1*795d594fSAndroid Build Coastguard Worker /*
2*795d594fSAndroid Build Coastguard Worker * Copyright (C) 2011 The Android Open Source Project
3*795d594fSAndroid Build Coastguard Worker *
4*795d594fSAndroid Build Coastguard Worker * Licensed under the Apache License, Version 2.0 (the "License");
5*795d594fSAndroid Build Coastguard Worker * you may not use this file except in compliance with the License.
6*795d594fSAndroid Build Coastguard Worker * You may obtain a copy of the License at
7*795d594fSAndroid Build Coastguard Worker *
8*795d594fSAndroid Build Coastguard Worker * http://www.apache.org/licenses/LICENSE-2.0
9*795d594fSAndroid Build Coastguard Worker *
10*795d594fSAndroid Build Coastguard Worker * Unless required by applicable law or agreed to in writing, software
11*795d594fSAndroid Build Coastguard Worker * distributed under the License is distributed on an "AS IS" BASIS,
12*795d594fSAndroid Build Coastguard Worker * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13*795d594fSAndroid Build Coastguard Worker * See the License for the specific language governing permissions and
14*795d594fSAndroid Build Coastguard Worker * limitations under the License.
15*795d594fSAndroid Build Coastguard Worker */
16*795d594fSAndroid Build Coastguard Worker
17*795d594fSAndroid Build Coastguard Worker #ifndef ART_RUNTIME_MIRROR_OBJECT_READBARRIER_INL_H_
18*795d594fSAndroid Build Coastguard Worker #define ART_RUNTIME_MIRROR_OBJECT_READBARRIER_INL_H_
19*795d594fSAndroid Build Coastguard Worker
20*795d594fSAndroid Build Coastguard Worker #include "object.h"
21*795d594fSAndroid Build Coastguard Worker
22*795d594fSAndroid Build Coastguard Worker #include "base/atomic.h"
23*795d594fSAndroid Build Coastguard Worker #include "class_linker.h"
24*795d594fSAndroid Build Coastguard Worker #include "heap_poisoning.h"
25*795d594fSAndroid Build Coastguard Worker #include "lock_word-inl.h"
26*795d594fSAndroid Build Coastguard Worker #include "object_reference-inl.h"
27*795d594fSAndroid Build Coastguard Worker #include "read_barrier.h"
28*795d594fSAndroid Build Coastguard Worker #include "runtime.h"
29*795d594fSAndroid Build Coastguard Worker
30*795d594fSAndroid Build Coastguard Worker namespace art HIDDEN {
31*795d594fSAndroid Build Coastguard Worker namespace mirror {
32*795d594fSAndroid Build Coastguard Worker
33*795d594fSAndroid Build Coastguard Worker template<VerifyObjectFlags kVerifyFlags>
GetLockWord(bool as_volatile)34*795d594fSAndroid Build Coastguard Worker inline LockWord Object::GetLockWord(bool as_volatile) {
35*795d594fSAndroid Build Coastguard Worker if (as_volatile) {
36*795d594fSAndroid Build Coastguard Worker return LockWord(GetField32Volatile<kVerifyFlags>(MonitorOffset()));
37*795d594fSAndroid Build Coastguard Worker }
38*795d594fSAndroid Build Coastguard Worker return LockWord(GetField32<kVerifyFlags>(MonitorOffset()));
39*795d594fSAndroid Build Coastguard Worker }
40*795d594fSAndroid Build Coastguard Worker
41*795d594fSAndroid Build Coastguard Worker template<bool kTransactionActive, bool kCheckTransaction, VerifyObjectFlags kVerifyFlags>
CasField32(MemberOffset field_offset,int32_t old_value,int32_t new_value,CASMode mode,std::memory_order memory_order)42*795d594fSAndroid Build Coastguard Worker inline bool Object::CasField32(MemberOffset field_offset,
43*795d594fSAndroid Build Coastguard Worker int32_t old_value,
44*795d594fSAndroid Build Coastguard Worker int32_t new_value,
45*795d594fSAndroid Build Coastguard Worker CASMode mode,
46*795d594fSAndroid Build Coastguard Worker std::memory_order memory_order) {
47*795d594fSAndroid Build Coastguard Worker if (kCheckTransaction) {
48*795d594fSAndroid Build Coastguard Worker DCHECK_EQ(kTransactionActive, Runtime::Current()->IsActiveTransaction());
49*795d594fSAndroid Build Coastguard Worker }
50*795d594fSAndroid Build Coastguard Worker if (kVerifyFlags & kVerifyThis) {
51*795d594fSAndroid Build Coastguard Worker VerifyObject(this);
52*795d594fSAndroid Build Coastguard Worker }
53*795d594fSAndroid Build Coastguard Worker uint8_t* raw_addr = reinterpret_cast<uint8_t*>(this) + field_offset.Int32Value();
54*795d594fSAndroid Build Coastguard Worker AtomicInteger* atomic_addr = reinterpret_cast<AtomicInteger*>(raw_addr);
55*795d594fSAndroid Build Coastguard Worker
56*795d594fSAndroid Build Coastguard Worker bool success = atomic_addr->CompareAndSet(old_value, new_value, mode, memory_order);
57*795d594fSAndroid Build Coastguard Worker if (kTransactionActive && success) {
58*795d594fSAndroid Build Coastguard Worker Runtime::Current()->GetClassLinker()->RecordWriteField32(
59*795d594fSAndroid Build Coastguard Worker this, field_offset, old_value, /*is_volatile=*/ true);
60*795d594fSAndroid Build Coastguard Worker }
61*795d594fSAndroid Build Coastguard Worker return success;
62*795d594fSAndroid Build Coastguard Worker }
63*795d594fSAndroid Build Coastguard Worker
CasLockWord(LockWord old_val,LockWord new_val,CASMode mode,std::memory_order memory_order)64*795d594fSAndroid Build Coastguard Worker inline bool Object::CasLockWord(LockWord old_val,
65*795d594fSAndroid Build Coastguard Worker LockWord new_val,
66*795d594fSAndroid Build Coastguard Worker CASMode mode,
67*795d594fSAndroid Build Coastguard Worker std::memory_order memory_order) {
68*795d594fSAndroid Build Coastguard Worker // Force use of non-transactional mode and do not check.
69*795d594fSAndroid Build Coastguard Worker return CasField32<false, false>(MonitorOffset(),
70*795d594fSAndroid Build Coastguard Worker old_val.GetValue(),
71*795d594fSAndroid Build Coastguard Worker new_val.GetValue(),
72*795d594fSAndroid Build Coastguard Worker mode,
73*795d594fSAndroid Build Coastguard Worker memory_order);
74*795d594fSAndroid Build Coastguard Worker }
75*795d594fSAndroid Build Coastguard Worker
GetReadBarrierState(uintptr_t * fake_address_dependency)76*795d594fSAndroid Build Coastguard Worker inline uint32_t Object::GetReadBarrierState(uintptr_t* fake_address_dependency) {
77*795d594fSAndroid Build Coastguard Worker if (!kUseBakerReadBarrier) {
78*795d594fSAndroid Build Coastguard Worker LOG(FATAL) << "Unreachable";
79*795d594fSAndroid Build Coastguard Worker UNREACHABLE();
80*795d594fSAndroid Build Coastguard Worker }
81*795d594fSAndroid Build Coastguard Worker #if defined(__arm__)
82*795d594fSAndroid Build Coastguard Worker uintptr_t obj = reinterpret_cast<uintptr_t>(this);
83*795d594fSAndroid Build Coastguard Worker uintptr_t result;
84*795d594fSAndroid Build Coastguard Worker DCHECK_EQ(OFFSETOF_MEMBER(Object, monitor_), 4U);
85*795d594fSAndroid Build Coastguard Worker // Use inline assembly to prevent the compiler from optimizing away the false dependency.
86*795d594fSAndroid Build Coastguard Worker __asm__ __volatile__(
87*795d594fSAndroid Build Coastguard Worker "ldr %[result], [%[obj], #4]\n\t"
88*795d594fSAndroid Build Coastguard Worker // This instruction is enough to "fool the compiler and the CPU" by having `fad` always be
89*795d594fSAndroid Build Coastguard Worker // null, without them being able to assume that fact.
90*795d594fSAndroid Build Coastguard Worker "eor %[fad], %[result], %[result]\n\t"
91*795d594fSAndroid Build Coastguard Worker : [result] "+r" (result), [fad] "=r" (*fake_address_dependency)
92*795d594fSAndroid Build Coastguard Worker : [obj] "r" (obj));
93*795d594fSAndroid Build Coastguard Worker DCHECK_EQ(*fake_address_dependency, 0U);
94*795d594fSAndroid Build Coastguard Worker LockWord lw(static_cast<uint32_t>(result));
95*795d594fSAndroid Build Coastguard Worker uint32_t rb_state = lw.ReadBarrierState();
96*795d594fSAndroid Build Coastguard Worker return rb_state;
97*795d594fSAndroid Build Coastguard Worker #elif defined(__aarch64__)
98*795d594fSAndroid Build Coastguard Worker uintptr_t obj = reinterpret_cast<uintptr_t>(this);
99*795d594fSAndroid Build Coastguard Worker uintptr_t result;
100*795d594fSAndroid Build Coastguard Worker DCHECK_EQ(OFFSETOF_MEMBER(Object, monitor_), 4U);
101*795d594fSAndroid Build Coastguard Worker // Use inline assembly to prevent the compiler from optimizing away the false dependency.
102*795d594fSAndroid Build Coastguard Worker __asm__ __volatile__(
103*795d594fSAndroid Build Coastguard Worker "ldr %w[result], [%[obj], #4]\n\t"
104*795d594fSAndroid Build Coastguard Worker // This instruction is enough to "fool the compiler and the CPU" by having `fad` always be
105*795d594fSAndroid Build Coastguard Worker // null, without them being able to assume that fact.
106*795d594fSAndroid Build Coastguard Worker "eor %[fad], %[result], %[result]\n\t"
107*795d594fSAndroid Build Coastguard Worker : [result] "+r" (result), [fad] "=r" (*fake_address_dependency)
108*795d594fSAndroid Build Coastguard Worker : [obj] "r" (obj));
109*795d594fSAndroid Build Coastguard Worker DCHECK_EQ(*fake_address_dependency, 0U);
110*795d594fSAndroid Build Coastguard Worker LockWord lw(static_cast<uint32_t>(result));
111*795d594fSAndroid Build Coastguard Worker uint32_t rb_state = lw.ReadBarrierState();
112*795d594fSAndroid Build Coastguard Worker return rb_state;
113*795d594fSAndroid Build Coastguard Worker #elif defined(__i386__) || defined(__x86_64__) || defined(__riscv)
114*795d594fSAndroid Build Coastguard Worker // TODO(riscv64): add arch-specific implementation
115*795d594fSAndroid Build Coastguard Worker LockWord lw = GetLockWord(false);
116*795d594fSAndroid Build Coastguard Worker // i386/x86_64 don't need fake address dependency. Use a compiler fence to avoid compiler
117*795d594fSAndroid Build Coastguard Worker // reordering.
118*795d594fSAndroid Build Coastguard Worker *fake_address_dependency = 0;
119*795d594fSAndroid Build Coastguard Worker std::atomic_signal_fence(std::memory_order_acquire);
120*795d594fSAndroid Build Coastguard Worker uint32_t rb_state = lw.ReadBarrierState();
121*795d594fSAndroid Build Coastguard Worker return rb_state;
122*795d594fSAndroid Build Coastguard Worker #else
123*795d594fSAndroid Build Coastguard Worker UNUSED(fake_address_dependency);
124*795d594fSAndroid Build Coastguard Worker LOG(FATAL) << "Unsupported architecture.";
125*795d594fSAndroid Build Coastguard Worker UNREACHABLE();
126*795d594fSAndroid Build Coastguard Worker #endif
127*795d594fSAndroid Build Coastguard Worker }
128*795d594fSAndroid Build Coastguard Worker
GetReadBarrierState()129*795d594fSAndroid Build Coastguard Worker inline uint32_t Object::GetReadBarrierState() {
130*795d594fSAndroid Build Coastguard Worker if (!kUseBakerReadBarrier) {
131*795d594fSAndroid Build Coastguard Worker LOG(FATAL) << "Unreachable";
132*795d594fSAndroid Build Coastguard Worker UNREACHABLE();
133*795d594fSAndroid Build Coastguard Worker }
134*795d594fSAndroid Build Coastguard Worker DCHECK(kUseBakerReadBarrier);
135*795d594fSAndroid Build Coastguard Worker LockWord lw(GetFieldPrimitive<uint32_t, /*kIsVolatile=*/false>(MonitorOffset()));
136*795d594fSAndroid Build Coastguard Worker uint32_t rb_state = lw.ReadBarrierState();
137*795d594fSAndroid Build Coastguard Worker DCHECK(ReadBarrier::IsValidReadBarrierState(rb_state)) << rb_state;
138*795d594fSAndroid Build Coastguard Worker return rb_state;
139*795d594fSAndroid Build Coastguard Worker }
140*795d594fSAndroid Build Coastguard Worker
GetReadBarrierStateAcquire()141*795d594fSAndroid Build Coastguard Worker inline uint32_t Object::GetReadBarrierStateAcquire() {
142*795d594fSAndroid Build Coastguard Worker if (!kUseBakerReadBarrier) {
143*795d594fSAndroid Build Coastguard Worker LOG(FATAL) << "Unreachable";
144*795d594fSAndroid Build Coastguard Worker UNREACHABLE();
145*795d594fSAndroid Build Coastguard Worker }
146*795d594fSAndroid Build Coastguard Worker LockWord lw(GetFieldAcquire<uint32_t>(MonitorOffset()));
147*795d594fSAndroid Build Coastguard Worker uint32_t rb_state = lw.ReadBarrierState();
148*795d594fSAndroid Build Coastguard Worker DCHECK(ReadBarrier::IsValidReadBarrierState(rb_state)) << rb_state;
149*795d594fSAndroid Build Coastguard Worker return rb_state;
150*795d594fSAndroid Build Coastguard Worker }
151*795d594fSAndroid Build Coastguard Worker
AtomicSetReadBarrierState(uint32_t expected_rb_state,uint32_t rb_state,std::memory_order order)152*795d594fSAndroid Build Coastguard Worker inline bool Object::AtomicSetReadBarrierState(uint32_t expected_rb_state,
153*795d594fSAndroid Build Coastguard Worker uint32_t rb_state,
154*795d594fSAndroid Build Coastguard Worker std::memory_order order) {
155*795d594fSAndroid Build Coastguard Worker if (!kUseBakerReadBarrier) {
156*795d594fSAndroid Build Coastguard Worker LOG(FATAL) << "Unreachable";
157*795d594fSAndroid Build Coastguard Worker UNREACHABLE();
158*795d594fSAndroid Build Coastguard Worker }
159*795d594fSAndroid Build Coastguard Worker DCHECK(ReadBarrier::IsValidReadBarrierState(expected_rb_state)) << expected_rb_state;
160*795d594fSAndroid Build Coastguard Worker DCHECK(ReadBarrier::IsValidReadBarrierState(rb_state)) << rb_state;
161*795d594fSAndroid Build Coastguard Worker LockWord expected_lw;
162*795d594fSAndroid Build Coastguard Worker LockWord new_lw;
163*795d594fSAndroid Build Coastguard Worker do {
164*795d594fSAndroid Build Coastguard Worker LockWord lw = GetLockWord(false);
165*795d594fSAndroid Build Coastguard Worker if (UNLIKELY(lw.ReadBarrierState() != expected_rb_state)) {
166*795d594fSAndroid Build Coastguard Worker // Lost the race.
167*795d594fSAndroid Build Coastguard Worker return false;
168*795d594fSAndroid Build Coastguard Worker }
169*795d594fSAndroid Build Coastguard Worker expected_lw = lw;
170*795d594fSAndroid Build Coastguard Worker expected_lw.SetReadBarrierState(expected_rb_state);
171*795d594fSAndroid Build Coastguard Worker new_lw = lw;
172*795d594fSAndroid Build Coastguard Worker new_lw.SetReadBarrierState(rb_state);
173*795d594fSAndroid Build Coastguard Worker // ConcurrentCopying::ProcessMarkStackRef uses this with
174*795d594fSAndroid Build Coastguard Worker // `kMemoryOrder` == `std::memory_order_release`.
175*795d594fSAndroid Build Coastguard Worker // If `kMemoryOrder` == `std::memory_order_release`, use a CAS release so that when GC updates
176*795d594fSAndroid Build Coastguard Worker // all the fields of an object and then changes the object from gray to black (non-gray), the
177*795d594fSAndroid Build Coastguard Worker // field updates (stores) will be visible (won't be reordered after this CAS.)
178*795d594fSAndroid Build Coastguard Worker } while (!CasLockWord(expected_lw, new_lw, CASMode::kWeak, order));
179*795d594fSAndroid Build Coastguard Worker return true;
180*795d594fSAndroid Build Coastguard Worker }
181*795d594fSAndroid Build Coastguard Worker
AtomicSetMarkBit(uint32_t expected_mark_bit,uint32_t mark_bit)182*795d594fSAndroid Build Coastguard Worker inline bool Object::AtomicSetMarkBit(uint32_t expected_mark_bit, uint32_t mark_bit) {
183*795d594fSAndroid Build Coastguard Worker LockWord expected_lw;
184*795d594fSAndroid Build Coastguard Worker LockWord new_lw;
185*795d594fSAndroid Build Coastguard Worker do {
186*795d594fSAndroid Build Coastguard Worker LockWord lw = GetLockWord(false);
187*795d594fSAndroid Build Coastguard Worker if (UNLIKELY(lw.MarkBitState() != expected_mark_bit)) {
188*795d594fSAndroid Build Coastguard Worker // Lost the race.
189*795d594fSAndroid Build Coastguard Worker return false;
190*795d594fSAndroid Build Coastguard Worker }
191*795d594fSAndroid Build Coastguard Worker expected_lw = lw;
192*795d594fSAndroid Build Coastguard Worker new_lw = lw;
193*795d594fSAndroid Build Coastguard Worker new_lw.SetMarkBitState(mark_bit);
194*795d594fSAndroid Build Coastguard Worker // Since this is only set from the mutator, we can use the non-release CAS.
195*795d594fSAndroid Build Coastguard Worker } while (!CasLockWord(expected_lw, new_lw, CASMode::kWeak, std::memory_order_relaxed));
196*795d594fSAndroid Build Coastguard Worker return true;
197*795d594fSAndroid Build Coastguard Worker }
198*795d594fSAndroid Build Coastguard Worker
199*795d594fSAndroid Build Coastguard Worker } // namespace mirror
200*795d594fSAndroid Build Coastguard Worker } // namespace art
201*795d594fSAndroid Build Coastguard Worker
202*795d594fSAndroid Build Coastguard Worker #endif // ART_RUNTIME_MIRROR_OBJECT_READBARRIER_INL_H_
203