diff --git a/.gdn/policheck/source.gdnsuppress b/.gdn/policheck/source.gdnsuppress index 5ee5fbf12d8..44b951ee542 100644 --- a/.gdn/policheck/source.gdnsuppress +++ b/.gdn/policheck/source.gdnsuppress @@ -90,6 +90,17 @@ "justification": "Matching against `aapt2` tool output.", "createdDate": "2025-02-05 11:48:04Z" }, + "26d3e99b351de02627162b255b2513d833a0343a6f25064f35d7310eb07cf3ff": { + "signature": "26d3e99b351de02627162b255b2513d833a0343a6f25064f35d7310eb07cf3ff", + "alternativeSignatures": [ + "d23c1bf667150310fd782f0ad92064dcf077226a64d9bf1dd6762ead152f7703" + ], + "memberOf": [ + "default" + ], + "justification": "Reference to ffs(3) find first set bit function.", + "createdDate": "2025-02-10 19:44:17Z" + }, "a5555a74b0e940543802a63a6465b4d965eff4f6c858552813df633186794c45": { "signature": "a5555a74b0e940543802a63a6465b4d965eff4f6c858552813df633186794c45", "alternativeSignatures": [ diff --git a/build-tools/scripts/generate-pinvoke-tables.sh b/build-tools/scripts/generate-pinvoke-tables.sh index 18c593e7c0f..2b0f8083e37 100755 --- a/build-tools/scripts/generate-pinvoke-tables.sh +++ b/build-tools/scripts/generate-pinvoke-tables.sh @@ -64,7 +64,7 @@ case ${HOST} in *) die Unsupported OS ;; esac -${COMPILER} -O2 -std=c++20 -I${EXTERNAL_DIR} -I${EXTERNAL_DIR}/constexpr-xxh3 -I${NATIVE_DIR}/shared "${GENERATOR_SOURCE}" -o "${GENERATOR_BINARY}" +${COMPILER} -O2 -std=c++20 -I${EXTERNAL_DIR} -I${EXTERNAL_DIR}/constexpr-xxh3 -I${NATIVE_DIR}/shared -I${NATIVE_DIR}/../common/include "${GENERATOR_SOURCE}" -o "${GENERATOR_BINARY}" "${GENERATOR_BINARY}" "${GENERATED_FILE}" FILES_DIFFER="no" diff --git a/src/native/CMakeLists.txt b/src/native/CMakeLists.txt index 422d9719850..72b2165bd4d 100644 --- a/src/native/CMakeLists.txt +++ b/src/native/CMakeLists.txt @@ -170,6 +170,9 @@ set(SYSROOT_CXX_INCLUDE_DIR ${CMAKE_SYSROOT}/usr/include/c++/v1) set(MONO_RUNTIME_INCLUDE_DIR ${NET_RUNTIME_DIR}/native/include/mono-2.0) set(JAVA_INTEROP_INCLUDE_DIR ${JAVA_INTEROP_SRC_PATH}) +include_directories(common/include) +include_directories(mono) + # # Compiler defines # diff --git a/src/native/clr/include/constants.hh b/src/native/clr/include/constants.hh new file mode 100644 index 00000000000..5cb344e3cf4 --- /dev/null +++ b/src/native/clr/include/constants.hh @@ -0,0 +1,143 @@ +#pragma once + +#include +#include + +#include + +#include + +namespace xamarin::android { + class Constants + { +#if INTPTR_MAX == INT64_MAX + static inline constexpr std::string_view BITNESS { "64bit" }; +#else + static inline constexpr std::string_view BITNESS { "32bit" }; +#endif + + public: +#if INTPTR_MAX == INT64_MAX + static inline constexpr bool is_64_bit_target = true; +#else + static inline constexpr bool is_64_bit_target = false; +#endif + +#if defined(RELEASE) + static constexpr bool is_release_build = true; + static constexpr bool is_debug_build = false; +#else + static constexpr bool is_release_build = false; + static constexpr bool is_debug_build = true; +#endif + static constexpr std::string_view MANGLED_ASSEMBLY_NAME_EXT { ".so" }; + + private: + static constexpr std::string_view RUNTIME_CONFIG_BLOB_BASE_NAME { "libarc.bin" }; + static constexpr size_t runtime_config_blob_name_size = calc_size (RUNTIME_CONFIG_BLOB_BASE_NAME, MANGLED_ASSEMBLY_NAME_EXT); + static constexpr auto RUNTIME_CONFIG_BLOB_NAME_ARRAY = concat_string_views (RUNTIME_CONFIG_BLOB_BASE_NAME, MANGLED_ASSEMBLY_NAME_EXT); + + public: + // .data() must be used otherwise string_view length will include the trailing \0 in the array + static constexpr std::string_view RUNTIME_CONFIG_BLOB_NAME { RUNTIME_CONFIG_BLOB_NAME_ARRAY.data () }; + static constexpr std::string_view OVERRIDE_DIRECTORY_NAME { ".__override__" }; + + /* Android property containing connection information, set by XS */ + static inline constexpr std::string_view DEBUG_MONO_CONNECT_PROPERTY { "debug.mono.connect" }; + static inline constexpr std::string_view DEBUG_MONO_DEBUG_PROPERTY { "debug.mono.debug" }; + static inline constexpr std::string_view DEBUG_MONO_ENV_PROPERTY { "debug.mono.env" }; + static inline constexpr std::string_view DEBUG_MONO_EXTRA_PROPERTY { "debug.mono.extra" }; + static inline constexpr std::string_view DEBUG_MONO_GC_PROPERTY { "debug.mono.gc" }; + static inline constexpr std::string_view DEBUG_MONO_GDB_PROPERTY { "debug.mono.gdb" }; + static inline constexpr std::string_view DEBUG_MONO_LOG_PROPERTY { "debug.mono.log" }; + static inline constexpr std::string_view DEBUG_MONO_MAX_GREFC { "debug.mono.max_grefc" }; + static inline constexpr std::string_view DEBUG_MONO_PROFILE_PROPERTY { "debug.mono.profile" }; + static inline constexpr std::string_view DEBUG_MONO_RUNTIME_ARGS_PROPERTY { "debug.mono.runtime_args" }; + static inline constexpr std::string_view DEBUG_MONO_SOFT_BREAKPOINTS { "debug.mono.soft_breakpoints" }; + static inline constexpr std::string_view DEBUG_MONO_TRACE_PROPERTY { "debug.mono.trace" }; + static inline constexpr std::string_view DEBUG_MONO_WREF_PROPERTY { "debug.mono.wref" }; + + static constexpr std::string_view LOG_CATEGORY_NAME_NONE { "*none*" }; + static constexpr std::string_view LOG_CATEGORY_NAME_MONODROID { "monodroid" }; + static constexpr std::string_view LOG_CATEGORY_NAME_MONODROID_ASSEMBLY { "monodroid-assembly" }; + static constexpr std::string_view LOG_CATEGORY_NAME_MONODROID_DEBUG { "monodroid-debug" }; + static constexpr std::string_view LOG_CATEGORY_NAME_MONODROID_GC { "monodroid-gc" }; + static constexpr std::string_view LOG_CATEGORY_NAME_MONODROID_GREF { "monodroid-gref" }; + static constexpr std::string_view LOG_CATEGORY_NAME_MONODROID_LREF { "monodroid-lref" }; + static constexpr std::string_view LOG_CATEGORY_NAME_MONODROID_TIMING { "monodroid-timing" }; + static constexpr std::string_view LOG_CATEGORY_NAME_MONODROID_BUNDLE { "monodroid-bundle" }; + static constexpr std::string_view LOG_CATEGORY_NAME_MONODROID_NETWORK { "monodroid-network" }; + static constexpr std::string_view LOG_CATEGORY_NAME_MONODROID_NETLINK { "monodroid-netlink" }; + static constexpr std::string_view LOG_CATEGORY_NAME_ERROR { "*error*" }; + +#if defined(__arm__) + static constexpr std::string_view android_abi { "armeabi_v7a" }; + static constexpr std::string_view android_lib_abi { "armeabi-v7a" }; + static constexpr std::string_view runtime_identifier { "android-arm" }; +#elif defined(__aarch64__) + static constexpr std::string_view android_abi { "arm64_v8a" }; + static constexpr std::string_view android_lib_abi { "arm64-v8a" }; + static constexpr std::string_view runtime_identifier { "android-arm64" }; +#elif defined(__x86_64__) + static constexpr std::string_view android_abi { "x86_64" }; + static constexpr std::string_view android_lib_abi { "x86_64" }; + static constexpr std::string_view runtime_identifier { "android-x64" }; +#elif defined(__i386__) + static constexpr std::string_view android_abi { "x86" }; + static constexpr std::string_view android_lib_abi { "x86" }; + static constexpr std::string_view runtime_identifier { "android-x86" }; +#endif + + static constexpr std::string_view split_config_prefix { "/split_config." }; + static constexpr std::string_view split_config_extension { ".apk" }; + + private: + static constexpr size_t split_config_abi_apk_name_size = calc_size (split_config_prefix, android_abi, split_config_extension); + + public: + static constexpr auto split_config_abi_apk_name = concat_string_views (split_config_prefix, android_abi, split_config_extension); + + // + // Indexes must match these of trhe `appDirs` array in src/java-runtime/mono/android/MonoPackageManager.java + // + static constexpr size_t APP_DIRS_FILES_DIR_INDEX = 0uz; + static constexpr size_t APP_DIRS_CACHE_DIR_INDEX = 1uz; + static constexpr size_t APP_DIRS_DATA_DIR_INDEX = 2uz; + + static inline constexpr size_t PROPERTY_VALUE_BUFFER_LEN = PROP_VALUE_MAX + 1uz; + + // 64-bit unsigned or 64-bit signed with sign + static constexpr size_t MAX_INTEGER_DIGIT_COUNT_BASE10 = 21uz; + static constexpr size_t INTEGER_BASE10_BUFFER_SIZE = MAX_INTEGER_DIGIT_COUNT_BASE10 + 1uz; + + // Documented in NDK's comments + static constexpr size_t MAX_LOGCAT_MESSAGE_LENGTH = 1023uz; + + // PATH_MAX is always 4096 on Linux, but for our purposes it's most likely too much and since + // we use this value to allocate stack variables mostly, let's downsize it a bit to what the + // _XOPEN_PATH_MAX is set to + static constexpr size_t SENSIBLE_PATH_MAX = 1024uz; + + static constexpr int DEFAULT_DIRECTORY_MODE = S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH; + +#if defined (DEBUG) + static constexpr std::string_view OVERRIDE_ENVIRONMENT_FILE_NAME { "environment" }; + static constexpr uint32_t OVERRIDE_ENVIRONMENT_FILE_HEADER_SIZE = 22; +#endif + + static constexpr std::string_view MONO_ANDROID_ASSEMBLY_NAME { "Mono.Android" }; + static constexpr std::string_view ANDROID_RUNTIME_NS_NAME { "Android.Runtime" }; + static constexpr std::string_view JNIENVINIT_CLASS_NAME { "JNIEnvInit" }; + static constexpr std::string_view JNIENV_CLASS_NAME { "JNIEnv" }; + + private: + static constexpr size_t JNIENVINIT_FULL_TYPE_NAME_SIZE = calc_size (ANDROID_RUNTIME_NS_NAME, "."sv, JNIENVINIT_CLASS_NAME); + static constexpr auto JNIENVINIT_FULL_TYPE_NAME_ARRAY = concat_string_views (ANDROID_RUNTIME_NS_NAME, "."sv, JNIENVINIT_CLASS_NAME); + + public: + static constexpr std::string_view JNIENVINIT_FULL_TYPE_NAME { JNIENVINIT_FULL_TYPE_NAME_ARRAY.data () }; + + static constexpr std::string_view ANDROID_ENVIRONMENT_CLASS_NAME { "AndroidEnvironment" }; + static constexpr std::string_view ANDROID_RUNTIME_INTERNAL_CLASS_NAME { "AndroidRuntimeInternal" }; + }; +} diff --git a/src/native/clr/include/runtime-base/android-system.hh b/src/native/clr/include/runtime-base/android-system.hh new file mode 100644 index 00000000000..24324da2353 --- /dev/null +++ b/src/native/clr/include/runtime-base/android-system.hh @@ -0,0 +1,149 @@ +#pragma once + +#include +#include +#include +#include +#include + +#include "../constants.hh" +#include "../shared/log_types.hh" +#include "../runtime-base/cpu-arch.hh" +#include +#include +#include "util.hh" + +struct BundledProperty; + +namespace xamarin::android { + class AndroidSystem + { + // This optimizes things a little bit. The array is allocated at build time, so we pay no cost for its + // allocation and at run time it allows us to skip dynamic memory allocation. + inline static std::array single_app_lib_directory{}; + inline static std::span app_lib_directories; + + // TODO: override dirs not implemented + inline static std::array override_dirs{}; + + static constexpr std::array android_abi_names { + std::string_view { "unknown" }, // CPU_KIND_UNKNOWN + std::string_view { "armeabi-v7a" }, // CPU_KIND_ARM + std::string_view { "arm64-v8a" }, // CPU_KIND_ARM64 + std::string_view { "mips" }, // CPU_KIND_MIPS + std::string_view { "x86" }, // CPU_KIND_X86 + std::string_view { "x86_64" }, // CPU_KIND_X86_64 + std::string_view { "riscv" }, // CPU_KIND_RISCV + }; + + public: + static auto get_gref_gc_threshold () noexcept -> long + { + if (max_gref_count == std::numeric_limits::max ()) { + return max_gref_count; + } + return static_cast ((max_gref_count * 90LL) / 100LL); + } + + static auto get_max_gref_count () noexcept -> long + { + return max_gref_count; + } + + static void init_max_gref_count () noexcept + { + max_gref_count = get_max_gref_count_from_system (); + } + + static void set_running_in_emulator (bool yesno) noexcept + { + running_in_emulator = yesno; + } + + static auto get_primary_override_dir () noexcept -> std::string const& + { + return primary_override_dir; + } + + static void set_primary_override_dir (jstring_wrapper& home) noexcept + { + primary_override_dir = determine_primary_override_dir (home); + } + + static void create_update_dir (std::string const& override_dir) noexcept + { + if constexpr (Constants::is_release_build) { + /* + * Don't create .__override__ on Release builds, because Google requires + * that pre-loaded apps not create world-writable directories. + * + * However, if any logging is enabled (which should _not_ happen with + * pre-loaded apps!), we need the .__override__ directory... + */ + dynamic_local_string value; + if (log_categories == 0 && monodroid_get_system_property (Constants::DEBUG_MONO_PROFILE_PROPERTY, value) == 0) [[likely]] { + return; + } + } + + Util::create_public_directory (override_dir); + log_warn (LOG_DEFAULT, "Creating public update directory: `{}`", override_dir); + } + + static auto is_embedded_dso_mode_enabled () noexcept -> bool + { + return embedded_dso_mode_enabled; + } + + static auto monodroid_get_system_property (std::string_view const& name, dynamic_local_string &value) noexcept -> int; + static void detect_embedded_dso_mode (jstring_array_wrapper& appDirs) noexcept; + static void setup_environment () noexcept; + static void setup_app_library_directories (jstring_array_wrapper& runtimeApks, jstring_array_wrapper& appDirs, bool have_split_apks) noexcept; + static auto load_dso (const char *path, unsigned int dl_flags, bool skip_exists_check) noexcept -> void*; + static auto load_dso_from_any_directories (const char *name, unsigned int dl_flags) noexcept -> void*; + + private: + static auto get_full_dso_path (std::string const& base_dir, const char *dso_path, dynamic_local_string& path) noexcept -> bool; + + template // TODO: replace with a concept + static auto load_dso_from_specified_dirs (TContainer directories, const char *dso_name, unsigned int dl_flags) noexcept -> void*; + static auto load_dso_from_app_lib_dirs (const char *name, unsigned int dl_flags) noexcept -> void*; + static auto load_dso_from_override_dirs (const char *name, unsigned int dl_flags) noexcept -> void*; + static auto lookup_system_property (std::string_view const &name, size_t &value_len) noexcept -> const char*; + static auto monodroid__system_property_get (std::string_view const&, char *sp_value, size_t sp_value_len) noexcept -> int; + static auto get_max_gref_count_from_system () noexcept -> long; + static void add_apk_libdir (std::string_view const& apk, size_t &index, std::string_view const& abi) noexcept; + static void setup_apk_directories (unsigned short running_on_cpu, jstring_array_wrapper &runtimeApks, bool have_split_apks) noexcept; +#if defined(DEBUG) + static void add_system_property (const char *name, const char *value) noexcept; + static void setup_environment (const char *name, const char *value) noexcept; + static void setup_environment_from_override_file (dynamic_local_string const& path) noexcept; +#endif + + static void set_embedded_dso_mode_enabled (bool yesno) noexcept + { + embedded_dso_mode_enabled = yesno; + } + + static auto determine_primary_override_dir (jstring_wrapper &home) noexcept -> std::string + { + dynamic_local_string name { home.get_cstr () }; + name.append ("/") + .append (Constants::OVERRIDE_DIRECTORY_NAME) + .append ("/") + .append (Constants::android_lib_abi); + + return {name.get (), name.length ()}; + } + + private: + static inline long max_gref_count = 0; + static inline bool running_in_emulator = false; + static inline bool embedded_dso_mode_enabled = false; + static inline std::string primary_override_dir; + +#if defined (DEBUG) + static inline std::unordered_map bundled_properties; +#endif + }; +} diff --git a/src/native/clr/include/runtime-base/cpu-arch.hh b/src/native/clr/include/runtime-base/cpu-arch.hh new file mode 100644 index 00000000000..2303c6d880a --- /dev/null +++ b/src/native/clr/include/runtime-base/cpu-arch.hh @@ -0,0 +1,13 @@ +#pragma once + +#include + +static inline constexpr uint16_t CPU_KIND_UNKNOWN = 0; +static inline constexpr uint16_t CPU_KIND_ARM = 1; +static inline constexpr uint16_t CPU_KIND_ARM64 = 2; +static inline constexpr uint16_t CPU_KIND_MIPS = 3; +static inline constexpr uint16_t CPU_KIND_X86 = 4; +static inline constexpr uint16_t CPU_KIND_X86_64 = 5; +static inline constexpr uint16_t CPU_KIND_RISCV = 6; + +void _monodroid_detect_cpu_and_architecture (uint16_t &built_for_cpu, uint16_t &running_on_cpu, bool &is64bit); diff --git a/src/native/clr/include/runtime-base/logger.hh b/src/native/clr/include/runtime-base/logger.hh new file mode 100644 index 00000000000..f9285456bc6 --- /dev/null +++ b/src/native/clr/include/runtime-base/logger.hh @@ -0,0 +1,63 @@ +#pragma once + +#include + +#include + +#include +#include + +namespace xamarin::android { + class Logger + { + public: + static void init_logging_categories () noexcept; + static void init_reference_logging (std::string_view const& override_dir) noexcept; + + static auto log_timing_categories () noexcept -> LogTimingCategories + { + return _log_timing_categories; + } + + static void set_gc_spew_enabled (bool yesno) noexcept + { + _gc_spew_enabled = yesno; + } + + static auto gc_spew_enabled () noexcept -> bool + { + return _gc_spew_enabled; + } + + static auto gref_log () -> FILE* + { + return _gref_log; + } + + static auto lref_log () -> FILE* + { + return _lref_log; + } + + static auto gref_to_logcat () -> bool + { + return _gref_to_logcat; + } + + static auto lref_to_logcat () -> bool + { + return _lref_to_logcat; + } + + private: + static bool set_category (std::string_view const& name, string_segment& arg, unsigned int entry, bool arg_starts_with_name = false) noexcept; + + private: + static inline LogTimingCategories _log_timing_categories; + static inline bool _gc_spew_enabled = false; + static inline FILE *_gref_log = nullptr; + static inline FILE *_lref_log = nullptr; + static inline bool _gref_to_logcat = false; + static inline bool _lref_to_logcat = false; + }; +} diff --git a/src/native/clr/include/runtime-base/monodroid-dl.hh b/src/native/clr/include/runtime-base/monodroid-dl.hh new file mode 100644 index 00000000000..c35a89052a4 --- /dev/null +++ b/src/native/clr/include/runtime-base/monodroid-dl.hh @@ -0,0 +1,210 @@ +#pragma once + +#include + +#include +#include + +#include + +#include +#include "../xamarin-app.hh" + +#include "android-system.hh" +#include +#include "startup-aware-lock.hh" + +namespace xamarin::android +{ + class MonodroidDl + { + enum class CacheKind + { + // Access AOT cache + AOT, + + // Access DSO cache + DSO, + }; + + static inline std::mutex dso_handle_write_lock; + + template + [[gnu::always_inline, gnu::flatten]] + static auto find_dso_cache_entry_common (hash_t hash) noexcept -> DSOCacheEntry* + { + static_assert (WhichCache == CacheKind::AOT || WhichCache == CacheKind::DSO, "Unknown cache type specified"); + + DSOCacheEntry *arr; + size_t arr_size; + + if constexpr (WhichCache == CacheKind::AOT) { + log_debug (LOG_ASSEMBLY, "Looking for hash {:x} in AOT cache", hash); + arr = aot_dso_cache; + arr_size = application_config.number_of_aot_cache_entries; + } else if constexpr (WhichCache == CacheKind::DSO) { + log_debug (LOG_ASSEMBLY, "Looking for hash {:x} in DSO cache", hash); + arr = dso_cache; + arr_size = application_config.number_of_dso_cache_entries; + } + + auto equal = [](DSOCacheEntry const& entry, hash_t key) -> bool { return entry.hash == key; }; + auto less_than = [](DSOCacheEntry const& entry, hash_t key) -> bool { return entry.hash < key; }; + ssize_t idx = Search::binary_search (hash, arr, arr_size); + + if (idx >= 0) { + return &arr[idx]; + } + + return nullptr; + } + + [[gnu::always_inline, gnu::flatten]] + static auto find_only_aot_cache_entry (hash_t hash) noexcept -> DSOCacheEntry* + { + return find_dso_cache_entry_common (hash); + } + + [[gnu::always_inline, gnu::flatten]] + static auto find_only_dso_cache_entry (hash_t hash) noexcept -> DSOCacheEntry* + { + return find_dso_cache_entry_common (hash); + } + + static auto monodroid_dlopen_log_and_return (void *handle, const char *full_name) -> void* + { + if (handle == nullptr) { + const char *load_error = dlerror (); + if (load_error == nullptr) { + load_error = "Unknown error"; + } + log_error ( + LOG_ASSEMBLY, + "Could not load library '{}'. {}", + full_name, + load_error + ); + } + + return handle; + } + + static auto monodroid_dlopen_ignore_component_or_load (const char *name, int flags) noexcept -> void* + { + unsigned int dl_flags = static_cast(flags); + void * handle = AndroidSystem::load_dso_from_any_directories (name, dl_flags); + if (handle != nullptr) { + return monodroid_dlopen_log_and_return (handle, name); + } + + handle = AndroidSystem::load_dso (name, dl_flags, false /* skip_existing_check */); + return monodroid_dlopen_log_and_return (handle, name); + } + + public: + [[gnu::flatten]] + static auto monodroid_dlopen (const char *name, int flags, bool prefer_aot_cache) noexcept -> void* + { + if (name == nullptr) { + log_warn (LOG_ASSEMBLY, "monodroid_dlopen got a null name. This is not supported in NET+"sv); + return nullptr; + } + + hash_t name_hash = xxhash::hash (name, strlen (name)); + log_debug (LOG_ASSEMBLY, "monodroid_dlopen: hash for name '{}' is {:x}", name, name_hash); + + DSOCacheEntry *dso = nullptr; + if (prefer_aot_cache) { + // If we're asked to look in the AOT DSO cache, do it first. This is because we're likely called from the + // MonoVM's dlopen fallback handler and it will not be a request to resolved a p/invoke, but most likely to + // find and load an AOT image for a managed assembly. Since there might be naming/hash conflicts in this + // scenario, we look at the AOT cache first. + // + // See: https://github.com/dotnet/android/issues/9081 + dso = find_only_aot_cache_entry (name_hash); + } + + if (dso == nullptr) { + dso = find_only_dso_cache_entry (name_hash); + } + + log_debug (LOG_ASSEMBLY, "monodroid_dlopen: hash match {}found, DSO name is '{}'", dso == nullptr ? "not "sv : ""sv, dso == nullptr ? ""sv : dso->name); + + if (dso == nullptr) { + // DSO not known at build time, try to load it + return monodroid_dlopen_ignore_component_or_load (name, flags); + } else if (dso->handle != nullptr) { + return monodroid_dlopen_log_and_return (dso->handle, dso->name); + } + + if (dso->ignore) { + log_info (LOG_ASSEMBLY, "Request to load '{}' ignored, it is known not to exist", dso->name); + return nullptr; + } + + StartupAwareLock lock (dso_handle_write_lock); +#if defined (RELEASE) + if (AndroidSystem::is_embedded_dso_mode_enabled ()) { + DSOApkEntry *apk_entry = dso_apk_entries; + for (size_t i = 0uz; i < application_config.number_of_shared_libraries; i++) { + if (apk_entry->name_hash != dso->real_name_hash) { + apk_entry++; + continue; + } + + android_dlextinfo dli; + dli.flags = ANDROID_DLEXT_USE_LIBRARY_FD | ANDROID_DLEXT_USE_LIBRARY_FD_OFFSET; + dli.library_fd = apk_entry->fd; + dli.library_fd_offset = apk_entry->offset; + dso->handle = android_dlopen_ext (dso->name, flags, &dli); + + if (dso->handle != nullptr) { + return monodroid_dlopen_log_and_return (dso->handle, dso->name); + } + break; + } + } +#endif + unsigned int dl_flags = static_cast(flags); + dso->handle = AndroidSystem::load_dso_from_any_directories (dso->name, dl_flags); + + if (dso->handle != nullptr) { + return monodroid_dlopen_log_and_return (dso->handle, dso->name); + } + + dso->handle = AndroidSystem::load_dso_from_any_directories (name, dl_flags); + return monodroid_dlopen_log_and_return (dso->handle, name); + } + + [[gnu::flatten]] + static auto monodroid_dlopen (const char *name, int flags) noexcept -> void* + { + // We're called by MonoVM via a callback, we might need to return an AOT DSO. + // See: https://github.com/dotnet/android/issues/9081 + constexpr bool PREFER_AOT_CACHE = true; + return monodroid_dlopen (name, flags, PREFER_AOT_CACHE); + } + + [[gnu::flatten]] + static auto monodroid_dlsym (void *handle, const char *name) -> void* + { + char *e = nullptr; + void *s = microsoft::java_interop::java_interop_lib_symbol (handle, name, &e); + + if (s == nullptr) { + log_error ( + LOG_ASSEMBLY, + "Could not find symbol '{}': {}", + optional_string (name), + optional_string (e) + ); + } + + if (e != nullptr) { + java_interop_free (e); + } + + return s; + } + }; +} diff --git a/src/native/clr/include/runtime-base/monodroid-state.hh b/src/native/clr/include/runtime-base/monodroid-state.hh new file mode 100644 index 00000000000..283040d4992 --- /dev/null +++ b/src/native/clr/include/runtime-base/monodroid-state.hh @@ -0,0 +1,21 @@ +#pragma once + +namespace xamarin::android +{ + class MonodroidState + { + public: + static auto is_startup_in_progress () noexcept -> bool + { + return startup_in_progress; + } + + static void mark_startup_done () noexcept + { + startup_in_progress = false; + } + + private: + inline static bool startup_in_progress = true; + }; +} diff --git a/src/native/clr/include/runtime-base/startup-aware-lock.hh b/src/native/clr/include/runtime-base/startup-aware-lock.hh new file mode 100644 index 00000000000..8b869151b61 --- /dev/null +++ b/src/native/clr/include/runtime-base/startup-aware-lock.hh @@ -0,0 +1,40 @@ +#pragma once + +#include + +#include "monodroid-state.hh" + +namespace xamarin::android +{ + class StartupAwareLock final + { + public: + explicit StartupAwareLock (std::mutex &m) + : lock (m) + { + if (MonodroidState::is_startup_in_progress ()) { + // During startup we run without threads, do nothing + return; + } + + lock.lock (); + } + + ~StartupAwareLock () + { + if (MonodroidState::is_startup_in_progress ()) { + return; + } + + lock.unlock (); + } + + StartupAwareLock (StartupAwareLock const&) = delete; + StartupAwareLock (StartupAwareLock const&&) = delete; + + StartupAwareLock& operator= (StartupAwareLock const&) = delete; + + private: + std::mutex& lock; + }; +} diff --git a/src/native/clr/include/runtime-base/timing-internal.hh b/src/native/clr/include/runtime-base/timing-internal.hh new file mode 100644 index 00000000000..6897c34df1d --- /dev/null +++ b/src/native/clr/include/runtime-base/timing-internal.hh @@ -0,0 +1,466 @@ +#pragma once + +#include +#include +#include +#include +#include +#include + +#include +#include +#include "startup-aware-lock.hh" +#include +#include "util.hh" +#include "../constants.hh" +#include "monodroid-state.hh" + +namespace xamarin::android { + // bionic should use `time_t` in the timespec struct, but it uses `long` instead + using time_type = long; + + // Events should never change their assigned values and no values should be reused. + // Values are used by the test runner to determine what measurement was taken. + // + // At the same time, the list should be kept sorted alphabetically for easier reading - + // values therefore might be out of order, but always unique. + enum class TimingEventKind + { + AssemblyDecompression = 0, + AssemblyLoad = 1, + AssemblyPreload = 2, + DebugStart = 3, + Init = 4, + JavaToManaged = 5, + ManagedToJava = 6, + MonoRuntimeInit = 7, + NativeToManagedTransition = 8, + RuntimeConfigBlob = 9, + RuntimeRegister = 10, + TotalRuntimeInit = 11, + Unspecified = 12, + }; + + struct TimingEventPoint + { + time_t sec; + uint64_t ns; + }; + + struct TimingInterval + { + time_t sec; + uint32_t ms; + uint32_t ns; + }; + + struct TimingEvent + { + bool before_managed; + TimingEventPoint start; + TimingEventPoint end; + TimingEventKind kind; + std::unique_ptr more_info; + }; + + template + concept TimingPointType = requires (T a) { + { a.sec } -> std::same_as; + { a.ns } -> std::same_as; + }; + + template + concept TimingIntervalType = requires (T a) { + { a.sec } -> std::same_as; + { a.ms } -> std::same_as; + { a.ns } -> std::same_as; + }; + + class FastTiming final + { + // Number of TimingEvent entries in the event vector allocated at the + // time of class instantiation. It's an arbitrary value, but it should + // be large enough to not require any dynamic reallocation of memory at + // the run time. + static constexpr size_t INITIAL_EVENT_VECTOR_SIZE = 4096uz; + static constexpr uint32_t ns_in_millisecond = 1000000u; + static constexpr uint32_t ms_in_second = 1000u; + static constexpr uint32_t ns_in_second = ms_in_second * ns_in_millisecond; + + protected: + FastTiming () noexcept + { + events.reserve (INITIAL_EVENT_VECTOR_SIZE); + } + + public: + [[gnu::always_inline]] + static auto enabled () noexcept -> bool + { + return is_enabled; + } + + [[gnu::always_inline]] + static auto is_bare_mode () noexcept -> bool + { + return + (Logger::log_timing_categories() & LogTimingCategories::Bare) == LogTimingCategories::Bare || + (Logger::log_timing_categories() & LogTimingCategories::FastBare) == LogTimingCategories::FastBare; + } + + [[gnu::always_inline]] + static void initialize (bool log_immediately) noexcept + { + if (!Util::should_log (LOG_TIMING)) [[likely]] { + return; + } + + mark (init_time.start); + really_initialize (log_immediately); + mark (init_time.end); + + init_time.before_managed = true; + init_time.kind = TimingEventKind::Init; + + if (!immediate_logging) { + return; + } + + log (init_time, false /* skip_log_if_more_info_missing */); + } + + // std::vector isn't used in a conventional manner here. We treat it as if it was a standard array and we + // don't take advantage of any emplacement functionality, merely using vector's ability to resize itself when + // needed. The reason for this is speed - we can atomically increase index into the array and relatively + // quickly check whether it's within the boundaries. We can then safely use thus indexed element without + // worrying about concurrency. Emplacing a new element in the vector would require holding the mutex, something + // that's fairly costly and has unpredictable effect on time spent acquiring and holding the lock (the OS can + // preempt us at this point) + [[gnu::always_inline]] + auto start_event (TimingEventKind kind = TimingEventKind::Unspecified) noexcept -> size_t + { + size_t index = next_event_index.fetch_add (1); + + if (index >= events.capacity ()) [[unlikely]] { + StartupAwareLock lock (event_vector_realloc_mutex); + if (index >= events.size ()) { // don't increase unnecessarily, if another thread has already done that + // Double the vector size. We should, in theory, check for integer overflow here, but it's more + // likely we'll run out of memory way, way, way before that happens + size_t old_size = events.capacity (); + events.reserve (old_size << 1); + log_warn (LOG_TIMING, "Reallocated timing event buffer from {} to {}", old_size, events.size ()); + } + } + + TimingEvent &ev = events[index]; + mark (ev.start); + ev.kind = kind; + ev.before_managed = MonodroidState::is_startup_in_progress (); + ev.more_info = nullptr; + + return index; + } + + [[gnu::always_inline]] + void end_event (size_t event_index, bool uses_more_info = false) noexcept + { + if (!is_valid_event_index (event_index, __PRETTY_FUNCTION__)) [[unlikely]] { + return; + } + + mark (events[event_index].end); + log (events[event_index], uses_more_info /* skip_log_if_more_info_missing */); + } + + template + [[gnu::always_inline]] + void add_more_info (size_t event_index, string_base const& str) noexcept + { + if (!is_valid_event_index (event_index, __PRETTY_FUNCTION__)) [[unlikely]] { + return; + } + + events[event_index].more_info = std::make_unique (str.get (), str.length ()); + log (events[event_index], false /* skip_log_if_more_info_missing */); + } + + [[gnu::always_inline]] + void add_more_info (size_t event_index, const char* str) noexcept + { + if (!is_valid_event_index (event_index, __PRETTY_FUNCTION__)) [[unlikely]] { + return; + } + + events[event_index].more_info = std::make_unique (str); + log (events[event_index], false /* skip_log_if_more_info_missing */); + } + + [[gnu::always_inline]] + static void get_time (time_t &seconds_out, uint64_t& ns_out) noexcept + { + int ret; + timespec tv_ctm; + + ret = clock_gettime (CLOCK_MONOTONIC, &tv_ctm); + ns_out = ret == 0 ? static_cast(tv_ctm.tv_nsec) : 0; + seconds_out = ret == 0 ? tv_ctm.tv_sec : 0; + } + + template [[gnu::always_inline]] + static void calculate_interval (P const& start, P const& end, I &result) noexcept + { + uint64_t nsec; + if (end.ns < start.ns) { + result.sec = end.sec - start.sec - 1; + if (result.sec < 0) { + result.sec = 0; + } + nsec = 1000000000ULL + end.ns - start.ns; + } else { + result.sec = end.sec - start.sec; + nsec = end.ns - start.ns; + } + + result.ms = static_cast(nsec / ns_in_millisecond); + if (result.ms >= ms_in_second) { + result.sec += result.ms / ms_in_second; + result.ms = result.ms % ms_in_second; + } + + result.ns = static_cast(nsec % ns_in_millisecond); + } + + template [[gnu::always_inline]] + static void calculate_interval (P const& start, P const& end, I &result, uint64_t& total_ns) noexcept + { + calculate_interval (start, end, result); + total_ns = + (static_cast(result.sec) * static_cast(ns_in_second)) + + (static_cast(result.ms) * static_cast(ns_in_millisecond)) + + static_cast(result.ns); + } + + void dump () noexcept; + + private: + static void really_initialize (bool log_immediately) noexcept; + static void* timing_signal_thread (void *arg) noexcept; + + [[gnu::always_inline]] + static void mark (TimingEventPoint &point) noexcept + { + get_time (point.sec, point.ns); + } + + [[gnu::always_inline]] + auto is_valid_event_index (size_t index, const char *method_name) noexcept -> bool + { + if (index >= events.capacity ()) [[unlikely]] { + log_warn (LOG_TIMING, "Invalid event index passed to method '{}'", method_name); + return false; + } + + return true; + } + + template [[gnu::always_inline]] + static void append_event_kind_description (TimingEventKind kind, dynamic_local_string& message) noexcept + { + switch (kind) { + case TimingEventKind::AssemblyDecompression: { + constexpr char desc[] = "LZ4 decompression time for "; + message.append (desc); + return; + } + + case TimingEventKind::AssemblyLoad: { + constexpr char desc[] = "Assembly load"; + message.append (desc); + return; + } + + case TimingEventKind::AssemblyPreload: { + constexpr char desc[] = "Finished preloading, number of loaded assemblies: "; + message.append (desc); + return; + } + + case TimingEventKind::DebugStart: { + constexpr char desc[] = "Debug::start_debugging_and_profiling: end"; + message.append (desc); + return; + } + + case TimingEventKind::Init: { + constexpr char desc[] = "XATiming: init time"; + message.append (desc); + return; + } + + case TimingEventKind::JavaToManaged: { + constexpr char desc[] = "Typemap.java_to_managed: end, total time"; + message.append (desc); + return; + } + + case TimingEventKind::ManagedToJava: { + constexpr char desc[] = "Typemap.managed_to_java: end, total time"; + message.append (desc); + return; + } + + case TimingEventKind::MonoRuntimeInit: { + constexpr char desc[] = "Runtime.init: Mono runtime init"; + message.append (desc); + return; + } + + case TimingEventKind::NativeToManagedTransition: { + constexpr char desc[] = "Runtime.init: end native-to-managed transition"; + message.append (desc); + return; + } + + case TimingEventKind::RuntimeConfigBlob: { + constexpr char desc[] = "Register runtimeconfig binary blob"; + message.append (desc); + return; + } + + case TimingEventKind::RuntimeRegister: { + constexpr char desc[] = "Runtime.register: end time. Registered type: "; + message.append (desc); + return; + } + + case TimingEventKind::TotalRuntimeInit: { + constexpr char desc[] = "Runtime.init: end, total time"; + message.append (desc); + return; + } + + default: { + constexpr char desc[] = "Unknown timing event"; + message.append (desc); + return; + } + } + } + + // + // Message format is as follows: [STAGE/EVENT] ; elapsed s:ms::ns + // + // STAGE is one of: + // 0 - native init (before managed code runs) + // 1 - managed code enabled + // 2 - events summary (see the `dump()` function) + // + // EVENT is one of: + // for stages 0 and 1, it's the value of the TimingEventKind member + // for stage 2 see the `dump()` function + // + // The [STAGE/EVENT] format is meant to help the test runner application, so that it can parse logcat without + // having to be kept in sync with the actual wording used for the event message. + // + template [[gnu::always_inline]] + static void format_and_log (TimingEvent const& event, TimingInterval const& interval, dynamic_local_string& message, bool indent = false) noexcept + { + constexpr char INDENT[] = " "; + constexpr char NATIVE_INIT_TAG[] = "[0/"; + constexpr char MANAGED_TAG[] = "[1/"; + + message.clear (); + if (indent) { + message.append (INDENT); + } + + if (event.before_managed) { + message.append (NATIVE_INIT_TAG); + } else { + message.append (MANAGED_TAG); + } + + message.append (static_cast(event.kind)); + message.append ("] "); + + append_event_kind_description (event.kind, message); + if (event.more_info && !event.more_info->empty ()) { + message.append (event.more_info->c_str (), event.more_info->length ()); + } + + constexpr char COLON[] = ":"; + constexpr char TWO_COLONS[] = "::"; + + message.append ("; elapsed: "); + message.append (static_cast(interval.sec)); + message.append (COLON); + message.append (interval.ms); + message.append (TWO_COLONS); + message.append (interval.ns); + + log_write (LOG_TIMING, LogLevel::Info, message.get ()); + } + + template [[gnu::always_inline]] + static void format_and_log (TimingEvent const& event, dynamic_local_string& message, uint64_t& total_ns, bool indent = false) noexcept + { + TimingInterval interval; + calculate_interval (event.start, event.end, interval, total_ns); + format_and_log (event, interval, message, indent); + } + + [[gnu::always_inline]] + static void format_and_log (TimingEvent const& event) noexcept + { + TimingInterval interval; + calculate_interval (event.start, event.end, interval); + + // `message` isn't used here, it is passed to `format_and_log` so that the `dump()` function can + // be slightly more efficient when dumping the event buffer. + dynamic_local_string message; + format_and_log (event, interval, message); + } + + [[gnu::always_inline]] + static void log (TimingEvent const& event, bool skip_log_if_more_info_missing) noexcept + { + if (!immediate_logging) { + return; + } + + if (skip_log_if_more_info_missing && (!event.more_info || event.more_info->empty ())) { + return; + } + + format_and_log (event); + } + + [[gnu::always_inline]] + static void ns_to_time (uint64_t total_ns, uint32_t &sec, uint32_t &ms, uint32_t &ns) noexcept + { + sec = static_cast(total_ns / ns_in_second); + if (sec > 0) { + total_ns = total_ns % 1000000000ULL; + } + + ms = static_cast(total_ns / ns_in_millisecond); + if (ms >= 1000) { + sec += ms / 1000; + ms = ms % 1000; + } + + ns = static_cast(total_ns % ns_in_millisecond); + } + + private: + std::atomic_size_t next_event_index = 0uz; + std::mutex event_vector_realloc_mutex; + std::vector events; + + static inline TimingEvent init_time{}; + static inline bool is_enabled = false; + static inline bool immediate_logging = false; + }; + + extern FastTiming *internal_timing; +} diff --git a/src/native/clr/include/runtime-base/timing.hh b/src/native/clr/include/runtime-base/timing.hh new file mode 100644 index 00000000000..9baf105c4b1 --- /dev/null +++ b/src/native/clr/include/runtime-base/timing.hh @@ -0,0 +1,149 @@ +#pragma once + +#include +#include +#include +#include +#include +#include +#include + +#include + +#include "logger.hh" + +namespace xamarin::android +{ + struct timing_point + { + time_t sec = 0; + uint64_t ns = 0; + + void mark (); + + void reset () + { + sec = 0; + ns = 0; + } + }; + + struct timing_period + { + timing_point start; + timing_point end; + + void mark_start () + { + start.mark (); + } + + void mark_end () + { + end.mark (); + } + + void reset () + { + start.reset (); + end.reset (); + } + }; + + struct timing_diff + { + static constexpr uint32_t ms_in_nsec = 1000000ULL; + + time_t sec; + uint32_t ms; + uint32_t ns; + + timing_diff (const timing_period &period); + }; + + struct managed_timing_sequence + { + timing_period period; + bool in_use; + bool dynamic; + }; + + // This class is intended to be used by the managed code. It can be used by the native code as + // well, but the overhead it has (out of necessity) might not be desirable in native code. + class Timing + { + static inline constexpr std::string_view MESSAGE_FORMAT { "{}; elapsed: {}:{}::{}" }; + + public: + static constexpr size_t DEFAULT_POOL_SIZE = 16uz; + + public: + explicit Timing (size_t initial_pool_size = DEFAULT_POOL_SIZE) noexcept + : sequence_pool_size (initial_pool_size) + { + sequence_pool = new managed_timing_sequence [initial_pool_size] (); + } + + ~Timing () noexcept + { + delete[] sequence_pool; + } + + static void info (timing_period const &period, const char *message) noexcept + { + timing_diff diff (period); + + log_info_nocheck (LOG_TIMING, MESSAGE_FORMAT.data (), message == nullptr ? ""sv : message, diff.sec, diff.ms, diff.ns); + } + + static void warn (timing_period const &period, const char *message) noexcept + { + timing_diff diff (period); + + log_warn (LOG_TIMING, MESSAGE_FORMAT.data (), message == nullptr ? ""sv : message, diff.sec, diff.ms, diff.ns); + } + + managed_timing_sequence* get_available_sequence () noexcept + { + std::lock_guard lock (sequence_lock); + + managed_timing_sequence *ret; + for (size_t i = 0uz; i < sequence_pool_size; i++) { + if (sequence_pool[i].in_use) { + continue; + } + + ret = &sequence_pool[i]; + ret->in_use = true; + ret->dynamic = false; + + return ret; + } + + ret = new managed_timing_sequence (); + ret->dynamic = true; + + return ret; + } + + void release_sequence (managed_timing_sequence *sequence) + { + if (sequence == nullptr) + return; + + std::lock_guard lock (sequence_lock); + if (sequence->dynamic) { + sequence->period.reset (); + delete sequence; + return; + } + + sequence->in_use = false; + } + + private: + managed_timing_sequence *sequence_pool; + size_t sequence_pool_size; + std::mutex sequence_lock; + }; +} diff --git a/src/native/clr/include/runtime-base/util.hh b/src/native/clr/include/runtime-base/util.hh new file mode 100644 index 00000000000..78100e05a71 --- /dev/null +++ b/src/native/clr/include/runtime-base/util.hh @@ -0,0 +1,226 @@ +#pragma once + +#include +#include +#include +#include + +#include +#include +#include +#include + +#include "../constants.hh" +#include +#include "archive-dso-stub-config.hh" +#include +#include "logger.hh" +#include + +namespace xamarin::android { + namespace detail { + template + concept PathComponentString = requires { + std::same_as, char*> || + std::same_as, std::string_view> || + std::same_as, std::string>; + }; + + template + concept PathBuffer = requires { + std::derived_from, dynamic_local_storage> || + std::derived_from, static_local_storage>; + }; + + struct mmap_info + { + void *area; + size_t size; + }; + } + + class Util + { + public: + static int create_directory (const char *pathname, mode_t mode); + static void create_public_directory (std::string_view const& dir); + static auto monodroid_fopen (std::string_view const& filename, std::string_view const& mode) noexcept -> FILE*; + static void set_world_accessable (std::string_view const& path); + + static auto should_log (LogCategories category) noexcept -> bool + { + return (log_categories & category) != 0; + } + + static auto file_exists (const char *file) noexcept -> bool + { + if (file == nullptr) { + return false; + } + + struct stat s; + if (::stat (file, &s) == 0 && (s.st_mode & S_IFMT) == S_IFREG) { + return true; + } + return false; + } + + template + static auto file_exists (dynamic_local_string const& file) noexcept -> bool + { + if (file.empty ()) { + return false; + } + + return file_exists (file.get ()); + } + + static void set_environment_variable (std::string_view const& name, jstring_wrapper& value) noexcept + { + ::setenv (name.data (), value.get_cstr (), 1); + } + + static void set_environment_variable_for_directory (std::string_view const& name, jstring_wrapper& value, bool createDirectory, mode_t mode) noexcept + { + if (createDirectory) { + int rv = create_directory (value.get_cstr (), mode); + if (rv < 0 && errno != EEXIST) { + log_warn (LOG_DEFAULT, "Failed to create directory '{}' for environment variable '{}'. {}", value.get_string_view (), name, strerror (errno)); + } + } + set_environment_variable (name, value); + } + + static void set_environment_variable_for_directory (const char *name, jstring_wrapper &value) noexcept + { + set_environment_variable_for_directory (name, value, true, Constants::DEFAULT_DIRECTORY_MODE); + } + + static int monodroid_getpagesize () noexcept + { + return page_size; + } + + static detail::mmap_info mmap_file (int fd, uint32_t offset, size_t size, std::string_view const& filename) noexcept + { + detail::mmap_info file_info; + detail::mmap_info mmap_info; + + size_t pageSize = static_cast(Util::monodroid_getpagesize ()); + size_t offsetFromPage = offset % pageSize; + size_t offsetPage = offset - offsetFromPage; + size_t offsetSize = size + offsetFromPage; + + mmap_info.area = mmap (nullptr, offsetSize, PROT_READ, MAP_PRIVATE, fd, static_cast(offsetPage)); + + if (mmap_info.area == MAP_FAILED) { + Helpers::abort_application ( + LOG_ASSEMBLY, + std::format ( + "Could not mmap APK fd {}: {}; File={}", + fd, + strerror (errno), + filename + ) + ); + } + + mmap_info.size = offsetSize; + file_info.area = pointer_add (mmap_info.area, offsetFromPage); + file_info.size = size; + + log_info ( + LOG_ASSEMBLY, + " mmap_start: {:<8p}; mmap_end: {:<8p} mmap_len: {:<12} file_start: {:<8p} file_end: {:<8p} file_len: {:<12} apk descriptor: {} file: {}", + mmap_info.area, + pointer_add (mmap_info.area, mmap_info.size), + mmap_info.size, + file_info.area, + pointer_add (file_info.area, file_info.size), + file_info.size, + fd, + filename + ); + + return file_info; + } + + [[gnu::always_inline]] + static std::tuple get_wrapper_dso_payload_pointer_and_size (detail::mmap_info const& map_info, std::string_view const& file_name) noexcept + { + using Elf_Header = std::conditional_t; + using Elf_SHeader = std::conditional_t; + + const void* const mapped_elf = map_info.area; + auto elf_bytes = static_cast(mapped_elf); + auto elf_header = reinterpret_cast(mapped_elf); + + if constexpr (Constants::is_debug_build) { + // In debug mode we might be dealing with plain data, without DSO wrapper + if (elf_header->e_ident[EI_MAG0] != ELFMAG0 || + elf_header->e_ident[EI_MAG1] != ELFMAG1 || + elf_header->e_ident[EI_MAG2] != ELFMAG2 || + elf_header->e_ident[EI_MAG3] != ELFMAG3) { + log_debug (LOG_ASSEMBLY, "Not an ELF image: {}", file_name); + // Not an ELF image, just return what we mmapped before + return { map_info.area, map_info.size }; + } + } + + auto section_header = reinterpret_cast(elf_bytes + elf_header->e_shoff); + Elf_SHeader const& payload_hdr = section_header[ArchiveDSOStubConfig::PayloadSectionIndex]; + + return { + const_cast(reinterpret_cast (elf_bytes + ArchiveDSOStubConfig::PayloadSectionOffset)), + payload_hdr.sh_size + }; + } + + static auto is_path_rooted (const char *path) noexcept -> bool + { + if (path == nullptr) { + return false; + } + + return path [0] == '/'; + } + + private: + // TODO: needs some work to accept mixed params of different accepted types + template TBuffer, detail::PathComponentString ...TPart> + static void path_combine_common (TBuffer& buf, TPart&&... parts) noexcept + { + buf.clear (); + + for (auto const& part : {parts...}) { + if (!buf.empty ()) { + buf.append ("/"sv); + } + + if constexpr (std::same_as, char*>) { + if (part != nullptr) { + buf.append_c (part); + } + } else { + buf.append (part); + } + } + } + + public: + template + static void path_combine (dynamic_local_string& buf, TParts&&... parts) noexcept + { + path_combine_common (buf, std::forward(parts)...); + } + + template + static void path_combine (static_local_string& buf, TParts&&... parts) noexcept + { + path_combine_common (buf, std::forward(parts)...); + } + + private: + static inline int page_size = getpagesize (); + }; +} diff --git a/src/native/clr/include/shared/log_types.hh b/src/native/clr/include/shared/log_types.hh new file mode 100644 index 00000000000..0821ef59077 --- /dev/null +++ b/src/native/clr/include/shared/log_types.hh @@ -0,0 +1,118 @@ +#pragma once + +#include +#include +#include +#include + +#include "java-interop-logger.h" +#include + +// We redeclare macros here +#if defined(log_debug) +#undef log_debug +#endif + +#if defined(log_info) +#undef log_info +#endif + +#define DO_LOG_FMT(_level, _category_, _fmt_, ...) \ + do { \ + if ((log_categories & ((_category_))) != 0) { \ + ::log_ ## _level ## _nocheck_fmt ((_category_), _fmt_ __VA_OPT__(,) __VA_ARGS__); \ + } \ + } while (0) + +// +// For std::format spec, see https://en.cppreference.com/w/cpp/utility/format/spec +// + +// NOTE: _fmt_ takes arguments in the std::format style not the POSIX printf style +#define log_debug(_category_, _fmt_, ...) DO_LOG_FMT (debug, (_category_), (_fmt_) __VA_OPT__(,) __VA_ARGS__) + +// NOTE: _fmt_ takes arguments in the std::format style not the POSIX printf style +#define log_info(_category_, _fmt_, ...) DO_LOG_FMT (info, (_category_), (_fmt_) __VA_OPT__(,) __VA_ARGS__) + +// NOTE: _fmt_ takes arguments in the std::format style not the POSIX printf style +#define log_warn(_category_, _fmt_, ...) log_warn_fmt ((_category_), (_fmt_) __VA_OPT__(,) __VA_ARGS__) + +// NOTE: _fmt_ takes arguments in the std::format style not the POSIX printf style +#define log_error(_category_, _fmt_, ...) log_error_fmt ((_category_), (_fmt_) __VA_OPT__(,) __VA_ARGS__) + +// NOTE: _fmt_ takes arguments in the std::format style not the POSIX printf style +#define log_fatal(_category_, _fmt_, ...) log_fatal_fmt ((_category_), (_fmt_) __VA_OPT__(,) __VA_ARGS__) + +namespace xamarin::android { + // A slightly faster alternative to other log functions as it doesn't parse the message + // for format placeholders nor it uses variable arguments + void log_write (LogCategories category, LogLevel level, const char *message) noexcept; + + [[gnu::always_inline]] + static inline void log_write (LogCategories category, LogLevel level, std::string_view const& message) noexcept + { + log_write (category, level, message.data ()); + } +} + +template [[gnu::always_inline]] +static inline constexpr void log_debug_nocheck_fmt (LogCategories category, std::format_string fmt, Args&& ...args) +{ + log_write (category, xamarin::android::LogLevel::Debug, std::format (fmt, std::forward(args)...).c_str ()); +} + +[[gnu::always_inline]] +static inline constexpr void log_debug_nocheck (LogCategories category, std::string_view const& message) noexcept +{ + log_write (category, xamarin::android::LogLevel::Debug, message.data ()); +} + +template [[gnu::always_inline]] +static inline constexpr void log_info_nocheck_fmt (LogCategories category, std::format_string fmt, Args&& ...args) +{ + log_write (category, xamarin::android::LogLevel::Info, std::format (fmt, std::forward(args)...).c_str ()); +} + +[[gnu::always_inline]] +static inline constexpr void log_info_nocheck (LogCategories category, std::string_view const& message) noexcept +{ + log_write (category, xamarin::android::LogLevel::Info, message.data ()); +} + +template [[gnu::always_inline]] +static inline constexpr void log_warn_fmt (LogCategories category, std::format_string fmt, Args&& ...args) noexcept +{ + log_write (category, xamarin::android::LogLevel::Warn, std::format (fmt, std::forward(args)...).c_str ()); +} + +[[gnu::always_inline]] +static inline constexpr void log_warn_fmt (LogCategories category, std::string_view const& message) noexcept +{ + log_write (category, xamarin::android::LogLevel::Warn, message.data ()); +} + +template [[gnu::always_inline]] +static inline constexpr void log_error_fmt (LogCategories category, std::format_string fmt, Args&& ...args) noexcept +{ + log_write (category, xamarin::android::LogLevel::Error, std::format (fmt, std::forward(args)...).c_str ()); +} + +[[gnu::always_inline]] +static inline constexpr void log_error_fmt (LogCategories category, std::string_view const& message) noexcept +{ + log_write (category, xamarin::android::LogLevel::Error, message.data ()); +} + +template [[gnu::always_inline]] +static inline constexpr void log_fatal_fmt (LogCategories category, std::format_string fmt, Args&& ...args) noexcept +{ + log_write (category, xamarin::android::LogLevel::Fatal, std::format (fmt, std::forward(args)...).c_str ()); +} + +[[gnu::always_inline]] +static inline constexpr void log_fatal_fmt (LogCategories category, std::string_view const& message) noexcept +{ + log_write (category, xamarin::android::LogLevel::Fatal, message.data ()); +} + +extern unsigned int log_categories; diff --git a/src/native/clr/include/startup/zip.hh b/src/native/clr/include/startup/zip.hh new file mode 100644 index 00000000000..0c846f50eb8 --- /dev/null +++ b/src/native/clr/include/startup/zip.hh @@ -0,0 +1,115 @@ +#pragma once + +#include + +#include +#include + +#include +#include +#include + +namespace xamarin::android { + namespace detail { + template + concept ByteArrayContainer = requires (T a) { + a.size (); + a.data (); + requires std::same_as; + }; + } + + class Zip + { + public: + // Returns `true` if the entry was something we need. + using ScanCallbackFn = bool(std::string_view const& apk_path, int apk_fd, dynamic_local_string const& entry_name, uint32_t offset, uint32_t size); + + struct zip_scan_state + { + int file_fd; + std::string_view const& file_name; + const char * const prefix; + uint32_t prefix_len; + size_t buf_offset; + uint16_t compression_method; + uint32_t local_header_offset; + uint32_t data_offset; + uint32_t file_size; + bool bundled_assemblies_slow_path; + uint32_t max_assembly_name_size; + uint32_t max_assembly_file_name_size; + }; + + private: + static inline constexpr off_t ZIP_EOCD_LEN = 22; + static inline constexpr off_t ZIP_CENTRAL_LEN = 46; + static inline constexpr off_t ZIP_LOCAL_LEN = 30; + + static inline constexpr std::string_view ZIP_CENTRAL_MAGIC { "PK\1\2" }; + static inline constexpr std::string_view ZIP_LOCAL_MAGIC { "PK\3\4" }; + static inline constexpr std::string_view ZIP_EOCD_MAGIC { "PK\5\6" }; + + static constexpr std::string_view zip_path_separator { "/" }; + static constexpr std::string_view apk_lib_dir_name { "lib" }; + + static constexpr size_t lib_prefix_size = calc_size(apk_lib_dir_name, zip_path_separator, Constants::android_lib_abi, zip_path_separator); + static constexpr auto lib_prefix_array = concat_string_views (apk_lib_dir_name, zip_path_separator, Constants::android_lib_abi, zip_path_separator); + + // .data() must be used otherwise string_view length will include the trailing \0 in the array + static constexpr std::string_view lib_prefix { lib_prefix_array.data () }; + + static constexpr std::string_view dso_suffix { ".so" }; + + static constexpr std::string_view assembly_store_prefix { "libassemblies." }; + static constexpr std::string_view assembly_store_extension { ".blob" }; + + static constexpr size_t assembly_store_file_name_size = calc_size (assembly_store_prefix, Constants::android_lib_abi, assembly_store_extension, dso_suffix); + static constexpr auto assembly_store_file_name_array = concat_string_views (assembly_store_prefix, Constants::android_lib_abi, assembly_store_extension, dso_suffix); + + // .data() must be used otherwise string_view length will include the trailing \0 in the array + static constexpr std::string_view assembly_store_file_name { assembly_store_file_name_array.data () }; + + static constexpr size_t assembly_store_file_path_size = calc_size(lib_prefix, assembly_store_file_name); + static constexpr auto assembly_store_file_path_array = concat_string_views (lib_prefix, assembly_store_file_name); + + public: + // .data() must be used otherwise string_view length will include the trailing \0 in the array + static constexpr std::string_view assembly_store_file_path { assembly_store_file_path_array.data () }; + + public: + // Scans the ZIP archive for any entries matching the `lib/{ARCH}/` prefix and calls `entry_cb` + // for each of them. If the callback returns `false` for all of the entries (meaning none of them + // was interesting/useful), then the APK file descriptor is closed. Otherwise, the descriptor is + // kept open since we will need it later on. + static void scan_archive (std::string_view const& apk_path, ScanCallbackFn entry_cb) noexcept; + + private: + static std::tuple get_assemblies_prefix_and_length () noexcept; + + // Returns `true` if the APK fd needs to remain open. + static bool zip_scan_entries (int apk_fd, std::string_view const& apk_path, ScanCallbackFn entry_cb) noexcept; + static bool zip_read_cd_info (int apk_fd, uint32_t& cd_offset, uint32_t& cd_size, uint16_t& cd_entries) noexcept; + static bool zip_read_entry_info (std::vector const& buf, dynamic_local_string& file_name, zip_scan_state &state) noexcept; + static bool zip_load_entry_common (size_t entry_index, std::vector const& buf, dynamic_local_string &entry_name, zip_scan_state &state) noexcept; + static bool zip_adjust_data_offset (int fd, zip_scan_state &state) noexcept; + + template + static bool zip_extract_cd_info (std::array const& buf, uint32_t& cd_offset, uint32_t& cd_size, uint16_t& cd_entries) noexcept; + + template + static bool zip_ensure_valid_params (T const& buf, size_t index, size_t to_read) noexcept; + + template + static bool zip_read_field (T const& src, size_t source_index, uint16_t& dst) noexcept; + + template + static bool zip_read_field (T const& src, size_t source_index, uint32_t& dst) noexcept; + + template + static bool zip_read_field (T const& src, size_t source_index, std::array& dst_sig) noexcept; + + template + static bool zip_read_field (T const& buf, size_t index, size_t count, dynamic_local_string& characters) noexcept; + }; +} diff --git a/src/native/clr/include/xamarin-app.hh b/src/native/clr/include/xamarin-app.hh new file mode 100644 index 00000000000..c65896eb93b --- /dev/null +++ b/src/native/clr/include/xamarin-app.hh @@ -0,0 +1,399 @@ +// Dear Emacs, this is a -*- C++ -*- header +#pragma once + +#include + +#include +#include + +#include + +static constexpr uint64_t FORMAT_TAG = 0x00035E6972616D58; // 'Xmari^XY' where XY is the format version +static constexpr uint32_t COMPRESSED_DATA_MAGIC = 0x5A4C4158; // 'XALZ', little-endian +static constexpr uint32_t ASSEMBLY_STORE_MAGIC = 0x41424158; // 'XABA', little-endian + +// The highest bit of assembly store version is a 64-bit ABI flag +#if INTPTR_MAX == INT64_MAX +static constexpr uint32_t ASSEMBLY_STORE_64BIT_FLAG = 0x80000000; +#else +static constexpr uint32_t ASSEMBLY_STORE_64BIT_FLAG = 0x00000000; +#endif + +// The second-to-last byte denotes the actual ABI +#if defined(__aarch64__) +static constexpr uint32_t ASSEMBLY_STORE_ABI = 0x00010000; +#elif defined(__arm__) +static constexpr uint32_t ASSEMBLY_STORE_ABI = 0x00020000; +#elif defined(__x86_64__) +static constexpr uint32_t ASSEMBLY_STORE_ABI = 0x00030000; +#elif defined(__i386__) +static constexpr uint32_t ASSEMBLY_STORE_ABI = 0x00040000; +#endif + +// Increase whenever an incompatible change is made to the assembly store format +static constexpr uint32_t ASSEMBLY_STORE_FORMAT_VERSION = 2 | ASSEMBLY_STORE_64BIT_FLAG | ASSEMBLY_STORE_ABI; + +static constexpr uint32_t MODULE_MAGIC_NAMES = 0x53544158; // 'XATS', little-endian +static constexpr uint32_t MODULE_INDEX_MAGIC = 0x49544158; // 'XATI', little-endian +static constexpr uint8_t MODULE_FORMAT_VERSION = 2; // Keep in sync with the value in src/Xamarin.Android.Build.Tasks/Utilities/TypeMapGenerator.cs + +#if defined (DEBUG) +struct BinaryTypeMapHeader +{ + uint32_t magic; + uint32_t version; + uint32_t entry_count; + uint32_t java_name_width; + uint32_t managed_name_width; + uint32_t assembly_name_length; +}; + +struct TypeMapIndexHeader +{ + uint32_t magic; + uint32_t version; + uint32_t entry_count; + uint32_t module_file_name_width; +}; + +struct TypeMapEntry +{ + const char *from; + const char *to; +}; + +// MUST match src/Xamarin.Android.Build.Tasks/Utilities/TypeMappingDebugNativeAssemblyGenerator.cs +struct TypeMap +{ + uint32_t entry_count; + char *assembly_name; + uint8_t *data; + const TypeMapEntry *java_to_managed; + const TypeMapEntry *managed_to_java; +}; +#else +struct TypeMapModuleEntry +{ + uint32_t type_token_id; + uint32_t java_map_index; +}; + +struct TypeMapModule +{ + uint8_t module_uuid[16]; + uint32_t entry_count; + uint32_t duplicate_count; + TypeMapModuleEntry const *map; + TypeMapModuleEntry const *duplicate_map; + char const *assembly_name; + uint8_t *image; + uint32_t java_name_width; + uint8_t *java_map; +}; + +struct TypeMapJava +{ + uint32_t module_index; + uint32_t type_token_id; + uint32_t java_name_index; +}; +#endif + +struct CompressedAssemblyHeader +{ + uint32_t magic; // COMPRESSED_DATA_MAGIC + uint32_t descriptor_index; + uint32_t uncompressed_length; +}; + +struct CompressedAssemblyDescriptor +{ + uint32_t uncompressed_file_size; + bool loaded; + uint8_t *data; +}; + +struct CompressedAssemblies +{ + uint32_t count; + CompressedAssemblyDescriptor *descriptors; +}; + +struct XamarinAndroidBundledAssembly +{ + int32_t file_fd; + char *file_name; + uint32_t data_offset; + uint32_t data_size; + uint8_t *data; + uint32_t name_length; + char *name; +}; + +// +// Assembly store format +// +// Each target ABI/architecture has a single assembly store file, composed of the following parts: +// +// [HEADER] +// [INDEX] +// [ASSEMBLY_DESCRIPTORS] +// [ASSEMBLY DATA] +// +// Formats of the sections above are as follows: +// +// HEADER (fixed size) +// [MAGIC] uint; value: 0x41424158 +// [FORMAT_VERSION] uint; store format version number +// [ENTRY_COUNT] uint; number of entries in the store +// [INDEX_ENTRY_COUNT] uint; number of entries in the index +// [INDEX_SIZE] uint; index size in bytes +// +// INDEX (variable size, HEADER.ENTRY_COUNT*2 entries, for assembly names with and without the extension) +// [NAME_HASH] uint on 32-bit platforms, ulong on 64-bit platforms; xxhash of the assembly name +// [DESCRIPTOR_INDEX] uint; index into in-store assembly descriptor array +// +// ASSEMBLY_DESCRIPTORS (variable size, HEADER.ENTRY_COUNT entries), each entry formatted as follows: +// [MAPPING_INDEX] uint; index into a runtime array where assembly data pointers are stored +// [DATA_OFFSET] uint; offset from the beginning of the store to the start of assembly data +// [DATA_SIZE] uint; size of the stored assembly data +// [DEBUG_DATA_OFFSET] uint; offset from the beginning of the store to the start of assembly PDB data, 0 if absent +// [DEBUG_DATA_SIZE] uint; size of the stored assembly PDB data, 0 if absent +// [CONFIG_DATA_OFFSET] uint; offset from the beginning of the store to the start of assembly .config contents, 0 if absent +// [CONFIG_DATA_SIZE] uint; size of the stored assembly .config contents, 0 if absent +// +// ASSEMBLY_NAMES (variable size, HEADER.ENTRY_COUNT entries), each entry formatted as follows: +// [NAME_LENGTH] uint: length of assembly name +// [NAME] byte: UTF-8 bytes of assembly name, without the NUL terminator +// + +// +// The structures which are found in the store files must be packed to avoid problems when calculating offsets (runtime +// size of a structure can be different than the real data size) +// +struct [[gnu::packed]] AssemblyStoreHeader final +{ + uint32_t magic; + uint32_t version; + uint32_t entry_count; + uint32_t index_entry_count; + uint32_t index_size; // index size in bytes +}; + +struct [[gnu::packed]] AssemblyStoreIndexEntry final +{ + xamarin::android::hash_t name_hash; + uint32_t descriptor_index; +}; + +struct [[gnu::packed]] AssemblyStoreEntryDescriptor final +{ + uint32_t mapping_index; + + uint32_t data_offset; + uint32_t data_size; + + uint32_t debug_data_offset; + uint32_t debug_data_size; + + uint32_t config_data_offset; + uint32_t config_data_size; +}; + +struct AssemblyStoreRuntimeData final +{ + uint8_t *data_start; + uint32_t assembly_count; + uint32_t index_entry_count; + AssemblyStoreEntryDescriptor *assemblies; +}; + +struct AssemblyStoreSingleAssemblyRuntimeData final +{ + uint8_t *image_data; + uint8_t *debug_info_data; + uint8_t *config_data; + AssemblyStoreEntryDescriptor *descriptor; +}; + +// Keep in strict sync with: +// src/Xamarin.Android.Build.Tasks/Utilities/ApplicationConfig.cs +// src/Xamarin.Android.Build.Tasks/Tests/Xamarin.Android.Build.Tests/Utilities/EnvironmentHelper.cs +struct ApplicationConfig +{ + bool uses_assembly_preload; + bool jni_add_native_method_registration_attribute_present; + bool marshal_methods_enabled; + bool ignore_split_configs; + uint32_t number_of_runtime_properties; + uint32_t package_naming_policy; + uint32_t environment_variable_count; + uint32_t system_property_count; + uint32_t number_of_assemblies_in_apk; + uint32_t bundled_assembly_name_width; + uint32_t number_of_dso_cache_entries; + uint32_t number_of_aot_cache_entries; + uint32_t number_of_shared_libraries; + uint32_t android_runtime_jnienv_class_token; + uint32_t jnienv_initialize_method_token; + uint32_t jnienv_registerjninatives_method_token; + uint32_t jni_remapping_replacement_type_count; + uint32_t jni_remapping_replacement_method_index_entry_count; + const char *android_package_name; +}; + +struct RuntimeProperty +{ + const char *key; + const char *value; + uint32_t value_size; // including the terminating NUL +}; + +struct RuntimePropertyIndexEntry +{ + xamarin::android::hash_t key_hash; + uint32_t index; +}; + +struct DSOApkEntry +{ + uint64_t name_hash; + uint32_t offset; // offset into the APK + int32_t fd; // apk file descriptor +}; + +struct DSOCacheEntry +{ + uint64_t hash; + uint64_t real_name_hash; + bool ignore; + const char *name; + void *handle; +}; + +struct JniRemappingString +{ + const uint32_t length; + const char *str; +}; + +struct JniRemappingReplacementMethod +{ + const char *target_type; + const char *target_name; + // const char *target_signature; + // const int32_t param_count; + const bool is_static; +}; + +struct JniRemappingIndexMethodEntry +{ + const JniRemappingString name; + const JniRemappingString signature; + const JniRemappingReplacementMethod replacement; +}; + +struct JniRemappingIndexTypeEntry +{ + const JniRemappingString name; + const uint32_t method_count; + const JniRemappingIndexMethodEntry *methods; +}; + +struct JniRemappingTypeReplacementEntry +{ + const JniRemappingString name; + const char *replacement; +}; + +extern "C" { + [[gnu::visibility("default")]] extern const JniRemappingIndexTypeEntry jni_remapping_method_replacement_index[]; + [[gnu::visibility("default")]] extern const JniRemappingTypeReplacementEntry jni_remapping_type_replacements[]; + + [[gnu::visibility("default")]] extern const uint64_t format_tag; + +#if defined (DEBUG) + [[gnu::visibility("default")]] extern const TypeMap type_map; // MUST match src/Xamarin.Android.Build.Tasks/Utilities/TypeMappingDebugNativeAssemblyGenerator.cs +#else + [[gnu::visibility("default")]] extern const uint32_t map_module_count; + [[gnu::visibility("default")]] extern const uint32_t java_type_count; + [[gnu::visibility("default")]] extern const char* const java_type_names[]; + [[gnu::visibility("default")]] extern TypeMapModule map_modules[]; + [[gnu::visibility("default")]] extern const TypeMapJava map_java[]; + [[gnu::visibility("default")]] extern const xamarin::android::hash_t map_java_hashes[]; +#endif + + [[gnu::visibility("default")]] extern CompressedAssemblies compressed_assemblies; + [[gnu::visibility("default")]] extern const ApplicationConfig application_config; + [[gnu::visibility("default")]] extern const char* const app_environment_variables[]; + [[gnu::visibility("default")]] extern const char* const app_system_properties[]; + + [[gnu::visibility("default")]] extern const char* const mono_aot_mode_name; + + [[gnu::visibility("default")]] extern XamarinAndroidBundledAssembly bundled_assemblies[]; + [[gnu::visibility("default")]] extern AssemblyStoreSingleAssemblyRuntimeData assembly_store_bundled_assemblies[]; + [[gnu::visibility("default")]] extern AssemblyStoreRuntimeData assembly_store; + + [[gnu::visibility("default")]] extern DSOCacheEntry dso_cache[]; + [[gnu::visibility("default")]] extern DSOCacheEntry aot_dso_cache[]; + [[gnu::visibility("default")]] extern DSOApkEntry dso_apk_entries[]; + + [[gnu::visibility("default")]] extern const RuntimeProperty runtime_properties[]; + [[gnu::visibility("default")]] extern const RuntimePropertyIndexEntry runtime_property_index[]; + + [[gnu::visibility("default")]] extern const host_configuration_properties host_config_properties; +} + +// +// Support for marshal methods +// +#if defined (RELEASE) +struct MarshalMethodsManagedClass +{ + const uint32_t token; + void *klass; +}; + +// Number of assembly name forms for which we generate hashes (essentially file name mutations. For instance +// `HelloWorld.dll`, `HelloWorld`, `en-US/HelloWorld` etc). This is multiplied by the number of assemblies in the apk to +// obtain number of entries in the `assembly_image_cache_hashes` and `assembly_image_cache_indices` entries +constexpr uint32_t number_of_assembly_name_forms_in_image_cache = 3; + +// These 3 arrays constitute the cache used to store pointers to loaded managed assemblies. +// Three arrays are used so that we can have multiple hashes pointing to the same MonoImage*. +// +// This is done by the `assembly_image_cache_hashes` containing hashes for all mutations of some +// assembly's name (e.g. with culture prefix, without extension etc) and position of that hash in +// `assembly_image_cache_hashes` is an index into `assembly_image_cache_indices` which, in turn, +// stores final index into the `assembly_image_cache` array. +// +[[gnu::visibility("default")]] extern void* assembly_image_cache[]; +[[gnu::visibility("default")]] extern const uint32_t assembly_image_cache_indices[]; +[[gnu::visibility("default")]] extern const xamarin::android::hash_t assembly_image_cache_hashes[]; + +// Number of unique classes which contain native callbacks we bind +[[gnu::visibility("default")]] extern uint32_t marshal_methods_number_of_classes; +[[gnu::visibility("default")]] extern MarshalMethodsManagedClass marshal_methods_class_cache[]; + +// +// These tables store names of classes and managed callback methods used in the generated marshal methods +// code. They are used just for error reporting. +// +// Class names are found at the same indexes as their corresponding entries in the `marshal_methods_class_cache` array +// above. Method names are stored as token:name pairs and the array must end with an "invalid" terminator entry (token +// == 0; name == nullptr) +// +struct MarshalMethodName +{ + // combination of assembly index (high 32 bits) and method token (low 32 bits) + const uint64_t id; + const char *name; +}; + +[[gnu::visibility("default")]] extern const char* const mm_class_names[]; +[[gnu::visibility("default")]] extern const MarshalMethodName mm_method_names[]; + +using get_function_pointer_fn = void(*)(uint32_t mono_image_index, uint32_t class_index, uint32_t method_token, void*& target_ptr); + +[[gnu::visibility("default")]] extern void xamarin_app_init (JNIEnv *env, get_function_pointer_fn fn) noexcept; +#endif // def RELEASE diff --git a/src/native/clr/libnet-android.map.txt b/src/native/clr/libnet-android.map.txt new file mode 100644 index 00000000000..9c8a580bc34 --- /dev/null +++ b/src/native/clr/libnet-android.map.txt @@ -0,0 +1,12 @@ +LIBNET_ANDROID { + global: + JNI_OnLoad; + Java_mono_android_Runtime_dumpTimingData; + Java_mono_android_Runtime_initInternal; + Java_mono_android_Runtime_notifyTimeZoneChanged; + Java_mono_android_Runtime_propagateUncaughtException; + Java_mono_android_Runtime_register; + + local: + *; +}; diff --git a/src/native/clr/runtime-base/CMakeLists.txt b/src/native/clr/runtime-base/CMakeLists.txt new file mode 100644 index 00000000000..93f83fea5a7 --- /dev/null +++ b/src/native/clr/runtime-base/CMakeLists.txt @@ -0,0 +1,106 @@ +# First generate some code + +# +# Must be the same value as DSOWrapperGenerator.PayloadSectionAlignment in src/Xamarin.Android.Build.Tasks/Utilities/DSOWrapperGenerator.cs +# +set(ARCHIVE_DSO_STUB_PAYLOAD_SECTION_ALIGNMENT 0x4000) + +file(COPY "${XA_ARCHIVE_STUB_OUTPUT_DIRECTORY}/${ARCHIVE_DSO_STUB_LIB_FILE_NAME}" DESTINATION ${CMAKE_CURRENT_BINARY_DIR}) +set(ARCHIVE_DSO_STUB_LIB_PATH "${CMAKE_CURRENT_BINARY_DIR}/${ARCHIVE_DSO_STUB_LIB_FILE_NAME}") + +# Emulate what we do when embedding something inside the ELF file +set(PAYLOAD_PATH ${CMAKE_CURRENT_SOURCE_DIR}/CMakeLists.txt) + +execute_process( + COMMAND ${CMAKE_OBJCOPY} --add-section payload=${PAYLOAD_PATH} ${ARCHIVE_DSO_STUB_LIB_PATH} + WORKING_DIRECTORY ${CMAKE_CURRENT_BINARY_DIR} + ECHO_ERROR_VARIABLE + COMMAND_ERROR_IS_FATAL ANY +) + +execute_process( + COMMAND ${CMAKE_OBJCOPY} --set-section-flags payload=readonly,data --set-section-alignment payload=${ARCHIVE_DSO_STUB_PAYLOAD_SECTION_ALIGNMENT} ${ARCHIVE_DSO_STUB_LIB_PATH} + WORKING_DIRECTORY ${CMAKE_CURRENT_BINARY_DIR} + ECHO_ERROR_VARIABLE + COMMAND_ERROR_IS_FATAL ANY +) + +execute_process( + COMMAND ${CMAKE_READELF} --file-header --section-headers ${ARCHIVE_DSO_STUB_LIB_PATH} --elf-output-style=JSON + WORKING_DIRECTORY ${CMAKE_CURRENT_BINARY_DIR} + OUTPUT_VARIABLE ARCHIVE_DSO_STUB_HEADER_JSON + ECHO_ERROR_VARIABLE + COMMAND_ERROR_IS_FATAL ANY +) +string(JSON SECTION_HEADER_ENTRY_SIZE GET "${ARCHIVE_DSO_STUB_HEADER_JSON}" 0 "ElfHeader" "SectionHeaderEntrySize") +string(JSON SECTION_HEADER_ENTRY_COUNT GET "${ARCHIVE_DSO_STUB_HEADER_JSON}" 0 "ElfHeader" "SectionHeaderCount") + +math(EXPR PAYLOAD_SECTION_INDEX "${SECTION_HEADER_ENTRY_COUNT} - 1") +string(JSON PAYLOAD_SECTION_OFFSET GET "${ARCHIVE_DSO_STUB_HEADER_JSON}" 0 "Sections" ${PAYLOAD_SECTION_INDEX} "Section" "Offset") +file(REMOVE ${ARCHIVE_DSO_STUB_LIB_PATH}) + +message(STATUS "Archive DSO stub header entry size: ${SECTION_HEADER_ENTRY_SIZE}; section count: ${SECTION_HEADER_ENTRY_COUNT}; payload offset: ${PAYLOAD_SECTION_OFFSET}") +configure_file( + archive-dso-stub-config.hh.in + ${CMAKE_CURRENT_BINARY_DIR}/include/archive-dso-stub-config.hh + USE_SOURCE_PERMISSIONS +) + +set(LIB_NAME runtime-base) +set(LIB_ALIAS xa::runtime-base) + +set(XA_RUNTIME_BASE_SOURCES + android-system.cc + cpu-arch-detect.cc + logger.cc + timing.cc + timing-internal.cc + util.cc +) +add_clang_check_sources("${XA_RUNTIME_BASE_SOURCES}") + +list(APPEND POTENTIAL_LOCAL_COMPILER_ARGS + -ffunction-sections + -fdata-sections +) + +xa_check_c_args(RUNTIME_BASE_CXX_ARGS "${POTENTIAL_LOCAL_COMPILER_ARGS}") + +add_library( + ${LIB_NAME} + STATIC + ${XA_RUNTIME_BASE_SOURCES} +) + +add_library(${LIB_ALIAS} ALIAS ${LIB_NAME}) + +set_static_library_suffix(${LIB_NAME}) + +target_compile_options( + ${LIB_NAME} + PRIVATE + ${XA_COMMON_CXX_ARGS} + ${RUNTIME_BASE_CXX_ARGS} +) + +target_include_directories( + ${LIB_NAME} + PUBLIC + "$" +) + +target_include_directories( + ${LIB_NAME} + SYSTEM PRIVATE + ${SYSROOT_CXX_INCLUDE_DIR} +) + +target_link_libraries( + ${LIB_NAME} + PRIVATE + xa::shared + xa::xamarin-app +) + +xa_add_compile_definitions(${LIB_NAME}) +xa_add_include_directories(${LIB_NAME}) diff --git a/src/native/clr/runtime-base/android-system.cc b/src/native/clr/runtime-base/android-system.cc new file mode 100644 index 00000000000..cd3a15d4495 --- /dev/null +++ b/src/native/clr/runtime-base/android-system.cc @@ -0,0 +1,493 @@ +#include +#include + +#include +#include + +#include +#include +#include +#include +#include +#include + +using namespace microsoft::java_interop; +using namespace xamarin::android; + +using std::operator""sv; + +#if defined(DEBUG) +[[gnu::always_inline]] +void +AndroidSystem::add_system_property (const char *name, const char *value) noexcept +{ + if (name == nullptr || *name == '\0') { + log_warn (LOG_DEFAULT, "Attempt to add a bundled system property without a valid name"); + return; + } + + if (value == nullptr) { + value = ""; + } + + bundled_properties[name] = value; +} + +void +AndroidSystem::setup_environment (const char *name, const char *value) noexcept +{ + if (name == nullptr || *name == '\0') { + return; + } + + const char *v = value; + if (v == nullptr) { + v = ""; + } + + if (isupper (name [0]) || name [0] == '_') { + if (setenv (name, v, 1) < 0) { + log_warn (LOG_DEFAULT, "(Debug) Failed to set environment variable: {}", strerror (errno)); + } + return; + } + + add_system_property (name, v); +} + +void +AndroidSystem::setup_environment_from_override_file (dynamic_local_string const& path) noexcept +{ + using read_count_type = size_t; + + struct stat sbuf; + if (::stat (path.get (), &sbuf) < 0) { + log_warn (LOG_DEFAULT, "Failed to stat the environment override file {}: {}", path.get (), strerror (errno)); + return; + } + + int fd = open (path.get (), O_RDONLY); + if (fd < 0) { + log_warn (LOG_DEFAULT, "Failed to open the environment override file {}: {}", path.get (), strerror (errno)); + return; + } + + auto file_size = static_cast(sbuf.st_size); + size_t nread = 0uz; + ssize_t r; + auto buf = std::make_unique (file_size); + + do { + auto read_count = static_cast(file_size - nread); + r = read (fd, buf.get () + nread, read_count); + if (r > 0) { + nread += static_cast(r); + } + } while (r < 0 && errno == EINTR); + + if (nread == 0) { + log_warn (LOG_DEFAULT, "Failed to read the environment override file {}: {}", path.get (), strerror (errno)); + return; + } + + // The file format is as follows (no newlines are used, this is just for illustration + // purposes, comments aren't part of the file either): + // + // # 10 ASCII characters formattted as a C++ hexadecimal number terminated with NUL: name + // # width (including the terminating NUL) + // 0x00000000\0 + // + // # 10 ASCII characters formattted as a C++ hexadecimal number terminated with NUL: value + // # width (including the terminating NUL) + // 0x00000000\0 + // + // # Variable name, terminated with NUL and padded to [name width] with NUL characters + // name\0 + // + // # Variable value, terminated with NUL and padded to [value width] with NUL characters + // value\0 + if (nread < Constants::OVERRIDE_ENVIRONMENT_FILE_HEADER_SIZE) { + log_warn (LOG_DEFAULT, "Invalid format of the environment override file {}: malformatted header", path.get ()); + return; + } + + char *endptr; + unsigned long name_width = strtoul (buf.get (), &endptr, 16); + if ((name_width == std::numeric_limits::max () && errno == ERANGE) || (buf[0] != '\0' && *endptr != '\0')) { + log_warn (LOG_DEFAULT, "Malformed header of the environment override file {}: name width has invalid format", path.get ()); + return; + } + + unsigned long value_width = strtoul (buf.get () + 11, &endptr, 16); + if ((value_width == std::numeric_limits::max () && errno == ERANGE) || (buf[0] != '\0' && *endptr != '\0')) { + log_warn (LOG_DEFAULT, "Malformed header of the environment override file {}: value width has invalid format", path.get ()); + return; + } + + uint64_t data_width = name_width + value_width; + if (data_width > file_size - Constants::OVERRIDE_ENVIRONMENT_FILE_HEADER_SIZE || (file_size - Constants::OVERRIDE_ENVIRONMENT_FILE_HEADER_SIZE) % data_width != 0) { + log_warn (LOG_DEFAULT, "Malformed environment override file {}: invalid data size", path.get ()); + return; + } + + uint64_t data_size = static_cast(file_size); + char *name = buf.get () + Constants::OVERRIDE_ENVIRONMENT_FILE_HEADER_SIZE; + while (data_size > 0 && data_size >= data_width) { + if (*name == '\0') { + log_warn (LOG_DEFAULT, "Malformed environment override file {}: name at offset {} is empty", path.get (), name - buf.get ()); + return; + } + + log_debug (LOG_DEFAULT, "Setting environment variable from the override file {}: '{}' = '{}'", path.get (), name, name + name_width); + setup_environment (name, name + name_width); + name += data_width; + data_size -= data_width; + } +} +#endif + +[[gnu::always_inline]] +void +AndroidSystem::add_apk_libdir (std::string_view const& apk, size_t &index, std::string_view const& abi) noexcept +{ + abort_unless (index < app_lib_directories.size (), "Index out of range"); + static constexpr std::string_view lib_prefix { "!/lib/" }; + std::string dir; + + dir.reserve (apk.size () + lib_prefix.size () + abi.size ()); + dir.assign (apk); + dir.append (lib_prefix); + dir.append (abi); + app_lib_directories [index] = dir; + log_debug (LOG_ASSEMBLY, "Added APK DSO lookup location: {}", dir); + index++; +} + +[[gnu::always_inline]] +void +AndroidSystem::setup_apk_directories (unsigned short running_on_cpu, jstring_array_wrapper &runtimeApks, bool have_split_apks) noexcept +{ + std::string_view const& abi = android_abi_names [running_on_cpu]; + size_t number_of_added_directories = 0uz; + + for (size_t i = 0uz; i < runtimeApks.get_length (); ++i) { + jstring_wrapper &e = runtimeApks [i]; + std::string_view apk = e.get_string_view (); + + if (have_split_apks) { + if (apk.ends_with (Constants::split_config_abi_apk_name.data ())) { + add_apk_libdir (apk, number_of_added_directories, abi); + break; + } + } else { + add_apk_libdir (apk, number_of_added_directories, abi); + } + } + + if (app_lib_directories.size () == number_of_added_directories) [[likely]] { + return; + } + + abort_unless (number_of_added_directories > 0, "At least a single application lib directory must be added"); + app_lib_directories = app_lib_directories.subspan (0, number_of_added_directories); +} + +void +AndroidSystem::setup_app_library_directories (jstring_array_wrapper& runtimeApks, jstring_array_wrapper& appDirs, bool have_split_apks) noexcept +{ + if (!is_embedded_dso_mode_enabled ()) { + log_debug (LOG_DEFAULT, "Setting up for DSO lookup in app data directories"sv); + + app_lib_directories = std::span (single_app_lib_directory); + app_lib_directories [0] = std::string (appDirs[Constants::APP_DIRS_DATA_DIR_INDEX].get_cstr ()); + log_debug (LOG_ASSEMBLY, "Added filesystem DSO lookup location: {}", app_lib_directories [0]); + return; + } + + log_debug (LOG_DEFAULT, "Setting up for DSO lookup directly in the APK"sv); + if (have_split_apks) { + // If split apks are used, then we will have just a single app library directory. Don't allocate any memory + // dynamically in this case + AndroidSystem::app_lib_directories = std::span (single_app_lib_directory); + } else { + size_t app_lib_directories_size = runtimeApks.get_length (); + AndroidSystem::app_lib_directories = std::span (new std::string[app_lib_directories_size], app_lib_directories_size); + } + + uint16_t built_for_cpu = 0, running_on_cpu = 0; + bool is64bit = false; + _monodroid_detect_cpu_and_architecture (built_for_cpu, running_on_cpu, is64bit); + setup_apk_directories (running_on_cpu, runtimeApks, have_split_apks); +} + +void +AndroidSystem::setup_environment () noexcept +{ + if (application_config.environment_variable_count % 2 != 0) { + log_warn (LOG_DEFAULT, "Corrupted environment variable array: does not contain an even number of entries ({})", application_config.environment_variable_count); + return; + } + + const char *var_name; + const char *var_value; + for (size_t i = 0uz; i < application_config.environment_variable_count; i += 2) { + var_name = app_environment_variables [i]; + if (var_name == nullptr || *var_name == '\0') { + continue; + } + + var_value = app_environment_variables [i + 1uz]; + if (var_value == nullptr) { + var_value = ""; + } + + if constexpr (Constants::is_debug_build) { + log_info (LOG_DEFAULT, "Setting environment variable '{}' to '{}'", var_name, var_value); + } + + if (setenv (var_name, var_value, 1) < 0) { + log_warn (LOG_DEFAULT, "Failed to set environment variable: {}", strerror (errno)); + } + } + +#if defined(DEBUG) + log_debug (LOG_DEFAULT, "Loading environment from the override directory."sv); + + dynamic_local_string env_override_file; + Util::path_combine (env_override_file, std::string_view {primary_override_dir}, Constants::OVERRIDE_ENVIRONMENT_FILE_NAME); + log_debug (LOG_DEFAULT, "{}", env_override_file.get ()); + if (Util::file_exists (env_override_file)) { + log_debug (LOG_DEFAULT, "Loading {}"sv, env_override_file.get ()); + setup_environment_from_override_file (env_override_file); + } +#endif // def DEBUG +} + +void +AndroidSystem::detect_embedded_dso_mode (jstring_array_wrapper& appDirs) noexcept +{ + // appDirs[Constants::APP_DIRS_DATA_DIR_INDEX] points to the native library directory + dynamic_local_string libmonodroid_path; + Util::path_combine (libmonodroid_path, appDirs[Constants::APP_DIRS_DATA_DIR_INDEX].get_string_view (), "libmonodroid.so"sv); + + log_debug (LOG_ASSEMBLY, "Checking if libmonodroid was unpacked to {}", libmonodroid_path.get ()); + if (!Util::file_exists (libmonodroid_path)) { + log_debug (LOG_ASSEMBLY, "{} not found, assuming application/android:extractNativeLibs == false", libmonodroid_path.get ()); + set_embedded_dso_mode_enabled (true); + } else { + log_debug (LOG_ASSEMBLY, "Native libs extracted to {}, assuming application/android:extractNativeLibs == true", appDirs[Constants::APP_DIRS_DATA_DIR_INDEX].get_cstr ()); + set_embedded_dso_mode_enabled (false); + } +} + +auto +AndroidSystem::lookup_system_property (std::string_view const& name, size_t &value_len) noexcept -> const char* +{ + value_len = 0; +#if defined (DEBUG) + if (!bundled_properties.empty ()) { + auto prop_iter = bundled_properties.find (name.data ()); + if (prop_iter != bundled_properties.end ()) { + value_len = prop_iter->second.length (); + return prop_iter->first.c_str (); + } + } +#endif // DEBUG + + if (application_config.system_property_count == 0) { + return nullptr; + } + + if (application_config.system_property_count % 2 != 0) { + log_warn (LOG_DEFAULT, "Corrupted environment variable array: does not contain an even number of entries ({})", application_config.system_property_count); + return nullptr; + } + + const char *prop_name; + const char *prop_value; + for (size_t i = 0uz; i < application_config.system_property_count; i += 2uz) { + prop_name = app_system_properties[i]; + if (prop_name == nullptr || *prop_name == '\0') { + continue; + } + + if (strcmp (prop_name, name.data ()) == 0) { + prop_value = app_system_properties [i + 1uz]; + if (prop_value == nullptr || *prop_value == '\0') { + value_len = 0uz; + return ""; + } + + value_len = strlen (prop_value); + return prop_value; + } + } + + return nullptr; +} + +auto +AndroidSystem::monodroid__system_property_get (std::string_view const& name, char *sp_value, size_t sp_value_len) noexcept -> int +{ + if (name.empty () || sp_value == nullptr) { + return -1; + } + + char *buf = nullptr; + if (sp_value_len < Constants::PROPERTY_VALUE_BUFFER_LEN) { + size_t alloc_size = Helpers::add_with_overflow_check (Constants::PROPERTY_VALUE_BUFFER_LEN, 1uz); + log_warn (LOG_DEFAULT, "Buffer to store system property may be too small, will copy only {} bytes", sp_value_len); + buf = new char [alloc_size]; + } + + int len = __system_property_get (name.data (), buf ? buf : sp_value); + if (buf != nullptr) { + strncpy (sp_value, buf, sp_value_len); + sp_value [sp_value_len] = '\0'; + delete[] buf; + } + + return len; +} + +auto AndroidSystem::monodroid_get_system_property (std::string_view const& name, dynamic_local_string &value) noexcept -> int +{ + int len = monodroid__system_property_get (name, value.get (), value.size ()); + if (len > 0) { + // Clumsy, but if we want direct writes to be fast, this is the price we pay + value.set_length_after_direct_write (static_cast(len)); + return len; + } + + size_t plen; + const char *v = lookup_system_property (name, plen); + if (v == nullptr) { + return len; + } + + value.assign (v, plen); + return Helpers::add_with_overflow_check (plen, 0); +} + +auto +AndroidSystem::get_max_gref_count_from_system () noexcept -> long +{ + long max; + + if (running_in_emulator) { + max = 2000; + } else { + max = 51200; + } + + dynamic_local_string override; + if (monodroid_get_system_property (Constants::DEBUG_MONO_MAX_GREFC, override) > 0) { + char *e; + max = strtol (override.get (), &e, 10); + switch (*e) { + case 'k': + e++; + max *= 1000; + break; + case 'm': + e++; + max *= 1000000; + break; + } + + if (max < 0) { + max = std::numeric_limits::max (); + } + + if (*e) { + log_warn (LOG_GC, "Unsupported '{}' value '{}'.", Constants::DEBUG_MONO_MAX_GREFC.data (), override.get ()); + } + + log_warn (LOG_GC, "Overriding max JNI Global Reference count to {}", max); + } + + return max; +} + +auto AndroidSystem::get_full_dso_path (std::string const& base_dir, const char *dso_path, dynamic_local_string& path) noexcept -> bool +{ + if (dso_path == nullptr) { + return false; + } + + if (base_dir.empty () || Util::is_path_rooted (dso_path)) + return const_cast(dso_path); // Absolute path or no base path, can't do much with it + + path.assign (base_dir) + .append ("/"sv) + .append_c (dso_path); + + return true; +} + +auto AndroidSystem::load_dso (const char *path, unsigned int dl_flags, bool skip_exists_check) noexcept -> void* +{ + if (path == nullptr || *path == '\0') { + return nullptr; + } + + log_info (LOG_ASSEMBLY, "Trying to load shared library '{}'", path); + if (!skip_exists_check && !is_embedded_dso_mode_enabled () && !Util::file_exists (path)) { + log_info (LOG_ASSEMBLY, "Shared library '{}' not found", path); + return nullptr; + } + + char *error = nullptr; + void *handle = java_interop_lib_load (path, dl_flags, &error); + if (handle == nullptr && Util::should_log (LOG_ASSEMBLY)) { + log_info_nocheck (LOG_ASSEMBLY, "Failed to load shared library '{}'. {}", path, error); + } + java_interop_free (error); + return handle; +} + +template [[gnu::always_inline]] // TODO: replace with a concept +auto AndroidSystem::load_dso_from_specified_dirs (TContainer directories, const char *dso_name, unsigned int dl_flags) noexcept -> void* +{ + if (dso_name == nullptr) { + return nullptr; + } + + dynamic_local_string full_path; + for (std::string const& dir : directories) { + if (!get_full_dso_path (dir, dso_name, full_path)) { + continue; + } + + void *handle = load_dso (full_path.get (), dl_flags, false); + if (handle != nullptr) { + return handle; + } + } + + return nullptr; +} + +auto AndroidSystem::load_dso_from_app_lib_dirs (const char *name, unsigned int dl_flags) noexcept -> void* +{ + return load_dso_from_specified_dirs (app_lib_directories, name, dl_flags); +} + +auto AndroidSystem::load_dso_from_override_dirs (const char *name, unsigned int dl_flags) noexcept -> void* +{ + if constexpr (Constants::is_release_build) { + return nullptr; + } else { + return load_dso_from_specified_dirs (AndroidSystem::override_dirs, name, dl_flags); + } +} + +[[gnu::flatten]] +auto AndroidSystem::load_dso_from_any_directories (const char *name, unsigned int dl_flags) noexcept -> void* +{ + void *handle = load_dso_from_override_dirs (name, dl_flags); + if (handle == nullptr) { + handle = load_dso_from_app_lib_dirs (name, dl_flags); + } + return handle; +} diff --git a/src/native/clr/runtime-base/archive-dso-stub-config.hh.in b/src/native/clr/runtime-base/archive-dso-stub-config.hh.in new file mode 100644 index 00000000000..c00d990a244 --- /dev/null +++ b/src/native/clr/runtime-base/archive-dso-stub-config.hh.in @@ -0,0 +1,17 @@ +#pragma once + +#include + +namespace xamarin::android { + struct ArchiveDSOStubConfig + { + static inline constexpr size_t PayloadSectionAlignment = @ARCHIVE_DSO_STUB_PAYLOAD_SECTION_ALIGNMENT@uz; + static inline constexpr size_t SectionHeaderEntrySize = @SECTION_HEADER_ENTRY_SIZE@uz; + static inline constexpr size_t SectionHeaderEntryCount = @SECTION_HEADER_ENTRY_COUNT@uz; + static inline constexpr uint32_t PayloadSectionOffset = @PAYLOAD_SECTION_OFFSET@uz; + + // We know that payload section is the last one in the binary, this is an index into + // the section header table. + static inline constexpr size_t PayloadSectionIndex = SectionHeaderEntryCount - 1uz; + }; +} diff --git a/src/native/clr/runtime-base/cpu-arch-detect.cc b/src/native/clr/runtime-base/cpu-arch-detect.cc new file mode 100644 index 00000000000..836f3c06c80 --- /dev/null +++ b/src/native/clr/runtime-base/cpu-arch-detect.cc @@ -0,0 +1,119 @@ +#include +#include + +#include +#include + +#if __arm__ +static inline constexpr size_t BUF_SIZE = 512uz; + +static int +find_in_maps (const char *str) +{ + abort_if_invalid_pointer_argument (str, "str"); + + FILE *maps = fopen ("/proc/self/maps", "r"); + char *line; + char buf [BUF_SIZE]; + + if (!maps) + return -1; + + while ((line = fgets (buf, BUF_SIZE, maps))) { + if (strstr (line, str)) + return 1; + } + + return 0; +} + +static int +detect_houdini () +{ + return find_in_maps ("libhoudini"); +} +#endif + +namespace { + [[gnu::always_inline]] + bool is_64_bit () + { + return sizeof (char*) == 8; + } + + [[gnu::always_inline]] + bool get_built_for_cpu_android ([[maybe_unused]] uint16_t &built_for_cpu) + { + bool found = true; +#if __arm__ + built_for_cpu = CPU_KIND_ARM; +#elif __aarch64__ + built_for_cpu = CPU_KIND_ARM64; +#elif __x86_64__ + built_for_cpu = CPU_KIND_X86_64; +#elif __i386__ + built_for_cpu = CPU_KIND_X86; +#elif __mips__ + built_for_cpu = CPU_KIND_MIPS; +#elif __riscv + built_for_cpu = CPU_KIND_RISCV; +#else + found = false; +#endif + return found; + } + + [[gnu::always_inline]] + void get_built_for_cpu (uint16_t &built_for_cpu) + { + if (get_built_for_cpu_android (built_for_cpu)) { + return; + } + + built_for_cpu = CPU_KIND_UNKNOWN; + } + + [[gnu::always_inline]] + bool get_running_on_cpu_android ([[maybe_unused]] uint16_t &running_on_cpu) + { + bool found = true; +#if __arm__ + if (!detect_houdini ()) { + running_on_cpu = CPU_KIND_ARM; + } else { + /* If houdini is mapped in we're running on x86 */ + running_on_cpu = CPU_KIND_X86; + } +#elif __aarch64__ + running_on_cpu = CPU_KIND_ARM64; +#elif __x86_64__ + running_on_cpu = CPU_KIND_X86_64; +#elif __i386__ + running_on_cpu = is_64_bit () ? CPU_KIND_X86_64 : CPU_KIND_X86; +#elif __mips__ + running_on_cpu = CPU_KIND_MIPS; +#elif __riscv + running_on_cpu = CPU_KIND_RISCV; +#else + found = false; +#endif + return found; + } + + [[gnu::always_inline]] + void get_running_on_cpu (uint16_t &running_on_cpu) + { + if (get_running_on_cpu_android (running_on_cpu)) { + return; + } + + running_on_cpu = CPU_KIND_UNKNOWN; + } +} + +void _monodroid_detect_cpu_and_architecture (uint16_t &built_for_cpu, uint16_t &running_on_cpu, bool &is64bit) +{ + is64bit = is_64_bit (); + get_built_for_cpu (built_for_cpu); + get_running_on_cpu (running_on_cpu); +} diff --git a/src/native/clr/runtime-base/logger.cc b/src/native/clr/runtime-base/logger.cc new file mode 100644 index 00000000000..c0d06769988 --- /dev/null +++ b/src/native/clr/runtime-base/logger.cc @@ -0,0 +1,214 @@ +#include +#include +#include +#include +#include +#include +#include + +#include +#include + +#include + +#include +#include +#include +#include +#include +#include + +using namespace xamarin::android; +using std::operator""sv; + +namespace { + FILE* + open_file (LogCategories category, std::string const& custom_path, std::string_view const& override_dir, std::string_view const& filename) + { + bool ignore_path = false; + if (!custom_path.empty () && access (custom_path.c_str (), W_OK) < 0) { + log_warn (category, + "Could not open path '{}' for logging (\"{}\"). Using '{}/{}' instead.", + custom_path, + strerror (errno), + override_dir, + filename + ); + ignore_path = true; + } + + std::string p{}; + if (custom_path.empty () || ignore_path) { + Util::create_public_directory (override_dir); + p.assign (override_dir); + p.append ("/"); + p.append (filename); + } + + std::string const& path = p.empty () ? custom_path : p; + unlink (path.c_str ()); + + FILE *f = Util::monodroid_fopen (path, "a"sv); + + if (f) { + Util::set_world_accessable (path); + } else { + log_warn (category, "Could not open path '{}' for logging: {}", path, strerror (errno)); + } + + return f; + } + + std::string gref_file{}; + std::string lref_file{}; + bool light_gref = false; + bool light_lref = false; +} + +void +Logger::init_reference_logging (std::string_view const& override_dir) noexcept +{ + if ((log_categories & LOG_GREF) != 0 && !light_gref) { + _gref_log = open_file (LOG_GREF, gref_file, override_dir, "grefs.txt"sv); + } + + if ((log_categories & LOG_LREF) != 0 && !light_lref) { + // if both lref & gref have files specified, and they're the same path, reuse the FILE*. + if (!lref_file.empty () && strcmp (lref_file.c_str (), !gref_file.empty () ? gref_file.c_str () : "") == 0) { + _lref_log = _gref_log; + } else { + _lref_log = open_file (LOG_LREF, lref_file, override_dir, "lrefs.txt"sv); + } + } +} + +[[gnu::always_inline]] bool +Logger::set_category (std::string_view const& name, string_segment& arg, unsigned int entry, bool arg_starts_with_name) noexcept +{ + if ((log_categories & entry) == entry) { + return false; + } + + if (arg_starts_with_name ? arg.starts_with (name) : arg.equal (name)) { + log_categories |= entry; + return true; + } + + return false; +} + +void +Logger::init_logging_categories () noexcept +{ + _log_timing_categories = LogTimingCategories::Default; + + dynamic_local_string value; + if (AndroidSystem::monodroid_get_system_property (Constants::DEBUG_MONO_LOG_PROPERTY, value) == 0) { + return; + } + + string_segment param; + while (value.next_token (',', param)) { + constexpr std::string_view CAT_ALL { "all" }; + + if (param.equal (CAT_ALL)) { + log_categories = 0xFFFFFFFF; + break; + } + + if (set_category ("assembly", param, LOG_ASSEMBLY)) { + continue; + } + + if (set_category ("default", param, LOG_DEFAULT)) { + continue; + } + + if (set_category ("debugger", param, LOG_DEBUGGER)) { + continue; + } + + if (set_category ("gc", param, LOG_GC)) { + continue; + } + + if (set_category ("gref", param, LOG_GREF)) { + continue; + } + + if (set_category ("lref", param, LOG_LREF)) { + continue; + } + + if (set_category ("timing", param, LOG_TIMING)) { + continue; + } + + if (set_category ("network", param, LOG_NET)) { + continue; + } + + if (set_category ("netlink", param, LOG_NETLINK)) { + continue; + } + + auto get_log_file_name = [](std::string_view const& file_kind, string_segment const& segment, size_t offset) -> const char* { + auto file_name = segment.at (offset); + + if (!file_name.has_value ()) { + log_warn (LOG_DEFAULT, "Unable to set path to {} log file: {}", file_kind, to_string (file_name.error ())); + return nullptr; + } + + return file_name.value (); + }; + + constexpr std::string_view CAT_GREF_EQUALS { "gref=" }; + if (set_category (CAT_GREF_EQUALS, param, LOG_GREF, true /* arg_starts_with_name */)) { + gref_file = get_log_file_name ("gref"sv, param, CAT_GREF_EQUALS.length ()); + continue; + } + + if (set_category ("gref-", param, LOG_GREF)) { + light_gref = true; + continue; + } + + if (set_category ("gref+", param, LOG_GREF)) { + _gref_to_logcat = true; + continue; + } + + constexpr std::string_view CAT_LREF_EQUALS { "lref=" }; + if (set_category (CAT_LREF_EQUALS, param, LOG_LREF, true /* arg_starts_with_name */)) { + lref_file = get_log_file_name ("lref"sv, param, CAT_LREF_EQUALS.length ()); + continue; + } + + if (set_category ("lref-", param, LOG_LREF)) { + light_lref = true; + continue; + } + + if (set_category ("lref+", param, LOG_LREF)) { + _lref_to_logcat = true; + continue; + } + + if (param.starts_with ("timing=fast-bare")) { + log_categories |= LOG_TIMING; + _log_timing_categories |= LogTimingCategories::FastBare; + continue; + } + + if (param.starts_with ("timing=bare")) { + log_categories |= LOG_TIMING; + _log_timing_categories |= LogTimingCategories::Bare; + continue; + } + } + + if ((log_categories & LOG_GC) != 0) { + _gc_spew_enabled = true; + } +} diff --git a/src/native/clr/runtime-base/timing-internal.cc b/src/native/clr/runtime-base/timing-internal.cc new file mode 100644 index 00000000000..fab5e4ed160 --- /dev/null +++ b/src/native/clr/runtime-base/timing-internal.cc @@ -0,0 +1,83 @@ +#include +#include + +using namespace xamarin::android; + +namespace xamarin::android { + FastTiming *internal_timing = nullptr; +} + +void +FastTiming::really_initialize (bool log_immediately) noexcept +{ + internal_timing = new FastTiming (); + is_enabled = true; + immediate_logging = log_immediately; + + if (immediate_logging) { + return; + } + + log_write (LOG_TIMING, LogLevel::Info, "[2/1] To get timing results, send the mono.android.app.DUMP_TIMING_DATA intent to the application"); +} + +void +FastTiming::dump () noexcept +{ + if (immediate_logging) { + return; + } + + StartupAwareLock lock { event_vector_realloc_mutex }; + size_t entries = next_event_index.load (); + + log_write (LOG_TIMING, LogLevel::Info, "[2/2] Performance measurement results"); + if (entries == 0) { + log_write (LOG_TIMING, LogLevel::Info, "[2/3] No events logged"); + return; + } + + dynamic_local_string message; + + // Values are in nanoseconds + uint64_t total_assembly_load_time = 0u; + uint64_t total_java_to_managed_time = 0u; + uint64_t total_managed_to_java_time = 0u; + uint64_t total_ns; + + format_and_log (init_time, message, total_ns, true /* indent */); + for (size_t i = 0uz; i < entries; i++) { + TimingEvent const& event = events[i]; + format_and_log (event, message, total_ns, true /* indent */); + + switch (event.kind) { + case TimingEventKind::AssemblyLoad: + total_assembly_load_time += total_ns; + break; + + case TimingEventKind::JavaToManaged: + total_java_to_managed_time += total_ns; + break; + + case TimingEventKind::ManagedToJava: + total_managed_to_java_time += total_ns; + break; + + default: + // Ignore other kinds + break; + } + } + + uint32_t sec, ms, ns; + log_write (LOG_TIMING, LogLevel::Info, "[2/4] Accumulated performance results"); + + ns_to_time (total_assembly_load_time, sec, ms, ns); + log_info_nocheck (LOG_TIMING, " [2/5] Assembly load: {}:{}::{}", sec, ms, ns); + + ns_to_time (total_java_to_managed_time, sec, ms, ns); + log_info_nocheck (LOG_TIMING, " [2/6] Java to Managed lookup: {}:{}::{}", sec, ms, ns); + + ns_to_time (total_managed_to_java_time, sec, ms, ns); + log_info_nocheck (LOG_TIMING, " [2/7] Managed to Java lookup: {}:{}::{}", sec, ms, ns); +} diff --git a/src/native/clr/runtime-base/timing.cc b/src/native/clr/runtime-base/timing.cc new file mode 100644 index 00000000000..930139e06e4 --- /dev/null +++ b/src/native/clr/runtime-base/timing.cc @@ -0,0 +1,14 @@ +#include +#include + +using namespace xamarin::android; + +void timing_point::mark () +{ + FastTiming::get_time (sec, ns); +} + +timing_diff::timing_diff (const timing_period &period) +{ + FastTiming::calculate_interval (period.start, period.end, *this); +} diff --git a/src/native/clr/runtime-base/util.cc b/src/native/clr/runtime-base/util.cc new file mode 100644 index 00000000000..6cce7591a6a --- /dev/null +++ b/src/native/clr/runtime-base/util.cc @@ -0,0 +1,82 @@ +#include +#include + +#include + +#include +#include + +using namespace xamarin::android; + +int +Util::create_directory (const char *pathname, mode_t mode) +{ + // if (mode <= 0) + // mode = DEFAULT_DIRECTORY_MODE; + + // if (!pathname || *pathname == '\0') { + // errno = EINVAL; + // return -1; + // } + // mode_t oldumask = umask (022); + // std::unique_ptr path {strdup_new (pathname)}; + // int rv, ret = 0; + // for (char *d = path.get (); d != nullptr && *d; ++d) { + // if (*d != '/') + // continue; + // *d = 0; + // if (*path) { + // rv = make_directory (path.get (), mode); + // if (rv == -1 && errno != EEXIST) { + // ret = -1; + // break; + // } + // } + // *d = '/'; + // } + + // if (ret == 0) + // ret = make_directory (pathname, mode); + // umask (oldumask); + + // return ret; + return -1; +} + +void +Util::create_public_directory (std::string_view const& dir) +{ + mode_t m = umask (0); + int ret = mkdir (dir.data (), 0777); + if (ret < 0) { + log_warn (LOG_DEFAULT, "Failed to create directory '{}'. {}", dir, std::strerror (errno)); + } + umask (m); +} + +auto +Util::monodroid_fopen (std::string_view const& filename, std::string_view const& mode) noexcept -> FILE* +{ + /* On Unix, both path and system calls are all assumed + * to be UTF-8 compliant. + */ + FILE *ret = fopen (filename.data (), mode.data ()); + if (ret == nullptr) { + log_error (LOG_DEFAULT, "fopen failed for file {}: {}", filename, strerror (errno)); + return nullptr; + } + + return ret; +} + +void Util::set_world_accessable (std::string_view const& path) +{ + int r; + do { + r = chmod (path.data (), 0664); + } while (r == -1 && errno == EINTR); + + if (r == -1) { + log_error (LOG_DEFAULT, "chmod(\"{}\", 0664) failed: {}", path, strerror (errno)); + } +} diff --git a/src/native/clr/shared/CMakeLists.txt b/src/native/clr/shared/CMakeLists.txt new file mode 100644 index 00000000000..aa6062066a6 --- /dev/null +++ b/src/native/clr/shared/CMakeLists.txt @@ -0,0 +1,50 @@ +set(LIB_NAME xa-shared-bits) +set(LIB_ALIAS xa::shared) + +set(XA_SHARED_SOURCES + helpers.cc + log_functions.cc +) +add_clang_check_sources("${XA_SHARED_SOURCES};") + +add_library( + ${LIB_NAME} + STATIC + ${XA_SHARED_SOURCES} +) +add_library(${LIB_ALIAS} ALIAS ${LIB_NAME}) + +set_static_library_suffix(${LIB_NAME}) + +macro(lib_target_options TARGET_NAME) + target_include_directories( + ${TARGET_NAME} + PUBLIC + "$" + "$" + ) + + target_link_libraries( + ${TARGET_NAME} + PUBLIC + xa::java-interop + -llog + ) + + target_include_directories( + ${TARGET_NAME} + SYSTEM PRIVATE + ${SYSROOT_CXX_INCLUDE_DIR} + ) + + target_compile_options( + ${TARGET_NAME} + PRIVATE + ${XA_COMMON_CXX_ARGS} + ) + + xa_add_compile_definitions(${TARGET_NAME}) + xa_add_include_directories(${TARGET_NAME}) +endmacro() + +lib_target_options(${LIB_NAME}) diff --git a/src/native/clr/shared/helpers.cc b/src/native/clr/shared/helpers.cc new file mode 100644 index 00000000000..7850592af5a --- /dev/null +++ b/src/native/clr/shared/helpers.cc @@ -0,0 +1,46 @@ +#include +#include +#include + +#include +#include + +using namespace xamarin::android; + +[[noreturn]] void +Helpers::abort_application (LogCategories category, const char *message, bool log_location, std::source_location sloc) noexcept +{ + // Log it, but also... + log_fatal (category, "{}", message); + + // ...let android include it in the tombstone, debuggerd output, stack trace etc + android_set_abort_message (message); + + if (log_location) { + // We don't want to log the full path, just the file name. libc++ uses full file path here. + const char *file_name = sloc.file_name (); + const char *last_path_sep = strrchr (file_name, '/'); + + if (last_path_sep == nullptr) [[unlikely]] { + // In case we were built on Windows + last_path_sep = strrchr (file_name, '\\'); + } + + if (last_path_sep != nullptr) [[likely]] { + last_path_sep++; + if (*last_path_sep != '\0') [[unlikely]] { + file_name = last_path_sep; + } + } + + log_fatal ( + category, + "Abort at {}:{}:{} ('{}')", + file_name, + sloc.line (), + sloc.column (), + sloc.function_name () + ); + } + std::abort (); +} diff --git a/src/native/clr/shared/log_functions.cc b/src/native/clr/shared/log_functions.cc new file mode 100644 index 00000000000..acd5e705c06 --- /dev/null +++ b/src/native/clr/shared/log_functions.cc @@ -0,0 +1,131 @@ +#include +#include +#include +#include + +#include + +#include "java-interop-logger.h" +#include +#include + +using namespace xamarin::android; + +namespace { + // Must match the same ordering as LogCategories + constexpr std::array log_names = { + Constants::LOG_CATEGORY_NAME_NONE, + Constants::LOG_CATEGORY_NAME_MONODROID, + Constants::LOG_CATEGORY_NAME_MONODROID_ASSEMBLY, + Constants::LOG_CATEGORY_NAME_MONODROID_DEBUG, + Constants::LOG_CATEGORY_NAME_MONODROID_GC, + Constants::LOG_CATEGORY_NAME_MONODROID_GREF, + Constants::LOG_CATEGORY_NAME_MONODROID_LREF, + Constants::LOG_CATEGORY_NAME_MONODROID_TIMING, + Constants::LOG_CATEGORY_NAME_MONODROID_BUNDLE, + Constants::LOG_CATEGORY_NAME_MONODROID_NETWORK, + Constants::LOG_CATEGORY_NAME_MONODROID_NETLINK, + Constants::LOG_CATEGORY_NAME_ERROR, + }; + + [[gnu::always_inline]] + constexpr auto category_name (int value) noexcept -> const char* + { + if (value == 0) { + return log_names[0].data (); + } + + // ffs(value) returns index of lowest bit set in `value` + return log_names [static_cast(ffs (value))].data (); + } + + constexpr android_LogPriority DEFAULT_PRIORITY = ANDROID_LOG_INFO; + + // relies on the fact that the LogLevel enum has sequential values + constexpr android_LogPriority loglevel_map[] = { + DEFAULT_PRIORITY, // Unknown + DEFAULT_PRIORITY, // Default + ANDROID_LOG_VERBOSE, // Verbose + ANDROID_LOG_DEBUG, // Debug + ANDROID_LOG_INFO, // Info + ANDROID_LOG_WARN, // Warn + ANDROID_LOG_ERROR, // Error + ANDROID_LOG_FATAL, // Fatal + ANDROID_LOG_SILENT, // Silent + }; + + constexpr size_t loglevel_map_max_index = (sizeof(loglevel_map) / sizeof(android_LogPriority)) - 1; +} + +unsigned int log_categories = LOG_NONE; + +#undef DO_LOG +#define DO_LOG(_level_,_category_,_format_,_args_) \ + va_start ((_args_), (_format_)); \ + __android_log_vprint ((_level_), category_name((_category_)), (_format_), (_args_)); \ + va_end ((_args_)); + +void +log_error (LogCategories category, const char *format, ...) +{ + va_list args; + + DO_LOG (ANDROID_LOG_ERROR, category, format, args); +} + +void +log_fatal (LogCategories category, const char *format, ...) +{ + va_list args; + + DO_LOG (ANDROID_LOG_FATAL, category, format, args); +} + +void +log_info_nocheck (LogCategories category, const char *format, ...) +{ + va_list args; + + if ((log_categories & category) != category) { + return; + } + + DO_LOG (ANDROID_LOG_INFO, category, format, args); +} + +void +log_warn (LogCategories category, const char *format, ...) +{ + va_list args; + + DO_LOG (ANDROID_LOG_WARN, category, format, args); +} + +void +log_debug_nocheck (LogCategories category, const char *format, ...) +{ + va_list args; + + if ((log_categories & category) != category) { + return; + } + + DO_LOG (ANDROID_LOG_DEBUG, category, format, args); +} + +namespace xamarin::android { + void + log_write (LogCategories category, LogLevel level, const char *message) noexcept + { + size_t map_index = static_cast(level); + android_LogPriority priority; + + if (map_index > loglevel_map_max_index) { + priority = DEFAULT_PRIORITY; + } else { + priority = loglevel_map[map_index]; + } + + __android_log_write (priority, category_name (category), message); + } +} diff --git a/src/native/clr/startup/CMakeLists.txt b/src/native/clr/startup/CMakeLists.txt new file mode 100644 index 00000000000..48600e115e8 --- /dev/null +++ b/src/native/clr/startup/CMakeLists.txt @@ -0,0 +1,53 @@ +set(LIB_NAME xamarin-startup) +set(LIB_ALIAS xa::xamarin-startup) + +set(XAMARIN_STARTUP_SOURCES + zip.cc +) +add_clang_check_sources("${XAMARIN_STARTUP_SOURCES}") + +add_library( + ${LIB_NAME} + STATIC + ${XAMARIN_STARTUP_SOURCES} +) + +add_library(${LIB_ALIAS} ALIAS ${LIB_NAME}) +set_static_library_suffix(${LIB_NAME}) + +target_include_directories( + ${LIB_NAME} + SYSTEM PRIVATE + ${SYSROOT_CXX_INCLUDE_DIR} +) + +target_compile_options( + ${LIB_NAME} + PRIVATE + ${XA_COMMON_CXX_ARGS} + # Avoid the 'warning: dynamic exception specifications are deprecated' warning from libc++ headers + -Wno-deprecated-dynamic-exception-spec +) + +target_link_directories( + ${LIB_NAME} + PRIVATE + ${NET_RUNTIME_DIR}/native +) + +target_link_options( + ${LIB_NAME} + PRIVATE + ${XA_COMMON_CXX_LINKER_ARGS} + ${XA_CXX_DSO_LINKER_ARGS} +) + +target_link_libraries( + ${LIB_NAME} + PRIVATE + xa::shared + -llog +) + +xa_add_compile_definitions(${LIB_NAME}) +xa_add_include_directories(${LIB_NAME}) diff --git a/src/native/clr/startup/zip.cc b/src/native/clr/startup/zip.cc new file mode 100644 index 00000000000..0c5413fb2d6 --- /dev/null +++ b/src/native/clr/startup/zip.cc @@ -0,0 +1,488 @@ +#include + +#include +#include +#include +#include + +#include +#include +#include +#include + +using namespace xamarin::android; + +[[gnu::always_inline]] +std::tuple Zip::get_assemblies_prefix_and_length () noexcept +{ + return {lib_prefix.data (), lib_prefix.size () }; +} + +[[gnu::always_inline]] +bool Zip::zip_adjust_data_offset (int fd, zip_scan_state &state) noexcept +{ + static constexpr size_t LH_FILE_NAME_LENGTH_OFFSET = 26uz; + static constexpr size_t LH_EXTRA_LENGTH_OFFSET = 28uz; + + off_t result = ::lseek (fd, static_cast(state.local_header_offset), SEEK_SET); + if (result < 0) { + log_error ( + LOG_ASSEMBLY, + "Failed to seek to archive entry local header at offset {}. {} (result: {}; errno: {})", + state.local_header_offset, std::strerror (errno), result, errno + ); + return false; + } + + std::array local_header; + std::array signature; + + ssize_t nread = ::read (fd, local_header.data (), local_header.size ()); + if (nread < 0 || nread != ZIP_LOCAL_LEN) { + log_error (LOG_ASSEMBLY, "Failed to read local header at offset {}: {} (nread: {}; errno: {})", state.local_header_offset, std::strerror (errno), nread, errno); + return false; + } + + size_t index = 0; + if (!zip_read_field (local_header, index, signature)) { + log_error (LOG_ASSEMBLY, "Failed to read Local Header entry signature at offset {}", state.local_header_offset); + return false; + } + + if (memcmp (signature.data (), ZIP_LOCAL_MAGIC.data (), signature.size ()) != 0) { + log_error (LOG_ASSEMBLY, "Invalid Local Header entry signature at offset {}", state.local_header_offset); + return false; + } + + uint16_t file_name_length; + index = LH_FILE_NAME_LENGTH_OFFSET; + if (!zip_read_field (local_header, index, file_name_length)) { + log_error (LOG_ASSEMBLY, "Failed to read Local Header 'file name length' field at offset {}", (state.local_header_offset + index)); + return false; + } + + uint16_t extra_field_length; + index = LH_EXTRA_LENGTH_OFFSET; + if (!zip_read_field (local_header, index, extra_field_length)) { + log_error (LOG_ASSEMBLY, "Failed to read Local Header 'extra field length' field at offset {}", (state.local_header_offset + index)); + return false; + } + + state.data_offset = static_cast(state.local_header_offset) + file_name_length + extra_field_length + local_header.size (); + + return true; +} + +[[gnu::always_inline]] +bool Zip::zip_read_entry_info (std::vector const& buf, dynamic_local_string& file_name, zip_scan_state &state) noexcept +{ + constexpr size_t CD_COMPRESSION_METHOD_OFFSET = 10uz; + constexpr size_t CD_UNCOMPRESSED_SIZE_OFFSET = 24uz; + constexpr size_t CD_FILENAME_LENGTH_OFFSET = 28uz; + constexpr size_t CD_EXTRA_LENGTH_OFFSET = 30uz; + constexpr size_t CD_LOCAL_HEADER_POS_OFFSET = 42uz; + constexpr size_t CD_COMMENT_LENGTH_OFFSET = 32uz; + + size_t index = state.buf_offset; + zip_ensure_valid_params (buf, index, ZIP_CENTRAL_LEN); + + std::array signature; + if (!zip_read_field (buf, index, signature)) { + log_error (LOG_ASSEMBLY, "Failed to read Central Directory entry signature"sv); + return false; + } + + if (memcmp (signature.data (), ZIP_CENTRAL_MAGIC.data (), signature.size ()) != 0) { + log_error (LOG_ASSEMBLY, "Invalid Central Directory entry signature"sv); + return false; + } + + index = state.buf_offset + CD_COMPRESSION_METHOD_OFFSET; + if (!zip_read_field (buf, index, state.compression_method)) { + log_error (LOG_ASSEMBLY, "Failed to read Central Directory entry 'compression method' field"sv); + return false; + } + + index = state.buf_offset + CD_UNCOMPRESSED_SIZE_OFFSET;; + if (!zip_read_field (buf, index, state.file_size)) { + log_error (LOG_ASSEMBLY, "Failed to read Central Directory entry 'uncompressed size' field"sv); + return false; + } + + uint16_t file_name_length; + index = state.buf_offset + CD_FILENAME_LENGTH_OFFSET; + if (!zip_read_field (buf, index, file_name_length)) { + log_error (LOG_ASSEMBLY, "Failed to read Central Directory entry 'file name length' field"sv); + return false; + } + + uint16_t extra_field_length; + index = state.buf_offset + CD_EXTRA_LENGTH_OFFSET; + if (!zip_read_field (buf, index, extra_field_length)) { + log_error (LOG_ASSEMBLY, "Failed to read Central Directory entry 'extra field length' field"sv); + return false; + } + + uint16_t comment_length; + index = state.buf_offset + CD_COMMENT_LENGTH_OFFSET; + if (!zip_read_field (buf, index, comment_length)) { + log_error (LOG_ASSEMBLY, "Failed to read Central Directory entry 'file comment length' field"sv); + return false; + } + + index = state.buf_offset + CD_LOCAL_HEADER_POS_OFFSET; + if (!zip_read_field (buf, index, state.local_header_offset)) { + log_error (LOG_ASSEMBLY, "Failed to read Central Directory entry 'relative offset of local header' field"sv); + return false; + } + index += sizeof(state.local_header_offset); + + if (file_name_length == 0) { + file_name.clear (); + } else if (!zip_read_field (buf, index, file_name_length, file_name)) { + log_error (LOG_ASSEMBLY, "Failed to read Central Directory entry 'file name' field"sv); + return false; + } + + state.buf_offset += ZIP_CENTRAL_LEN + file_name_length + extra_field_length + comment_length; + return true; +} + +bool Zip::zip_load_entry_common (size_t entry_index, std::vector const& buf, dynamic_local_string &entry_name, zip_scan_state &state) noexcept +{ + entry_name.clear (); + + bool result = zip_read_entry_info (buf, entry_name, state); + + log_debug (LOG_ASSEMBLY, "{} entry: {}", state.file_name, optional_string (entry_name.get (), "unknown")); + if (!result || entry_name.empty ()) { + Helpers::abort_application ( + LOG_ASSEMBLY, + std::format ( + "Failed to read Central Directory info for entry {} in APK {}", + entry_index, + state.file_name + ) + ); + } + + if (!zip_adjust_data_offset (state.file_fd, state)) { + Helpers::abort_application ( + LOG_ASSEMBLY, + std::format ( + "Failed to adjust data start offset for entry {} in APK {}", + entry_index, + state.file_name + ) + ); + } + + log_debug (LOG_ASSEMBLY, " ZIP: local header offset: {}; data offset: {}; file size: {}", state.local_header_offset, state.data_offset, state.file_size); + if (state.compression_method != 0) { + return false; + } + + if (entry_name.get ()[0] != state.prefix[0] || entry_name.length () < state.prefix_len || memcmp (state.prefix, entry_name.get (), state.prefix_len) != 0) { + // state.prefix and lib_prefix can point to the same location, see get_assemblies_prefix_and_length() + // In such instance we short-circuit and avoid a couple of comparisons below. + if (state.prefix == lib_prefix.data ()) { + return false; + } + + if (entry_name.get ()[0] != lib_prefix[0] || memcmp (lib_prefix.data (), entry_name.get (), lib_prefix.size () - 1) != 0) { + return false; + } + } + + // assemblies must be 16-byte or 4-byte aligned, or Bad Things happen + if (((state.data_offset & 0xf) != 0) || ((state.data_offset & 0x3) != 0)) { + std::string_view::size_type pos = state.file_name.find_last_of ('/'); + if (pos == state.file_name.npos) { + pos = 0; + } else { + pos++; + } + std::string_view const& name_no_path = state.file_name.substr (pos); + + Helpers::abort_application ( + LOG_ASSEMBLY, + std::format ( + "Assembly '{}' is at bad offset {} in the APK (not aligned to 4 or 16 bytes). 'zipalign' MUST be used on {} to align it properly", + optional_string (entry_name.get ()), + state.data_offset, + name_no_path + ) + ); + } + + return true; +} + +template [[gnu::always_inline]] +bool Zip::zip_extract_cd_info (std::array const& buf, uint32_t& cd_offset, uint32_t& cd_size, uint16_t& cd_entries) noexcept +{ + constexpr size_t EOCD_TOTAL_ENTRIES_OFFSET = 10uz; + constexpr size_t EOCD_CD_SIZE_OFFSET = 12uz; + constexpr size_t EOCD_CD_START_OFFSET = 16uz; + + static_assert (BufSize >= ZIP_EOCD_LEN, "Buffer too short for EOCD"); + + if (!zip_read_field (buf, EOCD_TOTAL_ENTRIES_OFFSET, cd_entries)) { + log_error (LOG_ASSEMBLY, "Failed to read EOCD 'total number of entries' field"sv); + return false; + } + + if (!zip_read_field (buf, EOCD_CD_START_OFFSET, cd_offset)) { + log_error (LOG_ASSEMBLY, "Failed to read EOCD 'central directory size' field"sv); + return false; + } + + if (!zip_read_field (buf, EOCD_CD_SIZE_OFFSET, cd_size)) { + log_error (LOG_ASSEMBLY, "Failed to read EOCD 'central directory offset' field"sv); + return false; + } + + return true; +} + +template [[gnu::always_inline]] +bool Zip::zip_ensure_valid_params (T const& buf, size_t index, size_t to_read) noexcept +{ + if (index + to_read > buf.size ()) { + log_error (LOG_ASSEMBLY, "Buffer too short to read {} bytes of data", to_read); + return false; + } + + return true; +} + +template [[gnu::always_inline]] +bool Zip::zip_read_field (T const& src, size_t source_index, uint16_t& dst) noexcept +{ + if (!zip_ensure_valid_params (src, source_index, sizeof (dst))) { + return false; + } + + dst = static_cast((src [source_index + 1] << 8) | src [source_index]); + return true; +} + +template [[gnu::always_inline]] +bool Zip::zip_read_field (T const& src, size_t source_index, uint32_t& dst) noexcept +{ + if (!zip_ensure_valid_params (src, source_index, sizeof (dst))) { + return false; + } + + dst = + (static_cast (src [source_index + 3]) << 24) | + (static_cast (src [source_index + 2]) << 16) | + (static_cast (src [source_index + 1]) << 8) | + (static_cast (src [source_index + 0])); + + return true; +} + +template [[gnu::always_inline]] +bool Zip::zip_read_field (T const& src, size_t source_index, std::array& dst_sig) noexcept +{ + if (!zip_ensure_valid_params (src, source_index, dst_sig.size ())) { + return false; + } + + memcpy (dst_sig.data (), src.data () + source_index, dst_sig.size ()); + return true; +} + +template [[gnu::always_inline]] +bool Zip::zip_read_field (T const& buf, size_t index, size_t count, dynamic_local_string& characters) noexcept +{ + if (!zip_ensure_valid_params (buf, index, count)) { + return false; + } + + characters.assign (reinterpret_cast(buf.data () + index), count); + return true; +} + +[[gnu::always_inline]] +bool Zip::zip_read_cd_info (int apk_fd, uint32_t& cd_offset, uint32_t& cd_size, uint16_t& cd_entries) noexcept +{ + // The simplest case - no file comment + off_t ret = ::lseek (apk_fd, -ZIP_EOCD_LEN, SEEK_END); + if (ret < 0) { + log_error (LOG_ASSEMBLY, "Unable to seek into the APK to find ECOD: {} (ret: {}; errno: {})", std::strerror (errno), ret, errno); + return false; + } + + std::array eocd; + ssize_t nread = ::read (apk_fd, eocd.data (), eocd.size ()); + if (nread < 0 || nread != eocd.size ()) { + log_error (LOG_ASSEMBLY, "Failed to read EOCD from the APK: {} (nread: {}; errno: {})", std::strerror (errno), nread, errno); + return false; + } + + size_t index = 0uz; // signature + std::array signature; + + if (!zip_read_field (eocd, index, signature)) { + log_error (LOG_ASSEMBLY, "Failed to read EOCD signature"sv); + return false; + } + + if (memcmp (signature.data (), ZIP_EOCD_MAGIC.data (), signature.size ()) == 0) { + return zip_extract_cd_info (eocd, cd_offset, cd_size, cd_entries); + } + + // Most probably a ZIP with comment + constexpr size_t alloc_size = 65535uz + ZIP_EOCD_LEN; // 64k is the biggest comment size allowed + ret = ::lseek (apk_fd, static_cast(-alloc_size), SEEK_END); + if (ret < 0) { + log_error (LOG_ASSEMBLY, "Unable to seek into the file to find ECOD before APK comment: {} (ret: {}; errno: {})", std::strerror (errno), ret, errno); + return false; + } + + std::vector buf (alloc_size); + + nread = ::read (apk_fd, buf.data (), buf.size ()); + + if (nread < 0 || static_cast(nread) != alloc_size) { + log_error (LOG_ASSEMBLY, "Failed to read EOCD and comment from the APK: {} (nread: {}; errno: {})", std::strerror (errno), nread, errno); + return false; + } + + // We scan from the end to save time + bool found = false; + const uint8_t* data = buf.data (); + for (ssize_t i = static_cast(alloc_size - (ZIP_EOCD_LEN + 2)); i >= 0z; i--) { + if (memcmp (data + i, ZIP_EOCD_MAGIC.data (), sizeof(ZIP_EOCD_MAGIC)) != 0) + continue; + + found = true; + memcpy (eocd.data (), data + i, ZIP_EOCD_LEN); + break; + } + + if (!found) { + log_error (LOG_ASSEMBLY, "Unable to find EOCD in the APK (with comment)"sv); + return false; + } + + return zip_extract_cd_info (eocd, cd_offset, cd_size, cd_entries); +} + +[[gnu::always_inline]] +bool Zip::zip_scan_entries (int apk_fd, std::string_view const& apk_path, ScanCallbackFn entry_cb) noexcept +{ + uint32_t cd_offset; + uint32_t cd_size; + uint16_t cd_entries; + + if (!zip_read_cd_info (apk_fd, cd_offset, cd_size, cd_entries)) { + Helpers::abort_application ( + LOG_ASSEMBLY, + std::format ( + "Failed to read the EOCD record from APK file %s", + apk_path + ) + ); + } + + log_debug (LOG_ASSEMBLY, "Central directory offset: {}", cd_offset); + log_debug (LOG_ASSEMBLY, "Central directory size: {}", cd_size); + log_debug (LOG_ASSEMBLY, "Central directory entries: {}", cd_entries); + + off_t retval = ::lseek (apk_fd, static_cast(cd_offset), SEEK_SET); + if (retval < 0) { + Helpers::abort_application ( + LOG_ASSEMBLY, + std::format ( + "Failed to seek to central directory position in APK: {}. retval={} errno={}, File={}", + std::strerror (errno), + retval, + errno, + apk_path + ) + ); + } + + std::vector buf (cd_size); + const auto [prefix, prefix_len] = get_assemblies_prefix_and_length (); + zip_scan_state state { + .file_fd = apk_fd, + .file_name = apk_path, + .prefix = prefix, + .prefix_len = prefix_len, + .buf_offset = 0uz, + .compression_method = 0u, + .local_header_offset = 0u, + .data_offset = 0u, + .file_size = 0u, + .bundled_assemblies_slow_path = false, + .max_assembly_name_size = 0u, + .max_assembly_file_name_size = 0u, + }; + + ssize_t nread; + do { + nread = read (apk_fd, buf.data (), buf.size ()); + } while (nread < 0 && errno == EINTR); + + if (static_cast(nread) != cd_size) { + Helpers::abort_application ( + LOG_ASSEMBLY, + std::format ( + "Failed to read Central Directory from APK: {}. nread={} errno={} File={}", + std::strerror (errno), + nread, + errno, + apk_path + ) + ); + } + + dynamic_local_string entry_name; + bool keep_archive_open = false; + + for (size_t i = 0uz; i < cd_entries; i++) { + bool interesting_entry = zip_load_entry_common (i, buf, entry_name, state); + if (!interesting_entry) { + continue; + } + + keep_archive_open |= entry_cb (apk_path, apk_fd, entry_name, state.data_offset, state.file_size); + } + + return keep_archive_open; +} + +void Zip::scan_archive (std::string_view const& apk_path, ScanCallbackFn entry_cb) noexcept +{ + int fd; + do { + fd = open (apk_path.data (), O_RDONLY); + } while (fd < 0 && errno == EINTR); + + if (fd < 0) { + Helpers::abort_application ( + LOG_ASSEMBLY, + std::format ( + "ERROR: Unable to load application package {}. {}", + apk_path, strerror (errno) + ) + ); + } + log_debug (LOG_ASSEMBLY, "APK {} FD: {}", apk_path, fd); + if (!zip_scan_entries (fd, apk_path, entry_cb)) { + return; + } + + if (close (fd) < 0) { + log_warn ( + LOG_ASSEMBLY, + "Failed to close file descriptor for {}. {}", + apk_path, + strerror (errno) + ); + } +} diff --git a/src/native/clr/xamarin-app-stub/CMakeLists.txt b/src/native/clr/xamarin-app-stub/CMakeLists.txt new file mode 100644 index 00000000000..c883ce2a2cb --- /dev/null +++ b/src/native/clr/xamarin-app-stub/CMakeLists.txt @@ -0,0 +1,54 @@ +set(LIB_NAME xamarin-app) +set(LIB_ALIAS xa::xamarin-app) + +set(XAMARIN_APP_SOURCES + application_dso_stub.cc +) + +add_library( + ${LIB_NAME} + SHARED + ${XAMARIN_APP_SOURCES} +) + +add_library(${LIB_ALIAS} ALIAS ${LIB_NAME}) + +target_include_directories( + ${LIB_NAME} + SYSTEM PRIVATE + ${SYSROOT_CXX_INCLUDE_DIR} +) + +target_compile_options( + ${LIB_NAME} + PRIVATE + ${XA_COMMON_CXX_ARGS} +) + +target_link_options( + ${LIB_NAME} + PRIVATE + ${XA_COMMON_CXX_LINKER_ARGS} + ${XA_CXX_DSO_LINKER_ARGS} +) + +target_link_libraries( + ${LIB_NAME} + PRIVATE + ${SHARED_LIB_NAME} +) + +if(DEBUG_BUILD) + set(LIB_SUBDIR "Debug") +else() + set(LIB_SUBDIR "Release") +endif() + +set_target_properties( + ${LIB_NAME} + PROPERTIES + LIBRARY_OUTPUT_DIRECTORY "${CMAKE_LIBRARY_OUTPUT_DIRECTORY}/${LIB_SUBDIR}" +) + +xa_add_compile_definitions(${LIB_NAME}) +xa_add_include_directories(${LIB_NAME}) diff --git a/src/native/clr/xamarin-app-stub/application_dso_stub.cc b/src/native/clr/xamarin-app-stub/application_dso_stub.cc new file mode 100644 index 00000000000..0e355298d40 --- /dev/null +++ b/src/native/clr/xamarin-app-stub/application_dso_stub.cc @@ -0,0 +1,364 @@ +#include +#include + +#include +#include + +// This file MUST have "valid" values everywhere - the DSO it is compiled into is loaded by the +// designer on desktop. +const uint64_t format_tag = FORMAT_TAG; + +#if defined (DEBUG) +static TypeMapEntry java_to_managed[] = {}; + +static TypeMapEntry managed_to_java[] = {}; + +// MUST match src/Xamarin.Android.Build.Tasks/Utilities/TypeMappingDebugNativeAssemblyGenerator.cs +const TypeMap type_map = { + 0, + nullptr, + nullptr, + java_to_managed, + managed_to_java +}; +#else +const uint32_t map_module_count = 0; +const uint32_t java_type_count = 0; +const char* const java_type_names[] = {}; + +TypeMapModule map_modules[] = {}; +const TypeMapJava map_java[] = {}; +const xamarin::android::hash_t map_java_hashes[] = {}; +#endif + +CompressedAssemblies compressed_assemblies = { + .count = 0, + .descriptors = nullptr, +}; + +// +// Config settings below **must** be valid for Desktop builds as the default `libxamarin-app.{dll,dylib,so}` is used by +// the Designer +// +constexpr char android_package_name[] = "com.xamarin.test"; +const ApplicationConfig application_config = { + .uses_assembly_preload = false, + .jni_add_native_method_registration_attribute_present = false, + .marshal_methods_enabled = false, + .ignore_split_configs = false, + .number_of_runtime_properties = 3, + .package_naming_policy = 0, + .environment_variable_count = 0, + .system_property_count = 0, + .number_of_assemblies_in_apk = 2, + .bundled_assembly_name_width = 0, + .number_of_dso_cache_entries = 2, + .number_of_aot_cache_entries = 2, + .number_of_shared_libraries = 2, + .android_runtime_jnienv_class_token = 1, + .jnienv_initialize_method_token = 2, + .jnienv_registerjninatives_method_token = 3, + .jni_remapping_replacement_type_count = 2, + .jni_remapping_replacement_method_index_entry_count = 2, + .android_package_name = android_package_name, +}; + +// TODO: migrate to std::string_view for these two +const char* const app_environment_variables[] = {}; +const char* const app_system_properties[] = {}; + +static constexpr size_t AssemblyNameWidth = 128uz; + +static char first_assembly_name[AssemblyNameWidth]; +static char second_assembly_name[AssemblyNameWidth]; + +XamarinAndroidBundledAssembly bundled_assemblies[] = { + { + .file_fd = -1, + .file_name = nullptr, + .data_offset = 0, + .data_size = 0, + .data = nullptr, + .name_length = 0, + .name = first_assembly_name, + }, + + { + .file_fd = -1, + .file_name = nullptr, + .data_offset = 0, + .data_size = 0, + .data = nullptr, + .name_length = 0, + .name = second_assembly_name, + }, +}; + +AssemblyStoreSingleAssemblyRuntimeData assembly_store_bundled_assemblies[] = { + { + .image_data = nullptr, + .debug_info_data = nullptr, + .config_data = nullptr, + .descriptor = nullptr, + }, + + { + .image_data = nullptr, + .debug_info_data = nullptr, + .config_data = nullptr, + .descriptor = nullptr, + }, +}; + +AssemblyStoreRuntimeData assembly_store = { + .data_start = nullptr, + .assembly_count = 0, + .index_entry_count = 0, + .assemblies = nullptr, +}; + +constexpr char fake_dso_name[] = "libaot-Some.Assembly.dll.so"; +constexpr char fake_dso_name2[] = "libaot-Another.Assembly.dll.so"; + +DSOCacheEntry dso_cache[] = { + { + .hash = xamarin::android::xxhash::hash (fake_dso_name, sizeof(fake_dso_name) - 1), + .real_name_hash = xamarin::android::xxhash::hash (fake_dso_name, sizeof(fake_dso_name) - 1), + .ignore = true, + .name = fake_dso_name, + .handle = nullptr, + }, + + { + .hash = xamarin::android::xxhash::hash (fake_dso_name2, sizeof(fake_dso_name2) - 1), + .real_name_hash = xamarin::android::xxhash::hash (fake_dso_name2, sizeof(fake_dso_name2) - 1), + .ignore = true, + .name = fake_dso_name2, + .handle = nullptr, + }, +}; + +DSOCacheEntry aot_dso_cache[] = { + { + .hash = xamarin::android::xxhash::hash (fake_dso_name, sizeof(fake_dso_name) - 1), + .real_name_hash = xamarin::android::xxhash::hash (fake_dso_name, sizeof(fake_dso_name) - 1), + .ignore = true, + .name = fake_dso_name, + .handle = nullptr, + }, + + { + .hash = xamarin::android::xxhash::hash (fake_dso_name2, sizeof(fake_dso_name2) - 1), + .real_name_hash = xamarin::android::xxhash::hash (fake_dso_name2, sizeof(fake_dso_name2) - 1), + .ignore = true, + .name = fake_dso_name2, + .handle = nullptr, + }, +}; + +DSOApkEntry dso_apk_entries[2] {}; + +// +// Support for marshal methods +// +#if defined (RELEASE) +void* assembly_image_cache[] = { + nullptr, + nullptr, + +}; + +// Each element contains an index into `assembly_image_cache` +const uint32_t assembly_image_cache_indices[] = { + 0, + 1, + 1, + 1, +}; + +// hashes point to indices in `assembly_image_cache_indices` +const xamarin::android::hash_t assembly_image_cache_hashes[] = { + 0, + 1, + 2, + 3, +}; + +uint32_t marshal_methods_number_of_classes = 2; +MarshalMethodsManagedClass marshal_methods_class_cache[] = { + { + .token = 0, + .klass = nullptr, + }, + + { + .token = 0, + .klass = nullptr, + }, +}; + +const char* const mm_class_names[2] = { + "one", + "two", +}; + +const MarshalMethodName mm_method_names[] = { + { + .id = 1, + .name = "one", + }, + + { + .id = 2, + .name = "two", + }, +}; + +void xamarin_app_init ([[maybe_unused]] JNIEnv *env, [[maybe_unused]] get_function_pointer_fn fn) noexcept +{ + // Dummy +} +#endif // def RELEASE + +static const JniRemappingIndexMethodEntry some_java_type_one_methods[] = { + { + .name = { + .length = 15, + .str = "old_method_name", + }, + + .signature = { + .length = 0, + .str = nullptr, + }, + + .replacement = { + .target_type = "some/java/target_type_one", + .target_name = "new_method_name", + .is_static = false, + } + }, +}; + +static const JniRemappingIndexMethodEntry some_java_type_two_methods[] = { + { + .name = { + .length = 15, + .str = "old_method_name", + }, + + .signature = { + .length = 28, + .str = "(IILandroid/content/Intent;)", + }, + + .replacement = { + .target_type = "some/java/target_type_two", + .target_name = "new_method_name", + .is_static = true, + } + }, +}; + +const JniRemappingIndexTypeEntry jni_remapping_method_replacement_index[] = { + { + .name = { + .length = 18, + .str = "some/java/type_one", + }, + .method_count = 1, + .methods = some_java_type_one_methods, + }, + + { + .name = { + .length = 18, + .str = "some/java/type_two", + }, + .method_count = 1, + .methods = some_java_type_two_methods, + }, +}; + +const JniRemappingTypeReplacementEntry jni_remapping_type_replacements[] = { + { + .name = { + .length = 14, + .str = "some/java/type", + }, + .replacement = "another/java/type", + }, + + { + .name = { + .length = 20, + .str = "some/other/java/type", + }, + .replacement = "another/replacement/java/type", + }, +}; + +constexpr char prop_test_string_key[] = "test_string"; +constexpr char prop_test_integer_key[] = "test_integer"; +constexpr char prop_test_boolean_key[] = "test_boolean"; + +const RuntimeProperty runtime_properties[] = { + { + .key = prop_test_string_key, + .value = "test", + .value_size = sizeof("test"), + }, + + { + .key = prop_test_integer_key, + .value = "42", + .value_size = sizeof("42"), + }, + + { + .key = prop_test_boolean_key, + .value = "true", + .value_size = sizeof("true"), + }, +}; + +const RuntimePropertyIndexEntry runtime_property_index[] = { + { + .key_hash = xamarin::android::xxhash::hash (prop_test_string_key, sizeof(prop_test_string_key) - 1), + .index = 0, + }, + + { + .key_hash = xamarin::android::xxhash::hash (prop_test_integer_key, sizeof(prop_test_integer_key) - 1), + .index = 1, + }, + + { + .key_hash = xamarin::android::xxhash::hash (prop_test_boolean_key, sizeof(prop_test_boolean_key) - 1), + .index = 2, + }, +}; + +namespace { + const host_configuration_property _host_configuration_properties_data[] = { + { + .name = u"test_string", + .value = u"string value", + }, + + { + .name = u"test_integer", + .value = u"23", + }, + + { + .name = u"test_boolean", + .value = u"true", + }, + }; +} + +const host_configuration_properties host_config_properties = { + .nitems = 3, + .data = _host_configuration_properties_data, +}; diff --git a/src/native/mono/runtime-base/jni-wrappers.hh b/src/native/common/include/runtime-base/jni-wrappers.hh similarity index 82% rename from src/native/mono/runtime-base/jni-wrappers.hh rename to src/native/common/include/runtime-base/jni-wrappers.hh index e9dde0eb083..679aed3df59 100644 --- a/src/native/mono/runtime-base/jni-wrappers.hh +++ b/src/native/common/include/runtime-base/jni-wrappers.hh @@ -1,13 +1,10 @@ -// Dear Emacs, this is a -*- C++ -*- header -#ifndef __JNI_WRAPPERS_H -#define __JNI_WRAPPERS_H +#pragma once -#include #include -#include "cpp-util.hh" +#include -#ifdef __cplusplus +#include namespace xamarin::android { @@ -51,16 +48,39 @@ namespace xamarin::android return jstr != nullptr; } + private: + [[gnu::always_inline]] + void ensure_cstr () noexcept + { + if (cstr != nullptr || env == nullptr) { + return; + } + + cstr = env->GetStringUTFChars (jstr, nullptr); + } + + public: const char* get_cstr () noexcept { - if (jstr == nullptr) + if (jstr == nullptr) { return nullptr; - if (cstr == nullptr && env != nullptr) - cstr = env->GetStringUTFChars (jstr, nullptr); + } + ensure_cstr (); return cstr; } + [[gnu::always_inline]] + const std::string_view get_string_view () noexcept + { + if (jstr == nullptr) { + return {}; + } + + ensure_cstr (); + return {cstr}; + } + jstring_wrapper& operator= (const jobject new_jo) noexcept { assign (reinterpret_cast (new_jo)); @@ -76,8 +96,9 @@ namespace xamarin::android protected: void release () noexcept { - if (jstr == nullptr || cstr == nullptr || env == nullptr) + if (jstr == nullptr || cstr == nullptr || env == nullptr) { return; + } env->ReleaseStringUTFChars (jstr, cstr); jobjectRefType type = env->GetObjectRefType (jstr); switch (type) { @@ -104,8 +125,9 @@ namespace xamarin::android void assign (const jstring new_js) noexcept { release (); - if (new_js == nullptr) + if (new_js == nullptr) { return; + } jstr = new_js; cstr = nullptr; @@ -130,8 +152,7 @@ namespace xamarin::android public: explicit jstring_array_wrapper (JNIEnv *_env) noexcept : jstring_array_wrapper(_env, nullptr) - { - } + {} explicit jstring_array_wrapper (JNIEnv *_env, jobjectArray _arr) : env (_env), @@ -140,10 +161,11 @@ namespace xamarin::android abort_if_invalid_pointer_argument (_env, "_env"); if (_arr != nullptr) { len = static_cast(_env->GetArrayLength (_arr)); - if (len > sizeof (static_wrappers) / sizeof (jstring_wrapper)) + if (len > sizeof (static_wrappers) / sizeof (jstring_wrapper)) { wrappers = new jstring_wrapper [len]; - else + } else { wrappers = static_wrappers; + } } else { len = 0; wrappers = nullptr; @@ -152,8 +174,9 @@ namespace xamarin::android ~jstring_array_wrapper () noexcept { - if (wrappers != nullptr && wrappers != static_wrappers) + if (wrappers != nullptr && wrappers != static_wrappers) { delete[] wrappers; + } } size_t get_length () const noexcept @@ -163,8 +186,9 @@ namespace xamarin::android jstring_wrapper& operator[] (size_t index) noexcept { - if (index >= len) + if (index >= len) { return invalid_wrapper; + } if (wrappers [index].env == nullptr) { wrappers [index].env = env; @@ -183,6 +207,3 @@ namespace xamarin::android jstring_wrapper invalid_wrapper; }; } - -#endif // __cplusplus -#endif // __JNI_WRAPPERS_H diff --git a/src/native/mono/runtime-base/search.hh b/src/native/common/include/runtime-base/search.hh similarity index 77% rename from src/native/mono/runtime-base/search.hh rename to src/native/common/include/runtime-base/search.hh index 9e4c81f1e45..c6c3311795f 100644 --- a/src/native/mono/runtime-base/search.hh +++ b/src/native/common/include/runtime-base/search.hh @@ -3,15 +3,15 @@ #include -#include "platform-compat.hh" -#include "xxhash.hh" +#include -namespace xamarin::android::internal { +namespace xamarin::android { class Search final { public: template - force_inline static ssize_t binary_search (hash_t key, const T *arr, size_t n) noexcept + [[gnu::always_inline]] + static ssize_t binary_search (hash_t key, const T *arr, size_t n) noexcept { static_assert (equal != nullptr, "equal is a required template parameter"); static_assert (less_than != nullptr, "less_than is a required template parameter"); @@ -31,7 +31,8 @@ namespace xamarin::android::internal { return equal (arr[right], key) ? right : -1z; } - force_inline static ssize_t binary_search (hash_t key, const hash_t *arr, size_t n) noexcept + [[gnu::always_inline]] + static ssize_t binary_search (hash_t key, const hash_t *arr, size_t n) noexcept { auto equal = [](hash_t const& entry, hash_t key) -> bool { return entry == key; }; auto less_than = [](hash_t const& entry, hash_t key) -> bool { return entry < key; }; @@ -39,7 +40,8 @@ namespace xamarin::android::internal { return binary_search (key, arr, n); } - force_inline static ptrdiff_t binary_search_branchless (hash_t x, const hash_t *arr, uint32_t len) noexcept + [[gnu::always_inline]] + static ptrdiff_t binary_search_branchless (hash_t x, const hash_t *arr, uint32_t len) noexcept { const hash_t *base = arr; while (len > 1) { diff --git a/src/native/mono/runtime-base/strings.hh b/src/native/common/include/runtime-base/strings.hh similarity index 66% rename from src/native/mono/runtime-base/strings.hh rename to src/native/common/include/runtime-base/strings.hh index 65f6603e501..b076e4f5ca9 100644 --- a/src/native/mono/runtime-base/strings.hh +++ b/src/native/common/include/runtime-base/strings.hh @@ -1,20 +1,26 @@ -#ifndef __STRINGS_HH -#define __STRINGS_HH +#pragma once #include #include #include +#include #include +#include #include #include #include -#include "platform-compat.hh" -#include "helpers.hh" -#include "shared-constants.hh" +#include -namespace xamarin::android::internal -{ +#if defined(XA_HOST_CLR) +#include +#else +#include + +using Constants = xamarin::android::internal::SharedConstants; +#endif + +namespace xamarin::android { static constexpr size_t SENSIBLE_TYPE_NAME_LENGTH = 128uz; static constexpr size_t SENSIBLE_PATH_MAX = 256uz; @@ -24,47 +30,83 @@ namespace xamarin::android::internal static constexpr bool BoundsCheck = false; #endif + enum class string_segment_error + { + index_out_of_range, + }; + + static inline auto to_string (string_segment_error error) -> std::string_view const + { + using std::operator""sv; + + switch (error) { + case string_segment_error::index_out_of_range: + return "Index out of range"sv; + + default: + return "Unknown error"sv; + } + } + class string_segment { public: - force_inline bool initialized () const noexcept + [[gnu::always_inline]] + auto initialized () const noexcept -> bool { return !_fresh; } - force_inline const char* start () const noexcept + [[gnu::always_inline]] + auto start () const noexcept -> const char* { return _start; } - force_inline size_t length () const noexcept + [[gnu::always_inline]] + auto at (size_t offset) const noexcept -> std::expected + { + if (offset >= length ()) { + return std::unexpected (string_segment_error::index_out_of_range); + } + + return _start + offset; + } + + [[gnu::always_inline]] + auto length () const noexcept -> size_t { return _length; } - force_inline bool empty () const noexcept + [[gnu::always_inline]] + auto empty () const noexcept -> bool { return length () == 0; } - force_inline bool equal (const char *s) const noexcept + [[gnu::always_inline]] + auto equal (const char *s) const noexcept -> bool { - if (s == nullptr) + if (s == nullptr) { return false; + } return equal (s, strlen (s)); } - force_inline bool equal (const char *s, size_t s_length) const noexcept + [[gnu::always_inline]] + auto equal (const char *s, size_t s_length) const noexcept -> bool { - if (s == nullptr) + if (s == nullptr) { return false; + } - if (!can_access (s_length)) { + if (length () != s_length) { return false; } - if (length () != s_length) { + if (!can_access (s_length)) [[unlikely]] { return false; } @@ -75,26 +117,30 @@ namespace xamarin::android::internal return memcmp (_start, s, length ()) == 0; } - template - force_inline bool equal (const char (&s)[Size]) noexcept + template [[gnu::always_inline]] + auto equal (const char (&s)[Size]) noexcept -> bool { return equal (s, Size - 1); } - force_inline bool equal (std::string_view const& s) noexcept + [[gnu::always_inline]] + auto equal (std::string_view const& s) noexcept -> bool { return equal (s.data (), s.length ()); } - force_inline bool starts_with_c (const char *s) const noexcept + [[gnu::always_inline]] + auto starts_with_c (const char *s) const noexcept -> bool { - if (s == nullptr) + if (s == nullptr) { return false; + } return starts_with (s, strlen (s)); } - force_inline bool starts_with (const char *s, size_t s_length) const noexcept + [[gnu::always_inline]] + auto starts_with (const char *s, size_t s_length) const noexcept -> bool { if (s == nullptr || !can_access (s_length)) { return false; @@ -107,18 +153,20 @@ namespace xamarin::android::internal return memcmp (start (), s, s_length) == 0; } - template - force_inline bool starts_with (const char (&s)[Size]) const noexcept + template [[gnu::always_inline]] + auto starts_with (const char (&s)[Size]) const noexcept -> bool { return starts_with (s, Size - 1); } - force_inline bool starts_with (std::string_view const& s) const noexcept + [[gnu::always_inline]] + auto starts_with (std::string_view const& s) const noexcept -> bool { return starts_with (s.data (), s.length ()); } - force_inline bool has_at (const char ch, size_t index) const noexcept + [[gnu::always_inline]] + auto has_at (const char ch, size_t index) const noexcept -> bool { if (!can_access (index)) { return false; @@ -127,7 +175,8 @@ namespace xamarin::android::internal return start ()[index] == ch; } - force_inline ssize_t find (const char ch, size_t start_index) const noexcept + [[gnu::always_inline]] + auto find (const char ch, size_t start_index) const noexcept -> ssize_t { if (!can_access (start_index)) { return -1; @@ -143,8 +192,8 @@ namespace xamarin::android::internal return -1; } - template - force_inline bool to_integer (T &val, size_t start_index = 0uz, int base = 10) const noexcept + template [[gnu::always_inline]] + auto to_integer (T &val, size_t start_index = 0uz, int base = 10) const noexcept -> bool { static_assert (std::is_integral_v); constexpr T min = std::numeric_limits::min (); @@ -199,14 +248,16 @@ namespace xamarin::android::internal } private: - force_inline bool can_access (size_t index) const noexcept + [[gnu::always_inline]] + auto can_access (size_t index) const noexcept -> bool { if (!initialized () || start () == nullptr) [[unlikely]] { return false; } - if (index > length ()) + if (index > length ()) { return false; + } return true; } @@ -241,23 +292,24 @@ namespace xamarin::android::internal free_store (); } - T* get () noexcept + auto get () noexcept -> T* { return allocated_store == nullptr ? local_store.data () : allocated_store; } - const T* get () const noexcept + auto get () const noexcept -> const T* { return allocated_store == nullptr ? local_store.data () : allocated_store; } - size_t size () const noexcept + auto size () const noexcept -> size_t { return store_size; } protected: - force_inline void init_store (size_t new_size) noexcept + [[gnu::always_inline]] + void init_store (size_t new_size) noexcept { if (new_size > MaxStackSize) { allocated_store = new T[new_size]; @@ -267,19 +319,24 @@ namespace xamarin::android::internal store_size = new_size; } - force_inline void free_store () noexcept + [[gnu::always_inline]] + void free_store () noexcept { - if (allocated_store == nullptr) + if (allocated_store == nullptr) { return; + } + delete[] allocated_store; } - force_inline LocalStoreArray& get_local_store () noexcept + [[gnu::always_inline]] + auto get_local_store () noexcept -> LocalStoreArray& { return local_store; } - force_inline T* get_allocated_store () noexcept + [[gnu::always_inline]] + auto get_allocated_store () noexcept -> T* { return allocated_store; } @@ -387,21 +444,25 @@ namespace xamarin::android::internal explicit string_base (const string_segment &token) : string_base (token.initialized () ? token.length () : 0) { - if (token.initialized ()) + if (token.initialized ()) { assign (token.start (), token.length ()); + } } - force_inline size_t length () const noexcept + [[gnu::always_inline]] + auto length () const noexcept -> size_t { return idx; } - force_inline bool empty () const noexcept + [[gnu::always_inline]] + auto empty () const noexcept -> bool { return length () == 0; } - force_inline void set_length (size_t new_length) noexcept + [[gnu::always_inline]] + void set_length (size_t new_length) noexcept { if (new_length >= buffer.size ()) { return; @@ -411,18 +472,21 @@ namespace xamarin::android::internal terminate (); } - force_inline void clear () noexcept + [[gnu::always_inline]] + void clear () noexcept { set_length (0); buffer.get ()[0] = NUL; } - force_inline void terminate () noexcept + [[gnu::always_inline]] + void terminate () noexcept { buffer.get ()[idx] = NUL; } - force_inline string_base& replace (const TChar c1, const TChar c2) noexcept + [[gnu::always_inline]] + auto replace (const TChar c1, const TChar c2) noexcept -> string_base& { if (empty ()) { return *this; @@ -437,10 +501,12 @@ namespace xamarin::android::internal return *this; } - force_inline string_base& append (const TChar* s, size_t length) noexcept + [[gnu::always_inline]] + auto append (const TChar* s, size_t length) noexcept -> string_base& { - if (s == nullptr || length == 0uz) + if (s == nullptr || length == 0uz) { return *this; + } resize_for_extra (length); if constexpr (BoundsCheck) { @@ -455,107 +521,130 @@ namespace xamarin::android::internal } template - force_inline string_base& append (internal::string_base const& str) noexcept + [[gnu::always_inline]] + auto append (string_base const& str) noexcept -> string_base& { return append (str.get (), str.length ()); } - force_inline string_base& append (std::string_view const& sv) noexcept + [[gnu::always_inline]] + auto append (std::string_view const& sv) noexcept -> string_base& { return append (sv.data (), sv.length ()); } - template - force_inline string_base& append (const char (&s)[Size]) noexcept + template [[gnu::always_inline]] + auto append (const char (&s)[Size]) noexcept -> string_base& { return append (s, Size - 1); } - force_inline string_base& append_c (const char *s) noexcept + [[gnu::always_inline]] + auto append_c (const char *s) noexcept -> string_base& { - if (s == nullptr) + if (s == nullptr) { return *this; + } return append (s, strlen (s)); } - force_inline string_base& append (int16_t i) noexcept + [[gnu::always_inline]] + auto append (int16_t i) noexcept -> string_base& { - resize_for_extra (SharedConstants::MAX_INTEGER_DIGIT_COUNT_BASE10); + resize_for_extra (Constants::MAX_INTEGER_DIGIT_COUNT_BASE10); append_integer (buffer.get (), i); return *this; } - force_inline string_base& append (uint16_t i) noexcept + [[gnu::always_inline]] + auto append (uint16_t i) noexcept -> string_base& { - resize_for_extra (SharedConstants::MAX_INTEGER_DIGIT_COUNT_BASE10); + resize_for_extra (Constants::MAX_INTEGER_DIGIT_COUNT_BASE10); append_integer (i); return *this; } - force_inline string_base& append (int32_t i) noexcept + [[gnu::always_inline]] + auto append (int32_t i) noexcept -> string_base& { - resize_for_extra (SharedConstants::MAX_INTEGER_DIGIT_COUNT_BASE10); + resize_for_extra (Constants::MAX_INTEGER_DIGIT_COUNT_BASE10); append_integer (i); return *this; } - force_inline string_base& append (uint32_t i) noexcept + [[gnu::always_inline]] + auto append (uint32_t i) noexcept -> string_base& { - resize_for_extra (SharedConstants::MAX_INTEGER_DIGIT_COUNT_BASE10); + resize_for_extra (Constants::MAX_INTEGER_DIGIT_COUNT_BASE10); append_integer (i); return *this; } - force_inline string_base& append (int64_t i) noexcept + [[gnu::always_inline]] + auto append (int64_t i) noexcept -> string_base& { - resize_for_extra (SharedConstants::MAX_INTEGER_DIGIT_COUNT_BASE10); + resize_for_extra (Constants::MAX_INTEGER_DIGIT_COUNT_BASE10); append_integer (i); return *this; } - force_inline string_base& append (uint64_t i) noexcept + [[gnu::always_inline]] + auto append (uint64_t i) noexcept -> string_base& { - resize_for_extra (SharedConstants::MAX_INTEGER_DIGIT_COUNT_BASE10); + resize_for_extra (Constants::MAX_INTEGER_DIGIT_COUNT_BASE10); append_integer (i); return *this; } - force_inline string_base& assign (const TChar* s, size_t length) noexcept + [[gnu::always_inline]] + auto assign (const TChar* s, size_t length) noexcept -> string_base& { idx = 0; return append (s, length); } - force_inline string_base& assign_c (const TChar* s) noexcept + [[gnu::always_inline]] + auto assign_c (const TChar* s) noexcept -> string_base& { - if (s == nullptr) + if (s == nullptr) { return *this; + } return assign (s, strlen (s)); } - force_inline string_base& assign (std::string_view const& sv) noexcept + [[gnu::always_inline]] + auto assign (std::string_view const& sv) noexcept -> string_base& { return assign (sv.data (), sv.size ()); } - template - force_inline string_base& assign (const char (&s)[Size]) noexcept + [[gnu::always_inline]] + auto assign (std::string const& s) noexcept -> string_base& + { + return assign (s.data (), s.size ()); + } + + template [[gnu::always_inline]] + auto assign (const char (&s)[Size]) noexcept -> string_base& { return assign (s, Size - 1); } template - force_inline string_base& assign (internal::string_base const& str) noexcept + [[gnu::always_inline]] + auto assign (string_base const& str) noexcept -> string_base& { return assign (str.get (), str.length ()); } - force_inline string_base& assign (const TChar* s, size_t offset, size_t count) noexcept + [[gnu::always_inline]] + auto assign (const TChar* s, size_t offset, size_t count) noexcept -> string_base& { - if (s == nullptr) + if (s == nullptr) { return *this; + } if constexpr (BoundsCheck) { size_t slen = strlen (s); @@ -567,7 +656,8 @@ namespace xamarin::android::internal return assign (s + offset, count); } - force_inline bool next_token (size_t start_index, const TChar separator, string_segment& token) const noexcept + [[gnu::always_inline]] + auto next_token (size_t start_index, const TChar separator, string_segment& token) const noexcept -> bool { size_t index; if (token._fresh) { @@ -601,12 +691,14 @@ namespace xamarin::android::internal return true; } - force_inline bool next_token (const char separator, string_segment& token) const noexcept + [[gnu::always_inline]] + auto next_token (const char separator, string_segment& token) const noexcept -> bool { return next_token (0, separator, token); } - force_inline ssize_t index_of (const TChar ch) const noexcept + [[gnu::always_inline]] + auto index_of (const TChar ch) const noexcept -> ssize_t { const TChar *p = buffer.get (); while (p != nullptr && *p != NUL) { @@ -619,40 +711,47 @@ namespace xamarin::android::internal return -1; } - force_inline bool starts_with (const TChar *s, size_t s_length) const noexcept + [[gnu::always_inline]] + auto starts_with (const TChar *s, size_t s_length) const noexcept -> bool { - if (s == nullptr || s_length == 0 || s_length > buffer.size ()) + if (s == nullptr || s_length == 0 || s_length > buffer.size ()) { return false; + } return memcmp (buffer.get (), s, s_length) == 0; } - force_inline bool starts_with_c (const char* s) noexcept + [[gnu::always_inline]] + auto starts_with_c (const char* s) noexcept -> bool { - if (s == nullptr) + if (s == nullptr) { return false; + } return starts_with (s, strlen (s)); } - template - force_inline bool starts_with (const char (&s)[Size]) noexcept + template [[gnu::always_inline]] + auto starts_with (const char (&s)[Size]) noexcept -> bool { return starts_with (s, Size - 1); } - force_inline bool starts_with (std::string_view const& s) noexcept + [[gnu::always_inline]] + auto starts_with (std::string_view const& s) noexcept -> bool { return starts_with (s.data (), s.length ()); } - force_inline void set_length_after_direct_write (size_t new_length) noexcept + [[gnu::always_inline]] + void set_length_after_direct_write (size_t new_length) noexcept { set_length (new_length); terminate (); } - force_inline void set_at (size_t index, const TChar ch) noexcept + [[gnu::always_inline]] + void set_at (size_t index, const TChar ch) noexcept { ensure_valid_index (index); TChar *p = buffer + index; @@ -663,52 +762,59 @@ namespace xamarin::android::internal *p = ch; } - force_inline const TChar get_at (size_t index) const noexcept + [[gnu::always_inline]] + auto get_at (size_t index) const noexcept -> const TChar { ensure_valid_index (index); return *(buffer.get () + index); } - force_inline TChar& get_at (size_t index) noexcept + [[gnu::always_inline]] + auto get_at (size_t index) noexcept -> TChar& { ensure_valid_index (index); return *(buffer.get () + index); } - force_inline const TChar* get () const noexcept + [[gnu::always_inline]] + auto get () const noexcept -> const TChar* { return buffer.get (); } - force_inline TChar* get () noexcept + [[gnu::always_inline]] + auto get () noexcept -> TChar* { return buffer.get (); } - force_inline size_t size () const noexcept + [[gnu::always_inline]] + auto size () const noexcept -> size_t { return buffer.size (); } - char operator[] (size_t index) const noexcept + [[gnu::always_inline]] + auto operator[] (size_t index) const noexcept -> char { return get_at (index); } - char& operator[] (size_t index) noexcept + [[gnu::always_inline]] + auto operator[] (size_t index) noexcept -> char& { return get_at (index); } protected: - template - force_inline void append_integer (Integer i) noexcept + template [[gnu::always_inline]] + void append_integer (Integer i) noexcept { static_assert (std::is_integral_v); - resize_for_extra (SharedConstants::MAX_INTEGER_DIGIT_COUNT_BASE10); + resize_for_extra (Constants::MAX_INTEGER_DIGIT_COUNT_BASE10); if constexpr (BoundsCheck) { - ensure_have_extra (SharedConstants::MAX_INTEGER_DIGIT_COUNT_BASE10); + ensure_have_extra (Constants::MAX_INTEGER_DIGIT_COUNT_BASE10); } if (i == 0) { @@ -719,8 +825,8 @@ namespace xamarin::android::internal return; } - TChar temp_buf[SharedConstants::MAX_INTEGER_DIGIT_COUNT_BASE10 + 1uz]; - TChar *p = temp_buf + SharedConstants::MAX_INTEGER_DIGIT_COUNT_BASE10; + TChar temp_buf[Constants::MAX_INTEGER_DIGIT_COUNT_BASE10 + 1uz]; + TChar *p = temp_buf + Constants::MAX_INTEGER_DIGIT_COUNT_BASE10; *p = NUL; TChar *end = p; @@ -759,7 +865,8 @@ namespace xamarin::android::internal append (p, static_cast(end - p)); } - force_inline void ensure_valid_index (size_t access_index) const noexcept + [[gnu::always_inline]] + void ensure_valid_index (size_t access_index) const noexcept { if (access_index < idx && access_index < buffer.size ()) [[likely]] { return; @@ -770,7 +877,8 @@ namespace xamarin::android::internal Helpers::abort_application (n == -1 ? "Index out of range" : message); } - force_inline void ensure_have_extra (size_t length) noexcept + [[gnu::always_inline]] + void ensure_have_extra (size_t length) noexcept { size_t needed_space = Helpers::add_with_overflow_check (length, idx + 1); if (needed_space > buffer.size ()) { @@ -785,7 +893,8 @@ namespace xamarin::android::internal } } - force_inline void resize_for_extra (size_t needed_space) noexcept + [[gnu::always_inline]] + void resize_for_extra (size_t needed_space) noexcept { if constexpr (TStorage::has_resize) { size_t required_space = Helpers::add_with_overflow_check (needed_space, idx + 1uz); @@ -853,4 +962,3 @@ namespace xamarin::android::internal } }; } -#endif // __STRINGS_HH diff --git a/src/native/common/include/shared/cpp-util.hh b/src/native/common/include/shared/cpp-util.hh new file mode 100644 index 00000000000..91eee1f7378 --- /dev/null +++ b/src/native/common/include/shared/cpp-util.hh @@ -0,0 +1,271 @@ +#pragma once + +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include +#include + +#include +#include + +#include + +namespace xamarin::android::detail { + [[gnu::always_inline, gnu::flatten]] + static inline const char* + _format_message (const char *format, ...) noexcept + { + va_list ap; + va_start (ap, format); + + char *message; + int ret = vasprintf (&message, format, ap); + + va_end (ap); + return ret == -1 ? "Out of memory" : message; + } + + [[gnu::always_inline]] + static inline std::string get_function_name (const char *signature) + { + using std::operator""sv; + + std::string_view sig { signature }; + if (sig.length () == 0) { + return ""; + } + + auto splitSignature = sig | std::views::split ("::"sv) | std::ranges::to> (); + + std::string ret; + if (splitSignature.size () > 1) { + ret.append (splitSignature [splitSignature.size () - 2]); + ret.append ("::"sv); + } + std::string_view func_name { splitSignature[splitSignature.size () - 1] }; + std::string_view::size_type args_pos = func_name.find ('('); + std::string_view::size_type name_start_pos = func_name.find (' '); + + if (name_start_pos == std::string_view::npos) { + name_start_pos = 0; + } else { + name_start_pos++; // point to after the space which separates return type from name + if (name_start_pos >= func_name.length ()) [[unlikely]] { + name_start_pos = 0; + } + } + + if (args_pos == std::string_view::npos) { + ret.append (func_name.substr (name_start_pos)); + } else { + // If there's a snafu with positions, start from 0 + if (name_start_pos >= args_pos || name_start_pos > func_name.length ()) [[unlikely]] { + name_start_pos = 0; + } + + ret.append (func_name.substr (name_start_pos, args_pos - name_start_pos)); + } + + return ret; + } +} + +template F> +[[gnu::always_inline, gnu::flatten]] +static inline void +abort_unless (bool condition, F&& get_message, std::source_location sloc = std::source_location::current ()) noexcept +{ + static_assert (std::is_same::type, const char*>::value, "get_message must return 'const char*'"); + + if (condition) [[likely]] { + return; + } + + xamarin::android::Helpers::abort_application (std::invoke (get_message), true /* log_location */, sloc); +} + +[[gnu::always_inline, gnu::flatten]] +static inline void +abort_unless (bool condition, const char *message, std::source_location sloc = std::source_location::current ()) noexcept +{ + if (condition) [[likely]] { + return; + } + xamarin::android::Helpers::abort_application (message, true /* log_location */, sloc); +} + +template +[[gnu::always_inline, gnu::flatten]] +static inline void +abort_if_invalid_pointer_argument (T *ptr, const char *ptr_name, std::source_location sloc = std::source_location::current ()) noexcept +{ + abort_unless ( + ptr != nullptr, + [&ptr_name, &sloc] { + return xamarin::android::detail::_format_message ( + "%s: parameter '%s' must be a valid pointer", + xamarin::android::detail::get_function_name (sloc.function_name ()).c_str (), + ptr_name + ); + }, + sloc + ); +} + +[[gnu::always_inline, gnu::flatten]] +static inline void +abort_if_negative_integer_argument (int arg, const char *arg_name, std::source_location sloc = std::source_location::current ()) noexcept +{ + abort_unless ( + arg > 0, + [&arg_name, &sloc] { + return xamarin::android::detail::_format_message ( + "%s: parameter '%s' must be a positive integer", + xamarin::android::detail::get_function_name (sloc.function_name ()).c_str (), + arg_name + ); + }, + sloc + ); +} + +// Helper to use in "printf debugging". Normally not used in code anywhere. No code should be shipped with any +// of the calls present. +[[gnu::always_inline]] +inline void pd_log_location (std::source_location sloc = std::source_location::current ()) noexcept +{ + log_info_nocheck (LOG_DEFAULT, "loc: {}:{} ('{}')", sloc.file_name (), sloc.line (), sloc.function_name ()); +} + +namespace xamarin::android +{ + template + struct CDeleter final + { + using UnderlyingType = std::remove_cv_t; + + void operator() (T* p) + { + UnderlyingType *ptr; + + if constexpr (std::is_const_v) { + ptr = const_cast*> (p); + } else { + ptr = p; + } + + std::free (reinterpret_cast(ptr)); + } + }; + + template + using c_unique_ptr = std::unique_ptr>; + + template + using char_array = std::array; + + template + constexpr auto concat_const (const char (&...parts)[Length]) + { + // `parts` being constant string arrays, Length for each of them includes the trailing NUL byte, thus the + // `sizeof... (Length)` part which subtracts the number of template parameters - the amount of NUL bytes so that + // we don't waste space. + constexpr size_t total_length = (... + Length) - sizeof... (Length); + char_array ret; // lgtm [cpp/paddingbyteinformationdisclosure] the buffer is filled in the loop below + ret[total_length] = 0; + + size_t i = 0uz; + for (char const* from : {parts...}) { + for (; *from != '\0'; i++) { + ret[i] = *from++; + } + } + + return ret; + }; + + template + concept StringViewPart = std::is_same_v; + + template + consteval auto concat_string_views (T const&... parts) + { + std::array ret; // lgtm [cpp/paddingbyteinformationdisclosure] the buffer is filled in the loop below + ret[TotalLength] = 0; + + size_t i = 0; + for (std::string_view const& sv : {parts...}) { + for (const char ch : sv) { + ret[i] = ch; + i++; + } + } + + return ret; + } + + consteval size_t calc_size (std::string_view const& sv1) noexcept + { + return sv1.size (); + } + + template + consteval size_t calc_size (std::string_view const& sv1, T const&... other_svs) noexcept + { + return sv1.size () + calc_size (other_svs...); + } + + template , int> = 0> + constexpr TEnum operator & (TEnum l, TEnum r) noexcept + { + using etype = std::underlying_type_t; + return static_cast(static_cast(l) & static_cast(r)); + } + + template , int> = 0> + constexpr TEnum& operator &= (TEnum& l, TEnum r) noexcept + { + return l = (l & r); + } + + template , int> = 0> + constexpr TEnum operator | (TEnum l, TEnum r) noexcept + { + using etype = std::underlying_type_t; + return static_cast(static_cast(l) | static_cast(r)); + } + + template , int> = 0> + constexpr TEnum& operator |= (TEnum& l, TEnum r) noexcept + { + return l = (l | r); + } + + template , int> = 0> + constexpr TEnum operator ~ (TEnum r) noexcept + { + using etype = std::underlying_type_t; + return static_cast (~static_cast(r)); + } + + template , int> = 0> + constexpr TEnum operator ^ (TEnum l, TEnum r) noexcept + { + using etype = std::underlying_type_t; + return static_cast(static_cast(l) ^ static_cast(r)); + } + + template , int> = 0> + constexpr TEnum& operator ^= (TEnum& l, TEnum r) noexcept + { + return l = (l ^ r); + } +} diff --git a/src/native/mono/shared/helpers.hh b/src/native/common/include/shared/helpers.hh similarity index 61% rename from src/native/mono/shared/helpers.hh rename to src/native/common/include/shared/helpers.hh index 62aeea9e00e..22e29b40f25 100644 --- a/src/native/mono/shared/helpers.hh +++ b/src/native/common/include/shared/helpers.hh @@ -1,5 +1,4 @@ -#ifndef __HELPERS_HH -#define __HELPERS_HH +#pragma once #include #include @@ -7,7 +6,6 @@ #include #include -#include "platform-compat.hh" using namespace std::string_view_literals; @@ -22,7 +20,8 @@ namespace xamarin::android { public: template - force_inline static Ret add_with_overflow_check (P1 a, P2 b, std::source_location sloc = std::source_location::current ()) noexcept + [[gnu::always_inline]] + static auto add_with_overflow_check (P1 a, P2 b, std::source_location sloc = std::source_location::current ()) noexcept -> Ret { constexpr bool DoNotLogLocation = false; Ret ret; @@ -38,7 +37,8 @@ namespace xamarin::android } template - force_inline static Ret multiply_with_overflow_check (P1 a, P2 b, std::source_location sloc = std::source_location::current ()) noexcept + [[gnu::always_inline]] + static auto multiply_with_overflow_check (P1 a, P2 b, std::source_location sloc = std::source_location::current ()) noexcept -> Ret { constexpr bool DoNotLogLocation = false; Ret ret; @@ -53,29 +53,35 @@ namespace xamarin::android return ret; } - [[noreturn]] static void abort_application (LogCategories category, const char *message, bool log_location = true, std::source_location sloc = std::source_location::current ()) noexcept; + [[noreturn]] + static void abort_application (LogCategories category, const char *message, bool log_location = true, std::source_location sloc = std::source_location::current ()) noexcept; - [[noreturn]] static void abort_application (LogCategories category, std::string const& message, bool log_location = true, std::source_location sloc = std::source_location::current ()) noexcept + [[noreturn]] + static void abort_application (LogCategories category, std::string const& message, bool log_location = true, std::source_location sloc = std::source_location::current ()) noexcept { abort_application (category, message.c_str (), log_location, sloc); } - [[noreturn]] static void abort_application (LogCategories category, std::string_view const& message, bool log_location = true, std::source_location sloc = std::source_location::current ()) noexcept + [[noreturn]] + static void abort_application (LogCategories category, std::string_view const& message, bool log_location = true, std::source_location sloc = std::source_location::current ()) noexcept { abort_application (category, message.data (), log_location, sloc); } - [[noreturn]] static void abort_application (const char *message, bool log_location = true, std::source_location sloc = std::source_location::current ()) noexcept + [[noreturn]] + static void abort_application (const char *message, bool log_location = true, std::source_location sloc = std::source_location::current ()) noexcept { abort_application (LOG_DEFAULT, message, log_location, sloc); } - [[noreturn]] static void abort_application (std::string const& message, bool log_location = true, std::source_location sloc = std::source_location::current ()) noexcept + [[noreturn]] + static void abort_application (std::string const& message, bool log_location = true, std::source_location sloc = std::source_location::current ()) noexcept { abort_application (LOG_DEFAULT, message.c_str (), log_location, sloc); } - [[noreturn]] static void abort_application (std::string_view const& message, bool log_location = true, std::source_location sloc = std::source_location::current ()) noexcept + [[noreturn]] + static void abort_application (std::string_view const& message, bool log_location = true, std::source_location sloc = std::source_location::current ()) noexcept { abort_application (LOG_DEFAULT, message.data (), log_location, sloc); } @@ -97,4 +103,3 @@ namespace xamarin::android return replacement == nullptr ? "" : replacement; } } -#endif // __HELPERS_HH diff --git a/src/native/mono/shared/log_level.hh b/src/native/common/include/shared/log_level.hh similarity index 100% rename from src/native/mono/shared/log_level.hh rename to src/native/common/include/shared/log_level.hh diff --git a/src/native/mono/shared/xxhash.hh b/src/native/common/include/shared/xxhash.hh similarity index 71% rename from src/native/mono/shared/xxhash.hh rename to src/native/common/include/shared/xxhash.hh index e75d6d0f87a..32365aceab0 100644 --- a/src/native/mono/shared/xxhash.hh +++ b/src/native/common/include/shared/xxhash.hh @@ -1,7 +1,6 @@ -#if !defined (__XXHASH_HH) -#define __XXHASH_HH +#pragma once -#include +#include #if INTPTR_MAX == INT64_MAX #define XXH_NO_STREAM @@ -44,8 +43,6 @@ #include #include -#include "platform-compat.hh" - namespace xamarin::android { class xxhash32 final @@ -60,7 +57,8 @@ namespace xamarin::android // We don't use any special seed in XA, the template parameter is just to keep the algorithm more easily // understood and to run compile-time algorithm correctness tests template - force_inline static constexpr uint32_t hash (const char *input, size_t len) noexcept + [[gnu::always_inline]] + static constexpr auto hash (const char *input, size_t len) noexcept -> uint32_t { return finalize ( (len >= 16 ? h16bytes (input, len) : Seed + PRIME5) + static_cast(len), @@ -70,39 +68,43 @@ namespace xamarin::android } template - force_inline static constexpr uint32_t hash (const char (&input)[Size]) noexcept + [[gnu::always_inline]] + static constexpr auto hash (const char (&input)[Size]) noexcept -> uint32_t { return hash (input, Size - 1); } template - force_inline static constexpr uint32_t hash (std::string_view const& input) noexcept + [[gnu::always_inline]] + static constexpr auto hash (std::string_view const& input) noexcept -> uint32_t { return hash (input.data (), input.length ()); } private: // 32-bit rotate left. - template - force_inline static constexpr uint32_t rotl (uint32_t x) noexcept + template [[gnu::always_inline]] + static constexpr auto rotl (uint32_t x) noexcept -> uint32_t { return ((x << Bits) | (x >> (32 - Bits))); } // Normal stripe processing routine. - force_inline static constexpr uint32_t round (uint32_t acc, const uint32_t input) noexcept + [[gnu::always_inline]] + static constexpr auto round (uint32_t acc, const uint32_t input) noexcept -> uint32_t { return rotl<13> (acc + (input * PRIME2)) * PRIME1; } - template - force_inline static constexpr uint32_t avalanche_step (const uint32_t h) noexcept + template [[gnu::always_inline]] + static constexpr auto avalanche_step (const uint32_t h) noexcept -> uint32_t { return (h ^ (h >> RShift)) * Prime; } // Mixes all bits to finalize the hash. - force_inline static constexpr uint32_t avalanche (const uint32_t h) noexcept + [[gnu::always_inline]] + static constexpr auto avalanche (const uint32_t h) noexcept -> uint32_t { return avalanche_step<16, 1> ( @@ -113,7 +115,8 @@ namespace xamarin::android } // little-endian version: all our target platforms are little-endian - force_inline static constexpr uint32_t endian32 (const char *v) noexcept + [[gnu::always_inline]] + static constexpr auto endian32 (const char *v) noexcept -> uint32_t { return static_cast(static_cast(v[0])) | @@ -122,13 +125,15 @@ namespace xamarin::android (static_cast(static_cast(v[3])) << 24); } - force_inline static constexpr uint32_t fetch32 (const char *p, const uint32_t v) noexcept + [[gnu::always_inline]] + static constexpr auto fetch32 (const char *p, const uint32_t v) noexcept -> uint32_t { return round (v, endian32 (p)); } // Processes the last 0-15 bytes of p. - force_inline static constexpr uint32_t finalize (const uint32_t h, const char *p, size_t len) noexcept + [[gnu::always_inline]] + static constexpr auto finalize (const uint32_t h, const char *p, size_t len) noexcept -> uint32_t { return (len >= 4) ? finalize (rotl<17> (h + (endian32 (p) * PRIME3)) * PRIME4, p + 4, len - 4) : @@ -136,7 +141,8 @@ namespace xamarin::android avalanche (h); } - force_inline static constexpr uint32_t h16bytes (const char *p, size_t len, const uint32_t v1, const uint32_t v2, const uint32_t v3, const uint32_t v4) noexcept + [[gnu::always_inline]] + static constexpr auto h16bytes (const char *p, size_t len, const uint32_t v1, const uint32_t v2, const uint32_t v3, const uint32_t v4) noexcept -> uint32_t { return (len >= 16) ? h16bytes (p + 16, len - 16, fetch32 (p, v1), fetch32 (p+4, v2), fetch32 (p+8, v3), fetch32 (p+12, v4)) : @@ -146,7 +152,8 @@ namespace xamarin::android // We don't use any special seed in XA, the template parameter is just to keep the algorithm more easily // understood template - force_inline static constexpr uint32_t h16bytes (const char *p, size_t len) + [[gnu::always_inline]] + static constexpr auto h16bytes (const char *p, size_t len) noexcept -> uint32_t { return h16bytes(p, len, Seed + PRIME1 + PRIME2, Seed + PRIME2, Seed, Seed - PRIME1); } @@ -156,12 +163,14 @@ namespace xamarin::android class xxhash64 final { public: - force_inline static XXH64_hash_t hash (const char *p, size_t len) noexcept + [[gnu::always_inline]] + static auto hash (const char *p, size_t len) noexcept -> XXH64_hash_t { return XXH3_64bits (static_cast(p), len); } - force_inline static consteval XXH64_hash_t hash (std::string_view const& input) noexcept + [[gnu::always_inline]] + static consteval auto hash (std::string_view const& input) noexcept -> XXH64_hash_t { return constexpr_xxh3::XXH3_64bits_const (input.data (), input.length ()); } @@ -169,8 +178,8 @@ namespace xamarin::android // The C XXH64_64bits function from xxhash.h is not `constexpr` or `consteval`, so we cannot call it here. // At the same time, at build time performance is not that important, so we call the "unoptmized" `consteval` // C++ implementation here - template - force_inline static consteval XXH64_hash_t hash (const char (&input)[Size]) noexcept + template [[gnu::always_inline]] + static consteval auto hash (const char (&input)[Size]) noexcept -> XXH64_hash_t { return constexpr_xxh3::XXH3_64bits_const (input); } @@ -183,4 +192,3 @@ namespace xamarin::android using xxhash = xxhash32; #endif } -#endif diff --git a/src/native/mono/monodroid/debug.cc b/src/native/mono/monodroid/debug.cc index 8839ded308a..492e114704b 100644 --- a/src/native/mono/monodroid/debug.cc +++ b/src/native/mono/monodroid/debug.cc @@ -34,7 +34,7 @@ #include "debug.hh" #include "util.hh" #include "globals.hh" -#include "cpp-util.hh" +#include #include "timing-internal.hh" #include "java-interop-dlfcn.h" diff --git a/src/native/mono/monodroid/designer-assemblies.hh b/src/native/mono/monodroid/designer-assemblies.hh index d4f8dabc9ca..f3c1cd7d8ed 100644 --- a/src/native/mono/monodroid/designer-assemblies.hh +++ b/src/native/mono/monodroid/designer-assemblies.hh @@ -1,7 +1,7 @@ #ifndef INC_MONODROID_DESIGNER_ASSEMBLIES_H #define INC_MONODROID_DESIGNER_ASSEMBLIES_H -#include "jni-wrappers.hh" +#include #include #include #include @@ -49,4 +49,4 @@ namespace xamarin::android::internal { }; } -#endif \ No newline at end of file +#endif diff --git a/src/native/mono/monodroid/embedded-assemblies-zip.cc b/src/native/mono/monodroid/embedded-assemblies-zip.cc index 453ff56d437..95c36da3f3c 100644 --- a/src/native/mono/monodroid/embedded-assemblies-zip.cc +++ b/src/native/mono/monodroid/embedded-assemblies-zip.cc @@ -9,13 +9,13 @@ #include "embedded-assemblies.hh" #include "globals.hh" -#include "strings.hh" +#include #include "xamarin-app.hh" -#include "xxhash.hh" +#include using namespace xamarin::android::internal; -force_inline bool +[[gnu::always_inline]] bool EmbeddedAssemblies::zip_load_entry_common (size_t entry_index, std::vector const& buf, dynamic_local_string &entry_name, ZipEntryLoadState &state) noexcept { entry_name.clear (); @@ -150,7 +150,7 @@ EmbeddedAssemblies::store_individual_assembly_data (dynamic_local_string const& buf, uint32_t num_entries, [[maybe_unused]] monodroid_should_register should_register, ZipEntryLoadState &state) noexcept { // TODO: do away with all the string manipulation here. Replace it with generating xxhash for the entry name @@ -257,7 +257,7 @@ EmbeddedAssemblies::map_assembly_store (dynamic_local_string have_and_want_debug_symbols = register_debug_symbols; } -force_inline void +[[gnu::always_inline]] void EmbeddedAssemblies::zip_load_assembly_store_entries (std::vector const& buf, uint32_t num_entries, ZipEntryLoadState &state) noexcept { if (all_required_zip_entries_found ()) { @@ -389,7 +389,7 @@ EmbeddedAssemblies::zip_load_entries (int fd, const char *apk_name, [[maybe_unus } template -force_inline void +[[gnu::always_inline]] void EmbeddedAssemblies::set_entry_data (XamarinAndroidBundledAssembly &entry, ZipEntryLoadState const& state, dynamic_local_string const& entry_name) noexcept { entry.file_fd = state.file_fd; @@ -419,13 +419,13 @@ EmbeddedAssemblies::set_entry_data (XamarinAndroidBundledAssembly &entry, ZipEnt ); } -force_inline void +[[gnu::always_inline]] void EmbeddedAssemblies::set_assembly_entry_data (XamarinAndroidBundledAssembly &entry, ZipEntryLoadState const& state, dynamic_local_string const& entry_name) noexcept { set_entry_data (entry, state, entry_name); } -force_inline void +[[gnu::always_inline]] void EmbeddedAssemblies::set_debug_entry_data (XamarinAndroidBundledAssembly &entry, ZipEntryLoadState const& state, dynamic_local_string const& entry_name) noexcept { set_entry_data (entry, state, entry_name); @@ -581,7 +581,7 @@ EmbeddedAssemblies::zip_extract_cd_info (std::array const& buf } template -force_inline bool +[[gnu::always_inline]] bool EmbeddedAssemblies::zip_ensure_valid_params (T const& buf, size_t index, size_t to_read) noexcept { if (index + to_read > buf.size ()) { diff --git a/src/native/mono/monodroid/embedded-assemblies.cc b/src/native/mono/monodroid/embedded-assemblies.cc index 6adb6f27fe6..95582ce2cc6 100644 --- a/src/native/mono/monodroid/embedded-assemblies.cc +++ b/src/native/mono/monodroid/embedded-assemblies.cc @@ -31,12 +31,12 @@ #include "globals.hh" #include "mono-image-loader.hh" #include "xamarin-app.hh" -#include "cpp-util.hh" +#include #include "monodroid-glue-internal.hh" #include "monodroid-state.hh" #include "startup-aware-lock.hh" #include "timing-internal.hh" -#include "search.hh" +#include using namespace xamarin::android; using namespace xamarin::android::internal; @@ -72,14 +72,14 @@ void EmbeddedAssemblies::set_assemblies_prefix (const char *prefix) noexcept assemblies_prefix_override = prefix != nullptr ? Util::strdup_new (prefix) : nullptr; } -force_inline void +[[gnu::always_inline]] void EmbeddedAssemblies::set_assembly_data_and_size (uint8_t* source_assembly_data, uint32_t source_assembly_data_size, uint8_t*& dest_assembly_data, uint32_t& dest_assembly_data_size) noexcept { dest_assembly_data = source_assembly_data; dest_assembly_data_size = source_assembly_data_size; } -force_inline void +[[gnu::always_inline]] void EmbeddedAssemblies::get_assembly_data (uint8_t *data, uint32_t data_size, [[maybe_unused]] const char *name, uint8_t*& assembly_data, uint32_t& assembly_data_size) noexcept { #if defined (HAVE_LZ4) && defined (RELEASE) @@ -171,20 +171,20 @@ EmbeddedAssemblies::get_assembly_data (uint8_t *data, uint32_t data_size, [[mayb } } -force_inline void +[[gnu::always_inline]] void EmbeddedAssemblies::get_assembly_data (XamarinAndroidBundledAssembly const& e, uint8_t*& assembly_data, uint32_t& assembly_data_size) noexcept { get_assembly_data (e.data, e.data_size, e.name, assembly_data, assembly_data_size); } -force_inline void +[[gnu::always_inline]] void EmbeddedAssemblies::get_assembly_data (AssemblyStoreSingleAssemblyRuntimeData const& e, uint8_t*& assembly_data, uint32_t& assembly_data_size) noexcept { get_assembly_data (e.image_data, e.descriptor->data_size, "", assembly_data, assembly_data_size); } template -force_inline void +[[gnu::always_inline]] void EmbeddedAssemblies::map_runtime_file (XamarinAndroidBundledAssembly& file) noexcept { int fd; @@ -258,20 +258,20 @@ EmbeddedAssemblies::map_runtime_file (XamarinAndroidBundledAssembly& file) noexc } } -force_inline void +[[gnu::always_inline]] void EmbeddedAssemblies::map_assembly (XamarinAndroidBundledAssembly& file) noexcept { map_runtime_file (file); } -force_inline void +[[gnu::always_inline]] void EmbeddedAssemblies::map_debug_data (XamarinAndroidBundledAssembly& file) noexcept { map_runtime_file (file); } template -force_inline MonoAssembly* +[[gnu::always_inline]] MonoAssembly* EmbeddedAssemblies::load_bundled_assembly ( XamarinAndroidBundledAssembly& assembly, dynamic_local_string const& name, @@ -341,7 +341,7 @@ EmbeddedAssemblies::load_bundled_assembly ( } template -force_inline MonoAssembly* +[[gnu::always_inline]] MonoAssembly* EmbeddedAssemblies::individual_assemblies_open_from_bundles (dynamic_local_string& name, TLoaderData loader_data, bool ref_only) noexcept { if (!Util::ends_with (name, SharedConstants::DLL_EXTENSION)) { @@ -377,7 +377,7 @@ EmbeddedAssemblies::individual_assemblies_open_from_bundles (dynamic_local_strin return nullptr; } -force_inline const AssemblyStoreIndexEntry* +[[gnu::always_inline]] const AssemblyStoreIndexEntry* EmbeddedAssemblies::find_assembly_store_entry (hash_t hash, const AssemblyStoreIndexEntry *entries, size_t entry_count) noexcept { auto equal = [](AssemblyStoreIndexEntry const& entry, hash_t key) -> bool { return entry.name_hash == key; }; @@ -391,7 +391,7 @@ EmbeddedAssemblies::find_assembly_store_entry (hash_t hash, const AssemblyStoreI } template -force_inline MonoAssembly* +[[gnu::always_inline]] MonoAssembly* EmbeddedAssemblies::assembly_store_open_from_bundles (dynamic_local_string& name, TLoaderData loader_data, bool ref_only) noexcept { hash_t name_hash = xxhash::hash (name.get (), name.length ()); @@ -468,7 +468,7 @@ EmbeddedAssemblies::assembly_store_open_from_bundles (dynamic_local_string -force_inline MonoAssembly* +[[gnu::always_inline]] MonoAssembly* EmbeddedAssemblies::open_from_bundles (MonoAssemblyName* aname, TLoaderData loader_data, [[maybe_unused]] MonoError *error, bool ref_only) noexcept { const char *culture = mono_assembly_name_get_culture (aname); @@ -530,7 +530,7 @@ EmbeddedAssemblies::install_preload_hooks_for_alc () noexcept } template -force_inline const Entry* +[[gnu::always_inline]] const Entry* EmbeddedAssemblies::binary_search (const Key *key, const Entry *base, size_t nmemb, [[maybe_unused]] size_t precalculated_size) noexcept { static_assert (compare != nullptr, "compare is a required template parameter"); @@ -581,7 +581,7 @@ EmbeddedAssemblies::binary_search (const Key *key, const Entry *base, size_t nme } #if defined (RELEASE) -force_inline const TypeMapModuleEntry* +[[gnu::always_inline]] const TypeMapModuleEntry* EmbeddedAssemblies::binary_search (uint32_t key, const TypeMapModuleEntry *arr, uint32_t n) noexcept { ssize_t left = -1z; @@ -602,7 +602,7 @@ EmbeddedAssemblies::binary_search (uint32_t key, const TypeMapModuleEntry *arr, #endif // def RELEASE #if defined (DEBUG) -force_inline int +[[gnu::always_inline]] int EmbeddedAssemblies::compare_type_name (const char *type_name, const TypeMapEntry *entry) noexcept { if (entry == nullptr) @@ -611,7 +611,7 @@ EmbeddedAssemblies::compare_type_name (const char *type_name, const TypeMapEntry return strcmp (type_name, entry->from); } -force_inline MonoReflectionType* +[[gnu::always_inline]] MonoReflectionType* EmbeddedAssemblies::typemap_java_to_managed ([[maybe_unused]] hash_t hash, const MonoString *java_type) noexcept { c_unique_ptr java_type_name {mono_string_to_utf8 (const_cast(java_type))}; @@ -646,7 +646,7 @@ EmbeddedAssemblies::typemap_java_to_managed ([[maybe_unused]] hash_t hash, const return ret; } #else // def DEBUG -force_inline MonoReflectionType* +[[gnu::always_inline]] MonoReflectionType* EmbeddedAssemblies::typemap_java_to_managed (hash_t hash, const MonoString *java_type_name) noexcept { // In microbrenchmarks, `binary_search_branchless` is faster than `binary_search` but in "real" application tests, @@ -771,13 +771,13 @@ EmbeddedAssemblies::typemap_java_to_managed (MonoString *java_type) noexcept } #if defined (DEBUG) -force_inline const TypeMapEntry* +[[gnu::always_inline]] const TypeMapEntry* EmbeddedAssemblies::typemap_managed_to_java (const char *managed_type_name) noexcept { return binary_search (managed_type_name, type_map.managed_to_java, type_map.entry_count); } -force_inline const char* +[[gnu::always_inline]] const char* EmbeddedAssemblies::typemap_managed_to_java ([[maybe_unused]] MonoType *type, MonoClass *klass, [[maybe_unused]] const uint8_t *mvid) noexcept { c_unique_ptr type_name {mono_type_get_name_full (type, MONO_TYPE_NAME_FORMAT_FULL_NAME)}; @@ -801,13 +801,13 @@ EmbeddedAssemblies::typemap_managed_to_java ([[maybe_unused]] MonoType *type, Mo return entry->to; } #else // def DEBUG -force_inline int +[[gnu::always_inline]] int EmbeddedAssemblies::compare_mvid (const uint8_t *mvid, const TypeMapModule *module) noexcept { return memcmp (mvid, module->module_uuid, sizeof(module->module_uuid)); } -force_inline const char* +[[gnu::always_inline]] const char* EmbeddedAssemblies::typemap_managed_to_java ([[maybe_unused]] MonoType *type, MonoClass *klass, const uint8_t *mvid) noexcept { const TypeMapModule *match = mvid != nullptr ? binary_search (mvid, map_modules, map_module_count) : nullptr; @@ -1269,7 +1269,7 @@ EmbeddedAssemblies::register_from_apk (const char *apk_file, monodroid_should_re } template -force_inline bool +[[gnu::always_inline]] bool EmbeddedAssemblies::maybe_register_assembly_from_filesystem ( [[maybe_unused]] monodroid_should_register should_register, size_t &assembly_count, @@ -1331,7 +1331,7 @@ EmbeddedAssemblies::maybe_register_assembly_from_filesystem ( return false; } -force_inline bool +[[gnu::always_inline]] bool EmbeddedAssemblies::maybe_register_blob_from_filesystem ( [[maybe_unused]] monodroid_should_register should_register, size_t &assembly_count, @@ -1364,7 +1364,7 @@ EmbeddedAssemblies::maybe_register_blob_from_filesystem ( return true; } -force_inline size_t +[[gnu::always_inline]] size_t EmbeddedAssemblies::register_from_filesystem (const char *lib_dir_path,bool look_for_mangled_names, monodroid_should_register should_register) noexcept { log_debug (LOG_ASSEMBLY, "Looking for assemblies in '{}'", optional_string (lib_dir_path)); diff --git a/src/native/mono/monodroid/embedded-assemblies.hh b/src/native/mono/monodroid/embedded-assemblies.hh index 341ecc2a086..f3447a69840 100644 --- a/src/native/mono/monodroid/embedded-assemblies.hh +++ b/src/native/mono/monodroid/embedded-assemblies.hh @@ -21,12 +21,12 @@ #include "archive-dso-stub-config.hh" #include "log_types.hh" -#include "strings.hh" +#include #include "xamarin-app.hh" -#include "cpp-util.hh" +#include #include "cppcompat.hh" #include "shared-constants.hh" -#include "xxhash.hh" +#include #include "util.hh" #include @@ -355,7 +355,7 @@ namespace xamarin::android::internal { && ((application_config.have_runtime_config_blob && runtime_config_blob_found) || !application_config.have_runtime_config_blob); } - force_inline static c_unique_ptr to_utf8 (const MonoString *s) noexcept + [[gnu::always_inline]] static c_unique_ptr to_utf8 (const MonoString *s) noexcept { if (s == nullptr) [[unlikely]] { // We need to duplicate mono_string_to_utf8 behavior diff --git a/src/native/mono/monodroid/jni-remapping.cc b/src/native/mono/monodroid/jni-remapping.cc index 92ffc707573..4122c8fe68a 100644 --- a/src/native/mono/monodroid/jni-remapping.cc +++ b/src/native/mono/monodroid/jni-remapping.cc @@ -6,7 +6,7 @@ using namespace xamarin::android::internal; -force_inline bool +[[gnu::always_inline]] bool JniRemapping::equal (JniRemappingString const& left, const char *right, size_t right_len) noexcept { if (left.length != static_cast(right_len) || left.str[0] != *right) { diff --git a/src/native/mono/monodroid/mono-image-loader.hh b/src/native/mono/monodroid/mono-image-loader.hh index 48812d223b2..ac33fe53588 100644 --- a/src/native/mono/monodroid/mono-image-loader.hh +++ b/src/native/mono/monodroid/mono-image-loader.hh @@ -11,9 +11,9 @@ #include "platform-compat.hh" #include "xamarin-app.hh" -#include "xxhash.hh" -#include "search.hh" -#include "strings.hh" +#include +#include +#include #include "util.hh" #if defined (RELEASE) diff --git a/src/native/mono/monodroid/mono-log-adapter.cc b/src/native/mono/monodroid/mono-log-adapter.cc index ecdd1f21f5f..c3fcff06cdf 100644 --- a/src/native/mono/monodroid/mono-log-adapter.cc +++ b/src/native/mono/monodroid/mono-log-adapter.cc @@ -2,7 +2,7 @@ #include #include "monodroid-glue-internal.hh" -#include "strings.hh" +#include #include "logger.hh" using namespace xamarin::android::internal; diff --git a/src/native/mono/monodroid/monodroid-glue-internal.hh b/src/native/mono/monodroid/monodroid-glue-internal.hh index 36c9206e36d..f5125cb9a5a 100644 --- a/src/native/mono/monodroid/monodroid-glue-internal.hh +++ b/src/native/mono/monodroid/monodroid-glue-internal.hh @@ -9,9 +9,10 @@ #include "android-system.hh" #include "osbridge.hh" #include "timing.hh" -#include "cpp-util.hh" -#include "xxhash.hh" +#include +#include #include "monodroid-dl.hh" +#include #include #include diff --git a/src/native/mono/monodroid/monodroid-glue.cc b/src/native/mono/monodroid/monodroid-glue.cc index ebb72718c57..fac103d595e 100644 --- a/src/native/mono/monodroid/monodroid-glue.cc +++ b/src/native/mono/monodroid/monodroid-glue.cc @@ -61,8 +61,8 @@ #include "runtime-util.hh" #include "monodroid-state.hh" #include "pinvoke-override-api.hh" -#include "cpp-util.hh" -#include "strings.hh" +#include +#include using namespace microsoft::java_interop; using namespace xamarin::android; @@ -774,7 +774,7 @@ MonodroidRuntime::create_domain (JNIEnv *env, jstring_array_wrapper &runtimeApks return domain; } -force_inline void +[[gnu::always_inline]] void MonodroidRuntime::lookup_bridge_info (MonoClass *klass, const OSBridge::MonoJavaGCBridgeType *type, OSBridge::MonoJavaGCBridgeInfo *info) noexcept { info->klass = klass; @@ -799,7 +799,7 @@ MonodroidRuntime::lookup_bridge_info (MonoClass *klass, const OSBridge::MonoJava } } -force_inline void +[[gnu::always_inline]] void MonodroidRuntime::lookup_bridge_info (MonoImage *image, const OSBridge::MonoJavaGCBridgeType *type, OSBridge::MonoJavaGCBridgeInfo *info) noexcept { lookup_bridge_info ( @@ -1301,7 +1301,7 @@ MonodroidRuntime::typemap_managed_to_java (MonoReflectionType *type, const uint8 } #endif // !def RELEASE -force_inline void +[[gnu::always_inline]] void MonodroidRuntime::setup_mono_tracing (std::unique_ptr const& mono_log_mask, bool have_log_assembly, bool have_log_gc) noexcept { constexpr std::string_view MASK_ASM { "asm" }; @@ -1374,7 +1374,7 @@ MonodroidRuntime::setup_mono_tracing (std::unique_ptr const& mono_log_ma mono_trace_set_mask_string (input_log_mask.get ()); } -force_inline void +[[gnu::always_inline]] void MonodroidRuntime::install_logging_handlers () noexcept { mono_trace_set_log_handler (mono_log_handler, nullptr); @@ -1606,7 +1606,7 @@ Java_mono_android_Runtime_initInternal (JNIEnv *env, jclass klass, jstring lang, ); } -force_inline void +[[gnu::always_inline]] void MonodroidRuntime::Java_mono_android_Runtime_register (JNIEnv *env, jstring managedType, jclass nativeClass, jstring methods) noexcept { size_t total_time_index; diff --git a/src/native/mono/monodroid/monodroid-tracing.cc b/src/native/mono/monodroid/monodroid-tracing.cc index 96c9778dd37..adb9f0db1d6 100644 --- a/src/native/mono/monodroid/monodroid-tracing.cc +++ b/src/native/mono/monodroid/monodroid-tracing.cc @@ -5,7 +5,7 @@ #include "mono/utils/details/mono-dl-fallback-types.h" #include "monodroid-glue-internal.hh" #include "native-tracing.hh" -#include +#include using namespace xamarin::android::internal; diff --git a/src/native/mono/monodroid/monovm-properties.hh b/src/native/mono/monodroid/monovm-properties.hh index 2caf946a9e5..51255be9408 100644 --- a/src/native/mono/monodroid/monovm-properties.hh +++ b/src/native/mono/monodroid/monovm-properties.hh @@ -5,7 +5,7 @@ #include #include "monodroid-glue-internal.hh" -#include "jni-wrappers.hh" +#include namespace xamarin::android::internal { diff --git a/src/native/mono/pinvoke-override/generate-pinvoke-tables.cc b/src/native/mono/pinvoke-override/generate-pinvoke-tables.cc index 38f022f2a8e..24fb3f5a24d 100644 --- a/src/native/mono/pinvoke-override/generate-pinvoke-tables.cc +++ b/src/native/mono/pinvoke-override/generate-pinvoke-tables.cc @@ -26,7 +26,7 @@ #include #include -#include "xxhash.hh" +#include namespace fs = std::filesystem; using namespace xamarin::android; diff --git a/src/native/mono/pinvoke-override/pinvoke-override-api.hh b/src/native/mono/pinvoke-override/pinvoke-override-api.hh index 445f8cccf0b..06b00c9978a 100644 --- a/src/native/mono/pinvoke-override/pinvoke-override-api.hh +++ b/src/native/mono/pinvoke-override/pinvoke-override-api.hh @@ -3,7 +3,7 @@ #include #include "cppcompat.hh" -#include "xxhash.hh" +#include // NDEBUG causes robin_map.h not to include which, in turn, prevents indirect inclusion of . // conflicts with our std::mutex definition in cppcompat.hh @@ -39,7 +39,7 @@ namespace xamarin::android { struct string_hash { - force_inline xamarin::android::hash_t operator() (std::string const& s) const noexcept + [[gnu::always_inline]] xamarin::android::hash_t operator() (std::string const& s) const noexcept { return xamarin::android::xxhash::hash (s.c_str (), s.length ()); } diff --git a/src/native/mono/runtime-base/android-system.cc b/src/native/mono/runtime-base/android-system.cc index d3c8b2c56e4..78d59b70bfa 100644 --- a/src/native/mono/runtime-base/android-system.cc +++ b/src/native/mono/runtime-base/android-system.cc @@ -6,12 +6,12 @@ #include #include "android-system.hh" -#include "cpp-util.hh" +#include #include "java-interop-dlfcn.h" #include "java-interop.h" -#include "jni-wrappers.hh" +#include #include "shared-constants.hh" -#include "strings.hh" +#include #include "util.hh" #include "xamarin-app.hh" @@ -720,7 +720,7 @@ AndroidSystem::for_each_apk (jstring_array_wrapper &runtimeApks, ForEachApkHandl } } -force_inline void +[[gnu::always_inline]] void AndroidSystem::add_apk_libdir (const char *apk, size_t &index, const char *abi) noexcept { abort_unless (index < app_lib_directories.size (), "Index out of range"); @@ -729,7 +729,7 @@ AndroidSystem::add_apk_libdir (const char *apk, size_t &index, const char *abi) index++; } -force_inline void +[[gnu::always_inline]] void AndroidSystem::setup_apk_directories (unsigned short running_on_cpu, jstring_array_wrapper &runtimeApks, bool have_split_apks) noexcept { const char *abi = android_abi_names [running_on_cpu]; diff --git a/src/native/mono/runtime-base/android-system.hh b/src/native/mono/runtime-base/android-system.hh index 4ff2afe982d..77404cd35b7 100644 --- a/src/native/mono/runtime-base/android-system.hh +++ b/src/native/mono/runtime-base/android-system.hh @@ -17,8 +17,8 @@ #include "xamarin-app.hh" #include "cpu-arch.hh" -#include "jni-wrappers.hh" -#include "strings.hh" +#include +#include static inline constexpr size_t PROPERTY_VALUE_BUFFER_LEN = PROP_VALUE_MAX + 1uz; diff --git a/src/native/mono/runtime-base/cpu-arch-detect.cc b/src/native/mono/runtime-base/cpu-arch-detect.cc index 7a7a47b0059..b46a46984b9 100644 --- a/src/native/mono/runtime-base/cpu-arch-detect.cc +++ b/src/native/mono/runtime-base/cpu-arch-detect.cc @@ -1,7 +1,7 @@ #include #include -#include "cpp-util.hh" +#include #include "cpu-arch.hh" #if __arm__ diff --git a/src/native/mono/runtime-base/logger.cc b/src/native/mono/runtime-base/logger.cc index dcc93d08d7e..256f6f2b030 100644 --- a/src/native/mono/runtime-base/logger.cc +++ b/src/native/mono/runtime-base/logger.cc @@ -11,8 +11,8 @@ #include #include "android-system.hh" -#include "cpp-util.hh" -#include "log_level.hh" +#include +#include #include "logger.hh" #include "shared-constants.hh" #include "util.hh" @@ -108,7 +108,7 @@ Logger::init_reference_logging (const char *override_dir) noexcept } } -force_inline bool +[[gnu::always_inline]] bool Logger::set_category (std::string_view const& name, string_segment& arg, unsigned int entry, bool arg_starts_with_name) noexcept { if ((log_categories & entry) == entry) { diff --git a/src/native/mono/runtime-base/logger.hh b/src/native/mono/runtime-base/logger.hh index f2d4ad9f966..48a1849f367 100644 --- a/src/native/mono/runtime-base/logger.hh +++ b/src/native/mono/runtime-base/logger.hh @@ -4,7 +4,7 @@ #include #include "log_types.hh" -#include "strings.hh" +#include namespace xamarin::android { class Logger @@ -43,7 +43,7 @@ namespace xamarin::android { } private: - static bool set_category (std::string_view const& name, internal::string_segment& arg, unsigned int entry, bool arg_starts_with_name = false) noexcept; + static bool set_category (std::string_view const& name, string_segment& arg, unsigned int entry, bool arg_starts_with_name = false) noexcept; private: static inline LogTimingCategories _log_timing_categories; diff --git a/src/native/mono/runtime-base/monodroid-dl.hh b/src/native/mono/runtime-base/monodroid-dl.hh index 4c3df81e077..93cb8b70b48 100644 --- a/src/native/mono/runtime-base/monodroid-dl.hh +++ b/src/native/mono/runtime-base/monodroid-dl.hh @@ -5,12 +5,12 @@ #include #include -#include +#include #include #include "android-system.hh" #include "monodroid-state.hh" -#include "search.hh" +#include #include "shared-constants.hh" #include "startup-aware-lock.hh" #include "util.hh" diff --git a/src/native/mono/runtime-base/shared-constants.hh b/src/native/mono/runtime-base/shared-constants.hh index 0b7264d5ce4..942b41fc964 100644 --- a/src/native/mono/runtime-base/shared-constants.hh +++ b/src/native/mono/runtime-base/shared-constants.hh @@ -2,8 +2,8 @@ #define __SHARED_CONSTANTS_HH #include -#include "cpp-util.hh" -#include "xxhash.hh" +#include +#include namespace xamarin::android::internal { diff --git a/src/native/mono/runtime-base/timing-internal.hh b/src/native/mono/runtime-base/timing-internal.hh index d87595ac9bd..6389e719e7e 100644 --- a/src/native/mono/runtime-base/timing-internal.hh +++ b/src/native/mono/runtime-base/timing-internal.hh @@ -6,10 +6,10 @@ #include #include -#include "cpp-util.hh" +#include #include "logger.hh" #include "startup-aware-lock.hh" -#include "strings.hh" +#include #include "util.hh" #include "shared-constants.hh" #include "monodroid-state.hh" @@ -94,19 +94,19 @@ namespace xamarin::android::internal } public: - force_inline static bool enabled () noexcept + [[gnu::always_inline]] static bool enabled () noexcept { return is_enabled; } - force_inline static bool is_bare_mode () noexcept + [[gnu::always_inline]] static bool is_bare_mode () noexcept { return (Logger::log_timing_categories() & LogTimingCategories::Bare) == LogTimingCategories::Bare || (Logger::log_timing_categories() & LogTimingCategories::FastBare) == LogTimingCategories::FastBare; } - force_inline static void initialize (bool log_immediately) noexcept + [[gnu::always_inline]] static void initialize (bool log_immediately) noexcept { if (!Util::should_log (LOG_TIMING)) [[likely]] { return; @@ -133,7 +133,7 @@ namespace xamarin::android::internal // worrying about concurrency. Emplacing a new element in the vector would require holding the mutex, something // that's fairly costly and has unpredictable effect on time spent acquiring and holding the lock (the OS can // preempt us at this point) - force_inline size_t start_event (TimingEventKind kind = TimingEventKind::Unspecified) noexcept + [[gnu::always_inline]] size_t start_event (TimingEventKind kind = TimingEventKind::Unspecified) noexcept { size_t index = next_event_index.fetch_add (1); @@ -157,7 +157,7 @@ namespace xamarin::android::internal return index; } - force_inline void end_event (size_t event_index, bool uses_more_info = false) noexcept + [[gnu::always_inline]] void end_event (size_t event_index, bool uses_more_info = false) noexcept { if (!is_valid_event_index (event_index, __PRETTY_FUNCTION__)) [[unlikely]] { return; @@ -168,7 +168,7 @@ namespace xamarin::android::internal } template - force_inline void add_more_info (size_t event_index, string_base const& str) noexcept + [[gnu::always_inline]] void add_more_info (size_t event_index, string_base const& str) noexcept { if (!is_valid_event_index (event_index, __PRETTY_FUNCTION__)) [[unlikely]] { return; @@ -178,7 +178,7 @@ namespace xamarin::android::internal log (events[event_index], false /* skip_log_if_more_info_missing */); } - force_inline void add_more_info (size_t event_index, const char* str) noexcept + [[gnu::always_inline]] void add_more_info (size_t event_index, const char* str) noexcept { if (!is_valid_event_index (event_index, __PRETTY_FUNCTION__)) [[unlikely]] { return; @@ -188,7 +188,7 @@ namespace xamarin::android::internal log (events[event_index], false /* skip_log_if_more_info_missing */); } - force_inline static void get_time (time_t &seconds_out, uint64_t& ns_out) noexcept + [[gnu::always_inline]] static void get_time (time_t &seconds_out, uint64_t& ns_out) noexcept { int ret; timespec tv_ctm; @@ -199,7 +199,7 @@ namespace xamarin::android::internal } template - force_inline static void calculate_interval (P const& start, P const& end, I &result) noexcept + [[gnu::always_inline]] static void calculate_interval (P const& start, P const& end, I &result) noexcept { uint64_t nsec; if (end.ns < start.ns) { @@ -223,7 +223,7 @@ namespace xamarin::android::internal } template - force_inline static void calculate_interval (P const& start, P const& end, I &result, uint64_t& total_ns) noexcept + [[gnu::always_inline]] static void calculate_interval (P const& start, P const& end, I &result, uint64_t& total_ns) noexcept { calculate_interval (start, end, result); total_ns = @@ -238,12 +238,12 @@ namespace xamarin::android::internal static void really_initialize (bool log_immediately) noexcept; static void* timing_signal_thread (void *arg) noexcept; - force_inline static void mark (TimingEventPoint &point) noexcept + [[gnu::always_inline]] static void mark (TimingEventPoint &point) noexcept { get_time (point.sec, point.ns); } - force_inline bool is_valid_event_index (size_t index, const char *method_name) noexcept + [[gnu::always_inline]] bool is_valid_event_index (size_t index, const char *method_name) noexcept { if (index >= events.capacity ()) [[unlikely]] { log_warn (LOG_TIMING, "Invalid event index passed to method '{}'", method_name); @@ -254,7 +254,7 @@ namespace xamarin::android::internal } template - force_inline static void append_event_kind_description (TimingEventKind kind, dynamic_local_string& message) noexcept + [[gnu::always_inline]] static void append_event_kind_description (TimingEventKind kind, dynamic_local_string& message) noexcept { switch (kind) { case TimingEventKind::AssemblyDecompression: { @@ -353,7 +353,7 @@ namespace xamarin::android::internal // having to be kept in sync with the actual wording used for the event message. // template - force_inline static void format_and_log (TimingEvent const& event, TimingInterval const& interval, dynamic_local_string& message, bool indent = false) noexcept + [[gnu::always_inline]] static void format_and_log (TimingEvent const& event, TimingInterval const& interval, dynamic_local_string& message, bool indent = false) noexcept { constexpr char INDENT[] = " "; constexpr char NATIVE_INIT_TAG[] = "[0/"; @@ -392,14 +392,14 @@ namespace xamarin::android::internal } template - force_inline static void format_and_log (TimingEvent const& event, dynamic_local_string& message, uint64_t& total_ns, bool indent = false) noexcept + [[gnu::always_inline]] static void format_and_log (TimingEvent const& event, dynamic_local_string& message, uint64_t& total_ns, bool indent = false) noexcept { TimingInterval interval; calculate_interval (event.start, event.end, interval, total_ns); format_and_log (event, interval, message, indent); } - force_inline static void format_and_log (TimingEvent const& event) noexcept + [[gnu::always_inline]] static void format_and_log (TimingEvent const& event) noexcept { TimingInterval interval; calculate_interval (event.start, event.end, interval); @@ -410,7 +410,7 @@ namespace xamarin::android::internal format_and_log (event, interval, message); } - force_inline static void log (TimingEvent const& event, bool skip_log_if_more_info_missing) noexcept + [[gnu::always_inline]] static void log (TimingEvent const& event, bool skip_log_if_more_info_missing) noexcept { if (!immediate_logging) { return; @@ -423,7 +423,7 @@ namespace xamarin::android::internal format_and_log (event); } - force_inline static void ns_to_time (uint64_t total_ns, uint32_t &sec, uint32_t &ms, uint32_t &ns) noexcept + [[gnu::always_inline]] static void ns_to_time (uint64_t total_ns, uint32_t &sec, uint32_t &ms, uint32_t &ns) noexcept { sec = static_cast(total_ns / ns_in_second); if (sec > 0) { diff --git a/src/native/mono/runtime-base/util.cc b/src/native/mono/runtime-base/util.cc index e0c568124ea..d377cc46c31 100644 --- a/src/native/mono/runtime-base/util.cc +++ b/src/native/mono/runtime-base/util.cc @@ -12,6 +12,7 @@ #include #include +#include #include "util.hh" using namespace xamarin::android; diff --git a/src/native/mono/runtime-base/util.hh b/src/native/mono/runtime-base/util.hh index 986f7f2e49a..33e9524703f 100644 --- a/src/native/mono/runtime-base/util.hh +++ b/src/native/mono/runtime-base/util.hh @@ -23,6 +23,7 @@ static inline constexpr int FALSE = 0; #include #include #include +#include #include #include #include @@ -37,10 +38,10 @@ static inline constexpr int FALSE = 0; #include #include -#include "jni-wrappers.hh" +#include #include "java-interop-util.h" #include "logger.hh" -#include "strings.hh" +#include #ifdef __cplusplus namespace xamarin::android @@ -126,25 +127,25 @@ namespace xamarin::android } template - static void path_combine (internal::static_local_string& buf, const char* path1, const char* path2) noexcept + static void path_combine (static_local_string& buf, const char* path1, const char* path2) noexcept { path_combine (buf, path1, path2); } template - static void path_combine (internal::static_local_string& buf, const char* path1, size_t path1_len, const char* path2, size_t path2_len) noexcept + static void path_combine (static_local_string& buf, const char* path1, size_t path1_len, const char* path2, size_t path2_len) noexcept { path_combine (buf, path1, path1_len, path2, path2_len); } template - static void path_combine (internal::dynamic_local_string& buf, const char* path1, const char* path2) noexcept + static void path_combine (dynamic_local_string& buf, const char* path1, const char* path2) noexcept { path_combine (buf, path1, path2); } template - static void path_combine (internal::dynamic_local_string& buf, const char* path1, size_t path1_len, const char* path2, size_t path2_len) noexcept + static void path_combine (dynamic_local_string& buf, const char* path1, size_t path1_len, const char* path2, size_t path2_len) noexcept { path_combine (buf, path1, path1_len, path2, path2_len); } @@ -161,7 +162,7 @@ namespace xamarin::android } template - static bool ends_with (internal::dynamic_local_string const& str, std::string_view const& sv) noexcept + static bool ends_with (dynamic_local_string const& str, std::string_view const& sv) noexcept { if (str.length () < sv.length ()) { return false; @@ -195,7 +196,7 @@ namespace xamarin::android } template - static bool ends_with (internal::string_base const& str, const char (&end)[N]) noexcept + static bool ends_with (string_base const& str, const char (&end)[N]) noexcept { constexpr size_t end_length = N - 1uz; @@ -208,7 +209,7 @@ namespace xamarin::android } template - static bool ends_with (internal::string_base const& str, std::array const& end) noexcept + static bool ends_with (string_base const& str, std::array const& end) noexcept { constexpr size_t end_length = N - 1uz; @@ -221,7 +222,7 @@ namespace xamarin::android } template - static const TChar* find_last (internal::string_base const& str, const char ch) noexcept + static const TChar* find_last (string_base const& str, const char ch) noexcept { if (str.empty ()) { return nullptr; @@ -276,12 +277,12 @@ namespace xamarin::android } template - static char *strdup_new (internal::dynamic_local_string const& buf) noexcept + static char *strdup_new (dynamic_local_string const& buf) noexcept { return strdup_new (buf.get (), buf.length ()); } - static char *strdup_new (xamarin::android::internal::string_segment const& s, size_t from_index = 0uz) noexcept + static char *strdup_new (string_segment const& s, size_t from_index = 0uz) noexcept { if (from_index >= s.length ()) { return nullptr; diff --git a/src/native/mono/shared/cpp-util.hh b/src/native/mono/shared/cpp-util.hh index 6e77d98f5f7..abbaa95bb79 100644 --- a/src/native/mono/shared/cpp-util.hh +++ b/src/native/mono/shared/cpp-util.hh @@ -17,7 +17,7 @@ #include #include -#include "helpers.hh" +#include namespace xamarin::android::detail { [[gnu::always_inline, gnu::flatten]] diff --git a/src/native/mono/shared/helpers.cc b/src/native/mono/shared/helpers.cc index 9638b16ebd5..d1a785cc09b 100644 --- a/src/native/mono/shared/helpers.cc +++ b/src/native/mono/shared/helpers.cc @@ -2,7 +2,7 @@ #include #include -#include "helpers.hh" +#include #include "log_types.hh" using namespace xamarin::android; diff --git a/src/native/mono/shared/log_functions.cc b/src/native/mono/shared/log_functions.cc index c6d61f54d0d..394ba2a1927 100644 --- a/src/native/mono/shared/log_functions.cc +++ b/src/native/mono/shared/log_functions.cc @@ -4,7 +4,7 @@ #include #include "java-interop-logger.h" -#include "log_level.hh" +#include // Must match the same ordering as LogCategories static constexpr std::array log_names = { diff --git a/src/native/mono/shared/log_types.hh b/src/native/mono/shared/log_types.hh index 66b1cae5097..53e7fbc97df 100644 --- a/src/native/mono/shared/log_types.hh +++ b/src/native/mono/shared/log_types.hh @@ -6,7 +6,7 @@ #include #include "java-interop-logger.h" -#include "log_level.hh" +#include // We redeclare macros here #if defined(log_debug) diff --git a/src/native/mono/xamarin-app-stub/application_dso_stub.cc b/src/native/mono/xamarin-app-stub/application_dso_stub.cc index f840005c204..c026be2b346 100644 --- a/src/native/mono/xamarin-app-stub/application_dso_stub.cc +++ b/src/native/mono/xamarin-app-stub/application_dso_stub.cc @@ -2,7 +2,7 @@ #include #include "xamarin-app.hh" -#include "xxhash.hh" +#include // This file MUST have "valid" values everywhere - the DSO it is compiled into is loaded by the // designer on desktop. diff --git a/src/native/mono/xamarin-app-stub/xamarin-app.hh b/src/native/mono/xamarin-app-stub/xamarin-app.hh index 426b4913e55..8216cad0848 100644 --- a/src/native/mono/xamarin-app-stub/xamarin-app.hh +++ b/src/native/mono/xamarin-app-stub/xamarin-app.hh @@ -9,7 +9,7 @@ #include #include -#include "xxhash.hh" +#include static constexpr uint64_t FORMAT_TAG = 0x00035E6972616D58; // 'Xmari^XY' where XY is the format version static constexpr uint32_t COMPRESSED_DATA_MAGIC = 0x5A4C4158; // 'XALZ', little-endian diff --git a/src/native/mono/xamarin-debug-app-helper/debug-app-helper.cc b/src/native/mono/xamarin-debug-app-helper/debug-app-helper.cc index e64c42750c8..85de1c000ed 100644 --- a/src/native/mono/xamarin-debug-app-helper/debug-app-helper.cc +++ b/src/native/mono/xamarin-debug-app-helper/debug-app-helper.cc @@ -13,7 +13,7 @@ #include "util.hh" #include "debug-app-helper.hh" #include "shared-constants.hh" -#include "jni-wrappers.hh" +#include #include "log_types.hh" using namespace xamarin::android;