1 /*
2  * Copyright (C) 2011 The Android Open Source Project
3  *
4  * Licensed under the Apache License, Version 2.0 (the "License");
5  * you may not use this file except in compliance with the License.
6  * You may obtain a copy of the License at
7  *
8  *      http://www.apache.org/licenses/LICENSE-2.0
9  *
10  * Unless required by applicable law or agreed to in writing, software
11  * distributed under the License is distributed on an "AS IS" BASIS,
12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13  * See the License for the specific language governing permissions and
14  * limitations under the License.
15  */
16 
17 #ifndef ART_RUNTIME_VERIFIER_METHOD_VERIFIER_H_
18 #define ART_RUNTIME_VERIFIER_METHOD_VERIFIER_H_
19 
20 #include <memory>
21 #include <vector>
22 
23 #include "base/macros.h"
24 #include "dex_file.h"
25 #include "handle.h"
26 #include "instruction_flags.h"
27 #include "method_reference.h"
28 #include "reg_type_cache.h"
29 
30 namespace art {
31 
32 class Instruction;
33 struct ReferenceMap2Visitor;
34 class Thread;
35 
36 namespace verifier {
37 
38 class DexPcToReferenceMap;
39 class MethodVerifier;
40 class RegisterLine;
41 class RegType;
42 
43 /*
44  * "Direct" and "virtual" methods are stored independently. The type of call used to invoke the
45  * method determines which list we search, and whether we travel up into superclasses.
46  *
47  * (<clinit>, <init>, and methods declared "private" or "static" are stored in the "direct" list.
48  * All others are stored in the "virtual" list.)
49  */
50 enum MethodType {
51   METHOD_UNKNOWN  = 0,
52   METHOD_DIRECT,      // <init>, private
53   METHOD_STATIC,      // static
54   METHOD_VIRTUAL,     // virtual, super
55   METHOD_INTERFACE    // interface
56 };
57 std::ostream& operator<<(std::ostream& os, const MethodType& rhs);
58 
59 /*
60  * An enumeration of problems that can turn up during verification.
61  * Both VERIFY_ERROR_BAD_CLASS_SOFT and VERIFY_ERROR_BAD_CLASS_HARD denote failures that cause
62  * the entire class to be rejected. However, VERIFY_ERROR_BAD_CLASS_SOFT denotes a soft failure
63  * that can potentially be corrected, and the verifier will try again at runtime.
64  * VERIFY_ERROR_BAD_CLASS_HARD denotes a hard failure that can't be corrected, and will cause
65  * the class to remain uncompiled. Other errors denote verification errors that cause bytecode
66  * to be rewritten to fail at runtime.
67  */
68 enum VerifyError {
69   VERIFY_ERROR_BAD_CLASS_HARD,  // VerifyError; hard error that skips compilation.
70   VERIFY_ERROR_BAD_CLASS_SOFT,  // VerifyError; soft error that verifies again at runtime.
71 
72   VERIFY_ERROR_NO_CLASS,        // NoClassDefFoundError.
73   VERIFY_ERROR_NO_FIELD,        // NoSuchFieldError.
74   VERIFY_ERROR_NO_METHOD,       // NoSuchMethodError.
75   VERIFY_ERROR_ACCESS_CLASS,    // IllegalAccessError.
76   VERIFY_ERROR_ACCESS_FIELD,    // IllegalAccessError.
77   VERIFY_ERROR_ACCESS_METHOD,   // IllegalAccessError.
78   VERIFY_ERROR_CLASS_CHANGE,    // IncompatibleClassChangeError.
79   VERIFY_ERROR_INSTANTIATION,   // InstantiationError.
80 };
81 std::ostream& operator<<(std::ostream& os, const VerifyError& rhs);
82 
83 /*
84  * Identifies the type of reference in the instruction that generated the verify error
85  * (e.g. VERIFY_ERROR_ACCESS_CLASS could come from a method, field, or class reference).
86  *
87  * This must fit in two bits.
88  */
89 enum VerifyErrorRefType {
90   VERIFY_ERROR_REF_CLASS  = 0,
91   VERIFY_ERROR_REF_FIELD  = 1,
92   VERIFY_ERROR_REF_METHOD = 2,
93 };
94 const int kVerifyErrorRefTypeShift = 6;
95 
96 // We don't need to store the register data for many instructions, because we either only need
97 // it at branch points (for verification) or GC points and branches (for verification +
98 // type-precise register analysis).
99 enum RegisterTrackingMode {
100   kTrackRegsBranches,
101   kTrackCompilerInterestPoints,
102   kTrackRegsAll,
103 };
104 
105 // A mapping from a dex pc to the register line statuses as they are immediately prior to the
106 // execution of that instruction.
107 class PcToRegisterLineTable {
108  public:
PcToRegisterLineTable()109   PcToRegisterLineTable() : size_(0) {}
110   ~PcToRegisterLineTable();
111 
112   // Initialize the RegisterTable. Every instruction address can have a different set of information
113   // about what's in which register, but for verification purposes we only need to store it at
114   // branch target addresses (because we merge into that).
115   void Init(RegisterTrackingMode mode, InstructionFlags* flags, uint32_t insns_size,
116             uint16_t registers_size, MethodVerifier* verifier);
117 
GetLine(size_t idx)118   RegisterLine* GetLine(size_t idx) {
119     DCHECK_LT(idx, size_);
120     return register_lines_[idx];
121   }
122 
123  private:
124   std::unique_ptr<RegisterLine*[]> register_lines_;
125   size_t size_;
126 
127   DISALLOW_COPY_AND_ASSIGN(PcToRegisterLineTable);
128 };
129 
130 // The verifier
131 class MethodVerifier {
132  public:
133   enum FailureKind {
134     kNoFailure,
135     kSoftFailure,
136     kHardFailure,
137   };
138 
139   /* Verify a class. Returns "kNoFailure" on success. */
140   static FailureKind VerifyClass(Thread* self, mirror::Class* klass, bool allow_soft_failures,
141                                  std::string* error)
142       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
143   static FailureKind VerifyClass(Thread* self, const DexFile* dex_file,
144                                  Handle<mirror::DexCache> dex_cache,
145                                  Handle<mirror::ClassLoader> class_loader,
146                                  const DexFile::ClassDef* class_def,
147                                  bool allow_soft_failures, std::string* error)
148       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
149 
150   static MethodVerifier* VerifyMethodAndDump(Thread* self, std::ostream& os, uint32_t method_idx,
151                                              const DexFile* dex_file,
152                                              Handle<mirror::DexCache> dex_cache,
153                                              Handle<mirror::ClassLoader> class_loader,
154                                              const DexFile::ClassDef* class_def,
155                                              const DexFile::CodeItem* code_item, ArtMethod* method,
156                                              uint32_t method_access_flags)
157       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
158 
159   static FailureKind VerifyMethod(ArtMethod* method, bool allow_soft_failures,
160                                   std::string* error) SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
161 
162   uint8_t EncodePcToReferenceMapData() const;
163 
DexFileVersion()164   uint32_t DexFileVersion() const {
165     return dex_file_->GetVersion();
166   }
167 
GetRegTypeCache()168   RegTypeCache* GetRegTypeCache() {
169     return &reg_types_;
170   }
171 
172   // Log a verification failure.
173   std::ostream& Fail(VerifyError error);
174 
175   // Log for verification information.
176   std::ostream& LogVerifyInfo();
177 
178   // Dump the failures encountered by the verifier.
179   std::ostream& DumpFailures(std::ostream& os);
180 
181   // Dump the state of the verifier, namely each instruction, what flags are set on it, register
182   // information
183   void Dump(std::ostream& os) SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
184 
185   // Fills 'monitor_enter_dex_pcs' with the dex pcs of the monitor-enter instructions corresponding
186   // to the locks held at 'dex_pc' in method 'm'.
187   static void FindLocksAtDexPc(ArtMethod* m, uint32_t dex_pc,
188                                std::vector<uint32_t>* monitor_enter_dex_pcs)
189       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
190 
191   // Returns the accessed field corresponding to the quick instruction's field
192   // offset at 'dex_pc' in method 'm'.
193   static ArtField* FindAccessedFieldAtDexPc(ArtMethod* m, uint32_t dex_pc)
194       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
195 
196   // Returns the invoked method corresponding to the quick instruction's vtable
197   // index at 'dex_pc' in method 'm'.
198   static ArtMethod* FindInvokedMethodAtDexPc(ArtMethod* m, uint32_t dex_pc)
199       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
200 
201   static SafeMap<uint32_t, std::set<uint32_t>> FindStringInitMap(ArtMethod* m)
202       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
203 
204   static void Init() SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
205   static void Shutdown();
206 
CanLoadClasses()207   bool CanLoadClasses() const {
208     return can_load_classes_;
209   }
210 
MethodVerifier(Thread * self,const DexFile * dex_file,Handle<mirror::DexCache> dex_cache,Handle<mirror::ClassLoader> class_loader,const DexFile::ClassDef * class_def,const DexFile::CodeItem * code_item,uint32_t method_idx,ArtMethod * method,uint32_t access_flags,bool can_load_classes,bool allow_soft_failures,bool need_precise_constants,bool allow_thread_suspension)211   MethodVerifier(Thread* self, const DexFile* dex_file, Handle<mirror::DexCache> dex_cache,
212                  Handle<mirror::ClassLoader> class_loader, const DexFile::ClassDef* class_def,
213                  const DexFile::CodeItem* code_item, uint32_t method_idx,
214                  ArtMethod* method,
215                  uint32_t access_flags, bool can_load_classes, bool allow_soft_failures,
216                  bool need_precise_constants, bool allow_thread_suspension)
217           SHARED_LOCKS_REQUIRED(Locks::mutator_lock_)
218       : MethodVerifier(self, dex_file, dex_cache, class_loader, class_def, code_item, method_idx,
219                        method, access_flags, can_load_classes, allow_soft_failures,
220                        need_precise_constants, false, allow_thread_suspension) {}
221 
222   ~MethodVerifier();
223 
224   // Run verification on the method. Returns true if verification completes and false if the input
225   // has an irrecoverable corruption.
226   bool Verify() SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
227 
228   // Describe VRegs at the given dex pc.
229   std::vector<int32_t> DescribeVRegs(uint32_t dex_pc);
230 
231   static void VisitStaticRoots(RootVisitor* visitor)
232       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
233   void VisitRoots(RootVisitor* visitor, const RootInfo& roots)
234       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
235 
236   // Accessors used by the compiler via CompilerCallback
237   const DexFile::CodeItem* CodeItem() const;
238   RegisterLine* GetRegLine(uint32_t dex_pc);
239   const InstructionFlags& GetInstructionFlags(size_t index) const;
240   mirror::ClassLoader* GetClassLoader() SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
241   mirror::DexCache* GetDexCache() SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
242   MethodReference GetMethodReference() const;
243   uint32_t GetAccessFlags() const;
244   bool HasCheckCasts() const;
245   bool HasVirtualOrInterfaceInvokes() const;
246   bool HasFailures() const;
HasInstructionThatWillThrow()247   bool HasInstructionThatWillThrow() const {
248     return have_any_pending_runtime_throw_failure_;
249   }
250 
251   const RegType& ResolveCheckedClass(uint32_t class_idx)
252       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
253   // Returns the method of a quick invoke or null if it cannot be found.
254   ArtMethod* GetQuickInvokedMethod(const Instruction* inst, RegisterLine* reg_line,
255                                            bool is_range, bool allow_failure)
256       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
257   // Returns the access field of a quick field access (iget/iput-quick) or null
258   // if it cannot be found.
259   ArtField* GetQuickFieldAccess(const Instruction* inst, RegisterLine* reg_line)
260       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
261 
262   // Is the method being verified a constructor?
IsConstructor()263   bool IsConstructor() const {
264     return (method_access_flags_ & kAccConstructor) != 0;
265   }
266 
267   // Is the method verified static?
IsStatic()268   bool IsStatic() const {
269     return (method_access_flags_ & kAccStatic) != 0;
270   }
271 
IsInstanceConstructor()272   bool IsInstanceConstructor() const {
273     return IsConstructor() && !IsStatic();
274   }
275 
GetStringInitPcRegMap()276   SafeMap<uint32_t, std::set<uint32_t>>& GetStringInitPcRegMap() {
277     return string_init_pc_reg_map_;
278   }
279 
280  private:
281   // Private constructor for dumping.
282   MethodVerifier(Thread* self, const DexFile* dex_file, Handle<mirror::DexCache> dex_cache,
283                  Handle<mirror::ClassLoader> class_loader, const DexFile::ClassDef* class_def,
284                  const DexFile::CodeItem* code_item, uint32_t method_idx,
285                  ArtMethod* method, uint32_t access_flags,
286                  bool can_load_classes, bool allow_soft_failures, bool need_precise_constants,
287                  bool verify_to_dump, bool allow_thread_suspension)
288       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
289 
290   // Adds the given string to the beginning of the last failure message.
291   void PrependToLastFailMessage(std::string);
292 
293   // Adds the given string to the end of the last failure message.
294   void AppendToLastFailMessage(std::string);
295 
296   /*
297    * Perform verification on a single method.
298    *
299    * We do this in three passes:
300    *  (1) Walk through all code units, determining instruction locations,
301    *      widths, and other characteristics.
302    *  (2) Walk through all code units, performing static checks on
303    *      operands.
304    *  (3) Iterate through the method, checking type safety and looking
305    *      for code flow problems.
306    */
307   static FailureKind VerifyMethod(Thread* self, uint32_t method_idx, const DexFile* dex_file,
308                                   Handle<mirror::DexCache> dex_cache,
309                                   Handle<mirror::ClassLoader> class_loader,
310                                   const DexFile::ClassDef* class_def_idx,
311                                   const DexFile::CodeItem* code_item,
312                                   ArtMethod* method, uint32_t method_access_flags,
313                                   bool allow_soft_failures, bool need_precise_constants)
314       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
315 
316   void FindLocksAtDexPc() SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
317 
318   ArtField* FindAccessedFieldAtDexPc(uint32_t dex_pc)
319       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
320 
321   ArtMethod* FindInvokedMethodAtDexPc(uint32_t dex_pc)
322       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
323 
324   SafeMap<uint32_t, std::set<uint32_t>>& FindStringInitMap()
325       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
326 
327   /*
328    * Compute the width of the instruction at each address in the instruction stream, and store it in
329    * insn_flags_. Addresses that are in the middle of an instruction, or that are part of switch
330    * table data, are not touched (so the caller should probably initialize "insn_flags" to zero).
331    *
332    * The "new_instance_count_" and "monitor_enter_count_" fields in vdata are also set.
333    *
334    * Performs some static checks, notably:
335    * - opcode of first instruction begins at index 0
336    * - only documented instructions may appear
337    * - each instruction follows the last
338    * - last byte of last instruction is at (code_length-1)
339    *
340    * Logs an error and returns "false" on failure.
341    */
342   bool ComputeWidthsAndCountOps();
343 
344   /*
345    * Set the "in try" flags for all instructions protected by "try" statements. Also sets the
346    * "branch target" flags for exception handlers.
347    *
348    * Call this after widths have been set in "insn_flags".
349    *
350    * Returns "false" if something in the exception table looks fishy, but we're expecting the
351    * exception table to be somewhat sane.
352    */
353   bool ScanTryCatchBlocks() SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
354 
355   /*
356    * Perform static verification on all instructions in a method.
357    *
358    * Walks through instructions in a method calling VerifyInstruction on each.
359    */
360   bool VerifyInstructions();
361 
362   /*
363    * Perform static verification on an instruction.
364    *
365    * As a side effect, this sets the "branch target" flags in InsnFlags.
366    *
367    * "(CF)" items are handled during code-flow analysis.
368    *
369    * v3 4.10.1
370    * - target of each jump and branch instruction must be valid
371    * - targets of switch statements must be valid
372    * - operands referencing constant pool entries must be valid
373    * - (CF) operands of getfield, putfield, getstatic, putstatic must be valid
374    * - (CF) operands of method invocation instructions must be valid
375    * - (CF) only invoke-direct can call a method starting with '<'
376    * - (CF) <clinit> must never be called explicitly
377    * - operands of instanceof, checkcast, new (and variants) must be valid
378    * - new-array[-type] limited to 255 dimensions
379    * - can't use "new" on an array class
380    * - (?) limit dimensions in multi-array creation
381    * - local variable load/store register values must be in valid range
382    *
383    * v3 4.11.1.2
384    * - branches must be within the bounds of the code array
385    * - targets of all control-flow instructions are the start of an instruction
386    * - register accesses fall within range of allocated registers
387    * - (N/A) access to constant pool must be of appropriate type
388    * - code does not end in the middle of an instruction
389    * - execution cannot fall off the end of the code
390    * - (earlier) for each exception handler, the "try" area must begin and
391    *   end at the start of an instruction (end can be at the end of the code)
392    * - (earlier) for each exception handler, the handler must start at a valid
393    *   instruction
394    */
395   bool VerifyInstruction(const Instruction* inst, uint32_t code_offset);
396 
397   /* Ensure that the register index is valid for this code item. */
398   bool CheckRegisterIndex(uint32_t idx);
399 
400   /* Ensure that the wide register index is valid for this code item. */
401   bool CheckWideRegisterIndex(uint32_t idx);
402 
403   // Perform static checks on a field Get or set instruction. All we do here is ensure that the
404   // field index is in the valid range.
405   bool CheckFieldIndex(uint32_t idx);
406 
407   // Perform static checks on a method invocation instruction. All we do here is ensure that the
408   // method index is in the valid range.
409   bool CheckMethodIndex(uint32_t idx);
410 
411   // Perform static checks on a "new-instance" instruction. Specifically, make sure the class
412   // reference isn't for an array class.
413   bool CheckNewInstance(uint32_t idx);
414 
415   /* Ensure that the string index is in the valid range. */
416   bool CheckStringIndex(uint32_t idx);
417 
418   // Perform static checks on an instruction that takes a class constant. Ensure that the class
419   // index is in the valid range.
420   bool CheckTypeIndex(uint32_t idx);
421 
422   // Perform static checks on a "new-array" instruction. Specifically, make sure they aren't
423   // creating an array of arrays that causes the number of dimensions to exceed 255.
424   bool CheckNewArray(uint32_t idx);
425 
426   // Verify an array data table. "cur_offset" is the offset of the fill-array-data instruction.
427   bool CheckArrayData(uint32_t cur_offset);
428 
429   // Verify that the target of a branch instruction is valid. We don't expect code to jump directly
430   // into an exception handler, but it's valid to do so as long as the target isn't a
431   // "move-exception" instruction. We verify that in a later stage.
432   // The dex format forbids certain instructions from branching to themselves.
433   // Updates "insn_flags_", setting the "branch target" flag.
434   bool CheckBranchTarget(uint32_t cur_offset);
435 
436   // Verify a switch table. "cur_offset" is the offset of the switch instruction.
437   // Updates "insn_flags_", setting the "branch target" flag.
438   bool CheckSwitchTargets(uint32_t cur_offset);
439 
440   // Check the register indices used in a "vararg" instruction, such as invoke-virtual or
441   // filled-new-array.
442   // - vA holds word count (0-5), args[] have values.
443   // There are some tests we don't do here, e.g. we don't try to verify that invoking a method that
444   // takes a double is done with consecutive registers. This requires parsing the target method
445   // signature, which we will be doing later on during the code flow analysis.
446   bool CheckVarArgRegs(uint32_t vA, uint32_t arg[]);
447 
448   // Check the register indices used in a "vararg/range" instruction, such as invoke-virtual/range
449   // or filled-new-array/range.
450   // - vA holds word count, vC holds index of first reg.
451   bool CheckVarArgRangeRegs(uint32_t vA, uint32_t vC);
452 
453   // Extract the relative offset from a branch instruction.
454   // Returns "false" on failure (e.g. this isn't a branch instruction).
455   bool GetBranchOffset(uint32_t cur_offset, int32_t* pOffset, bool* pConditional,
456                        bool* selfOkay);
457 
458   /* Perform detailed code-flow analysis on a single method. */
459   bool VerifyCodeFlow() SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
460 
461   // Set the register types for the first instruction in the method based on the method signature.
462   // This has the side-effect of validating the signature.
463   bool SetTypesFromSignature() SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
464 
465   /*
466    * Perform code flow on a method.
467    *
468    * The basic strategy is as outlined in v3 4.11.1.2: set the "changed" bit on the first
469    * instruction, process it (setting additional "changed" bits), and repeat until there are no
470    * more.
471    *
472    * v3 4.11.1.1
473    * - (N/A) operand stack is always the same size
474    * - operand stack [registers] contain the correct types of values
475    * - local variables [registers] contain the correct types of values
476    * - methods are invoked with the appropriate arguments
477    * - fields are assigned using values of appropriate types
478    * - opcodes have the correct type values in operand registers
479    * - there is never an uninitialized class instance in a local variable in code protected by an
480    *   exception handler (operand stack is okay, because the operand stack is discarded when an
481    *   exception is thrown) [can't know what's a local var w/o the debug info -- should fall out of
482    *   register typing]
483    *
484    * v3 4.11.1.2
485    * - execution cannot fall off the end of the code
486    *
487    * (We also do many of the items described in the "static checks" sections, because it's easier to
488    * do them here.)
489    *
490    * We need an array of RegType values, one per register, for every instruction. If the method uses
491    * monitor-enter, we need extra data for every register, and a stack for every "interesting"
492    * instruction. In theory this could become quite large -- up to several megabytes for a monster
493    * function.
494    *
495    * NOTE:
496    * The spec forbids backward branches when there's an uninitialized reference in a register. The
497    * idea is to prevent something like this:
498    *   loop:
499    *     move r1, r0
500    *     new-instance r0, MyClass
501    *     ...
502    *     if-eq rN, loop  // once
503    *   initialize r0
504    *
505    * This leaves us with two different instances, both allocated by the same instruction, but only
506    * one is initialized. The scheme outlined in v3 4.11.1.4 wouldn't catch this, so they work around
507    * it by preventing backward branches. We achieve identical results without restricting code
508    * reordering by specifying that you can't execute the new-instance instruction if a register
509    * contains an uninitialized instance created by that same instruction.
510    */
511   bool CodeFlowVerifyMethod() SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
512 
513   /*
514    * Perform verification for a single instruction.
515    *
516    * This requires fully decoding the instruction to determine the effect it has on registers.
517    *
518    * Finds zero or more following instructions and sets the "changed" flag if execution at that
519    * point needs to be (re-)evaluated. Register changes are merged into "reg_types_" at the target
520    * addresses. Does not set or clear any other flags in "insn_flags_".
521    */
522   bool CodeFlowVerifyInstruction(uint32_t* start_guess)
523       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
524 
525   // Perform verification of a new array instruction
526   void VerifyNewArray(const Instruction* inst, bool is_filled, bool is_range)
527       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
528 
529   // Helper to perform verification on puts of primitive type.
530   void VerifyPrimitivePut(const RegType& target_type, const RegType& insn_type,
531                           const uint32_t vregA) SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
532 
533   // Perform verification of an aget instruction. The destination register's type will be set to
534   // be that of component type of the array unless the array type is unknown, in which case a
535   // bottom type inferred from the type of instruction is used. is_primitive is false for an
536   // aget-object.
537   void VerifyAGet(const Instruction* inst, const RegType& insn_type,
538                   bool is_primitive) SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
539 
540   // Perform verification of an aput instruction.
541   void VerifyAPut(const Instruction* inst, const RegType& insn_type,
542                   bool is_primitive) SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
543 
544   // Lookup instance field and fail for resolution violations
545   ArtField* GetInstanceField(const RegType& obj_type, int field_idx)
546       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
547 
548   // Lookup static field and fail for resolution violations
549   ArtField* GetStaticField(int field_idx) SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
550 
551   // Perform verification of an iget/sget/iput/sput instruction.
552   enum class FieldAccessType {  // private
553     kAccGet,
554     kAccPut
555   };
556   template <FieldAccessType kAccType>
557   void VerifyISFieldAccess(const Instruction* inst, const RegType& insn_type,
558                            bool is_primitive, bool is_static)
559       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
560 
561   template <FieldAccessType kAccType>
562   void VerifyQuickFieldAccess(const Instruction* inst, const RegType& insn_type, bool is_primitive)
563       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
564 
565   // Resolves a class based on an index and performs access checks to ensure the referrer can
566   // access the resolved class.
567   const RegType& ResolveClassAndCheckAccess(uint32_t class_idx)
568       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
569 
570   /*
571    * For the "move-exception" instruction at "work_insn_idx_", which must be at an exception handler
572    * address, determine the Join of all exceptions that can land here. Fails if no matching
573    * exception handler can be found or if the Join of exception types fails.
574    */
575   const RegType& GetCaughtExceptionType()
576       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
577 
578   /*
579    * Resolves a method based on an index and performs access checks to ensure
580    * the referrer can access the resolved method.
581    * Does not throw exceptions.
582    */
583   ArtMethod* ResolveMethodAndCheckAccess(uint32_t method_idx, MethodType method_type)
584       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
585 
586   /*
587    * Verify the arguments to a method. We're executing in "method", making
588    * a call to the method reference in vB.
589    *
590    * If this is a "direct" invoke, we allow calls to <init>. For calls to
591    * <init>, the first argument may be an uninitialized reference. Otherwise,
592    * calls to anything starting with '<' will be rejected, as will any
593    * uninitialized reference arguments.
594    *
595    * For non-static method calls, this will verify that the method call is
596    * appropriate for the "this" argument.
597    *
598    * The method reference is in vBBBB. The "is_range" parameter determines
599    * whether we use 0-4 "args" values or a range of registers defined by
600    * vAA and vCCCC.
601    *
602    * Widening conversions on integers and references are allowed, but
603    * narrowing conversions are not.
604    *
605    * Returns the resolved method on success, null on failure (with *failure
606    * set appropriately).
607    */
608   ArtMethod* VerifyInvocationArgs(const Instruction* inst,
609                                           MethodType method_type,
610                                           bool is_range, bool is_super)
611       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
612 
613   // Similar checks to the above, but on the proto. Will be used when the method cannot be
614   // resolved.
615   void VerifyInvocationArgsUnresolvedMethod(const Instruction* inst, MethodType method_type,
616                                             bool is_range)
617       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
618 
619   template <class T>
620   ArtMethod* VerifyInvocationArgsFromIterator(T* it, const Instruction* inst,
621                                                       MethodType method_type, bool is_range,
622                                                       ArtMethod* res_method)
623       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
624 
625   ArtMethod* VerifyInvokeVirtualQuickArgs(const Instruction* inst, bool is_range)
626   SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
627 
628   /*
629    * Verify that the target instruction is not "move-exception". It's important that the only way
630    * to execute a move-exception is as the first instruction of an exception handler.
631    * Returns "true" if all is well, "false" if the target instruction is move-exception.
632    */
633   bool CheckNotMoveException(const uint16_t* insns, int insn_idx);
634 
635   /*
636    * Verify that the target instruction is not "move-result". It is important that we cannot
637    * branch to move-result instructions, but we have to make this a distinct check instead of
638    * adding it to CheckNotMoveException, because it is legal to continue into "move-result"
639    * instructions - as long as the previous instruction was an invoke, which is checked elsewhere.
640    */
641   bool CheckNotMoveResult(const uint16_t* insns, int insn_idx);
642 
643   /*
644    * Verify that the target instruction is not "move-result" or "move-exception". This is to
645    * be used when checking branch and switch instructions, but not instructions that can
646    * continue.
647    */
648   bool CheckNotMoveExceptionOrMoveResult(const uint16_t* insns, int insn_idx);
649 
650   /*
651   * Control can transfer to "next_insn". Merge the registers from merge_line into the table at
652   * next_insn, and set the changed flag on the target address if any of the registers were changed.
653   * In the case of fall-through, update the merge line on a change as its the working line for the
654   * next instruction.
655   * Returns "false" if an error is encountered.
656   */
657   bool UpdateRegisters(uint32_t next_insn, RegisterLine* merge_line, bool update_merge_line)
658       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
659 
660   // Return the register type for the method.
661   const RegType& GetMethodReturnType() SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
662 
663   // Get a type representing the declaring class of the method.
664   const RegType& GetDeclaringClass() SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
665 
666   InstructionFlags* CurrentInsnFlags();
667 
668   const RegType& DetermineCat1Constant(int32_t value, bool precise)
669       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
670 
671   // Try to create a register type from the given class. In case a precise type is requested, but
672   // the class is not instantiable, a soft error (of type NO_CLASS) will be enqueued and a
673   // non-precise reference will be returned.
674   // Note: we reuse NO_CLASS as this will throw an exception at runtime, when the failing class is
675   //       actually touched.
676   const RegType& FromClass(const char* descriptor, mirror::Class* klass, bool precise)
677       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_);
678 
679   // The thread we're verifying on.
680   Thread* const self_;
681 
682   RegTypeCache reg_types_;
683 
684   PcToRegisterLineTable reg_table_;
685 
686   // Storage for the register status we're currently working on.
687   std::unique_ptr<RegisterLine> work_line_;
688 
689   // The address of the instruction we're currently working on, note that this is in 2 byte
690   // quantities
691   uint32_t work_insn_idx_;
692 
693   // Storage for the register status we're saving for later.
694   std::unique_ptr<RegisterLine> saved_line_;
695 
696   const uint32_t dex_method_idx_;  // The method we're working on.
697   // Its object representation if known.
698   ArtMethod* mirror_method_ GUARDED_BY(Locks::mutator_lock_);
699   const uint32_t method_access_flags_;  // Method's access flags.
700   const RegType* return_type_;  // Lazily computed return type of the method.
701   const DexFile* const dex_file_;  // The dex file containing the method.
702   // The dex_cache for the declaring class of the method.
703   Handle<mirror::DexCache> dex_cache_ GUARDED_BY(Locks::mutator_lock_);
704   // The class loader for the declaring class of the method.
705   Handle<mirror::ClassLoader> class_loader_ GUARDED_BY(Locks::mutator_lock_);
706   const DexFile::ClassDef* const class_def_;  // The class def of the declaring class of the method.
707   const DexFile::CodeItem* const code_item_;  // The code item containing the code for the method.
708   const RegType* declaring_class_;  // Lazily computed reg type of the method's declaring class.
709   // Instruction widths and flags, one entry per code unit.
710   std::unique_ptr<InstructionFlags[]> insn_flags_;
711   // The dex PC of a FindLocksAtDexPc request, -1 otherwise.
712   uint32_t interesting_dex_pc_;
713   // The container into which FindLocksAtDexPc should write the registers containing held locks,
714   // null if we're not doing FindLocksAtDexPc.
715   std::vector<uint32_t>* monitor_enter_dex_pcs_;
716 
717   // The types of any error that occurs.
718   std::vector<VerifyError> failures_;
719   // Error messages associated with failures.
720   std::vector<std::ostringstream*> failure_messages_;
721   // Is there a pending hard failure?
722   bool have_pending_hard_failure_;
723   // Is there a pending runtime throw failure? A runtime throw failure is when an instruction
724   // would fail at runtime throwing an exception. Such an instruction causes the following code
725   // to be unreachable. This is set by Fail and used to ensure we don't process unreachable
726   // instructions that would hard fail the verification.
727   // Note: this flag is reset after processing each instruction.
728   bool have_pending_runtime_throw_failure_;
729 
730   // A version of the above that is not reset and thus captures if there were *any* throw failures.
731   bool have_any_pending_runtime_throw_failure_;
732 
733   // Info message log use primarily for verifier diagnostics.
734   std::ostringstream info_messages_;
735 
736   // The number of occurrences of specific opcodes.
737   size_t new_instance_count_;
738   size_t monitor_enter_count_;
739 
740   const bool can_load_classes_;
741 
742   // Converts soft failures to hard failures when false. Only false when the compiler isn't
743   // running and the verifier is called from the class linker.
744   const bool allow_soft_failures_;
745 
746   // An optimization where instead of generating unique RegTypes for constants we use imprecise
747   // constants that cover a range of constants. This isn't good enough for deoptimization that
748   // avoids loading from registers in the case of a constant as the dex instruction set lost the
749   // notion of whether a value should be in a floating point or general purpose register file.
750   const bool need_precise_constants_;
751 
752   // Indicates the method being verified contains at least one check-cast or aput-object
753   // instruction. Aput-object operations implicitly check for array-store exceptions, similar to
754   // check-cast.
755   bool has_check_casts_;
756 
757   // Indicates the method being verified contains at least one invoke-virtual/range
758   // or invoke-interface/range.
759   bool has_virtual_or_interface_invokes_;
760 
761   // Indicates whether we verify to dump the info. In that case we accept quickened instructions
762   // even though we might detect to be a compiler. Should only be set when running
763   // VerifyMethodAndDump.
764   const bool verify_to_dump_;
765 
766   // Whether or not we call AllowThreadSuspension periodically, we want a way to disable this for
767   // thread dumping checkpoints since we may get thread suspension at an inopportune time due to
768   // FindLocksAtDexPC, resulting in deadlocks.
769   const bool allow_thread_suspension_;
770 
771   // Link, for the method verifier root linked list.
772   MethodVerifier* link_;
773 
774   friend class art::Thread;
775 
776   // Map of dex pcs of invocations of java.lang.String.<init> to the set of other registers that
777   // contain the uninitialized this pointer to that invoke. Will contain no entry if there are
778   // no other registers.
779   SafeMap<uint32_t, std::set<uint32_t>> string_init_pc_reg_map_;
780 
781   DISALLOW_COPY_AND_ASSIGN(MethodVerifier);
782 };
783 std::ostream& operator<<(std::ostream& os, const MethodVerifier::FailureKind& rhs);
784 
785 }  // namespace verifier
786 }  // namespace art
787 
788 #endif  // ART_RUNTIME_VERIFIER_METHOD_VERIFIER_H_
789