1/*
2 * Copyright (C) 2013 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 *      http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include "verification_results.h"
18
19#include "base/logging.h"
20#include "base/stl_util.h"
21#include "base/mutex-inl.h"
22#include "driver/compiler_driver.h"
23#include "driver/compiler_options.h"
24#include "thread.h"
25#include "thread-inl.h"
26#include "verified_method.h"
27#include "verifier/method_verifier-inl.h"
28
29namespace art {
30
31VerificationResults::VerificationResults(const CompilerOptions* compiler_options)
32    : compiler_options_(compiler_options),
33      verified_methods_lock_("compiler verified methods lock"),
34      verified_methods_(),
35      rejected_classes_lock_("compiler rejected classes lock"),
36      rejected_classes_() {
37}
38
39VerificationResults::~VerificationResults() {
40  Thread* self = Thread::Current();
41  {
42    WriterMutexLock mu(self, verified_methods_lock_);
43    STLDeleteValues(&verified_methods_);
44  }
45}
46
47void VerificationResults::ProcessVerifiedMethod(verifier::MethodVerifier* method_verifier) {
48  DCHECK(method_verifier != nullptr);
49  MethodReference ref = method_verifier->GetMethodReference();
50  bool compile = IsCandidateForCompilation(ref, method_verifier->GetAccessFlags());
51  const VerifiedMethod* verified_method = VerifiedMethod::Create(method_verifier, compile);
52  if (verified_method == nullptr) {
53    // We'll punt this later.
54    return;
55  }
56
57  WriterMutexLock mu(Thread::Current(), verified_methods_lock_);
58  auto it = verified_methods_.find(ref);
59  if (it != verified_methods_.end()) {
60    // TODO: Investigate why are we doing the work again for this method and try to avoid it.
61    LOG(WARNING) << "Method processed more than once: "
62        << PrettyMethod(ref.dex_method_index, *ref.dex_file);
63    if (!Runtime::Current()->UseJitCompilation()) {
64      DCHECK_EQ(it->second->GetDevirtMap().size(), verified_method->GetDevirtMap().size());
65      DCHECK_EQ(it->second->GetSafeCastSet().size(), verified_method->GetSafeCastSet().size());
66    }
67    // Delete the new verified method since there was already an existing one registered. It
68    // is unsafe to replace the existing one since the JIT may be using it to generate a
69    // native GC map.
70    delete verified_method;
71    return;
72  }
73  verified_methods_.Put(ref, verified_method);
74  DCHECK(verified_methods_.find(ref) != verified_methods_.end());
75}
76
77const VerifiedMethod* VerificationResults::GetVerifiedMethod(MethodReference ref) {
78  ReaderMutexLock mu(Thread::Current(), verified_methods_lock_);
79  auto it = verified_methods_.find(ref);
80  return (it != verified_methods_.end()) ? it->second : nullptr;
81}
82
83void VerificationResults::AddRejectedClass(ClassReference ref) {
84  {
85    WriterMutexLock mu(Thread::Current(), rejected_classes_lock_);
86    rejected_classes_.insert(ref);
87  }
88  DCHECK(IsClassRejected(ref));
89}
90
91bool VerificationResults::IsClassRejected(ClassReference ref) {
92  ReaderMutexLock mu(Thread::Current(), rejected_classes_lock_);
93  return (rejected_classes_.find(ref) != rejected_classes_.end());
94}
95
96bool VerificationResults::IsCandidateForCompilation(MethodReference&,
97                                                    const uint32_t access_flags) {
98  if (!compiler_options_->IsBytecodeCompilationEnabled()) {
99    return false;
100  }
101  // Don't compile class initializers unless kEverything.
102  if ((compiler_options_->GetCompilerFilter() != CompilerFilter::kEverything) &&
103     ((access_flags & kAccConstructor) != 0) && ((access_flags & kAccStatic) != 0)) {
104    return false;
105  }
106  return true;
107}
108
109}  // namespace art
110