blob: 5283ca6fc265eee0e4d9adcbec3cbfb4e467400f [file] [log] [blame]
Elliott Hughes8d768a92011-09-14 16:35:25 -07001/*
2 * Copyright (C) 2011 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
Carl Shapiro0e5d75d2011-07-06 18:28:37 -070016
Brian Carlstromfc0e3212013-07-17 14:40:12 -070017#ifndef ART_RUNTIME_THREAD_H_
18#define ART_RUNTIME_THREAD_H_
Carl Shapiro0e5d75d2011-07-06 18:28:37 -070019
Elliott Hughes02b48d12011-09-07 17:15:51 -070020#include <bitset>
Ian Rogers306057f2012-11-26 12:45:53 -080021#include <deque>
Elliott Hughesa0957642011-09-02 14:27:33 -070022#include <iosfwd>
Ian Rogersb033c752011-07-20 12:22:35 -070023#include <list>
Ian Rogers700a4022014-05-19 16:49:03 -070024#include <memory>
Elliott Hughes8daa0922011-09-11 13:46:25 -070025#include <string>
Carl Shapirob5573532011-07-12 18:22:59 -070026
Ian Rogersb8e087e2014-07-09 21:12:06 -070027#include "atomic.h"
Elliott Hughes76160052012-12-12 16:31:20 -080028#include "base/macros.h"
Ian Rogers719d1a32014-03-06 12:13:39 -080029#include "base/mutex.h"
Ian Rogers848871b2013-08-05 10:56:33 -070030#include "entrypoints/interpreter/interpreter_entrypoints.h"
31#include "entrypoints/jni/jni_entrypoints.h"
Ian Rogers7655f292013-07-29 11:07:13 -070032#include "entrypoints/portable/portable_entrypoints.h"
33#include "entrypoints/quick/quick_entrypoints.h"
Brian Carlstrom578bbdc2011-07-21 14:07:47 -070034#include "globals.h"
Mathieu Chartiereb8167a2014-05-07 15:43:14 -070035#include "handle_scope.h"
Andreas Gampe7cd26f32014-06-18 17:01:15 -070036#include "instruction_set.h"
Ian Rogers306057f2012-11-26 12:45:53 -080037#include "jvalue.h"
Mathieu Chartier83c8ee02014-01-28 14:50:23 -080038#include "object_callbacks.h"
Brian Carlstrom578bbdc2011-07-21 14:07:47 -070039#include "offsets.h"
Elliott Hughes9d5ccec2011-09-19 13:19:50 -070040#include "runtime_stats.h"
Elliott Hughes68e76522011-10-05 13:22:16 -070041#include "stack.h"
Ian Rogers2dd0e2c2013-01-24 12:42:14 -080042#include "thread_state.h"
Ian Rogers62d6c772013-02-27 08:32:07 -080043#include "throw_location.h"
Ian Rogersb033c752011-07-20 12:22:35 -070044
Carl Shapiro0e5d75d2011-07-06 18:28:37 -070045namespace art {
46
Mathieu Chartier15d34022014-02-26 17:16:38 -080047namespace gc {
48namespace collector {
Mingyao Yang98d1cc82014-05-15 17:02:16 -070049 class SemiSpace;
Mathieu Chartier15d34022014-02-26 17:16:38 -080050} // namespace collector
51} // namespace gc
52
Ian Rogers2dd0e2c2013-01-24 12:42:14 -080053namespace mirror {
Brian Carlstromea46f952013-07-30 01:26:50 -070054 class ArtMethod;
Ian Rogers848871b2013-08-05 10:56:33 -070055 class Array;
56 class Class;
57 class ClassLoader;
58 class Object;
59 template<class T> class ObjectArray;
60 template<class T> class PrimitiveArray;
61 typedef PrimitiveArray<int32_t> IntArray;
62 class StackTraceElement;
Ian Rogers848871b2013-08-05 10:56:33 -070063 class Throwable;
Ian Rogers2dd0e2c2013-01-24 12:42:14 -080064} // namespace mirror
65class BaseMutex;
66class ClassLinker;
Ian Rogers7a22fa62013-01-23 12:16:16 -080067class Closure;
Ian Rogersbdb03912011-09-14 00:55:44 -070068class Context;
Ian Rogers1b09b092012-08-20 15:35:52 -070069struct DebugInvokeReq;
Ian Rogers81d425b2012-09-27 16:03:43 -070070class DexFile;
Ian Rogersb48b9eb2014-02-28 16:20:21 -080071class JavaVMExt;
Ian Rogers81d425b2012-09-27 16:03:43 -070072struct JNIEnvExt;
Elliott Hughes8daa0922011-09-11 13:46:25 -070073class Monitor;
Carl Shapirob5573532011-07-12 18:22:59 -070074class Runtime;
Mathieu Chartier2b7c4d12014-05-19 10:52:16 -070075class ScopedObjectAccessAlreadyRunnable;
Logan Chienf7ad17e2012-03-15 03:10:03 +080076class ShadowFrame;
Sebastien Hertz61b7f1b2013-11-15 15:59:30 +010077struct SingleStepControl;
Brian Carlstrom40381fb2011-10-19 14:13:40 -070078class Thread;
79class ThreadList;
Carl Shapiro0e5d75d2011-07-06 18:28:37 -070080
Elliott Hughes34e06962012-04-09 13:55:55 -070081// Thread priorities. These must match the Thread.MIN_PRIORITY,
82// Thread.NORM_PRIORITY, and Thread.MAX_PRIORITY constants.
83enum ThreadPriority {
84 kMinThreadPriority = 1,
85 kNormThreadPriority = 5,
86 kMaxThreadPriority = 10,
87};
88
Ian Rogers474b6da2012-09-25 00:20:38 -070089enum ThreadFlag {
Ian Rogers50ffee22012-11-20 11:47:44 -080090 kSuspendRequest = 1, // If set implies that suspend_count_ > 0 and the Thread should enter the
91 // safepoint handler.
Ian Rogers62d6c772013-02-27 08:32:07 -080092 kCheckpointRequest = 2 // Request that the thread do some checkpoint work and then continue.
Ian Rogers474b6da2012-09-25 00:20:38 -070093};
94
Ian Rogerse63db272014-07-15 15:36:11 -070095static constexpr size_t kNumRosAllocThreadLocalSizeBrackets = 34;
96
Dave Allison648d7112014-07-25 16:15:27 -070097// Thread's stack layout for implicit stack overflow checks:
98//
99// +---------------------+ <- highest address of stack memory
100// | |
101// . . <- SP
102// | |
103// | |
104// +---------------------+ <- stack_end
105// | |
106// | Gap |
107// | |
108// +---------------------+ <- stack_begin
109// | |
110// | Protected region |
111// | |
112// +---------------------+ <- lowest address of stack memory
113//
114// The stack always grows down in memory. At the lowest address is a region of memory
115// that is set mprotect(PROT_NONE). Any attempt to read/write to this region will
116// result in a segmentation fault signal. At any point, the thread's SP will be somewhere
117// between the stack_end and the highest address in stack memory. An implicit stack
118// overflow check is a read of memory at a certain offset below the current SP (4K typically).
119// If the thread's SP is below the stack_end address this will be a read into the protected
120// region. If the SP is above the stack_end address, the thread is guaranteed to have
121// at least 4K of space. Because stack overflow checks are only performed in generated code,
122// if the thread makes a call out to a native function (through JNI), that native function
123// might only have 4K of memory (if the SP is adjacent to stack_end).
124
Ian Rogersdd7624d2014-03-14 17:43:00 -0700125class Thread {
Carl Shapiro0e5d75d2011-07-06 18:28:37 -0700126 public:
Dave Allisonf9439142014-03-27 15:10:22 -0700127 // For implicit overflow checks we reserve an extra piece of memory at the bottom
128 // of the stack (lowest memory). The higher portion of the memory
129 // is protected against reads and the lower is available for use while
130 // throwing the StackOverflow exception.
Dave Allison648d7112014-07-25 16:15:27 -0700131 static constexpr size_t kStackOverflowProtectedSize = 4 * KB;
Andreas Gampe7ea6f792014-07-14 16:21:44 -0700132 static const size_t kStackOverflowImplicitCheckSize;
Dave Allisonf9439142014-03-27 15:10:22 -0700133
Elliott Hughes462c9442012-03-23 18:47:50 -0700134 // Creates a new native thread corresponding to the given managed peer.
135 // Used to implement Thread.start.
Ian Rogers52673ff2012-06-27 23:25:34 -0700136 static void CreateNativeThread(JNIEnv* env, jobject peer, size_t stack_size, bool daemon);
Carl Shapiro61e019d2011-07-14 16:53:09 -0700137
Elliott Hughes462c9442012-03-23 18:47:50 -0700138 // Attaches the calling native thread to the runtime, returning the new native peer.
139 // Used to implement JNI AttachCurrentThread and AttachCurrentThreadAsDaemon calls.
Mathieu Chartier664bebf2012-11-12 16:54:11 -0800140 static Thread* Attach(const char* thread_name, bool as_daemon, jobject thread_group,
141 bool create_peer);
Carl Shapirob5573532011-07-12 18:22:59 -0700142
Brian Carlstromcaabb1b2011-10-11 18:09:13 -0700143 // Reset internal state of child thread after fork.
144 void InitAfterFork();
145
Ian Rogers02ed4c02013-09-06 13:10:04 -0700146 static Thread* Current();
Carl Shapiro0e5d75d2011-07-06 18:28:37 -0700147
Mathieu Chartier2b7c4d12014-05-19 10:52:16 -0700148 static Thread* FromManagedThread(const ScopedObjectAccessAlreadyRunnable& ts,
Ian Rogers2dd0e2c2013-01-24 12:42:14 -0800149 mirror::Object* thread_peer)
jeffhaoa77f0f62012-12-05 17:19:31 -0800150 EXCLUSIVE_LOCKS_REQUIRED(Locks::thread_list_lock_)
Ian Rogersb726dcb2012-09-05 08:57:23 -0700151 LOCKS_EXCLUDED(Locks::thread_suspend_count_lock_)
152 SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
Mathieu Chartier2b7c4d12014-05-19 10:52:16 -0700153 static Thread* FromManagedThread(const ScopedObjectAccessAlreadyRunnable& ts, jobject thread)
jeffhaoa77f0f62012-12-05 17:19:31 -0800154 EXCLUSIVE_LOCKS_REQUIRED(Locks::thread_list_lock_)
Ian Rogersb726dcb2012-09-05 08:57:23 -0700155 LOCKS_EXCLUDED(Locks::thread_suspend_count_lock_)
156 SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
Elliott Hughes8daa0922011-09-11 13:46:25 -0700157
Elliott Hughes28fa76d2012-04-09 17:31:46 -0700158 // Translates 172 to pAllocArrayFromCode and so on.
Ian Rogersdd7624d2014-03-14 17:43:00 -0700159 template<size_t size_of_pointers>
160 static void DumpThreadOffset(std::ostream& os, uint32_t offset);
Elliott Hughes28fa76d2012-04-09 17:31:46 -0700161
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700162 // Dumps a one-line summary of thread state (used for operator<<).
163 void ShortDump(std::ostream& os) const;
164
165 // Dumps the detailed thread state and the thread stack (used for SIGQUIT).
166 void Dump(std::ostream& os) const
Ian Rogersb726dcb2012-09-05 08:57:23 -0700167 LOCKS_EXCLUDED(Locks::thread_suspend_count_lock_)
168 SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
Elliott Hughesa0957642011-09-02 14:27:33 -0700169
Mathieu Chartierc751fdc2014-03-30 15:25:44 -0700170 void DumpJavaStack(std::ostream& os) const
171 LOCKS_EXCLUDED(Locks::thread_suspend_count_lock_)
172 SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
173
Elliott Hughesabbe07d2012-06-05 17:42:23 -0700174 // Dumps the SIGQUIT per-thread header. 'thread' can be NULL for a non-attached thread, in which
175 // case we use 'tid' to identify the thread, and we'll include as much information as we can.
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700176 static void DumpState(std::ostream& os, const Thread* thread, pid_t tid)
Ian Rogerscfaa4552012-11-26 21:00:08 -0800177 LOCKS_EXCLUDED(Locks::thread_suspend_count_lock_)
178 SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
Elliott Hughesabbe07d2012-06-05 17:42:23 -0700179
Ian Rogers474b6da2012-09-25 00:20:38 -0700180 ThreadState GetState() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700181 DCHECK_GE(tls32_.state_and_flags.as_struct.state, kTerminated);
182 DCHECK_LE(tls32_.state_and_flags.as_struct.state, kSuspended);
183 return static_cast<ThreadState>(tls32_.state_and_flags.as_struct.state);
Dave Allison0aded082013-11-07 13:15:11 -0800184 }
185
Ian Rogers474b6da2012-09-25 00:20:38 -0700186 ThreadState SetState(ThreadState new_state);
Ian Rogers52673ff2012-06-27 23:25:34 -0700187
Ian Rogers81d425b2012-09-27 16:03:43 -0700188 int GetSuspendCount() const EXCLUSIVE_LOCKS_REQUIRED(Locks::thread_suspend_count_lock_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700189 return tls32_.suspend_count;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700190 }
Elliott Hughes038a8062011-09-18 14:12:41 -0700191
Ian Rogers81d425b2012-09-27 16:03:43 -0700192 int GetDebugSuspendCount() const EXCLUSIVE_LOCKS_REQUIRED(Locks::thread_suspend_count_lock_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700193 return tls32_.debug_suspend_count;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700194 }
195
Mathieu Chartier858f1c52012-10-17 17:45:55 -0700196 bool IsSuspended() const {
Chris Dearman59cde532013-12-04 18:53:49 -0800197 union StateAndFlags state_and_flags;
Ian Rogersdd7624d2014-03-14 17:43:00 -0700198 state_and_flags.as_int = tls32_.state_and_flags.as_int;
Mathieu Chartier858f1c52012-10-17 17:45:55 -0700199 return state_and_flags.as_struct.state != kRunnable &&
200 (state_and_flags.as_struct.flags & kSuspendRequest) != 0;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700201 }
202
Ian Rogers01ae5802012-09-28 16:14:01 -0700203 void ModifySuspendCount(Thread* self, int delta, bool for_debugger)
Ian Rogersb726dcb2012-09-05 08:57:23 -0700204 EXCLUSIVE_LOCKS_REQUIRED(Locks::thread_suspend_count_lock_);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700205
Ian Rogersd9c4fc92013-10-01 19:45:43 -0700206 bool RequestCheckpoint(Closure* function)
207 EXCLUSIVE_LOCKS_REQUIRED(Locks::thread_suspend_count_lock_);
Mathieu Chartier858f1c52012-10-17 17:45:55 -0700208
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700209 // Called when thread detected that the thread_suspend_count_ was non-zero. Gives up share of
210 // mutator_lock_ and waits until it is resumed and thread_suspend_count_ is zero.
Ian Rogers9da7f592012-08-20 17:14:28 -0700211 void FullSuspendCheck()
Ian Rogersb726dcb2012-09-05 08:57:23 -0700212 LOCKS_EXCLUDED(Locks::thread_suspend_count_lock_)
213 SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700214
215 // Transition from non-runnable to runnable state acquiring share on mutator_lock_.
216 ThreadState TransitionFromSuspendedToRunnable()
Ian Rogersb726dcb2012-09-05 08:57:23 -0700217 LOCKS_EXCLUDED(Locks::thread_suspend_count_lock_)
Ian Rogers693ff612013-02-01 10:56:12 -0800218 SHARED_LOCK_FUNCTION(Locks::mutator_lock_)
Ian Rogers1ffa32f2013-02-05 18:29:08 -0800219 ALWAYS_INLINE;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700220
221 // Transition from runnable into a state where mutator privileges are denied. Releases share of
222 // mutator lock.
223 void TransitionFromRunnableToSuspended(ThreadState new_state)
Ian Rogersb726dcb2012-09-05 08:57:23 -0700224 LOCKS_EXCLUDED(Locks::thread_suspend_count_lock_)
Ian Rogers693ff612013-02-01 10:56:12 -0800225 UNLOCK_FUNCTION(Locks::mutator_lock_)
Ian Rogers1ffa32f2013-02-05 18:29:08 -0800226 ALWAYS_INLINE;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700227
Ian Rogers0399dde2012-06-06 17:09:28 -0700228 // Once called thread suspension will cause an assertion failure.
Ian Rogers52673ff2012-06-27 23:25:34 -0700229 const char* StartAssertNoThreadSuspension(const char* cause) {
Mathieu Chartier590fee92013-09-13 13:46:47 -0700230 if (kIsDebugBuild) {
231 CHECK(cause != NULL);
Ian Rogersdd7624d2014-03-14 17:43:00 -0700232 const char* previous_cause = tlsPtr_.last_no_thread_suspension_cause;
233 tls32_.no_thread_suspension++;
234 tlsPtr_.last_no_thread_suspension_cause = cause;
Mathieu Chartier590fee92013-09-13 13:46:47 -0700235 return previous_cause;
236 } else {
237 return nullptr;
238 }
Ian Rogers0399dde2012-06-06 17:09:28 -0700239 }
Ian Rogers52673ff2012-06-27 23:25:34 -0700240
Ian Rogers0399dde2012-06-06 17:09:28 -0700241 // End region where no thread suspension is expected.
Ian Rogers52673ff2012-06-27 23:25:34 -0700242 void EndAssertNoThreadSuspension(const char* old_cause) {
Mathieu Chartier590fee92013-09-13 13:46:47 -0700243 if (kIsDebugBuild) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700244 CHECK(old_cause != nullptr || tls32_.no_thread_suspension == 1);
245 CHECK_GT(tls32_.no_thread_suspension, 0U);
246 tls32_.no_thread_suspension--;
247 tlsPtr_.last_no_thread_suspension_cause = old_cause;
Mathieu Chartier590fee92013-09-13 13:46:47 -0700248 }
Ian Rogers0399dde2012-06-06 17:09:28 -0700249 }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700250
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700251 void AssertThreadSuspensionIsAllowable(bool check_locks = true) const;
Ian Rogers0399dde2012-06-06 17:09:28 -0700252
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700253 bool IsDaemon() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700254 return tls32_.daemon;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700255 }
256
Ian Rogersdd7624d2014-03-14 17:43:00 -0700257 bool HoldsLock(mirror::Object*) const SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
Elliott Hughes5f791332011-09-15 17:45:30 -0700258
Elliott Hughes8daa0922011-09-11 13:46:25 -0700259 /*
260 * Changes the priority of this thread to match that of the java.lang.Thread object.
261 *
262 * We map a priority value from 1-10 to Linux "nice" values, where lower
263 * numbers indicate higher priority.
264 */
265 void SetNativePriority(int newPriority);
266
267 /*
268 * Returns the thread priority for the current thread by querying the system.
269 * This is useful when attaching a thread through JNI.
270 *
271 * Returns a value from 1 to 10 (compatible with java.lang.Thread values).
272 */
273 static int GetNativePriority();
274
Ian Rogersd9c4fc92013-10-01 19:45:43 -0700275 uint32_t GetThreadId() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700276 return tls32_.thin_lock_thread_id;
Carl Shapirob5573532011-07-12 18:22:59 -0700277 }
278
Elliott Hughesd92bec42011-09-02 17:04:36 -0700279 pid_t GetTid() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700280 return tls32_.tid;
Elliott Hughesd92bec42011-09-02 17:04:36 -0700281 }
Elliott Hughese27955c2011-08-26 15:21:24 -0700282
Elliott Hughesffb465f2012-03-01 18:46:05 -0800283 // Returns the java.lang.Thread's name, or NULL if this Thread* doesn't have a peer.
Mathieu Chartier2b7c4d12014-05-19 10:52:16 -0700284 mirror::String* GetThreadName(const ScopedObjectAccessAlreadyRunnable& ts) const
Ian Rogersb726dcb2012-09-05 08:57:23 -0700285 SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
Elliott Hughes899e7892012-01-24 14:57:32 -0800286
Elliott Hughesffb465f2012-03-01 18:46:05 -0800287 // Sets 'name' to the java.lang.Thread's name. This requires no transition to managed code,
288 // allocation, or locking.
289 void GetThreadName(std::string& name) const;
290
Elliott Hughes899e7892012-01-24 14:57:32 -0800291 // Sets the thread's name.
Ian Rogersb726dcb2012-09-05 08:57:23 -0700292 void SetThreadName(const char* name) SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
Elliott Hughesfc861622011-10-17 17:57:47 -0700293
Jeff Hao57dac6e2013-08-15 16:36:24 -0700294 // Returns the thread-specific CPU-time clock in microseconds or -1 if unavailable.
295 uint64_t GetCpuMicroTime() const;
296
Ian Rogers2dd0e2c2013-01-24 12:42:14 -0800297 mirror::Object* GetPeer() const SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700298 CHECK(tlsPtr_.jpeer == nullptr);
299 return tlsPtr_.opeer;
Elliott Hughes8daa0922011-09-11 13:46:25 -0700300 }
301
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700302 bool HasPeer() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700303 return tlsPtr_.jpeer != nullptr || tlsPtr_.opeer != nullptr;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700304 }
305
Elliott Hughes9d5ccec2011-09-19 13:19:50 -0700306 RuntimeStats* GetStats() {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700307 return &tls64_.stats;
Elliott Hughes9d5ccec2011-09-19 13:19:50 -0700308 }
309
Elliott Hughes7dc51662012-05-16 14:48:43 -0700310 bool IsStillStarting() const;
311
Carl Shapiro0e5d75d2011-07-06 18:28:37 -0700312 bool IsExceptionPending() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700313 return tlsPtr_.exception != nullptr;
Carl Shapiro0e5d75d2011-07-06 18:28:37 -0700314 }
315
Ian Rogers62d6c772013-02-27 08:32:07 -0800316 mirror::Throwable* GetException(ThrowLocation* throw_location) const
317 SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700318 if (throw_location != nullptr) {
319 *throw_location = tlsPtr_.throw_location;
Ian Rogers62d6c772013-02-27 08:32:07 -0800320 }
Ian Rogersdd7624d2014-03-14 17:43:00 -0700321 return tlsPtr_.exception;
Carl Shapiro0e5d75d2011-07-06 18:28:37 -0700322 }
323
Andreas Gamped9efea62014-07-21 22:56:08 -0700324 void AssertPendingException() const;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700325 void AssertNoPendingException() const;
Mathieu Chartier8d7672e2014-02-25 10:57:16 -0800326 void AssertNoPendingExceptionForNewException(const char* msg) const;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700327
Ian Rogers62d6c772013-02-27 08:32:07 -0800328 void SetException(const ThrowLocation& throw_location, mirror::Throwable* new_exception)
329 SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) {
Ian Rogers0cfe1fb2011-08-26 03:29:44 -0700330 CHECK(new_exception != NULL);
Ian Rogers474b6da2012-09-25 00:20:38 -0700331 // TODO: DCHECK(!IsExceptionPending());
Ian Rogersdd7624d2014-03-14 17:43:00 -0700332 tlsPtr_.exception = new_exception;
333 tlsPtr_.throw_location = throw_location;
Ian Rogers0cfe1fb2011-08-26 03:29:44 -0700334 }
335
Serguei Katkova309d762014-05-26 11:23:39 +0700336 void ClearException() SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700337 tlsPtr_.exception = nullptr;
338 tlsPtr_.throw_location.Clear();
Sebastien Hertz9f102032014-05-23 08:59:42 +0200339 SetExceptionReportedToInstrumentation(false);
jeffhao94d6df42012-11-26 16:02:12 -0800340 }
341
Ian Rogersbdb03912011-09-14 00:55:44 -0700342 // Find catch block and perform long jump to appropriate exception handle
jeffhao94d6df42012-11-26 16:02:12 -0800343 void QuickDeliverException() SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
Ian Rogersbdb03912011-09-14 00:55:44 -0700344
345 Context* GetLongJumpContext();
Ian Rogers0399dde2012-06-06 17:09:28 -0700346 void ReleaseLongJumpContext(Context* context) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700347 DCHECK(tlsPtr_.long_jump_context == nullptr);
348 tlsPtr_.long_jump_context = context;
Shih-wei Liao1a18c8c2011-08-14 17:47:36 -0700349 }
350
Andreas Gampe6ec8ebd2014-07-25 13:36:56 -0700351 // Get the current method and dex pc. If there are errors in retrieving the dex pc, this will
352 // abort the runtime iff abort_on_error is true.
353 mirror::ArtMethod* GetCurrentMethod(uint32_t* dex_pc, bool abort_on_error = true) const
Ian Rogersb726dcb2012-09-05 08:57:23 -0700354 SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
Ian Rogers0399dde2012-06-06 17:09:28 -0700355
Ian Rogers62d6c772013-02-27 08:32:07 -0800356 ThrowLocation GetCurrentLocationForThrow() SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
357
Andreas Gampecf4035a2014-05-28 22:43:01 -0700358 void SetTopOfStack(StackReference<mirror::ArtMethod>* top_method, uintptr_t pc) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700359 tlsPtr_.managed_stack.SetTopQuickFrame(top_method);
360 tlsPtr_.managed_stack.SetTopQuickFramePc(pc);
Carl Shapiro0e5d75d2011-07-06 18:28:37 -0700361 }
362
Jeff Hao11ffc2d2013-02-01 11:52:17 -0800363 void SetTopOfShadowStack(ShadowFrame* top) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700364 tlsPtr_.managed_stack.SetTopShadowFrame(top);
Jeff Hao11ffc2d2013-02-01 11:52:17 -0800365 }
366
Ian Rogers0399dde2012-06-06 17:09:28 -0700367 bool HasManagedStack() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700368 return (tlsPtr_.managed_stack.GetTopQuickFrame() != nullptr) ||
369 (tlsPtr_.managed_stack.GetTopShadowFrame() != nullptr);
Ian Rogersbdb03912011-09-14 00:55:44 -0700370 }
371
Elliott Hughesa4f94742012-05-29 16:28:38 -0700372 // If 'msg' is NULL, no detail message is set.
Ian Rogers62d6c772013-02-27 08:32:07 -0800373 void ThrowNewException(const ThrowLocation& throw_location,
374 const char* exception_class_descriptor, const char* msg)
Ian Rogersb726dcb2012-09-05 08:57:23 -0700375 SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
Elliott Hughes5cb5ad22011-10-02 12:13:39 -0700376
Elliott Hughesa4f94742012-05-29 16:28:38 -0700377 // If 'msg' is NULL, no detail message is set. An exception must be pending, and will be
378 // used as the new exception's cause.
Ian Rogers62d6c772013-02-27 08:32:07 -0800379 void ThrowNewWrappedException(const ThrowLocation& throw_location,
380 const char* exception_class_descriptor,
381 const char* msg)
Ian Rogersb726dcb2012-09-05 08:57:23 -0700382 SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
Elliott Hughesa4f94742012-05-29 16:28:38 -0700383
Ian Rogers62d6c772013-02-27 08:32:07 -0800384 void ThrowNewExceptionF(const ThrowLocation& throw_location,
385 const char* exception_class_descriptor, const char* fmt, ...)
386 __attribute__((format(printf, 4, 5)))
Ian Rogersb726dcb2012-09-05 08:57:23 -0700387 SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
Elliott Hughesa5b897e2011-08-16 11:33:06 -0700388
Ian Rogers62d6c772013-02-27 08:32:07 -0800389 void ThrowNewExceptionV(const ThrowLocation& throw_location,
390 const char* exception_class_descriptor, const char* fmt, va_list ap)
Ian Rogersb726dcb2012-09-05 08:57:23 -0700391 SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
Elliott Hughes4a2b4172011-09-20 17:08:25 -0700392
Elliott Hughes2ced6a52011-10-16 18:44:48 -0700393 // OutOfMemoryError is special, because we need to pre-allocate an instance.
Elliott Hughes8a8b9cb2012-04-13 18:29:22 -0700394 // Only the GC should call this.
Ian Rogers120f1c72012-09-28 17:17:10 -0700395 void ThrowOutOfMemoryError(const char* msg) SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
Elliott Hughes79082e32011-08-25 12:07:32 -0700396
Elliott Hughesbe759c62011-09-08 19:38:21 -0700397 static void Startup();
Elliott Hughes038a8062011-09-18 14:12:41 -0700398 static void FinishStartup();
Elliott Hughesc1674ed2011-08-25 18:09:09 -0700399 static void Shutdown();
Carl Shapirob5573532011-07-12 18:22:59 -0700400
Ian Rogersb033c752011-07-20 12:22:35 -0700401 // JNI methods
Elliott Hughes69f5bc62011-08-24 09:26:14 -0700402 JNIEnvExt* GetJniEnv() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700403 return tlsPtr_.jni_env;
Ian Rogersb033c752011-07-20 12:22:35 -0700404 }
405
Ian Rogers408f79a2011-08-23 18:22:33 -0700406 // Convert a jobject into a Object*
Ian Rogers2dd0e2c2013-01-24 12:42:14 -0800407 mirror::Object* DecodeJObject(jobject obj) const SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
Ian Rogersb033c752011-07-20 12:22:35 -0700408
Mathieu Chartiera6e7f082014-05-22 14:43:37 -0700409 mirror::Object* GetMonitorEnterObject() const SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700410 return tlsPtr_.monitor_enter_object;
411 }
412
Mathieu Chartiera6e7f082014-05-22 14:43:37 -0700413 void SetMonitorEnterObject(mirror::Object* obj) SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700414 tlsPtr_.monitor_enter_object = obj;
415 }
416
Elliott Hughes8daa0922011-09-11 13:46:25 -0700417 // Implements java.lang.Thread.interrupted.
Ian Rogersdd7624d2014-03-14 17:43:00 -0700418 bool Interrupted() LOCKS_EXCLUDED(wait_mutex_);
Elliott Hughes8daa0922011-09-11 13:46:25 -0700419 // Implements java.lang.Thread.isInterrupted.
Ian Rogersdd7624d2014-03-14 17:43:00 -0700420 bool IsInterrupted() LOCKS_EXCLUDED(wait_mutex_);
421 bool IsInterruptedLocked() EXCLUSIVE_LOCKS_REQUIRED(wait_mutex_) {
422 return interrupted_;
423 }
424 void Interrupt(Thread* self) LOCKS_EXCLUDED(wait_mutex_);
425 void SetInterruptedLocked(bool i) EXCLUSIVE_LOCKS_REQUIRED(wait_mutex_) {
426 interrupted_ = i;
427 }
428 void Notify() LOCKS_EXCLUDED(wait_mutex_);
429
430 private:
431 void NotifyLocked(Thread* self) EXCLUSIVE_LOCKS_REQUIRED(wait_mutex_);
432
433 public:
434 Mutex* GetWaitMutex() const LOCK_RETURNED(wait_mutex_) {
435 return wait_mutex_;
436 }
437
438 ConditionVariable* GetWaitConditionVariable() const EXCLUSIVE_LOCKS_REQUIRED(wait_mutex_) {
439 return wait_cond_;
440 }
441
442 Monitor* GetWaitMonitor() const EXCLUSIVE_LOCKS_REQUIRED(wait_mutex_) {
443 return wait_monitor_;
444 }
445
446 void SetWaitMonitor(Monitor* mon) EXCLUSIVE_LOCKS_REQUIRED(wait_mutex_) {
447 wait_monitor_ = mon;
448 }
449
450
451 // Waiter link-list support.
452 Thread* GetWaitNext() const {
453 return tlsPtr_.wait_next;
454 }
455
456 void SetWaitNext(Thread* next) {
457 tlsPtr_.wait_next = next;
458 }
Elliott Hughes5f791332011-09-15 17:45:30 -0700459
Ian Rogers68d8b422014-07-17 11:09:10 -0700460 jobject GetClassLoaderOverride() {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700461 return tlsPtr_.class_loader_override;
buzbeec143c552011-08-20 17:38:58 -0700462 }
463
Ian Rogers68d8b422014-07-17 11:09:10 -0700464 void SetClassLoaderOverride(jobject class_loader_override);
buzbeec143c552011-08-20 17:38:58 -0700465
Ian Rogersaaa20802011-09-11 21:47:37 -0700466 // Create the internal representation of a stack trace, that is more time
Sebastien Hertzee1d79a2014-02-21 15:46:30 +0100467 // and space efficient to compute than the StackTraceElement[].
468 template<bool kTransactionActive>
Mathieu Chartier2b7c4d12014-05-19 10:52:16 -0700469 jobject CreateInternalStackTrace(const ScopedObjectAccessAlreadyRunnable& soa) const
Ian Rogersb726dcb2012-09-05 08:57:23 -0700470 SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
Ian Rogersaaa20802011-09-11 21:47:37 -0700471
Elliott Hughes01158d72011-09-19 19:47:10 -0700472 // Convert an internal stack trace representation (returned by CreateInternalStackTrace) to a
473 // StackTraceElement[]. If output_array is NULL, a new array is created, otherwise as many
474 // frames as will fit are written into the given array. If stack_depth is non-NULL, it's updated
475 // with the number of valid frames in the returned array.
Mathieu Chartier2b7c4d12014-05-19 10:52:16 -0700476 static jobjectArray InternalStackTraceToStackTraceElementArray(
477 const ScopedObjectAccessAlreadyRunnable& soa, jobject internal,
478 jobjectArray output_array = nullptr, int* stack_depth = nullptr)
Ian Rogers53b8b092014-03-13 23:45:53 -0700479 SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
Shih-wei Liao55df06b2011-08-26 14:39:27 -0700480
Mathieu Chartier83c8ee02014-01-28 14:50:23 -0800481 void VisitRoots(RootCallback* visitor, void* arg) SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
Elliott Hughes410c0c82011-09-01 17:58:25 -0700482
Mathieu Chartier4e305412014-02-19 10:54:44 -0800483 ALWAYS_INLINE void VerifyStack() SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
jeffhao25045522012-03-13 19:34:37 -0700484
Elliott Hughesbe759c62011-09-08 19:38:21 -0700485 //
486 // Offsets of various members of native Thread class, used by compiled code.
487 //
488
Ian Rogersdd7624d2014-03-14 17:43:00 -0700489 template<size_t pointer_size>
490 static ThreadOffset<pointer_size> ThinLockIdOffset() {
491 return ThreadOffset<pointer_size>(
492 OFFSETOF_MEMBER(Thread, tls32_) +
493 OFFSETOF_MEMBER(tls_32bit_sized_values, thin_lock_thread_id));
Elliott Hughesbe759c62011-09-08 19:38:21 -0700494 }
495
Ian Rogersdd7624d2014-03-14 17:43:00 -0700496 template<size_t pointer_size>
497 static ThreadOffset<pointer_size> ThreadFlagsOffset() {
498 return ThreadOffset<pointer_size>(
499 OFFSETOF_MEMBER(Thread, tls32_) +
500 OFFSETOF_MEMBER(tls_32bit_sized_values, state_and_flags));
Elliott Hughesbe759c62011-09-08 19:38:21 -0700501 }
502
Ian Rogersdd7624d2014-03-14 17:43:00 -0700503 private:
504 template<size_t pointer_size>
505 static ThreadOffset<pointer_size> ThreadOffsetFromTlsPtr(size_t tls_ptr_offset) {
506 size_t base = OFFSETOF_MEMBER(Thread, tlsPtr_);
507 size_t scale;
508 size_t shrink;
509 if (pointer_size == sizeof(void*)) {
510 scale = 1;
511 shrink = 1;
512 } else if (pointer_size > sizeof(void*)) {
513 scale = pointer_size / sizeof(void*);
514 shrink = 1;
515 } else {
516 DCHECK_GT(sizeof(void*), pointer_size);
517 scale = 1;
518 shrink = sizeof(void*) / pointer_size;
519 }
520 return ThreadOffset<pointer_size>(base + ((tls_ptr_offset * scale) / shrink));
Ian Rogers07ec8e12012-12-01 01:26:51 -0800521 }
522
Ian Rogersdd7624d2014-03-14 17:43:00 -0700523 public:
524 template<size_t pointer_size>
525 static ThreadOffset<pointer_size> QuickEntryPointOffset(size_t quick_entrypoint_offset) {
526 return ThreadOffsetFromTlsPtr<pointer_size>(
527 OFFSETOF_MEMBER(tls_ptr_sized_values, quick_entrypoints) + quick_entrypoint_offset);
Elliott Hughesbe759c62011-09-08 19:38:21 -0700528 }
529
Ian Rogersdd7624d2014-03-14 17:43:00 -0700530 template<size_t pointer_size>
531 static ThreadOffset<pointer_size> InterpreterEntryPointOffset(size_t interp_entrypoint_offset) {
532 return ThreadOffsetFromTlsPtr<pointer_size>(
533 OFFSETOF_MEMBER(tls_ptr_sized_values, interpreter_entrypoints) + interp_entrypoint_offset);
Elliott Hughesbe759c62011-09-08 19:38:21 -0700534 }
535
Ian Rogersdd7624d2014-03-14 17:43:00 -0700536 template<size_t pointer_size>
537 static ThreadOffset<pointer_size> JniEntryPointOffset(size_t jni_entrypoint_offset) {
538 return ThreadOffsetFromTlsPtr<pointer_size>(
539 OFFSETOF_MEMBER(tls_ptr_sized_values, jni_entrypoints) + jni_entrypoint_offset);
Elliott Hughesbe759c62011-09-08 19:38:21 -0700540 }
541
Ian Rogersdd7624d2014-03-14 17:43:00 -0700542 template<size_t pointer_size>
543 static ThreadOffset<pointer_size> PortableEntryPointOffset(size_t port_entrypoint_offset) {
544 return ThreadOffsetFromTlsPtr<pointer_size>(
545 OFFSETOF_MEMBER(tls_ptr_sized_values, portable_entrypoints) + port_entrypoint_offset);
546 }
547
548 template<size_t pointer_size>
549 static ThreadOffset<pointer_size> SelfOffset() {
550 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values, self));
551 }
552
553 template<size_t pointer_size>
554 static ThreadOffset<pointer_size> ExceptionOffset() {
555 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values, exception));
556 }
557
558 template<size_t pointer_size>
559 static ThreadOffset<pointer_size> PeerOffset() {
560 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values, opeer));
561 }
562
563
564 template<size_t pointer_size>
565 static ThreadOffset<pointer_size> CardTableOffset() {
566 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values, card_table));
567 }
568
569 template<size_t pointer_size>
570 static ThreadOffset<pointer_size> ThreadSuspendTriggerOffset() {
571 return ThreadOffsetFromTlsPtr<pointer_size>(
572 OFFSETOF_MEMBER(tls_ptr_sized_values, suspend_trigger));
Dave Allisonb373e092014-02-20 16:06:36 -0800573 }
574
Ian Rogers932746a2011-09-22 18:57:50 -0700575 // Size of stack less any space reserved for stack overflow
jeffhaod7521322012-11-21 15:38:24 -0800576 size_t GetStackSize() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700577 return tlsPtr_.stack_size - (tlsPtr_.stack_end - tlsPtr_.stack_begin);
Ian Rogers932746a2011-09-22 18:57:50 -0700578 }
579
Nicolas Geoffray535a3fb2014-07-22 15:17:38 +0100580 byte* GetStackEndForInterpreter(bool implicit_overflow_check) const {
581 if (implicit_overflow_check) {
582 // The interpreter needs the extra overflow bytes that stack_end does
583 // not include.
584 return tlsPtr_.stack_end + GetStackOverflowReservedBytes(kRuntimeISA);
585 } else {
586 return tlsPtr_.stack_end;
587 }
588 }
589
jeffhaod7521322012-11-21 15:38:24 -0800590 byte* GetStackEnd() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700591 return tlsPtr_.stack_end;
jeffhaod7521322012-11-21 15:38:24 -0800592 }
593
Ian Rogers932746a2011-09-22 18:57:50 -0700594 // Set the stack end to that to be used during a stack overflow
Ian Rogersb726dcb2012-09-05 08:57:23 -0700595 void SetStackEndForStackOverflow() SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
Ian Rogers932746a2011-09-22 18:57:50 -0700596
597 // Set the stack end to that to be used during regular execution
Dave Allisonb090a182014-08-14 17:02:48 +0000598 void ResetDefaultStackEnd() {
Ian Rogers932746a2011-09-22 18:57:50 -0700599 // Our stacks grow down, so we want stack_end_ to be near there, but reserving enough room
600 // to throw a StackOverflowError.
Dave Allisonb090a182014-08-14 17:02:48 +0000601 tlsPtr_.stack_end = tlsPtr_.stack_begin + GetStackOverflowReservedBytes(kRuntimeISA);
Ian Rogers932746a2011-09-22 18:57:50 -0700602 }
603
Dave Allisonf9439142014-03-27 15:10:22 -0700604 // Install the protected region for implicit stack checks.
Dave Allison648d7112014-07-25 16:15:27 -0700605 void InstallImplicitProtection();
Dave Allisonf9439142014-03-27 15:10:22 -0700606
Ian Rogers120f1c72012-09-28 17:17:10 -0700607 bool IsHandlingStackOverflow() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700608 return tlsPtr_.stack_end == tlsPtr_.stack_begin;
Ian Rogers120f1c72012-09-28 17:17:10 -0700609 }
610
Ian Rogersdd7624d2014-03-14 17:43:00 -0700611 template<size_t pointer_size>
612 static ThreadOffset<pointer_size> StackEndOffset() {
613 return ThreadOffsetFromTlsPtr<pointer_size>(
614 OFFSETOF_MEMBER(tls_ptr_sized_values, stack_end));
Elliott Hughesbe759c62011-09-08 19:38:21 -0700615 }
616
Ian Rogersdd7624d2014-03-14 17:43:00 -0700617 template<size_t pointer_size>
618 static ThreadOffset<pointer_size> JniEnvOffset() {
619 return ThreadOffsetFromTlsPtr<pointer_size>(
620 OFFSETOF_MEMBER(tls_ptr_sized_values, jni_env));
Elliott Hughesbe759c62011-09-08 19:38:21 -0700621 }
622
Ian Rogersdd7624d2014-03-14 17:43:00 -0700623 template<size_t pointer_size>
624 static ThreadOffset<pointer_size> TopOfManagedStackOffset() {
625 return ThreadOffsetFromTlsPtr<pointer_size>(
626 OFFSETOF_MEMBER(tls_ptr_sized_values, managed_stack) +
627 ManagedStack::TopQuickFrameOffset());
Elliott Hughesbe759c62011-09-08 19:38:21 -0700628 }
629
Ian Rogersdd7624d2014-03-14 17:43:00 -0700630 template<size_t pointer_size>
631 static ThreadOffset<pointer_size> TopOfManagedStackPcOffset() {
632 return ThreadOffsetFromTlsPtr<pointer_size>(
633 OFFSETOF_MEMBER(tls_ptr_sized_values, managed_stack) +
634 ManagedStack::TopQuickFramePcOffset());
Ian Rogersbdb03912011-09-14 00:55:44 -0700635 }
636
Ian Rogers0399dde2012-06-06 17:09:28 -0700637 const ManagedStack* GetManagedStack() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700638 return &tlsPtr_.managed_stack;
Ian Rogers0399dde2012-06-06 17:09:28 -0700639 }
640
641 // Linked list recording fragments of managed stack.
642 void PushManagedStackFragment(ManagedStack* fragment) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700643 tlsPtr_.managed_stack.PushManagedStackFragment(fragment);
Ian Rogers0399dde2012-06-06 17:09:28 -0700644 }
645 void PopManagedStackFragment(const ManagedStack& fragment) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700646 tlsPtr_.managed_stack.PopManagedStackFragment(fragment);
Ian Rogers0399dde2012-06-06 17:09:28 -0700647 }
648
649 ShadowFrame* PushShadowFrame(ShadowFrame* new_top_frame) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700650 return tlsPtr_.managed_stack.PushShadowFrame(new_top_frame);
TDYa127de479be2012-05-31 08:03:26 -0700651 }
652
653 ShadowFrame* PopShadowFrame() {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700654 return tlsPtr_.managed_stack.PopShadowFrame();
TDYa127de479be2012-05-31 08:03:26 -0700655 }
Logan Chienf7ad17e2012-03-15 03:10:03 +0800656
Ian Rogersdd7624d2014-03-14 17:43:00 -0700657 template<size_t pointer_size>
658 static ThreadOffset<pointer_size> TopShadowFrameOffset() {
659 return ThreadOffsetFromTlsPtr<pointer_size>(
660 OFFSETOF_MEMBER(tls_ptr_sized_values, managed_stack) +
661 ManagedStack::TopShadowFrameOffset());
TDYa127d668a062012-04-13 12:36:57 -0700662 }
663
Ian Rogersef7d42f2014-01-06 12:55:46 -0800664 // Number of references allocated in JNI ShadowFrames on this thread.
665 size_t NumJniShadowFrameReferences() const SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700666 return tlsPtr_.managed_stack.NumJniShadowFrameReferences();
Ian Rogers0399dde2012-06-06 17:09:28 -0700667 }
668
Mathieu Chartiereb8167a2014-05-07 15:43:14 -0700669 // Number of references in handle scope on this thread.
670 size_t NumHandleReferences();
Ian Rogers0399dde2012-06-06 17:09:28 -0700671
Mathieu Chartiereb8167a2014-05-07 15:43:14 -0700672 // Number of references allocated in handle scopes & JNI shadow frames on this thread.
Ian Rogersef7d42f2014-01-06 12:55:46 -0800673 size_t NumStackReferences() SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) {
Mathieu Chartiereb8167a2014-05-07 15:43:14 -0700674 return NumHandleReferences() + NumJniShadowFrameReferences();
Ian Rogers0399dde2012-06-06 17:09:28 -0700675 };
676
677 // Is the given obj in this thread's stack indirect reference table?
Mathieu Chartiereb8167a2014-05-07 15:43:14 -0700678 bool HandleScopeContains(jobject obj) const;
Ian Rogers0399dde2012-06-06 17:09:28 -0700679
Mathieu Chartiereb8167a2014-05-07 15:43:14 -0700680 void HandleScopeVisitRoots(RootCallback* visitor, void* arg, uint32_t thread_id)
Mathieu Chartier83c8ee02014-01-28 14:50:23 -0800681 SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
Ian Rogers0399dde2012-06-06 17:09:28 -0700682
Mathieu Chartiereb8167a2014-05-07 15:43:14 -0700683 HandleScope* GetTopHandleScope() {
684 return tlsPtr_.top_handle_scope;
Ian Rogers1f539342012-10-03 21:09:42 -0700685 }
686
Mathieu Chartiereb8167a2014-05-07 15:43:14 -0700687 void PushHandleScope(HandleScope* handle_scope) {
688 handle_scope->SetLink(tlsPtr_.top_handle_scope);
689 tlsPtr_.top_handle_scope = handle_scope;
690 }
691
692 HandleScope* PopHandleScope() {
693 HandleScope* handle_scope = tlsPtr_.top_handle_scope;
694 DCHECK(handle_scope != nullptr);
695 tlsPtr_.top_handle_scope = tlsPtr_.top_handle_scope->GetLink();
696 return handle_scope;
Ian Rogers1f539342012-10-03 21:09:42 -0700697 }
Brian Carlstrom40381fb2011-10-19 14:13:40 -0700698
Ian Rogersdd7624d2014-03-14 17:43:00 -0700699 template<size_t pointer_size>
Mathieu Chartiereb8167a2014-05-07 15:43:14 -0700700 static ThreadOffset<pointer_size> TopHandleScopeOffset() {
701 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values,
702 top_handle_scope));
Elliott Hughesbe759c62011-09-08 19:38:21 -0700703 }
704
Ian Rogersdd7624d2014-03-14 17:43:00 -0700705 DebugInvokeReq* GetInvokeReq() const {
706 return tlsPtr_.debug_invoke_req;
Elliott Hughes475fc232011-10-25 15:00:35 -0700707 }
708
Sebastien Hertz61b7f1b2013-11-15 15:59:30 +0100709 SingleStepControl* GetSingleStepControl() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700710 return tlsPtr_.single_step_control;
Sebastien Hertz61b7f1b2013-11-15 15:59:30 +0100711 }
712
Sebastien Hertzfd3077e2014-04-23 10:32:43 +0200713 // Returns the fake exception used to activate deoptimization.
714 static mirror::Throwable* GetDeoptimizationException() {
715 return reinterpret_cast<mirror::Throwable*>(-1);
716 }
717
Ian Rogers62d6c772013-02-27 08:32:07 -0800718 void SetDeoptimizationShadowFrame(ShadowFrame* sf);
719 void SetDeoptimizationReturnValue(const JValue& ret_val);
Ian Rogers306057f2012-11-26 12:45:53 -0800720
721 ShadowFrame* GetAndClearDeoptimizationShadowFrame(JValue* ret_val);
722
Sebastien Hertz714f1752014-04-28 15:03:08 +0200723 bool HasDeoptimizationShadowFrame() const {
724 return tlsPtr_.deoptimization_shadow_frame != nullptr;
725 }
726
Andreas Gampe2a0d4ec2014-06-02 22:05:22 -0700727 void SetShadowFrameUnderConstruction(ShadowFrame* sf);
728 void ClearShadowFrameUnderConstruction();
729
730 bool HasShadowFrameUnderConstruction() const {
731 return tlsPtr_.shadow_frame_under_construction != nullptr;
732 }
733
Ian Rogers62d6c772013-02-27 08:32:07 -0800734 std::deque<instrumentation::InstrumentationStackFrame>* GetInstrumentationStack() {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700735 return tlsPtr_.instrumentation_stack;
jeffhaoe343b762011-12-05 16:36:44 -0800736 }
737
Jeff Hao5ce4b172013-08-16 16:27:18 -0700738 std::vector<mirror::ArtMethod*>* GetStackTraceSample() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700739 return tlsPtr_.stack_trace_sample;
Jeff Hao5ce4b172013-08-16 16:27:18 -0700740 }
741
742 void SetStackTraceSample(std::vector<mirror::ArtMethod*>* sample) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700743 tlsPtr_.stack_trace_sample = sample;
Jeff Hao5ce4b172013-08-16 16:27:18 -0700744 }
745
746 uint64_t GetTraceClockBase() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700747 return tls64_.trace_clock_base;
Jeff Hao5ce4b172013-08-16 16:27:18 -0700748 }
749
750 void SetTraceClockBase(uint64_t clock_base) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700751 tls64_.trace_clock_base = clock_base;
Jeff Hao5ce4b172013-08-16 16:27:18 -0700752 }
753
Ian Rogers81d425b2012-09-27 16:03:43 -0700754 BaseMutex* GetHeldMutex(LockLevel level) const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700755 return tlsPtr_.held_mutexes[level];
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700756 }
757
Ian Rogers81d425b2012-09-27 16:03:43 -0700758 void SetHeldMutex(LockLevel level, BaseMutex* mutex) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700759 tlsPtr_.held_mutexes[level] = mutex;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700760 }
Elliott Hughesffb465f2012-03-01 18:46:05 -0800761
Mathieu Chartier752a0e62013-06-27 11:03:27 -0700762 void RunCheckpointFunction();
Mathieu Chartier858f1c52012-10-17 17:45:55 -0700763
764 bool ReadFlag(ThreadFlag flag) const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700765 return (tls32_.state_and_flags.as_struct.flags & flag) != 0;
Mathieu Chartier858f1c52012-10-17 17:45:55 -0700766 }
767
Jeff Hao9cec2472013-05-14 18:17:06 -0700768 bool TestAllFlags() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700769 return (tls32_.state_and_flags.as_struct.flags != 0);
Jeff Hao9cec2472013-05-14 18:17:06 -0700770 }
771
Ian Rogers8c1b5f72014-07-09 22:02:36 -0700772 void AtomicSetFlag(ThreadFlag flag) {
773 tls32_.state_and_flags.as_atomic_int.FetchAndOrSequentiallyConsistent(flag);
774 }
Mathieu Chartier858f1c52012-10-17 17:45:55 -0700775
Ian Rogers8c1b5f72014-07-09 22:02:36 -0700776 void AtomicClearFlag(ThreadFlag flag) {
777 tls32_.state_and_flags.as_atomic_int.FetchAndAndSequentiallyConsistent(-1 ^ flag);
778 }
Mathieu Chartier858f1c52012-10-17 17:45:55 -0700779
Hiroshi Yamauchi3b4c1892013-09-12 21:33:12 -0700780 void ResetQuickAllocEntryPointsForThread();
781
Ian Rogersdd7624d2014-03-14 17:43:00 -0700782 // Returns the remaining space in the TLAB.
783 size_t TlabSize() const;
784 // Doesn't check that there is room.
785 mirror::Object* AllocTlab(size_t bytes);
786 void SetTlab(byte* start, byte* end);
787 bool HasTlab() const;
Elliott Hughes5d96a712012-06-28 12:24:27 -0700788
Ian Rogersdd7624d2014-03-14 17:43:00 -0700789 // Remove the suspend trigger for this thread by making the suspend_trigger_ TLS value
790 // equal to a valid pointer.
791 // TODO: does this need to atomic? I don't think so.
792 void RemoveSuspendTrigger() {
793 tlsPtr_.suspend_trigger = reinterpret_cast<uintptr_t*>(&tlsPtr_.suspend_trigger);
794 }
795
796 // Trigger a suspend check by making the suspend_trigger_ TLS value an invalid pointer.
797 // The next time a suspend check is done, it will load from the value at this address
798 // and trigger a SIGSEGV.
799 void TriggerSuspend() {
800 tlsPtr_.suspend_trigger = nullptr;
801 }
802
803
804 // Push an object onto the allocation stack.
805 bool PushOnThreadLocalAllocationStack(mirror::Object* obj);
806
807 // Set the thread local allocation pointers to the given pointers.
808 void SetThreadLocalAllocationStack(mirror::Object** start, mirror::Object** end);
809
810 // Resets the thread local allocation pointers.
811 void RevokeThreadLocalAllocationStack();
812
813 size_t GetThreadLocalBytesAllocated() const {
Mathieu Chartier14cc9be2014-07-11 10:26:37 -0700814 return tlsPtr_.thread_local_end - tlsPtr_.thread_local_start;
Ian Rogersdd7624d2014-03-14 17:43:00 -0700815 }
816
817 size_t GetThreadLocalObjectsAllocated() const {
818 return tlsPtr_.thread_local_objects;
819 }
820
Ian Rogersdd7624d2014-03-14 17:43:00 -0700821 void* GetRosAllocRun(size_t index) const {
822 return tlsPtr_.rosalloc_runs[index];
823 }
824
825 void SetRosAllocRun(size_t index, void* run) {
826 tlsPtr_.rosalloc_runs[index] = run;
827 }
828
Sebastien Hertz9f102032014-05-23 08:59:42 +0200829 bool IsExceptionReportedToInstrumentation() const {
830 return tls32_.is_exception_reported_to_instrumentation_;
831 }
832
833 void SetExceptionReportedToInstrumentation(bool reported) {
834 tls32_.is_exception_reported_to_instrumentation_ = reported;
835 }
836
Dave Allison648d7112014-07-25 16:15:27 -0700837 void ProtectStack();
838 bool UnprotectStack();
839
840 void NoteSignalBeingHandled() {
841 if (tls32_.handling_signal_) {
842 LOG(FATAL) << "Detected signal while processing a signal";
843 }
844 tls32_.handling_signal_ = true;
845 }
846
847 void NoteSignalHandlerDone() {
848 tls32_.handling_signal_ = false;
849 }
850
Ian Rogersdd7624d2014-03-14 17:43:00 -0700851 private:
Ian Rogers52673ff2012-06-27 23:25:34 -0700852 explicit Thread(bool daemon);
Ian Rogersb726dcb2012-09-05 08:57:23 -0700853 ~Thread() LOCKS_EXCLUDED(Locks::mutator_lock_,
854 Locks::thread_suspend_count_lock_);
Elliott Hughesc0f09332012-03-26 13:27:06 -0700855 void Destroy();
Carl Shapiro0e5d75d2011-07-06 18:28:37 -0700856
Ian Rogers365c1022012-06-22 15:05:28 -0700857 void CreatePeer(const char* name, bool as_daemon, jobject thread_group);
Elliott Hughes5fe594f2011-09-08 12:33:17 -0700858
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +0100859 template<bool kTransactionActive>
860 void InitPeer(ScopedObjectAccess& soa, jboolean thread_is_daemon, jobject thread_group,
861 jobject thread_name, jint thread_priority)
862 SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
863
Ian Rogers62d6c772013-02-27 08:32:07 -0800864 // Avoid use, callers should use SetState. Used only by SignalCatcher::HandleSigQuit, ~Thread and
865 // Dbg::Disconnected.
Ian Rogers474b6da2012-09-25 00:20:38 -0700866 ThreadState SetStateUnsafe(ThreadState new_state) {
867 ThreadState old_state = GetState();
Ian Rogersdd7624d2014-03-14 17:43:00 -0700868 tls32_.state_and_flags.as_struct.state = new_state;
Ian Rogersc747cff2012-08-31 18:20:08 -0700869 return old_state;
870 }
Ian Rogersc747cff2012-08-31 18:20:08 -0700871
Ian Rogers04d7aa92013-03-16 14:29:17 -0700872 void VerifyStackImpl() SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
873
Ian Rogerscfaa4552012-11-26 21:00:08 -0800874 void DumpState(std::ostream& os) const SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700875 void DumpStack(std::ostream& os) const
Ian Rogersb726dcb2012-09-05 08:57:23 -0700876 LOCKS_EXCLUDED(Locks::thread_suspend_count_lock_)
877 SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
Elliott Hughesd92bec42011-09-02 17:04:36 -0700878
Elliott Hughesaccd83d2011-10-17 14:25:58 -0700879 // Out-of-line conveniences for debugging in gdb.
Brian Carlstrom7934ac22013-07-26 10:54:15 -0700880 static Thread* CurrentFromGdb(); // Like Thread::Current.
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700881 // Like Thread::Dump(std::cerr).
Ian Rogersb726dcb2012-09-05 08:57:23 -0700882 void DumpFromGdb() const SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
Elliott Hughesaccd83d2011-10-17 14:25:58 -0700883
Elliott Hughes93e74e82011-09-13 11:07:03 -0700884 static void* CreateCallback(void* arg);
885
Ian Rogerscfaa4552012-11-26 21:00:08 -0800886 void HandleUncaughtExceptions(ScopedObjectAccess& soa)
887 SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
888 void RemoveFromThreadGroup(ScopedObjectAccess& soa) SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
Elliott Hughesaccd83d2011-10-17 14:25:58 -0700889
Ian Rogers120f1c72012-09-28 17:17:10 -0700890 void Init(ThreadList*, JavaVMExt*) EXCLUSIVE_LOCKS_REQUIRED(Locks::runtime_shutdown_lock_);
Ian Rogers5d76c432011-10-31 21:42:49 -0700891 void InitCardTable();
Ian Rogersb033c752011-07-20 12:22:35 -0700892 void InitCpu();
Alexei Zavjalov1efa0a92014-02-04 02:08:31 +0700893 void CleanupCpu();
Ian Rogers848871b2013-08-05 10:56:33 -0700894 void InitTlsEntryPoints();
Brian Carlstromcaabb1b2011-10-11 18:09:13 -0700895 void InitTid();
Brian Carlstromcaabb1b2011-10-11 18:09:13 -0700896 void InitPthreadKeySelf();
Elliott Hughesbe759c62011-09-08 19:38:21 -0700897 void InitStackHwm();
898
Elliott Hughesd6a23bd2013-07-16 14:19:52 -0700899 void SetUpAlternateSignalStack();
900 void TearDownAlternateSignalStack();
901
Ian Rogers474b6da2012-09-25 00:20:38 -0700902 // 32 bits of atomically changed state and flags. Keeping as 32 bits allows and atomic CAS to
903 // change from being Suspended to Runnable without a suspend request occurring.
Chris Dearman59cde532013-12-04 18:53:49 -0800904 union PACKED(4) StateAndFlags {
905 StateAndFlags() {}
Ian Rogersdf1ce912012-11-27 17:07:11 -0800906 struct PACKED(4) {
Ian Rogers30e173f2012-09-26 14:35:03 -0700907 // Bitfield of flag values. Must be changed atomically so that flag values aren't lost. See
908 // ThreadFlags for bit field meanings.
909 volatile uint16_t flags;
910 // Holds the ThreadState. May be changed non-atomically between Suspended (ie not Runnable)
911 // transitions. Changing to Runnable requires that the suspend_request be part of the atomic
912 // operation. If a thread is suspended and a suspend_request is present, a thread may not
913 // change to Runnable as a GC or other operation is in progress.
Ian Rogers01ae5802012-09-28 16:14:01 -0700914 volatile uint16_t state;
Ian Rogers30e173f2012-09-26 14:35:03 -0700915 } as_struct;
Ian Rogersb8e087e2014-07-09 21:12:06 -0700916 AtomicInteger as_atomic_int;
Ian Rogers01ae5802012-09-28 16:14:01 -0700917 volatile int32_t as_int;
Chris Dearman59cde532013-12-04 18:53:49 -0800918
919 private:
920 // gcc does not handle struct with volatile member assignments correctly.
921 // See http://gcc.gnu.org/bugzilla/show_bug.cgi?id=47409
922 DISALLOW_COPY_AND_ASSIGN(StateAndFlags);
Ian Rogers474b6da2012-09-25 00:20:38 -0700923 };
Ian Rogersb8e087e2014-07-09 21:12:06 -0700924 COMPILE_ASSERT(sizeof(StateAndFlags) == sizeof(int32_t), weird_state_and_flags_size);
Ian Rogers474b6da2012-09-25 00:20:38 -0700925
Ian Rogersdd7624d2014-03-14 17:43:00 -0700926 static void ThreadExitCallback(void* arg);
Elliott Hughes5d96a712012-06-28 12:24:27 -0700927
Dave Allison0aded082013-11-07 13:15:11 -0800928 // Maximum number of checkpoint functions.
929 static constexpr uint32_t kMaxCheckpoints = 3;
930
Ian Rogersdd7624d2014-03-14 17:43:00 -0700931 // Has Thread::Startup been called?
932 static bool is_started_;
Mathieu Chartier858f1c52012-10-17 17:45:55 -0700933
Ian Rogersdd7624d2014-03-14 17:43:00 -0700934 // TLS key used to retrieve the Thread*.
935 static pthread_key_t pthread_key_self_;
Ian Rogersa32a6fd2012-02-06 20:18:44 -0800936
Ian Rogersdd7624d2014-03-14 17:43:00 -0700937 // Used to notify threads that they should attempt to resume, they will suspend again if
938 // their suspend count is > 0.
939 static ConditionVariable* resume_cond_ GUARDED_BY(Locks::thread_suspend_count_lock_);
Dave Allisonb373e092014-02-20 16:06:36 -0800940
Ian Rogersdd7624d2014-03-14 17:43:00 -0700941 /***********************************************************************************************/
942 // Thread local storage. Fields are grouped by size to enable 32 <-> 64 searching to account for
943 // pointer size differences. To encourage shorter encoding, more frequently used values appear
944 // first if possible.
945 /***********************************************************************************************/
Elliott Hughes6a607ad2012-07-13 20:40:00 -0700946
Zuo Wangf37a88b2014-07-10 04:26:41 -0700947 struct PACKED(4) tls_32bit_sized_values {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700948 // We have no control over the size of 'bool', but want our boolean fields
949 // to be 4-byte quantities.
950 typedef uint32_t bool32_t;
Ian Rogers22f454c2012-09-08 11:06:29 -0700951
Ian Rogersdd7624d2014-03-14 17:43:00 -0700952 explicit tls_32bit_sized_values(bool is_daemon) :
953 suspend_count(0), debug_suspend_count(0), thin_lock_thread_id(0), tid(0),
954 daemon(is_daemon), throwing_OutOfMemoryError(false), no_thread_suspension(0),
Dave Allison648d7112014-07-25 16:15:27 -0700955 thread_exit_check_count(0), is_exception_reported_to_instrumentation_(false),
956 handling_signal_(false), padding_(0) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700957 }
Dave Allisonb373e092014-02-20 16:06:36 -0800958
Ian Rogersdd7624d2014-03-14 17:43:00 -0700959 union StateAndFlags state_and_flags;
960 COMPILE_ASSERT(sizeof(union StateAndFlags) == sizeof(int32_t),
961 sizeof_state_and_flags_and_int32_are_different);
Dave Allisonb373e092014-02-20 16:06:36 -0800962
Ian Rogersdd7624d2014-03-14 17:43:00 -0700963 // A non-zero value is used to tell the current thread to enter a safe point
964 // at the next poll.
965 int suspend_count GUARDED_BY(Locks::thread_suspend_count_lock_);
Hiroshi Yamauchicf58d4a2013-09-26 14:21:22 -0700966
Ian Rogersdd7624d2014-03-14 17:43:00 -0700967 // How much of 'suspend_count_' is by request of the debugger, used to set things right
968 // when the debugger detaches. Must be <= suspend_count_.
969 int debug_suspend_count GUARDED_BY(Locks::thread_suspend_count_lock_);
Hiroshi Yamauchif5b0e202014-02-11 17:02:22 -0800970
Ian Rogersdd7624d2014-03-14 17:43:00 -0700971 // Thin lock thread id. This is a small integer used by the thin lock implementation.
972 // This is not to be confused with the native thread's tid, nor is it the value returned
973 // by java.lang.Thread.getId --- this is a distinct value, used only for locking. One
974 // important difference between this id and the ids visible to managed code is that these
975 // ones get reused (to ensure that they fit in the number of bits available).
976 uint32_t thin_lock_thread_id;
Hiroshi Yamauchif5b0e202014-02-11 17:02:22 -0800977
Ian Rogersdd7624d2014-03-14 17:43:00 -0700978 // System thread id.
979 uint32_t tid;
Hiroshi Yamauchif5b0e202014-02-11 17:02:22 -0800980
Ian Rogersdd7624d2014-03-14 17:43:00 -0700981 // Is the thread a daemon?
982 const bool32_t daemon;
Hiroshi Yamauchif5b0e202014-02-11 17:02:22 -0800983
Ian Rogersdd7624d2014-03-14 17:43:00 -0700984 // A boolean telling us whether we're recursively throwing OOME.
985 bool32_t throwing_OutOfMemoryError;
986
987 // A positive value implies we're in a region where thread suspension isn't expected.
988 uint32_t no_thread_suspension;
989
990 // How many times has our pthread key's destructor been called?
991 uint32_t thread_exit_check_count;
Sebastien Hertz9f102032014-05-23 08:59:42 +0200992
993 // When true this field indicates that the exception associated with this thread has already
994 // been reported to instrumentation.
995 bool32_t is_exception_reported_to_instrumentation_;
Dave Allison648d7112014-07-25 16:15:27 -0700996
997 // True if signal is being handled by this thread.
998 bool32_t handling_signal_;
999
1000 // Padding to make the size aligned to 8. Remove this if we add another 32 bit field.
1001 int32_t padding_;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001002 } tls32_;
1003
1004 struct PACKED(8) tls_64bit_sized_values {
1005 tls_64bit_sized_values() : trace_clock_base(0), deoptimization_return_value() {
1006 }
1007
1008 // The clock base used for tracing.
1009 uint64_t trace_clock_base;
1010
1011 // Return value used by deoptimization.
1012 JValue deoptimization_return_value;
1013
1014 RuntimeStats stats;
1015 } tls64_;
1016
1017 struct PACKED(4) tls_ptr_sized_values {
1018 tls_ptr_sized_values() : card_table(nullptr), exception(nullptr), stack_end(nullptr),
1019 managed_stack(), suspend_trigger(nullptr), jni_env(nullptr), self(nullptr), opeer(nullptr),
1020 jpeer(nullptr), stack_begin(nullptr), stack_size(0), throw_location(),
1021 stack_trace_sample(nullptr), wait_next(nullptr), monitor_enter_object(nullptr),
Mathieu Chartiereb8167a2014-05-07 15:43:14 -07001022 top_handle_scope(nullptr), class_loader_override(nullptr), long_jump_context(nullptr),
Ian Rogersdd7624d2014-03-14 17:43:00 -07001023 instrumentation_stack(nullptr), debug_invoke_req(nullptr), single_step_control(nullptr),
Andreas Gampe2a0d4ec2014-06-02 22:05:22 -07001024 deoptimization_shadow_frame(nullptr), shadow_frame_under_construction(nullptr), name(nullptr),
1025 pthread_self(0), last_no_thread_suspension_cause(nullptr), thread_local_start(nullptr),
Ian Rogersdd7624d2014-03-14 17:43:00 -07001026 thread_local_pos(nullptr), thread_local_end(nullptr), thread_local_objects(0),
1027 thread_local_alloc_stack_top(nullptr), thread_local_alloc_stack_end(nullptr) {
1028 }
1029
1030 // The biased card table, see CardTable for details.
1031 byte* card_table;
1032
1033 // The pending exception or NULL.
1034 mirror::Throwable* exception;
1035
1036 // The end of this thread's stack. This is the lowest safely-addressable address on the stack.
1037 // We leave extra space so there's room for the code that throws StackOverflowError.
1038 byte* stack_end;
1039
1040 // The top of the managed stack often manipulated directly by compiler generated code.
1041 ManagedStack managed_stack;
1042
1043 // In certain modes, setting this to 0 will trigger a SEGV and thus a suspend check. It is
1044 // normally set to the address of itself.
1045 uintptr_t* suspend_trigger;
1046
1047 // Every thread may have an associated JNI environment
1048 JNIEnvExt* jni_env;
1049
1050 // Initialized to "this". On certain architectures (such as x86) reading off of Thread::Current
1051 // is easy but getting the address of Thread::Current is hard. This field can be read off of
1052 // Thread::Current to give the address.
1053 Thread* self;
1054
1055 // Our managed peer (an instance of java.lang.Thread). The jobject version is used during thread
1056 // start up, until the thread is registered and the local opeer_ is used.
1057 mirror::Object* opeer;
1058 jobject jpeer;
1059
1060 // The "lowest addressable byte" of the stack.
1061 byte* stack_begin;
1062
1063 // Size of the stack.
1064 size_t stack_size;
1065
1066 // The location the current exception was thrown from.
1067 ThrowLocation throw_location;
1068
1069 // Pointer to previous stack trace captured by sampling profiler.
1070 std::vector<mirror::ArtMethod*>* stack_trace_sample;
1071
1072 // The next thread in the wait set this thread is part of or NULL if not waiting.
1073 Thread* wait_next;
1074
1075 // If we're blocked in MonitorEnter, this is the object we're trying to lock.
1076 mirror::Object* monitor_enter_object;
1077
Mathieu Chartiereb8167a2014-05-07 15:43:14 -07001078 // Top of linked list of handle scopes or nullptr for none.
1079 HandleScope* top_handle_scope;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001080
1081 // Needed to get the right ClassLoader in JNI_OnLoad, but also
1082 // useful for testing.
Ian Rogers68d8b422014-07-17 11:09:10 -07001083 jobject class_loader_override;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001084
1085 // Thread local, lazily allocated, long jump context. Used to deliver exceptions.
1086 Context* long_jump_context;
1087
1088 // Additional stack used by method instrumentation to store method and return pc values.
1089 // Stored as a pointer since std::deque is not PACKED.
1090 std::deque<instrumentation::InstrumentationStackFrame>* instrumentation_stack;
1091
1092 // JDWP invoke-during-breakpoint support.
1093 DebugInvokeReq* debug_invoke_req;
1094
1095 // JDWP single-stepping support.
1096 SingleStepControl* single_step_control;
1097
1098 // Shadow frame stack that is used temporarily during the deoptimization of a method.
1099 ShadowFrame* deoptimization_shadow_frame;
1100
Andreas Gampe2a0d4ec2014-06-02 22:05:22 -07001101 // Shadow frame stack that is currently under construction but not yet on the stack
1102 ShadowFrame* shadow_frame_under_construction;
1103
Ian Rogersdd7624d2014-03-14 17:43:00 -07001104 // A cached copy of the java.lang.Thread's name.
1105 std::string* name;
1106
1107 // A cached pthread_t for the pthread underlying this Thread*.
1108 pthread_t pthread_self;
1109
Ian Rogersdd7624d2014-03-14 17:43:00 -07001110 // If no_thread_suspension_ is > 0, what is causing that assertion.
1111 const char* last_no_thread_suspension_cause;
1112
1113 // Pending checkpoint function or NULL if non-pending. Installation guarding by
1114 // Locks::thread_suspend_count_lock_.
1115 Closure* checkpoint_functions[kMaxCheckpoints];
1116
1117 // Entrypoint function pointers.
1118 // TODO: move this to more of a global offset table model to avoid per-thread duplication.
1119 InterpreterEntryPoints interpreter_entrypoints;
1120 JniEntryPoints jni_entrypoints;
1121 PortableEntryPoints portable_entrypoints;
1122 QuickEntryPoints quick_entrypoints;
1123
1124 // Thread-local allocation pointer.
1125 byte* thread_local_start;
1126 byte* thread_local_pos;
1127 byte* thread_local_end;
1128 size_t thread_local_objects;
1129
Mathieu Chartier0651d412014-04-29 14:37:57 -07001130 // There are RosAlloc::kNumThreadLocalSizeBrackets thread-local size brackets per thread.
Ian Rogerse63db272014-07-15 15:36:11 -07001131 void* rosalloc_runs[kNumRosAllocThreadLocalSizeBrackets];
Ian Rogersdd7624d2014-03-14 17:43:00 -07001132
1133 // Thread-local allocation stack data/routines.
1134 mirror::Object** thread_local_alloc_stack_top;
1135 mirror::Object** thread_local_alloc_stack_end;
Chao-ying Fu9e369312014-05-21 11:20:52 -07001136
1137 // Support for Mutex lock hierarchy bug detection.
1138 BaseMutex* held_mutexes[kLockLevelCount];
Ian Rogersdd7624d2014-03-14 17:43:00 -07001139 } tlsPtr_;
1140
1141 // Guards the 'interrupted_' and 'wait_monitor_' members.
1142 Mutex* wait_mutex_ DEFAULT_MUTEX_ACQUIRED_AFTER;
1143
1144 // Condition variable waited upon during a wait.
1145 ConditionVariable* wait_cond_ GUARDED_BY(wait_mutex_);
1146 // Pointer to the monitor lock we're currently waiting on or NULL if not waiting.
1147 Monitor* wait_monitor_ GUARDED_BY(wait_mutex_);
1148
1149 // Thread "interrupted" status; stays raised until queried or thrown.
1150 bool interrupted_ GUARDED_BY(wait_mutex_);
1151
Mathieu Chartiere6da9af2013-12-16 11:54:42 -08001152 friend class Dbg; // For SetStateUnsafe.
Mathieu Chartier15d34022014-02-26 17:16:38 -08001153 friend class gc::collector::SemiSpace; // For getting stack traces.
Mathieu Chartier692fafd2013-11-29 17:24:40 -08001154 friend class Runtime; // For CreatePeer.
Ian Rogers5cf98192014-05-29 21:31:50 -07001155 friend class QuickExceptionHandler; // For dumping the stack.
Mathieu Chartier692fafd2013-11-29 17:24:40 -08001156 friend class ScopedThreadStateChange;
1157 friend class SignalCatcher; // For SetStateUnsafe.
Mathieu Chartier119c6bd2014-05-09 14:11:47 -07001158 friend class StubTest; // For accessing entrypoints.
Mathieu Chartier692fafd2013-11-29 17:24:40 -08001159 friend class ThreadList; // For ~Thread and Destroy.
1160
Andreas Gampe4352b452014-06-04 18:59:01 -07001161 friend class EntrypointsOrderTest; // To test the order of tls entries.
1162
Carl Shapiro0e5d75d2011-07-06 18:28:37 -07001163 DISALLOW_COPY_AND_ASSIGN(Thread);
1164};
Ian Rogersbdb03912011-09-14 00:55:44 -07001165
Elliott Hughes330304d2011-08-12 14:28:05 -07001166std::ostream& operator<<(std::ostream& os, const Thread& thread);
Elliott Hughes34e06962012-04-09 13:55:55 -07001167std::ostream& operator<<(std::ostream& os, const ThreadState& state);
Carl Shapiro0e5d75d2011-07-06 18:28:37 -07001168
Carl Shapiro0e5d75d2011-07-06 18:28:37 -07001169} // namespace art
1170
Brian Carlstromfc0e3212013-07-17 14:40:12 -07001171#endif // ART_RUNTIME_THREAD_H_