blob: 24bb99d7f4eb14a59e0eb08fa295c60071fd14c7 [file] [log] [blame]
Colin Cross800fe132019-02-11 14:21:24 -08001// Copyright 2019 Google Inc. All rights reserved.
2//
3// Licensed under the Apache License, Version 2.0 (the "License");
4// you may not use this file except in compliance with the License.
5// You may obtain a copy of the License at
6//
7// http://www.apache.org/licenses/LICENSE-2.0
8//
9// Unless required by applicable law or agreed to in writing, software
10// distributed under the License is distributed on an "AS IS" BASIS,
11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12// See the License for the specific language governing permissions and
13// limitations under the License.
14
15package java
16
17import (
Colin Crossd6495802025-01-14 15:50:48 -080018 "fmt"
Colin Cross800fe132019-02-11 14:21:24 -080019 "path/filepath"
20 "strings"
21
22 "android/soong/android"
23 "android/soong/dexpreopt"
24
Spandan Dasda739a32023-12-13 00:06:32 +000025 "github.com/google/blueprint"
Colin Cross800fe132019-02-11 14:21:24 -080026 "github.com/google/blueprint/proptools"
27)
28
Paul Duffin1ab61862021-01-20 17:44:53 +000029// =================================================================================================
30// WIP - see http://b/177892522 for details
31//
32// The build support for boot images is currently being migrated away from singleton to modules so
33// the documentation may not be strictly accurate. Rather than update the documentation at every
34// step which will create a lot of churn the changes that have been made will be listed here and the
35// documentation will be updated once it is closer to the final result.
36//
37// Changes:
38// 1) dex_bootjars is now a singleton module and not a plain singleton.
Paul Duffin3451e162021-01-20 15:16:56 +000039// 2) Boot images are now represented by the boot_image module type.
40// 3) The art boot image is called "art-boot-image", the framework boot image is called
41// "framework-boot-image".
42// 4) They are defined in art/build/boot/Android.bp and frameworks/base/boot/Android.bp
43// respectively.
44// 5) Each boot_image retrieves the appropriate boot image configuration from the map returned by
45// genBootImageConfigs() using the image_name specified in the boot_image module.
Paul Duffin1ab61862021-01-20 17:44:53 +000046// =================================================================================================
47
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +000048// This comment describes:
49// 1. ART boot images in general (their types, structure, file layout, etc.)
50// 2. build system support for boot images
51//
52// 1. ART boot images
53// ------------------
54//
55// A boot image in ART is a set of files that contain AOT-compiled native code and a heap snapshot
56// of AOT-initialized classes for the bootclasspath Java libraries. A boot image is compiled from a
57// set of DEX jars by the dex2oat compiler. A boot image is used for two purposes: 1) it is
58// installed on device and loaded at runtime, and 2) other Java libraries and apps are compiled
59// against it (compilation may take place either on host, known as "dexpreopt", or on device, known
60// as "dexopt").
61//
62// A boot image is not a single file, but a collection of interrelated files. Each boot image has a
63// number of components that correspond to the Java libraries that constitute it. For each component
64// there are multiple files:
65// - *.oat or *.odex file with native code (architecture-specific, one per instruction set)
66// - *.art file with pre-initialized Java classes (architecture-specific, one per instruction set)
67// - *.vdex file with verification metadata for the DEX bytecode (architecture independent)
68//
69// *.vdex files for the boot images do not contain the DEX bytecode itself, because the
70// bootclasspath DEX files are stored on disk in uncompressed and aligned form. Consequently a boot
71// image is not self-contained and cannot be used without its DEX files. To simplify the management
72// of boot image files, ART uses a certain naming scheme and associates the following metadata with
73// each boot image:
74// - A stem, which is a symbolic name that is prepended to boot image file names.
75// - A location (on-device path to the boot image files).
76// - A list of boot image locations (on-device paths to dependency boot images).
77// - A set of DEX locations (on-device paths to the DEX files, one location for one DEX file used
78// to compile the boot image).
79//
80// There are two kinds of boot images:
81// - primary boot images
82// - boot image extensions
83//
84// 1.1. Primary boot images
85// ------------------------
86//
87// A primary boot image is compiled for a core subset of bootclasspath Java libraries. It does not
88// depend on any other images, and other boot images may depend on it.
89//
90// For example, assuming that the stem is "boot", the location is /apex/com.android.art/javalib/,
91// the set of core bootclasspath libraries is A B C, and the boot image is compiled for ARM targets
92// (32 and 64 bits), it will have three components with the following files:
93// - /apex/com.android.art/javalib/{arm,arm64}/boot.{art,oat,vdex}
94// - /apex/com.android.art/javalib/{arm,arm64}/boot-B.{art,oat,vdex}
95// - /apex/com.android.art/javalib/{arm,arm64}/boot-C.{art,oat,vdex}
96//
97// The files of the first component are special: they do not have the component name appended after
98// the stem. This naming convention dates back to the times when the boot image was not split into
99// components, and there were just boot.oat and boot.art. The decision to split was motivated by
100// licensing reasons for one of the bootclasspath libraries.
101//
102// As of November 2020 the only primary boot image in Android is the image in the ART APEX
103// com.android.art. The primary ART boot image contains the Core libraries that are part of the ART
104// module. When the ART module gets updated, the primary boot image will be updated with it, and all
105// dependent images will get invalidated (the checksum of the primary image stored in dependent
106// images will not match), unless they are updated in sync with the ART module.
107//
108// 1.2. Boot image extensions
109// --------------------------
110//
111// A boot image extension is compiled for a subset of bootclasspath Java libraries (in particular,
112// this subset does not include the Core bootclasspath libraries that go into the primary boot
113// image). A boot image extension depends on the primary boot image and optionally some other boot
114// image extensions. Other images may depend on it. In other words, boot image extensions can form
115// acyclic dependency graphs.
116//
117// The motivation for boot image extensions comes from the Mainline project. Consider a situation
118// when the list of bootclasspath libraries is A B C, and both A and B are parts of the Android
119// platform, but C is part of an updatable APEX com.android.C. When the APEX is updated, the Java
120// code for C might have changed compared to the code that was used to compile the boot image.
121// Consequently, the whole boot image is obsolete and invalidated (even though the code for A and B
122// that does not depend on C is up to date). To avoid this, the original monolithic boot image is
123// split in two parts: the primary boot image that contains A B, and the boot image extension that
124// contains C and depends on the primary boot image (extends it).
125//
126// For example, assuming that the stem is "boot", the location is /system/framework, the set of
127// bootclasspath libraries is D E (where D is part of the platform and is located in
128// /system/framework, and E is part of a non-updatable APEX com.android.E and is located in
129// /apex/com.android.E/javalib), and the boot image is compiled for ARM targets (32 and 64 bits),
130// it will have two components with the following files:
131// - /system/framework/{arm,arm64}/boot-D.{art,oat,vdex}
132// - /system/framework/{arm,arm64}/boot-E.{art,oat,vdex}
133//
134// As of November 2020 the only boot image extension in Android is the Framework boot image
135// extension. It extends the primary ART boot image and contains Framework libraries and other
136// bootclasspath libraries from the platform and non-updatable APEXes that are not included in the
137// ART image. The Framework boot image extension is updated together with the platform. In the
138// future other boot image extensions may be added for some updatable modules.
139//
140//
141// 2. Build system support for boot images
142// ---------------------------------------
143//
144// The primary ART boot image needs to be compiled with one dex2oat invocation that depends on DEX
145// jars for the core libraries. Framework boot image extension needs to be compiled with one dex2oat
146// invocation that depends on the primary ART boot image and all bootclasspath DEX jars except the
Paul Duffin1ab61862021-01-20 17:44:53 +0000147// core libraries as they are already part of the primary ART boot image.
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000148//
149// 2.1. Libraries that go in the boot images
150// -----------------------------------------
151//
152// The contents of each boot image are determined by the PRODUCT variables. The primary ART APEX
153// boot image contains libraries listed in the ART_APEX_JARS variable in the AOSP makefiles. The
154// Framework boot image extension contains libraries specified in the PRODUCT_BOOT_JARS and
155// PRODUCT_BOOT_JARS_EXTRA variables. The AOSP makefiles specify some common Framework libraries,
156// but more product-specific libraries can be added in the product makefiles.
157//
Martin Stjernholm1d51ea92021-07-05 20:33:42 +0100158// Each component of the PRODUCT_BOOT_JARS and PRODUCT_BOOT_JARS_EXTRA variables is a
159// colon-separated pair <apex>:<library>, where <apex> is the variant name of a non-updatable APEX,
160// "platform" if the library is a part of the platform in the system partition, or "system_ext" if
161// it's in the system_ext partition.
162//
163// In these variables APEXes are identified by their "variant names", i.e. the names they get
164// mounted as in /apex on device. In Soong modules that is the name set in the "apex_name"
165// properties, which default to the "name" values. For example, many APEXes have both
166// com.android.xxx and com.google.android.xxx modules in Soong, but take the same place
167// /apex/com.android.xxx at runtime. In these cases the variant name is always com.android.xxx,
168// regardless which APEX goes into the product. See also android.ApexInfo.ApexVariationName and
169// apex.apexBundleProperties.Apex_name.
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000170//
satayevd604b212021-07-21 14:23:52 +0100171// A related variable PRODUCT_APEX_BOOT_JARS contains bootclasspath libraries that are in APEXes.
172// They are not included in the boot image. The only exception here are ART jars and core-icu4j.jar
173// that have been historically part of the boot image and are now in apexes; they are in boot images
174// and core-icu4j.jar is generally treated as being part of PRODUCT_BOOT_JARS.
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000175//
176// One exception to the above rules are "coverage" builds (a special build flavor which requires
177// setting environment variable EMMA_INSTRUMENT_FRAMEWORK=true). In coverage builds the Java code in
178// boot image libraries is instrumented, which means that the instrumentation library (jacocoagent)
179// needs to be added to the list of bootclasspath DEX jars.
180//
181// In general, there is a requirement that the source code for a boot image library must be
182// available at build time (e.g. it cannot be a stub that has a separate implementation library).
183//
184// 2.2. Static configs
185// -------------------
186//
187// Because boot images are used to dexpreopt other Java modules, the paths to boot image files must
188// be known by the time dexpreopt build rules for the dependent modules are generated. Boot image
189// configs are constructed very early during the build, before build rule generation. The configs
190// provide predefined paths to boot image files (these paths depend only on static build
191// configuration, such as PRODUCT variables, and use hard-coded directory names).
192//
193// 2.3. Singleton
194// --------------
195//
196// Build rules for the boot images are generated with a Soong singleton. Because a singleton has no
197// dependencies on other modules, it has to find the modules for the DEX jars using VisitAllModules.
198// Soong loops through all modules and compares each module against a list of bootclasspath library
199// names. Then it generates build rules that copy DEX jars from their intermediate module-specific
200// locations to the hard-coded locations predefined in the boot image configs.
201//
202// It would be possible to use a module with proper dependencies instead, but that would require
203// changes in the way Soong generates variables for Make: a singleton can use one MakeVars() method
204// that writes variables to out/soong/make_vars-*.mk, which is included early by the main makefile,
205// but module(s) would have to use out/soong/Android-*.mk which has a group of LOCAL_* variables
206// for each module, and is included later.
207//
208// 2.4. Install rules
209// ------------------
210//
211// The primary boot image and the Framework extension are installed in different ways. The primary
212// boot image is part of the ART APEX: it is copied into the APEX intermediate files, packaged
ELIYAZ MOMINfd1c4fb2024-09-27 15:30:07 +0000213// together with other APEX contents, extracted and mounted on device. The Framework boot image
214// extension is installed by the rules defined in makefiles (make/core/dex_preopt_libart.mk). Soong
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000215// writes out a few DEXPREOPT_IMAGE_* variables for Make; these variables contain boot image names,
216// paths and so on.
217//
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000218
Martin Stjernholmdb513822021-02-16 19:55:58 +0000219var artApexNames = []string{
220 "com.android.art",
221 "com.android.art.debug",
Roland Levillaind603c7d2021-03-24 14:23:57 +0000222 "com.android.art.testing",
Martin Stjernholmdb513822021-02-16 19:55:58 +0000223 "com.google.android.art",
224 "com.google.android.art.debug",
225 "com.google.android.art.testing",
226}
227
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100228var (
Spandan Dasda739a32023-12-13 00:06:32 +0000229 dexBootJarsFragmentsKey = android.NewOnceKey("dexBootJarsFragments")
230 apexContributionsMetadataDepTag = dependencyTag{name: "all_apex_contributions"}
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100231)
232
Colin Cross800fe132019-02-11 14:21:24 -0800233func init() {
Ulya Trafimovichb28cc372020-01-13 15:18:16 +0000234 RegisterDexpreoptBootJarsComponents(android.InitRegistrationContext)
Colin Cross800fe132019-02-11 14:21:24 -0800235}
236
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000237// Target-independent description of a boot image.
Paul Duffina8df7e12022-10-04 15:21:47 +0100238//
239// WARNING: All fields in this struct should be initialized in the genBootImageConfigs function.
240// Failure to do so can lead to data races if there is no synchronization enforced ordering between
Colin Cross84ed5112024-01-17 12:14:44 -0800241// the writer and the reader.
Colin Cross44df5812019-02-15 23:06:46 -0800242type bootImageConfig struct {
David Srbecky1aacc6c2020-03-26 11:10:45 +0000243 // If this image is an extension, the image that it extends.
244 extends *bootImageConfig
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000245
246 // Image name (used in directory names and ninja rule names).
247 name string
248
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100249 // If the module with the given name exists, this config is enabled.
250 enabledIfExists string
251
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000252 // Basename of the image: the resulting filenames are <stem>[-<jar>].{art,oat,vdex}.
253 stem string
254
255 // Output directory for the image files.
256 dir android.OutputPath
257
258 // Output directory for the image files with debug symbols.
259 symbolsDir android.OutputPath
260
Jiakai Zhang09d88df2023-05-10 17:04:53 +0100261 // The relative location where the image files are installed. On host, the location is relative to
262 // $ANDROID_PRODUCT_OUT.
263 //
264 // Only the configs that are built by platform_bootclasspath are installable on device. On device,
265 // the location is relative to "/".
266 installDir string
Jeongik Cha4dda75e2021-04-27 23:56:44 +0900267
Ulya Trafimovich249386a2020-07-01 14:31:13 +0100268 // A list of (location, jar) pairs for the Java modules in this image.
269 modules android.ConfiguredJarList
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000270
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000271 // File paths to jars.
272 dexPaths android.WritablePaths // for this image
273 dexPathsDeps android.WritablePaths // for the dependency images and in this image
274
Paul Duffin5f148ca2021-06-02 17:24:22 +0100275 // Map from module name (without prebuilt_ prefix) to the predefined build path.
276 dexPathsByModule map[string]android.WritablePath
277
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000278 // File path to a zip archive with all image files (or nil, if not needed).
279 zip android.WritablePath
David Srbeckyc177ebe2020-02-18 20:43:06 +0000280
David Srbeckyc177ebe2020-02-18 20:43:06 +0000281 // Target-dependent fields.
282 variants []*bootImageVariant
Nicolas Geoffrayb9a46fb2022-03-14 15:31:47 +0000283
284 // Path of the preloaded classes file.
285 preloadedClassesFile string
Jiakai Zhang8e9ea8b2023-02-23 17:50:46 +0000286
287 // The "--compiler-filter" argument.
288 compilerFilter string
Jiakai Zhangb8796202023-03-06 19:16:48 +0000289
290 // The "--single-image" argument.
291 singleImage bool
Jiakai Zhangc08c1622023-05-10 18:38:34 +0100292
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100293 // Profiles imported from APEXes, in addition to the profile at the default path. Each entry must
294 // be the name of an APEX module.
295 profileImports []string
Colin Crossdcc61562025-02-01 14:10:29 -0800296
297 // The name of the module that provides boot image profiles, if any.
298 profileProviderModule string
David Srbeckyc177ebe2020-02-18 20:43:06 +0000299}
300
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000301// Target-dependent description of a boot image.
Paul Duffina8df7e12022-10-04 15:21:47 +0100302//
303// WARNING: The warning comment on bootImageConfig applies here too.
David Srbeckyc177ebe2020-02-18 20:43:06 +0000304type bootImageVariant struct {
305 *bootImageConfig
306
307 // Target for which the image is generated.
308 target android.Target
309
David Srbeckyab994982020-03-30 17:24:13 +0100310 // The "locations" of jars.
311 dexLocations []string // for this image
312 dexLocationsDeps []string // for the dependency images and in this image
313
David Srbeckyc177ebe2020-02-18 20:43:06 +0000314 // Paths to image files.
Paul Duffinbff50e22021-06-04 17:25:28 +0100315 imagePathOnHost android.OutputPath // first image file path on host
316 imagePathOnDevice string // first image file path on device
David Srbeckyc177ebe2020-02-18 20:43:06 +0000317
Paul Duffinbff50e22021-06-04 17:25:28 +0100318 // All the files that constitute this image variant, i.e. .art, .oat and .vdex files.
319 imagesDeps android.OutputPaths
320
Jiakai Zhang8fe3a412023-02-23 17:37:16 +0000321 // The path to the base image variant's imagePathOnHost field, where base image variant
Paul Duffinbff50e22021-06-04 17:25:28 +0100322 // means the image variant that this extends.
323 //
324 // This is only set for a variant of an image that extends another image.
Jiakai Zhang8fe3a412023-02-23 17:37:16 +0000325 baseImages android.OutputPaths
David Srbeckyc177ebe2020-02-18 20:43:06 +0000326
Jiakai Zhang8fe3a412023-02-23 17:37:16 +0000327 // The paths to the base image variant's imagesDeps field, where base image variant
Paul Duffinbff50e22021-06-04 17:25:28 +0100328 // means the image variant that this extends.
329 //
330 // This is only set for a variant of an image that extends another image.
Jiakai Zhang8fe3a412023-02-23 17:37:16 +0000331 baseImagesDeps android.Paths
Paul Duffinbff50e22021-06-04 17:25:28 +0100332
Jiakai Zhang6decef92022-01-12 17:56:19 +0000333 // Rules which should be used in make to install the outputs on host.
Paul Duffina8df7e12022-10-04 15:21:47 +0100334 //
335 // Deprecated: Not initialized correctly, see struct comment.
336 installs android.RuleBuilderInstalls
337
338 // Rules which should be used in make to install the vdex outputs on host.
339 //
340 // Deprecated: Not initialized correctly, see struct comment.
341 vdexInstalls android.RuleBuilderInstalls
342
343 // Rules which should be used in make to install the unstripped outputs on host.
344 //
345 // Deprecated: Not initialized correctly, see struct comment.
David Srbeckyc177ebe2020-02-18 20:43:06 +0000346 unstrippedInstalls android.RuleBuilderInstalls
Jiakai Zhang6decef92022-01-12 17:56:19 +0000347
Colin Crosse7fe0962022-03-15 17:49:24 -0700348 // Path to the license metadata file for the module that built the image.
Paul Duffina8df7e12022-10-04 15:21:47 +0100349 //
350 // Deprecated: Not initialized correctly, see struct comment.
Colin Crosse7fe0962022-03-15 17:49:24 -0700351 licenseMetadataFile android.OptionalPath
David Srbeckyc177ebe2020-02-18 20:43:06 +0000352}
353
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000354// Get target-specific boot image variant for the given boot image config and target.
David Srbeckyc177ebe2020-02-18 20:43:06 +0000355func (image bootImageConfig) getVariant(target android.Target) *bootImageVariant {
356 for _, variant := range image.variants {
357 if variant.target.Os == target.Os && variant.target.Arch.ArchType == target.Arch.ArchType {
358 return variant
359 }
360 }
361 return nil
Colin Cross800fe132019-02-11 14:21:24 -0800362}
363
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000364// Return any (the first) variant which is for the device (as opposed to for the host).
David Srbeckyab994982020-03-30 17:24:13 +0100365func (image bootImageConfig) getAnyAndroidVariant() *bootImageVariant {
366 for _, variant := range image.variants {
367 if variant.target.Os == android.Android {
368 return variant
369 }
370 }
371 return nil
372}
373
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000374// Return the name of a boot image module given a boot image config and a component (module) index.
375// A module name is a combination of the Java library name, and the boot image stem (that is stored
376// in the config).
Ulya Trafimovich8640ab92020-05-11 18:06:15 +0100377func (image bootImageConfig) moduleName(ctx android.PathContext, idx int) string {
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000378 // The first module of the primary boot image is special: its module name has only the stem, but
379 // not the library name. All other module names are of the form <stem>-<library name>
Ulya Trafimovich249386a2020-07-01 14:31:13 +0100380 m := image.modules.Jar(idx)
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000381 name := image.stem
David Srbecky1aacc6c2020-03-26 11:10:45 +0000382 if idx != 0 || image.extends != nil {
Jiakai Zhang4d90da22023-07-12 16:51:48 +0100383 name += "-" + android.ModuleStem(ctx.Config(), image.modules.Apex(idx), m)
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000384 }
385 return name
386}
Dan Willemsen0f416782019-06-13 21:44:53 +0000387
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000388// Return the name of the first boot image module, or stem if the list of modules is empty.
Ulya Trafimovich8640ab92020-05-11 18:06:15 +0100389func (image bootImageConfig) firstModuleNameOrStem(ctx android.PathContext) string {
Ulya Trafimovich249386a2020-07-01 14:31:13 +0100390 if image.modules.Len() > 0 {
Ulya Trafimovich8640ab92020-05-11 18:06:15 +0100391 return image.moduleName(ctx, 0)
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000392 } else {
393 return image.stem
394 }
395}
396
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000397// Return filenames for the given boot image component, given the output directory and a list of
398// extensions.
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000399func (image bootImageConfig) moduleFiles(ctx android.PathContext, dir android.OutputPath, exts ...string) android.OutputPaths {
Ulya Trafimovich249386a2020-07-01 14:31:13 +0100400 ret := make(android.OutputPaths, 0, image.modules.Len()*len(exts))
401 for i := 0; i < image.modules.Len(); i++ {
Ulya Trafimovich8640ab92020-05-11 18:06:15 +0100402 name := image.moduleName(ctx, i)
Dan Willemsen0f416782019-06-13 21:44:53 +0000403 for _, ext := range exts {
404 ret = append(ret, dir.Join(ctx, name+ext))
405 }
Jiakai Zhangb8796202023-03-06 19:16:48 +0000406 if image.singleImage {
407 break
408 }
Dan Willemsen0f416782019-06-13 21:44:53 +0000409 }
Dan Willemsen0f416782019-06-13 21:44:53 +0000410 return ret
411}
412
Paul Duffin5466a362021-06-07 10:25:31 +0100413// apexVariants returns a list of all *bootImageVariant that could be included in an apex.
414func (image *bootImageConfig) apexVariants() []*bootImageVariant {
415 variants := []*bootImageVariant{}
416 for _, variant := range image.variants {
417 // We also generate boot images for host (for testing), but we don't need those in the apex.
418 // TODO(b/177892522) - consider changing this to check Os.OsClass = android.Device
419 if variant.target.Os == android.Android {
420 variants = append(variants, variant)
421 }
422 }
423 return variants
424}
425
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000426// Return boot image locations (as a list of symbolic paths).
427//
David Srbecky1aacc6c2020-03-26 11:10:45 +0000428// The image "location" is a symbolic path that, with multiarchitecture support, doesn't really
429// exist on the device. Typically it is /apex/com.android.art/javalib/boot.art and should be the
430// same for all supported architectures on the device. The concrete architecture specific files
431// actually end up in architecture-specific sub-directory such as arm, arm64, x86, or x86_64.
432//
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000433// For example a physical file /apex/com.android.art/javalib/x86/boot.art has "image location"
434// /apex/com.android.art/javalib/boot.art (which is not an actual file).
435//
436// For a primary boot image the list of locations has a single element.
437//
438// For a boot image extension the list of locations contains a location for all dependency images
439// (including the primary image) and the location of the extension itself. For example, for the
440// Framework boot image extension that depends on the primary ART boot image the list contains two
441// elements.
David Srbecky1aacc6c2020-03-26 11:10:45 +0000442//
443// The location is passed as an argument to the ART tools like dex2oat instead of the real path.
444// ART tools will then reconstruct the architecture-specific real path.
Jeongik Cha4dda75e2021-04-27 23:56:44 +0900445func (image *bootImageVariant) imageLocations() (imageLocationsOnHost []string, imageLocationsOnDevice []string) {
David Srbecky1aacc6c2020-03-26 11:10:45 +0000446 if image.extends != nil {
Jeongik Cha4dda75e2021-04-27 23:56:44 +0900447 imageLocationsOnHost, imageLocationsOnDevice = image.extends.getVariant(image.target).imageLocations()
David Srbecky1aacc6c2020-03-26 11:10:45 +0000448 }
Jeongik Cha4dda75e2021-04-27 23:56:44 +0900449 return append(imageLocationsOnHost, dexpreopt.PathToLocation(image.imagePathOnHost, image.target.Arch.ArchType)),
450 append(imageLocationsOnDevice, dexpreopt.PathStringToLocation(image.imagePathOnDevice, image.target.Arch.ArchType))
David Srbecky1aacc6c2020-03-26 11:10:45 +0000451}
452
Jiakai Zhang8e9ea8b2023-02-23 17:50:46 +0000453func (image *bootImageConfig) isProfileGuided() bool {
454 return image.compilerFilter == "speed-profile"
455}
456
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100457func (image *bootImageConfig) isEnabled(ctx android.BaseModuleContext) bool {
458 return ctx.OtherModuleExists(image.enabledIfExists)
459}
460
Paul Duffin1ab61862021-01-20 17:44:53 +0000461func dexpreoptBootJarsFactory() android.SingletonModule {
462 m := &dexpreoptBootJars{}
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100463 android.InitAndroidArchModule(m, android.DeviceSupported, android.MultilibCommon)
Paul Duffin1ab61862021-01-20 17:44:53 +0000464 return m
Colin Cross800fe132019-02-11 14:21:24 -0800465}
466
Ulya Trafimovichb28cc372020-01-13 15:18:16 +0000467func RegisterDexpreoptBootJarsComponents(ctx android.RegistrationContext) {
LaMont Jones0c10e4d2023-05-16 00:58:37 +0000468 ctx.RegisterParallelSingletonModuleType("dex_bootjars", dexpreoptBootJarsFactory)
Spandan Das38b4c942024-09-18 18:58:41 +0000469 ctx.RegisterModuleType("art_boot_images", artBootImagesFactory)
Ulya Trafimovichb28cc372020-01-13 15:18:16 +0000470}
471
Ulya Trafimovicha4a1c4e2021-01-15 18:40:04 +0000472func SkipDexpreoptBootJars(ctx android.PathContext) bool {
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100473 global := dexpreopt.GetGlobalConfig(ctx)
474 return global.DisablePreoptBootImages || !shouldBuildBootImages(ctx.Config(), global)
Colin Cross800fe132019-02-11 14:21:24 -0800475}
476
Paul Duffin1ab61862021-01-20 17:44:53 +0000477// Singleton module for generating boot image build rules.
Colin Cross44df5812019-02-15 23:06:46 -0800478type dexpreoptBootJars struct {
Paul Duffin1ab61862021-01-20 17:44:53 +0000479 android.SingletonModuleBase
480
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000481 // Default boot image config (currently always the Framework boot image extension). It should be
482 // noted that JIT-Zygote builds use ART APEX image instead of the Framework boot image extension,
483 // but the switch is handled not here, but in the makefiles (triggered with
484 // DEXPREOPT_USE_ART_IMAGE=true).
David Srbeckyc177ebe2020-02-18 20:43:06 +0000485 defaultBootImage *bootImageConfig
Colin Cross2d00f0d2019-05-09 21:50:00 -0700486
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000487 // Other boot image configs (currently the list contains only the primary ART APEX image. It
488 // used to contain an experimental JIT-Zygote image (now replaced with the ART APEX image). In
489 // the future other boot image extensions may be added.
490 otherImages []*bootImageConfig
491
492 // Build path to a config file that Soong writes for Make (to be used in makefiles that install
493 // the default boot image).
Colin Cross2d00f0d2019-05-09 21:50:00 -0700494 dexpreoptConfigForMake android.WritablePath
Spandan Das29207b52024-07-30 23:28:17 +0000495
496 // Build path to the boot framework profile.
497 // This is used as the `OutputFile` in `AndroidMkEntries`.
498 // A non-nil value ensures that this singleton module does not get skipped in AndroidMkEntries processing.
499 bootFrameworkProfile android.WritablePath
Colin Cross44df5812019-02-15 23:06:46 -0800500}
Colin Cross800fe132019-02-11 14:21:24 -0800501
Spandan Dasda739a32023-12-13 00:06:32 +0000502func (dbj *dexpreoptBootJars) DepsMutator(ctx android.BottomUpMutatorContext) {
503 // Create a dependency on all_apex_contributions to determine the selected mainline module
504 ctx.AddDependency(ctx.Module(), apexContributionsMetadataDepTag, "all_apex_contributions")
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100505
506 if dexpreopt.IsDex2oatNeeded(ctx) {
507 // Add a dependency onto the dex2oat tool which is needed for creating the boot image. The
508 // path is retrieved from the dependency by GetGlobalSoongConfig(ctx).
509 dexpreopt.RegisterToolDeps(ctx)
510 }
511
512 imageConfigs := genBootImageConfigs(ctx)
513 for _, config := range imageConfigs {
514 if !config.isEnabled(ctx) {
515 continue
516 }
517 // For accessing the boot jars.
Colin Crossd8d8b852024-12-20 16:32:37 -0800518 addDependenciesOntoBootImageModules(ctx, config.modules, dexpreoptBootJar)
Spandan Dasda739a32023-12-13 00:06:32 +0000519 // Create a dependency on the apex selected using RELEASE_APEX_CONTRIBUTIONS_*
520 // TODO: b/308174306 - Remove the direct depedendency edge to the java_library (source/prebuilt) once all mainline modules
521 // have been flagged using RELEASE_APEX_CONTRIBUTIONS_*
522 apexes := []string{}
523 for i := 0; i < config.modules.Len(); i++ {
524 apexes = append(apexes, config.modules.Apex(i))
525 }
526 addDependenciesOntoSelectedBootImageApexes(ctx, android.FirstUniqueStrings(apexes)...)
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100527 }
528
529 if ctx.OtherModuleExists("platform-bootclasspath") {
530 // For accessing all bootclasspath fragments.
Colin Crossd8d8b852024-12-20 16:32:37 -0800531 addDependencyOntoApexModulePair(ctx, "platform", "platform-bootclasspath", platform)
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100532 } else if ctx.OtherModuleExists("art-bootclasspath-fragment") {
533 // For accessing the ART bootclasspath fragment on a thin manifest (e.g., master-art) where
534 // platform-bootclasspath doesn't exist.
Colin Crossd8d8b852024-12-20 16:32:37 -0800535 addDependencyOntoApexModulePair(ctx, "com.android.art", "art-bootclasspath-fragment", fragment)
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100536 }
Paul Duffin1ab61862021-01-20 17:44:53 +0000537}
538
Spandan Dasda739a32023-12-13 00:06:32 +0000539// Create a dependency from dex_bootjars to the specific apexes selected using all_apex_contributions
540// This dependency will be used to get the path to the deapexed dex boot jars and profile (via a provider)
541func addDependenciesOntoSelectedBootImageApexes(ctx android.BottomUpMutatorContext, apexes ...string) {
542 psi := android.PrebuiltSelectionInfoMap{}
543 ctx.VisitDirectDepsWithTag(apexContributionsMetadataDepTag, func(am android.Module) {
Spandan Dasbc114d22023-12-20 01:27:29 +0000544 if info, exists := android.OtherModuleProvider(ctx, am, android.PrebuiltSelectionInfoProvider); exists {
545 psi = info
Spandan Dasda739a32023-12-13 00:06:32 +0000546 }
547 })
548 for _, apex := range apexes {
549 for _, selected := range psi.GetSelectedModulesForApiDomain(apex) {
550 // We need to add a dep on only the apex listed in `contents` of the selected apex_contributions module
551 // This is not available in a structured format in `apex_contributions`, so this hack adds a dep on all `contents`
552 // (some modules like art.module.public.api do not have an apex variation since it is a pure stub module that does not get installed)
Colin Crossd8d8b852024-12-20 16:32:37 -0800553 tag := bootclasspathDependencyTag{
554 typ: dexpreoptBootJar,
555 }
Colin Crossd6495802025-01-14 15:50:48 -0800556
557 ctx.AddFarVariationDependencies(ctx.Target().Variations(), tag, android.RemoveOptionalPrebuiltPrefix(selected))
Spandan Dasda739a32023-12-13 00:06:32 +0000558 }
559 }
560}
561
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100562func gatherBootclasspathFragments(ctx android.ModuleContext) map[string]android.Module {
563 return ctx.Config().Once(dexBootJarsFragmentsKey, func() interface{} {
564 fragments := make(map[string]android.Module)
Colin Crossd6495802025-01-14 15:50:48 -0800565
566 type moduleInApexPair struct {
567 module string
568 apex string
569 }
570
571 var modulesInApexes []moduleInApexPair
572
573 // Find the list of modules in apexes.
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100574 ctx.WalkDeps(func(child, parent android.Module) bool {
Cole Fausta963b942024-04-11 17:43:00 -0700575 if !isActiveModule(ctx, child) {
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100576 return false
577 }
578 tag := ctx.OtherModuleDependencyTag(child)
Colin Crossd8d8b852024-12-20 16:32:37 -0800579 if bcpTag, ok := tag.(bootclasspathDependencyTag); ok {
580 if bcpTag.typ == platform {
581 return true
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100582 }
Colin Crossd8d8b852024-12-20 16:32:37 -0800583 if bcpTag.typ == fragment {
Colin Crossd6495802025-01-14 15:50:48 -0800584 if bcpTag.moduleInApex == "" {
585 panic(fmt.Errorf("expected fragment to be in apex"))
Colin Crossd8d8b852024-12-20 16:32:37 -0800586 }
Colin Crossd6495802025-01-14 15:50:48 -0800587 modulesInApexes = append(modulesInApexes, moduleInApexPair{bcpTag.moduleInApex, ctx.OtherModuleName(child)})
588 return true
Colin Crossd8d8b852024-12-20 16:32:37 -0800589 }
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100590 }
591 return false
592 })
Colin Crossd6495802025-01-14 15:50:48 -0800593
594 for _, moduleInApex := range modulesInApexes {
595 // Find a desired module in an apex.
596 ctx.WalkDeps(func(child, parent android.Module) bool {
597 t := ctx.OtherModuleDependencyTag(child)
598 if bcpTag, ok := t.(bootclasspathDependencyTag); ok {
599 if bcpTag.typ == platform {
600 return true
601 }
602 if bcpTag.typ == fragment && ctx.OtherModuleName(child) == moduleInApex.apex {
603 // This is the dependency from this module to the apex, recurse into it.
604 return true
605 }
606 } else if android.RemoveOptionalPrebuiltPrefix(ctx.OtherModuleName(child)) == moduleInApex.module {
607 // This is the desired module inside the apex.
608 fragments[android.RemoveOptionalPrebuiltPrefix(moduleInApex.apex)] = child
609 }
610 return false
611 })
612 }
613
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100614 return fragments
615 }).(map[string]android.Module)
616}
Colin Cross2d00f0d2019-05-09 21:50:00 -0700617
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100618func getBootclasspathFragmentByApex(ctx android.ModuleContext, apexName string) android.Module {
619 return gatherBootclasspathFragments(ctx)[apexName]
620}
Colin Cross800fe132019-02-11 14:21:24 -0800621
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100622// GenerateAndroidBuildActions generates the build rules for boot images.
623func (d *dexpreoptBootJars) GenerateAndroidBuildActions(ctx android.ModuleContext) {
Jiakai Zhang8fe3a412023-02-23 17:37:16 +0000624 imageConfigs := genBootImageConfigs(ctx)
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100625 d.defaultBootImage = defaultBootImageConfig(ctx)
Jiakai Zhang8fe3a412023-02-23 17:37:16 +0000626 d.otherImages = make([]*bootImageConfig, 0, len(imageConfigs)-1)
Colin Cross84ed5112024-01-17 12:14:44 -0800627 var profileInstalls android.RuleBuilderInstalls
Spandan Das38b4c942024-09-18 18:58:41 +0000628 var artBootImageHostInstalls android.RuleBuilderInstalls
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100629 for _, name := range getImageNames() {
630 config := imageConfigs[name]
631 if config != d.defaultBootImage {
Jiakai Zhang8fe3a412023-02-23 17:37:16 +0000632 d.otherImages = append(d.otherImages, config)
633 }
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100634 if !config.isEnabled(ctx) {
635 continue
636 }
Colin Cross84ed5112024-01-17 12:14:44 -0800637 installs := generateBootImage(ctx, config)
638 profileInstalls = append(profileInstalls, installs...)
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100639 if config == d.defaultBootImage {
Spandan Das29207b52024-07-30 23:28:17 +0000640 bootProfile, installs := bootFrameworkProfileRule(ctx, config)
641 d.bootFrameworkProfile = bootProfile
Colin Cross84ed5112024-01-17 12:14:44 -0800642 profileInstalls = append(profileInstalls, installs...)
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100643 }
Spandan Das38b4c942024-09-18 18:58:41 +0000644 // Gather the install files of the host variant of the ART boot image.
645 // These installed files will be used in ART tests.
646 if config.name == "art" {
647 for _, variant := range config.variants {
648 if variant.target.Os != ctx.Config().BuildOS {
649 // not a host variant
650 continue
651 }
652 artBootImageHostInstalls = append(artBootImageHostInstalls, variant.installs...)
653 artBootImageHostInstalls = append(artBootImageHostInstalls, variant.vdexInstalls...)
654 }
655 }
Jiakai Zhang8fe3a412023-02-23 17:37:16 +0000656 }
Colin Cross84ed5112024-01-17 12:14:44 -0800657 if len(profileInstalls) > 0 {
658 android.SetProvider(ctx, profileInstallInfoProvider, profileInstallInfo{
659 profileInstalls: profileInstalls,
660 profileLicenseMetadataFile: android.OptionalPathForPath(ctx.LicenseMetadataFile()),
661 })
Justin Yun22c8aca2024-06-05 20:25:03 +0900662 for _, install := range profileInstalls {
Spandan Das29207b52024-07-30 23:28:17 +0000663 installFile(ctx, install)
Justin Yun22c8aca2024-06-05 20:25:03 +0900664 }
Colin Cross84ed5112024-01-17 12:14:44 -0800665 }
Spandan Das38b4c942024-09-18 18:58:41 +0000666 // Set a provider containing the install files of the host variant of the ART boot image.
667 // The actual install rules will be created by `art_boot_images`
668 android.SetProvider(
669 ctx,
670 artBootImageHostInfoProvider,
671 artBootImageHostInfo{
672 installs: artBootImageHostInstalls,
673 },
674 )
Colin Cross44df5812019-02-15 23:06:46 -0800675}
676
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100677// GenerateSingletonBuildActions generates build rules for the dexpreopt config for Make.
678func (d *dexpreoptBootJars) GenerateSingletonBuildActions(ctx android.SingletonContext) {
Jiakai Zhang7d292222024-01-18 17:27:42 +0000679 d.dexpreoptConfigForMake =
680 android.PathForOutput(ctx, dexpreopt.GetDexpreoptDirName(ctx), "dexpreopt.config")
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100681 writeGlobalConfigForMake(ctx, d.dexpreoptConfigForMake)
682}
683
Paul Duffinad19d382021-04-26 16:44:00 +0100684// shouldBuildBootImages determines whether boot images should be built.
685func shouldBuildBootImages(config android.Config, global *dexpreopt.GlobalConfig) bool {
686 // Skip recompiling the boot image for the second sanitization phase. We'll get separate paths
687 // and invalidate first-stage artifacts which are crucial to SANITIZE_LITE builds.
688 // Note: this is technically incorrect. Compiled code contains stack checks which may depend
689 // on ASAN settings.
690 if len(config.SanitizeDevice()) == 1 && config.SanitizeDevice()[0] == "address" && global.SanitizeLite {
691 return false
692 }
693 return true
694}
695
Colin Cross84ed5112024-01-17 12:14:44 -0800696func generateBootImage(ctx android.ModuleContext, imageConfig *bootImageConfig) android.RuleBuilderInstalls {
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100697 apexJarModulePairs := getModulesForImage(ctx, imageConfig)
698
699 // Copy module dex jars to their predefined locations.
700 bootDexJarsByModule := extractEncodedDexJarsFromModulesOrBootclasspathFragments(ctx, apexJarModulePairs)
701 copyBootJarsToPredefinedLocations(ctx, bootDexJarsByModule, imageConfig.dexPathsByModule)
702
703 // Build a profile for the image config from the profile at the default path. The profile will
704 // then be used along with profiles imported from APEXes to build the boot image.
Colin Cross84ed5112024-01-17 12:14:44 -0800705 profile, profileInstalls := bootImageProfileRule(ctx, imageConfig)
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100706
707 // If dexpreopt of boot image jars should be skipped, stop after generating a profile.
Jiakai Zhang23984422023-11-09 16:47:04 +0000708 global := dexpreopt.GetGlobalConfig(ctx)
709 if SkipDexpreoptBootJars(ctx) || (global.OnlyPreoptArtBootImage && imageConfig.name != "art") {
Colin Cross84ed5112024-01-17 12:14:44 -0800710 return profileInstalls
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100711 }
712
713 // Build boot image files for the android variants.
714 androidBootImageFiles := buildBootImageVariantsForAndroidOs(ctx, imageConfig, profile)
715
716 // Zip the android variant boot image files up.
717 buildBootImageZipInPredefinedLocation(ctx, imageConfig, androidBootImageFiles.byArch)
718
719 // Build boot image files for the host variants. There are use directly by ART host side tests.
720 buildBootImageVariantsForBuildOs(ctx, imageConfig, profile)
721
722 // Create a `dump-oat-<image-name>` rule that runs `oatdump` for debugging purposes.
723 dumpOatRules(ctx, imageConfig)
Colin Cross84ed5112024-01-17 12:14:44 -0800724
725 return profileInstalls
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100726}
727
728type apexJarModulePair struct {
Cole Faust06ea5312023-10-18 17:38:40 -0700729 apex string
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100730 jarModule android.Module
731}
732
733func getModulesForImage(ctx android.ModuleContext, imageConfig *bootImageConfig) []apexJarModulePair {
734 modules := make([]apexJarModulePair, 0, imageConfig.modules.Len())
735 for i := 0; i < imageConfig.modules.Len(); i++ {
736 found := false
Colin Crossd8d8b852024-12-20 16:32:37 -0800737 for _, module := range gatherApexModulePairDepsWithTag(ctx, dexpreoptBootJar) {
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100738 name := android.RemoveOptionalPrebuiltPrefix(module.Name())
739 if name == imageConfig.modules.Jar(i) {
740 modules = append(modules, apexJarModulePair{
Cole Faust06ea5312023-10-18 17:38:40 -0700741 apex: imageConfig.modules.Apex(i),
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100742 jarModule: module,
743 })
744 found = true
745 break
746 }
747 }
748 if !found && !ctx.Config().AllowMissingDependencies() {
749 ctx.ModuleErrorf(
750 "Boot image '%s' module '%s' not added as a dependency of dex_bootjars",
751 imageConfig.name,
752 imageConfig.modules.Jar(i))
753 return []apexJarModulePair{}
754 }
755 }
756 return modules
757}
758
759// extractEncodedDexJarsFromModulesOrBootclasspathFragments gets the hidden API encoded dex jars for
760// the given modules.
761func extractEncodedDexJarsFromModulesOrBootclasspathFragments(ctx android.ModuleContext, apexJarModulePairs []apexJarModulePair) bootDexJarByModule {
Spandan Das64c9e0c2023-12-20 20:13:34 +0000762 apexNameToApexExportInfoMap := getApexNameToApexExportsInfoMap(ctx)
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100763 encodedDexJarsByModuleName := bootDexJarByModule{}
764 for _, pair := range apexJarModulePairs {
Spandan Das64c9e0c2023-12-20 20:13:34 +0000765 dexJarPath := getDexJarForApex(ctx, pair, apexNameToApexExportInfoMap)
Spandan Das5be63332023-12-13 00:06:32 +0000766 encodedDexJarsByModuleName.addPath(pair.jarModule, dexJarPath)
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +0100767 }
768 return encodedDexJarsByModuleName
769}
770
Spandan Das64c9e0c2023-12-20 20:13:34 +0000771type apexNameToApexExportsInfoMap map[string]android.ApexExportsInfo
772
773// javaLibraryPathOnHost returns the path to the java library which is exported by the apex for hiddenapi and dexpreopt and a boolean indicating whether the java library exists
774// For prebuilt apexes, this is created by deapexing the prebuilt apex
775func (m *apexNameToApexExportsInfoMap) javaLibraryDexPathOnHost(ctx android.ModuleContext, apex string, javalib string) (android.Path, bool) {
776 if info, exists := (*m)[apex]; exists {
777 if dex, exists := info.LibraryNameToDexJarPathOnHost[javalib]; exists {
778 return dex, true
779 } else {
780 ctx.ModuleErrorf("Apex %s does not provide a dex boot jar for library %s\n", apex, javalib)
781 }
782 }
783 // An apex entry could not be found. Return false.
784 // TODO: b/308174306 - When all the mainline modules have been flagged, make this a hard error
785 return nil, false
786}
787
Spandan Das161e4682024-01-19 00:22:22 +0000788// Returns the stem of an artifact inside a prebuilt apex
789func ModuleStemForDeapexing(m android.Module) string {
790 bmn, _ := m.(interface{ BaseModuleName() string })
791 return bmn.BaseModuleName()
792}
793
Spandan Das5be63332023-12-13 00:06:32 +0000794// Returns the java libraries exported by the apex for hiddenapi and dexpreopt
795// This information can come from two mechanisms
796// 1. New: Direct deps to _selected_ apexes. The apexes return a ApexExportsInfo
797// 2. Legacy: An edge to java_library or java_import (java_sdk_library) module. For prebuilt apexes, this serves as a hook and is populated by deapexers of prebuilt apxes
798// TODO: b/308174306 - Once all mainline modules have been flagged, drop (2)
Spandan Das64c9e0c2023-12-20 20:13:34 +0000799func getDexJarForApex(ctx android.ModuleContext, pair apexJarModulePair, apexNameToApexExportsInfoMap apexNameToApexExportsInfoMap) android.Path {
Spandan Das161e4682024-01-19 00:22:22 +0000800 if dex, found := apexNameToApexExportsInfoMap.javaLibraryDexPathOnHost(ctx, pair.apex, ModuleStemForDeapexing(pair.jarModule)); found {
Spandan Das64c9e0c2023-12-20 20:13:34 +0000801 return dex
Spandan Das5be63332023-12-13 00:06:32 +0000802 }
803 // TODO: b/308174306 - Remove the legacy mechanism
804 if android.IsConfiguredJarForPlatform(pair.apex) || android.IsModulePrebuilt(pair.jarModule) {
805 // This gives us the dex jar with the hidden API flags encoded from the monolithic hidden API
806 // files or the dex jar extracted from a prebuilt APEX. We can't use this for a boot jar for
807 // a source APEX because there is no guarantee that it is the same as the jar packed into the
808 // APEX. In practice, they are the same when we are building from a full source tree, but they
809 // are different when we are building from a thin manifest (e.g., master-art), where there is
810 // no monolithic hidden API files at all.
811 return retrieveEncodedBootDexJarFromModule(ctx, pair.jarModule)
812 } else {
813 // Use exactly the same jar that is packed into the APEX.
814 fragment := getBootclasspathFragmentByApex(ctx, pair.apex)
815 if fragment == nil {
816 ctx.ModuleErrorf("Boot jar '%[1]s' is from APEX '%[2]s', but a bootclasspath_fragment for "+
817 "APEX '%[2]s' doesn't exist or is not added as a dependency of dex_bootjars",
818 pair.jarModule.Name(),
819 pair.apex)
820 }
821 bootclasspathFragmentInfo, _ := android.OtherModuleProvider(ctx, fragment, BootclasspathFragmentApexContentInfoProvider)
822 jar, err := bootclasspathFragmentInfo.DexBootJarPathForContentModule(pair.jarModule)
823 if err != nil {
Colin Crossd8d8b852024-12-20 16:32:37 -0800824 if ctx.Config().AllowMissingDependencies() {
825 ctx.AddMissingDependencies([]string{pair.jarModule.String()})
826 } else {
827 ctx.ModuleErrorf("%s", err)
828 }
Spandan Das5be63332023-12-13 00:06:32 +0000829 }
830 return jar
831 }
832 return nil
833}
834
Paul Duffin5f148ca2021-06-02 17:24:22 +0100835// copyBootJarsToPredefinedLocations generates commands that will copy boot jars to predefined
836// paths in the global config.
837func copyBootJarsToPredefinedLocations(ctx android.ModuleContext, srcBootDexJarsByModule bootDexJarByModule, dstBootJarsByModule map[string]android.WritablePath) {
838 // Create the super set of module names.
839 names := []string{}
Cole Faust18994c72023-02-28 16:02:16 -0800840 names = append(names, android.SortedKeys(srcBootDexJarsByModule)...)
841 names = append(names, android.SortedKeys(dstBootJarsByModule)...)
Paul Duffin5f148ca2021-06-02 17:24:22 +0100842 names = android.SortedUniqueStrings(names)
843 for _, name := range names {
844 src := srcBootDexJarsByModule[name]
845 dst := dstBootJarsByModule[name]
Paul Duffin7ebebfd2021-04-27 19:36:57 +0100846
Paul Duffin5f148ca2021-06-02 17:24:22 +0100847 if src == nil {
Martin Stjernholmed3df442021-12-08 16:26:07 +0000848 // A dex boot jar should be provided by the source java module. It needs to be installable or
849 // have compile_dex=true - cf. assignments to java.Module.dexJarFile.
850 //
851 // However, the source java module may be either replaced or overridden (using prefer:true) by
852 // a prebuilt java module with the same name. In that case the dex boot jar needs to be
853 // provided by the corresponding prebuilt APEX module. That APEX is the one that refers
854 // through a exported_(boot|systemserver)classpath_fragments property to a
855 // prebuilt_(boot|systemserver)classpath_fragment module, which in turn lists the prebuilt
856 // java module in the contents property. If that chain is broken then this dependency will
857 // fail.
Spandan Das10ea4bf2021-08-20 19:18:16 +0000858 if !ctx.Config().AllowMissingDependencies() {
Martin Stjernholmed3df442021-12-08 16:26:07 +0000859 ctx.ModuleErrorf("module %s does not provide a dex boot jar (see comment next to this message in Soong for details)", name)
Spandan Das10ea4bf2021-08-20 19:18:16 +0000860 } else {
861 ctx.AddMissingDependencies([]string{name})
862 }
Paul Duffin5f148ca2021-06-02 17:24:22 +0100863 } else if dst == nil {
864 ctx.ModuleErrorf("module %s is not part of the boot configuration", name)
Paul Duffin57e2e7d2021-04-26 13:24:42 +0100865 } else {
866 ctx.Build(pctx, android.BuildParams{
867 Rule: android.Cp,
Paul Duffin5f148ca2021-06-02 17:24:22 +0100868 Input: src,
869 Output: dst,
Paul Duffin57e2e7d2021-04-26 13:24:42 +0100870 })
871 }
872 }
Ulya Trafimovichfa2b1cf2021-03-22 12:37:10 +0000873}
874
Paul Duffina56be7d2021-07-02 13:00:43 +0100875// buildBootImageVariantsForAndroidOs generates rules to build the boot image variants for the
876// android.Android OsType and returns a map from the architectures to the paths of the generated
877// boot image files.
878//
879// The paths are returned because they are needed elsewhere in Soong, e.g. for populating an APEX.
Paul Duffin9f6ac0b2022-10-04 15:36:44 +0100880func buildBootImageVariantsForAndroidOs(ctx android.ModuleContext, image *bootImageConfig, profile android.WritablePath) bootImageOutputs {
Paul Duffina56be7d2021-07-02 13:00:43 +0100881 return buildBootImageForOsType(ctx, image, profile, android.Android)
882}
883
884// buildBootImageVariantsForBuildOs generates rules to build the boot image variants for the
Colin Cross0c66bc62021-07-20 09:47:41 -0700885// config.BuildOS OsType, i.e. the type of OS on which the build is being running.
Paul Duffina56be7d2021-07-02 13:00:43 +0100886//
887// The files need to be generated into their predefined location because they are used from there
888// both within Soong and outside, e.g. for ART based host side testing and also for use by some
889// cloud based tools. However, they are not needed by callers of this function and so the paths do
890// not need to be returned from this func, unlike the buildBootImageVariantsForAndroidOs func.
891func buildBootImageVariantsForBuildOs(ctx android.ModuleContext, image *bootImageConfig, profile android.WritablePath) {
Colin Cross0c66bc62021-07-20 09:47:41 -0700892 buildBootImageForOsType(ctx, image, profile, ctx.Config().BuildOS)
Paul Duffina56be7d2021-07-02 13:00:43 +0100893}
894
Jiakai Zhangb47cacc2023-05-10 16:40:18 +0100895// bootImageFilesByArch is a map from android.ArchType to the paths to the boot image files.
896//
897// The paths include the .art, .oat and .vdex files, one for each of the modules from which the boot
898// image is created.
899type bootImageFilesByArch map[android.ArchType]android.Paths
900
Paul Duffin9f6ac0b2022-10-04 15:36:44 +0100901// bootImageOutputs encapsulates information about boot images that were created/obtained by
902// commonBootclasspathFragment.produceBootImageFiles.
903type bootImageOutputs struct {
904 // Map from arch to the paths to the boot image files created/obtained for that arch.
905 byArch bootImageFilesByArch
906
Paul Duffine10a9f22022-10-04 16:39:18 +0100907 variants []bootImageVariantOutputs
908
Paul Duffin9f6ac0b2022-10-04 15:36:44 +0100909 // The path to the profile file created/obtained for the boot image.
910 profile android.WritablePath
911}
912
Paul Duffina56be7d2021-07-02 13:00:43 +0100913// buildBootImageForOsType takes a bootImageConfig, a profile file and an android.OsType
914// boot image files are required for and it creates rules to build the boot image
915// files for all the required architectures for them.
Paul Duffin56afb272021-07-01 22:04:22 +0100916//
917// It returns a map from android.ArchType to the predefined paths of the boot image files.
Paul Duffin9f6ac0b2022-10-04 15:36:44 +0100918func buildBootImageForOsType(ctx android.ModuleContext, image *bootImageConfig, profile android.WritablePath, requiredOsType android.OsType) bootImageOutputs {
Paul Duffin56afb272021-07-01 22:04:22 +0100919 filesByArch := bootImageFilesByArch{}
Paul Duffine10a9f22022-10-04 16:39:18 +0100920 imageOutputs := bootImageOutputs{
921 byArch: filesByArch,
922 profile: profile,
923 }
David Srbeckyc177ebe2020-02-18 20:43:06 +0000924 for _, variant := range image.variants {
Paul Duffina56be7d2021-07-02 13:00:43 +0100925 if variant.target.Os == requiredOsType {
Paul Duffine10a9f22022-10-04 16:39:18 +0100926 variantOutputs := buildBootImageVariant(ctx, variant, profile)
927 imageOutputs.variants = append(imageOutputs.variants, variantOutputs)
Paul Duffin56afb272021-07-01 22:04:22 +0100928 filesByArch[variant.target.Arch.ArchType] = variant.imagesDeps.Paths()
Ulya Trafimovich9ab49332020-06-10 15:44:25 +0100929 }
Colin Cross800fe132019-02-11 14:21:24 -0800930 }
Colin Cross44df5812019-02-15 23:06:46 -0800931
Paul Duffine10a9f22022-10-04 16:39:18 +0100932 return imageOutputs
Paul Duffin56afb272021-07-01 22:04:22 +0100933}
Colin Crossdf8eebe2019-04-09 15:29:41 -0700934
Paul Duffin56afb272021-07-01 22:04:22 +0100935// buildBootImageZipInPredefinedLocation generates a zip file containing all the boot image files.
936//
937// The supplied filesByArch is nil when the boot image files have not been generated. Otherwise, it
938// is a map from android.ArchType to the predefined locations.
939func buildBootImageZipInPredefinedLocation(ctx android.ModuleContext, image *bootImageConfig, filesByArch bootImageFilesByArch) {
940 if filesByArch == nil {
941 return
Colin Crossdf8eebe2019-04-09 15:29:41 -0700942 }
Paul Duffin56afb272021-07-01 22:04:22 +0100943
944 // Compute the list of files from all the architectures.
945 zipFiles := android.Paths{}
946 for _, archType := range android.ArchTypeList() {
947 zipFiles = append(zipFiles, filesByArch[archType]...)
948 }
949
950 rule := android.NewRuleBuilder(pctx, ctx)
951 rule.Command().
952 BuiltTool("soong_zip").
953 FlagWithOutput("-o ", image.zip).
954 FlagWithArg("-C ", image.dir.Join(ctx, android.Android.String()).String()).
955 FlagWithInputList("-f ", zipFiles, " -f ")
956
957 rule.Build("zip_"+image.name, "zip "+image.name+" image")
Colin Cross800fe132019-02-11 14:21:24 -0800958}
959
Paul Duffine10a9f22022-10-04 16:39:18 +0100960type bootImageVariantOutputs struct {
Jiakai Zhangb47cacc2023-05-10 16:40:18 +0100961 config *bootImageVariant
Paul Duffine10a9f22022-10-04 16:39:18 +0100962}
963
Spandan Dasda739a32023-12-13 00:06:32 +0000964// Returns the profile file for an apex
965// This information can come from two mechanisms
966// 1. New: Direct deps to _selected_ apexes. The apexes return a BootclasspathFragmentApexContentInfo
967// 2. Legacy: An edge to bootclasspath_fragment module. For prebuilt apexes, this serves as a hook and is populated by deapexers of prebuilt apxes
968// TODO: b/308174306 - Once all mainline modules have been flagged, drop (2)
969func getProfilePathForApex(ctx android.ModuleContext, apexName string, apexNameToBcpInfoMap map[string]android.ApexExportsInfo) android.Path {
970 if info, exists := apexNameToBcpInfoMap[apexName]; exists {
971 return info.ProfilePathOnHost
972 }
973 // TODO: b/308174306 - Remove the legacy mechanism
974 fragment := getBootclasspathFragmentByApex(ctx, apexName)
975 if fragment == nil {
976 ctx.ModuleErrorf("Boot image config imports profile from '%[2]s', but a "+
977 "bootclasspath_fragment for APEX '%[2]s' doesn't exist or is not added as a "+
978 "dependency of dex_bootjars",
979 apexName)
980 return nil
981 }
982 return fragment.(commonBootclasspathFragment).getProfilePath()
983}
984
Spandan Das64c9e0c2023-12-20 20:13:34 +0000985func getApexNameToApexExportsInfoMap(ctx android.ModuleContext) apexNameToApexExportsInfoMap {
986 apexNameToApexExportsInfoMap := apexNameToApexExportsInfoMap{}
Colin Crossd6495802025-01-14 15:50:48 -0800987
Colin Crossd8d8b852024-12-20 16:32:37 -0800988 ctx.VisitDirectDeps(func(am android.Module) {
989 tag := ctx.OtherModuleDependencyTag(am)
990 if bcpTag, ok := tag.(bootclasspathDependencyTag); ok && bcpTag.typ == dexpreoptBootJar {
Colin Crossd6495802025-01-14 15:50:48 -0800991 if bcpTag.moduleInApex == "" {
992 info, exists := android.OtherModuleProvider(ctx, am, android.ApexExportsInfoProvider)
993 if exists {
994 apexNameToApexExportsInfoMap[info.ApexName] = info
995 }
Colin Crossd8d8b852024-12-20 16:32:37 -0800996 }
Spandan Das5be63332023-12-13 00:06:32 +0000997 }
998 })
Spandan Das64c9e0c2023-12-20 20:13:34 +0000999 return apexNameToApexExportsInfoMap
Spandan Das5be63332023-12-13 00:06:32 +00001000}
1001
Justin Yun22c8aca2024-06-05 20:25:03 +09001002func packageFileForTargetImage(ctx android.ModuleContext, image *bootImageVariant) {
1003 if image.target.Os != ctx.Os() {
1004 // This is not for the target device.
1005 return
1006 }
1007
1008 for _, install := range image.installs {
Spandan Das29207b52024-07-30 23:28:17 +00001009 installFile(ctx, install)
Justin Yun22c8aca2024-06-05 20:25:03 +09001010 }
1011
1012 for _, install := range image.vdexInstalls {
Spandan Das71559432024-07-30 23:28:17 +00001013 installPath, relDir, name := getModuleInstallPathInfo(ctx, install.To)
1014 if name == "" {
1015 continue
1016 }
1017 // Note that the vdex files are identical between architectures. Copy the vdex to a no arch directory
1018 // and create symlinks for both the primary and secondary arches.
1019 ctx.InstallSymlink(installPath.Join(ctx, relDir), name, installPath.Join(ctx, "framework", name))
1020 if image.target.Arch.ArchType.Name == ctx.DeviceConfig().DeviceArch() {
1021 // Copy the vdex from the primary arch to the no-arch directory
1022 // e.g. /system/framework/$bootjar.vdex
1023 ctx.InstallFile(installPath.Join(ctx, "framework"), name, install.From)
Justin Yun22c8aca2024-06-05 20:25:03 +09001024 }
1025 }
1026}
1027
Spandan Das38b4c942024-09-18 18:58:41 +00001028var artBootImageHostInfoProvider = blueprint.NewProvider[artBootImageHostInfo]()
1029
1030// artBootImageHostInfo contains the install locations of the host variant of ART boot image
1031// this contains both the primary and secondary arch locations
1032type artBootImageHostInfo struct {
1033 installs android.RuleBuilderInstalls
1034}
1035
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +00001036// Generate boot image build rules for a specific target.
Paul Duffine10a9f22022-10-04 16:39:18 +01001037func buildBootImageVariant(ctx android.ModuleContext, image *bootImageVariant, profile android.Path) bootImageVariantOutputs {
Colin Cross800fe132019-02-11 14:21:24 -08001038
Paul Duffin8fc51a82021-07-06 10:55:35 +01001039 globalSoong := dexpreopt.GetGlobalSoongConfig(ctx)
Martin Stjernholm40f9f3c2020-01-20 18:12:23 +00001040 global := dexpreopt.GetGlobalConfig(ctx)
Colin Cross44df5812019-02-15 23:06:46 -08001041
David Srbeckyc177ebe2020-02-18 20:43:06 +00001042 arch := image.target.Arch.ArchType
David Srbecky7f8dac12020-02-13 16:00:45 +00001043 os := image.target.Os.String() // We need to distinguish host-x86 and device-x86.
Jiakai Zhang09d88df2023-05-10 17:04:53 +01001044 symbolsDir := image.symbolsDir.Join(ctx, os, image.installDir, arch.String())
Ulyana Trafimovichde534412019-11-08 10:51:01 +00001045 symbolsFile := symbolsDir.Join(ctx, image.stem+".oat")
Jiakai Zhang09d88df2023-05-10 17:04:53 +01001046 outputDir := image.dir.Join(ctx, os, image.installDir, arch.String())
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +00001047 outputPath := outputDir.Join(ctx, image.stem+".oat")
1048 oatLocation := dexpreopt.PathToLocation(outputPath, arch)
1049 imagePath := outputPath.ReplaceExtension(ctx, "art")
Colin Cross800fe132019-02-11 14:21:24 -08001050
Colin Crossf1a035e2020-11-16 17:32:30 -08001051 rule := android.NewRuleBuilder(pctx, ctx)
Colin Cross800fe132019-02-11 14:21:24 -08001052
1053 rule.Command().Text("mkdir").Flag("-p").Flag(symbolsDir.String())
1054 rule.Command().Text("rm").Flag("-f").
1055 Flag(symbolsDir.Join(ctx, "*.art").String()).
1056 Flag(symbolsDir.Join(ctx, "*.oat").String()).
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +01001057 Flag(symbolsDir.Join(ctx, "*.vdex").String()).
Colin Cross800fe132019-02-11 14:21:24 -08001058 Flag(symbolsDir.Join(ctx, "*.invocation").String())
1059 rule.Command().Text("rm").Flag("-f").
1060 Flag(outputDir.Join(ctx, "*.art").String()).
1061 Flag(outputDir.Join(ctx, "*.oat").String()).
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +01001062 Flag(outputDir.Join(ctx, "*.vdex").String()).
Colin Cross800fe132019-02-11 14:21:24 -08001063 Flag(outputDir.Join(ctx, "*.invocation").String())
1064
1065 cmd := rule.Command()
1066
1067 extraFlags := ctx.Config().Getenv("ART_BOOT_IMAGE_EXTRA_ARGS")
1068 if extraFlags == "" {
1069 // Use ANDROID_LOG_TAGS to suppress most logging by default...
1070 cmd.Text(`ANDROID_LOG_TAGS="*:e"`)
1071 } else {
1072 // ...unless the boot image is generated specifically for testing, then allow all logging.
1073 cmd.Text(`ANDROID_LOG_TAGS="*:v"`)
1074 }
1075
1076 invocationPath := outputPath.ReplaceExtension(ctx, "invocation")
1077
Spandan Das64c9e0c2023-12-20 20:13:34 +00001078 apexNameToApexExportsInfoMap := getApexNameToApexExportsInfoMap(ctx)
Spandan Dasda739a32023-12-13 00:06:32 +00001079
Martin Stjernholm75a48d82020-01-10 20:32:59 +00001080 cmd.Tool(globalSoong.Dex2oat).
Colin Cross800fe132019-02-11 14:21:24 -08001081 Flag("--avoid-storing-invocation").
Colin Cross69f59a32019-02-15 10:39:37 -08001082 FlagWithOutput("--write-invocation-to=", invocationPath).ImplicitOutput(invocationPath).
Colin Cross44df5812019-02-15 23:06:46 -08001083 Flag("--runtime-arg").FlagWithArg("-Xms", global.Dex2oatImageXms).
1084 Flag("--runtime-arg").FlagWithArg("-Xmx", global.Dex2oatImageXmx)
Colin Cross800fe132019-02-11 14:21:24 -08001085
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +01001086 if image.isProfileGuided() && !global.DisableGenerateProfile {
1087 if profile != nil {
1088 cmd.FlagWithInput("--profile-file=", profile)
1089 }
Colin Cross800fe132019-02-11 14:21:24 -08001090
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +01001091 for _, apex := range image.profileImports {
Spandan Das64c9e0c2023-12-20 20:13:34 +00001092 importedProfile := getProfilePathForApex(ctx, apex, apexNameToApexExportsInfoMap)
Jiakai Zhangcb13b5d2023-07-13 11:03:38 +01001093 if importedProfile == nil {
1094 ctx.ModuleErrorf("Boot image config '%[1]s' imports profile from '%[2]s', but '%[2]s' "+
1095 "doesn't provide a profile",
1096 image.name,
1097 apex)
1098 return bootImageVariantOutputs{}
1099 }
1100 cmd.FlagWithInput("--profile-file=", importedProfile)
Jiakai Zhangc08c1622023-05-10 18:38:34 +01001101 }
Jiakai Zhangc08c1622023-05-10 18:38:34 +01001102 }
1103
Nicolas Geoffray1086e602021-01-20 14:30:40 +00001104 dirtyImageFile := "frameworks/base/config/dirty-image-objects"
1105 dirtyImagePath := android.ExistentPathForSource(ctx, dirtyImageFile)
1106 if dirtyImagePath.Valid() {
1107 cmd.FlagWithInput("--dirty-image-objects=", dirtyImagePath.Path())
Colin Cross800fe132019-02-11 14:21:24 -08001108 }
1109
David Srbecky1aacc6c2020-03-26 11:10:45 +00001110 if image.extends != nil {
Jiakai Zhang8fe3a412023-02-23 17:37:16 +00001111 // It is a boot image extension, so it needs the boot images that it depends on.
1112 baseImageLocations := make([]string, 0, len(image.baseImages))
1113 for _, image := range image.baseImages {
1114 baseImageLocations = append(baseImageLocations, dexpreopt.PathToLocation(image, arch))
1115 }
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +00001116 cmd.
1117 Flag("--runtime-arg").FlagWithInputList("-Xbootclasspath:", image.dexPathsDeps.Paths(), ":").
1118 Flag("--runtime-arg").FlagWithList("-Xbootclasspath-locations:", image.dexLocationsDeps, ":").
Paul Duffinbff50e22021-06-04 17:25:28 +01001119 // Add the path to the first file in the boot image with the arch specific directory removed,
1120 // dex2oat will reconstruct the path to the actual file when it needs it. As the actual path
1121 // to the file cannot be passed to the command make sure to add the actual path as an Implicit
1122 // dependency to ensure that it is built before the command runs.
Jiakai Zhang8fe3a412023-02-23 17:37:16 +00001123 FlagWithList("--boot-image=", baseImageLocations, ":").Implicits(image.baseImages.Paths()).
Paul Duffinbff50e22021-06-04 17:25:28 +01001124 // Similarly, the dex2oat tool will automatically find the paths to other files in the base
1125 // boot image so make sure to add them as implicit dependencies to ensure that they are built
1126 // before this command is run.
Jiakai Zhang8fe3a412023-02-23 17:37:16 +00001127 Implicits(image.baseImagesDeps)
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +00001128 } else {
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +00001129 // It is a primary image, so it needs a base address.
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +00001130 cmd.FlagWithArg("--base=", ctx.Config().LibartImgDeviceBaseAddress())
1131 }
1132
Jiakai Zhang8e9ea8b2023-02-23 17:50:46 +00001133 if len(image.preloadedClassesFile) > 0 {
1134 // We always expect a preloaded classes file to be available. However, if we cannot find it, it's
1135 // OK to not pass the flag to dex2oat.
1136 preloadedClassesPath := android.ExistentPathForSource(ctx, image.preloadedClassesFile)
1137 if preloadedClassesPath.Valid() {
1138 cmd.FlagWithInput("--preloaded-classes=", preloadedClassesPath.Path())
1139 }
Nicolas Geoffrayb9a46fb2022-03-14 15:31:47 +00001140 }
1141
Colin Cross800fe132019-02-11 14:21:24 -08001142 cmd.
Colin Cross44df5812019-02-15 23:06:46 -08001143 FlagForEachInput("--dex-file=", image.dexPaths.Paths()).
1144 FlagForEachArg("--dex-location=", image.dexLocations).
Colin Cross800fe132019-02-11 14:21:24 -08001145 Flag("--generate-debug-info").
1146 Flag("--generate-build-id").
Mathieu Chartier54fd8072019-07-26 13:50:04 -07001147 Flag("--image-format=lz4hc").
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +00001148 FlagWithArg("--oat-symbols=", symbolsFile.String()).
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +00001149 FlagWithArg("--oat-file=", outputPath.String()).
Colin Cross800fe132019-02-11 14:21:24 -08001150 FlagWithArg("--oat-location=", oatLocation).
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +00001151 FlagWithArg("--image=", imagePath.String()).
Colin Cross800fe132019-02-11 14:21:24 -08001152 FlagWithArg("--instruction-set=", arch.String()).
Colin Cross44df5812019-02-15 23:06:46 -08001153 FlagWithArg("--android-root=", global.EmptyDirectory).
Colin Cross800fe132019-02-11 14:21:24 -08001154 FlagWithArg("--no-inline-from=", "core-oj.jar").
Ulya Trafimovichc0c98d52020-03-09 12:46:06 +00001155 Flag("--force-determinism").
Jiakai Zhang63086d72023-02-28 15:13:44 +00001156 Flag("--abort-on-hard-verifier-error")
1157
Nicolas Geoffray1ad8a132023-06-28 21:34:44 +01001158 // We don't strip on host to make perf tools work.
1159 if image.target.Os == android.Android {
1160 cmd.Flag("--strip")
1161 }
1162
Jiakai Zhang63086d72023-02-28 15:13:44 +00001163 // If the image is profile-guided but the profile is disabled, we omit "--compiler-filter" to
1164 // leave the decision to dex2oat to pick the compiler filter.
1165 if !(image.isProfileGuided() && global.DisableGenerateProfile) {
1166 cmd.FlagWithArg("--compiler-filter=", image.compilerFilter)
1167 }
Colin Cross800fe132019-02-11 14:21:24 -08001168
Jiakai Zhangb8796202023-03-06 19:16:48 +00001169 if image.singleImage {
1170 cmd.Flag("--single-image")
1171 }
1172
David Srbecky7f8dac12020-02-13 16:00:45 +00001173 // Use the default variant/features for host builds.
1174 // The map below contains only device CPU info (which might be x86 on some devices).
1175 if image.target.Os == android.Android {
1176 cmd.FlagWithArg("--instruction-set-variant=", global.CpuVariant[arch])
1177 cmd.FlagWithArg("--instruction-set-features=", global.InstructionSetFeatures[arch])
1178 }
1179
Jiakai Zhang7d292222024-01-18 17:27:42 +00001180 if image.target.Os == android.Android {
1181 cmd.Text("$(cat").Input(globalSoong.UffdGcFlag).Text(")")
Jiakai Zhang616be062022-11-16 11:50:59 +00001182 }
1183
Colin Cross44df5812019-02-15 23:06:46 -08001184 if global.BootFlags != "" {
1185 cmd.Flag(global.BootFlags)
Colin Cross800fe132019-02-11 14:21:24 -08001186 }
1187
1188 if extraFlags != "" {
1189 cmd.Flag(extraFlags)
1190 }
1191
Colin Cross0b9f31f2019-02-28 11:00:01 -08001192 cmd.Textf(`|| ( echo %s ; false )`, proptools.ShellEscape(failureMessage))
Colin Cross800fe132019-02-11 14:21:24 -08001193
Jiakai Zhang09d88df2023-05-10 17:04:53 +01001194 installDir := filepath.Dir(image.imagePathOnDevice)
Colin Cross800fe132019-02-11 14:21:24 -08001195
Colin Cross800fe132019-02-11 14:21:24 -08001196 var vdexInstalls android.RuleBuilderInstalls
1197 var unstrippedInstalls android.RuleBuilderInstalls
1198
Dan Willemsen0f416782019-06-13 21:44:53 +00001199 for _, artOrOat := range image.moduleFiles(ctx, outputDir, ".art", ".oat") {
1200 cmd.ImplicitOutput(artOrOat)
Colin Cross800fe132019-02-11 14:21:24 -08001201
Dan Willemsen0f416782019-06-13 21:44:53 +00001202 // Install the .oat and .art files
1203 rule.Install(artOrOat, filepath.Join(installDir, artOrOat.Base()))
1204 }
Colin Cross800fe132019-02-11 14:21:24 -08001205
Dan Willemsen0f416782019-06-13 21:44:53 +00001206 for _, vdex := range image.moduleFiles(ctx, outputDir, ".vdex") {
1207 cmd.ImplicitOutput(vdex)
Colin Cross800fe132019-02-11 14:21:24 -08001208
David Srbecky7f8dac12020-02-13 16:00:45 +00001209 // Note that the vdex files are identical between architectures.
1210 // Make rules will create symlinks to share them between architectures.
Colin Cross800fe132019-02-11 14:21:24 -08001211 vdexInstalls = append(vdexInstalls,
David Srbecky7f8dac12020-02-13 16:00:45 +00001212 android.RuleBuilderInstall{vdex, filepath.Join(installDir, vdex.Base())})
Dan Willemsen0f416782019-06-13 21:44:53 +00001213 }
1214
1215 for _, unstrippedOat := range image.moduleFiles(ctx, symbolsDir, ".oat") {
1216 cmd.ImplicitOutput(unstrippedOat)
Colin Cross800fe132019-02-11 14:21:24 -08001217
1218 // Install the unstripped oat files. The Make rules will put these in $(TARGET_OUT_UNSTRIPPED)
1219 unstrippedInstalls = append(unstrippedInstalls,
Colin Cross69f59a32019-02-15 10:39:37 -08001220 android.RuleBuilderInstall{unstrippedOat, filepath.Join(installDir, unstrippedOat.Base())})
Colin Cross800fe132019-02-11 14:21:24 -08001221 }
1222
Colin Crossf1a035e2020-11-16 17:32:30 -08001223 rule.Build(image.name+"JarsDexpreopt_"+image.target.String(), "dexpreopt "+image.name+" jars "+arch.String())
Colin Cross800fe132019-02-11 14:21:24 -08001224
1225 // save output and installed files for makevars
Paul Duffin20d90e32022-10-04 20:01:04 +01001226 // TODO - these are always the same and so should be initialized in genBootImageConfigs
David Srbeckyc177ebe2020-02-18 20:43:06 +00001227 image.installs = rule.Installs()
1228 image.vdexInstalls = vdexInstalls
1229 image.unstrippedInstalls = unstrippedInstalls
Justin Yun22c8aca2024-06-05 20:25:03 +09001230 packageFileForTargetImage(ctx, image)
Paul Duffin20d90e32022-10-04 20:01:04 +01001231
1232 // Only set the licenseMetadataFile from the active module.
Cole Fausta963b942024-04-11 17:43:00 -07001233 if isActiveModule(ctx, ctx.Module()) {
Paul Duffin20d90e32022-10-04 20:01:04 +01001234 image.licenseMetadataFile = android.OptionalPathForPath(ctx.LicenseMetadataFile())
1235 }
Paul Duffine10a9f22022-10-04 16:39:18 +01001236
1237 return bootImageVariantOutputs{
1238 image,
Paul Duffine10a9f22022-10-04 16:39:18 +01001239 }
Colin Cross800fe132019-02-11 14:21:24 -08001240}
1241
1242const failureMessage = `ERROR: Dex2oat failed to compile a boot image.
1243It is likely that the boot classpath is inconsistent.
1244Rebuild with ART_BOOT_IMAGE_EXTRA_ARGS="--runtime-arg -verbose:verifier" to see verification errors.`
1245
Jiakai Zhang3444e562023-07-11 15:13:35 +01001246func bootImageProfileRuleCommon(ctx android.ModuleContext, name string, dexFiles android.Paths, dexLocations []string) android.WritablePath {
Paul Duffin8fc51a82021-07-06 10:55:35 +01001247 globalSoong := dexpreopt.GetGlobalSoongConfig(ctx)
Martin Stjernholm40f9f3c2020-01-20 18:12:23 +00001248 global := dexpreopt.GetGlobalConfig(ctx)
Nicolas Geoffray27c7cc62019-02-24 16:04:52 +00001249
Ulya Trafimovicha4a1c4e2021-01-15 18:40:04 +00001250 if global.DisableGenerateProfile {
Nicolas Geoffray27c7cc62019-02-24 16:04:52 +00001251 return nil
1252 }
Colin Cross800fe132019-02-11 14:21:24 -08001253
Islam Elbanna5351cf22024-09-24 15:36:14 +00001254 defaultProfile := "frameworks/base/boot/boot-image-profile.txt"
1255 // If ART is prebuilt, primarily in next release configs, this will still use
1256 // the profile from source which represent the latest code, so it may not
1257 // correspond to the BCP jars in the prebuilt APEX, but this is the profile we
1258 // have access to.
1259 artProfile := "art/build/boot/boot-image-profile.txt"
1260 extraProfile := "frameworks/base/boot/boot-image-profile-extra.txt"
Colin Cross800fe132019-02-11 14:21:24 -08001261
Paul Duffin58612422021-04-26 12:51:07 +01001262 rule := android.NewRuleBuilder(pctx, ctx)
Colin Cross800fe132019-02-11 14:21:24 -08001263
Nicolas Geoffray58d349c2022-07-11 14:59:14 +01001264 var profiles android.Paths
1265 if len(global.BootImageProfiles) > 0 {
1266 profiles = append(profiles, global.BootImageProfiles...)
Paul Duffin58612422021-04-26 12:51:07 +01001267 } else if path := android.ExistentPathForSource(ctx, defaultProfile); path.Valid() {
Nicolas Geoffray58d349c2022-07-11 14:59:14 +01001268 profiles = append(profiles, path.Path())
Paul Duffin58612422021-04-26 12:51:07 +01001269 } else {
1270 // No profile (not even a default one, which is the case on some branches
1271 // like master-art-host that don't have frameworks/base).
1272 // Return nil and continue without profile.
1273 return nil
Ulyana Trafimovichde534412019-11-08 10:51:01 +00001274 }
Islam Elbanna5351cf22024-09-24 15:36:14 +00001275 if path := android.ExistentPathForSource(ctx, artProfile); path.Valid() {
1276 profiles = append(profiles, path.Path())
1277 }
Nicolas Geoffray58d349c2022-07-11 14:59:14 +01001278 if path := android.ExistentPathForSource(ctx, extraProfile); path.Valid() {
1279 profiles = append(profiles, path.Path())
1280 }
Jiakai Zhang3444e562023-07-11 15:13:35 +01001281 bootImageProfile := android.PathForModuleOut(ctx, name, "boot-image-profile.txt")
Nicolas Geoffray58d349c2022-07-11 14:59:14 +01001282 rule.Command().Text("cat").Inputs(profiles).Text(">").Output(bootImageProfile)
Colin Cross800fe132019-02-11 14:21:24 -08001283
Jiakai Zhang3444e562023-07-11 15:13:35 +01001284 profile := android.PathForModuleOut(ctx, name, "boot.prof")
Paul Duffin58612422021-04-26 12:51:07 +01001285
1286 rule.Command().
1287 Text(`ANDROID_LOG_TAGS="*:e"`).
1288 Tool(globalSoong.Profman).
1289 Flag("--output-profile-type=boot").
1290 FlagWithInput("--create-profile-from=", bootImageProfile).
Jiakai Zhang3444e562023-07-11 15:13:35 +01001291 FlagForEachInput("--apk=", dexFiles).
1292 FlagForEachArg("--dex-location=", dexLocations).
Paul Duffin58612422021-04-26 12:51:07 +01001293 FlagWithOutput("--reference-profile-file=", profile)
1294
Jiakai Zhang3444e562023-07-11 15:13:35 +01001295 rule.Build("bootJarsProfile_"+name, "profile boot jars "+name)
1296
1297 return profile
1298}
1299
Colin Cross84ed5112024-01-17 12:14:44 -08001300type profileInstallInfo struct {
1301 // Rules which should be used in make to install the outputs.
1302 profileInstalls android.RuleBuilderInstalls
1303
1304 // Path to the license metadata file for the module that built the profile.
1305 profileLicenseMetadataFile android.OptionalPath
1306}
1307
1308var profileInstallInfoProvider = blueprint.NewProvider[profileInstallInfo]()
1309
1310func bootImageProfileRule(ctx android.ModuleContext, image *bootImageConfig) (android.WritablePath, android.RuleBuilderInstalls) {
Jiakai Zhang3444e562023-07-11 15:13:35 +01001311 if !image.isProfileGuided() {
Colin Cross84ed5112024-01-17 12:14:44 -08001312 return nil, nil
Jiakai Zhang3444e562023-07-11 15:13:35 +01001313 }
1314
1315 profile := bootImageProfileRuleCommon(ctx, image.name, image.dexPathsDeps.Paths(), image.getAnyAndroidVariant().dexLocationsDeps)
1316
Spandan Das29207b52024-07-30 23:28:17 +00001317 if image == defaultBootImageConfig(ctx) && profile != nil {
Jiakai Zhang3444e562023-07-11 15:13:35 +01001318 rule := android.NewRuleBuilder(pctx, ctx)
Jiakai Zhang49b1eb62021-11-26 18:09:27 +00001319 rule.Install(profile, "/system/etc/boot-image.prof")
Colin Cross84ed5112024-01-17 12:14:44 -08001320 return profile, rule.Installs()
Jiakai Zhang49b1eb62021-11-26 18:09:27 +00001321 }
Colin Cross84ed5112024-01-17 12:14:44 -08001322 return profile, nil
Paul Duffin58612422021-04-26 12:51:07 +01001323}
Nicolas Geoffray72892f12019-02-22 15:34:40 +00001324
Paul Duffinad19d382021-04-26 16:44:00 +01001325// bootFrameworkProfileRule generates the rule to create the boot framework profile and
1326// returns a path to the generated file.
Colin Cross84ed5112024-01-17 12:14:44 -08001327func bootFrameworkProfileRule(ctx android.ModuleContext, image *bootImageConfig) (android.WritablePath, android.RuleBuilderInstalls) {
Paul Duffinad19d382021-04-26 16:44:00 +01001328 globalSoong := dexpreopt.GetGlobalSoongConfig(ctx)
Martin Stjernholm40f9f3c2020-01-20 18:12:23 +00001329 global := dexpreopt.GetGlobalConfig(ctx)
Nicolas Geoffraye7102422019-07-24 13:19:29 +01001330
Dan Willemsen9f435972020-05-28 15:28:00 -07001331 if global.DisableGenerateProfile || ctx.Config().UnbundledBuild() {
Colin Cross84ed5112024-01-17 12:14:44 -08001332 return nil, nil
Nicolas Geoffraye7102422019-07-24 13:19:29 +01001333 }
Nicolas Geoffraye7102422019-07-24 13:19:29 +01001334
Islam Elbanna5351cf22024-09-24 15:36:14 +00001335 defaultProfile := "frameworks/base/boot/boot-profile.txt"
Paul Duffin2ac45f02021-04-26 17:08:38 +01001336 bootFrameworkProfile := android.PathForSource(ctx, defaultProfile)
Nicolas Geoffraye7102422019-07-24 13:19:29 +01001337
Paul Duffin58612422021-04-26 12:51:07 +01001338 profile := image.dir.Join(ctx, "boot.bprof")
Nicolas Geoffraye7102422019-07-24 13:19:29 +01001339
Paul Duffin58612422021-04-26 12:51:07 +01001340 rule := android.NewRuleBuilder(pctx, ctx)
Paul Duffin58612422021-04-26 12:51:07 +01001341 rule.Command().
1342 Text(`ANDROID_LOG_TAGS="*:e"`).
1343 Tool(globalSoong.Profman).
1344 Flag("--output-profile-type=bprof").
1345 FlagWithInput("--create-profile-from=", bootFrameworkProfile).
1346 FlagForEachInput("--apk=", image.dexPathsDeps.Paths()).
1347 FlagForEachArg("--dex-location=", image.getAnyAndroidVariant().dexLocationsDeps).
1348 FlagWithOutput("--reference-profile-file=", profile)
Nicolas Geoffraye7102422019-07-24 13:19:29 +01001349
Paul Duffin58612422021-04-26 12:51:07 +01001350 rule.Install(profile, "/system/etc/boot-image.bprof")
1351 rule.Build("bootFrameworkProfile", "profile boot framework jars")
Colin Cross84ed5112024-01-17 12:14:44 -08001352 return profile, rule.Installs()
Nicolas Geoffraye7102422019-07-24 13:19:29 +01001353}
1354
Paul Duffinf7a55922021-04-26 23:09:15 +01001355func dumpOatRules(ctx android.ModuleContext, image *bootImageConfig) {
Colin Crossc9a4c362019-02-26 21:13:48 -08001356 var allPhonies android.Paths
Jiakai Zhangda47d3c2023-07-11 14:53:12 +01001357 name := image.name
Jiakai Zhang7d292222024-01-18 17:27:42 +00001358 globalSoong := dexpreopt.GetGlobalSoongConfig(ctx)
David Srbeckyc177ebe2020-02-18 20:43:06 +00001359 for _, image := range image.variants {
1360 arch := image.target.Arch.ArchType
David Srbecky46672322020-03-16 13:27:55 +00001361 suffix := arch.String()
1362 // Host and target might both use x86 arch. We need to ensure the names are unique.
1363 if image.target.Os.Class == android.Host {
1364 suffix = "host-" + suffix
1365 }
Colin Crossc9a4c362019-02-26 21:13:48 -08001366 // Create a rule to call oatdump.
Jiakai Zhangda47d3c2023-07-11 14:53:12 +01001367 output := android.PathForOutput(ctx, name+"."+suffix+".oatdump.txt")
Colin Crossf1a035e2020-11-16 17:32:30 -08001368 rule := android.NewRuleBuilder(pctx, ctx)
Jeongik Cha4dda75e2021-04-27 23:56:44 +09001369 imageLocationsOnHost, _ := image.imageLocations()
Jiakai Zhang7d292222024-01-18 17:27:42 +00001370
Jiakai Zhangda47d3c2023-07-11 14:53:12 +01001371 cmd := rule.Command().
Martin Stjernholm07803722021-05-18 17:39:56 +01001372 BuiltTool("oatdump").
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +00001373 FlagWithInputList("--runtime-arg -Xbootclasspath:", image.dexPathsDeps.Paths(), ":").
1374 FlagWithList("--runtime-arg -Xbootclasspath-locations:", image.dexLocationsDeps, ":").
Jeongik Cha4dda75e2021-04-27 23:56:44 +09001375 FlagWithArg("--image=", strings.Join(imageLocationsOnHost, ":")).Implicits(image.imagesDeps.Paths()).
Colin Crossc9a4c362019-02-26 21:13:48 -08001376 FlagWithOutput("--output=", output).
1377 FlagWithArg("--instruction-set=", arch.String())
Jiakai Zhang7d292222024-01-18 17:27:42 +00001378 if image.target.Os == android.Android {
1379 cmd.Text("$(cat").Input(globalSoong.UffdGcFlag).Text(")")
Jiakai Zhangda47d3c2023-07-11 14:53:12 +01001380 }
1381 rule.Build("dump-oat-"+name+"-"+suffix, "dump oat "+name+" "+arch.String())
Colin Crossc9a4c362019-02-26 21:13:48 -08001382
1383 // Create a phony rule that depends on the output file and prints the path.
Jiakai Zhangda47d3c2023-07-11 14:53:12 +01001384 phony := android.PathForPhony(ctx, "dump-oat-"+name+"-"+suffix)
Colin Crossf1a035e2020-11-16 17:32:30 -08001385 rule = android.NewRuleBuilder(pctx, ctx)
Colin Crossc9a4c362019-02-26 21:13:48 -08001386 rule.Command().
1387 Implicit(output).
1388 ImplicitOutput(phony).
1389 Text("echo").FlagWithArg("Output in ", output.String())
Jiakai Zhangda47d3c2023-07-11 14:53:12 +01001390 rule.Build("phony-dump-oat-"+name+"-"+suffix, "dump oat "+name+" "+arch.String())
Colin Crossc9a4c362019-02-26 21:13:48 -08001391
David Srbecky1aacc6c2020-03-26 11:10:45 +00001392 allPhonies = append(allPhonies, phony)
Colin Crossc9a4c362019-02-26 21:13:48 -08001393 }
1394
Jiakai Zhangda47d3c2023-07-11 14:53:12 +01001395 phony := android.PathForPhony(ctx, "dump-oat-"+name)
Colin Crossc9a4c362019-02-26 21:13:48 -08001396 ctx.Build(pctx, android.BuildParams{
1397 Rule: android.Phony,
1398 Output: phony,
1399 Inputs: allPhonies,
Cole Faust06ea5312023-10-18 17:38:40 -07001400 Description: "dump-oat-" + name,
Colin Crossc9a4c362019-02-26 21:13:48 -08001401 })
Colin Crossc9a4c362019-02-26 21:13:48 -08001402}
1403
Colin Cross2d00f0d2019-05-09 21:50:00 -07001404func writeGlobalConfigForMake(ctx android.SingletonContext, path android.WritablePath) {
Martin Stjernholm40f9f3c2020-01-20 18:12:23 +00001405 data := dexpreopt.GetGlobalConfigRawData(ctx)
Colin Cross2d00f0d2019-05-09 21:50:00 -07001406
Colin Crosscf371cc2020-11-13 11:48:42 -08001407 android.WriteFileRule(ctx, path, string(data))
Colin Cross2d00f0d2019-05-09 21:50:00 -07001408}
1409
ELIYAZ MOMINfd1c4fb2024-09-27 15:30:07 +00001410// Define Make variables for boot image names, paths, etc. These variables are used in makefiles
1411// (make/core/dex_preopt_libart.mk) to generate install rules that copy boot image files to the
1412// correct output directories.
Colin Cross44df5812019-02-15 23:06:46 -08001413func (d *dexpreoptBootJars) MakeVars(ctx android.MakeVarsContext) {
Jiakai Zhangbc698cd2023-05-08 16:28:38 +00001414 if d.dexpreoptConfigForMake != nil && !SkipDexpreoptBootJars(ctx) {
Colin Cross2d00f0d2019-05-09 21:50:00 -07001415 ctx.Strict("DEX_PREOPT_CONFIG_FOR_MAKE", d.dexpreoptConfigForMake.String())
Martin Stjernholmc52aaf12020-01-06 23:11:37 +00001416 ctx.Strict("DEX_PREOPT_SOONG_CONFIG_FOR_MAKE", android.PathForOutput(ctx, "dexpreopt_soong.config").String())
Colin Cross2d00f0d2019-05-09 21:50:00 -07001417 }
1418
Colin Cross44df5812019-02-15 23:06:46 -08001419 image := d.defaultBootImage
Spandan Das953ce9e2024-09-26 20:52:12 +00001420 if image != nil && !SkipDexpreoptBootJars(ctx) {
Ulya Trafimovich9023b022021-03-22 16:02:28 +00001421 global := dexpreopt.GetGlobalConfig(ctx)
1422 dexPaths, dexLocations := bcpForDexpreopt(ctx, global.PreoptWithUpdatableBcp)
1423 ctx.Strict("DEXPREOPT_BOOTCLASSPATH_DEX_FILES", strings.Join(dexPaths.Strings(), " "))
1424 ctx.Strict("DEXPREOPT_BOOTCLASSPATH_DEX_LOCATIONS", strings.Join(dexLocations, " "))
Nicolas Geoffray72892f12019-02-22 15:34:40 +00001425
Ulya Trafimovich442ec7f2022-04-20 10:53:26 +01001426 // The primary ART boot image is exposed to Make for testing (gtests) and benchmarking
1427 // (golem) purposes.
Nicolas Geoffray72892f12019-02-22 15:34:40 +00001428 for _, current := range append(d.otherImages, image) {
David Srbecky1aacc6c2020-03-26 11:10:45 +00001429 for _, variant := range current.variants {
David Srbecky7f8dac12020-02-13 16:00:45 +00001430 suffix := ""
David Srbecky1aacc6c2020-03-26 11:10:45 +00001431 if variant.target.Os.Class == android.Host {
David Srbecky7f8dac12020-02-13 16:00:45 +00001432 suffix = "_host"
1433 }
David Srbecky1aacc6c2020-03-26 11:10:45 +00001434 sfx := variant.name + suffix + "_" + variant.target.Arch.ArchType.String()
ELIYAZ MOMINfd1c4fb2024-09-27 15:30:07 +00001435 ctx.Strict("DEXPREOPT_IMAGE_VDEX_BUILT_INSTALLED_"+sfx, variant.vdexInstalls.String())
Jeongik Chaa5969092021-05-07 18:53:21 +09001436 ctx.Strict("DEXPREOPT_IMAGE_"+sfx, variant.imagePathOnHost.String())
ELIYAZ MOMINfd1c4fb2024-09-27 15:30:07 +00001437 ctx.Strict("DEXPREOPT_IMAGE_DEPS_"+sfx, strings.Join(variant.imagesDeps.Strings(), " "))
1438 ctx.Strict("DEXPREOPT_IMAGE_BUILT_INSTALLED_"+sfx, variant.installs.String())
1439 ctx.Strict("DEXPREOPT_IMAGE_UNSTRIPPED_BUILT_INSTALLED_"+sfx, variant.unstrippedInstalls.String())
1440 if variant.licenseMetadataFile.Valid() {
1441 ctx.Strict("DEXPREOPT_IMAGE_LICENSE_METADATA_"+sfx, variant.licenseMetadataFile.String())
1442 }
Nicolas Geoffray72892f12019-02-22 15:34:40 +00001443 }
Jeongik Chae3165c82021-06-23 23:18:50 +09001444 imageLocationsOnHost, imageLocationsOnDevice := current.getAnyAndroidVariant().imageLocations()
1445 ctx.Strict("DEXPREOPT_IMAGE_LOCATIONS_ON_HOST"+current.name, strings.Join(imageLocationsOnHost, ":"))
1446 ctx.Strict("DEXPREOPT_IMAGE_LOCATIONS_ON_DEVICE"+current.name, strings.Join(imageLocationsOnDevice, ":"))
ELIYAZ MOMINfd1c4fb2024-09-27 15:30:07 +00001447 ctx.Strict("DEXPREOPT_IMAGE_ZIP_"+current.name, current.zip.String())
Nicolas Geoffray72892f12019-02-22 15:34:40 +00001448 }
ELIYAZ MOMINfd1c4fb2024-09-27 15:30:07 +00001449 ctx.Strict("DEXPREOPT_IMAGE_NAMES", strings.Join(getImageNames(), " "))
Colin Cross800fe132019-02-11 14:21:24 -08001450 }
Colin Cross800fe132019-02-11 14:21:24 -08001451}
Spandan Das29207b52024-07-30 23:28:17 +00001452
1453// Add one of the outputs in `OutputFile`
1454// This ensures that this singleton module does not get skipped when writing out/soong/Android-*.mk
1455func (d *dexpreoptBootJars) AndroidMkEntries() []android.AndroidMkEntries {
1456 return []android.AndroidMkEntries{{
1457 Class: "ETC",
1458 OutputFile: android.OptionalPathForPath(d.bootFrameworkProfile),
1459 }}
1460}
Spandan Das38b4c942024-09-18 18:58:41 +00001461
1462// artBootImages is a thin wrapper around `dex_bootjars`.
1463// it creates the installation rules for the host variant of the ART boot image.
1464type artBootImages struct {
1465 android.ModuleBase
1466
1467 // A non-empty file that will be written as `LOCAL_SOONG_INSTALLED_MODULE` in out/soong/Android-*.mk
1468 outputFile android.OptionalPath
1469}
1470
1471func artBootImagesFactory() android.Module {
1472 m := &artBootImages{}
1473 android.InitAndroidMultiTargetsArchModule(m, android.HostSupported, android.MultilibCommon)
1474 return m
1475}
1476
1477func (dbj *artBootImages) DepsMutator(ctx android.BottomUpMutatorContext) {
1478 // Create a dependency on `dex_bootjars` to access the intermediate locations of host art boot image.
Colin Crossd8d8b852024-12-20 16:32:37 -08001479 tag := bootclasspathDependencyTag{
1480 typ: dexpreoptBootJar,
1481 }
1482 ctx.AddVariationDependencies(ctx.Config().AndroidCommonTarget.Variations(), tag, "dex_bootjars")
Spandan Das38b4c942024-09-18 18:58:41 +00001483}
1484
1485func (d *artBootImages) GenerateAndroidBuildActions(ctx android.ModuleContext) {
Colin Crossd8d8b852024-12-20 16:32:37 -08001486 ctx.VisitDirectDeps(func(m android.Module) {
1487 tag := ctx.OtherModuleDependencyTag(m)
1488 if bcpTag, ok := tag.(bootclasspathDependencyTag); ok && bcpTag.typ == dexpreoptBootJar {
Colin Crossd6495802025-01-14 15:50:48 -08001489 if bcpTag.moduleInApex != "" {
1490 panic("unhandled moduleInApex")
1491 }
Colin Crossd8d8b852024-12-20 16:32:37 -08001492 hostInstallsInfo, ok := android.OtherModuleProvider(ctx, m, artBootImageHostInfoProvider)
1493 if !ok {
1494 ctx.ModuleErrorf("Could not find information about the host variant of ART boot image")
1495 }
1496 installs := d.installFile(ctx, hostInstallsInfo.installs)
1497 if len(installs) > 0 {
1498 d.outputFile = android.OptionalPathForPath(installs[0])
1499 // Create a phony target that can ART run-tests can depend on.
1500 ctx.Phony(d.Name(), installs...)
1501 } else {
1502 // this might be true e.g. when building with `WITH_DEXPREOPT=false`
1503 // create an empty file so that the `art_boot_images` is known to the packaging system.
1504 d.outputFile = android.OptionalPathForPath(android.PathForModuleOut(ctx, "undefined_art_boot_images"))
1505 }
Spandan Das38b4c942024-09-18 18:58:41 +00001506 }
1507 })
1508}
1509
1510// Creates an installation rule for host variant of ART boot image files.
1511// Returns the list of install locations (out/host/linux-x86/...)
1512func (d *artBootImages) installFile(ctx android.ModuleContext, ruleBuilderInstalls android.RuleBuilderInstalls) android.Paths {
1513 var ret android.Paths
1514 for _, ruleBuilderInstall := range ruleBuilderInstalls {
1515 installDir := android.PathForModuleInstall(
1516 ctx,
1517 strings.TrimPrefix(filepath.Dir(ruleBuilderInstall.To), "/"),
1518 )
1519 filename := filepath.Base(ruleBuilderInstall.To)
1520 ctx.InstallFile(
1521 installDir,
1522 filename,
1523 ruleBuilderInstall.From,
1524 )
1525 ret = append(ret, installDir.Join(ctx, filename))
1526 }
1527 return ret
1528}
1529
1530// Set `OutputFile` expclitly so that this module does not get elided when generating out/soong/Android-*.mk
1531func (d *artBootImages) AndroidMkEntries() []android.AndroidMkEntries {
1532 return []android.AndroidMkEntries{{
1533 Class: "ETC",
1534 OutputFile: d.outputFile,
1535 }}
1536}