You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
837 lines
33 KiB
837 lines
33 KiB
/*
|
|
* Copyright (C) 2015 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#include "oat_file_manager.h"
|
|
|
|
#include <memory>
|
|
#include <queue>
|
|
#include <vector>
|
|
#include <sys/stat.h>
|
|
|
|
#include "android-base/file.h"
|
|
#include "android-base/stringprintf.h"
|
|
#include "android-base/strings.h"
|
|
|
|
#include "art_field-inl.h"
|
|
#include "base/bit_vector-inl.h"
|
|
#include "base/file_utils.h"
|
|
#include "base/logging.h" // For VLOG.
|
|
#include "base/mutex-inl.h"
|
|
#include "base/sdk_version.h"
|
|
#include "base/stl_util.h"
|
|
#include "base/systrace.h"
|
|
#include "class_linker.h"
|
|
#include "class_loader_context.h"
|
|
#include "dex/art_dex_file_loader.h"
|
|
#include "dex/dex_file-inl.h"
|
|
#include "dex/dex_file_loader.h"
|
|
#include "dex/dex_file_tracking_registrar.h"
|
|
#include "gc/scoped_gc_critical_section.h"
|
|
#include "gc/space/image_space.h"
|
|
#include "handle_scope-inl.h"
|
|
#include "jit/jit.h"
|
|
#include "jni/java_vm_ext.h"
|
|
#include "jni/jni_internal.h"
|
|
#include "mirror/class_loader.h"
|
|
#include "mirror/object-inl.h"
|
|
#include "oat_file.h"
|
|
#include "oat_file_assistant.h"
|
|
#include "obj_ptr-inl.h"
|
|
#include "scoped_thread_state_change-inl.h"
|
|
#include "thread-current-inl.h"
|
|
#include "thread_list.h"
|
|
#include "thread_pool.h"
|
|
#include "vdex_file.h"
|
|
#include "verifier/verifier_deps.h"
|
|
#include "well_known_classes.h"
|
|
|
|
namespace art {
|
|
|
|
using android::base::StringPrintf;
|
|
|
|
// If true, we attempt to load the application image if it exists.
|
|
static constexpr bool kEnableAppImage = true;
|
|
|
|
const OatFile* OatFileManager::RegisterOatFile(std::unique_ptr<const OatFile> oat_file) {
|
|
// Use class_linker vlog to match the log for dex file registration.
|
|
VLOG(class_linker) << "Registered oat file " << oat_file->GetLocation();
|
|
PaletteNotifyOatFileLoaded(oat_file->GetLocation().c_str());
|
|
|
|
WriterMutexLock mu(Thread::Current(), *Locks::oat_file_manager_lock_);
|
|
CHECK(!only_use_system_oat_files_ ||
|
|
LocationIsTrusted(oat_file->GetLocation(), !Runtime::Current()->DenyArtApexDataFiles()) ||
|
|
!oat_file->IsExecutable())
|
|
<< "Registering a non /system oat file: " << oat_file->GetLocation();
|
|
DCHECK(oat_file != nullptr);
|
|
if (kIsDebugBuild) {
|
|
CHECK(oat_files_.find(oat_file) == oat_files_.end());
|
|
for (const std::unique_ptr<const OatFile>& existing : oat_files_) {
|
|
CHECK_NE(oat_file.get(), existing.get()) << oat_file->GetLocation();
|
|
// Check that we don't have an oat file with the same address. Copies of the same oat file
|
|
// should be loaded at different addresses.
|
|
CHECK_NE(oat_file->Begin(), existing->Begin()) << "Oat file already mapped at that location";
|
|
}
|
|
}
|
|
const OatFile* ret = oat_file.get();
|
|
oat_files_.insert(std::move(oat_file));
|
|
return ret;
|
|
}
|
|
|
|
void OatFileManager::UnRegisterAndDeleteOatFile(const OatFile* oat_file) {
|
|
WriterMutexLock mu(Thread::Current(), *Locks::oat_file_manager_lock_);
|
|
DCHECK(oat_file != nullptr);
|
|
std::unique_ptr<const OatFile> compare(oat_file);
|
|
auto it = oat_files_.find(compare);
|
|
CHECK(it != oat_files_.end());
|
|
oat_files_.erase(it);
|
|
compare.release(); // NOLINT b/117926937
|
|
}
|
|
|
|
const OatFile* OatFileManager::FindOpenedOatFileFromDexLocation(
|
|
const std::string& dex_base_location) const {
|
|
ReaderMutexLock mu(Thread::Current(), *Locks::oat_file_manager_lock_);
|
|
for (const std::unique_ptr<const OatFile>& oat_file : oat_files_) {
|
|
const std::vector<const OatDexFile*>& oat_dex_files = oat_file->GetOatDexFiles();
|
|
for (const OatDexFile* oat_dex_file : oat_dex_files) {
|
|
if (DexFileLoader::GetBaseLocation(oat_dex_file->GetDexFileLocation()) == dex_base_location) {
|
|
return oat_file.get();
|
|
}
|
|
}
|
|
}
|
|
return nullptr;
|
|
}
|
|
|
|
const OatFile* OatFileManager::FindOpenedOatFileFromOatLocation(const std::string& oat_location)
|
|
const {
|
|
ReaderMutexLock mu(Thread::Current(), *Locks::oat_file_manager_lock_);
|
|
return FindOpenedOatFileFromOatLocationLocked(oat_location);
|
|
}
|
|
|
|
const OatFile* OatFileManager::FindOpenedOatFileFromOatLocationLocked(
|
|
const std::string& oat_location) const {
|
|
for (const std::unique_ptr<const OatFile>& oat_file : oat_files_) {
|
|
if (oat_file->GetLocation() == oat_location) {
|
|
return oat_file.get();
|
|
}
|
|
}
|
|
return nullptr;
|
|
}
|
|
|
|
std::vector<const OatFile*> OatFileManager::GetBootOatFiles() const {
|
|
std::vector<gc::space::ImageSpace*> image_spaces =
|
|
Runtime::Current()->GetHeap()->GetBootImageSpaces();
|
|
std::vector<const OatFile*> oat_files;
|
|
oat_files.reserve(image_spaces.size());
|
|
for (gc::space::ImageSpace* image_space : image_spaces) {
|
|
oat_files.push_back(image_space->GetOatFile());
|
|
}
|
|
return oat_files;
|
|
}
|
|
|
|
OatFileManager::OatFileManager()
|
|
: only_use_system_oat_files_(false) {}
|
|
|
|
OatFileManager::~OatFileManager() {
|
|
// Explicitly clear oat_files_ since the OatFile destructor calls back into OatFileManager for
|
|
// UnRegisterOatFileLocation.
|
|
oat_files_.clear();
|
|
}
|
|
|
|
std::vector<const OatFile*> OatFileManager::RegisterImageOatFiles(
|
|
const std::vector<gc::space::ImageSpace*>& spaces) {
|
|
std::vector<const OatFile*> oat_files;
|
|
oat_files.reserve(spaces.size());
|
|
for (gc::space::ImageSpace* space : spaces) {
|
|
oat_files.push_back(RegisterOatFile(space->ReleaseOatFile()));
|
|
}
|
|
return oat_files;
|
|
}
|
|
|
|
bool OatFileManager::ShouldLoadAppImage(const OatFile* source_oat_file) const {
|
|
Runtime* const runtime = Runtime::Current();
|
|
return kEnableAppImage && (!runtime->IsJavaDebuggable() || source_oat_file->IsDebuggable());
|
|
}
|
|
|
|
std::vector<std::unique_ptr<const DexFile>> OatFileManager::OpenDexFilesFromOat(
|
|
const char* dex_location,
|
|
jobject class_loader,
|
|
jobjectArray dex_elements,
|
|
const OatFile** out_oat_file,
|
|
std::vector<std::string>* error_msgs) {
|
|
ScopedTrace trace(StringPrintf("%s(%s)", __FUNCTION__, dex_location));
|
|
CHECK(dex_location != nullptr);
|
|
CHECK(error_msgs != nullptr);
|
|
|
|
// Verify we aren't holding the mutator lock, which could starve GC when
|
|
// hitting the disk.
|
|
Thread* const self = Thread::Current();
|
|
Locks::mutator_lock_->AssertNotHeld(self);
|
|
Runtime* const runtime = Runtime::Current();
|
|
|
|
std::vector<std::unique_ptr<const DexFile>> dex_files;
|
|
std::unique_ptr<ClassLoaderContext> context(
|
|
ClassLoaderContext::CreateContextForClassLoader(class_loader, dex_elements));
|
|
|
|
// If the class_loader is null there's not much we can do. This happens if a dex files is loaded
|
|
// directly with DexFile APIs instead of using class loaders.
|
|
if (class_loader == nullptr) {
|
|
LOG(WARNING) << "Opening an oat file without a class loader. "
|
|
<< "Are you using the deprecated DexFile APIs?";
|
|
} else if (context != nullptr) {
|
|
OatFileAssistant oat_file_assistant(dex_location,
|
|
kRuntimeISA,
|
|
context.get(),
|
|
runtime->GetOatFilesExecutable(),
|
|
only_use_system_oat_files_);
|
|
|
|
// Get the current optimization status for trace debugging.
|
|
// Implementation detail note: GetOptimizationStatus will select the same
|
|
// oat file as GetBestOatFile used below, and in doing so it already pre-populates
|
|
// some OatFileAssistant internal fields.
|
|
std::string odex_location;
|
|
std::string compilation_filter;
|
|
std::string compilation_reason;
|
|
std::string odex_status;
|
|
oat_file_assistant.GetOptimizationStatus(
|
|
&odex_location,
|
|
&compilation_filter,
|
|
&compilation_reason,
|
|
&odex_status);
|
|
|
|
Runtime::Current()->GetAppInfo()->RegisterOdexStatus(
|
|
dex_location,
|
|
compilation_filter,
|
|
compilation_reason,
|
|
odex_status);
|
|
|
|
ScopedTrace odex_loading(StringPrintf(
|
|
"location=%s status=%s filter=%s reason=%s",
|
|
odex_location.c_str(),
|
|
odex_status.c_str(),
|
|
compilation_filter.c_str(),
|
|
compilation_reason.c_str()));
|
|
|
|
// Proceed with oat file loading.
|
|
std::unique_ptr<const OatFile> oat_file(oat_file_assistant.GetBestOatFile().release());
|
|
VLOG(oat) << "OatFileAssistant(" << dex_location << ").GetBestOatFile()="
|
|
<< (oat_file != nullptr ? oat_file->GetLocation() : "")
|
|
<< " (executable=" << (oat_file != nullptr ? oat_file->IsExecutable() : false) << ")";
|
|
|
|
CHECK(oat_file == nullptr || odex_location == oat_file->GetLocation())
|
|
<< "OatFileAssistant non-determinism in choosing best oat files. "
|
|
<< "optimization-status-location=" << odex_location
|
|
<< " best_oat_file-location=" << oat_file->GetLocation();
|
|
|
|
if (oat_file != nullptr) {
|
|
// Load the dex files from the oat file.
|
|
bool added_image_space = false;
|
|
if (oat_file->IsExecutable()) {
|
|
ScopedTrace app_image_timing("AppImage:Loading");
|
|
|
|
// We need to throw away the image space if we are debuggable but the oat-file source of the
|
|
// image is not otherwise we might get classes with inlined methods or other such things.
|
|
std::unique_ptr<gc::space::ImageSpace> image_space;
|
|
if (ShouldLoadAppImage(oat_file.get())) {
|
|
image_space = oat_file_assistant.OpenImageSpace(oat_file.get());
|
|
}
|
|
if (image_space != nullptr) {
|
|
ScopedObjectAccess soa(self);
|
|
StackHandleScope<1> hs(self);
|
|
Handle<mirror::ClassLoader> h_loader(
|
|
hs.NewHandle(soa.Decode<mirror::ClassLoader>(class_loader)));
|
|
// Can not load app image without class loader.
|
|
if (h_loader != nullptr) {
|
|
std::string temp_error_msg;
|
|
// Add image space has a race condition since other threads could be reading from the
|
|
// spaces array.
|
|
{
|
|
ScopedThreadSuspension sts(self, kSuspended);
|
|
gc::ScopedGCCriticalSection gcs(self,
|
|
gc::kGcCauseAddRemoveAppImageSpace,
|
|
gc::kCollectorTypeAddRemoveAppImageSpace);
|
|
ScopedSuspendAll ssa("Add image space");
|
|
runtime->GetHeap()->AddSpace(image_space.get());
|
|
}
|
|
{
|
|
ScopedTrace image_space_timing("Adding image space");
|
|
added_image_space = runtime->GetClassLinker()->AddImageSpace(image_space.get(),
|
|
h_loader,
|
|
/*out*/&dex_files,
|
|
/*out*/&temp_error_msg);
|
|
}
|
|
if (added_image_space) {
|
|
// Successfully added image space to heap, release the map so that it does not get
|
|
// freed.
|
|
image_space.release(); // NOLINT b/117926937
|
|
|
|
// Register for tracking.
|
|
for (const auto& dex_file : dex_files) {
|
|
dex::tracking::RegisterDexFile(dex_file.get());
|
|
}
|
|
} else {
|
|
LOG(INFO) << "Failed to add image file " << temp_error_msg;
|
|
dex_files.clear();
|
|
{
|
|
ScopedThreadSuspension sts(self, kSuspended);
|
|
gc::ScopedGCCriticalSection gcs(self,
|
|
gc::kGcCauseAddRemoveAppImageSpace,
|
|
gc::kCollectorTypeAddRemoveAppImageSpace);
|
|
ScopedSuspendAll ssa("Remove image space");
|
|
runtime->GetHeap()->RemoveSpace(image_space.get());
|
|
}
|
|
// Non-fatal, don't update error_msg.
|
|
}
|
|
}
|
|
}
|
|
}
|
|
if (!added_image_space) {
|
|
DCHECK(dex_files.empty());
|
|
|
|
if (oat_file->RequiresImage()) {
|
|
LOG(WARNING) << "Loading "
|
|
<< oat_file->GetLocation()
|
|
<< "non-executable as it requires an image which we failed to load";
|
|
// file as non-executable.
|
|
OatFileAssistant nonexecutable_oat_file_assistant(dex_location,
|
|
kRuntimeISA,
|
|
context.get(),
|
|
/*load_executable=*/false,
|
|
only_use_system_oat_files_);
|
|
oat_file.reset(nonexecutable_oat_file_assistant.GetBestOatFile().release());
|
|
|
|
// The file could be deleted concurrently (for example background
|
|
// dexopt, or secondary oat file being deleted by the app).
|
|
if (oat_file == nullptr) {
|
|
LOG(WARNING) << "Failed to reload oat file non-executable " << dex_location;
|
|
}
|
|
}
|
|
|
|
if (oat_file != nullptr) {
|
|
dex_files = oat_file_assistant.LoadDexFiles(*oat_file.get(), dex_location);
|
|
|
|
// Register for tracking.
|
|
for (const auto& dex_file : dex_files) {
|
|
dex::tracking::RegisterDexFile(dex_file.get());
|
|
}
|
|
}
|
|
}
|
|
if (dex_files.empty()) {
|
|
ScopedTrace failed_to_open_dex_files("FailedToOpenDexFilesFromOat");
|
|
error_msgs->push_back("Failed to open dex files from " + odex_location);
|
|
} else {
|
|
// Opened dex files from an oat file, madvise them to their loaded state.
|
|
for (const std::unique_ptr<const DexFile>& dex_file : dex_files) {
|
|
OatDexFile::MadviseDexFile(*dex_file, MadviseState::kMadviseStateAtLoad);
|
|
}
|
|
}
|
|
|
|
if (oat_file != nullptr) {
|
|
VLOG(class_linker) << "Registering " << oat_file->GetLocation();
|
|
*out_oat_file = RegisterOatFile(std::move(oat_file));
|
|
}
|
|
} else {
|
|
// oat_file == nullptr
|
|
// Verify if any of the dex files being loaded is already in the class path.
|
|
// If so, report an error with the current stack trace.
|
|
// Most likely the developer didn't intend to do this because it will waste
|
|
// performance and memory.
|
|
if (oat_file_assistant.GetBestStatus() == OatFileAssistant::kOatContextOutOfDate) {
|
|
std::set<const DexFile*> already_exists_in_classpath =
|
|
context->CheckForDuplicateDexFiles(MakeNonOwningPointerVector(dex_files));
|
|
if (!already_exists_in_classpath.empty()) {
|
|
ScopedTrace duplicate_dex_files("DuplicateDexFilesInContext");
|
|
auto duplicate_it = already_exists_in_classpath.begin();
|
|
std::string duplicates = (*duplicate_it)->GetLocation();
|
|
for (duplicate_it++ ; duplicate_it != already_exists_in_classpath.end(); duplicate_it++) {
|
|
duplicates += "," + (*duplicate_it)->GetLocation();
|
|
}
|
|
|
|
std::ostringstream out;
|
|
out << "Trying to load dex files which is already loaded in the same ClassLoader "
|
|
<< "hierarchy.\n"
|
|
<< "This is a strong indication of bad ClassLoader construct which leads to poor "
|
|
<< "performance and wastes memory.\n"
|
|
<< "The list of duplicate dex files is: " << duplicates << "\n"
|
|
<< "The current class loader context is: "
|
|
<< context->EncodeContextForOatFile("") << "\n"
|
|
<< "Java stack trace:\n";
|
|
|
|
{
|
|
ScopedObjectAccess soa(self);
|
|
self->DumpJavaStack(out);
|
|
}
|
|
|
|
// We log this as an ERROR to stress the fact that this is most likely unintended.
|
|
// Note that ART cannot do anything about it. It is up to the app to fix their logic.
|
|
// Here we are trying to give a heads up on why the app might have performance issues.
|
|
LOG(ERROR) << out.str();
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// If we arrive here with an empty dex files list, it means we fail to load
|
|
// it/them through an .oat file.
|
|
if (dex_files.empty()) {
|
|
std::string error_msg;
|
|
static constexpr bool kVerifyChecksum = true;
|
|
const ArtDexFileLoader dex_file_loader;
|
|
if (!dex_file_loader.Open(dex_location,
|
|
dex_location,
|
|
Runtime::Current()->IsVerificationEnabled(),
|
|
kVerifyChecksum,
|
|
/*out*/ &error_msg,
|
|
&dex_files)) {
|
|
ScopedTrace fail_to_open_dex_from_apk("FailedToOpenDexFilesFromApk");
|
|
LOG(WARNING) << error_msg;
|
|
error_msgs->push_back("Failed to open dex files from " + std::string(dex_location)
|
|
+ " because: " + error_msg);
|
|
}
|
|
}
|
|
|
|
if (Runtime::Current()->GetJit() != nullptr) {
|
|
Runtime::Current()->GetJit()->RegisterDexFiles(dex_files, class_loader);
|
|
}
|
|
|
|
// Now that we loaded the dex/odex files, notify the runtime.
|
|
// Note that we do this everytime we load dex files.
|
|
Runtime::Current()->NotifyDexFileLoaded();
|
|
|
|
return dex_files;
|
|
}
|
|
|
|
static std::vector<const DexFile::Header*> GetDexFileHeaders(const std::vector<MemMap>& maps) {
|
|
std::vector<const DexFile::Header*> headers;
|
|
headers.reserve(maps.size());
|
|
for (const MemMap& map : maps) {
|
|
DCHECK(map.IsValid());
|
|
headers.push_back(reinterpret_cast<const DexFile::Header*>(map.Begin()));
|
|
}
|
|
return headers;
|
|
}
|
|
|
|
std::vector<std::unique_ptr<const DexFile>> OatFileManager::OpenDexFilesFromOat(
|
|
std::vector<MemMap>&& dex_mem_maps,
|
|
jobject class_loader,
|
|
jobjectArray dex_elements,
|
|
const OatFile** out_oat_file,
|
|
std::vector<std::string>* error_msgs) {
|
|
std::vector<std::unique_ptr<const DexFile>> dex_files = OpenDexFilesFromOat_Impl(
|
|
std::move(dex_mem_maps),
|
|
class_loader,
|
|
dex_elements,
|
|
out_oat_file,
|
|
error_msgs);
|
|
|
|
if (error_msgs->empty()) {
|
|
// Remove write permission from DexFile pages. We do this at the end because
|
|
// OatFile assigns OatDexFile pointer in the DexFile objects.
|
|
for (std::unique_ptr<const DexFile>& dex_file : dex_files) {
|
|
if (!dex_file->DisableWrite()) {
|
|
error_msgs->push_back("Failed to make dex file " + dex_file->GetLocation() + " read-only");
|
|
}
|
|
}
|
|
}
|
|
|
|
if (!error_msgs->empty()) {
|
|
return std::vector<std::unique_ptr<const DexFile>>();
|
|
}
|
|
|
|
return dex_files;
|
|
}
|
|
|
|
std::vector<std::unique_ptr<const DexFile>> OatFileManager::OpenDexFilesFromOat_Impl(
|
|
std::vector<MemMap>&& dex_mem_maps,
|
|
jobject class_loader,
|
|
jobjectArray dex_elements,
|
|
const OatFile** out_oat_file,
|
|
std::vector<std::string>* error_msgs) {
|
|
ScopedTrace trace(__FUNCTION__);
|
|
std::string error_msg;
|
|
DCHECK(error_msgs != nullptr);
|
|
|
|
// Extract dex file headers from `dex_mem_maps`.
|
|
const std::vector<const DexFile::Header*> dex_headers = GetDexFileHeaders(dex_mem_maps);
|
|
|
|
// Determine dex/vdex locations and the combined location checksum.
|
|
std::string dex_location;
|
|
std::string vdex_path;
|
|
bool has_vdex = OatFileAssistant::AnonymousDexVdexLocation(dex_headers,
|
|
kRuntimeISA,
|
|
&dex_location,
|
|
&vdex_path);
|
|
|
|
// Attempt to open an existing vdex and check dex file checksums match.
|
|
std::unique_ptr<VdexFile> vdex_file = nullptr;
|
|
if (has_vdex && OS::FileExists(vdex_path.c_str())) {
|
|
vdex_file = VdexFile::Open(vdex_path,
|
|
/* writable= */ false,
|
|
/* low_4gb= */ false,
|
|
/* unquicken= */ false,
|
|
&error_msg);
|
|
if (vdex_file == nullptr) {
|
|
LOG(WARNING) << "Failed to open vdex " << vdex_path << ": " << error_msg;
|
|
} else if (!vdex_file->MatchesDexFileChecksums(dex_headers)) {
|
|
LOG(WARNING) << "Failed to open vdex " << vdex_path << ": dex file checksum mismatch";
|
|
vdex_file.reset(nullptr);
|
|
}
|
|
}
|
|
|
|
// Load dex files. Skip structural dex file verification if vdex was found
|
|
// and dex checksums matched.
|
|
std::vector<std::unique_ptr<const DexFile>> dex_files;
|
|
for (size_t i = 0; i < dex_mem_maps.size(); ++i) {
|
|
static constexpr bool kVerifyChecksum = true;
|
|
const ArtDexFileLoader dex_file_loader;
|
|
std::unique_ptr<const DexFile> dex_file(dex_file_loader.Open(
|
|
DexFileLoader::GetMultiDexLocation(i, dex_location.c_str()),
|
|
dex_headers[i]->checksum_,
|
|
std::move(dex_mem_maps[i]),
|
|
/* verify= */ (vdex_file == nullptr) && Runtime::Current()->IsVerificationEnabled(),
|
|
kVerifyChecksum,
|
|
&error_msg));
|
|
if (dex_file != nullptr) {
|
|
dex::tracking::RegisterDexFile(dex_file.get()); // Register for tracking.
|
|
dex_files.push_back(std::move(dex_file));
|
|
} else {
|
|
error_msgs->push_back("Failed to open dex files from memory: " + error_msg);
|
|
}
|
|
}
|
|
|
|
// Check if we should proceed to creating an OatFile instance backed by the vdex.
|
|
// We need: (a) an existing vdex, (b) class loader (can be null if invoked via reflection),
|
|
// and (c) no errors during dex file loading.
|
|
if (vdex_file == nullptr || class_loader == nullptr || !error_msgs->empty()) {
|
|
return dex_files;
|
|
}
|
|
|
|
// Attempt to create a class loader context, check OpenDexFiles succeeds (prerequisite
|
|
// for using the context later).
|
|
std::unique_ptr<ClassLoaderContext> context = ClassLoaderContext::CreateContextForClassLoader(
|
|
class_loader,
|
|
dex_elements);
|
|
if (context == nullptr) {
|
|
LOG(ERROR) << "Could not create class loader context for " << vdex_path;
|
|
return dex_files;
|
|
}
|
|
DCHECK(context->OpenDexFiles())
|
|
<< "Context created from already opened dex files should not attempt to open again";
|
|
|
|
// Initialize an OatFile instance backed by the loaded vdex.
|
|
std::unique_ptr<OatFile> oat_file(OatFile::OpenFromVdex(MakeNonOwningPointerVector(dex_files),
|
|
std::move(vdex_file),
|
|
dex_location));
|
|
if (oat_file != nullptr) {
|
|
VLOG(class_linker) << "Registering " << oat_file->GetLocation();
|
|
*out_oat_file = RegisterOatFile(std::move(oat_file));
|
|
}
|
|
return dex_files;
|
|
}
|
|
|
|
// Check how many vdex files exist in the same directory as the vdex file we are about
|
|
// to write. If more than or equal to kAnonymousVdexCacheSize, unlink the least
|
|
// recently used one(s) (according to stat-reported atime).
|
|
static bool UnlinkLeastRecentlyUsedVdexIfNeeded(const std::string& vdex_path_to_add,
|
|
std::string* error_msg) {
|
|
std::string basename = android::base::Basename(vdex_path_to_add);
|
|
if (!OatFileAssistant::IsAnonymousVdexBasename(basename)) {
|
|
// File is not for in memory dex files.
|
|
return true;
|
|
}
|
|
|
|
if (OS::FileExists(vdex_path_to_add.c_str())) {
|
|
// File already exists and will be overwritten.
|
|
// This will not change the number of entries in the cache.
|
|
return true;
|
|
}
|
|
|
|
auto last_slash = vdex_path_to_add.rfind('/');
|
|
CHECK(last_slash != std::string::npos);
|
|
std::string vdex_dir = vdex_path_to_add.substr(0, last_slash + 1);
|
|
|
|
if (!OS::DirectoryExists(vdex_dir.c_str())) {
|
|
// Folder does not exist yet. Cache has zero entries.
|
|
return true;
|
|
}
|
|
|
|
std::vector<std::pair<time_t, std::string>> cache;
|
|
|
|
DIR* c_dir = opendir(vdex_dir.c_str());
|
|
if (c_dir == nullptr) {
|
|
*error_msg = "Unable to open " + vdex_dir + " to delete unused vdex files";
|
|
return false;
|
|
}
|
|
for (struct dirent* de = readdir(c_dir); de != nullptr; de = readdir(c_dir)) {
|
|
if (de->d_type != DT_REG) {
|
|
continue;
|
|
}
|
|
basename = de->d_name;
|
|
if (!OatFileAssistant::IsAnonymousVdexBasename(basename)) {
|
|
continue;
|
|
}
|
|
std::string fullname = vdex_dir + basename;
|
|
|
|
struct stat s;
|
|
int rc = TEMP_FAILURE_RETRY(stat(fullname.c_str(), &s));
|
|
if (rc == -1) {
|
|
*error_msg = "Failed to stat() anonymous vdex file " + fullname;
|
|
return false;
|
|
}
|
|
|
|
cache.push_back(std::make_pair(s.st_atime, fullname));
|
|
}
|
|
CHECK_EQ(0, closedir(c_dir)) << "Unable to close directory.";
|
|
|
|
if (cache.size() < OatFileManager::kAnonymousVdexCacheSize) {
|
|
return true;
|
|
}
|
|
|
|
std::sort(cache.begin(),
|
|
cache.end(),
|
|
[](const auto& a, const auto& b) { return a.first < b.first; });
|
|
for (size_t i = OatFileManager::kAnonymousVdexCacheSize - 1; i < cache.size(); ++i) {
|
|
if (unlink(cache[i].second.c_str()) != 0) {
|
|
*error_msg = "Could not unlink anonymous vdex file " + cache[i].second;
|
|
return false;
|
|
}
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
class BackgroundVerificationTask final : public Task {
|
|
public:
|
|
BackgroundVerificationTask(const std::vector<const DexFile*>& dex_files,
|
|
jobject class_loader,
|
|
const std::string& vdex_path)
|
|
: dex_files_(dex_files),
|
|
vdex_path_(vdex_path) {
|
|
Thread* const self = Thread::Current();
|
|
ScopedObjectAccess soa(self);
|
|
// Create a global ref for `class_loader` because it will be accessed from a different thread.
|
|
class_loader_ = soa.Vm()->AddGlobalRef(self, soa.Decode<mirror::ClassLoader>(class_loader));
|
|
CHECK(class_loader_ != nullptr);
|
|
}
|
|
|
|
~BackgroundVerificationTask() {
|
|
Thread* const self = Thread::Current();
|
|
ScopedObjectAccess soa(self);
|
|
soa.Vm()->DeleteGlobalRef(self, class_loader_);
|
|
}
|
|
|
|
void Run(Thread* self) override {
|
|
std::string error_msg;
|
|
ClassLinker* const class_linker = Runtime::Current()->GetClassLinker();
|
|
verifier::VerifierDeps verifier_deps(dex_files_);
|
|
|
|
// Iterate over all classes and verify them.
|
|
for (const DexFile* dex_file : dex_files_) {
|
|
for (uint32_t cdef_idx = 0; cdef_idx < dex_file->NumClassDefs(); cdef_idx++) {
|
|
const dex::ClassDef& class_def = dex_file->GetClassDef(cdef_idx);
|
|
|
|
// Take handles inside the loop. The background verification is low priority
|
|
// and we want to minimize the risk of blocking anyone else.
|
|
ScopedObjectAccess soa(self);
|
|
StackHandleScope<2> hs(self);
|
|
Handle<mirror::ClassLoader> h_loader(hs.NewHandle(
|
|
soa.Decode<mirror::ClassLoader>(class_loader_)));
|
|
Handle<mirror::Class> h_class(hs.NewHandle<mirror::Class>(class_linker->FindClass(
|
|
self,
|
|
dex_file->GetClassDescriptor(class_def),
|
|
h_loader)));
|
|
|
|
if (h_class == nullptr) {
|
|
CHECK(self->IsExceptionPending());
|
|
self->ClearException();
|
|
continue;
|
|
}
|
|
|
|
if (&h_class->GetDexFile() != dex_file) {
|
|
// There is a different class in the class path or a parent class loader
|
|
// with the same descriptor. This `h_class` is not resolvable, skip it.
|
|
continue;
|
|
}
|
|
|
|
CHECK(h_class->IsResolved()) << h_class->PrettyDescriptor();
|
|
class_linker->VerifyClass(self, &verifier_deps, h_class);
|
|
if (h_class->IsErroneous()) {
|
|
// ClassLinker::VerifyClass throws, which isn't useful here.
|
|
CHECK(soa.Self()->IsExceptionPending());
|
|
soa.Self()->ClearException();
|
|
}
|
|
|
|
CHECK(h_class->IsVerified() || h_class->IsErroneous())
|
|
<< h_class->PrettyDescriptor() << ": state=" << h_class->GetStatus();
|
|
|
|
if (h_class->IsVerified()) {
|
|
verifier_deps.RecordClassVerified(*dex_file, class_def);
|
|
}
|
|
}
|
|
}
|
|
|
|
// Delete old vdex files if there are too many in the folder.
|
|
if (!UnlinkLeastRecentlyUsedVdexIfNeeded(vdex_path_, &error_msg)) {
|
|
LOG(ERROR) << "Could not unlink old vdex files " << vdex_path_ << ": " << error_msg;
|
|
return;
|
|
}
|
|
|
|
// Construct a vdex file and write `verifier_deps` into it.
|
|
if (!VdexFile::WriteToDisk(vdex_path_,
|
|
dex_files_,
|
|
verifier_deps,
|
|
&error_msg)) {
|
|
LOG(ERROR) << "Could not write anonymous vdex " << vdex_path_ << ": " << error_msg;
|
|
return;
|
|
}
|
|
}
|
|
|
|
void Finalize() override {
|
|
delete this;
|
|
}
|
|
|
|
private:
|
|
const std::vector<const DexFile*> dex_files_;
|
|
jobject class_loader_;
|
|
const std::string vdex_path_;
|
|
|
|
DISALLOW_COPY_AND_ASSIGN(BackgroundVerificationTask);
|
|
};
|
|
|
|
void OatFileManager::RunBackgroundVerification(const std::vector<const DexFile*>& dex_files,
|
|
jobject class_loader) {
|
|
Runtime* const runtime = Runtime::Current();
|
|
Thread* const self = Thread::Current();
|
|
|
|
if (runtime->IsJavaDebuggable()) {
|
|
// Threads created by ThreadPool ("runtime threads") are not allowed to load
|
|
// classes when debuggable to match class-initialization semantics
|
|
// expectations. Do not verify in the background.
|
|
return;
|
|
}
|
|
|
|
if (!IsSdkVersionSetAndAtLeast(runtime->GetTargetSdkVersion(), SdkVersion::kQ)) {
|
|
// Do not run for legacy apps as they may depend on the previous class loader behaviour.
|
|
return;
|
|
}
|
|
|
|
if (runtime->IsShuttingDown(self)) {
|
|
// Not allowed to create new threads during runtime shutdown.
|
|
return;
|
|
}
|
|
|
|
if (dex_files.size() < 1) {
|
|
// Nothing to verify.
|
|
return;
|
|
}
|
|
|
|
std::string dex_location = dex_files[0]->GetLocation();
|
|
const std::string& data_dir = Runtime::Current()->GetProcessDataDirectory();
|
|
if (!android::base::StartsWith(dex_location, data_dir)) {
|
|
// For now, we only run background verification for secondary dex files.
|
|
// Running it for primary or split APKs could have some undesirable
|
|
// side-effects, like overloading the device on app startup.
|
|
return;
|
|
}
|
|
|
|
std::string error_msg;
|
|
std::string odex_filename;
|
|
if (!OatFileAssistant::DexLocationToOdexFilename(dex_location,
|
|
kRuntimeISA,
|
|
&odex_filename,
|
|
&error_msg)) {
|
|
LOG(WARNING) << "Could not get odex filename for " << dex_location << ": " << error_msg;
|
|
return;
|
|
}
|
|
|
|
if (LocationIsOnArtApexData(odex_filename) && Runtime::Current()->DenyArtApexDataFiles()) {
|
|
// Ignore vdex file associated with this odex file as the odex file is not trustworthy.
|
|
return;
|
|
}
|
|
|
|
{
|
|
WriterMutexLock mu(self, *Locks::oat_file_manager_lock_);
|
|
if (verification_thread_pool_ == nullptr) {
|
|
verification_thread_pool_.reset(
|
|
new ThreadPool("Verification thread pool", /* num_threads= */ 1));
|
|
verification_thread_pool_->StartWorkers(self);
|
|
}
|
|
}
|
|
verification_thread_pool_->AddTask(self, new BackgroundVerificationTask(
|
|
dex_files,
|
|
class_loader,
|
|
GetVdexFilename(odex_filename)));
|
|
}
|
|
|
|
void OatFileManager::WaitForWorkersToBeCreated() {
|
|
DCHECK(!Runtime::Current()->IsShuttingDown(Thread::Current()))
|
|
<< "Cannot create new threads during runtime shutdown";
|
|
if (verification_thread_pool_ != nullptr) {
|
|
verification_thread_pool_->WaitForWorkersToBeCreated();
|
|
}
|
|
}
|
|
|
|
void OatFileManager::DeleteThreadPool() {
|
|
verification_thread_pool_.reset(nullptr);
|
|
}
|
|
|
|
void OatFileManager::WaitForBackgroundVerificationTasks() {
|
|
if (verification_thread_pool_ != nullptr) {
|
|
Thread* const self = Thread::Current();
|
|
verification_thread_pool_->WaitForWorkersToBeCreated();
|
|
verification_thread_pool_->Wait(self, /* do_work= */ true, /* may_hold_locks= */ false);
|
|
}
|
|
}
|
|
|
|
void OatFileManager::SetOnlyUseTrustedOatFiles() {
|
|
ReaderMutexLock mu(Thread::Current(), *Locks::oat_file_manager_lock_);
|
|
// Make sure all files that were loaded up to this point are on /system.
|
|
// Skip the image files as they can encode locations that don't exist (eg not
|
|
// containing the arch in the path, or for JIT zygote /nonx/existent).
|
|
std::vector<const OatFile*> boot_vector = GetBootOatFiles();
|
|
std::unordered_set<const OatFile*> boot_set(boot_vector.begin(), boot_vector.end());
|
|
|
|
for (const std::unique_ptr<const OatFile>& oat_file : oat_files_) {
|
|
if (boot_set.find(oat_file.get()) == boot_set.end()) {
|
|
// This method is called during runtime initialization before we can call
|
|
// Runtime::Current()->DenyArtApexDataFiles(). Since we don't want to fail hard if
|
|
// the ART APEX data files are untrusted, just treat them as trusted for the check here.
|
|
const bool trust_art_apex_data_files = true;
|
|
if (!LocationIsTrusted(oat_file->GetLocation(), trust_art_apex_data_files)) {
|
|
// When the file is not in a trusted location, we check whether the oat file has any
|
|
// AOT or DEX code. It is a fatal error if it has.
|
|
if (CompilerFilter::IsAotCompilationEnabled(oat_file->GetCompilerFilter()) ||
|
|
oat_file->ContainsDexCode()) {
|
|
LOG(FATAL) << "Executing untrusted code from " << oat_file->GetLocation();
|
|
}
|
|
}
|
|
}
|
|
}
|
|
only_use_system_oat_files_ = true;
|
|
}
|
|
|
|
void OatFileManager::DumpForSigQuit(std::ostream& os) {
|
|
ReaderMutexLock mu(Thread::Current(), *Locks::oat_file_manager_lock_);
|
|
std::vector<const OatFile*> boot_oat_files = GetBootOatFiles();
|
|
for (const std::unique_ptr<const OatFile>& oat_file : oat_files_) {
|
|
if (ContainsElement(boot_oat_files, oat_file.get())) {
|
|
continue;
|
|
}
|
|
os << oat_file->GetLocation() << ": " << oat_file->GetCompilerFilter() << "\n";
|
|
}
|
|
}
|
|
|
|
} // namespace art
|