blob: f03ea31098d99432f382bdd602d9937fad3d4d91 [file] [log] [blame]
Ian Rogers1d54e732013-05-02 21:10:01 -07001/*
2 * Copyright (C) 2011 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include "image_space.h"
18
Alex Light25396132014-08-27 15:37:23 -070019#include <dirent.h>
Andreas Gampe70be1fb2014-10-31 16:45:19 -070020#include <sys/statvfs.h>
Alex Light25396132014-08-27 15:37:23 -070021#include <sys/types.h>
22
Alex Lighta59dd802014-07-02 16:28:08 -070023#include <random>
24
Ian Rogersc7dd2952014-10-21 23:31:19 -070025#include "base/macros.h"
Brian Carlstrom56d947f2013-07-15 13:14:23 -070026#include "base/stl_util.h"
Ian Rogers1d54e732013-05-02 21:10:01 -070027#include "base/unix_file/fd_file.h"
Narayan Kamathd1c606f2014-06-09 16:50:19 +010028#include "base/scoped_flock.h"
Ian Rogers1d54e732013-05-02 21:10:01 -070029#include "gc/accounting/space_bitmap-inl.h"
Brian Carlstromea46f952013-07-30 01:26:50 -070030#include "mirror/art_method.h"
Ian Rogers1d54e732013-05-02 21:10:01 -070031#include "mirror/class-inl.h"
32#include "mirror/object-inl.h"
Brian Carlstrom56d947f2013-07-15 13:14:23 -070033#include "oat_file.h"
Ian Rogers1d54e732013-05-02 21:10:01 -070034#include "os.h"
Ian Rogers1d54e732013-05-02 21:10:01 -070035#include "space-inl.h"
36#include "utils.h"
37
38namespace art {
39namespace gc {
40namespace space {
41
Ian Rogersef7d42f2014-01-06 12:55:46 -080042Atomic<uint32_t> ImageSpace::bitmap_index_(0);
Ian Rogers1d54e732013-05-02 21:10:01 -070043
Narayan Kamath52f84882014-05-02 10:10:39 +010044ImageSpace::ImageSpace(const std::string& image_filename, const char* image_location,
45 MemMap* mem_map, accounting::ContinuousSpaceBitmap* live_bitmap)
46 : MemMapSpace(image_filename, mem_map, mem_map->Begin(), mem_map->End(), mem_map->End(),
47 kGcRetentionPolicyNeverCollect),
48 image_location_(image_location) {
Mathieu Chartier590fee92013-09-13 13:46:47 -070049 DCHECK(live_bitmap != nullptr);
Mathieu Chartier31e89252013-08-28 11:29:12 -070050 live_bitmap_.reset(live_bitmap);
Ian Rogers1d54e732013-05-02 21:10:01 -070051}
52
Alex Lightcf4bf382014-07-24 11:29:14 -070053static int32_t ChooseRelocationOffsetDelta(int32_t min_delta, int32_t max_delta) {
54 CHECK_ALIGNED(min_delta, kPageSize);
55 CHECK_ALIGNED(max_delta, kPageSize);
56 CHECK_LT(min_delta, max_delta);
57
58 std::default_random_engine generator;
59 generator.seed(NanoTime() * getpid());
60 std::uniform_int_distribution<int32_t> distribution(min_delta, max_delta);
61 int32_t r = distribution(generator);
62 if (r % 2 == 0) {
63 r = RoundUp(r, kPageSize);
64 } else {
65 r = RoundDown(r, kPageSize);
66 }
67 CHECK_LE(min_delta, r);
68 CHECK_GE(max_delta, r);
69 CHECK_ALIGNED(r, kPageSize);
70 return r;
71}
72
Alex Light25396132014-08-27 15:37:23 -070073// We are relocating or generating the core image. We should get rid of everything. It is all
74// out-of-date. We also don't really care if this fails since it is just a convienence.
75// Adapted from prune_dex_cache(const char* subdir) in frameworks/native/cmds/installd/commands.c
76// Note this should only be used during first boot.
77static void RealPruneDexCache(const std::string& cache_dir_path);
78static void PruneDexCache(InstructionSet isa) {
79 CHECK_NE(isa, kNone);
80 // Prune the base /data/dalvik-cache
81 RealPruneDexCache(GetDalvikCacheOrDie(".", false));
82 // prune /data/dalvik-cache/<isa>
83 RealPruneDexCache(GetDalvikCacheOrDie(GetInstructionSetString(isa), false));
84}
85static void RealPruneDexCache(const std::string& cache_dir_path) {
86 if (!OS::DirectoryExists(cache_dir_path.c_str())) {
87 return;
88 }
89 DIR* cache_dir = opendir(cache_dir_path.c_str());
90 if (cache_dir == nullptr) {
91 PLOG(WARNING) << "Unable to open " << cache_dir_path << " to delete it's contents";
92 return;
93 }
Alex Light25396132014-08-27 15:37:23 -070094
95 for (struct dirent* de = readdir(cache_dir); de != nullptr; de = readdir(cache_dir)) {
96 const char* name = de->d_name;
97 if (strcmp(name, ".") == 0 || strcmp(name, "..") == 0) {
98 continue;
99 }
100 // We only want to delete regular files.
101 if (de->d_type != DT_REG) {
102 if (de->d_type != DT_DIR) {
103 // We do expect some directories (namely the <isa> for pruning the base dalvik-cache).
104 LOG(WARNING) << "Unexpected file type of " << std::hex << de->d_type << " encountered.";
105 }
106 continue;
107 }
Brian Carlstromdebdda02014-08-28 22:17:13 -0700108 std::string cache_file(cache_dir_path);
109 cache_file += '/';
110 cache_file += name;
111 if (TEMP_FAILURE_RETRY(unlink(cache_file.c_str())) != 0) {
112 PLOG(ERROR) << "Unable to unlink " << cache_file;
Alex Light25396132014-08-27 15:37:23 -0700113 continue;
114 }
115 }
116 CHECK_EQ(0, TEMP_FAILURE_RETRY(closedir(cache_dir))) << "Unable to close directory.";
117}
118
119static bool GenerateImage(const std::string& image_filename, InstructionSet image_isa,
120 std::string* error_msg) {
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700121 const std::string boot_class_path_string(Runtime::Current()->GetBootClassPathString());
122 std::vector<std::string> boot_class_path;
Ian Rogers6f3dbba2014-10-14 17:41:57 -0700123 Split(boot_class_path_string, ':', &boot_class_path);
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700124 if (boot_class_path.empty()) {
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700125 *error_msg = "Failed to generate image because no boot class path specified";
126 return false;
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700127 }
Alex Light25396132014-08-27 15:37:23 -0700128 // We should clean up so we are more likely to have room for the image.
129 if (Runtime::Current()->IsZygote()) {
Andreas Gampe3c13a792014-09-18 20:56:04 -0700130 LOG(INFO) << "Pruning dalvik-cache since we are generating an image and will need to recompile";
Alex Light25396132014-08-27 15:37:23 -0700131 PruneDexCache(image_isa);
132 }
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700133
Mathieu Chartier8bbc8c02013-07-31 16:27:01 -0700134 std::vector<std::string> arg_vector;
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700135
Tsu Chiang Chuang12e6d742014-05-22 10:22:25 -0700136 std::string dex2oat(Runtime::Current()->GetCompilerExecutable());
Mathieu Chartier08d7d442013-07-31 18:08:51 -0700137 arg_vector.push_back(dex2oat);
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700138
139 std::string image_option_string("--image=");
Narayan Kamath52f84882014-05-02 10:10:39 +0100140 image_option_string += image_filename;
Mathieu Chartier8bbc8c02013-07-31 16:27:01 -0700141 arg_vector.push_back(image_option_string);
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700142
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700143 for (size_t i = 0; i < boot_class_path.size(); i++) {
Mathieu Chartier8bbc8c02013-07-31 16:27:01 -0700144 arg_vector.push_back(std::string("--dex-file=") + boot_class_path[i]);
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700145 }
146
147 std::string oat_file_option_string("--oat-file=");
Brian Carlstrom2f1e15c2014-10-27 16:27:06 -0700148 oat_file_option_string += ImageHeader::GetOatLocationFromImageLocation(image_filename);
Mathieu Chartier8bbc8c02013-07-31 16:27:01 -0700149 arg_vector.push_back(oat_file_option_string);
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700150
Ian Rogers8afeb852014-04-02 14:55:49 -0700151 Runtime::Current()->AddCurrentRuntimeFeaturesAsDex2OatArguments(&arg_vector);
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700152 CHECK_EQ(image_isa, kRuntimeISA)
153 << "We should always be generating an image for the current isa.";
Ian Rogers8afeb852014-04-02 14:55:49 -0700154
Alex Lightcf4bf382014-07-24 11:29:14 -0700155 int32_t base_offset = ChooseRelocationOffsetDelta(ART_BASE_ADDRESS_MIN_DELTA,
156 ART_BASE_ADDRESS_MAX_DELTA);
157 LOG(INFO) << "Using an offset of 0x" << std::hex << base_offset << " from default "
158 << "art base address of 0x" << std::hex << ART_BASE_ADDRESS;
159 arg_vector.push_back(StringPrintf("--base=0x%x", ART_BASE_ADDRESS + base_offset));
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700160
Brian Carlstrom57309db2014-07-30 15:13:25 -0700161 if (!kIsTargetBuild) {
Mathieu Chartier8bbc8c02013-07-31 16:27:01 -0700162 arg_vector.push_back("--host");
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700163 }
164
Brian Carlstrom6449c622014-02-10 23:48:36 -0800165 const std::vector<std::string>& compiler_options = Runtime::Current()->GetImageCompilerOptions();
Brian Carlstrom2ec65202014-03-03 15:16:37 -0800166 for (size_t i = 0; i < compiler_options.size(); ++i) {
Brian Carlstrom6449c622014-02-10 23:48:36 -0800167 arg_vector.push_back(compiler_options[i].c_str());
168 }
169
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700170 std::string command_line(Join(arg_vector, ' '));
171 LOG(INFO) << "GenerateImage: " << command_line;
Brian Carlstrom6449c622014-02-10 23:48:36 -0800172 return Exec(arg_vector, error_msg);
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700173}
174
Narayan Kamath52f84882014-05-02 10:10:39 +0100175bool ImageSpace::FindImageFilename(const char* image_location,
176 const InstructionSet image_isa,
Alex Lighta59dd802014-07-02 16:28:08 -0700177 std::string* system_filename,
178 bool* has_system,
179 std::string* cache_filename,
180 bool* dalvik_cache_exists,
Andreas Gampe3c13a792014-09-18 20:56:04 -0700181 bool* has_cache,
182 bool* is_global_cache) {
Alex Lighta59dd802014-07-02 16:28:08 -0700183 *has_system = false;
184 *has_cache = false;
Brian Carlstrom0e12bdc2014-05-14 17:44:28 -0700185 // image_location = /system/framework/boot.art
186 // system_image_location = /system/framework/<image_isa>/boot.art
187 std::string system_image_filename(GetSystemImageFilename(image_location, image_isa));
188 if (OS::FileExists(system_image_filename.c_str())) {
Alex Lighta59dd802014-07-02 16:28:08 -0700189 *system_filename = system_image_filename;
190 *has_system = true;
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700191 }
Narayan Kamath52f84882014-05-02 10:10:39 +0100192
Alex Lighta59dd802014-07-02 16:28:08 -0700193 bool have_android_data = false;
194 *dalvik_cache_exists = false;
195 std::string dalvik_cache;
196 GetDalvikCache(GetInstructionSetString(image_isa), true, &dalvik_cache,
Andreas Gampe3c13a792014-09-18 20:56:04 -0700197 &have_android_data, dalvik_cache_exists, is_global_cache);
Narayan Kamath52f84882014-05-02 10:10:39 +0100198
Alex Lighta59dd802014-07-02 16:28:08 -0700199 if (have_android_data && *dalvik_cache_exists) {
200 // Always set output location even if it does not exist,
201 // so that the caller knows where to create the image.
202 //
203 // image_location = /system/framework/boot.art
204 // *image_filename = /data/dalvik-cache/<image_isa>/boot.art
205 std::string error_msg;
206 if (!GetDalvikCacheFilename(image_location, dalvik_cache.c_str(), cache_filename, &error_msg)) {
207 LOG(WARNING) << error_msg;
208 return *has_system;
209 }
210 *has_cache = OS::FileExists(cache_filename->c_str());
211 }
212 return *has_system || *has_cache;
213}
214
215static bool ReadSpecificImageHeader(const char* filename, ImageHeader* image_header) {
216 std::unique_ptr<File> image_file(OS::OpenFileForReading(filename));
217 if (image_file.get() == nullptr) {
218 return false;
219 }
220 const bool success = image_file->ReadFully(image_header, sizeof(ImageHeader));
221 if (!success || !image_header->IsValid()) {
222 return false;
223 }
224 return true;
225}
226
Alex Light6e183f22014-07-18 14:57:04 -0700227// Relocate the image at image_location to dest_filename and relocate it by a random amount.
228static bool RelocateImage(const char* image_location, const char* dest_filename,
Alex Lighta59dd802014-07-02 16:28:08 -0700229 InstructionSet isa, std::string* error_msg) {
Alex Light25396132014-08-27 15:37:23 -0700230 // We should clean up so we are more likely to have room for the image.
231 if (Runtime::Current()->IsZygote()) {
232 LOG(INFO) << "Pruning dalvik-cache since we are relocating an image and will need to recompile";
233 PruneDexCache(isa);
234 }
235
Alex Lighta59dd802014-07-02 16:28:08 -0700236 std::string patchoat(Runtime::Current()->GetPatchoatExecutable());
237
238 std::string input_image_location_arg("--input-image-location=");
239 input_image_location_arg += image_location;
240
241 std::string output_image_filename_arg("--output-image-file=");
242 output_image_filename_arg += dest_filename;
243
244 std::string input_oat_location_arg("--input-oat-location=");
245 input_oat_location_arg += ImageHeader::GetOatLocationFromImageLocation(image_location);
246
247 std::string output_oat_filename_arg("--output-oat-file=");
248 output_oat_filename_arg += ImageHeader::GetOatLocationFromImageLocation(dest_filename);
249
250 std::string instruction_set_arg("--instruction-set=");
251 instruction_set_arg += GetInstructionSetString(isa);
252
253 std::string base_offset_arg("--base-offset-delta=");
254 StringAppendF(&base_offset_arg, "%d", ChooseRelocationOffsetDelta(ART_BASE_ADDRESS_MIN_DELTA,
255 ART_BASE_ADDRESS_MAX_DELTA));
256
257 std::vector<std::string> argv;
258 argv.push_back(patchoat);
259
260 argv.push_back(input_image_location_arg);
261 argv.push_back(output_image_filename_arg);
262
263 argv.push_back(input_oat_location_arg);
264 argv.push_back(output_oat_filename_arg);
265
266 argv.push_back(instruction_set_arg);
267 argv.push_back(base_offset_arg);
268
269 std::string command_line(Join(argv, ' '));
270 LOG(INFO) << "RelocateImage: " << command_line;
271 return Exec(argv, error_msg);
272}
273
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700274static ImageHeader* ReadSpecificImageHeader(const char* filename, std::string* error_msg) {
Alex Lighta59dd802014-07-02 16:28:08 -0700275 std::unique_ptr<ImageHeader> hdr(new ImageHeader);
276 if (!ReadSpecificImageHeader(filename, hdr.get())) {
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700277 *error_msg = StringPrintf("Unable to read image header for %s", filename);
Alex Lighta59dd802014-07-02 16:28:08 -0700278 return nullptr;
279 }
280 return hdr.release();
Narayan Kamath52f84882014-05-02 10:10:39 +0100281}
282
283ImageHeader* ImageSpace::ReadImageHeaderOrDie(const char* image_location,
284 const InstructionSet image_isa) {
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700285 std::string error_msg;
286 ImageHeader* image_header = ReadImageHeader(image_location, image_isa, &error_msg);
287 if (image_header == nullptr) {
288 LOG(FATAL) << error_msg;
289 }
290 return image_header;
291}
292
293ImageHeader* ImageSpace::ReadImageHeader(const char* image_location,
294 const InstructionSet image_isa,
295 std::string* error_msg) {
Alex Lighta59dd802014-07-02 16:28:08 -0700296 std::string system_filename;
297 bool has_system = false;
298 std::string cache_filename;
299 bool has_cache = false;
300 bool dalvik_cache_exists = false;
Andreas Gampe3c13a792014-09-18 20:56:04 -0700301 bool is_global_cache = false;
Alex Lighta59dd802014-07-02 16:28:08 -0700302 if (FindImageFilename(image_location, image_isa, &system_filename, &has_system,
Andreas Gampe3c13a792014-09-18 20:56:04 -0700303 &cache_filename, &dalvik_cache_exists, &has_cache, &is_global_cache)) {
Alex Lighta59dd802014-07-02 16:28:08 -0700304 if (Runtime::Current()->ShouldRelocate()) {
305 if (has_system && has_cache) {
306 std::unique_ptr<ImageHeader> sys_hdr(new ImageHeader);
307 std::unique_ptr<ImageHeader> cache_hdr(new ImageHeader);
308 if (!ReadSpecificImageHeader(system_filename.c_str(), sys_hdr.get())) {
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700309 *error_msg = StringPrintf("Unable to read image header for %s at %s",
310 image_location, system_filename.c_str());
Alex Lighta59dd802014-07-02 16:28:08 -0700311 return nullptr;
312 }
313 if (!ReadSpecificImageHeader(cache_filename.c_str(), cache_hdr.get())) {
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700314 *error_msg = StringPrintf("Unable to read image header for %s at %s",
315 image_location, cache_filename.c_str());
Alex Lighta59dd802014-07-02 16:28:08 -0700316 return nullptr;
317 }
318 if (sys_hdr->GetOatChecksum() != cache_hdr->GetOatChecksum()) {
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700319 *error_msg = StringPrintf("Unable to find a relocated version of image file %s",
320 image_location);
Alex Lighta59dd802014-07-02 16:28:08 -0700321 return nullptr;
322 }
323 return cache_hdr.release();
324 } else if (!has_cache) {
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700325 *error_msg = StringPrintf("Unable to find a relocated version of image file %s",
326 image_location);
Alex Lighta59dd802014-07-02 16:28:08 -0700327 return nullptr;
328 } else if (!has_system && has_cache) {
329 // This can probably just use the cache one.
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700330 return ReadSpecificImageHeader(cache_filename.c_str(), error_msg);
Alex Lighta59dd802014-07-02 16:28:08 -0700331 }
332 } else {
333 // We don't want to relocate, Just pick the appropriate one if we have it and return.
334 if (has_system && has_cache) {
335 // We want the cache if the checksum matches, otherwise the system.
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700336 std::unique_ptr<ImageHeader> system(ReadSpecificImageHeader(system_filename.c_str(),
337 error_msg));
338 std::unique_ptr<ImageHeader> cache(ReadSpecificImageHeader(cache_filename.c_str(),
339 error_msg));
Alex Lighta59dd802014-07-02 16:28:08 -0700340 if (system.get() == nullptr ||
341 (cache.get() != nullptr && cache->GetOatChecksum() == system->GetOatChecksum())) {
342 return cache.release();
343 } else {
344 return system.release();
345 }
346 } else if (has_system) {
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700347 return ReadSpecificImageHeader(system_filename.c_str(), error_msg);
Alex Lighta59dd802014-07-02 16:28:08 -0700348 } else if (has_cache) {
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700349 return ReadSpecificImageHeader(cache_filename.c_str(), error_msg);
Alex Lighta59dd802014-07-02 16:28:08 -0700350 }
Narayan Kamath52f84882014-05-02 10:10:39 +0100351 }
Narayan Kamath52f84882014-05-02 10:10:39 +0100352 }
353
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700354 *error_msg = StringPrintf("Unable to find image file for %s", image_location);
Narayan Kamath52f84882014-05-02 10:10:39 +0100355 return nullptr;
356}
357
Alex Lighta59dd802014-07-02 16:28:08 -0700358static bool ChecksumsMatch(const char* image_a, const char* image_b) {
359 ImageHeader hdr_a;
360 ImageHeader hdr_b;
361 return ReadSpecificImageHeader(image_a, &hdr_a) && ReadSpecificImageHeader(image_b, &hdr_b)
362 && hdr_a.GetOatChecksum() == hdr_b.GetOatChecksum();
363}
364
Andreas Gampe3c13a792014-09-18 20:56:04 -0700365static bool ImageCreationAllowed(bool is_global_cache, std::string* error_msg) {
366 // Anyone can write into a "local" cache.
367 if (!is_global_cache) {
368 return true;
369 }
370
371 // Only the zygote is allowed to create the global boot image.
372 if (Runtime::Current()->IsZygote()) {
373 return true;
374 }
375
376 *error_msg = "Only the zygote can create the global boot image.";
377 return false;
378}
379
Andreas Gampe70be1fb2014-10-31 16:45:19 -0700380static constexpr uint64_t kLowSpaceValue = 50 * MB;
381static constexpr uint64_t kTmpFsSentinelValue = 384 * MB;
382
383// Read the free space of the cache partition and make a decision whether to keep the generated
384// image. This is to try to mitigate situations where the system might run out of space later.
385static bool CheckSpace(const std::string& cache_filename, std::string* error_msg) {
386 // Using statvfs vs statvfs64 because of b/18207376, and it is enough for all practical purposes.
387 struct statvfs buf;
388
389 int res = TEMP_FAILURE_RETRY(statvfs(cache_filename.c_str(), &buf));
390 if (res != 0) {
391 // Could not stat. Conservatively tell the system to delete the image.
392 *error_msg = "Could not stat the filesystem, assuming low-memory situation.";
393 return false;
394 }
395
396 uint64_t fs_overall_size = buf.f_bsize * static_cast<uint64_t>(buf.f_blocks);
397 // Zygote is privileged, but other things are not. Use bavail.
398 uint64_t fs_free_size = buf.f_bsize * static_cast<uint64_t>(buf.f_bavail);
399
400 // Take the overall size as an indicator for a tmpfs, which is being used for the decryption
401 // environment. We do not want to fail quickening the boot image there, as it is beneficial
402 // for time-to-UI.
403 if (fs_overall_size > kTmpFsSentinelValue) {
404 if (fs_free_size < kLowSpaceValue) {
405 *error_msg = StringPrintf("Low-memory situation: only %4.2f megabytes available after image"
406 " generation, need at least %" PRIu64 ".",
407 static_cast<double>(fs_free_size) / MB,
408 kLowSpaceValue / MB);
409 return false;
410 }
411 }
412 return true;
413}
414
Narayan Kamath52f84882014-05-02 10:10:39 +0100415ImageSpace* ImageSpace::Create(const char* image_location,
Alex Light64ad14d2014-08-19 14:23:13 -0700416 const InstructionSet image_isa,
417 std::string* error_msg) {
Alex Lighta59dd802014-07-02 16:28:08 -0700418 std::string system_filename;
419 bool has_system = false;
420 std::string cache_filename;
421 bool has_cache = false;
422 bool dalvik_cache_exists = false;
Andreas Gampe3c13a792014-09-18 20:56:04 -0700423 bool is_global_cache = true;
Alex Lighta59dd802014-07-02 16:28:08 -0700424 const bool found_image = FindImageFilename(image_location, image_isa, &system_filename,
425 &has_system, &cache_filename, &dalvik_cache_exists,
Andreas Gampe3c13a792014-09-18 20:56:04 -0700426 &has_cache, &is_global_cache);
Narayan Kamathd1c606f2014-06-09 16:50:19 +0100427
Alex Lighta59dd802014-07-02 16:28:08 -0700428 ImageSpace* space;
429 bool relocate = Runtime::Current()->ShouldRelocate();
Alex Light64ad14d2014-08-19 14:23:13 -0700430 bool can_compile = Runtime::Current()->IsImageDex2OatEnabled();
Narayan Kamathd1c606f2014-06-09 16:50:19 +0100431 if (found_image) {
Alex Lighta59dd802014-07-02 16:28:08 -0700432 const std::string* image_filename;
433 bool is_system = false;
434 bool relocated_version_used = false;
435 if (relocate) {
Alex Light64ad14d2014-08-19 14:23:13 -0700436 if (!dalvik_cache_exists) {
437 *error_msg = StringPrintf("Requiring relocation for image '%s' at '%s' but we do not have "
438 "any dalvik_cache to find/place it in.",
439 image_location, system_filename.c_str());
440 return nullptr;
441 }
Alex Lighta59dd802014-07-02 16:28:08 -0700442 if (has_system) {
443 if (has_cache && ChecksumsMatch(system_filename.c_str(), cache_filename.c_str())) {
444 // We already have a relocated version
445 image_filename = &cache_filename;
446 relocated_version_used = true;
447 } else {
448 // We cannot have a relocated version, Relocate the system one and use it.
Andreas Gampe3c13a792014-09-18 20:56:04 -0700449
450 std::string reason;
451 bool success;
452
453 // Check whether we are allowed to relocate.
454 if (!can_compile) {
455 reason = "Image dex2oat disabled by -Xnoimage-dex2oat.";
456 success = false;
457 } else if (!ImageCreationAllowed(is_global_cache, &reason)) {
458 // Whether we can write to the cache.
459 success = false;
460 } else {
461 // Try to relocate.
462 success = RelocateImage(image_location, cache_filename.c_str(), image_isa, &reason);
463 }
464
465 if (success) {
Alex Lighta59dd802014-07-02 16:28:08 -0700466 relocated_version_used = true;
467 image_filename = &cache_filename;
468 } else {
Andreas Gampe3c13a792014-09-18 20:56:04 -0700469 *error_msg = StringPrintf("Unable to relocate image '%s' from '%s' to '%s': %s",
Alex Light64ad14d2014-08-19 14:23:13 -0700470 image_location, system_filename.c_str(),
471 cache_filename.c_str(), reason.c_str());
Brian Carlstrome9105f72014-10-28 15:53:43 -0700472 // We failed to create files, remove any possibly garbage output.
473 // Since ImageCreationAllowed was true above, we are the zygote
474 // and therefore the only process expected to generate these for
475 // the device.
476 PruneDexCache(image_isa);
Alex Lighta59dd802014-07-02 16:28:08 -0700477 return nullptr;
478 }
479 }
480 } else {
481 CHECK(has_cache);
482 // We can just use cache's since it should be fine. This might or might not be relocated.
483 image_filename = &cache_filename;
484 }
485 } else {
486 if (has_system && has_cache) {
487 // Check they have the same cksum. If they do use the cache. Otherwise system.
488 if (ChecksumsMatch(system_filename.c_str(), cache_filename.c_str())) {
489 image_filename = &cache_filename;
490 relocated_version_used = true;
491 } else {
492 image_filename = &system_filename;
Alex Light1a762132014-07-31 09:32:13 -0700493 is_system = true;
Alex Lighta59dd802014-07-02 16:28:08 -0700494 }
495 } else if (has_system) {
496 image_filename = &system_filename;
Alex Light1a762132014-07-31 09:32:13 -0700497 is_system = true;
Alex Lighta59dd802014-07-02 16:28:08 -0700498 } else {
499 CHECK(has_cache);
500 image_filename = &cache_filename;
501 }
502 }
503 {
504 // Note that we must not use the file descriptor associated with
505 // ScopedFlock::GetFile to Init the image file. We want the file
506 // descriptor (and the associated exclusive lock) to be released when
507 // we leave Create.
508 ScopedFlock image_lock;
Alex Light64ad14d2014-08-19 14:23:13 -0700509 image_lock.Init(image_filename->c_str(), error_msg);
Alex Lightb6cabc12014-08-21 09:45:00 -0700510 VLOG(startup) << "Using image file " << image_filename->c_str() << " for image location "
511 << image_location;
Alex Lightb93637a2014-07-31 10:48:46 -0700512 // If we are in /system we can assume the image is good. We can also
513 // assume this if we are using a relocated image (i.e. image checksum
514 // matches) since this is only different by the offset. We need this to
515 // make sure that host tests continue to work.
Alex Lighta59dd802014-07-02 16:28:08 -0700516 space = ImageSpace::Init(image_filename->c_str(), image_location,
Alex Light64ad14d2014-08-19 14:23:13 -0700517 !(is_system || relocated_version_used), error_msg);
Alex Lighta59dd802014-07-02 16:28:08 -0700518 }
Narayan Kamath52f84882014-05-02 10:10:39 +0100519 if (space != nullptr) {
520 return space;
521 }
522
Alex Lighta59dd802014-07-02 16:28:08 -0700523 if (relocated_version_used) {
Brian Carlstrome9105f72014-10-28 15:53:43 -0700524 // Something is wrong with the relocated copy (even though checksums match). Cleanup.
525 // This can happen if the .oat is corrupt, since the above only checks the .art checksums.
526 // TODO: Check the oat file validity earlier.
527 *error_msg = StringPrintf("Attempted to use relocated version of %s at %s generated from %s "
528 "but image failed to load: %s",
529 image_location, cache_filename.c_str(), system_filename.c_str(),
530 error_msg->c_str());
531 PruneDexCache(image_isa);
Alex Lighta59dd802014-07-02 16:28:08 -0700532 return nullptr;
533 } else if (is_system) {
Brian Carlstrome9105f72014-10-28 15:53:43 -0700534 // If the /system file exists, it should be up-to-date, don't try to generate it.
Alex Light64ad14d2014-08-19 14:23:13 -0700535 *error_msg = StringPrintf("Failed to load /system image '%s': %s",
536 image_filename->c_str(), error_msg->c_str());
Narayan Kamath52f84882014-05-02 10:10:39 +0100537 return nullptr;
Mathieu Chartierc7cb1902014-03-05 14:41:03 -0800538 } else {
Brian Carlstrome9105f72014-10-28 15:53:43 -0700539 // Otherwise, log a warning and fall through to GenerateImage.
Alex Light64ad14d2014-08-19 14:23:13 -0700540 LOG(WARNING) << *error_msg;
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700541 }
542 }
Narayan Kamath52f84882014-05-02 10:10:39 +0100543
Alex Light64ad14d2014-08-19 14:23:13 -0700544 if (!can_compile) {
545 *error_msg = "Not attempting to compile image because -Xnoimage-dex2oat";
546 return nullptr;
547 } else if (!dalvik_cache_exists) {
548 *error_msg = StringPrintf("No place to put generated image.");
549 return nullptr;
Andreas Gampe3c13a792014-09-18 20:56:04 -0700550 } else if (!ImageCreationAllowed(is_global_cache, error_msg)) {
551 return nullptr;
Alex Light25396132014-08-27 15:37:23 -0700552 } else if (!GenerateImage(cache_filename, image_isa, error_msg)) {
Alex Light64ad14d2014-08-19 14:23:13 -0700553 *error_msg = StringPrintf("Failed to generate image '%s': %s",
554 cache_filename.c_str(), error_msg->c_str());
Brian Carlstrome9105f72014-10-28 15:53:43 -0700555 // We failed to create files, remove any possibly garbage output.
556 // Since ImageCreationAllowed was true above, we are the zygote
557 // and therefore the only process expected to generate these for
558 // the device.
559 PruneDexCache(image_isa);
Alex Light64ad14d2014-08-19 14:23:13 -0700560 return nullptr;
561 } else {
Andreas Gampe70be1fb2014-10-31 16:45:19 -0700562 // Check whether there is enough space left over after we have generated the image.
563 if (!CheckSpace(cache_filename, error_msg)) {
564 // No. Delete the generated image and try to run out of the dex files.
565 PruneDexCache(image_isa);
566 return nullptr;
567 }
568
Alex Lighta59dd802014-07-02 16:28:08 -0700569 // Note that we must not use the file descriptor associated with
570 // ScopedFlock::GetFile to Init the image file. We want the file
571 // descriptor (and the associated exclusive lock) to be released when
572 // we leave Create.
573 ScopedFlock image_lock;
Alex Light64ad14d2014-08-19 14:23:13 -0700574 image_lock.Init(cache_filename.c_str(), error_msg);
575 space = ImageSpace::Init(cache_filename.c_str(), image_location, true, error_msg);
576 if (space == nullptr) {
577 *error_msg = StringPrintf("Failed to load generated image '%s': %s",
578 cache_filename.c_str(), error_msg->c_str());
579 }
580 return space;
Alex Lighta59dd802014-07-02 16:28:08 -0700581 }
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700582}
583
Mathieu Chartier31e89252013-08-28 11:29:12 -0700584void ImageSpace::VerifyImageAllocations() {
Ian Rogers13735952014-10-08 12:43:28 -0700585 uint8_t* current = Begin() + RoundUp(sizeof(ImageHeader), kObjectAlignment);
Mathieu Chartier31e89252013-08-28 11:29:12 -0700586 while (current < End()) {
587 DCHECK_ALIGNED(current, kObjectAlignment);
Ian Rogersef7d42f2014-01-06 12:55:46 -0800588 mirror::Object* obj = reinterpret_cast<mirror::Object*>(current);
Mathieu Chartier31e89252013-08-28 11:29:12 -0700589 CHECK(live_bitmap_->Test(obj));
590 CHECK(obj->GetClass() != nullptr) << "Image object at address " << obj << " has null class";
Hiroshi Yamauchi624468c2014-03-31 15:14:47 -0700591 if (kUseBakerOrBrooksReadBarrier) {
592 obj->AssertReadBarrierPointer();
Hiroshi Yamauchi9d04a202014-01-31 13:35:49 -0800593 }
Mathieu Chartier31e89252013-08-28 11:29:12 -0700594 current += RoundUp(obj->SizeOf(), kObjectAlignment);
595 }
596}
597
Narayan Kamath52f84882014-05-02 10:10:39 +0100598ImageSpace* ImageSpace::Init(const char* image_filename, const char* image_location,
599 bool validate_oat_file, std::string* error_msg) {
600 CHECK(image_filename != nullptr);
601 CHECK(image_location != nullptr);
Ian Rogers1d54e732013-05-02 21:10:01 -0700602
603 uint64_t start_time = 0;
604 if (VLOG_IS_ON(heap) || VLOG_IS_ON(startup)) {
605 start_time = NanoTime();
Narayan Kamath52f84882014-05-02 10:10:39 +0100606 LOG(INFO) << "ImageSpace::Init entering image_filename=" << image_filename;
Ian Rogers1d54e732013-05-02 21:10:01 -0700607 }
608
Ian Rogers700a4022014-05-19 16:49:03 -0700609 std::unique_ptr<File> file(OS::OpenFileForReading(image_filename));
Ian Rogers1d54e732013-05-02 21:10:01 -0700610 if (file.get() == NULL) {
Narayan Kamath52f84882014-05-02 10:10:39 +0100611 *error_msg = StringPrintf("Failed to open '%s'", image_filename);
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700612 return nullptr;
Ian Rogers1d54e732013-05-02 21:10:01 -0700613 }
614 ImageHeader image_header;
615 bool success = file->ReadFully(&image_header, sizeof(image_header));
616 if (!success || !image_header.IsValid()) {
Narayan Kamath52f84882014-05-02 10:10:39 +0100617 *error_msg = StringPrintf("Invalid image header in '%s'", image_filename);
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700618 return nullptr;
Ian Rogers1d54e732013-05-02 21:10:01 -0700619 }
Mathieu Chartier31e89252013-08-28 11:29:12 -0700620
621 // Note: The image header is part of the image due to mmap page alignment required of offset.
Ian Rogers700a4022014-05-19 16:49:03 -0700622 std::unique_ptr<MemMap> map(MemMap::MapFileAtAddress(image_header.GetImageBegin(),
Mathieu Chartier31e89252013-08-28 11:29:12 -0700623 image_header.GetImageSize(),
Ian Rogers1d54e732013-05-02 21:10:01 -0700624 PROT_READ | PROT_WRITE,
Hiroshi Yamauchi4fb5df82014-03-13 15:10:27 -0700625 MAP_PRIVATE,
Ian Rogers1d54e732013-05-02 21:10:01 -0700626 file->Fd(),
627 0,
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700628 false,
Narayan Kamath52f84882014-05-02 10:10:39 +0100629 image_filename,
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700630 error_msg));
Ian Rogers1d54e732013-05-02 21:10:01 -0700631 if (map.get() == NULL) {
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700632 DCHECK(!error_msg->empty());
633 return nullptr;
Ian Rogers1d54e732013-05-02 21:10:01 -0700634 }
635 CHECK_EQ(image_header.GetImageBegin(), map->Begin());
636 DCHECK_EQ(0, memcmp(&image_header, map->Begin(), sizeof(ImageHeader)));
637
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700638 std::unique_ptr<MemMap> image_map(
639 MemMap::MapFileAtAddress(nullptr, image_header.GetImageBitmapSize(),
640 PROT_READ, MAP_PRIVATE,
641 file->Fd(), image_header.GetBitmapOffset(),
642 false,
643 image_filename,
644 error_msg));
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700645 if (image_map.get() == nullptr) {
646 *error_msg = StringPrintf("Failed to map image bitmap: %s", error_msg->c_str());
647 return nullptr;
648 }
Ian Rogers3e5cf302014-05-20 16:40:37 -0700649 uint32_t bitmap_index = bitmap_index_.FetchAndAddSequentiallyConsistent(1);
Narayan Kamath52f84882014-05-02 10:10:39 +0100650 std::string bitmap_name(StringPrintf("imagespace %s live-bitmap %u", image_filename,
Mathieu Chartier31e89252013-08-28 11:29:12 -0700651 bitmap_index));
Ian Rogers700a4022014-05-19 16:49:03 -0700652 std::unique_ptr<accounting::ContinuousSpaceBitmap> bitmap(
Mathieu Chartiera8e8f9c2014-04-09 14:51:05 -0700653 accounting::ContinuousSpaceBitmap::CreateFromMemMap(bitmap_name, image_map.release(),
Ian Rogers13735952014-10-08 12:43:28 -0700654 reinterpret_cast<uint8_t*>(map->Begin()),
Mathieu Chartiera8e8f9c2014-04-09 14:51:05 -0700655 map->Size()));
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700656 if (bitmap.get() == nullptr) {
657 *error_msg = StringPrintf("Could not create bitmap '%s'", bitmap_name.c_str());
658 return nullptr;
659 }
Mathieu Chartier31e89252013-08-28 11:29:12 -0700660
Ian Rogers700a4022014-05-19 16:49:03 -0700661 std::unique_ptr<ImageSpace> space(new ImageSpace(image_filename, image_location,
Narayan Kamath52f84882014-05-02 10:10:39 +0100662 map.release(), bitmap.release()));
Hiroshi Yamauchibd0fb612014-05-20 13:46:00 -0700663
664 // VerifyImageAllocations() will be called later in Runtime::Init()
665 // as some class roots like ArtMethod::java_lang_reflect_ArtMethod_
666 // and ArtField::java_lang_reflect_ArtField_, which are used from
667 // Object::SizeOf() which VerifyImageAllocations() calls, are not
668 // set yet at this point.
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700669
Narayan Kamath52f84882014-05-02 10:10:39 +0100670 space->oat_file_.reset(space->OpenOatFile(image_filename, error_msg));
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700671 if (space->oat_file_.get() == nullptr) {
672 DCHECK(!error_msg->empty());
673 return nullptr;
Ian Rogers1d54e732013-05-02 21:10:01 -0700674 }
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700675
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700676 if (validate_oat_file && !space->ValidateOatFile(error_msg)) {
677 DCHECK(!error_msg->empty());
678 return nullptr;
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700679 }
680
Vladimir Marko7624d252014-05-02 14:40:15 +0100681 Runtime* runtime = Runtime::Current();
682 runtime->SetInstructionSet(space->oat_file_->GetOatHeader().GetInstructionSet());
683
684 mirror::Object* resolution_method = image_header.GetImageRoot(ImageHeader::kResolutionMethod);
685 runtime->SetResolutionMethod(down_cast<mirror::ArtMethod*>(resolution_method));
686 mirror::Object* imt_conflict_method = image_header.GetImageRoot(ImageHeader::kImtConflictMethod);
687 runtime->SetImtConflictMethod(down_cast<mirror::ArtMethod*>(imt_conflict_method));
Mathieu Chartier2d2621a2014-10-23 16:48:06 -0700688 mirror::Object* imt_unimplemented_method =
689 image_header.GetImageRoot(ImageHeader::kImtUnimplementedMethod);
690 runtime->SetImtUnimplementedMethod(down_cast<mirror::ArtMethod*>(imt_unimplemented_method));
Vladimir Marko7624d252014-05-02 14:40:15 +0100691 mirror::Object* default_imt = image_header.GetImageRoot(ImageHeader::kDefaultImt);
692 runtime->SetDefaultImt(down_cast<mirror::ObjectArray<mirror::ArtMethod>*>(default_imt));
693
694 mirror::Object* callee_save_method = image_header.GetImageRoot(ImageHeader::kCalleeSaveMethod);
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700695 runtime->SetCalleeSaveMethod(down_cast<mirror::ArtMethod*>(callee_save_method),
696 Runtime::kSaveAll);
Vladimir Marko7624d252014-05-02 14:40:15 +0100697 callee_save_method = image_header.GetImageRoot(ImageHeader::kRefsOnlySaveMethod);
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700698 runtime->SetCalleeSaveMethod(down_cast<mirror::ArtMethod*>(callee_save_method),
699 Runtime::kRefsOnly);
Vladimir Marko7624d252014-05-02 14:40:15 +0100700 callee_save_method = image_header.GetImageRoot(ImageHeader::kRefsAndArgsSaveMethod);
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700701 runtime->SetCalleeSaveMethod(down_cast<mirror::ArtMethod*>(callee_save_method),
702 Runtime::kRefsAndArgs);
Vladimir Marko7624d252014-05-02 14:40:15 +0100703
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700704 if (VLOG_IS_ON(heap) || VLOG_IS_ON(startup)) {
705 LOG(INFO) << "ImageSpace::Init exiting (" << PrettyDuration(NanoTime() - start_time)
706 << ") " << *space.get();
707 }
708 return space.release();
709}
710
Nicolas Geoffray9583fbc2014-02-28 15:21:07 +0000711OatFile* ImageSpace::OpenOatFile(const char* image_path, std::string* error_msg) const {
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700712 const ImageHeader& image_header = GetImageHeader();
Nicolas Geoffray9583fbc2014-02-28 15:21:07 +0000713 std::string oat_filename = ImageHeader::GetOatLocationFromImageLocation(image_path);
714
Igor Murashkin46774762014-10-22 11:37:02 -0700715 CHECK(image_header.GetOatDataBegin() != nullptr);
716
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700717 OatFile* oat_file = OatFile::Open(oat_filename, oat_filename, image_header.GetOatDataBegin(),
Igor Murashkin46774762014-10-22 11:37:02 -0700718 image_header.GetOatFileBegin(),
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700719 !Runtime::Current()->IsCompiler(), error_msg);
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700720 if (oat_file == NULL) {
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700721 *error_msg = StringPrintf("Failed to open oat file '%s' referenced from image %s: %s",
722 oat_filename.c_str(), GetName(), error_msg->c_str());
723 return nullptr;
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700724 }
725 uint32_t oat_checksum = oat_file->GetOatHeader().GetChecksum();
726 uint32_t image_oat_checksum = image_header.GetOatChecksum();
727 if (oat_checksum != image_oat_checksum) {
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700728 *error_msg = StringPrintf("Failed to match oat file checksum 0x%x to expected oat checksum 0x%x"
729 " in image %s", oat_checksum, image_oat_checksum, GetName());
730 return nullptr;
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700731 }
Alex Lighta59dd802014-07-02 16:28:08 -0700732 int32_t image_patch_delta = image_header.GetPatchDelta();
733 int32_t oat_patch_delta = oat_file->GetOatHeader().GetImagePatchDelta();
Igor Murashkin46774762014-10-22 11:37:02 -0700734 if (oat_patch_delta != image_patch_delta && !image_header.CompilePic()) {
Alex Lighta59dd802014-07-02 16:28:08 -0700735 // We should have already relocated by this point. Bail out.
736 *error_msg = StringPrintf("Failed to match oat file patch delta %d to expected patch delta %d "
737 "in image %s", oat_patch_delta, image_patch_delta, GetName());
738 return nullptr;
739 }
740
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700741 return oat_file;
742}
743
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700744bool ImageSpace::ValidateOatFile(std::string* error_msg) const {
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700745 CHECK(oat_file_.get() != NULL);
Mathieu Chartier31e89252013-08-28 11:29:12 -0700746 for (const OatFile::OatDexFile* oat_dex_file : oat_file_->GetOatDexFiles()) {
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700747 const std::string& dex_file_location = oat_dex_file->GetDexFileLocation();
748 uint32_t dex_file_location_checksum;
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700749 if (!DexFile::GetChecksum(dex_file_location.c_str(), &dex_file_location_checksum, error_msg)) {
750 *error_msg = StringPrintf("Failed to get checksum of dex file '%s' referenced by image %s: "
751 "%s", dex_file_location.c_str(), GetName(), error_msg->c_str());
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700752 return false;
753 }
754 if (dex_file_location_checksum != oat_dex_file->GetDexFileLocationChecksum()) {
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700755 *error_msg = StringPrintf("ValidateOatFile found checksum mismatch between oat file '%s' and "
756 "dex file '%s' (0x%x != 0x%x)",
757 oat_file_->GetLocation().c_str(), dex_file_location.c_str(),
758 oat_dex_file->GetDexFileLocationChecksum(),
759 dex_file_location_checksum);
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700760 return false;
761 }
762 }
763 return true;
764}
765
Andreas Gampe22f8e5c2014-07-09 11:38:21 -0700766const OatFile* ImageSpace::GetOatFile() const {
767 return oat_file_.get();
768}
769
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700770OatFile* ImageSpace::ReleaseOatFile() {
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700771 CHECK(oat_file_.get() != NULL);
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700772 return oat_file_.release();
Ian Rogers1d54e732013-05-02 21:10:01 -0700773}
774
Ian Rogers1d54e732013-05-02 21:10:01 -0700775void ImageSpace::Dump(std::ostream& os) const {
776 os << GetType()
Mathieu Chartier590fee92013-09-13 13:46:47 -0700777 << " begin=" << reinterpret_cast<void*>(Begin())
Ian Rogers1d54e732013-05-02 21:10:01 -0700778 << ",end=" << reinterpret_cast<void*>(End())
779 << ",size=" << PrettySize(Size())
780 << ",name=\"" << GetName() << "\"]";
781}
782
783} // namespace space
784} // namespace gc
785} // namespace art