blob: 0a324a9a00b72ef8596824a5e3807e66b41ad441 [file] [log] [blame]
Colin Cross800fe132019-02-11 14:21:24 -08001// Copyright 2019 Google Inc. All rights reserved.
2//
3// Licensed under the Apache License, Version 2.0 (the "License");
4// you may not use this file except in compliance with the License.
5// You may obtain a copy of the License at
6//
7// http://www.apache.org/licenses/LICENSE-2.0
8//
9// Unless required by applicable law or agreed to in writing, software
10// distributed under the License is distributed on an "AS IS" BASIS,
11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12// See the License for the specific language governing permissions and
13// limitations under the License.
14
15package java
16
17import (
Ulya Trafimovichfa2b1cf2021-03-22 12:37:10 +000018 "fmt"
Colin Cross800fe132019-02-11 14:21:24 -080019 "path/filepath"
Vladimir Marko205e6c22020-04-01 13:52:27 +010020 "sort"
Colin Cross800fe132019-02-11 14:21:24 -080021 "strings"
22
23 "android/soong/android"
24 "android/soong/dexpreopt"
25
Colin Cross800fe132019-02-11 14:21:24 -080026 "github.com/google/blueprint/proptools"
27)
28
Paul Duffin1ab61862021-01-20 17:44:53 +000029// =================================================================================================
30// WIP - see http://b/177892522 for details
31//
32// The build support for boot images is currently being migrated away from singleton to modules so
33// the documentation may not be strictly accurate. Rather than update the documentation at every
34// step which will create a lot of churn the changes that have been made will be listed here and the
35// documentation will be updated once it is closer to the final result.
36//
37// Changes:
38// 1) dex_bootjars is now a singleton module and not a plain singleton.
Paul Duffin3451e162021-01-20 15:16:56 +000039// 2) Boot images are now represented by the boot_image module type.
40// 3) The art boot image is called "art-boot-image", the framework boot image is called
41// "framework-boot-image".
42// 4) They are defined in art/build/boot/Android.bp and frameworks/base/boot/Android.bp
43// respectively.
44// 5) Each boot_image retrieves the appropriate boot image configuration from the map returned by
45// genBootImageConfigs() using the image_name specified in the boot_image module.
Paul Duffin1ab61862021-01-20 17:44:53 +000046// =================================================================================================
47
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +000048// This comment describes:
49// 1. ART boot images in general (their types, structure, file layout, etc.)
50// 2. build system support for boot images
51//
52// 1. ART boot images
53// ------------------
54//
55// A boot image in ART is a set of files that contain AOT-compiled native code and a heap snapshot
56// of AOT-initialized classes for the bootclasspath Java libraries. A boot image is compiled from a
57// set of DEX jars by the dex2oat compiler. A boot image is used for two purposes: 1) it is
58// installed on device and loaded at runtime, and 2) other Java libraries and apps are compiled
59// against it (compilation may take place either on host, known as "dexpreopt", or on device, known
60// as "dexopt").
61//
62// A boot image is not a single file, but a collection of interrelated files. Each boot image has a
63// number of components that correspond to the Java libraries that constitute it. For each component
64// there are multiple files:
65// - *.oat or *.odex file with native code (architecture-specific, one per instruction set)
66// - *.art file with pre-initialized Java classes (architecture-specific, one per instruction set)
67// - *.vdex file with verification metadata for the DEX bytecode (architecture independent)
68//
69// *.vdex files for the boot images do not contain the DEX bytecode itself, because the
70// bootclasspath DEX files are stored on disk in uncompressed and aligned form. Consequently a boot
71// image is not self-contained and cannot be used without its DEX files. To simplify the management
72// of boot image files, ART uses a certain naming scheme and associates the following metadata with
73// each boot image:
74// - A stem, which is a symbolic name that is prepended to boot image file names.
75// - A location (on-device path to the boot image files).
76// - A list of boot image locations (on-device paths to dependency boot images).
77// - A set of DEX locations (on-device paths to the DEX files, one location for one DEX file used
78// to compile the boot image).
79//
80// There are two kinds of boot images:
81// - primary boot images
82// - boot image extensions
83//
84// 1.1. Primary boot images
85// ------------------------
86//
87// A primary boot image is compiled for a core subset of bootclasspath Java libraries. It does not
88// depend on any other images, and other boot images may depend on it.
89//
90// For example, assuming that the stem is "boot", the location is /apex/com.android.art/javalib/,
91// the set of core bootclasspath libraries is A B C, and the boot image is compiled for ARM targets
92// (32 and 64 bits), it will have three components with the following files:
93// - /apex/com.android.art/javalib/{arm,arm64}/boot.{art,oat,vdex}
94// - /apex/com.android.art/javalib/{arm,arm64}/boot-B.{art,oat,vdex}
95// - /apex/com.android.art/javalib/{arm,arm64}/boot-C.{art,oat,vdex}
96//
97// The files of the first component are special: they do not have the component name appended after
98// the stem. This naming convention dates back to the times when the boot image was not split into
99// components, and there were just boot.oat and boot.art. The decision to split was motivated by
100// licensing reasons for one of the bootclasspath libraries.
101//
102// As of November 2020 the only primary boot image in Android is the image in the ART APEX
103// com.android.art. The primary ART boot image contains the Core libraries that are part of the ART
104// module. When the ART module gets updated, the primary boot image will be updated with it, and all
105// dependent images will get invalidated (the checksum of the primary image stored in dependent
106// images will not match), unless they are updated in sync with the ART module.
107//
108// 1.2. Boot image extensions
109// --------------------------
110//
111// A boot image extension is compiled for a subset of bootclasspath Java libraries (in particular,
112// this subset does not include the Core bootclasspath libraries that go into the primary boot
113// image). A boot image extension depends on the primary boot image and optionally some other boot
114// image extensions. Other images may depend on it. In other words, boot image extensions can form
115// acyclic dependency graphs.
116//
117// The motivation for boot image extensions comes from the Mainline project. Consider a situation
118// when the list of bootclasspath libraries is A B C, and both A and B are parts of the Android
119// platform, but C is part of an updatable APEX com.android.C. When the APEX is updated, the Java
120// code for C might have changed compared to the code that was used to compile the boot image.
121// Consequently, the whole boot image is obsolete and invalidated (even though the code for A and B
122// that does not depend on C is up to date). To avoid this, the original monolithic boot image is
123// split in two parts: the primary boot image that contains A B, and the boot image extension that
124// contains C and depends on the primary boot image (extends it).
125//
126// For example, assuming that the stem is "boot", the location is /system/framework, the set of
127// bootclasspath libraries is D E (where D is part of the platform and is located in
128// /system/framework, and E is part of a non-updatable APEX com.android.E and is located in
129// /apex/com.android.E/javalib), and the boot image is compiled for ARM targets (32 and 64 bits),
130// it will have two components with the following files:
131// - /system/framework/{arm,arm64}/boot-D.{art,oat,vdex}
132// - /system/framework/{arm,arm64}/boot-E.{art,oat,vdex}
133//
134// As of November 2020 the only boot image extension in Android is the Framework boot image
135// extension. It extends the primary ART boot image and contains Framework libraries and other
136// bootclasspath libraries from the platform and non-updatable APEXes that are not included in the
137// ART image. The Framework boot image extension is updated together with the platform. In the
138// future other boot image extensions may be added for some updatable modules.
139//
140//
141// 2. Build system support for boot images
142// ---------------------------------------
143//
144// The primary ART boot image needs to be compiled with one dex2oat invocation that depends on DEX
145// jars for the core libraries. Framework boot image extension needs to be compiled with one dex2oat
146// invocation that depends on the primary ART boot image and all bootclasspath DEX jars except the
Paul Duffin1ab61862021-01-20 17:44:53 +0000147// core libraries as they are already part of the primary ART boot image.
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000148//
149// 2.1. Libraries that go in the boot images
150// -----------------------------------------
151//
152// The contents of each boot image are determined by the PRODUCT variables. The primary ART APEX
153// boot image contains libraries listed in the ART_APEX_JARS variable in the AOSP makefiles. The
154// Framework boot image extension contains libraries specified in the PRODUCT_BOOT_JARS and
155// PRODUCT_BOOT_JARS_EXTRA variables. The AOSP makefiles specify some common Framework libraries,
156// but more product-specific libraries can be added in the product makefiles.
157//
158// Each component of the PRODUCT_BOOT_JARS and PRODUCT_BOOT_JARS_EXTRA variables is either a simple
159// name (if the library is a part of the Platform), or a colon-separated pair <apex, name> (if the
160// library is a part of a non-updatable APEX).
161//
162// A related variable PRODUCT_UPDATABLE_BOOT_JARS contains bootclasspath libraries that are in
163// updatable APEXes. They are not included in the boot image.
164//
165// One exception to the above rules are "coverage" builds (a special build flavor which requires
166// setting environment variable EMMA_INSTRUMENT_FRAMEWORK=true). In coverage builds the Java code in
167// boot image libraries is instrumented, which means that the instrumentation library (jacocoagent)
168// needs to be added to the list of bootclasspath DEX jars.
169//
170// In general, there is a requirement that the source code for a boot image library must be
171// available at build time (e.g. it cannot be a stub that has a separate implementation library).
172//
173// 2.2. Static configs
174// -------------------
175//
176// Because boot images are used to dexpreopt other Java modules, the paths to boot image files must
177// be known by the time dexpreopt build rules for the dependent modules are generated. Boot image
178// configs are constructed very early during the build, before build rule generation. The configs
179// provide predefined paths to boot image files (these paths depend only on static build
180// configuration, such as PRODUCT variables, and use hard-coded directory names).
181//
182// 2.3. Singleton
183// --------------
184//
185// Build rules for the boot images are generated with a Soong singleton. Because a singleton has no
186// dependencies on other modules, it has to find the modules for the DEX jars using VisitAllModules.
187// Soong loops through all modules and compares each module against a list of bootclasspath library
188// names. Then it generates build rules that copy DEX jars from their intermediate module-specific
189// locations to the hard-coded locations predefined in the boot image configs.
190//
191// It would be possible to use a module with proper dependencies instead, but that would require
192// changes in the way Soong generates variables for Make: a singleton can use one MakeVars() method
193// that writes variables to out/soong/make_vars-*.mk, which is included early by the main makefile,
194// but module(s) would have to use out/soong/Android-*.mk which has a group of LOCAL_* variables
195// for each module, and is included later.
196//
197// 2.4. Install rules
198// ------------------
199//
200// The primary boot image and the Framework extension are installed in different ways. The primary
201// boot image is part of the ART APEX: it is copied into the APEX intermediate files, packaged
202// together with other APEX contents, extracted and mounted on device. The Framework boot image
203// extension is installed by the rules defined in makefiles (make/core/dex_preopt_libart.mk). Soong
204// writes out a few DEXPREOPT_IMAGE_* variables for Make; these variables contain boot image names,
205// paths and so on.
206//
207// 2.5. JIT-Zygote configuration
208// -----------------------------
209//
210// One special configuration is JIT-Zygote build, when the primary ART image is used for compiling
211// apps instead of the Framework boot image extension (see DEXPREOPT_USE_ART_IMAGE and UseArtImage).
212//
213
Martin Stjernholmdb513822021-02-16 19:55:58 +0000214var artApexNames = []string{
215 "com.android.art",
216 "com.android.art.debug",
Roland Levillaind603c7d2021-03-24 14:23:57 +0000217 "com.android.art.testing",
Martin Stjernholmdb513822021-02-16 19:55:58 +0000218 "com.google.android.art",
219 "com.google.android.art.debug",
220 "com.google.android.art.testing",
221}
222
Colin Cross800fe132019-02-11 14:21:24 -0800223func init() {
Ulya Trafimovichb28cc372020-01-13 15:18:16 +0000224 RegisterDexpreoptBootJarsComponents(android.InitRegistrationContext)
Colin Cross800fe132019-02-11 14:21:24 -0800225}
226
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000227// Target-independent description of a boot image.
Colin Cross44df5812019-02-15 23:06:46 -0800228type bootImageConfig struct {
David Srbecky1aacc6c2020-03-26 11:10:45 +0000229 // If this image is an extension, the image that it extends.
230 extends *bootImageConfig
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000231
232 // Image name (used in directory names and ninja rule names).
233 name string
234
235 // Basename of the image: the resulting filenames are <stem>[-<jar>].{art,oat,vdex}.
236 stem string
237
238 // Output directory for the image files.
239 dir android.OutputPath
240
241 // Output directory for the image files with debug symbols.
242 symbolsDir android.OutputPath
243
244 // Subdirectory where the image files are installed.
Jeongik Chaa5969092021-05-07 18:53:21 +0900245 installDirOnHost string
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000246
Ulya Trafimovich249386a2020-07-01 14:31:13 +0100247 // A list of (location, jar) pairs for the Java modules in this image.
248 modules android.ConfiguredJarList
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000249
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000250 // File paths to jars.
251 dexPaths android.WritablePaths // for this image
252 dexPathsDeps android.WritablePaths // for the dependency images and in this image
253
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000254 // File path to a zip archive with all image files (or nil, if not needed).
255 zip android.WritablePath
David Srbeckyc177ebe2020-02-18 20:43:06 +0000256
257 // Rules which should be used in make to install the outputs.
258 profileInstalls android.RuleBuilderInstalls
259
260 // Target-dependent fields.
261 variants []*bootImageVariant
262}
263
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000264// Target-dependent description of a boot image.
David Srbeckyc177ebe2020-02-18 20:43:06 +0000265type bootImageVariant struct {
266 *bootImageConfig
267
268 // Target for which the image is generated.
269 target android.Target
270
David Srbeckyab994982020-03-30 17:24:13 +0100271 // The "locations" of jars.
272 dexLocations []string // for this image
273 dexLocationsDeps []string // for the dependency images and in this image
274
David Srbeckyc177ebe2020-02-18 20:43:06 +0000275 // Paths to image files.
Jeongik Chaa5969092021-05-07 18:53:21 +0900276 imagePathOnHost android.OutputPath // first image file
277 imagesDeps android.OutputPaths // all files
David Srbeckyc177ebe2020-02-18 20:43:06 +0000278
279 // Only for extensions, paths to the primary boot images.
280 primaryImages android.OutputPath
281
282 // Rules which should be used in make to install the outputs.
283 installs android.RuleBuilderInstalls
284 vdexInstalls android.RuleBuilderInstalls
285 unstrippedInstalls android.RuleBuilderInstalls
286}
287
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000288// Get target-specific boot image variant for the given boot image config and target.
David Srbeckyc177ebe2020-02-18 20:43:06 +0000289func (image bootImageConfig) getVariant(target android.Target) *bootImageVariant {
290 for _, variant := range image.variants {
291 if variant.target.Os == target.Os && variant.target.Arch.ArchType == target.Arch.ArchType {
292 return variant
293 }
294 }
295 return nil
Colin Cross800fe132019-02-11 14:21:24 -0800296}
297
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000298// Return any (the first) variant which is for the device (as opposed to for the host).
David Srbeckyab994982020-03-30 17:24:13 +0100299func (image bootImageConfig) getAnyAndroidVariant() *bootImageVariant {
300 for _, variant := range image.variants {
301 if variant.target.Os == android.Android {
302 return variant
303 }
304 }
305 return nil
306}
307
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000308// Return the name of a boot image module given a boot image config and a component (module) index.
309// A module name is a combination of the Java library name, and the boot image stem (that is stored
310// in the config).
Ulya Trafimovich8640ab92020-05-11 18:06:15 +0100311func (image bootImageConfig) moduleName(ctx android.PathContext, idx int) string {
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000312 // The first module of the primary boot image is special: its module name has only the stem, but
313 // not the library name. All other module names are of the form <stem>-<library name>
Ulya Trafimovich249386a2020-07-01 14:31:13 +0100314 m := image.modules.Jar(idx)
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000315 name := image.stem
David Srbecky1aacc6c2020-03-26 11:10:45 +0000316 if idx != 0 || image.extends != nil {
Ulya Trafimovich249386a2020-07-01 14:31:13 +0100317 name += "-" + android.ModuleStem(m)
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000318 }
319 return name
320}
Dan Willemsen0f416782019-06-13 21:44:53 +0000321
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000322// Return the name of the first boot image module, or stem if the list of modules is empty.
Ulya Trafimovich8640ab92020-05-11 18:06:15 +0100323func (image bootImageConfig) firstModuleNameOrStem(ctx android.PathContext) string {
Ulya Trafimovich249386a2020-07-01 14:31:13 +0100324 if image.modules.Len() > 0 {
Ulya Trafimovich8640ab92020-05-11 18:06:15 +0100325 return image.moduleName(ctx, 0)
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000326 } else {
327 return image.stem
328 }
329}
330
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000331// Return filenames for the given boot image component, given the output directory and a list of
332// extensions.
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000333func (image bootImageConfig) moduleFiles(ctx android.PathContext, dir android.OutputPath, exts ...string) android.OutputPaths {
Ulya Trafimovich249386a2020-07-01 14:31:13 +0100334 ret := make(android.OutputPaths, 0, image.modules.Len()*len(exts))
335 for i := 0; i < image.modules.Len(); i++ {
Ulya Trafimovich8640ab92020-05-11 18:06:15 +0100336 name := image.moduleName(ctx, i)
Dan Willemsen0f416782019-06-13 21:44:53 +0000337 for _, ext := range exts {
338 ret = append(ret, dir.Join(ctx, name+ext))
339 }
340 }
Dan Willemsen0f416782019-06-13 21:44:53 +0000341 return ret
342}
343
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000344// Return boot image locations (as a list of symbolic paths).
345//
David Srbecky1aacc6c2020-03-26 11:10:45 +0000346// The image "location" is a symbolic path that, with multiarchitecture support, doesn't really
347// exist on the device. Typically it is /apex/com.android.art/javalib/boot.art and should be the
348// same for all supported architectures on the device. The concrete architecture specific files
349// actually end up in architecture-specific sub-directory such as arm, arm64, x86, or x86_64.
350//
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000351// For example a physical file /apex/com.android.art/javalib/x86/boot.art has "image location"
352// /apex/com.android.art/javalib/boot.art (which is not an actual file).
353//
354// For a primary boot image the list of locations has a single element.
355//
356// For a boot image extension the list of locations contains a location for all dependency images
357// (including the primary image) and the location of the extension itself. For example, for the
358// Framework boot image extension that depends on the primary ART boot image the list contains two
359// elements.
David Srbecky1aacc6c2020-03-26 11:10:45 +0000360//
361// The location is passed as an argument to the ART tools like dex2oat instead of the real path.
362// ART tools will then reconstruct the architecture-specific real path.
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000363//
David Srbecky1aacc6c2020-03-26 11:10:45 +0000364func (image *bootImageVariant) imageLocations() (imageLocations []string) {
365 if image.extends != nil {
366 imageLocations = image.extends.getVariant(image.target).imageLocations()
367 }
Jeongik Chaa5969092021-05-07 18:53:21 +0900368 return append(imageLocations, dexpreopt.PathToLocation(image.imagePathOnHost, image.target.Arch.ArchType))
David Srbecky1aacc6c2020-03-26 11:10:45 +0000369}
370
Paul Duffin1ab61862021-01-20 17:44:53 +0000371func dexpreoptBootJarsFactory() android.SingletonModule {
372 m := &dexpreoptBootJars{}
373 android.InitAndroidModule(m)
374 return m
Colin Cross800fe132019-02-11 14:21:24 -0800375}
376
Ulya Trafimovichb28cc372020-01-13 15:18:16 +0000377func RegisterDexpreoptBootJarsComponents(ctx android.RegistrationContext) {
Paul Duffin1ab61862021-01-20 17:44:53 +0000378 ctx.RegisterSingletonModuleType("dex_bootjars", dexpreoptBootJarsFactory)
Ulya Trafimovichb28cc372020-01-13 15:18:16 +0000379}
380
Ulya Trafimovicha4a1c4e2021-01-15 18:40:04 +0000381func SkipDexpreoptBootJars(ctx android.PathContext) bool {
382 return dexpreopt.GetGlobalConfig(ctx).DisablePreoptBootImages
Colin Cross800fe132019-02-11 14:21:24 -0800383}
384
Paul Duffin1ab61862021-01-20 17:44:53 +0000385// Singleton module for generating boot image build rules.
Colin Cross44df5812019-02-15 23:06:46 -0800386type dexpreoptBootJars struct {
Paul Duffin1ab61862021-01-20 17:44:53 +0000387 android.SingletonModuleBase
388
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000389 // Default boot image config (currently always the Framework boot image extension). It should be
390 // noted that JIT-Zygote builds use ART APEX image instead of the Framework boot image extension,
391 // but the switch is handled not here, but in the makefiles (triggered with
392 // DEXPREOPT_USE_ART_IMAGE=true).
David Srbeckyc177ebe2020-02-18 20:43:06 +0000393 defaultBootImage *bootImageConfig
Colin Cross2d00f0d2019-05-09 21:50:00 -0700394
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000395 // Other boot image configs (currently the list contains only the primary ART APEX image. It
396 // used to contain an experimental JIT-Zygote image (now replaced with the ART APEX image). In
397 // the future other boot image extensions may be added.
398 otherImages []*bootImageConfig
399
400 // Build path to a config file that Soong writes for Make (to be used in makefiles that install
401 // the default boot image).
Colin Cross2d00f0d2019-05-09 21:50:00 -0700402 dexpreoptConfigForMake android.WritablePath
Colin Cross44df5812019-02-15 23:06:46 -0800403}
Colin Cross800fe132019-02-11 14:21:24 -0800404
Paul Duffin1ab61862021-01-20 17:44:53 +0000405// Provide paths to boot images for use by modules that depend upon them.
406//
407// The build rules are created in GenerateSingletonBuildActions().
408func (d *dexpreoptBootJars) GenerateAndroidBuildActions(ctx android.ModuleContext) {
409 // Placeholder for now.
410}
411
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000412// Generate build rules for boot images.
Paul Duffin1ab61862021-01-20 17:44:53 +0000413func (d *dexpreoptBootJars) GenerateSingletonBuildActions(ctx android.SingletonContext) {
Ulya Trafimovicha4a1c4e2021-01-15 18:40:04 +0000414 if SkipDexpreoptBootJars(ctx) {
Colin Cross800fe132019-02-11 14:21:24 -0800415 return
416 }
Martin Stjernholm6d415272020-01-31 17:10:36 +0000417 if dexpreopt.GetCachedGlobalSoongConfig(ctx) == nil {
418 // No module has enabled dexpreopting, so we assume there will be no boot image to make.
419 return
420 }
Colin Cross800fe132019-02-11 14:21:24 -0800421
Colin Cross2d00f0d2019-05-09 21:50:00 -0700422 d.dexpreoptConfigForMake = android.PathForOutput(ctx, ctx.Config().DeviceName(), "dexpreopt.config")
423 writeGlobalConfigForMake(ctx, d.dexpreoptConfigForMake)
424
Martin Stjernholm40f9f3c2020-01-20 18:12:23 +0000425 global := dexpreopt.GetGlobalConfig(ctx)
Paul Duffinad19d382021-04-26 16:44:00 +0100426 if !shouldBuildBootImages(ctx.Config(), global) {
Colin Cross800fe132019-02-11 14:21:24 -0800427 return
428 }
429
Paul Duffin58612422021-04-26 12:51:07 +0100430 // Generate the profile rule from the default boot image.
431 defaultImageConfig := defaultBootImageConfig(ctx)
432 profile := bootImageProfileRule(ctx, defaultImageConfig)
433
Paul Duffin58612422021-04-26 12:51:07 +0100434 // Create the default boot image.
435 d.defaultBootImage = buildBootImage(ctx, defaultImageConfig, profile)
436
Ulya Trafimovich44561882020-01-03 13:25:54 +0000437 // Create boot image for the ART apex (build artifacts are accessed via the global boot image config).
Paul Duffin58612422021-04-26 12:51:07 +0100438 d.otherImages = append(d.otherImages, buildBootImage(ctx, artBootImageConfig(ctx), profile))
Colin Cross44df5812019-02-15 23:06:46 -0800439}
440
Paul Duffinad19d382021-04-26 16:44:00 +0100441// shouldBuildBootImages determines whether boot images should be built.
442func shouldBuildBootImages(config android.Config, global *dexpreopt.GlobalConfig) bool {
443 // Skip recompiling the boot image for the second sanitization phase. We'll get separate paths
444 // and invalidate first-stage artifacts which are crucial to SANITIZE_LITE builds.
445 // Note: this is technically incorrect. Compiled code contains stack checks which may depend
446 // on ASAN settings.
447 if len(config.SanitizeDevice()) == 1 && config.SanitizeDevice()[0] == "address" && global.SanitizeLite {
448 return false
449 }
450 return true
451}
452
Paul Duffind6894ca2021-04-27 15:23:28 +0100453// copyBootJarsToPredefinedLocations generates commands that will copy boot jars to
454// predefined paths in the global config.
Paul Duffin7ebebfd2021-04-27 19:36:57 +0100455func copyBootJarsToPredefinedLocations(ctx android.ModuleContext, bootModules []android.Module, bootjars android.ConfiguredJarList, jarPathsPredefined android.WritablePaths) {
Paul Duffind6894ca2021-04-27 15:23:28 +0100456 jarPaths := make(android.Paths, bootjars.Len())
457 for i, module := range bootModules {
458 if module != nil {
459 bootDexJar := module.(interface{ DexJarBuildPath() android.Path }).DexJarBuildPath()
460 jarPaths[i] = bootDexJar
Paul Duffin7ebebfd2021-04-27 19:36:57 +0100461
462 name := android.RemoveOptionalPrebuiltPrefix(ctx.OtherModuleName(module))
463 if bootjars.Jar(i) != name {
464 ctx.ModuleErrorf("expected module %s at position %d but found %s", bootjars.Jar(i), i, name)
465 }
Paul Duffind6894ca2021-04-27 15:23:28 +0100466 }
467 }
Colin Cross800fe132019-02-11 14:21:24 -0800468
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000469 // The paths to bootclasspath DEX files need to be known at module GenerateAndroidBuildAction
470 // time, before the boot images are built (these paths are used in dexpreopt rule generation for
471 // Java libraries and apps). Generate rules that copy bootclasspath DEX jars to the predefined
472 // paths.
Ulya Trafimovichfa2b1cf2021-03-22 12:37:10 +0000473 for i := range jarPaths {
Paul Duffin57e2e7d2021-04-26 13:24:42 +0100474 input := jarPaths[i]
475 output := jarPathsPredefined[i]
476 module := bootjars.Jar(i)
477 if input == nil {
478 if ctx.Config().AllowMissingDependencies() {
479 apex := bootjars.Apex(i)
Colin Cross800fe132019-02-11 14:21:24 -0800480
Paul Duffin57e2e7d2021-04-26 13:24:42 +0100481 // Create an error rule that pretends to create the output file but will actually fail if it
482 // is run.
483 ctx.Build(pctx, android.BuildParams{
484 Rule: android.ErrorRule,
485 Output: output,
486 Args: map[string]string{
487 "error": fmt.Sprintf("missing dependencies: dex jar for %s:%s", module, apex),
488 },
489 })
490 } else {
Paul Duffin7ebebfd2021-04-27 19:36:57 +0100491 ctx.ModuleErrorf("failed to find a dex jar path for module '%s'"+
Paul Duffin57e2e7d2021-04-26 13:24:42 +0100492 ", note that some jars may be filtered out by module constraints", module)
493 }
494
495 } else {
496 ctx.Build(pctx, android.BuildParams{
497 Rule: android.Cp,
498 Input: input,
499 Output: output,
500 })
501 }
502 }
Ulya Trafimovichfa2b1cf2021-03-22 12:37:10 +0000503}
504
505// buildBootImage takes a bootImageConfig, creates rules to build it, and returns the image.
Paul Duffin58612422021-04-26 12:51:07 +0100506func buildBootImage(ctx android.SingletonContext, image *bootImageConfig, profile android.WritablePath) *bootImageConfig {
Ulya Trafimovich9ab49332020-06-10 15:44:25 +0100507 var zipFiles android.Paths
David Srbeckyc177ebe2020-02-18 20:43:06 +0000508 for _, variant := range image.variants {
Paul Duffin57e2e7d2021-04-26 13:24:42 +0100509 files := buildBootImageVariant(ctx, variant, profile)
Ulya Trafimovich9ab49332020-06-10 15:44:25 +0100510 if variant.target.Os == android.Android {
511 zipFiles = append(zipFiles, files.Paths()...)
512 }
Colin Cross800fe132019-02-11 14:21:24 -0800513 }
Colin Cross44df5812019-02-15 23:06:46 -0800514
Colin Crossdf8eebe2019-04-09 15:29:41 -0700515 if image.zip != nil {
Colin Crossf1a035e2020-11-16 17:32:30 -0800516 rule := android.NewRuleBuilder(pctx, ctx)
Colin Crossdf8eebe2019-04-09 15:29:41 -0700517 rule.Command().
Colin Crossf1a035e2020-11-16 17:32:30 -0800518 BuiltTool("soong_zip").
Colin Crossdf8eebe2019-04-09 15:29:41 -0700519 FlagWithOutput("-o ", image.zip).
Ulya Trafimovich9ab49332020-06-10 15:44:25 +0100520 FlagWithArg("-C ", image.dir.Join(ctx, android.Android.String()).String()).
521 FlagWithInputList("-f ", zipFiles, " -f ")
Colin Crossdf8eebe2019-04-09 15:29:41 -0700522
Colin Crossf1a035e2020-11-16 17:32:30 -0800523 rule.Build("zip_"+image.name, "zip "+image.name+" image")
Colin Crossdf8eebe2019-04-09 15:29:41 -0700524 }
525
Colin Cross44df5812019-02-15 23:06:46 -0800526 return image
Colin Cross800fe132019-02-11 14:21:24 -0800527}
528
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000529// Generate boot image build rules for a specific target.
Paul Duffin57e2e7d2021-04-26 13:24:42 +0100530func buildBootImageVariant(ctx android.SingletonContext, image *bootImageVariant, profile android.Path) android.WritablePaths {
Colin Cross800fe132019-02-11 14:21:24 -0800531
Martin Stjernholm75a48d82020-01-10 20:32:59 +0000532 globalSoong := dexpreopt.GetCachedGlobalSoongConfig(ctx)
Martin Stjernholm40f9f3c2020-01-20 18:12:23 +0000533 global := dexpreopt.GetGlobalConfig(ctx)
Colin Cross44df5812019-02-15 23:06:46 -0800534
David Srbeckyc177ebe2020-02-18 20:43:06 +0000535 arch := image.target.Arch.ArchType
David Srbecky7f8dac12020-02-13 16:00:45 +0000536 os := image.target.Os.String() // We need to distinguish host-x86 and device-x86.
Jeongik Chaa5969092021-05-07 18:53:21 +0900537 symbolsDir := image.symbolsDir.Join(ctx, os, image.installDirOnHost, arch.String())
Ulyana Trafimovichde534412019-11-08 10:51:01 +0000538 symbolsFile := symbolsDir.Join(ctx, image.stem+".oat")
Jeongik Chaa5969092021-05-07 18:53:21 +0900539 outputDir := image.dir.Join(ctx, os, image.installDirOnHost, arch.String())
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000540 outputPath := outputDir.Join(ctx, image.stem+".oat")
541 oatLocation := dexpreopt.PathToLocation(outputPath, arch)
542 imagePath := outputPath.ReplaceExtension(ctx, "art")
Colin Cross800fe132019-02-11 14:21:24 -0800543
Colin Crossf1a035e2020-11-16 17:32:30 -0800544 rule := android.NewRuleBuilder(pctx, ctx)
Colin Cross800fe132019-02-11 14:21:24 -0800545
546 rule.Command().Text("mkdir").Flag("-p").Flag(symbolsDir.String())
547 rule.Command().Text("rm").Flag("-f").
548 Flag(symbolsDir.Join(ctx, "*.art").String()).
549 Flag(symbolsDir.Join(ctx, "*.oat").String()).
550 Flag(symbolsDir.Join(ctx, "*.invocation").String())
551 rule.Command().Text("rm").Flag("-f").
552 Flag(outputDir.Join(ctx, "*.art").String()).
553 Flag(outputDir.Join(ctx, "*.oat").String()).
554 Flag(outputDir.Join(ctx, "*.invocation").String())
555
556 cmd := rule.Command()
557
558 extraFlags := ctx.Config().Getenv("ART_BOOT_IMAGE_EXTRA_ARGS")
559 if extraFlags == "" {
560 // Use ANDROID_LOG_TAGS to suppress most logging by default...
561 cmd.Text(`ANDROID_LOG_TAGS="*:e"`)
562 } else {
563 // ...unless the boot image is generated specifically for testing, then allow all logging.
564 cmd.Text(`ANDROID_LOG_TAGS="*:v"`)
565 }
566
567 invocationPath := outputPath.ReplaceExtension(ctx, "invocation")
568
Martin Stjernholm75a48d82020-01-10 20:32:59 +0000569 cmd.Tool(globalSoong.Dex2oat).
Colin Cross800fe132019-02-11 14:21:24 -0800570 Flag("--avoid-storing-invocation").
Colin Cross69f59a32019-02-15 10:39:37 -0800571 FlagWithOutput("--write-invocation-to=", invocationPath).ImplicitOutput(invocationPath).
Colin Cross44df5812019-02-15 23:06:46 -0800572 Flag("--runtime-arg").FlagWithArg("-Xms", global.Dex2oatImageXms).
573 Flag("--runtime-arg").FlagWithArg("-Xmx", global.Dex2oatImageXmx)
Colin Cross800fe132019-02-11 14:21:24 -0800574
Colin Cross69f59a32019-02-15 10:39:37 -0800575 if profile != nil {
Colin Cross800fe132019-02-11 14:21:24 -0800576 cmd.FlagWithArg("--compiler-filter=", "speed-profile")
Colin Cross69f59a32019-02-15 10:39:37 -0800577 cmd.FlagWithInput("--profile-file=", profile)
Colin Cross800fe132019-02-11 14:21:24 -0800578 }
579
Nicolas Geoffray1086e602021-01-20 14:30:40 +0000580 dirtyImageFile := "frameworks/base/config/dirty-image-objects"
581 dirtyImagePath := android.ExistentPathForSource(ctx, dirtyImageFile)
582 if dirtyImagePath.Valid() {
583 cmd.FlagWithInput("--dirty-image-objects=", dirtyImagePath.Path())
Colin Cross800fe132019-02-11 14:21:24 -0800584 }
585
David Srbecky1aacc6c2020-03-26 11:10:45 +0000586 if image.extends != nil {
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000587 // It is a boot image extension, so it needs the boot image it depends on (in this case the
588 // primary ART APEX image).
David Srbeckyc177ebe2020-02-18 20:43:06 +0000589 artImage := image.primaryImages
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000590 cmd.
591 Flag("--runtime-arg").FlagWithInputList("-Xbootclasspath:", image.dexPathsDeps.Paths(), ":").
592 Flag("--runtime-arg").FlagWithList("-Xbootclasspath-locations:", image.dexLocationsDeps, ":").
593 FlagWithArg("--boot-image=", dexpreopt.PathToLocation(artImage, arch)).Implicit(artImage)
594 } else {
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000595 // It is a primary image, so it needs a base address.
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000596 cmd.FlagWithArg("--base=", ctx.Config().LibartImgDeviceBaseAddress())
597 }
598
Colin Cross800fe132019-02-11 14:21:24 -0800599 cmd.
Colin Cross44df5812019-02-15 23:06:46 -0800600 FlagForEachInput("--dex-file=", image.dexPaths.Paths()).
601 FlagForEachArg("--dex-location=", image.dexLocations).
Colin Cross800fe132019-02-11 14:21:24 -0800602 Flag("--generate-debug-info").
603 Flag("--generate-build-id").
Mathieu Chartier54fd8072019-07-26 13:50:04 -0700604 Flag("--image-format=lz4hc").
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000605 FlagWithArg("--oat-symbols=", symbolsFile.String()).
Colin Cross800fe132019-02-11 14:21:24 -0800606 Flag("--strip").
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000607 FlagWithArg("--oat-file=", outputPath.String()).
Colin Cross800fe132019-02-11 14:21:24 -0800608 FlagWithArg("--oat-location=", oatLocation).
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000609 FlagWithArg("--image=", imagePath.String()).
Colin Cross800fe132019-02-11 14:21:24 -0800610 FlagWithArg("--instruction-set=", arch.String()).
Colin Cross44df5812019-02-15 23:06:46 -0800611 FlagWithArg("--android-root=", global.EmptyDirectory).
Colin Cross800fe132019-02-11 14:21:24 -0800612 FlagWithArg("--no-inline-from=", "core-oj.jar").
Ulya Trafimovichc0c98d52020-03-09 12:46:06 +0000613 Flag("--force-determinism").
Colin Cross800fe132019-02-11 14:21:24 -0800614 Flag("--abort-on-hard-verifier-error")
615
David Srbecky7f8dac12020-02-13 16:00:45 +0000616 // Use the default variant/features for host builds.
617 // The map below contains only device CPU info (which might be x86 on some devices).
618 if image.target.Os == android.Android {
619 cmd.FlagWithArg("--instruction-set-variant=", global.CpuVariant[arch])
620 cmd.FlagWithArg("--instruction-set-features=", global.InstructionSetFeatures[arch])
621 }
622
Colin Cross44df5812019-02-15 23:06:46 -0800623 if global.BootFlags != "" {
624 cmd.Flag(global.BootFlags)
Colin Cross800fe132019-02-11 14:21:24 -0800625 }
626
627 if extraFlags != "" {
628 cmd.Flag(extraFlags)
629 }
630
Colin Cross0b9f31f2019-02-28 11:00:01 -0800631 cmd.Textf(`|| ( echo %s ; false )`, proptools.ShellEscape(failureMessage))
Colin Cross800fe132019-02-11 14:21:24 -0800632
Jeongik Chaa5969092021-05-07 18:53:21 +0900633 installDir := filepath.Join("/", image.installDirOnHost, arch.String())
Colin Cross800fe132019-02-11 14:21:24 -0800634
Colin Cross800fe132019-02-11 14:21:24 -0800635 var vdexInstalls android.RuleBuilderInstalls
636 var unstrippedInstalls android.RuleBuilderInstalls
637
Colin Crossdf8eebe2019-04-09 15:29:41 -0700638 var zipFiles android.WritablePaths
639
Dan Willemsen0f416782019-06-13 21:44:53 +0000640 for _, artOrOat := range image.moduleFiles(ctx, outputDir, ".art", ".oat") {
641 cmd.ImplicitOutput(artOrOat)
642 zipFiles = append(zipFiles, artOrOat)
Colin Cross800fe132019-02-11 14:21:24 -0800643
Dan Willemsen0f416782019-06-13 21:44:53 +0000644 // Install the .oat and .art files
645 rule.Install(artOrOat, filepath.Join(installDir, artOrOat.Base()))
646 }
Colin Cross800fe132019-02-11 14:21:24 -0800647
Dan Willemsen0f416782019-06-13 21:44:53 +0000648 for _, vdex := range image.moduleFiles(ctx, outputDir, ".vdex") {
649 cmd.ImplicitOutput(vdex)
650 zipFiles = append(zipFiles, vdex)
Colin Cross800fe132019-02-11 14:21:24 -0800651
David Srbecky7f8dac12020-02-13 16:00:45 +0000652 // Note that the vdex files are identical between architectures.
653 // Make rules will create symlinks to share them between architectures.
Colin Cross800fe132019-02-11 14:21:24 -0800654 vdexInstalls = append(vdexInstalls,
David Srbecky7f8dac12020-02-13 16:00:45 +0000655 android.RuleBuilderInstall{vdex, filepath.Join(installDir, vdex.Base())})
Dan Willemsen0f416782019-06-13 21:44:53 +0000656 }
657
658 for _, unstrippedOat := range image.moduleFiles(ctx, symbolsDir, ".oat") {
659 cmd.ImplicitOutput(unstrippedOat)
Colin Cross800fe132019-02-11 14:21:24 -0800660
661 // Install the unstripped oat files. The Make rules will put these in $(TARGET_OUT_UNSTRIPPED)
662 unstrippedInstalls = append(unstrippedInstalls,
Colin Cross69f59a32019-02-15 10:39:37 -0800663 android.RuleBuilderInstall{unstrippedOat, filepath.Join(installDir, unstrippedOat.Base())})
Colin Cross800fe132019-02-11 14:21:24 -0800664 }
665
Colin Crossf1a035e2020-11-16 17:32:30 -0800666 rule.Build(image.name+"JarsDexpreopt_"+image.target.String(), "dexpreopt "+image.name+" jars "+arch.String())
Colin Cross800fe132019-02-11 14:21:24 -0800667
668 // save output and installed files for makevars
David Srbeckyc177ebe2020-02-18 20:43:06 +0000669 image.installs = rule.Installs()
670 image.vdexInstalls = vdexInstalls
671 image.unstrippedInstalls = unstrippedInstalls
Colin Crossdf8eebe2019-04-09 15:29:41 -0700672
673 return zipFiles
Colin Cross800fe132019-02-11 14:21:24 -0800674}
675
676const failureMessage = `ERROR: Dex2oat failed to compile a boot image.
677It is likely that the boot classpath is inconsistent.
678Rebuild with ART_BOOT_IMAGE_EXTRA_ARGS="--runtime-arg -verbose:verifier" to see verification errors.`
679
Paul Duffin57e2e7d2021-04-26 13:24:42 +0100680func bootImageProfileRule(ctx android.SingletonContext, image *bootImageConfig) android.WritablePath {
Martin Stjernholm75a48d82020-01-10 20:32:59 +0000681 globalSoong := dexpreopt.GetCachedGlobalSoongConfig(ctx)
Martin Stjernholm40f9f3c2020-01-20 18:12:23 +0000682 global := dexpreopt.GetGlobalConfig(ctx)
Nicolas Geoffray27c7cc62019-02-24 16:04:52 +0000683
Ulya Trafimovicha4a1c4e2021-01-15 18:40:04 +0000684 if global.DisableGenerateProfile {
Nicolas Geoffray27c7cc62019-02-24 16:04:52 +0000685 return nil
686 }
Colin Cross800fe132019-02-11 14:21:24 -0800687
Paul Duffin58612422021-04-26 12:51:07 +0100688 defaultProfile := "frameworks/base/config/boot-image-profile.txt"
Colin Cross800fe132019-02-11 14:21:24 -0800689
Paul Duffin58612422021-04-26 12:51:07 +0100690 rule := android.NewRuleBuilder(pctx, ctx)
Colin Cross800fe132019-02-11 14:21:24 -0800691
Paul Duffin58612422021-04-26 12:51:07 +0100692 var bootImageProfile android.Path
693 if len(global.BootImageProfiles) > 1 {
694 combinedBootImageProfile := image.dir.Join(ctx, "boot-image-profile.txt")
695 rule.Command().Text("cat").Inputs(global.BootImageProfiles).Text(">").Output(combinedBootImageProfile)
696 bootImageProfile = combinedBootImageProfile
697 } else if len(global.BootImageProfiles) == 1 {
698 bootImageProfile = global.BootImageProfiles[0]
699 } else if path := android.ExistentPathForSource(ctx, defaultProfile); path.Valid() {
700 bootImageProfile = path.Path()
701 } else {
702 // No profile (not even a default one, which is the case on some branches
703 // like master-art-host that don't have frameworks/base).
704 // Return nil and continue without profile.
705 return nil
Ulyana Trafimovichde534412019-11-08 10:51:01 +0000706 }
Colin Cross800fe132019-02-11 14:21:24 -0800707
Paul Duffin58612422021-04-26 12:51:07 +0100708 profile := image.dir.Join(ctx, "boot.prof")
709
710 rule.Command().
711 Text(`ANDROID_LOG_TAGS="*:e"`).
712 Tool(globalSoong.Profman).
713 Flag("--output-profile-type=boot").
714 FlagWithInput("--create-profile-from=", bootImageProfile).
715 FlagForEachInput("--apk=", image.dexPathsDeps.Paths()).
716 FlagForEachArg("--dex-location=", image.getAnyAndroidVariant().dexLocationsDeps).
717 FlagWithOutput("--reference-profile-file=", profile)
718
719 rule.Install(profile, "/system/etc/boot-image.prof")
720
721 rule.Build("bootJarsProfile", "profile boot jars")
722
Paul Duffinbe007d12021-05-07 13:02:07 +0100723 image.profileInstalls = append(image.profileInstalls, rule.Installs()...)
Paul Duffin58612422021-04-26 12:51:07 +0100724
725 return profile
726}
Nicolas Geoffray72892f12019-02-22 15:34:40 +0000727
Paul Duffinad19d382021-04-26 16:44:00 +0100728// bootFrameworkProfileRule generates the rule to create the boot framework profile and
729// returns a path to the generated file.
730func bootFrameworkProfileRule(ctx android.ModuleContext, image *bootImageConfig) android.WritablePath {
731 globalSoong := dexpreopt.GetGlobalSoongConfig(ctx)
Martin Stjernholm40f9f3c2020-01-20 18:12:23 +0000732 global := dexpreopt.GetGlobalConfig(ctx)
Nicolas Geoffraye7102422019-07-24 13:19:29 +0100733
Dan Willemsen9f435972020-05-28 15:28:00 -0700734 if global.DisableGenerateProfile || ctx.Config().UnbundledBuild() {
Nicolas Geoffraye7102422019-07-24 13:19:29 +0100735 return nil
736 }
Nicolas Geoffraye7102422019-07-24 13:19:29 +0100737
Paul Duffin58612422021-04-26 12:51:07 +0100738 defaultProfile := "frameworks/base/config/boot-profile.txt"
Paul Duffin2ac45f02021-04-26 17:08:38 +0100739 bootFrameworkProfile := android.PathForSource(ctx, defaultProfile)
Nicolas Geoffraye7102422019-07-24 13:19:29 +0100740
Paul Duffin58612422021-04-26 12:51:07 +0100741 profile := image.dir.Join(ctx, "boot.bprof")
Nicolas Geoffraye7102422019-07-24 13:19:29 +0100742
Paul Duffin58612422021-04-26 12:51:07 +0100743 rule := android.NewRuleBuilder(pctx, ctx)
Paul Duffin58612422021-04-26 12:51:07 +0100744 rule.Command().
745 Text(`ANDROID_LOG_TAGS="*:e"`).
746 Tool(globalSoong.Profman).
747 Flag("--output-profile-type=bprof").
748 FlagWithInput("--create-profile-from=", bootFrameworkProfile).
749 FlagForEachInput("--apk=", image.dexPathsDeps.Paths()).
750 FlagForEachArg("--dex-location=", image.getAnyAndroidVariant().dexLocationsDeps).
751 FlagWithOutput("--reference-profile-file=", profile)
Nicolas Geoffraye7102422019-07-24 13:19:29 +0100752
Paul Duffin58612422021-04-26 12:51:07 +0100753 rule.Install(profile, "/system/etc/boot-image.bprof")
754 rule.Build("bootFrameworkProfile", "profile boot framework jars")
755 image.profileInstalls = append(image.profileInstalls, rule.Installs()...)
Nicolas Geoffraye7102422019-07-24 13:19:29 +0100756
Paul Duffin58612422021-04-26 12:51:07 +0100757 return profile
Nicolas Geoffraye7102422019-07-24 13:19:29 +0100758}
759
Paul Duffin44d15942021-04-26 19:45:11 +0100760// generateUpdatableBcpPackagesRule generates the rule to create the updatable-bcp-packages.txt file
761// and returns a path to the generated file.
Paul Duffin4c094422021-04-26 20:10:48 +0100762func generateUpdatableBcpPackagesRule(ctx android.ModuleContext, image *bootImageConfig, updatableModules []android.Module) android.WritablePath {
Paul Duffin44d15942021-04-26 19:45:11 +0100763 // Collect `permitted_packages` for updatable boot jars.
764 var updatablePackages []string
765 for _, module := range updatableModules {
766 if j, ok := module.(PermittedPackagesForUpdatableBootJars); ok {
767 pp := j.PermittedPackagesForUpdatableBootJars()
768 if len(pp) > 0 {
769 updatablePackages = append(updatablePackages, pp...)
770 } else {
Paul Duffin4c094422021-04-26 20:10:48 +0100771 ctx.ModuleErrorf("Missing permitted_packages")
Paul Duffin44d15942021-04-26 19:45:11 +0100772 }
773 }
774 }
775
Paul Duffin58612422021-04-26 12:51:07 +0100776 // Sort updatable packages to ensure deterministic ordering.
777 sort.Strings(updatablePackages)
Vladimir Marko205e6c22020-04-01 13:52:27 +0100778
Paul Duffin58612422021-04-26 12:51:07 +0100779 updatableBcpPackagesName := "updatable-bcp-packages.txt"
780 updatableBcpPackages := image.dir.Join(ctx, updatableBcpPackagesName)
Vladimir Marko205e6c22020-04-01 13:52:27 +0100781
Paul Duffin58612422021-04-26 12:51:07 +0100782 // WriteFileRule automatically adds the last end-of-line.
783 android.WriteFileRule(ctx, updatableBcpPackages, strings.Join(updatablePackages, "\n"))
Vladimir Marko205e6c22020-04-01 13:52:27 +0100784
Paul Duffin58612422021-04-26 12:51:07 +0100785 rule := android.NewRuleBuilder(pctx, ctx)
786 rule.Install(updatableBcpPackages, "/system/etc/"+updatableBcpPackagesName)
787 // TODO: Rename `profileInstalls` to `extraInstalls`?
788 // Maybe even move the field out of the bootImageConfig into some higher level type?
789 image.profileInstalls = append(image.profileInstalls, rule.Installs()...)
Vladimir Marko205e6c22020-04-01 13:52:27 +0100790
Paul Duffin58612422021-04-26 12:51:07 +0100791 return updatableBcpPackages
Vladimir Marko205e6c22020-04-01 13:52:27 +0100792}
793
Paul Duffinf7a55922021-04-26 23:09:15 +0100794func dumpOatRules(ctx android.ModuleContext, image *bootImageConfig) {
Colin Crossc9a4c362019-02-26 21:13:48 -0800795 var allPhonies android.Paths
David Srbeckyc177ebe2020-02-18 20:43:06 +0000796 for _, image := range image.variants {
797 arch := image.target.Arch.ArchType
David Srbecky46672322020-03-16 13:27:55 +0000798 suffix := arch.String()
799 // Host and target might both use x86 arch. We need to ensure the names are unique.
800 if image.target.Os.Class == android.Host {
801 suffix = "host-" + suffix
802 }
Colin Crossc9a4c362019-02-26 21:13:48 -0800803 // Create a rule to call oatdump.
David Srbecky7f8dac12020-02-13 16:00:45 +0000804 output := android.PathForOutput(ctx, "boot."+suffix+".oatdump.txt")
Colin Crossf1a035e2020-11-16 17:32:30 -0800805 rule := android.NewRuleBuilder(pctx, ctx)
Colin Crossc9a4c362019-02-26 21:13:48 -0800806 rule.Command().
807 // TODO: for now, use the debug version for better error reporting
Colin Crossf1a035e2020-11-16 17:32:30 -0800808 BuiltTool("oatdumpd").
Ulya Trafimovich4d2eeed2019-11-08 10:54:21 +0000809 FlagWithInputList("--runtime-arg -Xbootclasspath:", image.dexPathsDeps.Paths(), ":").
810 FlagWithList("--runtime-arg -Xbootclasspath-locations:", image.dexLocationsDeps, ":").
David Srbecky1aacc6c2020-03-26 11:10:45 +0000811 FlagWithArg("--image=", strings.Join(image.imageLocations(), ":")).Implicits(image.imagesDeps.Paths()).
Colin Crossc9a4c362019-02-26 21:13:48 -0800812 FlagWithOutput("--output=", output).
813 FlagWithArg("--instruction-set=", arch.String())
Colin Crossf1a035e2020-11-16 17:32:30 -0800814 rule.Build("dump-oat-boot-"+suffix, "dump oat boot "+arch.String())
Colin Crossc9a4c362019-02-26 21:13:48 -0800815
816 // Create a phony rule that depends on the output file and prints the path.
David Srbecky7f8dac12020-02-13 16:00:45 +0000817 phony := android.PathForPhony(ctx, "dump-oat-boot-"+suffix)
Colin Crossf1a035e2020-11-16 17:32:30 -0800818 rule = android.NewRuleBuilder(pctx, ctx)
Colin Crossc9a4c362019-02-26 21:13:48 -0800819 rule.Command().
820 Implicit(output).
821 ImplicitOutput(phony).
822 Text("echo").FlagWithArg("Output in ", output.String())
Colin Crossf1a035e2020-11-16 17:32:30 -0800823 rule.Build("phony-dump-oat-boot-"+suffix, "dump oat boot "+arch.String())
Colin Crossc9a4c362019-02-26 21:13:48 -0800824
David Srbecky1aacc6c2020-03-26 11:10:45 +0000825 allPhonies = append(allPhonies, phony)
Colin Crossc9a4c362019-02-26 21:13:48 -0800826 }
827
828 phony := android.PathForPhony(ctx, "dump-oat-boot")
829 ctx.Build(pctx, android.BuildParams{
830 Rule: android.Phony,
831 Output: phony,
832 Inputs: allPhonies,
833 Description: "dump-oat-boot",
834 })
Colin Crossc9a4c362019-02-26 21:13:48 -0800835}
836
Colin Cross2d00f0d2019-05-09 21:50:00 -0700837func writeGlobalConfigForMake(ctx android.SingletonContext, path android.WritablePath) {
Martin Stjernholm40f9f3c2020-01-20 18:12:23 +0000838 data := dexpreopt.GetGlobalConfigRawData(ctx)
Colin Cross2d00f0d2019-05-09 21:50:00 -0700839
Colin Crosscf371cc2020-11-13 11:48:42 -0800840 android.WriteFileRule(ctx, path, string(data))
Colin Cross2d00f0d2019-05-09 21:50:00 -0700841}
842
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000843// Define Make variables for boot image names, paths, etc. These variables are used in makefiles
844// (make/core/dex_preopt_libart.mk) to generate install rules that copy boot image files to the
845// correct output directories.
Colin Cross44df5812019-02-15 23:06:46 -0800846func (d *dexpreoptBootJars) MakeVars(ctx android.MakeVarsContext) {
Colin Cross2d00f0d2019-05-09 21:50:00 -0700847 if d.dexpreoptConfigForMake != nil {
848 ctx.Strict("DEX_PREOPT_CONFIG_FOR_MAKE", d.dexpreoptConfigForMake.String())
Martin Stjernholmc52aaf12020-01-06 23:11:37 +0000849 ctx.Strict("DEX_PREOPT_SOONG_CONFIG_FOR_MAKE", android.PathForOutput(ctx, "dexpreopt_soong.config").String())
Colin Cross2d00f0d2019-05-09 21:50:00 -0700850 }
851
Colin Cross44df5812019-02-15 23:06:46 -0800852 image := d.defaultBootImage
853 if image != nil {
Colin Cross44df5812019-02-15 23:06:46 -0800854 ctx.Strict("DEXPREOPT_IMAGE_PROFILE_BUILT_INSTALLED", image.profileInstalls.String())
Ulya Trafimovich9023b022021-03-22 16:02:28 +0000855
856 global := dexpreopt.GetGlobalConfig(ctx)
857 dexPaths, dexLocations := bcpForDexpreopt(ctx, global.PreoptWithUpdatableBcp)
858 ctx.Strict("DEXPREOPT_BOOTCLASSPATH_DEX_FILES", strings.Join(dexPaths.Strings(), " "))
859 ctx.Strict("DEXPREOPT_BOOTCLASSPATH_DEX_LOCATIONS", strings.Join(dexLocations, " "))
Nicolas Geoffray72892f12019-02-22 15:34:40 +0000860
861 var imageNames []string
Ulya Trafimovich3bfabf22020-11-20 17:28:51 +0000862 // TODO: the primary ART boot image should not be exposed to Make, as it is installed in a
863 // different way as a part of the ART APEX. However, there is a special JIT-Zygote build
864 // configuration which uses the primary ART image instead of the Framework boot image
865 // extension, and it relies on the ART image being exposed to Make. To fix this, it is
866 // necessary to rework the logic in makefiles.
Nicolas Geoffray72892f12019-02-22 15:34:40 +0000867 for _, current := range append(d.otherImages, image) {
868 imageNames = append(imageNames, current.name)
David Srbecky1aacc6c2020-03-26 11:10:45 +0000869 for _, variant := range current.variants {
David Srbecky7f8dac12020-02-13 16:00:45 +0000870 suffix := ""
David Srbecky1aacc6c2020-03-26 11:10:45 +0000871 if variant.target.Os.Class == android.Host {
David Srbecky7f8dac12020-02-13 16:00:45 +0000872 suffix = "_host"
873 }
David Srbecky1aacc6c2020-03-26 11:10:45 +0000874 sfx := variant.name + suffix + "_" + variant.target.Arch.ArchType.String()
875 ctx.Strict("DEXPREOPT_IMAGE_VDEX_BUILT_INSTALLED_"+sfx, variant.vdexInstalls.String())
Jeongik Chaa5969092021-05-07 18:53:21 +0900876 ctx.Strict("DEXPREOPT_IMAGE_"+sfx, variant.imagePathOnHost.String())
David Srbecky1aacc6c2020-03-26 11:10:45 +0000877 ctx.Strict("DEXPREOPT_IMAGE_DEPS_"+sfx, strings.Join(variant.imagesDeps.Strings(), " "))
878 ctx.Strict("DEXPREOPT_IMAGE_BUILT_INSTALLED_"+sfx, variant.installs.String())
879 ctx.Strict("DEXPREOPT_IMAGE_UNSTRIPPED_BUILT_INSTALLED_"+sfx, variant.unstrippedInstalls.String())
Nicolas Geoffray72892f12019-02-22 15:34:40 +0000880 }
David Srbeckyab994982020-03-30 17:24:13 +0100881 imageLocations := current.getAnyAndroidVariant().imageLocations()
David Srbecky1aacc6c2020-03-26 11:10:45 +0000882 ctx.Strict("DEXPREOPT_IMAGE_LOCATIONS_"+current.name, strings.Join(imageLocations, ":"))
Colin Cross31bf00d2019-12-04 13:16:01 -0800883 ctx.Strict("DEXPREOPT_IMAGE_ZIP_"+current.name, current.zip.String())
Nicolas Geoffray72892f12019-02-22 15:34:40 +0000884 }
885 ctx.Strict("DEXPREOPT_IMAGE_NAMES", strings.Join(imageNames, " "))
Colin Cross800fe132019-02-11 14:21:24 -0800886 }
Colin Cross800fe132019-02-11 14:21:24 -0800887}