176 lines
6.9 KiB
C++
176 lines
6.9 KiB
C++
/*
|
|
* Copyright (C) 2013 The Android Open Source Project
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
#include "verification_results.h"
|
|
|
|
#include "base/logging.h"
|
|
#include "base/mutex-inl.h"
|
|
#include "base/stl_util.h"
|
|
#include "driver/compiler_driver.h"
|
|
#include "driver/compiler_options.h"
|
|
#include "runtime.h"
|
|
#include "thread.h"
|
|
#include "thread-current-inl.h"
|
|
#include "utils/atomic_dex_ref_map-inl.h"
|
|
#include "verified_method.h"
|
|
#include "verifier/method_verifier-inl.h"
|
|
|
|
namespace art {
|
|
|
|
VerificationResults::VerificationResults(const CompilerOptions* compiler_options)
|
|
: compiler_options_(compiler_options),
|
|
verified_methods_lock_("compiler verified methods lock"),
|
|
rejected_classes_lock_("compiler rejected classes lock") {}
|
|
|
|
VerificationResults::~VerificationResults() {
|
|
WriterMutexLock mu(Thread::Current(), verified_methods_lock_);
|
|
STLDeleteValues(&verified_methods_);
|
|
atomic_verified_methods_.Visit([](const DexFileReference& ref ATTRIBUTE_UNUSED,
|
|
const VerifiedMethod* method) {
|
|
delete method;
|
|
});
|
|
}
|
|
|
|
void VerificationResults::ProcessVerifiedMethod(verifier::MethodVerifier* method_verifier) {
|
|
DCHECK(method_verifier != nullptr);
|
|
if (!compiler_options_->IsAnyCompilationEnabled()) {
|
|
// Verified methods are only required for quickening and compilation.
|
|
return;
|
|
}
|
|
MethodReference ref = method_verifier->GetMethodReference();
|
|
std::unique_ptr<const VerifiedMethod> verified_method(VerifiedMethod::Create(method_verifier));
|
|
if (verified_method == nullptr) {
|
|
// We'll punt this later.
|
|
return;
|
|
}
|
|
AtomicMap::InsertResult result = atomic_verified_methods_.Insert(
|
|
DexFileReference(ref.dex_file, ref.dex_method_index),
|
|
/*expected*/ nullptr,
|
|
verified_method.get());
|
|
const VerifiedMethod* existing = nullptr;
|
|
bool inserted;
|
|
if (result != AtomicMap::kInsertResultInvalidDexFile) {
|
|
inserted = (result == AtomicMap::kInsertResultSuccess);
|
|
if (!inserted) {
|
|
// Rare case.
|
|
CHECK(atomic_verified_methods_.Get(DexFileReference(ref.dex_file, ref.dex_method_index),
|
|
&existing));
|
|
CHECK_NE(verified_method.get(), existing);
|
|
}
|
|
} else {
|
|
WriterMutexLock mu(Thread::Current(), verified_methods_lock_);
|
|
auto it = verified_methods_.find(ref);
|
|
inserted = it == verified_methods_.end();
|
|
if (inserted) {
|
|
verified_methods_.Put(ref, verified_method.get());
|
|
DCHECK(verified_methods_.find(ref) != verified_methods_.end());
|
|
} else {
|
|
existing = it->second;
|
|
}
|
|
}
|
|
if (inserted) {
|
|
// Successfully added, release the unique_ptr since we no longer have ownership.
|
|
DCHECK_EQ(GetVerifiedMethod(ref), verified_method.get());
|
|
verified_method.release();
|
|
} else {
|
|
// TODO: Investigate why are we doing the work again for this method and try to avoid it.
|
|
LOG(WARNING) << "Method processed more than once: " << ref.PrettyMethod();
|
|
if (!Runtime::Current()->UseJitCompilation()) {
|
|
if (kIsDebugBuild) {
|
|
auto ex_set = existing->GetSafeCastSet();
|
|
auto ve_set = verified_method->GetSafeCastSet();
|
|
CHECK_EQ(ex_set == nullptr, ve_set == nullptr);
|
|
CHECK((ex_set == nullptr) || (ex_set->size() == ve_set->size()));
|
|
}
|
|
}
|
|
// Let the unique_ptr delete the new verified method since there was already an existing one
|
|
// registered. It is unsafe to replace the existing one since the JIT may be using it to
|
|
// generate a native GC map.
|
|
}
|
|
}
|
|
|
|
const VerifiedMethod* VerificationResults::GetVerifiedMethod(MethodReference ref) {
|
|
const VerifiedMethod* ret = nullptr;
|
|
DCHECK(compiler_options_->IsAnyCompilationEnabled());
|
|
if (atomic_verified_methods_.Get(DexFileReference(ref.dex_file, ref.dex_method_index), &ret)) {
|
|
return ret;
|
|
}
|
|
ReaderMutexLock mu(Thread::Current(), verified_methods_lock_);
|
|
auto it = verified_methods_.find(ref);
|
|
return (it != verified_methods_.end()) ? it->second : nullptr;
|
|
}
|
|
|
|
void VerificationResults::CreateVerifiedMethodFor(MethodReference ref) {
|
|
// This method should only be called for classes verified at compile time,
|
|
// which have no verifier error, nor has methods that we know will throw
|
|
// at runtime.
|
|
std::unique_ptr<VerifiedMethod> verified_method = std::make_unique<VerifiedMethod>(
|
|
/* encountered_error_types */ 0, /* has_runtime_throw */ false);
|
|
if (atomic_verified_methods_.Insert(DexFileReference(ref.dex_file, ref.dex_method_index),
|
|
/*expected*/ nullptr,
|
|
verified_method.get()) ==
|
|
AtomicMap::InsertResult::kInsertResultSuccess) {
|
|
verified_method.release();
|
|
}
|
|
}
|
|
|
|
void VerificationResults::AddRejectedClass(ClassReference ref) {
|
|
{
|
|
WriterMutexLock mu(Thread::Current(), rejected_classes_lock_);
|
|
rejected_classes_.insert(ref);
|
|
}
|
|
DCHECK(IsClassRejected(ref));
|
|
}
|
|
|
|
bool VerificationResults::IsClassRejected(ClassReference ref) {
|
|
ReaderMutexLock mu(Thread::Current(), rejected_classes_lock_);
|
|
return (rejected_classes_.find(ref) != rejected_classes_.end());
|
|
}
|
|
|
|
bool VerificationResults::IsCandidateForCompilation(MethodReference&,
|
|
const uint32_t access_flags) {
|
|
if (!compiler_options_->IsAotCompilationEnabled()) {
|
|
return false;
|
|
}
|
|
// Don't compile class initializers unless kEverything.
|
|
if ((compiler_options_->GetCompilerFilter() != CompilerFilter::kEverything) &&
|
|
((access_flags & kAccConstructor) != 0) && ((access_flags & kAccStatic) != 0)) {
|
|
return false;
|
|
}
|
|
return true;
|
|
}
|
|
|
|
void VerificationResults::AddDexFile(const DexFile* dex_file) {
|
|
atomic_verified_methods_.AddDexFile(dex_file, dex_file->NumMethodIds());
|
|
WriterMutexLock mu(Thread::Current(), verified_methods_lock_);
|
|
// There can be some verified methods that are already registered for the dex_file since we set
|
|
// up well known classes earlier. Remove these and put them in the array so that we don't
|
|
// accidentally miss seeing them.
|
|
for (auto it = verified_methods_.begin(); it != verified_methods_.end(); ) {
|
|
MethodReference ref = it->first;
|
|
if (ref.dex_file == dex_file) {
|
|
CHECK(atomic_verified_methods_.Insert(DexFileReference(ref.dex_file, ref.dex_method_index),
|
|
nullptr,
|
|
it->second) ==
|
|
AtomicMap::kInsertResultSuccess);
|
|
it = verified_methods_.erase(it);
|
|
} else {
|
|
++it;
|
|
}
|
|
}
|
|
}
|
|
|
|
} // namespace art
|