blob: dfdbd0442708bd12b2d8d4f0816d7e55ad2e3b71 [file] [log] [blame]
Ian Rogers1d54e732013-05-02 21:10:01 -07001/*
2 * Copyright (C) 2011 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include "image_space.h"
18
Alex Light25396132014-08-27 15:37:23 -070019#include <dirent.h>
Mathieu Chartierceb07b32015-12-10 09:33:21 -080020#include <lz4.h>
21#include <random>
Andreas Gampe70be1fb2014-10-31 16:45:19 -070022#include <sys/statvfs.h>
Alex Light25396132014-08-27 15:37:23 -070023#include <sys/types.h>
Narayan Kamath5a2be3f2015-02-16 13:51:51 +000024#include <unistd.h>
Alex Light25396132014-08-27 15:37:23 -070025
Mathieu Chartiere401d142015-04-22 13:56:20 -070026#include "art_method.h"
Ian Rogersc7dd2952014-10-21 23:31:19 -070027#include "base/macros.h"
Brian Carlstrom56d947f2013-07-15 13:14:23 -070028#include "base/stl_util.h"
Narayan Kamathd1c606f2014-06-09 16:50:19 +010029#include "base/scoped_flock.h"
Vladimir Marko80afd022015-05-19 18:08:00 +010030#include "base/time_utils.h"
31#include "base/unix_file/fd_file.h"
Ian Rogers1d54e732013-05-02 21:10:01 -070032#include "gc/accounting/space_bitmap-inl.h"
Ian Rogers1d54e732013-05-02 21:10:01 -070033#include "mirror/class-inl.h"
34#include "mirror/object-inl.h"
Brian Carlstrom56d947f2013-07-15 13:14:23 -070035#include "oat_file.h"
Ian Rogers1d54e732013-05-02 21:10:01 -070036#include "os.h"
Ian Rogers1d54e732013-05-02 21:10:01 -070037#include "space-inl.h"
38#include "utils.h"
39
40namespace art {
41namespace gc {
42namespace space {
43
Ian Rogersef7d42f2014-01-06 12:55:46 -080044Atomic<uint32_t> ImageSpace::bitmap_index_(0);
Ian Rogers1d54e732013-05-02 21:10:01 -070045
Jeff Haodcdc85b2015-12-04 14:06:18 -080046ImageSpace::ImageSpace(const std::string& image_filename,
47 const char* image_location,
48 MemMap* mem_map,
49 accounting::ContinuousSpaceBitmap* live_bitmap,
50 uint8_t* end,
51 MemMap* shadow_map)
Mathieu Chartierc7853442015-03-27 14:35:38 -070052 : MemMapSpace(image_filename, mem_map, mem_map->Begin(), end, end,
Narayan Kamath52f84882014-05-02 10:10:39 +010053 kGcRetentionPolicyNeverCollect),
Jeff Haodcdc85b2015-12-04 14:06:18 -080054 oat_file_non_owned_(nullptr),
55 image_location_(image_location),
56 shadow_map_(shadow_map) {
Mathieu Chartier590fee92013-09-13 13:46:47 -070057 DCHECK(live_bitmap != nullptr);
Mathieu Chartier31e89252013-08-28 11:29:12 -070058 live_bitmap_.reset(live_bitmap);
Ian Rogers1d54e732013-05-02 21:10:01 -070059}
60
Alex Lightcf4bf382014-07-24 11:29:14 -070061static int32_t ChooseRelocationOffsetDelta(int32_t min_delta, int32_t max_delta) {
62 CHECK_ALIGNED(min_delta, kPageSize);
63 CHECK_ALIGNED(max_delta, kPageSize);
64 CHECK_LT(min_delta, max_delta);
65
Alex Light15324762015-11-19 11:03:10 -080066 int32_t r = GetRandomNumber<int32_t>(min_delta, max_delta);
Alex Lightcf4bf382014-07-24 11:29:14 -070067 if (r % 2 == 0) {
68 r = RoundUp(r, kPageSize);
69 } else {
70 r = RoundDown(r, kPageSize);
71 }
72 CHECK_LE(min_delta, r);
73 CHECK_GE(max_delta, r);
74 CHECK_ALIGNED(r, kPageSize);
75 return r;
76}
77
Alex Light25396132014-08-27 15:37:23 -070078// We are relocating or generating the core image. We should get rid of everything. It is all
Andreas Gampe8db9dcd2014-11-09 18:14:30 -080079// out-of-date. We also don't really care if this fails since it is just a convenience.
Alex Light25396132014-08-27 15:37:23 -070080// Adapted from prune_dex_cache(const char* subdir) in frameworks/native/cmds/installd/commands.c
81// Note this should only be used during first boot.
Narayan Kamath28bc9872014-11-07 17:46:28 +000082static void RealPruneDalvikCache(const std::string& cache_dir_path);
Andreas Gampe8db9dcd2014-11-09 18:14:30 -080083
Narayan Kamath28bc9872014-11-07 17:46:28 +000084static void PruneDalvikCache(InstructionSet isa) {
Alex Light25396132014-08-27 15:37:23 -070085 CHECK_NE(isa, kNone);
Andreas Gampe8db9dcd2014-11-09 18:14:30 -080086 // Prune the base /data/dalvik-cache.
Narayan Kamath28bc9872014-11-07 17:46:28 +000087 RealPruneDalvikCache(GetDalvikCacheOrDie(".", false));
Andreas Gampe8db9dcd2014-11-09 18:14:30 -080088 // Prune /data/dalvik-cache/<isa>.
Narayan Kamath28bc9872014-11-07 17:46:28 +000089 RealPruneDalvikCache(GetDalvikCacheOrDie(GetInstructionSetString(isa), false));
Alex Light25396132014-08-27 15:37:23 -070090}
Andreas Gampe8db9dcd2014-11-09 18:14:30 -080091
Narayan Kamath28bc9872014-11-07 17:46:28 +000092static void RealPruneDalvikCache(const std::string& cache_dir_path) {
Alex Light25396132014-08-27 15:37:23 -070093 if (!OS::DirectoryExists(cache_dir_path.c_str())) {
94 return;
95 }
96 DIR* cache_dir = opendir(cache_dir_path.c_str());
97 if (cache_dir == nullptr) {
98 PLOG(WARNING) << "Unable to open " << cache_dir_path << " to delete it's contents";
99 return;
100 }
Alex Light25396132014-08-27 15:37:23 -0700101
102 for (struct dirent* de = readdir(cache_dir); de != nullptr; de = readdir(cache_dir)) {
103 const char* name = de->d_name;
104 if (strcmp(name, ".") == 0 || strcmp(name, "..") == 0) {
105 continue;
106 }
Andreas Gampe8db9dcd2014-11-09 18:14:30 -0800107 // We only want to delete regular files and symbolic links.
108 if (de->d_type != DT_REG && de->d_type != DT_LNK) {
Alex Light25396132014-08-27 15:37:23 -0700109 if (de->d_type != DT_DIR) {
110 // We do expect some directories (namely the <isa> for pruning the base dalvik-cache).
111 LOG(WARNING) << "Unexpected file type of " << std::hex << de->d_type << " encountered.";
112 }
113 continue;
114 }
Brian Carlstromdebdda02014-08-28 22:17:13 -0700115 std::string cache_file(cache_dir_path);
116 cache_file += '/';
117 cache_file += name;
118 if (TEMP_FAILURE_RETRY(unlink(cache_file.c_str())) != 0) {
119 PLOG(ERROR) << "Unable to unlink " << cache_file;
Alex Light25396132014-08-27 15:37:23 -0700120 continue;
121 }
122 }
123 CHECK_EQ(0, TEMP_FAILURE_RETRY(closedir(cache_dir))) << "Unable to close directory.";
124}
125
Narayan Kamath28bc9872014-11-07 17:46:28 +0000126// We write out an empty file to the zygote's ISA specific cache dir at the start of
127// every zygote boot and delete it when the boot completes. If we find a file already
128// present, it usually means the boot didn't complete. We wipe the entire dalvik
129// cache if that's the case.
Narayan Kamath5a2be3f2015-02-16 13:51:51 +0000130static void MarkZygoteStart(const InstructionSet isa, const uint32_t max_failed_boots) {
Narayan Kamath28bc9872014-11-07 17:46:28 +0000131 const std::string isa_subdir = GetDalvikCacheOrDie(GetInstructionSetString(isa), false);
132 const std::string boot_marker = isa_subdir + "/.booting";
Narayan Kamath5a2be3f2015-02-16 13:51:51 +0000133 const char* file_name = boot_marker.c_str();
Narayan Kamath28bc9872014-11-07 17:46:28 +0000134
Narayan Kamath5a2be3f2015-02-16 13:51:51 +0000135 uint32_t num_failed_boots = 0;
136 std::unique_ptr<File> file(OS::OpenFileReadWrite(file_name));
137 if (file.get() == nullptr) {
138 file.reset(OS::CreateEmptyFile(file_name));
139
140 if (file.get() == nullptr) {
141 PLOG(WARNING) << "Failed to create boot marker.";
142 return;
143 }
144 } else {
145 if (!file->ReadFully(&num_failed_boots, sizeof(num_failed_boots))) {
146 PLOG(WARNING) << "Failed to read boot marker.";
147 file->Erase();
148 return;
149 }
150 }
151
152 if (max_failed_boots != 0 && num_failed_boots > max_failed_boots) {
Narayan Kamath28bc9872014-11-07 17:46:28 +0000153 LOG(WARNING) << "Incomplete boot detected. Pruning dalvik cache";
154 RealPruneDalvikCache(isa_subdir);
155 }
156
Narayan Kamath5a2be3f2015-02-16 13:51:51 +0000157 ++num_failed_boots;
158 VLOG(startup) << "Number of failed boots on : " << boot_marker << " = " << num_failed_boots;
159
160 if (lseek(file->Fd(), 0, SEEK_SET) == -1) {
161 PLOG(WARNING) << "Failed to write boot marker.";
162 file->Erase();
163 return;
164 }
165
166 if (!file->WriteFully(&num_failed_boots, sizeof(num_failed_boots))) {
167 PLOG(WARNING) << "Failed to write boot marker.";
168 file->Erase();
169 return;
170 }
171
172 if (file->FlushCloseOrErase() != 0) {
173 PLOG(WARNING) << "Failed to flush boot marker.";
Narayan Kamath28bc9872014-11-07 17:46:28 +0000174 }
175}
176
Alex Light25396132014-08-27 15:37:23 -0700177static bool GenerateImage(const std::string& image_filename, InstructionSet image_isa,
178 std::string* error_msg) {
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700179 const std::string boot_class_path_string(Runtime::Current()->GetBootClassPathString());
180 std::vector<std::string> boot_class_path;
Ian Rogers6f3dbba2014-10-14 17:41:57 -0700181 Split(boot_class_path_string, ':', &boot_class_path);
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700182 if (boot_class_path.empty()) {
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700183 *error_msg = "Failed to generate image because no boot class path specified";
184 return false;
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700185 }
Alex Light25396132014-08-27 15:37:23 -0700186 // We should clean up so we are more likely to have room for the image.
187 if (Runtime::Current()->IsZygote()) {
Andreas Gampe3c13a792014-09-18 20:56:04 -0700188 LOG(INFO) << "Pruning dalvik-cache since we are generating an image and will need to recompile";
Narayan Kamath28bc9872014-11-07 17:46:28 +0000189 PruneDalvikCache(image_isa);
Alex Light25396132014-08-27 15:37:23 -0700190 }
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700191
Mathieu Chartier8bbc8c02013-07-31 16:27:01 -0700192 std::vector<std::string> arg_vector;
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700193
Tsu Chiang Chuang12e6d742014-05-22 10:22:25 -0700194 std::string dex2oat(Runtime::Current()->GetCompilerExecutable());
Mathieu Chartier08d7d442013-07-31 18:08:51 -0700195 arg_vector.push_back(dex2oat);
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700196
197 std::string image_option_string("--image=");
Narayan Kamath52f84882014-05-02 10:10:39 +0100198 image_option_string += image_filename;
Mathieu Chartier8bbc8c02013-07-31 16:27:01 -0700199 arg_vector.push_back(image_option_string);
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700200
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700201 for (size_t i = 0; i < boot_class_path.size(); i++) {
Mathieu Chartier8bbc8c02013-07-31 16:27:01 -0700202 arg_vector.push_back(std::string("--dex-file=") + boot_class_path[i]);
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700203 }
204
205 std::string oat_file_option_string("--oat-file=");
Brian Carlstrom2f1e15c2014-10-27 16:27:06 -0700206 oat_file_option_string += ImageHeader::GetOatLocationFromImageLocation(image_filename);
Mathieu Chartier8bbc8c02013-07-31 16:27:01 -0700207 arg_vector.push_back(oat_file_option_string);
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700208
Sebastien Hertz0de11332015-05-13 12:14:05 +0200209 // Note: we do not generate a fully debuggable boot image so we do not pass the
210 // compiler flag --debuggable here.
211
Igor Murashkinb1d8c312015-08-04 11:18:43 -0700212 Runtime::Current()->AddCurrentRuntimeFeaturesAsDex2OatArguments(&arg_vector);
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700213 CHECK_EQ(image_isa, kRuntimeISA)
214 << "We should always be generating an image for the current isa.";
Ian Rogers8afeb852014-04-02 14:55:49 -0700215
Alex Lightcf4bf382014-07-24 11:29:14 -0700216 int32_t base_offset = ChooseRelocationOffsetDelta(ART_BASE_ADDRESS_MIN_DELTA,
217 ART_BASE_ADDRESS_MAX_DELTA);
218 LOG(INFO) << "Using an offset of 0x" << std::hex << base_offset << " from default "
219 << "art base address of 0x" << std::hex << ART_BASE_ADDRESS;
220 arg_vector.push_back(StringPrintf("--base=0x%x", ART_BASE_ADDRESS + base_offset));
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700221
Brian Carlstrom57309db2014-07-30 15:13:25 -0700222 if (!kIsTargetBuild) {
Mathieu Chartier8bbc8c02013-07-31 16:27:01 -0700223 arg_vector.push_back("--host");
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700224 }
225
Brian Carlstrom6449c622014-02-10 23:48:36 -0800226 const std::vector<std::string>& compiler_options = Runtime::Current()->GetImageCompilerOptions();
Brian Carlstrom2ec65202014-03-03 15:16:37 -0800227 for (size_t i = 0; i < compiler_options.size(); ++i) {
Brian Carlstrom6449c622014-02-10 23:48:36 -0800228 arg_vector.push_back(compiler_options[i].c_str());
229 }
230
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700231 std::string command_line(Join(arg_vector, ' '));
232 LOG(INFO) << "GenerateImage: " << command_line;
Brian Carlstrom6449c622014-02-10 23:48:36 -0800233 return Exec(arg_vector, error_msg);
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700234}
235
Narayan Kamath52f84882014-05-02 10:10:39 +0100236bool ImageSpace::FindImageFilename(const char* image_location,
237 const InstructionSet image_isa,
Alex Lighta59dd802014-07-02 16:28:08 -0700238 std::string* system_filename,
239 bool* has_system,
240 std::string* cache_filename,
241 bool* dalvik_cache_exists,
Andreas Gampe3c13a792014-09-18 20:56:04 -0700242 bool* has_cache,
243 bool* is_global_cache) {
Alex Lighta59dd802014-07-02 16:28:08 -0700244 *has_system = false;
245 *has_cache = false;
Brian Carlstrom0e12bdc2014-05-14 17:44:28 -0700246 // image_location = /system/framework/boot.art
247 // system_image_location = /system/framework/<image_isa>/boot.art
248 std::string system_image_filename(GetSystemImageFilename(image_location, image_isa));
249 if (OS::FileExists(system_image_filename.c_str())) {
Alex Lighta59dd802014-07-02 16:28:08 -0700250 *system_filename = system_image_filename;
251 *has_system = true;
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700252 }
Narayan Kamath52f84882014-05-02 10:10:39 +0100253
Alex Lighta59dd802014-07-02 16:28:08 -0700254 bool have_android_data = false;
255 *dalvik_cache_exists = false;
256 std::string dalvik_cache;
257 GetDalvikCache(GetInstructionSetString(image_isa), true, &dalvik_cache,
Andreas Gampe3c13a792014-09-18 20:56:04 -0700258 &have_android_data, dalvik_cache_exists, is_global_cache);
Narayan Kamath52f84882014-05-02 10:10:39 +0100259
Alex Lighta59dd802014-07-02 16:28:08 -0700260 if (have_android_data && *dalvik_cache_exists) {
261 // Always set output location even if it does not exist,
262 // so that the caller knows where to create the image.
263 //
264 // image_location = /system/framework/boot.art
265 // *image_filename = /data/dalvik-cache/<image_isa>/boot.art
266 std::string error_msg;
267 if (!GetDalvikCacheFilename(image_location, dalvik_cache.c_str(), cache_filename, &error_msg)) {
268 LOG(WARNING) << error_msg;
269 return *has_system;
270 }
271 *has_cache = OS::FileExists(cache_filename->c_str());
272 }
273 return *has_system || *has_cache;
274}
275
276static bool ReadSpecificImageHeader(const char* filename, ImageHeader* image_header) {
277 std::unique_ptr<File> image_file(OS::OpenFileForReading(filename));
278 if (image_file.get() == nullptr) {
279 return false;
280 }
281 const bool success = image_file->ReadFully(image_header, sizeof(ImageHeader));
282 if (!success || !image_header->IsValid()) {
283 return false;
284 }
285 return true;
286}
287
Alex Light6e183f22014-07-18 14:57:04 -0700288// Relocate the image at image_location to dest_filename and relocate it by a random amount.
289static bool RelocateImage(const char* image_location, const char* dest_filename,
Alex Lighta59dd802014-07-02 16:28:08 -0700290 InstructionSet isa, std::string* error_msg) {
Alex Light25396132014-08-27 15:37:23 -0700291 // We should clean up so we are more likely to have room for the image.
292 if (Runtime::Current()->IsZygote()) {
293 LOG(INFO) << "Pruning dalvik-cache since we are relocating an image and will need to recompile";
Narayan Kamath28bc9872014-11-07 17:46:28 +0000294 PruneDalvikCache(isa);
Alex Light25396132014-08-27 15:37:23 -0700295 }
296
Alex Lighta59dd802014-07-02 16:28:08 -0700297 std::string patchoat(Runtime::Current()->GetPatchoatExecutable());
298
299 std::string input_image_location_arg("--input-image-location=");
300 input_image_location_arg += image_location;
301
302 std::string output_image_filename_arg("--output-image-file=");
303 output_image_filename_arg += dest_filename;
304
305 std::string input_oat_location_arg("--input-oat-location=");
306 input_oat_location_arg += ImageHeader::GetOatLocationFromImageLocation(image_location);
307
308 std::string output_oat_filename_arg("--output-oat-file=");
309 output_oat_filename_arg += ImageHeader::GetOatLocationFromImageLocation(dest_filename);
310
311 std::string instruction_set_arg("--instruction-set=");
312 instruction_set_arg += GetInstructionSetString(isa);
313
314 std::string base_offset_arg("--base-offset-delta=");
315 StringAppendF(&base_offset_arg, "%d", ChooseRelocationOffsetDelta(ART_BASE_ADDRESS_MIN_DELTA,
316 ART_BASE_ADDRESS_MAX_DELTA));
317
318 std::vector<std::string> argv;
319 argv.push_back(patchoat);
320
321 argv.push_back(input_image_location_arg);
322 argv.push_back(output_image_filename_arg);
323
324 argv.push_back(input_oat_location_arg);
325 argv.push_back(output_oat_filename_arg);
326
327 argv.push_back(instruction_set_arg);
328 argv.push_back(base_offset_arg);
329
330 std::string command_line(Join(argv, ' '));
331 LOG(INFO) << "RelocateImage: " << command_line;
332 return Exec(argv, error_msg);
333}
334
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700335static ImageHeader* ReadSpecificImageHeader(const char* filename, std::string* error_msg) {
Alex Lighta59dd802014-07-02 16:28:08 -0700336 std::unique_ptr<ImageHeader> hdr(new ImageHeader);
337 if (!ReadSpecificImageHeader(filename, hdr.get())) {
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700338 *error_msg = StringPrintf("Unable to read image header for %s", filename);
Alex Lighta59dd802014-07-02 16:28:08 -0700339 return nullptr;
340 }
341 return hdr.release();
Narayan Kamath52f84882014-05-02 10:10:39 +0100342}
343
344ImageHeader* ImageSpace::ReadImageHeaderOrDie(const char* image_location,
345 const InstructionSet image_isa) {
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700346 std::string error_msg;
347 ImageHeader* image_header = ReadImageHeader(image_location, image_isa, &error_msg);
348 if (image_header == nullptr) {
349 LOG(FATAL) << error_msg;
350 }
351 return image_header;
352}
353
354ImageHeader* ImageSpace::ReadImageHeader(const char* image_location,
355 const InstructionSet image_isa,
356 std::string* error_msg) {
Alex Lighta59dd802014-07-02 16:28:08 -0700357 std::string system_filename;
358 bool has_system = false;
359 std::string cache_filename;
360 bool has_cache = false;
361 bool dalvik_cache_exists = false;
Andreas Gampe3c13a792014-09-18 20:56:04 -0700362 bool is_global_cache = false;
Alex Lighta59dd802014-07-02 16:28:08 -0700363 if (FindImageFilename(image_location, image_isa, &system_filename, &has_system,
Andreas Gampe3c13a792014-09-18 20:56:04 -0700364 &cache_filename, &dalvik_cache_exists, &has_cache, &is_global_cache)) {
Alex Lighta59dd802014-07-02 16:28:08 -0700365 if (Runtime::Current()->ShouldRelocate()) {
366 if (has_system && has_cache) {
367 std::unique_ptr<ImageHeader> sys_hdr(new ImageHeader);
368 std::unique_ptr<ImageHeader> cache_hdr(new ImageHeader);
369 if (!ReadSpecificImageHeader(system_filename.c_str(), sys_hdr.get())) {
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700370 *error_msg = StringPrintf("Unable to read image header for %s at %s",
371 image_location, system_filename.c_str());
Alex Lighta59dd802014-07-02 16:28:08 -0700372 return nullptr;
373 }
374 if (!ReadSpecificImageHeader(cache_filename.c_str(), cache_hdr.get())) {
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700375 *error_msg = StringPrintf("Unable to read image header for %s at %s",
376 image_location, cache_filename.c_str());
Alex Lighta59dd802014-07-02 16:28:08 -0700377 return nullptr;
378 }
379 if (sys_hdr->GetOatChecksum() != cache_hdr->GetOatChecksum()) {
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700380 *error_msg = StringPrintf("Unable to find a relocated version of image file %s",
381 image_location);
Alex Lighta59dd802014-07-02 16:28:08 -0700382 return nullptr;
383 }
384 return cache_hdr.release();
385 } else if (!has_cache) {
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700386 *error_msg = StringPrintf("Unable to find a relocated version of image file %s",
387 image_location);
Alex Lighta59dd802014-07-02 16:28:08 -0700388 return nullptr;
389 } else if (!has_system && has_cache) {
390 // This can probably just use the cache one.
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700391 return ReadSpecificImageHeader(cache_filename.c_str(), error_msg);
Alex Lighta59dd802014-07-02 16:28:08 -0700392 }
393 } else {
394 // We don't want to relocate, Just pick the appropriate one if we have it and return.
395 if (has_system && has_cache) {
396 // We want the cache if the checksum matches, otherwise the system.
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700397 std::unique_ptr<ImageHeader> system(ReadSpecificImageHeader(system_filename.c_str(),
398 error_msg));
399 std::unique_ptr<ImageHeader> cache(ReadSpecificImageHeader(cache_filename.c_str(),
400 error_msg));
Alex Lighta59dd802014-07-02 16:28:08 -0700401 if (system.get() == nullptr ||
402 (cache.get() != nullptr && cache->GetOatChecksum() == system->GetOatChecksum())) {
403 return cache.release();
404 } else {
405 return system.release();
406 }
407 } else if (has_system) {
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700408 return ReadSpecificImageHeader(system_filename.c_str(), error_msg);
Alex Lighta59dd802014-07-02 16:28:08 -0700409 } else if (has_cache) {
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700410 return ReadSpecificImageHeader(cache_filename.c_str(), error_msg);
Alex Lighta59dd802014-07-02 16:28:08 -0700411 }
Narayan Kamath52f84882014-05-02 10:10:39 +0100412 }
Narayan Kamath52f84882014-05-02 10:10:39 +0100413 }
414
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700415 *error_msg = StringPrintf("Unable to find image file for %s", image_location);
Narayan Kamath52f84882014-05-02 10:10:39 +0100416 return nullptr;
417}
418
Alex Lighta59dd802014-07-02 16:28:08 -0700419static bool ChecksumsMatch(const char* image_a, const char* image_b) {
420 ImageHeader hdr_a;
421 ImageHeader hdr_b;
422 return ReadSpecificImageHeader(image_a, &hdr_a) && ReadSpecificImageHeader(image_b, &hdr_b)
423 && hdr_a.GetOatChecksum() == hdr_b.GetOatChecksum();
424}
425
Andreas Gampe3c13a792014-09-18 20:56:04 -0700426static bool ImageCreationAllowed(bool is_global_cache, std::string* error_msg) {
427 // Anyone can write into a "local" cache.
428 if (!is_global_cache) {
429 return true;
430 }
431
432 // Only the zygote is allowed to create the global boot image.
433 if (Runtime::Current()->IsZygote()) {
434 return true;
435 }
436
437 *error_msg = "Only the zygote can create the global boot image.";
438 return false;
439}
440
Andreas Gampe70be1fb2014-10-31 16:45:19 -0700441static constexpr uint64_t kLowSpaceValue = 50 * MB;
442static constexpr uint64_t kTmpFsSentinelValue = 384 * MB;
443
444// Read the free space of the cache partition and make a decision whether to keep the generated
445// image. This is to try to mitigate situations where the system might run out of space later.
446static bool CheckSpace(const std::string& cache_filename, std::string* error_msg) {
447 // Using statvfs vs statvfs64 because of b/18207376, and it is enough for all practical purposes.
448 struct statvfs buf;
449
450 int res = TEMP_FAILURE_RETRY(statvfs(cache_filename.c_str(), &buf));
451 if (res != 0) {
452 // Could not stat. Conservatively tell the system to delete the image.
453 *error_msg = "Could not stat the filesystem, assuming low-memory situation.";
454 return false;
455 }
456
457 uint64_t fs_overall_size = buf.f_bsize * static_cast<uint64_t>(buf.f_blocks);
458 // Zygote is privileged, but other things are not. Use bavail.
459 uint64_t fs_free_size = buf.f_bsize * static_cast<uint64_t>(buf.f_bavail);
460
461 // Take the overall size as an indicator for a tmpfs, which is being used for the decryption
462 // environment. We do not want to fail quickening the boot image there, as it is beneficial
463 // for time-to-UI.
464 if (fs_overall_size > kTmpFsSentinelValue) {
465 if (fs_free_size < kLowSpaceValue) {
466 *error_msg = StringPrintf("Low-memory situation: only %4.2f megabytes available after image"
467 " generation, need at least %" PRIu64 ".",
468 static_cast<double>(fs_free_size) / MB,
469 kLowSpaceValue / MB);
470 return false;
471 }
472 }
473 return true;
474}
475
Narayan Kamath52f84882014-05-02 10:10:39 +0100476ImageSpace* ImageSpace::Create(const char* image_location,
Alex Light64ad14d2014-08-19 14:23:13 -0700477 const InstructionSet image_isa,
Jeff Haodcdc85b2015-12-04 14:06:18 -0800478 bool secondary_image,
Alex Light64ad14d2014-08-19 14:23:13 -0700479 std::string* error_msg) {
Alex Lighta59dd802014-07-02 16:28:08 -0700480 std::string system_filename;
481 bool has_system = false;
482 std::string cache_filename;
483 bool has_cache = false;
484 bool dalvik_cache_exists = false;
Andreas Gampe3c13a792014-09-18 20:56:04 -0700485 bool is_global_cache = true;
Alex Lighta59dd802014-07-02 16:28:08 -0700486 const bool found_image = FindImageFilename(image_location, image_isa, &system_filename,
487 &has_system, &cache_filename, &dalvik_cache_exists,
Andreas Gampe3c13a792014-09-18 20:56:04 -0700488 &has_cache, &is_global_cache);
Narayan Kamathd1c606f2014-06-09 16:50:19 +0100489
Jeff Haodcdc85b2015-12-04 14:06:18 -0800490 if (Runtime::Current()->IsZygote() && !secondary_image) {
Narayan Kamath5a2be3f2015-02-16 13:51:51 +0000491 MarkZygoteStart(image_isa, Runtime::Current()->GetZygoteMaxFailedBoots());
Narayan Kamath28bc9872014-11-07 17:46:28 +0000492 }
493
Alex Lighta59dd802014-07-02 16:28:08 -0700494 ImageSpace* space;
495 bool relocate = Runtime::Current()->ShouldRelocate();
Alex Light64ad14d2014-08-19 14:23:13 -0700496 bool can_compile = Runtime::Current()->IsImageDex2OatEnabled();
Narayan Kamathd1c606f2014-06-09 16:50:19 +0100497 if (found_image) {
Alex Lighta59dd802014-07-02 16:28:08 -0700498 const std::string* image_filename;
499 bool is_system = false;
500 bool relocated_version_used = false;
501 if (relocate) {
Alex Light64ad14d2014-08-19 14:23:13 -0700502 if (!dalvik_cache_exists) {
503 *error_msg = StringPrintf("Requiring relocation for image '%s' at '%s' but we do not have "
504 "any dalvik_cache to find/place it in.",
505 image_location, system_filename.c_str());
506 return nullptr;
507 }
Alex Lighta59dd802014-07-02 16:28:08 -0700508 if (has_system) {
509 if (has_cache && ChecksumsMatch(system_filename.c_str(), cache_filename.c_str())) {
510 // We already have a relocated version
511 image_filename = &cache_filename;
512 relocated_version_used = true;
513 } else {
514 // We cannot have a relocated version, Relocate the system one and use it.
Andreas Gampe3c13a792014-09-18 20:56:04 -0700515
516 std::string reason;
517 bool success;
518
519 // Check whether we are allowed to relocate.
520 if (!can_compile) {
521 reason = "Image dex2oat disabled by -Xnoimage-dex2oat.";
522 success = false;
523 } else if (!ImageCreationAllowed(is_global_cache, &reason)) {
524 // Whether we can write to the cache.
525 success = false;
Andreas Gampe8994a042015-12-30 19:03:17 +0000526 } else if (secondary_image) {
527 reason = "Should not have to patch secondary image.";
528 success = false;
Andreas Gampe3c13a792014-09-18 20:56:04 -0700529 } else {
530 // Try to relocate.
531 success = RelocateImage(image_location, cache_filename.c_str(), image_isa, &reason);
532 }
533
534 if (success) {
Alex Lighta59dd802014-07-02 16:28:08 -0700535 relocated_version_used = true;
536 image_filename = &cache_filename;
537 } else {
Andreas Gampe3c13a792014-09-18 20:56:04 -0700538 *error_msg = StringPrintf("Unable to relocate image '%s' from '%s' to '%s': %s",
Alex Light64ad14d2014-08-19 14:23:13 -0700539 image_location, system_filename.c_str(),
540 cache_filename.c_str(), reason.c_str());
Brian Carlstrome9105f72014-10-28 15:53:43 -0700541 // We failed to create files, remove any possibly garbage output.
542 // Since ImageCreationAllowed was true above, we are the zygote
543 // and therefore the only process expected to generate these for
544 // the device.
Narayan Kamath28bc9872014-11-07 17:46:28 +0000545 PruneDalvikCache(image_isa);
Alex Lighta59dd802014-07-02 16:28:08 -0700546 return nullptr;
547 }
548 }
549 } else {
550 CHECK(has_cache);
551 // We can just use cache's since it should be fine. This might or might not be relocated.
552 image_filename = &cache_filename;
553 }
554 } else {
555 if (has_system && has_cache) {
556 // Check they have the same cksum. If they do use the cache. Otherwise system.
557 if (ChecksumsMatch(system_filename.c_str(), cache_filename.c_str())) {
558 image_filename = &cache_filename;
559 relocated_version_used = true;
560 } else {
561 image_filename = &system_filename;
Alex Light1a762132014-07-31 09:32:13 -0700562 is_system = true;
Alex Lighta59dd802014-07-02 16:28:08 -0700563 }
564 } else if (has_system) {
565 image_filename = &system_filename;
Alex Light1a762132014-07-31 09:32:13 -0700566 is_system = true;
Alex Lighta59dd802014-07-02 16:28:08 -0700567 } else {
568 CHECK(has_cache);
569 image_filename = &cache_filename;
570 }
571 }
572 {
573 // Note that we must not use the file descriptor associated with
574 // ScopedFlock::GetFile to Init the image file. We want the file
575 // descriptor (and the associated exclusive lock) to be released when
576 // we leave Create.
577 ScopedFlock image_lock;
Alex Light64ad14d2014-08-19 14:23:13 -0700578 image_lock.Init(image_filename->c_str(), error_msg);
Alex Lightb6cabc12014-08-21 09:45:00 -0700579 VLOG(startup) << "Using image file " << image_filename->c_str() << " for image location "
580 << image_location;
Alex Lightb93637a2014-07-31 10:48:46 -0700581 // If we are in /system we can assume the image is good. We can also
582 // assume this if we are using a relocated image (i.e. image checksum
583 // matches) since this is only different by the offset. We need this to
584 // make sure that host tests continue to work.
Alex Lighta59dd802014-07-02 16:28:08 -0700585 space = ImageSpace::Init(image_filename->c_str(), image_location,
Alex Light64ad14d2014-08-19 14:23:13 -0700586 !(is_system || relocated_version_used), error_msg);
Alex Lighta59dd802014-07-02 16:28:08 -0700587 }
Narayan Kamath52f84882014-05-02 10:10:39 +0100588 if (space != nullptr) {
589 return space;
590 }
591
Alex Lighta59dd802014-07-02 16:28:08 -0700592 if (relocated_version_used) {
Brian Carlstrome9105f72014-10-28 15:53:43 -0700593 // Something is wrong with the relocated copy (even though checksums match). Cleanup.
594 // This can happen if the .oat is corrupt, since the above only checks the .art checksums.
595 // TODO: Check the oat file validity earlier.
596 *error_msg = StringPrintf("Attempted to use relocated version of %s at %s generated from %s "
597 "but image failed to load: %s",
598 image_location, cache_filename.c_str(), system_filename.c_str(),
599 error_msg->c_str());
Narayan Kamath28bc9872014-11-07 17:46:28 +0000600 PruneDalvikCache(image_isa);
Alex Lighta59dd802014-07-02 16:28:08 -0700601 return nullptr;
602 } else if (is_system) {
Brian Carlstrome9105f72014-10-28 15:53:43 -0700603 // If the /system file exists, it should be up-to-date, don't try to generate it.
Alex Light64ad14d2014-08-19 14:23:13 -0700604 *error_msg = StringPrintf("Failed to load /system image '%s': %s",
605 image_filename->c_str(), error_msg->c_str());
Narayan Kamath52f84882014-05-02 10:10:39 +0100606 return nullptr;
Mathieu Chartierc7cb1902014-03-05 14:41:03 -0800607 } else {
Brian Carlstrome9105f72014-10-28 15:53:43 -0700608 // Otherwise, log a warning and fall through to GenerateImage.
Alex Light64ad14d2014-08-19 14:23:13 -0700609 LOG(WARNING) << *error_msg;
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700610 }
611 }
Narayan Kamath52f84882014-05-02 10:10:39 +0100612
Alex Light64ad14d2014-08-19 14:23:13 -0700613 if (!can_compile) {
614 *error_msg = "Not attempting to compile image because -Xnoimage-dex2oat";
615 return nullptr;
616 } else if (!dalvik_cache_exists) {
617 *error_msg = StringPrintf("No place to put generated image.");
618 return nullptr;
Andreas Gampe3c13a792014-09-18 20:56:04 -0700619 } else if (!ImageCreationAllowed(is_global_cache, error_msg)) {
620 return nullptr;
Andreas Gampe8994a042015-12-30 19:03:17 +0000621 } else if (secondary_image) {
622 *error_msg = "Cannot compile a secondary image.";
623 return nullptr;
Alex Light25396132014-08-27 15:37:23 -0700624 } else if (!GenerateImage(cache_filename, image_isa, error_msg)) {
Alex Light64ad14d2014-08-19 14:23:13 -0700625 *error_msg = StringPrintf("Failed to generate image '%s': %s",
626 cache_filename.c_str(), error_msg->c_str());
Brian Carlstrome9105f72014-10-28 15:53:43 -0700627 // We failed to create files, remove any possibly garbage output.
628 // Since ImageCreationAllowed was true above, we are the zygote
629 // and therefore the only process expected to generate these for
630 // the device.
Narayan Kamath28bc9872014-11-07 17:46:28 +0000631 PruneDalvikCache(image_isa);
Alex Light64ad14d2014-08-19 14:23:13 -0700632 return nullptr;
633 } else {
Andreas Gampe70be1fb2014-10-31 16:45:19 -0700634 // Check whether there is enough space left over after we have generated the image.
635 if (!CheckSpace(cache_filename, error_msg)) {
636 // No. Delete the generated image and try to run out of the dex files.
Narayan Kamath28bc9872014-11-07 17:46:28 +0000637 PruneDalvikCache(image_isa);
Andreas Gampe70be1fb2014-10-31 16:45:19 -0700638 return nullptr;
639 }
640
Alex Lighta59dd802014-07-02 16:28:08 -0700641 // Note that we must not use the file descriptor associated with
642 // ScopedFlock::GetFile to Init the image file. We want the file
643 // descriptor (and the associated exclusive lock) to be released when
644 // we leave Create.
645 ScopedFlock image_lock;
Alex Light64ad14d2014-08-19 14:23:13 -0700646 image_lock.Init(cache_filename.c_str(), error_msg);
647 space = ImageSpace::Init(cache_filename.c_str(), image_location, true, error_msg);
648 if (space == nullptr) {
649 *error_msg = StringPrintf("Failed to load generated image '%s': %s",
650 cache_filename.c_str(), error_msg->c_str());
651 }
652 return space;
Alex Lighta59dd802014-07-02 16:28:08 -0700653 }
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700654}
655
Mathieu Chartier31e89252013-08-28 11:29:12 -0700656void ImageSpace::VerifyImageAllocations() {
Ian Rogers13735952014-10-08 12:43:28 -0700657 uint8_t* current = Begin() + RoundUp(sizeof(ImageHeader), kObjectAlignment);
Mathieu Chartier31e89252013-08-28 11:29:12 -0700658 while (current < End()) {
Mathieu Chartierc7853442015-03-27 14:35:38 -0700659 CHECK_ALIGNED(current, kObjectAlignment);
660 auto* obj = reinterpret_cast<mirror::Object*>(current);
Mathieu Chartier31e89252013-08-28 11:29:12 -0700661 CHECK(obj->GetClass() != nullptr) << "Image object at address " << obj << " has null class";
Mathieu Chartierc7853442015-03-27 14:35:38 -0700662 CHECK(live_bitmap_->Test(obj)) << PrettyTypeOf(obj);
Hiroshi Yamauchi624468c2014-03-31 15:14:47 -0700663 if (kUseBakerOrBrooksReadBarrier) {
664 obj->AssertReadBarrierPointer();
Hiroshi Yamauchi9d04a202014-01-31 13:35:49 -0800665 }
Mathieu Chartier31e89252013-08-28 11:29:12 -0700666 current += RoundUp(obj->SizeOf(), kObjectAlignment);
667 }
668}
669
Narayan Kamath52f84882014-05-02 10:10:39 +0100670ImageSpace* ImageSpace::Init(const char* image_filename, const char* image_location,
671 bool validate_oat_file, std::string* error_msg) {
672 CHECK(image_filename != nullptr);
673 CHECK(image_location != nullptr);
Ian Rogers1d54e732013-05-02 21:10:01 -0700674
675 uint64_t start_time = 0;
676 if (VLOG_IS_ON(heap) || VLOG_IS_ON(startup)) {
677 start_time = NanoTime();
Narayan Kamath52f84882014-05-02 10:10:39 +0100678 LOG(INFO) << "ImageSpace::Init entering image_filename=" << image_filename;
Ian Rogers1d54e732013-05-02 21:10:01 -0700679 }
680
Ian Rogers700a4022014-05-19 16:49:03 -0700681 std::unique_ptr<File> file(OS::OpenFileForReading(image_filename));
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700682 if (file.get() == nullptr) {
Narayan Kamath52f84882014-05-02 10:10:39 +0100683 *error_msg = StringPrintf("Failed to open '%s'", image_filename);
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700684 return nullptr;
Ian Rogers1d54e732013-05-02 21:10:01 -0700685 }
686 ImageHeader image_header;
687 bool success = file->ReadFully(&image_header, sizeof(image_header));
688 if (!success || !image_header.IsValid()) {
Narayan Kamath52f84882014-05-02 10:10:39 +0100689 *error_msg = StringPrintf("Invalid image header in '%s'", image_filename);
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700690 return nullptr;
Ian Rogers1d54e732013-05-02 21:10:01 -0700691 }
Mathieu Chartierceb07b32015-12-10 09:33:21 -0800692 // Check that the file is larger or equal to the header size + data size.
693 const uint64_t image_file_size = static_cast<uint64_t>(file->GetLength());
694 if (image_file_size < sizeof(ImageHeader) + image_header.GetDataSize()) {
695 *error_msg = StringPrintf("Image file truncated: %" PRIu64 " vs. %" PRIu64 ".",
696 image_file_size,
697 image_header.GetDataSize());
Andreas Gampe6c8b49f2015-02-19 11:42:36 -0800698 return nullptr;
699 }
Mathieu Chartiere401d142015-04-22 13:56:20 -0700700
Jeff Haodcdc85b2015-12-04 14:06:18 -0800701 if (VLOG_IS_ON(startup)) {
Mathieu Chartiere401d142015-04-22 13:56:20 -0700702 LOG(INFO) << "Dumping image sections";
703 for (size_t i = 0; i < ImageHeader::kSectionCount; ++i) {
704 const auto section_idx = static_cast<ImageHeader::ImageSections>(i);
705 auto& section = image_header.GetImageSection(section_idx);
706 LOG(INFO) << section_idx << " start="
Mathieu Chartierd39645e2015-06-09 17:50:29 -0700707 << reinterpret_cast<void*>(image_header.GetImageBegin() + section.Offset()) << " "
Mathieu Chartiere401d142015-04-22 13:56:20 -0700708 << section;
709 }
710 }
711
712 const auto& bitmap_section = image_header.GetImageSection(ImageHeader::kSectionImageBitmap);
Mathieu Chartierceb07b32015-12-10 09:33:21 -0800713 // The location we want to map from is the first aligned page after the end of the stored
714 // (possibly compressed) data.
715 const size_t image_bitmap_offset = RoundUp(sizeof(image_header) + image_header.GetDataSize(),
716 kPageSize);
717 const size_t end_of_bitmap = image_bitmap_offset + bitmap_section.Size();
Mathieu Chartierc7853442015-03-27 14:35:38 -0700718 if (end_of_bitmap != image_file_size) {
719 *error_msg = StringPrintf(
720 "Image file size does not equal end of bitmap: size=%" PRIu64 " vs. %zu.", image_file_size,
721 end_of_bitmap);
Andreas Gampe6c8b49f2015-02-19 11:42:36 -0800722 return nullptr;
723 }
724
Mathieu Chartier31e89252013-08-28 11:29:12 -0700725 // Note: The image header is part of the image due to mmap page alignment required of offset.
Mathieu Chartierceb07b32015-12-10 09:33:21 -0800726 std::unique_ptr<MemMap> map;
727 if (image_header.GetStorageMode() == ImageHeader::kStorageModeUncompressed) {
728 map.reset(MemMap::MapFileAtAddress(image_header.GetImageBegin(),
729 image_header.GetImageSize(),
730 PROT_READ | PROT_WRITE,
731 MAP_PRIVATE,
732 file->Fd(),
733 0,
734 /*low_4gb*/false,
735 /*reuse*/false,
736 image_filename,
737 error_msg));
738 } else {
739 // Reserve output and decompress into it.
740 map.reset(MemMap::MapAnonymous(image_location,
741 image_header.GetImageBegin(),
742 image_header.GetImageSize(),
743 PROT_READ | PROT_WRITE,
744 /*low_4gb*/false,
745 /*reuse*/false,
746 error_msg));
747 if (map != nullptr) {
748 const size_t stored_size = image_header.GetDataSize();
749 const size_t write_offset = sizeof(image_header); // Skip the header.
750 std::unique_ptr<MemMap> temp_map(MemMap::MapFile(sizeof(ImageHeader) + stored_size,
751 PROT_READ,
Mathieu Chartier42bddce2015-11-09 15:16:56 -0800752 MAP_PRIVATE,
753 file->Fd(),
Mathieu Chartierceb07b32015-12-10 09:33:21 -0800754 /*offset*/0,
Mathieu Chartier42bddce2015-11-09 15:16:56 -0800755 /*low_4gb*/false,
Mathieu Chartier42bddce2015-11-09 15:16:56 -0800756 image_filename,
757 error_msg));
Mathieu Chartierceb07b32015-12-10 09:33:21 -0800758 if (temp_map == nullptr) {
759 DCHECK(!error_msg->empty());
760 return nullptr;
761 }
762 memcpy(map->Begin(), &image_header, sizeof(image_header));
763 const uint64_t start = NanoTime();
764 const size_t decompressed_size = LZ4_decompress_safe(
765 reinterpret_cast<char*>(temp_map->Begin()) + sizeof(ImageHeader),
766 reinterpret_cast<char*>(map->Begin()) + write_offset,
767 stored_size,
768 map->Size());
769 // TODO: VLOG(image)
770 VLOG(class_linker) << "Decompressing image took " << PrettyDuration(NanoTime() - start);
771 if (decompressed_size + sizeof(ImageHeader) != image_header.GetImageSize()) {
772 *error_msg = StringPrintf("Decompressed size does not match expected image size %zu vs %zu",
773 decompressed_size + sizeof(ImageHeader),
774 image_header.GetImageSize());
775 return nullptr;
776 }
777 }
778 }
779
Mathieu Chartier42bddce2015-11-09 15:16:56 -0800780 if (map == nullptr) {
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700781 DCHECK(!error_msg->empty());
782 return nullptr;
Ian Rogers1d54e732013-05-02 21:10:01 -0700783 }
784 CHECK_EQ(image_header.GetImageBegin(), map->Begin());
785 DCHECK_EQ(0, memcmp(&image_header, map->Begin(), sizeof(ImageHeader)));
786
Mathieu Chartierceb07b32015-12-10 09:33:21 -0800787 std::unique_ptr<MemMap> image_bitmap_map(MemMap::MapFileAtAddress(nullptr,
788 bitmap_section.Size(),
789 PROT_READ, MAP_PRIVATE,
790 file->Fd(),
791 image_bitmap_offset,
792 /*low_4gb*/false,
793 /*reuse*/false,
794 image_filename,
795 error_msg));
796 if (image_bitmap_map == nullptr) {
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700797 *error_msg = StringPrintf("Failed to map image bitmap: %s", error_msg->c_str());
798 return nullptr;
799 }
Ian Rogers3e5cf302014-05-20 16:40:37 -0700800 uint32_t bitmap_index = bitmap_index_.FetchAndAddSequentiallyConsistent(1);
Narayan Kamath52f84882014-05-02 10:10:39 +0100801 std::string bitmap_name(StringPrintf("imagespace %s live-bitmap %u", image_filename,
Mathieu Chartier31e89252013-08-28 11:29:12 -0700802 bitmap_index));
Ian Rogers700a4022014-05-19 16:49:03 -0700803 std::unique_ptr<accounting::ContinuousSpaceBitmap> bitmap(
Mathieu Chartierd39645e2015-06-09 17:50:29 -0700804 accounting::ContinuousSpaceBitmap::CreateFromMemMap(
Mathieu Chartierceb07b32015-12-10 09:33:21 -0800805 bitmap_name,
806 image_bitmap_map.release(),
807 reinterpret_cast<uint8_t*>(map->Begin()),
Mathieu Chartierd39645e2015-06-09 17:50:29 -0700808 accounting::ContinuousSpaceBitmap::ComputeHeapSize(bitmap_section.Size())));
Mathieu Chartierceb07b32015-12-10 09:33:21 -0800809 if (bitmap == nullptr) {
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700810 *error_msg = StringPrintf("Could not create bitmap '%s'", bitmap_name.c_str());
811 return nullptr;
812 }
Mathieu Chartier31e89252013-08-28 11:29:12 -0700813
Jeff Haodcdc85b2015-12-04 14:06:18 -0800814 // In case of multi-images, the images are spaced apart so that the bitmaps don't overlap. We
815 // need to reserve the slack, as otherwise the large object space might allocate in there.
816 // TODO: Reconsider the multi-image layout. b/26317072
817 std::unique_ptr<MemMap> shadow_map;
818 {
819 uintptr_t image_begin = reinterpret_cast<uintptr_t>(image_header.GetImageBegin());
820 uintptr_t image_end = RoundUp(image_begin + image_header.GetImageSize(), kPageSize);
821 uintptr_t oat_begin = reinterpret_cast<uintptr_t>(image_header.GetOatFileBegin());
822 if (image_end < oat_begin) {
823 // There's a gap. Could be multi-image, could be the oat file spaced apart. Go ahead and
824 // dummy-reserve the space covered by the bitmap (which will be a shadow that introduces
825 // a gap to the next image).
826 uintptr_t heap_size = bitmap->HeapSize();
827 uintptr_t bitmap_coverage_end = RoundUp(image_begin + heap_size, kPageSize);
828 if (bitmap_coverage_end > image_end) {
829 VLOG(startup) << "Reserving bitmap shadow ["
830 << std::hex << image_end << ";"
831 << std::hex << bitmap_coverage_end << ";] (oat file begins at "
832 << std::hex << oat_begin;
833 // Note: we cannot use MemMap::Dummy here, as that won't reserve the space in 32-bit mode.
834 shadow_map.reset(MemMap::MapAnonymous("Image bitmap shadow",
835 reinterpret_cast<uint8_t*>(image_end),
836 bitmap_coverage_end - image_end,
837 PROT_NONE,
838 false,
839 false,
840 error_msg));
841 if (shadow_map == nullptr) {
842 return nullptr;
843 }
844 // madvise it away, we don't really want it, just reserve the address space.
845 // TODO: Should we use MadviseDontNeedAndZero? b/26317072
846 madvise(shadow_map->BaseBegin(), shadow_map->BaseSize(), MADV_DONTNEED);
847 }
848 }
849 }
850
Mathieu Chartiere401d142015-04-22 13:56:20 -0700851 // We only want the mirror object, not the ArtFields and ArtMethods.
852 uint8_t* const image_end =
853 map->Begin() + image_header.GetImageSection(ImageHeader::kSectionObjects).End();
Jeff Haodcdc85b2015-12-04 14:06:18 -0800854 std::unique_ptr<ImageSpace> space(new ImageSpace(image_filename,
855 image_location,
856 map.release(),
857 bitmap.release(),
858 image_end,
859 shadow_map.release()));
Hiroshi Yamauchibd0fb612014-05-20 13:46:00 -0700860
861 // VerifyImageAllocations() will be called later in Runtime::Init()
862 // as some class roots like ArtMethod::java_lang_reflect_ArtMethod_
863 // and ArtField::java_lang_reflect_ArtField_, which are used from
864 // Object::SizeOf() which VerifyImageAllocations() calls, are not
865 // set yet at this point.
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700866
Narayan Kamath52f84882014-05-02 10:10:39 +0100867 space->oat_file_.reset(space->OpenOatFile(image_filename, error_msg));
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700868 if (space->oat_file_.get() == nullptr) {
869 DCHECK(!error_msg->empty());
870 return nullptr;
Ian Rogers1d54e732013-05-02 21:10:01 -0700871 }
Andreas Gampe88da3b02015-06-12 20:38:49 -0700872 space->oat_file_non_owned_ = space->oat_file_.get();
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700873
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700874 if (validate_oat_file && !space->ValidateOatFile(error_msg)) {
875 DCHECK(!error_msg->empty());
876 return nullptr;
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700877 }
878
Vladimir Marko7624d252014-05-02 14:40:15 +0100879 Runtime* runtime = Runtime::Current();
880 runtime->SetInstructionSet(space->oat_file_->GetOatHeader().GetInstructionSet());
881
Jeff Haodcdc85b2015-12-04 14:06:18 -0800882 if (!runtime->HasResolutionMethod()) {
883 runtime->SetResolutionMethod(image_header.GetImageMethod(ImageHeader::kResolutionMethod));
884 runtime->SetImtConflictMethod(image_header.GetImageMethod(ImageHeader::kImtConflictMethod));
885 runtime->SetImtUnimplementedMethod(
886 image_header.GetImageMethod(ImageHeader::kImtUnimplementedMethod));
887 runtime->SetCalleeSaveMethod(
888 image_header.GetImageMethod(ImageHeader::kCalleeSaveMethod), Runtime::kSaveAll);
889 runtime->SetCalleeSaveMethod(
890 image_header.GetImageMethod(ImageHeader::kRefsOnlySaveMethod), Runtime::kRefsOnly);
891 runtime->SetCalleeSaveMethod(
892 image_header.GetImageMethod(ImageHeader::kRefsAndArgsSaveMethod), Runtime::kRefsAndArgs);
893 }
Vladimir Marko7624d252014-05-02 14:40:15 +0100894
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700895 if (VLOG_IS_ON(heap) || VLOG_IS_ON(startup)) {
896 LOG(INFO) << "ImageSpace::Init exiting (" << PrettyDuration(NanoTime() - start_time)
897 << ") " << *space.get();
898 }
899 return space.release();
900}
901
Nicolas Geoffray9583fbc2014-02-28 15:21:07 +0000902OatFile* ImageSpace::OpenOatFile(const char* image_path, std::string* error_msg) const {
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700903 const ImageHeader& image_header = GetImageHeader();
Nicolas Geoffray9583fbc2014-02-28 15:21:07 +0000904 std::string oat_filename = ImageHeader::GetOatLocationFromImageLocation(image_path);
905
Igor Murashkin46774762014-10-22 11:37:02 -0700906 CHECK(image_header.GetOatDataBegin() != nullptr);
907
Mathieu Chartierf9c6fc62015-10-07 11:44:05 -0700908 OatFile* oat_file = OatFile::Open(oat_filename,
909 oat_filename,
910 image_header.GetOatDataBegin(),
Igor Murashkin46774762014-10-22 11:37:02 -0700911 image_header.GetOatFileBegin(),
Richard Uhlere5fed032015-03-18 08:21:11 -0700912 !Runtime::Current()->IsAotCompiler(),
Mathieu Chartierf9c6fc62015-10-07 11:44:05 -0700913 nullptr,
914 error_msg);
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700915 if (oat_file == nullptr) {
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700916 *error_msg = StringPrintf("Failed to open oat file '%s' referenced from image %s: %s",
917 oat_filename.c_str(), GetName(), error_msg->c_str());
918 return nullptr;
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700919 }
920 uint32_t oat_checksum = oat_file->GetOatHeader().GetChecksum();
921 uint32_t image_oat_checksum = image_header.GetOatChecksum();
922 if (oat_checksum != image_oat_checksum) {
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700923 *error_msg = StringPrintf("Failed to match oat file checksum 0x%x to expected oat checksum 0x%x"
924 " in image %s", oat_checksum, image_oat_checksum, GetName());
925 return nullptr;
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700926 }
Alex Lighta59dd802014-07-02 16:28:08 -0700927 int32_t image_patch_delta = image_header.GetPatchDelta();
928 int32_t oat_patch_delta = oat_file->GetOatHeader().GetImagePatchDelta();
Igor Murashkin46774762014-10-22 11:37:02 -0700929 if (oat_patch_delta != image_patch_delta && !image_header.CompilePic()) {
Alex Lighta59dd802014-07-02 16:28:08 -0700930 // We should have already relocated by this point. Bail out.
931 *error_msg = StringPrintf("Failed to match oat file patch delta %d to expected patch delta %d "
932 "in image %s", oat_patch_delta, image_patch_delta, GetName());
933 return nullptr;
934 }
935
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700936 return oat_file;
937}
938
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700939bool ImageSpace::ValidateOatFile(std::string* error_msg) const {
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700940 CHECK(oat_file_.get() != nullptr);
Mathieu Chartier31e89252013-08-28 11:29:12 -0700941 for (const OatFile::OatDexFile* oat_dex_file : oat_file_->GetOatDexFiles()) {
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700942 const std::string& dex_file_location = oat_dex_file->GetDexFileLocation();
943 uint32_t dex_file_location_checksum;
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700944 if (!DexFile::GetChecksum(dex_file_location.c_str(), &dex_file_location_checksum, error_msg)) {
945 *error_msg = StringPrintf("Failed to get checksum of dex file '%s' referenced by image %s: "
946 "%s", dex_file_location.c_str(), GetName(), error_msg->c_str());
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700947 return false;
948 }
949 if (dex_file_location_checksum != oat_dex_file->GetDexFileLocationChecksum()) {
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700950 *error_msg = StringPrintf("ValidateOatFile found checksum mismatch between oat file '%s' and "
951 "dex file '%s' (0x%x != 0x%x)",
952 oat_file_->GetLocation().c_str(), dex_file_location.c_str(),
953 oat_dex_file->GetDexFileLocationChecksum(),
954 dex_file_location_checksum);
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700955 return false;
956 }
957 }
958 return true;
959}
960
Andreas Gampe22f8e5c2014-07-09 11:38:21 -0700961const OatFile* ImageSpace::GetOatFile() const {
Andreas Gampe88da3b02015-06-12 20:38:49 -0700962 return oat_file_non_owned_;
Andreas Gampe22f8e5c2014-07-09 11:38:21 -0700963}
964
Mathieu Chartierf9c6fc62015-10-07 11:44:05 -0700965std::unique_ptr<const OatFile> ImageSpace::ReleaseOatFile() {
966 CHECK(oat_file_ != nullptr);
967 return std::move(oat_file_);
Ian Rogers1d54e732013-05-02 21:10:01 -0700968}
969
Ian Rogers1d54e732013-05-02 21:10:01 -0700970void ImageSpace::Dump(std::ostream& os) const {
971 os << GetType()
Mathieu Chartier590fee92013-09-13 13:46:47 -0700972 << " begin=" << reinterpret_cast<void*>(Begin())
Ian Rogers1d54e732013-05-02 21:10:01 -0700973 << ",end=" << reinterpret_cast<void*>(End())
974 << ",size=" << PrettySize(Size())
975 << ",name=\"" << GetName() << "\"]";
976}
977
Andreas Gampe8994a042015-12-30 19:03:17 +0000978void ImageSpace::CreateMultiImageLocations(const std::string& input_image_file_name,
979 const std::string& boot_classpath,
980 std::vector<std::string>* image_file_names) {
981 DCHECK(image_file_names != nullptr);
982
983 std::vector<std::string> images;
984 Split(boot_classpath, ':', &images);
985
986 // Add the rest into the list. We have to adjust locations, possibly:
987 //
988 // For example, image_file_name is /a/b/c/d/e.art
989 // images[0] is f/c/d/e.art
990 // ----------------------------------------------
991 // images[1] is g/h/i/j.art -> /a/b/h/i/j.art
992
993 // Derive pattern.
994 std::vector<std::string> left;
995 Split(input_image_file_name, '/', &left);
996 std::vector<std::string> right;
997 Split(images[0], '/', &right);
998
999 size_t common = 1;
1000 while (common < left.size() && common < right.size()) {
1001 if (left[left.size() - common - 1] != right[right.size() - common - 1]) {
1002 break;
1003 }
1004 common++;
1005 }
1006
1007 std::vector<std::string> prefix_vector(left.begin(), left.end() - common);
1008 std::string common_prefix = Join(prefix_vector, '/');
1009 if (!common_prefix.empty() && common_prefix[0] != '/' && input_image_file_name[0] == '/') {
1010 common_prefix = "/" + common_prefix;
1011 }
1012
1013 // Apply pattern to images[1] .. images[n].
1014 for (size_t i = 1; i < images.size(); ++i) {
1015 std::string image = images[i];
1016
1017 size_t rslash = std::string::npos;
1018 for (size_t j = 0; j < common; ++j) {
1019 if (rslash != std::string::npos) {
1020 rslash--;
1021 }
1022
1023 rslash = image.rfind('/', rslash);
1024 if (rslash == std::string::npos) {
1025 rslash = 0;
1026 }
1027 if (rslash == 0) {
1028 break;
1029 }
1030 }
1031 std::string image_part = image.substr(rslash);
1032
1033 std::string new_image = common_prefix + (StartsWith(image_part, "/") ? "" : "/") +
1034 image_part;
1035 image_file_names->push_back(new_image);
1036 }
1037}
1038
Ian Rogers1d54e732013-05-02 21:10:01 -07001039} // namespace space
1040} // namespace gc
1041} // namespace art