1/*
2 * Copyright (C) 2011 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 *      http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include "image_space.h"
18
19#include <dirent.h>
20#include <sys/statvfs.h>
21#include <sys/types.h>
22#include <unistd.h>
23
24#include <random>
25
26#include "art_method.h"
27#include "base/macros.h"
28#include "base/stl_util.h"
29#include "base/scoped_flock.h"
30#include "base/time_utils.h"
31#include "base/unix_file/fd_file.h"
32#include "gc/accounting/space_bitmap-inl.h"
33#include "mirror/class-inl.h"
34#include "mirror/object-inl.h"
35#include "oat_file.h"
36#include "os.h"
37#include "space-inl.h"
38#include "utils.h"
39
40namespace art {
41namespace gc {
42namespace space {
43
44Atomic<uint32_t> ImageSpace::bitmap_index_(0);
45
46ImageSpace::ImageSpace(const std::string& image_filename, const char* image_location,
47                       MemMap* mem_map, accounting::ContinuousSpaceBitmap* live_bitmap,
48                       uint8_t* end)
49    : MemMapSpace(image_filename, mem_map, mem_map->Begin(), end, end,
50                  kGcRetentionPolicyNeverCollect),
51      image_location_(image_location) {
52  DCHECK(live_bitmap != nullptr);
53  live_bitmap_.reset(live_bitmap);
54}
55
56static int32_t ChooseRelocationOffsetDelta(int32_t min_delta, int32_t max_delta) {
57  CHECK_ALIGNED(min_delta, kPageSize);
58  CHECK_ALIGNED(max_delta, kPageSize);
59  CHECK_LT(min_delta, max_delta);
60
61  std::default_random_engine generator;
62  generator.seed(NanoTime() * getpid());
63  std::uniform_int_distribution<int32_t> distribution(min_delta, max_delta);
64  int32_t r = distribution(generator);
65  if (r % 2 == 0) {
66    r = RoundUp(r, kPageSize);
67  } else {
68    r = RoundDown(r, kPageSize);
69  }
70  CHECK_LE(min_delta, r);
71  CHECK_GE(max_delta, r);
72  CHECK_ALIGNED(r, kPageSize);
73  return r;
74}
75
76// We are relocating or generating the core image. We should get rid of everything. It is all
77// out-of-date. We also don't really care if this fails since it is just a convenience.
78// Adapted from prune_dex_cache(const char* subdir) in frameworks/native/cmds/installd/commands.c
79// Note this should only be used during first boot.
80static void RealPruneDalvikCache(const std::string& cache_dir_path);
81
82static void PruneDalvikCache(InstructionSet isa) {
83  CHECK_NE(isa, kNone);
84  // Prune the base /data/dalvik-cache.
85  RealPruneDalvikCache(GetDalvikCacheOrDie(".", false));
86  // Prune /data/dalvik-cache/<isa>.
87  RealPruneDalvikCache(GetDalvikCacheOrDie(GetInstructionSetString(isa), false));
88}
89
90static void RealPruneDalvikCache(const std::string& cache_dir_path) {
91  if (!OS::DirectoryExists(cache_dir_path.c_str())) {
92    return;
93  }
94  DIR* cache_dir = opendir(cache_dir_path.c_str());
95  if (cache_dir == nullptr) {
96    PLOG(WARNING) << "Unable to open " << cache_dir_path << " to delete it's contents";
97    return;
98  }
99
100  for (struct dirent* de = readdir(cache_dir); de != nullptr; de = readdir(cache_dir)) {
101    const char* name = de->d_name;
102    if (strcmp(name, ".") == 0 || strcmp(name, "..") == 0) {
103      continue;
104    }
105    // We only want to delete regular files and symbolic links.
106    if (de->d_type != DT_REG && de->d_type != DT_LNK) {
107      if (de->d_type != DT_DIR) {
108        // We do expect some directories (namely the <isa> for pruning the base dalvik-cache).
109        LOG(WARNING) << "Unexpected file type of " << std::hex << de->d_type << " encountered.";
110      }
111      continue;
112    }
113    std::string cache_file(cache_dir_path);
114    cache_file += '/';
115    cache_file += name;
116    if (TEMP_FAILURE_RETRY(unlink(cache_file.c_str())) != 0) {
117      PLOG(ERROR) << "Unable to unlink " << cache_file;
118      continue;
119    }
120  }
121  CHECK_EQ(0, TEMP_FAILURE_RETRY(closedir(cache_dir))) << "Unable to close directory.";
122}
123
124// We write out an empty file to the zygote's ISA specific cache dir at the start of
125// every zygote boot and delete it when the boot completes. If we find a file already
126// present, it usually means the boot didn't complete. We wipe the entire dalvik
127// cache if that's the case.
128static void MarkZygoteStart(const InstructionSet isa, const uint32_t max_failed_boots) {
129  const std::string isa_subdir = GetDalvikCacheOrDie(GetInstructionSetString(isa), false);
130  const std::string boot_marker = isa_subdir + "/.booting";
131  const char* file_name = boot_marker.c_str();
132
133  uint32_t num_failed_boots = 0;
134  std::unique_ptr<File> file(OS::OpenFileReadWrite(file_name));
135  if (file.get() == nullptr) {
136    file.reset(OS::CreateEmptyFile(file_name));
137
138    if (file.get() == nullptr) {
139      PLOG(WARNING) << "Failed to create boot marker.";
140      return;
141    }
142  } else {
143    if (!file->ReadFully(&num_failed_boots, sizeof(num_failed_boots))) {
144      PLOG(WARNING) << "Failed to read boot marker.";
145      file->Erase();
146      return;
147    }
148  }
149
150  if (max_failed_boots != 0 && num_failed_boots > max_failed_boots) {
151    LOG(WARNING) << "Incomplete boot detected. Pruning dalvik cache";
152    RealPruneDalvikCache(isa_subdir);
153  }
154
155  ++num_failed_boots;
156  VLOG(startup) << "Number of failed boots on : " << boot_marker << " = " << num_failed_boots;
157
158  if (lseek(file->Fd(), 0, SEEK_SET) == -1) {
159    PLOG(WARNING) << "Failed to write boot marker.";
160    file->Erase();
161    return;
162  }
163
164  if (!file->WriteFully(&num_failed_boots, sizeof(num_failed_boots))) {
165    PLOG(WARNING) << "Failed to write boot marker.";
166    file->Erase();
167    return;
168  }
169
170  if (file->FlushCloseOrErase() != 0) {
171    PLOG(WARNING) << "Failed to flush boot marker.";
172  }
173}
174
175static bool GenerateImage(const std::string& image_filename, InstructionSet image_isa,
176                          std::string* error_msg) {
177  const std::string boot_class_path_string(Runtime::Current()->GetBootClassPathString());
178  std::vector<std::string> boot_class_path;
179  Split(boot_class_path_string, ':', &boot_class_path);
180  if (boot_class_path.empty()) {
181    *error_msg = "Failed to generate image because no boot class path specified";
182    return false;
183  }
184  // We should clean up so we are more likely to have room for the image.
185  if (Runtime::Current()->IsZygote()) {
186    LOG(INFO) << "Pruning dalvik-cache since we are generating an image and will need to recompile";
187    PruneDalvikCache(image_isa);
188  }
189
190  std::vector<std::string> arg_vector;
191
192  std::string dex2oat(Runtime::Current()->GetCompilerExecutable());
193  arg_vector.push_back(dex2oat);
194
195  std::string image_option_string("--image=");
196  image_option_string += image_filename;
197  arg_vector.push_back(image_option_string);
198
199  for (size_t i = 0; i < boot_class_path.size(); i++) {
200    arg_vector.push_back(std::string("--dex-file=") + boot_class_path[i]);
201  }
202
203  std::string oat_file_option_string("--oat-file=");
204  oat_file_option_string += ImageHeader::GetOatLocationFromImageLocation(image_filename);
205  arg_vector.push_back(oat_file_option_string);
206
207  // Note: we do not generate a fully debuggable boot image so we do not pass the
208  // compiler flag --debuggable here.
209
210  Runtime::Current()->AddCurrentRuntimeFeaturesAsDex2OatArguments(&arg_vector);
211  CHECK_EQ(image_isa, kRuntimeISA)
212      << "We should always be generating an image for the current isa.";
213
214  int32_t base_offset = ChooseRelocationOffsetDelta(ART_BASE_ADDRESS_MIN_DELTA,
215                                                    ART_BASE_ADDRESS_MAX_DELTA);
216  LOG(INFO) << "Using an offset of 0x" << std::hex << base_offset << " from default "
217            << "art base address of 0x" << std::hex << ART_BASE_ADDRESS;
218  arg_vector.push_back(StringPrintf("--base=0x%x", ART_BASE_ADDRESS + base_offset));
219
220  if (!kIsTargetBuild) {
221    arg_vector.push_back("--host");
222  }
223
224  const std::vector<std::string>& compiler_options = Runtime::Current()->GetImageCompilerOptions();
225  for (size_t i = 0; i < compiler_options.size(); ++i) {
226    arg_vector.push_back(compiler_options[i].c_str());
227  }
228
229  std::string command_line(Join(arg_vector, ' '));
230  LOG(INFO) << "GenerateImage: " << command_line;
231  return Exec(arg_vector, error_msg);
232}
233
234bool ImageSpace::FindImageFilename(const char* image_location,
235                                   const InstructionSet image_isa,
236                                   std::string* system_filename,
237                                   bool* has_system,
238                                   std::string* cache_filename,
239                                   bool* dalvik_cache_exists,
240                                   bool* has_cache,
241                                   bool* is_global_cache) {
242  *has_system = false;
243  *has_cache = false;
244  // image_location = /system/framework/boot.art
245  // system_image_location = /system/framework/<image_isa>/boot.art
246  std::string system_image_filename(GetSystemImageFilename(image_location, image_isa));
247  if (OS::FileExists(system_image_filename.c_str())) {
248    *system_filename = system_image_filename;
249    *has_system = true;
250  }
251
252  bool have_android_data = false;
253  *dalvik_cache_exists = false;
254  std::string dalvik_cache;
255  GetDalvikCache(GetInstructionSetString(image_isa), true, &dalvik_cache,
256                 &have_android_data, dalvik_cache_exists, is_global_cache);
257
258  if (have_android_data && *dalvik_cache_exists) {
259    // Always set output location even if it does not exist,
260    // so that the caller knows where to create the image.
261    //
262    // image_location = /system/framework/boot.art
263    // *image_filename = /data/dalvik-cache/<image_isa>/boot.art
264    std::string error_msg;
265    if (!GetDalvikCacheFilename(image_location, dalvik_cache.c_str(), cache_filename, &error_msg)) {
266      LOG(WARNING) << error_msg;
267      return *has_system;
268    }
269    *has_cache = OS::FileExists(cache_filename->c_str());
270  }
271  return *has_system || *has_cache;
272}
273
274static bool ReadSpecificImageHeader(const char* filename, ImageHeader* image_header) {
275    std::unique_ptr<File> image_file(OS::OpenFileForReading(filename));
276    if (image_file.get() == nullptr) {
277      return false;
278    }
279    const bool success = image_file->ReadFully(image_header, sizeof(ImageHeader));
280    if (!success || !image_header->IsValid()) {
281      return false;
282    }
283    return true;
284}
285
286// Relocate the image at image_location to dest_filename and relocate it by a random amount.
287static bool RelocateImage(const char* image_location, const char* dest_filename,
288                               InstructionSet isa, std::string* error_msg) {
289  // We should clean up so we are more likely to have room for the image.
290  if (Runtime::Current()->IsZygote()) {
291    LOG(INFO) << "Pruning dalvik-cache since we are relocating an image and will need to recompile";
292    PruneDalvikCache(isa);
293  }
294
295  std::string patchoat(Runtime::Current()->GetPatchoatExecutable());
296
297  std::string input_image_location_arg("--input-image-location=");
298  input_image_location_arg += image_location;
299
300  std::string output_image_filename_arg("--output-image-file=");
301  output_image_filename_arg += dest_filename;
302
303  std::string input_oat_location_arg("--input-oat-location=");
304  input_oat_location_arg += ImageHeader::GetOatLocationFromImageLocation(image_location);
305
306  std::string output_oat_filename_arg("--output-oat-file=");
307  output_oat_filename_arg += ImageHeader::GetOatLocationFromImageLocation(dest_filename);
308
309  std::string instruction_set_arg("--instruction-set=");
310  instruction_set_arg += GetInstructionSetString(isa);
311
312  std::string base_offset_arg("--base-offset-delta=");
313  StringAppendF(&base_offset_arg, "%d", ChooseRelocationOffsetDelta(ART_BASE_ADDRESS_MIN_DELTA,
314                                                                    ART_BASE_ADDRESS_MAX_DELTA));
315
316  std::vector<std::string> argv;
317  argv.push_back(patchoat);
318
319  argv.push_back(input_image_location_arg);
320  argv.push_back(output_image_filename_arg);
321
322  argv.push_back(input_oat_location_arg);
323  argv.push_back(output_oat_filename_arg);
324
325  argv.push_back(instruction_set_arg);
326  argv.push_back(base_offset_arg);
327
328  std::string command_line(Join(argv, ' '));
329  LOG(INFO) << "RelocateImage: " << command_line;
330  return Exec(argv, error_msg);
331}
332
333static ImageHeader* ReadSpecificImageHeader(const char* filename, std::string* error_msg) {
334  std::unique_ptr<ImageHeader> hdr(new ImageHeader);
335  if (!ReadSpecificImageHeader(filename, hdr.get())) {
336    *error_msg = StringPrintf("Unable to read image header for %s", filename);
337    return nullptr;
338  }
339  return hdr.release();
340}
341
342ImageHeader* ImageSpace::ReadImageHeaderOrDie(const char* image_location,
343                                              const InstructionSet image_isa) {
344  std::string error_msg;
345  ImageHeader* image_header = ReadImageHeader(image_location, image_isa, &error_msg);
346  if (image_header == nullptr) {
347    LOG(FATAL) << error_msg;
348  }
349  return image_header;
350}
351
352ImageHeader* ImageSpace::ReadImageHeader(const char* image_location,
353                                         const InstructionSet image_isa,
354                                         std::string* error_msg) {
355  std::string system_filename;
356  bool has_system = false;
357  std::string cache_filename;
358  bool has_cache = false;
359  bool dalvik_cache_exists = false;
360  bool is_global_cache = false;
361  if (FindImageFilename(image_location, image_isa, &system_filename, &has_system,
362                        &cache_filename, &dalvik_cache_exists, &has_cache, &is_global_cache)) {
363    if (Runtime::Current()->ShouldRelocate()) {
364      if (has_system && has_cache) {
365        std::unique_ptr<ImageHeader> sys_hdr(new ImageHeader);
366        std::unique_ptr<ImageHeader> cache_hdr(new ImageHeader);
367        if (!ReadSpecificImageHeader(system_filename.c_str(), sys_hdr.get())) {
368          *error_msg = StringPrintf("Unable to read image header for %s at %s",
369                                    image_location, system_filename.c_str());
370          return nullptr;
371        }
372        if (!ReadSpecificImageHeader(cache_filename.c_str(), cache_hdr.get())) {
373          *error_msg = StringPrintf("Unable to read image header for %s at %s",
374                                    image_location, cache_filename.c_str());
375          return nullptr;
376        }
377        if (sys_hdr->GetOatChecksum() != cache_hdr->GetOatChecksum()) {
378          *error_msg = StringPrintf("Unable to find a relocated version of image file %s",
379                                    image_location);
380          return nullptr;
381        }
382        return cache_hdr.release();
383      } else if (!has_cache) {
384        *error_msg = StringPrintf("Unable to find a relocated version of image file %s",
385                                  image_location);
386        return nullptr;
387      } else if (!has_system && has_cache) {
388        // This can probably just use the cache one.
389        return ReadSpecificImageHeader(cache_filename.c_str(), error_msg);
390      }
391    } else {
392      // We don't want to relocate, Just pick the appropriate one if we have it and return.
393      if (has_system && has_cache) {
394        // We want the cache if the checksum matches, otherwise the system.
395        std::unique_ptr<ImageHeader> system(ReadSpecificImageHeader(system_filename.c_str(),
396                                                                    error_msg));
397        std::unique_ptr<ImageHeader> cache(ReadSpecificImageHeader(cache_filename.c_str(),
398                                                                   error_msg));
399        if (system.get() == nullptr ||
400            (cache.get() != nullptr && cache->GetOatChecksum() == system->GetOatChecksum())) {
401          return cache.release();
402        } else {
403          return system.release();
404        }
405      } else if (has_system) {
406        return ReadSpecificImageHeader(system_filename.c_str(), error_msg);
407      } else if (has_cache) {
408        return ReadSpecificImageHeader(cache_filename.c_str(), error_msg);
409      }
410    }
411  }
412
413  *error_msg = StringPrintf("Unable to find image file for %s", image_location);
414  return nullptr;
415}
416
417static bool ChecksumsMatch(const char* image_a, const char* image_b) {
418  ImageHeader hdr_a;
419  ImageHeader hdr_b;
420  return ReadSpecificImageHeader(image_a, &hdr_a) && ReadSpecificImageHeader(image_b, &hdr_b)
421      && hdr_a.GetOatChecksum() == hdr_b.GetOatChecksum();
422}
423
424static bool ImageCreationAllowed(bool is_global_cache, std::string* error_msg) {
425  // Anyone can write into a "local" cache.
426  if (!is_global_cache) {
427    return true;
428  }
429
430  // Only the zygote is allowed to create the global boot image.
431  if (Runtime::Current()->IsZygote()) {
432    return true;
433  }
434
435  *error_msg = "Only the zygote can create the global boot image.";
436  return false;
437}
438
439static constexpr uint64_t kLowSpaceValue = 50 * MB;
440static constexpr uint64_t kTmpFsSentinelValue = 384 * MB;
441
442// Read the free space of the cache partition and make a decision whether to keep the generated
443// image. This is to try to mitigate situations where the system might run out of space later.
444static bool CheckSpace(const std::string& cache_filename, std::string* error_msg) {
445  // Using statvfs vs statvfs64 because of b/18207376, and it is enough for all practical purposes.
446  struct statvfs buf;
447
448  int res = TEMP_FAILURE_RETRY(statvfs(cache_filename.c_str(), &buf));
449  if (res != 0) {
450    // Could not stat. Conservatively tell the system to delete the image.
451    *error_msg = "Could not stat the filesystem, assuming low-memory situation.";
452    return false;
453  }
454
455  uint64_t fs_overall_size = buf.f_bsize * static_cast<uint64_t>(buf.f_blocks);
456  // Zygote is privileged, but other things are not. Use bavail.
457  uint64_t fs_free_size = buf.f_bsize * static_cast<uint64_t>(buf.f_bavail);
458
459  // Take the overall size as an indicator for a tmpfs, which is being used for the decryption
460  // environment. We do not want to fail quickening the boot image there, as it is beneficial
461  // for time-to-UI.
462  if (fs_overall_size > kTmpFsSentinelValue) {
463    if (fs_free_size < kLowSpaceValue) {
464      *error_msg = StringPrintf("Low-memory situation: only %4.2f megabytes available after image"
465                                " generation, need at least %" PRIu64 ".",
466                                static_cast<double>(fs_free_size) / MB,
467                                kLowSpaceValue / MB);
468      return false;
469    }
470  }
471  return true;
472}
473
474ImageSpace* ImageSpace::Create(const char* image_location,
475                               const InstructionSet image_isa,
476                               std::string* error_msg) {
477  std::string system_filename;
478  bool has_system = false;
479  std::string cache_filename;
480  bool has_cache = false;
481  bool dalvik_cache_exists = false;
482  bool is_global_cache = true;
483  const bool found_image = FindImageFilename(image_location, image_isa, &system_filename,
484                                             &has_system, &cache_filename, &dalvik_cache_exists,
485                                             &has_cache, &is_global_cache);
486
487  if (Runtime::Current()->IsZygote()) {
488    MarkZygoteStart(image_isa, Runtime::Current()->GetZygoteMaxFailedBoots());
489  }
490
491  ImageSpace* space;
492  bool relocate = Runtime::Current()->ShouldRelocate();
493  bool can_compile = Runtime::Current()->IsImageDex2OatEnabled();
494  if (found_image) {
495    const std::string* image_filename;
496    bool is_system = false;
497    bool relocated_version_used = false;
498    if (relocate) {
499      if (!dalvik_cache_exists) {
500        *error_msg = StringPrintf("Requiring relocation for image '%s' at '%s' but we do not have "
501                                  "any dalvik_cache to find/place it in.",
502                                  image_location, system_filename.c_str());
503        return nullptr;
504      }
505      if (has_system) {
506        if (has_cache && ChecksumsMatch(system_filename.c_str(), cache_filename.c_str())) {
507          // We already have a relocated version
508          image_filename = &cache_filename;
509          relocated_version_used = true;
510        } else {
511          // We cannot have a relocated version, Relocate the system one and use it.
512
513          std::string reason;
514          bool success;
515
516          // Check whether we are allowed to relocate.
517          if (!can_compile) {
518            reason = "Image dex2oat disabled by -Xnoimage-dex2oat.";
519            success = false;
520          } else if (!ImageCreationAllowed(is_global_cache, &reason)) {
521            // Whether we can write to the cache.
522            success = false;
523          } else {
524            // Try to relocate.
525            success = RelocateImage(image_location, cache_filename.c_str(), image_isa, &reason);
526          }
527
528          if (success) {
529            relocated_version_used = true;
530            image_filename = &cache_filename;
531          } else {
532            *error_msg = StringPrintf("Unable to relocate image '%s' from '%s' to '%s': %s",
533                                      image_location, system_filename.c_str(),
534                                      cache_filename.c_str(), reason.c_str());
535            // We failed to create files, remove any possibly garbage output.
536            // Since ImageCreationAllowed was true above, we are the zygote
537            // and therefore the only process expected to generate these for
538            // the device.
539            PruneDalvikCache(image_isa);
540            return nullptr;
541          }
542        }
543      } else {
544        CHECK(has_cache);
545        // We can just use cache's since it should be fine. This might or might not be relocated.
546        image_filename = &cache_filename;
547      }
548    } else {
549      if (has_system && has_cache) {
550        // Check they have the same cksum. If they do use the cache. Otherwise system.
551        if (ChecksumsMatch(system_filename.c_str(), cache_filename.c_str())) {
552          image_filename = &cache_filename;
553          relocated_version_used = true;
554        } else {
555          image_filename = &system_filename;
556          is_system = true;
557        }
558      } else if (has_system) {
559        image_filename = &system_filename;
560        is_system = true;
561      } else {
562        CHECK(has_cache);
563        image_filename = &cache_filename;
564      }
565    }
566    {
567      // Note that we must not use the file descriptor associated with
568      // ScopedFlock::GetFile to Init the image file. We want the file
569      // descriptor (and the associated exclusive lock) to be released when
570      // we leave Create.
571      ScopedFlock image_lock;
572      image_lock.Init(image_filename->c_str(), error_msg);
573      VLOG(startup) << "Using image file " << image_filename->c_str() << " for image location "
574                    << image_location;
575      // If we are in /system we can assume the image is good. We can also
576      // assume this if we are using a relocated image (i.e. image checksum
577      // matches) since this is only different by the offset. We need this to
578      // make sure that host tests continue to work.
579      space = ImageSpace::Init(image_filename->c_str(), image_location,
580                               !(is_system || relocated_version_used), error_msg);
581    }
582    if (space != nullptr) {
583      return space;
584    }
585
586    if (relocated_version_used) {
587      // Something is wrong with the relocated copy (even though checksums match). Cleanup.
588      // This can happen if the .oat is corrupt, since the above only checks the .art checksums.
589      // TODO: Check the oat file validity earlier.
590      *error_msg = StringPrintf("Attempted to use relocated version of %s at %s generated from %s "
591                                "but image failed to load: %s",
592                                image_location, cache_filename.c_str(), system_filename.c_str(),
593                                error_msg->c_str());
594      PruneDalvikCache(image_isa);
595      return nullptr;
596    } else if (is_system) {
597      // If the /system file exists, it should be up-to-date, don't try to generate it.
598      *error_msg = StringPrintf("Failed to load /system image '%s': %s",
599                                image_filename->c_str(), error_msg->c_str());
600      return nullptr;
601    } else {
602      // Otherwise, log a warning and fall through to GenerateImage.
603      LOG(WARNING) << *error_msg;
604    }
605  }
606
607  if (!can_compile) {
608    *error_msg = "Not attempting to compile image because -Xnoimage-dex2oat";
609    return nullptr;
610  } else if (!dalvik_cache_exists) {
611    *error_msg = StringPrintf("No place to put generated image.");
612    return nullptr;
613  } else if (!ImageCreationAllowed(is_global_cache, error_msg)) {
614    return nullptr;
615  } else if (!GenerateImage(cache_filename, image_isa, error_msg)) {
616    *error_msg = StringPrintf("Failed to generate image '%s': %s",
617                              cache_filename.c_str(), error_msg->c_str());
618    // We failed to create files, remove any possibly garbage output.
619    // Since ImageCreationAllowed was true above, we are the zygote
620    // and therefore the only process expected to generate these for
621    // the device.
622    PruneDalvikCache(image_isa);
623    return nullptr;
624  } else {
625    // Check whether there is enough space left over after we have generated the image.
626    if (!CheckSpace(cache_filename, error_msg)) {
627      // No. Delete the generated image and try to run out of the dex files.
628      PruneDalvikCache(image_isa);
629      return nullptr;
630    }
631
632    // Note that we must not use the file descriptor associated with
633    // ScopedFlock::GetFile to Init the image file. We want the file
634    // descriptor (and the associated exclusive lock) to be released when
635    // we leave Create.
636    ScopedFlock image_lock;
637    image_lock.Init(cache_filename.c_str(), error_msg);
638    space = ImageSpace::Init(cache_filename.c_str(), image_location, true, error_msg);
639    if (space == nullptr) {
640      *error_msg = StringPrintf("Failed to load generated image '%s': %s",
641                                cache_filename.c_str(), error_msg->c_str());
642    }
643    return space;
644  }
645}
646
647void ImageSpace::VerifyImageAllocations() {
648  uint8_t* current = Begin() + RoundUp(sizeof(ImageHeader), kObjectAlignment);
649  while (current < End()) {
650    CHECK_ALIGNED(current, kObjectAlignment);
651    auto* obj = reinterpret_cast<mirror::Object*>(current);
652    CHECK(obj->GetClass() != nullptr) << "Image object at address " << obj << " has null class";
653    CHECK(live_bitmap_->Test(obj)) << PrettyTypeOf(obj);
654    if (kUseBakerOrBrooksReadBarrier) {
655      obj->AssertReadBarrierPointer();
656    }
657    current += RoundUp(obj->SizeOf(), kObjectAlignment);
658  }
659}
660
661ImageSpace* ImageSpace::Init(const char* image_filename, const char* image_location,
662                             bool validate_oat_file, std::string* error_msg) {
663  CHECK(image_filename != nullptr);
664  CHECK(image_location != nullptr);
665
666  uint64_t start_time = 0;
667  if (VLOG_IS_ON(heap) || VLOG_IS_ON(startup)) {
668    start_time = NanoTime();
669    LOG(INFO) << "ImageSpace::Init entering image_filename=" << image_filename;
670  }
671
672  std::unique_ptr<File> file(OS::OpenFileForReading(image_filename));
673  if (file.get() == nullptr) {
674    *error_msg = StringPrintf("Failed to open '%s'", image_filename);
675    return nullptr;
676  }
677  ImageHeader image_header;
678  bool success = file->ReadFully(&image_header, sizeof(image_header));
679  if (!success || !image_header.IsValid()) {
680    *error_msg = StringPrintf("Invalid image header in '%s'", image_filename);
681    return nullptr;
682  }
683  // Check that the file is large enough.
684  uint64_t image_file_size = static_cast<uint64_t>(file->GetLength());
685  if (image_header.GetImageSize() > image_file_size) {
686    *error_msg = StringPrintf("Image file too small for image heap: %" PRIu64 " vs. %zu.",
687                              image_file_size, image_header.GetImageSize());
688    return nullptr;
689  }
690
691  if (kIsDebugBuild) {
692    LOG(INFO) << "Dumping image sections";
693    for (size_t i = 0; i < ImageHeader::kSectionCount; ++i) {
694      const auto section_idx = static_cast<ImageHeader::ImageSections>(i);
695      auto& section = image_header.GetImageSection(section_idx);
696      LOG(INFO) << section_idx << " start="
697          << reinterpret_cast<void*>(image_header.GetImageBegin() + section.Offset()) << " "
698          << section;
699    }
700  }
701
702  const auto& bitmap_section = image_header.GetImageSection(ImageHeader::kSectionImageBitmap);
703  auto end_of_bitmap = static_cast<size_t>(bitmap_section.End());
704  if (end_of_bitmap != image_file_size) {
705    *error_msg = StringPrintf(
706        "Image file size does not equal end of bitmap: size=%" PRIu64 " vs. %zu.", image_file_size,
707        end_of_bitmap);
708    return nullptr;
709  }
710
711  // Note: The image header is part of the image due to mmap page alignment required of offset.
712  std::unique_ptr<MemMap> map(MemMap::MapFileAtAddress(
713      image_header.GetImageBegin(), image_header.GetImageSize(),
714      PROT_READ | PROT_WRITE, MAP_PRIVATE, file->Fd(), 0, false, image_filename, error_msg));
715  if (map.get() == nullptr) {
716    DCHECK(!error_msg->empty());
717    return nullptr;
718  }
719  CHECK_EQ(image_header.GetImageBegin(), map->Begin());
720  DCHECK_EQ(0, memcmp(&image_header, map->Begin(), sizeof(ImageHeader)));
721
722  std::unique_ptr<MemMap> image_map(MemMap::MapFileAtAddress(
723      nullptr, bitmap_section.Size(), PROT_READ, MAP_PRIVATE, file->Fd(),
724      bitmap_section.Offset(), false, image_filename, error_msg));
725  if (image_map.get() == nullptr) {
726    *error_msg = StringPrintf("Failed to map image bitmap: %s", error_msg->c_str());
727    return nullptr;
728  }
729  uint32_t bitmap_index = bitmap_index_.FetchAndAddSequentiallyConsistent(1);
730  std::string bitmap_name(StringPrintf("imagespace %s live-bitmap %u", image_filename,
731                                       bitmap_index));
732  std::unique_ptr<accounting::ContinuousSpaceBitmap> bitmap(
733      accounting::ContinuousSpaceBitmap::CreateFromMemMap(
734          bitmap_name, image_map.release(), reinterpret_cast<uint8_t*>(map->Begin()),
735          accounting::ContinuousSpaceBitmap::ComputeHeapSize(bitmap_section.Size())));
736  if (bitmap.get() == nullptr) {
737    *error_msg = StringPrintf("Could not create bitmap '%s'", bitmap_name.c_str());
738    return nullptr;
739  }
740
741  // We only want the mirror object, not the ArtFields and ArtMethods.
742  uint8_t* const image_end =
743      map->Begin() + image_header.GetImageSection(ImageHeader::kSectionObjects).End();
744  std::unique_ptr<ImageSpace> space(new ImageSpace(image_filename, image_location,
745                                                   map.release(), bitmap.release(), image_end));
746
747  // VerifyImageAllocations() will be called later in Runtime::Init()
748  // as some class roots like ArtMethod::java_lang_reflect_ArtMethod_
749  // and ArtField::java_lang_reflect_ArtField_, which are used from
750  // Object::SizeOf() which VerifyImageAllocations() calls, are not
751  // set yet at this point.
752
753  space->oat_file_.reset(space->OpenOatFile(image_filename, error_msg));
754  if (space->oat_file_.get() == nullptr) {
755    DCHECK(!error_msg->empty());
756    return nullptr;
757  }
758  space->oat_file_non_owned_ = space->oat_file_.get();
759
760  if (validate_oat_file && !space->ValidateOatFile(error_msg)) {
761    DCHECK(!error_msg->empty());
762    return nullptr;
763  }
764
765  Runtime* runtime = Runtime::Current();
766  runtime->SetInstructionSet(space->oat_file_->GetOatHeader().GetInstructionSet());
767
768  runtime->SetResolutionMethod(image_header.GetImageMethod(ImageHeader::kResolutionMethod));
769  runtime->SetImtConflictMethod(image_header.GetImageMethod(ImageHeader::kImtConflictMethod));
770  runtime->SetImtUnimplementedMethod(
771      image_header.GetImageMethod(ImageHeader::kImtUnimplementedMethod));
772  runtime->SetCalleeSaveMethod(
773      image_header.GetImageMethod(ImageHeader::kCalleeSaveMethod), Runtime::kSaveAll);
774  runtime->SetCalleeSaveMethod(
775      image_header.GetImageMethod(ImageHeader::kRefsOnlySaveMethod), Runtime::kRefsOnly);
776  runtime->SetCalleeSaveMethod(
777      image_header.GetImageMethod(ImageHeader::kRefsAndArgsSaveMethod), Runtime::kRefsAndArgs);
778
779  if (VLOG_IS_ON(heap) || VLOG_IS_ON(startup)) {
780    LOG(INFO) << "ImageSpace::Init exiting (" << PrettyDuration(NanoTime() - start_time)
781             << ") " << *space.get();
782  }
783  return space.release();
784}
785
786OatFile* ImageSpace::OpenOatFile(const char* image_path, std::string* error_msg) const {
787  const ImageHeader& image_header = GetImageHeader();
788  std::string oat_filename = ImageHeader::GetOatLocationFromImageLocation(image_path);
789
790  CHECK(image_header.GetOatDataBegin() != nullptr);
791
792  OatFile* oat_file = OatFile::Open(oat_filename, oat_filename, image_header.GetOatDataBegin(),
793                                    image_header.GetOatFileBegin(),
794                                    !Runtime::Current()->IsAotCompiler(),
795                                    nullptr, error_msg);
796  if (oat_file == nullptr) {
797    *error_msg = StringPrintf("Failed to open oat file '%s' referenced from image %s: %s",
798                              oat_filename.c_str(), GetName(), error_msg->c_str());
799    return nullptr;
800  }
801  uint32_t oat_checksum = oat_file->GetOatHeader().GetChecksum();
802  uint32_t image_oat_checksum = image_header.GetOatChecksum();
803  if (oat_checksum != image_oat_checksum) {
804    *error_msg = StringPrintf("Failed to match oat file checksum 0x%x to expected oat checksum 0x%x"
805                              " in image %s", oat_checksum, image_oat_checksum, GetName());
806    return nullptr;
807  }
808  int32_t image_patch_delta = image_header.GetPatchDelta();
809  int32_t oat_patch_delta = oat_file->GetOatHeader().GetImagePatchDelta();
810  if (oat_patch_delta != image_patch_delta && !image_header.CompilePic()) {
811    // We should have already relocated by this point. Bail out.
812    *error_msg = StringPrintf("Failed to match oat file patch delta %d to expected patch delta %d "
813                              "in image %s", oat_patch_delta, image_patch_delta, GetName());
814    return nullptr;
815  }
816
817  return oat_file;
818}
819
820bool ImageSpace::ValidateOatFile(std::string* error_msg) const {
821  CHECK(oat_file_.get() != nullptr);
822  for (const OatFile::OatDexFile* oat_dex_file : oat_file_->GetOatDexFiles()) {
823    const std::string& dex_file_location = oat_dex_file->GetDexFileLocation();
824    uint32_t dex_file_location_checksum;
825    if (!DexFile::GetChecksum(dex_file_location.c_str(), &dex_file_location_checksum, error_msg)) {
826      *error_msg = StringPrintf("Failed to get checksum of dex file '%s' referenced by image %s: "
827                                "%s", dex_file_location.c_str(), GetName(), error_msg->c_str());
828      return false;
829    }
830    if (dex_file_location_checksum != oat_dex_file->GetDexFileLocationChecksum()) {
831      *error_msg = StringPrintf("ValidateOatFile found checksum mismatch between oat file '%s' and "
832                                "dex file '%s' (0x%x != 0x%x)",
833                                oat_file_->GetLocation().c_str(), dex_file_location.c_str(),
834                                oat_dex_file->GetDexFileLocationChecksum(),
835                                dex_file_location_checksum);
836      return false;
837    }
838  }
839  return true;
840}
841
842
843const OatFile* ImageSpace::GetOatFile() const {
844  return oat_file_non_owned_;
845}
846
847
848OatFile* ImageSpace::ReleaseOatFile() {
849  CHECK(oat_file_.get() != nullptr);
850  return oat_file_.release();
851}
852
853void ImageSpace::Dump(std::ostream& os) const {
854  os << GetType()
855      << " begin=" << reinterpret_cast<void*>(Begin())
856      << ",end=" << reinterpret_cast<void*>(End())
857      << ",size=" << PrettySize(Size())
858      << ",name=\"" << GetName() << "\"]";
859}
860
861}  // namespace space
862}  // namespace gc
863}  // namespace art
864