• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 /*
2  * Copyright (C) 2015 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 #include "oat_file_manager.h"
18 
19 #include <memory>
20 #include <queue>
21 #include <vector>
22 #include <sys/stat.h>
23 
24 #include "android-base/file.h"
25 #include "android-base/stringprintf.h"
26 #include "android-base/strings.h"
27 
28 #include "art_field-inl.h"
29 #include "base/bit_vector-inl.h"
30 #include "base/file_utils.h"
31 #include "base/logging.h"  // For VLOG.
32 #include "base/mutex-inl.h"
33 #include "base/sdk_version.h"
34 #include "base/stl_util.h"
35 #include "base/systrace.h"
36 #include "class_linker.h"
37 #include "class_loader_context.h"
38 #include "dex/art_dex_file_loader.h"
39 #include "dex/dex_file-inl.h"
40 #include "dex/dex_file_loader.h"
41 #include "dex/dex_file_tracking_registrar.h"
42 #include "gc/scoped_gc_critical_section.h"
43 #include "gc/space/image_space.h"
44 #include "handle_scope-inl.h"
45 #include "jit/jit.h"
46 #include "jni/java_vm_ext.h"
47 #include "jni/jni_internal.h"
48 #include "mirror/class_loader.h"
49 #include "mirror/object-inl.h"
50 #include "oat_file.h"
51 #include "oat_file_assistant.h"
52 #include "obj_ptr-inl.h"
53 #include "runtime_image.h"
54 #include "scoped_thread_state_change-inl.h"
55 #include "thread-current-inl.h"
56 #include "thread_list.h"
57 #include "thread_pool.h"
58 #include "vdex_file.h"
59 #include "verifier/verifier_deps.h"
60 #include "well_known_classes.h"
61 
62 namespace art {
63 
64 using android::base::StringPrintf;
65 
66 // If true, we attempt to load the application image if it exists.
67 static constexpr bool kEnableAppImage = true;
68 
69 // If true, we attempt to load an app image generated by the runtime.
70 static const bool kEnableRuntimeAppImage = true;
71 
RegisterOatFile(std::unique_ptr<const OatFile> oat_file,bool in_memory)72 const OatFile* OatFileManager::RegisterOatFile(std::unique_ptr<const OatFile> oat_file,
73                                                bool in_memory) {
74   // Use class_linker vlog to match the log for dex file registration.
75   VLOG(class_linker) << "Registered oat file " << oat_file->GetLocation();
76   PaletteNotifyOatFileLoaded(oat_file->GetLocation().c_str());
77 
78   WriterMutexLock mu(Thread::Current(), *Locks::oat_file_manager_lock_);
79   CHECK(in_memory ||
80         !only_use_system_oat_files_ ||
81         LocationIsTrusted(oat_file->GetLocation(), !Runtime::Current()->DenyArtApexDataFiles()) ||
82         !oat_file->IsExecutable())
83       << "Registering a non /system oat file: " << oat_file->GetLocation() << " android-root="
84       << GetAndroidRoot();
85   DCHECK(oat_file != nullptr);
86   if (kIsDebugBuild) {
87     CHECK(oat_files_.find(oat_file) == oat_files_.end());
88     for (const std::unique_ptr<const OatFile>& existing : oat_files_) {
89       CHECK_NE(oat_file.get(), existing.get()) << oat_file->GetLocation();
90       // Check that we don't have an oat file with the same address. Copies of the same oat file
91       // should be loaded at different addresses.
92       CHECK_NE(oat_file->Begin(), existing->Begin()) << "Oat file already mapped at that location";
93     }
94   }
95   const OatFile* ret = oat_file.get();
96   oat_files_.insert(std::move(oat_file));
97   return ret;
98 }
99 
UnRegisterAndDeleteOatFile(const OatFile * oat_file)100 void OatFileManager::UnRegisterAndDeleteOatFile(const OatFile* oat_file) {
101   WriterMutexLock mu(Thread::Current(), *Locks::oat_file_manager_lock_);
102   DCHECK(oat_file != nullptr);
103   std::unique_ptr<const OatFile> compare(oat_file);
104   auto it = oat_files_.find(compare);
105   CHECK(it != oat_files_.end());
106   oat_files_.erase(it);
107   compare.release();  // NOLINT b/117926937
108 }
109 
FindOpenedOatFileFromDexLocation(const std::string & dex_base_location) const110 const OatFile* OatFileManager::FindOpenedOatFileFromDexLocation(
111     const std::string& dex_base_location) const {
112   ReaderMutexLock mu(Thread::Current(), *Locks::oat_file_manager_lock_);
113   for (const std::unique_ptr<const OatFile>& oat_file : oat_files_) {
114     const std::vector<const OatDexFile*>& oat_dex_files = oat_file->GetOatDexFiles();
115     for (const OatDexFile* oat_dex_file : oat_dex_files) {
116       if (DexFileLoader::GetBaseLocation(oat_dex_file->GetDexFileLocation()) == dex_base_location) {
117         return oat_file.get();
118       }
119     }
120   }
121   return nullptr;
122 }
123 
FindOpenedOatFileFromOatLocation(const std::string & oat_location) const124 const OatFile* OatFileManager::FindOpenedOatFileFromOatLocation(const std::string& oat_location)
125     const {
126   ReaderMutexLock mu(Thread::Current(), *Locks::oat_file_manager_lock_);
127   return FindOpenedOatFileFromOatLocationLocked(oat_location);
128 }
129 
FindOpenedOatFileFromOatLocationLocked(const std::string & oat_location) const130 const OatFile* OatFileManager::FindOpenedOatFileFromOatLocationLocked(
131     const std::string& oat_location) const {
132   for (const std::unique_ptr<const OatFile>& oat_file : oat_files_) {
133     if (oat_file->GetLocation() == oat_location) {
134       return oat_file.get();
135     }
136   }
137   return nullptr;
138 }
139 
GetBootOatFiles() const140 std::vector<const OatFile*> OatFileManager::GetBootOatFiles() const {
141   std::vector<gc::space::ImageSpace*> image_spaces =
142       Runtime::Current()->GetHeap()->GetBootImageSpaces();
143   std::vector<const OatFile*> oat_files;
144   oat_files.reserve(image_spaces.size());
145   for (gc::space::ImageSpace* image_space : image_spaces) {
146     oat_files.push_back(image_space->GetOatFile());
147   }
148   return oat_files;
149 }
150 
OatFileManager()151 OatFileManager::OatFileManager()
152     : only_use_system_oat_files_(false) {}
153 
~OatFileManager()154 OatFileManager::~OatFileManager() {
155   // Explicitly clear oat_files_ since the OatFile destructor calls back into OatFileManager for
156   // UnRegisterOatFileLocation.
157   oat_files_.clear();
158 }
159 
RegisterImageOatFiles(const std::vector<gc::space::ImageSpace * > & spaces)160 std::vector<const OatFile*> OatFileManager::RegisterImageOatFiles(
161     const std::vector<gc::space::ImageSpace*>& spaces) {
162   std::vector<const OatFile*> oat_files;
163   oat_files.reserve(spaces.size());
164   for (gc::space::ImageSpace* space : spaces) {
165     // The oat file was generated in memory if the image space has a profile.
166     bool in_memory = !space->GetProfileFiles().empty();
167     oat_files.push_back(RegisterOatFile(space->ReleaseOatFile(), in_memory));
168   }
169   return oat_files;
170 }
171 
ShouldLoadAppImage(const OatFile * source_oat_file) const172 bool OatFileManager::ShouldLoadAppImage(const OatFile* source_oat_file) const {
173   Runtime* const runtime = Runtime::Current();
174   return kEnableAppImage && (!runtime->IsJavaDebuggableAtInit() || source_oat_file->IsDebuggable());
175 }
176 
OpenDexFilesFromOat(const char * dex_location,jobject class_loader,jobjectArray dex_elements,const OatFile ** out_oat_file,std::vector<std::string> * error_msgs)177 std::vector<std::unique_ptr<const DexFile>> OatFileManager::OpenDexFilesFromOat(
178     const char* dex_location,
179     jobject class_loader,
180     jobjectArray dex_elements,
181     const OatFile** out_oat_file,
182     std::vector<std::string>* error_msgs) {
183   ScopedTrace trace(StringPrintf("%s(%s)", __FUNCTION__, dex_location));
184   CHECK(dex_location != nullptr);
185   CHECK(error_msgs != nullptr);
186 
187   // Verify we aren't holding the mutator lock, which could starve GC when
188   // hitting the disk.
189   Thread* const self = Thread::Current();
190   Locks::mutator_lock_->AssertNotHeld(self);
191   Runtime* const runtime = Runtime::Current();
192 
193   std::vector<std::unique_ptr<const DexFile>> dex_files;
194   std::unique_ptr<ClassLoaderContext> context(
195       ClassLoaderContext::CreateContextForClassLoader(class_loader, dex_elements));
196 
197   // If the class_loader is null there's not much we can do. This happens if a dex files is loaded
198   // directly with DexFile APIs instead of using class loaders.
199   if (class_loader == nullptr) {
200     LOG(WARNING) << "Opening an oat file without a class loader. "
201                  << "Are you using the deprecated DexFile APIs?";
202   } else if (context != nullptr) {
203     auto oat_file_assistant = std::make_unique<OatFileAssistant>(dex_location,
204                                                                  kRuntimeISA,
205                                                                  context.get(),
206                                                                  runtime->GetOatFilesExecutable(),
207                                                                  only_use_system_oat_files_);
208 
209     // Get the current optimization status for trace debugging.
210     // Implementation detail note: GetOptimizationStatus will select the same
211     // oat file as GetBestOatFile used below, and in doing so it already pre-populates
212     // some OatFileAssistant internal fields.
213     std::string odex_location;
214     std::string compilation_filter;
215     std::string compilation_reason;
216     std::string odex_status;
217     oat_file_assistant->GetOptimizationStatus(
218         &odex_location, &compilation_filter, &compilation_reason, &odex_status);
219 
220     ScopedTrace odex_loading(StringPrintf(
221         "location=%s status=%s filter=%s reason=%s",
222         odex_location.c_str(),
223         odex_status.c_str(),
224         compilation_filter.c_str(),
225         compilation_reason.c_str()));
226 
227     const bool has_registered_app_info = Runtime::Current()->GetAppInfo()->HasRegisteredAppInfo();
228     const AppInfo::CodeType code_type =
229         Runtime::Current()->GetAppInfo()->GetRegisteredCodeType(dex_location);
230     // We only want to madvise primary/split dex artifacts as a startup optimization. However,
231     // as the code_type for those artifacts may not be set until the initial app info registration,
232     // we conservatively madvise everything until the app info registration is complete.
233     const bool should_madvise = !has_registered_app_info ||
234                                 code_type == AppInfo::CodeType::kPrimaryApk ||
235                                 code_type == AppInfo::CodeType::kSplitApk;
236 
237     // Proceed with oat file loading.
238     std::unique_ptr<const OatFile> oat_file(oat_file_assistant->GetBestOatFile().release());
239     VLOG(oat) << "OatFileAssistant(" << dex_location << ").GetBestOatFile()="
240               << (oat_file != nullptr ? oat_file->GetLocation() : "")
241               << " (executable=" << (oat_file != nullptr ? oat_file->IsExecutable() : false) << ")";
242 
243     CHECK(oat_file == nullptr || odex_location == oat_file->GetLocation())
244         << "OatFileAssistant non-determinism in choosing best oat files. "
245         << "optimization-status-location=" << odex_location
246         << " best_oat_file-location=" << oat_file->GetLocation();
247 
248     if (oat_file != nullptr) {
249       bool compilation_enabled =
250           CompilerFilter::IsAotCompilationEnabled(oat_file->GetCompilerFilter());
251       // Load the dex files from the oat file.
252       bool added_image_space = false;
253       if (should_madvise) {
254         VLOG(oat) << "Madvising oat file: " << oat_file->GetLocation();
255         size_t madvise_size_limit = runtime->GetMadviseWillNeedSizeOdex();
256         Runtime::MadviseFileForRange(madvise_size_limit,
257                                      oat_file->Size(),
258                                      oat_file->Begin(),
259                                      oat_file->End(),
260                                      oat_file->GetLocation());
261       }
262 
263       ScopedTrace app_image_timing("AppImage:Loading");
264 
265       // We need to throw away the image space if we are debuggable but the oat-file source of the
266       // image is not otherwise we might get classes with inlined methods or other such things.
267       std::unique_ptr<gc::space::ImageSpace> image_space;
268       if (ShouldLoadAppImage(oat_file.get())) {
269         if (oat_file->IsExecutable()) {
270           // App images generated by the compiler can only be used if the oat file
271           // is executable.
272           image_space = oat_file_assistant->OpenImageSpace(oat_file.get());
273         }
274         if (kEnableRuntimeAppImage && image_space == nullptr && !compilation_enabled) {
275           std::string art_file = RuntimeImage::GetRuntimeImagePath(dex_location);
276           std::string error_msg;
277           ScopedObjectAccess soa(self);
278           image_space = gc::space::ImageSpace::CreateFromAppImage(
279               art_file.c_str(), oat_file.get(), &error_msg);
280           if (image_space == nullptr) {
281             (OS::FileExists(art_file.c_str()) ? LOG_STREAM(INFO) : VLOG_STREAM(image))
282                 << "Could not load runtime generated app image: " << error_msg;
283           }
284         }
285       }
286       if (image_space != nullptr) {
287         ScopedObjectAccess soa(self);
288         StackHandleScope<1> hs(self);
289         Handle<mirror::ClassLoader> h_loader(
290             hs.NewHandle(soa.Decode<mirror::ClassLoader>(class_loader)));
291         // Can not load app image without class loader.
292         if (h_loader != nullptr) {
293           std::string temp_error_msg;
294           // Add image space has a race condition since other threads could be reading from the
295           // spaces array.
296           {
297             ScopedThreadSuspension sts(self, ThreadState::kSuspended);
298             gc::ScopedGCCriticalSection gcs(self,
299                                             gc::kGcCauseAddRemoveAppImageSpace,
300                                             gc::kCollectorTypeAddRemoveAppImageSpace);
301             ScopedSuspendAll ssa("Add image space");
302             runtime->GetHeap()->AddSpace(image_space.get());
303           }
304           {
305             ScopedTrace image_space_timing("Adding image space");
306             gc::space::ImageSpace* space_ptr = image_space.get();
307             added_image_space = runtime->GetClassLinker()->AddImageSpaces(
308                 ArrayRef<gc::space::ImageSpace*>(&space_ptr, /*size=*/1),
309                 h_loader,
310                 context.get(),
311                 /*out*/ &dex_files,
312                 /*out*/ &temp_error_msg);
313           }
314           if (added_image_space) {
315             // Successfully added image space to heap, release the map so that it does not get
316             // freed.
317             image_space.release();  // NOLINT b/117926937
318 
319             // Register for tracking.
320             for (const auto& dex_file : dex_files) {
321               dex::tracking::RegisterDexFile(dex_file.get());
322             }
323 
324             if (!compilation_enabled) {
325               // Update the filter we are going to report to 'speed-profile'.
326               // Ideally, we would also update the compiler filter of the odex
327               // file, but at this point it's just too late.
328               compilation_filter = CompilerFilter::NameOfFilter(CompilerFilter::kSpeedProfile);
329             }
330           } else {
331             LOG(INFO) << "Failed to add image file: " << temp_error_msg;
332             dex_files.clear();
333             {
334               ScopedThreadSuspension sts(self, ThreadState::kSuspended);
335               gc::ScopedGCCriticalSection gcs(self,
336                                               gc::kGcCauseAddRemoveAppImageSpace,
337                                               gc::kCollectorTypeAddRemoveAppImageSpace);
338               ScopedSuspendAll ssa("Remove image space");
339               runtime->GetHeap()->RemoveSpace(image_space.get());
340             }
341             // Non-fatal, don't update error_msg.
342           }
343         }
344       }
345       if (!added_image_space) {
346         DCHECK(dex_files.empty());
347 
348         if (oat_file->RequiresImage()) {
349           LOG(WARNING) << "Loading "
350                        << oat_file->GetLocation()
351                        << " non-executable as it requires an image which we failed to load";
352           // file as non-executable.
353           auto nonexecutable_oat_file_assistant =
354               std::make_unique<OatFileAssistant>(dex_location,
355                                                  kRuntimeISA,
356                                                  context.get(),
357                                                  /*load_executable=*/false,
358                                                  only_use_system_oat_files_);
359           oat_file.reset(nonexecutable_oat_file_assistant->GetBestOatFile().release());
360 
361           // The file could be deleted concurrently (for example background
362           // dexopt, or secondary oat file being deleted by the app).
363           if (oat_file == nullptr) {
364             LOG(WARNING) << "Failed to reload oat file non-executable " << dex_location;
365           }
366         }
367 
368         if (oat_file != nullptr) {
369           dex_files = oat_file_assistant->LoadDexFiles(*oat_file.get(), dex_location);
370 
371           // Register for tracking.
372           for (const auto& dex_file : dex_files) {
373             dex::tracking::RegisterDexFile(dex_file.get());
374           }
375         }
376       }
377       if (dex_files.empty()) {
378         ScopedTrace failed_to_open_dex_files("FailedToOpenDexFilesFromOat");
379         error_msgs->push_back("Failed to open dex files from " + odex_location);
380       } else if (should_madvise) {
381         size_t madvise_size_limit = Runtime::Current()->GetMadviseWillNeedTotalDexSize();
382         for (const std::unique_ptr<const DexFile>& dex_file : dex_files) {
383           // Prefetch the dex file based on vdex size limit (name should
384           // have been dex size limit).
385           VLOG(oat) << "Madvising dex file: " << dex_file->GetLocation();
386           Runtime::MadviseFileForRange(madvise_size_limit,
387                                        dex_file->Size(),
388                                        dex_file->Begin(),
389                                        dex_file->Begin() + dex_file->Size(),
390                                        dex_file->GetLocation());
391           if (dex_file->Size() >= madvise_size_limit) {
392             break;
393           }
394           madvise_size_limit -= dex_file->Size();
395         }
396       }
397 
398       if (oat_file != nullptr) {
399         VLOG(class_linker) << "Registering " << oat_file->GetLocation();
400         *out_oat_file = RegisterOatFile(std::move(oat_file));
401       }
402     } else {
403       // oat_file == nullptr
404       // Verify if any of the dex files being loaded is already in the class path.
405       // If so, report an error with the current stack trace.
406       // Most likely the developer didn't intend to do this because it will waste
407       // performance and memory.
408       if (oat_file_assistant->GetBestStatus() == OatFileAssistant::kOatContextOutOfDate) {
409         std::set<const DexFile*> already_exists_in_classpath =
410             context->CheckForDuplicateDexFiles(MakeNonOwningPointerVector(dex_files));
411         if (!already_exists_in_classpath.empty()) {
412           ScopedTrace duplicate_dex_files("DuplicateDexFilesInContext");
413           auto duplicate_it = already_exists_in_classpath.begin();
414           std::string duplicates = (*duplicate_it)->GetLocation();
415           for (duplicate_it++ ; duplicate_it != already_exists_in_classpath.end(); duplicate_it++) {
416             duplicates += "," + (*duplicate_it)->GetLocation();
417           }
418 
419           std::ostringstream out;
420           out << "Trying to load dex files which is already loaded in the same ClassLoader "
421               << "hierarchy.\n"
422               << "This is a strong indication of bad ClassLoader construct which leads to poor "
423               << "performance and wastes memory.\n"
424               << "The list of duplicate dex files is: " << duplicates << "\n"
425               << "The current class loader context is: "
426               << context->EncodeContextForOatFile("") << "\n"
427               << "Java stack trace:\n";
428 
429           {
430             ScopedObjectAccess soa(self);
431             self->DumpJavaStack(out);
432           }
433 
434           // We log this as an ERROR to stress the fact that this is most likely unintended.
435           // Note that ART cannot do anything about it. It is up to the app to fix their logic.
436           // Here we are trying to give a heads up on why the app might have performance issues.
437           LOG(ERROR) << out.str();
438         }
439       }
440     }
441 
442     Runtime::Current()->GetAppInfo()->RegisterOdexStatus(
443         dex_location,
444         compilation_filter,
445         compilation_reason,
446         odex_status);
447   }
448 
449   // If we arrive here with an empty dex files list, it means we fail to load
450   // it/them through an .oat file.
451   if (dex_files.empty()) {
452     std::string error_msg;
453     static constexpr bool kVerifyChecksum = true;
454     ArtDexFileLoader dex_file_loader(dex_location);
455     if (!dex_file_loader.Open(Runtime::Current()->IsVerificationEnabled(),
456                               kVerifyChecksum,
457                               /*out*/ &error_msg,
458                               &dex_files)) {
459       ScopedTrace fail_to_open_dex_from_apk("FailedToOpenDexFilesFromApk");
460       LOG(WARNING) << error_msg;
461       error_msgs->push_back("Failed to open dex files from " + std::string(dex_location)
462                             + " because: " + error_msg);
463     }
464   }
465 
466   if (Runtime::Current()->GetJit() != nullptr) {
467     Runtime::Current()->GetJit()->RegisterDexFiles(dex_files, class_loader);
468   }
469 
470   // Now that we loaded the dex/odex files, notify the runtime.
471   // Note that we do this everytime we load dex files.
472   Runtime::Current()->NotifyDexFileLoaded();
473 
474   return dex_files;
475 }
476 
GetDexFileHeaders(const std::vector<MemMap> & maps)477 static std::vector<const DexFile::Header*> GetDexFileHeaders(const std::vector<MemMap>& maps) {
478   std::vector<const DexFile::Header*> headers;
479   headers.reserve(maps.size());
480   for (const MemMap& map : maps) {
481     DCHECK(map.IsValid());
482     headers.push_back(reinterpret_cast<const DexFile::Header*>(map.Begin()));
483   }
484   return headers;
485 }
486 
OpenDexFilesFromOat(std::vector<MemMap> && dex_mem_maps,jobject class_loader,jobjectArray dex_elements,const OatFile ** out_oat_file,std::vector<std::string> * error_msgs)487 std::vector<std::unique_ptr<const DexFile>> OatFileManager::OpenDexFilesFromOat(
488     std::vector<MemMap>&& dex_mem_maps,
489     jobject class_loader,
490     jobjectArray dex_elements,
491     const OatFile** out_oat_file,
492     std::vector<std::string>* error_msgs) {
493   std::vector<std::unique_ptr<const DexFile>> dex_files = OpenDexFilesFromOat_Impl(
494       std::move(dex_mem_maps),
495       class_loader,
496       dex_elements,
497       out_oat_file,
498       error_msgs);
499 
500   if (error_msgs->empty()) {
501     // Remove write permission from DexFile pages. We do this at the end because
502     // OatFile assigns OatDexFile pointer in the DexFile objects.
503     for (std::unique_ptr<const DexFile>& dex_file : dex_files) {
504       if (!dex_file->DisableWrite()) {
505         error_msgs->push_back("Failed to make dex file " + dex_file->GetLocation() + " read-only");
506       }
507     }
508   }
509 
510   if (!error_msgs->empty()) {
511     return std::vector<std::unique_ptr<const DexFile>>();
512   }
513 
514   return dex_files;
515 }
516 
OpenDexFilesFromOat_Impl(std::vector<MemMap> && dex_mem_maps,jobject class_loader,jobjectArray dex_elements,const OatFile ** out_oat_file,std::vector<std::string> * error_msgs)517 std::vector<std::unique_ptr<const DexFile>> OatFileManager::OpenDexFilesFromOat_Impl(
518     std::vector<MemMap>&& dex_mem_maps,
519     jobject class_loader,
520     jobjectArray dex_elements,
521     const OatFile** out_oat_file,
522     std::vector<std::string>* error_msgs) {
523   ScopedTrace trace(__FUNCTION__);
524   std::string error_msg;
525   DCHECK(error_msgs != nullptr);
526 
527   // Extract dex file headers from `dex_mem_maps`.
528   const std::vector<const DexFile::Header*> dex_headers = GetDexFileHeaders(dex_mem_maps);
529 
530   // Determine dex/vdex locations and the combined location checksum.
531   std::string dex_location;
532   std::string vdex_path;
533   bool has_vdex = OatFileAssistant::AnonymousDexVdexLocation(dex_headers,
534                                                              kRuntimeISA,
535                                                              &dex_location,
536                                                              &vdex_path);
537 
538   // Attempt to open an existing vdex and check dex file checksums match.
539   std::unique_ptr<VdexFile> vdex_file = nullptr;
540   if (has_vdex && OS::FileExists(vdex_path.c_str())) {
541     vdex_file = VdexFile::Open(vdex_path,
542                                /* writable= */ false,
543                                /* low_4gb= */ false,
544                                &error_msg);
545     if (vdex_file == nullptr) {
546       LOG(WARNING) << "Failed to open vdex " << vdex_path << ": " << error_msg;
547     } else if (!vdex_file->MatchesDexFileChecksums(dex_headers)) {
548       LOG(WARNING) << "Failed to open vdex " << vdex_path << ": dex file checksum mismatch";
549       vdex_file.reset(nullptr);
550     }
551   }
552 
553   // Load dex files. Skip structural dex file verification if vdex was found
554   // and dex checksums matched.
555   std::vector<std::unique_ptr<const DexFile>> dex_files;
556   for (size_t i = 0; i < dex_mem_maps.size(); ++i) {
557     static constexpr bool kVerifyChecksum = true;
558     ArtDexFileLoader dex_file_loader(std::move(dex_mem_maps[i]),
559                                      DexFileLoader::GetMultiDexLocation(i, dex_location.c_str()));
560     std::unique_ptr<const DexFile> dex_file(dex_file_loader.Open(
561         dex_headers[i]->checksum_,
562         /* verify= */ (vdex_file == nullptr) && Runtime::Current()->IsVerificationEnabled(),
563         kVerifyChecksum,
564         &error_msg));
565     if (dex_file != nullptr) {
566       dex::tracking::RegisterDexFile(dex_file.get());  // Register for tracking.
567       dex_files.push_back(std::move(dex_file));
568     } else {
569       error_msgs->push_back("Failed to open dex files from memory: " + error_msg);
570     }
571   }
572 
573   // Check if we should proceed to creating an OatFile instance backed by the vdex.
574   // We need: (a) an existing vdex, (b) class loader (can be null if invoked via reflection),
575   // and (c) no errors during dex file loading.
576   if (vdex_file == nullptr || class_loader == nullptr || !error_msgs->empty()) {
577     return dex_files;
578   }
579 
580   // Attempt to create a class loader context, check OpenDexFiles succeeds (prerequisite
581   // for using the context later).
582   std::unique_ptr<ClassLoaderContext> context = ClassLoaderContext::CreateContextForClassLoader(
583       class_loader,
584       dex_elements);
585   if (context == nullptr) {
586     LOG(ERROR) << "Could not create class loader context for " << vdex_path;
587     return dex_files;
588   }
589   DCHECK(context->OpenDexFiles())
590       << "Context created from already opened dex files should not attempt to open again";
591 
592   // Initialize an OatFile instance backed by the loaded vdex.
593   std::unique_ptr<OatFile> oat_file(OatFile::OpenFromVdex(MakeNonOwningPointerVector(dex_files),
594                                                           std::move(vdex_file),
595                                                           dex_location,
596                                                           context.get()));
597   if (oat_file != nullptr) {
598     VLOG(class_linker) << "Registering " << oat_file->GetLocation();
599     *out_oat_file = RegisterOatFile(std::move(oat_file));
600   }
601   return dex_files;
602 }
603 
604 // Check how many vdex files exist in the same directory as the vdex file we are about
605 // to write. If more than or equal to kAnonymousVdexCacheSize, unlink the least
606 // recently used one(s) (according to stat-reported atime).
UnlinkLeastRecentlyUsedVdexIfNeeded(const std::string & vdex_path_to_add,std::string * error_msg)607 static bool UnlinkLeastRecentlyUsedVdexIfNeeded(const std::string& vdex_path_to_add,
608                                                 std::string* error_msg) {
609   std::string basename = android::base::Basename(vdex_path_to_add);
610   if (!OatFileAssistant::IsAnonymousVdexBasename(basename)) {
611     // File is not for in memory dex files.
612     return true;
613   }
614 
615   if (OS::FileExists(vdex_path_to_add.c_str())) {
616     // File already exists and will be overwritten.
617     // This will not change the number of entries in the cache.
618     return true;
619   }
620 
621   auto last_slash = vdex_path_to_add.rfind('/');
622   CHECK(last_slash != std::string::npos);
623   std::string vdex_dir = vdex_path_to_add.substr(0, last_slash + 1);
624 
625   if (!OS::DirectoryExists(vdex_dir.c_str())) {
626     // Folder does not exist yet. Cache has zero entries.
627     return true;
628   }
629 
630   std::vector<std::pair<time_t, std::string>> cache;
631 
632   DIR* c_dir = opendir(vdex_dir.c_str());
633   if (c_dir == nullptr) {
634     *error_msg = "Unable to open " + vdex_dir + " to delete unused vdex files";
635     return false;
636   }
637   for (struct dirent* de = readdir(c_dir); de != nullptr; de = readdir(c_dir)) {
638     if (de->d_type != DT_REG) {
639       continue;
640     }
641     basename = de->d_name;
642     if (!OatFileAssistant::IsAnonymousVdexBasename(basename)) {
643       continue;
644     }
645     std::string fullname = vdex_dir + basename;
646 
647     struct stat s;
648     int rc = TEMP_FAILURE_RETRY(stat(fullname.c_str(), &s));
649     if (rc == -1) {
650       *error_msg = "Failed to stat() anonymous vdex file " + fullname;
651       return false;
652     }
653 
654     cache.push_back(std::make_pair(s.st_atime, fullname));
655   }
656   CHECK_EQ(0, closedir(c_dir)) << "Unable to close directory.";
657 
658   if (cache.size() < OatFileManager::kAnonymousVdexCacheSize) {
659     return true;
660   }
661 
662   std::sort(cache.begin(),
663             cache.end(),
664             [](const auto& a, const auto& b) { return a.first < b.first; });
665   for (size_t i = OatFileManager::kAnonymousVdexCacheSize - 1; i < cache.size(); ++i) {
666     if (unlink(cache[i].second.c_str()) != 0) {
667       *error_msg = "Could not unlink anonymous vdex file " + cache[i].second;
668       return false;
669     }
670   }
671 
672   return true;
673 }
674 
675 class BackgroundVerificationTask final : public Task {
676  public:
BackgroundVerificationTask(const std::vector<const DexFile * > & dex_files,jobject class_loader,const std::string & vdex_path)677   BackgroundVerificationTask(const std::vector<const DexFile*>& dex_files,
678                              jobject class_loader,
679                              const std::string& vdex_path)
680       : dex_files_(dex_files),
681         vdex_path_(vdex_path) {
682     Thread* const self = Thread::Current();
683     ScopedObjectAccess soa(self);
684     // Create a global ref for `class_loader` because it will be accessed from a different thread.
685     class_loader_ = soa.Vm()->AddGlobalRef(self, soa.Decode<mirror::ClassLoader>(class_loader));
686     CHECK(class_loader_ != nullptr);
687   }
688 
~BackgroundVerificationTask()689   ~BackgroundVerificationTask() {
690     Thread* const self = Thread::Current();
691     ScopedObjectAccess soa(self);
692     soa.Vm()->DeleteGlobalRef(self, class_loader_);
693   }
694 
Run(Thread * self)695   void Run(Thread* self) override {
696     std::string error_msg;
697     ClassLinker* const class_linker = Runtime::Current()->GetClassLinker();
698     verifier::VerifierDeps verifier_deps(dex_files_);
699 
700     // Iterate over all classes and verify them.
701     for (const DexFile* dex_file : dex_files_) {
702       for (uint32_t cdef_idx = 0; cdef_idx < dex_file->NumClassDefs(); cdef_idx++) {
703         const dex::ClassDef& class_def = dex_file->GetClassDef(cdef_idx);
704 
705         // Take handles inside the loop. The background verification is low priority
706         // and we want to minimize the risk of blocking anyone else.
707         ScopedObjectAccess soa(self);
708         StackHandleScope<2> hs(self);
709         Handle<mirror::ClassLoader> h_loader(hs.NewHandle(
710             soa.Decode<mirror::ClassLoader>(class_loader_)));
711         Handle<mirror::Class> h_class(hs.NewHandle<mirror::Class>(class_linker->FindClass(
712             self,
713             dex_file->GetClassDescriptor(class_def),
714             h_loader)));
715 
716         if (h_class == nullptr) {
717           DCHECK(self->IsExceptionPending());
718           self->ClearException();
719           continue;
720         }
721 
722         if (&h_class->GetDexFile() != dex_file) {
723           // There is a different class in the class path or a parent class loader
724           // with the same descriptor. This `h_class` is not resolvable, skip it.
725           continue;
726         }
727 
728         DCHECK(h_class->IsResolved()) << h_class->PrettyDescriptor();
729         class_linker->VerifyClass(self, &verifier_deps, h_class);
730         if (self->IsExceptionPending()) {
731           // ClassLinker::VerifyClass can throw, but the exception isn't useful here.
732           self->ClearException();
733         }
734 
735         DCHECK(h_class->IsVerified() || h_class->IsErroneous())
736             << h_class->PrettyDescriptor() << ": state=" << h_class->GetStatus();
737 
738         if (h_class->IsVerified()) {
739           verifier_deps.RecordClassVerified(*dex_file, class_def);
740         }
741       }
742     }
743 
744     // Delete old vdex files if there are too many in the folder.
745     if (!UnlinkLeastRecentlyUsedVdexIfNeeded(vdex_path_, &error_msg)) {
746       LOG(ERROR) << "Could not unlink old vdex files " << vdex_path_ << ": " << error_msg;
747       return;
748     }
749 
750     // Construct a vdex file and write `verifier_deps` into it.
751     if (!VdexFile::WriteToDisk(vdex_path_,
752                                dex_files_,
753                                verifier_deps,
754                                &error_msg)) {
755       LOG(ERROR) << "Could not write anonymous vdex " << vdex_path_ << ": " << error_msg;
756       return;
757     }
758   }
759 
Finalize()760   void Finalize() override {
761     delete this;
762   }
763 
764  private:
765   const std::vector<const DexFile*> dex_files_;
766   jobject class_loader_;
767   const std::string vdex_path_;
768 
769   DISALLOW_COPY_AND_ASSIGN(BackgroundVerificationTask);
770 };
771 
RunBackgroundVerification(const std::vector<const DexFile * > & dex_files,jobject class_loader)772 void OatFileManager::RunBackgroundVerification(const std::vector<const DexFile*>& dex_files,
773                                                jobject class_loader) {
774   Runtime* const runtime = Runtime::Current();
775   Thread* const self = Thread::Current();
776 
777   if (runtime->IsJavaDebuggable()) {
778     // Threads created by ThreadPool ("runtime threads") are not allowed to load
779     // classes when debuggable to match class-initialization semantics
780     // expectations. Do not verify in the background.
781     return;
782   }
783 
784   {
785     // Temporarily create a class loader context to see if we recognize the
786     // chain.
787     std::unique_ptr<ClassLoaderContext> context(
788         ClassLoaderContext::CreateContextForClassLoader(class_loader, nullptr));
789     if (context == nullptr) {
790       // We only run background verification for class loaders we know the lookup
791       // chain. Because the background verification runs on runtime threads,
792       // which do not call Java, we won't be able to load classes when
793       // verifying, which is something the current verifier relies on.
794       return;
795     }
796   }
797 
798   if (!IsSdkVersionSetAndAtLeast(runtime->GetTargetSdkVersion(), SdkVersion::kQ)) {
799     // Do not run for legacy apps as they may depend on the previous class loader behaviour.
800     return;
801   }
802 
803   if (runtime->IsShuttingDown(self)) {
804     // Not allowed to create new threads during runtime shutdown.
805     return;
806   }
807 
808   if (dex_files.size() < 1) {
809     // Nothing to verify.
810     return;
811   }
812 
813   std::string dex_location = dex_files[0]->GetLocation();
814   const std::string& data_dir = Runtime::Current()->GetProcessDataDirectory();
815   if (!android::base::StartsWith(dex_location, data_dir)) {
816     // For now, we only run background verification for secondary dex files.
817     // Running it for primary or split APKs could have some undesirable
818     // side-effects, like overloading the device on app startup.
819     return;
820   }
821 
822   std::string error_msg;
823   std::string odex_filename;
824   if (!OatFileAssistant::DexLocationToOdexFilename(dex_location,
825                                                    kRuntimeISA,
826                                                    &odex_filename,
827                                                    &error_msg)) {
828     LOG(WARNING) << "Could not get odex filename for " << dex_location << ": " << error_msg;
829     return;
830   }
831 
832   if (LocationIsOnArtApexData(odex_filename) && Runtime::Current()->DenyArtApexDataFiles()) {
833     // Ignore vdex file associated with this odex file as the odex file is not trustworthy.
834     return;
835   }
836 
837   {
838     WriterMutexLock mu(self, *Locks::oat_file_manager_lock_);
839     if (verification_thread_pool_ == nullptr) {
840       verification_thread_pool_.reset(
841           new ThreadPool("Verification thread pool", /* num_threads= */ 1));
842       verification_thread_pool_->StartWorkers(self);
843     }
844   }
845   verification_thread_pool_->AddTask(self, new BackgroundVerificationTask(
846       dex_files,
847       class_loader,
848       GetVdexFilename(odex_filename)));
849 }
850 
WaitForWorkersToBeCreated()851 void OatFileManager::WaitForWorkersToBeCreated() {
852   DCHECK(!Runtime::Current()->IsShuttingDown(Thread::Current()))
853       << "Cannot create new threads during runtime shutdown";
854   if (verification_thread_pool_ != nullptr) {
855     verification_thread_pool_->WaitForWorkersToBeCreated();
856   }
857 }
858 
DeleteThreadPool()859 void OatFileManager::DeleteThreadPool() {
860   verification_thread_pool_.reset(nullptr);
861 }
862 
WaitForBackgroundVerificationTasksToFinish()863 void OatFileManager::WaitForBackgroundVerificationTasksToFinish() {
864   if (verification_thread_pool_ == nullptr) {
865     return;
866   }
867 
868   Thread* const self = Thread::Current();
869   verification_thread_pool_->Wait(self, /* do_work= */ true, /* may_hold_locks= */ false);
870 }
871 
WaitForBackgroundVerificationTasks()872 void OatFileManager::WaitForBackgroundVerificationTasks() {
873   if (verification_thread_pool_ != nullptr) {
874     Thread* const self = Thread::Current();
875     verification_thread_pool_->WaitForWorkersToBeCreated();
876     verification_thread_pool_->Wait(self, /* do_work= */ true, /* may_hold_locks= */ false);
877   }
878 }
879 
ClearOnlyUseTrustedOatFiles()880 void OatFileManager::ClearOnlyUseTrustedOatFiles() {
881   only_use_system_oat_files_ = false;
882 }
883 
SetOnlyUseTrustedOatFiles()884 void OatFileManager::SetOnlyUseTrustedOatFiles() {
885   ReaderMutexLock mu(Thread::Current(), *Locks::oat_file_manager_lock_);
886   if (!oat_files_.empty()) {
887     LOG(FATAL) << "Unexpected non-empty loaded oat files ";
888   }
889   only_use_system_oat_files_ = true;
890 }
891 
DumpForSigQuit(std::ostream & os)892 void OatFileManager::DumpForSigQuit(std::ostream& os) {
893   ReaderMutexLock mu(Thread::Current(), *Locks::oat_file_manager_lock_);
894   std::vector<const OatFile*> boot_oat_files = GetBootOatFiles();
895   for (const std::unique_ptr<const OatFile>& oat_file : oat_files_) {
896     if (ContainsElement(boot_oat_files, oat_file.get())) {
897       continue;
898     }
899     os << oat_file->GetLocation() << ": " << oat_file->GetCompilerFilter() << "\n";
900   }
901 }
902 
ContainsPc(const void * code)903 bool OatFileManager::ContainsPc(const void* code) {
904   ReaderMutexLock mu(Thread::Current(), *Locks::oat_file_manager_lock_);
905   std::vector<const OatFile*> boot_oat_files = GetBootOatFiles();
906   for (const std::unique_ptr<const OatFile>& oat_file : oat_files_) {
907     if (oat_file->Contains(code)) {
908       return true;
909     }
910   }
911   return false;
912 }
913 
914 }  // namespace art
915