1 /*
2 * Copyright (C) 2013 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17 #include "verification_results.h"
18
19 #include "base/logging.h"
20 #include "base/mutex-inl.h"
21 #include "base/stl_util.h"
22 #include "driver/compiler_driver.h"
23 #include "driver/compiler_options.h"
24 #include "runtime.h"
25 #include "thread.h"
26 #include "thread-current-inl.h"
27 #include "utils/atomic_dex_ref_map-inl.h"
28 #include "verified_method.h"
29 #include "verifier/method_verifier-inl.h"
30
31 namespace art {
32
VerificationResults(const CompilerOptions * compiler_options)33 VerificationResults::VerificationResults(const CompilerOptions* compiler_options)
34 : compiler_options_(compiler_options),
35 verified_methods_lock_("compiler verified methods lock"),
36 rejected_classes_lock_("compiler rejected classes lock") {}
37
~VerificationResults()38 VerificationResults::~VerificationResults() {
39 WriterMutexLock mu(Thread::Current(), verified_methods_lock_);
40 STLDeleteValues(&verified_methods_);
41 atomic_verified_methods_.Visit([](const DexFileReference& ref ATTRIBUTE_UNUSED,
42 const VerifiedMethod* method) {
43 delete method;
44 });
45 }
46
ProcessVerifiedMethod(verifier::MethodVerifier * method_verifier)47 void VerificationResults::ProcessVerifiedMethod(verifier::MethodVerifier* method_verifier) {
48 DCHECK(method_verifier != nullptr);
49 if (!compiler_options_->IsAnyCompilationEnabled()) {
50 // Verified methods are only required for quickening and compilation.
51 return;
52 }
53 MethodReference ref = method_verifier->GetMethodReference();
54 std::unique_ptr<const VerifiedMethod> verified_method(VerifiedMethod::Create(method_verifier));
55 if (verified_method == nullptr) {
56 // We'll punt this later.
57 return;
58 }
59 AtomicMap::InsertResult result = atomic_verified_methods_.Insert(
60 DexFileReference(ref.dex_file, ref.dex_method_index),
61 /*expected*/ nullptr,
62 verified_method.get());
63 const VerifiedMethod* existing = nullptr;
64 bool inserted;
65 if (result != AtomicMap::kInsertResultInvalidDexFile) {
66 inserted = (result == AtomicMap::kInsertResultSuccess);
67 if (!inserted) {
68 // Rare case.
69 CHECK(atomic_verified_methods_.Get(DexFileReference(ref.dex_file, ref.dex_method_index),
70 &existing));
71 CHECK_NE(verified_method.get(), existing);
72 }
73 } else {
74 WriterMutexLock mu(Thread::Current(), verified_methods_lock_);
75 auto it = verified_methods_.find(ref);
76 inserted = it == verified_methods_.end();
77 if (inserted) {
78 verified_methods_.Put(ref, verified_method.get());
79 DCHECK(verified_methods_.find(ref) != verified_methods_.end());
80 } else {
81 existing = it->second;
82 }
83 }
84 if (inserted) {
85 // Successfully added, release the unique_ptr since we no longer have ownership.
86 DCHECK_EQ(GetVerifiedMethod(ref), verified_method.get());
87 verified_method.release();
88 } else {
89 // TODO: Investigate why are we doing the work again for this method and try to avoid it.
90 LOG(WARNING) << "Method processed more than once: " << ref.PrettyMethod();
91 if (!Runtime::Current()->UseJitCompilation()) {
92 if (kIsDebugBuild) {
93 auto ex_set = existing->GetSafeCastSet();
94 auto ve_set = verified_method->GetSafeCastSet();
95 CHECK_EQ(ex_set == nullptr, ve_set == nullptr);
96 CHECK((ex_set == nullptr) || (ex_set->size() == ve_set->size()));
97 }
98 }
99 // Let the unique_ptr delete the new verified method since there was already an existing one
100 // registered. It is unsafe to replace the existing one since the JIT may be using it to
101 // generate a native GC map.
102 }
103 }
104
GetVerifiedMethod(MethodReference ref)105 const VerifiedMethod* VerificationResults::GetVerifiedMethod(MethodReference ref) {
106 const VerifiedMethod* ret = nullptr;
107 DCHECK(compiler_options_->IsAnyCompilationEnabled());
108 if (atomic_verified_methods_.Get(DexFileReference(ref.dex_file, ref.dex_method_index), &ret)) {
109 return ret;
110 }
111 ReaderMutexLock mu(Thread::Current(), verified_methods_lock_);
112 auto it = verified_methods_.find(ref);
113 return (it != verified_methods_.end()) ? it->second : nullptr;
114 }
115
CreateVerifiedMethodFor(MethodReference ref)116 void VerificationResults::CreateVerifiedMethodFor(MethodReference ref) {
117 // This method should only be called for classes verified at compile time,
118 // which have no verifier error, nor has methods that we know will throw
119 // at runtime.
120 std::unique_ptr<VerifiedMethod> verified_method = std::make_unique<VerifiedMethod>(
121 /* encountered_error_types */ 0, /* has_runtime_throw */ false);
122 if (atomic_verified_methods_.Insert(DexFileReference(ref.dex_file, ref.dex_method_index),
123 /*expected*/ nullptr,
124 verified_method.get()) ==
125 AtomicMap::InsertResult::kInsertResultSuccess) {
126 verified_method.release();
127 }
128 }
129
AddRejectedClass(ClassReference ref)130 void VerificationResults::AddRejectedClass(ClassReference ref) {
131 {
132 WriterMutexLock mu(Thread::Current(), rejected_classes_lock_);
133 rejected_classes_.insert(ref);
134 }
135 DCHECK(IsClassRejected(ref));
136 }
137
IsClassRejected(ClassReference ref)138 bool VerificationResults::IsClassRejected(ClassReference ref) {
139 ReaderMutexLock mu(Thread::Current(), rejected_classes_lock_);
140 return (rejected_classes_.find(ref) != rejected_classes_.end());
141 }
142
IsCandidateForCompilation(MethodReference &,const uint32_t access_flags)143 bool VerificationResults::IsCandidateForCompilation(MethodReference&,
144 const uint32_t access_flags) {
145 if (!compiler_options_->IsAotCompilationEnabled()) {
146 return false;
147 }
148 // Don't compile class initializers unless kEverything.
149 if ((compiler_options_->GetCompilerFilter() != CompilerFilter::kEverything) &&
150 ((access_flags & kAccConstructor) != 0) && ((access_flags & kAccStatic) != 0)) {
151 return false;
152 }
153 return true;
154 }
155
AddDexFile(const DexFile * dex_file)156 void VerificationResults::AddDexFile(const DexFile* dex_file) {
157 atomic_verified_methods_.AddDexFile(dex_file, dex_file->NumMethodIds());
158 WriterMutexLock mu(Thread::Current(), verified_methods_lock_);
159 // There can be some verified methods that are already registered for the dex_file since we set
160 // up well known classes earlier. Remove these and put them in the array so that we don't
161 // accidentally miss seeing them.
162 for (auto it = verified_methods_.begin(); it != verified_methods_.end(); ) {
163 MethodReference ref = it->first;
164 if (ref.dex_file == dex_file) {
165 CHECK(atomic_verified_methods_.Insert(DexFileReference(ref.dex_file, ref.dex_method_index),
166 nullptr,
167 it->second) ==
168 AtomicMap::kInsertResultSuccess);
169 it = verified_methods_.erase(it);
170 } else {
171 ++it;
172 }
173 }
174 }
175
176 } // namespace art
177