1 /*
2 * Copyright (C) 2015 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17 #include "oat_file_manager.h"
18
19 #include <memory>
20 #include <queue>
21 #include <vector>
22 #include <sys/stat.h>
23
24 #include "android-base/file.h"
25 #include "android-base/stringprintf.h"
26 #include "android-base/strings.h"
27
28 #include "art_field-inl.h"
29 #include "base/bit_vector-inl.h"
30 #include "base/file_utils.h"
31 #include "base/logging.h" // For VLOG.
32 #include "base/mutex-inl.h"
33 #include "base/sdk_version.h"
34 #include "base/stl_util.h"
35 #include "base/systrace.h"
36 #include "class_linker.h"
37 #include "class_loader_context.h"
38 #include "dex/art_dex_file_loader.h"
39 #include "dex/dex_file-inl.h"
40 #include "dex/dex_file_loader.h"
41 #include "dex/dex_file_tracking_registrar.h"
42 #include "gc/scoped_gc_critical_section.h"
43 #include "gc/space/image_space.h"
44 #include "handle_scope-inl.h"
45 #include "jit/jit.h"
46 #include "jni/java_vm_ext.h"
47 #include "jni/jni_internal.h"
48 #include "mirror/class_loader.h"
49 #include "mirror/object-inl.h"
50 #include "oat_file.h"
51 #include "oat_file_assistant.h"
52 #include "obj_ptr-inl.h"
53 #include "runtime_image.h"
54 #include "scoped_thread_state_change-inl.h"
55 #include "thread-current-inl.h"
56 #include "thread_list.h"
57 #include "thread_pool.h"
58 #include "vdex_file.h"
59 #include "verifier/verifier_deps.h"
60 #include "well_known_classes.h"
61
62 namespace art {
63
64 using android::base::StringPrintf;
65
66 // If true, we attempt to load the application image if it exists.
67 static constexpr bool kEnableAppImage = true;
68
69 // If true, we attempt to load an app image generated by the runtime.
70 static const bool kEnableRuntimeAppImage = true;
71
RegisterOatFile(std::unique_ptr<const OatFile> oat_file,bool in_memory)72 const OatFile* OatFileManager::RegisterOatFile(std::unique_ptr<const OatFile> oat_file,
73 bool in_memory) {
74 // Use class_linker vlog to match the log for dex file registration.
75 VLOG(class_linker) << "Registered oat file " << oat_file->GetLocation();
76 PaletteNotifyOatFileLoaded(oat_file->GetLocation().c_str());
77
78 WriterMutexLock mu(Thread::Current(), *Locks::oat_file_manager_lock_);
79 CHECK(in_memory ||
80 !only_use_system_oat_files_ ||
81 LocationIsTrusted(oat_file->GetLocation(), !Runtime::Current()->DenyArtApexDataFiles()) ||
82 !oat_file->IsExecutable())
83 << "Registering a non /system oat file: " << oat_file->GetLocation() << " android-root="
84 << GetAndroidRoot();
85 DCHECK(oat_file != nullptr);
86 if (kIsDebugBuild) {
87 CHECK(oat_files_.find(oat_file) == oat_files_.end());
88 for (const std::unique_ptr<const OatFile>& existing : oat_files_) {
89 CHECK_NE(oat_file.get(), existing.get()) << oat_file->GetLocation();
90 // Check that we don't have an oat file with the same address. Copies of the same oat file
91 // should be loaded at different addresses.
92 CHECK_NE(oat_file->Begin(), existing->Begin()) << "Oat file already mapped at that location";
93 }
94 }
95 const OatFile* ret = oat_file.get();
96 oat_files_.insert(std::move(oat_file));
97 return ret;
98 }
99
UnRegisterAndDeleteOatFile(const OatFile * oat_file)100 void OatFileManager::UnRegisterAndDeleteOatFile(const OatFile* oat_file) {
101 WriterMutexLock mu(Thread::Current(), *Locks::oat_file_manager_lock_);
102 DCHECK(oat_file != nullptr);
103 std::unique_ptr<const OatFile> compare(oat_file);
104 auto it = oat_files_.find(compare);
105 CHECK(it != oat_files_.end());
106 oat_files_.erase(it);
107 compare.release(); // NOLINT b/117926937
108 }
109
FindOpenedOatFileFromDexLocation(const std::string & dex_base_location) const110 const OatFile* OatFileManager::FindOpenedOatFileFromDexLocation(
111 const std::string& dex_base_location) const {
112 ReaderMutexLock mu(Thread::Current(), *Locks::oat_file_manager_lock_);
113 for (const std::unique_ptr<const OatFile>& oat_file : oat_files_) {
114 const std::vector<const OatDexFile*>& oat_dex_files = oat_file->GetOatDexFiles();
115 for (const OatDexFile* oat_dex_file : oat_dex_files) {
116 if (DexFileLoader::GetBaseLocation(oat_dex_file->GetDexFileLocation()) == dex_base_location) {
117 return oat_file.get();
118 }
119 }
120 }
121 return nullptr;
122 }
123
FindOpenedOatFileFromOatLocation(const std::string & oat_location) const124 const OatFile* OatFileManager::FindOpenedOatFileFromOatLocation(const std::string& oat_location)
125 const {
126 ReaderMutexLock mu(Thread::Current(), *Locks::oat_file_manager_lock_);
127 return FindOpenedOatFileFromOatLocationLocked(oat_location);
128 }
129
FindOpenedOatFileFromOatLocationLocked(const std::string & oat_location) const130 const OatFile* OatFileManager::FindOpenedOatFileFromOatLocationLocked(
131 const std::string& oat_location) const {
132 for (const std::unique_ptr<const OatFile>& oat_file : oat_files_) {
133 if (oat_file->GetLocation() == oat_location) {
134 return oat_file.get();
135 }
136 }
137 return nullptr;
138 }
139
GetBootOatFiles() const140 std::vector<const OatFile*> OatFileManager::GetBootOatFiles() const {
141 std::vector<gc::space::ImageSpace*> image_spaces =
142 Runtime::Current()->GetHeap()->GetBootImageSpaces();
143 std::vector<const OatFile*> oat_files;
144 oat_files.reserve(image_spaces.size());
145 for (gc::space::ImageSpace* image_space : image_spaces) {
146 oat_files.push_back(image_space->GetOatFile());
147 }
148 return oat_files;
149 }
150
OatFileManager()151 OatFileManager::OatFileManager()
152 : only_use_system_oat_files_(false) {}
153
~OatFileManager()154 OatFileManager::~OatFileManager() {
155 // Explicitly clear oat_files_ since the OatFile destructor calls back into OatFileManager for
156 // UnRegisterOatFileLocation.
157 oat_files_.clear();
158 }
159
RegisterImageOatFiles(const std::vector<gc::space::ImageSpace * > & spaces)160 std::vector<const OatFile*> OatFileManager::RegisterImageOatFiles(
161 const std::vector<gc::space::ImageSpace*>& spaces) {
162 std::vector<const OatFile*> oat_files;
163 oat_files.reserve(spaces.size());
164 for (gc::space::ImageSpace* space : spaces) {
165 // The oat file was generated in memory if the image space has a profile.
166 bool in_memory = !space->GetProfileFiles().empty();
167 oat_files.push_back(RegisterOatFile(space->ReleaseOatFile(), in_memory));
168 }
169 return oat_files;
170 }
171
ShouldLoadAppImage(const OatFile * source_oat_file) const172 bool OatFileManager::ShouldLoadAppImage(const OatFile* source_oat_file) const {
173 Runtime* const runtime = Runtime::Current();
174 return kEnableAppImage && (!runtime->IsJavaDebuggableAtInit() || source_oat_file->IsDebuggable());
175 }
176
OpenDexFilesFromOat(const char * dex_location,jobject class_loader,jobjectArray dex_elements,const OatFile ** out_oat_file,std::vector<std::string> * error_msgs)177 std::vector<std::unique_ptr<const DexFile>> OatFileManager::OpenDexFilesFromOat(
178 const char* dex_location,
179 jobject class_loader,
180 jobjectArray dex_elements,
181 const OatFile** out_oat_file,
182 std::vector<std::string>* error_msgs) {
183 ScopedTrace trace(StringPrintf("%s(%s)", __FUNCTION__, dex_location));
184 CHECK(dex_location != nullptr);
185 CHECK(error_msgs != nullptr);
186
187 // Verify we aren't holding the mutator lock, which could starve GC when
188 // hitting the disk.
189 Thread* const self = Thread::Current();
190 Locks::mutator_lock_->AssertNotHeld(self);
191 Runtime* const runtime = Runtime::Current();
192
193 std::vector<std::unique_ptr<const DexFile>> dex_files;
194 std::unique_ptr<ClassLoaderContext> context(
195 ClassLoaderContext::CreateContextForClassLoader(class_loader, dex_elements));
196
197 // If the class_loader is null there's not much we can do. This happens if a dex files is loaded
198 // directly with DexFile APIs instead of using class loaders.
199 if (class_loader == nullptr) {
200 LOG(WARNING) << "Opening an oat file without a class loader. "
201 << "Are you using the deprecated DexFile APIs?";
202 } else if (context != nullptr) {
203 auto oat_file_assistant = std::make_unique<OatFileAssistant>(dex_location,
204 kRuntimeISA,
205 context.get(),
206 runtime->GetOatFilesExecutable(),
207 only_use_system_oat_files_);
208
209 // Get the current optimization status for trace debugging.
210 // Implementation detail note: GetOptimizationStatus will select the same
211 // oat file as GetBestOatFile used below, and in doing so it already pre-populates
212 // some OatFileAssistant internal fields.
213 std::string odex_location;
214 std::string compilation_filter;
215 std::string compilation_reason;
216 std::string odex_status;
217 oat_file_assistant->GetOptimizationStatus(
218 &odex_location, &compilation_filter, &compilation_reason, &odex_status);
219
220 ScopedTrace odex_loading(StringPrintf(
221 "location=%s status=%s filter=%s reason=%s",
222 odex_location.c_str(),
223 odex_status.c_str(),
224 compilation_filter.c_str(),
225 compilation_reason.c_str()));
226
227 const bool has_registered_app_info = Runtime::Current()->GetAppInfo()->HasRegisteredAppInfo();
228 const AppInfo::CodeType code_type =
229 Runtime::Current()->GetAppInfo()->GetRegisteredCodeType(dex_location);
230 // We only want to madvise primary/split dex artifacts as a startup optimization. However,
231 // as the code_type for those artifacts may not be set until the initial app info registration,
232 // we conservatively madvise everything until the app info registration is complete.
233 const bool should_madvise = !has_registered_app_info ||
234 code_type == AppInfo::CodeType::kPrimaryApk ||
235 code_type == AppInfo::CodeType::kSplitApk;
236
237 // Proceed with oat file loading.
238 std::unique_ptr<const OatFile> oat_file(oat_file_assistant->GetBestOatFile().release());
239 VLOG(oat) << "OatFileAssistant(" << dex_location << ").GetBestOatFile()="
240 << (oat_file != nullptr ? oat_file->GetLocation() : "")
241 << " (executable=" << (oat_file != nullptr ? oat_file->IsExecutable() : false) << ")";
242
243 CHECK(oat_file == nullptr || odex_location == oat_file->GetLocation())
244 << "OatFileAssistant non-determinism in choosing best oat files. "
245 << "optimization-status-location=" << odex_location
246 << " best_oat_file-location=" << oat_file->GetLocation();
247
248 if (oat_file != nullptr) {
249 bool compilation_enabled =
250 CompilerFilter::IsAotCompilationEnabled(oat_file->GetCompilerFilter());
251 // Load the dex files from the oat file.
252 bool added_image_space = false;
253 if (should_madvise) {
254 VLOG(oat) << "Madvising oat file: " << oat_file->GetLocation();
255 size_t madvise_size_limit = runtime->GetMadviseWillNeedSizeOdex();
256 Runtime::MadviseFileForRange(madvise_size_limit,
257 oat_file->Size(),
258 oat_file->Begin(),
259 oat_file->End(),
260 oat_file->GetLocation());
261 }
262
263 ScopedTrace app_image_timing("AppImage:Loading");
264
265 // We need to throw away the image space if we are debuggable but the oat-file source of the
266 // image is not otherwise we might get classes with inlined methods or other such things.
267 std::unique_ptr<gc::space::ImageSpace> image_space;
268 if (ShouldLoadAppImage(oat_file.get())) {
269 if (oat_file->IsExecutable()) {
270 // App images generated by the compiler can only be used if the oat file
271 // is executable.
272 image_space = oat_file_assistant->OpenImageSpace(oat_file.get());
273 }
274 if (kEnableRuntimeAppImage && image_space == nullptr && !compilation_enabled) {
275 std::string art_file = RuntimeImage::GetRuntimeImagePath(dex_location);
276 std::string error_msg;
277 ScopedObjectAccess soa(self);
278 image_space = gc::space::ImageSpace::CreateFromAppImage(
279 art_file.c_str(), oat_file.get(), &error_msg);
280 if (image_space == nullptr) {
281 (OS::FileExists(art_file.c_str()) ? LOG_STREAM(INFO) : VLOG_STREAM(image))
282 << "Could not load runtime generated app image: " << error_msg;
283 }
284 }
285 }
286 if (image_space != nullptr) {
287 ScopedObjectAccess soa(self);
288 StackHandleScope<1> hs(self);
289 Handle<mirror::ClassLoader> h_loader(
290 hs.NewHandle(soa.Decode<mirror::ClassLoader>(class_loader)));
291 // Can not load app image without class loader.
292 if (h_loader != nullptr) {
293 std::string temp_error_msg;
294 // Add image space has a race condition since other threads could be reading from the
295 // spaces array.
296 {
297 ScopedThreadSuspension sts(self, ThreadState::kSuspended);
298 gc::ScopedGCCriticalSection gcs(self,
299 gc::kGcCauseAddRemoveAppImageSpace,
300 gc::kCollectorTypeAddRemoveAppImageSpace);
301 ScopedSuspendAll ssa("Add image space");
302 runtime->GetHeap()->AddSpace(image_space.get());
303 }
304 {
305 ScopedTrace image_space_timing("Adding image space");
306 gc::space::ImageSpace* space_ptr = image_space.get();
307 added_image_space = runtime->GetClassLinker()->AddImageSpaces(
308 ArrayRef<gc::space::ImageSpace*>(&space_ptr, /*size=*/1),
309 h_loader,
310 context.get(),
311 /*out*/ &dex_files,
312 /*out*/ &temp_error_msg);
313 }
314 if (added_image_space) {
315 // Successfully added image space to heap, release the map so that it does not get
316 // freed.
317 image_space.release(); // NOLINT b/117926937
318
319 // Register for tracking.
320 for (const auto& dex_file : dex_files) {
321 dex::tracking::RegisterDexFile(dex_file.get());
322 }
323
324 if (!compilation_enabled) {
325 // Update the filter we are going to report to 'speed-profile'.
326 // Ideally, we would also update the compiler filter of the odex
327 // file, but at this point it's just too late.
328 compilation_filter = CompilerFilter::NameOfFilter(CompilerFilter::kSpeedProfile);
329 }
330 } else {
331 LOG(INFO) << "Failed to add image file: " << temp_error_msg;
332 dex_files.clear();
333 {
334 ScopedThreadSuspension sts(self, ThreadState::kSuspended);
335 gc::ScopedGCCriticalSection gcs(self,
336 gc::kGcCauseAddRemoveAppImageSpace,
337 gc::kCollectorTypeAddRemoveAppImageSpace);
338 ScopedSuspendAll ssa("Remove image space");
339 runtime->GetHeap()->RemoveSpace(image_space.get());
340 }
341 // Non-fatal, don't update error_msg.
342 }
343 }
344 }
345 if (!added_image_space) {
346 DCHECK(dex_files.empty());
347
348 if (oat_file->RequiresImage()) {
349 LOG(WARNING) << "Loading "
350 << oat_file->GetLocation()
351 << " non-executable as it requires an image which we failed to load";
352 // file as non-executable.
353 auto nonexecutable_oat_file_assistant =
354 std::make_unique<OatFileAssistant>(dex_location,
355 kRuntimeISA,
356 context.get(),
357 /*load_executable=*/false,
358 only_use_system_oat_files_);
359 oat_file.reset(nonexecutable_oat_file_assistant->GetBestOatFile().release());
360
361 // The file could be deleted concurrently (for example background
362 // dexopt, or secondary oat file being deleted by the app).
363 if (oat_file == nullptr) {
364 LOG(WARNING) << "Failed to reload oat file non-executable " << dex_location;
365 }
366 }
367
368 if (oat_file != nullptr) {
369 dex_files = oat_file_assistant->LoadDexFiles(*oat_file.get(), dex_location);
370
371 // Register for tracking.
372 for (const auto& dex_file : dex_files) {
373 dex::tracking::RegisterDexFile(dex_file.get());
374 }
375 }
376 }
377 if (dex_files.empty()) {
378 ScopedTrace failed_to_open_dex_files("FailedToOpenDexFilesFromOat");
379 error_msgs->push_back("Failed to open dex files from " + odex_location);
380 } else if (should_madvise) {
381 size_t madvise_size_limit = Runtime::Current()->GetMadviseWillNeedTotalDexSize();
382 for (const std::unique_ptr<const DexFile>& dex_file : dex_files) {
383 // Prefetch the dex file based on vdex size limit (name should
384 // have been dex size limit).
385 VLOG(oat) << "Madvising dex file: " << dex_file->GetLocation();
386 Runtime::MadviseFileForRange(madvise_size_limit,
387 dex_file->Size(),
388 dex_file->Begin(),
389 dex_file->Begin() + dex_file->Size(),
390 dex_file->GetLocation());
391 if (dex_file->Size() >= madvise_size_limit) {
392 break;
393 }
394 madvise_size_limit -= dex_file->Size();
395 }
396 }
397
398 if (oat_file != nullptr) {
399 VLOG(class_linker) << "Registering " << oat_file->GetLocation();
400 *out_oat_file = RegisterOatFile(std::move(oat_file));
401 }
402 } else {
403 // oat_file == nullptr
404 // Verify if any of the dex files being loaded is already in the class path.
405 // If so, report an error with the current stack trace.
406 // Most likely the developer didn't intend to do this because it will waste
407 // performance and memory.
408 if (oat_file_assistant->GetBestStatus() == OatFileAssistant::kOatContextOutOfDate) {
409 std::set<const DexFile*> already_exists_in_classpath =
410 context->CheckForDuplicateDexFiles(MakeNonOwningPointerVector(dex_files));
411 if (!already_exists_in_classpath.empty()) {
412 ScopedTrace duplicate_dex_files("DuplicateDexFilesInContext");
413 auto duplicate_it = already_exists_in_classpath.begin();
414 std::string duplicates = (*duplicate_it)->GetLocation();
415 for (duplicate_it++ ; duplicate_it != already_exists_in_classpath.end(); duplicate_it++) {
416 duplicates += "," + (*duplicate_it)->GetLocation();
417 }
418
419 std::ostringstream out;
420 out << "Trying to load dex files which is already loaded in the same ClassLoader "
421 << "hierarchy.\n"
422 << "This is a strong indication of bad ClassLoader construct which leads to poor "
423 << "performance and wastes memory.\n"
424 << "The list of duplicate dex files is: " << duplicates << "\n"
425 << "The current class loader context is: "
426 << context->EncodeContextForOatFile("") << "\n"
427 << "Java stack trace:\n";
428
429 {
430 ScopedObjectAccess soa(self);
431 self->DumpJavaStack(out);
432 }
433
434 // We log this as an ERROR to stress the fact that this is most likely unintended.
435 // Note that ART cannot do anything about it. It is up to the app to fix their logic.
436 // Here we are trying to give a heads up on why the app might have performance issues.
437 LOG(ERROR) << out.str();
438 }
439 }
440 }
441
442 Runtime::Current()->GetAppInfo()->RegisterOdexStatus(
443 dex_location,
444 compilation_filter,
445 compilation_reason,
446 odex_status);
447 }
448
449 // If we arrive here with an empty dex files list, it means we fail to load
450 // it/them through an .oat file.
451 if (dex_files.empty()) {
452 std::string error_msg;
453 static constexpr bool kVerifyChecksum = true;
454 ArtDexFileLoader dex_file_loader(dex_location);
455 if (!dex_file_loader.Open(Runtime::Current()->IsVerificationEnabled(),
456 kVerifyChecksum,
457 /*out*/ &error_msg,
458 &dex_files)) {
459 ScopedTrace fail_to_open_dex_from_apk("FailedToOpenDexFilesFromApk");
460 LOG(WARNING) << error_msg;
461 error_msgs->push_back("Failed to open dex files from " + std::string(dex_location)
462 + " because: " + error_msg);
463 }
464 }
465
466 if (Runtime::Current()->GetJit() != nullptr) {
467 Runtime::Current()->GetJit()->RegisterDexFiles(dex_files, class_loader);
468 }
469
470 // Now that we loaded the dex/odex files, notify the runtime.
471 // Note that we do this everytime we load dex files.
472 Runtime::Current()->NotifyDexFileLoaded();
473
474 return dex_files;
475 }
476
GetDexFileHeaders(const std::vector<MemMap> & maps)477 static std::vector<const DexFile::Header*> GetDexFileHeaders(const std::vector<MemMap>& maps) {
478 std::vector<const DexFile::Header*> headers;
479 headers.reserve(maps.size());
480 for (const MemMap& map : maps) {
481 DCHECK(map.IsValid());
482 headers.push_back(reinterpret_cast<const DexFile::Header*>(map.Begin()));
483 }
484 return headers;
485 }
486
OpenDexFilesFromOat(std::vector<MemMap> && dex_mem_maps,jobject class_loader,jobjectArray dex_elements,const OatFile ** out_oat_file,std::vector<std::string> * error_msgs)487 std::vector<std::unique_ptr<const DexFile>> OatFileManager::OpenDexFilesFromOat(
488 std::vector<MemMap>&& dex_mem_maps,
489 jobject class_loader,
490 jobjectArray dex_elements,
491 const OatFile** out_oat_file,
492 std::vector<std::string>* error_msgs) {
493 std::vector<std::unique_ptr<const DexFile>> dex_files = OpenDexFilesFromOat_Impl(
494 std::move(dex_mem_maps),
495 class_loader,
496 dex_elements,
497 out_oat_file,
498 error_msgs);
499
500 if (error_msgs->empty()) {
501 // Remove write permission from DexFile pages. We do this at the end because
502 // OatFile assigns OatDexFile pointer in the DexFile objects.
503 for (std::unique_ptr<const DexFile>& dex_file : dex_files) {
504 if (!dex_file->DisableWrite()) {
505 error_msgs->push_back("Failed to make dex file " + dex_file->GetLocation() + " read-only");
506 }
507 }
508 }
509
510 if (!error_msgs->empty()) {
511 return std::vector<std::unique_ptr<const DexFile>>();
512 }
513
514 return dex_files;
515 }
516
OpenDexFilesFromOat_Impl(std::vector<MemMap> && dex_mem_maps,jobject class_loader,jobjectArray dex_elements,const OatFile ** out_oat_file,std::vector<std::string> * error_msgs)517 std::vector<std::unique_ptr<const DexFile>> OatFileManager::OpenDexFilesFromOat_Impl(
518 std::vector<MemMap>&& dex_mem_maps,
519 jobject class_loader,
520 jobjectArray dex_elements,
521 const OatFile** out_oat_file,
522 std::vector<std::string>* error_msgs) {
523 ScopedTrace trace(__FUNCTION__);
524 std::string error_msg;
525 DCHECK(error_msgs != nullptr);
526
527 // Extract dex file headers from `dex_mem_maps`.
528 const std::vector<const DexFile::Header*> dex_headers = GetDexFileHeaders(dex_mem_maps);
529
530 // Determine dex/vdex locations and the combined location checksum.
531 std::string dex_location;
532 std::string vdex_path;
533 bool has_vdex = OatFileAssistant::AnonymousDexVdexLocation(dex_headers,
534 kRuntimeISA,
535 &dex_location,
536 &vdex_path);
537
538 // Attempt to open an existing vdex and check dex file checksums match.
539 std::unique_ptr<VdexFile> vdex_file = nullptr;
540 if (has_vdex && OS::FileExists(vdex_path.c_str())) {
541 vdex_file = VdexFile::Open(vdex_path,
542 /* writable= */ false,
543 /* low_4gb= */ false,
544 &error_msg);
545 if (vdex_file == nullptr) {
546 LOG(WARNING) << "Failed to open vdex " << vdex_path << ": " << error_msg;
547 } else if (!vdex_file->MatchesDexFileChecksums(dex_headers)) {
548 LOG(WARNING) << "Failed to open vdex " << vdex_path << ": dex file checksum mismatch";
549 vdex_file.reset(nullptr);
550 }
551 }
552
553 // Load dex files. Skip structural dex file verification if vdex was found
554 // and dex checksums matched.
555 std::vector<std::unique_ptr<const DexFile>> dex_files;
556 for (size_t i = 0; i < dex_mem_maps.size(); ++i) {
557 static constexpr bool kVerifyChecksum = true;
558 ArtDexFileLoader dex_file_loader(std::move(dex_mem_maps[i]),
559 DexFileLoader::GetMultiDexLocation(i, dex_location.c_str()));
560 std::unique_ptr<const DexFile> dex_file(dex_file_loader.Open(
561 dex_headers[i]->checksum_,
562 /* verify= */ (vdex_file == nullptr) && Runtime::Current()->IsVerificationEnabled(),
563 kVerifyChecksum,
564 &error_msg));
565 if (dex_file != nullptr) {
566 dex::tracking::RegisterDexFile(dex_file.get()); // Register for tracking.
567 dex_files.push_back(std::move(dex_file));
568 } else {
569 error_msgs->push_back("Failed to open dex files from memory: " + error_msg);
570 }
571 }
572
573 // Check if we should proceed to creating an OatFile instance backed by the vdex.
574 // We need: (a) an existing vdex, (b) class loader (can be null if invoked via reflection),
575 // and (c) no errors during dex file loading.
576 if (vdex_file == nullptr || class_loader == nullptr || !error_msgs->empty()) {
577 return dex_files;
578 }
579
580 // Attempt to create a class loader context, check OpenDexFiles succeeds (prerequisite
581 // for using the context later).
582 std::unique_ptr<ClassLoaderContext> context = ClassLoaderContext::CreateContextForClassLoader(
583 class_loader,
584 dex_elements);
585 if (context == nullptr) {
586 LOG(ERROR) << "Could not create class loader context for " << vdex_path;
587 return dex_files;
588 }
589 DCHECK(context->OpenDexFiles())
590 << "Context created from already opened dex files should not attempt to open again";
591
592 // Initialize an OatFile instance backed by the loaded vdex.
593 std::unique_ptr<OatFile> oat_file(OatFile::OpenFromVdex(MakeNonOwningPointerVector(dex_files),
594 std::move(vdex_file),
595 dex_location,
596 context.get()));
597 if (oat_file != nullptr) {
598 VLOG(class_linker) << "Registering " << oat_file->GetLocation();
599 *out_oat_file = RegisterOatFile(std::move(oat_file));
600 }
601 return dex_files;
602 }
603
604 // Check how many vdex files exist in the same directory as the vdex file we are about
605 // to write. If more than or equal to kAnonymousVdexCacheSize, unlink the least
606 // recently used one(s) (according to stat-reported atime).
UnlinkLeastRecentlyUsedVdexIfNeeded(const std::string & vdex_path_to_add,std::string * error_msg)607 static bool UnlinkLeastRecentlyUsedVdexIfNeeded(const std::string& vdex_path_to_add,
608 std::string* error_msg) {
609 std::string basename = android::base::Basename(vdex_path_to_add);
610 if (!OatFileAssistant::IsAnonymousVdexBasename(basename)) {
611 // File is not for in memory dex files.
612 return true;
613 }
614
615 if (OS::FileExists(vdex_path_to_add.c_str())) {
616 // File already exists and will be overwritten.
617 // This will not change the number of entries in the cache.
618 return true;
619 }
620
621 auto last_slash = vdex_path_to_add.rfind('/');
622 CHECK(last_slash != std::string::npos);
623 std::string vdex_dir = vdex_path_to_add.substr(0, last_slash + 1);
624
625 if (!OS::DirectoryExists(vdex_dir.c_str())) {
626 // Folder does not exist yet. Cache has zero entries.
627 return true;
628 }
629
630 std::vector<std::pair<time_t, std::string>> cache;
631
632 DIR* c_dir = opendir(vdex_dir.c_str());
633 if (c_dir == nullptr) {
634 *error_msg = "Unable to open " + vdex_dir + " to delete unused vdex files";
635 return false;
636 }
637 for (struct dirent* de = readdir(c_dir); de != nullptr; de = readdir(c_dir)) {
638 if (de->d_type != DT_REG) {
639 continue;
640 }
641 basename = de->d_name;
642 if (!OatFileAssistant::IsAnonymousVdexBasename(basename)) {
643 continue;
644 }
645 std::string fullname = vdex_dir + basename;
646
647 struct stat s;
648 int rc = TEMP_FAILURE_RETRY(stat(fullname.c_str(), &s));
649 if (rc == -1) {
650 *error_msg = "Failed to stat() anonymous vdex file " + fullname;
651 return false;
652 }
653
654 cache.push_back(std::make_pair(s.st_atime, fullname));
655 }
656 CHECK_EQ(0, closedir(c_dir)) << "Unable to close directory.";
657
658 if (cache.size() < OatFileManager::kAnonymousVdexCacheSize) {
659 return true;
660 }
661
662 std::sort(cache.begin(),
663 cache.end(),
664 [](const auto& a, const auto& b) { return a.first < b.first; });
665 for (size_t i = OatFileManager::kAnonymousVdexCacheSize - 1; i < cache.size(); ++i) {
666 if (unlink(cache[i].second.c_str()) != 0) {
667 *error_msg = "Could not unlink anonymous vdex file " + cache[i].second;
668 return false;
669 }
670 }
671
672 return true;
673 }
674
675 class BackgroundVerificationTask final : public Task {
676 public:
BackgroundVerificationTask(const std::vector<const DexFile * > & dex_files,jobject class_loader,const std::string & vdex_path)677 BackgroundVerificationTask(const std::vector<const DexFile*>& dex_files,
678 jobject class_loader,
679 const std::string& vdex_path)
680 : dex_files_(dex_files),
681 vdex_path_(vdex_path) {
682 Thread* const self = Thread::Current();
683 ScopedObjectAccess soa(self);
684 // Create a global ref for `class_loader` because it will be accessed from a different thread.
685 class_loader_ = soa.Vm()->AddGlobalRef(self, soa.Decode<mirror::ClassLoader>(class_loader));
686 CHECK(class_loader_ != nullptr);
687 }
688
~BackgroundVerificationTask()689 ~BackgroundVerificationTask() {
690 Thread* const self = Thread::Current();
691 ScopedObjectAccess soa(self);
692 soa.Vm()->DeleteGlobalRef(self, class_loader_);
693 }
694
Run(Thread * self)695 void Run(Thread* self) override {
696 std::string error_msg;
697 ClassLinker* const class_linker = Runtime::Current()->GetClassLinker();
698 verifier::VerifierDeps verifier_deps(dex_files_);
699
700 // Iterate over all classes and verify them.
701 for (const DexFile* dex_file : dex_files_) {
702 for (uint32_t cdef_idx = 0; cdef_idx < dex_file->NumClassDefs(); cdef_idx++) {
703 const dex::ClassDef& class_def = dex_file->GetClassDef(cdef_idx);
704
705 // Take handles inside the loop. The background verification is low priority
706 // and we want to minimize the risk of blocking anyone else.
707 ScopedObjectAccess soa(self);
708 StackHandleScope<2> hs(self);
709 Handle<mirror::ClassLoader> h_loader(hs.NewHandle(
710 soa.Decode<mirror::ClassLoader>(class_loader_)));
711 Handle<mirror::Class> h_class(hs.NewHandle<mirror::Class>(class_linker->FindClass(
712 self,
713 dex_file->GetClassDescriptor(class_def),
714 h_loader)));
715
716 if (h_class == nullptr) {
717 DCHECK(self->IsExceptionPending());
718 self->ClearException();
719 continue;
720 }
721
722 if (&h_class->GetDexFile() != dex_file) {
723 // There is a different class in the class path or a parent class loader
724 // with the same descriptor. This `h_class` is not resolvable, skip it.
725 continue;
726 }
727
728 DCHECK(h_class->IsResolved()) << h_class->PrettyDescriptor();
729 class_linker->VerifyClass(self, &verifier_deps, h_class);
730 if (self->IsExceptionPending()) {
731 // ClassLinker::VerifyClass can throw, but the exception isn't useful here.
732 self->ClearException();
733 }
734
735 DCHECK(h_class->IsVerified() || h_class->IsErroneous())
736 << h_class->PrettyDescriptor() << ": state=" << h_class->GetStatus();
737
738 if (h_class->IsVerified()) {
739 verifier_deps.RecordClassVerified(*dex_file, class_def);
740 }
741 }
742 }
743
744 // Delete old vdex files if there are too many in the folder.
745 if (!UnlinkLeastRecentlyUsedVdexIfNeeded(vdex_path_, &error_msg)) {
746 LOG(ERROR) << "Could not unlink old vdex files " << vdex_path_ << ": " << error_msg;
747 return;
748 }
749
750 // Construct a vdex file and write `verifier_deps` into it.
751 if (!VdexFile::WriteToDisk(vdex_path_,
752 dex_files_,
753 verifier_deps,
754 &error_msg)) {
755 LOG(ERROR) << "Could not write anonymous vdex " << vdex_path_ << ": " << error_msg;
756 return;
757 }
758 }
759
Finalize()760 void Finalize() override {
761 delete this;
762 }
763
764 private:
765 const std::vector<const DexFile*> dex_files_;
766 jobject class_loader_;
767 const std::string vdex_path_;
768
769 DISALLOW_COPY_AND_ASSIGN(BackgroundVerificationTask);
770 };
771
RunBackgroundVerification(const std::vector<const DexFile * > & dex_files,jobject class_loader)772 void OatFileManager::RunBackgroundVerification(const std::vector<const DexFile*>& dex_files,
773 jobject class_loader) {
774 Runtime* const runtime = Runtime::Current();
775 Thread* const self = Thread::Current();
776
777 if (runtime->IsJavaDebuggable()) {
778 // Threads created by ThreadPool ("runtime threads") are not allowed to load
779 // classes when debuggable to match class-initialization semantics
780 // expectations. Do not verify in the background.
781 return;
782 }
783
784 {
785 // Temporarily create a class loader context to see if we recognize the
786 // chain.
787 std::unique_ptr<ClassLoaderContext> context(
788 ClassLoaderContext::CreateContextForClassLoader(class_loader, nullptr));
789 if (context == nullptr) {
790 // We only run background verification for class loaders we know the lookup
791 // chain. Because the background verification runs on runtime threads,
792 // which do not call Java, we won't be able to load classes when
793 // verifying, which is something the current verifier relies on.
794 return;
795 }
796 }
797
798 if (!IsSdkVersionSetAndAtLeast(runtime->GetTargetSdkVersion(), SdkVersion::kQ)) {
799 // Do not run for legacy apps as they may depend on the previous class loader behaviour.
800 return;
801 }
802
803 if (runtime->IsShuttingDown(self)) {
804 // Not allowed to create new threads during runtime shutdown.
805 return;
806 }
807
808 if (dex_files.size() < 1) {
809 // Nothing to verify.
810 return;
811 }
812
813 std::string dex_location = dex_files[0]->GetLocation();
814 const std::string& data_dir = Runtime::Current()->GetProcessDataDirectory();
815 if (!android::base::StartsWith(dex_location, data_dir)) {
816 // For now, we only run background verification for secondary dex files.
817 // Running it for primary or split APKs could have some undesirable
818 // side-effects, like overloading the device on app startup.
819 return;
820 }
821
822 std::string error_msg;
823 std::string odex_filename;
824 if (!OatFileAssistant::DexLocationToOdexFilename(dex_location,
825 kRuntimeISA,
826 &odex_filename,
827 &error_msg)) {
828 LOG(WARNING) << "Could not get odex filename for " << dex_location << ": " << error_msg;
829 return;
830 }
831
832 if (LocationIsOnArtApexData(odex_filename) && Runtime::Current()->DenyArtApexDataFiles()) {
833 // Ignore vdex file associated with this odex file as the odex file is not trustworthy.
834 return;
835 }
836
837 {
838 WriterMutexLock mu(self, *Locks::oat_file_manager_lock_);
839 if (verification_thread_pool_ == nullptr) {
840 verification_thread_pool_.reset(
841 new ThreadPool("Verification thread pool", /* num_threads= */ 1));
842 verification_thread_pool_->StartWorkers(self);
843 }
844 }
845 verification_thread_pool_->AddTask(self, new BackgroundVerificationTask(
846 dex_files,
847 class_loader,
848 GetVdexFilename(odex_filename)));
849 }
850
WaitForWorkersToBeCreated()851 void OatFileManager::WaitForWorkersToBeCreated() {
852 DCHECK(!Runtime::Current()->IsShuttingDown(Thread::Current()))
853 << "Cannot create new threads during runtime shutdown";
854 if (verification_thread_pool_ != nullptr) {
855 verification_thread_pool_->WaitForWorkersToBeCreated();
856 }
857 }
858
DeleteThreadPool()859 void OatFileManager::DeleteThreadPool() {
860 verification_thread_pool_.reset(nullptr);
861 }
862
WaitForBackgroundVerificationTasksToFinish()863 void OatFileManager::WaitForBackgroundVerificationTasksToFinish() {
864 if (verification_thread_pool_ == nullptr) {
865 return;
866 }
867
868 Thread* const self = Thread::Current();
869 verification_thread_pool_->Wait(self, /* do_work= */ true, /* may_hold_locks= */ false);
870 }
871
WaitForBackgroundVerificationTasks()872 void OatFileManager::WaitForBackgroundVerificationTasks() {
873 if (verification_thread_pool_ != nullptr) {
874 Thread* const self = Thread::Current();
875 verification_thread_pool_->WaitForWorkersToBeCreated();
876 verification_thread_pool_->Wait(self, /* do_work= */ true, /* may_hold_locks= */ false);
877 }
878 }
879
ClearOnlyUseTrustedOatFiles()880 void OatFileManager::ClearOnlyUseTrustedOatFiles() {
881 only_use_system_oat_files_ = false;
882 }
883
SetOnlyUseTrustedOatFiles()884 void OatFileManager::SetOnlyUseTrustedOatFiles() {
885 ReaderMutexLock mu(Thread::Current(), *Locks::oat_file_manager_lock_);
886 if (!oat_files_.empty()) {
887 LOG(FATAL) << "Unexpected non-empty loaded oat files ";
888 }
889 only_use_system_oat_files_ = true;
890 }
891
DumpForSigQuit(std::ostream & os)892 void OatFileManager::DumpForSigQuit(std::ostream& os) {
893 ReaderMutexLock mu(Thread::Current(), *Locks::oat_file_manager_lock_);
894 std::vector<const OatFile*> boot_oat_files = GetBootOatFiles();
895 for (const std::unique_ptr<const OatFile>& oat_file : oat_files_) {
896 if (ContainsElement(boot_oat_files, oat_file.get())) {
897 continue;
898 }
899 os << oat_file->GetLocation() << ": " << oat_file->GetCompilerFilter() << "\n";
900 }
901 }
902
ContainsPc(const void * code)903 bool OatFileManager::ContainsPc(const void* code) {
904 ReaderMutexLock mu(Thread::Current(), *Locks::oat_file_manager_lock_);
905 std::vector<const OatFile*> boot_oat_files = GetBootOatFiles();
906 for (const std::unique_ptr<const OatFile>& oat_file : oat_files_) {
907 if (oat_file->Contains(code)) {
908 return true;
909 }
910 }
911 return false;
912 }
913
914 } // namespace art
915