1 /* 2 * Copyright (C) 2011 The Android Open Source Project 3 * 4 * Licensed under the Apache License, Version 2.0 (the "License"); 5 * you may not use this file except in compliance with the License. 6 * You may obtain a copy of the License at 7 * 8 * http://www.apache.org/licenses/LICENSE-2.0 9 * 10 * Unless required by applicable law or agreed to in writing, software 11 * distributed under the License is distributed on an "AS IS" BASIS, 12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 * See the License for the specific language governing permissions and 14 * limitations under the License. 15 */ 16 17 #include "image_space.h" 18 19 #include <dirent.h> 20 #include <sys/statvfs.h> 21 #include <sys/types.h> 22 23 #include <random> 24 25 #include "base/stl_util.h" 26 #include "base/unix_file/fd_file.h" 27 #include "base/scoped_flock.h" 28 #include "gc/accounting/space_bitmap-inl.h" 29 #include "mirror/art_method.h" 30 #include "mirror/class-inl.h" 31 #include "mirror/object-inl.h" 32 #include "oat_file.h" 33 #include "os.h" 34 #include "space-inl.h" 35 #include "utils.h" 36 37 namespace art { 38 namespace gc { 39 namespace space { 40 41 Atomic<uint32_t> ImageSpace::bitmap_index_(0); 42 43 ImageSpace::ImageSpace(const std::string& image_filename, const char* image_location, 44 MemMap* mem_map, accounting::ContinuousSpaceBitmap* live_bitmap) 45 : MemMapSpace(image_filename, mem_map, mem_map->Begin(), mem_map->End(), mem_map->End(), 46 kGcRetentionPolicyNeverCollect), 47 image_location_(image_location) { 48 DCHECK(live_bitmap != nullptr); 49 live_bitmap_.reset(live_bitmap); 50 } 51 52 static int32_t ChooseRelocationOffsetDelta(int32_t min_delta, int32_t max_delta) { 53 CHECK_ALIGNED(min_delta, kPageSize); 54 CHECK_ALIGNED(max_delta, kPageSize); 55 CHECK_LT(min_delta, max_delta); 56 57 std::default_random_engine generator; 58 generator.seed(NanoTime() * getpid()); 59 std::uniform_int_distribution<int32_t> distribution(min_delta, max_delta); 60 int32_t r = distribution(generator); 61 if (r % 2 == 0) { 62 r = RoundUp(r, kPageSize); 63 } else { 64 r = RoundDown(r, kPageSize); 65 } 66 CHECK_LE(min_delta, r); 67 CHECK_GE(max_delta, r); 68 CHECK_ALIGNED(r, kPageSize); 69 return r; 70 } 71 72 // We are relocating or generating the core image. We should get rid of everything. It is all 73 // out-of-date. We also don't really care if this fails since it is just a convenience. 74 // Adapted from prune_dex_cache(const char* subdir) in frameworks/native/cmds/installd/commands.c 75 // Note this should only be used during first boot. 76 static void RealPruneDalvikCache(const std::string& cache_dir_path); 77 78 static void PruneDalvikCache(InstructionSet isa) { 79 CHECK_NE(isa, kNone); 80 // Prune the base /data/dalvik-cache. 81 RealPruneDalvikCache(GetDalvikCacheOrDie(".", false)); 82 // Prune /data/dalvik-cache/<isa>. 83 RealPruneDalvikCache(GetDalvikCacheOrDie(GetInstructionSetString(isa), false)); 84 } 85 86 static void RealPruneDalvikCache(const std::string& cache_dir_path) { 87 if (!OS::DirectoryExists(cache_dir_path.c_str())) { 88 return; 89 } 90 DIR* cache_dir = opendir(cache_dir_path.c_str()); 91 if (cache_dir == nullptr) { 92 PLOG(WARNING) << "Unable to open " << cache_dir_path << " to delete it's contents"; 93 return; 94 } 95 96 for (struct dirent* de = readdir(cache_dir); de != nullptr; de = readdir(cache_dir)) { 97 const char* name = de->d_name; 98 if (strcmp(name, ".") == 0 || strcmp(name, "..") == 0) { 99 continue; 100 } 101 // We only want to delete regular files and symbolic links. 102 if (de->d_type != DT_REG && de->d_type != DT_LNK) { 103 if (de->d_type != DT_DIR) { 104 // We do expect some directories (namely the <isa> for pruning the base dalvik-cache). 105 LOG(WARNING) << "Unexpected file type of " << std::hex << de->d_type << " encountered."; 106 } 107 continue; 108 } 109 std::string cache_file(cache_dir_path); 110 cache_file += '/'; 111 cache_file += name; 112 if (TEMP_FAILURE_RETRY(unlink(cache_file.c_str())) != 0) { 113 PLOG(ERROR) << "Unable to unlink " << cache_file; 114 continue; 115 } 116 } 117 CHECK_EQ(0, TEMP_FAILURE_RETRY(closedir(cache_dir))) << "Unable to close directory."; 118 } 119 120 // We write out an empty file to the zygote's ISA specific cache dir at the start of 121 // every zygote boot and delete it when the boot completes. If we find a file already 122 // present, it usually means the boot didn't complete. We wipe the entire dalvik 123 // cache if that's the case. 124 static void MarkZygoteStart(const InstructionSet isa) { 125 const std::string isa_subdir = GetDalvikCacheOrDie(GetInstructionSetString(isa), false); 126 const std::string boot_marker = isa_subdir + "/.booting"; 127 128 if (OS::FileExists(boot_marker.c_str())) { 129 LOG(WARNING) << "Incomplete boot detected. Pruning dalvik cache"; 130 RealPruneDalvikCache(isa_subdir); 131 } 132 133 VLOG(startup) << "Creating boot start marker: " << boot_marker; 134 std::unique_ptr<File> f(OS::CreateEmptyFile(boot_marker.c_str())); 135 if (f.get() != nullptr) { 136 if (f->FlushCloseOrErase() != 0) { 137 PLOG(WARNING) << "Failed to write boot marker."; 138 } 139 } 140 } 141 142 static bool GenerateImage(const std::string& image_filename, InstructionSet image_isa, 143 std::string* error_msg) { 144 const std::string boot_class_path_string(Runtime::Current()->GetBootClassPathString()); 145 std::vector<std::string> boot_class_path; 146 Split(boot_class_path_string, ':', boot_class_path); 147 if (boot_class_path.empty()) { 148 *error_msg = "Failed to generate image because no boot class path specified"; 149 return false; 150 } 151 // We should clean up so we are more likely to have room for the image. 152 if (Runtime::Current()->IsZygote()) { 153 LOG(INFO) << "Pruning dalvik-cache since we are generating an image and will need to recompile"; 154 PruneDalvikCache(image_isa); 155 } 156 157 std::vector<std::string> arg_vector; 158 159 std::string dex2oat(Runtime::Current()->GetCompilerExecutable()); 160 arg_vector.push_back(dex2oat); 161 162 std::string image_option_string("--image="); 163 image_option_string += image_filename; 164 arg_vector.push_back(image_option_string); 165 166 for (size_t i = 0; i < boot_class_path.size(); i++) { 167 arg_vector.push_back(std::string("--dex-file=") + boot_class_path[i]); 168 } 169 170 std::string oat_file_option_string("--oat-file="); 171 oat_file_option_string += ImageHeader::GetOatLocationFromImageLocation(image_filename); 172 arg_vector.push_back(oat_file_option_string); 173 174 Runtime::Current()->AddCurrentRuntimeFeaturesAsDex2OatArguments(&arg_vector); 175 CHECK_EQ(image_isa, kRuntimeISA) 176 << "We should always be generating an image for the current isa."; 177 178 int32_t base_offset = ChooseRelocationOffsetDelta(ART_BASE_ADDRESS_MIN_DELTA, 179 ART_BASE_ADDRESS_MAX_DELTA); 180 LOG(INFO) << "Using an offset of 0x" << std::hex << base_offset << " from default " 181 << "art base address of 0x" << std::hex << ART_BASE_ADDRESS; 182 arg_vector.push_back(StringPrintf("--base=0x%x", ART_BASE_ADDRESS + base_offset)); 183 184 if (!kIsTargetBuild) { 185 arg_vector.push_back("--host"); 186 } 187 188 const std::vector<std::string>& compiler_options = Runtime::Current()->GetImageCompilerOptions(); 189 for (size_t i = 0; i < compiler_options.size(); ++i) { 190 arg_vector.push_back(compiler_options[i].c_str()); 191 } 192 193 std::string command_line(Join(arg_vector, ' ')); 194 LOG(INFO) << "GenerateImage: " << command_line; 195 return Exec(arg_vector, error_msg); 196 } 197 198 bool ImageSpace::FindImageFilename(const char* image_location, 199 const InstructionSet image_isa, 200 std::string* system_filename, 201 bool* has_system, 202 std::string* cache_filename, 203 bool* dalvik_cache_exists, 204 bool* has_cache, 205 bool* is_global_cache) { 206 *has_system = false; 207 *has_cache = false; 208 // image_location = /system/framework/boot.art 209 // system_image_location = /system/framework/<image_isa>/boot.art 210 std::string system_image_filename(GetSystemImageFilename(image_location, image_isa)); 211 if (OS::FileExists(system_image_filename.c_str())) { 212 *system_filename = system_image_filename; 213 *has_system = true; 214 } 215 216 bool have_android_data = false; 217 *dalvik_cache_exists = false; 218 std::string dalvik_cache; 219 GetDalvikCache(GetInstructionSetString(image_isa), true, &dalvik_cache, 220 &have_android_data, dalvik_cache_exists, is_global_cache); 221 222 if (have_android_data && *dalvik_cache_exists) { 223 // Always set output location even if it does not exist, 224 // so that the caller knows where to create the image. 225 // 226 // image_location = /system/framework/boot.art 227 // *image_filename = /data/dalvik-cache/<image_isa>/boot.art 228 std::string error_msg; 229 if (!GetDalvikCacheFilename(image_location, dalvik_cache.c_str(), cache_filename, &error_msg)) { 230 LOG(WARNING) << error_msg; 231 return *has_system; 232 } 233 *has_cache = OS::FileExists(cache_filename->c_str()); 234 } 235 return *has_system || *has_cache; 236 } 237 238 static bool ReadSpecificImageHeader(const char* filename, ImageHeader* image_header) { 239 std::unique_ptr<File> image_file(OS::OpenFileForReading(filename)); 240 if (image_file.get() == nullptr) { 241 return false; 242 } 243 const bool success = image_file->ReadFully(image_header, sizeof(ImageHeader)); 244 if (!success || !image_header->IsValid()) { 245 return false; 246 } 247 return true; 248 } 249 250 // Relocate the image at image_location to dest_filename and relocate it by a random amount. 251 static bool RelocateImage(const char* image_location, const char* dest_filename, 252 InstructionSet isa, std::string* error_msg) { 253 // We should clean up so we are more likely to have room for the image. 254 if (Runtime::Current()->IsZygote()) { 255 LOG(INFO) << "Pruning dalvik-cache since we are relocating an image and will need to recompile"; 256 PruneDalvikCache(isa); 257 } 258 259 std::string patchoat(Runtime::Current()->GetPatchoatExecutable()); 260 261 std::string input_image_location_arg("--input-image-location="); 262 input_image_location_arg += image_location; 263 264 std::string output_image_filename_arg("--output-image-file="); 265 output_image_filename_arg += dest_filename; 266 267 std::string input_oat_location_arg("--input-oat-location="); 268 input_oat_location_arg += ImageHeader::GetOatLocationFromImageLocation(image_location); 269 270 std::string output_oat_filename_arg("--output-oat-file="); 271 output_oat_filename_arg += ImageHeader::GetOatLocationFromImageLocation(dest_filename); 272 273 std::string instruction_set_arg("--instruction-set="); 274 instruction_set_arg += GetInstructionSetString(isa); 275 276 std::string base_offset_arg("--base-offset-delta="); 277 StringAppendF(&base_offset_arg, "%d", ChooseRelocationOffsetDelta(ART_BASE_ADDRESS_MIN_DELTA, 278 ART_BASE_ADDRESS_MAX_DELTA)); 279 280 std::vector<std::string> argv; 281 argv.push_back(patchoat); 282 283 argv.push_back(input_image_location_arg); 284 argv.push_back(output_image_filename_arg); 285 286 argv.push_back(input_oat_location_arg); 287 argv.push_back(output_oat_filename_arg); 288 289 argv.push_back(instruction_set_arg); 290 argv.push_back(base_offset_arg); 291 292 std::string command_line(Join(argv, ' ')); 293 LOG(INFO) << "RelocateImage: " << command_line; 294 return Exec(argv, error_msg); 295 } 296 297 static ImageHeader* ReadSpecificImageHeader(const char* filename, std::string* error_msg) { 298 std::unique_ptr<ImageHeader> hdr(new ImageHeader); 299 if (!ReadSpecificImageHeader(filename, hdr.get())) { 300 *error_msg = StringPrintf("Unable to read image header for %s", filename); 301 return nullptr; 302 } 303 return hdr.release(); 304 } 305 306 ImageHeader* ImageSpace::ReadImageHeaderOrDie(const char* image_location, 307 const InstructionSet image_isa) { 308 std::string error_msg; 309 ImageHeader* image_header = ReadImageHeader(image_location, image_isa, &error_msg); 310 if (image_header == nullptr) { 311 LOG(FATAL) << error_msg; 312 } 313 return image_header; 314 } 315 316 ImageHeader* ImageSpace::ReadImageHeader(const char* image_location, 317 const InstructionSet image_isa, 318 std::string* error_msg) { 319 std::string system_filename; 320 bool has_system = false; 321 std::string cache_filename; 322 bool has_cache = false; 323 bool dalvik_cache_exists = false; 324 bool is_global_cache = false; 325 if (FindImageFilename(image_location, image_isa, &system_filename, &has_system, 326 &cache_filename, &dalvik_cache_exists, &has_cache, &is_global_cache)) { 327 if (Runtime::Current()->ShouldRelocate()) { 328 if (has_system && has_cache) { 329 std::unique_ptr<ImageHeader> sys_hdr(new ImageHeader); 330 std::unique_ptr<ImageHeader> cache_hdr(new ImageHeader); 331 if (!ReadSpecificImageHeader(system_filename.c_str(), sys_hdr.get())) { 332 *error_msg = StringPrintf("Unable to read image header for %s at %s", 333 image_location, system_filename.c_str()); 334 return nullptr; 335 } 336 if (!ReadSpecificImageHeader(cache_filename.c_str(), cache_hdr.get())) { 337 *error_msg = StringPrintf("Unable to read image header for %s at %s", 338 image_location, cache_filename.c_str()); 339 return nullptr; 340 } 341 if (sys_hdr->GetOatChecksum() != cache_hdr->GetOatChecksum()) { 342 *error_msg = StringPrintf("Unable to find a relocated version of image file %s", 343 image_location); 344 return nullptr; 345 } 346 return cache_hdr.release(); 347 } else if (!has_cache) { 348 *error_msg = StringPrintf("Unable to find a relocated version of image file %s", 349 image_location); 350 return nullptr; 351 } else if (!has_system && has_cache) { 352 // This can probably just use the cache one. 353 return ReadSpecificImageHeader(cache_filename.c_str(), error_msg); 354 } 355 } else { 356 // We don't want to relocate, Just pick the appropriate one if we have it and return. 357 if (has_system && has_cache) { 358 // We want the cache if the checksum matches, otherwise the system. 359 std::unique_ptr<ImageHeader> system(ReadSpecificImageHeader(system_filename.c_str(), 360 error_msg)); 361 std::unique_ptr<ImageHeader> cache(ReadSpecificImageHeader(cache_filename.c_str(), 362 error_msg)); 363 if (system.get() == nullptr || 364 (cache.get() != nullptr && cache->GetOatChecksum() == system->GetOatChecksum())) { 365 return cache.release(); 366 } else { 367 return system.release(); 368 } 369 } else if (has_system) { 370 return ReadSpecificImageHeader(system_filename.c_str(), error_msg); 371 } else if (has_cache) { 372 return ReadSpecificImageHeader(cache_filename.c_str(), error_msg); 373 } 374 } 375 } 376 377 *error_msg = StringPrintf("Unable to find image file for %s", image_location); 378 return nullptr; 379 } 380 381 static bool ChecksumsMatch(const char* image_a, const char* image_b) { 382 ImageHeader hdr_a; 383 ImageHeader hdr_b; 384 return ReadSpecificImageHeader(image_a, &hdr_a) && ReadSpecificImageHeader(image_b, &hdr_b) 385 && hdr_a.GetOatChecksum() == hdr_b.GetOatChecksum(); 386 } 387 388 static bool ImageCreationAllowed(bool is_global_cache, std::string* error_msg) { 389 // Anyone can write into a "local" cache. 390 if (!is_global_cache) { 391 return true; 392 } 393 394 // Only the zygote is allowed to create the global boot image. 395 if (Runtime::Current()->IsZygote()) { 396 return true; 397 } 398 399 *error_msg = "Only the zygote can create the global boot image."; 400 return false; 401 } 402 403 static constexpr uint64_t kLowSpaceValue = 50 * MB; 404 static constexpr uint64_t kTmpFsSentinelValue = 384 * MB; 405 406 // Read the free space of the cache partition and make a decision whether to keep the generated 407 // image. This is to try to mitigate situations where the system might run out of space later. 408 static bool CheckSpace(const std::string& cache_filename, std::string* error_msg) { 409 // Using statvfs vs statvfs64 because of b/18207376, and it is enough for all practical purposes. 410 struct statvfs buf; 411 412 int res = TEMP_FAILURE_RETRY(statvfs(cache_filename.c_str(), &buf)); 413 if (res != 0) { 414 // Could not stat. Conservatively tell the system to delete the image. 415 *error_msg = "Could not stat the filesystem, assuming low-memory situation."; 416 return false; 417 } 418 419 uint64_t fs_overall_size = buf.f_bsize * static_cast<uint64_t>(buf.f_blocks); 420 // Zygote is privileged, but other things are not. Use bavail. 421 uint64_t fs_free_size = buf.f_bsize * static_cast<uint64_t>(buf.f_bavail); 422 423 // Take the overall size as an indicator for a tmpfs, which is being used for the decryption 424 // environment. We do not want to fail quickening the boot image there, as it is beneficial 425 // for time-to-UI. 426 if (fs_overall_size > kTmpFsSentinelValue) { 427 if (fs_free_size < kLowSpaceValue) { 428 *error_msg = StringPrintf("Low-memory situation: only %4.2f megabytes available after image" 429 " generation, need at least %" PRIu64 ".", 430 static_cast<double>(fs_free_size) / MB, 431 kLowSpaceValue / MB); 432 return false; 433 } 434 } 435 return true; 436 } 437 438 ImageSpace* ImageSpace::Create(const char* image_location, 439 const InstructionSet image_isa, 440 std::string* error_msg) { 441 std::string system_filename; 442 bool has_system = false; 443 std::string cache_filename; 444 bool has_cache = false; 445 bool dalvik_cache_exists = false; 446 bool is_global_cache = true; 447 const bool found_image = FindImageFilename(image_location, image_isa, &system_filename, 448 &has_system, &cache_filename, &dalvik_cache_exists, 449 &has_cache, &is_global_cache); 450 451 if (Runtime::Current()->IsZygote()) { 452 MarkZygoteStart(image_isa); 453 } 454 455 ImageSpace* space; 456 bool relocate = Runtime::Current()->ShouldRelocate(); 457 bool can_compile = Runtime::Current()->IsImageDex2OatEnabled(); 458 if (found_image) { 459 const std::string* image_filename; 460 bool is_system = false; 461 bool relocated_version_used = false; 462 if (relocate) { 463 if (!dalvik_cache_exists) { 464 *error_msg = StringPrintf("Requiring relocation for image '%s' at '%s' but we do not have " 465 "any dalvik_cache to find/place it in.", 466 image_location, system_filename.c_str()); 467 return nullptr; 468 } 469 if (has_system) { 470 if (has_cache && ChecksumsMatch(system_filename.c_str(), cache_filename.c_str())) { 471 // We already have a relocated version 472 image_filename = &cache_filename; 473 relocated_version_used = true; 474 } else { 475 // We cannot have a relocated version, Relocate the system one and use it. 476 477 std::string reason; 478 bool success; 479 480 // Check whether we are allowed to relocate. 481 if (!can_compile) { 482 reason = "Image dex2oat disabled by -Xnoimage-dex2oat."; 483 success = false; 484 } else if (!ImageCreationAllowed(is_global_cache, &reason)) { 485 // Whether we can write to the cache. 486 success = false; 487 } else { 488 // Try to relocate. 489 success = RelocateImage(image_location, cache_filename.c_str(), image_isa, &reason); 490 } 491 492 if (success) { 493 relocated_version_used = true; 494 image_filename = &cache_filename; 495 } else { 496 *error_msg = StringPrintf("Unable to relocate image '%s' from '%s' to '%s': %s", 497 image_location, system_filename.c_str(), 498 cache_filename.c_str(), reason.c_str()); 499 // We failed to create files, remove any possibly garbage output. 500 // Since ImageCreationAllowed was true above, we are the zygote 501 // and therefore the only process expected to generate these for 502 // the device. 503 PruneDalvikCache(image_isa); 504 return nullptr; 505 } 506 } 507 } else { 508 CHECK(has_cache); 509 // We can just use cache's since it should be fine. This might or might not be relocated. 510 image_filename = &cache_filename; 511 } 512 } else { 513 if (has_system && has_cache) { 514 // Check they have the same cksum. If they do use the cache. Otherwise system. 515 if (ChecksumsMatch(system_filename.c_str(), cache_filename.c_str())) { 516 image_filename = &cache_filename; 517 relocated_version_used = true; 518 } else { 519 image_filename = &system_filename; 520 is_system = true; 521 } 522 } else if (has_system) { 523 image_filename = &system_filename; 524 is_system = true; 525 } else { 526 CHECK(has_cache); 527 image_filename = &cache_filename; 528 } 529 } 530 { 531 // Note that we must not use the file descriptor associated with 532 // ScopedFlock::GetFile to Init the image file. We want the file 533 // descriptor (and the associated exclusive lock) to be released when 534 // we leave Create. 535 ScopedFlock image_lock; 536 image_lock.Init(image_filename->c_str(), error_msg); 537 VLOG(startup) << "Using image file " << image_filename->c_str() << " for image location " 538 << image_location; 539 // If we are in /system we can assume the image is good. We can also 540 // assume this if we are using a relocated image (i.e. image checksum 541 // matches) since this is only different by the offset. We need this to 542 // make sure that host tests continue to work. 543 space = ImageSpace::Init(image_filename->c_str(), image_location, 544 !(is_system || relocated_version_used), error_msg); 545 } 546 if (space != nullptr) { 547 return space; 548 } 549 550 if (relocated_version_used) { 551 // Something is wrong with the relocated copy (even though checksums match). Cleanup. 552 // This can happen if the .oat is corrupt, since the above only checks the .art checksums. 553 // TODO: Check the oat file validity earlier. 554 *error_msg = StringPrintf("Attempted to use relocated version of %s at %s generated from %s " 555 "but image failed to load: %s", 556 image_location, cache_filename.c_str(), system_filename.c_str(), 557 error_msg->c_str()); 558 PruneDalvikCache(image_isa); 559 return nullptr; 560 } else if (is_system) { 561 // If the /system file exists, it should be up-to-date, don't try to generate it. 562 *error_msg = StringPrintf("Failed to load /system image '%s': %s", 563 image_filename->c_str(), error_msg->c_str()); 564 return nullptr; 565 } else { 566 // Otherwise, log a warning and fall through to GenerateImage. 567 LOG(WARNING) << *error_msg; 568 } 569 } 570 571 if (!can_compile) { 572 *error_msg = "Not attempting to compile image because -Xnoimage-dex2oat"; 573 return nullptr; 574 } else if (!dalvik_cache_exists) { 575 *error_msg = StringPrintf("No place to put generated image."); 576 return nullptr; 577 } else if (!ImageCreationAllowed(is_global_cache, error_msg)) { 578 return nullptr; 579 } else if (!GenerateImage(cache_filename, image_isa, error_msg)) { 580 *error_msg = StringPrintf("Failed to generate image '%s': %s", 581 cache_filename.c_str(), error_msg->c_str()); 582 // We failed to create files, remove any possibly garbage output. 583 // Since ImageCreationAllowed was true above, we are the zygote 584 // and therefore the only process expected to generate these for 585 // the device. 586 PruneDalvikCache(image_isa); 587 return nullptr; 588 } else { 589 // Check whether there is enough space left over after we have generated the image. 590 if (!CheckSpace(cache_filename, error_msg)) { 591 // No. Delete the generated image and try to run out of the dex files. 592 PruneDalvikCache(image_isa); 593 return nullptr; 594 } 595 596 // Note that we must not use the file descriptor associated with 597 // ScopedFlock::GetFile to Init the image file. We want the file 598 // descriptor (and the associated exclusive lock) to be released when 599 // we leave Create. 600 ScopedFlock image_lock; 601 image_lock.Init(cache_filename.c_str(), error_msg); 602 space = ImageSpace::Init(cache_filename.c_str(), image_location, true, error_msg); 603 if (space == nullptr) { 604 *error_msg = StringPrintf("Failed to load generated image '%s': %s", 605 cache_filename.c_str(), error_msg->c_str()); 606 } 607 return space; 608 } 609 } 610 611 void ImageSpace::VerifyImageAllocations() { 612 byte* current = Begin() + RoundUp(sizeof(ImageHeader), kObjectAlignment); 613 while (current < End()) { 614 DCHECK_ALIGNED(current, kObjectAlignment); 615 mirror::Object* obj = reinterpret_cast<mirror::Object*>(current); 616 CHECK(live_bitmap_->Test(obj)); 617 CHECK(obj->GetClass() != nullptr) << "Image object at address " << obj << " has null class"; 618 if (kUseBakerOrBrooksReadBarrier) { 619 obj->AssertReadBarrierPointer(); 620 } 621 current += RoundUp(obj->SizeOf(), kObjectAlignment); 622 } 623 } 624 625 ImageSpace* ImageSpace::Init(const char* image_filename, const char* image_location, 626 bool validate_oat_file, std::string* error_msg) { 627 CHECK(image_filename != nullptr); 628 CHECK(image_location != nullptr); 629 630 uint64_t start_time = 0; 631 if (VLOG_IS_ON(heap) || VLOG_IS_ON(startup)) { 632 start_time = NanoTime(); 633 LOG(INFO) << "ImageSpace::Init entering image_filename=" << image_filename; 634 } 635 636 std::unique_ptr<File> file(OS::OpenFileForReading(image_filename)); 637 if (file.get() == NULL) { 638 *error_msg = StringPrintf("Failed to open '%s'", image_filename); 639 return nullptr; 640 } 641 ImageHeader image_header; 642 bool success = file->ReadFully(&image_header, sizeof(image_header)); 643 if (!success || !image_header.IsValid()) { 644 *error_msg = StringPrintf("Invalid image header in '%s'", image_filename); 645 return nullptr; 646 } 647 648 // Note: The image header is part of the image due to mmap page alignment required of offset. 649 std::unique_ptr<MemMap> map(MemMap::MapFileAtAddress(image_header.GetImageBegin(), 650 image_header.GetImageSize(), 651 PROT_READ | PROT_WRITE, 652 MAP_PRIVATE, 653 file->Fd(), 654 0, 655 false, 656 image_filename, 657 error_msg)); 658 if (map.get() == NULL) { 659 DCHECK(!error_msg->empty()); 660 return nullptr; 661 } 662 CHECK_EQ(image_header.GetImageBegin(), map->Begin()); 663 DCHECK_EQ(0, memcmp(&image_header, map->Begin(), sizeof(ImageHeader))); 664 665 std::unique_ptr<MemMap> image_map( 666 MemMap::MapFileAtAddress(nullptr, image_header.GetImageBitmapSize(), 667 PROT_READ, MAP_PRIVATE, 668 file->Fd(), image_header.GetBitmapOffset(), 669 false, 670 image_filename, 671 error_msg)); 672 if (image_map.get() == nullptr) { 673 *error_msg = StringPrintf("Failed to map image bitmap: %s", error_msg->c_str()); 674 return nullptr; 675 } 676 uint32_t bitmap_index = bitmap_index_.FetchAndAddSequentiallyConsistent(1); 677 std::string bitmap_name(StringPrintf("imagespace %s live-bitmap %u", image_filename, 678 bitmap_index)); 679 std::unique_ptr<accounting::ContinuousSpaceBitmap> bitmap( 680 accounting::ContinuousSpaceBitmap::CreateFromMemMap(bitmap_name, image_map.release(), 681 reinterpret_cast<byte*>(map->Begin()), 682 map->Size())); 683 if (bitmap.get() == nullptr) { 684 *error_msg = StringPrintf("Could not create bitmap '%s'", bitmap_name.c_str()); 685 return nullptr; 686 } 687 688 std::unique_ptr<ImageSpace> space(new ImageSpace(image_filename, image_location, 689 map.release(), bitmap.release())); 690 691 // VerifyImageAllocations() will be called later in Runtime::Init() 692 // as some class roots like ArtMethod::java_lang_reflect_ArtMethod_ 693 // and ArtField::java_lang_reflect_ArtField_, which are used from 694 // Object::SizeOf() which VerifyImageAllocations() calls, are not 695 // set yet at this point. 696 697 space->oat_file_.reset(space->OpenOatFile(image_filename, error_msg)); 698 if (space->oat_file_.get() == nullptr) { 699 DCHECK(!error_msg->empty()); 700 return nullptr; 701 } 702 703 if (validate_oat_file && !space->ValidateOatFile(error_msg)) { 704 DCHECK(!error_msg->empty()); 705 return nullptr; 706 } 707 708 Runtime* runtime = Runtime::Current(); 709 runtime->SetInstructionSet(space->oat_file_->GetOatHeader().GetInstructionSet()); 710 711 mirror::Object* resolution_method = image_header.GetImageRoot(ImageHeader::kResolutionMethod); 712 runtime->SetResolutionMethod(down_cast<mirror::ArtMethod*>(resolution_method)); 713 mirror::Object* imt_conflict_method = image_header.GetImageRoot(ImageHeader::kImtConflictMethod); 714 runtime->SetImtConflictMethod(down_cast<mirror::ArtMethod*>(imt_conflict_method)); 715 mirror::Object* imt_unimplemented_method = 716 image_header.GetImageRoot(ImageHeader::kImtUnimplementedMethod); 717 runtime->SetImtUnimplementedMethod(down_cast<mirror::ArtMethod*>(imt_unimplemented_method)); 718 mirror::Object* default_imt = image_header.GetImageRoot(ImageHeader::kDefaultImt); 719 runtime->SetDefaultImt(down_cast<mirror::ObjectArray<mirror::ArtMethod>*>(default_imt)); 720 721 mirror::Object* callee_save_method = image_header.GetImageRoot(ImageHeader::kCalleeSaveMethod); 722 runtime->SetCalleeSaveMethod(down_cast<mirror::ArtMethod*>(callee_save_method), 723 Runtime::kSaveAll); 724 callee_save_method = image_header.GetImageRoot(ImageHeader::kRefsOnlySaveMethod); 725 runtime->SetCalleeSaveMethod(down_cast<mirror::ArtMethod*>(callee_save_method), 726 Runtime::kRefsOnly); 727 callee_save_method = image_header.GetImageRoot(ImageHeader::kRefsAndArgsSaveMethod); 728 runtime->SetCalleeSaveMethod(down_cast<mirror::ArtMethod*>(callee_save_method), 729 Runtime::kRefsAndArgs); 730 731 if (VLOG_IS_ON(heap) || VLOG_IS_ON(startup)) { 732 LOG(INFO) << "ImageSpace::Init exiting (" << PrettyDuration(NanoTime() - start_time) 733 << ") " << *space.get(); 734 } 735 return space.release(); 736 } 737 738 OatFile* ImageSpace::OpenOatFile(const char* image_path, std::string* error_msg) const { 739 const ImageHeader& image_header = GetImageHeader(); 740 std::string oat_filename = ImageHeader::GetOatLocationFromImageLocation(image_path); 741 742 CHECK(image_header.GetOatDataBegin() != nullptr); 743 744 OatFile* oat_file = OatFile::Open(oat_filename, oat_filename, image_header.GetOatDataBegin(), 745 image_header.GetOatFileBegin(), 746 !Runtime::Current()->IsCompiler(), error_msg); 747 if (oat_file == NULL) { 748 *error_msg = StringPrintf("Failed to open oat file '%s' referenced from image %s: %s", 749 oat_filename.c_str(), GetName(), error_msg->c_str()); 750 return nullptr; 751 } 752 uint32_t oat_checksum = oat_file->GetOatHeader().GetChecksum(); 753 uint32_t image_oat_checksum = image_header.GetOatChecksum(); 754 if (oat_checksum != image_oat_checksum) { 755 *error_msg = StringPrintf("Failed to match oat file checksum 0x%x to expected oat checksum 0x%x" 756 " in image %s", oat_checksum, image_oat_checksum, GetName()); 757 return nullptr; 758 } 759 int32_t image_patch_delta = image_header.GetPatchDelta(); 760 int32_t oat_patch_delta = oat_file->GetOatHeader().GetImagePatchDelta(); 761 if (oat_patch_delta != image_patch_delta && !image_header.CompilePic()) { 762 // We should have already relocated by this point. Bail out. 763 *error_msg = StringPrintf("Failed to match oat file patch delta %d to expected patch delta %d " 764 "in image %s", oat_patch_delta, image_patch_delta, GetName()); 765 return nullptr; 766 } 767 768 return oat_file; 769 } 770 771 bool ImageSpace::ValidateOatFile(std::string* error_msg) const { 772 CHECK(oat_file_.get() != NULL); 773 for (const OatFile::OatDexFile* oat_dex_file : oat_file_->GetOatDexFiles()) { 774 const std::string& dex_file_location = oat_dex_file->GetDexFileLocation(); 775 uint32_t dex_file_location_checksum; 776 if (!DexFile::GetChecksum(dex_file_location.c_str(), &dex_file_location_checksum, error_msg)) { 777 *error_msg = StringPrintf("Failed to get checksum of dex file '%s' referenced by image %s: " 778 "%s", dex_file_location.c_str(), GetName(), error_msg->c_str()); 779 return false; 780 } 781 if (dex_file_location_checksum != oat_dex_file->GetDexFileLocationChecksum()) { 782 *error_msg = StringPrintf("ValidateOatFile found checksum mismatch between oat file '%s' and " 783 "dex file '%s' (0x%x != 0x%x)", 784 oat_file_->GetLocation().c_str(), dex_file_location.c_str(), 785 oat_dex_file->GetDexFileLocationChecksum(), 786 dex_file_location_checksum); 787 return false; 788 } 789 } 790 return true; 791 } 792 793 const OatFile* ImageSpace::GetOatFile() const { 794 return oat_file_.get(); 795 } 796 797 OatFile* ImageSpace::ReleaseOatFile() { 798 CHECK(oat_file_.get() != NULL); 799 return oat_file_.release(); 800 } 801 802 void ImageSpace::Dump(std::ostream& os) const { 803 os << GetType() 804 << " begin=" << reinterpret_cast<void*>(Begin()) 805 << ",end=" << reinterpret_cast<void*>(End()) 806 << ",size=" << PrettySize(Size()) 807 << ",name=\"" << GetName() << "\"]"; 808 } 809 810 } // namespace space 811 } // namespace gc 812 } // namespace art 813