blob: dd8b061b950a01ee8cc6a25efbe9d4c7bf074e95 [file] [log] [blame]
Elliott Hughes8d768a92011-09-14 16:35:25 -07001/*
2 * Copyright (C) 2011 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
Carl Shapiro0e5d75d2011-07-06 18:28:37 -070016
Brian Carlstromfc0e3212013-07-17 14:40:12 -070017#ifndef ART_RUNTIME_THREAD_H_
18#define ART_RUNTIME_THREAD_H_
Carl Shapiro0e5d75d2011-07-06 18:28:37 -070019
David Srbecky28f6cff2018-10-16 15:07:28 +010020#include <atomic>
Elliott Hughes02b48d12011-09-07 17:15:51 -070021#include <bitset>
Ian Rogers306057f2012-11-26 12:45:53 -080022#include <deque>
Elliott Hughesa0957642011-09-02 14:27:33 -070023#include <iosfwd>
Ian Rogersb033c752011-07-20 12:22:35 -070024#include <list>
Ian Rogers700a4022014-05-19 16:49:03 -070025#include <memory>
Elliott Hughes8daa0922011-09-11 13:46:25 -070026#include <string>
Carl Shapirob5573532011-07-12 18:22:59 -070027
David Sehrc431b9d2018-03-02 12:01:51 -080028#include "base/atomic.h"
Vladimir Markoddf4fd32021-11-22 16:31:57 +000029#include "base/bit_field.h"
30#include "base/bit_utils.h"
Andreas Gampe542451c2016-07-26 09:02:02 -070031#include "base/enums.h"
Andreas Gampe7fbc4a52018-11-28 08:26:47 -080032#include "base/locks.h"
Elliott Hughes76160052012-12-12 16:31:20 -080033#include "base/macros.h"
Alex Light184f0752018-07-13 11:18:22 -070034#include "base/safe_map.h"
Andreas Gampea1ffdba2019-01-04 16:08:51 -080035#include "base/value_object.h"
Ian Rogers848871b2013-08-05 10:56:33 -070036#include "entrypoints/jni/jni_entrypoints.h"
Ian Rogers7655f292013-07-29 11:07:13 -070037#include "entrypoints/quick/quick_entrypoints.h"
Alex Lightb7c640d2019-03-20 15:52:13 -070038#include "handle.h"
Mathieu Chartiereb8167a2014-05-07 15:43:14 -070039#include "handle_scope.h"
David Srbecky912f36c2018-09-08 12:22:58 +010040#include "interpreter/interpreter_cache.h"
Wessam Hassaneinb5a10be2020-11-11 16:42:52 -080041#include "javaheapprof/javaheapsampler.h"
Ian Rogers306057f2012-11-26 12:45:53 -080042#include "jvalue.h"
Andreas Gampe513061a2017-06-01 09:17:34 -070043#include "managed_stack.h"
Brian Carlstrom578bbdc2011-07-21 14:07:47 -070044#include "offsets.h"
Andreas Gampe217488a2017-09-18 08:34:42 -070045#include "read_barrier_config.h"
Alex Light55eccdf2019-10-07 13:51:13 +000046#include "reflective_handle_scope.h"
Andreas Gampe5a0430d2019-01-04 14:33:57 -080047#include "runtime_globals.h"
Elliott Hughes9d5ccec2011-09-19 13:19:50 -070048#include "runtime_stats.h"
Ian Rogers2dd0e2c2013-01-24 12:42:14 -080049#include "thread_state.h"
Ian Rogersb033c752011-07-20 12:22:35 -070050
Christopher Ferris6cff48f2014-01-26 21:36:13 -080051class BacktraceMap;
52
Carl Shapiro0e5d75d2011-07-06 18:28:37 -070053namespace art {
54
Mathieu Chartier15d34022014-02-26 17:16:38 -080055namespace gc {
Hiroshi Yamauchi0b713572015-06-16 18:29:23 -070056namespace accounting {
Igor Murashkin2ffb7032017-11-08 13:35:21 -080057template<class T> class AtomicStack;
Hiroshi Yamauchi0b713572015-06-16 18:29:23 -070058} // namespace accounting
Mathieu Chartier15d34022014-02-26 17:16:38 -080059namespace collector {
Igor Murashkin2ffb7032017-11-08 13:35:21 -080060class SemiSpace;
Mathieu Chartier15d34022014-02-26 17:16:38 -080061} // namespace collector
62} // namespace gc
63
Andreas Gamped77abd92019-01-02 16:10:20 -080064namespace instrumentation {
65struct InstrumentationStackFrame;
66} // namespace instrumentation
67
Ian Rogers2dd0e2c2013-01-24 12:42:14 -080068namespace mirror {
Igor Murashkin2ffb7032017-11-08 13:35:21 -080069class Array;
70class Class;
71class ClassLoader;
72class Object;
73template<class T> class ObjectArray;
74template<class T> class PrimitiveArray;
Vladimir Marko4f990712021-07-14 12:45:13 +010075using IntArray = PrimitiveArray<int32_t>;
Igor Murashkin2ffb7032017-11-08 13:35:21 -080076class StackTraceElement;
77class String;
78class Throwable;
Ian Rogers2dd0e2c2013-01-24 12:42:14 -080079} // namespace mirror
Mathieu Chartier12d625f2015-03-13 11:33:37 -070080
81namespace verifier {
Igor Murashkin2ffb7032017-11-08 13:35:21 -080082class MethodVerifier;
83class VerifierDeps;
Mathieu Chartier12d625f2015-03-13 11:33:37 -070084} // namespace verifier
85
Mathieu Chartiere401d142015-04-22 13:56:20 -070086class ArtMethod;
Ian Rogers2dd0e2c2013-01-24 12:42:14 -080087class BaseMutex;
88class ClassLinker;
Ian Rogers7a22fa62013-01-23 12:16:16 -080089class Closure;
Ian Rogersbdb03912011-09-14 00:55:44 -070090class Context;
Sebastien Hertz07474662015-08-25 15:12:33 +000091class DeoptimizationContextRecord;
Ian Rogers81d425b2012-09-27 16:03:43 -070092class DexFile;
Mingyao Yang99170c62015-07-06 11:10:37 -070093class FrameIdToShadowFrame;
Nicolas Geoffraye3f775b2019-12-04 14:41:52 +000094class IsMarkedVisitor;
Ian Rogersb48b9eb2014-02-28 16:20:21 -080095class JavaVMExt;
Ian Rogers55256cb2017-12-21 17:07:11 -080096class JNIEnvExt;
Elliott Hughes8daa0922011-09-11 13:46:25 -070097class Monitor;
Andreas Gampe513061a2017-06-01 09:17:34 -070098class RootVisitor;
Mathieu Chartier2b7c4d12014-05-19 10:52:16 -070099class ScopedObjectAccessAlreadyRunnable;
Logan Chienf7ad17e2012-03-15 03:10:03 +0800100class ShadowFrame;
Sebastien Hertzf7958692015-06-09 14:09:14 +0200101class StackedShadowFrameRecord;
Andreas Gampe0c2313c2019-05-14 09:47:00 -0700102enum class SuspendReason : char;
Brian Carlstrom40381fb2011-10-19 14:13:40 -0700103class Thread;
104class ThreadList;
Andreas Gampe513061a2017-06-01 09:17:34 -0700105enum VisitRootFlags : uint8_t;
Carl Shapiro0e5d75d2011-07-06 18:28:37 -0700106
Alex Light184f0752018-07-13 11:18:22 -0700107// A piece of data that can be held in the CustomTls. The destructor will be called during thread
108// shutdown. The thread the destructor is called on is not necessarily the same thread it was stored
109// on.
110class TLSData {
111 public:
112 virtual ~TLSData() {}
113};
114
Elliott Hughes34e06962012-04-09 13:55:55 -0700115// Thread priorities. These must match the Thread.MIN_PRIORITY,
116// Thread.NORM_PRIORITY, and Thread.MAX_PRIORITY constants.
117enum ThreadPriority {
118 kMinThreadPriority = 1,
119 kNormThreadPriority = 5,
120 kMaxThreadPriority = 10,
121};
122
Vladimir Markoddf4fd32021-11-22 16:31:57 +0000123enum class ThreadFlag : uint32_t {
124 // If set, implies that suspend_count_ > 0 and the Thread should enter the safepoint handler.
125 kSuspendRequest = 1u << 0,
126
127 // Request that the thread do some checkpoint work and then continue.
128 kCheckpointRequest = 1u << 1,
129
130 // Request that the thread do empty checkpoint and then continue.
131 kEmptyCheckpointRequest = 1u << 2,
132
133 // Register that at least 1 suspend barrier needs to be passed.
134 kActiveSuspendBarrier = 1u << 3,
135
Vladimir Marko9c0f7642021-12-06 16:17:52 +0000136 // Marks that a "flip function" needs to be executed on this thread.
137 kPendingFlipFunction = 1u << 4,
138
139 // Marks that the "flip function" is being executed by another thread.
140 //
141 // This is used to guards against multiple threads trying to run the
142 // "flip function" for the same thread while the thread is suspended.
143 //
144 // This is not needed when the thread is running the flip function
145 // on its own after transitioning to Runnable.
146 kRunningFlipFunction = 1u << 5,
147
148 // Marks that a thread is wating for "flip function" to complete.
149 //
150 // This is used to check if we need to broadcast the completion of the
151 // "flip function" to other threads. See also `kRunningFlipFunction`.
152 kWaitingForFlipFunction = 1u << 6,
153
Vladimir Markoce2a3442021-11-24 15:10:26 +0000154 // Request that compiled JNI stubs do not transition to Native or Runnable with
155 // inlined code, but take a slow path for monitoring method entry and exit events.
Vladimir Marko9c0f7642021-12-06 16:17:52 +0000156 kMonitorJniEntryExit = 1u << 7,
Vladimir Markoce2a3442021-11-24 15:10:26 +0000157
Vladimir Markoddf4fd32021-11-22 16:31:57 +0000158 // Indicates the last flag. Used for checking that the flags do not overlap thread state.
Vladimir Markoce2a3442021-11-24 15:10:26 +0000159 kLastFlag = kMonitorJniEntryExit
Ian Rogers474b6da2012-09-25 00:20:38 -0700160};
161
Sebastien Hertzf7958692015-06-09 14:09:14 +0200162enum class StackedShadowFrameType {
Mingyao Yang1f2d3ba2015-05-18 12:12:50 -0700163 kShadowFrameUnderConstruction,
Andreas Gampe639bdd12015-06-03 11:22:45 -0700164 kDeoptimizationShadowFrame,
Mingyao Yang1f2d3ba2015-05-18 12:12:50 -0700165};
166
Mingyao Yang2ee17902017-08-30 11:37:08 -0700167// The type of method that triggers deoptimization. It contains info on whether
168// the deoptimized method should advance dex_pc.
169enum class DeoptimizationMethodType {
170 kKeepDexPc, // dex pc is required to be kept upon deoptimization.
171 kDefault // dex pc may or may not advance depending on other conditions.
172};
173
Hans Boehm1b3ec0f2022-01-26 16:53:07 +0000174// For the CC colector, normal weak reference access can be disabled on a per-thread basis, while
175// processing references. After finishing, the reference processor asynchronously sets the
176// per-thread flags back to kEnabled with release memory ordering semantics. Each mutator thread
177// should check its flag with acquire semantics before assuming that it is enabled. However,
178// that is often too expensive, so the reading thread sets it to kVisiblyEnabled after seeing it
179// kEnabled. The Reference.get() intrinsic can thus read it in relaxed mode, and reread (by
180// resorting to the slow path) with acquire semantics if it sees a value of kEnabled rather than
181// kVisiblyEnabled.
182enum class WeakRefAccessState : int32_t {
183 kVisiblyEnabled = 0, // Enabled, and previously read with acquire load by this thread.
184 kEnabled,
185 kDisabled
186};
187
Hiroshi Yamauchi7ed9c562016-02-02 15:22:09 -0800188// This should match RosAlloc::kNumThreadLocalSizeBrackets.
189static constexpr size_t kNumRosAllocThreadLocalSizeBracketsInThread = 16;
Ian Rogerse63db272014-07-15 15:36:11 -0700190
Nicolas Geoffrayf9ae8e32022-02-15 22:54:11 +0000191static constexpr size_t kSharedMethodHotnessThreshold = 0xffff;
192
Dave Allison648d7112014-07-25 16:15:27 -0700193// Thread's stack layout for implicit stack overflow checks:
194//
195// +---------------------+ <- highest address of stack memory
196// | |
197// . . <- SP
198// | |
199// | |
200// +---------------------+ <- stack_end
201// | |
202// | Gap |
203// | |
204// +---------------------+ <- stack_begin
205// | |
206// | Protected region |
207// | |
208// +---------------------+ <- lowest address of stack memory
209//
210// The stack always grows down in memory. At the lowest address is a region of memory
211// that is set mprotect(PROT_NONE). Any attempt to read/write to this region will
212// result in a segmentation fault signal. At any point, the thread's SP will be somewhere
213// between the stack_end and the highest address in stack memory. An implicit stack
214// overflow check is a read of memory at a certain offset below the current SP (4K typically).
215// If the thread's SP is below the stack_end address this will be a read into the protected
216// region. If the SP is above the stack_end address, the thread is guaranteed to have
217// at least 4K of space. Because stack overflow checks are only performed in generated code,
218// if the thread makes a call out to a native function (through JNI), that native function
219// might only have 4K of memory (if the SP is adjacent to stack_end).
220
Ian Rogersdd7624d2014-03-14 17:43:00 -0700221class Thread {
Carl Shapiro0e5d75d2011-07-06 18:28:37 -0700222 public:
Andreas Gampe7ea6f792014-07-14 16:21:44 -0700223 static const size_t kStackOverflowImplicitCheckSize;
Andreas Gampeb486a982017-06-01 13:45:54 -0700224 static constexpr bool kVerifyStack = kIsDebugBuild;
Dave Allisonf9439142014-03-27 15:10:22 -0700225
Elliott Hughes462c9442012-03-23 18:47:50 -0700226 // Creates a new native thread corresponding to the given managed peer.
227 // Used to implement Thread.start.
Ian Rogers52673ff2012-06-27 23:25:34 -0700228 static void CreateNativeThread(JNIEnv* env, jobject peer, size_t stack_size, bool daemon);
Carl Shapiro61e019d2011-07-14 16:53:09 -0700229
Elliott Hughes462c9442012-03-23 18:47:50 -0700230 // Attaches the calling native thread to the runtime, returning the new native peer.
231 // Used to implement JNI AttachCurrentThread and AttachCurrentThreadAsDaemon calls.
Mathieu Chartier664bebf2012-11-12 16:54:11 -0800232 static Thread* Attach(const char* thread_name, bool as_daemon, jobject thread_group,
233 bool create_peer);
Andreas Gampe732b0ac2017-01-18 15:23:39 -0800234 // Attaches the calling native thread to the runtime, returning the new native peer.
235 static Thread* Attach(const char* thread_name, bool as_daemon, jobject thread_peer);
Carl Shapirob5573532011-07-12 18:22:59 -0700236
Brian Carlstromcaabb1b2011-10-11 18:09:13 -0700237 // Reset internal state of child thread after fork.
238 void InitAfterFork();
239
Ian Rogers6f3dbba2014-10-14 17:41:57 -0700240 // Get the currently executing thread, frequently referred to as 'self'. This call has reasonably
241 // high cost and so we favor passing self around when possible.
242 // TODO: mark as PURE so the compiler may coalesce and remove?
Ian Rogers02ed4c02013-09-06 13:10:04 -0700243 static Thread* Current();
Carl Shapiro0e5d75d2011-07-06 18:28:37 -0700244
Ian Rogers7b078e82014-09-10 14:44:24 -0700245 // On a runnable thread, check for pending thread suspension request and handle if pending.
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700246 void AllowThreadSuspension() REQUIRES_SHARED(Locks::mutator_lock_);
Ian Rogers7b078e82014-09-10 14:44:24 -0700247
248 // Process pending thread suspension request and handle if pending.
Vladimir Markoe45883e2022-01-11 12:38:35 +0000249 void CheckSuspend(bool implicit = false) REQUIRES_SHARED(Locks::mutator_lock_);
Ian Rogers7b078e82014-09-10 14:44:24 -0700250
Hiroshi Yamauchi30493242016-11-03 13:06:52 -0700251 // Process a pending empty checkpoint if pending.
Hiroshi Yamauchia2224042017-02-08 16:35:45 -0800252 void CheckEmptyCheckpointFromWeakRefAccess(BaseMutex* cond_var_mutex);
253 void CheckEmptyCheckpointFromMutex();
Hiroshi Yamauchi30493242016-11-03 13:06:52 -0700254
Mathieu Chartier2b7c4d12014-05-19 10:52:16 -0700255 static Thread* FromManagedThread(const ScopedObjectAccessAlreadyRunnable& ts,
Mathieu Chartierf5769e12017-01-10 15:54:41 -0800256 ObjPtr<mirror::Object> thread_peer)
Mathieu Chartier90443472015-07-16 20:32:27 -0700257 REQUIRES(Locks::thread_list_lock_, !Locks::thread_suspend_count_lock_)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700258 REQUIRES_SHARED(Locks::mutator_lock_);
Mathieu Chartier2b7c4d12014-05-19 10:52:16 -0700259 static Thread* FromManagedThread(const ScopedObjectAccessAlreadyRunnable& ts, jobject thread)
Mathieu Chartier90443472015-07-16 20:32:27 -0700260 REQUIRES(Locks::thread_list_lock_, !Locks::thread_suspend_count_lock_)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700261 REQUIRES_SHARED(Locks::mutator_lock_);
Elliott Hughes8daa0922011-09-11 13:46:25 -0700262
Elliott Hughes28fa76d2012-04-09 17:31:46 -0700263 // Translates 172 to pAllocArrayFromCode and so on.
Andreas Gampe542451c2016-07-26 09:02:02 -0700264 template<PointerSize size_of_pointers>
Ian Rogersdd7624d2014-03-14 17:43:00 -0700265 static void DumpThreadOffset(std::ostream& os, uint32_t offset);
Elliott Hughes28fa76d2012-04-09 17:31:46 -0700266
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700267 // Dumps a one-line summary of thread state (used for operator<<).
268 void ShortDump(std::ostream& os) const;
269
270 // Dumps the detailed thread state and the thread stack (used for SIGQUIT).
Nicolas Geoffraya73280d2016-02-15 13:05:16 +0000271 void Dump(std::ostream& os,
Nicolas Geoffray6ee49712018-03-30 14:39:05 +0000272 bool dump_native_stack = true,
Hiroshi Yamauchi13c16352017-01-31 10:15:08 -0800273 BacktraceMap* backtrace_map = nullptr,
274 bool force_dump_stack = false) const
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700275 REQUIRES_SHARED(Locks::mutator_lock_);
Elliott Hughesa0957642011-09-02 14:27:33 -0700276
Hiroshi Yamauchi02f365f2017-02-03 15:06:00 -0800277 void DumpJavaStack(std::ostream& os,
278 bool check_suspended = true,
279 bool dump_locks = true) const
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700280 REQUIRES_SHARED(Locks::mutator_lock_);
Mathieu Chartierc751fdc2014-03-30 15:25:44 -0700281
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700282 // Dumps the SIGQUIT per-thread header. 'thread' can be null for a non-attached thread, in which
Elliott Hughesabbe07d2012-06-05 17:42:23 -0700283 // case we use 'tid' to identify the thread, and we'll include as much information as we can.
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700284 static void DumpState(std::ostream& os, const Thread* thread, pid_t tid)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700285 REQUIRES_SHARED(Locks::mutator_lock_);
Elliott Hughesabbe07d2012-06-05 17:42:23 -0700286
Ian Rogers474b6da2012-09-25 00:20:38 -0700287 ThreadState GetState() const {
Vladimir Marko9c0f7642021-12-06 16:17:52 +0000288 return GetStateAndFlags(std::memory_order_relaxed).GetState();
Dave Allison0aded082013-11-07 13:15:11 -0800289 }
290
Ian Rogers474b6da2012-09-25 00:20:38 -0700291 ThreadState SetState(ThreadState new_state);
Ian Rogers52673ff2012-06-27 23:25:34 -0700292
Mathieu Chartier90443472015-07-16 20:32:27 -0700293 int GetSuspendCount() const REQUIRES(Locks::thread_suspend_count_lock_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700294 return tls32_.suspend_count;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700295 }
Elliott Hughes038a8062011-09-18 14:12:41 -0700296
Alex Light88fd7202017-06-30 08:31:59 -0700297 int GetUserCodeSuspendCount() const REQUIRES(Locks::thread_suspend_count_lock_,
298 Locks::user_code_suspension_lock_) {
299 return tls32_.user_code_suspend_count;
300 }
301
Mathieu Chartier858f1c52012-10-17 17:45:55 -0700302 bool IsSuspended() const {
Vladimir Marko9c0f7642021-12-06 16:17:52 +0000303 StateAndFlags state_and_flags = GetStateAndFlags(std::memory_order_relaxed);
Vladimir Markoddf4fd32021-11-22 16:31:57 +0000304 return state_and_flags.GetState() != ThreadState::kRunnable &&
305 state_and_flags.IsFlagSet(ThreadFlag::kSuspendRequest);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700306 }
307
Alex Light270db1c2019-12-03 12:20:01 +0000308 void DecrDefineClassCount() {
309 tls32_.define_class_counter--;
310 }
311
312 void IncrDefineClassCount() {
313 tls32_.define_class_counter++;
314 }
315 uint32_t GetDefineClassCount() const {
316 return tls32_.define_class_counter;
317 }
318
Hiroshi Yamauchi02e7f1a2016-10-03 15:32:01 -0700319 // If delta > 0 and (this != self or suspend_barrier is not null), this function may temporarily
320 // release thread_suspend_count_lock_ internally.
321 ALWAYS_INLINE
322 bool ModifySuspendCount(Thread* self,
323 int delta,
324 AtomicInteger* suspend_barrier,
Alex Light46f93402017-06-29 11:59:50 -0700325 SuspendReason reason)
Sebastien Hertz1c8f4ff2017-04-14 15:05:12 +0200326 WARN_UNUSED
Mathieu Chartier90443472015-07-16 20:32:27 -0700327 REQUIRES(Locks::thread_suspend_count_lock_);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700328
Hans Boehm891cb882020-07-31 12:06:58 -0700329 // Requests a checkpoint closure to run on another thread. The closure will be run when the
330 // thread notices the request, either in an explicit runtime CheckSuspend() call, or in a call
331 // originating from a compiler generated suspend point check. This returns true if the closure
332 // was added and will (eventually) be executed. It returns false otherwise.
Alex Light318afe62018-03-22 16:50:10 -0700333 //
Hans Boehm891cb882020-07-31 12:06:58 -0700334 // Since multiple closures can be queued and some closures can delay other threads from running,
335 // no closure should attempt to suspend another thread while running.
Alex Light318afe62018-03-22 16:50:10 -0700336 // TODO We should add some debug option that verifies this.
Hans Boehm891cb882020-07-31 12:06:58 -0700337 //
338 // This guarantees that the RequestCheckpoint invocation happens-before the function invocation:
339 // RequestCheckpointFunction holds thread_suspend_count_lock_, and RunCheckpointFunction
340 // acquires it.
Ian Rogersd9c4fc92013-10-01 19:45:43 -0700341 bool RequestCheckpoint(Closure* function)
Mathieu Chartier90443472015-07-16 20:32:27 -0700342 REQUIRES(Locks::thread_suspend_count_lock_);
Alex Lightb1e31a82017-10-04 16:57:36 -0700343
344 // RequestSynchronousCheckpoint releases the thread_list_lock_ as a part of its execution. This is
345 // due to the fact that Thread::Current() needs to go to sleep to allow the targeted thread to
Alex Light318afe62018-03-22 16:50:10 -0700346 // execute the checkpoint for us if it is Runnable. The suspend_state is the state that the thread
347 // will go into while it is awaiting the checkpoint to be run.
348 // NB Passing ThreadState::kRunnable may cause the current thread to wait in a condition variable
349 // while holding the mutator_lock_. Callers should ensure that this will not cause any problems
350 // for the closure or the rest of the system.
351 // NB Since multiple closures can be queued and some closures can delay other threads from running
352 // no closure should attempt to suspend another thread while running.
353 bool RequestSynchronousCheckpoint(Closure* function,
354 ThreadState suspend_state = ThreadState::kWaiting)
Andreas Gampe28c4a232017-06-21 21:21:31 -0700355 REQUIRES_SHARED(Locks::mutator_lock_)
Alex Lightb1e31a82017-10-04 16:57:36 -0700356 RELEASE(Locks::thread_list_lock_)
Andreas Gampe28c4a232017-06-21 21:21:31 -0700357 REQUIRES(!Locks::thread_suspend_count_lock_);
Alex Light318afe62018-03-22 16:50:10 -0700358
Hiroshi Yamauchi30493242016-11-03 13:06:52 -0700359 bool RequestEmptyCheckpoint()
360 REQUIRES(Locks::thread_suspend_count_lock_);
Mathieu Chartier858f1c52012-10-17 17:45:55 -0700361
Vladimir Marko9c0f7642021-12-06 16:17:52 +0000362 // Set the flip function. This is done with all threads suspended, except for the calling thread.
Hiroshi Yamauchi2cd334a2015-01-09 14:03:35 -0800363 void SetFlipFunction(Closure* function);
Vladimir Marko9c0f7642021-12-06 16:17:52 +0000364
365 // Ensure that thread flip function started running. If no other thread is executing
366 // it, the calling thread shall run the flip function and then notify other threads
367 // that have tried to do that concurrently. After this function returns, the
368 // `ThreadFlag::kPendingFlipFunction` is cleared but another thread may still
369 // run the flip function as indicated by the `ThreadFlag::kRunningFlipFunction`.
370 void EnsureFlipFunctionStarted(Thread* self) REQUIRES_SHARED(Locks::mutator_lock_);
371
372 // Wait for the flip function to complete if still running on another thread.
373 void WaitForFlipFunction(Thread* self) REQUIRES_SHARED(Locks::mutator_lock_);
Hiroshi Yamauchi2cd334a2015-01-09 14:03:35 -0800374
Hiroshi Yamauchi0b713572015-06-16 18:29:23 -0700375 gc::accounting::AtomicStack<mirror::Object>* GetThreadLocalMarkStack() {
376 CHECK(kUseReadBarrier);
377 return tlsPtr_.thread_local_mark_stack;
378 }
379 void SetThreadLocalMarkStack(gc::accounting::AtomicStack<mirror::Object>* stack) {
380 CHECK(kUseReadBarrier);
381 tlsPtr_.thread_local_mark_stack = stack;
382 }
383
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700384 // Called when thread detected that the thread_suspend_count_ was non-zero. Gives up share of
385 // mutator_lock_ and waits until it is resumed and thread_suspend_count_ is zero.
Vladimir Markoe45883e2022-01-11 12:38:35 +0000386 void FullSuspendCheck(bool implicit = false)
Mathieu Chartier90443472015-07-16 20:32:27 -0700387 REQUIRES(!Locks::thread_suspend_count_lock_)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700388 REQUIRES_SHARED(Locks::mutator_lock_);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700389
390 // Transition from non-runnable to runnable state acquiring share on mutator_lock_.
Mathieu Chartier8ac9c912015-10-01 15:58:41 -0700391 ALWAYS_INLINE ThreadState TransitionFromSuspendedToRunnable()
Mathieu Chartier90443472015-07-16 20:32:27 -0700392 REQUIRES(!Locks::thread_suspend_count_lock_)
Mathieu Chartier8ac9c912015-10-01 15:58:41 -0700393 SHARED_LOCK_FUNCTION(Locks::mutator_lock_);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700394
395 // Transition from runnable into a state where mutator privileges are denied. Releases share of
396 // mutator lock.
Mathieu Chartier8ac9c912015-10-01 15:58:41 -0700397 ALWAYS_INLINE void TransitionFromRunnableToSuspended(ThreadState new_state)
Mathieu Chartier4e2cb092015-07-22 16:17:51 -0700398 REQUIRES(!Locks::thread_suspend_count_lock_, !Roles::uninterruptible_)
Mathieu Chartier8ac9c912015-10-01 15:58:41 -0700399 UNLOCK_FUNCTION(Locks::mutator_lock_);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700400
Ian Rogers0399dde2012-06-06 17:09:28 -0700401 // Once called thread suspension will cause an assertion failure.
Mathieu Chartier4e2cb092015-07-22 16:17:51 -0700402 const char* StartAssertNoThreadSuspension(const char* cause) ACQUIRE(Roles::uninterruptible_) {
403 Roles::uninterruptible_.Acquire(); // No-op.
Mathieu Chartier590fee92013-09-13 13:46:47 -0700404 if (kIsDebugBuild) {
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700405 CHECK(cause != nullptr);
Ian Rogersdd7624d2014-03-14 17:43:00 -0700406 const char* previous_cause = tlsPtr_.last_no_thread_suspension_cause;
407 tls32_.no_thread_suspension++;
408 tlsPtr_.last_no_thread_suspension_cause = cause;
Mathieu Chartier590fee92013-09-13 13:46:47 -0700409 return previous_cause;
410 } else {
411 return nullptr;
412 }
Ian Rogers0399dde2012-06-06 17:09:28 -0700413 }
Ian Rogers52673ff2012-06-27 23:25:34 -0700414
Ian Rogers0399dde2012-06-06 17:09:28 -0700415 // End region where no thread suspension is expected.
Mathieu Chartier4e2cb092015-07-22 16:17:51 -0700416 void EndAssertNoThreadSuspension(const char* old_cause) RELEASE(Roles::uninterruptible_) {
Mathieu Chartier590fee92013-09-13 13:46:47 -0700417 if (kIsDebugBuild) {
Santiago Aboy Solanes6cdabe12022-02-18 15:27:43 +0000418 CHECK_IMPLIES(old_cause == nullptr, tls32_.no_thread_suspension == 1);
Ian Rogersdd7624d2014-03-14 17:43:00 -0700419 CHECK_GT(tls32_.no_thread_suspension, 0U);
420 tls32_.no_thread_suspension--;
421 tlsPtr_.last_no_thread_suspension_cause = old_cause;
Mathieu Chartier590fee92013-09-13 13:46:47 -0700422 }
Mathieu Chartier4e2cb092015-07-22 16:17:51 -0700423 Roles::uninterruptible_.Release(); // No-op.
Ian Rogers0399dde2012-06-06 17:09:28 -0700424 }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700425
Mathieu Chartierdc540df2019-11-15 17:11:44 -0800426 // End region where no thread suspension is expected. Returns the current open region in case we
427 // want to reopen it. Used for ScopedAllowThreadSuspension. Not supported if no_thread_suspension
428 // is larger than one.
429 const char* EndAssertNoThreadSuspension() RELEASE(Roles::uninterruptible_) WARN_UNUSED {
430 const char* ret = nullptr;
431 if (kIsDebugBuild) {
432 CHECK_EQ(tls32_.no_thread_suspension, 1u);
433 tls32_.no_thread_suspension--;
434 ret = tlsPtr_.last_no_thread_suspension_cause;
435 tlsPtr_.last_no_thread_suspension_cause = nullptr;
436 }
437 Roles::uninterruptible_.Release(); // No-op.
438 return ret;
439 }
440
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700441 void AssertThreadSuspensionIsAllowable(bool check_locks = true) const;
Ian Rogers0399dde2012-06-06 17:09:28 -0700442
Mathieu Chartier10b218d2016-07-25 17:48:52 -0700443 // Return true if thread suspension is allowable.
444 bool IsThreadSuspensionAllowable() const;
445
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700446 bool IsDaemon() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700447 return tls32_.daemon;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700448 }
449
Mathieu Chartier14c3bf92015-07-13 14:35:43 -0700450 size_t NumberOfHeldMutexes() const;
451
Mathieu Chartierf5769e12017-01-10 15:54:41 -0800452 bool HoldsLock(ObjPtr<mirror::Object> object) const REQUIRES_SHARED(Locks::mutator_lock_);
Elliott Hughes5f791332011-09-15 17:45:30 -0700453
Elliott Hughes8daa0922011-09-11 13:46:25 -0700454 /*
455 * Changes the priority of this thread to match that of the java.lang.Thread object.
456 *
457 * We map a priority value from 1-10 to Linux "nice" values, where lower
458 * numbers indicate higher priority.
459 */
460 void SetNativePriority(int newPriority);
461
462 /*
Nicolas Geoffrayfa595882019-08-06 17:40:09 +0100463 * Returns the priority of this thread by querying the system.
Elliott Hughes8daa0922011-09-11 13:46:25 -0700464 * This is useful when attaching a thread through JNI.
465 *
466 * Returns a value from 1 to 10 (compatible with java.lang.Thread values).
467 */
Nicolas Geoffrayfa595882019-08-06 17:40:09 +0100468 int GetNativePriority() const;
Elliott Hughes8daa0922011-09-11 13:46:25 -0700469
Mathieu Chartier61b3cd42016-04-18 11:43:29 -0700470 // Guaranteed to be non-zero.
Ian Rogersd9c4fc92013-10-01 19:45:43 -0700471 uint32_t GetThreadId() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700472 return tls32_.thin_lock_thread_id;
Carl Shapirob5573532011-07-12 18:22:59 -0700473 }
474
Elliott Hughesd92bec42011-09-02 17:04:36 -0700475 pid_t GetTid() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700476 return tls32_.tid;
Elliott Hughesd92bec42011-09-02 17:04:36 -0700477 }
Elliott Hughese27955c2011-08-26 15:21:24 -0700478
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700479 // Returns the java.lang.Thread's name, or null if this Thread* doesn't have a peer.
Vladimir Marko4617d582019-03-28 13:48:31 +0000480 ObjPtr<mirror::String> GetThreadName() const REQUIRES_SHARED(Locks::mutator_lock_);
Elliott Hughes899e7892012-01-24 14:57:32 -0800481
Elliott Hughesffb465f2012-03-01 18:46:05 -0800482 // Sets 'name' to the java.lang.Thread's name. This requires no transition to managed code,
483 // allocation, or locking.
484 void GetThreadName(std::string& name) const;
485
Elliott Hughes899e7892012-01-24 14:57:32 -0800486 // Sets the thread's name.
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700487 void SetThreadName(const char* name) REQUIRES_SHARED(Locks::mutator_lock_);
Elliott Hughesfc861622011-10-17 17:57:47 -0700488
Jeff Hao57dac6e2013-08-15 16:36:24 -0700489 // Returns the thread-specific CPU-time clock in microseconds or -1 if unavailable.
490 uint64_t GetCpuMicroTime() const;
491
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700492 mirror::Object* GetPeer() const REQUIRES_SHARED(Locks::mutator_lock_) {
Nicolas Geoffrayffc8cad2017-02-10 10:59:22 +0000493 DCHECK(Thread::Current() == this) << "Use GetPeerFromOtherThread instead";
Ian Rogersdd7624d2014-03-14 17:43:00 -0700494 CHECK(tlsPtr_.jpeer == nullptr);
495 return tlsPtr_.opeer;
Elliott Hughes8daa0922011-09-11 13:46:25 -0700496 }
Andreas Gampe202f85a2017-02-06 10:23:26 -0800497 // GetPeer is not safe if called on another thread in the middle of the CC thread flip and
498 // the thread's stack may have not been flipped yet and peer may be a from-space (stale) ref.
499 // This function will explicitly mark/forward it.
500 mirror::Object* GetPeerFromOtherThread() const REQUIRES_SHARED(Locks::mutator_lock_);
Elliott Hughes8daa0922011-09-11 13:46:25 -0700501
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700502 bool HasPeer() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700503 return tlsPtr_.jpeer != nullptr || tlsPtr_.opeer != nullptr;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700504 }
505
Elliott Hughes9d5ccec2011-09-19 13:19:50 -0700506 RuntimeStats* GetStats() {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700507 return &tls64_.stats;
Elliott Hughes9d5ccec2011-09-19 13:19:50 -0700508 }
509
Elliott Hughes7dc51662012-05-16 14:48:43 -0700510 bool IsStillStarting() const;
511
Carl Shapiro0e5d75d2011-07-06 18:28:37 -0700512 bool IsExceptionPending() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700513 return tlsPtr_.exception != nullptr;
Carl Shapiro0e5d75d2011-07-06 18:28:37 -0700514 }
515
Alex Light848574c2017-09-25 16:59:39 -0700516 bool IsAsyncExceptionPending() const {
517 return tlsPtr_.async_exception != nullptr;
518 }
519
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700520 mirror::Throwable* GetException() const REQUIRES_SHARED(Locks::mutator_lock_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700521 return tlsPtr_.exception;
Carl Shapiro0e5d75d2011-07-06 18:28:37 -0700522 }
523
Andreas Gamped9efea62014-07-21 22:56:08 -0700524 void AssertPendingException() const;
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700525 void AssertPendingOOMException() const REQUIRES_SHARED(Locks::mutator_lock_);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700526 void AssertNoPendingException() const;
Mathieu Chartier8d7672e2014-02-25 10:57:16 -0800527 void AssertNoPendingExceptionForNewException(const char* msg) const;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700528
Mathieu Chartier0795f232016-09-27 18:43:30 -0700529 void SetException(ObjPtr<mirror::Throwable> new_exception) REQUIRES_SHARED(Locks::mutator_lock_);
Ian Rogers0cfe1fb2011-08-26 03:29:44 -0700530
Alex Light848574c2017-09-25 16:59:39 -0700531 // Set an exception that is asynchronously thrown from a different thread. This will be checked
532 // periodically and might overwrite the current 'Exception'. This can only be called from a
533 // checkpoint.
534 //
535 // The caller should also make sure that the thread has been deoptimized so that the exception
536 // could be detected on back-edges.
537 void SetAsyncException(ObjPtr<mirror::Throwable> new_exception)
538 REQUIRES_SHARED(Locks::mutator_lock_);
539
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700540 void ClearException() REQUIRES_SHARED(Locks::mutator_lock_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700541 tlsPtr_.exception = nullptr;
jeffhao94d6df42012-11-26 16:02:12 -0800542 }
543
Alex Light848574c2017-09-25 16:59:39 -0700544 // Move the current async-exception to the main exception. This should be called when the current
545 // thread is ready to deal with any async exceptions. Returns true if there is an async exception
546 // that needs to be dealt with, false otherwise.
547 bool ObserveAsyncException() REQUIRES_SHARED(Locks::mutator_lock_);
548
Ian Rogersbdb03912011-09-14 00:55:44 -0700549 // Find catch block and perform long jump to appropriate exception handle
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700550 NO_RETURN void QuickDeliverException() REQUIRES_SHARED(Locks::mutator_lock_);
Ian Rogersbdb03912011-09-14 00:55:44 -0700551
552 Context* GetLongJumpContext();
Ian Rogers0399dde2012-06-06 17:09:28 -0700553 void ReleaseLongJumpContext(Context* context) {
Mingyao Yang4dcfc432015-04-21 16:55:22 -0700554 if (tlsPtr_.long_jump_context != nullptr) {
Andreas Gampee5d23982019-01-08 10:34:26 -0800555 ReleaseLongJumpContextInternal();
Mingyao Yang4dcfc432015-04-21 16:55:22 -0700556 }
Ian Rogersdd7624d2014-03-14 17:43:00 -0700557 tlsPtr_.long_jump_context = context;
Shih-wei Liao1a18c8c2011-08-14 17:47:36 -0700558 }
559
Andreas Gampe6ec8ebd2014-07-25 13:36:56 -0700560 // Get the current method and dex pc. If there are errors in retrieving the dex pc, this will
561 // abort the runtime iff abort_on_error is true.
Hiroshi Yamauchi02f365f2017-02-03 15:06:00 -0800562 ArtMethod* GetCurrentMethod(uint32_t* dex_pc,
563 bool check_suspended = true,
564 bool abort_on_error = true) const
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700565 REQUIRES_SHARED(Locks::mutator_lock_);
Ian Rogers0399dde2012-06-06 17:09:28 -0700566
Nicolas Geoffray7642cfc2015-02-26 10:56:09 +0000567 // Returns whether the given exception was thrown by the current Java method being executed
568 // (Note that this includes native Java methods).
Mathieu Chartierf5769e12017-01-10 15:54:41 -0800569 bool IsExceptionThrownByCurrentMethod(ObjPtr<mirror::Throwable> exception) const
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700570 REQUIRES_SHARED(Locks::mutator_lock_);
Nicolas Geoffray7642cfc2015-02-26 10:56:09 +0000571
Mathieu Chartiere401d142015-04-22 13:56:20 -0700572 void SetTopOfStack(ArtMethod** top_method) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700573 tlsPtr_.managed_stack.SetTopQuickFrame(top_method);
Carl Shapiro0e5d75d2011-07-06 18:28:37 -0700574 }
575
Vladimir Marko2196c652017-11-30 16:16:07 +0000576 void SetTopOfStackTagged(ArtMethod** top_method) {
577 tlsPtr_.managed_stack.SetTopQuickFrameTagged(top_method);
578 }
579
Jeff Hao11ffc2d2013-02-01 11:52:17 -0800580 void SetTopOfShadowStack(ShadowFrame* top) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700581 tlsPtr_.managed_stack.SetTopShadowFrame(top);
Jeff Hao11ffc2d2013-02-01 11:52:17 -0800582 }
583
Ian Rogers0399dde2012-06-06 17:09:28 -0700584 bool HasManagedStack() const {
Vladimir Marko2196c652017-11-30 16:16:07 +0000585 return tlsPtr_.managed_stack.HasTopQuickFrame() || tlsPtr_.managed_stack.HasTopShadowFrame();
Ian Rogersbdb03912011-09-14 00:55:44 -0700586 }
587
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700588 // If 'msg' is null, no detail message is set.
Nicolas Geoffray0aa50ce2015-03-10 11:03:29 +0000589 void ThrowNewException(const char* exception_class_descriptor, const char* msg)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700590 REQUIRES_SHARED(Locks::mutator_lock_) REQUIRES(!Roles::uninterruptible_);
Elliott Hughes5cb5ad22011-10-02 12:13:39 -0700591
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700592 // If 'msg' is null, no detail message is set. An exception must be pending, and will be
Elliott Hughesa4f94742012-05-29 16:28:38 -0700593 // used as the new exception's cause.
Nicolas Geoffray0aa50ce2015-03-10 11:03:29 +0000594 void ThrowNewWrappedException(const char* exception_class_descriptor, const char* msg)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700595 REQUIRES_SHARED(Locks::mutator_lock_) REQUIRES(!Roles::uninterruptible_);
Elliott Hughesa4f94742012-05-29 16:28:38 -0700596
Nicolas Geoffray0aa50ce2015-03-10 11:03:29 +0000597 void ThrowNewExceptionF(const char* exception_class_descriptor, const char* fmt, ...)
598 __attribute__((format(printf, 3, 4)))
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700599 REQUIRES_SHARED(Locks::mutator_lock_) REQUIRES(!Roles::uninterruptible_);
Elliott Hughesa5b897e2011-08-16 11:33:06 -0700600
Nicolas Geoffray0aa50ce2015-03-10 11:03:29 +0000601 void ThrowNewExceptionV(const char* exception_class_descriptor, const char* fmt, va_list ap)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700602 REQUIRES_SHARED(Locks::mutator_lock_) REQUIRES(!Roles::uninterruptible_);
Elliott Hughes4a2b4172011-09-20 17:08:25 -0700603
Elliott Hughes2ced6a52011-10-16 18:44:48 -0700604 // OutOfMemoryError is special, because we need to pre-allocate an instance.
Elliott Hughes8a8b9cb2012-04-13 18:29:22 -0700605 // Only the GC should call this.
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700606 void ThrowOutOfMemoryError(const char* msg) REQUIRES_SHARED(Locks::mutator_lock_)
Mathieu Chartiered8990a2015-07-23 14:11:16 -0700607 REQUIRES(!Roles::uninterruptible_);
Elliott Hughes79082e32011-08-25 12:07:32 -0700608
Elliott Hughesbe759c62011-09-08 19:38:21 -0700609 static void Startup();
Elliott Hughes038a8062011-09-18 14:12:41 -0700610 static void FinishStartup();
Elliott Hughesc1674ed2011-08-25 18:09:09 -0700611 static void Shutdown();
Carl Shapirob5573532011-07-12 18:22:59 -0700612
Andreas Gampe56776012018-01-26 17:40:55 -0800613 // Notify this thread's thread-group that this thread has started.
614 // Note: the given thread-group is used as a fast path and verified in debug build. If the value
615 // is null, the thread's thread-group is loaded from the peer.
616 void NotifyThreadGroup(ScopedObjectAccessAlreadyRunnable& soa, jobject thread_group = nullptr)
617 REQUIRES_SHARED(Locks::mutator_lock_);
618
Ian Rogersb033c752011-07-20 12:22:35 -0700619 // JNI methods
Elliott Hughes69f5bc62011-08-24 09:26:14 -0700620 JNIEnvExt* GetJniEnv() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700621 return tlsPtr_.jni_env;
Ian Rogersb033c752011-07-20 12:22:35 -0700622 }
623
Ian Rogers408f79a2011-08-23 18:22:33 -0700624 // Convert a jobject into a Object*
Mathieu Chartierc4f39252016-10-05 18:32:08 -0700625 ObjPtr<mirror::Object> DecodeJObject(jobject obj) const REQUIRES_SHARED(Locks::mutator_lock_);
Hiroshi Yamauchi04302db2015-11-11 23:45:34 -0800626 // Checks if the weak global ref has been cleared by the GC without decoding it.
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700627 bool IsJWeakCleared(jweak obj) const REQUIRES_SHARED(Locks::mutator_lock_);
Ian Rogersb033c752011-07-20 12:22:35 -0700628
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700629 mirror::Object* GetMonitorEnterObject() const REQUIRES_SHARED(Locks::mutator_lock_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700630 return tlsPtr_.monitor_enter_object;
631 }
632
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700633 void SetMonitorEnterObject(mirror::Object* obj) REQUIRES_SHARED(Locks::mutator_lock_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700634 tlsPtr_.monitor_enter_object = obj;
635 }
636
Elliott Hughes8daa0922011-09-11 13:46:25 -0700637 // Implements java.lang.Thread.interrupted.
Nicolas Geoffray365719c2017-03-08 13:11:50 +0000638 bool Interrupted();
Elliott Hughes8daa0922011-09-11 13:46:25 -0700639 // Implements java.lang.Thread.isInterrupted.
Nicolas Geoffray365719c2017-03-08 13:11:50 +0000640 bool IsInterrupted();
Andreas Gampe7fbc4a52018-11-28 08:26:47 -0800641 void Interrupt(Thread* self) REQUIRES(!wait_mutex_);
Nicolas Geoffray365719c2017-03-08 13:11:50 +0000642 void SetInterrupted(bool i) {
Orion Hodson88591fe2018-03-06 13:35:43 +0000643 tls32_.interrupted.store(i, std::memory_order_seq_cst);
Ian Rogersdd7624d2014-03-14 17:43:00 -0700644 }
Andreas Gampe7fbc4a52018-11-28 08:26:47 -0800645 void Notify() REQUIRES(!wait_mutex_);
Ian Rogersdd7624d2014-03-14 17:43:00 -0700646
Mathieu Chartier3f7f03c2016-09-26 11:39:52 -0700647 ALWAYS_INLINE void PoisonObjectPointers() {
648 ++poison_object_cookie_;
649 }
650
Mathieu Chartiera59d9b22016-09-26 18:13:17 -0700651 ALWAYS_INLINE static void PoisonObjectPointersIfDebug();
652
Mathieu Chartier3f7f03c2016-09-26 11:39:52 -0700653 ALWAYS_INLINE uintptr_t GetPoisonObjectCookie() const {
654 return poison_object_cookie_;
655 }
656
Charles Mungeraa31f492018-11-01 18:57:38 +0000657 // Parking for 0ns of relative time means an untimed park, negative (though
658 // should be handled in java code) returns immediately
659 void Park(bool is_absolute, int64_t time) REQUIRES_SHARED(Locks::mutator_lock_);
660 void Unpark();
661
Ian Rogersdd7624d2014-03-14 17:43:00 -0700662 private:
Mathieu Chartier90443472015-07-16 20:32:27 -0700663 void NotifyLocked(Thread* self) REQUIRES(wait_mutex_);
Ian Rogersdd7624d2014-03-14 17:43:00 -0700664
665 public:
666 Mutex* GetWaitMutex() const LOCK_RETURNED(wait_mutex_) {
667 return wait_mutex_;
668 }
669
Mathieu Chartier90443472015-07-16 20:32:27 -0700670 ConditionVariable* GetWaitConditionVariable() const REQUIRES(wait_mutex_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700671 return wait_cond_;
672 }
673
Mathieu Chartier90443472015-07-16 20:32:27 -0700674 Monitor* GetWaitMonitor() const REQUIRES(wait_mutex_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700675 return wait_monitor_;
676 }
677
Mathieu Chartier90443472015-07-16 20:32:27 -0700678 void SetWaitMonitor(Monitor* mon) REQUIRES(wait_mutex_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700679 wait_monitor_ = mon;
680 }
681
Ian Rogersdd7624d2014-03-14 17:43:00 -0700682 // Waiter link-list support.
683 Thread* GetWaitNext() const {
684 return tlsPtr_.wait_next;
685 }
686
687 void SetWaitNext(Thread* next) {
688 tlsPtr_.wait_next = next;
689 }
Elliott Hughes5f791332011-09-15 17:45:30 -0700690
Ian Rogers68d8b422014-07-17 11:09:10 -0700691 jobject GetClassLoaderOverride() {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700692 return tlsPtr_.class_loader_override;
buzbeec143c552011-08-20 17:38:58 -0700693 }
694
Ian Rogers68d8b422014-07-17 11:09:10 -0700695 void SetClassLoaderOverride(jobject class_loader_override);
buzbeec143c552011-08-20 17:38:58 -0700696
Ian Rogersaaa20802011-09-11 21:47:37 -0700697 // Create the internal representation of a stack trace, that is more time
Sebastien Hertzee1d79a2014-02-21 15:46:30 +0100698 // and space efficient to compute than the StackTraceElement[].
Mathieu Chartier2b7c4d12014-05-19 10:52:16 -0700699 jobject CreateInternalStackTrace(const ScopedObjectAccessAlreadyRunnable& soa) const
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700700 REQUIRES_SHARED(Locks::mutator_lock_);
Ian Rogersaaa20802011-09-11 21:47:37 -0700701
Elliott Hughes01158d72011-09-19 19:47:10 -0700702 // Convert an internal stack trace representation (returned by CreateInternalStackTrace) to a
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700703 // StackTraceElement[]. If output_array is null, a new array is created, otherwise as many
704 // frames as will fit are written into the given array. If stack_depth is non-null, it's updated
Elliott Hughes01158d72011-09-19 19:47:10 -0700705 // with the number of valid frames in the returned array.
Mathieu Chartier2b7c4d12014-05-19 10:52:16 -0700706 static jobjectArray InternalStackTraceToStackTraceElementArray(
707 const ScopedObjectAccessAlreadyRunnable& soa, jobject internal,
708 jobjectArray output_array = nullptr, int* stack_depth = nullptr)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700709 REQUIRES_SHARED(Locks::mutator_lock_);
Shih-wei Liao55df06b2011-08-26 14:39:27 -0700710
Andreas Gampefb6b0b12017-12-11 20:47:56 -0800711 jobjectArray CreateAnnotatedStackTrace(const ScopedObjectAccessAlreadyRunnable& soa) const
712 REQUIRES_SHARED(Locks::mutator_lock_);
713
Mingyao Yang99170c62015-07-06 11:10:37 -0700714 bool HasDebuggerShadowFrames() const {
715 return tlsPtr_.frame_id_to_shadow_frame != nullptr;
716 }
717
Andreas Gampe513061a2017-06-01 09:17:34 -0700718 void VisitRoots(RootVisitor* visitor, VisitRootFlags flags)
Andreas Gampe585da952016-12-02 14:52:29 -0800719 REQUIRES_SHARED(Locks::mutator_lock_);
Elliott Hughes410c0c82011-09-01 17:58:25 -0700720
Alex Light55eccdf2019-10-07 13:51:13 +0000721 void VisitReflectiveTargets(ReflectiveValueVisitor* visitor)
722 REQUIRES(Locks::mutator_lock_);
723
Andreas Gampeb486a982017-06-01 13:45:54 -0700724 void VerifyStack() REQUIRES_SHARED(Locks::mutator_lock_) {
725 if (kVerifyStack) {
726 VerifyStackImpl();
727 }
728 }
jeffhao25045522012-03-13 19:34:37 -0700729
Elliott Hughesbe759c62011-09-08 19:38:21 -0700730 //
731 // Offsets of various members of native Thread class, used by compiled code.
732 //
733
Andreas Gampe542451c2016-07-26 09:02:02 -0700734 template<PointerSize pointer_size>
David Srbecky56de89a2018-10-01 15:32:20 +0100735 static constexpr ThreadOffset<pointer_size> ThinLockIdOffset() {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700736 return ThreadOffset<pointer_size>(
737 OFFSETOF_MEMBER(Thread, tls32_) +
738 OFFSETOF_MEMBER(tls_32bit_sized_values, thin_lock_thread_id));
Elliott Hughesbe759c62011-09-08 19:38:21 -0700739 }
740
Andreas Gampe542451c2016-07-26 09:02:02 -0700741 template<PointerSize pointer_size>
David Srbecky56de89a2018-10-01 15:32:20 +0100742 static constexpr ThreadOffset<pointer_size> InterruptedOffset() {
Nicolas Geoffray365719c2017-03-08 13:11:50 +0000743 return ThreadOffset<pointer_size>(
744 OFFSETOF_MEMBER(Thread, tls32_) +
745 OFFSETOF_MEMBER(tls_32bit_sized_values, interrupted));
746 }
747
748 template<PointerSize pointer_size>
Vladimir Marko01b65522020-10-28 15:43:54 +0000749 static constexpr ThreadOffset<pointer_size> WeakRefAccessEnabledOffset() {
750 return ThreadOffset<pointer_size>(
751 OFFSETOF_MEMBER(Thread, tls32_) +
752 OFFSETOF_MEMBER(tls_32bit_sized_values, weak_ref_access_enabled));
753 }
754
755 template<PointerSize pointer_size>
David Srbecky56de89a2018-10-01 15:32:20 +0100756 static constexpr ThreadOffset<pointer_size> ThreadFlagsOffset() {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700757 return ThreadOffset<pointer_size>(
758 OFFSETOF_MEMBER(Thread, tls32_) +
759 OFFSETOF_MEMBER(tls_32bit_sized_values, state_and_flags));
Elliott Hughesbe759c62011-09-08 19:38:21 -0700760 }
761
Andreas Gampe542451c2016-07-26 09:02:02 -0700762 template<PointerSize pointer_size>
David Srbecky56de89a2018-10-01 15:32:20 +0100763 static constexpr ThreadOffset<pointer_size> IsGcMarkingOffset() {
Roland Levillain7c1559a2015-12-15 10:55:36 +0000764 return ThreadOffset<pointer_size>(
765 OFFSETOF_MEMBER(Thread, tls32_) +
766 OFFSETOF_MEMBER(tls_32bit_sized_values, is_gc_marking));
767 }
768
Igor Murashkinae7ff922016-10-06 14:59:19 -0700769 static constexpr size_t IsGcMarkingSize() {
770 return sizeof(tls32_.is_gc_marking);
771 }
772
Nicolas Geoffrayf9ae8e32022-02-15 22:54:11 +0000773 template<PointerSize pointer_size>
774 static constexpr ThreadOffset<pointer_size> SharedMethodHotnessOffset() {
775 return ThreadOffset<pointer_size>(
776 OFFSETOF_MEMBER(Thread, tls32_) +
777 OFFSETOF_MEMBER(tls_32bit_sized_values, shared_method_hotness));
778 }
779
Nicolas Geoffrayb331feb2016-02-05 16:51:53 +0000780 // Deoptimize the Java stack.
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700781 void DeoptimizeWithDeoptimizationException(JValue* result) REQUIRES_SHARED(Locks::mutator_lock_);
Nicolas Geoffrayb331feb2016-02-05 16:51:53 +0000782
Ian Rogersdd7624d2014-03-14 17:43:00 -0700783 private:
Andreas Gampe542451c2016-07-26 09:02:02 -0700784 template<PointerSize pointer_size>
David Srbecky56de89a2018-10-01 15:32:20 +0100785 static constexpr ThreadOffset<pointer_size> ThreadOffsetFromTlsPtr(size_t tls_ptr_offset) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700786 size_t base = OFFSETOF_MEMBER(Thread, tlsPtr_);
David Srbecky56de89a2018-10-01 15:32:20 +0100787 size_t scale = (pointer_size > kRuntimePointerSize) ?
788 static_cast<size_t>(pointer_size) / static_cast<size_t>(kRuntimePointerSize) : 1;
789 size_t shrink = (kRuntimePointerSize > pointer_size) ?
790 static_cast<size_t>(kRuntimePointerSize) / static_cast<size_t>(pointer_size) : 1;
Ian Rogersdd7624d2014-03-14 17:43:00 -0700791 return ThreadOffset<pointer_size>(base + ((tls_ptr_offset * scale) / shrink));
Ian Rogers07ec8e12012-12-01 01:26:51 -0800792 }
793
Ian Rogersdd7624d2014-03-14 17:43:00 -0700794 public:
Nicolas Geoffraya00b54b2019-12-03 14:36:42 +0000795 template<PointerSize pointer_size>
796 static constexpr ThreadOffset<pointer_size> QuickEntryPointOffset(
797 size_t quick_entrypoint_offset) {
798 return ThreadOffsetFromTlsPtr<pointer_size>(
799 OFFSETOF_MEMBER(tls_ptr_sized_values, quick_entrypoints) + quick_entrypoint_offset);
800 }
801
802 static constexpr uint32_t QuickEntryPointOffsetWithSize(size_t quick_entrypoint_offset,
Nicolas Geoffraye3f775b2019-12-04 14:41:52 +0000803 PointerSize pointer_size) {
Andreas Gampe542451c2016-07-26 09:02:02 -0700804 if (pointer_size == PointerSize::k32) {
805 return QuickEntryPointOffset<PointerSize::k32>(quick_entrypoint_offset).
806 Uint32Value();
Jeff Hao848f70a2014-01-15 13:49:50 -0800807 } else {
Andreas Gampe542451c2016-07-26 09:02:02 -0700808 return QuickEntryPointOffset<PointerSize::k64>(quick_entrypoint_offset).
809 Uint32Value();
Jeff Hao848f70a2014-01-15 13:49:50 -0800810 }
811 }
812
Andreas Gampe542451c2016-07-26 09:02:02 -0700813 template<PointerSize pointer_size>
Ian Rogersdd7624d2014-03-14 17:43:00 -0700814 static ThreadOffset<pointer_size> JniEntryPointOffset(size_t jni_entrypoint_offset) {
815 return ThreadOffsetFromTlsPtr<pointer_size>(
816 OFFSETOF_MEMBER(tls_ptr_sized_values, jni_entrypoints) + jni_entrypoint_offset);
Elliott Hughesbe759c62011-09-08 19:38:21 -0700817 }
818
Roland Levillain97c46462017-05-11 14:04:03 +0100819 // Return the entry point offset integer value for ReadBarrierMarkRegX, where X is `reg`.
820 template <PointerSize pointer_size>
Nicolas Geoffraya00b54b2019-12-03 14:36:42 +0000821 static constexpr int32_t ReadBarrierMarkEntryPointsOffset(size_t reg) {
Roland Levillain97c46462017-05-11 14:04:03 +0100822 // The entry point list defines 30 ReadBarrierMarkRegX entry points.
823 DCHECK_LT(reg, 30u);
824 // The ReadBarrierMarkRegX entry points are ordered by increasing
825 // register number in Thread::tls_Ptr_.quick_entrypoints.
826 return QUICK_ENTRYPOINT_OFFSET(pointer_size, pReadBarrierMarkReg00).Int32Value()
827 + static_cast<size_t>(pointer_size) * reg;
828 }
829
Andreas Gampe542451c2016-07-26 09:02:02 -0700830 template<PointerSize pointer_size>
David Srbecky56de89a2018-10-01 15:32:20 +0100831 static constexpr ThreadOffset<pointer_size> SelfOffset() {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700832 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values, self));
833 }
834
Andreas Gampe542451c2016-07-26 09:02:02 -0700835 template<PointerSize pointer_size>
David Srbecky56de89a2018-10-01 15:32:20 +0100836 static constexpr ThreadOffset<pointer_size> ExceptionOffset() {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700837 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values, exception));
838 }
839
Andreas Gampe542451c2016-07-26 09:02:02 -0700840 template<PointerSize pointer_size>
David Srbecky56de89a2018-10-01 15:32:20 +0100841 static constexpr ThreadOffset<pointer_size> PeerOffset() {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700842 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values, opeer));
843 }
844
845
Andreas Gampe542451c2016-07-26 09:02:02 -0700846 template<PointerSize pointer_size>
David Srbecky56de89a2018-10-01 15:32:20 +0100847 static constexpr ThreadOffset<pointer_size> CardTableOffset() {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700848 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values, card_table));
849 }
850
Andreas Gampe542451c2016-07-26 09:02:02 -0700851 template<PointerSize pointer_size>
David Srbecky56de89a2018-10-01 15:32:20 +0100852 static constexpr ThreadOffset<pointer_size> ThreadSuspendTriggerOffset() {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700853 return ThreadOffsetFromTlsPtr<pointer_size>(
854 OFFSETOF_MEMBER(tls_ptr_sized_values, suspend_trigger));
Dave Allisonb373e092014-02-20 16:06:36 -0800855 }
856
Andreas Gampe542451c2016-07-26 09:02:02 -0700857 template<PointerSize pointer_size>
David Srbecky56de89a2018-10-01 15:32:20 +0100858 static constexpr ThreadOffset<pointer_size> ThreadLocalPosOffset() {
Andreas Gampe542451c2016-07-26 09:02:02 -0700859 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values,
860 thread_local_pos));
Hiroshi Yamauchie01a5202015-03-19 12:35:04 -0700861 }
862
Andreas Gampe542451c2016-07-26 09:02:02 -0700863 template<PointerSize pointer_size>
David Srbecky56de89a2018-10-01 15:32:20 +0100864 static constexpr ThreadOffset<pointer_size> ThreadLocalEndOffset() {
Andreas Gampe542451c2016-07-26 09:02:02 -0700865 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values,
866 thread_local_end));
Hiroshi Yamauchie01a5202015-03-19 12:35:04 -0700867 }
868
Andreas Gampe542451c2016-07-26 09:02:02 -0700869 template<PointerSize pointer_size>
David Srbecky56de89a2018-10-01 15:32:20 +0100870 static constexpr ThreadOffset<pointer_size> ThreadLocalObjectsOffset() {
Andreas Gampe542451c2016-07-26 09:02:02 -0700871 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values,
872 thread_local_objects));
Hiroshi Yamauchie01a5202015-03-19 12:35:04 -0700873 }
874
Andreas Gampe542451c2016-07-26 09:02:02 -0700875 template<PointerSize pointer_size>
David Srbecky56de89a2018-10-01 15:32:20 +0100876 static constexpr ThreadOffset<pointer_size> RosAllocRunsOffset() {
Hiroshi Yamauchidc412b62015-10-15 12:26:57 -0700877 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values,
878 rosalloc_runs));
879 }
880
Andreas Gampe542451c2016-07-26 09:02:02 -0700881 template<PointerSize pointer_size>
David Srbecky56de89a2018-10-01 15:32:20 +0100882 static constexpr ThreadOffset<pointer_size> ThreadLocalAllocStackTopOffset() {
Hiroshi Yamauchidc412b62015-10-15 12:26:57 -0700883 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values,
884 thread_local_alloc_stack_top));
885 }
886
Andreas Gampe542451c2016-07-26 09:02:02 -0700887 template<PointerSize pointer_size>
David Srbecky56de89a2018-10-01 15:32:20 +0100888 static constexpr ThreadOffset<pointer_size> ThreadLocalAllocStackEndOffset() {
Hiroshi Yamauchidc412b62015-10-15 12:26:57 -0700889 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values,
890 thread_local_alloc_stack_end));
891 }
892
Ian Rogers932746a2011-09-22 18:57:50 -0700893 // Size of stack less any space reserved for stack overflow
jeffhaod7521322012-11-21 15:38:24 -0800894 size_t GetStackSize() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700895 return tlsPtr_.stack_size - (tlsPtr_.stack_end - tlsPtr_.stack_begin);
Ian Rogers932746a2011-09-22 18:57:50 -0700896 }
897
Andreas Gampe639b2b12019-01-08 10:32:50 -0800898 ALWAYS_INLINE uint8_t* GetStackEndForInterpreter(bool implicit_overflow_check) const;
Nicolas Geoffray535a3fb2014-07-22 15:17:38 +0100899
Ian Rogers13735952014-10-08 12:43:28 -0700900 uint8_t* GetStackEnd() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700901 return tlsPtr_.stack_end;
jeffhaod7521322012-11-21 15:38:24 -0800902 }
903
Ian Rogers932746a2011-09-22 18:57:50 -0700904 // Set the stack end to that to be used during a stack overflow
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700905 void SetStackEndForStackOverflow() REQUIRES_SHARED(Locks::mutator_lock_);
Ian Rogers932746a2011-09-22 18:57:50 -0700906
907 // Set the stack end to that to be used during regular execution
Andreas Gampe639b2b12019-01-08 10:32:50 -0800908 ALWAYS_INLINE void ResetDefaultStackEnd();
Ian Rogers932746a2011-09-22 18:57:50 -0700909
Ian Rogers120f1c72012-09-28 17:17:10 -0700910 bool IsHandlingStackOverflow() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700911 return tlsPtr_.stack_end == tlsPtr_.stack_begin;
Ian Rogers120f1c72012-09-28 17:17:10 -0700912 }
913
Andreas Gampe542451c2016-07-26 09:02:02 -0700914 template<PointerSize pointer_size>
David Srbecky56de89a2018-10-01 15:32:20 +0100915 static constexpr ThreadOffset<pointer_size> StackEndOffset() {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700916 return ThreadOffsetFromTlsPtr<pointer_size>(
917 OFFSETOF_MEMBER(tls_ptr_sized_values, stack_end));
Elliott Hughesbe759c62011-09-08 19:38:21 -0700918 }
919
Andreas Gampe542451c2016-07-26 09:02:02 -0700920 template<PointerSize pointer_size>
David Srbecky56de89a2018-10-01 15:32:20 +0100921 static constexpr ThreadOffset<pointer_size> JniEnvOffset() {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700922 return ThreadOffsetFromTlsPtr<pointer_size>(
923 OFFSETOF_MEMBER(tls_ptr_sized_values, jni_env));
Elliott Hughesbe759c62011-09-08 19:38:21 -0700924 }
925
Andreas Gampe542451c2016-07-26 09:02:02 -0700926 template<PointerSize pointer_size>
David Srbecky56de89a2018-10-01 15:32:20 +0100927 static constexpr ThreadOffset<pointer_size> TopOfManagedStackOffset() {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700928 return ThreadOffsetFromTlsPtr<pointer_size>(
929 OFFSETOF_MEMBER(tls_ptr_sized_values, managed_stack) +
Vladimir Marko2196c652017-11-30 16:16:07 +0000930 ManagedStack::TaggedTopQuickFrameOffset());
Elliott Hughesbe759c62011-09-08 19:38:21 -0700931 }
932
Ian Rogers0399dde2012-06-06 17:09:28 -0700933 const ManagedStack* GetManagedStack() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700934 return &tlsPtr_.managed_stack;
Ian Rogers0399dde2012-06-06 17:09:28 -0700935 }
936
937 // Linked list recording fragments of managed stack.
938 void PushManagedStackFragment(ManagedStack* fragment) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700939 tlsPtr_.managed_stack.PushManagedStackFragment(fragment);
Ian Rogers0399dde2012-06-06 17:09:28 -0700940 }
941 void PopManagedStackFragment(const ManagedStack& fragment) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700942 tlsPtr_.managed_stack.PopManagedStackFragment(fragment);
Ian Rogers0399dde2012-06-06 17:09:28 -0700943 }
944
Andreas Gampe513061a2017-06-01 09:17:34 -0700945 ALWAYS_INLINE ShadowFrame* PushShadowFrame(ShadowFrame* new_top_frame);
946 ALWAYS_INLINE ShadowFrame* PopShadowFrame();
Logan Chienf7ad17e2012-03-15 03:10:03 +0800947
Andreas Gampe542451c2016-07-26 09:02:02 -0700948 template<PointerSize pointer_size>
David Srbecky56de89a2018-10-01 15:32:20 +0100949 static constexpr ThreadOffset<pointer_size> TopShadowFrameOffset() {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700950 return ThreadOffsetFromTlsPtr<pointer_size>(
951 OFFSETOF_MEMBER(tls_ptr_sized_values, managed_stack) +
952 ManagedStack::TopShadowFrameOffset());
TDYa127d668a062012-04-13 12:36:57 -0700953 }
954
Vladimir Markocedec9d2021-02-08 16:16:13 +0000955 // Is the given obj in one of this thread's JNI transition frames?
956 bool IsJniTransitionReference(jobject obj) const REQUIRES_SHARED(Locks::mutator_lock_);
Ian Rogers0399dde2012-06-06 17:09:28 -0700957
Eric Holkf1e1dd12020-08-21 15:38:12 -0700958 void HandleScopeVisitRoots(RootVisitor* visitor, uint32_t thread_id)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700959 REQUIRES_SHARED(Locks::mutator_lock_);
Ian Rogers0399dde2012-06-06 17:09:28 -0700960
Vladimir Marko1d326f92021-06-01 09:26:55 +0100961 BaseHandleScope* GetTopHandleScope() REQUIRES_SHARED(Locks::mutator_lock_) {
Mathieu Chartiereb8167a2014-05-07 15:43:14 -0700962 return tlsPtr_.top_handle_scope;
Ian Rogers1f539342012-10-03 21:09:42 -0700963 }
964
Vladimir Marko1d326f92021-06-01 09:26:55 +0100965 void PushHandleScope(BaseHandleScope* handle_scope) REQUIRES_SHARED(Locks::mutator_lock_) {
Ian Rogers59c07062014-10-10 13:03:39 -0700966 DCHECK_EQ(handle_scope->GetLink(), tlsPtr_.top_handle_scope);
Mathieu Chartiereb8167a2014-05-07 15:43:14 -0700967 tlsPtr_.top_handle_scope = handle_scope;
968 }
969
Vladimir Marko1d326f92021-06-01 09:26:55 +0100970 BaseHandleScope* PopHandleScope() REQUIRES_SHARED(Locks::mutator_lock_) {
Mathieu Chartiere8a3c572016-10-11 16:52:17 -0700971 BaseHandleScope* handle_scope = tlsPtr_.top_handle_scope;
Mathieu Chartiereb8167a2014-05-07 15:43:14 -0700972 DCHECK(handle_scope != nullptr);
973 tlsPtr_.top_handle_scope = tlsPtr_.top_handle_scope->GetLink();
974 return handle_scope;
Ian Rogers1f539342012-10-03 21:09:42 -0700975 }
Brian Carlstrom40381fb2011-10-19 14:13:40 -0700976
Andreas Gampe542451c2016-07-26 09:02:02 -0700977 template<PointerSize pointer_size>
David Srbecky56de89a2018-10-01 15:32:20 +0100978 static constexpr ThreadOffset<pointer_size> TopHandleScopeOffset() {
Mathieu Chartiereb8167a2014-05-07 15:43:14 -0700979 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values,
980 top_handle_scope));
Elliott Hughesbe759c62011-09-08 19:38:21 -0700981 }
982
Vladimir Markoce2a3442021-11-24 15:10:26 +0000983 template<PointerSize pointer_size>
Vladimir Markoe74e0ce2021-12-08 14:16:21 +0000984 static constexpr ThreadOffset<pointer_size> MutatorLockOffset() {
985 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values,
986 mutator_lock));
987 }
988
989 template<PointerSize pointer_size>
Vladimir Markoce2a3442021-11-24 15:10:26 +0000990 static constexpr ThreadOffset<pointer_size> HeldMutexOffset(LockLevel level) {
991 DCHECK_LT(enum_cast<size_t>(level), arraysize(tlsPtr_.held_mutexes));
992 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values,
993 held_mutexes[level]));
994 }
995
Alex Light55eccdf2019-10-07 13:51:13 +0000996 BaseReflectiveHandleScope* GetTopReflectiveHandleScope() {
997 return tlsPtr_.top_reflective_handle_scope;
998 }
999
1000 void PushReflectiveHandleScope(BaseReflectiveHandleScope* scope) {
1001 DCHECK_EQ(scope->GetLink(), tlsPtr_.top_reflective_handle_scope);
1002 DCHECK_EQ(scope->GetThread(), this);
1003 tlsPtr_.top_reflective_handle_scope = scope;
1004 }
1005
1006 BaseReflectiveHandleScope* PopReflectiveHandleScope() {
1007 BaseReflectiveHandleScope* handle_scope = tlsPtr_.top_reflective_handle_scope;
1008 DCHECK(handle_scope != nullptr);
1009 tlsPtr_.top_reflective_handle_scope = tlsPtr_.top_reflective_handle_scope->GetLink();
1010 return handle_scope;
1011 }
1012
Hiroshi Yamauchi00370822015-08-18 14:47:25 -07001013 bool GetIsGcMarking() const {
1014 CHECK(kUseReadBarrier);
1015 return tls32_.is_gc_marking;
1016 }
1017
Mathieu Chartierfe814e82016-11-09 14:32:49 -08001018 void SetIsGcMarkingAndUpdateEntrypoints(bool is_marking);
Hiroshi Yamauchi00370822015-08-18 14:47:25 -07001019
Hans Boehm1b3ec0f2022-01-26 16:53:07 +00001020 bool GetWeakRefAccessEnabled() const; // Only safe for current thread.
Hiroshi Yamauchi0b713572015-06-16 18:29:23 -07001021
1022 void SetWeakRefAccessEnabled(bool enabled) {
1023 CHECK(kUseReadBarrier);
Hans Boehm1b3ec0f2022-01-26 16:53:07 +00001024 WeakRefAccessState new_state = enabled ?
1025 WeakRefAccessState::kEnabled : WeakRefAccessState::kDisabled;
1026 tls32_.weak_ref_access_enabled.store(new_state, std::memory_order_release);
Hiroshi Yamauchi0b713572015-06-16 18:29:23 -07001027 }
1028
Hiroshi Yamauchi20a0be02016-02-19 15:44:06 -08001029 uint32_t GetDisableThreadFlipCount() const {
1030 CHECK(kUseReadBarrier);
1031 return tls32_.disable_thread_flip_count;
1032 }
1033
1034 void IncrementDisableThreadFlipCount() {
1035 CHECK(kUseReadBarrier);
1036 ++tls32_.disable_thread_flip_count;
1037 }
1038
1039 void DecrementDisableThreadFlipCount() {
1040 CHECK(kUseReadBarrier);
1041 DCHECK_GT(tls32_.disable_thread_flip_count, 0U);
1042 --tls32_.disable_thread_flip_count;
1043 }
1044
Alex Light185a4612018-10-04 15:54:25 -07001045 // Returns true if the thread is a runtime thread (eg from a ThreadPool).
Alex Lighte9f61032018-09-24 16:04:51 -07001046 bool IsRuntimeThread() const {
1047 return is_runtime_thread_;
Calin Juravleccd56952016-12-15 17:57:38 +00001048 }
1049
Alex Lighte9f61032018-09-24 16:04:51 -07001050 void SetIsRuntimeThread(bool is_runtime_thread) {
1051 is_runtime_thread_ = is_runtime_thread;
Calin Juravleccd56952016-12-15 17:57:38 +00001052 }
1053
Orion Hodson01ecfa12019-07-18 12:57:47 +01001054 uint32_t CorePlatformApiCookie() {
1055 return core_platform_api_cookie_;
1056 }
1057
1058 void SetCorePlatformApiCookie(uint32_t cookie) {
1059 core_platform_api_cookie_ = cookie;
1060 }
1061
Alex Lighte9f61032018-09-24 16:04:51 -07001062 // Returns true if the thread is allowed to load java classes.
1063 bool CanLoadClasses() const;
1064
Sebastien Hertzfd3077e2014-04-23 10:32:43 +02001065 // Returns the fake exception used to activate deoptimization.
1066 static mirror::Throwable* GetDeoptimizationException() {
Mathieu Chartier0795f232016-09-27 18:43:30 -07001067 // Note that the mirror::Throwable must be aligned to kObjectAlignment or else it cannot be
1068 // represented by ObjPtr.
1069 return reinterpret_cast<mirror::Throwable*>(0x100);
Sebastien Hertzfd3077e2014-04-23 10:32:43 +02001070 }
1071
Mingyao Yang1f2d3ba2015-05-18 12:12:50 -07001072 // Currently deoptimization invokes verifier which can trigger class loading
1073 // and execute Java code, so there might be nested deoptimizations happening.
1074 // We need to save the ongoing deoptimization shadow frames and return
1075 // values on stacks.
Nicolas Geoffray73be1e82015-09-17 15:22:56 +01001076 // 'from_code' denotes whether the deoptimization was explicitly made from
1077 // compiled code.
Mingyao Yang2ee17902017-08-30 11:37:08 -07001078 // 'method_type' contains info on whether deoptimization should advance
1079 // dex_pc.
Nicolas Geoffray73be1e82015-09-17 15:22:56 +01001080 void PushDeoptimizationContext(const JValue& return_value,
1081 bool is_reference,
Mingyao Yang2ee17902017-08-30 11:37:08 -07001082 ObjPtr<mirror::Throwable> exception,
Nicolas Geoffray73be1e82015-09-17 15:22:56 +01001083 bool from_code,
Mingyao Yang2ee17902017-08-30 11:37:08 -07001084 DeoptimizationMethodType method_type)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -07001085 REQUIRES_SHARED(Locks::mutator_lock_);
Mathieu Chartierf5769e12017-01-10 15:54:41 -08001086 void PopDeoptimizationContext(JValue* result,
1087 ObjPtr<mirror::Throwable>* exception,
Mingyao Yang2ee17902017-08-30 11:37:08 -07001088 bool* from_code,
1089 DeoptimizationMethodType* method_type)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -07001090 REQUIRES_SHARED(Locks::mutator_lock_);
Sebastien Hertz07474662015-08-25 15:12:33 +00001091 void AssertHasDeoptimizationContext()
Andreas Gampebdf7f1c2016-08-30 16:38:47 -07001092 REQUIRES_SHARED(Locks::mutator_lock_);
Mingyao Yang1f2d3ba2015-05-18 12:12:50 -07001093 void PushStackedShadowFrame(ShadowFrame* sf, StackedShadowFrameType type);
Andreas Gampe639bdd12015-06-03 11:22:45 -07001094 ShadowFrame* PopStackedShadowFrame(StackedShadowFrameType type, bool must_be_present = true);
Andreas Gampe2a0d4ec2014-06-02 22:05:22 -07001095
Mingyao Yang99170c62015-07-06 11:10:37 -07001096 // For debugger, find the shadow frame that corresponds to a frame id.
1097 // Or return null if there is none.
1098 ShadowFrame* FindDebuggerShadowFrame(size_t frame_id)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -07001099 REQUIRES_SHARED(Locks::mutator_lock_);
Mingyao Yang99170c62015-07-06 11:10:37 -07001100 // For debugger, find the bool array that keeps track of the updated vreg set
1101 // for a frame id.
Andreas Gampebdf7f1c2016-08-30 16:38:47 -07001102 bool* GetUpdatedVRegFlags(size_t frame_id) REQUIRES_SHARED(Locks::mutator_lock_);
Mingyao Yang99170c62015-07-06 11:10:37 -07001103 // For debugger, find the shadow frame that corresponds to a frame id. If
1104 // one doesn't exist yet, create one and track it in frame_id_to_shadow_frame.
1105 ShadowFrame* FindOrCreateDebuggerShadowFrame(size_t frame_id,
1106 uint32_t num_vregs,
1107 ArtMethod* method,
1108 uint32_t dex_pc)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -07001109 REQUIRES_SHARED(Locks::mutator_lock_);
Mingyao Yang99170c62015-07-06 11:10:37 -07001110
1111 // Delete the entry that maps from frame_id to shadow_frame.
1112 void RemoveDebuggerShadowFrameMapping(size_t frame_id)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -07001113 REQUIRES_SHARED(Locks::mutator_lock_);
Mingyao Yang99170c62015-07-06 11:10:37 -07001114
Nicolas Geoffraye91e7952020-01-23 10:15:56 +00001115 // While getting this map requires shared the mutator lock, manipulating it
1116 // should actually follow these rules:
1117 // (1) The owner of this map (the thread) can change it with its mutator lock.
1118 // (2) Other threads can read this map when the owner is suspended and they
1119 // hold the mutator lock.
1120 // (3) Other threads can change this map when owning the mutator lock exclusively.
1121 //
1122 // The reason why (3) needs the mutator lock exclusively (and not just having
1123 // the owner suspended) is that we don't want other threads to concurrently read the map.
1124 //
1125 // TODO: Add a class abstraction to express these rules.
1126 std::map<uintptr_t, instrumentation::InstrumentationStackFrame>* GetInstrumentationStack()
1127 REQUIRES_SHARED(Locks::mutator_lock_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -07001128 return tlsPtr_.instrumentation_stack;
jeffhaoe343b762011-12-05 16:36:44 -08001129 }
1130
Mathieu Chartiere401d142015-04-22 13:56:20 -07001131 std::vector<ArtMethod*>* GetStackTraceSample() const {
Andreas Gampe2c19f5b2016-11-28 08:10:18 -08001132 DCHECK(!IsAotCompiler());
Nicolas Geoffray340dafa2016-11-18 16:03:10 +00001133 return tlsPtr_.deps_or_stack_trace_sample.stack_trace_sample;
Jeff Hao5ce4b172013-08-16 16:27:18 -07001134 }
1135
Mathieu Chartiere401d142015-04-22 13:56:20 -07001136 void SetStackTraceSample(std::vector<ArtMethod*>* sample) {
Andreas Gampe2c19f5b2016-11-28 08:10:18 -08001137 DCHECK(!IsAotCompiler());
Nicolas Geoffray340dafa2016-11-18 16:03:10 +00001138 tlsPtr_.deps_or_stack_trace_sample.stack_trace_sample = sample;
1139 }
1140
1141 verifier::VerifierDeps* GetVerifierDeps() const {
Andreas Gampe2c19f5b2016-11-28 08:10:18 -08001142 DCHECK(IsAotCompiler());
Nicolas Geoffray340dafa2016-11-18 16:03:10 +00001143 return tlsPtr_.deps_or_stack_trace_sample.verifier_deps;
1144 }
1145
1146 // It is the responsability of the caller to make sure the verifier_deps
1147 // entry in the thread is cleared before destruction of the actual VerifierDeps
1148 // object, or the thread.
1149 void SetVerifierDeps(verifier::VerifierDeps* verifier_deps) {
Andreas Gampe2c19f5b2016-11-28 08:10:18 -08001150 DCHECK(IsAotCompiler());
Nicolas Geoffraye424c932016-11-23 12:52:01 +00001151 DCHECK(verifier_deps == nullptr || tlsPtr_.deps_or_stack_trace_sample.verifier_deps == nullptr);
Nicolas Geoffray340dafa2016-11-18 16:03:10 +00001152 tlsPtr_.deps_or_stack_trace_sample.verifier_deps = verifier_deps;
Jeff Hao5ce4b172013-08-16 16:27:18 -07001153 }
1154
1155 uint64_t GetTraceClockBase() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -07001156 return tls64_.trace_clock_base;
Jeff Hao5ce4b172013-08-16 16:27:18 -07001157 }
1158
1159 void SetTraceClockBase(uint64_t clock_base) {
Ian Rogersdd7624d2014-03-14 17:43:00 -07001160 tls64_.trace_clock_base = clock_base;
Jeff Hao5ce4b172013-08-16 16:27:18 -07001161 }
1162
Ian Rogers81d425b2012-09-27 16:03:43 -07001163 BaseMutex* GetHeldMutex(LockLevel level) const {
Ian Rogersdd7624d2014-03-14 17:43:00 -07001164 return tlsPtr_.held_mutexes[level];
Ian Rogers00f7d0e2012-07-19 15:28:27 -07001165 }
1166
Ian Rogers81d425b2012-09-27 16:03:43 -07001167 void SetHeldMutex(LockLevel level, BaseMutex* mutex) {
Ian Rogersdd7624d2014-03-14 17:43:00 -07001168 tlsPtr_.held_mutexes[level] = mutex;
Ian Rogers00f7d0e2012-07-19 15:28:27 -07001169 }
Elliott Hughesffb465f2012-03-01 18:46:05 -08001170
Yu Lieac44242015-06-29 10:50:03 +08001171 void ClearSuspendBarrier(AtomicInteger* target)
Mathieu Chartier90443472015-07-16 20:32:27 -07001172 REQUIRES(Locks::thread_suspend_count_lock_);
Yu Lieac44242015-06-29 10:50:03 +08001173
Mathieu Chartier858f1c52012-10-17 17:45:55 -07001174 bool ReadFlag(ThreadFlag flag) const {
Vladimir Marko9c0f7642021-12-06 16:17:52 +00001175 return GetStateAndFlags(std::memory_order_relaxed).IsFlagSet(flag);
Mathieu Chartier858f1c52012-10-17 17:45:55 -07001176 }
1177
Vladimir Marko9c0f7642021-12-06 16:17:52 +00001178 void AtomicSetFlag(ThreadFlag flag, std::memory_order order = std::memory_order_seq_cst) {
1179 tls32_.state_and_flags.fetch_or(enum_cast<uint32_t>(flag), order);
Ian Rogers8c1b5f72014-07-09 22:02:36 -07001180 }
Mathieu Chartier858f1c52012-10-17 17:45:55 -07001181
Vladimir Marko9c0f7642021-12-06 16:17:52 +00001182 void AtomicClearFlag(ThreadFlag flag, std::memory_order order = std::memory_order_seq_cst) {
1183 tls32_.state_and_flags.fetch_and(~enum_cast<uint32_t>(flag), order);
Ian Rogers8c1b5f72014-07-09 22:02:36 -07001184 }
Mathieu Chartier858f1c52012-10-17 17:45:55 -07001185
Lokesh Gidra7e678d32020-04-28 16:17:49 -07001186 void ResetQuickAllocEntryPointsForThread();
Hiroshi Yamauchi3b4c1892013-09-12 21:33:12 -07001187
Ian Rogersdd7624d2014-03-14 17:43:00 -07001188 // Returns the remaining space in the TLAB.
Mathieu Chartier6bc77742017-04-18 17:46:23 -07001189 size_t TlabSize() const {
1190 return tlsPtr_.thread_local_end - tlsPtr_.thread_local_pos;
1191 }
1192
Wessam Hassaneinb5a10be2020-11-11 16:42:52 -08001193 // Returns pos offset from start.
1194 size_t GetTlabPosOffset() const {
1195 return tlsPtr_.thread_local_pos - tlsPtr_.thread_local_start;
1196 }
1197
Mathieu Chartier6bc77742017-04-18 17:46:23 -07001198 // Returns the remaining space in the TLAB if we were to expand it to maximum capacity.
1199 size_t TlabRemainingCapacity() const {
1200 return tlsPtr_.thread_local_limit - tlsPtr_.thread_local_pos;
1201 }
1202
1203 // Expand the TLAB by a fixed number of bytes. There must be enough capacity to do so.
1204 void ExpandTlab(size_t bytes) {
1205 tlsPtr_.thread_local_end += bytes;
1206 DCHECK_LE(tlsPtr_.thread_local_end, tlsPtr_.thread_local_limit);
1207 }
1208
Ian Rogersdd7624d2014-03-14 17:43:00 -07001209 // Doesn't check that there is room.
1210 mirror::Object* AllocTlab(size_t bytes);
Mathieu Chartier6bc77742017-04-18 17:46:23 -07001211 void SetTlab(uint8_t* start, uint8_t* end, uint8_t* limit);
Ian Rogersdd7624d2014-03-14 17:43:00 -07001212 bool HasTlab() const;
Mathieu Chartierc4bf6672020-01-13 13:07:16 -08001213 void ResetTlab();
Hiroshi Yamauchi2cd334a2015-01-09 14:03:35 -08001214 uint8_t* GetTlabStart() {
1215 return tlsPtr_.thread_local_start;
1216 }
1217 uint8_t* GetTlabPos() {
1218 return tlsPtr_.thread_local_pos;
1219 }
Lokesh Gidra4f9d62b2020-01-06 15:06:04 -08001220 uint8_t* GetTlabEnd() {
1221 return tlsPtr_.thread_local_end;
1222 }
Ian Rogersdd7624d2014-03-14 17:43:00 -07001223 // Remove the suspend trigger for this thread by making the suspend_trigger_ TLS value
1224 // equal to a valid pointer.
1225 // TODO: does this need to atomic? I don't think so.
1226 void RemoveSuspendTrigger() {
1227 tlsPtr_.suspend_trigger = reinterpret_cast<uintptr_t*>(&tlsPtr_.suspend_trigger);
1228 }
1229
1230 // Trigger a suspend check by making the suspend_trigger_ TLS value an invalid pointer.
1231 // The next time a suspend check is done, it will load from the value at this address
1232 // and trigger a SIGSEGV.
Hans Boehm891cb882020-07-31 12:06:58 -07001233 // Only needed if Runtime::implicit_suspend_checks_ is true and fully implemented. It currently
1234 // is always false. Client code currently just looks at the thread flags directly to determine
1235 // whether we should suspend, so this call is currently unnecessary.
Ian Rogersdd7624d2014-03-14 17:43:00 -07001236 void TriggerSuspend() {
1237 tlsPtr_.suspend_trigger = nullptr;
1238 }
1239
1240
1241 // Push an object onto the allocation stack.
Mathieu Chartiercb535da2015-01-23 13:50:03 -08001242 bool PushOnThreadLocalAllocationStack(mirror::Object* obj)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -07001243 REQUIRES_SHARED(Locks::mutator_lock_);
Ian Rogersdd7624d2014-03-14 17:43:00 -07001244
1245 // Set the thread local allocation pointers to the given pointers.
Mathieu Chartiercb535da2015-01-23 13:50:03 -08001246 void SetThreadLocalAllocationStack(StackReference<mirror::Object>* start,
1247 StackReference<mirror::Object>* end);
Ian Rogersdd7624d2014-03-14 17:43:00 -07001248
1249 // Resets the thread local allocation pointers.
1250 void RevokeThreadLocalAllocationStack();
1251
1252 size_t GetThreadLocalBytesAllocated() const {
Mathieu Chartier14cc9be2014-07-11 10:26:37 -07001253 return tlsPtr_.thread_local_end - tlsPtr_.thread_local_start;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001254 }
1255
1256 size_t GetThreadLocalObjectsAllocated() const {
1257 return tlsPtr_.thread_local_objects;
1258 }
1259
Ian Rogersdd7624d2014-03-14 17:43:00 -07001260 void* GetRosAllocRun(size_t index) const {
1261 return tlsPtr_.rosalloc_runs[index];
1262 }
1263
1264 void SetRosAllocRun(size_t index, void* run) {
1265 tlsPtr_.rosalloc_runs[index] = run;
1266 }
1267
Andreas Gampe2c2d2a02016-03-17 21:27:19 -07001268 bool ProtectStack(bool fatal_on_error = true);
Dave Allison648d7112014-07-25 16:15:27 -07001269 bool UnprotectStack();
1270
Hiroshi Yamauchiee235822016-08-19 17:03:27 -07001271 bool IsTransitioningToRunnable() const {
1272 return tls32_.is_transitioning_to_runnable;
1273 }
1274
1275 void SetIsTransitioningToRunnable(bool value) {
1276 tls32_.is_transitioning_to_runnable = value;
Hiroshi Yamauchi2cd334a2015-01-09 14:03:35 -08001277 }
1278
Alex Light3dacdd62019-03-12 15:45:47 +00001279 uint32_t DecrementForceInterpreterCount() REQUIRES(Locks::thread_list_lock_) {
1280 return --tls32_.force_interpreter_count;
1281 }
1282
1283 uint32_t IncrementForceInterpreterCount() REQUIRES(Locks::thread_list_lock_) {
1284 return ++tls32_.force_interpreter_count;
1285 }
1286
1287 void SetForceInterpreterCount(uint32_t value) REQUIRES(Locks::thread_list_lock_) {
1288 tls32_.force_interpreter_count = value;
1289 }
1290
1291 uint32_t ForceInterpreterCount() const {
1292 return tls32_.force_interpreter_count;
1293 }
1294
1295 bool IsForceInterpreter() const {
1296 return tls32_.force_interpreter_count != 0;
1297 }
1298
Vladimir Markobf121912019-06-04 13:49:05 +01001299 bool IncrementMakeVisiblyInitializedCounter() {
1300 tls32_.make_visibly_initialized_counter += 1u;
1301 return tls32_.make_visibly_initialized_counter == kMakeVisiblyInitializedCounterTriggerCount;
1302 }
1303
1304 void ClearMakeVisiblyInitializedCounter() {
1305 tls32_.make_visibly_initialized_counter = 0u;
1306 }
1307
Mathieu Chartierd0ad2ee2015-03-31 14:59:59 -07001308 void PushVerifier(verifier::MethodVerifier* verifier);
1309 void PopVerifier(verifier::MethodVerifier* verifier);
Mathieu Chartier12d625f2015-03-13 11:33:37 -07001310
Jeff Hao848f70a2014-01-15 13:49:50 -08001311 void InitStringEntryPoints();
1312
Mathieu Chartierdfe02f62016-02-01 20:15:11 -08001313 void ModifyDebugDisallowReadBarrier(int8_t delta) {
Vladimir Marko468de592022-02-04 16:47:46 +00001314 if (kCheckDebugDisallowReadBarrierCount) {
1315 debug_disallow_read_barrier_ += delta;
1316 }
Mathieu Chartierdfe02f62016-02-01 20:15:11 -08001317 }
1318
1319 uint8_t GetDebugDisallowReadBarrierCount() const {
Vladimir Marko468de592022-02-04 16:47:46 +00001320 return kCheckDebugDisallowReadBarrierCount ? debug_disallow_read_barrier_ : 0u;
Mathieu Chartierdfe02f62016-02-01 20:15:11 -08001321 }
1322
Alex Light184f0752018-07-13 11:18:22 -07001323 // Gets the current TLSData associated with the key or nullptr if there isn't any. Note that users
1324 // do not gain ownership of TLSData and must synchronize with SetCustomTls themselves to prevent
1325 // it from being deleted.
1326 TLSData* GetCustomTLS(const char* key) REQUIRES(!Locks::custom_tls_lock_);
Andreas Gampef26bf2d2017-01-13 16:47:14 -08001327
Alex Light184f0752018-07-13 11:18:22 -07001328 // Sets the tls entry at 'key' to data. The thread takes ownership of the TLSData. The destructor
1329 // will be run when the thread exits or when SetCustomTLS is called again with the same key.
1330 void SetCustomTLS(const char* key, TLSData* data) REQUIRES(!Locks::custom_tls_lock_);
Andreas Gampef26bf2d2017-01-13 16:47:14 -08001331
Calin Juravle97cbc922016-04-15 16:16:35 +01001332 // Returns true if the current thread is the jit sensitive thread.
1333 bool IsJitSensitiveThread() const {
1334 return this == jit_sensitive_thread_;
1335 }
1336
Alex Lighte0b2ce42019-02-21 19:23:42 +00001337 bool IsSystemDaemon() const REQUIRES_SHARED(Locks::mutator_lock_);
1338
Calin Juravle97cbc922016-04-15 16:16:35 +01001339 // Returns true if StrictMode events are traced for the current thread.
Calin Juravleb2771b42016-04-07 17:09:25 +01001340 static bool IsSensitiveThread() {
1341 if (is_sensitive_thread_hook_ != nullptr) {
1342 return (*is_sensitive_thread_hook_)();
1343 }
1344 return false;
1345 }
1346
Mathieu Chartier3768ade2017-05-02 14:04:39 -07001347 // Set to the read barrier marking entrypoints to be non-null.
1348 void SetReadBarrierEntrypoints();
1349
Andreas Gampebad529d2017-02-13 18:52:10 -08001350 static jobject CreateCompileTimePeer(JNIEnv* env,
1351 const char* name,
1352 bool as_daemon,
1353 jobject thread_group)
1354 REQUIRES_SHARED(Locks::mutator_lock_);
1355
David Srbecky912f36c2018-09-08 12:22:58 +01001356 ALWAYS_INLINE InterpreterCache* GetInterpreterCache() {
1357 return &interpreter_cache_;
1358 }
1359
1360 // Clear all thread-local interpreter caches.
1361 //
1362 // Since the caches are keyed by memory pointer to dex instructions, this must be
1363 // called when any dex code is unloaded (before different code gets loaded at the
1364 // same memory location).
1365 //
1366 // If presence of cache entry implies some pre-conditions, this must also be
1367 // called if the pre-conditions might no longer hold true.
1368 static void ClearAllInterpreterCaches();
1369
1370 template<PointerSize pointer_size>
David Srbecky56de89a2018-10-01 15:32:20 +01001371 static constexpr ThreadOffset<pointer_size> InterpreterCacheOffset() {
David Srbecky912f36c2018-09-08 12:22:58 +01001372 return ThreadOffset<pointer_size>(OFFSETOF_MEMBER(Thread, interpreter_cache_));
1373 }
1374
Hans Boehm3d2f1482022-01-17 01:32:55 +00001375 static constexpr int InterpreterCacheSizeLog2() {
1376 return WhichPowerOf2(InterpreterCache::kSize);
1377 }
1378
Vladimir Marko254a8582021-11-29 14:08:37 +00001379 static constexpr uint32_t AllThreadFlags() {
1380 return enum_cast<uint32_t>(ThreadFlag::kLastFlag) |
1381 (enum_cast<uint32_t>(ThreadFlag::kLastFlag) - 1u);
1382 }
1383
1384 static constexpr uint32_t SuspendOrCheckpointRequestFlags() {
1385 return enum_cast<uint32_t>(ThreadFlag::kSuspendRequest) |
1386 enum_cast<uint32_t>(ThreadFlag::kCheckpointRequest) |
1387 enum_cast<uint32_t>(ThreadFlag::kEmptyCheckpointRequest);
1388 }
1389
Vladimir Marko9c0f7642021-12-06 16:17:52 +00001390 static constexpr uint32_t FlipFunctionFlags() {
1391 return enum_cast<uint32_t>(ThreadFlag::kPendingFlipFunction) |
1392 enum_cast<uint32_t>(ThreadFlag::kRunningFlipFunction) |
1393 enum_cast<uint32_t>(ThreadFlag::kWaitingForFlipFunction);
1394 }
1395
Vladimir Markoce2a3442021-11-24 15:10:26 +00001396 static constexpr uint32_t StoredThreadStateValue(ThreadState state) {
1397 return StateAndFlags::EncodeState(state);
1398 }
1399
Nicolas Geoffrayf9ae8e32022-02-15 22:54:11 +00001400 void ResetSharedMethodHotness() {
1401 tls32_.shared_method_hotness = kSharedMethodHotnessThreshold;
1402 }
1403
1404 uint32_t GetSharedMethodHotness() const {
1405 return tls32_.shared_method_hotness;
1406 }
1407
1408 uint32_t DecrementSharedMethodHotness() {
1409 tls32_.shared_method_hotness = (tls32_.shared_method_hotness - 1) & 0xffff;
1410 return tls32_.shared_method_hotness;
1411 }
1412
Ian Rogersdd7624d2014-03-14 17:43:00 -07001413 private:
Ian Rogers52673ff2012-06-27 23:25:34 -07001414 explicit Thread(bool daemon);
Mathieu Chartier90443472015-07-16 20:32:27 -07001415 ~Thread() REQUIRES(!Locks::mutator_lock_, !Locks::thread_suspend_count_lock_);
Elliott Hughesc0f09332012-03-26 13:27:06 -07001416 void Destroy();
Carl Shapiro0e5d75d2011-07-06 18:28:37 -07001417
Alex Light4847a072019-12-12 16:13:47 -08001418 // Deletes and clears the tlsPtr_.jpeer field. Done in a way so that both it and opeer cannot be
1419 // observed to be set at the same time by instrumentation.
1420 void DeleteJPeer(JNIEnv* env);
1421
Andreas Gampe732b0ac2017-01-18 15:23:39 -08001422 // Attaches the calling native thread to the runtime, returning the new native peer.
1423 // Used to implement JNI AttachCurrentThread and AttachCurrentThreadAsDaemon calls.
1424 template <typename PeerAction>
1425 static Thread* Attach(const char* thread_name,
1426 bool as_daemon,
1427 PeerAction p);
1428
Ian Rogers365c1022012-06-22 15:05:28 -07001429 void CreatePeer(const char* name, bool as_daemon, jobject thread_group);
Elliott Hughes5fe594f2011-09-08 12:33:17 -07001430
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +01001431 template<bool kTransactionActive>
Andreas Gampebad529d2017-02-13 18:52:10 -08001432 static void InitPeer(ScopedObjectAccessAlreadyRunnable& soa,
1433 ObjPtr<mirror::Object> peer,
1434 jboolean thread_is_daemon,
1435 jobject thread_group,
1436 jobject thread_name,
1437 jint thread_priority)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -07001438 REQUIRES_SHARED(Locks::mutator_lock_);
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +01001439
Vladimir Markoddf4fd32021-11-22 16:31:57 +00001440 // Avoid use, callers should use SetState.
1441 // Used only by `Thread` destructor and stack trace collection in semi-space GC (currently
1442 // disabled by `kStoreStackTraces = false`).
Vladimir Marko9c0f7642021-12-06 16:17:52 +00001443 // NO_THREAD_SAFETY_ANALYSIS: This function is "Unsafe" and can be called in
1444 // different states, so clang cannot perform the thread safety analysis.
1445 ThreadState SetStateUnsafe(ThreadState new_state) NO_THREAD_SAFETY_ANALYSIS {
1446 StateAndFlags old_state_and_flags = GetStateAndFlags(std::memory_order_relaxed);
Vladimir Markoddf4fd32021-11-22 16:31:57 +00001447 ThreadState old_state = old_state_and_flags.GetState();
1448 if (old_state == new_state) {
1449 // Nothing to do.
1450 } else if (old_state == ThreadState::kRunnable) {
Mathieu Chartier8ac9c912015-10-01 15:58:41 -07001451 // Need to run pending checkpoint and suspend barriers. Run checkpoints in runnable state in
1452 // case they need to use a ScopedObjectAccess. If we are holding the mutator lock and a SOA
1453 // attempts to TransitionFromSuspendedToRunnable, it results in a deadlock.
1454 TransitionToSuspendedAndRunCheckpoints(new_state);
1455 // Since we transitioned to a suspended state, check the pass barrier requests.
1456 PassActiveSuspendBarriers();
1457 } else {
Vladimir Markoddf4fd32021-11-22 16:31:57 +00001458 while (true) {
1459 StateAndFlags new_state_and_flags = old_state_and_flags;
1460 new_state_and_flags.SetState(new_state);
1461 if (LIKELY(tls32_.state_and_flags.CompareAndSetWeakAcquire(
1462 old_state_and_flags.GetValue(),
1463 new_state_and_flags.GetValue()))) {
1464 break;
1465 }
1466 // Reload state and flags.
Vladimir Marko9c0f7642021-12-06 16:17:52 +00001467 old_state_and_flags = GetStateAndFlags(std::memory_order_relaxed);
Vladimir Markoddf4fd32021-11-22 16:31:57 +00001468 DCHECK_EQ(old_state, old_state_and_flags.GetState());
1469 }
Yu Lieac44242015-06-29 10:50:03 +08001470 }
Ian Rogersc747cff2012-08-31 18:20:08 -07001471 return old_state;
1472 }
Ian Rogersc747cff2012-08-31 18:20:08 -07001473
Vladimir Marko23cf32f2021-11-15 13:38:02 +00001474 MutatorMutex* GetMutatorLock() RETURN_CAPABILITY(Locks::mutator_lock_) {
1475 DCHECK_EQ(tlsPtr_.mutator_lock, Locks::mutator_lock_);
1476 return tlsPtr_.mutator_lock;
1477 }
1478
Andreas Gampebdf7f1c2016-08-30 16:38:47 -07001479 void VerifyStackImpl() REQUIRES_SHARED(Locks::mutator_lock_);
Ian Rogers04d7aa92013-03-16 14:29:17 -07001480
Andreas Gampebdf7f1c2016-08-30 16:38:47 -07001481 void DumpState(std::ostream& os) const REQUIRES_SHARED(Locks::mutator_lock_);
Nicolas Geoffraya73280d2016-02-15 13:05:16 +00001482 void DumpStack(std::ostream& os,
Nicolas Geoffray6ee49712018-03-30 14:39:05 +00001483 bool dump_native_stack = true,
Hiroshi Yamauchi13c16352017-01-31 10:15:08 -08001484 BacktraceMap* backtrace_map = nullptr,
1485 bool force_dump_stack = false) const
Andreas Gampebdf7f1c2016-08-30 16:38:47 -07001486 REQUIRES_SHARED(Locks::mutator_lock_);
Elliott Hughesd92bec42011-09-02 17:04:36 -07001487
Elliott Hughesaccd83d2011-10-17 14:25:58 -07001488 // Out-of-line conveniences for debugging in gdb.
Brian Carlstrom7934ac22013-07-26 10:54:15 -07001489 static Thread* CurrentFromGdb(); // Like Thread::Current.
Ian Rogers00f7d0e2012-07-19 15:28:27 -07001490 // Like Thread::Dump(std::cerr).
Andreas Gampebdf7f1c2016-08-30 16:38:47 -07001491 void DumpFromGdb() const REQUIRES_SHARED(Locks::mutator_lock_);
Elliott Hughesaccd83d2011-10-17 14:25:58 -07001492
Elliott Hughes93e74e82011-09-13 11:07:03 -07001493 static void* CreateCallback(void* arg);
1494
Andreas Gampe513061a2017-06-01 09:17:34 -07001495 void HandleUncaughtExceptions(ScopedObjectAccessAlreadyRunnable& soa)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -07001496 REQUIRES_SHARED(Locks::mutator_lock_);
Andreas Gampe513061a2017-06-01 09:17:34 -07001497 void RemoveFromThreadGroup(ScopedObjectAccessAlreadyRunnable& soa)
1498 REQUIRES_SHARED(Locks::mutator_lock_);
Elliott Hughesaccd83d2011-10-17 14:25:58 -07001499
Andreas Gampe449357d2015-06-01 22:29:51 -07001500 // Initialize a thread.
1501 //
1502 // The third parameter is not mandatory. If given, the thread will use this JNIEnvExt. In case
1503 // Init succeeds, this means the thread takes ownership of it. If Init fails, it is the caller's
1504 // responsibility to destroy the given JNIEnvExt. If the parameter is null, Init will try to
1505 // create a JNIEnvExt on its own (and potentially fail at that stage, indicated by a return value
1506 // of false).
1507 bool Init(ThreadList*, JavaVMExt*, JNIEnvExt* jni_env_ext = nullptr)
Mathieu Chartier90443472015-07-16 20:32:27 -07001508 REQUIRES(Locks::runtime_shutdown_lock_);
Ian Rogers5d76c432011-10-31 21:42:49 -07001509 void InitCardTable();
Ian Rogersb033c752011-07-20 12:22:35 -07001510 void InitCpu();
Alexei Zavjalov1efa0a92014-02-04 02:08:31 +07001511 void CleanupCpu();
Ian Rogers848871b2013-08-05 10:56:33 -07001512 void InitTlsEntryPoints();
Brian Carlstromcaabb1b2011-10-11 18:09:13 -07001513 void InitTid();
Brian Carlstromcaabb1b2011-10-11 18:09:13 -07001514 void InitPthreadKeySelf();
Ian Rogersf4d4da12014-11-11 16:10:33 -08001515 bool InitStackHwm();
Elliott Hughesbe759c62011-09-08 19:38:21 -07001516
Elliott Hughesd6a23bd2013-07-16 14:19:52 -07001517 void SetUpAlternateSignalStack();
1518 void TearDownAlternateSignalStack();
Vladimir Markoe45883e2022-01-11 12:38:35 +00001519 void MadviseAwayAlternateSignalStack();
Elliott Hughesd6a23bd2013-07-16 14:19:52 -07001520
Mathieu Chartier8ac9c912015-10-01 15:58:41 -07001521 ALWAYS_INLINE void TransitionToSuspendedAndRunCheckpoints(ThreadState new_state)
Vladimir Marko9c0f7642021-12-06 16:17:52 +00001522 REQUIRES(!Locks::thread_suspend_count_lock_, !Roles::uninterruptible_)
1523 REQUIRES_SHARED(Locks::mutator_lock_);
Mathieu Chartier8ac9c912015-10-01 15:58:41 -07001524
1525 ALWAYS_INLINE void PassActiveSuspendBarriers()
1526 REQUIRES(!Locks::thread_suspend_count_lock_, !Roles::uninterruptible_);
1527
Calin Juravle97cbc922016-04-15 16:16:35 +01001528 // Registers the current thread as the jit sensitive thread. Should be called just once.
1529 static void SetJitSensitiveThread() {
1530 if (jit_sensitive_thread_ == nullptr) {
1531 jit_sensitive_thread_ = Thread::Current();
1532 } else {
1533 LOG(WARNING) << "Attempt to set the sensitive thread twice. Tid:"
1534 << Thread::Current()->GetTid();
1535 }
1536 }
1537
Calin Juravleb2771b42016-04-07 17:09:25 +01001538 static void SetSensitiveThreadHook(bool (*is_sensitive_thread_hook)()) {
1539 is_sensitive_thread_hook_ = is_sensitive_thread_hook;
1540 }
1541
Hiroshi Yamauchi02e7f1a2016-10-03 15:32:01 -07001542 bool ModifySuspendCountInternal(Thread* self,
1543 int delta,
1544 AtomicInteger* suspend_barrier,
Alex Light46f93402017-06-29 11:59:50 -07001545 SuspendReason reason)
Sebastien Hertz1c8f4ff2017-04-14 15:05:12 +02001546 WARN_UNUSED
Hiroshi Yamauchi02e7f1a2016-10-03 15:32:01 -07001547 REQUIRES(Locks::thread_suspend_count_lock_);
1548
Alex Lightdf00a1e2017-11-01 09:29:53 -07001549 // Runs a single checkpoint function. If there are no more pending checkpoint functions it will
1550 // clear the kCheckpointRequest flag. The caller is responsible for calling this in a loop until
1551 // the kCheckpointRequest flag is cleared.
Vladimir Marko9c0f7642021-12-06 16:17:52 +00001552 void RunCheckpointFunction()
1553 REQUIRES(!Locks::thread_suspend_count_lock_)
1554 REQUIRES_SHARED(Locks::mutator_lock_);
Hiroshi Yamauchi30493242016-11-03 13:06:52 -07001555 void RunEmptyCheckpoint();
Andreas Gampe0a855762016-10-26 13:43:14 -07001556
1557 bool PassActiveSuspendBarriers(Thread* self)
1558 REQUIRES(!Locks::thread_suspend_count_lock_);
1559
1560 // Install the protected region for implicit stack checks.
1561 void InstallImplicitProtection();
1562
Andreas Gampe585da952016-12-02 14:52:29 -08001563 template <bool kPrecise>
1564 void VisitRoots(RootVisitor* visitor) REQUIRES_SHARED(Locks::mutator_lock_);
1565
David Srbeckybe2b1092022-02-19 23:13:27 +00001566 static void SweepInterpreterCaches(IsMarkedVisitor* visitor)
1567 REQUIRES_SHARED(Locks::mutator_lock_);
Nicolas Geoffraye3f775b2019-12-04 14:41:52 +00001568
Andreas Gampe2c19f5b2016-11-28 08:10:18 -08001569 static bool IsAotCompiler();
1570
Andreas Gampee5d23982019-01-08 10:34:26 -08001571 void ReleaseLongJumpContextInternal();
1572
Hans Boehm30bc7772022-01-28 15:07:02 -08001573 void SetCachedThreadName(const char* name);
1574
Vladimir Markoddf4fd32021-11-22 16:31:57 +00001575 // Helper class for manipulating the 32 bits of atomically changed state and flags.
1576 class StateAndFlags {
1577 public:
1578 explicit StateAndFlags(uint32_t value) :value_(value) {}
1579
1580 uint32_t GetValue() const {
1581 return value_;
1582 }
1583
1584 void SetValue(uint32_t value) {
1585 value_ = value;
1586 }
1587
Vladimir Marko254a8582021-11-29 14:08:37 +00001588 bool IsAnyOfFlagsSet(uint32_t flags) const {
1589 DCHECK_EQ(flags & ~AllThreadFlags(), 0u);
1590 return (value_ & flags) != 0u;
1591 }
1592
Vladimir Markoddf4fd32021-11-22 16:31:57 +00001593 bool IsFlagSet(ThreadFlag flag) const {
1594 return (value_ & enum_cast<uint32_t>(flag)) != 0u;
1595 }
1596
1597 void SetFlag(ThreadFlag flag) {
1598 value_ |= enum_cast<uint32_t>(flag);
1599 }
1600
Vladimir Marko9c0f7642021-12-06 16:17:52 +00001601 StateAndFlags WithFlag(ThreadFlag flag) const {
1602 StateAndFlags result = *this;
1603 result.SetFlag(flag);
1604 return result;
1605 }
1606
1607 StateAndFlags WithoutFlag(ThreadFlag flag) const {
1608 StateAndFlags result = *this;
1609 result.ClearFlag(flag);
1610 return result;
1611 }
1612
Vladimir Markoddf4fd32021-11-22 16:31:57 +00001613 void ClearFlag(ThreadFlag flag) {
1614 value_ &= ~enum_cast<uint32_t>(flag);
1615 }
1616
1617 ThreadState GetState() const {
1618 ThreadState state = ThreadStateField::Decode(value_);
1619 ValidateThreadState(state);
1620 return state;
1621 }
1622
1623 void SetState(ThreadState state) {
1624 ValidateThreadState(state);
1625 value_ = ThreadStateField::Update(state, value_);
1626 }
Chris Dearman59cde532013-12-04 18:53:49 -08001627
Vladimir Marko9c0f7642021-12-06 16:17:52 +00001628 StateAndFlags WithState(ThreadState state) const {
1629 StateAndFlags result = *this;
1630 result.SetState(state);
1631 return result;
1632 }
1633
Vladimir Markoce2a3442021-11-24 15:10:26 +00001634 static constexpr uint32_t EncodeState(ThreadState state) {
1635 ValidateThreadState(state);
1636 return ThreadStateField::Encode(state);
1637 }
1638
Chris Dearman59cde532013-12-04 18:53:49 -08001639 private:
Vladimir Markoce2a3442021-11-24 15:10:26 +00001640 static constexpr void ValidateThreadState(ThreadState state) {
Vladimir Markoddf4fd32021-11-22 16:31:57 +00001641 if (kIsDebugBuild && state != ThreadState::kRunnable) {
1642 CHECK_GE(state, ThreadState::kTerminated);
1643 CHECK_LE(state, ThreadState::kSuspended);
1644 CHECK_NE(state, ThreadState::kObsoleteRunnable);
1645 }
1646 }
1647
1648 // The value holds thread flags and thread state.
1649 uint32_t value_;
1650
1651 static constexpr size_t kThreadStateBitSize = BitSizeOf<std::underlying_type_t<ThreadState>>();
1652 static constexpr size_t kThreadStatePosition = BitSizeOf<uint32_t>() - kThreadStateBitSize;
1653 using ThreadStateField = BitField<ThreadState, kThreadStatePosition, kThreadStateBitSize>;
1654 static_assert(
1655 WhichPowerOf2(enum_cast<uint32_t>(ThreadFlag::kLastFlag)) < kThreadStatePosition);
Ian Rogers474b6da2012-09-25 00:20:38 -07001656 };
Vladimir Markoddf4fd32021-11-22 16:31:57 +00001657 static_assert(sizeof(StateAndFlags) == sizeof(uint32_t), "Unexpected StateAndFlags size");
Ian Rogers474b6da2012-09-25 00:20:38 -07001658
Vladimir Marko9c0f7642021-12-06 16:17:52 +00001659 StateAndFlags GetStateAndFlags(std::memory_order order) const {
1660 return StateAndFlags(tls32_.state_and_flags.load(order));
1661 }
1662
Hans Boehm9d27fbc2021-05-21 09:23:38 -07001663 // Format state and flags as a hex string. For diagnostic output.
1664 std::string StateAndFlagsAsHexString() const;
1665
Vladimir Marko9c0f7642021-12-06 16:17:52 +00001666 // Run the flip function and, if requested, notify other threads that may have tried
1667 // to do that concurrently.
1668 void RunFlipFunction(Thread* self, bool notify) REQUIRES_SHARED(Locks::mutator_lock_);
1669
Ian Rogersdd7624d2014-03-14 17:43:00 -07001670 static void ThreadExitCallback(void* arg);
Elliott Hughes5d96a712012-06-28 12:24:27 -07001671
Yu Lieac44242015-06-29 10:50:03 +08001672 // Maximum number of suspend barriers.
1673 static constexpr uint32_t kMaxSuspendBarriers = 3;
1674
Ian Rogersdd7624d2014-03-14 17:43:00 -07001675 // Has Thread::Startup been called?
1676 static bool is_started_;
Mathieu Chartier858f1c52012-10-17 17:45:55 -07001677
Ian Rogersdd7624d2014-03-14 17:43:00 -07001678 // TLS key used to retrieve the Thread*.
1679 static pthread_key_t pthread_key_self_;
Ian Rogersa32a6fd2012-02-06 20:18:44 -08001680
Ian Rogersdd7624d2014-03-14 17:43:00 -07001681 // Used to notify threads that they should attempt to resume, they will suspend again if
1682 // their suspend count is > 0.
1683 static ConditionVariable* resume_cond_ GUARDED_BY(Locks::thread_suspend_count_lock_);
Dave Allisonb373e092014-02-20 16:06:36 -08001684
Calin Juravleb2771b42016-04-07 17:09:25 +01001685 // Hook passed by framework which returns true
1686 // when StrictMode events are traced for the current thread.
1687 static bool (*is_sensitive_thread_hook_)();
Calin Juravle97cbc922016-04-15 16:16:35 +01001688 // Stores the jit sensitive thread (which for now is the UI thread).
1689 static Thread* jit_sensitive_thread_;
Calin Juravleb2771b42016-04-07 17:09:25 +01001690
Vladimir Marko9f18fbc2019-07-31 15:06:12 +01001691 static constexpr uint32_t kMakeVisiblyInitializedCounterTriggerCount = 128;
Vladimir Markobf121912019-06-04 13:49:05 +01001692
Ian Rogersdd7624d2014-03-14 17:43:00 -07001693 /***********************************************************************************************/
1694 // Thread local storage. Fields are grouped by size to enable 32 <-> 64 searching to account for
1695 // pointer size differences. To encourage shorter encoding, more frequently used values appear
1696 // first if possible.
1697 /***********************************************************************************************/
Elliott Hughes6a607ad2012-07-13 20:40:00 -07001698
Zuo Wangf37a88b2014-07-10 04:26:41 -07001699 struct PACKED(4) tls_32bit_sized_values {
Ian Rogersdd7624d2014-03-14 17:43:00 -07001700 // We have no control over the size of 'bool', but want our boolean fields
1701 // to be 4-byte quantities.
Vladimir Marko4f990712021-07-14 12:45:13 +01001702 using bool32_t = uint32_t;
Ian Rogers22f454c2012-09-08 11:06:29 -07001703
Vladimir Markobf121912019-06-04 13:49:05 +01001704 explicit tls_32bit_sized_values(bool is_daemon)
Vladimir Markoddf4fd32021-11-22 16:31:57 +00001705 : state_and_flags(0u),
1706 suspend_count(0),
Vladimir Markobf121912019-06-04 13:49:05 +01001707 thin_lock_thread_id(0),
1708 tid(0),
1709 daemon(is_daemon),
1710 throwing_OutOfMemoryError(false),
1711 no_thread_suspension(0),
1712 thread_exit_check_count(0),
Vladimir Markobf121912019-06-04 13:49:05 +01001713 is_transitioning_to_runnable(false),
Vladimir Markobf121912019-06-04 13:49:05 +01001714 is_gc_marking(false),
Hans Boehm1b3ec0f2022-01-26 16:53:07 +00001715 weak_ref_access_enabled(WeakRefAccessState::kVisiblyEnabled),
Vladimir Markobf121912019-06-04 13:49:05 +01001716 disable_thread_flip_count(0),
1717 user_code_suspend_count(0),
1718 force_interpreter_count(0),
Alex Light270db1c2019-12-03 12:20:01 +00001719 make_visibly_initialized_counter(0),
Hans Boehm30bc7772022-01-28 15:07:02 -08001720 define_class_counter(0),
Nicolas Geoffrayf9ae8e32022-02-15 22:54:11 +00001721 num_name_readers(0),
1722 shared_method_hotness(kSharedMethodHotnessThreshold)
1723 {}
Dave Allisonb373e092014-02-20 16:06:36 -08001724
Vladimir Markoddf4fd32021-11-22 16:31:57 +00001725 // The state and flags field must be changed atomically so that flag values aren't lost.
1726 // See `StateAndFlags` for bit assignments of `ThreadFlag` and `ThreadState` values.
1727 // Keeping the state and flags together allows an atomic CAS to change from being
1728 // Suspended to Runnable without a suspend request occurring.
1729 Atomic<uint32_t> state_and_flags;
1730 static_assert(sizeof(state_and_flags) == sizeof(uint32_t),
1731 "Size of state_and_flags and uint32 are different");
Dave Allisonb373e092014-02-20 16:06:36 -08001732
Ian Rogersdd7624d2014-03-14 17:43:00 -07001733 // A non-zero value is used to tell the current thread to enter a safe point
1734 // at the next poll.
1735 int suspend_count GUARDED_BY(Locks::thread_suspend_count_lock_);
Hiroshi Yamauchicf58d4a2013-09-26 14:21:22 -07001736
Ian Rogersdd7624d2014-03-14 17:43:00 -07001737 // Thin lock thread id. This is a small integer used by the thin lock implementation.
1738 // This is not to be confused with the native thread's tid, nor is it the value returned
1739 // by java.lang.Thread.getId --- this is a distinct value, used only for locking. One
1740 // important difference between this id and the ids visible to managed code is that these
1741 // ones get reused (to ensure that they fit in the number of bits available).
1742 uint32_t thin_lock_thread_id;
Hiroshi Yamauchif5b0e202014-02-11 17:02:22 -08001743
Ian Rogersdd7624d2014-03-14 17:43:00 -07001744 // System thread id.
1745 uint32_t tid;
Hiroshi Yamauchif5b0e202014-02-11 17:02:22 -08001746
Ian Rogersdd7624d2014-03-14 17:43:00 -07001747 // Is the thread a daemon?
1748 const bool32_t daemon;
Hiroshi Yamauchif5b0e202014-02-11 17:02:22 -08001749
Ian Rogersdd7624d2014-03-14 17:43:00 -07001750 // A boolean telling us whether we're recursively throwing OOME.
1751 bool32_t throwing_OutOfMemoryError;
1752
1753 // A positive value implies we're in a region where thread suspension isn't expected.
1754 uint32_t no_thread_suspension;
1755
1756 // How many times has our pthread key's destructor been called?
1757 uint32_t thread_exit_check_count;
Sebastien Hertz9f102032014-05-23 08:59:42 +02001758
Hiroshi Yamauchiee235822016-08-19 17:03:27 -07001759 // True if the thread is in TransitionFromSuspendedToRunnable(). This is used to distinguish the
1760 // non-runnable threads (eg. kNative, kWaiting) that are about to transition to runnable from
1761 // the rest of them.
1762 bool32_t is_transitioning_to_runnable;
Sebastien Hertz1558b572015-02-25 15:05:59 +01001763
Hiroshi Yamauchi00370822015-08-18 14:47:25 -07001764 // True if the GC is in the marking phase. This is used for the CC collector only. This is
1765 // thread local so that we can simplify the logic to check for the fast path of read barriers of
1766 // GC roots.
1767 bool32_t is_gc_marking;
1768
Nicolas Geoffray365719c2017-03-08 13:11:50 +00001769 // Thread "interrupted" status; stays raised until queried or thrown.
1770 Atomic<bool32_t> interrupted;
1771
Charles Mungeraa31f492018-11-01 18:57:38 +00001772 AtomicInteger park_state_;
1773
Hans Boehm1b3ec0f2022-01-26 16:53:07 +00001774 // Determines whether the thread is allowed to directly access a weak ref
1775 // (Reference::GetReferent() and system weaks) and to potentially mark an object alive/gray.
1776 // This is used for concurrent reference processing of the CC collector only. This is thread
1777 // local so that we can enable/disable weak ref access by using a checkpoint and avoid a race
1778 // around the time weak ref access gets disabled and concurrent reference processing begins
1779 // (if weak ref access is disabled during a pause, this is not an issue.) Other collectors use
1780 // Runtime::DisallowNewSystemWeaks() and ReferenceProcessor::EnableSlowPath(). Can be
1781 // concurrently accessed by GetReferent() and set (by iterating over threads).
1782 // Can be changed from kEnabled to kVisiblyEnabled by readers. No other concurrent access is
1783 // possible when that happens.
1784 mutable std::atomic<WeakRefAccessState> weak_ref_access_enabled;
Hiroshi Yamauchi20a0be02016-02-19 15:44:06 -08001785
1786 // A thread local version of Heap::disable_thread_flip_count_. This keeps track of how many
1787 // levels of (nested) JNI critical sections the thread is in and is used to detect a nested JNI
1788 // critical section enter.
1789 uint32_t disable_thread_flip_count;
Alex Light88fd7202017-06-30 08:31:59 -07001790
Alex Lightcea42152018-09-18 22:51:55 +00001791 // How much of 'suspend_count_' is by request of user code, used to distinguish threads
1792 // suspended by the runtime from those suspended by user code.
Alex Light88fd7202017-06-30 08:31:59 -07001793 // This should have GUARDED_BY(Locks::user_code_suspension_lock_) but auto analysis cannot be
1794 // told that AssertHeld should be good enough.
1795 int user_code_suspend_count GUARDED_BY(Locks::thread_suspend_count_lock_);
David Srbecky28f6cff2018-10-16 15:07:28 +01001796
Alex Light3dacdd62019-03-12 15:45:47 +00001797 // Count of how many times this thread has been forced to interpreter. If this is not 0 the
1798 // thread must remain in interpreted code as much as possible.
1799 uint32_t force_interpreter_count;
1800
Vladimir Markobf121912019-06-04 13:49:05 +01001801 // Counter for calls to initialize a class that's initialized but not visibly initialized.
1802 // When this reaches kMakeVisiblyInitializedCounterTriggerCount, we call the runtime to
1803 // make initialized classes visibly initialized. This is needed because we usually make
1804 // classes visibly initialized in batches but we do not want to be stuck with a class
1805 // initialized but not visibly initialized for a long time even if no more classes are
1806 // being initialized anymore.
1807 uint32_t make_visibly_initialized_counter;
Alex Light270db1c2019-12-03 12:20:01 +00001808
1809 // Counter for how many nested define-classes are ongoing in this thread. Used to allow waiting
1810 // for threads to be done with class-definition work.
1811 uint32_t define_class_counter;
Hans Boehm30bc7772022-01-28 15:07:02 -08001812
1813 // A count of the number of readers of tlsPtr_.name that may still be looking at a string they
1814 // retrieved.
1815 mutable std::atomic<uint32_t> num_name_readers;
1816 static_assert(std::atomic<uint32_t>::is_always_lock_free);
Nicolas Geoffrayf9ae8e32022-02-15 22:54:11 +00001817
1818 // Thread-local hotness counter for shared memory methods. Initialized with
1819 // `kSharedMethodHotnessThreshold`. The interpreter decrements it and goes
1820 // into the runtime when hitting zero. Note that all previous decrements
1821 // could have been executed by another method than the one seeing zero.
1822 // There is a second level counter in `Jit::shared_method_counters_` to make
1823 // sure we at least have a few samples before compiling a method.
1824 uint32_t shared_method_hotness;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001825 } tls32_;
1826
1827 struct PACKED(8) tls_64bit_sized_values {
Sebastien Hertz07474662015-08-25 15:12:33 +00001828 tls_64bit_sized_values() : trace_clock_base(0) {
Ian Rogersdd7624d2014-03-14 17:43:00 -07001829 }
1830
1831 // The clock base used for tracing.
1832 uint64_t trace_clock_base;
1833
Ian Rogersdd7624d2014-03-14 17:43:00 -07001834 RuntimeStats stats;
1835 } tls64_;
1836
Andreas Gampe6aa13702015-10-28 10:57:25 -07001837 struct PACKED(sizeof(void*)) tls_ptr_sized_values {
Nicolas Geoffrayf9795d12021-10-04 16:28:54 +01001838 tls_ptr_sized_values() : card_table(nullptr),
1839 exception(nullptr),
1840 stack_end(nullptr),
1841 managed_stack(),
1842 suspend_trigger(nullptr),
1843 jni_env(nullptr),
1844 tmp_jni_env(nullptr),
1845 self(nullptr),
1846 opeer(nullptr),
1847 jpeer(nullptr),
1848 stack_begin(nullptr),
1849 stack_size(0),
1850 deps_or_stack_trace_sample(),
1851 wait_next(nullptr),
1852 monitor_enter_object(nullptr),
1853 top_handle_scope(nullptr),
1854 class_loader_override(nullptr),
1855 long_jump_context(nullptr),
1856 instrumentation_stack(nullptr),
1857 stacked_shadow_frame_record(nullptr),
1858 deoptimization_context_stack(nullptr),
1859 frame_id_to_shadow_frame(nullptr),
1860 name(nullptr),
1861 pthread_self(0),
1862 last_no_thread_suspension_cause(nullptr),
1863 checkpoint_function(nullptr),
1864 thread_local_start(nullptr),
1865 thread_local_pos(nullptr),
1866 thread_local_end(nullptr),
1867 thread_local_limit(nullptr),
1868 thread_local_objects(0),
1869 thread_local_alloc_stack_top(nullptr),
1870 thread_local_alloc_stack_end(nullptr),
Vladimir Marko23cf32f2021-11-15 13:38:02 +00001871 mutator_lock(nullptr),
Nicolas Geoffrayf9795d12021-10-04 16:28:54 +01001872 flip_function(nullptr),
1873 method_verifier(nullptr),
1874 thread_local_mark_stack(nullptr),
1875 async_exception(nullptr),
1876 top_reflective_handle_scope(nullptr) {
Mathieu Chartier12d625f2015-03-13 11:33:37 -07001877 std::fill(held_mutexes, held_mutexes + kLockLevelCount, nullptr);
Ian Rogersdd7624d2014-03-14 17:43:00 -07001878 }
1879
1880 // The biased card table, see CardTable for details.
Ian Rogers13735952014-10-08 12:43:28 -07001881 uint8_t* card_table;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001882
Mathieu Chartier2cebb242015-04-21 16:50:40 -07001883 // The pending exception or null.
Ian Rogersdd7624d2014-03-14 17:43:00 -07001884 mirror::Throwable* exception;
1885
1886 // The end of this thread's stack. This is the lowest safely-addressable address on the stack.
1887 // We leave extra space so there's room for the code that throws StackOverflowError.
Ian Rogers13735952014-10-08 12:43:28 -07001888 uint8_t* stack_end;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001889
1890 // The top of the managed stack often manipulated directly by compiler generated code.
1891 ManagedStack managed_stack;
1892
1893 // In certain modes, setting this to 0 will trigger a SEGV and thus a suspend check. It is
1894 // normally set to the address of itself.
1895 uintptr_t* suspend_trigger;
1896
1897 // Every thread may have an associated JNI environment
1898 JNIEnvExt* jni_env;
1899
Andreas Gampe449357d2015-06-01 22:29:51 -07001900 // Temporary storage to transfer a pre-allocated JNIEnvExt from the creating thread to the
1901 // created thread.
1902 JNIEnvExt* tmp_jni_env;
1903
Ian Rogersdd7624d2014-03-14 17:43:00 -07001904 // Initialized to "this". On certain architectures (such as x86) reading off of Thread::Current
1905 // is easy but getting the address of Thread::Current is hard. This field can be read off of
1906 // Thread::Current to give the address.
1907 Thread* self;
1908
1909 // Our managed peer (an instance of java.lang.Thread). The jobject version is used during thread
1910 // start up, until the thread is registered and the local opeer_ is used.
1911 mirror::Object* opeer;
1912 jobject jpeer;
1913
1914 // The "lowest addressable byte" of the stack.
Ian Rogers13735952014-10-08 12:43:28 -07001915 uint8_t* stack_begin;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001916
1917 // Size of the stack.
1918 size_t stack_size;
1919
Nicolas Geoffray340dafa2016-11-18 16:03:10 +00001920 // Sampling profiler and AOT verification cannot happen on the same run, so we share
1921 // the same entry for the stack trace and the verifier deps.
1922 union DepsOrStackTraceSample {
1923 DepsOrStackTraceSample() {
1924 verifier_deps = nullptr;
1925 stack_trace_sample = nullptr;
1926 }
1927 // Pointer to previous stack trace captured by sampling profiler.
1928 std::vector<ArtMethod*>* stack_trace_sample;
1929 // When doing AOT verification, per-thread VerifierDeps.
1930 verifier::VerifierDeps* verifier_deps;
1931 } deps_or_stack_trace_sample;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001932
Mathieu Chartier2cebb242015-04-21 16:50:40 -07001933 // The next thread in the wait set this thread is part of or null if not waiting.
Ian Rogersdd7624d2014-03-14 17:43:00 -07001934 Thread* wait_next;
1935
1936 // If we're blocked in MonitorEnter, this is the object we're trying to lock.
1937 mirror::Object* monitor_enter_object;
1938
Mathieu Chartier2cebb242015-04-21 16:50:40 -07001939 // Top of linked list of handle scopes or null for none.
Mathieu Chartiere8a3c572016-10-11 16:52:17 -07001940 BaseHandleScope* top_handle_scope;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001941
1942 // Needed to get the right ClassLoader in JNI_OnLoad, but also
1943 // useful for testing.
Ian Rogers68d8b422014-07-17 11:09:10 -07001944 jobject class_loader_override;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001945
1946 // Thread local, lazily allocated, long jump context. Used to deliver exceptions.
1947 Context* long_jump_context;
1948
1949 // Additional stack used by method instrumentation to store method and return pc values.
Nicolas Geoffraye91e7952020-01-23 10:15:56 +00001950 // Stored as a pointer since std::map is not PACKED.
1951 // !DO NOT CHANGE! to std::unordered_map: the users of this map require an
1952 // ordered iteration on the keys (which are stack addresses).
1953 // Also see Thread::GetInstrumentationStack for the requirements on
1954 // manipulating and reading this map.
1955 std::map<uintptr_t, instrumentation::InstrumentationStackFrame>* instrumentation_stack;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001956
Mingyao Yang1f2d3ba2015-05-18 12:12:50 -07001957 // For gc purpose, a shadow frame record stack that keeps track of:
1958 // 1) shadow frames under construction.
1959 // 2) deoptimization shadow frames.
1960 StackedShadowFrameRecord* stacked_shadow_frame_record;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001961
Mingyao Yang1f2d3ba2015-05-18 12:12:50 -07001962 // Deoptimization return value record stack.
Sebastien Hertz07474662015-08-25 15:12:33 +00001963 DeoptimizationContextRecord* deoptimization_context_stack;
Andreas Gampe2a0d4ec2014-06-02 22:05:22 -07001964
Mingyao Yang99170c62015-07-06 11:10:37 -07001965 // For debugger, a linked list that keeps the mapping from frame_id to shadow frame.
1966 // Shadow frames may be created before deoptimization happens so that the debugger can
1967 // set local values there first.
1968 FrameIdToShadowFrame* frame_id_to_shadow_frame;
1969
Hans Boehm30bc7772022-01-28 15:07:02 -08001970 // A cached copy of the java.lang.Thread's (modified UTF-8) name.
1971 // If this is not null or kThreadNameDuringStartup, then it owns the malloc memory holding
1972 // the string. Updated in an RCU-like manner.
1973 std::atomic<const char*> name;
1974 static_assert(std::atomic<const char*>::is_always_lock_free);
Ian Rogersdd7624d2014-03-14 17:43:00 -07001975
1976 // A cached pthread_t for the pthread underlying this Thread*.
1977 pthread_t pthread_self;
1978
Ian Rogersdd7624d2014-03-14 17:43:00 -07001979 // If no_thread_suspension_ is > 0, what is causing that assertion.
1980 const char* last_no_thread_suspension_cause;
1981
Mathieu Chartier952e1e32016-06-13 14:04:02 -07001982 // Pending checkpoint function or null if non-pending. If this checkpoint is set and someone\
1983 // requests another checkpoint, it goes to the checkpoint overflow list.
1984 Closure* checkpoint_function GUARDED_BY(Locks::thread_suspend_count_lock_);
Ian Rogersdd7624d2014-03-14 17:43:00 -07001985
Yu Lieac44242015-06-29 10:50:03 +08001986 // Pending barriers that require passing or NULL if non-pending. Installation guarding by
1987 // Locks::thread_suspend_count_lock_.
1988 // They work effectively as art::Barrier, but implemented directly using AtomicInteger and futex
1989 // to avoid additional cost of a mutex and a condition variable, as used in art::Barrier.
1990 AtomicInteger* active_suspend_barriers[kMaxSuspendBarriers];
1991
Roland Levillaine71b3542017-01-16 14:58:23 +00001992 // Thread-local allocation pointer. Moved here to force alignment for thread_local_pos on ARM.
1993 uint8_t* thread_local_start;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001994
Hiroshi Yamauchi7e1ce282015-12-11 15:46:19 -08001995 // thread_local_pos and thread_local_end must be consecutive for ldrd and are 8 byte aligned for
1996 // potentially better performance.
Ian Rogers13735952014-10-08 12:43:28 -07001997 uint8_t* thread_local_pos;
1998 uint8_t* thread_local_end;
Igor Murashkinaf1e2992016-10-12 17:44:50 -07001999
Mathieu Chartier6bc77742017-04-18 17:46:23 -07002000 // Thread local limit is how much we can expand the thread local buffer to, it is greater or
2001 // equal to thread_local_end.
2002 uint8_t* thread_local_limit;
2003
Vladimir Marko05846472016-09-14 12:49:57 +01002004 size_t thread_local_objects;
Ian Rogersdd7624d2014-03-14 17:43:00 -07002005
Roland Levillaine71b3542017-01-16 14:58:23 +00002006 // Entrypoint function pointers.
2007 // TODO: move this to more of a global offset table model to avoid per-thread duplication.
2008 JniEntryPoints jni_entrypoints;
2009 QuickEntryPoints quick_entrypoints;
2010
Mathieu Chartier0651d412014-04-29 14:37:57 -07002011 // There are RosAlloc::kNumThreadLocalSizeBrackets thread-local size brackets per thread.
Hiroshi Yamauchi7ed9c562016-02-02 15:22:09 -08002012 void* rosalloc_runs[kNumRosAllocThreadLocalSizeBracketsInThread];
Ian Rogersdd7624d2014-03-14 17:43:00 -07002013
2014 // Thread-local allocation stack data/routines.
Mathieu Chartiercb535da2015-01-23 13:50:03 -08002015 StackReference<mirror::Object>* thread_local_alloc_stack_top;
2016 StackReference<mirror::Object>* thread_local_alloc_stack_end;
Chao-ying Fu9e369312014-05-21 11:20:52 -07002017
Vladimir Marko23cf32f2021-11-15 13:38:02 +00002018 // Pointer to the mutator lock.
2019 // This is the same as `Locks::mutator_lock_` but cached for faster state transitions.
2020 MutatorMutex* mutator_lock;
2021
Chao-ying Fu9e369312014-05-21 11:20:52 -07002022 // Support for Mutex lock hierarchy bug detection.
2023 BaseMutex* held_mutexes[kLockLevelCount];
Dave Allison8ce6b902014-08-26 11:07:58 -07002024
Hiroshi Yamauchi2cd334a2015-01-09 14:03:35 -08002025 // The function used for thread flip.
2026 Closure* flip_function;
Mathieu Chartier12d625f2015-03-13 11:33:37 -07002027
2028 // Current method verifier, used for root marking.
2029 verifier::MethodVerifier* method_verifier;
Hiroshi Yamauchi0b713572015-06-16 18:29:23 -07002030
2031 // Thread-local mark stack for the concurrent copying collector.
2032 gc::accounting::AtomicStack<mirror::Object>* thread_local_mark_stack;
Alex Light848574c2017-09-25 16:59:39 -07002033
2034 // The pending async-exception or null.
2035 mirror::Throwable* async_exception;
Alex Light55eccdf2019-10-07 13:51:13 +00002036
2037 // Top of the linked-list for reflective-handle scopes or null if none.
2038 BaseReflectiveHandleScope* top_reflective_handle_scope;
Ian Rogersdd7624d2014-03-14 17:43:00 -07002039 } tlsPtr_;
2040
Alex Lightbb68fda2018-10-01 13:21:47 -07002041 // Small thread-local cache to be used from the interpreter.
2042 // It is keyed by dex instruction pointer.
2043 // The value is opcode-depended (e.g. field offset).
2044 InterpreterCache interpreter_cache_;
2045
2046 // All fields below this line should not be accessed by native code. This means these fields can
2047 // be modified, rearranged, added or removed without having to modify asm_support.h
2048
Nicolas Geoffray365719c2017-03-08 13:11:50 +00002049 // Guards the 'wait_monitor_' members.
Ian Rogersdd7624d2014-03-14 17:43:00 -07002050 Mutex* wait_mutex_ DEFAULT_MUTEX_ACQUIRED_AFTER;
2051
2052 // Condition variable waited upon during a wait.
2053 ConditionVariable* wait_cond_ GUARDED_BY(wait_mutex_);
Mathieu Chartier2cebb242015-04-21 16:50:40 -07002054 // Pointer to the monitor lock we're currently waiting on or null if not waiting.
Ian Rogersdd7624d2014-03-14 17:43:00 -07002055 Monitor* wait_monitor_ GUARDED_BY(wait_mutex_);
2056
Mathieu Chartierdfe02f62016-02-01 20:15:11 -08002057 // Debug disable read barrier count, only is checked for debug builds and only in the runtime.
2058 uint8_t debug_disallow_read_barrier_ = 0;
2059
Mathieu Chartier3f7f03c2016-09-26 11:39:52 -07002060 // Note that it is not in the packed struct, may not be accessed for cross compilation.
2061 uintptr_t poison_object_cookie_ = 0;
2062
Mathieu Chartier952e1e32016-06-13 14:04:02 -07002063 // Pending extra checkpoints if checkpoint_function_ is already used.
2064 std::list<Closure*> checkpoint_overflow_ GUARDED_BY(Locks::thread_suspend_count_lock_);
2065
Alex Light184f0752018-07-13 11:18:22 -07002066 // Custom TLS field that can be used by plugins or the runtime. Should not be accessed directly by
2067 // compiled code or entrypoints.
Alex Light6e1b7d82021-05-06 09:58:46 -07002068 SafeMap<std::string, std::unique_ptr<TLSData>, std::less<>> custom_tls_
2069 GUARDED_BY(Locks::custom_tls_lock_);
Andreas Gampef26bf2d2017-01-13 16:47:14 -08002070
Andreas Gampe82372002019-07-24 15:42:09 -07002071#ifndef __BIONIC__
Andreas Gampe2be43062019-07-24 16:52:33 -07002072 __attribute__((tls_model("initial-exec")))
Andreas Gampe82372002019-07-24 15:42:09 -07002073 static thread_local Thread* self_tls_;
2074#endif
2075
Alex Lighte9f61032018-09-24 16:04:51 -07002076 // True if the thread is some form of runtime thread (ex, GC or JIT).
2077 bool is_runtime_thread_;
Calin Juravleccd56952016-12-15 17:57:38 +00002078
Orion Hodson01ecfa12019-07-18 12:57:47 +01002079 // Set during execution of JNI methods that get field and method id's as part of determining if
2080 // the caller is allowed to access all fields and methods in the Core Platform API.
2081 uint32_t core_platform_api_cookie_ = 0;
2082
Mathieu Chartier15d34022014-02-26 17:16:38 -08002083 friend class gc::collector::SemiSpace; // For getting stack traces.
Mathieu Chartier692fafd2013-11-29 17:24:40 -08002084 friend class Runtime; // For CreatePeer.
Ian Rogers5cf98192014-05-29 21:31:50 -07002085 friend class QuickExceptionHandler; // For dumping the stack.
Mathieu Chartier692fafd2013-11-29 17:24:40 -08002086 friend class ScopedThreadStateChange;
Mathieu Chartier119c6bd2014-05-09 14:11:47 -07002087 friend class StubTest; // For accessing entrypoints.
Mathieu Chartier692fafd2013-11-29 17:24:40 -08002088 friend class ThreadList; // For ~Thread and Destroy.
2089
Andreas Gampe4352b452014-06-04 18:59:01 -07002090 friend class EntrypointsOrderTest; // To test the order of tls entries.
Vladimir Markocedec9d2021-02-08 16:16:13 +00002091 friend class JniCompilerTest; // For intercepting JNI entrypoint calls.
Andreas Gampe4352b452014-06-04 18:59:01 -07002092
Carl Shapiro0e5d75d2011-07-06 18:28:37 -07002093 DISALLOW_COPY_AND_ASSIGN(Thread);
2094};
Ian Rogersbdb03912011-09-14 00:55:44 -07002095
Mathieu Chartier4e2cb092015-07-22 16:17:51 -07002096class SCOPED_CAPABILITY ScopedAssertNoThreadSuspension {
Mathieu Chartier2d5f39e2014-09-19 17:52:37 -07002097 public:
Mingyao Yangf26828b2017-07-27 12:49:01 -07002098 ALWAYS_INLINE ScopedAssertNoThreadSuspension(const char* cause,
2099 bool enabled = true)
2100 ACQUIRE(Roles::uninterruptible_)
2101 : enabled_(enabled) {
2102 if (!enabled_) {
2103 return;
2104 }
Mathieu Chartier268764d2016-09-13 12:09:38 -07002105 if (kIsDebugBuild) {
2106 self_ = Thread::Current();
2107 old_cause_ = self_->StartAssertNoThreadSuspension(cause);
2108 } else {
2109 Roles::uninterruptible_.Acquire(); // No-op.
2110 }
Mathieu Chartier2d5f39e2014-09-19 17:52:37 -07002111 }
Mathieu Chartier268764d2016-09-13 12:09:38 -07002112 ALWAYS_INLINE ~ScopedAssertNoThreadSuspension() RELEASE(Roles::uninterruptible_) {
Mingyao Yangf26828b2017-07-27 12:49:01 -07002113 if (!enabled_) {
2114 return;
2115 }
Mathieu Chartier268764d2016-09-13 12:09:38 -07002116 if (kIsDebugBuild) {
2117 self_->EndAssertNoThreadSuspension(old_cause_);
2118 } else {
2119 Roles::uninterruptible_.Release(); // No-op.
2120 }
Mathieu Chartier2d5f39e2014-09-19 17:52:37 -07002121 }
2122
2123 private:
Mathieu Chartier268764d2016-09-13 12:09:38 -07002124 Thread* self_;
Mingyao Yangf26828b2017-07-27 12:49:01 -07002125 const bool enabled_;
Mathieu Chartier268764d2016-09-13 12:09:38 -07002126 const char* old_cause_;
Mathieu Chartier2d5f39e2014-09-19 17:52:37 -07002127};
2128
Mathieu Chartierdc540df2019-11-15 17:11:44 -08002129class ScopedAllowThreadSuspension {
2130 public:
2131 ALWAYS_INLINE ScopedAllowThreadSuspension() RELEASE(Roles::uninterruptible_) {
2132 if (kIsDebugBuild) {
2133 self_ = Thread::Current();
2134 old_cause_ = self_->EndAssertNoThreadSuspension();
2135 } else {
2136 Roles::uninterruptible_.Release(); // No-op.
2137 }
2138 }
2139 ALWAYS_INLINE ~ScopedAllowThreadSuspension() ACQUIRE(Roles::uninterruptible_) {
2140 if (kIsDebugBuild) {
2141 CHECK(self_->StartAssertNoThreadSuspension(old_cause_) == nullptr);
2142 } else {
2143 Roles::uninterruptible_.Acquire(); // No-op.
2144 }
2145 }
2146
2147 private:
2148 Thread* self_;
2149 const char* old_cause_;
2150};
2151
2152
Mingyao Yang1f2d3ba2015-05-18 12:12:50 -07002153class ScopedStackedShadowFramePusher {
2154 public:
2155 ScopedStackedShadowFramePusher(Thread* self, ShadowFrame* sf, StackedShadowFrameType type)
2156 : self_(self), type_(type) {
2157 self_->PushStackedShadowFrame(sf, type);
2158 }
2159 ~ScopedStackedShadowFramePusher() {
2160 self_->PopStackedShadowFrame(type_);
2161 }
2162
2163 private:
2164 Thread* const self_;
2165 const StackedShadowFrameType type_;
2166
2167 DISALLOW_COPY_AND_ASSIGN(ScopedStackedShadowFramePusher);
2168};
2169
Mathieu Chartierdfe02f62016-02-01 20:15:11 -08002170// Only works for debug builds.
2171class ScopedDebugDisallowReadBarriers {
2172 public:
2173 explicit ScopedDebugDisallowReadBarriers(Thread* self) : self_(self) {
2174 self_->ModifyDebugDisallowReadBarrier(1);
2175 }
2176 ~ScopedDebugDisallowReadBarriers() {
2177 self_->ModifyDebugDisallowReadBarrier(-1);
2178 }
2179
2180 private:
2181 Thread* const self_;
2182};
2183
Hiroshi Yamauchiee235822016-08-19 17:03:27 -07002184class ScopedTransitioningToRunnable : public ValueObject {
2185 public:
2186 explicit ScopedTransitioningToRunnable(Thread* self)
2187 : self_(self) {
2188 DCHECK_EQ(self, Thread::Current());
2189 if (kUseReadBarrier) {
2190 self_->SetIsTransitioningToRunnable(true);
2191 }
2192 }
2193
2194 ~ScopedTransitioningToRunnable() {
2195 if (kUseReadBarrier) {
2196 self_->SetIsTransitioningToRunnable(false);
2197 }
2198 }
2199
2200 private:
2201 Thread* const self_;
2202};
2203
Andreas Gampe04bbb5b2017-01-19 17:49:03 +00002204class ThreadLifecycleCallback {
2205 public:
2206 virtual ~ThreadLifecycleCallback() {}
2207
2208 virtual void ThreadStart(Thread* self) REQUIRES_SHARED(Locks::mutator_lock_) = 0;
2209 virtual void ThreadDeath(Thread* self) REQUIRES_SHARED(Locks::mutator_lock_) = 0;
2210};
2211
Alex Lightb7c640d2019-03-20 15:52:13 -07002212// Store an exception from the thread and suppress it for the duration of this object.
2213class ScopedExceptionStorage {
2214 public:
2215 explicit ScopedExceptionStorage(Thread* self) REQUIRES_SHARED(Locks::mutator_lock_);
Alex Light79d6c802019-06-27 15:50:11 +00002216 void SuppressOldException(const char* message = "") REQUIRES_SHARED(Locks::mutator_lock_);
Alex Lightb7c640d2019-03-20 15:52:13 -07002217 ~ScopedExceptionStorage() REQUIRES_SHARED(Locks::mutator_lock_);
2218
2219 private:
2220 Thread* self_;
2221 StackHandleScope<1> hs_;
Alex Light79d6c802019-06-27 15:50:11 +00002222 MutableHandle<mirror::Throwable> excp_;
Alex Lightb7c640d2019-03-20 15:52:13 -07002223};
2224
Elliott Hughes330304d2011-08-12 14:28:05 -07002225std::ostream& operator<<(std::ostream& os, const Thread& thread);
Vladimir Marko9974e3c2020-06-10 16:27:06 +01002226std::ostream& operator<<(std::ostream& os, StackedShadowFrameType thread);
Carl Shapiro0e5d75d2011-07-06 18:28:37 -07002227
Carl Shapiro0e5d75d2011-07-06 18:28:37 -07002228} // namespace art
2229
Brian Carlstromfc0e3212013-07-17 14:40:12 -07002230#endif // ART_RUNTIME_THREAD_H_