blob: ed42e462ae19b0afa4a614b76dabd65d39b86392 [file] [log] [blame]
Elliott Hughes8d768a92011-09-14 16:35:25 -07001/*
2 * Copyright (C) 2011 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
Carl Shapiro0e5d75d2011-07-06 18:28:37 -070016
Brian Carlstromfc0e3212013-07-17 14:40:12 -070017#ifndef ART_RUNTIME_THREAD_H_
18#define ART_RUNTIME_THREAD_H_
Carl Shapiro0e5d75d2011-07-06 18:28:37 -070019
Elliott Hughes02b48d12011-09-07 17:15:51 -070020#include <bitset>
Ian Rogers306057f2012-11-26 12:45:53 -080021#include <deque>
Elliott Hughesa0957642011-09-02 14:27:33 -070022#include <iosfwd>
Ian Rogersb033c752011-07-20 12:22:35 -070023#include <list>
Ian Rogers700a4022014-05-19 16:49:03 -070024#include <memory>
Dave Allison8ce6b902014-08-26 11:07:58 -070025#include <setjmp.h>
Elliott Hughes8daa0922011-09-11 13:46:25 -070026#include <string>
Carl Shapirob5573532011-07-12 18:22:59 -070027
Mingyao Yang4dcfc432015-04-21 16:55:22 -070028#include "arch/context.h"
Ian Rogersd582fa42014-11-05 23:46:43 -080029#include "arch/instruction_set.h"
Ian Rogersb8e087e2014-07-09 21:12:06 -070030#include "atomic.h"
Elliott Hughes76160052012-12-12 16:31:20 -080031#include "base/macros.h"
Ian Rogers719d1a32014-03-06 12:13:39 -080032#include "base/mutex.h"
Ian Rogers848871b2013-08-05 10:56:33 -070033#include "entrypoints/jni/jni_entrypoints.h"
Ian Rogers7655f292013-07-29 11:07:13 -070034#include "entrypoints/quick/quick_entrypoints.h"
Brian Carlstrom578bbdc2011-07-21 14:07:47 -070035#include "globals.h"
Mathieu Chartiereb8167a2014-05-07 15:43:14 -070036#include "handle_scope.h"
Elliott Hughes956af0f2014-12-11 14:34:28 -080037#include "instrumentation.h"
Ian Rogers306057f2012-11-26 12:45:53 -080038#include "jvalue.h"
Mathieu Chartier83c8ee02014-01-28 14:50:23 -080039#include "object_callbacks.h"
Brian Carlstrom578bbdc2011-07-21 14:07:47 -070040#include "offsets.h"
Elliott Hughes9d5ccec2011-09-19 13:19:50 -070041#include "runtime_stats.h"
Elliott Hughes68e76522011-10-05 13:22:16 -070042#include "stack.h"
Ian Rogers2dd0e2c2013-01-24 12:42:14 -080043#include "thread_state.h"
Ian Rogersb033c752011-07-20 12:22:35 -070044
Christopher Ferris6cff48f2014-01-26 21:36:13 -080045class BacktraceMap;
46
Carl Shapiro0e5d75d2011-07-06 18:28:37 -070047namespace art {
48
Mathieu Chartier15d34022014-02-26 17:16:38 -080049namespace gc {
Hiroshi Yamauchi0b713572015-06-16 18:29:23 -070050namespace accounting {
51 template<class T> class AtomicStack;
52} // namespace accounting
Mathieu Chartier15d34022014-02-26 17:16:38 -080053namespace collector {
Mingyao Yang98d1cc82014-05-15 17:02:16 -070054 class SemiSpace;
Mathieu Chartier15d34022014-02-26 17:16:38 -080055} // namespace collector
56} // namespace gc
57
Ian Rogers2dd0e2c2013-01-24 12:42:14 -080058namespace mirror {
Ian Rogers848871b2013-08-05 10:56:33 -070059 class Array;
60 class Class;
61 class ClassLoader;
62 class Object;
63 template<class T> class ObjectArray;
64 template<class T> class PrimitiveArray;
65 typedef PrimitiveArray<int32_t> IntArray;
66 class StackTraceElement;
Vladimir Marko80afd022015-05-19 18:08:00 +010067 class String;
Ian Rogers848871b2013-08-05 10:56:33 -070068 class Throwable;
Ian Rogers2dd0e2c2013-01-24 12:42:14 -080069} // namespace mirror
Mathieu Chartier12d625f2015-03-13 11:33:37 -070070
71namespace verifier {
72class MethodVerifier;
73} // namespace verifier
74
Mathieu Chartiere401d142015-04-22 13:56:20 -070075class ArtMethod;
Ian Rogers2dd0e2c2013-01-24 12:42:14 -080076class BaseMutex;
77class ClassLinker;
Ian Rogers7a22fa62013-01-23 12:16:16 -080078class Closure;
Ian Rogersbdb03912011-09-14 00:55:44 -070079class Context;
Ian Rogers1b09b092012-08-20 15:35:52 -070080struct DebugInvokeReq;
Sebastien Hertz07474662015-08-25 15:12:33 +000081class DeoptimizationContextRecord;
Ian Rogers81d425b2012-09-27 16:03:43 -070082class DexFile;
Mingyao Yang99170c62015-07-06 11:10:37 -070083class FrameIdToShadowFrame;
Ian Rogersb48b9eb2014-02-28 16:20:21 -080084class JavaVMExt;
Ian Rogers81d425b2012-09-27 16:03:43 -070085struct JNIEnvExt;
Elliott Hughes8daa0922011-09-11 13:46:25 -070086class Monitor;
Carl Shapirob5573532011-07-12 18:22:59 -070087class Runtime;
Mathieu Chartier2b7c4d12014-05-19 10:52:16 -070088class ScopedObjectAccessAlreadyRunnable;
Logan Chienf7ad17e2012-03-15 03:10:03 +080089class ShadowFrame;
Sebastien Hertz597c4f02015-01-26 17:37:14 +010090class SingleStepControl;
Sebastien Hertzf7958692015-06-09 14:09:14 +020091class StackedShadowFrameRecord;
Brian Carlstrom40381fb2011-10-19 14:13:40 -070092class Thread;
93class ThreadList;
Carl Shapiro0e5d75d2011-07-06 18:28:37 -070094
Elliott Hughes34e06962012-04-09 13:55:55 -070095// Thread priorities. These must match the Thread.MIN_PRIORITY,
96// Thread.NORM_PRIORITY, and Thread.MAX_PRIORITY constants.
97enum ThreadPriority {
98 kMinThreadPriority = 1,
99 kNormThreadPriority = 5,
100 kMaxThreadPriority = 10,
101};
102
Ian Rogers474b6da2012-09-25 00:20:38 -0700103enum ThreadFlag {
Ian Rogers50ffee22012-11-20 11:47:44 -0800104 kSuspendRequest = 1, // If set implies that suspend_count_ > 0 and the Thread should enter the
105 // safepoint handler.
Yu Lieac44242015-06-29 10:50:03 +0800106 kCheckpointRequest = 2, // Request that the thread do some checkpoint work and then continue.
107 kActiveSuspendBarrier = 4 // Register that at least 1 suspend barrier needs to be passed.
Ian Rogers474b6da2012-09-25 00:20:38 -0700108};
109
Sebastien Hertzf7958692015-06-09 14:09:14 +0200110enum class StackedShadowFrameType {
Mingyao Yang1f2d3ba2015-05-18 12:12:50 -0700111 kShadowFrameUnderConstruction,
Andreas Gampe639bdd12015-06-03 11:22:45 -0700112 kDeoptimizationShadowFrame,
113 kSingleFrameDeoptimizationShadowFrame
Mingyao Yang1f2d3ba2015-05-18 12:12:50 -0700114};
115
Hiroshi Yamauchi7ed9c562016-02-02 15:22:09 -0800116// This should match RosAlloc::kNumThreadLocalSizeBrackets.
117static constexpr size_t kNumRosAllocThreadLocalSizeBracketsInThread = 16;
Ian Rogerse63db272014-07-15 15:36:11 -0700118
Dave Allison648d7112014-07-25 16:15:27 -0700119// Thread's stack layout for implicit stack overflow checks:
120//
121// +---------------------+ <- highest address of stack memory
122// | |
123// . . <- SP
124// | |
125// | |
126// +---------------------+ <- stack_end
127// | |
128// | Gap |
129// | |
130// +---------------------+ <- stack_begin
131// | |
132// | Protected region |
133// | |
134// +---------------------+ <- lowest address of stack memory
135//
136// The stack always grows down in memory. At the lowest address is a region of memory
137// that is set mprotect(PROT_NONE). Any attempt to read/write to this region will
138// result in a segmentation fault signal. At any point, the thread's SP will be somewhere
139// between the stack_end and the highest address in stack memory. An implicit stack
140// overflow check is a read of memory at a certain offset below the current SP (4K typically).
141// If the thread's SP is below the stack_end address this will be a read into the protected
142// region. If the SP is above the stack_end address, the thread is guaranteed to have
143// at least 4K of space. Because stack overflow checks are only performed in generated code,
144// if the thread makes a call out to a native function (through JNI), that native function
145// might only have 4K of memory (if the SP is adjacent to stack_end).
146
Ian Rogersdd7624d2014-03-14 17:43:00 -0700147class Thread {
Carl Shapiro0e5d75d2011-07-06 18:28:37 -0700148 public:
Andreas Gampe7ea6f792014-07-14 16:21:44 -0700149 static const size_t kStackOverflowImplicitCheckSize;
Dave Allisonf9439142014-03-27 15:10:22 -0700150
Elliott Hughes462c9442012-03-23 18:47:50 -0700151 // Creates a new native thread corresponding to the given managed peer.
152 // Used to implement Thread.start.
Ian Rogers52673ff2012-06-27 23:25:34 -0700153 static void CreateNativeThread(JNIEnv* env, jobject peer, size_t stack_size, bool daemon);
Carl Shapiro61e019d2011-07-14 16:53:09 -0700154
Elliott Hughes462c9442012-03-23 18:47:50 -0700155 // Attaches the calling native thread to the runtime, returning the new native peer.
156 // Used to implement JNI AttachCurrentThread and AttachCurrentThreadAsDaemon calls.
Mathieu Chartier664bebf2012-11-12 16:54:11 -0800157 static Thread* Attach(const char* thread_name, bool as_daemon, jobject thread_group,
158 bool create_peer);
Carl Shapirob5573532011-07-12 18:22:59 -0700159
Brian Carlstromcaabb1b2011-10-11 18:09:13 -0700160 // Reset internal state of child thread after fork.
161 void InitAfterFork();
162
Ian Rogers6f3dbba2014-10-14 17:41:57 -0700163 // Get the currently executing thread, frequently referred to as 'self'. This call has reasonably
164 // high cost and so we favor passing self around when possible.
165 // TODO: mark as PURE so the compiler may coalesce and remove?
Ian Rogers02ed4c02013-09-06 13:10:04 -0700166 static Thread* Current();
Carl Shapiro0e5d75d2011-07-06 18:28:37 -0700167
Ian Rogers7b078e82014-09-10 14:44:24 -0700168 // On a runnable thread, check for pending thread suspension request and handle if pending.
Mathieu Chartier90443472015-07-16 20:32:27 -0700169 void AllowThreadSuspension() SHARED_REQUIRES(Locks::mutator_lock_);
Ian Rogers7b078e82014-09-10 14:44:24 -0700170
171 // Process pending thread suspension request and handle if pending.
Mathieu Chartier90443472015-07-16 20:32:27 -0700172 void CheckSuspend() SHARED_REQUIRES(Locks::mutator_lock_);
Ian Rogers7b078e82014-09-10 14:44:24 -0700173
Mathieu Chartier2b7c4d12014-05-19 10:52:16 -0700174 static Thread* FromManagedThread(const ScopedObjectAccessAlreadyRunnable& ts,
Ian Rogers2dd0e2c2013-01-24 12:42:14 -0800175 mirror::Object* thread_peer)
Mathieu Chartier90443472015-07-16 20:32:27 -0700176 REQUIRES(Locks::thread_list_lock_, !Locks::thread_suspend_count_lock_)
177 SHARED_REQUIRES(Locks::mutator_lock_);
Mathieu Chartier2b7c4d12014-05-19 10:52:16 -0700178 static Thread* FromManagedThread(const ScopedObjectAccessAlreadyRunnable& ts, jobject thread)
Mathieu Chartier90443472015-07-16 20:32:27 -0700179 REQUIRES(Locks::thread_list_lock_, !Locks::thread_suspend_count_lock_)
180 SHARED_REQUIRES(Locks::mutator_lock_);
Elliott Hughes8daa0922011-09-11 13:46:25 -0700181
Elliott Hughes28fa76d2012-04-09 17:31:46 -0700182 // Translates 172 to pAllocArrayFromCode and so on.
Ian Rogersdd7624d2014-03-14 17:43:00 -0700183 template<size_t size_of_pointers>
184 static void DumpThreadOffset(std::ostream& os, uint32_t offset);
Elliott Hughes28fa76d2012-04-09 17:31:46 -0700185
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700186 // Dumps a one-line summary of thread state (used for operator<<).
187 void ShortDump(std::ostream& os) const;
188
189 // Dumps the detailed thread state and the thread stack (used for SIGQUIT).
Nicolas Geoffraya73280d2016-02-15 13:05:16 +0000190 void Dump(std::ostream& os,
191 bool dump_native_stack = true,
192 BacktraceMap* backtrace_map = nullptr) const
Mathieu Chartier90443472015-07-16 20:32:27 -0700193 REQUIRES(!Locks::thread_suspend_count_lock_)
194 SHARED_REQUIRES(Locks::mutator_lock_);
Elliott Hughesa0957642011-09-02 14:27:33 -0700195
Mathieu Chartierc751fdc2014-03-30 15:25:44 -0700196 void DumpJavaStack(std::ostream& os) const
Mathieu Chartier90443472015-07-16 20:32:27 -0700197 REQUIRES(!Locks::thread_suspend_count_lock_)
198 SHARED_REQUIRES(Locks::mutator_lock_);
Mathieu Chartierc751fdc2014-03-30 15:25:44 -0700199
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700200 // Dumps the SIGQUIT per-thread header. 'thread' can be null for a non-attached thread, in which
Elliott Hughesabbe07d2012-06-05 17:42:23 -0700201 // case we use 'tid' to identify the thread, and we'll include as much information as we can.
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700202 static void DumpState(std::ostream& os, const Thread* thread, pid_t tid)
Mathieu Chartier90443472015-07-16 20:32:27 -0700203 REQUIRES(!Locks::thread_suspend_count_lock_)
204 SHARED_REQUIRES(Locks::mutator_lock_);
Elliott Hughesabbe07d2012-06-05 17:42:23 -0700205
Ian Rogers474b6da2012-09-25 00:20:38 -0700206 ThreadState GetState() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700207 DCHECK_GE(tls32_.state_and_flags.as_struct.state, kTerminated);
208 DCHECK_LE(tls32_.state_and_flags.as_struct.state, kSuspended);
209 return static_cast<ThreadState>(tls32_.state_and_flags.as_struct.state);
Dave Allison0aded082013-11-07 13:15:11 -0800210 }
211
Ian Rogers474b6da2012-09-25 00:20:38 -0700212 ThreadState SetState(ThreadState new_state);
Ian Rogers52673ff2012-06-27 23:25:34 -0700213
Mathieu Chartier90443472015-07-16 20:32:27 -0700214 int GetSuspendCount() const REQUIRES(Locks::thread_suspend_count_lock_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700215 return tls32_.suspend_count;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700216 }
Elliott Hughes038a8062011-09-18 14:12:41 -0700217
Mathieu Chartier90443472015-07-16 20:32:27 -0700218 int GetDebugSuspendCount() const REQUIRES(Locks::thread_suspend_count_lock_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700219 return tls32_.debug_suspend_count;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700220 }
221
Mathieu Chartier858f1c52012-10-17 17:45:55 -0700222 bool IsSuspended() const {
Chris Dearman59cde532013-12-04 18:53:49 -0800223 union StateAndFlags state_and_flags;
Ian Rogersdd7624d2014-03-14 17:43:00 -0700224 state_and_flags.as_int = tls32_.state_and_flags.as_int;
Mathieu Chartier858f1c52012-10-17 17:45:55 -0700225 return state_and_flags.as_struct.state != kRunnable &&
226 (state_and_flags.as_struct.flags & kSuspendRequest) != 0;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700227 }
228
Yu Lieac44242015-06-29 10:50:03 +0800229 bool ModifySuspendCount(Thread* self, int delta, AtomicInteger* suspend_barrier, bool for_debugger)
Mathieu Chartier90443472015-07-16 20:32:27 -0700230 REQUIRES(Locks::thread_suspend_count_lock_);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700231
Ian Rogersd9c4fc92013-10-01 19:45:43 -0700232 bool RequestCheckpoint(Closure* function)
Mathieu Chartier90443472015-07-16 20:32:27 -0700233 REQUIRES(Locks::thread_suspend_count_lock_);
Mathieu Chartier858f1c52012-10-17 17:45:55 -0700234
Hiroshi Yamauchi2cd334a2015-01-09 14:03:35 -0800235 void SetFlipFunction(Closure* function);
236 Closure* GetFlipFunction();
237
Hiroshi Yamauchi0b713572015-06-16 18:29:23 -0700238 gc::accounting::AtomicStack<mirror::Object>* GetThreadLocalMarkStack() {
239 CHECK(kUseReadBarrier);
240 return tlsPtr_.thread_local_mark_stack;
241 }
242 void SetThreadLocalMarkStack(gc::accounting::AtomicStack<mirror::Object>* stack) {
243 CHECK(kUseReadBarrier);
244 tlsPtr_.thread_local_mark_stack = stack;
245 }
246
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700247 // Called when thread detected that the thread_suspend_count_ was non-zero. Gives up share of
248 // mutator_lock_ and waits until it is resumed and thread_suspend_count_ is zero.
Ian Rogers9da7f592012-08-20 17:14:28 -0700249 void FullSuspendCheck()
Mathieu Chartier90443472015-07-16 20:32:27 -0700250 REQUIRES(!Locks::thread_suspend_count_lock_)
251 SHARED_REQUIRES(Locks::mutator_lock_);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700252
253 // Transition from non-runnable to runnable state acquiring share on mutator_lock_.
Mathieu Chartier8ac9c912015-10-01 15:58:41 -0700254 ALWAYS_INLINE ThreadState TransitionFromSuspendedToRunnable()
Mathieu Chartier90443472015-07-16 20:32:27 -0700255 REQUIRES(!Locks::thread_suspend_count_lock_)
Mathieu Chartier8ac9c912015-10-01 15:58:41 -0700256 SHARED_LOCK_FUNCTION(Locks::mutator_lock_);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700257
258 // Transition from runnable into a state where mutator privileges are denied. Releases share of
259 // mutator lock.
Mathieu Chartier8ac9c912015-10-01 15:58:41 -0700260 ALWAYS_INLINE void TransitionFromRunnableToSuspended(ThreadState new_state)
Mathieu Chartier4e2cb092015-07-22 16:17:51 -0700261 REQUIRES(!Locks::thread_suspend_count_lock_, !Roles::uninterruptible_)
Mathieu Chartier8ac9c912015-10-01 15:58:41 -0700262 UNLOCK_FUNCTION(Locks::mutator_lock_);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700263
Ian Rogers0399dde2012-06-06 17:09:28 -0700264 // Once called thread suspension will cause an assertion failure.
Mathieu Chartier4e2cb092015-07-22 16:17:51 -0700265 const char* StartAssertNoThreadSuspension(const char* cause) ACQUIRE(Roles::uninterruptible_) {
266 Roles::uninterruptible_.Acquire(); // No-op.
Mathieu Chartier590fee92013-09-13 13:46:47 -0700267 if (kIsDebugBuild) {
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700268 CHECK(cause != nullptr);
Ian Rogersdd7624d2014-03-14 17:43:00 -0700269 const char* previous_cause = tlsPtr_.last_no_thread_suspension_cause;
270 tls32_.no_thread_suspension++;
271 tlsPtr_.last_no_thread_suspension_cause = cause;
Mathieu Chartier590fee92013-09-13 13:46:47 -0700272 return previous_cause;
273 } else {
274 return nullptr;
275 }
Ian Rogers0399dde2012-06-06 17:09:28 -0700276 }
Ian Rogers52673ff2012-06-27 23:25:34 -0700277
Ian Rogers0399dde2012-06-06 17:09:28 -0700278 // End region where no thread suspension is expected.
Mathieu Chartier4e2cb092015-07-22 16:17:51 -0700279 void EndAssertNoThreadSuspension(const char* old_cause) RELEASE(Roles::uninterruptible_) {
Mathieu Chartier590fee92013-09-13 13:46:47 -0700280 if (kIsDebugBuild) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700281 CHECK(old_cause != nullptr || tls32_.no_thread_suspension == 1);
282 CHECK_GT(tls32_.no_thread_suspension, 0U);
283 tls32_.no_thread_suspension--;
284 tlsPtr_.last_no_thread_suspension_cause = old_cause;
Mathieu Chartier590fee92013-09-13 13:46:47 -0700285 }
Mathieu Chartier4e2cb092015-07-22 16:17:51 -0700286 Roles::uninterruptible_.Release(); // No-op.
Ian Rogers0399dde2012-06-06 17:09:28 -0700287 }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700288
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700289 void AssertThreadSuspensionIsAllowable(bool check_locks = true) const;
Ian Rogers0399dde2012-06-06 17:09:28 -0700290
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700291 bool IsDaemon() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700292 return tls32_.daemon;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700293 }
294
Mathieu Chartier14c3bf92015-07-13 14:35:43 -0700295 size_t NumberOfHeldMutexes() const;
296
Mathieu Chartier90443472015-07-16 20:32:27 -0700297 bool HoldsLock(mirror::Object*) const SHARED_REQUIRES(Locks::mutator_lock_);
Elliott Hughes5f791332011-09-15 17:45:30 -0700298
Elliott Hughes8daa0922011-09-11 13:46:25 -0700299 /*
300 * Changes the priority of this thread to match that of the java.lang.Thread object.
301 *
302 * We map a priority value from 1-10 to Linux "nice" values, where lower
303 * numbers indicate higher priority.
304 */
305 void SetNativePriority(int newPriority);
306
307 /*
308 * Returns the thread priority for the current thread by querying the system.
309 * This is useful when attaching a thread through JNI.
310 *
311 * Returns a value from 1 to 10 (compatible with java.lang.Thread values).
312 */
313 static int GetNativePriority();
314
Mathieu Chartier61b3cd42016-04-18 11:43:29 -0700315 // Guaranteed to be non-zero.
Ian Rogersd9c4fc92013-10-01 19:45:43 -0700316 uint32_t GetThreadId() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700317 return tls32_.thin_lock_thread_id;
Carl Shapirob5573532011-07-12 18:22:59 -0700318 }
319
Elliott Hughesd92bec42011-09-02 17:04:36 -0700320 pid_t GetTid() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700321 return tls32_.tid;
Elliott Hughesd92bec42011-09-02 17:04:36 -0700322 }
Elliott Hughese27955c2011-08-26 15:21:24 -0700323
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700324 // Returns the java.lang.Thread's name, or null if this Thread* doesn't have a peer.
Mathieu Chartier2b7c4d12014-05-19 10:52:16 -0700325 mirror::String* GetThreadName(const ScopedObjectAccessAlreadyRunnable& ts) const
Mathieu Chartier90443472015-07-16 20:32:27 -0700326 SHARED_REQUIRES(Locks::mutator_lock_);
Elliott Hughes899e7892012-01-24 14:57:32 -0800327
Elliott Hughesffb465f2012-03-01 18:46:05 -0800328 // Sets 'name' to the java.lang.Thread's name. This requires no transition to managed code,
329 // allocation, or locking.
330 void GetThreadName(std::string& name) const;
331
Elliott Hughes899e7892012-01-24 14:57:32 -0800332 // Sets the thread's name.
Mathieu Chartier90443472015-07-16 20:32:27 -0700333 void SetThreadName(const char* name) SHARED_REQUIRES(Locks::mutator_lock_);
Elliott Hughesfc861622011-10-17 17:57:47 -0700334
Jeff Hao57dac6e2013-08-15 16:36:24 -0700335 // Returns the thread-specific CPU-time clock in microseconds or -1 if unavailable.
336 uint64_t GetCpuMicroTime() const;
337
Mathieu Chartier90443472015-07-16 20:32:27 -0700338 mirror::Object* GetPeer() const SHARED_REQUIRES(Locks::mutator_lock_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700339 CHECK(tlsPtr_.jpeer == nullptr);
340 return tlsPtr_.opeer;
Elliott Hughes8daa0922011-09-11 13:46:25 -0700341 }
342
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700343 bool HasPeer() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700344 return tlsPtr_.jpeer != nullptr || tlsPtr_.opeer != nullptr;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700345 }
346
Elliott Hughes9d5ccec2011-09-19 13:19:50 -0700347 RuntimeStats* GetStats() {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700348 return &tls64_.stats;
Elliott Hughes9d5ccec2011-09-19 13:19:50 -0700349 }
350
Elliott Hughes7dc51662012-05-16 14:48:43 -0700351 bool IsStillStarting() const;
352
Carl Shapiro0e5d75d2011-07-06 18:28:37 -0700353 bool IsExceptionPending() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700354 return tlsPtr_.exception != nullptr;
Carl Shapiro0e5d75d2011-07-06 18:28:37 -0700355 }
356
Mathieu Chartier90443472015-07-16 20:32:27 -0700357 mirror::Throwable* GetException() const SHARED_REQUIRES(Locks::mutator_lock_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700358 return tlsPtr_.exception;
Carl Shapiro0e5d75d2011-07-06 18:28:37 -0700359 }
360
Andreas Gamped9efea62014-07-21 22:56:08 -0700361 void AssertPendingException() const;
Mathieu Chartier90443472015-07-16 20:32:27 -0700362 void AssertPendingOOMException() const SHARED_REQUIRES(Locks::mutator_lock_);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700363 void AssertNoPendingException() const;
Mathieu Chartier8d7672e2014-02-25 10:57:16 -0800364 void AssertNoPendingExceptionForNewException(const char* msg) const;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700365
Nicolas Geoffray14691c52015-03-05 10:40:17 +0000366 void SetException(mirror::Throwable* new_exception)
Mathieu Chartier90443472015-07-16 20:32:27 -0700367 SHARED_REQUIRES(Locks::mutator_lock_) {
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700368 CHECK(new_exception != nullptr);
Ian Rogers474b6da2012-09-25 00:20:38 -0700369 // TODO: DCHECK(!IsExceptionPending());
Ian Rogersdd7624d2014-03-14 17:43:00 -0700370 tlsPtr_.exception = new_exception;
Ian Rogers0cfe1fb2011-08-26 03:29:44 -0700371 }
372
Mathieu Chartier90443472015-07-16 20:32:27 -0700373 void ClearException() SHARED_REQUIRES(Locks::mutator_lock_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700374 tlsPtr_.exception = nullptr;
jeffhao94d6df42012-11-26 16:02:12 -0800375 }
376
Ian Rogersbdb03912011-09-14 00:55:44 -0700377 // Find catch block and perform long jump to appropriate exception handle
Mathieu Chartier90443472015-07-16 20:32:27 -0700378 NO_RETURN void QuickDeliverException() SHARED_REQUIRES(Locks::mutator_lock_);
Ian Rogersbdb03912011-09-14 00:55:44 -0700379
380 Context* GetLongJumpContext();
Ian Rogers0399dde2012-06-06 17:09:28 -0700381 void ReleaseLongJumpContext(Context* context) {
Mingyao Yang4dcfc432015-04-21 16:55:22 -0700382 if (tlsPtr_.long_jump_context != nullptr) {
383 // Each QuickExceptionHandler gets a long jump context and uses
384 // it for doing the long jump, after finding catch blocks/doing deoptimization.
385 // Both finding catch blocks and deoptimization can trigger another
386 // exception such as a result of class loading. So there can be nested
387 // cases of exception handling and multiple contexts being used.
388 // ReleaseLongJumpContext tries to save the context in tlsPtr_.long_jump_context
389 // for reuse so there is no need to always allocate a new one each time when
390 // getting a context. Since we only keep one context for reuse, delete the
391 // existing one since the passed in context is yet to be used for longjump.
392 delete tlsPtr_.long_jump_context;
393 }
Ian Rogersdd7624d2014-03-14 17:43:00 -0700394 tlsPtr_.long_jump_context = context;
Shih-wei Liao1a18c8c2011-08-14 17:47:36 -0700395 }
396
Andreas Gampe6ec8ebd2014-07-25 13:36:56 -0700397 // Get the current method and dex pc. If there are errors in retrieving the dex pc, this will
398 // abort the runtime iff abort_on_error is true.
Mathieu Chartiere401d142015-04-22 13:56:20 -0700399 ArtMethod* GetCurrentMethod(uint32_t* dex_pc, bool abort_on_error = true) const
Mathieu Chartier90443472015-07-16 20:32:27 -0700400 SHARED_REQUIRES(Locks::mutator_lock_);
Ian Rogers0399dde2012-06-06 17:09:28 -0700401
Nicolas Geoffray7642cfc2015-02-26 10:56:09 +0000402 // Returns whether the given exception was thrown by the current Java method being executed
403 // (Note that this includes native Java methods).
404 bool IsExceptionThrownByCurrentMethod(mirror::Throwable* exception) const
Mathieu Chartier90443472015-07-16 20:32:27 -0700405 SHARED_REQUIRES(Locks::mutator_lock_);
Nicolas Geoffray7642cfc2015-02-26 10:56:09 +0000406
Mathieu Chartiere401d142015-04-22 13:56:20 -0700407 void SetTopOfStack(ArtMethod** top_method) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700408 tlsPtr_.managed_stack.SetTopQuickFrame(top_method);
Carl Shapiro0e5d75d2011-07-06 18:28:37 -0700409 }
410
Jeff Hao11ffc2d2013-02-01 11:52:17 -0800411 void SetTopOfShadowStack(ShadowFrame* top) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700412 tlsPtr_.managed_stack.SetTopShadowFrame(top);
Jeff Hao11ffc2d2013-02-01 11:52:17 -0800413 }
414
Ian Rogers0399dde2012-06-06 17:09:28 -0700415 bool HasManagedStack() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700416 return (tlsPtr_.managed_stack.GetTopQuickFrame() != nullptr) ||
417 (tlsPtr_.managed_stack.GetTopShadowFrame() != nullptr);
Ian Rogersbdb03912011-09-14 00:55:44 -0700418 }
419
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700420 // If 'msg' is null, no detail message is set.
Nicolas Geoffray0aa50ce2015-03-10 11:03:29 +0000421 void ThrowNewException(const char* exception_class_descriptor, const char* msg)
Mathieu Chartiered8990a2015-07-23 14:11:16 -0700422 SHARED_REQUIRES(Locks::mutator_lock_) REQUIRES(!Roles::uninterruptible_);
Elliott Hughes5cb5ad22011-10-02 12:13:39 -0700423
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700424 // If 'msg' is null, no detail message is set. An exception must be pending, and will be
Elliott Hughesa4f94742012-05-29 16:28:38 -0700425 // used as the new exception's cause.
Nicolas Geoffray0aa50ce2015-03-10 11:03:29 +0000426 void ThrowNewWrappedException(const char* exception_class_descriptor, const char* msg)
Mathieu Chartiered8990a2015-07-23 14:11:16 -0700427 SHARED_REQUIRES(Locks::mutator_lock_) REQUIRES(!Roles::uninterruptible_);
Elliott Hughesa4f94742012-05-29 16:28:38 -0700428
Nicolas Geoffray0aa50ce2015-03-10 11:03:29 +0000429 void ThrowNewExceptionF(const char* exception_class_descriptor, const char* fmt, ...)
430 __attribute__((format(printf, 3, 4)))
Mathieu Chartiered8990a2015-07-23 14:11:16 -0700431 SHARED_REQUIRES(Locks::mutator_lock_) REQUIRES(!Roles::uninterruptible_);
Elliott Hughesa5b897e2011-08-16 11:33:06 -0700432
Nicolas Geoffray0aa50ce2015-03-10 11:03:29 +0000433 void ThrowNewExceptionV(const char* exception_class_descriptor, const char* fmt, va_list ap)
Mathieu Chartiered8990a2015-07-23 14:11:16 -0700434 SHARED_REQUIRES(Locks::mutator_lock_) REQUIRES(!Roles::uninterruptible_);
Elliott Hughes4a2b4172011-09-20 17:08:25 -0700435
Elliott Hughes2ced6a52011-10-16 18:44:48 -0700436 // OutOfMemoryError is special, because we need to pre-allocate an instance.
Elliott Hughes8a8b9cb2012-04-13 18:29:22 -0700437 // Only the GC should call this.
Mathieu Chartiered8990a2015-07-23 14:11:16 -0700438 void ThrowOutOfMemoryError(const char* msg) SHARED_REQUIRES(Locks::mutator_lock_)
439 REQUIRES(!Roles::uninterruptible_);
Elliott Hughes79082e32011-08-25 12:07:32 -0700440
Elliott Hughesbe759c62011-09-08 19:38:21 -0700441 static void Startup();
Elliott Hughes038a8062011-09-18 14:12:41 -0700442 static void FinishStartup();
Elliott Hughesc1674ed2011-08-25 18:09:09 -0700443 static void Shutdown();
Carl Shapirob5573532011-07-12 18:22:59 -0700444
Ian Rogersb033c752011-07-20 12:22:35 -0700445 // JNI methods
Elliott Hughes69f5bc62011-08-24 09:26:14 -0700446 JNIEnvExt* GetJniEnv() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700447 return tlsPtr_.jni_env;
Ian Rogersb033c752011-07-20 12:22:35 -0700448 }
449
Ian Rogers408f79a2011-08-23 18:22:33 -0700450 // Convert a jobject into a Object*
Mathieu Chartier90443472015-07-16 20:32:27 -0700451 mirror::Object* DecodeJObject(jobject obj) const SHARED_REQUIRES(Locks::mutator_lock_);
Hiroshi Yamauchi04302db2015-11-11 23:45:34 -0800452 // Checks if the weak global ref has been cleared by the GC without decoding it.
453 bool IsJWeakCleared(jweak obj) const SHARED_REQUIRES(Locks::mutator_lock_);
Ian Rogersb033c752011-07-20 12:22:35 -0700454
Mathieu Chartier90443472015-07-16 20:32:27 -0700455 mirror::Object* GetMonitorEnterObject() const SHARED_REQUIRES(Locks::mutator_lock_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700456 return tlsPtr_.monitor_enter_object;
457 }
458
Mathieu Chartier90443472015-07-16 20:32:27 -0700459 void SetMonitorEnterObject(mirror::Object* obj) SHARED_REQUIRES(Locks::mutator_lock_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700460 tlsPtr_.monitor_enter_object = obj;
461 }
462
Elliott Hughes8daa0922011-09-11 13:46:25 -0700463 // Implements java.lang.Thread.interrupted.
Mathieu Chartier90443472015-07-16 20:32:27 -0700464 bool Interrupted() REQUIRES(!*wait_mutex_);
Elliott Hughes8daa0922011-09-11 13:46:25 -0700465 // Implements java.lang.Thread.isInterrupted.
Mathieu Chartier90443472015-07-16 20:32:27 -0700466 bool IsInterrupted() REQUIRES(!*wait_mutex_);
467 bool IsInterruptedLocked() REQUIRES(wait_mutex_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700468 return interrupted_;
469 }
Mathieu Chartier90443472015-07-16 20:32:27 -0700470 void Interrupt(Thread* self) REQUIRES(!*wait_mutex_);
471 void SetInterruptedLocked(bool i) REQUIRES(wait_mutex_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700472 interrupted_ = i;
473 }
Mathieu Chartier90443472015-07-16 20:32:27 -0700474 void Notify() REQUIRES(!*wait_mutex_);
Ian Rogersdd7624d2014-03-14 17:43:00 -0700475
476 private:
Mathieu Chartier90443472015-07-16 20:32:27 -0700477 void NotifyLocked(Thread* self) REQUIRES(wait_mutex_);
Ian Rogersdd7624d2014-03-14 17:43:00 -0700478
479 public:
480 Mutex* GetWaitMutex() const LOCK_RETURNED(wait_mutex_) {
481 return wait_mutex_;
482 }
483
Mathieu Chartier90443472015-07-16 20:32:27 -0700484 ConditionVariable* GetWaitConditionVariable() const REQUIRES(wait_mutex_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700485 return wait_cond_;
486 }
487
Mathieu Chartier90443472015-07-16 20:32:27 -0700488 Monitor* GetWaitMonitor() const REQUIRES(wait_mutex_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700489 return wait_monitor_;
490 }
491
Mathieu Chartier90443472015-07-16 20:32:27 -0700492 void SetWaitMonitor(Monitor* mon) REQUIRES(wait_mutex_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700493 wait_monitor_ = mon;
494 }
495
Ian Rogersdd7624d2014-03-14 17:43:00 -0700496 // Waiter link-list support.
497 Thread* GetWaitNext() const {
498 return tlsPtr_.wait_next;
499 }
500
501 void SetWaitNext(Thread* next) {
502 tlsPtr_.wait_next = next;
503 }
Elliott Hughes5f791332011-09-15 17:45:30 -0700504
Ian Rogers68d8b422014-07-17 11:09:10 -0700505 jobject GetClassLoaderOverride() {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700506 return tlsPtr_.class_loader_override;
buzbeec143c552011-08-20 17:38:58 -0700507 }
508
Ian Rogers68d8b422014-07-17 11:09:10 -0700509 void SetClassLoaderOverride(jobject class_loader_override);
buzbeec143c552011-08-20 17:38:58 -0700510
Ian Rogersaaa20802011-09-11 21:47:37 -0700511 // Create the internal representation of a stack trace, that is more time
Sebastien Hertzee1d79a2014-02-21 15:46:30 +0100512 // and space efficient to compute than the StackTraceElement[].
513 template<bool kTransactionActive>
Mathieu Chartier2b7c4d12014-05-19 10:52:16 -0700514 jobject CreateInternalStackTrace(const ScopedObjectAccessAlreadyRunnable& soa) const
Mathieu Chartier90443472015-07-16 20:32:27 -0700515 SHARED_REQUIRES(Locks::mutator_lock_);
Ian Rogersaaa20802011-09-11 21:47:37 -0700516
Elliott Hughes01158d72011-09-19 19:47:10 -0700517 // Convert an internal stack trace representation (returned by CreateInternalStackTrace) to a
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700518 // StackTraceElement[]. If output_array is null, a new array is created, otherwise as many
519 // frames as will fit are written into the given array. If stack_depth is non-null, it's updated
Elliott Hughes01158d72011-09-19 19:47:10 -0700520 // with the number of valid frames in the returned array.
Mathieu Chartier2b7c4d12014-05-19 10:52:16 -0700521 static jobjectArray InternalStackTraceToStackTraceElementArray(
522 const ScopedObjectAccessAlreadyRunnable& soa, jobject internal,
523 jobjectArray output_array = nullptr, int* stack_depth = nullptr)
Mathieu Chartier90443472015-07-16 20:32:27 -0700524 SHARED_REQUIRES(Locks::mutator_lock_);
Shih-wei Liao55df06b2011-08-26 14:39:27 -0700525
Mingyao Yang99170c62015-07-06 11:10:37 -0700526 bool HasDebuggerShadowFrames() const {
527 return tlsPtr_.frame_id_to_shadow_frame != nullptr;
528 }
529
Mathieu Chartier90443472015-07-16 20:32:27 -0700530 void VisitRoots(RootVisitor* visitor) SHARED_REQUIRES(Locks::mutator_lock_);
Elliott Hughes410c0c82011-09-01 17:58:25 -0700531
Mathieu Chartier90443472015-07-16 20:32:27 -0700532 ALWAYS_INLINE void VerifyStack() SHARED_REQUIRES(Locks::mutator_lock_);
jeffhao25045522012-03-13 19:34:37 -0700533
Elliott Hughesbe759c62011-09-08 19:38:21 -0700534 //
535 // Offsets of various members of native Thread class, used by compiled code.
536 //
537
Ian Rogersdd7624d2014-03-14 17:43:00 -0700538 template<size_t pointer_size>
539 static ThreadOffset<pointer_size> ThinLockIdOffset() {
540 return ThreadOffset<pointer_size>(
541 OFFSETOF_MEMBER(Thread, tls32_) +
542 OFFSETOF_MEMBER(tls_32bit_sized_values, thin_lock_thread_id));
Elliott Hughesbe759c62011-09-08 19:38:21 -0700543 }
544
Ian Rogersdd7624d2014-03-14 17:43:00 -0700545 template<size_t pointer_size>
546 static ThreadOffset<pointer_size> ThreadFlagsOffset() {
547 return ThreadOffset<pointer_size>(
548 OFFSETOF_MEMBER(Thread, tls32_) +
549 OFFSETOF_MEMBER(tls_32bit_sized_values, state_and_flags));
Elliott Hughesbe759c62011-09-08 19:38:21 -0700550 }
551
Roland Levillain7c1559a2015-12-15 10:55:36 +0000552 template<size_t pointer_size>
553 static ThreadOffset<pointer_size> IsGcMarkingOffset() {
554 return ThreadOffset<pointer_size>(
555 OFFSETOF_MEMBER(Thread, tls32_) +
556 OFFSETOF_MEMBER(tls_32bit_sized_values, is_gc_marking));
557 }
558
Nicolas Geoffrayb331feb2016-02-05 16:51:53 +0000559 // Deoptimize the Java stack.
560 void DeoptimizeWithDeoptimizationException(JValue* result) SHARED_REQUIRES(Locks::mutator_lock_);
561
Ian Rogersdd7624d2014-03-14 17:43:00 -0700562 private:
563 template<size_t pointer_size>
564 static ThreadOffset<pointer_size> ThreadOffsetFromTlsPtr(size_t tls_ptr_offset) {
565 size_t base = OFFSETOF_MEMBER(Thread, tlsPtr_);
566 size_t scale;
567 size_t shrink;
568 if (pointer_size == sizeof(void*)) {
569 scale = 1;
570 shrink = 1;
571 } else if (pointer_size > sizeof(void*)) {
572 scale = pointer_size / sizeof(void*);
573 shrink = 1;
574 } else {
575 DCHECK_GT(sizeof(void*), pointer_size);
576 scale = 1;
577 shrink = sizeof(void*) / pointer_size;
578 }
579 return ThreadOffset<pointer_size>(base + ((tls_ptr_offset * scale) / shrink));
Ian Rogers07ec8e12012-12-01 01:26:51 -0800580 }
581
Ian Rogersdd7624d2014-03-14 17:43:00 -0700582 public:
Jeff Hao848f70a2014-01-15 13:49:50 -0800583 static uint32_t QuickEntryPointOffsetWithSize(size_t quick_entrypoint_offset,
584 size_t pointer_size) {
585 DCHECK(pointer_size == 4 || pointer_size == 8) << pointer_size;
586 if (pointer_size == 4) {
587 return QuickEntryPointOffset<4>(quick_entrypoint_offset).Uint32Value();
588 } else {
589 return QuickEntryPointOffset<8>(quick_entrypoint_offset).Uint32Value();
590 }
591 }
592
Ian Rogersdd7624d2014-03-14 17:43:00 -0700593 template<size_t pointer_size>
594 static ThreadOffset<pointer_size> QuickEntryPointOffset(size_t quick_entrypoint_offset) {
595 return ThreadOffsetFromTlsPtr<pointer_size>(
596 OFFSETOF_MEMBER(tls_ptr_sized_values, quick_entrypoints) + quick_entrypoint_offset);
Elliott Hughesbe759c62011-09-08 19:38:21 -0700597 }
598
Ian Rogersdd7624d2014-03-14 17:43:00 -0700599 template<size_t pointer_size>
Ian Rogersdd7624d2014-03-14 17:43:00 -0700600 static ThreadOffset<pointer_size> JniEntryPointOffset(size_t jni_entrypoint_offset) {
601 return ThreadOffsetFromTlsPtr<pointer_size>(
602 OFFSETOF_MEMBER(tls_ptr_sized_values, jni_entrypoints) + jni_entrypoint_offset);
Elliott Hughesbe759c62011-09-08 19:38:21 -0700603 }
604
Ian Rogersdd7624d2014-03-14 17:43:00 -0700605 template<size_t pointer_size>
Ian Rogersdd7624d2014-03-14 17:43:00 -0700606 static ThreadOffset<pointer_size> SelfOffset() {
607 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values, self));
608 }
609
610 template<size_t pointer_size>
buzbee1452bee2015-03-06 14:43:04 -0800611 static ThreadOffset<pointer_size> MterpCurrentIBaseOffset() {
612 return ThreadOffsetFromTlsPtr<pointer_size>(
613 OFFSETOF_MEMBER(tls_ptr_sized_values, mterp_current_ibase));
614 }
615
616 template<size_t pointer_size>
617 static ThreadOffset<pointer_size> MterpDefaultIBaseOffset() {
618 return ThreadOffsetFromTlsPtr<pointer_size>(
619 OFFSETOF_MEMBER(tls_ptr_sized_values, mterp_default_ibase));
620 }
621
622 template<size_t pointer_size>
623 static ThreadOffset<pointer_size> MterpAltIBaseOffset() {
624 return ThreadOffsetFromTlsPtr<pointer_size>(
625 OFFSETOF_MEMBER(tls_ptr_sized_values, mterp_alt_ibase));
626 }
627
628 template<size_t pointer_size>
Ian Rogersdd7624d2014-03-14 17:43:00 -0700629 static ThreadOffset<pointer_size> ExceptionOffset() {
630 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values, exception));
631 }
632
633 template<size_t pointer_size>
634 static ThreadOffset<pointer_size> PeerOffset() {
635 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values, opeer));
636 }
637
638
639 template<size_t pointer_size>
640 static ThreadOffset<pointer_size> CardTableOffset() {
641 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values, card_table));
642 }
643
644 template<size_t pointer_size>
645 static ThreadOffset<pointer_size> ThreadSuspendTriggerOffset() {
646 return ThreadOffsetFromTlsPtr<pointer_size>(
647 OFFSETOF_MEMBER(tls_ptr_sized_values, suspend_trigger));
Dave Allisonb373e092014-02-20 16:06:36 -0800648 }
649
Hiroshi Yamauchie01a5202015-03-19 12:35:04 -0700650 template<size_t pointer_size>
651 static ThreadOffset<pointer_size> ThreadLocalPosOffset() {
652 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values, thread_local_pos));
653 }
654
655 template<size_t pointer_size>
656 static ThreadOffset<pointer_size> ThreadLocalEndOffset() {
657 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values, thread_local_end));
658 }
659
660 template<size_t pointer_size>
661 static ThreadOffset<pointer_size> ThreadLocalObjectsOffset() {
662 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values, thread_local_objects));
663 }
664
Hiroshi Yamauchidc412b62015-10-15 12:26:57 -0700665 template<size_t pointer_size>
666 static ThreadOffset<pointer_size> RosAllocRunsOffset() {
667 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values,
668 rosalloc_runs));
669 }
670
671 template<size_t pointer_size>
672 static ThreadOffset<pointer_size> ThreadLocalAllocStackTopOffset() {
673 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values,
674 thread_local_alloc_stack_top));
675 }
676
677 template<size_t pointer_size>
678 static ThreadOffset<pointer_size> ThreadLocalAllocStackEndOffset() {
679 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values,
680 thread_local_alloc_stack_end));
681 }
682
Ian Rogers932746a2011-09-22 18:57:50 -0700683 // Size of stack less any space reserved for stack overflow
jeffhaod7521322012-11-21 15:38:24 -0800684 size_t GetStackSize() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700685 return tlsPtr_.stack_size - (tlsPtr_.stack_end - tlsPtr_.stack_begin);
Ian Rogers932746a2011-09-22 18:57:50 -0700686 }
687
Ian Rogers13735952014-10-08 12:43:28 -0700688 uint8_t* GetStackEndForInterpreter(bool implicit_overflow_check) const {
Nicolas Geoffray535a3fb2014-07-22 15:17:38 +0100689 if (implicit_overflow_check) {
690 // The interpreter needs the extra overflow bytes that stack_end does
691 // not include.
692 return tlsPtr_.stack_end + GetStackOverflowReservedBytes(kRuntimeISA);
693 } else {
694 return tlsPtr_.stack_end;
695 }
696 }
697
Ian Rogers13735952014-10-08 12:43:28 -0700698 uint8_t* GetStackEnd() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700699 return tlsPtr_.stack_end;
jeffhaod7521322012-11-21 15:38:24 -0800700 }
701
Ian Rogers932746a2011-09-22 18:57:50 -0700702 // Set the stack end to that to be used during a stack overflow
Mathieu Chartier90443472015-07-16 20:32:27 -0700703 void SetStackEndForStackOverflow() SHARED_REQUIRES(Locks::mutator_lock_);
Ian Rogers932746a2011-09-22 18:57:50 -0700704
705 // Set the stack end to that to be used during regular execution
Dave Allisonb090a182014-08-14 17:02:48 +0000706 void ResetDefaultStackEnd() {
Ian Rogers932746a2011-09-22 18:57:50 -0700707 // Our stacks grow down, so we want stack_end_ to be near there, but reserving enough room
708 // to throw a StackOverflowError.
Dave Allisonb090a182014-08-14 17:02:48 +0000709 tlsPtr_.stack_end = tlsPtr_.stack_begin + GetStackOverflowReservedBytes(kRuntimeISA);
Ian Rogers932746a2011-09-22 18:57:50 -0700710 }
711
Dave Allisonf9439142014-03-27 15:10:22 -0700712 // Install the protected region for implicit stack checks.
Dave Allison648d7112014-07-25 16:15:27 -0700713 void InstallImplicitProtection();
Dave Allisonf9439142014-03-27 15:10:22 -0700714
Ian Rogers120f1c72012-09-28 17:17:10 -0700715 bool IsHandlingStackOverflow() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700716 return tlsPtr_.stack_end == tlsPtr_.stack_begin;
Ian Rogers120f1c72012-09-28 17:17:10 -0700717 }
718
Ian Rogersdd7624d2014-03-14 17:43:00 -0700719 template<size_t pointer_size>
720 static ThreadOffset<pointer_size> StackEndOffset() {
721 return ThreadOffsetFromTlsPtr<pointer_size>(
722 OFFSETOF_MEMBER(tls_ptr_sized_values, stack_end));
Elliott Hughesbe759c62011-09-08 19:38:21 -0700723 }
724
Ian Rogersdd7624d2014-03-14 17:43:00 -0700725 template<size_t pointer_size>
726 static ThreadOffset<pointer_size> JniEnvOffset() {
727 return ThreadOffsetFromTlsPtr<pointer_size>(
728 OFFSETOF_MEMBER(tls_ptr_sized_values, jni_env));
Elliott Hughesbe759c62011-09-08 19:38:21 -0700729 }
730
Ian Rogersdd7624d2014-03-14 17:43:00 -0700731 template<size_t pointer_size>
732 static ThreadOffset<pointer_size> TopOfManagedStackOffset() {
733 return ThreadOffsetFromTlsPtr<pointer_size>(
734 OFFSETOF_MEMBER(tls_ptr_sized_values, managed_stack) +
735 ManagedStack::TopQuickFrameOffset());
Elliott Hughesbe759c62011-09-08 19:38:21 -0700736 }
737
Ian Rogers0399dde2012-06-06 17:09:28 -0700738 const ManagedStack* GetManagedStack() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700739 return &tlsPtr_.managed_stack;
Ian Rogers0399dde2012-06-06 17:09:28 -0700740 }
741
742 // Linked list recording fragments of managed stack.
743 void PushManagedStackFragment(ManagedStack* fragment) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700744 tlsPtr_.managed_stack.PushManagedStackFragment(fragment);
Ian Rogers0399dde2012-06-06 17:09:28 -0700745 }
746 void PopManagedStackFragment(const ManagedStack& fragment) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700747 tlsPtr_.managed_stack.PopManagedStackFragment(fragment);
Ian Rogers0399dde2012-06-06 17:09:28 -0700748 }
749
750 ShadowFrame* PushShadowFrame(ShadowFrame* new_top_frame) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700751 return tlsPtr_.managed_stack.PushShadowFrame(new_top_frame);
TDYa127de479be2012-05-31 08:03:26 -0700752 }
753
754 ShadowFrame* PopShadowFrame() {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700755 return tlsPtr_.managed_stack.PopShadowFrame();
TDYa127de479be2012-05-31 08:03:26 -0700756 }
Logan Chienf7ad17e2012-03-15 03:10:03 +0800757
Ian Rogersdd7624d2014-03-14 17:43:00 -0700758 template<size_t pointer_size>
759 static ThreadOffset<pointer_size> TopShadowFrameOffset() {
760 return ThreadOffsetFromTlsPtr<pointer_size>(
761 OFFSETOF_MEMBER(tls_ptr_sized_values, managed_stack) +
762 ManagedStack::TopShadowFrameOffset());
TDYa127d668a062012-04-13 12:36:57 -0700763 }
764
Ian Rogersef7d42f2014-01-06 12:55:46 -0800765 // Number of references allocated in JNI ShadowFrames on this thread.
Mathieu Chartier90443472015-07-16 20:32:27 -0700766 size_t NumJniShadowFrameReferences() const SHARED_REQUIRES(Locks::mutator_lock_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700767 return tlsPtr_.managed_stack.NumJniShadowFrameReferences();
Ian Rogers0399dde2012-06-06 17:09:28 -0700768 }
769
Mathieu Chartiereb8167a2014-05-07 15:43:14 -0700770 // Number of references in handle scope on this thread.
771 size_t NumHandleReferences();
Ian Rogers0399dde2012-06-06 17:09:28 -0700772
Mathieu Chartiereb8167a2014-05-07 15:43:14 -0700773 // Number of references allocated in handle scopes & JNI shadow frames on this thread.
Mathieu Chartier90443472015-07-16 20:32:27 -0700774 size_t NumStackReferences() SHARED_REQUIRES(Locks::mutator_lock_) {
Mathieu Chartiereb8167a2014-05-07 15:43:14 -0700775 return NumHandleReferences() + NumJniShadowFrameReferences();
Andreas Gampec8ccf682014-09-29 20:07:43 -0700776 }
Ian Rogers0399dde2012-06-06 17:09:28 -0700777
778 // Is the given obj in this thread's stack indirect reference table?
Mathieu Chartiereb8167a2014-05-07 15:43:14 -0700779 bool HandleScopeContains(jobject obj) const;
Ian Rogers0399dde2012-06-06 17:09:28 -0700780
Mathieu Chartierbb87e0f2015-04-03 11:21:55 -0700781 void HandleScopeVisitRoots(RootVisitor* visitor, uint32_t thread_id)
Mathieu Chartier90443472015-07-16 20:32:27 -0700782 SHARED_REQUIRES(Locks::mutator_lock_);
Ian Rogers0399dde2012-06-06 17:09:28 -0700783
Mathieu Chartiereb8167a2014-05-07 15:43:14 -0700784 HandleScope* GetTopHandleScope() {
785 return tlsPtr_.top_handle_scope;
Ian Rogers1f539342012-10-03 21:09:42 -0700786 }
787
Mathieu Chartiereb8167a2014-05-07 15:43:14 -0700788 void PushHandleScope(HandleScope* handle_scope) {
Ian Rogers59c07062014-10-10 13:03:39 -0700789 DCHECK_EQ(handle_scope->GetLink(), tlsPtr_.top_handle_scope);
Mathieu Chartiereb8167a2014-05-07 15:43:14 -0700790 tlsPtr_.top_handle_scope = handle_scope;
791 }
792
793 HandleScope* PopHandleScope() {
794 HandleScope* handle_scope = tlsPtr_.top_handle_scope;
795 DCHECK(handle_scope != nullptr);
796 tlsPtr_.top_handle_scope = tlsPtr_.top_handle_scope->GetLink();
797 return handle_scope;
Ian Rogers1f539342012-10-03 21:09:42 -0700798 }
Brian Carlstrom40381fb2011-10-19 14:13:40 -0700799
Ian Rogersdd7624d2014-03-14 17:43:00 -0700800 template<size_t pointer_size>
Mathieu Chartiereb8167a2014-05-07 15:43:14 -0700801 static ThreadOffset<pointer_size> TopHandleScopeOffset() {
802 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values,
803 top_handle_scope));
Elliott Hughesbe759c62011-09-08 19:38:21 -0700804 }
805
Ian Rogersdd7624d2014-03-14 17:43:00 -0700806 DebugInvokeReq* GetInvokeReq() const {
807 return tlsPtr_.debug_invoke_req;
Elliott Hughes475fc232011-10-25 15:00:35 -0700808 }
809
Sebastien Hertz61b7f1b2013-11-15 15:59:30 +0100810 SingleStepControl* GetSingleStepControl() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700811 return tlsPtr_.single_step_control;
Sebastien Hertz61b7f1b2013-11-15 15:59:30 +0100812 }
813
Sebastien Hertz1558b572015-02-25 15:05:59 +0100814 // Indicates whether this thread is ready to invoke a method for debugging. This
815 // is only true if the thread has been suspended by a debug event.
816 bool IsReadyForDebugInvoke() const {
817 return tls32_.ready_for_debug_invoke;
818 }
819
820 void SetReadyForDebugInvoke(bool ready) {
821 tls32_.ready_for_debug_invoke = ready;
822 }
823
Sebastien Hertz9d6bf692015-04-10 12:12:33 +0200824 bool IsDebugMethodEntry() const {
825 return tls32_.debug_method_entry_;
826 }
827
828 void SetDebugMethodEntry() {
829 tls32_.debug_method_entry_ = true;
830 }
831
832 void ClearDebugMethodEntry() {
833 tls32_.debug_method_entry_ = false;
834 }
835
Hiroshi Yamauchi00370822015-08-18 14:47:25 -0700836 bool GetIsGcMarking() const {
837 CHECK(kUseReadBarrier);
838 return tls32_.is_gc_marking;
839 }
840
841 void SetIsGcMarking(bool is_marking) {
842 CHECK(kUseReadBarrier);
843 tls32_.is_gc_marking = is_marking;
844 }
845
Hiroshi Yamauchi0b713572015-06-16 18:29:23 -0700846 bool GetWeakRefAccessEnabled() const {
847 CHECK(kUseReadBarrier);
848 return tls32_.weak_ref_access_enabled;
849 }
850
851 void SetWeakRefAccessEnabled(bool enabled) {
852 CHECK(kUseReadBarrier);
853 tls32_.weak_ref_access_enabled = enabled;
854 }
855
Hiroshi Yamauchi20a0be02016-02-19 15:44:06 -0800856 uint32_t GetDisableThreadFlipCount() const {
857 CHECK(kUseReadBarrier);
858 return tls32_.disable_thread_flip_count;
859 }
860
861 void IncrementDisableThreadFlipCount() {
862 CHECK(kUseReadBarrier);
863 ++tls32_.disable_thread_flip_count;
864 }
865
866 void DecrementDisableThreadFlipCount() {
867 CHECK(kUseReadBarrier);
868 DCHECK_GT(tls32_.disable_thread_flip_count, 0U);
869 --tls32_.disable_thread_flip_count;
870 }
871
Sebastien Hertz597c4f02015-01-26 17:37:14 +0100872 // Activates single step control for debugging. The thread takes the
873 // ownership of the given SingleStepControl*. It is deleted by a call
874 // to DeactivateSingleStepControl or upon thread destruction.
875 void ActivateSingleStepControl(SingleStepControl* ssc);
876
877 // Deactivates single step control for debugging.
878 void DeactivateSingleStepControl();
879
Sebastien Hertz1558b572015-02-25 15:05:59 +0100880 // Sets debug invoke request for debugging. When the thread is resumed,
Sebastien Hertzcbc50642015-06-01 17:33:12 +0200881 // it executes the method described by this request then sends the reply
882 // before suspending itself. The thread takes the ownership of the given
883 // DebugInvokeReq*. It is deleted by a call to ClearDebugInvokeReq.
Sebastien Hertz1558b572015-02-25 15:05:59 +0100884 void SetDebugInvokeReq(DebugInvokeReq* req);
885
886 // Clears debug invoke request for debugging. When the thread completes
Sebastien Hertzcbc50642015-06-01 17:33:12 +0200887 // method invocation, it deletes its debug invoke request and suspends
888 // itself.
Sebastien Hertz1558b572015-02-25 15:05:59 +0100889 void ClearDebugInvokeReq();
Sebastien Hertz597c4f02015-01-26 17:37:14 +0100890
Sebastien Hertzfd3077e2014-04-23 10:32:43 +0200891 // Returns the fake exception used to activate deoptimization.
892 static mirror::Throwable* GetDeoptimizationException() {
893 return reinterpret_cast<mirror::Throwable*>(-1);
894 }
895
Mingyao Yang1f2d3ba2015-05-18 12:12:50 -0700896 // Currently deoptimization invokes verifier which can trigger class loading
897 // and execute Java code, so there might be nested deoptimizations happening.
898 // We need to save the ongoing deoptimization shadow frames and return
899 // values on stacks.
Nicolas Geoffray73be1e82015-09-17 15:22:56 +0100900 // 'from_code' denotes whether the deoptimization was explicitly made from
901 // compiled code.
902 void PushDeoptimizationContext(const JValue& return_value,
903 bool is_reference,
904 bool from_code,
Sebastien Hertz07474662015-08-25 15:12:33 +0000905 mirror::Throwable* exception)
906 SHARED_REQUIRES(Locks::mutator_lock_);
Nicolas Geoffray73be1e82015-09-17 15:22:56 +0100907 void PopDeoptimizationContext(JValue* result, mirror::Throwable** exception, bool* from_code)
Sebastien Hertz07474662015-08-25 15:12:33 +0000908 SHARED_REQUIRES(Locks::mutator_lock_);
909 void AssertHasDeoptimizationContext()
910 SHARED_REQUIRES(Locks::mutator_lock_);
Mingyao Yang1f2d3ba2015-05-18 12:12:50 -0700911 void PushStackedShadowFrame(ShadowFrame* sf, StackedShadowFrameType type);
Andreas Gampe639bdd12015-06-03 11:22:45 -0700912 ShadowFrame* PopStackedShadowFrame(StackedShadowFrameType type, bool must_be_present = true);
Andreas Gampe2a0d4ec2014-06-02 22:05:22 -0700913
Mingyao Yang99170c62015-07-06 11:10:37 -0700914 // For debugger, find the shadow frame that corresponds to a frame id.
915 // Or return null if there is none.
916 ShadowFrame* FindDebuggerShadowFrame(size_t frame_id)
917 SHARED_REQUIRES(Locks::mutator_lock_);
918 // For debugger, find the bool array that keeps track of the updated vreg set
919 // for a frame id.
920 bool* GetUpdatedVRegFlags(size_t frame_id) SHARED_REQUIRES(Locks::mutator_lock_);
921 // For debugger, find the shadow frame that corresponds to a frame id. If
922 // one doesn't exist yet, create one and track it in frame_id_to_shadow_frame.
923 ShadowFrame* FindOrCreateDebuggerShadowFrame(size_t frame_id,
924 uint32_t num_vregs,
925 ArtMethod* method,
926 uint32_t dex_pc)
927 SHARED_REQUIRES(Locks::mutator_lock_);
928
929 // Delete the entry that maps from frame_id to shadow_frame.
930 void RemoveDebuggerShadowFrameMapping(size_t frame_id)
931 SHARED_REQUIRES(Locks::mutator_lock_);
932
Ian Rogers62d6c772013-02-27 08:32:07 -0800933 std::deque<instrumentation::InstrumentationStackFrame>* GetInstrumentationStack() {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700934 return tlsPtr_.instrumentation_stack;
jeffhaoe343b762011-12-05 16:36:44 -0800935 }
936
Mathieu Chartiere401d142015-04-22 13:56:20 -0700937 std::vector<ArtMethod*>* GetStackTraceSample() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700938 return tlsPtr_.stack_trace_sample;
Jeff Hao5ce4b172013-08-16 16:27:18 -0700939 }
940
Mathieu Chartiere401d142015-04-22 13:56:20 -0700941 void SetStackTraceSample(std::vector<ArtMethod*>* sample) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700942 tlsPtr_.stack_trace_sample = sample;
Jeff Hao5ce4b172013-08-16 16:27:18 -0700943 }
944
945 uint64_t GetTraceClockBase() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700946 return tls64_.trace_clock_base;
Jeff Hao5ce4b172013-08-16 16:27:18 -0700947 }
948
949 void SetTraceClockBase(uint64_t clock_base) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700950 tls64_.trace_clock_base = clock_base;
Jeff Hao5ce4b172013-08-16 16:27:18 -0700951 }
952
Ian Rogers81d425b2012-09-27 16:03:43 -0700953 BaseMutex* GetHeldMutex(LockLevel level) const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700954 return tlsPtr_.held_mutexes[level];
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700955 }
956
Ian Rogers81d425b2012-09-27 16:03:43 -0700957 void SetHeldMutex(LockLevel level, BaseMutex* mutex) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700958 tlsPtr_.held_mutexes[level] = mutex;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700959 }
Elliott Hughesffb465f2012-03-01 18:46:05 -0800960
Mathieu Chartier752a0e62013-06-27 11:03:27 -0700961 void RunCheckpointFunction();
Mathieu Chartier858f1c52012-10-17 17:45:55 -0700962
Yu Lieac44242015-06-29 10:50:03 +0800963 bool PassActiveSuspendBarriers(Thread* self)
Mathieu Chartier90443472015-07-16 20:32:27 -0700964 REQUIRES(!Locks::thread_suspend_count_lock_);
Yu Lieac44242015-06-29 10:50:03 +0800965
966 void ClearSuspendBarrier(AtomicInteger* target)
Mathieu Chartier90443472015-07-16 20:32:27 -0700967 REQUIRES(Locks::thread_suspend_count_lock_);
Yu Lieac44242015-06-29 10:50:03 +0800968
Mathieu Chartier858f1c52012-10-17 17:45:55 -0700969 bool ReadFlag(ThreadFlag flag) const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700970 return (tls32_.state_and_flags.as_struct.flags & flag) != 0;
Mathieu Chartier858f1c52012-10-17 17:45:55 -0700971 }
972
Jeff Hao9cec2472013-05-14 18:17:06 -0700973 bool TestAllFlags() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700974 return (tls32_.state_and_flags.as_struct.flags != 0);
Jeff Hao9cec2472013-05-14 18:17:06 -0700975 }
976
Ian Rogers8c1b5f72014-07-09 22:02:36 -0700977 void AtomicSetFlag(ThreadFlag flag) {
978 tls32_.state_and_flags.as_atomic_int.FetchAndOrSequentiallyConsistent(flag);
979 }
Mathieu Chartier858f1c52012-10-17 17:45:55 -0700980
Ian Rogers8c1b5f72014-07-09 22:02:36 -0700981 void AtomicClearFlag(ThreadFlag flag) {
982 tls32_.state_and_flags.as_atomic_int.FetchAndAndSequentiallyConsistent(-1 ^ flag);
983 }
Mathieu Chartier858f1c52012-10-17 17:45:55 -0700984
Hiroshi Yamauchi3b4c1892013-09-12 21:33:12 -0700985 void ResetQuickAllocEntryPointsForThread();
986
Ian Rogersdd7624d2014-03-14 17:43:00 -0700987 // Returns the remaining space in the TLAB.
988 size_t TlabSize() const;
989 // Doesn't check that there is room.
990 mirror::Object* AllocTlab(size_t bytes);
Ian Rogers13735952014-10-08 12:43:28 -0700991 void SetTlab(uint8_t* start, uint8_t* end);
Ian Rogersdd7624d2014-03-14 17:43:00 -0700992 bool HasTlab() const;
Hiroshi Yamauchi2cd334a2015-01-09 14:03:35 -0800993 uint8_t* GetTlabStart() {
994 return tlsPtr_.thread_local_start;
995 }
996 uint8_t* GetTlabPos() {
997 return tlsPtr_.thread_local_pos;
998 }
Elliott Hughes5d96a712012-06-28 12:24:27 -0700999
Ian Rogersdd7624d2014-03-14 17:43:00 -07001000 // Remove the suspend trigger for this thread by making the suspend_trigger_ TLS value
1001 // equal to a valid pointer.
1002 // TODO: does this need to atomic? I don't think so.
1003 void RemoveSuspendTrigger() {
1004 tlsPtr_.suspend_trigger = reinterpret_cast<uintptr_t*>(&tlsPtr_.suspend_trigger);
1005 }
1006
1007 // Trigger a suspend check by making the suspend_trigger_ TLS value an invalid pointer.
1008 // The next time a suspend check is done, it will load from the value at this address
1009 // and trigger a SIGSEGV.
1010 void TriggerSuspend() {
1011 tlsPtr_.suspend_trigger = nullptr;
1012 }
1013
1014
1015 // Push an object onto the allocation stack.
Mathieu Chartiercb535da2015-01-23 13:50:03 -08001016 bool PushOnThreadLocalAllocationStack(mirror::Object* obj)
Mathieu Chartier90443472015-07-16 20:32:27 -07001017 SHARED_REQUIRES(Locks::mutator_lock_);
Ian Rogersdd7624d2014-03-14 17:43:00 -07001018
1019 // Set the thread local allocation pointers to the given pointers.
Mathieu Chartiercb535da2015-01-23 13:50:03 -08001020 void SetThreadLocalAllocationStack(StackReference<mirror::Object>* start,
1021 StackReference<mirror::Object>* end);
Ian Rogersdd7624d2014-03-14 17:43:00 -07001022
1023 // Resets the thread local allocation pointers.
1024 void RevokeThreadLocalAllocationStack();
1025
1026 size_t GetThreadLocalBytesAllocated() const {
Mathieu Chartier14cc9be2014-07-11 10:26:37 -07001027 return tlsPtr_.thread_local_end - tlsPtr_.thread_local_start;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001028 }
1029
1030 size_t GetThreadLocalObjectsAllocated() const {
1031 return tlsPtr_.thread_local_objects;
1032 }
1033
Ian Rogersdd7624d2014-03-14 17:43:00 -07001034 void* GetRosAllocRun(size_t index) const {
1035 return tlsPtr_.rosalloc_runs[index];
1036 }
1037
1038 void SetRosAllocRun(size_t index, void* run) {
1039 tlsPtr_.rosalloc_runs[index] = run;
1040 }
1041
Andreas Gampe2c2d2a02016-03-17 21:27:19 -07001042 bool ProtectStack(bool fatal_on_error = true);
Dave Allison648d7112014-07-25 16:15:27 -07001043 bool UnprotectStack();
1044
buzbee1452bee2015-03-06 14:43:04 -08001045 void SetMterpDefaultIBase(void* ibase) {
1046 tlsPtr_.mterp_default_ibase = ibase;
1047 }
1048
1049 void SetMterpCurrentIBase(void* ibase) {
1050 tlsPtr_.mterp_current_ibase = ibase;
1051 }
1052
1053 void SetMterpAltIBase(void* ibase) {
1054 tlsPtr_.mterp_alt_ibase = ibase;
1055 }
1056
1057 const void* GetMterpDefaultIBase() const {
1058 return tlsPtr_.mterp_default_ibase;
1059 }
1060
1061 const void* GetMterpCurrentIBase() const {
1062 return tlsPtr_.mterp_current_ibase;
1063 }
1064
1065 const void* GetMterpAltIBase() const {
1066 return tlsPtr_.mterp_alt_ibase;
1067 }
1068
Dave Allison648d7112014-07-25 16:15:27 -07001069 void NoteSignalBeingHandled() {
1070 if (tls32_.handling_signal_) {
1071 LOG(FATAL) << "Detected signal while processing a signal";
1072 }
1073 tls32_.handling_signal_ = true;
1074 }
1075
1076 void NoteSignalHandlerDone() {
1077 tls32_.handling_signal_ = false;
1078 }
1079
Dave Allison8ce6b902014-08-26 11:07:58 -07001080 jmp_buf* GetNestedSignalState() {
1081 return tlsPtr_.nested_signal_state;
1082 }
1083
Hiroshi Yamauchi2cd334a2015-01-09 14:03:35 -08001084 bool IsSuspendedAtSuspendCheck() const {
1085 return tls32_.suspended_at_suspend_check;
1086 }
1087
Mathieu Chartierd0ad2ee2015-03-31 14:59:59 -07001088 void PushVerifier(verifier::MethodVerifier* verifier);
1089 void PopVerifier(verifier::MethodVerifier* verifier);
Mathieu Chartier12d625f2015-03-13 11:33:37 -07001090
Jeff Hao848f70a2014-01-15 13:49:50 -08001091 void InitStringEntryPoints();
1092
Mathieu Chartierdfe02f62016-02-01 20:15:11 -08001093 void ModifyDebugDisallowReadBarrier(int8_t delta) {
1094 debug_disallow_read_barrier_ += delta;
1095 }
1096
1097 uint8_t GetDebugDisallowReadBarrierCount() const {
1098 return debug_disallow_read_barrier_;
1099 }
1100
Calin Juravleb2771b42016-04-07 17:09:25 +01001101 static bool IsSensitiveThread() {
1102 if (is_sensitive_thread_hook_ != nullptr) {
1103 return (*is_sensitive_thread_hook_)();
1104 }
1105 return false;
1106 }
1107
Ian Rogersdd7624d2014-03-14 17:43:00 -07001108 private:
Ian Rogers52673ff2012-06-27 23:25:34 -07001109 explicit Thread(bool daemon);
Mathieu Chartier90443472015-07-16 20:32:27 -07001110 ~Thread() REQUIRES(!Locks::mutator_lock_, !Locks::thread_suspend_count_lock_);
Elliott Hughesc0f09332012-03-26 13:27:06 -07001111 void Destroy();
Carl Shapiro0e5d75d2011-07-06 18:28:37 -07001112
Ian Rogers365c1022012-06-22 15:05:28 -07001113 void CreatePeer(const char* name, bool as_daemon, jobject thread_group);
Elliott Hughes5fe594f2011-09-08 12:33:17 -07001114
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +01001115 template<bool kTransactionActive>
1116 void InitPeer(ScopedObjectAccess& soa, jboolean thread_is_daemon, jobject thread_group,
1117 jobject thread_name, jint thread_priority)
Mathieu Chartier90443472015-07-16 20:32:27 -07001118 SHARED_REQUIRES(Locks::mutator_lock_);
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +01001119
Ian Rogers62d6c772013-02-27 08:32:07 -08001120 // Avoid use, callers should use SetState. Used only by SignalCatcher::HandleSigQuit, ~Thread and
1121 // Dbg::Disconnected.
Ian Rogers474b6da2012-09-25 00:20:38 -07001122 ThreadState SetStateUnsafe(ThreadState new_state) {
1123 ThreadState old_state = GetState();
Mathieu Chartier8ac9c912015-10-01 15:58:41 -07001124 if (old_state == kRunnable && new_state != kRunnable) {
1125 // Need to run pending checkpoint and suspend barriers. Run checkpoints in runnable state in
1126 // case they need to use a ScopedObjectAccess. If we are holding the mutator lock and a SOA
1127 // attempts to TransitionFromSuspendedToRunnable, it results in a deadlock.
1128 TransitionToSuspendedAndRunCheckpoints(new_state);
1129 // Since we transitioned to a suspended state, check the pass barrier requests.
1130 PassActiveSuspendBarriers();
1131 } else {
1132 tls32_.state_and_flags.as_struct.state = new_state;
Yu Lieac44242015-06-29 10:50:03 +08001133 }
Ian Rogersc747cff2012-08-31 18:20:08 -07001134 return old_state;
1135 }
Ian Rogersc747cff2012-08-31 18:20:08 -07001136
Mathieu Chartier90443472015-07-16 20:32:27 -07001137 void VerifyStackImpl() SHARED_REQUIRES(Locks::mutator_lock_);
Ian Rogers04d7aa92013-03-16 14:29:17 -07001138
Mathieu Chartier90443472015-07-16 20:32:27 -07001139 void DumpState(std::ostream& os) const SHARED_REQUIRES(Locks::mutator_lock_);
Nicolas Geoffraya73280d2016-02-15 13:05:16 +00001140 void DumpStack(std::ostream& os,
1141 bool dump_native_stack = true,
1142 BacktraceMap* backtrace_map = nullptr) const
Mathieu Chartier90443472015-07-16 20:32:27 -07001143 REQUIRES(!Locks::thread_suspend_count_lock_)
1144 SHARED_REQUIRES(Locks::mutator_lock_);
Elliott Hughesd92bec42011-09-02 17:04:36 -07001145
Elliott Hughesaccd83d2011-10-17 14:25:58 -07001146 // Out-of-line conveniences for debugging in gdb.
Brian Carlstrom7934ac22013-07-26 10:54:15 -07001147 static Thread* CurrentFromGdb(); // Like Thread::Current.
Ian Rogers00f7d0e2012-07-19 15:28:27 -07001148 // Like Thread::Dump(std::cerr).
Mathieu Chartier90443472015-07-16 20:32:27 -07001149 void DumpFromGdb() const SHARED_REQUIRES(Locks::mutator_lock_);
Elliott Hughesaccd83d2011-10-17 14:25:58 -07001150
Elliott Hughes93e74e82011-09-13 11:07:03 -07001151 static void* CreateCallback(void* arg);
1152
Ian Rogerscfaa4552012-11-26 21:00:08 -08001153 void HandleUncaughtExceptions(ScopedObjectAccess& soa)
Mathieu Chartier90443472015-07-16 20:32:27 -07001154 SHARED_REQUIRES(Locks::mutator_lock_);
1155 void RemoveFromThreadGroup(ScopedObjectAccess& soa) SHARED_REQUIRES(Locks::mutator_lock_);
Elliott Hughesaccd83d2011-10-17 14:25:58 -07001156
Andreas Gampe449357d2015-06-01 22:29:51 -07001157 // Initialize a thread.
1158 //
1159 // The third parameter is not mandatory. If given, the thread will use this JNIEnvExt. In case
1160 // Init succeeds, this means the thread takes ownership of it. If Init fails, it is the caller's
1161 // responsibility to destroy the given JNIEnvExt. If the parameter is null, Init will try to
1162 // create a JNIEnvExt on its own (and potentially fail at that stage, indicated by a return value
1163 // of false).
1164 bool Init(ThreadList*, JavaVMExt*, JNIEnvExt* jni_env_ext = nullptr)
Mathieu Chartier90443472015-07-16 20:32:27 -07001165 REQUIRES(Locks::runtime_shutdown_lock_);
Ian Rogers5d76c432011-10-31 21:42:49 -07001166 void InitCardTable();
Ian Rogersb033c752011-07-20 12:22:35 -07001167 void InitCpu();
Alexei Zavjalov1efa0a92014-02-04 02:08:31 +07001168 void CleanupCpu();
Ian Rogers848871b2013-08-05 10:56:33 -07001169 void InitTlsEntryPoints();
Brian Carlstromcaabb1b2011-10-11 18:09:13 -07001170 void InitTid();
Brian Carlstromcaabb1b2011-10-11 18:09:13 -07001171 void InitPthreadKeySelf();
Ian Rogersf4d4da12014-11-11 16:10:33 -08001172 bool InitStackHwm();
Elliott Hughesbe759c62011-09-08 19:38:21 -07001173
Elliott Hughesd6a23bd2013-07-16 14:19:52 -07001174 void SetUpAlternateSignalStack();
1175 void TearDownAlternateSignalStack();
1176
Mathieu Chartier8ac9c912015-10-01 15:58:41 -07001177 ALWAYS_INLINE void TransitionToSuspendedAndRunCheckpoints(ThreadState new_state)
1178 REQUIRES(!Locks::thread_suspend_count_lock_, !Roles::uninterruptible_);
1179
1180 ALWAYS_INLINE void PassActiveSuspendBarriers()
1181 REQUIRES(!Locks::thread_suspend_count_lock_, !Roles::uninterruptible_);
1182
Calin Juravleb2771b42016-04-07 17:09:25 +01001183 static void SetSensitiveThreadHook(bool (*is_sensitive_thread_hook)()) {
1184 is_sensitive_thread_hook_ = is_sensitive_thread_hook;
1185 }
1186
Ian Rogers474b6da2012-09-25 00:20:38 -07001187 // 32 bits of atomically changed state and flags. Keeping as 32 bits allows and atomic CAS to
1188 // change from being Suspended to Runnable without a suspend request occurring.
Chris Dearman59cde532013-12-04 18:53:49 -08001189 union PACKED(4) StateAndFlags {
1190 StateAndFlags() {}
Ian Rogersdf1ce912012-11-27 17:07:11 -08001191 struct PACKED(4) {
Ian Rogers30e173f2012-09-26 14:35:03 -07001192 // Bitfield of flag values. Must be changed atomically so that flag values aren't lost. See
1193 // ThreadFlags for bit field meanings.
1194 volatile uint16_t flags;
1195 // Holds the ThreadState. May be changed non-atomically between Suspended (ie not Runnable)
1196 // transitions. Changing to Runnable requires that the suspend_request be part of the atomic
1197 // operation. If a thread is suspended and a suspend_request is present, a thread may not
1198 // change to Runnable as a GC or other operation is in progress.
Ian Rogers01ae5802012-09-28 16:14:01 -07001199 volatile uint16_t state;
Ian Rogers30e173f2012-09-26 14:35:03 -07001200 } as_struct;
Ian Rogersb8e087e2014-07-09 21:12:06 -07001201 AtomicInteger as_atomic_int;
Ian Rogers01ae5802012-09-28 16:14:01 -07001202 volatile int32_t as_int;
Chris Dearman59cde532013-12-04 18:53:49 -08001203
1204 private:
1205 // gcc does not handle struct with volatile member assignments correctly.
1206 // See http://gcc.gnu.org/bugzilla/show_bug.cgi?id=47409
1207 DISALLOW_COPY_AND_ASSIGN(StateAndFlags);
Ian Rogers474b6da2012-09-25 00:20:38 -07001208 };
Andreas Gampe575e78c2014-11-03 23:41:03 -08001209 static_assert(sizeof(StateAndFlags) == sizeof(int32_t), "Weird state_and_flags size");
Ian Rogers474b6da2012-09-25 00:20:38 -07001210
Ian Rogersdd7624d2014-03-14 17:43:00 -07001211 static void ThreadExitCallback(void* arg);
Elliott Hughes5d96a712012-06-28 12:24:27 -07001212
Dave Allison0aded082013-11-07 13:15:11 -08001213 // Maximum number of checkpoint functions.
1214 static constexpr uint32_t kMaxCheckpoints = 3;
1215
Yu Lieac44242015-06-29 10:50:03 +08001216 // Maximum number of suspend barriers.
1217 static constexpr uint32_t kMaxSuspendBarriers = 3;
1218
Ian Rogersdd7624d2014-03-14 17:43:00 -07001219 // Has Thread::Startup been called?
1220 static bool is_started_;
Mathieu Chartier858f1c52012-10-17 17:45:55 -07001221
Ian Rogersdd7624d2014-03-14 17:43:00 -07001222 // TLS key used to retrieve the Thread*.
1223 static pthread_key_t pthread_key_self_;
Ian Rogersa32a6fd2012-02-06 20:18:44 -08001224
Ian Rogersdd7624d2014-03-14 17:43:00 -07001225 // Used to notify threads that they should attempt to resume, they will suspend again if
1226 // their suspend count is > 0.
1227 static ConditionVariable* resume_cond_ GUARDED_BY(Locks::thread_suspend_count_lock_);
Dave Allisonb373e092014-02-20 16:06:36 -08001228
Calin Juravleb2771b42016-04-07 17:09:25 +01001229 // Hook passed by framework which returns true
1230 // when StrictMode events are traced for the current thread.
1231 static bool (*is_sensitive_thread_hook_)();
1232
Ian Rogersdd7624d2014-03-14 17:43:00 -07001233 /***********************************************************************************************/
1234 // Thread local storage. Fields are grouped by size to enable 32 <-> 64 searching to account for
1235 // pointer size differences. To encourage shorter encoding, more frequently used values appear
1236 // first if possible.
1237 /***********************************************************************************************/
Elliott Hughes6a607ad2012-07-13 20:40:00 -07001238
Zuo Wangf37a88b2014-07-10 04:26:41 -07001239 struct PACKED(4) tls_32bit_sized_values {
Ian Rogersdd7624d2014-03-14 17:43:00 -07001240 // We have no control over the size of 'bool', but want our boolean fields
1241 // to be 4-byte quantities.
1242 typedef uint32_t bool32_t;
Ian Rogers22f454c2012-09-08 11:06:29 -07001243
Ian Rogersdd7624d2014-03-14 17:43:00 -07001244 explicit tls_32bit_sized_values(bool is_daemon) :
1245 suspend_count(0), debug_suspend_count(0), thin_lock_thread_id(0), tid(0),
1246 daemon(is_daemon), throwing_OutOfMemoryError(false), no_thread_suspension(0),
Mingyao Yang1f2d3ba2015-05-18 12:12:50 -07001247 thread_exit_check_count(0), handling_signal_(false),
Sebastien Hertz07474662015-08-25 15:12:33 +00001248 suspended_at_suspend_check(false), ready_for_debug_invoke(false),
Hiroshi Yamauchi20a0be02016-02-19 15:44:06 -08001249 debug_method_entry_(false), is_gc_marking(false), weak_ref_access_enabled(true),
1250 disable_thread_flip_count(0) {
Ian Rogersdd7624d2014-03-14 17:43:00 -07001251 }
Dave Allisonb373e092014-02-20 16:06:36 -08001252
Ian Rogersdd7624d2014-03-14 17:43:00 -07001253 union StateAndFlags state_and_flags;
Andreas Gampe575e78c2014-11-03 23:41:03 -08001254 static_assert(sizeof(union StateAndFlags) == sizeof(int32_t),
1255 "Size of state_and_flags and int32 are different");
Dave Allisonb373e092014-02-20 16:06:36 -08001256
Ian Rogersdd7624d2014-03-14 17:43:00 -07001257 // A non-zero value is used to tell the current thread to enter a safe point
1258 // at the next poll.
1259 int suspend_count GUARDED_BY(Locks::thread_suspend_count_lock_);
Hiroshi Yamauchicf58d4a2013-09-26 14:21:22 -07001260
Ian Rogersdd7624d2014-03-14 17:43:00 -07001261 // How much of 'suspend_count_' is by request of the debugger, used to set things right
1262 // when the debugger detaches. Must be <= suspend_count_.
1263 int debug_suspend_count GUARDED_BY(Locks::thread_suspend_count_lock_);
Hiroshi Yamauchif5b0e202014-02-11 17:02:22 -08001264
Ian Rogersdd7624d2014-03-14 17:43:00 -07001265 // Thin lock thread id. This is a small integer used by the thin lock implementation.
1266 // This is not to be confused with the native thread's tid, nor is it the value returned
1267 // by java.lang.Thread.getId --- this is a distinct value, used only for locking. One
1268 // important difference between this id and the ids visible to managed code is that these
1269 // ones get reused (to ensure that they fit in the number of bits available).
1270 uint32_t thin_lock_thread_id;
Hiroshi Yamauchif5b0e202014-02-11 17:02:22 -08001271
Ian Rogersdd7624d2014-03-14 17:43:00 -07001272 // System thread id.
1273 uint32_t tid;
Hiroshi Yamauchif5b0e202014-02-11 17:02:22 -08001274
Ian Rogersdd7624d2014-03-14 17:43:00 -07001275 // Is the thread a daemon?
1276 const bool32_t daemon;
Hiroshi Yamauchif5b0e202014-02-11 17:02:22 -08001277
Ian Rogersdd7624d2014-03-14 17:43:00 -07001278 // A boolean telling us whether we're recursively throwing OOME.
1279 bool32_t throwing_OutOfMemoryError;
1280
1281 // A positive value implies we're in a region where thread suspension isn't expected.
1282 uint32_t no_thread_suspension;
1283
1284 // How many times has our pthread key's destructor been called?
1285 uint32_t thread_exit_check_count;
Sebastien Hertz9f102032014-05-23 08:59:42 +02001286
Dave Allison648d7112014-07-25 16:15:27 -07001287 // True if signal is being handled by this thread.
1288 bool32_t handling_signal_;
1289
Hiroshi Yamauchi2cd334a2015-01-09 14:03:35 -08001290 // True if the thread is suspended in FullSuspendCheck(). This is
1291 // used to distinguish runnable threads that are suspended due to
1292 // a normal suspend check from other threads.
1293 bool32_t suspended_at_suspend_check;
Sebastien Hertz1558b572015-02-25 15:05:59 +01001294
1295 // True if the thread has been suspended by a debugger event. This is
1296 // used to invoke method from the debugger which is only allowed when
1297 // the thread is suspended by an event.
1298 bool32_t ready_for_debug_invoke;
Sebastien Hertz9d6bf692015-04-10 12:12:33 +02001299
1300 // True if the thread enters a method. This is used to detect method entry
1301 // event for the debugger.
1302 bool32_t debug_method_entry_;
Hiroshi Yamauchi0b713572015-06-16 18:29:23 -07001303
Hiroshi Yamauchi00370822015-08-18 14:47:25 -07001304 // True if the GC is in the marking phase. This is used for the CC collector only. This is
1305 // thread local so that we can simplify the logic to check for the fast path of read barriers of
1306 // GC roots.
1307 bool32_t is_gc_marking;
1308
Hiroshi Yamauchi0b713572015-06-16 18:29:23 -07001309 // True if the thread is allowed to access a weak ref (Reference::GetReferent() and system
1310 // weaks) and to potentially mark an object alive/gray. This is used for concurrent reference
1311 // processing of the CC collector only. This is thread local so that we can enable/disable weak
1312 // ref access by using a checkpoint and avoid a race around the time weak ref access gets
1313 // disabled and concurrent reference processing begins (if weak ref access is disabled during a
1314 // pause, this is not an issue.) Other collectors use Runtime::DisallowNewSystemWeaks() and
1315 // ReferenceProcessor::EnableSlowPath().
1316 bool32_t weak_ref_access_enabled;
Hiroshi Yamauchi20a0be02016-02-19 15:44:06 -08001317
1318 // A thread local version of Heap::disable_thread_flip_count_. This keeps track of how many
1319 // levels of (nested) JNI critical sections the thread is in and is used to detect a nested JNI
1320 // critical section enter.
1321 uint32_t disable_thread_flip_count;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001322 } tls32_;
1323
1324 struct PACKED(8) tls_64bit_sized_values {
Sebastien Hertz07474662015-08-25 15:12:33 +00001325 tls_64bit_sized_values() : trace_clock_base(0) {
Ian Rogersdd7624d2014-03-14 17:43:00 -07001326 }
1327
1328 // The clock base used for tracing.
1329 uint64_t trace_clock_base;
1330
Ian Rogersdd7624d2014-03-14 17:43:00 -07001331 RuntimeStats stats;
1332 } tls64_;
1333
Andreas Gampe6aa13702015-10-28 10:57:25 -07001334 struct PACKED(sizeof(void*)) tls_ptr_sized_values {
Ian Rogersdd7624d2014-03-14 17:43:00 -07001335 tls_ptr_sized_values() : card_table(nullptr), exception(nullptr), stack_end(nullptr),
Andreas Gampe449357d2015-06-01 22:29:51 -07001336 managed_stack(), suspend_trigger(nullptr), jni_env(nullptr), tmp_jni_env(nullptr),
1337 self(nullptr), opeer(nullptr), jpeer(nullptr), stack_begin(nullptr), stack_size(0),
Ian Rogersdd7624d2014-03-14 17:43:00 -07001338 stack_trace_sample(nullptr), wait_next(nullptr), monitor_enter_object(nullptr),
Mathieu Chartiereb8167a2014-05-07 15:43:14 -07001339 top_handle_scope(nullptr), class_loader_override(nullptr), long_jump_context(nullptr),
Ian Rogersdd7624d2014-03-14 17:43:00 -07001340 instrumentation_stack(nullptr), debug_invoke_req(nullptr), single_step_control(nullptr),
Sebastien Hertz07474662015-08-25 15:12:33 +00001341 stacked_shadow_frame_record(nullptr), deoptimization_context_stack(nullptr),
Mingyao Yang99170c62015-07-06 11:10:37 -07001342 frame_id_to_shadow_frame(nullptr), name(nullptr), pthread_self(0),
Hiroshi Yamauchi7e1ce282015-12-11 15:46:19 -08001343 last_no_thread_suspension_cause(nullptr), thread_local_objects(0),
1344 thread_local_start(nullptr), thread_local_pos(nullptr), thread_local_end(nullptr),
buzbee1452bee2015-03-06 14:43:04 -08001345 mterp_current_ibase(nullptr), mterp_default_ibase(nullptr), mterp_alt_ibase(nullptr),
Ian Rogers7b078e82014-09-10 14:44:24 -07001346 thread_local_alloc_stack_top(nullptr), thread_local_alloc_stack_end(nullptr),
Sebastien Hertzaa50d3a2015-08-25 15:25:41 +02001347 nested_signal_state(nullptr), flip_function(nullptr), method_verifier(nullptr),
1348 thread_local_mark_stack(nullptr) {
Mathieu Chartier12d625f2015-03-13 11:33:37 -07001349 std::fill(held_mutexes, held_mutexes + kLockLevelCount, nullptr);
Ian Rogersdd7624d2014-03-14 17:43:00 -07001350 }
1351
1352 // The biased card table, see CardTable for details.
Ian Rogers13735952014-10-08 12:43:28 -07001353 uint8_t* card_table;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001354
Mathieu Chartier2cebb242015-04-21 16:50:40 -07001355 // The pending exception or null.
Ian Rogersdd7624d2014-03-14 17:43:00 -07001356 mirror::Throwable* exception;
1357
1358 // The end of this thread's stack. This is the lowest safely-addressable address on the stack.
1359 // We leave extra space so there's room for the code that throws StackOverflowError.
Ian Rogers13735952014-10-08 12:43:28 -07001360 uint8_t* stack_end;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001361
1362 // The top of the managed stack often manipulated directly by compiler generated code.
1363 ManagedStack managed_stack;
1364
1365 // In certain modes, setting this to 0 will trigger a SEGV and thus a suspend check. It is
1366 // normally set to the address of itself.
1367 uintptr_t* suspend_trigger;
1368
1369 // Every thread may have an associated JNI environment
1370 JNIEnvExt* jni_env;
1371
Andreas Gampe449357d2015-06-01 22:29:51 -07001372 // Temporary storage to transfer a pre-allocated JNIEnvExt from the creating thread to the
1373 // created thread.
1374 JNIEnvExt* tmp_jni_env;
1375
Ian Rogersdd7624d2014-03-14 17:43:00 -07001376 // Initialized to "this". On certain architectures (such as x86) reading off of Thread::Current
1377 // is easy but getting the address of Thread::Current is hard. This field can be read off of
1378 // Thread::Current to give the address.
1379 Thread* self;
1380
1381 // Our managed peer (an instance of java.lang.Thread). The jobject version is used during thread
1382 // start up, until the thread is registered and the local opeer_ is used.
1383 mirror::Object* opeer;
1384 jobject jpeer;
1385
1386 // The "lowest addressable byte" of the stack.
Ian Rogers13735952014-10-08 12:43:28 -07001387 uint8_t* stack_begin;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001388
1389 // Size of the stack.
1390 size_t stack_size;
1391
Ian Rogersdd7624d2014-03-14 17:43:00 -07001392 // Pointer to previous stack trace captured by sampling profiler.
Mathieu Chartiere401d142015-04-22 13:56:20 -07001393 std::vector<ArtMethod*>* stack_trace_sample;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001394
Mathieu Chartier2cebb242015-04-21 16:50:40 -07001395 // The next thread in the wait set this thread is part of or null if not waiting.
Ian Rogersdd7624d2014-03-14 17:43:00 -07001396 Thread* wait_next;
1397
1398 // If we're blocked in MonitorEnter, this is the object we're trying to lock.
1399 mirror::Object* monitor_enter_object;
1400
Mathieu Chartier2cebb242015-04-21 16:50:40 -07001401 // Top of linked list of handle scopes or null for none.
Mathieu Chartiereb8167a2014-05-07 15:43:14 -07001402 HandleScope* top_handle_scope;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001403
1404 // Needed to get the right ClassLoader in JNI_OnLoad, but also
1405 // useful for testing.
Ian Rogers68d8b422014-07-17 11:09:10 -07001406 jobject class_loader_override;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001407
1408 // Thread local, lazily allocated, long jump context. Used to deliver exceptions.
1409 Context* long_jump_context;
1410
1411 // Additional stack used by method instrumentation to store method and return pc values.
1412 // Stored as a pointer since std::deque is not PACKED.
1413 std::deque<instrumentation::InstrumentationStackFrame>* instrumentation_stack;
1414
1415 // JDWP invoke-during-breakpoint support.
1416 DebugInvokeReq* debug_invoke_req;
1417
1418 // JDWP single-stepping support.
1419 SingleStepControl* single_step_control;
1420
Mingyao Yang1f2d3ba2015-05-18 12:12:50 -07001421 // For gc purpose, a shadow frame record stack that keeps track of:
1422 // 1) shadow frames under construction.
1423 // 2) deoptimization shadow frames.
1424 StackedShadowFrameRecord* stacked_shadow_frame_record;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001425
Mingyao Yang1f2d3ba2015-05-18 12:12:50 -07001426 // Deoptimization return value record stack.
Sebastien Hertz07474662015-08-25 15:12:33 +00001427 DeoptimizationContextRecord* deoptimization_context_stack;
Andreas Gampe2a0d4ec2014-06-02 22:05:22 -07001428
Mingyao Yang99170c62015-07-06 11:10:37 -07001429 // For debugger, a linked list that keeps the mapping from frame_id to shadow frame.
1430 // Shadow frames may be created before deoptimization happens so that the debugger can
1431 // set local values there first.
1432 FrameIdToShadowFrame* frame_id_to_shadow_frame;
1433
Ian Rogersdd7624d2014-03-14 17:43:00 -07001434 // A cached copy of the java.lang.Thread's name.
1435 std::string* name;
1436
1437 // A cached pthread_t for the pthread underlying this Thread*.
1438 pthread_t pthread_self;
1439
Ian Rogersdd7624d2014-03-14 17:43:00 -07001440 // If no_thread_suspension_ is > 0, what is causing that assertion.
1441 const char* last_no_thread_suspension_cause;
1442
Mathieu Chartier2cebb242015-04-21 16:50:40 -07001443 // Pending checkpoint function or null if non-pending. Installation guarding by
Ian Rogersdd7624d2014-03-14 17:43:00 -07001444 // Locks::thread_suspend_count_lock_.
1445 Closure* checkpoint_functions[kMaxCheckpoints];
1446
Yu Lieac44242015-06-29 10:50:03 +08001447 // Pending barriers that require passing or NULL if non-pending. Installation guarding by
1448 // Locks::thread_suspend_count_lock_.
1449 // They work effectively as art::Barrier, but implemented directly using AtomicInteger and futex
1450 // to avoid additional cost of a mutex and a condition variable, as used in art::Barrier.
1451 AtomicInteger* active_suspend_barriers[kMaxSuspendBarriers];
1452
Ian Rogersdd7624d2014-03-14 17:43:00 -07001453 // Entrypoint function pointers.
1454 // TODO: move this to more of a global offset table model to avoid per-thread duplication.
Ian Rogersdd7624d2014-03-14 17:43:00 -07001455 JniEntryPoints jni_entrypoints;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001456 QuickEntryPoints quick_entrypoints;
1457
1458 // Thread-local allocation pointer.
Hiroshi Yamauchi7e1ce282015-12-11 15:46:19 -08001459 size_t thread_local_objects;
Ian Rogers13735952014-10-08 12:43:28 -07001460 uint8_t* thread_local_start;
Hiroshi Yamauchi7e1ce282015-12-11 15:46:19 -08001461 // thread_local_pos and thread_local_end must be consecutive for ldrd and are 8 byte aligned for
1462 // potentially better performance.
Ian Rogers13735952014-10-08 12:43:28 -07001463 uint8_t* thread_local_pos;
1464 uint8_t* thread_local_end;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001465
buzbee1452bee2015-03-06 14:43:04 -08001466 // Mterp jump table bases.
1467 void* mterp_current_ibase;
1468 void* mterp_default_ibase;
1469 void* mterp_alt_ibase;
1470
Mathieu Chartier0651d412014-04-29 14:37:57 -07001471 // There are RosAlloc::kNumThreadLocalSizeBrackets thread-local size brackets per thread.
Hiroshi Yamauchi7ed9c562016-02-02 15:22:09 -08001472 void* rosalloc_runs[kNumRosAllocThreadLocalSizeBracketsInThread];
Ian Rogersdd7624d2014-03-14 17:43:00 -07001473
1474 // Thread-local allocation stack data/routines.
Mathieu Chartiercb535da2015-01-23 13:50:03 -08001475 StackReference<mirror::Object>* thread_local_alloc_stack_top;
1476 StackReference<mirror::Object>* thread_local_alloc_stack_end;
Chao-ying Fu9e369312014-05-21 11:20:52 -07001477
1478 // Support for Mutex lock hierarchy bug detection.
1479 BaseMutex* held_mutexes[kLockLevelCount];
Dave Allison8ce6b902014-08-26 11:07:58 -07001480
1481 // Recorded thread state for nested signals.
1482 jmp_buf* nested_signal_state;
Hiroshi Yamauchi2cd334a2015-01-09 14:03:35 -08001483
1484 // The function used for thread flip.
1485 Closure* flip_function;
Mathieu Chartier12d625f2015-03-13 11:33:37 -07001486
1487 // Current method verifier, used for root marking.
1488 verifier::MethodVerifier* method_verifier;
Hiroshi Yamauchi0b713572015-06-16 18:29:23 -07001489
1490 // Thread-local mark stack for the concurrent copying collector.
1491 gc::accounting::AtomicStack<mirror::Object>* thread_local_mark_stack;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001492 } tlsPtr_;
1493
1494 // Guards the 'interrupted_' and 'wait_monitor_' members.
1495 Mutex* wait_mutex_ DEFAULT_MUTEX_ACQUIRED_AFTER;
1496
1497 // Condition variable waited upon during a wait.
1498 ConditionVariable* wait_cond_ GUARDED_BY(wait_mutex_);
Mathieu Chartier2cebb242015-04-21 16:50:40 -07001499 // Pointer to the monitor lock we're currently waiting on or null if not waiting.
Ian Rogersdd7624d2014-03-14 17:43:00 -07001500 Monitor* wait_monitor_ GUARDED_BY(wait_mutex_);
1501
1502 // Thread "interrupted" status; stays raised until queried or thrown.
1503 bool interrupted_ GUARDED_BY(wait_mutex_);
1504
Mathieu Chartierdfe02f62016-02-01 20:15:11 -08001505 // Debug disable read barrier count, only is checked for debug builds and only in the runtime.
1506 uint8_t debug_disallow_read_barrier_ = 0;
1507
Mathieu Chartiere6da9af2013-12-16 11:54:42 -08001508 friend class Dbg; // For SetStateUnsafe.
Mathieu Chartier15d34022014-02-26 17:16:38 -08001509 friend class gc::collector::SemiSpace; // For getting stack traces.
Mathieu Chartier692fafd2013-11-29 17:24:40 -08001510 friend class Runtime; // For CreatePeer.
Ian Rogers5cf98192014-05-29 21:31:50 -07001511 friend class QuickExceptionHandler; // For dumping the stack.
Mathieu Chartier692fafd2013-11-29 17:24:40 -08001512 friend class ScopedThreadStateChange;
Mathieu Chartier119c6bd2014-05-09 14:11:47 -07001513 friend class StubTest; // For accessing entrypoints.
Mathieu Chartier692fafd2013-11-29 17:24:40 -08001514 friend class ThreadList; // For ~Thread and Destroy.
1515
Andreas Gampe4352b452014-06-04 18:59:01 -07001516 friend class EntrypointsOrderTest; // To test the order of tls entries.
1517
Carl Shapiro0e5d75d2011-07-06 18:28:37 -07001518 DISALLOW_COPY_AND_ASSIGN(Thread);
1519};
Ian Rogersbdb03912011-09-14 00:55:44 -07001520
Mathieu Chartier4e2cb092015-07-22 16:17:51 -07001521class SCOPED_CAPABILITY ScopedAssertNoThreadSuspension {
Mathieu Chartier2d5f39e2014-09-19 17:52:37 -07001522 public:
Mathieu Chartier4e2cb092015-07-22 16:17:51 -07001523 ScopedAssertNoThreadSuspension(Thread* self, const char* cause) ACQUIRE(Roles::uninterruptible_)
Mathieu Chartier2d5f39e2014-09-19 17:52:37 -07001524 : self_(self), old_cause_(self->StartAssertNoThreadSuspension(cause)) {
1525 }
Mathieu Chartier4e2cb092015-07-22 16:17:51 -07001526 ~ScopedAssertNoThreadSuspension() RELEASE(Roles::uninterruptible_) {
Mathieu Chartier2d5f39e2014-09-19 17:52:37 -07001527 self_->EndAssertNoThreadSuspension(old_cause_);
1528 }
1529 Thread* Self() {
1530 return self_;
1531 }
1532
1533 private:
1534 Thread* const self_;
Ian Rogersf2247512014-12-02 16:17:08 -08001535 const char* const old_cause_;
Mathieu Chartier2d5f39e2014-09-19 17:52:37 -07001536};
1537
Mingyao Yang1f2d3ba2015-05-18 12:12:50 -07001538class ScopedStackedShadowFramePusher {
1539 public:
1540 ScopedStackedShadowFramePusher(Thread* self, ShadowFrame* sf, StackedShadowFrameType type)
1541 : self_(self), type_(type) {
1542 self_->PushStackedShadowFrame(sf, type);
1543 }
1544 ~ScopedStackedShadowFramePusher() {
1545 self_->PopStackedShadowFrame(type_);
1546 }
1547
1548 private:
1549 Thread* const self_;
1550 const StackedShadowFrameType type_;
1551
1552 DISALLOW_COPY_AND_ASSIGN(ScopedStackedShadowFramePusher);
1553};
1554
Mathieu Chartierdfe02f62016-02-01 20:15:11 -08001555// Only works for debug builds.
1556class ScopedDebugDisallowReadBarriers {
1557 public:
1558 explicit ScopedDebugDisallowReadBarriers(Thread* self) : self_(self) {
1559 self_->ModifyDebugDisallowReadBarrier(1);
1560 }
1561 ~ScopedDebugDisallowReadBarriers() {
1562 self_->ModifyDebugDisallowReadBarrier(-1);
1563 }
1564
1565 private:
1566 Thread* const self_;
1567};
1568
Elliott Hughes330304d2011-08-12 14:28:05 -07001569std::ostream& operator<<(std::ostream& os, const Thread& thread);
Sebastien Hertzf7958692015-06-09 14:09:14 +02001570std::ostream& operator<<(std::ostream& os, const StackedShadowFrameType& thread);
Carl Shapiro0e5d75d2011-07-06 18:28:37 -07001571
Carl Shapiro0e5d75d2011-07-06 18:28:37 -07001572} // namespace art
1573
Brian Carlstromfc0e3212013-07-17 14:40:12 -07001574#endif // ART_RUNTIME_THREAD_H_