blob: 8dbed9b7f95cddcc1086adc198dae8e4af0817bf [file] [log] [blame]
Elliott Hughes2faa5f12012-01-30 14:42:07 -08001/*
2 * Copyright (C) 2011 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
Carl Shapiro1fb86202011-06-27 17:43:13 -070016
Brian Carlstrom578bbdc2011-07-21 14:07:47 -070017#include "runtime.h"
Carl Shapiro1fb86202011-06-27 17:43:13 -070018
Brian Carlstrombd86bcc2013-03-10 20:26:16 -070019// sys/mount.h has to come before linux/fs.h due to redefinition of MS_RDONLY, MS_BIND, etc
20#include <sys/mount.h>
Ian Rogersc5f17732014-06-05 20:48:42 -070021#ifdef __linux__
Brian Carlstrombd86bcc2013-03-10 20:26:16 -070022#include <linux/fs.h>
Hiroshi Yamauchi6ffb9cc2015-08-31 15:14:17 -070023#include <sys/prctl.h>
Ian Rogersc5f17732014-06-05 20:48:42 -070024#endif
Brian Carlstrombd86bcc2013-03-10 20:26:16 -070025
Andreas Gampe8cf9cb32017-07-19 09:28:38 -070026#include <fcntl.h>
Brian Carlstromdbf05b72011-12-15 00:55:24 -080027#include <signal.h>
Elliott Hughesd06a6c72012-05-30 17:59:06 -070028#include <sys/syscall.h>
Andreas Gampe8cf9cb32017-07-19 09:28:38 -070029
David Sehrd106d9f2016-08-16 19:22:57 -070030#if defined(__APPLE__)
31#include <crt_externs.h> // for _NSGetEnviron
32#endif
Brian Carlstromdbf05b72011-12-15 00:55:24 -080033
Elliott Hughesffe67362011-07-17 12:09:27 -070034#include <cstdio>
35#include <cstdlib>
Brian Carlstrom8a436592011-08-15 21:27:23 -070036#include <limits>
Calin Juravlec2753e62021-06-25 15:34:09 -070037#include <string.h>
Mathieu Chartierada33d72018-12-17 13:17:30 -080038#include <thread>
Alex Lightabd8f052019-12-06 10:49:17 -080039#include <unordered_set>
Carl Shapiro2ed144c2011-07-26 16:52:08 -070040#include <vector>
Elliott Hughesffe67362011-07-17 12:09:27 -070041
Andreas Gampe9186ced2016-12-12 14:28:21 -080042#include "android-base/strings.h"
43
Chang Xing605fe242017-07-20 15:57:21 -070044#include "aot_class_linker.h"
Ian Rogers166db042013-07-26 12:05:57 -070045#include "arch/arm/registers_arm.h"
Stuart Monteithb95a5342014-03-12 13:32:32 +000046#include "arch/arm64/registers_arm64.h"
Andreas Gampee5d23982019-01-08 10:34:26 -080047#include "arch/context.h"
Ian Rogersd582fa42014-11-05 23:46:43 -080048#include "arch/instruction_set_features.h"
Ian Rogers166db042013-07-26 12:05:57 -070049#include "arch/x86/registers_x86.h"
Ian Rogersef7d42f2014-01-06 12:55:46 -080050#include "arch/x86_64/registers_x86_64.h"
Mathieu Chartierc7853442015-03-27 14:35:38 -070051#include "art_field-inl.h"
Mathieu Chartiere401d142015-04-22 13:56:20 -070052#include "art_method-inl.h"
Ian Rogers1d8cdbc2014-09-22 22:51:09 -070053#include "asm_support.h"
Andreas Gampe39b378c2017-12-07 15:44:13 -080054#include "base/aborting.h"
Andreas Gampe4585f872015-03-27 23:45:15 -070055#include "base/arena_allocator.h"
David Sehrc431b9d2018-03-02 12:01:51 -080056#include "base/atomic.h"
Ian Rogersc7dd2952014-10-21 23:31:19 -070057#include "base/dumpable.h"
Andreas Gampe542451c2016-07-26 09:02:02 -070058#include "base/enums.h"
David Sehr891a50e2017-10-27 17:01:07 -070059#include "base/file_utils.h"
Calin Juravle09eacd92021-05-19 17:03:55 -070060#include "base/flags.h"
David Sehr3215fff2018-04-03 17:10:12 -070061#include "base/malloc_arena_pool.h"
62#include "base/mem_map_arena_pool.h"
Andreas Gampe8cf9cb32017-07-19 09:28:38 -070063#include "base/memory_tool.h"
David Sehrc431b9d2018-03-02 12:01:51 -080064#include "base/mutex.h"
65#include "base/os.h"
66#include "base/quasi_atomic.h"
David Brazdil2bb2fbd2018-11-13 18:24:26 +000067#include "base/sdk_version.h"
Vladimir Marko637ee0b2015-09-04 12:47:41 +010068#include "base/stl_util.h"
Mathieu Chartier32ce2ad2016-03-04 14:58:03 -080069#include "base/systrace.h"
Ian Rogers1d8cdbc2014-09-22 22:51:09 -070070#include "base/unix_file/fd_file.h"
David Sehrc431b9d2018-03-02 12:01:51 -080071#include "base/utils.h"
Vladimir Marko3481ba22015-04-13 12:22:36 +010072#include "class_linker-inl.h"
Vladimir Marko5868ada2020-05-12 11:50:34 +010073#include "class_root-inl.h"
Andreas Gampe4585f872015-03-27 23:45:15 -070074#include "compiler_callbacks.h"
Elliott Hughes3bb81562011-10-21 18:52:59 -070075#include "debugger.h"
David Sehr013fd802018-01-11 22:55:24 -080076#include "dex/art_dex_file_loader.h"
David Sehr9e734c72018-01-04 17:56:19 -080077#include "dex/dex_file_loader.h"
Alex Light84d76052014-08-22 17:49:35 -070078#include "elf_file.h"
Ian Rogers6f3dbba2014-10-14 17:41:57 -070079#include "entrypoints/runtime_asm_entrypoints.h"
Alex Lighteb7c1442015-08-31 13:17:42 -070080#include "experimental_flags.h"
Ian Rogers576ca0c2014-06-06 15:58:22 -070081#include "fault_handler.h"
Ian Rogers1d54e732013-05-02 21:10:01 -070082#include "gc/accounting/card_table-inl.h"
83#include "gc/heap.h"
Andreas Gampefda57142016-09-08 20:29:18 -070084#include "gc/scoped_gc_critical_section.h"
Ian Rogerse63db272014-07-15 15:36:11 -070085#include "gc/space/image_space.h"
Mathieu Chartier461687d2015-03-31 12:05:24 -070086#include "gc/space/space-inl.h"
Andreas Gampefda57142016-09-08 20:29:18 -070087#include "gc/system_weak.h"
Mathieu Chartierad390fa2019-10-16 20:03:00 -070088#include "gc/task_processor.h"
Brian Carlstrom02c5f4d2015-01-30 10:18:03 -080089#include "handle_scope-inl.h"
Andreas Gampeaa120012018-03-28 16:23:24 -070090#include "hidden_api.h"
Mathieu Chartier4a26f172016-01-26 14:26:18 -080091#include "image-inl.h"
jeffhao725a9572012-11-13 18:20:12 -080092#include "instrumentation.h"
Mathieu Chartier74ccee62018-10-10 10:30:29 -070093#include "intern_table-inl.h"
Mathieu Chartiere5f13e52015-02-24 09:37:21 -080094#include "interpreter/interpreter.h"
95#include "jit/jit.h"
Nicolas Geoffray132d8362016-11-16 09:19:42 +000096#include "jit/jit_code_cache.h"
Steven Morelande431e272017-07-18 16:53:49 -070097#include "jit/profile_saver.h"
Vladimir Markoa3ad0cd2018-05-04 10:06:38 +010098#include "jni/java_vm_ext.h"
Alex Light79d6c802019-06-27 15:50:11 +000099#include "jni/jni_id_manager.h"
Alex Light79d6c802019-06-27 15:50:11 +0000100#include "jni_id_type.h"
Mathieu Chartierc7853442015-03-27 14:35:38 -0700101#include "linear_alloc.h"
Andreas Gampe8cf9cb32017-07-19 09:28:38 -0700102#include "memory_representation.h"
Brian Carlstrom02c5f4d2015-01-30 10:18:03 -0800103#include "mirror/array.h"
Andreas Gampe70f5fd02018-10-24 19:58:37 -0700104#include "mirror/class-alloc-inl.h"
Ian Rogers62d6c772013-02-27 08:32:07 -0800105#include "mirror/class-inl.h"
Alex Lightcec2fd42016-11-02 16:32:07 -0700106#include "mirror/class_ext.h"
Alex Lightabd8f052019-12-06 10:49:17 -0800107#include "mirror/class_loader-inl.h"
Narayan Kamath000e1882016-10-24 17:14:25 +0100108#include "mirror/emulated_stack_frame.h"
Mathieu Chartierdaaf3262015-03-24 13:30:28 -0700109#include "mirror/field.h"
Mathieu Chartierfc58af42015-04-16 18:00:39 -0700110#include "mirror/method.h"
Narayan Kamathafa48272016-08-03 12:46:58 +0100111#include "mirror/method_handle_impl.h"
Orion Hodsonc069a302017-01-18 09:23:12 +0000112#include "mirror/method_handles_lookup.h"
Narayan Kamathafa48272016-08-03 12:46:58 +0100113#include "mirror/method_type.h"
Mathieu Chartierc528dba2013-11-26 12:00:11 -0800114#include "mirror/stack_trace_element.h"
Ian Rogers2dd0e2c2013-01-24 12:42:14 -0800115#include "mirror/throwable.h"
Orion Hodson928033d2018-02-07 05:30:54 +0000116#include "mirror/var_handle.h"
Elliott Hughes32d6e1e2011-10-11 14:47:44 -0700117#include "monitor.h"
Andreas Gampe277ccbd2014-11-03 21:36:10 -0800118#include "native/dalvik_system_DexFile.h"
Dan Zimmermanb682ea42019-12-23 06:59:06 -0800119#include "native/dalvik_system_BaseDexClassLoader.h"
Andreas Gampe277ccbd2014-11-03 21:36:10 -0800120#include "native/dalvik_system_VMDebug.h"
121#include "native/dalvik_system_VMRuntime.h"
122#include "native/dalvik_system_VMStack.h"
123#include "native/dalvik_system_ZygoteHooks.h"
124#include "native/java_lang_Class.h"
Andreas Gampe277ccbd2014-11-03 21:36:10 -0800125#include "native/java_lang_Object.h"
Andreas Gampe277ccbd2014-11-03 21:36:10 -0800126#include "native/java_lang_String.h"
Jeff Hao848f70a2014-01-15 13:49:50 -0800127#include "native/java_lang_StringFactory.h"
Andreas Gampe277ccbd2014-11-03 21:36:10 -0800128#include "native/java_lang_System.h"
129#include "native/java_lang_Thread.h"
130#include "native/java_lang_Throwable.h"
131#include "native/java_lang_VMClassLoader.h"
Narayan Kamathbd2fed52017-01-25 10:46:54 +0000132#include "native/java_lang_invoke_MethodHandleImpl.h"
Brian Carlstrom02c5f4d2015-01-30 10:18:03 -0800133#include "native/java_lang_ref_FinalizerReference.h"
134#include "native/java_lang_ref_Reference.h"
135#include "native/java_lang_reflect_Array.h"
136#include "native/java_lang_reflect_Constructor.h"
Neil Fuller0e844392016-09-08 13:43:31 +0100137#include "native/java_lang_reflect_Executable.h"
Brian Carlstrom02c5f4d2015-01-30 10:18:03 -0800138#include "native/java_lang_reflect_Field.h"
139#include "native/java_lang_reflect_Method.h"
Neil Fuller60458a02016-09-01 15:32:44 +0100140#include "native/java_lang_reflect_Parameter.h"
Brian Carlstrom02c5f4d2015-01-30 10:18:03 -0800141#include "native/java_lang_reflect_Proxy.h"
Andreas Gampe277ccbd2014-11-03 21:36:10 -0800142#include "native/java_util_concurrent_atomic_AtomicLong.h"
Jeff Hao848f70a2014-01-15 13:49:50 -0800143#include "native/libcore_util_CharsetUtils.h"
Andreas Gampe277ccbd2014-11-03 21:36:10 -0800144#include "native/org_apache_harmony_dalvik_ddmc_DdmServer.h"
145#include "native/org_apache_harmony_dalvik_ddmc_DdmVmInternal.h"
146#include "native/sun_misc_Unsafe.h"
Brian Carlstrom02c5f4d2015-01-30 10:18:03 -0800147#include "native_bridge_art_interface.h"
Andreas Gampe5dd44d02016-08-02 17:20:03 -0700148#include "native_stack_dump.h"
Andreas Gampe373a9b52017-10-18 09:01:57 -0700149#include "nativehelper/scoped_local_ref.h"
Vladimir Markod3d00c02019-11-07 15:09:07 +0000150#include "oat.h"
Mathieu Chartierf9c6fc62015-10-07 11:44:05 -0700151#include "oat_file_manager.h"
Nicolas Geoffray00391822019-12-10 10:17:23 +0000152#include "oat_quick_method_header.h"
Andreas Gamped482e732017-04-24 17:59:09 -0700153#include "object_callbacks.h"
Orion Hodsonbaf563d2021-04-08 07:53:54 +0100154#include "odr_statslog/odr_statslog.h"
Brian Carlstrom02c5f4d2015-01-30 10:18:03 -0800155#include "parsed_options.h"
Vladimir Marko7624d252014-05-02 14:40:15 +0100156#include "quick/quick_method_frame_info.h"
Ian Rogers53b8b092014-03-13 23:45:53 -0700157#include "reflection.h"
Andreas Gampeac30fa22017-01-18 21:02:36 -0800158#include "runtime_callbacks.h"
Andreas Gampe87648602019-06-12 12:34:26 -0700159#include "runtime_common.h"
Orion Hodson26ef34c2017-11-01 13:32:41 +0000160#include "runtime_intrinsics.h"
Igor Murashkinaaebaa02015-01-26 10:55:53 -0800161#include "runtime_options.h"
Mathieu Chartier0795f232016-09-27 18:43:30 -0700162#include "scoped_thread_state_change-inl.h"
Dave Allisoncefcea82014-09-16 10:01:01 -0700163#include "sigchain.h"
Elliott Hughese27955c2011-08-26 15:21:24 -0700164#include "signal_catcher.h"
Elliott Hughes457005c2012-04-16 13:54:25 -0700165#include "signal_set.h"
Brian Carlstrom578bbdc2011-07-21 14:07:47 -0700166#include "thread.h"
Elliott Hughes8daa0922011-09-11 13:46:25 -0700167#include "thread_list.h"
Alex Light7233c7e2016-07-28 10:07:45 -0700168#include "ti/agent.h"
jeffhaob5e81852012-03-12 11:15:45 -0700169#include "trace.h"
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +0100170#include "transaction.h"
Vladimir Marko97d7e1c2016-10-04 14:44:28 +0100171#include "vdex_file.h"
Andreas Gampea43ba3d2019-03-13 15:49:20 -0700172#include "verifier/class_verifier.h"
Elliott Hugheseac76672012-05-24 21:56:51 -0700173#include "well_known_classes.h"
Carl Shapiro61e019d2011-07-14 16:53:09 -0700174
David Sehrf57589f2016-10-17 10:09:33 -0700175#ifdef ART_TARGET_ANDROID
176#include <android/set_abort_message.h>
Nicolas Geoffrayd3c45c22021-04-27 13:21:28 +0100177#include "com_android_apex.h"
178namespace apex = com::android::apex;
179
David Sehrf57589f2016-10-17 10:09:33 -0700180#endif
181
David Srbecky50b47432018-10-18 12:26:34 +0100182// Static asserts to check the values of generated assembly-support macros.
183#define ASM_DEFINE(NAME, EXPR) static_assert((NAME) == (EXPR), "Unexpected value of " #NAME);
184#include "asm_defines.def"
185#undef ASM_DEFINE
186
Carl Shapiro1fb86202011-06-27 17:43:13 -0700187namespace art {
188
Ian Rogers6f3dbba2014-10-14 17:41:57 -0700189// If a signal isn't handled properly, enable a handler that attempts to dump the Java stack.
Brian Carlstromb57f1c72014-10-08 13:56:25 -0700190static constexpr bool kEnableJavaStackTraceHandler = false;
Mathieu Chartier32cc9ee2015-10-15 09:19:15 -0700191// Tuned by compiling GmsCore under perf and measuring time spent in DescriptorEquals for class
192// linking.
193static constexpr double kLowMemoryMinLoadFactor = 0.5;
194static constexpr double kLowMemoryMaxLoadFactor = 0.8;
195static constexpr double kNormalMinLoadFactor = 0.4;
196static constexpr double kNormalMaxLoadFactor = 0.7;
Mathieu Chartier11c273d2017-10-15 20:54:45 -0700197
198// Extra added to the default heap growth multiplier. Used to adjust the GC ergonomics for the read
199// barrier config.
200static constexpr double kExtraDefaultHeapGrowthMultiplier = kUseReadBarrier ? 1.0 : 0.0;
201
Ian Rogers6f3dbba2014-10-14 17:41:57 -0700202Runtime* Runtime::instance_ = nullptr;
Carl Shapiro2ed144c2011-07-26 16:52:08 -0700203
Andreas Gampef6a780a2015-04-02 18:51:05 -0700204struct TraceConfig {
205 Trace::TraceMode trace_mode;
206 Trace::TraceOutputMode trace_output_mode;
207 std::string trace_file;
208 size_t trace_file_size;
209};
210
David Sehrd106d9f2016-08-16 19:22:57 -0700211namespace {
Andreas Gampea2fed082019-02-01 09:34:43 -0800212
David Sehrd106d9f2016-08-16 19:22:57 -0700213#ifdef __APPLE__
214inline char** GetEnviron() {
215 // When Google Test is built as a framework on MacOS X, the environ variable
216 // is unavailable. Apple's documentation (man environ) recommends using
217 // _NSGetEnviron() instead.
218 return *_NSGetEnviron();
219}
220#else
221// Some POSIX platforms expect you to declare environ. extern "C" makes
222// it reside in the global namespace.
223extern "C" char** environ;
224inline char** GetEnviron() { return environ; }
225#endif
Andreas Gampea2fed082019-02-01 09:34:43 -0800226
227void CheckConstants() {
228 CHECK_EQ(mirror::Array::kFirstElementOffset, mirror::Array::FirstElementOffset());
229}
230
David Sehrd106d9f2016-08-16 19:22:57 -0700231} // namespace
232
Elliott Hughesdcc24742011-09-07 14:02:44 -0700233Runtime::Runtime()
Mathieu Chartier31000802015-06-14 14:14:37 -0700234 : resolution_method_(nullptr),
235 imt_conflict_method_(nullptr),
236 imt_unimplemented_method_(nullptr),
Vladimir Marko33bff252017-11-01 14:35:42 +0000237 instruction_set_(InstructionSet::kNone),
Ian Rogers6ed19fd2014-03-20 08:10:17 -0700238 compiler_callbacks_(nullptr),
Elliott Hughesd9c67be2012-02-02 19:54:06 -0800239 is_zygote_(false),
Nicolas Geoffray4444f1b2019-06-10 14:09:19 +0100240 is_primary_zygote_(false),
Nicolas Geoffray9ac09ee2019-05-08 23:38:27 +0100241 is_system_server_(false),
Alex Lighta59dd802014-07-02 16:28:08 -0700242 must_relocate_(false),
Mathieu Chartier069387a2012-06-18 12:01:01 -0700243 is_concurrent_gc_enabled_(true),
Anwar Ghuloum87183592013-08-14 12:12:19 -0700244 is_explicit_gc_disabled_(false),
Alex Light64ad14d2014-08-19 14:23:13 -0700245 image_dex2oat_enabled_(true),
Elliott Hughes6cf23882012-06-15 15:42:07 -0700246 default_stack_size_(0),
Ian Rogersef7d42f2014-01-06 12:55:46 -0800247 heap_(nullptr),
Ian Rogersd9c4fc92013-10-01 19:45:43 -0700248 max_spins_before_thin_lock_inflation_(Monitor::kDefaultMaxSpinsBeforeThinLockInflation),
Ian Rogersef7d42f2014-01-06 12:55:46 -0800249 monitor_list_(nullptr),
250 monitor_pool_(nullptr),
251 thread_list_(nullptr),
252 intern_table_(nullptr),
253 class_linker_(nullptr),
254 signal_catcher_(nullptr),
255 java_vm_(nullptr),
Mathieu Chartierada33d72018-12-17 13:17:30 -0800256 thread_pool_ref_count_(0u),
Andreas Gampe44f67602018-11-28 08:27:27 -0800257 fault_message_(nullptr),
Ian Rogers120f1c72012-09-28 17:17:10 -0700258 threads_being_born_(0),
Ian Rogersc604d732012-10-14 16:09:54 -0700259 shutdown_cond_(new ConditionVariable("Runtime shutdown", *Locks::runtime_shutdown_lock_)),
Elliott Hughes6b355752012-01-13 16:49:08 -0800260 shutting_down_(false),
Ian Rogers120f1c72012-09-28 17:17:10 -0700261 shutting_down_started_(false),
Elliott Hughesdcc24742011-09-07 14:02:44 -0700262 started_(false),
Mathieu Chartier7664f5c2012-06-08 18:15:32 -0700263 finished_starting_(false),
Ian Rogersef7d42f2014-01-06 12:55:46 -0800264 vfprintf_(nullptr),
265 exit_(nullptr),
266 abort_(nullptr),
jeffhao2692b572011-12-16 15:42:28 -0800267 stats_enabled_(false),
Roland Levillain05e34f42018-05-24 13:19:05 +0000268 is_running_on_memory_tool_(kRunningOnMemoryTool),
Ian Rogers62d6c772013-02-27 08:32:07 -0800269 instrumentation_(),
Ian Rogersef7d42f2014-01-06 12:55:46 -0800270 main_thread_group_(nullptr),
271 system_thread_group_(nullptr),
272 system_class_loader_(nullptr),
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +0100273 dump_gc_performance_on_shutdown_(false),
Chang Xing605fe242017-07-20 15:57:21 -0700274 preinitialization_transactions_(),
Igor Murashkin7617abd2015-07-10 18:27:47 -0700275 verify_(verifier::VerifyMode::kNone),
David Brazdil2bb2fbd2018-11-13 18:24:26 +0000276 target_sdk_version_(static_cast<uint32_t>(SdkVersion::kUnset)),
Andrei Onea037d2822020-11-19 00:20:04 +0000277 compat_framework_(),
Dave Allison69dfe512014-07-11 17:11:58 +0000278 implicit_null_checks_(false),
279 implicit_so_checks_(false),
Calin Juravle07d83c72014-10-22 21:02:23 +0100280 implicit_suspend_checks_(false),
Calin Juravle01aaf6e2015-06-19 22:05:39 +0100281 no_sig_chain_(false),
Andreas Gampef38a6612016-04-11 08:42:26 -0700282 force_native_bridge_(false),
Narayan Kamath5a2be3f2015-02-16 13:51:51 +0000283 is_native_bridge_loaded_(false),
David Srbeckyf4480162016-03-16 00:06:24 +0000284 is_native_debuggable_(false),
Alex Light7919db92017-11-29 09:00:55 -0800285 async_exceptions_thrown_(false),
Alex Light0aa7a5a2018-10-10 15:58:14 +0000286 non_standard_exits_enabled_(false),
Nicolas Geoffray433b79a2017-01-30 20:54:45 +0000287 is_java_debuggable_(false),
wangguibo0d290722021-04-24 11:27:06 +0800288 monitor_timeout_enable_(false),
289 monitor_timeout_ns_(0),
Igor Murashkin158f35c2015-06-10 15:55:30 -0700290 zygote_max_failed_boots_(0),
Mathieu Chartier32cc9ee2015-10-15 09:19:15 -0700291 experimental_flags_(ExperimentalFlags::kNone),
292 oat_file_manager_(nullptr),
Nicolas Geoffray787ae8e2015-11-05 11:32:24 +0000293 is_low_memory_mode_(false),
Jagadeesh Pakaravoor06541532021-02-22 21:19:09 -0800294 madvise_willneed_vdex_filesize_(0),
295 madvise_willneed_odex_filesize_(0),
296 madvise_willneed_art_filesize_(0),
Andreas Gampea1425a12016-03-11 17:44:04 -0800297 safe_mode_(false),
David Brazdilf50ac102018-10-17 18:00:06 +0100298 hidden_api_policy_(hiddenapi::EnforcementPolicy::kDisabled),
David Brazdil6dfdfef2019-04-11 17:39:11 +0100299 core_platform_api_policy_(hiddenapi::EnforcementPolicy::kDisabled),
satayev09efc162021-02-22 17:24:57 +0000300 test_api_policy_(hiddenapi::EnforcementPolicy::kDisabled),
David Brazdilee7d2fd2018-01-20 17:25:23 +0000301 dedupe_hidden_api_warnings_(true),
Mathew Inwood1fd97f22018-04-03 15:32:32 +0100302 hidden_api_access_event_log_rate_(0),
Nicolas Geoffray6ee49712018-03-30 14:39:05 +0000303 dump_native_stack_on_sig_quit_(true),
Mathieu Chartierf8cb1782016-03-18 18:45:41 -0700304 // Initially assume we perceive jank in case the process state is never updated.
Andreas Gampef38a6612016-04-11 08:42:26 -0700305 process_state_(kProcessStateJankPerceptible),
Andreas Gampe0b0ffc12018-08-01 14:41:27 -0700306 zygote_no_threads_(false),
Andreas Gamped84794d2019-07-18 13:40:03 -0700307 verifier_logging_threshold_ms_(100),
Florian Mayer0972d082020-05-15 14:07:31 +0200308 verifier_missing_kthrow_fatal_(false),
Wessam Hassaneinb5a10be2020-11-11 16:42:52 -0800309 perfetto_hprof_enabled_(false),
310 perfetto_javaheapprof_enabled_(false) {
Andreas Gampe8228cdf2017-05-30 15:03:54 -0700311 static_assert(Runtime::kCalleeSaveSize ==
312 static_cast<uint32_t>(CalleeSaveType::kLastCalleeSaveType), "Unexpected size");
Andreas Gampea2fed082019-02-01 09:34:43 -0800313 CheckConstants();
Andreas Gampe8228cdf2017-05-30 15:03:54 -0700314
Mathieu Chartiere401d142015-04-22 13:56:20 -0700315 std::fill(callee_save_methods_, callee_save_methods_ + arraysize(callee_save_methods_), 0u);
buzbee1452bee2015-03-06 14:43:04 -0800316 interpreter::CheckInterpreterAsmConstants();
Andreas Gampeac30fa22017-01-18 21:02:36 -0800317 callbacks_.reset(new RuntimeCallbacks());
Nicolas Geoffray4e92c3c2017-05-08 09:34:26 +0100318 for (size_t i = 0; i <= static_cast<size_t>(DeoptimizationKind::kLast); ++i) {
319 deoptimization_counts_[i] = 0u;
320 }
Elliott Hughesdcc24742011-09-07 14:02:44 -0700321}
322
Carl Shapiro61e019d2011-07-14 16:53:09 -0700323Runtime::~Runtime() {
Mathieu Chartier32ce2ad2016-03-04 14:58:03 -0800324 ScopedTrace trace("Runtime shutdown");
Calin Juravle07d83c72014-10-22 21:02:23 +0100325 if (is_native_bridge_loaded_) {
326 UnloadNativeBridge();
327 }
Calin Juravle31f2c152015-10-23 17:56:15 +0100328
Ian Rogers120f1c72012-09-28 17:17:10 -0700329 Thread* self = Thread::Current();
Mathieu Chartier05d14612015-02-23 15:31:58 -0800330 const bool attach_shutdown_thread = self == nullptr;
331 if (attach_shutdown_thread) {
Alex Lightb6f34642018-01-04 11:01:48 -0800332 // We can only create a peer if the runtime is actually started. This is only not true during
Alex Lighte44ee0c2018-01-08 10:26:17 -0800333 // some tests. If there is extreme memory pressure the allocation of the thread peer can fail.
334 // In this case we will just try again without allocating a peer so that shutdown can continue.
335 // Very few things are actually capable of distinguishing between the peer & peerless states so
336 // this should be fine.
337 bool thread_attached = AttachCurrentThread("Shutdown thread",
Andreas Gampe98ea9d92018-10-19 14:06:15 -0700338 /* as_daemon= */ false,
Alex Lighte44ee0c2018-01-08 10:26:17 -0800339 GetSystemThreadGroup(),
Andreas Gampe98ea9d92018-10-19 14:06:15 -0700340 /* create_peer= */ IsStarted());
Alex Lighte44ee0c2018-01-08 10:26:17 -0800341 if (UNLIKELY(!thread_attached)) {
342 LOG(WARNING) << "Failed to attach shutdown thread. Trying again without a peer.";
343 CHECK(AttachCurrentThread("Shutdown thread (no java peer)",
Andreas Gampe98ea9d92018-10-19 14:06:15 -0700344 /* as_daemon= */ false,
345 /* thread_group=*/ nullptr,
346 /* create_peer= */ false));
Alex Lighte44ee0c2018-01-08 10:26:17 -0800347 }
Mathieu Chartiercef50f02014-12-09 17:38:52 -0800348 self = Thread::Current();
349 } else {
350 LOG(WARNING) << "Current thread not detached in Runtime shutdown";
351 }
352
Mathieu Chartier1d495012017-04-11 17:50:00 -0700353 if (dump_gc_performance_on_shutdown_) {
Albert Mingkun Yang6e0d3252018-12-10 15:22:45 +0000354 heap_->CalculatePreGcWeightedAllocatedBytes();
Albert Mingkun Yang2d7329b2018-11-30 19:58:18 +0000355 uint64_t process_cpu_end_time = ProcessCpuNanoTime();
Mathieu Chartierb0042b82017-12-13 13:50:36 -0800356 ScopedLogSeverity sls(LogSeverity::INFO);
Mathieu Chartier1d495012017-04-11 17:50:00 -0700357 // This can't be called from the Heap destructor below because it
358 // could call RosAlloc::InspectAll() which needs the thread_list
359 // to be still alive.
360 heap_->DumpGcPerformanceInfo(LOG_STREAM(INFO));
Albert Mingkun Yangd6e178e2018-11-19 12:58:30 +0000361
Albert Mingkun Yang2d7329b2018-11-30 19:58:18 +0000362 uint64_t process_cpu_time = process_cpu_end_time - heap_->GetProcessCpuStartTime();
Albert Mingkun Yangd6e178e2018-11-19 12:58:30 +0000363 uint64_t gc_cpu_time = heap_->GetTotalGcCpuTime();
364 float ratio = static_cast<float>(gc_cpu_time) / process_cpu_time;
365 LOG_STREAM(INFO) << "GC CPU time " << PrettyDuration(gc_cpu_time)
366 << " out of process CPU time " << PrettyDuration(process_cpu_time)
367 << " (" << ratio << ")"
368 << "\n";
Albert Mingkun Yang6e0d3252018-12-10 15:22:45 +0000369 double pre_gc_weighted_allocated_bytes =
370 heap_->GetPreGcWeightedAllocatedBytes() / process_cpu_time;
Albert Mingkun Yang1c0ae842019-01-11 16:52:24 +0000371 // Here we don't use process_cpu_time for normalization, because VM shutdown is not a real
372 // GC. Both numerator and denominator take into account until the end of the last GC,
373 // instead of the whole process life time like pre_gc_weighted_allocated_bytes.
Albert Mingkun Yang6e0d3252018-12-10 15:22:45 +0000374 double post_gc_weighted_allocated_bytes =
Albert Mingkun Yang1c0ae842019-01-11 16:52:24 +0000375 heap_->GetPostGcWeightedAllocatedBytes() /
376 (heap_->GetPostGCLastProcessCpuTime() - heap_->GetProcessCpuStartTime());
Albert Mingkun Yang6e0d3252018-12-10 15:22:45 +0000377
Albert Mingkun Yang16bd6ac2018-12-19 17:55:23 +0000378 LOG_STREAM(INFO) << "Average bytes allocated at GC start, weighted by CPU time between GCs: "
379 << static_cast<uint64_t>(pre_gc_weighted_allocated_bytes)
Albert Mingkun Yang6e0d3252018-12-10 15:22:45 +0000380 << " (" << PrettySize(pre_gc_weighted_allocated_bytes) << ")";
Albert Mingkun Yang16bd6ac2018-12-19 17:55:23 +0000381 LOG_STREAM(INFO) << "Average bytes allocated at GC end, weighted by CPU time between GCs: "
382 << static_cast<uint64_t>(post_gc_weighted_allocated_bytes)
Albert Mingkun Yang6e0d3252018-12-10 15:22:45 +0000383 << " (" << PrettySize(post_gc_weighted_allocated_bytes) << ")"
Albert Mingkun Yang2d7329b2018-11-30 19:58:18 +0000384 << "\n";
Mathieu Chartier1d495012017-04-11 17:50:00 -0700385 }
386
David Brazdil331a5e12019-04-01 22:46:16 +0000387 // Wait for the workers of thread pools to be created since there can't be any
388 // threads attaching during shutdown.
Mathieu Chartierada33d72018-12-17 13:17:30 -0800389 WaitForThreadPoolWorkersToStart();
Calin Juravlea345d312017-03-14 18:45:55 -0700390 if (jit_ != nullptr) {
Mathieu Chartier93c21ba2018-12-10 13:08:30 -0800391 jit_->WaitForWorkersToBeCreated();
Calin Juravlea345d312017-03-14 18:45:55 -0700392 // Stop the profile saver thread before marking the runtime as shutting down.
393 // The saver will try to dump the profiles before being sopped and that
394 // requires holding the mutator lock.
395 jit_->StopProfileSaver();
Nicolas Geoffray714fad62019-06-27 15:32:00 +0100396 // Delete thread pool before the thread list since we don't want to wait forever on the
397 // JIT compiler threads. Also this should be run before marking the runtime
398 // as shutting down as some tasks may require mutator access.
399 jit_->DeleteThreadPool();
Calin Juravlea345d312017-03-14 18:45:55 -0700400 }
David Brazdil331a5e12019-04-01 22:46:16 +0000401 if (oat_file_manager_ != nullptr) {
402 oat_file_manager_->WaitForWorkersToBeCreated();
403 }
Calin Juravlea345d312017-03-14 18:45:55 -0700404
Ian Rogers120f1c72012-09-28 17:17:10 -0700405 {
Mathieu Chartier32ce2ad2016-03-04 14:58:03 -0800406 ScopedTrace trace2("Wait for shutdown cond");
Ian Rogers120f1c72012-09-28 17:17:10 -0700407 MutexLock mu(self, *Locks::runtime_shutdown_lock_);
408 shutting_down_started_ = true;
409 while (threads_being_born_ > 0) {
Ian Rogersc604d732012-10-14 16:09:54 -0700410 shutdown_cond_->Wait(self);
Ian Rogers120f1c72012-09-28 17:17:10 -0700411 }
Hans Boehm70aa29e2021-08-11 12:11:19 -0700412 SetShuttingDown();
Ian Rogers120f1c72012-09-28 17:17:10 -0700413 }
Mathieu Chartiercef50f02014-12-09 17:38:52 -0800414 // Shutdown and wait for the daemons.
415 CHECK(self != nullptr);
416 if (IsFinishedStarting()) {
Mathieu Chartier32ce2ad2016-03-04 14:58:03 -0800417 ScopedTrace trace2("Waiting for Daemons");
Mathieu Chartiercef50f02014-12-09 17:38:52 -0800418 self->ClearException();
419 self->GetJniEnv()->CallStaticVoidMethod(WellKnownClasses::java_lang_Daemons,
420 WellKnownClasses::java_lang_Daemons_stop);
421 }
Mathieu Chartier673ed3d2015-08-28 14:56:43 -0700422
Nicolas Geoffray21b65682019-03-12 00:49:45 +0000423 // Shutdown any trace running.
Mathieu Chartier673ed3d2015-08-28 14:56:43 -0700424 Trace::Shutdown();
425
Hans Boehm65c18a22020-01-03 23:37:13 +0000426 // Report death. Clients may require a working thread, still, so do it before GC completes and
Andreas Gampe48864112017-01-19 17:23:17 -0800427 // all non-daemon threads are done.
428 {
429 ScopedObjectAccess soa(self);
430 callbacks_->NextRuntimePhase(RuntimePhaseCallback::RuntimePhase::kDeath);
431 }
432
Mathieu Chartier05d14612015-02-23 15:31:58 -0800433 if (attach_shutdown_thread) {
434 DetachCurrentThread();
435 self = nullptr;
436 }
Mathieu Chartiercef50f02014-12-09 17:38:52 -0800437
Mathieu Chartiera6399032012-06-11 18:49:50 -0700438 // Make sure to let the GC complete if it is running.
Mathieu Chartier89a201e2014-05-02 10:27:26 -0700439 heap_->WaitForGcToComplete(gc::kGcCauseBackground, self);
Mathieu Chartier35883cc2012-11-13 14:08:12 -0800440 heap_->DeleteThreadPool();
David Brazdil331a5e12019-04-01 22:46:16 +0000441 if (oat_file_manager_ != nullptr) {
442 oat_file_manager_->DeleteThreadPool();
443 }
Mathieu Chartierada33d72018-12-17 13:17:30 -0800444 DeleteThreadPool();
445 CHECK(thread_pool_ == nullptr);
Mathieu Chartiera6399032012-06-11 18:49:50 -0700446
Andreas Gampec4bed162017-05-01 13:46:24 -0700447 // Make sure our internal threads are dead before we start tearing down things they're using.
Alex Light40320712017-12-14 11:52:04 -0800448 GetRuntimeCallbacks()->StopDebugger();
Hans Boehm65c18a22020-01-03 23:37:13 +0000449 // Deletion ordering is tricky. Null out everything we've deleted.
Andreas Gampec4bed162017-05-01 13:46:24 -0700450 delete signal_catcher_;
Hans Boehm65c18a22020-01-03 23:37:13 +0000451 signal_catcher_ = nullptr;
Andreas Gampec4bed162017-05-01 13:46:24 -0700452
Eric Holk0b986f72021-01-20 22:24:06 +0000453 // Shutdown metrics reporting.
454 metrics_reporter_.reset();
455
Andreas Gampec4bed162017-05-01 13:46:24 -0700456 // Make sure all other non-daemon threads have terminated, and all daemon threads are suspended.
Hans Boehm65c18a22020-01-03 23:37:13 +0000457 // Also wait for daemon threads to quiesce, so that in addition to being "suspended", they
458 // no longer access monitor and thread list data structures. We leak user daemon threads
459 // themselves, since we have no mechanism for shutting them down.
Andreas Gampec4bed162017-05-01 13:46:24 -0700460 {
461 ScopedTrace trace2("Delete thread list");
462 thread_list_->ShutDown();
463 }
464
Alex Light7233c7e2016-07-28 10:07:45 -0700465 // TODO Maybe do some locking.
466 for (auto& agent : agents_) {
Andreas Gampeaadcbc62017-12-28 14:05:42 -0800467 agent->Unload();
Alex Light7233c7e2016-07-28 10:07:45 -0700468 }
469
Alex Light185d1342016-08-11 10:48:03 -0700470 // TODO Maybe do some locking
471 for (auto& plugin : plugins_) {
472 plugin.Unload();
473 }
474
Andreas Gampec4bed162017-05-01 13:46:24 -0700475 // Finally delete the thread list.
Hans Boehm65c18a22020-01-03 23:37:13 +0000476 // Thread_list_ can be accessed by "suspended" threads, e.g. in InflateThinLocked.
477 // We assume that by this point, we've waited long enough for things to quiesce.
Andreas Gampec4bed162017-05-01 13:46:24 -0700478 delete thread_list_;
Hans Boehm65c18a22020-01-03 23:37:13 +0000479 thread_list_ = nullptr;
Elliott Hughes5fe594f2011-09-08 12:33:17 -0700480
Mathieu Chartiere5f13e52015-02-24 09:37:21 -0800481 // Delete the JIT after thread list to ensure that there is no remaining threads which could be
482 // accessing the instrumentation when we delete it.
Mathieu Chartierfb6db4c2016-01-06 17:23:25 -0800483 if (jit_ != nullptr) {
Mathieu Chartiere5f13e52015-02-24 09:37:21 -0800484 VLOG(jit) << "Deleting jit";
485 jit_.reset(nullptr);
Orion Hodsonad28f5e2018-10-17 09:08:17 +0100486 jit_code_cache_.reset(nullptr);
Mathieu Chartiere5f13e52015-02-24 09:37:21 -0800487 }
488
Vladimir Marko2beeb822014-10-20 18:13:22 +0100489 // Shutdown the fault manager if it was initialized.
490 fault_manager.Shutdown();
491
Mathieu Chartier32ce2ad2016-03-04 14:58:03 -0800492 ScopedTrace trace2("Delete state");
Elliott Hughesc33a32b2011-10-11 18:18:07 -0700493 delete monitor_list_;
Hans Boehm65c18a22020-01-03 23:37:13 +0000494 monitor_list_ = nullptr;
Ian Rogersef7d42f2014-01-06 12:55:46 -0800495 delete monitor_pool_;
Hans Boehm65c18a22020-01-03 23:37:13 +0000496 monitor_pool_ = nullptr;
Carl Shapiro61e019d2011-07-14 16:53:09 -0700497 delete class_linker_;
Hans Boehm65c18a22020-01-03 23:37:13 +0000498 class_linker_ = nullptr;
Elliott Hughesb3bd5f02012-03-08 21:05:27 -0800499 delete heap_;
Hans Boehm65c18a22020-01-03 23:37:13 +0000500 heap_ = nullptr;
Elliott Hughescf4c6c42011-09-01 15:16:42 -0700501 delete intern_table_;
Hans Boehm65c18a22020-01-03 23:37:13 +0000502 intern_table_ = nullptr;
Mathieu Chartiere58991b2015-10-13 07:59:34 -0700503 delete oat_file_manager_;
Hans Boehm65c18a22020-01-03 23:37:13 +0000504 oat_file_manager_ = nullptr;
Elliott Hughesc1674ed2011-08-25 18:09:09 -0700505 Thread::Shutdown();
Elliott Hughes7c6169d2012-05-02 16:11:48 -0700506 QuasiAtomic::Shutdown();
Andreas Gampea43ba3d2019-03-13 15:49:20 -0700507 verifier::ClassVerifier::Shutdown();
Vladimir Marko37cf51f2015-09-22 11:43:46 +0100508
509 // Destroy allocators before shutting down the MemMap because they may use it.
Richard Uhlerda0a69e2016-10-11 15:06:38 +0100510 java_vm_.reset();
Vladimir Marko37cf51f2015-09-22 11:43:46 +0100511 linear_alloc_.reset();
512 low_4gb_arena_pool_.reset();
513 arena_pool_.reset();
Nicolas Geoffray25e04562016-03-01 13:17:58 +0000514 jit_arena_pool_.reset();
Vladimir Markoc34bebf2018-08-16 16:12:49 +0100515 protected_fault_page_.Reset();
Mathieu Chartier6e88ef62014-10-14 15:01:24 -0700516 MemMap::Shutdown();
Vladimir Marko37cf51f2015-09-22 11:43:46 +0100517
Carl Shapiro4acf4642011-07-26 18:54:13 -0700518 // TODO: acquire a static mutex on Runtime to avoid racing.
Ian Rogersef7d42f2014-01-06 12:55:46 -0800519 CHECK(instance_ == nullptr || instance_ == this);
520 instance_ = nullptr;
Andreas Gampedb48a792017-09-08 22:18:30 -0700521
522 // Well-known classes must be deleted or it is impossible to successfully start another Runtime
523 // instance. We rely on a small initialization order issue in Runtime::Start() that requires
524 // elements of WellKnownClasses to be null, see b/65500943.
525 WellKnownClasses::Clear();
Carl Shapiro61e019d2011-07-14 16:53:09 -0700526}
527
Elliott Hughese0918552011-10-28 17:18:29 -0700528struct AbortState {
Ian Rogersc7dd2952014-10-21 23:31:19 -0700529 void Dump(std::ostream& os) const {
Nicolas Geoffraydb978712014-12-09 13:33:38 +0000530 if (gAborting > 1) {
531 os << "Runtime aborting --- recursively, so no thread-specific detail!\n";
Andreas Gampe9fd470f2016-11-18 17:21:12 -0800532 DumpRecursiveAbort(os);
Nicolas Geoffraydb978712014-12-09 13:33:38 +0000533 return;
534 }
535 gAborting++;
Elliott Hughese0918552011-10-28 17:18:29 -0700536 os << "Runtime aborting...\n";
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700537 if (Runtime::Current() == nullptr) {
Elliott Hughes6c7d2442012-02-01 18:40:47 -0800538 os << "(Runtime does not yet exist!)\n";
Andreas Gampe6eb6a392016-02-10 20:18:37 -0800539 DumpNativeStack(os, GetTid(), nullptr, " native: ", nullptr);
Elliott Hughes6c7d2442012-02-01 18:40:47 -0800540 return;
541 }
Elliott Hughese0918552011-10-28 17:18:29 -0700542 Thread* self = Thread::Current();
Andreas Gampea3f78fe2017-09-05 09:31:04 -0700543
544 // Dump all threads first and then the aborting thread. While this is counter the logical flow,
545 // it improves the chance of relevant data surviving in the Android logs.
546
547 DumpAllThreads(os, self);
548
Mathieu Chartierc7a966d2014-04-10 18:06:32 -0700549 if (self == nullptr) {
Elliott Hughese0918552011-10-28 17:18:29 -0700550 os << "(Aborting thread was not attached to runtime!)\n";
Christopher Ferris6cff48f2014-01-26 21:36:13 -0800551 DumpNativeStack(os, GetTid(), nullptr, " native: ", nullptr);
Elliott Hughese0918552011-10-28 17:18:29 -0700552 } else {
Ian Rogers2f7f9b62012-10-10 18:24:05 -0700553 os << "Aborting thread:\n";
Mathieu Chartierc7a966d2014-04-10 18:06:32 -0700554 if (Locks::mutator_lock_->IsExclusiveHeld(self) || Locks::mutator_lock_->IsSharedHeld(self)) {
555 DumpThread(os, self);
556 } else {
557 if (Locks::mutator_lock_->SharedTryLock(self)) {
558 DumpThread(os, self);
559 Locks::mutator_lock_->SharedUnlock(self);
560 }
Elliott Hughes899e7892012-01-24 14:57:32 -0800561 }
Elliott Hughese0918552011-10-28 17:18:29 -0700562 }
Ian Rogers2f7f9b62012-10-10 18:24:05 -0700563 }
564
Ian Rogers7b078e82014-09-10 14:44:24 -0700565 // No thread-safety analysis as we do explicitly test for holding the mutator lock.
Ian Rogersc7dd2952014-10-21 23:31:19 -0700566 void DumpThread(std::ostream& os, Thread* self) const NO_THREAD_SAFETY_ANALYSIS {
Ian Rogers7b078e82014-09-10 14:44:24 -0700567 DCHECK(Locks::mutator_lock_->IsExclusiveHeld(self) || Locks::mutator_lock_->IsSharedHeld(self));
Mathieu Chartierc7a966d2014-04-10 18:06:32 -0700568 self->Dump(os);
569 if (self->IsExceptionPending()) {
Nicolas Geoffray14691c52015-03-05 10:40:17 +0000570 mirror::Throwable* exception = self->GetException();
571 os << "Pending exception " << exception->Dump();
Mathieu Chartierc7a966d2014-04-10 18:06:32 -0700572 }
573 }
574
Ian Rogersc7dd2952014-10-21 23:31:19 -0700575 void DumpAllThreads(std::ostream& os, Thread* self) const {
Ian Rogers4e14e722014-06-27 17:32:56 -0700576 Runtime* runtime = Runtime::Current();
577 if (runtime != nullptr) {
578 ThreadList* thread_list = runtime->GetThreadList();
579 if (thread_list != nullptr) {
Andreas Gampeba26b512019-05-31 13:07:26 -0700580 // Dump requires ThreadListLock and ThreadSuspendCountLock to not be held (they will be
581 // grabbed).
582 // TODO(b/134167395): Change Dump to work with the locks held, and have a loop with timeout
583 // acquiring the locks.
Ian Rogers4e14e722014-06-27 17:32:56 -0700584 bool tll_already_held = Locks::thread_list_lock_->IsExclusiveHeld(self);
Andreas Gampeba26b512019-05-31 13:07:26 -0700585 bool tscl_already_held = Locks::thread_suspend_count_lock_->IsExclusiveHeld(self);
586 if (tll_already_held || tscl_already_held) {
587 os << "Skipping all-threads dump as locks are held:"
588 << (tll_already_held ? "" : " thread_list_lock")
589 << (tscl_already_held ? "" : " thread_suspend_count_lock")
590 << "\n";
591 return;
592 }
593 bool ml_already_exlusively_held = Locks::mutator_lock_->IsExclusiveHeld(self);
594 if (ml_already_exlusively_held) {
595 os << "Skipping all-threads dump as mutator lock is exclusively held.";
Brian Carlstrom54a6d4c2019-06-03 11:02:12 -0700596 return;
Andreas Gampeba26b512019-05-31 13:07:26 -0700597 }
Ian Rogers4e14e722014-06-27 17:32:56 -0700598 bool ml_already_held = Locks::mutator_lock_->IsSharedHeld(self);
Andreas Gampeba26b512019-05-31 13:07:26 -0700599 if (!ml_already_held) {
600 os << "Dumping all threads without mutator lock held\n";
Ian Rogers4e14e722014-06-27 17:32:56 -0700601 }
602 os << "All threads:\n";
Ian Rogers7b078e82014-09-10 14:44:24 -0700603 thread_list->Dump(os);
Ian Rogers4e14e722014-06-27 17:32:56 -0700604 }
Ian Rogers2f7f9b62012-10-10 18:24:05 -0700605 }
Elliott Hughese0918552011-10-28 17:18:29 -0700606 }
Andreas Gampe7afa4542016-11-18 09:51:06 -0800607
608 // For recursive aborts.
609 void DumpRecursiveAbort(std::ostream& os) const NO_THREAD_SAFETY_ANALYSIS {
Andreas Gampe9fd470f2016-11-18 17:21:12 -0800610 // The only thing we'll attempt is dumping the native stack of the current thread. We will only
611 // try this if we haven't exceeded an arbitrary amount of recursions, to recover and actually
612 // die.
613 // Note: as we're using a global counter for the recursive abort detection, there is a potential
614 // race here and it is not OK to just print when the counter is "2" (one from
615 // Runtime::Abort(), one from previous Dump() call). Use a number that seems large enough.
616 static constexpr size_t kOnlyPrintWhenRecursionLessThan = 100u;
617 if (gAborting < kOnlyPrintWhenRecursionLessThan) {
618 gAborting++;
619 DumpNativeStack(os, GetTid());
620 }
Andreas Gampe7afa4542016-11-18 09:51:06 -0800621 }
Elliott Hughese0918552011-10-28 17:18:29 -0700622};
623
Andreas Gampe90a32b12016-10-03 19:47:08 -0700624void Runtime::Abort(const char* msg) {
Andreas Gampe247fc332017-06-22 16:18:24 -0700625 auto old_value = gAborting.fetch_add(1); // set before taking any locks
Brian Carlstrom81b88712012-11-05 19:21:30 -0800626
Andreas Gampe89036a32018-12-06 13:05:20 -0800627 // Only set the first abort message.
Andreas Gampe247fc332017-06-22 16:18:24 -0700628 if (old_value == 0) {
Andreas Gampe0ffbe5f2017-06-21 21:05:13 -0700629#ifdef ART_TARGET_ANDROID
Andreas Gampe89036a32018-12-06 13:05:20 -0800630 android_set_abort_message(msg);
631#else
632 // Set the runtime fault message in case our unexpected-signal code will run.
633 Runtime* current = Runtime::Current();
634 if (current != nullptr) {
635 current->SetFaultMessage(msg);
636 }
Andreas Gampe0ffbe5f2017-06-21 21:05:13 -0700637#endif
Andreas Gampe89036a32018-12-06 13:05:20 -0800638 }
Andreas Gampe0ffbe5f2017-06-21 21:05:13 -0700639
Andreas Gampe3e2446b2019-06-12 10:00:57 -0700640 // May be coming from an unattached thread.
641 if (Thread::Current() == nullptr) {
642 Runtime* current = Runtime::Current();
Hans Boehm70aa29e2021-08-11 12:11:19 -0700643 if (current != nullptr && current->IsStarted() && !current->IsShuttingDownUnsafe()) {
Andreas Gampe87648602019-06-12 12:34:26 -0700644 // We do not flag this to the unexpected-signal handler so that that may dump the stack.
Andreas Gampe3e2446b2019-06-12 10:00:57 -0700645 abort();
646 UNREACHABLE();
647 }
648 }
649
Koji Fukui34857b52019-03-20 19:13:00 +0900650 {
651 // Ensure that we don't have multiple threads trying to abort at once,
652 // which would result in significantly worse diagnostics.
653 ScopedThreadStateChange tsc(Thread::Current(), kNativeForAbort);
654 Locks::abort_lock_->ExclusiveLock(Thread::Current());
655 }
Elliott Hughes131aef82012-01-27 11:53:35 -0800656
Elliott Hughesffe67362011-07-17 12:09:27 -0700657 // Get any pending output out of the way.
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700658 fflush(nullptr);
Elliott Hughesffe67362011-07-17 12:09:27 -0700659
660 // Many people have difficulty distinguish aborts from crashes,
661 // so be explicit.
Andreas Gampeb67906b2016-11-18 09:30:08 -0800662 // Note: use cerr on the host to print log lines immediately, so we get at least some output
663 // in case of recursive aborts. We lose annotation with the source file and line number
664 // here, which is a minor issue. The same is significantly more complicated on device,
665 // which is why we ignore the issue there.
Elliott Hughese0918552011-10-28 17:18:29 -0700666 AbortState state;
Andreas Gampeb67906b2016-11-18 09:30:08 -0800667 if (kIsTargetBuild) {
668 LOG(FATAL_WITHOUT_ABORT) << Dumpable<AbortState>(state);
669 } else {
670 std::cerr << Dumpable<AbortState>(state);
671 }
Elliott Hughesffe67362011-07-17 12:09:27 -0700672
Andreas Gampe90a32b12016-10-03 19:47:08 -0700673 // Sometimes we dump long messages, and the Android abort message only retains the first line.
674 // In those cases, just log the message again, to avoid logcat limits.
675 if (msg != nullptr && strchr(msg, '\n') != nullptr) {
676 LOG(FATAL_WITHOUT_ABORT) << msg;
677 }
678
Andreas Gampe87648602019-06-12 12:34:26 -0700679 FlagRuntimeAbort();
680
Elliott Hughes8593fdb2012-04-21 20:53:44 -0700681 // Call the abort hook if we have one.
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700682 if (Runtime::Current() != nullptr && Runtime::Current()->abort_ != nullptr) {
Andreas Gampe3fec9ac2016-09-13 10:47:28 -0700683 LOG(FATAL_WITHOUT_ABORT) << "Calling abort hook...";
Brian Carlstrom6ea095a2011-08-16 15:26:54 -0700684 Runtime::Current()->abort_();
685 // notreached
Andreas Gampe3fec9ac2016-09-13 10:47:28 -0700686 LOG(FATAL_WITHOUT_ABORT) << "Unexpectedly returned from abort hook!";
Brian Carlstrom6ea095a2011-08-16 15:26:54 -0700687 }
688
Elliott Hughesdd623db2013-06-11 11:20:23 -0700689 abort();
Elliott Hughesffe67362011-07-17 12:09:27 -0700690 // notreached
691}
692
Narayan Kamath3de95a72014-04-02 12:54:23 +0100693void Runtime::PreZygoteFork() {
Nicolas Geoffrayce9ed362018-11-29 03:19:28 +0000694 if (GetJit() != nullptr) {
695 GetJit()->PreZygoteFork();
696 }
Mathieu Chartiercc236d72012-07-20 10:29:05 -0700697 heap_->PreZygoteFork();
Lev Rumyantsevabafbe72019-12-13 15:49:37 -0800698 PreZygoteForkNativeBridge();
Mathieu Chartiercc236d72012-07-20 10:29:05 -0700699}
700
Nicolas Geoffrayce9ed362018-11-29 03:19:28 +0000701void Runtime::PostZygoteFork() {
Nicolas Geoffrayf9dbb972020-08-27 15:21:11 +0100702 jit::Jit* jit = GetJit();
703 if (jit != nullptr) {
704 jit->PostZygoteFork();
705 // Ensure that the threads in the JIT pool have been created with the right
706 // priority.
707 if (kIsDebugBuild && jit->GetThreadPool() != nullptr) {
708 jit->GetThreadPool()->CheckPthreadPriority(jit->GetThreadPoolPthreadPriority());
709 }
Nicolas Geoffrayce9ed362018-11-29 03:19:28 +0000710 }
Andreas Gampe9c87c022019-06-18 13:45:52 -0700711 // Reset all stats.
712 ResetStats(0xFFFFFFFF);
Nicolas Geoffrayce9ed362018-11-29 03:19:28 +0000713}
714
Elliott Hughesbf86d042011-08-31 17:53:14 -0700715void Runtime::CallExitHook(jint status) {
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700716 if (exit_ != nullptr) {
Elliott Hughes34e06962012-04-09 13:55:55 -0700717 ScopedThreadStateChange tsc(Thread::Current(), kNative);
Elliott Hughesbf86d042011-08-31 17:53:14 -0700718 exit_(status);
719 LOG(WARNING) << "Exit hook returned instead of exiting!";
720 }
721}
722
Mathieu Chartier97509952015-07-13 14:35:43 -0700723void Runtime::SweepSystemWeaks(IsMarkedVisitor* visitor) {
724 GetInternTable()->SweepInternTableWeaks(visitor);
725 GetMonitorList()->SweepMonitorList(visitor);
726 GetJavaVM()->SweepJniWeakGlobals(visitor);
727 GetHeap()->SweepAllocationRecords(visitor);
Nicolas Geoffray132d8362016-11-16 09:19:42 +0000728 if (GetJit() != nullptr) {
729 // Visit JIT literal tables. Objects in these tables are classes and strings
730 // and only classes can be affected by class unloading. The strings always
731 // stay alive as they are strongly interned.
732 // TODO: Move this closer to CleanupClassLoaders, to avoid blocking weak accesses
733 // from mutators. See b/32167580.
734 GetJit()->GetCodeCache()->SweepRootTables(visitor);
735 }
Nicolas Geoffraye3f775b2019-12-04 14:41:52 +0000736 thread_list_->SweepInterpreterCaches(visitor);
Andreas Gampefda57142016-09-08 20:29:18 -0700737
738 // All other generic system-weak holders.
739 for (gc::AbstractSystemWeakHolder* holder : system_weak_holders_) {
740 holder->Sweep(visitor);
741 }
Mathieu Chartier6aa3df92013-09-17 15:17:28 -0700742}
743
Vladimir Marko88b2b802015-12-04 14:19:04 +0000744bool Runtime::ParseOptions(const RuntimeOptions& raw_options,
745 bool ignore_unrecognized,
746 RuntimeArgumentMap* runtime_options) {
David Sehrc431b9d2018-03-02 12:01:51 -0800747 Locks::Init();
Andreas Gampe98ea9d92018-10-19 14:06:15 -0700748 InitLogging(/* argv= */ nullptr, Abort); // Calls Locks::Init() as a side effect.
Vladimir Marko88b2b802015-12-04 14:19:04 +0000749 bool parsed = ParsedOptions::Parse(raw_options, ignore_unrecognized, runtime_options);
750 if (!parsed) {
751 LOG(ERROR) << "Failed to parse options";
752 return false;
753 }
754 return true;
755}
756
David Sehrf42eb2c2016-10-19 13:20:45 -0700757// Callback to check whether it is safe to call Abort (e.g., to use a call to
758// LOG(FATAL)). It is only safe to call Abort if the runtime has been created,
759// properly initialized, and has not shut down.
760static bool IsSafeToCallAbort() NO_THREAD_SAFETY_ANALYSIS {
761 Runtime* runtime = Runtime::Current();
762 return runtime != nullptr && runtime->IsStarted() && !runtime->IsShuttingDownLocked();
763}
764
Vladimir Marko88b2b802015-12-04 14:19:04 +0000765bool Runtime::Create(RuntimeArgumentMap&& runtime_options) {
Carl Shapiro2ed144c2011-07-26 16:52:08 -0700766 // TODO: acquire a static mutex on Runtime to avoid racing.
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700767 if (Runtime::instance_ != nullptr) {
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700768 return false;
Carl Shapiro2ed144c2011-07-26 16:52:08 -0700769 }
Elliott Hughesdcc24742011-09-07 14:02:44 -0700770 instance_ = new Runtime;
David Sehrf42eb2c2016-10-19 13:20:45 -0700771 Locks::SetClientCallback(IsSafeToCallAbort);
Vladimir Marko88b2b802015-12-04 14:19:04 +0000772 if (!instance_->Init(std::move(runtime_options))) {
Jean Christophe Beyler24e04aa2014-09-12 12:03:25 -0700773 // TODO: Currently deleting the instance will abort the runtime on destruction. Now This will
774 // leak memory, instead. Fix the destructor. b/19100793.
775 // delete instance_;
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700776 instance_ = nullptr;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700777 return false;
Carl Shapiro61e019d2011-07-14 16:53:09 -0700778 }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700779 return true;
Brian Carlstrom69b15fb2011-09-03 12:25:21 -0700780}
Elliott Hughes0af55432011-08-17 18:37:28 -0700781
Vladimir Marko88b2b802015-12-04 14:19:04 +0000782bool Runtime::Create(const RuntimeOptions& raw_options, bool ignore_unrecognized) {
783 RuntimeArgumentMap runtime_options;
784 return ParseOptions(raw_options, ignore_unrecognized, &runtime_options) &&
785 Create(std::move(runtime_options));
786}
787
Andreas Gampe81c6f8d2015-03-25 17:19:53 -0700788static jobject CreateSystemClassLoader(Runtime* runtime) {
789 if (runtime->IsAotCompiler() && !runtime->GetCompilerCallbacks()->IsBootImage()) {
790 return nullptr;
Brian Carlstromaded5f72011-10-07 17:15:04 -0700791 }
792
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700793 ScopedObjectAccess soa(Thread::Current());
Mathieu Chartierc528dba2013-11-26 12:00:11 -0800794 ClassLinker* cl = Runtime::Current()->GetClassLinker();
Mathieu Chartiere401d142015-04-22 13:56:20 -0700795 auto pointer_size = cl->GetImagePointerSize();
Brian Carlstromaded5f72011-10-07 17:15:04 -0700796
Ian Rogers68d8b422014-07-17 11:09:10 -0700797 StackHandleScope<2> hs(soa.Self());
Mathieu Chartiereb8167a2014-05-07 15:43:14 -0700798 Handle<mirror::Class> class_loader_class(
Mathieu Chartier0795f232016-09-27 18:43:30 -0700799 hs.NewHandle(soa.Decode<mirror::Class>(WellKnownClasses::java_lang_ClassLoader)));
Ian Rogers7b078e82014-09-10 14:44:24 -0700800 CHECK(cl->EnsureInitialized(soa.Self(), class_loader_class, true, true));
Brian Carlstromaded5f72011-10-07 17:15:04 -0700801
Vladimir Markoba118822017-06-12 15:41:56 +0100802 ArtMethod* getSystemClassLoader = class_loader_class->FindClassMethod(
Mathieu Chartiere401d142015-04-22 13:56:20 -0700803 "getSystemClassLoader", "()Ljava/lang/ClassLoader;", pointer_size);
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700804 CHECK(getSystemClassLoader != nullptr);
Vladimir Markoba118822017-06-12 15:41:56 +0100805 CHECK(getSystemClassLoader->IsStatic());
Brian Carlstromaded5f72011-10-07 17:15:04 -0700806
Andreas Gampe13b27842016-11-07 16:48:23 -0800807 JValue result = InvokeWithJValues(soa,
808 nullptr,
Alex Light01fbfbe2019-06-27 10:47:04 -0700809 getSystemClassLoader,
Andreas Gampe13b27842016-11-07 16:48:23 -0800810 nullptr);
Brian Carlstromce888532013-10-10 00:32:58 -0700811 JNIEnv* env = soa.Self()->GetJniEnv();
Mathieu Chartiere401d142015-04-22 13:56:20 -0700812 ScopedLocalRef<jobject> system_class_loader(env, soa.AddLocalReference<jobject>(result.GetL()));
Mathieu Chartierc528dba2013-11-26 12:00:11 -0800813 CHECK(system_class_loader.get() != nullptr);
Brian Carlstromce888532013-10-10 00:32:58 -0700814
Ian Rogers68d8b422014-07-17 11:09:10 -0700815 soa.Self()->SetClassLoaderOverride(system_class_loader.get());
Ian Rogers365c1022012-06-22 15:05:28 -0700816
Mathieu Chartiereb8167a2014-05-07 15:43:14 -0700817 Handle<mirror::Class> thread_class(
Mathieu Chartier0795f232016-09-27 18:43:30 -0700818 hs.NewHandle(soa.Decode<mirror::Class>(WellKnownClasses::java_lang_Thread)));
Ian Rogers7b078e82014-09-10 14:44:24 -0700819 CHECK(cl->EnsureInitialized(soa.Self(), thread_class, true, true));
Ian Rogers365c1022012-06-22 15:05:28 -0700820
Mathieu Chartierc7853442015-03-27 14:35:38 -0700821 ArtField* contextClassLoader =
Mathieu Chartierc528dba2013-11-26 12:00:11 -0800822 thread_class->FindDeclaredInstanceField("contextClassLoader", "Ljava/lang/ClassLoader;");
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700823 CHECK(contextClassLoader != nullptr);
Ian Rogers365c1022012-06-22 15:05:28 -0700824
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +0100825 // We can't run in a transaction yet.
Mathieu Chartier0795f232016-09-27 18:43:30 -0700826 contextClassLoader->SetObject<false>(
827 soa.Self()->GetPeer(),
Mathieu Chartier1cc62e42016-10-03 18:01:28 -0700828 soa.Decode<mirror::ClassLoader>(system_class_loader.get()).Ptr());
Brian Carlstromce888532013-10-10 00:32:58 -0700829
830 return env->NewGlobalRef(system_class_loader.get());
Brian Carlstromaded5f72011-10-07 17:15:04 -0700831}
832
Tsu Chiang Chuang12e6d742014-05-22 10:22:25 -0700833std::string Runtime::GetCompilerExecutable() const {
834 if (!compiler_executable_.empty()) {
835 return compiler_executable_;
836 }
Martin Stjernholme58624f2019-09-20 15:53:40 +0100837 std::string compiler_executable = GetArtBinDir() + "/dex2oat";
Roland Levillainfb6a5c02019-03-29 20:20:16 +0000838 if (kIsDebugBuild) {
839 compiler_executable += 'd';
840 }
Nicolas Geoffrayb0c6cb52020-04-20 15:12:42 +0100841 if (kIsTargetBuild) {
842 compiler_executable += Is64BitInstructionSet(kRuntimeISA) ? "64" : "32";
843 }
Tsu Chiang Chuang12e6d742014-05-22 10:22:25 -0700844 return compiler_executable;
845}
846
Vladimir Markodcfcce42018-06-27 10:00:28 +0000847void Runtime::RunRootClinits(Thread* self) {
848 class_linker_->RunRootClinits(self);
849
850 GcRoot<mirror::Throwable>* exceptions[] = {
851 &pre_allocated_OutOfMemoryError_when_throwing_exception_,
852 // &pre_allocated_OutOfMemoryError_when_throwing_oome_, // Same class as above.
853 // &pre_allocated_OutOfMemoryError_when_handling_stack_overflow_, // Same class as above.
854 &pre_allocated_NoClassDefFoundError_,
855 };
856 for (GcRoot<mirror::Throwable>* exception : exceptions) {
857 StackHandleScope<1> hs(self);
858 Handle<mirror::Class> klass = hs.NewHandle<mirror::Class>(exception->Read()->GetClass());
859 class_linker_->EnsureInitialized(self, klass, true, true);
860 self->AssertNoPendingException();
861 }
862}
863
Brian Carlstrombd86bcc2013-03-10 20:26:16 -0700864bool Runtime::Start() {
Elliott Hughes4dd9b4d2011-12-12 18:29:24 -0800865 VLOG(startup) << "Runtime::Start entering";
Brian Carlstrom58ae9412011-10-04 00:56:06 -0700866
Calin Juravle01aaf6e2015-06-19 22:05:39 +0100867 CHECK(!no_sig_chain_) << "A started runtime should have sig chain enabled";
868
Hiroshi Yamauchi6ffb9cc2015-08-31 15:14:17 -0700869 // If a debug host build, disable ptrace restriction for debugging and test timeout thread dump.
Hiroshi Yamauchic823eff2015-09-01 16:21:35 -0700870 // Only 64-bit as prctl() may fail in 32 bit userspace on a 64-bit kernel.
Bilyan Borisovbb661c02016-04-04 16:27:32 +0100871#if defined(__linux__) && !defined(ART_TARGET_ANDROID) && defined(__x86_64__)
Hiroshi Yamauchi6ffb9cc2015-08-31 15:14:17 -0700872 if (kIsDebugBuild) {
Dan Zimmerman145f3c42019-12-18 04:21:38 -0800873 if (prctl(PR_SET_PTRACER, PR_SET_PTRACER_ANY) != 0) {
874 PLOG(WARNING) << "Failed setting PR_SET_PTRACER to PR_SET_PTRACER_ANY";
875 }
Hiroshi Yamauchi6ffb9cc2015-08-31 15:14:17 -0700876 }
877#endif
878
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700879 // Restore main thread state to kNative as expected by native code.
Ian Rogersa436fde2013-08-27 23:34:06 -0700880 Thread* self = Thread::Current();
Alex Light64ad14d2014-08-19 14:23:13 -0700881
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700882 self->TransitionFromRunnableToSuspended(kNative);
883
Nicolas Geoffraye4f983c2021-07-12 15:53:27 +0100884 started_ = true;
Brian Carlstrom5d40f182011-09-26 22:29:18 -0700885
Jeff Haodcdc85b2015-12-04 14:06:18 -0800886 if (!IsImageDex2OatEnabled() || !GetHeap()->HasBootImageSpace()) {
Mathieu Chartiereb175f72014-10-31 11:49:27 -0700887 ScopedObjectAccess soa(self);
Nicolas Geoffray00391822019-12-10 10:17:23 +0000888 StackHandleScope<3> hs(soa.Self());
Przemyslaw Szczepaniaka2b147e2016-05-12 14:55:48 +0100889
Vladimir Marko679730e2018-05-25 15:06:48 +0100890 ObjPtr<mirror::ObjectArray<mirror::Class>> class_roots = GetClassLinker()->GetClassRoots();
891 auto class_class(hs.NewHandle<mirror::Class>(GetClassRoot<mirror::Class>(class_roots)));
Nicolas Geoffray00391822019-12-10 10:17:23 +0000892 auto string_class(hs.NewHandle<mirror::Class>(GetClassRoot<mirror::String>(class_roots)));
Vladimir Marko679730e2018-05-25 15:06:48 +0100893 auto field_class(hs.NewHandle<mirror::Class>(GetClassRoot<mirror::Field>(class_roots)));
Przemyslaw Szczepaniaka2b147e2016-05-12 14:55:48 +0100894
895 class_linker_->EnsureInitialized(soa.Self(), class_class, true, true);
Nicolas Geoffray00391822019-12-10 10:17:23 +0000896 class_linker_->EnsureInitialized(soa.Self(), string_class, true, true);
Vladimir Markodcfcce42018-06-27 10:00:28 +0000897 self->AssertNoPendingException();
Przemyslaw Szczepaniaka2b147e2016-05-12 14:55:48 +0100898 // Field class is needed for register_java_net_InetAddress in libcore, b/28153851.
899 class_linker_->EnsureInitialized(soa.Self(), field_class, true, true);
Vladimir Markodcfcce42018-06-27 10:00:28 +0000900 self->AssertNoPendingException();
Alex Light64ad14d2014-08-19 14:23:13 -0700901 }
902
Brian Carlstromae826982011-11-09 01:33:42 -0800903 // InitNativeMethods needs to be after started_ so that the classes
904 // it touches will have methods linked to the oat file if necessary.
Mathieu Chartier32ce2ad2016-03-04 14:58:03 -0800905 {
906 ScopedTrace trace2("InitNativeMethods");
907 InitNativeMethods();
908 }
Brian Carlstromae826982011-11-09 01:33:42 -0800909
Orion Hodson26ef34c2017-11-01 13:32:41 +0000910 // IntializeIntrinsics needs to be called after the WellKnownClasses::Init in InitNativeMethods
911 // because in checking the invocation types of intrinsic methods ArtMethod::GetInvokeType()
912 // needs the SignaturePolymorphic annotation class which is initialized in WellKnownClasses::Init.
913 InitializeIntrinsics();
914
Orion Hodson814b9282020-02-19 16:37:11 +0000915 // InitializeCorePlatformApiPrivateFields() needs to be called after well known class
916 // initializtion in InitNativeMethods().
917 art::hiddenapi::InitializeCorePlatformApiPrivateFields();
918
Ian Rogers365c1022012-06-22 15:05:28 -0700919 // Initialize well known thread group values that may be accessed threads while attaching.
920 InitThreadGroups(self);
921
Jesse Wilson9a6bae82011-11-14 14:57:30 -0500922 Thread::FinishStartup();
923
Andreas Gampe4471e4f2017-01-30 16:40:49 +0000924 // Create the JIT either if we have to use JIT compilation or save profiling info. This is
925 // done after FinishStartup as the JIT pool needs Java thread peers, which require the main
926 // ThreadGroup to exist.
927 //
928 // TODO(calin): We use the JIT class as a proxy for JIT compilation and for
929 // recoding profiles. Maybe we should consider changing the name to be more clear it's
930 // not only about compiling. b/28295073.
Andreas Gampe83e20492018-11-07 11:12:26 -0800931 if (jit_options_->UseJitCompilation() || jit_options_->GetSaveProfilingInfo()) {
Orion Hodsonad28f5e2018-10-17 09:08:17 +0100932 // Try to load compiler pre zygote to reduce PSS. b/27744947
Andreas Gampe4471e4f2017-01-30 16:40:49 +0000933 std::string error_msg;
Nicolas Geoffraya7edd0d2018-11-07 03:18:16 +0000934 if (!jit::Jit::LoadCompilerLibrary(&error_msg)) {
Orion Hodsonad28f5e2018-10-17 09:08:17 +0100935 LOG(WARNING) << "Failed to load JIT compiler with error " << error_msg;
Andreas Gampe4471e4f2017-01-30 16:40:49 +0000936 }
Nicolas Geoffray7a2c7c22018-11-20 10:03:13 +0000937 CreateJitCodeCache(/*rwx_memory_allowed=*/true);
938 CreateJit();
Andreas Gampe4471e4f2017-01-30 16:40:49 +0000939 }
940
Andreas Gampe48864112017-01-19 17:23:17 -0800941 // Send the start phase event. We have to wait till here as this is when the main thread peer
942 // has just been generated, important root clinits have been run and JNI is completely functional.
943 {
944 ScopedObjectAccess soa(self);
945 callbacks_->NextRuntimePhase(RuntimePhaseCallback::RuntimePhase::kStart);
946 }
947
Andreas Gampe81c6f8d2015-03-25 17:19:53 -0700948 system_class_loader_ = CreateSystemClassLoader(this);
jgu21a6da74e2014-09-10 06:57:17 -0400949
Robert Sesekb2267032016-09-13 19:12:57 -0400950 if (!is_zygote_) {
Calin Juravle07d83c72014-10-22 21:02:23 +0100951 if (is_native_bridge_loaded_) {
jgu21a6da74e2014-09-10 06:57:17 -0400952 PreInitializeNativeBridge(".");
953 }
Calin Juravled3e7c6c2016-02-04 19:07:51 +0000954 NativeBridgeAction action = force_native_bridge_
955 ? NativeBridgeAction::kInitialize
956 : NativeBridgeAction::kUnload;
Nicolas Geoffrayba69a512015-11-17 13:50:21 +0000957 InitNonZygoteOrPostFork(self->GetJniEnv(),
Andreas Gampe98ea9d92018-10-19 14:06:15 -0700958 /* is_system_server= */ false,
Lev Rumyantsev87f36302019-12-13 15:49:37 -0800959 /* is_child_zygote= */ false,
Calin Juravled3e7c6c2016-02-04 19:07:51 +0000960 action,
Nicolas Geoffrayba69a512015-11-17 13:50:21 +0000961 GetInstructionSetString(kRuntimeISA));
Elliott Hughesd1cc8362011-10-24 16:58:50 -0700962 }
Elliott Hughes9ca7a1f2011-10-11 14:29:52 -0700963
Alex Lighte0b2ce42019-02-21 19:23:42 +0000964 StartDaemonThreads();
965
966 // Make sure the environment is still clean (no lingering local refs from starting daemon
967 // threads).
968 {
969 ScopedObjectAccess soa(self);
970 self->GetJniEnv()->AssertLocalsEmpty();
971 }
972
973 // Send the initialized phase event. Send it after starting the Daemon threads so that agents
974 // cannot delay the daemon threads from starting forever.
Andreas Gampeeafaf572017-01-20 12:34:15 -0800975 {
976 ScopedObjectAccess soa(self);
977 callbacks_->NextRuntimePhase(RuntimePhaseCallback::RuntimePhase::kInit);
978 }
979
Yevgeny Rouban35aef2c2014-05-19 16:19:36 +0700980 {
981 ScopedObjectAccess soa(self);
Ian Rogers55256cb2017-12-21 17:07:11 -0800982 self->GetJniEnv()->AssertLocalsEmpty();
Yevgeny Rouban35aef2c2014-05-19 16:19:36 +0700983 }
Elliott Hughes726079d2011-10-07 18:43:44 -0700984
Elliott Hughes4dd9b4d2011-12-12 18:29:24 -0800985 VLOG(startup) << "Runtime::Start exiting";
Mathieu Chartier7664f5c2012-06-08 18:15:32 -0700986 finished_starting_ = true;
Brian Carlstrombd86bcc2013-03-10 20:26:16 -0700987
Andreas Gampe40da2862015-02-27 12:49:04 -0800988 if (trace_config_.get() != nullptr && trace_config_->trace_file != "") {
989 ScopedThreadStateChange tsc(self, kWaitingForMethodTracingStart);
990 Trace::Start(trace_config_->trace_file.c_str(),
Andreas Gampe40da2862015-02-27 12:49:04 -0800991 static_cast<int>(trace_config_->trace_file_size),
992 0,
993 trace_config_->trace_output_mode,
994 trace_config_->trace_mode,
995 0);
996 }
997
Calin Juravle2bce0762018-02-20 16:03:34 -0800998 // In case we have a profile path passed as a command line argument,
999 // register the current class path for profiling now. Note that we cannot do
1000 // this before we create the JIT and having it here is the most convenient way.
1001 // This is used when testing profiles with dalvikvm command as there is no
1002 // framework to register the dex files for profiling.
1003 if (jit_.get() != nullptr && jit_options_->GetSaveProfilingInfo() &&
1004 !jit_options_->GetProfileSaverOptions().GetProfilePath().empty()) {
1005 std::vector<std::string> dex_filenames;
1006 Split(class_path_string_, ':', &dex_filenames);
Calin Juravlec2753e62021-06-25 15:34:09 -07001007
1008 // We pass "" as the package name because at this point we don't know it. It could be the
1009 // Zygote or it could be a dalvikvm cmd line execution. The package name will be re-set during
1010 // post-fork or during RegisterAppInfo.
1011 //
1012 // Also, it's ok to pass "" to the ref profile filename. It indicates we don't have
Calin Juravlebeb9f202021-06-02 14:42:03 -07001013 // a reference profile.
1014 RegisterAppInfo(
Calin Juravlec2753e62021-06-25 15:34:09 -07001015 /*package_name=*/ "",
Calin Juravlebeb9f202021-06-02 14:42:03 -07001016 dex_filenames,
1017 jit_options_->GetProfileSaverOptions().GetProfilePath(),
Calin Juravlec2753e62021-06-25 15:34:09 -07001018 /*ref_profile_filename=*/ "",
1019 kVMRuntimePrimaryApk);
Calin Juravle2bce0762018-02-20 16:03:34 -08001020 }
1021
Brian Carlstrombd86bcc2013-03-10 20:26:16 -07001022 return true;
Elliott Hughes85d15452011-09-16 17:33:01 -07001023}
1024
Mathieu Chartier90443472015-07-16 20:32:27 -07001025void Runtime::EndThreadBirth() REQUIRES(Locks::runtime_shutdown_lock_) {
Ian Rogers120f1c72012-09-28 17:17:10 -07001026 DCHECK_GT(threads_being_born_, 0U);
1027 threads_being_born_--;
1028 if (shutting_down_started_ && threads_being_born_ == 0) {
Ian Rogersc604d732012-10-14 16:09:54 -07001029 shutdown_cond_->Broadcast(Thread::Current());
Ian Rogers120f1c72012-09-28 17:17:10 -07001030 }
1031}
1032
Nicolas Geoffrayd66c8622015-12-11 14:59:16 +00001033void Runtime::InitNonZygoteOrPostFork(
Calin Juravle016fcbe22018-05-03 19:47:35 -07001034 JNIEnv* env,
1035 bool is_system_server,
Lev Rumyantsev87f36302019-12-13 15:49:37 -08001036 // This is true when we are initializing a child-zygote. It requires
1037 // native bridge initialization to be able to run guest native code in
1038 // doPreload().
1039 bool is_child_zygote,
Calin Juravle016fcbe22018-05-03 19:47:35 -07001040 NativeBridgeAction action,
1041 const char* isa,
1042 bool profile_system_server) {
Calin Juravle07d83c72014-10-22 21:02:23 +01001043 if (is_native_bridge_loaded_) {
1044 switch (action) {
1045 case NativeBridgeAction::kUnload:
1046 UnloadNativeBridge();
1047 is_native_bridge_loaded_ = false;
1048 break;
Calin Juravle07d83c72014-10-22 21:02:23 +01001049 case NativeBridgeAction::kInitialize:
1050 InitializeNativeBridge(env, isa);
1051 break;
1052 }
Andreas Gampe6be67ee2014-09-02 21:22:18 -07001053 }
1054
Lev Rumyantsev87f36302019-12-13 15:49:37 -08001055 if (is_child_zygote) {
1056 // If creating a child-zygote we only initialize native bridge. The rest of
1057 // runtime post-fork logic would spin up threads for Binder and JDWP.
1058 // Instead, the Java side of the child process will call a static main in a
1059 // class specified by the parent.
1060 return;
1061 }
1062
1063 DCHECK(!IsZygote());
1064
wangguibo0d290722021-04-24 11:27:06 +08001065 if (is_system_server) {
Calin Juravlec2753e62021-06-25 15:34:09 -07001066 // Register the system server code paths.
1067 // TODO: Ideally this should be done by the VMRuntime#RegisterAppInfo. However, right now
1068 // the method is only called when we set up the profile. It should be called all the time
1069 // (simillar to the apps). Once that's done this manual registration can be removed.
1070 const char* system_server_classpath = getenv("SYSTEMSERVERCLASSPATH");
1071 if (system_server_classpath == nullptr || (strlen(system_server_classpath) == 0)) {
1072 LOG(WARNING) << "System server class path not set";
1073 } else {
1074 std::vector<std::string> jars = android::base::Split(system_server_classpath, ":");
1075 app_info_.RegisterAppInfo("android",
1076 jars,
1077 /*cur_profile_path=*/ "",
1078 /*ref_profile_path=*/ "",
1079 AppInfo::CodeType::kPrimaryApk);
1080 }
1081
Mathieu Chartier882d4142019-11-21 13:27:10 -08001082 // Set the system server package name to "android".
1083 // This is used to tell the difference between samples provided by system server
1084 // and samples generated by other apps when processing boot image profiles.
1085 SetProcessPackageName("android");
wangguibo0d290722021-04-24 11:27:06 +08001086 if (profile_system_server) {
1087 jit_options_->SetWaitForJitNotificationsToSaveProfile(false);
1088 VLOG(profiler) << "Enabling system server profiles";
1089 }
Calin Juravle016fcbe22018-05-03 19:47:35 -07001090 }
Orion Hodsonad28f5e2018-10-17 09:08:17 +01001091
Orion Hodsonad28f5e2018-10-17 09:08:17 +01001092 // Create the thread pools.
1093 heap_->CreateThreadPool();
Mathieu Chartier1092bf32019-09-10 12:39:55 -07001094 // Avoid creating the runtime thread pool for system server since it will not be used and would
1095 // waste memory.
1096 if (!is_system_server) {
Mathieu Chartierada33d72018-12-17 13:17:30 -08001097 ScopedTrace timing("CreateThreadPool");
1098 constexpr size_t kStackSize = 64 * KB;
1099 constexpr size_t kMaxRuntimeWorkers = 4u;
1100 const size_t num_workers =
1101 std::min(static_cast<size_t>(std::thread::hardware_concurrency()), kMaxRuntimeWorkers);
1102 MutexLock mu(Thread::Current(), *Locks::runtime_thread_pool_lock_);
1103 CHECK(thread_pool_ == nullptr);
1104 thread_pool_.reset(new ThreadPool("Runtime", num_workers, /*create_peers=*/false, kStackSize));
1105 thread_pool_->StartWorkers(Thread::Current());
1106 }
1107
Eric Holkd91328f2021-03-17 16:21:51 -07001108 // Reset the gc performance data and metrics at zygote fork so that the events from
Orion Hodsonad28f5e2018-10-17 09:08:17 +01001109 // before fork aren't attributed to an app.
1110 heap_->ResetGcPerformanceInfo();
Eric Holkd91328f2021-03-17 16:21:51 -07001111 GetMetrics()->Reset();
Orion Hodsonad28f5e2018-10-17 09:08:17 +01001112
Eric Holk0b986f72021-01-20 22:24:06 +00001113 if (metrics_reporter_ != nullptr) {
Calin Juravleec11cf12021-06-17 15:41:08 -07001114 // Now that we know if we are an app or system server, reload the metrics reporter config
1115 // in case there are any difference.
1116 metrics::ReportingConfig metrics_config =
1117 metrics::ReportingConfig::FromFlags(is_system_server);
1118
1119 metrics_reporter_->ReloadConfig(metrics_config);
Eric Holk62b75582021-03-03 15:14:58 -08001120
Eric Holkc7ac91b2021-02-04 21:44:01 +00001121 metrics::SessionData session_data{metrics::SessionData::CreateDefault()};
Calin Juravle1282f382021-06-21 20:22:12 -07001122 // Start the session id from 1 to avoid clashes with the default value.
1123 // (better for debugability)
1124 session_data.session_id = GetRandomNumber<int64_t>(1, std::numeric_limits<int64_t>::max());
Eric Holkc7ac91b2021-02-04 21:44:01 +00001125 // TODO: set session_data.compilation_reason and session_data.compiler_filter
1126 metrics_reporter_->MaybeStartBackgroundThread(session_data);
Calin Juravlec2753e62021-06-25 15:34:09 -07001127 // Also notify about any updates to the app info.
1128 metrics_reporter_->NotifyAppInfoUpdated(&app_info_);
Eric Holk0b986f72021-01-20 22:24:06 +00001129 }
1130
Brian Carlstromcaabb1b2011-10-11 18:09:13 -07001131 StartSignalCatcher();
Elliott Hughesd1cc8362011-10-24 16:58:50 -07001132
Alex Light40320712017-12-14 11:52:04 -08001133 ScopedObjectAccess soa(Thread::Current());
Florian Mayer0972d082020-05-15 14:07:31 +02001134 if (IsPerfettoHprofEnabled() &&
Florian Mayer0bc9bef2021-04-28 15:52:33 +01001135 (Dbg::IsJdwpAllowed() || IsProfileable() || IsProfileableFromShell() || IsJavaDebuggable() ||
Florian Mayer0972d082020-05-15 14:07:31 +02001136 Runtime::Current()->IsSystemServer())) {
Florian Mayer07710c52019-09-16 15:53:38 +00001137 std::string err;
Florian Mayer46d7b242020-01-14 17:44:37 +00001138 ScopedTrace tr("perfetto_hprof init.");
Florian Mayer07710c52019-09-16 15:53:38 +00001139 ScopedThreadSuspension sts(Thread::Current(), ThreadState::kNative);
1140 if (!EnsurePerfettoPlugin(&err)) {
1141 LOG(WARNING) << "Failed to load perfetto_hprof: " << err;
1142 }
1143 }
Wessam Hassaneinb5a10be2020-11-11 16:42:52 -08001144 if (IsPerfettoJavaHeapStackProfEnabled() &&
Florian Mayer0bc9bef2021-04-28 15:52:33 +01001145 (Dbg::IsJdwpAllowed() || IsProfileable() || IsProfileableFromShell() || IsJavaDebuggable() ||
Wessam Hassaneinb5a10be2020-11-11 16:42:52 -08001146 Runtime::Current()->IsSystemServer())) {
Wessam Hassanein0877daf2021-04-29 23:53:14 -07001147 // Marker used for dev tracing similar to above markers.
Wessam Hassaneinb5a10be2020-11-11 16:42:52 -08001148 ScopedTrace tr("perfetto_javaheapprof init.");
Wessam Hassaneinb5a10be2020-11-11 16:42:52 -08001149 }
Orion Hodsonbaf563d2021-04-08 07:53:54 +01001150 if (Runtime::Current()->IsSystemServer()) {
1151 std::string err;
1152 ScopedTrace tr("odrefresh stats logging");
1153 ScopedThreadSuspension sts(Thread::Current(), ThreadState::kNative);
1154 // Report stats if available. This should be moved into ART Services when they are ready.
1155 if (!odrefresh::UploadStatsIfAvailable(&err)) {
1156 LOG(WARNING) << "Failed to upload odrefresh metrics: " << err;
1157 }
1158 }
1159
Alex Light4ca2f482019-11-25 16:07:22 -08001160 if (LIKELY(automatically_set_jni_ids_indirection_) && CanSetJniIdType()) {
1161 if (IsJavaDebuggable()) {
1162 SetJniIdType(JniIdType::kIndices);
1163 } else {
1164 SetJniIdType(JniIdType::kPointer);
1165 }
1166 }
Mathieu Chartier85b125f2020-10-30 15:45:52 -07001167 ATraceIntegerValue(
1168 "profilebootclasspath",
1169 static_cast<int>(jit_options_->GetProfileSaverOptions().GetProfileBootClassPath()));
Alex Lighta3f81292020-01-08 16:02:46 -08001170 // Start the JDWP thread. If the command-line debugger flags specified "suspend=y",
1171 // this will pause the runtime (in the internal debugger implementation), so we probably want
1172 // this to come last.
1173 GetRuntimeCallbacks()->StartDebugger();
Brian Carlstromcaabb1b2011-10-11 18:09:13 -07001174}
1175
1176void Runtime::StartSignalCatcher() {
1177 if (!is_zygote_) {
Andreas Gampe53af0402018-05-03 10:40:37 -07001178 signal_catcher_ = new SignalCatcher();
Brian Carlstromcaabb1b2011-10-11 18:09:13 -07001179 }
1180}
1181
Mathieu Chartier590fee92013-09-13 13:46:47 -07001182bool Runtime::IsShuttingDown(Thread* self) {
1183 MutexLock mu(self, *Locks::runtime_shutdown_lock_);
1184 return IsShuttingDownLocked();
1185}
1186
Elliott Hughes85d15452011-09-16 17:33:01 -07001187void Runtime::StartDaemonThreads() {
Mathieu Chartier32ce2ad2016-03-04 14:58:03 -08001188 ScopedTrace trace(__FUNCTION__);
Elliott Hughes4dd9b4d2011-12-12 18:29:24 -08001189 VLOG(startup) << "Runtime::StartDaemonThreads entering";
Elliott Hughes85d15452011-09-16 17:33:01 -07001190
Elliott Hughes719b3232011-09-25 17:42:19 -07001191 Thread* self = Thread::Current();
Brian Carlstromaded5f72011-10-07 17:15:04 -07001192
1193 // Must be in the kNative state for calling native methods.
Ian Rogers50b35e22012-10-04 10:09:15 -07001194 CHECK_EQ(self->GetState(), kNative);
Brian Carlstromaded5f72011-10-07 17:15:04 -07001195
Elliott Hughes719b3232011-09-25 17:42:19 -07001196 JNIEnv* env = self->GetJniEnv();
Ian Rogers2fa6b2e2012-10-17 00:10:17 -07001197 env->CallStaticVoidMethod(WellKnownClasses::java_lang_Daemons,
1198 WellKnownClasses::java_lang_Daemons_start);
1199 if (env->ExceptionCheck()) {
1200 env->ExceptionDescribe();
1201 LOG(FATAL) << "Error starting java.lang.Daemons";
1202 }
Elliott Hughes9ca7a1f2011-10-11 14:29:52 -07001203
Elliott Hughes4dd9b4d2011-12-12 18:29:24 -08001204 VLOG(startup) << "Runtime::StartDaemonThreads exiting";
Carl Shapiro61e019d2011-07-14 16:53:09 -07001205}
1206
Nicolas Geoffray99fc9382019-02-20 13:17:27 +00001207static size_t OpenBootDexFiles(ArrayRef<const std::string> dex_filenames,
1208 ArrayRef<const std::string> dex_locations,
Victor Hsiehce9b9022021-07-21 10:44:06 -07001209 ArrayRef<const int> dex_fds,
Nicolas Geoffray99fc9382019-02-20 13:17:27 +00001210 std::vector<std::unique_ptr<const DexFile>>* dex_files) {
Igor Murashkinb1d8c312015-08-04 11:18:43 -07001211 DCHECK(dex_files != nullptr) << "OpenDexFiles: out-param is nullptr";
Alex Light64ad14d2014-08-19 14:23:13 -07001212 size_t failure_count = 0;
David Sehr013fd802018-01-11 22:55:24 -08001213 const ArtDexFileLoader dex_file_loader;
Alex Light64ad14d2014-08-19 14:23:13 -07001214 for (size_t i = 0; i < dex_filenames.size(); i++) {
1215 const char* dex_filename = dex_filenames[i].c_str();
Richard Uhlerc2752592015-01-02 13:28:22 -08001216 const char* dex_location = dex_locations[i].c_str();
Victor Hsiehce9b9022021-07-21 10:44:06 -07001217 const int dex_fd = i < dex_fds.size() ? dex_fds[i] : -1;
Aart Bik37d6a3b2016-06-21 18:30:10 -07001218 static constexpr bool kVerifyChecksum = true;
Alex Light64ad14d2014-08-19 14:23:13 -07001219 std::string error_msg;
Victor Hsiehce9b9022021-07-21 10:44:06 -07001220 if (!OS::FileExists(dex_filename) && dex_fd < 0) {
Alex Light64ad14d2014-08-19 14:23:13 -07001221 LOG(WARNING) << "Skipping non-existent dex file '" << dex_filename << "'";
1222 continue;
1223 }
David Srbecky3db3d372019-04-17 18:19:17 +01001224 bool verify = Runtime::Current()->IsVerificationEnabled();
David Sehr013fd802018-01-11 22:55:24 -08001225 if (!dex_file_loader.Open(dex_filename,
Victor Hsiehce9b9022021-07-21 10:44:06 -07001226 dex_fd,
David Sehr013fd802018-01-11 22:55:24 -08001227 dex_location,
Nicolas Geoffray99fc9382019-02-20 13:17:27 +00001228 verify,
David Sehr013fd802018-01-11 22:55:24 -08001229 kVerifyChecksum,
1230 &error_msg,
1231 dex_files)) {
Victor Hsiehce9b9022021-07-21 10:44:06 -07001232 LOG(WARNING) << "Failed to open .dex from file '" << dex_filename << "' / fd " << dex_fd
1233 << ": " << error_msg;
Alex Light64ad14d2014-08-19 14:23:13 -07001234 ++failure_count;
1235 }
1236 }
1237 return failure_count;
1238}
1239
Vladimir Marko024d69f2019-06-13 10:52:32 +01001240void Runtime::SetSentinel(ObjPtr<mirror::Object> sentinel) {
Mathieu Chartier673ed3d2015-08-28 14:56:43 -07001241 CHECK(sentinel_.Read() == nullptr);
1242 CHECK(sentinel != nullptr);
Hiroshi Yamauchi04302db2015-11-11 23:45:34 -08001243 CHECK(!heap_->IsMovableObject(sentinel));
Mathieu Chartier673ed3d2015-08-28 14:56:43 -07001244 sentinel_ = GcRoot<mirror::Object>(sentinel);
1245}
1246
Roland Levillain0e155592018-11-05 18:31:49 +00001247GcRoot<mirror::Object> Runtime::GetSentinel() {
1248 return sentinel_;
1249}
1250
Vladimir Markodcfcce42018-06-27 10:00:28 +00001251static inline void CreatePreAllocatedException(Thread* self,
1252 Runtime* runtime,
1253 GcRoot<mirror::Throwable>* exception,
1254 const char* exception_class_descriptor,
1255 const char* msg)
Vladimir Markoc13fbd82018-06-04 16:16:28 +01001256 REQUIRES_SHARED(Locks::mutator_lock_) {
1257 DCHECK_EQ(self, Thread::Current());
Vladimir Markodcfcce42018-06-27 10:00:28 +00001258 ClassLinker* class_linker = runtime->GetClassLinker();
1259 // Allocate an object without initializing the class to allow non-trivial Throwable.<clinit>().
1260 ObjPtr<mirror::Class> klass = class_linker->FindSystemClass(self, exception_class_descriptor);
1261 CHECK(klass != nullptr);
1262 gc::AllocatorType allocator_type = runtime->GetHeap()->GetCurrentAllocator();
1263 ObjPtr<mirror::Throwable> exception_object = ObjPtr<mirror::Throwable>::DownCast(
Vladimir Marko9b81ac32019-05-16 16:47:08 +01001264 klass->Alloc(self, allocator_type));
Vladimir Markodcfcce42018-06-27 10:00:28 +00001265 CHECK(exception_object != nullptr);
1266 *exception = GcRoot<mirror::Throwable>(exception_object);
1267 // Initialize the "detailMessage" field.
1268 ObjPtr<mirror::String> message = mirror::String::AllocFromModifiedUtf8(self, msg);
1269 CHECK(message != nullptr);
1270 ObjPtr<mirror::Class> throwable = GetClassRoot<mirror::Throwable>(class_linker);
1271 ArtField* detailMessageField =
1272 throwable->FindDeclaredInstanceField("detailMessage", "Ljava/lang/String;");
1273 CHECK(detailMessageField != nullptr);
Andreas Gampe98ea9d92018-10-19 14:06:15 -07001274 detailMessageField->SetObject</* kTransactionActive= */ false>(exception->Read(), message);
Vladimir Markoc13fbd82018-06-04 16:16:28 +01001275}
1276
Nicolas Geoffrayd3c45c22021-04-27 13:21:28 +01001277void Runtime::InitializeApexVersions() {
1278 std::vector<std::string_view> bcp_apexes;
Nicolas Geoffrayd808f692021-05-01 11:09:04 +01001279 for (std::string_view jar : Runtime::Current()->GetBootClassPathLocations()) {
Nicolas Geoffrayd3c45c22021-04-27 13:21:28 +01001280 if (LocationIsOnApex(jar)) {
1281 size_t start = jar.find('/', 1);
1282 if (start == std::string::npos) {
1283 continue;
1284 }
1285 size_t end = jar.find('/', start + 1);
1286 if (end == std::string::npos) {
1287 continue;
1288 }
Nicolas Geoffrayd808f692021-05-01 11:09:04 +01001289 std::string_view apex = jar.substr(start + 1, end - start - 1);
Nicolas Geoffrayd3c45c22021-04-27 13:21:28 +01001290 bcp_apexes.push_back(apex);
1291 }
1292 }
1293 std::string result;
1294 static const char* kApexFileName = "/apex/apex-info-list.xml";
1295 // When running on host or chroot, we just encode empty markers.
1296 if (!kIsTargetBuild || !OS::FileExists(kApexFileName)) {
1297 for (uint32_t i = 0; i < bcp_apexes.size(); ++i) {
1298 result += '/';
1299 }
1300 } else {
1301#ifdef ART_TARGET_ANDROID
1302 auto info_list = apex::readApexInfoList(kApexFileName);
1303 CHECK(info_list.has_value());
1304 std::map<std::string_view, const apex::ApexInfo*> apex_infos;
1305 for (const apex::ApexInfo& info : info_list->getApexInfo()) {
1306 if (info.getIsActive()) {
1307 apex_infos.emplace(info.getModuleName(), &info);
1308 }
1309 }
1310 for (const std::string_view& str : bcp_apexes) {
1311 auto info = apex_infos.find(str);
1312 if (info == apex_infos.end() || info->second->getIsFactory()) {
1313 result += '/';
1314 } else {
Nikita Ioffe5f2f2892021-07-12 15:59:38 +01001315 // In case lastUpdateMillis field is populated in apex-info-list.xml, we
1316 // prefer to use it as version scheme. If the field is missing we
1317 // fallback to the version code of the APEX.
1318 uint64_t version = info->second->hasLastUpdateMillis()
1319 ? info->second->getLastUpdateMillis()
1320 : info->second->getVersionCode();
1321 android::base::StringAppendF(&result, "/%" PRIu64, version);
Nicolas Geoffrayd3c45c22021-04-27 13:21:28 +01001322 }
1323 }
1324#endif
1325 }
1326 apex_versions_ = result;
1327}
1328
Calin Juravle09eacd92021-05-19 17:03:55 -07001329void Runtime::ReloadAllFlags(const std::string& caller) {
1330 FlagBase::ReloadAllFlags(caller);
1331}
1332
Vladimir Marko88b2b802015-12-04 14:19:04 +00001333bool Runtime::Init(RuntimeArgumentMap&& runtime_options_in) {
David Sehrd106d9f2016-08-16 19:22:57 -07001334 // (b/30160149): protect subprocesses from modifications to LD_LIBRARY_PATH, etc.
1335 // Take a snapshot of the environment at the time the runtime was created, for use by Exec, etc.
1336 env_snapshot_.TakeSnapshot();
1337
Andreas Gampe25419b52018-02-08 21:30:26 -08001338 using Opt = RuntimeArgumentMap;
1339 Opt runtime_options(std::move(runtime_options_in));
Mathieu Chartier32ce2ad2016-03-04 14:58:03 -08001340 ScopedTrace trace(__FUNCTION__);
Eric Holkf1e1dd12020-08-21 15:38:12 -07001341 CHECK_EQ(static_cast<size_t>(sysconf(_SC_PAGE_SIZE)), kPageSize);
Brian Carlstrom6ea095a2011-08-16 15:26:54 -07001342
Calin Juravle09eacd92021-05-19 17:03:55 -07001343 // Reload all the flags value (from system properties and device configs).
1344 ReloadAllFlags(__FUNCTION__);
1345
Orion Hodson971068d2021-06-30 21:17:53 +01001346 deny_art_apex_data_files_ = runtime_options.Exists(Opt::DenyArtApexDataFiles);
1347 if (deny_art_apex_data_files_) {
1348 // We will run slower without those files if the system has taken an ART APEX update.
1349 LOG(WARNING) << "ART APEX data files are untrusted.";
1350 }
1351
Andreas Gampe25419b52018-02-08 21:30:26 -08001352 // Early override for logging output.
1353 if (runtime_options.Exists(Opt::UseStderrLogger)) {
1354 android::base::SetLogger(android::base::StderrLogger);
1355 }
1356
Mathieu Chartier6e88ef62014-10-14 15:01:24 -07001357 MemMap::Init();
1358
Andreas Gamped84794d2019-07-18 13:40:03 -07001359 verifier_missing_kthrow_fatal_ = runtime_options.GetOrDefault(Opt::VerifierMissingKThrowFatal);
Hans Boehm1792c6f2021-06-24 17:35:50 -07001360 force_java_zygote_fork_loop_ = runtime_options.GetOrDefault(Opt::ForceJavaZygoteForkLoop);
Florian Mayer0972d082020-05-15 14:07:31 +02001361 perfetto_hprof_enabled_ = runtime_options.GetOrDefault(Opt::PerfettoHprof);
Wessam Hassaneinb5a10be2020-11-11 16:42:52 -08001362 perfetto_javaheapprof_enabled_ = runtime_options.GetOrDefault(Opt::PerfettoJavaHeapStackProf);
Andreas Gamped84794d2019-07-18 13:40:03 -07001363
Andreas Gampe5f2a2fc2017-05-18 17:45:07 -07001364 // Try to reserve a dedicated fault page. This is allocated for clobbered registers and sentinels.
1365 // If we cannot reserve it, log a warning.
1366 // Note: We allocate this first to have a good chance of grabbing the page. The address (0xebad..)
1367 // is out-of-the-way enough that it should not collide with boot image mapping.
1368 // Note: Don't request an error message. That will lead to a maps dump in the case of failure,
1369 // leading to logspam.
1370 {
1371 constexpr uintptr_t kSentinelAddr =
1372 RoundDown(static_cast<uintptr_t>(Context::kBadGprBase), kPageSize);
Vladimir Markoc34bebf2018-08-16 16:12:49 +01001373 protected_fault_page_ = MemMap::MapAnonymous("Sentinel fault page",
1374 reinterpret_cast<uint8_t*>(kSentinelAddr),
1375 kPageSize,
1376 PROT_NONE,
Vladimir Marko11306592018-10-26 14:22:59 +01001377 /*low_4gb=*/ true,
1378 /*reuse=*/ false,
1379 /*reservation=*/ nullptr,
1380 /*error_msg=*/ nullptr);
Vladimir Markoc34bebf2018-08-16 16:12:49 +01001381 if (!protected_fault_page_.IsValid()) {
Andreas Gampe5f2a2fc2017-05-18 17:45:07 -07001382 LOG(WARNING) << "Could not reserve sentinel fault page";
Vladimir Markoc34bebf2018-08-16 16:12:49 +01001383 } else if (reinterpret_cast<uintptr_t>(protected_fault_page_.Begin()) != kSentinelAddr) {
Andreas Gampe5f2a2fc2017-05-18 17:45:07 -07001384 LOG(WARNING) << "Could not reserve sentinel fault page at the right address.";
Vladimir Markoc34bebf2018-08-16 16:12:49 +01001385 protected_fault_page_.Reset();
Andreas Gampe5f2a2fc2017-05-18 17:45:07 -07001386 }
1387 }
1388
Elliott Hughes4dd9b4d2011-12-12 18:29:24 -08001389 VLOG(startup) << "Runtime::Init -verbose:startup enabled";
Elliott Hughes7ede61e2011-09-14 18:18:06 -07001390
Elliott Hughes7c6169d2012-05-02 16:11:48 -07001391 QuasiAtomic::Startup();
1392
Nicolas Geoffrayea55f3d2021-09-07 12:16:56 +01001393 oat_file_manager_ = new OatFileManager();
Mathieu Chartierf9c6fc62015-10-07 11:44:05 -07001394
Nicolas Geoffrayea55f3d2021-09-07 12:16:56 +01001395 jni_id_manager_.reset(new jni::JniIdManager());
Alex Light79d6c802019-06-27 15:50:11 +00001396
Calin Juravleb2771b42016-04-07 17:09:25 +01001397 Thread::SetSensitiveThreadHook(runtime_options.GetOrDefault(Opt::HookIsSensitiveThread));
Andreas Gamped0210e52017-06-23 13:38:09 -07001398 Monitor::Init(runtime_options.GetOrDefault(Opt::LockProfThreshold),
1399 runtime_options.GetOrDefault(Opt::StackDumpLockProfThreshold));
Elliott Hughes32d6e1e2011-10-11 14:47:44 -07001400
Victor Hsieh61ffd042021-05-20 15:14:25 -07001401 image_locations_ = runtime_options.ReleaseOrDefault(Opt::Image);
Nicolas Geoffray144f82c2019-02-21 09:43:18 +00001402
Vladimir Marko91f10322018-12-07 18:04:10 +00001403 SetInstructionSet(runtime_options.GetOrDefault(Opt::ImageInstructionSet));
1404 boot_class_path_ = runtime_options.ReleaseOrDefault(Opt::BootClassPath);
1405 boot_class_path_locations_ = runtime_options.ReleaseOrDefault(Opt::BootClassPathLocations);
1406 DCHECK(boot_class_path_locations_.empty() ||
1407 boot_class_path_locations_.size() == boot_class_path_.size());
1408 if (boot_class_path_.empty()) {
Victor Hsiehb5728322021-05-21 09:45:35 -07001409 LOG(ERROR) << "Boot classpath is empty";
1410 return false;
Vladimir Marko91f10322018-12-07 18:04:10 +00001411 }
1412
Victor Hsieha09d8b72021-05-24 14:21:55 -07001413 boot_class_path_fds_ = runtime_options.ReleaseOrDefault(Opt::BootClassPathFds);
1414 if (!boot_class_path_fds_.empty() && boot_class_path_fds_.size() != boot_class_path_.size()) {
1415 LOG(ERROR) << "Number of FDs specified in -Xbootclasspathfds must match the number of JARs in "
1416 << "-Xbootclasspath.";
1417 return false;
1418 }
1419
Victor Hsiehce9b9022021-07-21 10:44:06 -07001420 boot_class_path_image_fds_ = runtime_options.ReleaseOrDefault(Opt::BootClassPathImageFds);
1421 boot_class_path_vdex_fds_ = runtime_options.ReleaseOrDefault(Opt::BootClassPathVdexFds);
1422 boot_class_path_oat_fds_ = runtime_options.ReleaseOrDefault(Opt::BootClassPathOatFds);
1423 CHECK(boot_class_path_image_fds_.empty() ||
1424 boot_class_path_image_fds_.size() == boot_class_path_fds_.size());
1425 CHECK(boot_class_path_vdex_fds_.empty() ||
1426 boot_class_path_vdex_fds_.size() == boot_class_path_fds_.size());
1427 CHECK(boot_class_path_oat_fds_.empty() ||
1428 boot_class_path_oat_fds_.size() == boot_class_path_fds_.size());
1429
Igor Murashkinaaebaa02015-01-26 10:55:53 -08001430 class_path_string_ = runtime_options.ReleaseOrDefault(Opt::ClassPath);
1431 properties_ = runtime_options.ReleaseOrDefault(Opt::PropertiesList);
Elliott Hughes7ede61e2011-09-14 18:18:06 -07001432
Igor Murashkinaaebaa02015-01-26 10:55:53 -08001433 compiler_callbacks_ = runtime_options.GetOrDefault(Opt::CompilerCallbacksPtr);
Igor Murashkinaaebaa02015-01-26 10:55:53 -08001434 must_relocate_ = runtime_options.GetOrDefault(Opt::Relocate);
1435 is_zygote_ = runtime_options.Exists(Opt::Zygote);
Nicolas Geoffray4444f1b2019-06-10 14:09:19 +01001436 is_primary_zygote_ = runtime_options.Exists(Opt::PrimaryZygote);
Igor Murashkinaaebaa02015-01-26 10:55:53 -08001437 is_explicit_gc_disabled_ = runtime_options.Exists(Opt::DisableExplicitGC);
Igor Murashkinaaebaa02015-01-26 10:55:53 -08001438 image_dex2oat_enabled_ = runtime_options.GetOrDefault(Opt::ImageDex2Oat);
Nicolas Geoffray6ee49712018-03-30 14:39:05 +00001439 dump_native_stack_on_sig_quit_ = runtime_options.GetOrDefault(Opt::DumpNativeStackOnSigQuit);
Elliott Hughes9ca7a1f2011-10-11 14:29:52 -07001440
Nicolas Geoffrayea55f3d2021-09-07 12:16:56 +01001441 if (is_zygote_ || runtime_options.Exists(Opt::OnlyUseTrustedOatFiles)) {
1442 oat_file_manager_->SetOnlyUseTrustedOatFiles();
1443 }
1444
Igor Murashkinaaebaa02015-01-26 10:55:53 -08001445 vfprintf_ = runtime_options.GetOrDefault(Opt::HookVfprintf);
1446 exit_ = runtime_options.GetOrDefault(Opt::HookExit);
1447 abort_ = runtime_options.GetOrDefault(Opt::HookAbort);
Brian Carlstrom6ea095a2011-08-16 15:26:54 -07001448
Igor Murashkinaaebaa02015-01-26 10:55:53 -08001449 default_stack_size_ = runtime_options.GetOrDefault(Opt::StackSize);
Brian Carlstrom6ea095a2011-08-16 15:26:54 -07001450
Igor Murashkinaaebaa02015-01-26 10:55:53 -08001451 compiler_executable_ = runtime_options.ReleaseOrDefault(Opt::Compiler);
1452 compiler_options_ = runtime_options.ReleaseOrDefault(Opt::CompilerOptions);
Vladimir Marko72101082019-02-05 16:16:30 +00001453 for (const std::string& option : Runtime::Current()->GetCompilerOptions()) {
1454 if (option == "--debuggable") {
Nicolas Geoffray433b79a2017-01-30 20:54:45 +00001455 SetJavaDebuggable(true);
1456 break;
1457 }
1458 }
Igor Murashkinaaebaa02015-01-26 10:55:53 -08001459 image_compiler_options_ = runtime_options.ReleaseOrDefault(Opt::ImageCompilerOptions);
Brian Carlstrom2ec65202014-03-03 15:16:37 -08001460
Hans Boehmb2155572019-03-27 14:25:53 -07001461 finalizer_timeout_ms_ = runtime_options.GetOrDefault(Opt::FinalizerTimeoutMs);
Igor Murashkinaaebaa02015-01-26 10:55:53 -08001462 max_spins_before_thin_lock_inflation_ =
1463 runtime_options.GetOrDefault(Opt::MaxSpinsBeforeThinLockInflation);
Ian Rogersd9c4fc92013-10-01 19:45:43 -07001464
Elliott Hughesc33a32b2011-10-11 18:18:07 -07001465 monitor_list_ = new MonitorList;
Ian Rogersef7d42f2014-01-06 12:55:46 -08001466 monitor_pool_ = MonitorPool::Create();
Mathieu Chartier3fceaf52017-01-22 13:33:40 -08001467 thread_list_ = new ThreadList(runtime_options.GetOrDefault(Opt::ThreadSuspendTimeout));
Elliott Hughescf4c6c42011-09-01 15:16:42 -07001468 intern_table_ = new InternTable;
1469
wangguibo0d290722021-04-24 11:27:06 +08001470 monitor_timeout_enable_ = runtime_options.GetOrDefault(Opt::MonitorTimeoutEnable);
1471 int monitor_timeout_ms = runtime_options.GetOrDefault(Opt::MonitorTimeout);
Hans Boehmc3632b12021-05-17 15:18:14 -07001472 if (monitor_timeout_ms < Monitor::kMonitorTimeoutMinMs) {
1473 LOG(WARNING) << "Monitor timeout too short: Increasing";
1474 monitor_timeout_ms = Monitor::kMonitorTimeoutMinMs;
1475 }
1476 if (monitor_timeout_ms >= Monitor::kMonitorTimeoutMaxMs) {
1477 LOG(WARNING) << "Monitor timeout too long: Decreasing";
1478 monitor_timeout_ms = Monitor::kMonitorTimeoutMaxMs - 1;
wangguibo0d290722021-04-24 11:27:06 +08001479 }
1480 monitor_timeout_ns_ = MsToNs(monitor_timeout_ms);
1481
Igor Murashkinaaebaa02015-01-26 10:55:53 -08001482 verify_ = runtime_options.GetOrDefault(Opt::Verify);
Logan Chiendd361c92012-04-10 23:40:37 +08001483
David Brazdila7db0262018-01-16 17:13:35 +00001484 target_sdk_version_ = runtime_options.GetOrDefault(Opt::TargetSdkVersion);
1485
David Brazdil6dfdfef2019-04-11 17:39:11 +01001486 // Set hidden API enforcement policy. The checks are disabled by default and
1487 // we only enable them if:
1488 // (a) runtime was started with a command line flag that enables the checks, or
David Brazdilad666272018-02-06 20:30:59 +00001489 // (b) Zygote forked a new process that is not exempt (see ZygoteHooks).
David Brazdil6dfdfef2019-04-11 17:39:11 +01001490 hidden_api_policy_ = runtime_options.GetOrDefault(Opt::HiddenApiPolicy);
1491 DCHECK(!is_zygote_ || hidden_api_policy_ == hiddenapi::EnforcementPolicy::kDisabled);
1492
1493 // Set core platform API enforcement policy. The checks are disabled by default and
1494 // can be enabled with a command line flag. AndroidRuntime will pass the flag if
1495 // a system property is set.
1496 core_platform_api_policy_ = runtime_options.GetOrDefault(Opt::CorePlatformApiPolicy);
1497 if (core_platform_api_policy_ != hiddenapi::EnforcementPolicy::kDisabled) {
1498 LOG(INFO) << "Core platform API reporting enabled, enforcing="
1499 << (core_platform_api_policy_ == hiddenapi::EnforcementPolicy::kEnabled ? "true" : "false");
1500 }
David Brazdil3e0fa0a2018-01-15 18:41:44 +00001501
Calin Juravle01aaf6e2015-06-19 22:05:39 +01001502 no_sig_chain_ = runtime_options.Exists(Opt::NoSigChain);
Calin Juravled3e7c6c2016-02-04 19:07:51 +00001503 force_native_bridge_ = runtime_options.Exists(Opt::ForceNativeBridge);
Calin Juravle01aaf6e2015-06-19 22:05:39 +01001504
Dmitriy Ivanov785049f2014-07-18 10:08:57 -07001505 Split(runtime_options.GetOrDefault(Opt::CpuAbiList), ',', &cpu_abilist_);
1506
Andreas Gampedd671252015-07-23 14:37:18 -07001507 fingerprint_ = runtime_options.ReleaseOrDefault(Opt::Fingerprint);
1508
Ulya Trafimovich5439f052020-07-29 10:03:46 +01001509 if (runtime_options.GetOrDefault(Opt::Interpret)) {
Ian Rogers62d6c772013-02-27 08:32:07 -08001510 GetInstrumentation()->ForceInterpretOnly();
1511 }
1512
Narayan Kamath5a2be3f2015-02-16 13:51:51 +00001513 zygote_max_failed_boots_ = runtime_options.GetOrDefault(Opt::ZygoteMaxFailedBoots);
Alex Lighteb7c1442015-08-31 13:17:42 -07001514 experimental_flags_ = runtime_options.GetOrDefault(Opt::Experimental);
Mathieu Chartier32cc9ee2015-10-15 09:19:15 -07001515 is_low_memory_mode_ = runtime_options.Exists(Opt::LowMemoryMode);
Mathieu Chartierc42cb0e2017-10-13 11:35:00 -07001516 madvise_random_access_ = runtime_options.GetOrDefault(Opt::MadviseRandomAccess);
Jagadeesh Pakaravoor06541532021-02-22 21:19:09 -08001517 madvise_willneed_vdex_filesize_ = runtime_options.GetOrDefault(Opt::MadviseWillNeedVdexFileSize);
1518 madvise_willneed_odex_filesize_ = runtime_options.GetOrDefault(Opt::MadviseWillNeedOdexFileSize);
1519 madvise_willneed_art_filesize_ = runtime_options.GetOrDefault(Opt::MadviseWillNeedArtFileSize);
Narayan Kamath5a2be3f2015-02-16 13:51:51 +00001520
Alex Lightf3677472019-06-26 16:31:53 -07001521 jni_ids_indirection_ = runtime_options.GetOrDefault(Opt::OpaqueJniIds);
Alex Light4ca2f482019-11-25 16:07:22 -08001522 automatically_set_jni_ids_indirection_ =
1523 runtime_options.GetOrDefault(Opt::AutoPromoteOpaqueJniIds);
Alex Light79d6c802019-06-27 15:50:11 +00001524
Andreas Gampe01fd70b2017-01-25 10:03:08 -08001525 plugins_ = runtime_options.ReleaseOrDefault(Opt::Plugins);
Andreas Gampeaadcbc62017-12-28 14:05:42 -08001526 agent_specs_ = runtime_options.ReleaseOrDefault(Opt::AgentPath);
Andreas Gampe01fd70b2017-01-25 10:03:08 -08001527 // TODO Add back in -agentlib
1528 // for (auto lib : runtime_options.ReleaseOrDefault(Opt::AgentLib)) {
1529 // agents_.push_back(lib);
1530 // }
1531
Mathieu Chartier11c273d2017-10-15 20:54:45 -07001532 float foreground_heap_growth_multiplier;
1533 if (is_low_memory_mode_ && !runtime_options.Exists(Opt::ForegroundHeapGrowthMultiplier)) {
1534 // If low memory mode, use 1.0 as the multiplier by default.
1535 foreground_heap_growth_multiplier = 1.0f;
1536 } else {
1537 foreground_heap_growth_multiplier =
1538 runtime_options.GetOrDefault(Opt::ForegroundHeapGrowthMultiplier) +
1539 kExtraDefaultHeapGrowthMultiplier;
1540 }
Igor Murashkinaaebaa02015-01-26 10:55:53 -08001541 XGcOption xgc_option = runtime_options.GetOrDefault(Opt::GcOption);
Albert Mingkun Yang0b4d1462018-11-29 13:25:35 +00001542
1543 // Generational CC collection is currently only compatible with Baker read barriers.
1544 bool use_generational_cc = kUseBakerReadBarrier && xgc_option.generational_cc;
1545
Igor Murashkinaaebaa02015-01-26 10:55:53 -08001546 heap_ = new gc::Heap(runtime_options.GetOrDefault(Opt::MemoryInitialSize),
1547 runtime_options.GetOrDefault(Opt::HeapGrowthLimit),
1548 runtime_options.GetOrDefault(Opt::HeapMinFree),
1549 runtime_options.GetOrDefault(Opt::HeapMaxFree),
1550 runtime_options.GetOrDefault(Opt::HeapTargetUtilization),
Mathieu Chartier11c273d2017-10-15 20:54:45 -07001551 foreground_heap_growth_multiplier,
Hans Boehmbb2467b2019-03-29 22:55:06 -07001552 runtime_options.GetOrDefault(Opt::StopForNativeAllocs),
Igor Murashkinaaebaa02015-01-26 10:55:53 -08001553 runtime_options.GetOrDefault(Opt::MemoryMaximumSize),
1554 runtime_options.GetOrDefault(Opt::NonMovingSpaceCapacity),
Vladimir Marko91f10322018-12-07 18:04:10 +00001555 GetBootClassPath(),
1556 GetBootClassPathLocations(),
Victor Hsieha09d8b72021-05-24 14:21:55 -07001557 GetBootClassPathFds(),
Victor Hsiehce9b9022021-07-21 10:44:06 -07001558 GetBootClassPathImageFds(),
1559 GetBootClassPathVdexFds(),
1560 GetBootClassPathOatFds(),
Victor Hsieh61ffd042021-05-20 15:14:25 -07001561 image_locations_,
Ulya Trafimovich5439f052020-07-29 10:03:46 +01001562 instruction_set_,
Hiroshi Yamauchi1b0adbf2016-11-14 17:35:12 -08001563 // Override the collector type to CC if the read barrier config.
1564 kUseReadBarrier ? gc::kCollectorTypeCC : xgc_option.collector_type_,
1565 kUseReadBarrier ? BackgroundGcOption(gc::kCollectorTypeCCBackground)
1566 : runtime_options.GetOrDefault(Opt::BackgroundGc),
Igor Murashkinaaebaa02015-01-26 10:55:53 -08001567 runtime_options.GetOrDefault(Opt::LargeObjectSpace),
1568 runtime_options.GetOrDefault(Opt::LargeObjectThreshold),
1569 runtime_options.GetOrDefault(Opt::ParallelGCThreads),
1570 runtime_options.GetOrDefault(Opt::ConcGCThreads),
1571 runtime_options.Exists(Opt::LowMemoryMode),
1572 runtime_options.GetOrDefault(Opt::LongPauseLogThreshold),
1573 runtime_options.GetOrDefault(Opt::LongGCLogThreshold),
1574 runtime_options.Exists(Opt::IgnoreMaxFootprint),
Alex Lightb5a0e912020-07-23 10:54:47 -07001575 runtime_options.GetOrDefault(Opt::AlwaysLogExplicitGcs),
Hiroshi Yamauchif360ad02015-02-20 11:28:03 -08001576 runtime_options.GetOrDefault(Opt::UseTLAB),
Igor Murashkinaaebaa02015-01-26 10:55:53 -08001577 xgc_option.verify_pre_gc_heap_,
1578 xgc_option.verify_pre_sweeping_heap_,
1579 xgc_option.verify_post_gc_heap_,
1580 xgc_option.verify_pre_gc_rosalloc_,
1581 xgc_option.verify_pre_sweeping_rosalloc_,
1582 xgc_option.verify_post_gc_rosalloc_,
Mathieu Chartier31000802015-06-14 14:14:37 -07001583 xgc_option.gcstress_,
Mathieu Chartier56fe2582016-07-14 13:30:03 -07001584 xgc_option.measure_,
Igor Murashkinaaebaa02015-01-26 10:55:53 -08001585 runtime_options.GetOrDefault(Opt::EnableHSpaceCompactForOOM),
Albert Mingkun Yang0b4d1462018-11-29 13:25:35 +00001586 use_generational_cc,
Albert Mingkun Yangde94ea72018-11-16 10:15:49 +00001587 runtime_options.GetOrDefault(Opt::HSpaceCompactForOOMMinIntervalsMs),
1588 runtime_options.Exists(Opt::DumpRegionInfoBeforeGC),
Orion Hodsonae7168e2020-10-09 15:13:29 +01001589 runtime_options.Exists(Opt::DumpRegionInfoAfterGC));
Dave Allison3d14eb62014-07-10 01:54:57 +00001590
Igor Murashkinaaebaa02015-01-26 10:55:53 -08001591 dump_gc_performance_on_shutdown_ = runtime_options.Exists(Opt::DumpGCPerformanceOnShutdown);
Dave Allison3d14eb62014-07-10 01:54:57 +00001592
Alex Light01cc9102021-02-04 16:53:40 -08001593 bool has_explicit_jdwp_options = runtime_options.Get(Opt::JdwpOptions) != nullptr;
Alex Light40320712017-12-14 11:52:04 -08001594 jdwp_options_ = runtime_options.GetOrDefault(Opt::JdwpOptions);
Alex Lightbaac7e42018-06-08 15:30:11 +00001595 jdwp_provider_ = CanonicalizeJdwpProvider(runtime_options.GetOrDefault(Opt::JdwpProvider),
1596 IsJavaDebuggable());
Alex Light40320712017-12-14 11:52:04 -08001597 switch (jdwp_provider_) {
1598 case JdwpProvider::kNone: {
Alex Light230fa942018-03-08 14:07:02 -08001599 VLOG(jdwp) << "Disabling all JDWP support.";
Alex Lightb06bd682018-01-29 13:26:45 -08001600 if (!jdwp_options_.empty()) {
1601 bool has_transport = jdwp_options_.find("transport") != std::string::npos;
Alex Lightb06bd682018-01-29 13:26:45 -08001602 std::string adb_connection_args =
1603 std::string(" -XjdwpProvider:adbconnection -XjdwpOptions:") + jdwp_options_;
Alex Light01cc9102021-02-04 16:53:40 -08001604 if (has_explicit_jdwp_options) {
1605 LOG(WARNING) << "Jdwp options given when jdwp is disabled! You probably want to enable "
1606 << "jdwp with one of:" << std::endl
1607 << " -Xplugin:libopenjdkjvmti" << (kIsDebugBuild ? "d" : "") << ".so "
1608 << "-agentpath:libjdwp.so=" << jdwp_options_ << std::endl
1609 << (has_transport ? "" : adb_connection_args);
1610 }
Alex Lightb06bd682018-01-29 13:26:45 -08001611 }
Alex Light40320712017-12-14 11:52:04 -08001612 break;
1613 }
Alex Lightfbf96702017-12-14 13:27:13 -08001614 case JdwpProvider::kAdbConnection: {
1615 constexpr const char* plugin_name = kIsDebugBuild ? "libadbconnectiond.so"
1616 : "libadbconnection.so";
1617 plugins_.push_back(Plugin::Create(plugin_name));
Alex Lightbaac7e42018-06-08 15:30:11 +00001618 break;
1619 }
1620 case JdwpProvider::kUnset: {
1621 LOG(FATAL) << "Illegal jdwp provider " << jdwp_provider_ << " was not filtered out!";
Alex Lightfbf96702017-12-14 13:27:13 -08001622 }
Sebastien Hertz3be6e9d2015-02-05 16:30:58 +01001623 }
Andreas Gampeac30fa22017-01-18 21:02:36 -08001624 callbacks_->AddThreadLifecycleCallback(Dbg::GetThreadLifecycleCallback());
Sebastien Hertz3be6e9d2015-02-05 16:30:58 +01001625
Mathieu Chartier455f67c2015-03-17 13:48:29 -07001626 jit_options_.reset(jit::JitOptions::CreateFromRuntimeArguments(runtime_options));
Mathieu Chartier455f67c2015-03-17 13:48:29 -07001627 if (IsAotCompiler()) {
Mathieu Chartiere5f13e52015-02-24 09:37:21 -08001628 // If we are already the compiler at this point, we must be dex2oat. Don't create the jit in
1629 // this case.
1630 // If runtime_options doesn't have UseJIT set to true then CreateFromRuntimeArguments returns
Mathieu Chartier2cebb242015-04-21 16:50:40 -07001631 // null and we don't create the jit.
Calin Juravleffc87072016-04-20 14:22:09 +01001632 jit_options_->SetUseJitCompilation(false);
1633 jit_options_->SetSaveProfilingInfo(false);
Mathieu Chartiere5f13e52015-02-24 09:37:21 -08001634 }
1635
Mathieu Chartierc6201fa2015-03-12 10:06:33 -07001636 // Use MemMap arena pool for jit, malloc otherwise. Malloc arenas are faster to allocate but
1637 // can't be trimmed as easily.
Mathieu Chartiere401d142015-04-22 13:56:20 -07001638 const bool use_malloc = IsAotCompiler();
David Sehr3215fff2018-04-03 17:10:12 -07001639 if (use_malloc) {
1640 arena_pool_.reset(new MallocArenaPool());
1641 jit_arena_pool_.reset(new MallocArenaPool());
1642 } else {
Andreas Gampe98ea9d92018-10-19 14:06:15 -07001643 arena_pool_.reset(new MemMapArenaPool(/* low_4gb= */ false));
1644 jit_arena_pool_.reset(new MemMapArenaPool(/* low_4gb= */ false, "CompilerMetadata"));
David Sehr3215fff2018-04-03 17:10:12 -07001645 }
Nicolas Geoffray25e04562016-03-01 13:17:58 +00001646
Mathieu Chartier017ed0b2015-09-22 11:04:26 -07001647 if (IsAotCompiler() && Is64BitInstructionSet(kRuntimeISA)) {
Mathieu Chartierc7853442015-03-27 14:35:38 -07001648 // 4gb, no malloc. Explanation in header.
Andreas Gampe98ea9d92018-10-19 14:06:15 -07001649 low_4gb_arena_pool_.reset(new MemMapArenaPool(/* low_4gb= */ true));
Mathieu Chartierc7853442015-03-27 14:35:38 -07001650 }
Mathieu Chartier951ec2c2015-09-22 08:50:05 -07001651 linear_alloc_.reset(CreateLinearAlloc());
Mathieu Chartierc6201fa2015-03-12 10:06:33 -07001652
Dave Allison3d14eb62014-07-10 01:54:57 +00001653 BlockSignals();
1654 InitPlatformSignalHandlers();
1655
Dave Allison69dfe512014-07-11 17:11:58 +00001656 // Change the implicit checks flags based on runtime architecture.
1657 switch (kRuntimeISA) {
Vladimir Marko33bff252017-11-01 14:35:42 +00001658 case InstructionSet::kArm:
1659 case InstructionSet::kThumb2:
1660 case InstructionSet::kX86:
1661 case InstructionSet::kArm64:
1662 case InstructionSet::kX86_64:
Dave Allison69dfe512014-07-11 17:11:58 +00001663 implicit_null_checks_ = true;
Roland Levillain05e34f42018-05-24 13:19:05 +00001664 // Historical note: Installing stack protection was not playing well with Valgrind.
1665 implicit_so_checks_ = true;
Dave Allison69dfe512014-07-11 17:11:58 +00001666 break;
1667 default:
1668 // Keep the defaults.
1669 break;
1670 }
1671
Calin Juravle01aaf6e2015-06-19 22:05:39 +01001672 if (!no_sig_chain_) {
1673 // Dex2Oat's Runtime does not need the signal chain or the fault handler.
Calin Juravle01aaf6e2015-06-19 22:05:39 +01001674 if (implicit_null_checks_ || implicit_so_checks_ || implicit_suspend_checks_) {
1675 fault_manager.Init();
Dave Allison69dfe512014-07-11 17:11:58 +00001676
Calin Juravle01aaf6e2015-06-19 22:05:39 +01001677 // These need to be in a specific order. The null point check handler must be
1678 // after the suspend check and stack overflow check handlers.
1679 //
Roland Levillain05e34f42018-05-24 13:19:05 +00001680 // Note: the instances attach themselves to the fault manager and are handled by it. The
1681 // manager will delete the instance on Shutdown().
Calin Juravle01aaf6e2015-06-19 22:05:39 +01001682 if (implicit_suspend_checks_) {
1683 new SuspensionHandler(&fault_manager);
1684 }
Dave Allison69dfe512014-07-11 17:11:58 +00001685
Calin Juravle01aaf6e2015-06-19 22:05:39 +01001686 if (implicit_so_checks_) {
1687 new StackOverflowHandler(&fault_manager);
1688 }
Dave Allison69dfe512014-07-11 17:11:58 +00001689
Calin Juravle01aaf6e2015-06-19 22:05:39 +01001690 if (implicit_null_checks_) {
1691 new NullPointerHandler(&fault_manager);
1692 }
1693
1694 if (kEnableJavaStackTraceHandler) {
1695 new JavaStackTraceHandler(&fault_manager);
1696 }
Dave Allison69dfe512014-07-11 17:11:58 +00001697 }
1698 }
1699
Andreas Gampe0b0ffc12018-08-01 14:41:27 -07001700 verifier_logging_threshold_ms_ = runtime_options.GetOrDefault(Opt::VerifierLoggingThreshold);
1701
Richard Uhlerda0a69e2016-10-11 15:06:38 +01001702 std::string error_msg;
1703 java_vm_ = JavaVMExt::Create(this, runtime_options, &error_msg);
1704 if (java_vm_.get() == nullptr) {
1705 LOG(ERROR) << "Could not initialize JavaVMExt: " << error_msg;
1706 return false;
1707 }
Elliott Hughes515a5bc2011-08-17 11:08:34 -07001708
Alex Light185d1342016-08-11 10:48:03 -07001709 // Add the JniEnv handler.
1710 // TODO Refactor this stuff.
1711 java_vm_->AddEnvironmentHook(JNIEnvExt::GetEnvHandler);
1712
Elliott Hughesbe759c62011-09-08 19:38:21 -07001713 Thread::Startup();
Elliott Hughesd92bec42011-09-02 17:04:36 -07001714
Mathieu Chartier664bebf2012-11-12 16:54:11 -08001715 // ClassLinker needs an attached thread, but we can't fully attach a thread without creating
1716 // objects. We can't supply a thread group yet; it will be fixed later. Since we are the main
1717 // thread, we do not get a java peer.
Ian Rogers63557452014-06-04 16:57:15 -07001718 Thread* self = Thread::Attach("main", false, nullptr, false);
Ian Rogersdd7624d2014-03-14 17:43:00 -07001719 CHECK_EQ(self->GetThreadId(), ThreadList::kMainThreadId);
Ian Rogers63557452014-06-04 16:57:15 -07001720 CHECK(self != nullptr);
Brian Carlstrom6ea095a2011-08-16 15:26:54 -07001721
Alex Lighte9f61032018-09-24 16:04:51 -07001722 self->SetIsRuntimeThread(IsAotCompiler());
Calin Juravleccd56952016-12-15 17:57:38 +00001723
Brian Carlstromf28bc5b2011-10-26 01:15:03 -07001724 // Set us to runnable so tools using a runtime can allocate and GC by default
Ian Rogers120f1c72012-09-28 17:17:10 -07001725 self->TransitionFromSuspendedToRunnable();
Brian Carlstromf28bc5b2011-10-26 01:15:03 -07001726
Ian Rogersa436fde2013-08-27 23:34:06 -07001727 // Now we're attached, we can take the heap locks and validate the heap.
Ian Rogers141d6222012-04-05 12:23:06 -07001728 GetHeap()->EnableObjectValidation();
1729
Ian Rogers1d54e732013-05-02 21:10:01 -07001730 CHECK_GE(GetHeap()->GetContinuousSpaces().size(), 1U);
Andreas Gampe87658f32019-04-18 18:39:02 +00001731
Chang Xing605fe242017-07-20 15:57:21 -07001732 if (UNLIKELY(IsAotCompiler())) {
1733 class_linker_ = new AotClassLinker(intern_table_);
1734 } else {
Andreas Gampe87658f32019-04-18 18:39:02 +00001735 class_linker_ = new ClassLinker(
1736 intern_table_,
1737 runtime_options.GetOrDefault(Opt::FastClassNotFoundException));
Chang Xing605fe242017-07-20 15:57:21 -07001738 }
Jeff Haodcdc85b2015-12-04 14:06:18 -08001739 if (GetHeap()->HasBootImageSpace()) {
Mathieu Chartierfbc31082016-01-24 11:59:56 -08001740 bool result = class_linker_->InitFromBootImage(&error_msg);
Andreas Gampe3db9c5d2015-11-17 11:52:46 -08001741 if (!result) {
1742 LOG(ERROR) << "Could not initialize from image: " << error_msg;
1743 return false;
1744 }
Hiroshi Yamauchibd0fb612014-05-20 13:46:00 -07001745 if (kIsDebugBuild) {
Jeff Haodcdc85b2015-12-04 14:06:18 -08001746 for (auto image_space : GetHeap()->GetBootImageSpaces()) {
1747 image_space->VerifyImageAllocations();
1748 }
Hiroshi Yamauchibd0fb612014-05-20 13:46:00 -07001749 }
Vladimir Markocac5a7e2016-02-22 10:39:50 +00001750 {
1751 ScopedTrace trace2("AddImageStringsToTable");
Mathieu Chartier74ccee62018-10-10 10:30:29 -07001752 for (gc::space::ImageSpace* image_space : heap_->GetBootImageSpaces()) {
1753 GetInternTable()->AddImageStringsToTable(image_space, VoidFunctor());
1754 }
Vladimir Markocac5a7e2016-02-22 10:39:50 +00001755 }
Orion Hodson771708f2021-01-06 15:45:16 +00001756
1757 const size_t total_components = gc::space::ImageSpace::GetNumberOfComponents(
1758 ArrayRef<gc::space::ImageSpace* const>(heap_->GetBootImageSpaces()));
1759 if (total_components != GetBootClassPath().size()) {
Vladimir Marko0ace5632018-12-14 11:11:47 +00001760 // The boot image did not contain all boot class path components. Load the rest.
Orion Hodson771708f2021-01-06 15:45:16 +00001761 CHECK_LT(total_components, GetBootClassPath().size());
1762 size_t start = total_components;
Vladimir Marko0ace5632018-12-14 11:11:47 +00001763 DCHECK_LT(start, GetBootClassPath().size());
1764 std::vector<std::unique_ptr<const DexFile>> extra_boot_class_path;
1765 if (runtime_options.Exists(Opt::BootClassPathDexList)) {
1766 extra_boot_class_path.swap(*runtime_options.GetOrDefault(Opt::BootClassPathDexList));
1767 } else {
Victor Hsiehce9b9022021-07-21 10:44:06 -07001768 ArrayRef<const int> bcp_fds = start < GetBootClassPathFds().size()
1769 ? ArrayRef<const int>(GetBootClassPathFds()).SubArray(start)
1770 : ArrayRef<const int>();
Nicolas Geoffray99fc9382019-02-20 13:17:27 +00001771 OpenBootDexFiles(ArrayRef<const std::string>(GetBootClassPath()).SubArray(start),
1772 ArrayRef<const std::string>(GetBootClassPathLocations()).SubArray(start),
Victor Hsiehce9b9022021-07-21 10:44:06 -07001773 bcp_fds,
Nicolas Geoffray99fc9382019-02-20 13:17:27 +00001774 &extra_boot_class_path);
Vladimir Marko0ace5632018-12-14 11:11:47 +00001775 }
1776 class_linker_->AddExtraBootDexFiles(self, std::move(extra_boot_class_path));
1777 }
Mathieu Chartier40906572019-09-30 13:57:11 -07001778 if (IsJavaDebuggable() || jit_options_->GetProfileSaverOptions().GetProfileBootClassPath()) {
1779 // Deoptimize the boot image if debuggable as the code may have been compiled non-debuggable.
1780 // Also deoptimize if we are profiling the boot class path.
Nicolas Geoffray226805d2018-12-14 10:59:02 +00001781 ScopedThreadSuspension sts(self, ThreadState::kNative);
1782 ScopedSuspendAll ssa(__FUNCTION__);
Nicolas Geoffray433b79a2017-01-30 20:54:45 +00001783 DeoptimizeBootImage();
1784 }
Richard Uhlerc2752592015-01-02 13:28:22 -08001785 } else {
Richard Uhlerfbef44d2014-12-23 09:48:51 -08001786 std::vector<std::unique_ptr<const DexFile>> boot_class_path;
Vladimir Marko9bdf1082016-01-21 12:15:52 +00001787 if (runtime_options.Exists(Opt::BootClassPathDexList)) {
1788 boot_class_path.swap(*runtime_options.GetOrDefault(Opt::BootClassPathDexList));
1789 } else {
Nicolas Geoffray99fc9382019-02-20 13:17:27 +00001790 OpenBootDexFiles(ArrayRef<const std::string>(GetBootClassPath()),
1791 ArrayRef<const std::string>(GetBootClassPathLocations()),
Victor Hsiehce9b9022021-07-21 10:44:06 -07001792 ArrayRef<const int>(GetBootClassPathFds()),
Nicolas Geoffray99fc9382019-02-20 13:17:27 +00001793 &boot_class_path);
Vladimir Marko9bdf1082016-01-21 12:15:52 +00001794 }
Andreas Gampe3db9c5d2015-11-17 11:52:46 -08001795 if (!class_linker_->InitWithoutImage(std::move(boot_class_path), &error_msg)) {
1796 LOG(ERROR) << "Could not initialize without image: " << error_msg;
1797 return false;
1798 }
Igor Murashkinaaebaa02015-01-26 10:55:53 -08001799
Alex Light64ad14d2014-08-19 14:23:13 -07001800 // TODO: Should we move the following to InitWithoutImage?
Ulya Trafimovich5439f052020-07-29 10:03:46 +01001801 SetInstructionSet(instruction_set_);
Andreas Gampe8228cdf2017-05-30 15:03:54 -07001802 for (uint32_t i = 0; i < kCalleeSaveSize; i++) {
1803 CalleeSaveType type = CalleeSaveType(i);
Alex Light64ad14d2014-08-19 14:23:13 -07001804 if (!HasCalleeSaveMethod(type)) {
Ian Rogers6a3c1fc2014-10-31 00:33:20 -07001805 SetCalleeSaveMethod(CreateCalleeSaveMethod(), type);
Alex Light64ad14d2014-08-19 14:23:13 -07001806 }
1807 }
Igor Murashkina2cfee32015-01-07 16:37:24 -08001808 }
1809
Nicolas Geoffraybbdb1ed2021-06-29 14:12:05 +01001810 // Now that the boot image space is set, cache the boot classpath checksums,
1811 // to be used when validating oat files.
1812 ArrayRef<gc::space::ImageSpace* const> image_spaces(GetHeap()->GetBootImageSpaces());
1813 ArrayRef<const DexFile* const> bcp_dex_files(GetClassLinker()->GetBootClassPath());
1814 boot_class_path_checksums_ = gc::space::ImageSpace::GetBootClassPathChecksums(image_spaces,
1815 bcp_dex_files);
1816
1817 // Cache the apex versions.
Nicolas Geoffrayd3c45c22021-04-27 13:21:28 +01001818 InitializeApexVersions();
1819
Ian Rogers63557452014-06-04 16:57:15 -07001820 CHECK(class_linker_ != nullptr);
Ian Rogersc0542af2014-09-03 16:16:56 -07001821
Andreas Gampee0bbab92019-07-25 12:28:22 -07001822 verifier::ClassVerifier::Init(class_linker_);
Brian Carlstrom6ea095a2011-08-16 15:26:54 -07001823
Andreas Gampef6a780a2015-04-02 18:51:05 -07001824 if (runtime_options.Exists(Opt::MethodTrace)) {
1825 trace_config_.reset(new TraceConfig());
1826 trace_config_->trace_file = runtime_options.ReleaseOrDefault(Opt::MethodTraceFile);
1827 trace_config_->trace_file_size = runtime_options.ReleaseOrDefault(Opt::MethodTraceFileSize);
1828 trace_config_->trace_mode = Trace::TraceMode::kMethodTracing;
Andreas Gampe40da2862015-02-27 12:49:04 -08001829 trace_config_->trace_output_mode = runtime_options.Exists(Opt::MethodTraceStreaming) ?
1830 Trace::TraceOutputMode::kStreaming :
1831 Trace::TraceOutputMode::kFile;
Andreas Gampef6a780a2015-04-02 18:51:05 -07001832 }
jeffhaob5e81852012-03-12 11:15:45 -07001833
Brian Carlstrom491ca9e2014-03-02 18:24:38 -08001834 // TODO: move this to just be an Trace::Start argument
Igor Murashkinaaebaa02015-01-26 10:55:53 -08001835 Trace::SetDefaultClockSource(runtime_options.GetOrDefault(Opt::ProfileClock));
Dave Allison0aded082013-11-07 13:15:11 -08001836
Vladimir Markoc13fbd82018-06-04 16:16:28 +01001837 if (GetHeap()->HasBootImageSpace()) {
1838 const ImageHeader& image_header = GetHeap()->GetBootImageSpaces()[0]->GetImageHeader();
Vladimir Marko024d69f2019-06-13 10:52:32 +01001839 ObjPtr<mirror::ObjectArray<mirror::Object>> boot_image_live_objects =
1840 ObjPtr<mirror::ObjectArray<mirror::Object>>::DownCast(
1841 image_header.GetImageRoot(ImageHeader::kBootImageLiveObjects));
Vladimir Markoc13fbd82018-06-04 16:16:28 +01001842 pre_allocated_OutOfMemoryError_when_throwing_exception_ = GcRoot<mirror::Throwable>(
Vladimir Marko024d69f2019-06-13 10:52:32 +01001843 boot_image_live_objects->Get(ImageHeader::kOomeWhenThrowingException)->AsThrowable());
Vladimir Markoc13fbd82018-06-04 16:16:28 +01001844 DCHECK(pre_allocated_OutOfMemoryError_when_throwing_exception_.Read()->GetClass()
1845 ->DescriptorEquals("Ljava/lang/OutOfMemoryError;"));
1846 pre_allocated_OutOfMemoryError_when_throwing_oome_ = GcRoot<mirror::Throwable>(
Vladimir Marko024d69f2019-06-13 10:52:32 +01001847 boot_image_live_objects->Get(ImageHeader::kOomeWhenThrowingOome)->AsThrowable());
Vladimir Markoc13fbd82018-06-04 16:16:28 +01001848 DCHECK(pre_allocated_OutOfMemoryError_when_throwing_oome_.Read()->GetClass()
1849 ->DescriptorEquals("Ljava/lang/OutOfMemoryError;"));
1850 pre_allocated_OutOfMemoryError_when_handling_stack_overflow_ = GcRoot<mirror::Throwable>(
Vladimir Marko024d69f2019-06-13 10:52:32 +01001851 boot_image_live_objects->Get(ImageHeader::kOomeWhenHandlingStackOverflow)->AsThrowable());
Vladimir Markoc13fbd82018-06-04 16:16:28 +01001852 DCHECK(pre_allocated_OutOfMemoryError_when_handling_stack_overflow_.Read()->GetClass()
1853 ->DescriptorEquals("Ljava/lang/OutOfMemoryError;"));
1854 pre_allocated_NoClassDefFoundError_ = GcRoot<mirror::Throwable>(
Vladimir Marko024d69f2019-06-13 10:52:32 +01001855 boot_image_live_objects->Get(ImageHeader::kNoClassDefFoundError)->AsThrowable());
Vladimir Markoc13fbd82018-06-04 16:16:28 +01001856 DCHECK(pre_allocated_NoClassDefFoundError_.Read()->GetClass()
1857 ->DescriptorEquals("Ljava/lang/NoClassDefFoundError;"));
1858 } else {
1859 // Pre-allocate an OutOfMemoryError for the case when we fail to
1860 // allocate the exception to be thrown.
Vladimir Markodcfcce42018-06-27 10:00:28 +00001861 CreatePreAllocatedException(self,
1862 this,
1863 &pre_allocated_OutOfMemoryError_when_throwing_exception_,
1864 "Ljava/lang/OutOfMemoryError;",
1865 "OutOfMemoryError thrown while trying to throw an exception; "
1866 "no stack trace available");
Vladimir Markoc13fbd82018-06-04 16:16:28 +01001867 // Pre-allocate an OutOfMemoryError for the double-OOME case.
Vladimir Markodcfcce42018-06-27 10:00:28 +00001868 CreatePreAllocatedException(self,
1869 this,
1870 &pre_allocated_OutOfMemoryError_when_throwing_oome_,
1871 "Ljava/lang/OutOfMemoryError;",
1872 "OutOfMemoryError thrown while trying to throw OutOfMemoryError; "
1873 "no stack trace available");
Vladimir Markoc13fbd82018-06-04 16:16:28 +01001874 // Pre-allocate an OutOfMemoryError for the case when we fail to
1875 // allocate while handling a stack overflow.
Vladimir Markodcfcce42018-06-27 10:00:28 +00001876 CreatePreAllocatedException(self,
1877 this,
1878 &pre_allocated_OutOfMemoryError_when_handling_stack_overflow_,
1879 "Ljava/lang/OutOfMemoryError;",
1880 "OutOfMemoryError thrown while trying to handle a stack overflow; "
1881 "no stack trace available");
Ian Rogersa436fde2013-08-27 23:34:06 -07001882
Vladimir Markoc13fbd82018-06-04 16:16:28 +01001883 // Pre-allocate a NoClassDefFoundError for the common case of failing to find a system class
1884 // ahead of checking the application's class loader.
Vladimir Markodcfcce42018-06-27 10:00:28 +00001885 CreatePreAllocatedException(self,
1886 this,
1887 &pre_allocated_NoClassDefFoundError_,
1888 "Ljava/lang/NoClassDefFoundError;",
1889 "Class not found using the boot class loader; "
1890 "no stack trace available");
Vladimir Markoc13fbd82018-06-04 16:16:28 +01001891 }
Ian Rogers63557452014-06-04 16:57:15 -07001892
Alex Lightbc19b752019-12-02 18:54:13 +00001893 // Class-roots are setup, we can now finish initializing the JniIdManager.
1894 GetJniIdManager()->Init(self);
1895
Calin Juravle1ff90562021-06-16 14:37:42 -07001896 InitMetrics();
Eric Holk59d4b532020-10-21 17:49:39 -07001897
Alex Light185d1342016-08-11 10:48:03 -07001898 // Runtime initialization is largely done now.
1899 // We load plugins first since that can modify the runtime state slightly.
1900 // Load all plugins
Nicolas Geoffray226805d2018-12-14 10:59:02 +00001901 {
1902 // The init method of plugins expect the state of the thread to be non runnable.
1903 ScopedThreadSuspension sts(self, ThreadState::kNative);
1904 for (auto& plugin : plugins_) {
1905 std::string err;
1906 if (!plugin.Load(&err)) {
1907 LOG(FATAL) << plugin << " failed to load: " << err;
1908 }
Alex Light185d1342016-08-11 10:48:03 -07001909 }
1910 }
1911
Andreas Gampe855564b2014-07-25 02:32:19 -07001912 // Look for a native bridge.
Andreas Gampe6be67ee2014-09-02 21:22:18 -07001913 //
1914 // The intended flow here is, in the case of a running system:
1915 //
1916 // Runtime::Init() (zygote):
1917 // LoadNativeBridge -> dlopen from cmd line parameter.
1918 // |
1919 // V
1920 // Runtime::Start() (zygote):
1921 // No-op wrt native bridge.
1922 // |
1923 // | start app
1924 // V
1925 // DidForkFromZygote(action)
1926 // action = kUnload -> dlclose native bridge.
1927 // action = kInitialize -> initialize library
1928 //
1929 //
1930 // The intended flow here is, in the case of a simple dalvikvm call:
1931 //
1932 // Runtime::Init():
1933 // LoadNativeBridge -> dlopen from cmd line parameter.
1934 // |
1935 // V
1936 // Runtime::Start():
1937 // DidForkFromZygote(kInitialize) -> try to initialize any native bridge given.
1938 // No-op wrt native bridge.
Igor Murashkinaaebaa02015-01-26 10:55:53 -08001939 {
1940 std::string native_bridge_file_name = runtime_options.ReleaseOrDefault(Opt::NativeBridge);
1941 is_native_bridge_loaded_ = LoadNativeBridge(native_bridge_file_name);
1942 }
Calin Juravlea68629e2014-08-22 12:53:59 +01001943
Alex Light7233c7e2016-07-28 10:07:45 -07001944 // Startup agents
1945 // TODO Maybe we should start a new thread to run these on. Investigate RI behavior more.
Andreas Gampeaadcbc62017-12-28 14:05:42 -08001946 for (auto& agent_spec : agent_specs_) {
Alex Light7233c7e2016-07-28 10:07:45 -07001947 // TODO Check err
1948 int res = 0;
1949 std::string err = "";
Andreas Gampeaadcbc62017-12-28 14:05:42 -08001950 ti::LoadError error;
1951 std::unique_ptr<ti::Agent> agent = agent_spec.Load(&res, &error, &err);
1952
1953 if (agent != nullptr) {
1954 agents_.push_back(std::move(agent));
1955 continue;
Alex Light7233c7e2016-07-28 10:07:45 -07001956 }
Andreas Gampeaadcbc62017-12-28 14:05:42 -08001957
1958 switch (error) {
1959 case ti::LoadError::kInitializationError:
1960 LOG(FATAL) << "Unable to initialize agent!";
1961 UNREACHABLE();
1962
1963 case ti::LoadError::kLoadingError:
1964 LOG(ERROR) << "Unable to load an agent: " << err;
1965 continue;
1966
1967 case ti::LoadError::kNoError:
1968 break;
1969 }
1970 LOG(FATAL) << "Unreachable";
1971 UNREACHABLE();
Alex Light7233c7e2016-07-28 10:07:45 -07001972 }
Andreas Gampe96eca782017-01-19 19:45:30 -08001973 {
1974 ScopedObjectAccess soa(self);
1975 callbacks_->NextRuntimePhase(RuntimePhaseCallback::RuntimePhase::kInitialAgents);
1976 }
Alex Light7233c7e2016-07-28 10:07:45 -07001977
Florian Mayer0278b4b2020-05-26 12:09:14 +02001978 if (IsZygote() && IsPerfettoHprofEnabled()) {
Florian Mayer0caa3fd2020-05-27 10:54:11 +02001979 constexpr const char* plugin_name = kIsDebugBuild ?
Florian Mayerbce68772020-05-27 15:32:58 +02001980 "libperfetto_hprofd.so" : "libperfetto_hprof.so";
Florian Mayer0278b4b2020-05-26 12:09:14 +02001981 // Load eagerly in Zygote to improve app startup times. This will make
1982 // subsequent dlopens for the library no-ops.
1983 dlopen(plugin_name, RTLD_NOW | RTLD_LOCAL);
1984 }
1985
Elliott Hughes4dd9b4d2011-12-12 18:29:24 -08001986 VLOG(startup) << "Runtime::Init exiting";
Mathieu Chartiere401d142015-04-22 13:56:20 -07001987
Carl Shapiro1fb86202011-06-27 17:43:13 -07001988 return true;
1989}
1990
Calin Juravle1ff90562021-06-16 14:37:42 -07001991void Runtime::InitMetrics() {
Calin Juravleec11cf12021-06-17 15:41:08 -07001992 metrics::ReportingConfig metrics_config = metrics::ReportingConfig::FromFlags();
Eric Holk62b75582021-03-03 15:14:58 -08001993 metrics_reporter_ = metrics::MetricsReporter::Create(metrics_config, this);
Eric Holk5bb354f2021-01-13 20:38:34 +00001994}
1995
Eric Holk5e435b22021-02-23 17:24:47 -08001996void Runtime::RequestMetricsReport(bool synchronous) {
1997 if (metrics_reporter_) {
1998 metrics_reporter_->RequestMetricsReport(synchronous);
1999 }
2000}
2001
Florian Mayer07710c52019-09-16 15:53:38 +00002002bool Runtime::EnsurePluginLoaded(const char* plugin_name, std::string* error_msg) {
Andreas Gampec4baad22017-01-12 16:59:39 +00002003 // Is the plugin already loaded?
Florian Mayer07710c52019-09-16 15:53:38 +00002004 for (const Plugin& p : plugins_) {
Andreas Gampec4baad22017-01-12 16:59:39 +00002005 if (p.GetLibrary() == plugin_name) {
2006 return true;
2007 }
2008 }
Florian Mayer07710c52019-09-16 15:53:38 +00002009 Plugin new_plugin = Plugin::Create(plugin_name);
Andreas Gampec4baad22017-01-12 16:59:39 +00002010
Florian Mayer07710c52019-09-16 15:53:38 +00002011 if (!new_plugin.Load(error_msg)) {
2012 return false;
2013 }
2014 plugins_.push_back(std::move(new_plugin));
2015 return true;
2016}
2017
2018bool Runtime::EnsurePerfettoPlugin(std::string* error_msg) {
2019 constexpr const char* plugin_name = kIsDebugBuild ?
2020 "libperfetto_hprofd.so" : "libperfetto_hprof.so";
2021 return EnsurePluginLoaded(plugin_name, error_msg);
2022}
2023
2024static bool EnsureJvmtiPlugin(Runtime* runtime,
2025 std::string* error_msg) {
Alex Lightf889c702018-02-23 15:25:45 -08002026 // TODO Rename Dbg::IsJdwpAllowed is IsDebuggingAllowed.
2027 DCHECK(Dbg::IsJdwpAllowed() || !runtime->IsJavaDebuggable())
2028 << "Being debuggable requires that jdwp (i.e. debugging) is allowed.";
Alex Light2ce6fc82017-12-18 16:42:36 -08002029 // Is the process debuggable? Otherwise, do not attempt to load the plugin unless we are
2030 // specifically allowed.
Alex Lightf889c702018-02-23 15:25:45 -08002031 if (!Dbg::IsJdwpAllowed()) {
2032 *error_msg = "Process is not allowed to load openjdkjvmti plugin. Process must be debuggable";
Andreas Gampec4baad22017-01-12 16:59:39 +00002033 return false;
2034 }
2035
Florian Mayer07710c52019-09-16 15:53:38 +00002036 constexpr const char* plugin_name = kIsDebugBuild ? "libopenjdkjvmtid.so" : "libopenjdkjvmti.so";
2037 return runtime->EnsurePluginLoaded(plugin_name, error_msg);
Andreas Gampec4baad22017-01-12 16:59:39 +00002038}
2039
Leonard Mosescueb842212016-10-06 17:26:36 -07002040// Attach a new agent and add it to the list of runtime agents
2041//
2042// TODO: once we decide on the threading model for agents,
2043// revisit this and make sure we're doing this on the right thread
2044// (and we synchronize access to any shared data structures like "agents_")
2045//
Alex Lightf889c702018-02-23 15:25:45 -08002046void Runtime::AttachAgent(JNIEnv* env, const std::string& agent_arg, jobject class_loader) {
Andreas Gampec4baad22017-01-12 16:59:39 +00002047 std::string error_msg;
Florian Mayer07710c52019-09-16 15:53:38 +00002048 if (!EnsureJvmtiPlugin(this, &error_msg)) {
Andreas Gampec4baad22017-01-12 16:59:39 +00002049 LOG(WARNING) << "Could not load plugin: " << error_msg;
2050 ScopedObjectAccess soa(Thread::Current());
2051 ThrowIOException("%s", error_msg.c_str());
2052 return;
2053 }
2054
Andreas Gampeaadcbc62017-12-28 14:05:42 -08002055 ti::AgentSpec agent_spec(agent_arg);
Leonard Mosescueb842212016-10-06 17:26:36 -07002056
2057 int res = 0;
Andreas Gampeaadcbc62017-12-28 14:05:42 -08002058 ti::LoadError error;
Andreas Gampe7b38e692017-12-28 19:18:28 -08002059 std::unique_ptr<ti::Agent> agent = agent_spec.Attach(env, class_loader, &res, &error, &error_msg);
Leonard Mosescueb842212016-10-06 17:26:36 -07002060
Andreas Gampeaadcbc62017-12-28 14:05:42 -08002061 if (agent != nullptr) {
Leonard Mosescueb842212016-10-06 17:26:36 -07002062 agents_.push_back(std::move(agent));
2063 } else {
Andreas Gampeaadcbc62017-12-28 14:05:42 -08002064 LOG(WARNING) << "Agent attach failed (result=" << error << ") : " << error_msg;
Leonard Mosescueb842212016-10-06 17:26:36 -07002065 ScopedObjectAccess soa(Thread::Current());
Andreas Gampec4baad22017-01-12 16:59:39 +00002066 ThrowIOException("%s", error_msg.c_str());
Leonard Mosescueb842212016-10-06 17:26:36 -07002067 }
2068}
2069
Elliott Hughes038a8062011-09-18 14:12:41 -07002070void Runtime::InitNativeMethods() {
Elliott Hughes4dd9b4d2011-12-12 18:29:24 -08002071 VLOG(startup) << "Runtime::InitNativeMethods entering";
Elliott Hughesad7c2a32011-08-31 11:58:10 -07002072 Thread* self = Thread::Current();
2073 JNIEnv* env = self->GetJniEnv();
2074
Elliott Hughes418d20f2011-09-22 14:00:39 -07002075 // Must be in the kNative state for calling native methods (JNI_OnLoad code).
Ian Rogers50b35e22012-10-04 10:09:15 -07002076 CHECK_EQ(self->GetState(), kNative);
Elliott Hughesad7c2a32011-08-31 11:58:10 -07002077
Andreas Gamped863be72017-09-12 12:02:28 -07002078 // Set up the native methods provided by the runtime itself.
Elliott Hughesad7c2a32011-08-31 11:58:10 -07002079 RegisterRuntimeNativeMethods(env);
2080
Yi Kong0871cd72015-11-20 16:00:31 +00002081 // Initialize classes used in JNI. The initialization requires runtime native
2082 // methods to be loaded first.
2083 WellKnownClasses::Init(env);
2084
Victor Chang65ae6692019-10-11 14:17:21 +01002085 // Then set up libjavacore / libopenjdk / libicu_jni ,which are just
2086 // a regular JNI libraries with a regular JNI_OnLoad. Most JNI libraries can
2087 // just use System.loadLibrary, but libcore can't because it's the library
2088 // that implements System.loadLibrary!
Martin Stjernholm5fef5562021-06-21 23:33:33 +01002089 //
2090 // By setting calling class to java.lang.Object, the caller location for these
2091 // JNI libs is core-oj.jar in the ART APEX, and hence they are loaded from the
2092 // com_android_art linker namespace.
Victor Chang1c5949e2019-11-04 19:36:00 +00002093
2094 // libicu_jni has to be initialized before libopenjdk{d} due to runtime dependency from
2095 // libopenjdk{d} to Icu4cMetadata native methods in libicu_jni. See http://b/143888405
2096 {
2097 std::string error_msg;
2098 if (!java_vm_->LoadNativeLibrary(
2099 env, "libicu_jni.so", nullptr, WellKnownClasses::java_lang_Object, &error_msg)) {
2100 LOG(FATAL) << "LoadNativeLibrary failed for \"libicu_jni.so\": " << error_msg;
2101 }
2102 }
Ian Rogers00f7d0e2012-07-19 15:28:27 -07002103 {
Dmitriy Ivanov44409d32015-11-11 14:18:55 -08002104 std::string error_msg;
Nicolas Geoffray107ce792019-01-26 01:06:17 +00002105 if (!java_vm_->LoadNativeLibrary(
2106 env, "libjavacore.so", nullptr, WellKnownClasses::java_lang_Object, &error_msg)) {
Dmitriy Ivanov44409d32015-11-11 14:18:55 -08002107 LOG(FATAL) << "LoadNativeLibrary failed for \"libjavacore.so\": " << error_msg;
Ian Rogers00f7d0e2012-07-19 15:28:27 -07002108 }
Ian Rogers00f7d0e2012-07-19 15:28:27 -07002109 }
Piotr Jastrzebski8ca90772015-04-24 09:18:00 +01002110 {
Andreas Gampe10edbb12016-01-06 17:59:49 -08002111 constexpr const char* kOpenJdkLibrary = kIsDebugBuild
2112 ? "libopenjdkd.so"
2113 : "libopenjdk.so";
Dmitriy Ivanov3e381722015-11-23 17:40:11 -08002114 std::string error_msg;
Nicolas Geoffray107ce792019-01-26 01:06:17 +00002115 if (!java_vm_->LoadNativeLibrary(
2116 env, kOpenJdkLibrary, nullptr, WellKnownClasses::java_lang_Object, &error_msg)) {
Andreas Gampe10edbb12016-01-06 17:59:49 -08002117 LOG(FATAL) << "LoadNativeLibrary failed for \"" << kOpenJdkLibrary << "\": " << error_msg;
Piotr Jastrzebski8ca90772015-04-24 09:18:00 +01002118 }
Piotr Jastrzebski8ca90772015-04-24 09:18:00 +01002119 }
Ian Rogersef28b142012-11-30 14:22:18 -08002120
2121 // Initialize well known classes that may invoke runtime native methods.
2122 WellKnownClasses::LateInit(env);
2123
Elliott Hughes4dd9b4d2011-12-12 18:29:24 -08002124 VLOG(startup) << "Runtime::InitNativeMethods exiting";
Elliott Hughesad7c2a32011-08-31 11:58:10 -07002125}
2126
Jean-Philippe Halimica76a1a2016-02-02 19:48:52 +01002127void Runtime::ReclaimArenaPoolMemory() {
2128 arena_pool_->LockReclaimMemory();
2129}
2130
Ian Rogers365c1022012-06-22 15:05:28 -07002131void Runtime::InitThreadGroups(Thread* self) {
2132 JNIEnvExt* env = self->GetJniEnv();
2133 ScopedJniEnvLocalRefState env_state(env);
2134 main_thread_group_ =
Brian Carlstrom491ca9e2014-03-02 18:24:38 -08002135 env->NewGlobalRef(env->GetStaticObjectField(
2136 WellKnownClasses::java_lang_ThreadGroup,
2137 WellKnownClasses::java_lang_ThreadGroup_mainThreadGroup));
Mathieu Chartier2cebb242015-04-21 16:50:40 -07002138 CHECK(main_thread_group_ != nullptr || IsAotCompiler());
Ian Rogers365c1022012-06-22 15:05:28 -07002139 system_thread_group_ =
Brian Carlstrom491ca9e2014-03-02 18:24:38 -08002140 env->NewGlobalRef(env->GetStaticObjectField(
2141 WellKnownClasses::java_lang_ThreadGroup,
2142 WellKnownClasses::java_lang_ThreadGroup_systemThreadGroup));
Mathieu Chartier2cebb242015-04-21 16:50:40 -07002143 CHECK(system_thread_group_ != nullptr || IsAotCompiler());
Brian Carlstrom034f76b2012-08-01 15:51:58 -07002144}
2145
2146jobject Runtime::GetMainThreadGroup() const {
Mathieu Chartier2cebb242015-04-21 16:50:40 -07002147 CHECK(main_thread_group_ != nullptr || IsAotCompiler());
Brian Carlstrom034f76b2012-08-01 15:51:58 -07002148 return main_thread_group_;
2149}
2150
2151jobject Runtime::GetSystemThreadGroup() const {
Mathieu Chartier2cebb242015-04-21 16:50:40 -07002152 CHECK(system_thread_group_ != nullptr || IsAotCompiler());
Brian Carlstrom034f76b2012-08-01 15:51:58 -07002153 return system_thread_group_;
Ian Rogers365c1022012-06-22 15:05:28 -07002154}
2155
Brian Carlstromce888532013-10-10 00:32:58 -07002156jobject Runtime::GetSystemClassLoader() const {
Mathieu Chartier2cebb242015-04-21 16:50:40 -07002157 CHECK(system_class_loader_ != nullptr || IsAotCompiler());
Brian Carlstromce888532013-10-10 00:32:58 -07002158 return system_class_loader_;
2159}
2160
Elliott Hughesad7c2a32011-08-31 11:58:10 -07002161void Runtime::RegisterRuntimeNativeMethods(JNIEnv* env) {
Andreas Gampe277ccbd2014-11-03 21:36:10 -08002162 register_dalvik_system_DexFile(env);
Dan Zimmermanb682ea42019-12-23 06:59:06 -08002163 register_dalvik_system_BaseDexClassLoader(env);
Andreas Gampe277ccbd2014-11-03 21:36:10 -08002164 register_dalvik_system_VMDebug(env);
2165 register_dalvik_system_VMRuntime(env);
2166 register_dalvik_system_VMStack(env);
2167 register_dalvik_system_ZygoteHooks(env);
2168 register_java_lang_Class(env);
Andreas Gampe277ccbd2014-11-03 21:36:10 -08002169 register_java_lang_Object(env);
Narayan Kamathbd2fed52017-01-25 10:46:54 +00002170 register_java_lang_invoke_MethodHandleImpl(env);
Andreas Gampe277ccbd2014-11-03 21:36:10 -08002171 register_java_lang_ref_FinalizerReference(env);
2172 register_java_lang_reflect_Array(env);
2173 register_java_lang_reflect_Constructor(env);
Neil Fuller0e844392016-09-08 13:43:31 +01002174 register_java_lang_reflect_Executable(env);
Andreas Gampe277ccbd2014-11-03 21:36:10 -08002175 register_java_lang_reflect_Field(env);
2176 register_java_lang_reflect_Method(env);
Neil Fuller60458a02016-09-01 15:32:44 +01002177 register_java_lang_reflect_Parameter(env);
Andreas Gampe277ccbd2014-11-03 21:36:10 -08002178 register_java_lang_reflect_Proxy(env);
2179 register_java_lang_ref_Reference(env);
Andreas Gampe277ccbd2014-11-03 21:36:10 -08002180 register_java_lang_String(env);
Jeff Hao848f70a2014-01-15 13:49:50 -08002181 register_java_lang_StringFactory(env);
Andreas Gampe277ccbd2014-11-03 21:36:10 -08002182 register_java_lang_System(env);
2183 register_java_lang_Thread(env);
2184 register_java_lang_Throwable(env);
2185 register_java_lang_VMClassLoader(env);
2186 register_java_util_concurrent_atomic_AtomicLong(env);
Jeff Hao848f70a2014-01-15 13:49:50 -08002187 register_libcore_util_CharsetUtils(env);
Andreas Gampe277ccbd2014-11-03 21:36:10 -08002188 register_org_apache_harmony_dalvik_ddmc_DdmServer(env);
2189 register_org_apache_harmony_dalvik_ddmc_DdmVmInternal(env);
2190 register_sun_misc_Unsafe(env);
Elliott Hughesad7c2a32011-08-31 11:58:10 -07002191}
2192
Nicolas Geoffray4e92c3c2017-05-08 09:34:26 +01002193std::ostream& operator<<(std::ostream& os, const DeoptimizationKind& kind) {
2194 os << GetDeoptimizationKindName(kind);
2195 return os;
2196}
2197
2198void Runtime::DumpDeoptimizations(std::ostream& os) {
2199 for (size_t i = 0; i <= static_cast<size_t>(DeoptimizationKind::kLast); ++i) {
2200 if (deoptimization_counts_[i] != 0) {
2201 os << "Number of "
2202 << GetDeoptimizationKindName(static_cast<DeoptimizationKind>(i))
2203 << " deoptimizations: "
2204 << deoptimization_counts_[i]
2205 << "\n";
2206 }
2207 }
2208}
2209
Elliott Hughesc967f782012-04-16 10:23:15 -07002210void Runtime::DumpForSigQuit(std::ostream& os) {
Elliott Hughescac6cc72011-11-03 20:31:21 -07002211 GetClassLinker()->DumpForSigQuit(os);
2212 GetInternTable()->DumpForSigQuit(os);
Elliott Hughesae80b492012-04-24 10:43:17 -07002213 GetJavaVM()->DumpForSigQuit(os);
Elliott Hughesc967f782012-04-16 10:23:15 -07002214 GetHeap()->DumpForSigQuit(os);
Nicolas Geoffray04680f32016-03-17 11:56:54 +00002215 oat_file_manager_->DumpForSigQuit(os);
Nicolas Geoffrayaee21562015-12-15 16:39:44 +00002216 if (GetJit() != nullptr) {
2217 GetJit()->DumpForSigQuit(os);
2218 } else {
2219 os << "Running non JIT\n";
2220 }
Nicolas Geoffray4e92c3c2017-05-08 09:34:26 +01002221 DumpDeoptimizations(os);
Mathieu Chartierbad02672014-08-25 13:08:22 -07002222 TrackedAllocators::Dump(os);
Eric Holk61c71ef2020-10-19 12:04:39 -07002223 GetMetrics()->DumpForSigQuit(os);
Elliott Hughes42ee1422011-09-06 12:33:32 -07002224 os << "\n";
Elliott Hughes8daa0922011-09-11 13:46:25 -07002225
Elliott Hughesc967f782012-04-16 10:23:15 -07002226 thread_list_->DumpForSigQuit(os);
Ian Rogers56edc432013-01-18 16:51:51 -08002227 BaseMutex::DumpAll(os);
Andreas Gampea5814f92017-01-18 21:43:16 -08002228
2229 // Inform anyone else who is interested in SigQuit.
2230 {
2231 ScopedObjectAccess soa(Thread::Current());
2232 callbacks_->SigQuit();
2233 }
Elliott Hughese27955c2011-08-26 15:21:24 -07002234}
2235
Elliott Hughes21a5bf22011-12-07 14:35:20 -08002236void Runtime::DumpLockHolders(std::ostream& os) {
Ian Rogersb726dcb2012-09-05 08:57:23 -07002237 uint64_t mutator_lock_owner = Locks::mutator_lock_->GetExclusiveOwnerTid();
Elliott Hughes21a5bf22011-12-07 14:35:20 -08002238 pid_t thread_list_lock_owner = GetThreadList()->GetLockOwner();
2239 pid_t classes_lock_owner = GetClassLinker()->GetClassesLockOwner();
2240 pid_t dex_lock_owner = GetClassLinker()->GetDexLockOwner();
Ian Rogers00f7d0e2012-07-19 15:28:27 -07002241 if ((thread_list_lock_owner | classes_lock_owner | dex_lock_owner) != 0) {
2242 os << "Mutator lock exclusive owner tid: " << mutator_lock_owner << "\n"
Elliott Hughes21a5bf22011-12-07 14:35:20 -08002243 << "ThreadList lock owner tid: " << thread_list_lock_owner << "\n"
2244 << "ClassLinker classes lock owner tid: " << classes_lock_owner << "\n"
2245 << "ClassLinker dex lock owner tid: " << dex_lock_owner << "\n";
2246 }
2247}
2248
Mathieu Chartier9ef78b52014-09-25 17:03:12 -07002249void Runtime::SetStatsEnabled(bool new_state) {
2250 Thread* self = Thread::Current();
2251 MutexLock mu(self, *Locks::instrument_entrypoints_lock_);
Elliott Hughes9d5ccec2011-09-19 13:19:50 -07002252 if (new_state == true) {
2253 GetStats()->Clear(~0);
2254 // TODO: wouldn't it make more sense to clear _all_ threads' stats?
Mathieu Chartier9ef78b52014-09-25 17:03:12 -07002255 self->GetStats()->Clear(~0);
2256 if (stats_enabled_ != new_state) {
2257 GetInstrumentation()->InstrumentQuickAllocEntryPointsLocked();
2258 }
2259 } else if (stats_enabled_ != new_state) {
2260 GetInstrumentation()->UninstrumentQuickAllocEntryPointsLocked();
Elliott Hughes9d5ccec2011-09-19 13:19:50 -07002261 }
2262 stats_enabled_ = new_state;
2263}
2264
2265void Runtime::ResetStats(int kinds) {
2266 GetStats()->Clear(kinds & 0xffff);
2267 // TODO: wouldn't it make more sense to clear _all_ threads' stats?
2268 Thread::Current()->GetStats()->Clear(kinds >> 16);
2269}
2270
Andreas Gampe7ee607e2019-07-23 12:22:04 -07002271uint64_t Runtime::GetStat(int kind) {
Elliott Hughes9d5ccec2011-09-19 13:19:50 -07002272 RuntimeStats* stats;
2273 if (kind < (1<<16)) {
2274 stats = GetStats();
2275 } else {
2276 stats = Thread::Current()->GetStats();
2277 kind >>= 16;
2278 }
2279 switch (kind) {
2280 case KIND_ALLOCATED_OBJECTS:
2281 return stats->allocated_objects;
2282 case KIND_ALLOCATED_BYTES:
2283 return stats->allocated_bytes;
2284 case KIND_FREED_OBJECTS:
2285 return stats->freed_objects;
2286 case KIND_FREED_BYTES:
2287 return stats->freed_bytes;
2288 case KIND_GC_INVOCATIONS:
2289 return stats->gc_for_alloc_count;
2290 case KIND_CLASS_INIT_COUNT:
2291 return stats->class_init_count;
2292 case KIND_CLASS_INIT_TIME:
Andreas Gampe7ee607e2019-07-23 12:22:04 -07002293 return stats->class_init_time_ns;
Elliott Hughes9d5ccec2011-09-19 13:19:50 -07002294 case KIND_EXT_ALLOCATED_OBJECTS:
2295 case KIND_EXT_ALLOCATED_BYTES:
2296 case KIND_EXT_FREED_OBJECTS:
2297 case KIND_EXT_FREED_BYTES:
2298 return 0; // backward compatibility
2299 default:
Elliott Hughes7b9d9962012-04-20 18:48:18 -07002300 LOG(FATAL) << "Unknown statistic " << kind;
Elliott Hughesc1896c92018-11-29 11:33:18 -08002301 UNREACHABLE();
Elliott Hughes9d5ccec2011-09-19 13:19:50 -07002302 }
2303}
2304
Elliott Hughesc1674ed2011-08-25 18:09:09 -07002305void Runtime::BlockSignals() {
Elliott Hughes457005c2012-04-16 13:54:25 -07002306 SignalSet signals;
2307 signals.Add(SIGPIPE);
Elliott Hughesc1674ed2011-08-25 18:09:09 -07002308 // SIGQUIT is used to dump the runtime's state (including stack traces).
Elliott Hughes457005c2012-04-16 13:54:25 -07002309 signals.Add(SIGQUIT);
Elliott Hughes08795042012-04-03 14:48:52 -07002310 // SIGUSR1 is used to initiate a GC.
Elliott Hughes457005c2012-04-16 13:54:25 -07002311 signals.Add(SIGUSR1);
2312 signals.Block();
Elliott Hughesc1674ed2011-08-25 18:09:09 -07002313}
2314
Igor Murashkinb1d8c312015-08-04 11:18:43 -07002315bool Runtime::AttachCurrentThread(const char* thread_name, bool as_daemon, jobject thread_group,
Mathieu Chartier664bebf2012-11-12 16:54:11 -08002316 bool create_peer) {
Mathieu Chartier32ce2ad2016-03-04 14:58:03 -08002317 ScopedTrace trace(__FUNCTION__);
Andreas Gampe56776012018-01-26 17:40:55 -08002318 Thread* self = Thread::Attach(thread_name, as_daemon, thread_group, create_peer);
2319 // Run ThreadGroup.add to notify the group that this thread is now started.
2320 if (self != nullptr && create_peer && !IsAotCompiler()) {
2321 ScopedObjectAccess soa(self);
2322 self->NotifyThreadGroup(soa, thread_group);
2323 }
2324 return self != nullptr;
Carl Shapiro61e019d2011-07-14 16:53:09 -07002325}
2326
Elliott Hughesd92bec42011-09-02 17:04:36 -07002327void Runtime::DetachCurrentThread() {
Mathieu Chartier32ce2ad2016-03-04 14:58:03 -08002328 ScopedTrace trace(__FUNCTION__);
Brian Carlstrom4d571432012-05-16 00:21:41 -07002329 Thread* self = Thread::Current();
Mathieu Chartier2cebb242015-04-21 16:50:40 -07002330 if (self == nullptr) {
Brian Carlstrom4d571432012-05-16 00:21:41 -07002331 LOG(FATAL) << "attempting to detach thread that is not attached";
2332 }
Ian Rogers0399dde2012-06-06 17:09:28 -07002333 if (self->HasManagedStack()) {
Elliott Hughes22869a92012-03-27 14:08:24 -07002334 LOG(FATAL) << *Thread::Current() << " attempting to detach while still running code";
2335 }
Ian Rogers00f7d0e2012-07-19 15:28:27 -07002336 thread_list_->Unregister(self);
Carl Shapiro1fb86202011-06-27 17:43:13 -07002337}
2338
Roland Levillain7b0e8442018-04-11 18:27:47 +01002339mirror::Throwable* Runtime::GetPreAllocatedOutOfMemoryErrorWhenThrowingException() {
2340 mirror::Throwable* oome = pre_allocated_OutOfMemoryError_when_throwing_exception_.Read();
Ian Rogers63557452014-06-04 16:57:15 -07002341 if (oome == nullptr) {
Roland Levillain7b0e8442018-04-11 18:27:47 +01002342 LOG(ERROR) << "Failed to return pre-allocated OOME-when-throwing-exception";
2343 }
2344 return oome;
2345}
2346
2347mirror::Throwable* Runtime::GetPreAllocatedOutOfMemoryErrorWhenThrowingOOME() {
2348 mirror::Throwable* oome = pre_allocated_OutOfMemoryError_when_throwing_oome_.Read();
2349 if (oome == nullptr) {
2350 LOG(ERROR) << "Failed to return pre-allocated OOME-when-throwing-OOME";
2351 }
2352 return oome;
2353}
2354
2355mirror::Throwable* Runtime::GetPreAllocatedOutOfMemoryErrorWhenHandlingStackOverflow() {
2356 mirror::Throwable* oome = pre_allocated_OutOfMemoryError_when_handling_stack_overflow_.Read();
2357 if (oome == nullptr) {
2358 LOG(ERROR) << "Failed to return pre-allocated OOME-when-handling-stack-overflow";
Ian Rogersa436fde2013-08-27 23:34:06 -07002359 }
Hiroshi Yamauchiab088112014-07-14 13:00:14 -07002360 return oome;
Ian Rogersa436fde2013-08-27 23:34:06 -07002361}
2362
Ian Rogers63557452014-06-04 16:57:15 -07002363mirror::Throwable* Runtime::GetPreAllocatedNoClassDefFoundError() {
2364 mirror::Throwable* ncdfe = pre_allocated_NoClassDefFoundError_.Read();
2365 if (ncdfe == nullptr) {
2366 LOG(ERROR) << "Failed to return pre-allocated NoClassDefFoundError";
2367 }
2368 return ncdfe;
2369}
2370
Mathieu Chartierbb87e0f2015-04-03 11:21:55 -07002371void Runtime::VisitConstantRoots(RootVisitor* visitor) {
Mathieu Chartiere3b034a2015-05-31 14:29:23 -07002372 // Visiting the roots of these ArtMethods is not currently required since all the GcRoots are
2373 // null.
2374 BufferedRootVisitor<16> buffered_visitor(visitor, RootInfo(kRootVMInternal));
Andreas Gampe542451c2016-07-26 09:02:02 -07002375 const PointerSize pointer_size = GetClassLinker()->GetImagePointerSize();
Mathieu Chartiere3b034a2015-05-31 14:29:23 -07002376 if (HasResolutionMethod()) {
Mathieu Chartier1147b9b2015-09-14 18:50:08 -07002377 resolution_method_->VisitRoots(buffered_visitor, pointer_size);
Mathieu Chartiere3b034a2015-05-31 14:29:23 -07002378 }
2379 if (HasImtConflictMethod()) {
Mathieu Chartier1147b9b2015-09-14 18:50:08 -07002380 imt_conflict_method_->VisitRoots(buffered_visitor, pointer_size);
Mathieu Chartiere3b034a2015-05-31 14:29:23 -07002381 }
2382 if (imt_unimplemented_method_ != nullptr) {
Mathieu Chartier1147b9b2015-09-14 18:50:08 -07002383 imt_unimplemented_method_->VisitRoots(buffered_visitor, pointer_size);
Mathieu Chartiere3b034a2015-05-31 14:29:23 -07002384 }
Andreas Gampe8228cdf2017-05-30 15:03:54 -07002385 for (uint32_t i = 0; i < kCalleeSaveSize; ++i) {
Mathieu Chartiere3b034a2015-05-31 14:29:23 -07002386 auto* m = reinterpret_cast<ArtMethod*>(callee_save_methods_[i]);
2387 if (m != nullptr) {
Mathieu Chartier1147b9b2015-09-14 18:50:08 -07002388 m->VisitRoots(buffered_visitor, pointer_size);
Mathieu Chartiere3b034a2015-05-31 14:29:23 -07002389 }
2390 }
Mathieu Chartier893263b2014-03-04 11:07:42 -08002391}
2392
Mathieu Chartierbb87e0f2015-04-03 11:21:55 -07002393void Runtime::VisitConcurrentRoots(RootVisitor* visitor, VisitRootFlags flags) {
2394 intern_table_->VisitRoots(visitor, flags);
2395 class_linker_->VisitRoots(visitor, flags);
Alex Lightbc19b752019-12-02 18:54:13 +00002396 jni_id_manager_->VisitRoots(visitor);
Man Cao1ed11b92015-06-11 22:47:35 -07002397 heap_->VisitAllocationRecords(visitor);
Mathieu Chartier893263b2014-03-04 11:07:42 -08002398 if ((flags & kVisitRootFlagNewRoots) == 0) {
2399 // Guaranteed to have no new roots in the constant roots.
Mathieu Chartierbb87e0f2015-04-03 11:21:55 -07002400 VisitConstantRoots(visitor);
Mathieu Chartier893263b2014-03-04 11:07:42 -08002401 }
2402}
2403
Mathieu Chartierbb87e0f2015-04-03 11:21:55 -07002404void Runtime::VisitTransactionRoots(RootVisitor* visitor) {
Vladimir Markob6e67922021-07-06 15:53:07 +01002405 for (Transaction& transaction : preinitialization_transactions_) {
2406 transaction.VisitRoots(visitor);
Hiroshi Yamauchi2cd334a2015-01-09 14:03:35 -08002407 }
2408}
2409
Mathieu Chartierbb87e0f2015-04-03 11:21:55 -07002410void Runtime::VisitNonThreadRoots(RootVisitor* visitor) {
2411 java_vm_->VisitRoots(visitor);
2412 sentinel_.VisitRootIfNonNull(visitor, RootInfo(kRootVMInternal));
Roland Levillain7b0e8442018-04-11 18:27:47 +01002413 pre_allocated_OutOfMemoryError_when_throwing_exception_
2414 .VisitRootIfNonNull(visitor, RootInfo(kRootVMInternal));
2415 pre_allocated_OutOfMemoryError_when_throwing_oome_
2416 .VisitRootIfNonNull(visitor, RootInfo(kRootVMInternal));
2417 pre_allocated_OutOfMemoryError_when_handling_stack_overflow_
2418 .VisitRootIfNonNull(visitor, RootInfo(kRootVMInternal));
Mathieu Chartierbb87e0f2015-04-03 11:21:55 -07002419 pre_allocated_NoClassDefFoundError_.VisitRootIfNonNull(visitor, RootInfo(kRootVMInternal));
Vladimir Markof75613c2018-06-05 12:51:04 +01002420 VisitImageRoots(visitor);
Andreas Gampea43ba3d2019-03-13 15:49:20 -07002421 verifier::ClassVerifier::VisitStaticRoots(visitor);
Mathieu Chartierbb87e0f2015-04-03 11:21:55 -07002422 VisitTransactionRoots(visitor);
Brian Carlstrome24fa612011-09-29 00:53:55 -07002423}
2424
Andreas Gampe585da952016-12-02 14:52:29 -08002425void Runtime::VisitNonConcurrentRoots(RootVisitor* visitor, VisitRootFlags flags) {
2426 VisitThreadRoots(visitor, flags);
Mathieu Chartierbb87e0f2015-04-03 11:21:55 -07002427 VisitNonThreadRoots(visitor);
Mathieu Chartier858f1c52012-10-17 17:45:55 -07002428}
2429
Andreas Gampe585da952016-12-02 14:52:29 -08002430void Runtime::VisitThreadRoots(RootVisitor* visitor, VisitRootFlags flags) {
2431 thread_list_->VisitRoots(visitor, flags);
Hiroshi Yamauchi2cd334a2015-01-09 14:03:35 -08002432}
2433
Mathieu Chartierbb87e0f2015-04-03 11:21:55 -07002434void Runtime::VisitRoots(RootVisitor* visitor, VisitRootFlags flags) {
Andreas Gampe585da952016-12-02 14:52:29 -08002435 VisitNonConcurrentRoots(visitor, flags);
Mathieu Chartierbb87e0f2015-04-03 11:21:55 -07002436 VisitConcurrentRoots(visitor, flags);
Mathieu Chartier9ebae1f2012-10-15 17:38:16 -07002437}
2438
Alex Lightc18eba32019-09-24 14:36:27 -07002439void Runtime::VisitReflectiveTargets(ReflectiveValueVisitor *visitor) {
Alex Light55eccdf2019-10-07 13:51:13 +00002440 thread_list_->VisitReflectiveTargets(visitor);
Alex Lightc18eba32019-09-24 14:36:27 -07002441 heap_->VisitReflectiveTargets(visitor);
2442 jni_id_manager_->VisitReflectiveTargets(visitor);
2443 callbacks_->VisitReflectiveTargets(visitor);
2444}
2445
Mathieu Chartierbb87e0f2015-04-03 11:21:55 -07002446void Runtime::VisitImageRoots(RootVisitor* visitor) {
Mathieu Chartier461687d2015-03-31 12:05:24 -07002447 for (auto* space : GetHeap()->GetContinuousSpaces()) {
2448 if (space->IsImageSpace()) {
2449 auto* image_space = space->AsImageSpace();
2450 const auto& image_header = image_space->GetImageHeader();
Vladimir Markoeca3eda2016-11-09 16:26:44 +00002451 for (int32_t i = 0, size = image_header.GetImageRoots()->GetLength(); i != size; ++i) {
Vladimir Markoc13fbd82018-06-04 16:16:28 +01002452 mirror::Object* obj =
2453 image_header.GetImageRoot(static_cast<ImageHeader::ImageRoot>(i)).Ptr();
Mathieu Chartier461687d2015-03-31 12:05:24 -07002454 if (obj != nullptr) {
Vladimir Markoc13fbd82018-06-04 16:16:28 +01002455 mirror::Object* after_obj = obj;
Mathieu Chartierbb87e0f2015-04-03 11:21:55 -07002456 visitor->VisitRoot(&after_obj, RootInfo(kRootStickyClass));
Mathieu Chartier461687d2015-03-31 12:05:24 -07002457 CHECK_EQ(after_obj, obj);
2458 }
2459 }
2460 }
2461 }
2462}
2463
Nicolas Geoffrayf05f04b2019-10-31 11:50:41 +00002464static ArtMethod* CreateRuntimeMethod(ClassLinker* class_linker, LinearAlloc* linear_alloc)
2465 REQUIRES_SHARED(Locks::mutator_lock_) {
Andreas Gampecc1b5352016-12-01 16:58:38 -08002466 const PointerSize image_pointer_size = class_linker->GetImagePointerSize();
2467 const size_t method_alignment = ArtMethod::Alignment(image_pointer_size);
2468 const size_t method_size = ArtMethod::Size(image_pointer_size);
2469 LengthPrefixedArray<ArtMethod>* method_array = class_linker->AllocArtMethodArray(
2470 Thread::Current(),
2471 linear_alloc,
2472 1);
2473 ArtMethod* method = &method_array->At(0, method_size, method_alignment);
2474 CHECK(method != nullptr);
Andreas Gampee2abbc62017-09-15 11:59:26 -07002475 method->SetDexMethodIndex(dex::kDexNoIndex);
Andreas Gampecc1b5352016-12-01 16:58:38 -08002476 CHECK(method->IsRuntimeMethod());
2477 return method;
2478}
2479
Nicolas Geoffray796d6302016-03-13 22:22:31 +00002480ArtMethod* Runtime::CreateImtConflictMethod(LinearAlloc* linear_alloc) {
Mathieu Chartier91288d82016-04-28 09:44:54 -07002481 ClassLinker* const class_linker = GetClassLinker();
Andreas Gampecc1b5352016-12-01 16:58:38 -08002482 ArtMethod* method = CreateRuntimeMethod(class_linker, linear_alloc);
Jeff Hao88474b42013-10-23 16:24:40 -07002483 // When compiling, the code pointer will get set later when the image is loaded.
Andreas Gampe542451c2016-07-26 09:02:02 -07002484 const PointerSize pointer_size = GetInstructionSetPointerSize(instruction_set_);
Mathieu Chartiere401d142015-04-22 13:56:20 -07002485 if (IsAotCompiler()) {
Jeff Haoc7d11882015-02-03 15:08:39 -08002486 method->SetEntryPointFromQuickCompiledCodePtrSize(nullptr, pointer_size);
Ian Rogersef7d42f2014-01-06 12:55:46 -08002487 } else {
Ian Rogers6f3dbba2014-10-14 17:41:57 -07002488 method->SetEntryPointFromQuickCompiledCode(GetQuickImtConflictStub());
Ian Rogersef7d42f2014-01-06 12:55:46 -08002489 }
Mathieu Chartier91288d82016-04-28 09:44:54 -07002490 // Create empty conflict table.
Andreas Gampe98ea9d92018-10-19 14:06:15 -07002491 method->SetImtConflictTable(class_linker->CreateImtConflictTable(/*count=*/0u, linear_alloc),
Mathieu Chartier91288d82016-04-28 09:44:54 -07002492 pointer_size);
Mathieu Chartiere401d142015-04-22 13:56:20 -07002493 return method;
Jeff Hao88474b42013-10-23 16:24:40 -07002494}
2495
Mathieu Chartiere401d142015-04-22 13:56:20 -07002496void Runtime::SetImtConflictMethod(ArtMethod* method) {
2497 CHECK(method != nullptr);
2498 CHECK(method->IsRuntimeMethod());
2499 imt_conflict_method_ = method;
Mathieu Chartiere5f13e52015-02-24 09:37:21 -08002500}
2501
Mathieu Chartiere401d142015-04-22 13:56:20 -07002502ArtMethod* Runtime::CreateResolutionMethod() {
Andreas Gampecc1b5352016-12-01 16:58:38 -08002503 auto* method = CreateRuntimeMethod(GetClassLinker(), GetLinearAlloc());
Jeff Hao58df3272013-04-22 15:28:53 -07002504 // When compiling, the code pointer will get set later when the image is loaded.
Mathieu Chartiere401d142015-04-22 13:56:20 -07002505 if (IsAotCompiler()) {
Andreas Gampe542451c2016-07-26 09:02:02 -07002506 PointerSize pointer_size = GetInstructionSetPointerSize(instruction_set_);
Jeff Haoc7d11882015-02-03 15:08:39 -08002507 method->SetEntryPointFromQuickCompiledCodePtrSize(nullptr, pointer_size);
Vladimir Marko86c87522020-05-11 16:55:55 +01002508 method->SetEntryPointFromJniPtrSize(nullptr, pointer_size);
Ian Rogersef7d42f2014-01-06 12:55:46 -08002509 } else {
Ian Rogers6f3dbba2014-10-14 17:41:57 -07002510 method->SetEntryPointFromQuickCompiledCode(GetQuickResolutionStub());
Vladimir Marko86c87522020-05-11 16:55:55 +01002511 method->SetEntryPointFromJni(GetJniDlsymLookupCriticalStub());
Ian Rogersef7d42f2014-01-06 12:55:46 -08002512 }
Mathieu Chartiere401d142015-04-22 13:56:20 -07002513 return method;
Ian Rogers19846512012-02-24 11:42:47 -08002514}
2515
Mathieu Chartiere401d142015-04-22 13:56:20 -07002516ArtMethod* Runtime::CreateCalleeSaveMethod() {
Andreas Gampecc1b5352016-12-01 16:58:38 -08002517 auto* method = CreateRuntimeMethod(GetClassLinker(), GetLinearAlloc());
Andreas Gampe542451c2016-07-26 09:02:02 -07002518 PointerSize pointer_size = GetInstructionSetPointerSize(instruction_set_);
Jeff Haoc7d11882015-02-03 15:08:39 -08002519 method->SetEntryPointFromQuickCompiledCodePtrSize(nullptr, pointer_size);
Vladimir Marko33bff252017-11-01 14:35:42 +00002520 DCHECK_NE(instruction_set_, InstructionSet::kNone);
Mathieu Chartiere401d142015-04-22 13:56:20 -07002521 DCHECK(method->IsRuntimeMethod());
2522 return method;
Ian Rogersff1ed472011-09-20 13:46:24 -07002523}
2524
Mathieu Chartierc11d9b82013-09-19 10:01:59 -07002525void Runtime::DisallowNewSystemWeaks() {
Hiroshi Yamauchifdbd13c2015-09-02 16:16:58 -07002526 CHECK(!kUseReadBarrier);
Mathieu Chartierc11d9b82013-09-19 10:01:59 -07002527 monitor_list_->DisallowNewMonitors();
Mathieu Chartier14c3bf92015-07-13 14:35:43 -07002528 intern_table_->ChangeWeakRootState(gc::kWeakRootStateNoReadsOrWrites);
Mathieu Chartierc11d9b82013-09-19 10:01:59 -07002529 java_vm_->DisallowNewWeakGlobals();
Man Cao42c3c332015-06-23 16:38:25 -07002530 heap_->DisallowNewAllocationRecords();
Nicolas Geoffraye51ca8b2016-11-22 14:49:31 +00002531 if (GetJit() != nullptr) {
2532 GetJit()->GetCodeCache()->DisallowInlineCacheAccess();
2533 }
Andreas Gampefda57142016-09-08 20:29:18 -07002534
2535 // All other generic system-weak holders.
2536 for (gc::AbstractSystemWeakHolder* holder : system_weak_holders_) {
2537 holder->Disallow();
2538 }
Mathieu Chartierc11d9b82013-09-19 10:01:59 -07002539}
2540
2541void Runtime::AllowNewSystemWeaks() {
Hiroshi Yamauchifdbd13c2015-09-02 16:16:58 -07002542 CHECK(!kUseReadBarrier);
Mathieu Chartierc11d9b82013-09-19 10:01:59 -07002543 monitor_list_->AllowNewMonitors();
Mathieu Chartier90ef3db2015-08-04 15:19:41 -07002544 intern_table_->ChangeWeakRootState(gc::kWeakRootStateNormal); // TODO: Do this in the sweeping.
Mathieu Chartierc11d9b82013-09-19 10:01:59 -07002545 java_vm_->AllowNewWeakGlobals();
Man Cao42c3c332015-06-23 16:38:25 -07002546 heap_->AllowNewAllocationRecords();
Nicolas Geoffraye51ca8b2016-11-22 14:49:31 +00002547 if (GetJit() != nullptr) {
2548 GetJit()->GetCodeCache()->AllowInlineCacheAccess();
2549 }
Andreas Gampefda57142016-09-08 20:29:18 -07002550
2551 // All other generic system-weak holders.
2552 for (gc::AbstractSystemWeakHolder* holder : system_weak_holders_) {
2553 holder->Allow();
2554 }
Mathieu Chartierc11d9b82013-09-19 10:01:59 -07002555}
2556
Hiroshi Yamauchi30493242016-11-03 13:06:52 -07002557void Runtime::BroadcastForNewSystemWeaks(bool broadcast_for_checkpoint) {
Hiroshi Yamauchifdbd13c2015-09-02 16:16:58 -07002558 // This is used for the read barrier case that uses the thread-local
Hiroshi Yamauchi30493242016-11-03 13:06:52 -07002559 // Thread::GetWeakRefAccessEnabled() flag and the checkpoint while weak ref access is disabled
2560 // (see ThreadList::RunCheckpoint).
Hiroshi Yamauchi0b713572015-06-16 18:29:23 -07002561 monitor_list_->BroadcastForNewMonitors();
2562 intern_table_->BroadcastForNewInterns();
2563 java_vm_->BroadcastForNewWeakGlobals();
Hiroshi Yamauchifdbd13c2015-09-02 16:16:58 -07002564 heap_->BroadcastForNewAllocationRecords();
Nicolas Geoffraye51ca8b2016-11-22 14:49:31 +00002565 if (GetJit() != nullptr) {
2566 GetJit()->GetCodeCache()->BroadcastForInlineCacheAccess();
2567 }
Andreas Gampefda57142016-09-08 20:29:18 -07002568
2569 // All other generic system-weak holders.
2570 for (gc::AbstractSystemWeakHolder* holder : system_weak_holders_) {
Hiroshi Yamauchi30493242016-11-03 13:06:52 -07002571 holder->Broadcast(broadcast_for_checkpoint);
Andreas Gampefda57142016-09-08 20:29:18 -07002572 }
Hiroshi Yamauchi0b713572015-06-16 18:29:23 -07002573}
2574
Vladimir Marko7624d252014-05-02 14:40:15 +01002575void Runtime::SetInstructionSet(InstructionSet instruction_set) {
2576 instruction_set_ = instruction_set;
Vladimir Markod3083dd2018-05-17 08:43:47 +01002577 switch (instruction_set) {
2578 case InstructionSet::kThumb2:
2579 // kThumb2 is the same as kArm, use the canonical value.
2580 instruction_set_ = InstructionSet::kArm;
2581 break;
2582 case InstructionSet::kArm:
2583 case InstructionSet::kArm64:
Vladimir Markod3083dd2018-05-17 08:43:47 +01002584 case InstructionSet::kX86:
2585 case InstructionSet::kX86_64:
2586 break;
2587 default:
2588 UNIMPLEMENTED(FATAL) << instruction_set_;
2589 UNREACHABLE();
Vladimir Marko7624d252014-05-02 14:40:15 +01002590 }
2591}
2592
Igor Murashkin8275fba2017-05-02 15:58:02 -07002593void Runtime::ClearInstructionSet() {
2594 instruction_set_ = InstructionSet::kNone;
2595}
2596
Mathieu Chartiere401d142015-04-22 13:56:20 -07002597void Runtime::SetCalleeSaveMethod(ArtMethod* method, CalleeSaveType type) {
Andreas Gampe8228cdf2017-05-30 15:03:54 -07002598 DCHECK_LT(static_cast<uint32_t>(type), kCalleeSaveSize);
Mathieu Chartiere401d142015-04-22 13:56:20 -07002599 CHECK(method != nullptr);
Andreas Gampe8228cdf2017-05-30 15:03:54 -07002600 callee_save_methods_[static_cast<size_t>(type)] = reinterpret_cast<uintptr_t>(method);
Brian Carlstrome24fa612011-09-29 00:53:55 -07002601}
2602
Igor Murashkin8275fba2017-05-02 15:58:02 -07002603void Runtime::ClearCalleeSaveMethods() {
Andreas Gampe8228cdf2017-05-30 15:03:54 -07002604 for (size_t i = 0; i < kCalleeSaveSize; ++i) {
2605 callee_save_methods_[i] = reinterpret_cast<uintptr_t>(nullptr);
Igor Murashkin8275fba2017-05-02 15:58:02 -07002606 }
2607}
2608
Calin Juravlec2753e62021-06-25 15:34:09 -07002609void Runtime::RegisterAppInfo(const std::string& package_name,
2610 const std::vector<std::string>& code_paths,
Calin Juravlebeb9f202021-06-02 14:42:03 -07002611 const std::string& profile_output_filename,
Calin Juravlec2753e62021-06-25 15:34:09 -07002612 const std::string& ref_profile_filename,
2613 int32_t code_type) {
2614 app_info_.RegisterAppInfo(
2615 package_name,
2616 code_paths,
2617 profile_output_filename,
2618 ref_profile_filename,
2619 AppInfo::FromVMRuntimeConstants(code_type));
2620
2621 if (metrics_reporter_ != nullptr) {
2622 metrics_reporter_->NotifyAppInfoUpdated(&app_info_);
2623 }
2624
Calin Juravle5e2b9712015-12-18 14:10:00 +02002625 if (jit_.get() == nullptr) {
2626 // We are not JITing. Nothing to do.
2627 return;
Calin Juravle4d77b6a2015-12-01 18:38:09 +00002628 }
Calin Juravle5e2b9712015-12-18 14:10:00 +02002629
2630 VLOG(profiler) << "Register app with " << profile_output_filename
Andreas Gampe9186ced2016-12-12 14:28:21 -08002631 << " " << android::base::Join(code_paths, ':');
Calin Juravlebeb9f202021-06-02 14:42:03 -07002632 VLOG(profiler) << "Reference profile is: " << ref_profile_filename;
Calin Juravle5e2b9712015-12-18 14:10:00 +02002633
2634 if (profile_output_filename.empty()) {
2635 LOG(WARNING) << "JIT profile information will not be recorded: profile filename is empty.";
2636 return;
2637 }
Andreas Gampe98ea9d92018-10-19 14:06:15 -07002638 if (!OS::FileExists(profile_output_filename.c_str(), /*check_file_type=*/ false)) {
Travis Tynesda40aca2019-07-22 19:24:35 -04002639 LOG(WARNING) << "JIT profile information will not be recorded: profile file does not exist.";
Calin Juravle5e2b9712015-12-18 14:10:00 +02002640 return;
2641 }
2642 if (code_paths.empty()) {
2643 LOG(WARNING) << "JIT profile information will not be recorded: code paths is empty.";
2644 return;
2645 }
2646
Calin Juravlebeb9f202021-06-02 14:42:03 -07002647 jit_->StartProfileSaver(profile_output_filename, code_paths, ref_profile_filename);
Dave Allison0aded082013-11-07 13:15:11 -08002648}
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +01002649
2650// Transaction support.
Chang Xing605fe242017-07-20 15:57:21 -07002651bool Runtime::IsActiveTransaction() const {
2652 return !preinitialization_transactions_.empty() && !GetTransaction()->IsRollingBack();
2653}
2654
Chang Xing5a906fc2017-07-26 15:01:16 -07002655void Runtime::EnterTransactionMode(bool strict, mirror::Class* root) {
Chang Xingcade5c32017-07-20 17:56:26 -07002656 DCHECK(IsAotCompiler());
Vladimir Markob6e67922021-07-06 15:53:07 +01002657 ArenaPool* arena_pool = nullptr;
2658 ArenaStack* arena_stack = nullptr;
Vladimir Marko672c0802019-07-26 13:03:13 +01002659 if (preinitialization_transactions_.empty()) { // Top-level transaction?
2660 // Make initialized classes visibly initialized now. If that happened during the transaction
2661 // and then the transaction was aborted, we would roll back the status update but not the
2662 // ClassLinker's bookkeeping structures, so these classes would never be visibly initialized.
2663 GetClassLinker()->MakeInitializedClassesVisiblyInitialized(Thread::Current(), /*wait=*/ true);
Vladimir Markob6e67922021-07-06 15:53:07 +01002664 // Pass the runtime `ArenaPool` to the transaction.
2665 arena_pool = GetArenaPool();
2666 } else {
2667 // Pass the `ArenaStack` from previous transaction to the new one.
2668 arena_stack = preinitialization_transactions_.front().GetArenaStack();
Vladimir Marko672c0802019-07-26 13:03:13 +01002669 }
Vladimir Markob6e67922021-07-06 15:53:07 +01002670 preinitialization_transactions_.emplace_front(strict, root, arena_stack, arena_pool);
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +01002671}
2672
2673void Runtime::ExitTransactionMode() {
Mathieu Chartiere5f13e52015-02-24 09:37:21 -08002674 DCHECK(IsAotCompiler());
Chang Xing605fe242017-07-20 15:57:21 -07002675 DCHECK(IsActiveTransaction());
Vladimir Markob6e67922021-07-06 15:53:07 +01002676 preinitialization_transactions_.pop_front();
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +01002677}
2678
Chang Xing16d1dd82017-07-20 17:56:26 -07002679void Runtime::RollbackAndExitTransactionMode() {
2680 DCHECK(IsAotCompiler());
2681 DCHECK(IsActiveTransaction());
Vladimir Markob6e67922021-07-06 15:53:07 +01002682 preinitialization_transactions_.front().Rollback();
2683 preinitialization_transactions_.pop_front();
Chang Xing16d1dd82017-07-20 17:56:26 -07002684}
2685
Sebastien Hertz1c80bec2015-02-03 11:58:06 +01002686bool Runtime::IsTransactionAborted() const {
2687 if (!IsActiveTransaction()) {
2688 return false;
2689 } else {
Mathieu Chartier184c9dc2015-03-05 13:20:54 -08002690 DCHECK(IsAotCompiler());
Chang Xing605fe242017-07-20 15:57:21 -07002691 return GetTransaction()->IsAborted();
Sebastien Hertz1c80bec2015-02-03 11:58:06 +01002692 }
2693}
2694
Chang Xing605fe242017-07-20 15:57:21 -07002695void Runtime::RollbackAllTransactions() {
2696 // If transaction is aborted, all transactions will be kept in the list.
2697 // Rollback and exit all of them.
2698 while (IsActiveTransaction()) {
2699 RollbackAndExitTransactionMode();
Sebastien Hertz1c80bec2015-02-03 11:58:06 +01002700 }
2701}
2702
Chang Xing5a906fc2017-07-26 15:01:16 -07002703bool Runtime::IsActiveStrictTransactionMode() const {
Chang Xing605fe242017-07-20 15:57:21 -07002704 return IsActiveTransaction() && GetTransaction()->IsStrict();
2705}
2706
Vladimir Markob6e67922021-07-06 15:53:07 +01002707const Transaction* Runtime::GetTransaction() const {
Chang Xing605fe242017-07-20 15:57:21 -07002708 DCHECK(!preinitialization_transactions_.empty());
Vladimir Markob6e67922021-07-06 15:53:07 +01002709 return &preinitialization_transactions_.front();
2710}
2711
2712Transaction* Runtime::GetTransaction() {
2713 DCHECK(!preinitialization_transactions_.empty());
2714 return &preinitialization_transactions_.front();
Chang Xing5a906fc2017-07-26 15:01:16 -07002715}
2716
Sebastien Hertz2fd7e692015-04-02 11:11:19 +02002717void Runtime::AbortTransactionAndThrowAbortError(Thread* self, const std::string& abort_message) {
Mathieu Chartier184c9dc2015-03-05 13:20:54 -08002718 DCHECK(IsAotCompiler());
Sebastien Hertz1c80bec2015-02-03 11:58:06 +01002719 DCHECK(IsActiveTransaction());
Sebastien Hertzbd9cf9f2015-03-03 12:16:13 +01002720 // Throwing an exception may cause its class initialization. If we mark the transaction
2721 // aborted before that, we may warn with a false alarm. Throwing the exception before
2722 // marking the transaction aborted avoids that.
Chang Xing605fe242017-07-20 15:57:21 -07002723 // But now the transaction can be nested, and abort the transaction will relax the constraints
2724 // for constructing stack trace.
2725 GetTransaction()->Abort(abort_message);
2726 GetTransaction()->ThrowAbortError(self, &abort_message);
Sebastien Hertz1c80bec2015-02-03 11:58:06 +01002727}
2728
Sebastien Hertz2fd7e692015-04-02 11:11:19 +02002729void Runtime::ThrowTransactionAbortError(Thread* self) {
Mathieu Chartier184c9dc2015-03-05 13:20:54 -08002730 DCHECK(IsAotCompiler());
Sebastien Hertz1c80bec2015-02-03 11:58:06 +01002731 DCHECK(IsActiveTransaction());
Sebastien Hertzb81e1cd2015-04-28 12:31:41 +02002732 // Passing nullptr means we rethrow an exception with the earlier transaction abort message.
Chang Xing605fe242017-07-20 15:57:21 -07002733 GetTransaction()->ThrowAbortError(self, nullptr);
Sebastien Hertz1c80bec2015-02-03 11:58:06 +01002734}
2735
Vladimir Markob6e67922021-07-06 15:53:07 +01002736void Runtime::RecordWriteFieldBoolean(mirror::Object* obj,
2737 MemberOffset field_offset,
2738 uint8_t value,
2739 bool is_volatile) {
Mathieu Chartier184c9dc2015-03-05 13:20:54 -08002740 DCHECK(IsAotCompiler());
Fred Shih37f05ef2014-07-16 18:38:08 -07002741 DCHECK(IsActiveTransaction());
Chang Xing605fe242017-07-20 15:57:21 -07002742 GetTransaction()->RecordWriteFieldBoolean(obj, field_offset, value, is_volatile);
Fred Shih37f05ef2014-07-16 18:38:08 -07002743}
2744
Vladimir Markob6e67922021-07-06 15:53:07 +01002745void Runtime::RecordWriteFieldByte(mirror::Object* obj,
2746 MemberOffset field_offset,
2747 int8_t value,
2748 bool is_volatile) {
Mathieu Chartier184c9dc2015-03-05 13:20:54 -08002749 DCHECK(IsAotCompiler());
Fred Shih37f05ef2014-07-16 18:38:08 -07002750 DCHECK(IsActiveTransaction());
Chang Xing605fe242017-07-20 15:57:21 -07002751 GetTransaction()->RecordWriteFieldByte(obj, field_offset, value, is_volatile);
Fred Shih37f05ef2014-07-16 18:38:08 -07002752}
2753
Vladimir Markob6e67922021-07-06 15:53:07 +01002754void Runtime::RecordWriteFieldChar(mirror::Object* obj,
2755 MemberOffset field_offset,
2756 uint16_t value,
2757 bool is_volatile) {
Mathieu Chartier184c9dc2015-03-05 13:20:54 -08002758 DCHECK(IsAotCompiler());
Fred Shih37f05ef2014-07-16 18:38:08 -07002759 DCHECK(IsActiveTransaction());
Chang Xing605fe242017-07-20 15:57:21 -07002760 GetTransaction()->RecordWriteFieldChar(obj, field_offset, value, is_volatile);
Fred Shih37f05ef2014-07-16 18:38:08 -07002761}
2762
Vladimir Markob6e67922021-07-06 15:53:07 +01002763void Runtime::RecordWriteFieldShort(mirror::Object* obj,
2764 MemberOffset field_offset,
2765 int16_t value,
2766 bool is_volatile) {
Mathieu Chartier184c9dc2015-03-05 13:20:54 -08002767 DCHECK(IsAotCompiler());
Fred Shih37f05ef2014-07-16 18:38:08 -07002768 DCHECK(IsActiveTransaction());
Chang Xing605fe242017-07-20 15:57:21 -07002769 GetTransaction()->RecordWriteFieldShort(obj, field_offset, value, is_volatile);
Fred Shih37f05ef2014-07-16 18:38:08 -07002770}
2771
Vladimir Markob6e67922021-07-06 15:53:07 +01002772void Runtime::RecordWriteField32(mirror::Object* obj,
2773 MemberOffset field_offset,
2774 uint32_t value,
2775 bool is_volatile) {
Mathieu Chartiere5f13e52015-02-24 09:37:21 -08002776 DCHECK(IsAotCompiler());
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +01002777 DCHECK(IsActiveTransaction());
Chang Xing605fe242017-07-20 15:57:21 -07002778 GetTransaction()->RecordWriteField32(obj, field_offset, value, is_volatile);
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +01002779}
2780
Vladimir Markob6e67922021-07-06 15:53:07 +01002781void Runtime::RecordWriteField64(mirror::Object* obj,
2782 MemberOffset field_offset,
2783 uint64_t value,
2784 bool is_volatile) {
Mathieu Chartiere5f13e52015-02-24 09:37:21 -08002785 DCHECK(IsAotCompiler());
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +01002786 DCHECK(IsActiveTransaction());
Chang Xing605fe242017-07-20 15:57:21 -07002787 GetTransaction()->RecordWriteField64(obj, field_offset, value, is_volatile);
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +01002788}
2789
Mathieu Chartiera058fdf2016-10-06 15:13:58 -07002790void Runtime::RecordWriteFieldReference(mirror::Object* obj,
2791 MemberOffset field_offset,
2792 ObjPtr<mirror::Object> value,
Vladimir Markob6e67922021-07-06 15:53:07 +01002793 bool is_volatile) {
Mathieu Chartiere5f13e52015-02-24 09:37:21 -08002794 DCHECK(IsAotCompiler());
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +01002795 DCHECK(IsActiveTransaction());
Vladimir Markob6e67922021-07-06 15:53:07 +01002796 GetTransaction()->RecordWriteFieldReference(obj, field_offset, value.Ptr(), is_volatile);
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +01002797}
2798
Vladimir Markob6e67922021-07-06 15:53:07 +01002799void Runtime::RecordWriteArray(mirror::Array* array, size_t index, uint64_t value) {
Mathieu Chartiere5f13e52015-02-24 09:37:21 -08002800 DCHECK(IsAotCompiler());
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +01002801 DCHECK(IsActiveTransaction());
Chang Xing605fe242017-07-20 15:57:21 -07002802 GetTransaction()->RecordWriteArray(array, index, value);
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +01002803}
2804
Vladimir Markob6e67922021-07-06 15:53:07 +01002805void Runtime::RecordStrongStringInsertion(ObjPtr<mirror::String> s) {
Mathieu Chartiere5f13e52015-02-24 09:37:21 -08002806 DCHECK(IsAotCompiler());
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +01002807 DCHECK(IsActiveTransaction());
Chang Xing605fe242017-07-20 15:57:21 -07002808 GetTransaction()->RecordStrongStringInsertion(s);
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +01002809}
2810
Vladimir Markob6e67922021-07-06 15:53:07 +01002811void Runtime::RecordWeakStringInsertion(ObjPtr<mirror::String> s) {
Mathieu Chartiere5f13e52015-02-24 09:37:21 -08002812 DCHECK(IsAotCompiler());
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +01002813 DCHECK(IsActiveTransaction());
Chang Xing605fe242017-07-20 15:57:21 -07002814 GetTransaction()->RecordWeakStringInsertion(s);
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +01002815}
2816
Vladimir Markob6e67922021-07-06 15:53:07 +01002817void Runtime::RecordStrongStringRemoval(ObjPtr<mirror::String> s) {
Mathieu Chartiere5f13e52015-02-24 09:37:21 -08002818 DCHECK(IsAotCompiler());
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +01002819 DCHECK(IsActiveTransaction());
Chang Xing605fe242017-07-20 15:57:21 -07002820 GetTransaction()->RecordStrongStringRemoval(s);
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +01002821}
2822
Vladimir Markob6e67922021-07-06 15:53:07 +01002823void Runtime::RecordWeakStringRemoval(ObjPtr<mirror::String> s) {
Mathieu Chartiere5f13e52015-02-24 09:37:21 -08002824 DCHECK(IsAotCompiler());
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +01002825 DCHECK(IsActiveTransaction());
Chang Xing605fe242017-07-20 15:57:21 -07002826 GetTransaction()->RecordWeakStringRemoval(s);
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +01002827}
Mathieu Chartier15d34022014-02-26 17:16:38 -08002828
Andreas Gampe8a0128a2016-11-28 07:38:35 -08002829void Runtime::RecordResolveString(ObjPtr<mirror::DexCache> dex_cache,
Vladimir Markob6e67922021-07-06 15:53:07 +01002830 dex::StringIndex string_idx) {
Mathieu Chartierbb816d62016-09-07 10:17:46 -07002831 DCHECK(IsAotCompiler());
2832 DCHECK(IsActiveTransaction());
Chang Xing605fe242017-07-20 15:57:21 -07002833 GetTransaction()->RecordResolveString(dex_cache, string_idx);
Mathieu Chartierbb816d62016-09-07 10:17:46 -07002834}
2835
Vladimir Markoe9a4a602021-06-22 16:33:34 +01002836void Runtime::RecordResolveMethodType(ObjPtr<mirror::DexCache> dex_cache,
Vladimir Markob6e67922021-07-06 15:53:07 +01002837 dex::ProtoIndex proto_idx) {
Vladimir Markoe9a4a602021-06-22 16:33:34 +01002838 DCHECK(IsAotCompiler());
2839 DCHECK(IsActiveTransaction());
2840 GetTransaction()->RecordResolveMethodType(dex_cache, proto_idx);
2841}
2842
Mathieu Chartier15d34022014-02-26 17:16:38 -08002843void Runtime::SetFaultMessage(const std::string& message) {
Andreas Gampe44f67602018-11-28 08:27:27 -08002844 std::string* new_msg = new std::string(message);
2845 std::string* cur_msg = fault_message_.exchange(new_msg);
2846 delete cur_msg;
2847}
2848
2849std::string Runtime::GetFaultMessage() {
2850 // Retrieve the message. Temporarily replace with null so that SetFaultMessage will not delete
2851 // the string in parallel.
2852 std::string* cur_msg = fault_message_.exchange(nullptr);
2853
2854 // Make a copy of the string.
2855 std::string ret = cur_msg == nullptr ? "" : *cur_msg;
2856
2857 // Put the message back if it hasn't been updated.
2858 std::string* null_str = nullptr;
2859 if (!fault_message_.compare_exchange_strong(null_str, cur_msg)) {
2860 // Already replaced.
2861 delete cur_msg;
2862 }
2863
2864 return ret;
Mathieu Chartier15d34022014-02-26 17:16:38 -08002865}
Brian Carlstrom491ca9e2014-03-02 18:24:38 -08002866
Igor Murashkinb1d8c312015-08-04 11:18:43 -07002867void Runtime::AddCurrentRuntimeFeaturesAsDex2OatArguments(std::vector<std::string>* argv)
Ian Rogers8afeb852014-04-02 14:55:49 -07002868 const {
Nicolas Geoffrayc6b1b932016-03-22 09:52:40 +00002869 if (GetInstrumentation()->InterpretOnly()) {
Nicolas Geoffray49cda062017-04-21 13:08:25 +01002870 argv->push_back("--compiler-filter=quicken");
Ian Rogers9bc54402014-04-17 16:40:01 -07002871 }
2872
Ian Rogers8afeb852014-04-02 14:55:49 -07002873 // Make the dex2oat instruction set match that of the launching runtime. If we have multiple
2874 // architecture support, dex2oat may be compiled as a different instruction-set than that
2875 // currently being executed.
Ian Rogersb9beb2e2014-05-09 16:57:40 -07002876 std::string instruction_set("--instruction-set=");
Ulya Trafimovich5439f052020-07-29 10:03:46 +01002877 instruction_set += GetInstructionSetString(kRuntimeISA);
Ian Rogersb9beb2e2014-05-09 16:57:40 -07002878 argv->push_back(instruction_set);
Ian Rogers8afeb852014-04-02 14:55:49 -07002879
xueliang.zhong7f88c1a2018-11-06 11:42:41 +00002880 if (InstructionSetFeatures::IsRuntimeDetectionSupported()) {
2881 argv->push_back("--instruction-set-features=runtime");
2882 } else {
2883 std::unique_ptr<const InstructionSetFeatures> features(
2884 InstructionSetFeatures::FromCppDefines());
2885 std::string feature_string("--instruction-set-features=");
2886 feature_string += features->GetFeatureString();
2887 argv->push_back(feature_string);
2888 }
Ian Rogers8afeb852014-04-02 14:55:49 -07002889}
2890
Orion Hodsonad28f5e2018-10-17 09:08:17 +01002891void Runtime::CreateJitCodeCache(bool rwx_memory_allowed) {
Calin Juravleaf36e492016-04-27 18:50:45 +01002892 if (kIsDebugBuild && GetInstrumentation()->IsForcedInterpretOnly()) {
2893 DCHECK(!jit_options_->UseJitCompilation());
Hiroshi Yamauchi02d2f292015-04-03 13:35:16 -07002894 }
Orion Hodsonad28f5e2018-10-17 09:08:17 +01002895
Andreas Gampe83e20492018-11-07 11:12:26 -08002896 if (!jit_options_->UseJitCompilation() && !jit_options_->GetSaveProfilingInfo()) {
Calin Juravle9545f6d2017-03-16 19:05:09 -07002897 return;
2898 }
Orion Hodsonad28f5e2018-10-17 09:08:17 +01002899
Orion Hodsonad28f5e2018-10-17 09:08:17 +01002900 std::string error_msg;
2901 bool profiling_only = !jit_options_->UseJitCompilation();
Nicolas Geoffray7a2c7c22018-11-20 10:03:13 +00002902 jit_code_cache_.reset(jit::JitCodeCache::Create(profiling_only,
2903 rwx_memory_allowed,
2904 IsZygote(),
Orion Hodsonad28f5e2018-10-17 09:08:17 +01002905 &error_msg));
2906 if (jit_code_cache_.get() == nullptr) {
2907 LOG(WARNING) << "Failed to create JIT Code Cache: " << error_msg;
2908 }
2909}
2910
2911void Runtime::CreateJit() {
Andreas Gampe83e20492018-11-07 11:12:26 -08002912 DCHECK(jit_ == nullptr);
Orion Hodsonad28f5e2018-10-17 09:08:17 +01002913 if (jit_code_cache_.get() == nullptr) {
Andreas Gampe83e20492018-11-07 11:12:26 -08002914 if (!IsSafeMode()) {
2915 LOG(WARNING) << "Missing code cache, cannot create JIT.";
2916 }
2917 return;
2918 }
2919 if (IsSafeMode()) {
2920 LOG(INFO) << "Not creating JIT because of SafeMode.";
2921 jit_code_cache_.reset();
Orion Hodsonad28f5e2018-10-17 09:08:17 +01002922 return;
2923 }
2924
2925 jit::Jit* jit = jit::Jit::Create(jit_code_cache_.get(), jit_options_.get());
Nicolas Geoffraye4f983c2021-07-12 15:53:27 +01002926 jit_.reset(jit);
Orion Hodsonad28f5e2018-10-17 09:08:17 +01002927 if (jit == nullptr) {
2928 LOG(WARNING) << "Failed to allocate JIT";
2929 // Release JIT code cache resources (several MB of memory).
Andreas Gampe83e20492018-11-07 11:12:26 -08002930 jit_code_cache_.reset();
Nicolas Geoffrayce9ed362018-11-29 03:19:28 +00002931 } else {
2932 jit->CreateThreadPool();
Orion Hodsonad28f5e2018-10-17 09:08:17 +01002933 }
Mathieu Chartiere5f13e52015-02-24 09:37:21 -08002934}
2935
Andreas Gampe4585f872015-03-27 23:45:15 -07002936bool Runtime::CanRelocate() const {
Vladimir Marko4df2d802018-09-27 16:42:44 +00002937 return !IsAotCompiler();
Andreas Gampe4585f872015-03-27 23:45:15 -07002938}
2939
2940bool Runtime::IsCompilingBootImage() const {
2941 return IsCompiler() && compiler_callbacks_->IsBootImage();
2942}
2943
Mathieu Chartiere401d142015-04-22 13:56:20 -07002944void Runtime::SetResolutionMethod(ArtMethod* method) {
2945 CHECK(method != nullptr);
2946 CHECK(method->IsRuntimeMethod()) << method;
2947 resolution_method_ = method;
2948}
2949
2950void Runtime::SetImtUnimplementedMethod(ArtMethod* method) {
2951 CHECK(method != nullptr);
2952 CHECK(method->IsRuntimeMethod());
2953 imt_unimplemented_method_ = method;
Mathieu Chartier91288d82016-04-28 09:44:54 -07002954}
2955
2956void Runtime::FixupConflictTables() {
2957 // We can only do this after the class linker is created.
Andreas Gampe542451c2016-07-26 09:02:02 -07002958 const PointerSize pointer_size = GetClassLinker()->GetImagePointerSize();
Mathieu Chartier91288d82016-04-28 09:44:54 -07002959 if (imt_unimplemented_method_->GetImtConflictTable(pointer_size) == nullptr) {
2960 imt_unimplemented_method_->SetImtConflictTable(
Andreas Gampe98ea9d92018-10-19 14:06:15 -07002961 ClassLinker::CreateImtConflictTable(/*count=*/0u, GetLinearAlloc(), pointer_size),
Mathieu Chartier91288d82016-04-28 09:44:54 -07002962 pointer_size);
2963 }
2964 if (imt_conflict_method_->GetImtConflictTable(pointer_size) == nullptr) {
2965 imt_conflict_method_->SetImtConflictTable(
Andreas Gampe98ea9d92018-10-19 14:06:15 -07002966 ClassLinker::CreateImtConflictTable(/*count=*/0u, GetLinearAlloc(), pointer_size),
Mathieu Chartier91288d82016-04-28 09:44:54 -07002967 pointer_size);
Nicolas Geoffray40c68c62016-03-23 16:35:51 +00002968 }
Mathieu Chartiere401d142015-04-22 13:56:20 -07002969}
2970
Nicolas Geoffray68bf3902017-09-07 14:40:48 +01002971void Runtime::DisableVerifier() {
2972 verify_ = verifier::VerifyMode::kNone;
2973}
2974
Igor Murashkin7617abd2015-07-10 18:27:47 -07002975bool Runtime::IsVerificationEnabled() const {
Igor Murashkindf707e42016-02-02 16:56:50 -08002976 return verify_ == verifier::VerifyMode::kEnable ||
2977 verify_ == verifier::VerifyMode::kSoftFail;
Igor Murashkin7617abd2015-07-10 18:27:47 -07002978}
2979
2980bool Runtime::IsVerificationSoftFail() const {
2981 return verify_ == verifier::VerifyMode::kSoftFail;
2982}
2983
Nicolas Geoffray433b79a2017-01-30 20:54:45 +00002984bool Runtime::IsAsyncDeoptimizeable(uintptr_t code) const {
Nicolas Geoffray00391822019-12-10 10:17:23 +00002985 if (OatQuickMethodHeader::NterpMethodHeader != nullptr) {
2986 if (OatQuickMethodHeader::NterpMethodHeader->Contains(code)) {
2987 return true;
2988 }
2989 }
Nicolas Geoffray433b79a2017-01-30 20:54:45 +00002990 // We only support async deopt (ie the compiled code is not explicitly asking for
2991 // deopt, but something else like the debugger) in debuggable JIT code.
2992 // We could look at the oat file where `code` is being defined,
2993 // and check whether it's been compiled debuggable, but we decided to
2994 // only rely on the JIT for debuggable apps.
Alex Light280e6c32020-03-03 13:52:07 -08002995 // The JIT-zygote is not debuggable so we need to be sure to exclude code from the non-private
2996 // region as well.
2997 return IsJavaDebuggable() && GetJit() != nullptr &&
2998 GetJit()->GetCodeCache()->PrivateRegionContainsPc(reinterpret_cast<const void*>(code));
Mingyao Yangf711f2c2016-05-23 12:29:39 -07002999}
3000
Mathieu Chartier951ec2c2015-09-22 08:50:05 -07003001LinearAlloc* Runtime::CreateLinearAlloc() {
Mathieu Chartierc3fcd412015-09-25 16:54:59 -07003002 // For 64 bit compilers, it needs to be in low 4GB in the case where we are cross compiling for a
3003 // 32 bit target. In this case, we have 32 bit pointers in the dex cache arrays which can't hold
3004 // when we have 64 bit ArtMethod pointers.
Mathieu Chartier017ed0b2015-09-22 11:04:26 -07003005 return (IsAotCompiler() && Is64BitInstructionSet(kRuntimeISA))
Mathieu Chartier951ec2c2015-09-22 08:50:05 -07003006 ? new LinearAlloc(low_4gb_arena_pool_.get())
3007 : new LinearAlloc(arena_pool_.get());
3008}
3009
Mathieu Chartier32cc9ee2015-10-15 09:19:15 -07003010double Runtime::GetHashTableMinLoadFactor() const {
3011 return is_low_memory_mode_ ? kLowMemoryMinLoadFactor : kNormalMinLoadFactor;
3012}
3013
3014double Runtime::GetHashTableMaxLoadFactor() const {
3015 return is_low_memory_mode_ ? kLowMemoryMaxLoadFactor : kNormalMaxLoadFactor;
3016}
3017
Mathieu Chartierf8cb1782016-03-18 18:45:41 -07003018void Runtime::UpdateProcessState(ProcessState process_state) {
3019 ProcessState old_process_state = process_state_;
3020 process_state_ = process_state;
3021 GetHeap()->UpdateProcessState(old_process_state, process_state);
3022}
3023
Calin Juravle97cbc922016-04-15 16:16:35 +01003024void Runtime::RegisterSensitiveThread() const {
3025 Thread::SetJitSensitiveThread();
3026}
3027
Calin Juravleffc87072016-04-20 14:22:09 +01003028// Returns true if JIT compilations are enabled. GetJit() will be not null in this case.
3029bool Runtime::UseJitCompilation() const {
3030 return (jit_ != nullptr) && jit_->UseJitCompilation();
3031}
3032
David Sehrd106d9f2016-08-16 19:22:57 -07003033void Runtime::EnvSnapshot::TakeSnapshot() {
3034 char** env = GetEnviron();
3035 for (size_t i = 0; env[i] != nullptr; ++i) {
3036 name_value_pairs_.emplace_back(new std::string(env[i]));
3037 }
3038 // The strings in name_value_pairs_ retain ownership of the c_str, but we assign pointers
3039 // for quick use by GetSnapshot. This avoids allocation and copying cost at Exec.
3040 c_env_vector_.reset(new char*[name_value_pairs_.size() + 1]);
3041 for (size_t i = 0; env[i] != nullptr; ++i) {
3042 c_env_vector_[i] = const_cast<char*>(name_value_pairs_[i]->c_str());
3043 }
3044 c_env_vector_[name_value_pairs_.size()] = nullptr;
3045}
3046
3047char** Runtime::EnvSnapshot::GetSnapshot() const {
3048 return c_env_vector_.get();
3049}
3050
Andreas Gampefda57142016-09-08 20:29:18 -07003051void Runtime::AddSystemWeakHolder(gc::AbstractSystemWeakHolder* holder) {
3052 gc::ScopedGCCriticalSection gcs(Thread::Current(),
3053 gc::kGcCauseAddRemoveSystemWeakHolder,
3054 gc::kCollectorTypeAddRemoveSystemWeakHolder);
Andreas Gampe1f648592017-01-13 10:46:01 -08003055 // Note: The ScopedGCCriticalSection also ensures that the rest of the function is in
3056 // a critical section.
Andreas Gampefda57142016-09-08 20:29:18 -07003057 system_weak_holders_.push_back(holder);
3058}
3059
3060void Runtime::RemoveSystemWeakHolder(gc::AbstractSystemWeakHolder* holder) {
3061 gc::ScopedGCCriticalSection gcs(Thread::Current(),
3062 gc::kGcCauseAddRemoveSystemWeakHolder,
3063 gc::kCollectorTypeAddRemoveSystemWeakHolder);
3064 auto it = std::find(system_weak_holders_.begin(), system_weak_holders_.end(), holder);
3065 if (it != system_weak_holders_.end()) {
3066 system_weak_holders_.erase(it);
3067 }
3068}
3069
Andreas Gampeac30fa22017-01-18 21:02:36 -08003070RuntimeCallbacks* Runtime::GetRuntimeCallbacks() {
3071 return callbacks_.get();
3072}
3073
Nicolas Geoffray433b79a2017-01-30 20:54:45 +00003074// Used to patch boot image method entry point to interpreter bridge.
3075class UpdateEntryPointsClassVisitor : public ClassVisitor {
3076 public:
3077 explicit UpdateEntryPointsClassVisitor(instrumentation::Instrumentation* instrumentation)
3078 : instrumentation_(instrumentation) {}
3079
Roland Levillainbbc6e7e2018-08-24 16:58:47 +01003080 bool operator()(ObjPtr<mirror::Class> klass) override REQUIRES(Locks::mutator_lock_) {
Nicolas Geoffray226805d2018-12-14 10:59:02 +00003081 DCHECK(Locks::mutator_lock_->IsExclusiveHeld(Thread::Current()));
Nicolas Geoffray433b79a2017-01-30 20:54:45 +00003082 auto pointer_size = Runtime::Current()->GetClassLinker()->GetImagePointerSize();
3083 for (auto& m : klass->GetMethods(pointer_size)) {
3084 const void* code = m.GetEntryPointFromQuickCompiledCode();
3085 if (Runtime::Current()->GetHeap()->IsInBootImageOatFile(code) &&
3086 !m.IsNative() &&
3087 !m.IsProxyMethod()) {
3088 instrumentation_->UpdateMethodsCodeForJavaDebuggable(&m, GetQuickToInterpreterBridge());
3089 }
Nicolas Geoffrayc76232e2020-03-18 11:23:33 +00003090
3091 if (Runtime::Current()->GetJit() != nullptr &&
3092 Runtime::Current()->GetJit()->GetCodeCache()->IsInZygoteExecSpace(code) &&
3093 !m.IsNative()) {
3094 DCHECK(!m.IsProxyMethod());
3095 instrumentation_->UpdateMethodsCodeForJavaDebuggable(&m, GetQuickToInterpreterBridge());
3096 }
3097
3098 if (m.IsPreCompiled()) {
3099 // Precompilation is incompatible with debuggable, so clear the flag
3100 // and update the entrypoint in case it has been compiled.
3101 m.ClearPreCompiled();
3102 instrumentation_->UpdateMethodsCodeForJavaDebuggable(&m, GetQuickToInterpreterBridge());
3103 }
Nicolas Geoffray433b79a2017-01-30 20:54:45 +00003104 }
3105 return true;
3106 }
3107
3108 private:
3109 instrumentation::Instrumentation* const instrumentation_;
3110};
3111
3112void Runtime::SetJavaDebuggable(bool value) {
3113 is_java_debuggable_ = value;
3114 // Do not call DeoptimizeBootImage just yet, the runtime may still be starting up.
3115}
3116
3117void Runtime::DeoptimizeBootImage() {
3118 // If we've already started and we are setting this runtime to debuggable,
3119 // we patch entry points of methods in boot image to interpreter bridge, as
3120 // boot image code may be AOT compiled as not debuggable.
3121 if (!GetInstrumentation()->IsForcedInterpretOnly()) {
Nicolas Geoffray433b79a2017-01-30 20:54:45 +00003122 UpdateEntryPointsClassVisitor visitor(GetInstrumentation());
3123 GetClassLinker()->VisitClasses(&visitor);
Nicolas Geoffray226805d2018-12-14 10:59:02 +00003124 jit::Jit* jit = GetJit();
3125 if (jit != nullptr) {
Alex Lightb28e3042020-03-06 13:02:46 -08003126 // Code previously compiled may not be compiled debuggable.
3127 jit->GetCodeCache()->TransitionToDebuggable();
Nicolas Geoffray226805d2018-12-14 10:59:02 +00003128 }
Nicolas Geoffray433b79a2017-01-30 20:54:45 +00003129 }
3130}
Mathieu Chartierada33d72018-12-17 13:17:30 -08003131
3132Runtime::ScopedThreadPoolUsage::ScopedThreadPoolUsage()
3133 : thread_pool_(Runtime::Current()->AcquireThreadPool()) {}
3134
3135Runtime::ScopedThreadPoolUsage::~ScopedThreadPoolUsage() {
3136 Runtime::Current()->ReleaseThreadPool();
3137}
3138
3139bool Runtime::DeleteThreadPool() {
3140 // Make sure workers are started to prevent thread shutdown errors.
3141 WaitForThreadPoolWorkersToStart();
3142 std::unique_ptr<ThreadPool> thread_pool;
3143 {
3144 MutexLock mu(Thread::Current(), *Locks::runtime_thread_pool_lock_);
3145 if (thread_pool_ref_count_ == 0) {
3146 thread_pool = std::move(thread_pool_);
3147 }
3148 }
3149 return thread_pool != nullptr;
3150}
3151
3152ThreadPool* Runtime::AcquireThreadPool() {
3153 MutexLock mu(Thread::Current(), *Locks::runtime_thread_pool_lock_);
3154 ++thread_pool_ref_count_;
3155 return thread_pool_.get();
3156}
3157
3158void Runtime::ReleaseThreadPool() {
3159 MutexLock mu(Thread::Current(), *Locks::runtime_thread_pool_lock_);
3160 CHECK_GT(thread_pool_ref_count_, 0u);
3161 --thread_pool_ref_count_;
3162}
3163
3164void Runtime::WaitForThreadPoolWorkersToStart() {
3165 // Need to make sure workers are created before deleting the pool.
3166 ScopedThreadPoolUsage stpu;
3167 if (stpu.GetThreadPool() != nullptr) {
3168 stpu.GetThreadPool()->WaitForWorkersToBeCreated();
3169 }
3170}
3171
Mathieu Chartier03625442019-06-24 17:29:23 -07003172void Runtime::ResetStartupCompleted() {
3173 startup_completed_.store(false, std::memory_order_seq_cst);
3174}
3175
Mathieu Chartierad390fa2019-10-16 20:03:00 -07003176class Runtime::NotifyStartupCompletedTask : public gc::HeapTask {
3177 public:
3178 NotifyStartupCompletedTask() : gc::HeapTask(/*target_run_time=*/ NanoTime()) {}
3179
3180 void Run(Thread* self) override {
3181 VLOG(startup) << "NotifyStartupCompletedTask running";
3182 Runtime* const runtime = Runtime::Current();
3183 {
3184 ScopedTrace trace("Releasing app image spaces metadata");
3185 ScopedObjectAccess soa(Thread::Current());
Mathieu Chartierad390fa2019-10-16 20:03:00 -07003186 // Request empty checkpoints to make sure no threads are accessing the image space metadata
3187 // section when we madvise it. Use GC exclusion to prevent deadlocks that may happen if
3188 // multiple threads are attempting to run empty checkpoints at the same time.
3189 {
3190 // Avoid using ScopedGCCriticalSection since that does not allow thread suspension. This is
3191 // not allowed to prevent allocations, but it's still safe to suspend temporarily for the
3192 // checkpoint.
3193 gc::ScopedInterruptibleGCCriticalSection sigcs(self,
3194 gc::kGcCauseRunEmptyCheckpoint,
3195 gc::kCollectorTypeCriticalSection);
3196 runtime->GetThreadList()->RunEmptyCheckpoint();
3197 }
3198 for (gc::space::ContinuousSpace* space : runtime->GetHeap()->GetContinuousSpaces()) {
3199 if (space->IsImageSpace()) {
3200 gc::space::ImageSpace* image_space = space->AsImageSpace();
3201 if (image_space->GetImageHeader().IsAppImage()) {
3202 image_space->ReleaseMetadata();
3203 }
3204 }
3205 }
3206 }
3207
3208 {
3209 // Delete the thread pool used for app image loading since startup is assumed to be completed.
3210 ScopedTrace trace2("Delete thread pool");
3211 runtime->DeleteThreadPool();
3212 }
3213 }
3214};
3215
Mathieu Chartier175ce3d2019-03-06 16:54:24 -08003216void Runtime::NotifyStartupCompleted() {
3217 bool expected = false;
3218 if (!startup_completed_.compare_exchange_strong(expected, true, std::memory_order_seq_cst)) {
3219 // Right now NotifyStartupCompleted will be called up to twice, once from profiler and up to
3220 // once externally. For this reason there are no asserts.
3221 return;
3222 }
Mathieu Chartier175ce3d2019-03-06 16:54:24 -08003223
Calin Juravlec2753e62021-06-25 15:34:09 -07003224 VLOG(startup) << app_info_;
3225
Mathieu Chartierad390fa2019-10-16 20:03:00 -07003226 VLOG(startup) << "Adding NotifyStartupCompleted task";
3227 // Use the heap task processor since we want to be exclusive with the GC and we don't want to
3228 // block the caller if the GC is running.
3229 if (!GetHeap()->AddHeapTask(new NotifyStartupCompletedTask)) {
3230 VLOG(startup) << "Failed to add NotifyStartupCompletedTask";
Mathieu Chartier6e7a72c2019-03-07 21:40:10 -08003231 }
3232
Mathieu Chartier175ce3d2019-03-06 16:54:24 -08003233 // Notify the profiler saver that startup is now completed.
3234 ProfileSaver::NotifyStartupCompleted();
Eric Holkb6dda5a2021-02-04 01:09:58 +00003235
3236 if (metrics_reporter_ != nullptr) {
3237 metrics_reporter_->NotifyStartupCompleted();
3238 }
Mathieu Chartier175ce3d2019-03-06 16:54:24 -08003239}
3240
Calin Juravlec2753e62021-06-25 15:34:09 -07003241void Runtime::NotifyDexFileLoaded() {
3242 if (metrics_reporter_ != nullptr) {
3243 metrics_reporter_->NotifyAppInfoUpdated(&app_info_);
3244 }
3245}
3246
Mathieu Chartier175ce3d2019-03-06 16:54:24 -08003247bool Runtime::GetStartupCompleted() const {
3248 return startup_completed_.load(std::memory_order_seq_cst);
3249}
3250
randy.jeong5bef0222019-05-27 10:29:09 +09003251void Runtime::SetSignalHookDebuggable(bool value) {
3252 SkipAddSignalHandler(value);
3253}
3254
Alex Lightf3677472019-06-26 16:31:53 -07003255void Runtime::SetJniIdType(JniIdType t) {
3256 CHECK(CanSetJniIdType()) << "Not allowed to change id type!";
3257 if (t == GetJniIdType()) {
3258 return;
3259 }
3260 jni_ids_indirection_ = t;
3261 JNIEnvExt::ResetFunctionTable();
3262 WellKnownClasses::HandleJniIdTypeChange(Thread::Current()->GetJniEnv());
3263}
3264
Mathieu Chartierccc75192019-10-28 13:34:03 -07003265bool Runtime::GetOatFilesExecutable() const {
3266 return !IsAotCompiler() && !(IsSystemServer() && jit_options_->GetSaveProfilingInfo());
3267}
3268
Nicolas Geoffraye3f775b2019-12-04 14:41:52 +00003269void Runtime::ProcessWeakClass(GcRoot<mirror::Class>* root_ptr,
3270 IsMarkedVisitor* visitor,
3271 mirror::Class* update) {
3272 // This does not need a read barrier because this is called by GC.
3273 mirror::Class* cls = root_ptr->Read<kWithoutReadBarrier>();
3274 if (cls != nullptr && cls != GetWeakClassSentinel()) {
3275 DCHECK((cls->IsClass<kDefaultVerifyFlags>()));
3276 // Look at the classloader of the class to know if it has been unloaded.
3277 // This does not need a read barrier because this is called by GC.
3278 ObjPtr<mirror::Object> class_loader =
3279 cls->GetClassLoader<kDefaultVerifyFlags, kWithoutReadBarrier>();
3280 if (class_loader == nullptr || visitor->IsMarked(class_loader.Ptr()) != nullptr) {
3281 // The class loader is live, update the entry if the class has moved.
3282 mirror::Class* new_cls = down_cast<mirror::Class*>(visitor->IsMarked(cls));
3283 // Note that new_object can be null for CMS and newly allocated objects.
3284 if (new_cls != nullptr && new_cls != cls) {
3285 *root_ptr = GcRoot<mirror::Class>(new_cls);
3286 }
3287 } else {
3288 // The class loader is not live, clear the entry.
3289 *root_ptr = GcRoot<mirror::Class>(update);
3290 }
3291 }
3292}
3293
Jagadeesh Pakaravoor06541532021-02-22 21:19:09 -08003294void Runtime::MadviseFileForRange(size_t madvise_size_limit_bytes,
3295 size_t map_size_bytes,
3296 const uint8_t* map_begin,
3297 const uint8_t* map_end,
3298 const std::string& file_name) {
3299 // Ideal blockTransferSize for madvising files (128KiB)
3300 static constexpr size_t kIdealIoTransferSizeBytes = 128*1024;
3301
3302 size_t target_size_bytes = std::min<size_t>(map_size_bytes, madvise_size_limit_bytes);
3303
3304 if (target_size_bytes > 0) {
3305 ScopedTrace madvising_trace("madvising "
3306 + file_name
3307 + " size="
3308 + std::to_string(target_size_bytes));
3309
3310 // Based on requested size (target_size_bytes)
3311 const uint8_t* target_pos = map_begin + target_size_bytes;
3312
3313 // Clamp endOfFile if its past map_end
Jagadeesh Pakaravoor0461e332021-03-15 17:07:57 -07003314 if (target_pos > map_end) {
Jagadeesh Pakaravoor06541532021-02-22 21:19:09 -08003315 target_pos = map_end;
3316 }
3317
3318 // Madvise the whole file up to target_pos in chunks of
3319 // kIdealIoTransferSizeBytes (to MADV_WILLNEED)
3320 // Note:
3321 // madvise(MADV_WILLNEED) will prefetch max(fd readahead size, optimal
3322 // block size for device) per call, hence the need for chunks. (128KB is a
3323 // good default.)
3324 for (const uint8_t* madvise_start = map_begin;
3325 madvise_start < target_pos;
3326 madvise_start += kIdealIoTransferSizeBytes) {
3327 void* madvise_addr = const_cast<void*>(reinterpret_cast<const void*>(madvise_start));
3328 size_t madvise_length = std::min(kIdealIoTransferSizeBytes,
3329 static_cast<size_t>(target_pos - madvise_start));
3330 int status = madvise(madvise_addr, madvise_length, MADV_WILLNEED);
3331 // In case of error we stop madvising rest of the file
3332 if (status < 0) {
3333 LOG(ERROR) << "Failed to madvise file:" << file_name << " for size:" << map_size_bytes;
3334 break;
3335 }
3336 }
3337 }
3338}
3339
Carl Shapiro1fb86202011-06-27 17:43:13 -07003340} // namespace art