blob: de0b892f5fcf8b70ab8450795120aa3f47e838a8 [file] [log] [blame]
Elliott Hughes8d768a92011-09-14 16:35:25 -07001/*
2 * Copyright (C) 2011 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
Carl Shapiro0e5d75d2011-07-06 18:28:37 -070016
Brian Carlstromfc0e3212013-07-17 14:40:12 -070017#ifndef ART_RUNTIME_THREAD_H_
18#define ART_RUNTIME_THREAD_H_
Carl Shapiro0e5d75d2011-07-06 18:28:37 -070019
Elliott Hughes02b48d12011-09-07 17:15:51 -070020#include <bitset>
Ian Rogers306057f2012-11-26 12:45:53 -080021#include <deque>
Elliott Hughesa0957642011-09-02 14:27:33 -070022#include <iosfwd>
Ian Rogersb033c752011-07-20 12:22:35 -070023#include <list>
Ian Rogers700a4022014-05-19 16:49:03 -070024#include <memory>
Dave Allison8ce6b902014-08-26 11:07:58 -070025#include <setjmp.h>
Elliott Hughes8daa0922011-09-11 13:46:25 -070026#include <string>
Carl Shapirob5573532011-07-12 18:22:59 -070027
Mingyao Yang4dcfc432015-04-21 16:55:22 -070028#include "arch/context.h"
Ian Rogersd582fa42014-11-05 23:46:43 -080029#include "arch/instruction_set.h"
Ian Rogersb8e087e2014-07-09 21:12:06 -070030#include "atomic.h"
Andreas Gampe542451c2016-07-26 09:02:02 -070031#include "base/enums.h"
Elliott Hughes76160052012-12-12 16:31:20 -080032#include "base/macros.h"
Ian Rogers719d1a32014-03-06 12:13:39 -080033#include "base/mutex.h"
Ian Rogers848871b2013-08-05 10:56:33 -070034#include "entrypoints/jni/jni_entrypoints.h"
Ian Rogers7655f292013-07-29 11:07:13 -070035#include "entrypoints/quick/quick_entrypoints.h"
Andreas Gampe2c19f5b2016-11-28 08:10:18 -080036#include "gc_root.h"
Brian Carlstrom578bbdc2011-07-21 14:07:47 -070037#include "globals.h"
Mathieu Chartiereb8167a2014-05-07 15:43:14 -070038#include "handle_scope.h"
Elliott Hughes956af0f2014-12-11 14:34:28 -080039#include "instrumentation.h"
Ian Rogers306057f2012-11-26 12:45:53 -080040#include "jvalue.h"
Mathieu Chartier83c8ee02014-01-28 14:50:23 -080041#include "object_callbacks.h"
Brian Carlstrom578bbdc2011-07-21 14:07:47 -070042#include "offsets.h"
Elliott Hughes9d5ccec2011-09-19 13:19:50 -070043#include "runtime_stats.h"
Elliott Hughes68e76522011-10-05 13:22:16 -070044#include "stack.h"
Ian Rogers2dd0e2c2013-01-24 12:42:14 -080045#include "thread_state.h"
Ian Rogersb033c752011-07-20 12:22:35 -070046
Christopher Ferris6cff48f2014-01-26 21:36:13 -080047class BacktraceMap;
48
Carl Shapiro0e5d75d2011-07-06 18:28:37 -070049namespace art {
50
Mathieu Chartier15d34022014-02-26 17:16:38 -080051namespace gc {
Hiroshi Yamauchi0b713572015-06-16 18:29:23 -070052namespace accounting {
53 template<class T> class AtomicStack;
54} // namespace accounting
Mathieu Chartier15d34022014-02-26 17:16:38 -080055namespace collector {
Mingyao Yang98d1cc82014-05-15 17:02:16 -070056 class SemiSpace;
Mathieu Chartier15d34022014-02-26 17:16:38 -080057} // namespace collector
58} // namespace gc
59
Ian Rogers2dd0e2c2013-01-24 12:42:14 -080060namespace mirror {
Ian Rogers848871b2013-08-05 10:56:33 -070061 class Array;
62 class Class;
63 class ClassLoader;
64 class Object;
65 template<class T> class ObjectArray;
66 template<class T> class PrimitiveArray;
67 typedef PrimitiveArray<int32_t> IntArray;
68 class StackTraceElement;
Vladimir Marko80afd022015-05-19 18:08:00 +010069 class String;
Ian Rogers848871b2013-08-05 10:56:33 -070070 class Throwable;
Ian Rogers2dd0e2c2013-01-24 12:42:14 -080071} // namespace mirror
Mathieu Chartier12d625f2015-03-13 11:33:37 -070072
73namespace verifier {
Nicolas Geoffray340dafa2016-11-18 16:03:10 +000074 class MethodVerifier;
75 class VerifierDeps;
Mathieu Chartier12d625f2015-03-13 11:33:37 -070076} // namespace verifier
77
Mathieu Chartiere401d142015-04-22 13:56:20 -070078class ArtMethod;
Ian Rogers2dd0e2c2013-01-24 12:42:14 -080079class BaseMutex;
80class ClassLinker;
Ian Rogers7a22fa62013-01-23 12:16:16 -080081class Closure;
Ian Rogersbdb03912011-09-14 00:55:44 -070082class Context;
Ian Rogers1b09b092012-08-20 15:35:52 -070083struct DebugInvokeReq;
Sebastien Hertz07474662015-08-25 15:12:33 +000084class DeoptimizationContextRecord;
Ian Rogers81d425b2012-09-27 16:03:43 -070085class DexFile;
Mingyao Yang99170c62015-07-06 11:10:37 -070086class FrameIdToShadowFrame;
Ian Rogersb48b9eb2014-02-28 16:20:21 -080087class JavaVMExt;
Ian Rogers81d425b2012-09-27 16:03:43 -070088struct JNIEnvExt;
Elliott Hughes8daa0922011-09-11 13:46:25 -070089class Monitor;
Mathieu Chartier2b7c4d12014-05-19 10:52:16 -070090class ScopedObjectAccessAlreadyRunnable;
Logan Chienf7ad17e2012-03-15 03:10:03 +080091class ShadowFrame;
Sebastien Hertz597c4f02015-01-26 17:37:14 +010092class SingleStepControl;
Sebastien Hertzf7958692015-06-09 14:09:14 +020093class StackedShadowFrameRecord;
Brian Carlstrom40381fb2011-10-19 14:13:40 -070094class Thread;
95class ThreadList;
Carl Shapiro0e5d75d2011-07-06 18:28:37 -070096
Elliott Hughes34e06962012-04-09 13:55:55 -070097// Thread priorities. These must match the Thread.MIN_PRIORITY,
98// Thread.NORM_PRIORITY, and Thread.MAX_PRIORITY constants.
99enum ThreadPriority {
100 kMinThreadPriority = 1,
101 kNormThreadPriority = 5,
102 kMaxThreadPriority = 10,
103};
104
Ian Rogers474b6da2012-09-25 00:20:38 -0700105enum ThreadFlag {
Ian Rogers50ffee22012-11-20 11:47:44 -0800106 kSuspendRequest = 1, // If set implies that suspend_count_ > 0 and the Thread should enter the
107 // safepoint handler.
Yu Lieac44242015-06-29 10:50:03 +0800108 kCheckpointRequest = 2, // Request that the thread do some checkpoint work and then continue.
Hiroshi Yamauchi30493242016-11-03 13:06:52 -0700109 kEmptyCheckpointRequest = 4, // Request that the thread do empty checkpoint and then continue.
110 kActiveSuspendBarrier = 8, // Register that at least 1 suspend barrier needs to be passed.
Ian Rogers474b6da2012-09-25 00:20:38 -0700111};
112
Sebastien Hertzf7958692015-06-09 14:09:14 +0200113enum class StackedShadowFrameType {
Mingyao Yang1f2d3ba2015-05-18 12:12:50 -0700114 kShadowFrameUnderConstruction,
Andreas Gampe639bdd12015-06-03 11:22:45 -0700115 kDeoptimizationShadowFrame,
Mingyao Yang1f2d3ba2015-05-18 12:12:50 -0700116};
117
Hiroshi Yamauchi7ed9c562016-02-02 15:22:09 -0800118// This should match RosAlloc::kNumThreadLocalSizeBrackets.
119static constexpr size_t kNumRosAllocThreadLocalSizeBracketsInThread = 16;
Ian Rogerse63db272014-07-15 15:36:11 -0700120
Dave Allison648d7112014-07-25 16:15:27 -0700121// Thread's stack layout for implicit stack overflow checks:
122//
123// +---------------------+ <- highest address of stack memory
124// | |
125// . . <- SP
126// | |
127// | |
128// +---------------------+ <- stack_end
129// | |
130// | Gap |
131// | |
132// +---------------------+ <- stack_begin
133// | |
134// | Protected region |
135// | |
136// +---------------------+ <- lowest address of stack memory
137//
138// The stack always grows down in memory. At the lowest address is a region of memory
139// that is set mprotect(PROT_NONE). Any attempt to read/write to this region will
140// result in a segmentation fault signal. At any point, the thread's SP will be somewhere
141// between the stack_end and the highest address in stack memory. An implicit stack
142// overflow check is a read of memory at a certain offset below the current SP (4K typically).
143// If the thread's SP is below the stack_end address this will be a read into the protected
144// region. If the SP is above the stack_end address, the thread is guaranteed to have
145// at least 4K of space. Because stack overflow checks are only performed in generated code,
146// if the thread makes a call out to a native function (through JNI), that native function
147// might only have 4K of memory (if the SP is adjacent to stack_end).
148
Ian Rogersdd7624d2014-03-14 17:43:00 -0700149class Thread {
Carl Shapiro0e5d75d2011-07-06 18:28:37 -0700150 public:
Andreas Gampe7ea6f792014-07-14 16:21:44 -0700151 static const size_t kStackOverflowImplicitCheckSize;
Dave Allisonf9439142014-03-27 15:10:22 -0700152
Elliott Hughes462c9442012-03-23 18:47:50 -0700153 // Creates a new native thread corresponding to the given managed peer.
154 // Used to implement Thread.start.
Ian Rogers52673ff2012-06-27 23:25:34 -0700155 static void CreateNativeThread(JNIEnv* env, jobject peer, size_t stack_size, bool daemon);
Carl Shapiro61e019d2011-07-14 16:53:09 -0700156
Elliott Hughes462c9442012-03-23 18:47:50 -0700157 // Attaches the calling native thread to the runtime, returning the new native peer.
158 // Used to implement JNI AttachCurrentThread and AttachCurrentThreadAsDaemon calls.
Mathieu Chartier664bebf2012-11-12 16:54:11 -0800159 static Thread* Attach(const char* thread_name, bool as_daemon, jobject thread_group,
160 bool create_peer);
Andreas Gampe732b0ac2017-01-18 15:23:39 -0800161 // Attaches the calling native thread to the runtime, returning the new native peer.
162 static Thread* Attach(const char* thread_name, bool as_daemon, jobject thread_peer);
Carl Shapirob5573532011-07-12 18:22:59 -0700163
Brian Carlstromcaabb1b2011-10-11 18:09:13 -0700164 // Reset internal state of child thread after fork.
165 void InitAfterFork();
166
Ian Rogers6f3dbba2014-10-14 17:41:57 -0700167 // Get the currently executing thread, frequently referred to as 'self'. This call has reasonably
168 // high cost and so we favor passing self around when possible.
169 // TODO: mark as PURE so the compiler may coalesce and remove?
Ian Rogers02ed4c02013-09-06 13:10:04 -0700170 static Thread* Current();
Carl Shapiro0e5d75d2011-07-06 18:28:37 -0700171
Ian Rogers7b078e82014-09-10 14:44:24 -0700172 // On a runnable thread, check for pending thread suspension request and handle if pending.
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700173 void AllowThreadSuspension() REQUIRES_SHARED(Locks::mutator_lock_);
Ian Rogers7b078e82014-09-10 14:44:24 -0700174
175 // Process pending thread suspension request and handle if pending.
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700176 void CheckSuspend() REQUIRES_SHARED(Locks::mutator_lock_);
Ian Rogers7b078e82014-09-10 14:44:24 -0700177
Hiroshi Yamauchi30493242016-11-03 13:06:52 -0700178 // Process a pending empty checkpoint if pending.
Hiroshi Yamauchia2224042017-02-08 16:35:45 -0800179 void CheckEmptyCheckpointFromWeakRefAccess(BaseMutex* cond_var_mutex);
180 void CheckEmptyCheckpointFromMutex();
Hiroshi Yamauchi30493242016-11-03 13:06:52 -0700181
Mathieu Chartier2b7c4d12014-05-19 10:52:16 -0700182 static Thread* FromManagedThread(const ScopedObjectAccessAlreadyRunnable& ts,
Mathieu Chartierf5769e12017-01-10 15:54:41 -0800183 ObjPtr<mirror::Object> thread_peer)
Mathieu Chartier90443472015-07-16 20:32:27 -0700184 REQUIRES(Locks::thread_list_lock_, !Locks::thread_suspend_count_lock_)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700185 REQUIRES_SHARED(Locks::mutator_lock_);
Mathieu Chartier2b7c4d12014-05-19 10:52:16 -0700186 static Thread* FromManagedThread(const ScopedObjectAccessAlreadyRunnable& ts, jobject thread)
Mathieu Chartier90443472015-07-16 20:32:27 -0700187 REQUIRES(Locks::thread_list_lock_, !Locks::thread_suspend_count_lock_)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700188 REQUIRES_SHARED(Locks::mutator_lock_);
Elliott Hughes8daa0922011-09-11 13:46:25 -0700189
Elliott Hughes28fa76d2012-04-09 17:31:46 -0700190 // Translates 172 to pAllocArrayFromCode and so on.
Andreas Gampe542451c2016-07-26 09:02:02 -0700191 template<PointerSize size_of_pointers>
Ian Rogersdd7624d2014-03-14 17:43:00 -0700192 static void DumpThreadOffset(std::ostream& os, uint32_t offset);
Elliott Hughes28fa76d2012-04-09 17:31:46 -0700193
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700194 // Dumps a one-line summary of thread state (used for operator<<).
195 void ShortDump(std::ostream& os) const;
196
197 // Dumps the detailed thread state and the thread stack (used for SIGQUIT).
Nicolas Geoffraya73280d2016-02-15 13:05:16 +0000198 void Dump(std::ostream& os,
199 bool dump_native_stack = true,
Hiroshi Yamauchi13c16352017-01-31 10:15:08 -0800200 BacktraceMap* backtrace_map = nullptr,
201 bool force_dump_stack = false) const
Mathieu Chartier90443472015-07-16 20:32:27 -0700202 REQUIRES(!Locks::thread_suspend_count_lock_)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700203 REQUIRES_SHARED(Locks::mutator_lock_);
Elliott Hughesa0957642011-09-02 14:27:33 -0700204
Hiroshi Yamauchi02f365f2017-02-03 15:06:00 -0800205 void DumpJavaStack(std::ostream& os,
206 bool check_suspended = true,
207 bool dump_locks = true) const
Mathieu Chartier90443472015-07-16 20:32:27 -0700208 REQUIRES(!Locks::thread_suspend_count_lock_)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700209 REQUIRES_SHARED(Locks::mutator_lock_);
Mathieu Chartierc751fdc2014-03-30 15:25:44 -0700210
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700211 // Dumps the SIGQUIT per-thread header. 'thread' can be null for a non-attached thread, in which
Elliott Hughesabbe07d2012-06-05 17:42:23 -0700212 // case we use 'tid' to identify the thread, and we'll include as much information as we can.
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700213 static void DumpState(std::ostream& os, const Thread* thread, pid_t tid)
Mathieu Chartier90443472015-07-16 20:32:27 -0700214 REQUIRES(!Locks::thread_suspend_count_lock_)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700215 REQUIRES_SHARED(Locks::mutator_lock_);
Elliott Hughesabbe07d2012-06-05 17:42:23 -0700216
Ian Rogers474b6da2012-09-25 00:20:38 -0700217 ThreadState GetState() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700218 DCHECK_GE(tls32_.state_and_flags.as_struct.state, kTerminated);
219 DCHECK_LE(tls32_.state_and_flags.as_struct.state, kSuspended);
220 return static_cast<ThreadState>(tls32_.state_and_flags.as_struct.state);
Dave Allison0aded082013-11-07 13:15:11 -0800221 }
222
Ian Rogers474b6da2012-09-25 00:20:38 -0700223 ThreadState SetState(ThreadState new_state);
Ian Rogers52673ff2012-06-27 23:25:34 -0700224
Mathieu Chartier90443472015-07-16 20:32:27 -0700225 int GetSuspendCount() const REQUIRES(Locks::thread_suspend_count_lock_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700226 return tls32_.suspend_count;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700227 }
Elliott Hughes038a8062011-09-18 14:12:41 -0700228
Mathieu Chartier90443472015-07-16 20:32:27 -0700229 int GetDebugSuspendCount() const REQUIRES(Locks::thread_suspend_count_lock_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700230 return tls32_.debug_suspend_count;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700231 }
232
Mathieu Chartier858f1c52012-10-17 17:45:55 -0700233 bool IsSuspended() const {
Chris Dearman59cde532013-12-04 18:53:49 -0800234 union StateAndFlags state_and_flags;
Ian Rogersdd7624d2014-03-14 17:43:00 -0700235 state_and_flags.as_int = tls32_.state_and_flags.as_int;
Mathieu Chartier858f1c52012-10-17 17:45:55 -0700236 return state_and_flags.as_struct.state != kRunnable &&
237 (state_and_flags.as_struct.flags & kSuspendRequest) != 0;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700238 }
239
Hiroshi Yamauchi02e7f1a2016-10-03 15:32:01 -0700240 // If delta > 0 and (this != self or suspend_barrier is not null), this function may temporarily
241 // release thread_suspend_count_lock_ internally.
242 ALWAYS_INLINE
243 bool ModifySuspendCount(Thread* self,
244 int delta,
245 AtomicInteger* suspend_barrier,
246 bool for_debugger)
Mathieu Chartier90443472015-07-16 20:32:27 -0700247 REQUIRES(Locks::thread_suspend_count_lock_);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700248
Ian Rogersd9c4fc92013-10-01 19:45:43 -0700249 bool RequestCheckpoint(Closure* function)
Mathieu Chartier90443472015-07-16 20:32:27 -0700250 REQUIRES(Locks::thread_suspend_count_lock_);
Andreas Gampee9f67122016-10-27 19:21:23 -0700251 void RequestSynchronousCheckpoint(Closure* function)
252 REQUIRES(!Locks::thread_suspend_count_lock_, !Locks::thread_list_lock_);
Hiroshi Yamauchi30493242016-11-03 13:06:52 -0700253 bool RequestEmptyCheckpoint()
254 REQUIRES(Locks::thread_suspend_count_lock_);
Mathieu Chartier858f1c52012-10-17 17:45:55 -0700255
Hiroshi Yamauchi2cd334a2015-01-09 14:03:35 -0800256 void SetFlipFunction(Closure* function);
257 Closure* GetFlipFunction();
258
Hiroshi Yamauchi0b713572015-06-16 18:29:23 -0700259 gc::accounting::AtomicStack<mirror::Object>* GetThreadLocalMarkStack() {
260 CHECK(kUseReadBarrier);
261 return tlsPtr_.thread_local_mark_stack;
262 }
263 void SetThreadLocalMarkStack(gc::accounting::AtomicStack<mirror::Object>* stack) {
264 CHECK(kUseReadBarrier);
265 tlsPtr_.thread_local_mark_stack = stack;
266 }
267
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700268 // Called when thread detected that the thread_suspend_count_ was non-zero. Gives up share of
269 // mutator_lock_ and waits until it is resumed and thread_suspend_count_ is zero.
Ian Rogers9da7f592012-08-20 17:14:28 -0700270 void FullSuspendCheck()
Mathieu Chartier90443472015-07-16 20:32:27 -0700271 REQUIRES(!Locks::thread_suspend_count_lock_)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700272 REQUIRES_SHARED(Locks::mutator_lock_);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700273
274 // Transition from non-runnable to runnable state acquiring share on mutator_lock_.
Mathieu Chartier8ac9c912015-10-01 15:58:41 -0700275 ALWAYS_INLINE ThreadState TransitionFromSuspendedToRunnable()
Mathieu Chartier90443472015-07-16 20:32:27 -0700276 REQUIRES(!Locks::thread_suspend_count_lock_)
Mathieu Chartier8ac9c912015-10-01 15:58:41 -0700277 SHARED_LOCK_FUNCTION(Locks::mutator_lock_);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700278
279 // Transition from runnable into a state where mutator privileges are denied. Releases share of
280 // mutator lock.
Mathieu Chartier8ac9c912015-10-01 15:58:41 -0700281 ALWAYS_INLINE void TransitionFromRunnableToSuspended(ThreadState new_state)
Mathieu Chartier4e2cb092015-07-22 16:17:51 -0700282 REQUIRES(!Locks::thread_suspend_count_lock_, !Roles::uninterruptible_)
Mathieu Chartier8ac9c912015-10-01 15:58:41 -0700283 UNLOCK_FUNCTION(Locks::mutator_lock_);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700284
Ian Rogers0399dde2012-06-06 17:09:28 -0700285 // Once called thread suspension will cause an assertion failure.
Mathieu Chartier4e2cb092015-07-22 16:17:51 -0700286 const char* StartAssertNoThreadSuspension(const char* cause) ACQUIRE(Roles::uninterruptible_) {
287 Roles::uninterruptible_.Acquire(); // No-op.
Mathieu Chartier590fee92013-09-13 13:46:47 -0700288 if (kIsDebugBuild) {
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700289 CHECK(cause != nullptr);
Ian Rogersdd7624d2014-03-14 17:43:00 -0700290 const char* previous_cause = tlsPtr_.last_no_thread_suspension_cause;
291 tls32_.no_thread_suspension++;
292 tlsPtr_.last_no_thread_suspension_cause = cause;
Mathieu Chartier590fee92013-09-13 13:46:47 -0700293 return previous_cause;
294 } else {
295 return nullptr;
296 }
Ian Rogers0399dde2012-06-06 17:09:28 -0700297 }
Ian Rogers52673ff2012-06-27 23:25:34 -0700298
Ian Rogers0399dde2012-06-06 17:09:28 -0700299 // End region where no thread suspension is expected.
Mathieu Chartier4e2cb092015-07-22 16:17:51 -0700300 void EndAssertNoThreadSuspension(const char* old_cause) RELEASE(Roles::uninterruptible_) {
Mathieu Chartier590fee92013-09-13 13:46:47 -0700301 if (kIsDebugBuild) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700302 CHECK(old_cause != nullptr || tls32_.no_thread_suspension == 1);
303 CHECK_GT(tls32_.no_thread_suspension, 0U);
304 tls32_.no_thread_suspension--;
305 tlsPtr_.last_no_thread_suspension_cause = old_cause;
Mathieu Chartier590fee92013-09-13 13:46:47 -0700306 }
Mathieu Chartier4e2cb092015-07-22 16:17:51 -0700307 Roles::uninterruptible_.Release(); // No-op.
Ian Rogers0399dde2012-06-06 17:09:28 -0700308 }
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700309
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700310 void AssertThreadSuspensionIsAllowable(bool check_locks = true) const;
Ian Rogers0399dde2012-06-06 17:09:28 -0700311
Mathieu Chartier10b218d2016-07-25 17:48:52 -0700312 // Return true if thread suspension is allowable.
313 bool IsThreadSuspensionAllowable() const;
314
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700315 bool IsDaemon() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700316 return tls32_.daemon;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700317 }
318
Mathieu Chartier14c3bf92015-07-13 14:35:43 -0700319 size_t NumberOfHeldMutexes() const;
320
Mathieu Chartierf5769e12017-01-10 15:54:41 -0800321 bool HoldsLock(ObjPtr<mirror::Object> object) const REQUIRES_SHARED(Locks::mutator_lock_);
Elliott Hughes5f791332011-09-15 17:45:30 -0700322
Elliott Hughes8daa0922011-09-11 13:46:25 -0700323 /*
324 * Changes the priority of this thread to match that of the java.lang.Thread object.
325 *
326 * We map a priority value from 1-10 to Linux "nice" values, where lower
327 * numbers indicate higher priority.
328 */
329 void SetNativePriority(int newPriority);
330
331 /*
332 * Returns the thread priority for the current thread by querying the system.
333 * This is useful when attaching a thread through JNI.
334 *
335 * Returns a value from 1 to 10 (compatible with java.lang.Thread values).
336 */
337 static int GetNativePriority();
338
Mathieu Chartier61b3cd42016-04-18 11:43:29 -0700339 // Guaranteed to be non-zero.
Ian Rogersd9c4fc92013-10-01 19:45:43 -0700340 uint32_t GetThreadId() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700341 return tls32_.thin_lock_thread_id;
Carl Shapirob5573532011-07-12 18:22:59 -0700342 }
343
Elliott Hughesd92bec42011-09-02 17:04:36 -0700344 pid_t GetTid() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700345 return tls32_.tid;
Elliott Hughesd92bec42011-09-02 17:04:36 -0700346 }
Elliott Hughese27955c2011-08-26 15:21:24 -0700347
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700348 // Returns the java.lang.Thread's name, or null if this Thread* doesn't have a peer.
Andreas Gampe08883de2016-11-08 13:20:52 -0800349 mirror::String* GetThreadName() const REQUIRES_SHARED(Locks::mutator_lock_);
Elliott Hughes899e7892012-01-24 14:57:32 -0800350
Elliott Hughesffb465f2012-03-01 18:46:05 -0800351 // Sets 'name' to the java.lang.Thread's name. This requires no transition to managed code,
352 // allocation, or locking.
353 void GetThreadName(std::string& name) const;
354
Elliott Hughes899e7892012-01-24 14:57:32 -0800355 // Sets the thread's name.
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700356 void SetThreadName(const char* name) REQUIRES_SHARED(Locks::mutator_lock_);
Elliott Hughesfc861622011-10-17 17:57:47 -0700357
Jeff Hao57dac6e2013-08-15 16:36:24 -0700358 // Returns the thread-specific CPU-time clock in microseconds or -1 if unavailable.
359 uint64_t GetCpuMicroTime() const;
360
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700361 mirror::Object* GetPeer() const REQUIRES_SHARED(Locks::mutator_lock_) {
Nicolas Geoffrayffc8cad2017-02-10 10:59:22 +0000362 DCHECK(Thread::Current() == this) << "Use GetPeerFromOtherThread instead";
Ian Rogersdd7624d2014-03-14 17:43:00 -0700363 CHECK(tlsPtr_.jpeer == nullptr);
364 return tlsPtr_.opeer;
Elliott Hughes8daa0922011-09-11 13:46:25 -0700365 }
Andreas Gampe202f85a2017-02-06 10:23:26 -0800366 // GetPeer is not safe if called on another thread in the middle of the CC thread flip and
367 // the thread's stack may have not been flipped yet and peer may be a from-space (stale) ref.
368 // This function will explicitly mark/forward it.
369 mirror::Object* GetPeerFromOtherThread() const REQUIRES_SHARED(Locks::mutator_lock_);
Elliott Hughes8daa0922011-09-11 13:46:25 -0700370
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700371 bool HasPeer() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700372 return tlsPtr_.jpeer != nullptr || tlsPtr_.opeer != nullptr;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700373 }
374
Elliott Hughes9d5ccec2011-09-19 13:19:50 -0700375 RuntimeStats* GetStats() {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700376 return &tls64_.stats;
Elliott Hughes9d5ccec2011-09-19 13:19:50 -0700377 }
378
Elliott Hughes7dc51662012-05-16 14:48:43 -0700379 bool IsStillStarting() const;
380
Carl Shapiro0e5d75d2011-07-06 18:28:37 -0700381 bool IsExceptionPending() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700382 return tlsPtr_.exception != nullptr;
Carl Shapiro0e5d75d2011-07-06 18:28:37 -0700383 }
384
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700385 mirror::Throwable* GetException() const REQUIRES_SHARED(Locks::mutator_lock_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700386 return tlsPtr_.exception;
Carl Shapiro0e5d75d2011-07-06 18:28:37 -0700387 }
388
Andreas Gamped9efea62014-07-21 22:56:08 -0700389 void AssertPendingException() const;
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700390 void AssertPendingOOMException() const REQUIRES_SHARED(Locks::mutator_lock_);
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700391 void AssertNoPendingException() const;
Mathieu Chartier8d7672e2014-02-25 10:57:16 -0800392 void AssertNoPendingExceptionForNewException(const char* msg) const;
Ian Rogers00f7d0e2012-07-19 15:28:27 -0700393
Mathieu Chartier0795f232016-09-27 18:43:30 -0700394 void SetException(ObjPtr<mirror::Throwable> new_exception) REQUIRES_SHARED(Locks::mutator_lock_);
Ian Rogers0cfe1fb2011-08-26 03:29:44 -0700395
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700396 void ClearException() REQUIRES_SHARED(Locks::mutator_lock_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700397 tlsPtr_.exception = nullptr;
jeffhao94d6df42012-11-26 16:02:12 -0800398 }
399
Ian Rogersbdb03912011-09-14 00:55:44 -0700400 // Find catch block and perform long jump to appropriate exception handle
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700401 NO_RETURN void QuickDeliverException() REQUIRES_SHARED(Locks::mutator_lock_);
Ian Rogersbdb03912011-09-14 00:55:44 -0700402
403 Context* GetLongJumpContext();
Ian Rogers0399dde2012-06-06 17:09:28 -0700404 void ReleaseLongJumpContext(Context* context) {
Mingyao Yang4dcfc432015-04-21 16:55:22 -0700405 if (tlsPtr_.long_jump_context != nullptr) {
406 // Each QuickExceptionHandler gets a long jump context and uses
407 // it for doing the long jump, after finding catch blocks/doing deoptimization.
408 // Both finding catch blocks and deoptimization can trigger another
409 // exception such as a result of class loading. So there can be nested
410 // cases of exception handling and multiple contexts being used.
411 // ReleaseLongJumpContext tries to save the context in tlsPtr_.long_jump_context
412 // for reuse so there is no need to always allocate a new one each time when
413 // getting a context. Since we only keep one context for reuse, delete the
414 // existing one since the passed in context is yet to be used for longjump.
415 delete tlsPtr_.long_jump_context;
416 }
Ian Rogersdd7624d2014-03-14 17:43:00 -0700417 tlsPtr_.long_jump_context = context;
Shih-wei Liao1a18c8c2011-08-14 17:47:36 -0700418 }
419
Andreas Gampe6ec8ebd2014-07-25 13:36:56 -0700420 // Get the current method and dex pc. If there are errors in retrieving the dex pc, this will
421 // abort the runtime iff abort_on_error is true.
Hiroshi Yamauchi02f365f2017-02-03 15:06:00 -0800422 ArtMethod* GetCurrentMethod(uint32_t* dex_pc,
423 bool check_suspended = true,
424 bool abort_on_error = true) const
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700425 REQUIRES_SHARED(Locks::mutator_lock_);
Ian Rogers0399dde2012-06-06 17:09:28 -0700426
Nicolas Geoffray7642cfc2015-02-26 10:56:09 +0000427 // Returns whether the given exception was thrown by the current Java method being executed
428 // (Note that this includes native Java methods).
Mathieu Chartierf5769e12017-01-10 15:54:41 -0800429 bool IsExceptionThrownByCurrentMethod(ObjPtr<mirror::Throwable> exception) const
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700430 REQUIRES_SHARED(Locks::mutator_lock_);
Nicolas Geoffray7642cfc2015-02-26 10:56:09 +0000431
Mathieu Chartiere401d142015-04-22 13:56:20 -0700432 void SetTopOfStack(ArtMethod** top_method) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700433 tlsPtr_.managed_stack.SetTopQuickFrame(top_method);
Carl Shapiro0e5d75d2011-07-06 18:28:37 -0700434 }
435
Jeff Hao11ffc2d2013-02-01 11:52:17 -0800436 void SetTopOfShadowStack(ShadowFrame* top) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700437 tlsPtr_.managed_stack.SetTopShadowFrame(top);
Jeff Hao11ffc2d2013-02-01 11:52:17 -0800438 }
439
Ian Rogers0399dde2012-06-06 17:09:28 -0700440 bool HasManagedStack() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700441 return (tlsPtr_.managed_stack.GetTopQuickFrame() != nullptr) ||
442 (tlsPtr_.managed_stack.GetTopShadowFrame() != nullptr);
Ian Rogersbdb03912011-09-14 00:55:44 -0700443 }
444
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700445 // If 'msg' is null, no detail message is set.
Nicolas Geoffray0aa50ce2015-03-10 11:03:29 +0000446 void ThrowNewException(const char* exception_class_descriptor, const char* msg)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700447 REQUIRES_SHARED(Locks::mutator_lock_) REQUIRES(!Roles::uninterruptible_);
Elliott Hughes5cb5ad22011-10-02 12:13:39 -0700448
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700449 // If 'msg' is null, no detail message is set. An exception must be pending, and will be
Elliott Hughesa4f94742012-05-29 16:28:38 -0700450 // used as the new exception's cause.
Nicolas Geoffray0aa50ce2015-03-10 11:03:29 +0000451 void ThrowNewWrappedException(const char* exception_class_descriptor, const char* msg)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700452 REQUIRES_SHARED(Locks::mutator_lock_) REQUIRES(!Roles::uninterruptible_);
Elliott Hughesa4f94742012-05-29 16:28:38 -0700453
Nicolas Geoffray0aa50ce2015-03-10 11:03:29 +0000454 void ThrowNewExceptionF(const char* exception_class_descriptor, const char* fmt, ...)
455 __attribute__((format(printf, 3, 4)))
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700456 REQUIRES_SHARED(Locks::mutator_lock_) REQUIRES(!Roles::uninterruptible_);
Elliott Hughesa5b897e2011-08-16 11:33:06 -0700457
Nicolas Geoffray0aa50ce2015-03-10 11:03:29 +0000458 void ThrowNewExceptionV(const char* exception_class_descriptor, const char* fmt, va_list ap)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700459 REQUIRES_SHARED(Locks::mutator_lock_) REQUIRES(!Roles::uninterruptible_);
Elliott Hughes4a2b4172011-09-20 17:08:25 -0700460
Elliott Hughes2ced6a52011-10-16 18:44:48 -0700461 // OutOfMemoryError is special, because we need to pre-allocate an instance.
Elliott Hughes8a8b9cb2012-04-13 18:29:22 -0700462 // Only the GC should call this.
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700463 void ThrowOutOfMemoryError(const char* msg) REQUIRES_SHARED(Locks::mutator_lock_)
Mathieu Chartiered8990a2015-07-23 14:11:16 -0700464 REQUIRES(!Roles::uninterruptible_);
Elliott Hughes79082e32011-08-25 12:07:32 -0700465
Elliott Hughesbe759c62011-09-08 19:38:21 -0700466 static void Startup();
Elliott Hughes038a8062011-09-18 14:12:41 -0700467 static void FinishStartup();
Elliott Hughesc1674ed2011-08-25 18:09:09 -0700468 static void Shutdown();
Carl Shapirob5573532011-07-12 18:22:59 -0700469
Ian Rogersb033c752011-07-20 12:22:35 -0700470 // JNI methods
Elliott Hughes69f5bc62011-08-24 09:26:14 -0700471 JNIEnvExt* GetJniEnv() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700472 return tlsPtr_.jni_env;
Ian Rogersb033c752011-07-20 12:22:35 -0700473 }
474
Ian Rogers408f79a2011-08-23 18:22:33 -0700475 // Convert a jobject into a Object*
Mathieu Chartierc4f39252016-10-05 18:32:08 -0700476 ObjPtr<mirror::Object> DecodeJObject(jobject obj) const REQUIRES_SHARED(Locks::mutator_lock_);
Hiroshi Yamauchi04302db2015-11-11 23:45:34 -0800477 // Checks if the weak global ref has been cleared by the GC without decoding it.
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700478 bool IsJWeakCleared(jweak obj) const REQUIRES_SHARED(Locks::mutator_lock_);
Ian Rogersb033c752011-07-20 12:22:35 -0700479
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700480 mirror::Object* GetMonitorEnterObject() const REQUIRES_SHARED(Locks::mutator_lock_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700481 return tlsPtr_.monitor_enter_object;
482 }
483
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700484 void SetMonitorEnterObject(mirror::Object* obj) REQUIRES_SHARED(Locks::mutator_lock_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700485 tlsPtr_.monitor_enter_object = obj;
486 }
487
Elliott Hughes8daa0922011-09-11 13:46:25 -0700488 // Implements java.lang.Thread.interrupted.
Mathieu Chartier90443472015-07-16 20:32:27 -0700489 bool Interrupted() REQUIRES(!*wait_mutex_);
Elliott Hughes8daa0922011-09-11 13:46:25 -0700490 // Implements java.lang.Thread.isInterrupted.
Mathieu Chartier90443472015-07-16 20:32:27 -0700491 bool IsInterrupted() REQUIRES(!*wait_mutex_);
492 bool IsInterruptedLocked() REQUIRES(wait_mutex_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700493 return interrupted_;
494 }
Mathieu Chartier90443472015-07-16 20:32:27 -0700495 void Interrupt(Thread* self) REQUIRES(!*wait_mutex_);
496 void SetInterruptedLocked(bool i) REQUIRES(wait_mutex_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700497 interrupted_ = i;
498 }
Mathieu Chartier90443472015-07-16 20:32:27 -0700499 void Notify() REQUIRES(!*wait_mutex_);
Ian Rogersdd7624d2014-03-14 17:43:00 -0700500
Mathieu Chartier3f7f03c2016-09-26 11:39:52 -0700501 ALWAYS_INLINE void PoisonObjectPointers() {
502 ++poison_object_cookie_;
503 }
504
Mathieu Chartiera59d9b22016-09-26 18:13:17 -0700505 ALWAYS_INLINE static void PoisonObjectPointersIfDebug();
506
Mathieu Chartier3f7f03c2016-09-26 11:39:52 -0700507 ALWAYS_INLINE uintptr_t GetPoisonObjectCookie() const {
508 return poison_object_cookie_;
509 }
510
Ian Rogersdd7624d2014-03-14 17:43:00 -0700511 private:
Mathieu Chartier90443472015-07-16 20:32:27 -0700512 void NotifyLocked(Thread* self) REQUIRES(wait_mutex_);
Ian Rogersdd7624d2014-03-14 17:43:00 -0700513
514 public:
515 Mutex* GetWaitMutex() const LOCK_RETURNED(wait_mutex_) {
516 return wait_mutex_;
517 }
518
Mathieu Chartier90443472015-07-16 20:32:27 -0700519 ConditionVariable* GetWaitConditionVariable() const REQUIRES(wait_mutex_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700520 return wait_cond_;
521 }
522
Mathieu Chartier90443472015-07-16 20:32:27 -0700523 Monitor* GetWaitMonitor() const REQUIRES(wait_mutex_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700524 return wait_monitor_;
525 }
526
Mathieu Chartier90443472015-07-16 20:32:27 -0700527 void SetWaitMonitor(Monitor* mon) REQUIRES(wait_mutex_) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700528 wait_monitor_ = mon;
529 }
530
Ian Rogersdd7624d2014-03-14 17:43:00 -0700531 // Waiter link-list support.
532 Thread* GetWaitNext() const {
533 return tlsPtr_.wait_next;
534 }
535
536 void SetWaitNext(Thread* next) {
537 tlsPtr_.wait_next = next;
538 }
Elliott Hughes5f791332011-09-15 17:45:30 -0700539
Ian Rogers68d8b422014-07-17 11:09:10 -0700540 jobject GetClassLoaderOverride() {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700541 return tlsPtr_.class_loader_override;
buzbeec143c552011-08-20 17:38:58 -0700542 }
543
Ian Rogers68d8b422014-07-17 11:09:10 -0700544 void SetClassLoaderOverride(jobject class_loader_override);
buzbeec143c552011-08-20 17:38:58 -0700545
Ian Rogersaaa20802011-09-11 21:47:37 -0700546 // Create the internal representation of a stack trace, that is more time
Sebastien Hertzee1d79a2014-02-21 15:46:30 +0100547 // and space efficient to compute than the StackTraceElement[].
548 template<bool kTransactionActive>
Mathieu Chartier2b7c4d12014-05-19 10:52:16 -0700549 jobject CreateInternalStackTrace(const ScopedObjectAccessAlreadyRunnable& soa) const
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700550 REQUIRES_SHARED(Locks::mutator_lock_);
Ian Rogersaaa20802011-09-11 21:47:37 -0700551
Elliott Hughes01158d72011-09-19 19:47:10 -0700552 // Convert an internal stack trace representation (returned by CreateInternalStackTrace) to a
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700553 // StackTraceElement[]. If output_array is null, a new array is created, otherwise as many
554 // frames as will fit are written into the given array. If stack_depth is non-null, it's updated
Elliott Hughes01158d72011-09-19 19:47:10 -0700555 // with the number of valid frames in the returned array.
Mathieu Chartier2b7c4d12014-05-19 10:52:16 -0700556 static jobjectArray InternalStackTraceToStackTraceElementArray(
557 const ScopedObjectAccessAlreadyRunnable& soa, jobject internal,
558 jobjectArray output_array = nullptr, int* stack_depth = nullptr)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700559 REQUIRES_SHARED(Locks::mutator_lock_);
Shih-wei Liao55df06b2011-08-26 14:39:27 -0700560
Mingyao Yang99170c62015-07-06 11:10:37 -0700561 bool HasDebuggerShadowFrames() const {
562 return tlsPtr_.frame_id_to_shadow_frame != nullptr;
563 }
564
Andreas Gampe585da952016-12-02 14:52:29 -0800565 void VisitRoots(RootVisitor* visitor, VisitRootFlags flags = kVisitRootFlagAllRoots)
566 REQUIRES_SHARED(Locks::mutator_lock_);
Elliott Hughes410c0c82011-09-01 17:58:25 -0700567
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700568 ALWAYS_INLINE void VerifyStack() REQUIRES_SHARED(Locks::mutator_lock_);
jeffhao25045522012-03-13 19:34:37 -0700569
Elliott Hughesbe759c62011-09-08 19:38:21 -0700570 //
571 // Offsets of various members of native Thread class, used by compiled code.
572 //
573
Andreas Gampe542451c2016-07-26 09:02:02 -0700574 template<PointerSize pointer_size>
Ian Rogersdd7624d2014-03-14 17:43:00 -0700575 static ThreadOffset<pointer_size> ThinLockIdOffset() {
576 return ThreadOffset<pointer_size>(
577 OFFSETOF_MEMBER(Thread, tls32_) +
578 OFFSETOF_MEMBER(tls_32bit_sized_values, thin_lock_thread_id));
Elliott Hughesbe759c62011-09-08 19:38:21 -0700579 }
580
Andreas Gampe542451c2016-07-26 09:02:02 -0700581 template<PointerSize pointer_size>
Ian Rogersdd7624d2014-03-14 17:43:00 -0700582 static ThreadOffset<pointer_size> ThreadFlagsOffset() {
583 return ThreadOffset<pointer_size>(
584 OFFSETOF_MEMBER(Thread, tls32_) +
585 OFFSETOF_MEMBER(tls_32bit_sized_values, state_and_flags));
Elliott Hughesbe759c62011-09-08 19:38:21 -0700586 }
587
Andreas Gampe542451c2016-07-26 09:02:02 -0700588 template<PointerSize pointer_size>
Roland Levillain7c1559a2015-12-15 10:55:36 +0000589 static ThreadOffset<pointer_size> IsGcMarkingOffset() {
590 return ThreadOffset<pointer_size>(
591 OFFSETOF_MEMBER(Thread, tls32_) +
592 OFFSETOF_MEMBER(tls_32bit_sized_values, is_gc_marking));
593 }
594
Igor Murashkinae7ff922016-10-06 14:59:19 -0700595 static constexpr size_t IsGcMarkingSize() {
596 return sizeof(tls32_.is_gc_marking);
597 }
598
Nicolas Geoffrayb331feb2016-02-05 16:51:53 +0000599 // Deoptimize the Java stack.
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700600 void DeoptimizeWithDeoptimizationException(JValue* result) REQUIRES_SHARED(Locks::mutator_lock_);
Nicolas Geoffrayb331feb2016-02-05 16:51:53 +0000601
Ian Rogersdd7624d2014-03-14 17:43:00 -0700602 private:
Andreas Gampe542451c2016-07-26 09:02:02 -0700603 template<PointerSize pointer_size>
Ian Rogersdd7624d2014-03-14 17:43:00 -0700604 static ThreadOffset<pointer_size> ThreadOffsetFromTlsPtr(size_t tls_ptr_offset) {
605 size_t base = OFFSETOF_MEMBER(Thread, tlsPtr_);
606 size_t scale;
607 size_t shrink;
Andreas Gampe542451c2016-07-26 09:02:02 -0700608 if (pointer_size == kRuntimePointerSize) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700609 scale = 1;
610 shrink = 1;
Andreas Gampe542451c2016-07-26 09:02:02 -0700611 } else if (pointer_size > kRuntimePointerSize) {
612 scale = static_cast<size_t>(pointer_size) / static_cast<size_t>(kRuntimePointerSize);
Ian Rogersdd7624d2014-03-14 17:43:00 -0700613 shrink = 1;
614 } else {
Andreas Gampe542451c2016-07-26 09:02:02 -0700615 DCHECK_GT(kRuntimePointerSize, pointer_size);
Ian Rogersdd7624d2014-03-14 17:43:00 -0700616 scale = 1;
Andreas Gampe542451c2016-07-26 09:02:02 -0700617 shrink = static_cast<size_t>(kRuntimePointerSize) / static_cast<size_t>(pointer_size);
Ian Rogersdd7624d2014-03-14 17:43:00 -0700618 }
619 return ThreadOffset<pointer_size>(base + ((tls_ptr_offset * scale) / shrink));
Ian Rogers07ec8e12012-12-01 01:26:51 -0800620 }
621
Ian Rogersdd7624d2014-03-14 17:43:00 -0700622 public:
Jeff Hao848f70a2014-01-15 13:49:50 -0800623 static uint32_t QuickEntryPointOffsetWithSize(size_t quick_entrypoint_offset,
Andreas Gampe542451c2016-07-26 09:02:02 -0700624 PointerSize pointer_size) {
625 if (pointer_size == PointerSize::k32) {
626 return QuickEntryPointOffset<PointerSize::k32>(quick_entrypoint_offset).
627 Uint32Value();
Jeff Hao848f70a2014-01-15 13:49:50 -0800628 } else {
Andreas Gampe542451c2016-07-26 09:02:02 -0700629 return QuickEntryPointOffset<PointerSize::k64>(quick_entrypoint_offset).
630 Uint32Value();
Jeff Hao848f70a2014-01-15 13:49:50 -0800631 }
632 }
633
Andreas Gampe542451c2016-07-26 09:02:02 -0700634 template<PointerSize pointer_size>
Ian Rogersdd7624d2014-03-14 17:43:00 -0700635 static ThreadOffset<pointer_size> QuickEntryPointOffset(size_t quick_entrypoint_offset) {
636 return ThreadOffsetFromTlsPtr<pointer_size>(
637 OFFSETOF_MEMBER(tls_ptr_sized_values, quick_entrypoints) + quick_entrypoint_offset);
Elliott Hughesbe759c62011-09-08 19:38:21 -0700638 }
639
Andreas Gampe542451c2016-07-26 09:02:02 -0700640 template<PointerSize pointer_size>
Ian Rogersdd7624d2014-03-14 17:43:00 -0700641 static ThreadOffset<pointer_size> JniEntryPointOffset(size_t jni_entrypoint_offset) {
642 return ThreadOffsetFromTlsPtr<pointer_size>(
643 OFFSETOF_MEMBER(tls_ptr_sized_values, jni_entrypoints) + jni_entrypoint_offset);
Elliott Hughesbe759c62011-09-08 19:38:21 -0700644 }
645
Andreas Gampe542451c2016-07-26 09:02:02 -0700646 template<PointerSize pointer_size>
Ian Rogersdd7624d2014-03-14 17:43:00 -0700647 static ThreadOffset<pointer_size> SelfOffset() {
648 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values, self));
649 }
650
Andreas Gampe542451c2016-07-26 09:02:02 -0700651 template<PointerSize pointer_size>
buzbee1452bee2015-03-06 14:43:04 -0800652 static ThreadOffset<pointer_size> MterpCurrentIBaseOffset() {
653 return ThreadOffsetFromTlsPtr<pointer_size>(
654 OFFSETOF_MEMBER(tls_ptr_sized_values, mterp_current_ibase));
655 }
656
Andreas Gampe542451c2016-07-26 09:02:02 -0700657 template<PointerSize pointer_size>
buzbee1452bee2015-03-06 14:43:04 -0800658 static ThreadOffset<pointer_size> MterpDefaultIBaseOffset() {
659 return ThreadOffsetFromTlsPtr<pointer_size>(
660 OFFSETOF_MEMBER(tls_ptr_sized_values, mterp_default_ibase));
661 }
662
Andreas Gampe542451c2016-07-26 09:02:02 -0700663 template<PointerSize pointer_size>
buzbee1452bee2015-03-06 14:43:04 -0800664 static ThreadOffset<pointer_size> MterpAltIBaseOffset() {
665 return ThreadOffsetFromTlsPtr<pointer_size>(
666 OFFSETOF_MEMBER(tls_ptr_sized_values, mterp_alt_ibase));
667 }
668
Andreas Gampe542451c2016-07-26 09:02:02 -0700669 template<PointerSize pointer_size>
Ian Rogersdd7624d2014-03-14 17:43:00 -0700670 static ThreadOffset<pointer_size> ExceptionOffset() {
671 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values, exception));
672 }
673
Andreas Gampe542451c2016-07-26 09:02:02 -0700674 template<PointerSize pointer_size>
Ian Rogersdd7624d2014-03-14 17:43:00 -0700675 static ThreadOffset<pointer_size> PeerOffset() {
676 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values, opeer));
677 }
678
679
Andreas Gampe542451c2016-07-26 09:02:02 -0700680 template<PointerSize pointer_size>
Ian Rogersdd7624d2014-03-14 17:43:00 -0700681 static ThreadOffset<pointer_size> CardTableOffset() {
682 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values, card_table));
683 }
684
Andreas Gampe542451c2016-07-26 09:02:02 -0700685 template<PointerSize pointer_size>
Ian Rogersdd7624d2014-03-14 17:43:00 -0700686 static ThreadOffset<pointer_size> ThreadSuspendTriggerOffset() {
687 return ThreadOffsetFromTlsPtr<pointer_size>(
688 OFFSETOF_MEMBER(tls_ptr_sized_values, suspend_trigger));
Dave Allisonb373e092014-02-20 16:06:36 -0800689 }
690
Andreas Gampe542451c2016-07-26 09:02:02 -0700691 template<PointerSize pointer_size>
Hiroshi Yamauchie01a5202015-03-19 12:35:04 -0700692 static ThreadOffset<pointer_size> ThreadLocalPosOffset() {
Andreas Gampe542451c2016-07-26 09:02:02 -0700693 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values,
694 thread_local_pos));
Hiroshi Yamauchie01a5202015-03-19 12:35:04 -0700695 }
696
Andreas Gampe542451c2016-07-26 09:02:02 -0700697 template<PointerSize pointer_size>
Hiroshi Yamauchie01a5202015-03-19 12:35:04 -0700698 static ThreadOffset<pointer_size> ThreadLocalEndOffset() {
Andreas Gampe542451c2016-07-26 09:02:02 -0700699 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values,
700 thread_local_end));
Hiroshi Yamauchie01a5202015-03-19 12:35:04 -0700701 }
702
Andreas Gampe542451c2016-07-26 09:02:02 -0700703 template<PointerSize pointer_size>
Hiroshi Yamauchie01a5202015-03-19 12:35:04 -0700704 static ThreadOffset<pointer_size> ThreadLocalObjectsOffset() {
Andreas Gampe542451c2016-07-26 09:02:02 -0700705 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values,
706 thread_local_objects));
Hiroshi Yamauchie01a5202015-03-19 12:35:04 -0700707 }
708
Andreas Gampe542451c2016-07-26 09:02:02 -0700709 template<PointerSize pointer_size>
Hiroshi Yamauchidc412b62015-10-15 12:26:57 -0700710 static ThreadOffset<pointer_size> RosAllocRunsOffset() {
711 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values,
712 rosalloc_runs));
713 }
714
Andreas Gampe542451c2016-07-26 09:02:02 -0700715 template<PointerSize pointer_size>
Hiroshi Yamauchidc412b62015-10-15 12:26:57 -0700716 static ThreadOffset<pointer_size> ThreadLocalAllocStackTopOffset() {
717 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values,
718 thread_local_alloc_stack_top));
719 }
720
Andreas Gampe542451c2016-07-26 09:02:02 -0700721 template<PointerSize pointer_size>
Hiroshi Yamauchidc412b62015-10-15 12:26:57 -0700722 static ThreadOffset<pointer_size> ThreadLocalAllocStackEndOffset() {
723 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values,
724 thread_local_alloc_stack_end));
725 }
726
Ian Rogers932746a2011-09-22 18:57:50 -0700727 // Size of stack less any space reserved for stack overflow
jeffhaod7521322012-11-21 15:38:24 -0800728 size_t GetStackSize() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700729 return tlsPtr_.stack_size - (tlsPtr_.stack_end - tlsPtr_.stack_begin);
Ian Rogers932746a2011-09-22 18:57:50 -0700730 }
731
Ian Rogers13735952014-10-08 12:43:28 -0700732 uint8_t* GetStackEndForInterpreter(bool implicit_overflow_check) const {
Nicolas Geoffray535a3fb2014-07-22 15:17:38 +0100733 if (implicit_overflow_check) {
734 // The interpreter needs the extra overflow bytes that stack_end does
735 // not include.
736 return tlsPtr_.stack_end + GetStackOverflowReservedBytes(kRuntimeISA);
737 } else {
738 return tlsPtr_.stack_end;
739 }
740 }
741
Ian Rogers13735952014-10-08 12:43:28 -0700742 uint8_t* GetStackEnd() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700743 return tlsPtr_.stack_end;
jeffhaod7521322012-11-21 15:38:24 -0800744 }
745
Ian Rogers932746a2011-09-22 18:57:50 -0700746 // Set the stack end to that to be used during a stack overflow
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700747 void SetStackEndForStackOverflow() REQUIRES_SHARED(Locks::mutator_lock_);
Ian Rogers932746a2011-09-22 18:57:50 -0700748
749 // Set the stack end to that to be used during regular execution
Dave Allisonb090a182014-08-14 17:02:48 +0000750 void ResetDefaultStackEnd() {
Ian Rogers932746a2011-09-22 18:57:50 -0700751 // Our stacks grow down, so we want stack_end_ to be near there, but reserving enough room
752 // to throw a StackOverflowError.
Dave Allisonb090a182014-08-14 17:02:48 +0000753 tlsPtr_.stack_end = tlsPtr_.stack_begin + GetStackOverflowReservedBytes(kRuntimeISA);
Ian Rogers932746a2011-09-22 18:57:50 -0700754 }
755
Ian Rogers120f1c72012-09-28 17:17:10 -0700756 bool IsHandlingStackOverflow() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700757 return tlsPtr_.stack_end == tlsPtr_.stack_begin;
Ian Rogers120f1c72012-09-28 17:17:10 -0700758 }
759
Andreas Gampe542451c2016-07-26 09:02:02 -0700760 template<PointerSize pointer_size>
Ian Rogersdd7624d2014-03-14 17:43:00 -0700761 static ThreadOffset<pointer_size> StackEndOffset() {
762 return ThreadOffsetFromTlsPtr<pointer_size>(
763 OFFSETOF_MEMBER(tls_ptr_sized_values, stack_end));
Elliott Hughesbe759c62011-09-08 19:38:21 -0700764 }
765
Andreas Gampe542451c2016-07-26 09:02:02 -0700766 template<PointerSize pointer_size>
Ian Rogersdd7624d2014-03-14 17:43:00 -0700767 static ThreadOffset<pointer_size> JniEnvOffset() {
768 return ThreadOffsetFromTlsPtr<pointer_size>(
769 OFFSETOF_MEMBER(tls_ptr_sized_values, jni_env));
Elliott Hughesbe759c62011-09-08 19:38:21 -0700770 }
771
Andreas Gampe542451c2016-07-26 09:02:02 -0700772 template<PointerSize pointer_size>
Ian Rogersdd7624d2014-03-14 17:43:00 -0700773 static ThreadOffset<pointer_size> TopOfManagedStackOffset() {
774 return ThreadOffsetFromTlsPtr<pointer_size>(
775 OFFSETOF_MEMBER(tls_ptr_sized_values, managed_stack) +
776 ManagedStack::TopQuickFrameOffset());
Elliott Hughesbe759c62011-09-08 19:38:21 -0700777 }
778
Ian Rogers0399dde2012-06-06 17:09:28 -0700779 const ManagedStack* GetManagedStack() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700780 return &tlsPtr_.managed_stack;
Ian Rogers0399dde2012-06-06 17:09:28 -0700781 }
782
783 // Linked list recording fragments of managed stack.
784 void PushManagedStackFragment(ManagedStack* fragment) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700785 tlsPtr_.managed_stack.PushManagedStackFragment(fragment);
Ian Rogers0399dde2012-06-06 17:09:28 -0700786 }
787 void PopManagedStackFragment(const ManagedStack& fragment) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700788 tlsPtr_.managed_stack.PopManagedStackFragment(fragment);
Ian Rogers0399dde2012-06-06 17:09:28 -0700789 }
790
791 ShadowFrame* PushShadowFrame(ShadowFrame* new_top_frame) {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700792 return tlsPtr_.managed_stack.PushShadowFrame(new_top_frame);
TDYa127de479be2012-05-31 08:03:26 -0700793 }
794
795 ShadowFrame* PopShadowFrame() {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700796 return tlsPtr_.managed_stack.PopShadowFrame();
TDYa127de479be2012-05-31 08:03:26 -0700797 }
Logan Chienf7ad17e2012-03-15 03:10:03 +0800798
Andreas Gampe542451c2016-07-26 09:02:02 -0700799 template<PointerSize pointer_size>
Ian Rogersdd7624d2014-03-14 17:43:00 -0700800 static ThreadOffset<pointer_size> TopShadowFrameOffset() {
801 return ThreadOffsetFromTlsPtr<pointer_size>(
802 OFFSETOF_MEMBER(tls_ptr_sized_values, managed_stack) +
803 ManagedStack::TopShadowFrameOffset());
TDYa127d668a062012-04-13 12:36:57 -0700804 }
805
Ian Rogers0399dde2012-06-06 17:09:28 -0700806 // Is the given obj in this thread's stack indirect reference table?
Mathieu Chartiereb8167a2014-05-07 15:43:14 -0700807 bool HandleScopeContains(jobject obj) const;
Ian Rogers0399dde2012-06-06 17:09:28 -0700808
Mathieu Chartierbb87e0f2015-04-03 11:21:55 -0700809 void HandleScopeVisitRoots(RootVisitor* visitor, uint32_t thread_id)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700810 REQUIRES_SHARED(Locks::mutator_lock_);
Ian Rogers0399dde2012-06-06 17:09:28 -0700811
Mathieu Chartiere8a3c572016-10-11 16:52:17 -0700812 BaseHandleScope* GetTopHandleScope() {
Mathieu Chartiereb8167a2014-05-07 15:43:14 -0700813 return tlsPtr_.top_handle_scope;
Ian Rogers1f539342012-10-03 21:09:42 -0700814 }
815
Mathieu Chartiere8a3c572016-10-11 16:52:17 -0700816 void PushHandleScope(BaseHandleScope* handle_scope) {
Ian Rogers59c07062014-10-10 13:03:39 -0700817 DCHECK_EQ(handle_scope->GetLink(), tlsPtr_.top_handle_scope);
Mathieu Chartiereb8167a2014-05-07 15:43:14 -0700818 tlsPtr_.top_handle_scope = handle_scope;
819 }
820
Mathieu Chartiere8a3c572016-10-11 16:52:17 -0700821 BaseHandleScope* PopHandleScope() {
822 BaseHandleScope* handle_scope = tlsPtr_.top_handle_scope;
Mathieu Chartiereb8167a2014-05-07 15:43:14 -0700823 DCHECK(handle_scope != nullptr);
824 tlsPtr_.top_handle_scope = tlsPtr_.top_handle_scope->GetLink();
825 return handle_scope;
Ian Rogers1f539342012-10-03 21:09:42 -0700826 }
Brian Carlstrom40381fb2011-10-19 14:13:40 -0700827
Andreas Gampe542451c2016-07-26 09:02:02 -0700828 template<PointerSize pointer_size>
Mathieu Chartiereb8167a2014-05-07 15:43:14 -0700829 static ThreadOffset<pointer_size> TopHandleScopeOffset() {
830 return ThreadOffsetFromTlsPtr<pointer_size>(OFFSETOF_MEMBER(tls_ptr_sized_values,
831 top_handle_scope));
Elliott Hughesbe759c62011-09-08 19:38:21 -0700832 }
833
Ian Rogersdd7624d2014-03-14 17:43:00 -0700834 DebugInvokeReq* GetInvokeReq() const {
835 return tlsPtr_.debug_invoke_req;
Elliott Hughes475fc232011-10-25 15:00:35 -0700836 }
837
Sebastien Hertz61b7f1b2013-11-15 15:59:30 +0100838 SingleStepControl* GetSingleStepControl() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700839 return tlsPtr_.single_step_control;
Sebastien Hertz61b7f1b2013-11-15 15:59:30 +0100840 }
841
Sebastien Hertz1558b572015-02-25 15:05:59 +0100842 // Indicates whether this thread is ready to invoke a method for debugging. This
843 // is only true if the thread has been suspended by a debug event.
844 bool IsReadyForDebugInvoke() const {
845 return tls32_.ready_for_debug_invoke;
846 }
847
848 void SetReadyForDebugInvoke(bool ready) {
849 tls32_.ready_for_debug_invoke = ready;
850 }
851
Sebastien Hertz9d6bf692015-04-10 12:12:33 +0200852 bool IsDebugMethodEntry() const {
853 return tls32_.debug_method_entry_;
854 }
855
856 void SetDebugMethodEntry() {
857 tls32_.debug_method_entry_ = true;
858 }
859
860 void ClearDebugMethodEntry() {
861 tls32_.debug_method_entry_ = false;
862 }
863
Hiroshi Yamauchi00370822015-08-18 14:47:25 -0700864 bool GetIsGcMarking() const {
865 CHECK(kUseReadBarrier);
866 return tls32_.is_gc_marking;
867 }
868
Mathieu Chartierfe814e82016-11-09 14:32:49 -0800869 void SetIsGcMarkingAndUpdateEntrypoints(bool is_marking);
Hiroshi Yamauchi00370822015-08-18 14:47:25 -0700870
Hiroshi Yamauchi0b713572015-06-16 18:29:23 -0700871 bool GetWeakRefAccessEnabled() const {
872 CHECK(kUseReadBarrier);
873 return tls32_.weak_ref_access_enabled;
874 }
875
876 void SetWeakRefAccessEnabled(bool enabled) {
877 CHECK(kUseReadBarrier);
878 tls32_.weak_ref_access_enabled = enabled;
879 }
880
Hiroshi Yamauchi20a0be02016-02-19 15:44:06 -0800881 uint32_t GetDisableThreadFlipCount() const {
882 CHECK(kUseReadBarrier);
883 return tls32_.disable_thread_flip_count;
884 }
885
886 void IncrementDisableThreadFlipCount() {
887 CHECK(kUseReadBarrier);
888 ++tls32_.disable_thread_flip_count;
889 }
890
891 void DecrementDisableThreadFlipCount() {
892 CHECK(kUseReadBarrier);
893 DCHECK_GT(tls32_.disable_thread_flip_count, 0U);
894 --tls32_.disable_thread_flip_count;
895 }
896
Calin Juravleccd56952016-12-15 17:57:38 +0000897 // Returns true if the thread is allowed to call into java.
898 bool CanCallIntoJava() const {
899 return can_call_into_java_;
900 }
901
902 void SetCanCallIntoJava(bool can_call_into_java) {
903 can_call_into_java_ = can_call_into_java;
904 }
905
Sebastien Hertz597c4f02015-01-26 17:37:14 +0100906 // Activates single step control for debugging. The thread takes the
907 // ownership of the given SingleStepControl*. It is deleted by a call
908 // to DeactivateSingleStepControl or upon thread destruction.
909 void ActivateSingleStepControl(SingleStepControl* ssc);
910
911 // Deactivates single step control for debugging.
912 void DeactivateSingleStepControl();
913
Sebastien Hertz1558b572015-02-25 15:05:59 +0100914 // Sets debug invoke request for debugging. When the thread is resumed,
Sebastien Hertzcbc50642015-06-01 17:33:12 +0200915 // it executes the method described by this request then sends the reply
916 // before suspending itself. The thread takes the ownership of the given
917 // DebugInvokeReq*. It is deleted by a call to ClearDebugInvokeReq.
Sebastien Hertz1558b572015-02-25 15:05:59 +0100918 void SetDebugInvokeReq(DebugInvokeReq* req);
919
920 // Clears debug invoke request for debugging. When the thread completes
Sebastien Hertzcbc50642015-06-01 17:33:12 +0200921 // method invocation, it deletes its debug invoke request and suspends
922 // itself.
Sebastien Hertz1558b572015-02-25 15:05:59 +0100923 void ClearDebugInvokeReq();
Sebastien Hertz597c4f02015-01-26 17:37:14 +0100924
Sebastien Hertzfd3077e2014-04-23 10:32:43 +0200925 // Returns the fake exception used to activate deoptimization.
926 static mirror::Throwable* GetDeoptimizationException() {
Mathieu Chartier0795f232016-09-27 18:43:30 -0700927 // Note that the mirror::Throwable must be aligned to kObjectAlignment or else it cannot be
928 // represented by ObjPtr.
929 return reinterpret_cast<mirror::Throwable*>(0x100);
Sebastien Hertzfd3077e2014-04-23 10:32:43 +0200930 }
931
Mingyao Yang1f2d3ba2015-05-18 12:12:50 -0700932 // Currently deoptimization invokes verifier which can trigger class loading
933 // and execute Java code, so there might be nested deoptimizations happening.
934 // We need to save the ongoing deoptimization shadow frames and return
935 // values on stacks.
Nicolas Geoffray73be1e82015-09-17 15:22:56 +0100936 // 'from_code' denotes whether the deoptimization was explicitly made from
937 // compiled code.
938 void PushDeoptimizationContext(const JValue& return_value,
939 bool is_reference,
940 bool from_code,
Mathieu Chartierf5769e12017-01-10 15:54:41 -0800941 ObjPtr<mirror::Throwable> exception)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700942 REQUIRES_SHARED(Locks::mutator_lock_);
Mathieu Chartierf5769e12017-01-10 15:54:41 -0800943 void PopDeoptimizationContext(JValue* result,
944 ObjPtr<mirror::Throwable>* exception,
945 bool* from_code)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700946 REQUIRES_SHARED(Locks::mutator_lock_);
Sebastien Hertz07474662015-08-25 15:12:33 +0000947 void AssertHasDeoptimizationContext()
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700948 REQUIRES_SHARED(Locks::mutator_lock_);
Mingyao Yang1f2d3ba2015-05-18 12:12:50 -0700949 void PushStackedShadowFrame(ShadowFrame* sf, StackedShadowFrameType type);
Andreas Gampe639bdd12015-06-03 11:22:45 -0700950 ShadowFrame* PopStackedShadowFrame(StackedShadowFrameType type, bool must_be_present = true);
Andreas Gampe2a0d4ec2014-06-02 22:05:22 -0700951
Mingyao Yang99170c62015-07-06 11:10:37 -0700952 // For debugger, find the shadow frame that corresponds to a frame id.
953 // Or return null if there is none.
954 ShadowFrame* FindDebuggerShadowFrame(size_t frame_id)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700955 REQUIRES_SHARED(Locks::mutator_lock_);
Mingyao Yang99170c62015-07-06 11:10:37 -0700956 // For debugger, find the bool array that keeps track of the updated vreg set
957 // for a frame id.
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700958 bool* GetUpdatedVRegFlags(size_t frame_id) REQUIRES_SHARED(Locks::mutator_lock_);
Mingyao Yang99170c62015-07-06 11:10:37 -0700959 // For debugger, find the shadow frame that corresponds to a frame id. If
960 // one doesn't exist yet, create one and track it in frame_id_to_shadow_frame.
961 ShadowFrame* FindOrCreateDebuggerShadowFrame(size_t frame_id,
962 uint32_t num_vregs,
963 ArtMethod* method,
964 uint32_t dex_pc)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700965 REQUIRES_SHARED(Locks::mutator_lock_);
Mingyao Yang99170c62015-07-06 11:10:37 -0700966
967 // Delete the entry that maps from frame_id to shadow_frame.
968 void RemoveDebuggerShadowFrameMapping(size_t frame_id)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -0700969 REQUIRES_SHARED(Locks::mutator_lock_);
Mingyao Yang99170c62015-07-06 11:10:37 -0700970
Ian Rogers62d6c772013-02-27 08:32:07 -0800971 std::deque<instrumentation::InstrumentationStackFrame>* GetInstrumentationStack() {
Ian Rogersdd7624d2014-03-14 17:43:00 -0700972 return tlsPtr_.instrumentation_stack;
jeffhaoe343b762011-12-05 16:36:44 -0800973 }
974
Mathieu Chartiere401d142015-04-22 13:56:20 -0700975 std::vector<ArtMethod*>* GetStackTraceSample() const {
Andreas Gampe2c19f5b2016-11-28 08:10:18 -0800976 DCHECK(!IsAotCompiler());
Nicolas Geoffray340dafa2016-11-18 16:03:10 +0000977 return tlsPtr_.deps_or_stack_trace_sample.stack_trace_sample;
Jeff Hao5ce4b172013-08-16 16:27:18 -0700978 }
979
Mathieu Chartiere401d142015-04-22 13:56:20 -0700980 void SetStackTraceSample(std::vector<ArtMethod*>* sample) {
Andreas Gampe2c19f5b2016-11-28 08:10:18 -0800981 DCHECK(!IsAotCompiler());
Nicolas Geoffray340dafa2016-11-18 16:03:10 +0000982 tlsPtr_.deps_or_stack_trace_sample.stack_trace_sample = sample;
983 }
984
985 verifier::VerifierDeps* GetVerifierDeps() const {
Andreas Gampe2c19f5b2016-11-28 08:10:18 -0800986 DCHECK(IsAotCompiler());
Nicolas Geoffray340dafa2016-11-18 16:03:10 +0000987 return tlsPtr_.deps_or_stack_trace_sample.verifier_deps;
988 }
989
990 // It is the responsability of the caller to make sure the verifier_deps
991 // entry in the thread is cleared before destruction of the actual VerifierDeps
992 // object, or the thread.
993 void SetVerifierDeps(verifier::VerifierDeps* verifier_deps) {
Andreas Gampe2c19f5b2016-11-28 08:10:18 -0800994 DCHECK(IsAotCompiler());
Nicolas Geoffraye424c932016-11-23 12:52:01 +0000995 DCHECK(verifier_deps == nullptr || tlsPtr_.deps_or_stack_trace_sample.verifier_deps == nullptr);
Nicolas Geoffray340dafa2016-11-18 16:03:10 +0000996 tlsPtr_.deps_or_stack_trace_sample.verifier_deps = verifier_deps;
Jeff Hao5ce4b172013-08-16 16:27:18 -0700997 }
998
999 uint64_t GetTraceClockBase() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -07001000 return tls64_.trace_clock_base;
Jeff Hao5ce4b172013-08-16 16:27:18 -07001001 }
1002
1003 void SetTraceClockBase(uint64_t clock_base) {
Ian Rogersdd7624d2014-03-14 17:43:00 -07001004 tls64_.trace_clock_base = clock_base;
Jeff Hao5ce4b172013-08-16 16:27:18 -07001005 }
1006
Ian Rogers81d425b2012-09-27 16:03:43 -07001007 BaseMutex* GetHeldMutex(LockLevel level) const {
Ian Rogersdd7624d2014-03-14 17:43:00 -07001008 return tlsPtr_.held_mutexes[level];
Ian Rogers00f7d0e2012-07-19 15:28:27 -07001009 }
1010
Ian Rogers81d425b2012-09-27 16:03:43 -07001011 void SetHeldMutex(LockLevel level, BaseMutex* mutex) {
Ian Rogersdd7624d2014-03-14 17:43:00 -07001012 tlsPtr_.held_mutexes[level] = mutex;
Ian Rogers00f7d0e2012-07-19 15:28:27 -07001013 }
Elliott Hughesffb465f2012-03-01 18:46:05 -08001014
Yu Lieac44242015-06-29 10:50:03 +08001015 void ClearSuspendBarrier(AtomicInteger* target)
Mathieu Chartier90443472015-07-16 20:32:27 -07001016 REQUIRES(Locks::thread_suspend_count_lock_);
Yu Lieac44242015-06-29 10:50:03 +08001017
Mathieu Chartier858f1c52012-10-17 17:45:55 -07001018 bool ReadFlag(ThreadFlag flag) const {
Ian Rogersdd7624d2014-03-14 17:43:00 -07001019 return (tls32_.state_and_flags.as_struct.flags & flag) != 0;
Mathieu Chartier858f1c52012-10-17 17:45:55 -07001020 }
1021
Jeff Hao9cec2472013-05-14 18:17:06 -07001022 bool TestAllFlags() const {
Ian Rogersdd7624d2014-03-14 17:43:00 -07001023 return (tls32_.state_and_flags.as_struct.flags != 0);
Jeff Hao9cec2472013-05-14 18:17:06 -07001024 }
1025
Ian Rogers8c1b5f72014-07-09 22:02:36 -07001026 void AtomicSetFlag(ThreadFlag flag) {
1027 tls32_.state_and_flags.as_atomic_int.FetchAndOrSequentiallyConsistent(flag);
1028 }
Mathieu Chartier858f1c52012-10-17 17:45:55 -07001029
Ian Rogers8c1b5f72014-07-09 22:02:36 -07001030 void AtomicClearFlag(ThreadFlag flag) {
1031 tls32_.state_and_flags.as_atomic_int.FetchAndAndSequentiallyConsistent(-1 ^ flag);
1032 }
Mathieu Chartier858f1c52012-10-17 17:45:55 -07001033
Mathieu Chartier5ace2012016-11-30 10:15:41 -08001034 void ResetQuickAllocEntryPointsForThread(bool is_marking);
Hiroshi Yamauchi3b4c1892013-09-12 21:33:12 -07001035
Ian Rogersdd7624d2014-03-14 17:43:00 -07001036 // Returns the remaining space in the TLAB.
1037 size_t TlabSize() const;
1038 // Doesn't check that there is room.
1039 mirror::Object* AllocTlab(size_t bytes);
Ian Rogers13735952014-10-08 12:43:28 -07001040 void SetTlab(uint8_t* start, uint8_t* end);
Ian Rogersdd7624d2014-03-14 17:43:00 -07001041 bool HasTlab() const;
Hiroshi Yamauchi2cd334a2015-01-09 14:03:35 -08001042 uint8_t* GetTlabStart() {
1043 return tlsPtr_.thread_local_start;
1044 }
1045 uint8_t* GetTlabPos() {
1046 return tlsPtr_.thread_local_pos;
1047 }
Elliott Hughes5d96a712012-06-28 12:24:27 -07001048
Ian Rogersdd7624d2014-03-14 17:43:00 -07001049 // Remove the suspend trigger for this thread by making the suspend_trigger_ TLS value
1050 // equal to a valid pointer.
1051 // TODO: does this need to atomic? I don't think so.
1052 void RemoveSuspendTrigger() {
1053 tlsPtr_.suspend_trigger = reinterpret_cast<uintptr_t*>(&tlsPtr_.suspend_trigger);
1054 }
1055
1056 // Trigger a suspend check by making the suspend_trigger_ TLS value an invalid pointer.
1057 // The next time a suspend check is done, it will load from the value at this address
1058 // and trigger a SIGSEGV.
1059 void TriggerSuspend() {
1060 tlsPtr_.suspend_trigger = nullptr;
1061 }
1062
1063
1064 // Push an object onto the allocation stack.
Mathieu Chartiercb535da2015-01-23 13:50:03 -08001065 bool PushOnThreadLocalAllocationStack(mirror::Object* obj)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -07001066 REQUIRES_SHARED(Locks::mutator_lock_);
Ian Rogersdd7624d2014-03-14 17:43:00 -07001067
1068 // Set the thread local allocation pointers to the given pointers.
Mathieu Chartiercb535da2015-01-23 13:50:03 -08001069 void SetThreadLocalAllocationStack(StackReference<mirror::Object>* start,
1070 StackReference<mirror::Object>* end);
Ian Rogersdd7624d2014-03-14 17:43:00 -07001071
1072 // Resets the thread local allocation pointers.
1073 void RevokeThreadLocalAllocationStack();
1074
1075 size_t GetThreadLocalBytesAllocated() const {
Mathieu Chartier14cc9be2014-07-11 10:26:37 -07001076 return tlsPtr_.thread_local_end - tlsPtr_.thread_local_start;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001077 }
1078
1079 size_t GetThreadLocalObjectsAllocated() const {
1080 return tlsPtr_.thread_local_objects;
1081 }
1082
Ian Rogersdd7624d2014-03-14 17:43:00 -07001083 void* GetRosAllocRun(size_t index) const {
1084 return tlsPtr_.rosalloc_runs[index];
1085 }
1086
1087 void SetRosAllocRun(size_t index, void* run) {
1088 tlsPtr_.rosalloc_runs[index] = run;
1089 }
1090
Andreas Gampe2c2d2a02016-03-17 21:27:19 -07001091 bool ProtectStack(bool fatal_on_error = true);
Dave Allison648d7112014-07-25 16:15:27 -07001092 bool UnprotectStack();
1093
buzbee1452bee2015-03-06 14:43:04 -08001094 void SetMterpDefaultIBase(void* ibase) {
1095 tlsPtr_.mterp_default_ibase = ibase;
1096 }
1097
1098 void SetMterpCurrentIBase(void* ibase) {
1099 tlsPtr_.mterp_current_ibase = ibase;
1100 }
1101
1102 void SetMterpAltIBase(void* ibase) {
1103 tlsPtr_.mterp_alt_ibase = ibase;
1104 }
1105
1106 const void* GetMterpDefaultIBase() const {
1107 return tlsPtr_.mterp_default_ibase;
1108 }
1109
1110 const void* GetMterpCurrentIBase() const {
1111 return tlsPtr_.mterp_current_ibase;
1112 }
1113
1114 const void* GetMterpAltIBase() const {
1115 return tlsPtr_.mterp_alt_ibase;
1116 }
1117
Josh Gaoefd20cb2017-02-28 16:53:59 -08001118 bool HandlingSignal() const {
1119 return tls32_.handling_signal_;
Dave Allison648d7112014-07-25 16:15:27 -07001120 }
1121
Josh Gaoefd20cb2017-02-28 16:53:59 -08001122 void SetHandlingSignal(bool handling_signal) {
1123 tls32_.handling_signal_ = handling_signal;
Dave Allison8ce6b902014-08-26 11:07:58 -07001124 }
1125
Hiroshi Yamauchiee235822016-08-19 17:03:27 -07001126 bool IsTransitioningToRunnable() const {
1127 return tls32_.is_transitioning_to_runnable;
1128 }
1129
1130 void SetIsTransitioningToRunnable(bool value) {
1131 tls32_.is_transitioning_to_runnable = value;
Hiroshi Yamauchi2cd334a2015-01-09 14:03:35 -08001132 }
1133
Mathieu Chartierd0ad2ee2015-03-31 14:59:59 -07001134 void PushVerifier(verifier::MethodVerifier* verifier);
1135 void PopVerifier(verifier::MethodVerifier* verifier);
Mathieu Chartier12d625f2015-03-13 11:33:37 -07001136
Jeff Hao848f70a2014-01-15 13:49:50 -08001137 void InitStringEntryPoints();
1138
Mathieu Chartierdfe02f62016-02-01 20:15:11 -08001139 void ModifyDebugDisallowReadBarrier(int8_t delta) {
1140 debug_disallow_read_barrier_ += delta;
1141 }
1142
1143 uint8_t GetDebugDisallowReadBarrierCount() const {
1144 return debug_disallow_read_barrier_;
1145 }
1146
Andreas Gampef26bf2d2017-01-13 16:47:14 -08001147 const void* GetCustomTLS() const {
1148 return custom_tls_;
1149 }
1150
1151 void SetCustomTLS(const void* data) {
1152 custom_tls_ = data;
1153 }
1154
Calin Juravle97cbc922016-04-15 16:16:35 +01001155 // Returns true if the current thread is the jit sensitive thread.
1156 bool IsJitSensitiveThread() const {
1157 return this == jit_sensitive_thread_;
1158 }
1159
1160 // Returns true if StrictMode events are traced for the current thread.
Calin Juravleb2771b42016-04-07 17:09:25 +01001161 static bool IsSensitiveThread() {
1162 if (is_sensitive_thread_hook_ != nullptr) {
1163 return (*is_sensitive_thread_hook_)();
1164 }
1165 return false;
1166 }
1167
Andreas Gampebad529d2017-02-13 18:52:10 -08001168 static jobject CreateCompileTimePeer(JNIEnv* env,
1169 const char* name,
1170 bool as_daemon,
1171 jobject thread_group)
1172 REQUIRES_SHARED(Locks::mutator_lock_);
1173
Ian Rogersdd7624d2014-03-14 17:43:00 -07001174 private:
Ian Rogers52673ff2012-06-27 23:25:34 -07001175 explicit Thread(bool daemon);
Mathieu Chartier90443472015-07-16 20:32:27 -07001176 ~Thread() REQUIRES(!Locks::mutator_lock_, !Locks::thread_suspend_count_lock_);
Elliott Hughesc0f09332012-03-26 13:27:06 -07001177 void Destroy();
Carl Shapiro0e5d75d2011-07-06 18:28:37 -07001178
Andreas Gampe732b0ac2017-01-18 15:23:39 -08001179 // Attaches the calling native thread to the runtime, returning the new native peer.
1180 // Used to implement JNI AttachCurrentThread and AttachCurrentThreadAsDaemon calls.
1181 template <typename PeerAction>
1182 static Thread* Attach(const char* thread_name,
1183 bool as_daemon,
1184 PeerAction p);
1185
Ian Rogers365c1022012-06-22 15:05:28 -07001186 void CreatePeer(const char* name, bool as_daemon, jobject thread_group);
Elliott Hughes5fe594f2011-09-08 12:33:17 -07001187
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +01001188 template<bool kTransactionActive>
Andreas Gampebad529d2017-02-13 18:52:10 -08001189 static void InitPeer(ScopedObjectAccessAlreadyRunnable& soa,
1190 ObjPtr<mirror::Object> peer,
1191 jboolean thread_is_daemon,
1192 jobject thread_group,
1193 jobject thread_name,
1194 jint thread_priority)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -07001195 REQUIRES_SHARED(Locks::mutator_lock_);
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +01001196
Ian Rogers62d6c772013-02-27 08:32:07 -08001197 // Avoid use, callers should use SetState. Used only by SignalCatcher::HandleSigQuit, ~Thread and
Hiroshi Yamauchi98810e32016-05-24 14:55:40 -07001198 // Dbg::ManageDeoptimization.
Ian Rogers474b6da2012-09-25 00:20:38 -07001199 ThreadState SetStateUnsafe(ThreadState new_state) {
1200 ThreadState old_state = GetState();
Mathieu Chartier8ac9c912015-10-01 15:58:41 -07001201 if (old_state == kRunnable && new_state != kRunnable) {
1202 // Need to run pending checkpoint and suspend barriers. Run checkpoints in runnable state in
1203 // case they need to use a ScopedObjectAccess. If we are holding the mutator lock and a SOA
1204 // attempts to TransitionFromSuspendedToRunnable, it results in a deadlock.
1205 TransitionToSuspendedAndRunCheckpoints(new_state);
1206 // Since we transitioned to a suspended state, check the pass barrier requests.
1207 PassActiveSuspendBarriers();
1208 } else {
1209 tls32_.state_and_flags.as_struct.state = new_state;
Yu Lieac44242015-06-29 10:50:03 +08001210 }
Ian Rogersc747cff2012-08-31 18:20:08 -07001211 return old_state;
1212 }
Ian Rogersc747cff2012-08-31 18:20:08 -07001213
Andreas Gampebdf7f1c2016-08-30 16:38:47 -07001214 void VerifyStackImpl() REQUIRES_SHARED(Locks::mutator_lock_);
Ian Rogers04d7aa92013-03-16 14:29:17 -07001215
Andreas Gampebdf7f1c2016-08-30 16:38:47 -07001216 void DumpState(std::ostream& os) const REQUIRES_SHARED(Locks::mutator_lock_);
Nicolas Geoffraya73280d2016-02-15 13:05:16 +00001217 void DumpStack(std::ostream& os,
1218 bool dump_native_stack = true,
Hiroshi Yamauchi13c16352017-01-31 10:15:08 -08001219 BacktraceMap* backtrace_map = nullptr,
1220 bool force_dump_stack = false) const
Mathieu Chartier90443472015-07-16 20:32:27 -07001221 REQUIRES(!Locks::thread_suspend_count_lock_)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -07001222 REQUIRES_SHARED(Locks::mutator_lock_);
Elliott Hughesd92bec42011-09-02 17:04:36 -07001223
Elliott Hughesaccd83d2011-10-17 14:25:58 -07001224 // Out-of-line conveniences for debugging in gdb.
Brian Carlstrom7934ac22013-07-26 10:54:15 -07001225 static Thread* CurrentFromGdb(); // Like Thread::Current.
Ian Rogers00f7d0e2012-07-19 15:28:27 -07001226 // Like Thread::Dump(std::cerr).
Andreas Gampebdf7f1c2016-08-30 16:38:47 -07001227 void DumpFromGdb() const REQUIRES_SHARED(Locks::mutator_lock_);
Elliott Hughesaccd83d2011-10-17 14:25:58 -07001228
Elliott Hughes93e74e82011-09-13 11:07:03 -07001229 static void* CreateCallback(void* arg);
1230
Ian Rogerscfaa4552012-11-26 21:00:08 -08001231 void HandleUncaughtExceptions(ScopedObjectAccess& soa)
Andreas Gampebdf7f1c2016-08-30 16:38:47 -07001232 REQUIRES_SHARED(Locks::mutator_lock_);
1233 void RemoveFromThreadGroup(ScopedObjectAccess& soa) REQUIRES_SHARED(Locks::mutator_lock_);
Elliott Hughesaccd83d2011-10-17 14:25:58 -07001234
Andreas Gampe449357d2015-06-01 22:29:51 -07001235 // Initialize a thread.
1236 //
1237 // The third parameter is not mandatory. If given, the thread will use this JNIEnvExt. In case
1238 // Init succeeds, this means the thread takes ownership of it. If Init fails, it is the caller's
1239 // responsibility to destroy the given JNIEnvExt. If the parameter is null, Init will try to
1240 // create a JNIEnvExt on its own (and potentially fail at that stage, indicated by a return value
1241 // of false).
1242 bool Init(ThreadList*, JavaVMExt*, JNIEnvExt* jni_env_ext = nullptr)
Mathieu Chartier90443472015-07-16 20:32:27 -07001243 REQUIRES(Locks::runtime_shutdown_lock_);
Ian Rogers5d76c432011-10-31 21:42:49 -07001244 void InitCardTable();
Ian Rogersb033c752011-07-20 12:22:35 -07001245 void InitCpu();
Alexei Zavjalov1efa0a92014-02-04 02:08:31 +07001246 void CleanupCpu();
Ian Rogers848871b2013-08-05 10:56:33 -07001247 void InitTlsEntryPoints();
Brian Carlstromcaabb1b2011-10-11 18:09:13 -07001248 void InitTid();
Brian Carlstromcaabb1b2011-10-11 18:09:13 -07001249 void InitPthreadKeySelf();
Ian Rogersf4d4da12014-11-11 16:10:33 -08001250 bool InitStackHwm();
Elliott Hughesbe759c62011-09-08 19:38:21 -07001251
Elliott Hughesd6a23bd2013-07-16 14:19:52 -07001252 void SetUpAlternateSignalStack();
1253 void TearDownAlternateSignalStack();
1254
Mathieu Chartier8ac9c912015-10-01 15:58:41 -07001255 ALWAYS_INLINE void TransitionToSuspendedAndRunCheckpoints(ThreadState new_state)
1256 REQUIRES(!Locks::thread_suspend_count_lock_, !Roles::uninterruptible_);
1257
1258 ALWAYS_INLINE void PassActiveSuspendBarriers()
1259 REQUIRES(!Locks::thread_suspend_count_lock_, !Roles::uninterruptible_);
1260
Calin Juravle97cbc922016-04-15 16:16:35 +01001261 // Registers the current thread as the jit sensitive thread. Should be called just once.
1262 static void SetJitSensitiveThread() {
1263 if (jit_sensitive_thread_ == nullptr) {
1264 jit_sensitive_thread_ = Thread::Current();
1265 } else {
1266 LOG(WARNING) << "Attempt to set the sensitive thread twice. Tid:"
1267 << Thread::Current()->GetTid();
1268 }
1269 }
1270
Calin Juravleb2771b42016-04-07 17:09:25 +01001271 static void SetSensitiveThreadHook(bool (*is_sensitive_thread_hook)()) {
1272 is_sensitive_thread_hook_ = is_sensitive_thread_hook;
1273 }
1274
Hiroshi Yamauchi02e7f1a2016-10-03 15:32:01 -07001275 bool ModifySuspendCountInternal(Thread* self,
1276 int delta,
1277 AtomicInteger* suspend_barrier,
1278 bool for_debugger)
1279 REQUIRES(Locks::thread_suspend_count_lock_);
1280
Andreas Gampe0a855762016-10-26 13:43:14 -07001281 void RunCheckpointFunction();
Hiroshi Yamauchi30493242016-11-03 13:06:52 -07001282 void RunEmptyCheckpoint();
Andreas Gampe0a855762016-10-26 13:43:14 -07001283
1284 bool PassActiveSuspendBarriers(Thread* self)
1285 REQUIRES(!Locks::thread_suspend_count_lock_);
1286
1287 // Install the protected region for implicit stack checks.
1288 void InstallImplicitProtection();
1289
Andreas Gampe585da952016-12-02 14:52:29 -08001290 template <bool kPrecise>
1291 void VisitRoots(RootVisitor* visitor) REQUIRES_SHARED(Locks::mutator_lock_);
1292
Andreas Gampe2c19f5b2016-11-28 08:10:18 -08001293 static bool IsAotCompiler();
1294
Ian Rogers474b6da2012-09-25 00:20:38 -07001295 // 32 bits of atomically changed state and flags. Keeping as 32 bits allows and atomic CAS to
1296 // change from being Suspended to Runnable without a suspend request occurring.
Chris Dearman59cde532013-12-04 18:53:49 -08001297 union PACKED(4) StateAndFlags {
1298 StateAndFlags() {}
Ian Rogersdf1ce912012-11-27 17:07:11 -08001299 struct PACKED(4) {
Ian Rogers30e173f2012-09-26 14:35:03 -07001300 // Bitfield of flag values. Must be changed atomically so that flag values aren't lost. See
1301 // ThreadFlags for bit field meanings.
1302 volatile uint16_t flags;
1303 // Holds the ThreadState. May be changed non-atomically between Suspended (ie not Runnable)
1304 // transitions. Changing to Runnable requires that the suspend_request be part of the atomic
1305 // operation. If a thread is suspended and a suspend_request is present, a thread may not
1306 // change to Runnable as a GC or other operation is in progress.
Ian Rogers01ae5802012-09-28 16:14:01 -07001307 volatile uint16_t state;
Ian Rogers30e173f2012-09-26 14:35:03 -07001308 } as_struct;
Ian Rogersb8e087e2014-07-09 21:12:06 -07001309 AtomicInteger as_atomic_int;
Ian Rogers01ae5802012-09-28 16:14:01 -07001310 volatile int32_t as_int;
Chris Dearman59cde532013-12-04 18:53:49 -08001311
1312 private:
1313 // gcc does not handle struct with volatile member assignments correctly.
1314 // See http://gcc.gnu.org/bugzilla/show_bug.cgi?id=47409
1315 DISALLOW_COPY_AND_ASSIGN(StateAndFlags);
Ian Rogers474b6da2012-09-25 00:20:38 -07001316 };
Andreas Gampe575e78c2014-11-03 23:41:03 -08001317 static_assert(sizeof(StateAndFlags) == sizeof(int32_t), "Weird state_and_flags size");
Ian Rogers474b6da2012-09-25 00:20:38 -07001318
Ian Rogersdd7624d2014-03-14 17:43:00 -07001319 static void ThreadExitCallback(void* arg);
Elliott Hughes5d96a712012-06-28 12:24:27 -07001320
Yu Lieac44242015-06-29 10:50:03 +08001321 // Maximum number of suspend barriers.
1322 static constexpr uint32_t kMaxSuspendBarriers = 3;
1323
Ian Rogersdd7624d2014-03-14 17:43:00 -07001324 // Has Thread::Startup been called?
1325 static bool is_started_;
Mathieu Chartier858f1c52012-10-17 17:45:55 -07001326
Ian Rogersdd7624d2014-03-14 17:43:00 -07001327 // TLS key used to retrieve the Thread*.
1328 static pthread_key_t pthread_key_self_;
Ian Rogersa32a6fd2012-02-06 20:18:44 -08001329
Ian Rogersdd7624d2014-03-14 17:43:00 -07001330 // Used to notify threads that they should attempt to resume, they will suspend again if
1331 // their suspend count is > 0.
1332 static ConditionVariable* resume_cond_ GUARDED_BY(Locks::thread_suspend_count_lock_);
Dave Allisonb373e092014-02-20 16:06:36 -08001333
Calin Juravleb2771b42016-04-07 17:09:25 +01001334 // Hook passed by framework which returns true
1335 // when StrictMode events are traced for the current thread.
1336 static bool (*is_sensitive_thread_hook_)();
Calin Juravle97cbc922016-04-15 16:16:35 +01001337 // Stores the jit sensitive thread (which for now is the UI thread).
1338 static Thread* jit_sensitive_thread_;
Calin Juravleb2771b42016-04-07 17:09:25 +01001339
Ian Rogersdd7624d2014-03-14 17:43:00 -07001340 /***********************************************************************************************/
1341 // Thread local storage. Fields are grouped by size to enable 32 <-> 64 searching to account for
1342 // pointer size differences. To encourage shorter encoding, more frequently used values appear
1343 // first if possible.
1344 /***********************************************************************************************/
Elliott Hughes6a607ad2012-07-13 20:40:00 -07001345
Zuo Wangf37a88b2014-07-10 04:26:41 -07001346 struct PACKED(4) tls_32bit_sized_values {
Ian Rogersdd7624d2014-03-14 17:43:00 -07001347 // We have no control over the size of 'bool', but want our boolean fields
1348 // to be 4-byte quantities.
1349 typedef uint32_t bool32_t;
Ian Rogers22f454c2012-09-08 11:06:29 -07001350
Ian Rogersdd7624d2014-03-14 17:43:00 -07001351 explicit tls_32bit_sized_values(bool is_daemon) :
1352 suspend_count(0), debug_suspend_count(0), thin_lock_thread_id(0), tid(0),
1353 daemon(is_daemon), throwing_OutOfMemoryError(false), no_thread_suspension(0),
Mingyao Yang1f2d3ba2015-05-18 12:12:50 -07001354 thread_exit_check_count(0), handling_signal_(false),
Hiroshi Yamauchiee235822016-08-19 17:03:27 -07001355 is_transitioning_to_runnable(false), ready_for_debug_invoke(false),
Hiroshi Yamauchi20a0be02016-02-19 15:44:06 -08001356 debug_method_entry_(false), is_gc_marking(false), weak_ref_access_enabled(true),
1357 disable_thread_flip_count(0) {
Ian Rogersdd7624d2014-03-14 17:43:00 -07001358 }
Dave Allisonb373e092014-02-20 16:06:36 -08001359
Ian Rogersdd7624d2014-03-14 17:43:00 -07001360 union StateAndFlags state_and_flags;
Andreas Gampe575e78c2014-11-03 23:41:03 -08001361 static_assert(sizeof(union StateAndFlags) == sizeof(int32_t),
1362 "Size of state_and_flags and int32 are different");
Dave Allisonb373e092014-02-20 16:06:36 -08001363
Ian Rogersdd7624d2014-03-14 17:43:00 -07001364 // A non-zero value is used to tell the current thread to enter a safe point
1365 // at the next poll.
1366 int suspend_count GUARDED_BY(Locks::thread_suspend_count_lock_);
Hiroshi Yamauchicf58d4a2013-09-26 14:21:22 -07001367
Ian Rogersdd7624d2014-03-14 17:43:00 -07001368 // How much of 'suspend_count_' is by request of the debugger, used to set things right
1369 // when the debugger detaches. Must be <= suspend_count_.
1370 int debug_suspend_count GUARDED_BY(Locks::thread_suspend_count_lock_);
Hiroshi Yamauchif5b0e202014-02-11 17:02:22 -08001371
Ian Rogersdd7624d2014-03-14 17:43:00 -07001372 // Thin lock thread id. This is a small integer used by the thin lock implementation.
1373 // This is not to be confused with the native thread's tid, nor is it the value returned
1374 // by java.lang.Thread.getId --- this is a distinct value, used only for locking. One
1375 // important difference between this id and the ids visible to managed code is that these
1376 // ones get reused (to ensure that they fit in the number of bits available).
1377 uint32_t thin_lock_thread_id;
Hiroshi Yamauchif5b0e202014-02-11 17:02:22 -08001378
Ian Rogersdd7624d2014-03-14 17:43:00 -07001379 // System thread id.
1380 uint32_t tid;
Hiroshi Yamauchif5b0e202014-02-11 17:02:22 -08001381
Ian Rogersdd7624d2014-03-14 17:43:00 -07001382 // Is the thread a daemon?
1383 const bool32_t daemon;
Hiroshi Yamauchif5b0e202014-02-11 17:02:22 -08001384
Ian Rogersdd7624d2014-03-14 17:43:00 -07001385 // A boolean telling us whether we're recursively throwing OOME.
1386 bool32_t throwing_OutOfMemoryError;
1387
1388 // A positive value implies we're in a region where thread suspension isn't expected.
1389 uint32_t no_thread_suspension;
1390
1391 // How many times has our pthread key's destructor been called?
1392 uint32_t thread_exit_check_count;
Sebastien Hertz9f102032014-05-23 08:59:42 +02001393
Dave Allison648d7112014-07-25 16:15:27 -07001394 // True if signal is being handled by this thread.
1395 bool32_t handling_signal_;
1396
Hiroshi Yamauchiee235822016-08-19 17:03:27 -07001397 // True if the thread is in TransitionFromSuspendedToRunnable(). This is used to distinguish the
1398 // non-runnable threads (eg. kNative, kWaiting) that are about to transition to runnable from
1399 // the rest of them.
1400 bool32_t is_transitioning_to_runnable;
Sebastien Hertz1558b572015-02-25 15:05:59 +01001401
1402 // True if the thread has been suspended by a debugger event. This is
1403 // used to invoke method from the debugger which is only allowed when
1404 // the thread is suspended by an event.
1405 bool32_t ready_for_debug_invoke;
Sebastien Hertz9d6bf692015-04-10 12:12:33 +02001406
1407 // True if the thread enters a method. This is used to detect method entry
1408 // event for the debugger.
1409 bool32_t debug_method_entry_;
Hiroshi Yamauchi0b713572015-06-16 18:29:23 -07001410
Hiroshi Yamauchi00370822015-08-18 14:47:25 -07001411 // True if the GC is in the marking phase. This is used for the CC collector only. This is
1412 // thread local so that we can simplify the logic to check for the fast path of read barriers of
1413 // GC roots.
1414 bool32_t is_gc_marking;
1415
Hiroshi Yamauchi0b713572015-06-16 18:29:23 -07001416 // True if the thread is allowed to access a weak ref (Reference::GetReferent() and system
1417 // weaks) and to potentially mark an object alive/gray. This is used for concurrent reference
1418 // processing of the CC collector only. This is thread local so that we can enable/disable weak
1419 // ref access by using a checkpoint and avoid a race around the time weak ref access gets
1420 // disabled and concurrent reference processing begins (if weak ref access is disabled during a
1421 // pause, this is not an issue.) Other collectors use Runtime::DisallowNewSystemWeaks() and
1422 // ReferenceProcessor::EnableSlowPath().
1423 bool32_t weak_ref_access_enabled;
Hiroshi Yamauchi20a0be02016-02-19 15:44:06 -08001424
1425 // A thread local version of Heap::disable_thread_flip_count_. This keeps track of how many
1426 // levels of (nested) JNI critical sections the thread is in and is used to detect a nested JNI
1427 // critical section enter.
1428 uint32_t disable_thread_flip_count;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001429 } tls32_;
1430
1431 struct PACKED(8) tls_64bit_sized_values {
Sebastien Hertz07474662015-08-25 15:12:33 +00001432 tls_64bit_sized_values() : trace_clock_base(0) {
Ian Rogersdd7624d2014-03-14 17:43:00 -07001433 }
1434
1435 // The clock base used for tracing.
1436 uint64_t trace_clock_base;
1437
Ian Rogersdd7624d2014-03-14 17:43:00 -07001438 RuntimeStats stats;
1439 } tls64_;
1440
Andreas Gampe6aa13702015-10-28 10:57:25 -07001441 struct PACKED(sizeof(void*)) tls_ptr_sized_values {
Ian Rogersdd7624d2014-03-14 17:43:00 -07001442 tls_ptr_sized_values() : card_table(nullptr), exception(nullptr), stack_end(nullptr),
Andreas Gampe449357d2015-06-01 22:29:51 -07001443 managed_stack(), suspend_trigger(nullptr), jni_env(nullptr), tmp_jni_env(nullptr),
1444 self(nullptr), opeer(nullptr), jpeer(nullptr), stack_begin(nullptr), stack_size(0),
Nicolas Geoffray340dafa2016-11-18 16:03:10 +00001445 deps_or_stack_trace_sample(), wait_next(nullptr), monitor_enter_object(nullptr),
Mathieu Chartiereb8167a2014-05-07 15:43:14 -07001446 top_handle_scope(nullptr), class_loader_override(nullptr), long_jump_context(nullptr),
Ian Rogersdd7624d2014-03-14 17:43:00 -07001447 instrumentation_stack(nullptr), debug_invoke_req(nullptr), single_step_control(nullptr),
Sebastien Hertz07474662015-08-25 15:12:33 +00001448 stacked_shadow_frame_record(nullptr), deoptimization_context_stack(nullptr),
Mingyao Yang99170c62015-07-06 11:10:37 -07001449 frame_id_to_shadow_frame(nullptr), name(nullptr), pthread_self(0),
Vladimir Marko05846472016-09-14 12:49:57 +01001450 last_no_thread_suspension_cause(nullptr), checkpoint_function(nullptr),
Roland Levillaine71b3542017-01-16 14:58:23 +00001451 thread_local_start(nullptr), thread_local_pos(nullptr), thread_local_end(nullptr),
Vladimir Marko05846472016-09-14 12:49:57 +01001452 thread_local_objects(0), mterp_current_ibase(nullptr), mterp_default_ibase(nullptr),
1453 mterp_alt_ibase(nullptr), thread_local_alloc_stack_top(nullptr),
Josh Gaoefd20cb2017-02-28 16:53:59 -08001454 thread_local_alloc_stack_end(nullptr),
Vladimir Marko05846472016-09-14 12:49:57 +01001455 flip_function(nullptr), method_verifier(nullptr), thread_local_mark_stack(nullptr) {
Mathieu Chartier12d625f2015-03-13 11:33:37 -07001456 std::fill(held_mutexes, held_mutexes + kLockLevelCount, nullptr);
Ian Rogersdd7624d2014-03-14 17:43:00 -07001457 }
1458
1459 // The biased card table, see CardTable for details.
Ian Rogers13735952014-10-08 12:43:28 -07001460 uint8_t* card_table;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001461
Mathieu Chartier2cebb242015-04-21 16:50:40 -07001462 // The pending exception or null.
Ian Rogersdd7624d2014-03-14 17:43:00 -07001463 mirror::Throwable* exception;
1464
1465 // The end of this thread's stack. This is the lowest safely-addressable address on the stack.
1466 // We leave extra space so there's room for the code that throws StackOverflowError.
Ian Rogers13735952014-10-08 12:43:28 -07001467 uint8_t* stack_end;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001468
1469 // The top of the managed stack often manipulated directly by compiler generated code.
1470 ManagedStack managed_stack;
1471
1472 // In certain modes, setting this to 0 will trigger a SEGV and thus a suspend check. It is
1473 // normally set to the address of itself.
1474 uintptr_t* suspend_trigger;
1475
1476 // Every thread may have an associated JNI environment
1477 JNIEnvExt* jni_env;
1478
Andreas Gampe449357d2015-06-01 22:29:51 -07001479 // Temporary storage to transfer a pre-allocated JNIEnvExt from the creating thread to the
1480 // created thread.
1481 JNIEnvExt* tmp_jni_env;
1482
Ian Rogersdd7624d2014-03-14 17:43:00 -07001483 // Initialized to "this". On certain architectures (such as x86) reading off of Thread::Current
1484 // is easy but getting the address of Thread::Current is hard. This field can be read off of
1485 // Thread::Current to give the address.
1486 Thread* self;
1487
1488 // Our managed peer (an instance of java.lang.Thread). The jobject version is used during thread
1489 // start up, until the thread is registered and the local opeer_ is used.
1490 mirror::Object* opeer;
1491 jobject jpeer;
1492
1493 // The "lowest addressable byte" of the stack.
Ian Rogers13735952014-10-08 12:43:28 -07001494 uint8_t* stack_begin;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001495
1496 // Size of the stack.
1497 size_t stack_size;
1498
Nicolas Geoffray340dafa2016-11-18 16:03:10 +00001499 // Sampling profiler and AOT verification cannot happen on the same run, so we share
1500 // the same entry for the stack trace and the verifier deps.
1501 union DepsOrStackTraceSample {
1502 DepsOrStackTraceSample() {
1503 verifier_deps = nullptr;
1504 stack_trace_sample = nullptr;
1505 }
1506 // Pointer to previous stack trace captured by sampling profiler.
1507 std::vector<ArtMethod*>* stack_trace_sample;
1508 // When doing AOT verification, per-thread VerifierDeps.
1509 verifier::VerifierDeps* verifier_deps;
1510 } deps_or_stack_trace_sample;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001511
Mathieu Chartier2cebb242015-04-21 16:50:40 -07001512 // The next thread in the wait set this thread is part of or null if not waiting.
Ian Rogersdd7624d2014-03-14 17:43:00 -07001513 Thread* wait_next;
1514
1515 // If we're blocked in MonitorEnter, this is the object we're trying to lock.
1516 mirror::Object* monitor_enter_object;
1517
Mathieu Chartier2cebb242015-04-21 16:50:40 -07001518 // Top of linked list of handle scopes or null for none.
Mathieu Chartiere8a3c572016-10-11 16:52:17 -07001519 BaseHandleScope* top_handle_scope;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001520
1521 // Needed to get the right ClassLoader in JNI_OnLoad, but also
1522 // useful for testing.
Ian Rogers68d8b422014-07-17 11:09:10 -07001523 jobject class_loader_override;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001524
1525 // Thread local, lazily allocated, long jump context. Used to deliver exceptions.
1526 Context* long_jump_context;
1527
1528 // Additional stack used by method instrumentation to store method and return pc values.
1529 // Stored as a pointer since std::deque is not PACKED.
1530 std::deque<instrumentation::InstrumentationStackFrame>* instrumentation_stack;
1531
1532 // JDWP invoke-during-breakpoint support.
1533 DebugInvokeReq* debug_invoke_req;
1534
1535 // JDWP single-stepping support.
1536 SingleStepControl* single_step_control;
1537
Mingyao Yang1f2d3ba2015-05-18 12:12:50 -07001538 // For gc purpose, a shadow frame record stack that keeps track of:
1539 // 1) shadow frames under construction.
1540 // 2) deoptimization shadow frames.
1541 StackedShadowFrameRecord* stacked_shadow_frame_record;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001542
Mingyao Yang1f2d3ba2015-05-18 12:12:50 -07001543 // Deoptimization return value record stack.
Sebastien Hertz07474662015-08-25 15:12:33 +00001544 DeoptimizationContextRecord* deoptimization_context_stack;
Andreas Gampe2a0d4ec2014-06-02 22:05:22 -07001545
Mingyao Yang99170c62015-07-06 11:10:37 -07001546 // For debugger, a linked list that keeps the mapping from frame_id to shadow frame.
1547 // Shadow frames may be created before deoptimization happens so that the debugger can
1548 // set local values there first.
1549 FrameIdToShadowFrame* frame_id_to_shadow_frame;
1550
Ian Rogersdd7624d2014-03-14 17:43:00 -07001551 // A cached copy of the java.lang.Thread's name.
1552 std::string* name;
1553
1554 // A cached pthread_t for the pthread underlying this Thread*.
1555 pthread_t pthread_self;
1556
Ian Rogersdd7624d2014-03-14 17:43:00 -07001557 // If no_thread_suspension_ is > 0, what is causing that assertion.
1558 const char* last_no_thread_suspension_cause;
1559
Mathieu Chartier952e1e32016-06-13 14:04:02 -07001560 // Pending checkpoint function or null if non-pending. If this checkpoint is set and someone\
1561 // requests another checkpoint, it goes to the checkpoint overflow list.
1562 Closure* checkpoint_function GUARDED_BY(Locks::thread_suspend_count_lock_);
Ian Rogersdd7624d2014-03-14 17:43:00 -07001563
Yu Lieac44242015-06-29 10:50:03 +08001564 // Pending barriers that require passing or NULL if non-pending. Installation guarding by
1565 // Locks::thread_suspend_count_lock_.
1566 // They work effectively as art::Barrier, but implemented directly using AtomicInteger and futex
1567 // to avoid additional cost of a mutex and a condition variable, as used in art::Barrier.
1568 AtomicInteger* active_suspend_barriers[kMaxSuspendBarriers];
1569
Roland Levillaine71b3542017-01-16 14:58:23 +00001570 // Thread-local allocation pointer. Moved here to force alignment for thread_local_pos on ARM.
1571 uint8_t* thread_local_start;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001572
Hiroshi Yamauchi7e1ce282015-12-11 15:46:19 -08001573 // thread_local_pos and thread_local_end must be consecutive for ldrd and are 8 byte aligned for
1574 // potentially better performance.
Ian Rogers13735952014-10-08 12:43:28 -07001575 uint8_t* thread_local_pos;
1576 uint8_t* thread_local_end;
Igor Murashkinaf1e2992016-10-12 17:44:50 -07001577
Vladimir Marko05846472016-09-14 12:49:57 +01001578 size_t thread_local_objects;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001579
Roland Levillaine71b3542017-01-16 14:58:23 +00001580 // Entrypoint function pointers.
1581 // TODO: move this to more of a global offset table model to avoid per-thread duplication.
1582 JniEntryPoints jni_entrypoints;
1583 QuickEntryPoints quick_entrypoints;
1584
buzbee1452bee2015-03-06 14:43:04 -08001585 // Mterp jump table bases.
1586 void* mterp_current_ibase;
1587 void* mterp_default_ibase;
1588 void* mterp_alt_ibase;
1589
Mathieu Chartier0651d412014-04-29 14:37:57 -07001590 // There are RosAlloc::kNumThreadLocalSizeBrackets thread-local size brackets per thread.
Hiroshi Yamauchi7ed9c562016-02-02 15:22:09 -08001591 void* rosalloc_runs[kNumRosAllocThreadLocalSizeBracketsInThread];
Ian Rogersdd7624d2014-03-14 17:43:00 -07001592
1593 // Thread-local allocation stack data/routines.
Mathieu Chartiercb535da2015-01-23 13:50:03 -08001594 StackReference<mirror::Object>* thread_local_alloc_stack_top;
1595 StackReference<mirror::Object>* thread_local_alloc_stack_end;
Chao-ying Fu9e369312014-05-21 11:20:52 -07001596
1597 // Support for Mutex lock hierarchy bug detection.
1598 BaseMutex* held_mutexes[kLockLevelCount];
Dave Allison8ce6b902014-08-26 11:07:58 -07001599
Hiroshi Yamauchi2cd334a2015-01-09 14:03:35 -08001600 // The function used for thread flip.
1601 Closure* flip_function;
Mathieu Chartier12d625f2015-03-13 11:33:37 -07001602
1603 // Current method verifier, used for root marking.
1604 verifier::MethodVerifier* method_verifier;
Hiroshi Yamauchi0b713572015-06-16 18:29:23 -07001605
1606 // Thread-local mark stack for the concurrent copying collector.
1607 gc::accounting::AtomicStack<mirror::Object>* thread_local_mark_stack;
Ian Rogersdd7624d2014-03-14 17:43:00 -07001608 } tlsPtr_;
1609
1610 // Guards the 'interrupted_' and 'wait_monitor_' members.
1611 Mutex* wait_mutex_ DEFAULT_MUTEX_ACQUIRED_AFTER;
1612
1613 // Condition variable waited upon during a wait.
1614 ConditionVariable* wait_cond_ GUARDED_BY(wait_mutex_);
Mathieu Chartier2cebb242015-04-21 16:50:40 -07001615 // Pointer to the monitor lock we're currently waiting on or null if not waiting.
Ian Rogersdd7624d2014-03-14 17:43:00 -07001616 Monitor* wait_monitor_ GUARDED_BY(wait_mutex_);
1617
1618 // Thread "interrupted" status; stays raised until queried or thrown.
1619 bool interrupted_ GUARDED_BY(wait_mutex_);
1620
Mathieu Chartierdfe02f62016-02-01 20:15:11 -08001621 // Debug disable read barrier count, only is checked for debug builds and only in the runtime.
1622 uint8_t debug_disallow_read_barrier_ = 0;
1623
Mathieu Chartier3f7f03c2016-09-26 11:39:52 -07001624 // Note that it is not in the packed struct, may not be accessed for cross compilation.
1625 uintptr_t poison_object_cookie_ = 0;
1626
Mathieu Chartier952e1e32016-06-13 14:04:02 -07001627 // Pending extra checkpoints if checkpoint_function_ is already used.
1628 std::list<Closure*> checkpoint_overflow_ GUARDED_BY(Locks::thread_suspend_count_lock_);
1629
Andreas Gampef26bf2d2017-01-13 16:47:14 -08001630 // Custom TLS field that can be used by plugins.
1631 // TODO: Generalize once we have more plugins.
1632 const void* custom_tls_;
1633
Calin Juravleccd56952016-12-15 17:57:38 +00001634 // True if the thread is allowed to call back into java (for e.g. during class resolution).
1635 // By default this is true.
1636 bool can_call_into_java_;
1637
Mathieu Chartiere6da9af2013-12-16 11:54:42 -08001638 friend class Dbg; // For SetStateUnsafe.
Mathieu Chartier15d34022014-02-26 17:16:38 -08001639 friend class gc::collector::SemiSpace; // For getting stack traces.
Mathieu Chartier692fafd2013-11-29 17:24:40 -08001640 friend class Runtime; // For CreatePeer.
Ian Rogers5cf98192014-05-29 21:31:50 -07001641 friend class QuickExceptionHandler; // For dumping the stack.
Mathieu Chartier692fafd2013-11-29 17:24:40 -08001642 friend class ScopedThreadStateChange;
Mathieu Chartier119c6bd2014-05-09 14:11:47 -07001643 friend class StubTest; // For accessing entrypoints.
Mathieu Chartier692fafd2013-11-29 17:24:40 -08001644 friend class ThreadList; // For ~Thread and Destroy.
1645
Andreas Gampe4352b452014-06-04 18:59:01 -07001646 friend class EntrypointsOrderTest; // To test the order of tls entries.
1647
Carl Shapiro0e5d75d2011-07-06 18:28:37 -07001648 DISALLOW_COPY_AND_ASSIGN(Thread);
1649};
Ian Rogersbdb03912011-09-14 00:55:44 -07001650
Mathieu Chartier4e2cb092015-07-22 16:17:51 -07001651class SCOPED_CAPABILITY ScopedAssertNoThreadSuspension {
Mathieu Chartier2d5f39e2014-09-19 17:52:37 -07001652 public:
Andreas Gampeea47ff82016-11-03 08:20:17 -07001653 ALWAYS_INLINE explicit ScopedAssertNoThreadSuspension(const char* cause)
1654 ACQUIRE(Roles::uninterruptible_) {
Mathieu Chartier268764d2016-09-13 12:09:38 -07001655 if (kIsDebugBuild) {
1656 self_ = Thread::Current();
1657 old_cause_ = self_->StartAssertNoThreadSuspension(cause);
1658 } else {
1659 Roles::uninterruptible_.Acquire(); // No-op.
1660 }
Mathieu Chartier2d5f39e2014-09-19 17:52:37 -07001661 }
Mathieu Chartier268764d2016-09-13 12:09:38 -07001662 ALWAYS_INLINE ~ScopedAssertNoThreadSuspension() RELEASE(Roles::uninterruptible_) {
1663 if (kIsDebugBuild) {
1664 self_->EndAssertNoThreadSuspension(old_cause_);
1665 } else {
1666 Roles::uninterruptible_.Release(); // No-op.
1667 }
Mathieu Chartier2d5f39e2014-09-19 17:52:37 -07001668 }
1669
1670 private:
Mathieu Chartier268764d2016-09-13 12:09:38 -07001671 Thread* self_;
1672 const char* old_cause_;
Mathieu Chartier2d5f39e2014-09-19 17:52:37 -07001673};
1674
Mingyao Yang1f2d3ba2015-05-18 12:12:50 -07001675class ScopedStackedShadowFramePusher {
1676 public:
1677 ScopedStackedShadowFramePusher(Thread* self, ShadowFrame* sf, StackedShadowFrameType type)
1678 : self_(self), type_(type) {
1679 self_->PushStackedShadowFrame(sf, type);
1680 }
1681 ~ScopedStackedShadowFramePusher() {
1682 self_->PopStackedShadowFrame(type_);
1683 }
1684
1685 private:
1686 Thread* const self_;
1687 const StackedShadowFrameType type_;
1688
1689 DISALLOW_COPY_AND_ASSIGN(ScopedStackedShadowFramePusher);
1690};
1691
Mathieu Chartierdfe02f62016-02-01 20:15:11 -08001692// Only works for debug builds.
1693class ScopedDebugDisallowReadBarriers {
1694 public:
1695 explicit ScopedDebugDisallowReadBarriers(Thread* self) : self_(self) {
1696 self_->ModifyDebugDisallowReadBarrier(1);
1697 }
1698 ~ScopedDebugDisallowReadBarriers() {
1699 self_->ModifyDebugDisallowReadBarrier(-1);
1700 }
1701
1702 private:
1703 Thread* const self_;
1704};
1705
Hiroshi Yamauchiee235822016-08-19 17:03:27 -07001706class ScopedTransitioningToRunnable : public ValueObject {
1707 public:
1708 explicit ScopedTransitioningToRunnable(Thread* self)
1709 : self_(self) {
1710 DCHECK_EQ(self, Thread::Current());
1711 if (kUseReadBarrier) {
1712 self_->SetIsTransitioningToRunnable(true);
1713 }
1714 }
1715
1716 ~ScopedTransitioningToRunnable() {
1717 if (kUseReadBarrier) {
1718 self_->SetIsTransitioningToRunnable(false);
1719 }
1720 }
1721
1722 private:
1723 Thread* const self_;
1724};
1725
Andreas Gampe04bbb5b2017-01-19 17:49:03 +00001726class ThreadLifecycleCallback {
1727 public:
1728 virtual ~ThreadLifecycleCallback() {}
1729
1730 virtual void ThreadStart(Thread* self) REQUIRES_SHARED(Locks::mutator_lock_) = 0;
1731 virtual void ThreadDeath(Thread* self) REQUIRES_SHARED(Locks::mutator_lock_) = 0;
1732};
1733
Elliott Hughes330304d2011-08-12 14:28:05 -07001734std::ostream& operator<<(std::ostream& os, const Thread& thread);
Sebastien Hertzf7958692015-06-09 14:09:14 +02001735std::ostream& operator<<(std::ostream& os, const StackedShadowFrameType& thread);
Carl Shapiro0e5d75d2011-07-06 18:28:37 -07001736
Carl Shapiro0e5d75d2011-07-06 18:28:37 -07001737} // namespace art
1738
Brian Carlstromfc0e3212013-07-17 14:40:12 -07001739#endif // ART_RUNTIME_THREAD_H_