blob: d185e6331ace0adccb97d0d28245675da09911e3 [file] [log] [blame]
Ian Rogers1d54e732013-05-02 21:10:01 -07001/*
2 * Copyright (C) 2011 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include "image_space.h"
18
Alex Light25396132014-08-27 15:37:23 -070019#include <dirent.h>
Mathieu Chartierceb07b32015-12-10 09:33:21 -080020#include <lz4.h>
21#include <random>
Andreas Gampe70be1fb2014-10-31 16:45:19 -070022#include <sys/statvfs.h>
Alex Light25396132014-08-27 15:37:23 -070023#include <sys/types.h>
Narayan Kamath5a2be3f2015-02-16 13:51:51 +000024#include <unistd.h>
Alex Light25396132014-08-27 15:37:23 -070025
Mathieu Chartiere401d142015-04-22 13:56:20 -070026#include "art_method.h"
Ian Rogersc7dd2952014-10-21 23:31:19 -070027#include "base/macros.h"
Brian Carlstrom56d947f2013-07-15 13:14:23 -070028#include "base/stl_util.h"
Narayan Kamathd1c606f2014-06-09 16:50:19 +010029#include "base/scoped_flock.h"
Vladimir Marko80afd022015-05-19 18:08:00 +010030#include "base/time_utils.h"
31#include "base/unix_file/fd_file.h"
Ian Rogers1d54e732013-05-02 21:10:01 -070032#include "gc/accounting/space_bitmap-inl.h"
Mathieu Chartier4a26f172016-01-26 14:26:18 -080033#include "image-inl.h"
Ian Rogers1d54e732013-05-02 21:10:01 -070034#include "mirror/class-inl.h"
35#include "mirror/object-inl.h"
Brian Carlstrom56d947f2013-07-15 13:14:23 -070036#include "oat_file.h"
Ian Rogers1d54e732013-05-02 21:10:01 -070037#include "os.h"
Ian Rogers1d54e732013-05-02 21:10:01 -070038#include "space-inl.h"
39#include "utils.h"
40
41namespace art {
42namespace gc {
43namespace space {
44
Ian Rogersef7d42f2014-01-06 12:55:46 -080045Atomic<uint32_t> ImageSpace::bitmap_index_(0);
Ian Rogers1d54e732013-05-02 21:10:01 -070046
Jeff Haodcdc85b2015-12-04 14:06:18 -080047ImageSpace::ImageSpace(const std::string& image_filename,
48 const char* image_location,
49 MemMap* mem_map,
50 accounting::ContinuousSpaceBitmap* live_bitmap,
Mathieu Chartier2d124ec2016-01-05 18:03:15 -080051 uint8_t* end)
52 : MemMapSpace(image_filename,
53 mem_map,
54 mem_map->Begin(),
55 end,
56 end,
Narayan Kamath52f84882014-05-02 10:10:39 +010057 kGcRetentionPolicyNeverCollect),
Jeff Haodcdc85b2015-12-04 14:06:18 -080058 oat_file_non_owned_(nullptr),
Mathieu Chartier2d124ec2016-01-05 18:03:15 -080059 image_location_(image_location) {
Mathieu Chartier590fee92013-09-13 13:46:47 -070060 DCHECK(live_bitmap != nullptr);
Mathieu Chartier31e89252013-08-28 11:29:12 -070061 live_bitmap_.reset(live_bitmap);
Ian Rogers1d54e732013-05-02 21:10:01 -070062}
63
Alex Lightcf4bf382014-07-24 11:29:14 -070064static int32_t ChooseRelocationOffsetDelta(int32_t min_delta, int32_t max_delta) {
65 CHECK_ALIGNED(min_delta, kPageSize);
66 CHECK_ALIGNED(max_delta, kPageSize);
67 CHECK_LT(min_delta, max_delta);
68
Alex Light15324762015-11-19 11:03:10 -080069 int32_t r = GetRandomNumber<int32_t>(min_delta, max_delta);
Alex Lightcf4bf382014-07-24 11:29:14 -070070 if (r % 2 == 0) {
71 r = RoundUp(r, kPageSize);
72 } else {
73 r = RoundDown(r, kPageSize);
74 }
75 CHECK_LE(min_delta, r);
76 CHECK_GE(max_delta, r);
77 CHECK_ALIGNED(r, kPageSize);
78 return r;
79}
80
Alex Light25396132014-08-27 15:37:23 -070081// We are relocating or generating the core image. We should get rid of everything. It is all
Andreas Gampe8db9dcd2014-11-09 18:14:30 -080082// out-of-date. We also don't really care if this fails since it is just a convenience.
Alex Light25396132014-08-27 15:37:23 -070083// Adapted from prune_dex_cache(const char* subdir) in frameworks/native/cmds/installd/commands.c
84// Note this should only be used during first boot.
Narayan Kamath28bc9872014-11-07 17:46:28 +000085static void RealPruneDalvikCache(const std::string& cache_dir_path);
Andreas Gampe8db9dcd2014-11-09 18:14:30 -080086
Narayan Kamath28bc9872014-11-07 17:46:28 +000087static void PruneDalvikCache(InstructionSet isa) {
Alex Light25396132014-08-27 15:37:23 -070088 CHECK_NE(isa, kNone);
Andreas Gampe8db9dcd2014-11-09 18:14:30 -080089 // Prune the base /data/dalvik-cache.
Narayan Kamath28bc9872014-11-07 17:46:28 +000090 RealPruneDalvikCache(GetDalvikCacheOrDie(".", false));
Andreas Gampe8db9dcd2014-11-09 18:14:30 -080091 // Prune /data/dalvik-cache/<isa>.
Narayan Kamath28bc9872014-11-07 17:46:28 +000092 RealPruneDalvikCache(GetDalvikCacheOrDie(GetInstructionSetString(isa), false));
Alex Light25396132014-08-27 15:37:23 -070093}
Andreas Gampe8db9dcd2014-11-09 18:14:30 -080094
Narayan Kamath28bc9872014-11-07 17:46:28 +000095static void RealPruneDalvikCache(const std::string& cache_dir_path) {
Alex Light25396132014-08-27 15:37:23 -070096 if (!OS::DirectoryExists(cache_dir_path.c_str())) {
97 return;
98 }
99 DIR* cache_dir = opendir(cache_dir_path.c_str());
100 if (cache_dir == nullptr) {
101 PLOG(WARNING) << "Unable to open " << cache_dir_path << " to delete it's contents";
102 return;
103 }
Alex Light25396132014-08-27 15:37:23 -0700104
105 for (struct dirent* de = readdir(cache_dir); de != nullptr; de = readdir(cache_dir)) {
106 const char* name = de->d_name;
107 if (strcmp(name, ".") == 0 || strcmp(name, "..") == 0) {
108 continue;
109 }
Andreas Gampe8db9dcd2014-11-09 18:14:30 -0800110 // We only want to delete regular files and symbolic links.
111 if (de->d_type != DT_REG && de->d_type != DT_LNK) {
Alex Light25396132014-08-27 15:37:23 -0700112 if (de->d_type != DT_DIR) {
113 // We do expect some directories (namely the <isa> for pruning the base dalvik-cache).
114 LOG(WARNING) << "Unexpected file type of " << std::hex << de->d_type << " encountered.";
115 }
116 continue;
117 }
Brian Carlstromdebdda02014-08-28 22:17:13 -0700118 std::string cache_file(cache_dir_path);
119 cache_file += '/';
120 cache_file += name;
121 if (TEMP_FAILURE_RETRY(unlink(cache_file.c_str())) != 0) {
122 PLOG(ERROR) << "Unable to unlink " << cache_file;
Alex Light25396132014-08-27 15:37:23 -0700123 continue;
124 }
125 }
126 CHECK_EQ(0, TEMP_FAILURE_RETRY(closedir(cache_dir))) << "Unable to close directory.";
127}
128
Narayan Kamath28bc9872014-11-07 17:46:28 +0000129// We write out an empty file to the zygote's ISA specific cache dir at the start of
130// every zygote boot and delete it when the boot completes. If we find a file already
131// present, it usually means the boot didn't complete. We wipe the entire dalvik
132// cache if that's the case.
Narayan Kamath5a2be3f2015-02-16 13:51:51 +0000133static void MarkZygoteStart(const InstructionSet isa, const uint32_t max_failed_boots) {
Narayan Kamath28bc9872014-11-07 17:46:28 +0000134 const std::string isa_subdir = GetDalvikCacheOrDie(GetInstructionSetString(isa), false);
135 const std::string boot_marker = isa_subdir + "/.booting";
Narayan Kamath5a2be3f2015-02-16 13:51:51 +0000136 const char* file_name = boot_marker.c_str();
Narayan Kamath28bc9872014-11-07 17:46:28 +0000137
Narayan Kamath5a2be3f2015-02-16 13:51:51 +0000138 uint32_t num_failed_boots = 0;
139 std::unique_ptr<File> file(OS::OpenFileReadWrite(file_name));
140 if (file.get() == nullptr) {
141 file.reset(OS::CreateEmptyFile(file_name));
142
143 if (file.get() == nullptr) {
144 PLOG(WARNING) << "Failed to create boot marker.";
145 return;
146 }
147 } else {
148 if (!file->ReadFully(&num_failed_boots, sizeof(num_failed_boots))) {
149 PLOG(WARNING) << "Failed to read boot marker.";
150 file->Erase();
151 return;
152 }
153 }
154
155 if (max_failed_boots != 0 && num_failed_boots > max_failed_boots) {
Narayan Kamath28bc9872014-11-07 17:46:28 +0000156 LOG(WARNING) << "Incomplete boot detected. Pruning dalvik cache";
157 RealPruneDalvikCache(isa_subdir);
158 }
159
Narayan Kamath5a2be3f2015-02-16 13:51:51 +0000160 ++num_failed_boots;
161 VLOG(startup) << "Number of failed boots on : " << boot_marker << " = " << num_failed_boots;
162
163 if (lseek(file->Fd(), 0, SEEK_SET) == -1) {
164 PLOG(WARNING) << "Failed to write boot marker.";
165 file->Erase();
166 return;
167 }
168
169 if (!file->WriteFully(&num_failed_boots, sizeof(num_failed_boots))) {
170 PLOG(WARNING) << "Failed to write boot marker.";
171 file->Erase();
172 return;
173 }
174
175 if (file->FlushCloseOrErase() != 0) {
176 PLOG(WARNING) << "Failed to flush boot marker.";
Narayan Kamath28bc9872014-11-07 17:46:28 +0000177 }
178}
179
Alex Light25396132014-08-27 15:37:23 -0700180static bool GenerateImage(const std::string& image_filename, InstructionSet image_isa,
181 std::string* error_msg) {
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700182 const std::string boot_class_path_string(Runtime::Current()->GetBootClassPathString());
183 std::vector<std::string> boot_class_path;
Ian Rogers6f3dbba2014-10-14 17:41:57 -0700184 Split(boot_class_path_string, ':', &boot_class_path);
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700185 if (boot_class_path.empty()) {
Ian Rogers8d31bbd2013-10-13 10:44:14 -0700186 *error_msg = "Failed to generate image because no boot class path specified";
187 return false;
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700188 }
Alex Light25396132014-08-27 15:37:23 -0700189 // We should clean up so we are more likely to have room for the image.
190 if (Runtime::Current()->IsZygote()) {
Andreas Gampe3c13a792014-09-18 20:56:04 -0700191 LOG(INFO) << "Pruning dalvik-cache since we are generating an image and will need to recompile";
Narayan Kamath28bc9872014-11-07 17:46:28 +0000192 PruneDalvikCache(image_isa);
Alex Light25396132014-08-27 15:37:23 -0700193 }
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700194
Mathieu Chartier8bbc8c02013-07-31 16:27:01 -0700195 std::vector<std::string> arg_vector;
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700196
Tsu Chiang Chuang12e6d742014-05-22 10:22:25 -0700197 std::string dex2oat(Runtime::Current()->GetCompilerExecutable());
Mathieu Chartier08d7d442013-07-31 18:08:51 -0700198 arg_vector.push_back(dex2oat);
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700199
200 std::string image_option_string("--image=");
Narayan Kamath52f84882014-05-02 10:10:39 +0100201 image_option_string += image_filename;
Mathieu Chartier8bbc8c02013-07-31 16:27:01 -0700202 arg_vector.push_back(image_option_string);
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700203
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700204 for (size_t i = 0; i < boot_class_path.size(); i++) {
Mathieu Chartier8bbc8c02013-07-31 16:27:01 -0700205 arg_vector.push_back(std::string("--dex-file=") + boot_class_path[i]);
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700206 }
207
208 std::string oat_file_option_string("--oat-file=");
Brian Carlstrom2f1e15c2014-10-27 16:27:06 -0700209 oat_file_option_string += ImageHeader::GetOatLocationFromImageLocation(image_filename);
Mathieu Chartier8bbc8c02013-07-31 16:27:01 -0700210 arg_vector.push_back(oat_file_option_string);
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700211
Sebastien Hertz0de11332015-05-13 12:14:05 +0200212 // Note: we do not generate a fully debuggable boot image so we do not pass the
213 // compiler flag --debuggable here.
214
Igor Murashkinb1d8c312015-08-04 11:18:43 -0700215 Runtime::Current()->AddCurrentRuntimeFeaturesAsDex2OatArguments(&arg_vector);
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700216 CHECK_EQ(image_isa, kRuntimeISA)
217 << "We should always be generating an image for the current isa.";
Ian Rogers8afeb852014-04-02 14:55:49 -0700218
Alex Lightcf4bf382014-07-24 11:29:14 -0700219 int32_t base_offset = ChooseRelocationOffsetDelta(ART_BASE_ADDRESS_MIN_DELTA,
220 ART_BASE_ADDRESS_MAX_DELTA);
221 LOG(INFO) << "Using an offset of 0x" << std::hex << base_offset << " from default "
222 << "art base address of 0x" << std::hex << ART_BASE_ADDRESS;
223 arg_vector.push_back(StringPrintf("--base=0x%x", ART_BASE_ADDRESS + base_offset));
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700224
Brian Carlstrom57309db2014-07-30 15:13:25 -0700225 if (!kIsTargetBuild) {
Mathieu Chartier8bbc8c02013-07-31 16:27:01 -0700226 arg_vector.push_back("--host");
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700227 }
228
Brian Carlstrom6449c622014-02-10 23:48:36 -0800229 const std::vector<std::string>& compiler_options = Runtime::Current()->GetImageCompilerOptions();
Brian Carlstrom2ec65202014-03-03 15:16:37 -0800230 for (size_t i = 0; i < compiler_options.size(); ++i) {
Brian Carlstrom6449c622014-02-10 23:48:36 -0800231 arg_vector.push_back(compiler_options[i].c_str());
232 }
233
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700234 std::string command_line(Join(arg_vector, ' '));
235 LOG(INFO) << "GenerateImage: " << command_line;
Brian Carlstrom6449c622014-02-10 23:48:36 -0800236 return Exec(arg_vector, error_msg);
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700237}
238
Narayan Kamath52f84882014-05-02 10:10:39 +0100239bool ImageSpace::FindImageFilename(const char* image_location,
240 const InstructionSet image_isa,
Alex Lighta59dd802014-07-02 16:28:08 -0700241 std::string* system_filename,
242 bool* has_system,
243 std::string* cache_filename,
244 bool* dalvik_cache_exists,
Andreas Gampe3c13a792014-09-18 20:56:04 -0700245 bool* has_cache,
246 bool* is_global_cache) {
Alex Lighta59dd802014-07-02 16:28:08 -0700247 *has_system = false;
248 *has_cache = false;
Brian Carlstrom0e12bdc2014-05-14 17:44:28 -0700249 // image_location = /system/framework/boot.art
250 // system_image_location = /system/framework/<image_isa>/boot.art
251 std::string system_image_filename(GetSystemImageFilename(image_location, image_isa));
252 if (OS::FileExists(system_image_filename.c_str())) {
Alex Lighta59dd802014-07-02 16:28:08 -0700253 *system_filename = system_image_filename;
254 *has_system = true;
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700255 }
Narayan Kamath52f84882014-05-02 10:10:39 +0100256
Alex Lighta59dd802014-07-02 16:28:08 -0700257 bool have_android_data = false;
258 *dalvik_cache_exists = false;
259 std::string dalvik_cache;
260 GetDalvikCache(GetInstructionSetString(image_isa), true, &dalvik_cache,
Andreas Gampe3c13a792014-09-18 20:56:04 -0700261 &have_android_data, dalvik_cache_exists, is_global_cache);
Narayan Kamath52f84882014-05-02 10:10:39 +0100262
Alex Lighta59dd802014-07-02 16:28:08 -0700263 if (have_android_data && *dalvik_cache_exists) {
264 // Always set output location even if it does not exist,
265 // so that the caller knows where to create the image.
266 //
267 // image_location = /system/framework/boot.art
268 // *image_filename = /data/dalvik-cache/<image_isa>/boot.art
269 std::string error_msg;
270 if (!GetDalvikCacheFilename(image_location, dalvik_cache.c_str(), cache_filename, &error_msg)) {
271 LOG(WARNING) << error_msg;
272 return *has_system;
273 }
274 *has_cache = OS::FileExists(cache_filename->c_str());
275 }
276 return *has_system || *has_cache;
277}
278
279static bool ReadSpecificImageHeader(const char* filename, ImageHeader* image_header) {
280 std::unique_ptr<File> image_file(OS::OpenFileForReading(filename));
281 if (image_file.get() == nullptr) {
282 return false;
283 }
284 const bool success = image_file->ReadFully(image_header, sizeof(ImageHeader));
285 if (!success || !image_header->IsValid()) {
286 return false;
287 }
288 return true;
289}
290
Alex Light6e183f22014-07-18 14:57:04 -0700291// Relocate the image at image_location to dest_filename and relocate it by a random amount.
292static bool RelocateImage(const char* image_location, const char* dest_filename,
Alex Lighta59dd802014-07-02 16:28:08 -0700293 InstructionSet isa, std::string* error_msg) {
Alex Light25396132014-08-27 15:37:23 -0700294 // We should clean up so we are more likely to have room for the image.
295 if (Runtime::Current()->IsZygote()) {
296 LOG(INFO) << "Pruning dalvik-cache since we are relocating an image and will need to recompile";
Narayan Kamath28bc9872014-11-07 17:46:28 +0000297 PruneDalvikCache(isa);
Alex Light25396132014-08-27 15:37:23 -0700298 }
299
Alex Lighta59dd802014-07-02 16:28:08 -0700300 std::string patchoat(Runtime::Current()->GetPatchoatExecutable());
301
302 std::string input_image_location_arg("--input-image-location=");
303 input_image_location_arg += image_location;
304
305 std::string output_image_filename_arg("--output-image-file=");
306 output_image_filename_arg += dest_filename;
307
308 std::string input_oat_location_arg("--input-oat-location=");
309 input_oat_location_arg += ImageHeader::GetOatLocationFromImageLocation(image_location);
310
311 std::string output_oat_filename_arg("--output-oat-file=");
312 output_oat_filename_arg += ImageHeader::GetOatLocationFromImageLocation(dest_filename);
313
314 std::string instruction_set_arg("--instruction-set=");
315 instruction_set_arg += GetInstructionSetString(isa);
316
317 std::string base_offset_arg("--base-offset-delta=");
318 StringAppendF(&base_offset_arg, "%d", ChooseRelocationOffsetDelta(ART_BASE_ADDRESS_MIN_DELTA,
319 ART_BASE_ADDRESS_MAX_DELTA));
320
321 std::vector<std::string> argv;
322 argv.push_back(patchoat);
323
324 argv.push_back(input_image_location_arg);
325 argv.push_back(output_image_filename_arg);
326
327 argv.push_back(input_oat_location_arg);
328 argv.push_back(output_oat_filename_arg);
329
330 argv.push_back(instruction_set_arg);
331 argv.push_back(base_offset_arg);
332
333 std::string command_line(Join(argv, ' '));
334 LOG(INFO) << "RelocateImage: " << command_line;
335 return Exec(argv, error_msg);
336}
337
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700338static ImageHeader* ReadSpecificImageHeader(const char* filename, std::string* error_msg) {
Alex Lighta59dd802014-07-02 16:28:08 -0700339 std::unique_ptr<ImageHeader> hdr(new ImageHeader);
340 if (!ReadSpecificImageHeader(filename, hdr.get())) {
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700341 *error_msg = StringPrintf("Unable to read image header for %s", filename);
Alex Lighta59dd802014-07-02 16:28:08 -0700342 return nullptr;
343 }
344 return hdr.release();
Narayan Kamath52f84882014-05-02 10:10:39 +0100345}
346
347ImageHeader* ImageSpace::ReadImageHeaderOrDie(const char* image_location,
348 const InstructionSet image_isa) {
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700349 std::string error_msg;
350 ImageHeader* image_header = ReadImageHeader(image_location, image_isa, &error_msg);
351 if (image_header == nullptr) {
352 LOG(FATAL) << error_msg;
353 }
354 return image_header;
355}
356
357ImageHeader* ImageSpace::ReadImageHeader(const char* image_location,
358 const InstructionSet image_isa,
359 std::string* error_msg) {
Alex Lighta59dd802014-07-02 16:28:08 -0700360 std::string system_filename;
361 bool has_system = false;
362 std::string cache_filename;
363 bool has_cache = false;
364 bool dalvik_cache_exists = false;
Andreas Gampe3c13a792014-09-18 20:56:04 -0700365 bool is_global_cache = false;
Alex Lighta59dd802014-07-02 16:28:08 -0700366 if (FindImageFilename(image_location, image_isa, &system_filename, &has_system,
Andreas Gampe3c13a792014-09-18 20:56:04 -0700367 &cache_filename, &dalvik_cache_exists, &has_cache, &is_global_cache)) {
Alex Lighta59dd802014-07-02 16:28:08 -0700368 if (Runtime::Current()->ShouldRelocate()) {
369 if (has_system && has_cache) {
370 std::unique_ptr<ImageHeader> sys_hdr(new ImageHeader);
371 std::unique_ptr<ImageHeader> cache_hdr(new ImageHeader);
372 if (!ReadSpecificImageHeader(system_filename.c_str(), sys_hdr.get())) {
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700373 *error_msg = StringPrintf("Unable to read image header for %s at %s",
374 image_location, system_filename.c_str());
Alex Lighta59dd802014-07-02 16:28:08 -0700375 return nullptr;
376 }
377 if (!ReadSpecificImageHeader(cache_filename.c_str(), cache_hdr.get())) {
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700378 *error_msg = StringPrintf("Unable to read image header for %s at %s",
379 image_location, cache_filename.c_str());
Alex Lighta59dd802014-07-02 16:28:08 -0700380 return nullptr;
381 }
382 if (sys_hdr->GetOatChecksum() != cache_hdr->GetOatChecksum()) {
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700383 *error_msg = StringPrintf("Unable to find a relocated version of image file %s",
384 image_location);
Alex Lighta59dd802014-07-02 16:28:08 -0700385 return nullptr;
386 }
387 return cache_hdr.release();
388 } else if (!has_cache) {
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700389 *error_msg = StringPrintf("Unable to find a relocated version of image file %s",
390 image_location);
Alex Lighta59dd802014-07-02 16:28:08 -0700391 return nullptr;
392 } else if (!has_system && has_cache) {
393 // This can probably just use the cache one.
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700394 return ReadSpecificImageHeader(cache_filename.c_str(), error_msg);
Alex Lighta59dd802014-07-02 16:28:08 -0700395 }
396 } else {
397 // We don't want to relocate, Just pick the appropriate one if we have it and return.
398 if (has_system && has_cache) {
399 // We want the cache if the checksum matches, otherwise the system.
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700400 std::unique_ptr<ImageHeader> system(ReadSpecificImageHeader(system_filename.c_str(),
401 error_msg));
402 std::unique_ptr<ImageHeader> cache(ReadSpecificImageHeader(cache_filename.c_str(),
403 error_msg));
Alex Lighta59dd802014-07-02 16:28:08 -0700404 if (system.get() == nullptr ||
405 (cache.get() != nullptr && cache->GetOatChecksum() == system->GetOatChecksum())) {
406 return cache.release();
407 } else {
408 return system.release();
409 }
410 } else if (has_system) {
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700411 return ReadSpecificImageHeader(system_filename.c_str(), error_msg);
Alex Lighta59dd802014-07-02 16:28:08 -0700412 } else if (has_cache) {
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700413 return ReadSpecificImageHeader(cache_filename.c_str(), error_msg);
Alex Lighta59dd802014-07-02 16:28:08 -0700414 }
Narayan Kamath52f84882014-05-02 10:10:39 +0100415 }
Narayan Kamath52f84882014-05-02 10:10:39 +0100416 }
417
Brian Carlstrom31d8f522014-09-29 11:22:54 -0700418 *error_msg = StringPrintf("Unable to find image file for %s", image_location);
Narayan Kamath52f84882014-05-02 10:10:39 +0100419 return nullptr;
420}
421
Alex Lighta59dd802014-07-02 16:28:08 -0700422static bool ChecksumsMatch(const char* image_a, const char* image_b) {
423 ImageHeader hdr_a;
424 ImageHeader hdr_b;
425 return ReadSpecificImageHeader(image_a, &hdr_a) && ReadSpecificImageHeader(image_b, &hdr_b)
426 && hdr_a.GetOatChecksum() == hdr_b.GetOatChecksum();
427}
428
Andreas Gampe3c13a792014-09-18 20:56:04 -0700429static bool ImageCreationAllowed(bool is_global_cache, std::string* error_msg) {
430 // Anyone can write into a "local" cache.
431 if (!is_global_cache) {
432 return true;
433 }
434
435 // Only the zygote is allowed to create the global boot image.
436 if (Runtime::Current()->IsZygote()) {
437 return true;
438 }
439
440 *error_msg = "Only the zygote can create the global boot image.";
441 return false;
442}
443
Andreas Gampe70be1fb2014-10-31 16:45:19 -0700444static constexpr uint64_t kLowSpaceValue = 50 * MB;
445static constexpr uint64_t kTmpFsSentinelValue = 384 * MB;
446
447// Read the free space of the cache partition and make a decision whether to keep the generated
448// image. This is to try to mitigate situations where the system might run out of space later.
449static bool CheckSpace(const std::string& cache_filename, std::string* error_msg) {
450 // Using statvfs vs statvfs64 because of b/18207376, and it is enough for all practical purposes.
451 struct statvfs buf;
452
453 int res = TEMP_FAILURE_RETRY(statvfs(cache_filename.c_str(), &buf));
454 if (res != 0) {
455 // Could not stat. Conservatively tell the system to delete the image.
456 *error_msg = "Could not stat the filesystem, assuming low-memory situation.";
457 return false;
458 }
459
460 uint64_t fs_overall_size = buf.f_bsize * static_cast<uint64_t>(buf.f_blocks);
461 // Zygote is privileged, but other things are not. Use bavail.
462 uint64_t fs_free_size = buf.f_bsize * static_cast<uint64_t>(buf.f_bavail);
463
464 // Take the overall size as an indicator for a tmpfs, which is being used for the decryption
465 // environment. We do not want to fail quickening the boot image there, as it is beneficial
466 // for time-to-UI.
467 if (fs_overall_size > kTmpFsSentinelValue) {
468 if (fs_free_size < kLowSpaceValue) {
469 *error_msg = StringPrintf("Low-memory situation: only %4.2f megabytes available after image"
470 " generation, need at least %" PRIu64 ".",
471 static_cast<double>(fs_free_size) / MB,
472 kLowSpaceValue / MB);
473 return false;
474 }
475 }
476 return true;
477}
478
Mathieu Chartierfbc31082016-01-24 11:59:56 -0800479ImageSpace* ImageSpace::CreateBootImage(const char* image_location,
480 const InstructionSet image_isa,
481 bool secondary_image,
482 std::string* error_msg) {
Alex Lighta59dd802014-07-02 16:28:08 -0700483 std::string system_filename;
484 bool has_system = false;
485 std::string cache_filename;
486 bool has_cache = false;
487 bool dalvik_cache_exists = false;
Andreas Gampe3c13a792014-09-18 20:56:04 -0700488 bool is_global_cache = true;
Alex Lighta59dd802014-07-02 16:28:08 -0700489 const bool found_image = FindImageFilename(image_location, image_isa, &system_filename,
490 &has_system, &cache_filename, &dalvik_cache_exists,
Andreas Gampe3c13a792014-09-18 20:56:04 -0700491 &has_cache, &is_global_cache);
Narayan Kamathd1c606f2014-06-09 16:50:19 +0100492
Jeff Haodcdc85b2015-12-04 14:06:18 -0800493 if (Runtime::Current()->IsZygote() && !secondary_image) {
Narayan Kamath5a2be3f2015-02-16 13:51:51 +0000494 MarkZygoteStart(image_isa, Runtime::Current()->GetZygoteMaxFailedBoots());
Narayan Kamath28bc9872014-11-07 17:46:28 +0000495 }
496
Alex Lighta59dd802014-07-02 16:28:08 -0700497 ImageSpace* space;
498 bool relocate = Runtime::Current()->ShouldRelocate();
Alex Light64ad14d2014-08-19 14:23:13 -0700499 bool can_compile = Runtime::Current()->IsImageDex2OatEnabled();
Narayan Kamathd1c606f2014-06-09 16:50:19 +0100500 if (found_image) {
Alex Lighta59dd802014-07-02 16:28:08 -0700501 const std::string* image_filename;
502 bool is_system = false;
503 bool relocated_version_used = false;
504 if (relocate) {
Alex Light64ad14d2014-08-19 14:23:13 -0700505 if (!dalvik_cache_exists) {
506 *error_msg = StringPrintf("Requiring relocation for image '%s' at '%s' but we do not have "
507 "any dalvik_cache to find/place it in.",
508 image_location, system_filename.c_str());
509 return nullptr;
510 }
Alex Lighta59dd802014-07-02 16:28:08 -0700511 if (has_system) {
512 if (has_cache && ChecksumsMatch(system_filename.c_str(), cache_filename.c_str())) {
513 // We already have a relocated version
514 image_filename = &cache_filename;
515 relocated_version_used = true;
516 } else {
517 // We cannot have a relocated version, Relocate the system one and use it.
Andreas Gampe3c13a792014-09-18 20:56:04 -0700518
519 std::string reason;
520 bool success;
521
522 // Check whether we are allowed to relocate.
523 if (!can_compile) {
524 reason = "Image dex2oat disabled by -Xnoimage-dex2oat.";
525 success = false;
526 } else if (!ImageCreationAllowed(is_global_cache, &reason)) {
527 // Whether we can write to the cache.
528 success = false;
Andreas Gampe8994a042015-12-30 19:03:17 +0000529 } else if (secondary_image) {
530 reason = "Should not have to patch secondary image.";
531 success = false;
Andreas Gampe3c13a792014-09-18 20:56:04 -0700532 } else {
533 // Try to relocate.
534 success = RelocateImage(image_location, cache_filename.c_str(), image_isa, &reason);
535 }
536
537 if (success) {
Alex Lighta59dd802014-07-02 16:28:08 -0700538 relocated_version_used = true;
539 image_filename = &cache_filename;
540 } else {
Andreas Gampe3c13a792014-09-18 20:56:04 -0700541 *error_msg = StringPrintf("Unable to relocate image '%s' from '%s' to '%s': %s",
Alex Light64ad14d2014-08-19 14:23:13 -0700542 image_location, system_filename.c_str(),
543 cache_filename.c_str(), reason.c_str());
Brian Carlstrome9105f72014-10-28 15:53:43 -0700544 // We failed to create files, remove any possibly garbage output.
545 // Since ImageCreationAllowed was true above, we are the zygote
546 // and therefore the only process expected to generate these for
547 // the device.
Narayan Kamath28bc9872014-11-07 17:46:28 +0000548 PruneDalvikCache(image_isa);
Alex Lighta59dd802014-07-02 16:28:08 -0700549 return nullptr;
550 }
551 }
552 } else {
553 CHECK(has_cache);
554 // We can just use cache's since it should be fine. This might or might not be relocated.
555 image_filename = &cache_filename;
556 }
557 } else {
558 if (has_system && has_cache) {
559 // Check they have the same cksum. If they do use the cache. Otherwise system.
560 if (ChecksumsMatch(system_filename.c_str(), cache_filename.c_str())) {
561 image_filename = &cache_filename;
562 relocated_version_used = true;
563 } else {
564 image_filename = &system_filename;
Alex Light1a762132014-07-31 09:32:13 -0700565 is_system = true;
Alex Lighta59dd802014-07-02 16:28:08 -0700566 }
567 } else if (has_system) {
568 image_filename = &system_filename;
Alex Light1a762132014-07-31 09:32:13 -0700569 is_system = true;
Alex Lighta59dd802014-07-02 16:28:08 -0700570 } else {
571 CHECK(has_cache);
572 image_filename = &cache_filename;
573 }
574 }
575 {
576 // Note that we must not use the file descriptor associated with
577 // ScopedFlock::GetFile to Init the image file. We want the file
578 // descriptor (and the associated exclusive lock) to be released when
579 // we leave Create.
580 ScopedFlock image_lock;
Alex Light64ad14d2014-08-19 14:23:13 -0700581 image_lock.Init(image_filename->c_str(), error_msg);
Alex Lightb6cabc12014-08-21 09:45:00 -0700582 VLOG(startup) << "Using image file " << image_filename->c_str() << " for image location "
583 << image_location;
Alex Lightb93637a2014-07-31 10:48:46 -0700584 // If we are in /system we can assume the image is good. We can also
585 // assume this if we are using a relocated image (i.e. image checksum
586 // matches) since this is only different by the offset. We need this to
587 // make sure that host tests continue to work.
Mathieu Chartierfbc31082016-01-24 11:59:56 -0800588 // Since we are the boot image, pass null since we load the oat file from the boot image oat
589 // file name.
590 space = ImageSpace::Init(image_filename->c_str(),
591 image_location,
592 !(is_system || relocated_version_used),
593 /* oat_file */nullptr,
594 error_msg);
Alex Lighta59dd802014-07-02 16:28:08 -0700595 }
Narayan Kamath52f84882014-05-02 10:10:39 +0100596 if (space != nullptr) {
597 return space;
598 }
599
Alex Lighta59dd802014-07-02 16:28:08 -0700600 if (relocated_version_used) {
Brian Carlstrome9105f72014-10-28 15:53:43 -0700601 // Something is wrong with the relocated copy (even though checksums match). Cleanup.
602 // This can happen if the .oat is corrupt, since the above only checks the .art checksums.
603 // TODO: Check the oat file validity earlier.
604 *error_msg = StringPrintf("Attempted to use relocated version of %s at %s generated from %s "
605 "but image failed to load: %s",
606 image_location, cache_filename.c_str(), system_filename.c_str(),
607 error_msg->c_str());
Narayan Kamath28bc9872014-11-07 17:46:28 +0000608 PruneDalvikCache(image_isa);
Alex Lighta59dd802014-07-02 16:28:08 -0700609 return nullptr;
610 } else if (is_system) {
Brian Carlstrome9105f72014-10-28 15:53:43 -0700611 // If the /system file exists, it should be up-to-date, don't try to generate it.
Alex Light64ad14d2014-08-19 14:23:13 -0700612 *error_msg = StringPrintf("Failed to load /system image '%s': %s",
613 image_filename->c_str(), error_msg->c_str());
Narayan Kamath52f84882014-05-02 10:10:39 +0100614 return nullptr;
Mathieu Chartierc7cb1902014-03-05 14:41:03 -0800615 } else {
Brian Carlstrome9105f72014-10-28 15:53:43 -0700616 // Otherwise, log a warning and fall through to GenerateImage.
Alex Light64ad14d2014-08-19 14:23:13 -0700617 LOG(WARNING) << *error_msg;
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700618 }
619 }
Narayan Kamath52f84882014-05-02 10:10:39 +0100620
Alex Light64ad14d2014-08-19 14:23:13 -0700621 if (!can_compile) {
622 *error_msg = "Not attempting to compile image because -Xnoimage-dex2oat";
623 return nullptr;
624 } else if (!dalvik_cache_exists) {
625 *error_msg = StringPrintf("No place to put generated image.");
626 return nullptr;
Andreas Gampe3c13a792014-09-18 20:56:04 -0700627 } else if (!ImageCreationAllowed(is_global_cache, error_msg)) {
628 return nullptr;
Andreas Gampe8994a042015-12-30 19:03:17 +0000629 } else if (secondary_image) {
630 *error_msg = "Cannot compile a secondary image.";
631 return nullptr;
Alex Light25396132014-08-27 15:37:23 -0700632 } else if (!GenerateImage(cache_filename, image_isa, error_msg)) {
Alex Light64ad14d2014-08-19 14:23:13 -0700633 *error_msg = StringPrintf("Failed to generate image '%s': %s",
634 cache_filename.c_str(), error_msg->c_str());
Brian Carlstrome9105f72014-10-28 15:53:43 -0700635 // We failed to create files, remove any possibly garbage output.
636 // Since ImageCreationAllowed was true above, we are the zygote
637 // and therefore the only process expected to generate these for
638 // the device.
Narayan Kamath28bc9872014-11-07 17:46:28 +0000639 PruneDalvikCache(image_isa);
Alex Light64ad14d2014-08-19 14:23:13 -0700640 return nullptr;
641 } else {
Andreas Gampe70be1fb2014-10-31 16:45:19 -0700642 // Check whether there is enough space left over after we have generated the image.
643 if (!CheckSpace(cache_filename, error_msg)) {
644 // No. Delete the generated image and try to run out of the dex files.
Narayan Kamath28bc9872014-11-07 17:46:28 +0000645 PruneDalvikCache(image_isa);
Andreas Gampe70be1fb2014-10-31 16:45:19 -0700646 return nullptr;
647 }
648
Alex Lighta59dd802014-07-02 16:28:08 -0700649 // Note that we must not use the file descriptor associated with
650 // ScopedFlock::GetFile to Init the image file. We want the file
651 // descriptor (and the associated exclusive lock) to be released when
652 // we leave Create.
653 ScopedFlock image_lock;
Alex Light64ad14d2014-08-19 14:23:13 -0700654 image_lock.Init(cache_filename.c_str(), error_msg);
Mathieu Chartierfbc31082016-01-24 11:59:56 -0800655 space = ImageSpace::Init(cache_filename.c_str(), image_location, true, nullptr, error_msg);
Alex Light64ad14d2014-08-19 14:23:13 -0700656 if (space == nullptr) {
657 *error_msg = StringPrintf("Failed to load generated image '%s': %s",
658 cache_filename.c_str(), error_msg->c_str());
659 }
660 return space;
Alex Lighta59dd802014-07-02 16:28:08 -0700661 }
Brian Carlstrom56d947f2013-07-15 13:14:23 -0700662}
663
Mathieu Chartier31e89252013-08-28 11:29:12 -0700664void ImageSpace::VerifyImageAllocations() {
Ian Rogers13735952014-10-08 12:43:28 -0700665 uint8_t* current = Begin() + RoundUp(sizeof(ImageHeader), kObjectAlignment);
Mathieu Chartier31e89252013-08-28 11:29:12 -0700666 while (current < End()) {
Mathieu Chartierc7853442015-03-27 14:35:38 -0700667 CHECK_ALIGNED(current, kObjectAlignment);
668 auto* obj = reinterpret_cast<mirror::Object*>(current);
Mathieu Chartier31e89252013-08-28 11:29:12 -0700669 CHECK(obj->GetClass() != nullptr) << "Image object at address " << obj << " has null class";
Mathieu Chartierc7853442015-03-27 14:35:38 -0700670 CHECK(live_bitmap_->Test(obj)) << PrettyTypeOf(obj);
Hiroshi Yamauchi624468c2014-03-31 15:14:47 -0700671 if (kUseBakerOrBrooksReadBarrier) {
672 obj->AssertReadBarrierPointer();
Hiroshi Yamauchi9d04a202014-01-31 13:35:49 -0800673 }
Mathieu Chartier31e89252013-08-28 11:29:12 -0700674 current += RoundUp(obj->SizeOf(), kObjectAlignment);
675 }
676}
677
Mathieu Chartierfbc31082016-01-24 11:59:56 -0800678// Helper class for relocating from one range of memory to another.
679class RelocationRange {
680 public:
681 RelocationRange() = default;
682 RelocationRange(const RelocationRange&) = default;
683 RelocationRange(uintptr_t source, uintptr_t dest, uintptr_t length)
684 : source_(source),
685 dest_(dest),
686 length_(length) {}
687
688 bool ContainsSource(uintptr_t address) const {
689 return address - source_ < length_;
690 }
691
692 // Translate a source address to the destination space.
693 uintptr_t ToDest(uintptr_t address) const {
694 DCHECK(ContainsSource(address));
695 return address + Delta();
696 }
697
698 // Returns the delta between the dest from the source.
699 off_t Delta() const {
700 return dest_ - source_;
701 }
702
703 uintptr_t Source() const {
704 return source_;
705 }
706
707 uintptr_t Dest() const {
708 return dest_;
709 }
710
711 uintptr_t Length() const {
712 return length_;
713 }
714
715 private:
716 const uintptr_t source_;
717 const uintptr_t dest_;
718 const uintptr_t length_;
719};
720
721class FixupVisitor : public ValueObject {
722 public:
723 FixupVisitor(const RelocationRange& boot_image,
724 const RelocationRange& boot_oat,
725 const RelocationRange& app_image,
726 const RelocationRange& app_oat)
727 : boot_image_(boot_image),
728 boot_oat_(boot_oat),
729 app_image_(app_image),
730 app_oat_(app_oat) {}
731
732 // Return the relocated address of a heap object.
733 template <typename T>
734 ALWAYS_INLINE T* ForwardObject(T* src) const {
735 const uintptr_t uint_src = reinterpret_cast<uintptr_t>(src);
736 if (boot_image_.ContainsSource(uint_src)) {
737 return reinterpret_cast<T*>(boot_image_.ToDest(uint_src));
738 }
739 if (app_image_.ContainsSource(uint_src)) {
740 return reinterpret_cast<T*>(app_image_.ToDest(uint_src));
741 }
742 return src;
743 }
744
745 // Return the relocated address of a code pointer (contained by an oat file).
746 ALWAYS_INLINE const void* ForwardCode(const void* src) const {
747 const uintptr_t uint_src = reinterpret_cast<uintptr_t>(src);
748 if (boot_oat_.ContainsSource(uint_src)) {
749 return reinterpret_cast<const void*>(boot_oat_.ToDest(uint_src));
750 }
751 if (app_oat_.ContainsSource(uint_src)) {
752 return reinterpret_cast<const void*>(app_oat_.ToDest(uint_src));
753 }
754 return src;
755 }
756
757 protected:
758 // Source section.
759 const RelocationRange boot_image_;
760 const RelocationRange boot_oat_;
761 const RelocationRange app_image_;
762 const RelocationRange app_oat_;
763};
764
765std::ostream& operator<<(std::ostream& os, const RelocationRange& reloc) {
766 return os << "(" << reinterpret_cast<const void*>(reloc.Source()) << "-"
767 << reinterpret_cast<const void*>(reloc.Source() + reloc.Length()) << ")->("
768 << reinterpret_cast<const void*>(reloc.Dest()) << "-"
769 << reinterpret_cast<const void*>(reloc.Dest() + reloc.Length()) << ")";
770}
771
772// Adapt for mirror::Class::FixupNativePointers.
773class FixupObjectAdapter : public FixupVisitor {
774 public:
775 template<typename... Args>
776 explicit FixupObjectAdapter(Args... args) : FixupVisitor(args...) {}
777
778 template <typename T>
779 T* operator()(T* obj) const {
780 return ForwardObject(obj);
781 }
782};
783
784class FixupClassVisitor : public FixupVisitor {
785 public:
786 template<typename... Args>
787 explicit FixupClassVisitor(Args... args) : FixupVisitor(args...) {}
788
789 // The image space is contained so the GC doesn't need to know about it. Avoid requiring mutator
790 // lock to prevent possible pauses.
791 ALWAYS_INLINE void operator()(mirror::Object* obj) const NO_THREAD_SAFETY_ANALYSIS {
792 mirror::Class* klass = obj->GetClass<kVerifyNone, kWithoutReadBarrier>();
793 DCHECK(klass != nullptr) << "Null class in image";
794 // No AsClass since our fields aren't quite fixed up yet.
795 mirror::Class* new_klass = down_cast<mirror::Class*>(ForwardObject(klass));
796 // Keep clean if possible.
797 if (klass != new_klass) {
798 obj->SetClass<kVerifyNone>(new_klass);
799 }
800 }
801};
802
803class FixupRootVisitor : public FixupVisitor {
804 public:
805 template<typename... Args>
806 explicit FixupRootVisitor(Args... args) : FixupVisitor(args...) {}
807
808 ALWAYS_INLINE void VisitRootIfNonNull(mirror::CompressedReference<mirror::Object>* root) const
809 SHARED_REQUIRES(Locks::mutator_lock_) {
810 if (!root->IsNull()) {
811 VisitRoot(root);
812 }
813 }
814
815 ALWAYS_INLINE void VisitRoot(mirror::CompressedReference<mirror::Object>* root) const
816 SHARED_REQUIRES(Locks::mutator_lock_) {
817 mirror::Object* ref = root->AsMirrorPtr();
818 mirror::Object* new_ref = ForwardObject(ref);
819 if (ref != new_ref) {
820 root->Assign(new_ref);
821 }
822 }
823};
824
825class FixupObjectVisitor : public FixupVisitor {
826 public:
827 template<typename... Args>
828 explicit FixupObjectVisitor(Args... args) : FixupVisitor(args...) {}
829
830 // Fix up separately since we also need to fix up method entrypoints.
831 ALWAYS_INLINE void VisitRootIfNonNull(
832 mirror::CompressedReference<mirror::Object>* root ATTRIBUTE_UNUSED) const {}
833
834 ALWAYS_INLINE void VisitRoot(mirror::CompressedReference<mirror::Object>* root ATTRIBUTE_UNUSED)
835 const {}
836
837 ALWAYS_INLINE void operator()(mirror::Object* obj,
838 MemberOffset offset,
839 bool is_static ATTRIBUTE_UNUSED) const
840 NO_THREAD_SAFETY_ANALYSIS {
841 // There could be overlap between ranges, we must avoid visiting the same reference twice.
842 // Avoid the class field since we already fixed it up in FixupClassVisitor.
843 if (offset.Uint32Value() != mirror::Object::ClassOffset().Uint32Value()) {
844 // Space is not yet added to the heap, don't do a read barrier.
845 mirror::Object* ref = obj->GetFieldObject<mirror::Object, kVerifyNone, kWithoutReadBarrier>(
846 offset);
847 // Use SetFieldObjectWithoutWriteBarrier to avoid card marking since we are writing to the
848 // image.
849 obj->SetFieldObjectWithoutWriteBarrier<false, true, kVerifyNone>(offset, ForwardObject(ref));
850 }
851 }
852
853 // java.lang.ref.Reference visitor.
854 void operator()(mirror::Class* klass ATTRIBUTE_UNUSED, mirror::Reference* ref) const
855 SHARED_REQUIRES(Locks::mutator_lock_) REQUIRES(Locks::heap_bitmap_lock_) {
856 mirror::Object* obj = ref->GetReferent<kWithoutReadBarrier>();
857 ref->SetFieldObjectWithoutWriteBarrier<false, true, kVerifyNone>(
858 mirror::Reference::ReferentOffset(),
859 ForwardObject(obj));
860 }
861
862 ALWAYS_INLINE void operator()(mirror::Object* obj) const NO_THREAD_SAFETY_ANALYSIS {
863 obj->VisitReferences</*visit native roots*/false, kVerifyNone, kWithoutReadBarrier>(
864 *this,
865 *this);
866 // We want to use our own class loader and not the one in the image.
867 if (obj->IsClass<kVerifyNone, kWithoutReadBarrier>()) {
868 mirror::Class* klass = obj->AsClass<kVerifyNone, kWithoutReadBarrier>();
869 FixupObjectAdapter visitor(boot_image_, boot_oat_, app_image_, app_oat_);
Mathieu Chartierdfe02f62016-02-01 20:15:11 -0800870 klass->FixupNativePointers<kVerifyNone, kWithoutReadBarrier>(klass, sizeof(void*), visitor);
Mathieu Chartierfbc31082016-01-24 11:59:56 -0800871 // Deal with the arrays.
872 mirror::PointerArray* vtable = klass->GetVTable<kVerifyNone, kWithoutReadBarrier>();
873 if (vtable != nullptr) {
Mathieu Chartierdfe02f62016-02-01 20:15:11 -0800874 vtable->Fixup<kVerifyNone, kWithoutReadBarrier>(vtable, sizeof(void*), visitor);
Mathieu Chartierfbc31082016-01-24 11:59:56 -0800875 }
876 mirror::IfTable* iftable = klass->GetIfTable<kVerifyNone, kWithoutReadBarrier>();
877 if (iftable != nullptr) {
Mathieu Chartierdfe02f62016-02-01 20:15:11 -0800878 for (int32_t i = 0, count = iftable->Count(); i < count; ++i) {
879 if (iftable->GetMethodArrayCount<kVerifyNone, kWithoutReadBarrier>(i) > 0) {
Mathieu Chartierfbc31082016-01-24 11:59:56 -0800880 mirror::PointerArray* methods =
881 iftable->GetMethodArray<kVerifyNone, kWithoutReadBarrier>(i);
882 DCHECK(methods != nullptr);
Mathieu Chartierdfe02f62016-02-01 20:15:11 -0800883 methods->Fixup<kVerifyNone, kWithoutReadBarrier>(methods, sizeof(void*), visitor);
Mathieu Chartierfbc31082016-01-24 11:59:56 -0800884 }
885 }
886 }
887 }
888 }
889};
890
891class ForwardObjectAdapter {
892 public:
893 ALWAYS_INLINE ForwardObjectAdapter(const FixupVisitor* visitor) : visitor_(visitor) {}
894
895 template <typename T>
896 ALWAYS_INLINE T* operator()(T* src) const {
897 return visitor_->ForwardObject(src);
898 }
899
900 private:
901 const FixupVisitor* const visitor_;
902};
903
904class ForwardCodeAdapter {
905 public:
906 ALWAYS_INLINE ForwardCodeAdapter(const FixupVisitor* visitor) : visitor_(visitor) {}
907
908 template <typename T>
909 ALWAYS_INLINE T* operator()(T* src) const {
910 return visitor_->ForwardCode(src);
911 }
912
913 private:
914 const FixupVisitor* const visitor_;
915};
916
917class FixupArtMethodVisitor : public FixupVisitor, public ArtMethodVisitor {
918 public:
919 template<typename... Args>
920 explicit FixupArtMethodVisitor(bool fixup_heap_objects, Args... args)
921 : FixupVisitor(args...),
922 fixup_heap_objects_(fixup_heap_objects) {}
923
924 virtual void Visit(ArtMethod* method) NO_THREAD_SAFETY_ANALYSIS {
925 if (fixup_heap_objects_) {
926 method->UpdateObjectsForImageRelocation(ForwardObjectAdapter(this));
927 }
928 method->UpdateEntrypoints(ForwardCodeAdapter(this));
929 }
930
931 private:
932 const bool fixup_heap_objects_;
933};
934
935class FixupArtFieldVisitor : public FixupVisitor, public ArtFieldVisitor {
936 public:
937 template<typename... Args>
938 explicit FixupArtFieldVisitor(Args... args) : FixupVisitor(args...) {}
939
940 virtual void Visit(ArtField* field) NO_THREAD_SAFETY_ANALYSIS {
941 field->UpdateObjects(ForwardObjectAdapter(this));
942 }
943};
944
945// Relocate an image space mapped at target_base which possibly used to be at a different base
946// address. Only needs a single image space, not one for both source and destination.
947// In place means modifying a single ImageSpace in place rather than relocating from one ImageSpace
948// to another.
949static bool RelocateInPlace(ImageHeader& image_header,
950 uint8_t* target_base,
951 accounting::ContinuousSpaceBitmap* bitmap,
952 const OatFile* app_oat_file,
953 std::string* error_msg) {
954 DCHECK(error_msg != nullptr);
955 if (!image_header.IsPic()) {
956 if (image_header.GetImageBegin() == target_base) {
957 return true;
958 }
959 *error_msg = StringPrintf("Cannot relocate non-pic image for oat file %s",
960 (app_oat_file != nullptr) ? app_oat_file->GetLocation().c_str() : "");
961 return false;
962 }
963 // Set up sections.
964 uint32_t boot_image_begin = 0;
965 uint32_t boot_image_end = 0;
966 uint32_t boot_oat_begin = 0;
967 uint32_t boot_oat_end = 0;
968 gc::Heap* const heap = Runtime::Current()->GetHeap();
969 heap->GetBootImagesSize(&boot_image_begin, &boot_image_end, &boot_oat_begin, &boot_oat_end);
970 CHECK_NE(boot_image_begin, boot_image_end)
971 << "Can not relocate app image without boot image space";
972 CHECK_NE(boot_oat_begin, boot_oat_end) << "Can not relocate app image without boot oat file";
973 const uint32_t boot_image_size = boot_image_end - boot_image_begin;
974 const uint32_t boot_oat_size = boot_oat_end - boot_oat_begin;
975 const uint32_t image_header_boot_image_size = image_header.GetBootImageSize();
976 const uint32_t image_header_boot_oat_size = image_header.GetBootOatSize();
977 if (boot_image_size != image_header_boot_image_size) {
978 *error_msg = StringPrintf("Boot image size %" PRIu64 " does not match expected size %"
979 PRIu64,
980 static_cast<uint64_t>(boot_image_size),
981 static_cast<uint64_t>(image_header_boot_image_size));
982 return false;
983 }
984 if (boot_oat_size != image_header_boot_oat_size) {
985 *error_msg = StringPrintf("Boot oat size %" PRIu64 " does not match expected size %"
986 PRIu64,
987 static_cast<uint64_t>(boot_oat_size),
988 static_cast<uint64_t>(image_header_boot_oat_size));
989 return false;
990 }
991 TimingLogger logger(__FUNCTION__, true, false);
992 RelocationRange boot_image(image_header.GetBootImageBegin(),
993 boot_image_begin,
994 boot_image_size);
995 RelocationRange boot_oat(image_header.GetBootOatBegin(),
996 boot_oat_begin,
997 boot_oat_size);
998 RelocationRange app_image(reinterpret_cast<uintptr_t>(image_header.GetImageBegin()),
999 reinterpret_cast<uintptr_t>(target_base),
1000 image_header.GetImageSize());
1001 // Use the oat data section since this is where the OatFile::Begin is.
1002 RelocationRange app_oat(reinterpret_cast<uintptr_t>(image_header.GetOatDataBegin()),
1003 // Not necessarily in low 4GB.
1004 reinterpret_cast<uintptr_t>(app_oat_file->Begin()),
1005 image_header.GetOatDataEnd() - image_header.GetOatDataBegin());
1006 VLOG(image) << "App image " << app_image;
1007 VLOG(image) << "App oat " << app_oat;
1008 VLOG(image) << "Boot image " << boot_image;
1009 VLOG(image) << "Boot oat " << boot_oat;
1010 // True if we need to fixup any heap pointers, otherwise only code pointers.
1011 const bool fixup_image = boot_image.Delta() != 0 || app_image.Delta() != 0;
1012 const bool fixup_code = boot_oat.Delta() != 0 || app_oat.Delta() != 0;
1013 if (!fixup_image && !fixup_code) {
1014 // Nothing to fix up.
1015 return true;
1016 }
Mathieu Chartierdfe02f62016-02-01 20:15:11 -08001017 ScopedDebugDisallowReadBarriers sddrb(Thread::Current());
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001018 // Need to update the image to be at the target base.
1019 const ImageSection& objects_section = image_header.GetImageSection(ImageHeader::kSectionObjects);
1020 uintptr_t objects_begin = reinterpret_cast<uintptr_t>(target_base + objects_section.Offset());
1021 uintptr_t objects_end = reinterpret_cast<uintptr_t>(target_base + objects_section.End());
1022 // Two pass approach, fix up all classes first, then fix up non class-objects.
1023 FixupObjectVisitor fixup_object_visitor(boot_image, boot_oat, app_image, app_oat);
1024 if (fixup_image) {
1025 TimingLogger::ScopedTiming timing("Fixup classes", &logger);
1026 // Fixup class only touches app image classes, don't need the mutator lock since the space is
1027 // not yet visible to the GC.
1028 FixupClassVisitor fixup_class_visitor(boot_image, boot_oat, app_image, app_oat);
1029 bitmap->VisitMarkedRange(objects_begin, objects_end, fixup_class_visitor);
1030 // Fixup objects may read fields in the boot image, use the mutator lock here for sanity. Though
1031 // its probably not required.
1032 ScopedObjectAccess soa(Thread::Current());
1033 timing.NewTiming("Fixup objects");
1034 bitmap->VisitMarkedRange(objects_begin, objects_end, fixup_object_visitor);
1035 FixupObjectAdapter fixup_adapter(boot_image, boot_oat, app_image, app_oat);
1036 // Fixup image roots.
Mathieu Chartier4a26f172016-01-26 14:26:18 -08001037 CHECK(app_image.ContainsSource(reinterpret_cast<uintptr_t>(
1038 image_header.GetImageRoots<kWithoutReadBarrier>())));
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001039 image_header.RelocateImageObjects(app_image.Delta());
1040 CHECK_EQ(image_header.GetImageBegin(), target_base);
1041 // Fix up dex cache DexFile pointers.
Mathieu Chartier4a26f172016-01-26 14:26:18 -08001042 auto* dex_caches = image_header.GetImageRoot<kWithoutReadBarrier>(ImageHeader::kDexCaches)->
Mathieu Chartierdfe02f62016-02-01 20:15:11 -08001043 AsObjectArray<mirror::DexCache, kVerifyNone, kWithoutReadBarrier>();
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001044 for (int32_t i = 0, count = dex_caches->GetLength(); i < count; ++i) {
Mathieu Chartier60bc39c2016-01-27 18:37:48 -08001045 mirror::DexCache* dex_cache = dex_caches->Get<kVerifyNone, kWithoutReadBarrier>(i);
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001046 // Fix up dex cache pointers.
1047 GcRoot<mirror::String>* strings = dex_cache->GetStrings();
1048 if (strings != nullptr) {
1049 GcRoot<mirror::String>* new_strings = fixup_adapter.ForwardObject(strings);
1050 if (strings != new_strings) {
Mathieu Chartier1aa8ec22016-02-01 10:34:47 -08001051 dex_cache->SetStrings(new_strings);
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001052 }
Mathieu Chartier60bc39c2016-01-27 18:37:48 -08001053 dex_cache->FixupStrings<kWithoutReadBarrier>(new_strings, fixup_adapter);
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001054 }
1055 GcRoot<mirror::Class>* types = dex_cache->GetResolvedTypes();
1056 if (types != nullptr) {
1057 GcRoot<mirror::Class>* new_types = fixup_adapter.ForwardObject(types);
1058 if (types != new_types) {
Mathieu Chartier1aa8ec22016-02-01 10:34:47 -08001059 dex_cache->SetResolvedTypes(new_types);
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001060 }
Mathieu Chartier60bc39c2016-01-27 18:37:48 -08001061 dex_cache->FixupResolvedTypes<kWithoutReadBarrier>(new_types, fixup_adapter);
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001062 }
1063 ArtMethod** methods = dex_cache->GetResolvedMethods();
1064 if (methods != nullptr) {
1065 ArtMethod** new_methods = fixup_adapter.ForwardObject(methods);
1066 if (methods != new_methods) {
Mathieu Chartier1aa8ec22016-02-01 10:34:47 -08001067 dex_cache->SetResolvedMethods(new_methods);
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001068 }
1069 for (size_t j = 0, num = dex_cache->NumResolvedMethods(); j != num; ++j) {
1070 ArtMethod* orig = mirror::DexCache::GetElementPtrSize(new_methods, j, sizeof(void*));
1071 ArtMethod* copy = fixup_adapter.ForwardObject(orig);
1072 if (orig != copy) {
1073 mirror::DexCache::SetElementPtrSize(new_methods, j, copy, sizeof(void*));
1074 }
1075 }
1076 }
1077 ArtField** fields = dex_cache->GetResolvedFields();
1078 if (fields != nullptr) {
1079 ArtField** new_fields = fixup_adapter.ForwardObject(fields);
1080 if (fields != new_fields) {
Mathieu Chartier1aa8ec22016-02-01 10:34:47 -08001081 dex_cache->SetResolvedFields(new_fields);
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001082 }
1083 for (size_t j = 0, num = dex_cache->NumResolvedFields(); j != num; ++j) {
1084 ArtField* orig = mirror::DexCache::GetElementPtrSize(new_fields, j, sizeof(void*));
1085 ArtField* copy = fixup_adapter.ForwardObject(orig);
1086 if (orig != copy) {
1087 mirror::DexCache::SetElementPtrSize(new_fields, j, copy, sizeof(void*));
1088 }
1089 }
1090 }
1091 }
1092 }
1093 {
1094 // Only touches objects in the app image, no need for mutator lock.
1095 TimingLogger::ScopedTiming timing("Fixup methods", &logger);
1096 FixupArtMethodVisitor method_visitor(fixup_image, boot_image, boot_oat, app_image, app_oat);
1097 image_header.GetImageSection(ImageHeader::kSectionArtMethods).VisitPackedArtMethods(
1098 &method_visitor,
1099 target_base,
1100 sizeof(void*));
1101 }
1102 if (fixup_image) {
1103 {
1104 // Only touches objects in the app image, no need for mutator lock.
1105 TimingLogger::ScopedTiming timing("Fixup fields", &logger);
1106 FixupArtFieldVisitor field_visitor(boot_image, boot_oat, app_image, app_oat);
1107 image_header.GetImageSection(ImageHeader::kSectionArtFields).VisitPackedArtFields(
1108 &field_visitor,
1109 target_base);
1110 }
1111 // In the app image case, the image methods are actually in the boot image.
1112 image_header.RelocateImageMethods(boot_image.Delta());
1113 const auto& class_table_section = image_header.GetImageSection(ImageHeader::kSectionClassTable);
1114 if (class_table_section.Size() > 0u) {
1115 // Note that we require that ReadFromMemory does not make an internal copy of the elements.
1116 // This also relies on visit roots not doing any verification which could fail after we update
1117 // the roots to be the image addresses.
1118 ScopedObjectAccess soa(Thread::Current());
1119 WriterMutexLock mu(Thread::Current(), *Locks::classlinker_classes_lock_);
1120 ClassTable temp_table;
1121 temp_table.ReadFromMemory(target_base + class_table_section.Offset());
1122 FixupRootVisitor root_visitor(boot_image, boot_oat, app_image, app_oat);
1123 temp_table.VisitRoots(root_visitor);
1124 }
1125 }
1126 if (VLOG_IS_ON(image)) {
1127 logger.Dump(LOG(INFO));
1128 }
1129 return true;
1130}
1131
1132ImageSpace* ImageSpace::Init(const char* image_filename,
1133 const char* image_location,
1134 bool validate_oat_file,
1135 const OatFile* oat_file,
1136 std::string* error_msg) {
Narayan Kamath52f84882014-05-02 10:10:39 +01001137 CHECK(image_filename != nullptr);
1138 CHECK(image_location != nullptr);
Ian Rogers1d54e732013-05-02 21:10:01 -07001139
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001140 TimingLogger logger(__FUNCTION__, true, false);
1141 VLOG(image) << "ImageSpace::Init entering image_filename=" << image_filename;
Nicolas Geoffray1bc977c2016-01-23 14:15:49 +00001142
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001143 std::unique_ptr<File> file;
1144 {
1145 TimingLogger::ScopedTiming timing("OpenImageFile", &logger);
1146 file.reset(OS::OpenFileForReading(image_filename));
1147 if (file == nullptr) {
1148 *error_msg = StringPrintf("Failed to open '%s'", image_filename);
1149 return nullptr;
1150 }
Nicolas Geoffray1bc977c2016-01-23 14:15:49 +00001151 }
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001152 ImageHeader temp_image_header;
1153 ImageHeader* image_header = &temp_image_header;
1154 {
1155 TimingLogger::ScopedTiming timing("ReadImageHeader", &logger);
1156 bool success = file->ReadFully(image_header, sizeof(*image_header));
1157 if (!success || !image_header->IsValid()) {
1158 *error_msg = StringPrintf("Invalid image header in '%s'", image_filename);
1159 return nullptr;
1160 }
Ian Rogers1d54e732013-05-02 21:10:01 -07001161 }
Mathieu Chartierceb07b32015-12-10 09:33:21 -08001162 // Check that the file is larger or equal to the header size + data size.
1163 const uint64_t image_file_size = static_cast<uint64_t>(file->GetLength());
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001164 if (image_file_size < sizeof(ImageHeader) + image_header->GetDataSize()) {
Mathieu Chartierceb07b32015-12-10 09:33:21 -08001165 *error_msg = StringPrintf("Image file truncated: %" PRIu64 " vs. %" PRIu64 ".",
1166 image_file_size,
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001167 sizeof(ImageHeader) + image_header->GetDataSize());
Andreas Gampe6c8b49f2015-02-19 11:42:36 -08001168 return nullptr;
1169 }
Mathieu Chartiere401d142015-04-22 13:56:20 -07001170
Mathieu Chartier9ff84602016-01-29 12:22:17 -08001171 if (oat_file != nullptr) {
1172 // If we have an oat file, check the oat file checksum. The oat file is only non-null for the
1173 // app image case. Otherwise, we open the oat file after the image and check the checksum there.
1174 const uint32_t oat_checksum = oat_file->GetOatHeader().GetChecksum();
1175 const uint32_t image_oat_checksum = image_header->GetOatChecksum();
1176 if (oat_checksum != image_oat_checksum) {
1177 *error_msg = StringPrintf("Oat checksum 0x%x does not match the image one 0x%x in image %s",
1178 oat_checksum,
1179 image_oat_checksum,
1180 image_filename);
1181 return nullptr;
1182 }
1183 }
1184
Jeff Haodcdc85b2015-12-04 14:06:18 -08001185 if (VLOG_IS_ON(startup)) {
Mathieu Chartiere401d142015-04-22 13:56:20 -07001186 LOG(INFO) << "Dumping image sections";
1187 for (size_t i = 0; i < ImageHeader::kSectionCount; ++i) {
1188 const auto section_idx = static_cast<ImageHeader::ImageSections>(i);
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001189 auto& section = image_header->GetImageSection(section_idx);
Mathieu Chartiere401d142015-04-22 13:56:20 -07001190 LOG(INFO) << section_idx << " start="
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001191 << reinterpret_cast<void*>(image_header->GetImageBegin() + section.Offset()) << " "
1192 << section;
Mathieu Chartiere401d142015-04-22 13:56:20 -07001193 }
1194 }
1195
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001196 const auto& bitmap_section = image_header->GetImageSection(ImageHeader::kSectionImageBitmap);
Mathieu Chartierceb07b32015-12-10 09:33:21 -08001197 // The location we want to map from is the first aligned page after the end of the stored
1198 // (possibly compressed) data.
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001199 const size_t image_bitmap_offset = RoundUp(sizeof(ImageHeader) + image_header->GetDataSize(),
Mathieu Chartierceb07b32015-12-10 09:33:21 -08001200 kPageSize);
1201 const size_t end_of_bitmap = image_bitmap_offset + bitmap_section.Size();
Mathieu Chartierc7853442015-03-27 14:35:38 -07001202 if (end_of_bitmap != image_file_size) {
1203 *error_msg = StringPrintf(
1204 "Image file size does not equal end of bitmap: size=%" PRIu64 " vs. %zu.", image_file_size,
1205 end_of_bitmap);
Andreas Gampe6c8b49f2015-02-19 11:42:36 -08001206 return nullptr;
1207 }
1208
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001209 // The preferred address to map the image, null specifies any address. If we manage to map the
1210 // image at the image begin, the amount of fixup work required is minimized.
1211 std::vector<uint8_t*> addresses(1, image_header->GetImageBegin());
1212 if (image_header->IsPic()) {
1213 // Can also map at a random low_4gb address since we can relocate in-place.
1214 addresses.push_back(nullptr);
1215 }
1216
Mathieu Chartier31e89252013-08-28 11:29:12 -07001217 // Note: The image header is part of the image due to mmap page alignment required of offset.
Mathieu Chartierceb07b32015-12-10 09:33:21 -08001218 std::unique_ptr<MemMap> map;
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001219 std::string temp_error_msg;
1220 for (uint8_t* address : addresses) {
1221 TimingLogger::ScopedTiming timing("MapImageFile", &logger);
1222 // Only care about the error message for the last address in addresses. We want to avoid the
1223 // overhead of printing the process maps if we can relocate.
1224 std::string* out_error_msg = (address == addresses.back()) ? &temp_error_msg : nullptr;
1225 if (image_header->GetStorageMode() == ImageHeader::kStorageModeUncompressed) {
1226 map.reset(MemMap::MapFileAtAddress(address,
1227 image_header->GetImageSize(),
1228 PROT_READ | PROT_WRITE,
1229 MAP_PRIVATE,
1230 file->Fd(),
1231 0,
1232 /*low_4gb*/true,
1233 /*reuse*/false,
1234 image_filename,
1235 /*out*/out_error_msg));
1236 } else {
1237 // Reserve output and decompress into it.
1238 map.reset(MemMap::MapAnonymous(image_location,
1239 address,
1240 image_header->GetImageSize(),
1241 PROT_READ | PROT_WRITE,
1242 /*low_4gb*/true,
1243 /*reuse*/false,
1244 out_error_msg));
1245 if (map != nullptr) {
1246 const size_t stored_size = image_header->GetDataSize();
1247 const size_t write_offset = sizeof(ImageHeader); // Skip the header.
1248 std::unique_ptr<MemMap> temp_map(MemMap::MapFile(sizeof(ImageHeader) + stored_size,
1249 PROT_READ,
1250 MAP_PRIVATE,
1251 file->Fd(),
1252 /*offset*/0,
1253 /*low_4gb*/false,
1254 image_filename,
1255 out_error_msg));
1256 if (temp_map == nullptr) {
1257 DCHECK(!out_error_msg->empty());
1258 return nullptr;
1259 }
1260 memcpy(map->Begin(), image_header, sizeof(ImageHeader));
1261 const uint64_t start = NanoTime();
1262 const size_t decompressed_size = LZ4_decompress_safe(
1263 reinterpret_cast<char*>(temp_map->Begin()) + sizeof(ImageHeader),
1264 reinterpret_cast<char*>(map->Begin()) + write_offset,
1265 stored_size,
1266 map->Size());
1267 VLOG(image) << "Decompressing image took " << PrettyDuration(NanoTime() - start);
1268 if (decompressed_size + sizeof(ImageHeader) != image_header->GetImageSize()) {
1269 *error_msg = StringPrintf("Decompressed size does not match expected image size %zu vs %zu",
1270 decompressed_size + sizeof(ImageHeader),
1271 image_header->GetImageSize());
1272 return nullptr;
1273 }
1274 }
1275 }
Mathieu Chartierceb07b32015-12-10 09:33:21 -08001276 if (map != nullptr) {
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001277 break;
Mathieu Chartierceb07b32015-12-10 09:33:21 -08001278 }
1279 }
1280
Mathieu Chartier42bddce2015-11-09 15:16:56 -08001281 if (map == nullptr) {
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001282 DCHECK(!temp_error_msg.empty());
1283 *error_msg = temp_error_msg;
Ian Rogers8d31bbd2013-10-13 10:44:14 -07001284 return nullptr;
Ian Rogers1d54e732013-05-02 21:10:01 -07001285 }
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001286 DCHECK_EQ(0, memcmp(image_header, map->Begin(), sizeof(ImageHeader)));
Ian Rogers1d54e732013-05-02 21:10:01 -07001287
Mathieu Chartierceb07b32015-12-10 09:33:21 -08001288 std::unique_ptr<MemMap> image_bitmap_map(MemMap::MapFileAtAddress(nullptr,
1289 bitmap_section.Size(),
1290 PROT_READ, MAP_PRIVATE,
1291 file->Fd(),
1292 image_bitmap_offset,
1293 /*low_4gb*/false,
1294 /*reuse*/false,
1295 image_filename,
1296 error_msg));
1297 if (image_bitmap_map == nullptr) {
Ian Rogers8d31bbd2013-10-13 10:44:14 -07001298 *error_msg = StringPrintf("Failed to map image bitmap: %s", error_msg->c_str());
1299 return nullptr;
1300 }
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001301 // Loaded the map, use the image header from the file now in case we patch it with
1302 // RelocateInPlace.
1303 image_header = reinterpret_cast<ImageHeader*>(map->Begin());
1304 const uint32_t bitmap_index = bitmap_index_.FetchAndAddSequentiallyConsistent(1);
1305 std::string bitmap_name(StringPrintf("imagespace %s live-bitmap %u",
1306 image_filename,
Mathieu Chartier31e89252013-08-28 11:29:12 -07001307 bitmap_index));
Mathieu Chartier2d124ec2016-01-05 18:03:15 -08001308 // Bitmap only needs to cover until the end of the mirror objects section.
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001309 const ImageSection& image_objects = image_header->GetImageSection(ImageHeader::kSectionObjects);
1310 // We only want the mirror object, not the ArtFields and ArtMethods.
1311 uint8_t* const image_end = map->Begin() + image_objects.End();
1312 std::unique_ptr<accounting::ContinuousSpaceBitmap> bitmap;
1313 {
1314 TimingLogger::ScopedTiming timing("CreateImageBitmap", &logger);
1315 bitmap.reset(
Mathieu Chartierd39645e2015-06-09 17:50:29 -07001316 accounting::ContinuousSpaceBitmap::CreateFromMemMap(
Mathieu Chartierceb07b32015-12-10 09:33:21 -08001317 bitmap_name,
1318 image_bitmap_map.release(),
1319 reinterpret_cast<uint8_t*>(map->Begin()),
Mathieu Chartier2d124ec2016-01-05 18:03:15 -08001320 image_objects.End()));
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001321 if (bitmap == nullptr) {
1322 *error_msg = StringPrintf("Could not create bitmap '%s'", bitmap_name.c_str());
1323 return nullptr;
1324 }
Ian Rogers8d31bbd2013-10-13 10:44:14 -07001325 }
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001326 {
1327 TimingLogger::ScopedTiming timing("RelocateImage", &logger);
1328 if (!RelocateInPlace(*image_header,
1329 map->Begin(),
1330 bitmap.get(),
1331 oat_file,
1332 error_msg)) {
1333 return nullptr;
1334 }
1335 }
Mathieu Chartiere401d142015-04-22 13:56:20 -07001336 // We only want the mirror object, not the ArtFields and ArtMethods.
Jeff Haodcdc85b2015-12-04 14:06:18 -08001337 std::unique_ptr<ImageSpace> space(new ImageSpace(image_filename,
1338 image_location,
1339 map.release(),
1340 bitmap.release(),
Mathieu Chartier2d124ec2016-01-05 18:03:15 -08001341 image_end));
Hiroshi Yamauchibd0fb612014-05-20 13:46:00 -07001342
1343 // VerifyImageAllocations() will be called later in Runtime::Init()
1344 // as some class roots like ArtMethod::java_lang_reflect_ArtMethod_
1345 // and ArtField::java_lang_reflect_ArtField_, which are used from
1346 // Object::SizeOf() which VerifyImageAllocations() calls, are not
1347 // set yet at this point.
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001348 if (oat_file == nullptr) {
1349 TimingLogger::ScopedTiming timing("OpenOatFile", &logger);
1350 space->oat_file_.reset(space->OpenOatFile(image_filename, error_msg));
1351 if (space->oat_file_ == nullptr) {
1352 DCHECK(!error_msg->empty());
1353 return nullptr;
1354 }
1355 space->oat_file_non_owned_ = space->oat_file_.get();
1356 } else {
1357 space->oat_file_non_owned_ = oat_file;
Nicolas Geoffray1bc977c2016-01-23 14:15:49 +00001358 }
Nicolas Geoffray1bc977c2016-01-23 14:15:49 +00001359
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001360 if (validate_oat_file) {
1361 TimingLogger::ScopedTiming timing("ValidateOatFile", &logger);
1362 if (!space->ValidateOatFile(error_msg)) {
1363 DCHECK(!error_msg->empty());
1364 return nullptr;
1365 }
Brian Carlstrom56d947f2013-07-15 13:14:23 -07001366 }
1367
Vladimir Marko7624d252014-05-02 14:40:15 +01001368 Runtime* runtime = Runtime::Current();
Vladimir Marko7624d252014-05-02 14:40:15 +01001369
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001370 // If oat_file is null, then it is the boot image space. Use oat_file_non_owned_ from the space
1371 // to set the runtime methods.
1372 CHECK_EQ(oat_file != nullptr, image_header->IsAppImage());
1373 if (image_header->IsAppImage()) {
1374 CHECK_EQ(runtime->GetResolutionMethod(),
1375 image_header->GetImageMethod(ImageHeader::kResolutionMethod));
1376 CHECK_EQ(runtime->GetImtConflictMethod(),
1377 image_header->GetImageMethod(ImageHeader::kImtConflictMethod));
1378 CHECK_EQ(runtime->GetImtUnimplementedMethod(),
1379 image_header->GetImageMethod(ImageHeader::kImtUnimplementedMethod));
1380 CHECK_EQ(runtime->GetCalleeSaveMethod(Runtime::kSaveAll),
1381 image_header->GetImageMethod(ImageHeader::kCalleeSaveMethod));
1382 CHECK_EQ(runtime->GetCalleeSaveMethod(Runtime::kRefsOnly),
1383 image_header->GetImageMethod(ImageHeader::kRefsOnlySaveMethod));
1384 CHECK_EQ(runtime->GetCalleeSaveMethod(Runtime::kRefsAndArgs),
1385 image_header->GetImageMethod(ImageHeader::kRefsAndArgsSaveMethod));
1386 } else if (!runtime->HasResolutionMethod()) {
1387 runtime->SetInstructionSet(space->oat_file_non_owned_->GetOatHeader().GetInstructionSet());
1388 runtime->SetResolutionMethod(image_header->GetImageMethod(ImageHeader::kResolutionMethod));
1389 runtime->SetImtConflictMethod(image_header->GetImageMethod(ImageHeader::kImtConflictMethod));
Jeff Haodcdc85b2015-12-04 14:06:18 -08001390 runtime->SetImtUnimplementedMethod(
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001391 image_header->GetImageMethod(ImageHeader::kImtUnimplementedMethod));
Jeff Haodcdc85b2015-12-04 14:06:18 -08001392 runtime->SetCalleeSaveMethod(
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001393 image_header->GetImageMethod(ImageHeader::kCalleeSaveMethod), Runtime::kSaveAll);
Jeff Haodcdc85b2015-12-04 14:06:18 -08001394 runtime->SetCalleeSaveMethod(
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001395 image_header->GetImageMethod(ImageHeader::kRefsOnlySaveMethod), Runtime::kRefsOnly);
Jeff Haodcdc85b2015-12-04 14:06:18 -08001396 runtime->SetCalleeSaveMethod(
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001397 image_header->GetImageMethod(ImageHeader::kRefsAndArgsSaveMethod), Runtime::kRefsAndArgs);
Jeff Haodcdc85b2015-12-04 14:06:18 -08001398 }
Vladimir Marko7624d252014-05-02 14:40:15 +01001399
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001400 VLOG(image) << "ImageSpace::Init exiting " << *space.get();
1401 if (VLOG_IS_ON(image)) {
1402 logger.Dump(LOG(INFO));
Brian Carlstrom56d947f2013-07-15 13:14:23 -07001403 }
1404 return space.release();
1405}
1406
Nicolas Geoffray9583fbc2014-02-28 15:21:07 +00001407OatFile* ImageSpace::OpenOatFile(const char* image_path, std::string* error_msg) const {
Brian Carlstrom56d947f2013-07-15 13:14:23 -07001408 const ImageHeader& image_header = GetImageHeader();
Nicolas Geoffray9583fbc2014-02-28 15:21:07 +00001409 std::string oat_filename = ImageHeader::GetOatLocationFromImageLocation(image_path);
1410
Igor Murashkin46774762014-10-22 11:37:02 -07001411 CHECK(image_header.GetOatDataBegin() != nullptr);
1412
Mathieu Chartierf9c6fc62015-10-07 11:44:05 -07001413 OatFile* oat_file = OatFile::Open(oat_filename,
1414 oat_filename,
1415 image_header.GetOatDataBegin(),
Igor Murashkin46774762014-10-22 11:37:02 -07001416 image_header.GetOatFileBegin(),
Richard Uhlere5fed032015-03-18 08:21:11 -07001417 !Runtime::Current()->IsAotCompiler(),
Mathieu Chartierf9c6fc62015-10-07 11:44:05 -07001418 nullptr,
1419 error_msg);
Mathieu Chartier2cebb242015-04-21 16:50:40 -07001420 if (oat_file == nullptr) {
Ian Rogers8d31bbd2013-10-13 10:44:14 -07001421 *error_msg = StringPrintf("Failed to open oat file '%s' referenced from image %s: %s",
1422 oat_filename.c_str(), GetName(), error_msg->c_str());
1423 return nullptr;
Brian Carlstrom56d947f2013-07-15 13:14:23 -07001424 }
1425 uint32_t oat_checksum = oat_file->GetOatHeader().GetChecksum();
1426 uint32_t image_oat_checksum = image_header.GetOatChecksum();
1427 if (oat_checksum != image_oat_checksum) {
Ian Rogers8d31bbd2013-10-13 10:44:14 -07001428 *error_msg = StringPrintf("Failed to match oat file checksum 0x%x to expected oat checksum 0x%x"
1429 " in image %s", oat_checksum, image_oat_checksum, GetName());
1430 return nullptr;
Brian Carlstrom56d947f2013-07-15 13:14:23 -07001431 }
Alex Lighta59dd802014-07-02 16:28:08 -07001432 int32_t image_patch_delta = image_header.GetPatchDelta();
1433 int32_t oat_patch_delta = oat_file->GetOatHeader().GetImagePatchDelta();
Igor Murashkin46774762014-10-22 11:37:02 -07001434 if (oat_patch_delta != image_patch_delta && !image_header.CompilePic()) {
Alex Lighta59dd802014-07-02 16:28:08 -07001435 // We should have already relocated by this point. Bail out.
1436 *error_msg = StringPrintf("Failed to match oat file patch delta %d to expected patch delta %d "
1437 "in image %s", oat_patch_delta, image_patch_delta, GetName());
1438 return nullptr;
1439 }
1440
Brian Carlstrom56d947f2013-07-15 13:14:23 -07001441 return oat_file;
1442}
1443
Ian Rogers8d31bbd2013-10-13 10:44:14 -07001444bool ImageSpace::ValidateOatFile(std::string* error_msg) const {
Mathieu Chartier2cebb242015-04-21 16:50:40 -07001445 CHECK(oat_file_.get() != nullptr);
Mathieu Chartier31e89252013-08-28 11:29:12 -07001446 for (const OatFile::OatDexFile* oat_dex_file : oat_file_->GetOatDexFiles()) {
Brian Carlstrom56d947f2013-07-15 13:14:23 -07001447 const std::string& dex_file_location = oat_dex_file->GetDexFileLocation();
1448 uint32_t dex_file_location_checksum;
Ian Rogers8d31bbd2013-10-13 10:44:14 -07001449 if (!DexFile::GetChecksum(dex_file_location.c_str(), &dex_file_location_checksum, error_msg)) {
1450 *error_msg = StringPrintf("Failed to get checksum of dex file '%s' referenced by image %s: "
1451 "%s", dex_file_location.c_str(), GetName(), error_msg->c_str());
Brian Carlstrom56d947f2013-07-15 13:14:23 -07001452 return false;
1453 }
1454 if (dex_file_location_checksum != oat_dex_file->GetDexFileLocationChecksum()) {
Ian Rogers8d31bbd2013-10-13 10:44:14 -07001455 *error_msg = StringPrintf("ValidateOatFile found checksum mismatch between oat file '%s' and "
1456 "dex file '%s' (0x%x != 0x%x)",
1457 oat_file_->GetLocation().c_str(), dex_file_location.c_str(),
1458 oat_dex_file->GetDexFileLocationChecksum(),
1459 dex_file_location_checksum);
Brian Carlstrom56d947f2013-07-15 13:14:23 -07001460 return false;
1461 }
1462 }
1463 return true;
1464}
1465
Andreas Gampe22f8e5c2014-07-09 11:38:21 -07001466const OatFile* ImageSpace::GetOatFile() const {
Andreas Gampe88da3b02015-06-12 20:38:49 -07001467 return oat_file_non_owned_;
Andreas Gampe22f8e5c2014-07-09 11:38:21 -07001468}
1469
Mathieu Chartierf9c6fc62015-10-07 11:44:05 -07001470std::unique_ptr<const OatFile> ImageSpace::ReleaseOatFile() {
1471 CHECK(oat_file_ != nullptr);
1472 return std::move(oat_file_);
Ian Rogers1d54e732013-05-02 21:10:01 -07001473}
1474
Ian Rogers1d54e732013-05-02 21:10:01 -07001475void ImageSpace::Dump(std::ostream& os) const {
1476 os << GetType()
Mathieu Chartier590fee92013-09-13 13:46:47 -07001477 << " begin=" << reinterpret_cast<void*>(Begin())
Ian Rogers1d54e732013-05-02 21:10:01 -07001478 << ",end=" << reinterpret_cast<void*>(End())
1479 << ",size=" << PrettySize(Size())
1480 << ",name=\"" << GetName() << "\"]";
1481}
1482
Andreas Gampe8994a042015-12-30 19:03:17 +00001483void ImageSpace::CreateMultiImageLocations(const std::string& input_image_file_name,
1484 const std::string& boot_classpath,
1485 std::vector<std::string>* image_file_names) {
1486 DCHECK(image_file_names != nullptr);
1487
1488 std::vector<std::string> images;
1489 Split(boot_classpath, ':', &images);
1490
1491 // Add the rest into the list. We have to adjust locations, possibly:
1492 //
1493 // For example, image_file_name is /a/b/c/d/e.art
1494 // images[0] is f/c/d/e.art
1495 // ----------------------------------------------
1496 // images[1] is g/h/i/j.art -> /a/b/h/i/j.art
1497
1498 // Derive pattern.
1499 std::vector<std::string> left;
1500 Split(input_image_file_name, '/', &left);
1501 std::vector<std::string> right;
1502 Split(images[0], '/', &right);
1503
1504 size_t common = 1;
1505 while (common < left.size() && common < right.size()) {
1506 if (left[left.size() - common - 1] != right[right.size() - common - 1]) {
1507 break;
1508 }
1509 common++;
1510 }
1511
1512 std::vector<std::string> prefix_vector(left.begin(), left.end() - common);
1513 std::string common_prefix = Join(prefix_vector, '/');
1514 if (!common_prefix.empty() && common_prefix[0] != '/' && input_image_file_name[0] == '/') {
1515 common_prefix = "/" + common_prefix;
1516 }
1517
1518 // Apply pattern to images[1] .. images[n].
1519 for (size_t i = 1; i < images.size(); ++i) {
1520 std::string image = images[i];
1521
1522 size_t rslash = std::string::npos;
1523 for (size_t j = 0; j < common; ++j) {
1524 if (rslash != std::string::npos) {
1525 rslash--;
1526 }
1527
1528 rslash = image.rfind('/', rslash);
1529 if (rslash == std::string::npos) {
1530 rslash = 0;
1531 }
1532 if (rslash == 0) {
1533 break;
1534 }
1535 }
1536 std::string image_part = image.substr(rslash);
1537
1538 std::string new_image = common_prefix + (StartsWith(image_part, "/") ? "" : "/") +
1539 image_part;
1540 image_file_names->push_back(new_image);
1541 }
1542}
1543
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001544ImageSpace* ImageSpace::CreateFromAppImage(const char* image,
1545 const OatFile* oat_file,
1546 std::string* error_msg) {
1547 return gc::space::ImageSpace::Init(image,
1548 image,
1549 /*validate_oat_file*/false,
1550 oat_file,
1551 /*out*/error_msg);
1552}
1553
Ian Rogers1d54e732013-05-02 21:10:01 -07001554} // namespace space
1555} // namespace gc
1556} // namespace art