1 /* 2 * Copyright (c) 1997, 2018, Oracle and/or its affiliates. All rights reserved. 3 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. 4 * 5 * This code is free software; you can redistribute it and/or modify it 6 * under the terms of the GNU General Public License version 2 only, as 7 * published by the Free Software Foundation. 8 * 9 * This code is distributed in the hope that it will be useful, but WITHOUT 10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 11 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License 12 * version 2 for more details (a copy is included in the LICENSE file that 13 * accompanied this code). 14 * 15 * You should have received a copy of the GNU General Public License version 16 * 2 along with this work; if not, write to the Free Software Foundation, 17 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. 18 * 19 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA 20 * or visit www.oracle.com if you need additional information or have any 21 * questions. 22 * 23 */ 24 25 #include "precompiled.hpp" 26 #include "jvm.h" 27 #include "jimage.hpp" 28 #include "classfile/classFileStream.hpp" 29 #include "classfile/classLoader.inline.hpp" 30 #include "classfile/classLoaderData.inline.hpp" 31 #include "classfile/classLoaderExt.hpp" 32 #include "classfile/javaClasses.hpp" 33 #include "classfile/moduleEntry.hpp" 34 #include "classfile/modules.hpp" 35 #include "classfile/packageEntry.hpp" 36 #include "classfile/klassFactory.hpp" 37 #include "classfile/systemDictionary.hpp" 38 #include "classfile/vmSymbols.hpp" 39 #include "compiler/compileBroker.hpp" 40 #include "gc/shared/collectedHeap.inline.hpp" 41 #include "gc/shared/generation.hpp" 42 #include "interpreter/bytecodeStream.hpp" 43 #include "interpreter/oopMapCache.hpp" 44 #include "logging/log.hpp" 45 #include "logging/logStream.hpp" 46 #include "logging/logTag.hpp" 47 #include "memory/allocation.inline.hpp" 48 #include "memory/filemap.hpp" 49 #include "memory/oopFactory.hpp" 50 #include "memory/resourceArea.hpp" 51 #include "memory/universe.hpp" 52 #include "oops/instanceKlass.hpp" 53 #include "oops/instanceRefKlass.hpp" 54 #include "oops/method.inline.hpp" 55 #include "oops/objArrayOop.inline.hpp" 56 #include "oops/oop.inline.hpp" 57 #include "oops/symbol.hpp" 58 #include "prims/jvm_misc.hpp" 59 #include "runtime/arguments.hpp" 60 #include "runtime/compilationPolicy.hpp" 61 #include "runtime/handles.hpp" 62 #include "runtime/handles.inline.hpp" 63 #include "runtime/init.hpp" 64 #include "runtime/interfaceSupport.inline.hpp" 65 #include "runtime/java.hpp" 66 #include "runtime/javaCalls.hpp" 67 #include "runtime/os.inline.hpp" 68 #include "runtime/threadCritical.hpp" 69 #include "runtime/timer.hpp" 70 #include "runtime/vm_version.hpp" 71 #include "services/management.hpp" 72 #include "services/threadService.hpp" 73 #include "utilities/events.hpp" 74 #include "utilities/hashtable.inline.hpp" 75 #include "utilities/macros.hpp" 76 #if INCLUDE_CDS 77 #include "classfile/sharedClassUtil.hpp" 78 #include "classfile/sharedPathsMiscInfo.hpp" 79 #endif 80 81 // Entry points in zip.dll for loading zip/jar file entries 82 83 typedef void * * (JNICALL *ZipOpen_t)(const char *name, char **pmsg); 84 typedef void (JNICALL *ZipClose_t)(jzfile *zip); 85 typedef jzentry* (JNICALL *FindEntry_t)(jzfile *zip, const char *name, jint *sizeP, jint *nameLen); 86 typedef jboolean (JNICALL *ReadEntry_t)(jzfile *zip, jzentry *entry, unsigned char *buf, char *namebuf); 87 typedef jzentry* (JNICALL *GetNextEntry_t)(jzfile *zip, jint n); 88 typedef jboolean (JNICALL *ZipInflateFully_t)(void *inBuf, jlong inLen, void *outBuf, jlong outLen, char **pmsg); 89 typedef jint (JNICALL *Crc32_t)(jint crc, const jbyte *buf, jint len); 90 91 static ZipOpen_t ZipOpen = NULL; 92 static ZipClose_t ZipClose = NULL; 93 static FindEntry_t FindEntry = NULL; 94 static ReadEntry_t ReadEntry = NULL; 95 static GetNextEntry_t GetNextEntry = NULL; 96 static canonicalize_fn_t CanonicalizeEntry = NULL; 97 static ZipInflateFully_t ZipInflateFully = NULL; 98 static Crc32_t Crc32 = NULL; 99 100 // Entry points for jimage.dll for loading jimage file entries 101 102 static JImageOpen_t JImageOpen = NULL; 103 static JImageClose_t JImageClose = NULL; 104 static JImagePackageToModule_t JImagePackageToModule = NULL; 105 static JImageFindResource_t JImageFindResource = NULL; 106 static JImageGetResource_t JImageGetResource = NULL; 107 static JImageResourceIterator_t JImageResourceIterator = NULL; 108 static JImage_ResourcePath_t JImageResourcePath = NULL; 109 110 // Globals 111 112 PerfCounter* ClassLoader::_perf_accumulated_time = NULL; 113 PerfCounter* ClassLoader::_perf_classes_inited = NULL; 114 PerfCounter* ClassLoader::_perf_class_init_time = NULL; 115 PerfCounter* ClassLoader::_perf_class_init_selftime = NULL; 116 PerfCounter* ClassLoader::_perf_classes_verified = NULL; 117 PerfCounter* ClassLoader::_perf_class_verify_time = NULL; 118 PerfCounter* ClassLoader::_perf_class_verify_selftime = NULL; 119 PerfCounter* ClassLoader::_perf_classes_linked = NULL; 120 PerfCounter* ClassLoader::_perf_class_link_time = NULL; 121 PerfCounter* ClassLoader::_perf_class_link_selftime = NULL; 122 PerfCounter* ClassLoader::_perf_class_parse_time = NULL; 123 PerfCounter* ClassLoader::_perf_class_parse_selftime = NULL; 124 PerfCounter* ClassLoader::_perf_sys_class_lookup_time = NULL; 125 PerfCounter* ClassLoader::_perf_shared_classload_time = NULL; 126 PerfCounter* ClassLoader::_perf_sys_classload_time = NULL; 127 PerfCounter* ClassLoader::_perf_app_classload_time = NULL; 128 PerfCounter* ClassLoader::_perf_app_classload_selftime = NULL; 129 PerfCounter* ClassLoader::_perf_app_classload_count = NULL; 130 PerfCounter* ClassLoader::_perf_define_appclasses = NULL; 131 PerfCounter* ClassLoader::_perf_define_appclass_time = NULL; 132 PerfCounter* ClassLoader::_perf_define_appclass_selftime = NULL; 133 PerfCounter* ClassLoader::_perf_app_classfile_bytes_read = NULL; 134 PerfCounter* ClassLoader::_perf_sys_classfile_bytes_read = NULL; 135 PerfCounter* ClassLoader::_sync_systemLoaderLockContentionRate = NULL; 136 PerfCounter* ClassLoader::_sync_nonSystemLoaderLockContentionRate = NULL; 137 PerfCounter* ClassLoader::_sync_JVMFindLoadedClassLockFreeCounter = NULL; 138 PerfCounter* ClassLoader::_sync_JVMDefineClassLockFreeCounter = NULL; 139 PerfCounter* ClassLoader::_sync_JNIDefineClassLockFreeCounter = NULL; 140 PerfCounter* ClassLoader::_unsafe_defineClassCallCounter = NULL; 141 PerfCounter* ClassLoader::_load_instance_class_failCounter = NULL; 142 143 GrowableArray<ModuleClassPathList*>* ClassLoader::_patch_mod_entries = NULL; 144 GrowableArray<ModuleClassPathList*>* ClassLoader::_exploded_entries = NULL; 145 ClassPathEntry* ClassLoader::_jrt_entry = NULL; 146 ClassPathEntry* ClassLoader::_first_append_entry = NULL; 147 ClassPathEntry* ClassLoader::_last_append_entry = NULL; 148 #if INCLUDE_CDS 149 ClassPathEntry* ClassLoader::_app_classpath_entries = NULL; 150 ClassPathEntry* ClassLoader::_last_app_classpath_entry = NULL; 151 ClassPathEntry* ClassLoader::_module_path_entries = NULL; 152 ClassPathEntry* ClassLoader::_last_module_path_entry = NULL; 153 SharedPathsMiscInfo* ClassLoader::_shared_paths_misc_info = NULL; 154 #endif 155 156 // helper routines 157 bool string_starts_with(const char* str, const char* str_to_find) { 158 size_t str_len = strlen(str); 159 size_t str_to_find_len = strlen(str_to_find); 160 if (str_to_find_len > str_len) { 161 return false; 162 } 163 return (strncmp(str, str_to_find, str_to_find_len) == 0); 164 } 165 166 static const char* get_jimage_version_string() { 167 static char version_string[10] = ""; 168 if (version_string[0] == '\0') { 169 jio_snprintf(version_string, sizeof(version_string), "%d.%d", 170 Abstract_VM_Version::vm_major_version(), Abstract_VM_Version::vm_minor_version()); 171 } 172 return (const char*)version_string; 173 } 174 175 bool ClassLoader::string_ends_with(const char* str, const char* str_to_find) { 176 size_t str_len = strlen(str); 177 size_t str_to_find_len = strlen(str_to_find); 178 if (str_to_find_len > str_len) { 179 return false; 180 } 181 return (strncmp(str + (str_len - str_to_find_len), str_to_find, str_to_find_len) == 0); 182 } 183 184 // Used to obtain the package name from a fully qualified class name. 185 // It is the responsibility of the caller to establish a ResourceMark. 186 const char* ClassLoader::package_from_name(const char* const class_name, bool* bad_class_name) { 187 if (class_name == NULL) { 188 if (bad_class_name != NULL) { 189 *bad_class_name = true; 190 } 191 return NULL; 192 } 193 194 if (bad_class_name != NULL) { 195 *bad_class_name = false; 196 } 197 198 const char* const last_slash = strrchr(class_name, '/'); 199 if (last_slash == NULL) { 200 // No package name 201 return NULL; 202 } 203 204 char* class_name_ptr = (char*) class_name; 205 // Skip over '['s 206 if (*class_name_ptr == '[') { 207 do { 208 class_name_ptr++; 209 } while (*class_name_ptr == '['); 210 211 // Fully qualified class names should not contain a 'L'. 212 // Set bad_class_name to true to indicate that the package name 213 // could not be obtained due to an error condition. 214 // In this situation, is_same_class_package returns false. 215 if (*class_name_ptr == 'L') { 216 if (bad_class_name != NULL) { 217 *bad_class_name = true; 218 } 219 return NULL; 220 } 221 } 222 223 int length = last_slash - class_name_ptr; 224 225 // A class name could have just the slash character in the name. 226 if (length <= 0) { 227 // No package name 228 if (bad_class_name != NULL) { 229 *bad_class_name = true; 230 } 231 return NULL; 232 } 233 234 // drop name after last slash (including slash) 235 // Ex., "java/lang/String.class" => "java/lang" 236 char* pkg_name = NEW_RESOURCE_ARRAY(char, length + 1); 237 strncpy(pkg_name, class_name_ptr, length); 238 *(pkg_name+length) = '\0'; 239 240 return (const char *)pkg_name; 241 } 242 243 // Given a fully qualified class name, find its defining package in the class loader's 244 // package entry table. 245 PackageEntry* ClassLoader::get_package_entry(const char* class_name, ClassLoaderData* loader_data, TRAPS) { 246 ResourceMark rm(THREAD); 247 const char *pkg_name = ClassLoader::package_from_name(class_name); 248 if (pkg_name == NULL) { 249 return NULL; 250 } 251 PackageEntryTable* pkgEntryTable = loader_data->packages(); 252 TempNewSymbol pkg_symbol = SymbolTable::new_symbol(pkg_name, CHECK_NULL); 253 return pkgEntryTable->lookup_only(pkg_symbol); 254 } 255 256 ClassPathDirEntry::ClassPathDirEntry(const char* dir) : ClassPathEntry() { 257 char* copy = NEW_C_HEAP_ARRAY(char, strlen(dir)+1, mtClass); 258 strcpy(copy, dir); 259 _dir = copy; 260 } 261 262 263 ClassFileStream* ClassPathDirEntry::open_stream(const char* name, TRAPS) { 264 // construct full path name 265 assert((_dir != NULL) && (name != NULL), "sanity"); 266 size_t path_len = strlen(_dir) + strlen(name) + strlen(os::file_separator()) + 1; 267 char* path = NEW_RESOURCE_ARRAY_IN_THREAD(THREAD, char, path_len); 268 int len = jio_snprintf(path, path_len, "%s%s%s", _dir, os::file_separator(), name); 269 assert(len == (int)(path_len - 1), "sanity"); 270 // check if file exists 271 struct stat st; 272 if (os::stat(path, &st) == 0) { 273 #if INCLUDE_CDS 274 if (DumpSharedSpaces) { 275 // We have already check in ClassLoader::check_shared_classpath() that the directory is empty, so 276 // we should never find a file underneath it -- unless user has added a new file while we are running 277 // the dump, in which case let's quit! 278 ShouldNotReachHere(); 279 } 280 #endif 281 // found file, open it 282 int file_handle = os::open(path, 0, 0); 283 if (file_handle != -1) { 284 // read contents into resource array 285 u1* buffer = NEW_RESOURCE_ARRAY(u1, st.st_size); 286 size_t num_read = os::read(file_handle, (char*) buffer, st.st_size); 287 // close file 288 os::close(file_handle); 289 // construct ClassFileStream 290 if (num_read == (size_t)st.st_size) { 291 if (UsePerfData) { 292 ClassLoader::perf_sys_classfile_bytes_read()->inc(num_read); 293 } 294 FREE_RESOURCE_ARRAY(char, path, path_len); 295 // Resource allocated 296 return new ClassFileStream(buffer, 297 st.st_size, 298 _dir, 299 ClassFileStream::verify); 300 } 301 } 302 } 303 FREE_RESOURCE_ARRAY(char, path, path_len); 304 return NULL; 305 } 306 307 ClassPathZipEntry::ClassPathZipEntry(jzfile* zip, const char* zip_name, bool is_boot_append) : ClassPathEntry() { 308 _zip = zip; 309 char *copy = NEW_C_HEAP_ARRAY(char, strlen(zip_name)+1, mtClass); 310 strcpy(copy, zip_name); 311 _zip_name = copy; 312 _is_boot_append = is_boot_append; 313 _multi_versioned = _unknown; 314 } 315 316 ClassPathZipEntry::~ClassPathZipEntry() { 317 if (ZipClose != NULL) { 318 (*ZipClose)(_zip); 319 } 320 FREE_C_HEAP_ARRAY(char, _zip_name); 321 } 322 323 u1* ClassPathZipEntry::open_entry(const char* name, jint* filesize, bool nul_terminate, TRAPS) { 324 // enable call to C land 325 JavaThread* thread = JavaThread::current(); 326 ThreadToNativeFromVM ttn(thread); 327 // check whether zip archive contains name 328 jint name_len; 329 jzentry* entry = (*FindEntry)(_zip, name, filesize, &name_len); 330 if (entry == NULL) return NULL; 331 u1* buffer; 332 char name_buf[128]; 333 char* filename; 334 if (name_len < 128) { 335 filename = name_buf; 336 } else { 337 filename = NEW_RESOURCE_ARRAY(char, name_len + 1); 338 } 339 340 // read contents into resource array 341 int size = (*filesize) + ((nul_terminate) ? 1 : 0); 342 buffer = NEW_RESOURCE_ARRAY(u1, size); 343 if (!(*ReadEntry)(_zip, entry, buffer, filename)) return NULL; 344 345 // return result 346 if (nul_terminate) { 347 buffer[*filesize] = 0; 348 } 349 return buffer; 350 } 351 352 #if INCLUDE_CDS 353 u1* ClassPathZipEntry::open_versioned_entry(const char* name, jint* filesize, TRAPS) { 354 u1* buffer = NULL; 355 if (DumpSharedSpaces && !_is_boot_append) { 356 // We presume default is multi-release enabled 357 const char* multi_ver = Arguments::get_property("jdk.util.jar.enableMultiRelease"); 358 const char* verstr = Arguments::get_property("jdk.util.jar.version"); 359 bool is_multi_ver = (multi_ver == NULL || 360 strcmp(multi_ver, "true") == 0 || 361 strcmp(multi_ver, "force") == 0) && 362 is_multiple_versioned(THREAD); 363 // command line version setting 364 int version = 0; 365 const int base_version = 8; // JDK8 366 int cur_ver = JDK_Version::current().major_version(); 367 if (verstr != NULL) { 368 version = atoi(verstr); 369 if (version < base_version || version > cur_ver) { 370 // If the specified version is lower than the base version, the base 371 // entry will be used; if the version is higher than the current 372 // jdk version, the highest versioned entry will be used. 373 if (version < base_version) { 374 is_multi_ver = false; 375 } 376 // print out warning, do not use assertion here since it will continue to look 377 // for proper version. 378 warning("JDK%d is not supported in multiple version jars", version); 379 } 380 } 381 382 if (is_multi_ver) { 383 int n; 384 const char* version_entry = "META-INF/versions/"; 385 // 10 is the max length of a decimal 32-bit non-negative number 386 // 2 includes the '/' and trailing zero 387 size_t entry_name_len = strlen(version_entry) + 10 + strlen(name) + 2; 388 char* entry_name = NEW_RESOURCE_ARRAY_IN_THREAD(THREAD, char, entry_name_len); 389 if (version > 0) { 390 n = jio_snprintf(entry_name, entry_name_len, "%s%d/%s", version_entry, version, name); 391 entry_name[n] = '\0'; 392 buffer = open_entry((const char*)entry_name, filesize, false, CHECK_NULL); 393 if (buffer == NULL) { 394 warning("Could not find %s in %s, try to find highest version instead", entry_name, _zip_name); 395 } 396 } 397 if (buffer == NULL) { 398 for (int i = cur_ver; i >= base_version; i--) { 399 n = jio_snprintf(entry_name, entry_name_len, "%s%d/%s", version_entry, i, name); 400 entry_name[n] = '\0'; 401 buffer = open_entry((const char*)entry_name, filesize, false, CHECK_NULL); 402 if (buffer != NULL) { 403 break; 404 } 405 } 406 } 407 FREE_RESOURCE_ARRAY(char, entry_name, entry_name_len); 408 } 409 } 410 return buffer; 411 } 412 413 bool ClassPathZipEntry::is_multiple_versioned(TRAPS) { 414 assert(DumpSharedSpaces, "called only at dump time"); 415 if (_multi_versioned != _unknown) { 416 return (_multi_versioned == _yes) ? true : false; 417 } 418 jint size; 419 char* buffer = (char*)open_entry("META-INF/MANIFEST.MF", &size, true, CHECK_false); 420 if (buffer != NULL) { 421 char* p = buffer; 422 for ( ; *p; ++p) *p = tolower(*p); 423 if (strstr(buffer, "multi-release: true") != NULL) { 424 _multi_versioned = _yes; 425 return true; 426 } 427 } 428 _multi_versioned = _no; 429 return false; 430 } 431 #endif // INCLUDE_CDS 432 433 ClassFileStream* ClassPathZipEntry::open_stream(const char* name, TRAPS) { 434 jint filesize; 435 u1* buffer = open_versioned_entry(name, &filesize, CHECK_NULL); 436 if (buffer == NULL) { 437 buffer = open_entry(name, &filesize, false, CHECK_NULL); 438 if (buffer == NULL) { 439 return NULL; 440 } 441 } 442 if (UsePerfData) { 443 ClassLoader::perf_sys_classfile_bytes_read()->inc(filesize); 444 } 445 // Resource allocated 446 return new ClassFileStream(buffer, 447 filesize, 448 _zip_name, 449 ClassFileStream::verify); 450 } 451 452 // invoke function for each entry in the zip file 453 void ClassPathZipEntry::contents_do(void f(const char* name, void* context), void* context) { 454 JavaThread* thread = JavaThread::current(); 455 HandleMark handle_mark(thread); 456 ThreadToNativeFromVM ttn(thread); 457 for (int n = 0; ; n++) { 458 jzentry * ze = ((*GetNextEntry)(_zip, n)); 459 if (ze == NULL) break; 460 (*f)(ze->name, context); 461 } 462 } 463 464 ClassPathImageEntry::ClassPathImageEntry(JImageFile* jimage, const char* name) : 465 ClassPathEntry(), 466 _jimage(jimage) { 467 guarantee(jimage != NULL, "jimage file is null"); 468 guarantee(name != NULL, "jimage file name is null"); 469 size_t len = strlen(name) + 1; 470 _name = NEW_C_HEAP_ARRAY(const char, len, mtClass); 471 strncpy((char *)_name, name, len); 472 } 473 474 ClassPathImageEntry::~ClassPathImageEntry() { 475 if (_name != NULL) { 476 FREE_C_HEAP_ARRAY(const char, _name); 477 _name = NULL; 478 } 479 if (_jimage != NULL) { 480 (*JImageClose)(_jimage); 481 _jimage = NULL; 482 } 483 } 484 485 // For a class in a named module, look it up in the jimage file using this syntax: 486 // /<module-name>/<package-name>/<base-class> 487 // 488 // Assumptions: 489 // 1. There are no unnamed modules in the jimage file. 490 // 2. A package is in at most one module in the jimage file. 491 // 492 ClassFileStream* ClassPathImageEntry::open_stream(const char* name, TRAPS) { 493 jlong size; 494 JImageLocationRef location = (*JImageFindResource)(_jimage, "", get_jimage_version_string(), name, &size); 495 496 if (location == 0) { 497 ResourceMark rm; 498 const char* pkg_name = ClassLoader::package_from_name(name); 499 500 if (pkg_name != NULL) { 501 if (!Universe::is_module_initialized()) { 502 location = (*JImageFindResource)(_jimage, JAVA_BASE_NAME, get_jimage_version_string(), name, &size); 503 #if INCLUDE_CDS 504 // CDS uses the boot class loader to load classes whose packages are in 505 // modules defined for other class loaders. So, for now, get their module 506 // names from the "modules" jimage file. 507 if (DumpSharedSpaces && location == 0) { 508 const char* module_name = (*JImagePackageToModule)(_jimage, pkg_name); 509 if (module_name != NULL) { 510 location = (*JImageFindResource)(_jimage, module_name, get_jimage_version_string(), name, &size); 511 } 512 } 513 #endif 514 515 } else { 516 PackageEntry* package_entry = ClassLoader::get_package_entry(name, ClassLoaderData::the_null_class_loader_data(), CHECK_NULL); 517 if (package_entry != NULL) { 518 ResourceMark rm; 519 // Get the module name 520 ModuleEntry* module = package_entry->module(); 521 assert(module != NULL, "Boot classLoader package missing module"); 522 assert(module->is_named(), "Boot classLoader package is in unnamed module"); 523 const char* module_name = module->name()->as_C_string(); 524 if (module_name != NULL) { 525 location = (*JImageFindResource)(_jimage, module_name, get_jimage_version_string(), name, &size); 526 } 527 } 528 } 529 } 530 } 531 if (location != 0) { 532 if (UsePerfData) { 533 ClassLoader::perf_sys_classfile_bytes_read()->inc(size); 534 } 535 char* data = NEW_RESOURCE_ARRAY(char, size); 536 (*JImageGetResource)(_jimage, location, data, size); 537 // Resource allocated 538 return new ClassFileStream((u1*)data, 539 (int)size, 540 _name, 541 ClassFileStream::verify); 542 } 543 544 return NULL; 545 } 546 547 JImageLocationRef ClassLoader::jimage_find_resource(JImageFile* jf, 548 const char* module_name, 549 const char* file_name, 550 jlong &size) { 551 return ((*JImageFindResource)(jf, module_name, get_jimage_version_string(), file_name, &size)); 552 } 553 554 #ifndef PRODUCT 555 bool ctw_visitor(JImageFile* jimage, 556 const char* module_name, const char* version, const char* package, 557 const char* name, const char* extension, void* arg) { 558 if (strcmp(extension, "class") == 0) { 559 Thread* THREAD = Thread::current(); 560 ResourceMark rm(THREAD); 561 char* path = NEW_RESOURCE_ARRAY_IN_THREAD(THREAD, char, JIMAGE_MAX_PATH); 562 jio_snprintf(path, JIMAGE_MAX_PATH - 1, "%s/%s.class", package, name); 563 ClassLoader::compile_the_world_in(path, *(Handle*)arg, THREAD); 564 return !HAS_PENDING_EXCEPTION; 565 } 566 return true; 567 } 568 569 void ClassPathImageEntry::compile_the_world(Handle loader, TRAPS) { 570 tty->print_cr("CompileTheWorld : Compiling all classes in %s", name()); 571 tty->cr(); 572 (*JImageResourceIterator)(_jimage, (JImageResourceVisitor_t)ctw_visitor, (void *)&loader); 573 if (HAS_PENDING_EXCEPTION) { 574 if (PENDING_EXCEPTION->is_a(SystemDictionary::OutOfMemoryError_klass())) { 575 CLEAR_PENDING_EXCEPTION; 576 tty->print_cr("\nCompileTheWorld : Ran out of memory\n"); 577 tty->print_cr("Increase class metadata storage if a limit was set"); 578 } else { 579 tty->print_cr("\nCompileTheWorld : Unexpected exception occurred\n"); 580 } 581 } 582 } 583 #endif 584 585 bool ClassPathImageEntry::is_modules_image() const { 586 return ClassLoader::is_modules_image(name()); 587 } 588 589 #if INCLUDE_CDS 590 void ClassLoader::exit_with_path_failure(const char* error, const char* message) { 591 assert(DumpSharedSpaces, "only called at dump time"); 592 tty->print_cr("Hint: enable -Xlog:class+path=info to diagnose the failure"); 593 vm_exit_during_initialization(error, message); 594 } 595 #endif 596 597 ModuleClassPathList::ModuleClassPathList(Symbol* module_name) { 598 _module_name = module_name; 599 _module_first_entry = NULL; 600 _module_last_entry = NULL; 601 } 602 603 ModuleClassPathList::~ModuleClassPathList() { 604 // Clean out each ClassPathEntry on list 605 ClassPathEntry* e = _module_first_entry; 606 while (e != NULL) { 607 ClassPathEntry* next_entry = e->next(); 608 delete e; 609 e = next_entry; 610 } 611 } 612 613 void ModuleClassPathList::add_to_list(ClassPathEntry* new_entry) { 614 if (new_entry != NULL) { 615 if (_module_last_entry == NULL) { 616 _module_first_entry = _module_last_entry = new_entry; 617 } else { 618 _module_last_entry->set_next(new_entry); 619 _module_last_entry = new_entry; 620 } 621 } 622 } 623 624 void ClassLoader::trace_class_path(const char* msg, const char* name) { 625 LogTarget(Info, class, path) lt; 626 if (lt.is_enabled()) { 627 LogStream ls(lt); 628 if (msg) { 629 ls.print("%s", msg); 630 } 631 if (name) { 632 if (strlen(name) < 256) { 633 ls.print("%s", name); 634 } else { 635 // For very long paths, we need to print each character separately, 636 // as print_cr() has a length limit 637 while (name[0] != '\0') { 638 ls.print("%c", name[0]); 639 name++; 640 } 641 } 642 } 643 ls.cr(); 644 } 645 } 646 647 #if INCLUDE_CDS 648 void ClassLoader::check_shared_classpath(const char *path) { 649 if (strcmp(path, "") == 0) { 650 exit_with_path_failure("Cannot have empty path in archived classpaths", NULL); 651 } 652 653 struct stat st; 654 if (os::stat(path, &st) == 0) { 655 if ((st.st_mode & S_IFMT) != S_IFREG) { // is not a regular file 656 if (!os::dir_is_empty(path)) { 657 tty->print_cr("Error: non-empty directory '%s'", path); 658 exit_with_path_failure("CDS allows only empty directories in archived classpaths", NULL); 659 } 660 } 661 } 662 } 663 #endif 664 665 void ClassLoader::setup_bootstrap_search_path() { 666 const char* sys_class_path = Arguments::get_sysclasspath(); 667 if (PrintSharedArchiveAndExit) { 668 // Don't print sys_class_path - this is the bootcp of this current VM process, not necessarily 669 // the same as the bootcp of the shared archive. 670 } else { 671 trace_class_path("bootstrap loader class path=", sys_class_path); 672 } 673 #if INCLUDE_CDS 674 if (DumpSharedSpaces) { 675 _shared_paths_misc_info->add_boot_classpath(sys_class_path); 676 } 677 #endif 678 setup_boot_search_path(sys_class_path); 679 } 680 681 #if INCLUDE_CDS 682 int ClassLoader::get_shared_paths_misc_info_size() { 683 return _shared_paths_misc_info->get_used_bytes(); 684 } 685 686 void* ClassLoader::get_shared_paths_misc_info() { 687 return _shared_paths_misc_info->buffer(); 688 } 689 690 bool ClassLoader::check_shared_paths_misc_info(void *buf, int size) { 691 SharedPathsMiscInfo* checker = SharedClassUtil::allocate_shared_paths_misc_info((char*)buf, size); 692 bool result = checker->check(); 693 delete checker; 694 return result; 695 } 696 697 void ClassLoader::setup_app_search_path(const char *class_path) { 698 699 assert(DumpSharedSpaces, "Sanity"); 700 701 Thread* THREAD = Thread::current(); 702 int len = (int)strlen(class_path); 703 int end = 0; 704 705 // Iterate over class path entries 706 for (int start = 0; start < len; start = end) { 707 while (class_path[end] && class_path[end] != os::path_separator()[0]) { 708 end++; 709 } 710 EXCEPTION_MARK; 711 ResourceMark rm(THREAD); 712 char* path = NEW_RESOURCE_ARRAY(char, end - start + 1); 713 strncpy(path, &class_path[start], end - start); 714 path[end - start] = '\0'; 715 716 check_shared_classpath(path); 717 718 update_class_path_entry_list(path, false, false); 719 720 while (class_path[end] == os::path_separator()[0]) { 721 end++; 722 } 723 } 724 } 725 726 void ClassLoader::setup_module_search_path(const char* path) { 727 check_shared_classpath(path); 728 update_module_path_entry_list(path); 729 } 730 731 #endif 732 733 // Construct the array of module/path pairs as specified to --patch-module 734 // for the boot loader to search ahead of the jimage, if the class being 735 // loaded is defined to a module that has been specified to --patch-module. 736 void ClassLoader::setup_patch_mod_entries() { 737 Thread* THREAD = Thread::current(); 738 GrowableArray<ModulePatchPath*>* patch_mod_args = Arguments::get_patch_mod_prefix(); 739 int num_of_entries = patch_mod_args->length(); 740 741 742 // Set up the boot loader's _patch_mod_entries list 743 _patch_mod_entries = new (ResourceObj::C_HEAP, mtModule) GrowableArray<ModuleClassPathList*>(num_of_entries, true); 744 745 for (int i = 0; i < num_of_entries; i++) { 746 const char* module_name = (patch_mod_args->at(i))->module_name(); 747 Symbol* const module_sym = SymbolTable::lookup(module_name, (int)strlen(module_name), CHECK); 748 assert(module_sym != NULL, "Failed to obtain Symbol for module name"); 749 ModuleClassPathList* module_cpl = new ModuleClassPathList(module_sym); 750 751 char* class_path = (patch_mod_args->at(i))->path_string(); 752 int len = (int)strlen(class_path); 753 int end = 0; 754 // Iterate over the module's class path entries 755 for (int start = 0; start < len; start = end) { 756 while (class_path[end] && class_path[end] != os::path_separator()[0]) { 757 end++; 758 } 759 EXCEPTION_MARK; 760 ResourceMark rm(THREAD); 761 char* path = NEW_RESOURCE_ARRAY(char, end - start + 1); 762 strncpy(path, &class_path[start], end - start); 763 path[end - start] = '\0'; 764 765 struct stat st; 766 if (os::stat(path, &st) == 0) { 767 // File or directory found 768 Thread* THREAD = Thread::current(); 769 ClassPathEntry* new_entry = create_class_path_entry(path, &st, false, false, CHECK); 770 // If the path specification is valid, enter it into this module's list 771 if (new_entry != NULL) { 772 module_cpl->add_to_list(new_entry); 773 } 774 } 775 776 while (class_path[end] == os::path_separator()[0]) { 777 end++; 778 } 779 } 780 781 // Record the module into the list of --patch-module entries only if 782 // valid ClassPathEntrys have been created 783 if (module_cpl->module_first_entry() != NULL) { 784 _patch_mod_entries->push(module_cpl); 785 } 786 } 787 } 788 789 // Determine whether the module has been patched via the command-line 790 // option --patch-module 791 bool ClassLoader::is_in_patch_mod_entries(Symbol* module_name) { 792 if (_patch_mod_entries != NULL && _patch_mod_entries->is_nonempty()) { 793 int table_len = _patch_mod_entries->length(); 794 for (int i = 0; i < table_len; i++) { 795 ModuleClassPathList* patch_mod = _patch_mod_entries->at(i); 796 if (module_name->fast_compare(patch_mod->module_name()) == 0) { 797 return true; 798 } 799 } 800 } 801 return false; 802 } 803 804 // Set up the _jrt_entry if present and boot append path 805 void ClassLoader::setup_boot_search_path(const char *class_path) { 806 int len = (int)strlen(class_path); 807 int end = 0; 808 bool set_base_piece = true; 809 810 #if INCLUDE_CDS 811 if (DumpSharedSpaces) { 812 if (!Arguments::has_jimage()) { 813 vm_exit_during_initialization("CDS is not supported in exploded JDK build", NULL); 814 } 815 } 816 #endif 817 818 // Iterate over class path entries 819 for (int start = 0; start < len; start = end) { 820 while (class_path[end] && class_path[end] != os::path_separator()[0]) { 821 end++; 822 } 823 EXCEPTION_MARK; 824 ResourceMark rm(THREAD); 825 char* path = NEW_RESOURCE_ARRAY(char, end - start + 1); 826 strncpy(path, &class_path[start], end - start); 827 path[end - start] = '\0'; 828 829 if (set_base_piece) { 830 // The first time through the bootstrap_search setup, it must be determined 831 // what the base or core piece of the boot loader search is. Either a java runtime 832 // image is present or this is an exploded module build situation. 833 assert(string_ends_with(path, MODULES_IMAGE_NAME) || string_ends_with(path, JAVA_BASE_NAME), 834 "Incorrect boot loader search path, no java runtime image or " JAVA_BASE_NAME " exploded build"); 835 struct stat st; 836 if (os::stat(path, &st) == 0) { 837 // Directory found 838 Thread* THREAD = Thread::current(); 839 ClassPathEntry* new_entry = create_class_path_entry(path, &st, false, false, CHECK); 840 841 // Check for a jimage 842 if (Arguments::has_jimage()) { 843 assert(_jrt_entry == NULL, "should not setup bootstrap class search path twice"); 844 assert(new_entry != NULL && new_entry->is_modules_image(), "No java runtime image present"); 845 _jrt_entry = new_entry; 846 assert(_jrt_entry->jimage() != NULL, "No java runtime image"); 847 } 848 } else { 849 // If path does not exist, exit 850 vm_exit_during_initialization("Unable to establish the boot loader search path", path); 851 } 852 set_base_piece = false; 853 } else { 854 // Every entry on the system boot class path after the initial base piece, 855 // which is set by os::set_boot_path(), is considered an appended entry. 856 update_class_path_entry_list(path, false, true); 857 } 858 859 #if INCLUDE_CDS 860 if (DumpSharedSpaces) { 861 check_shared_classpath(path); 862 } 863 #endif 864 while (class_path[end] == os::path_separator()[0]) { 865 end++; 866 } 867 } 868 } 869 870 // During an exploded modules build, each module defined to the boot loader 871 // will be added to the ClassLoader::_exploded_entries array. 872 void ClassLoader::add_to_exploded_build_list(Symbol* module_sym, TRAPS) { 873 assert(!ClassLoader::has_jrt_entry(), "Exploded build not applicable"); 874 assert(_exploded_entries != NULL, "_exploded_entries was not initialized"); 875 876 // Find the module's symbol 877 ResourceMark rm(THREAD); 878 const char *module_name = module_sym->as_C_string(); 879 const char *home = Arguments::get_java_home(); 880 const char file_sep = os::file_separator()[0]; 881 // 10 represents the length of "modules" + 2 file separators + \0 882 size_t len = strlen(home) + strlen(module_name) + 10; 883 char *path = NEW_C_HEAP_ARRAY(char, len, mtModule); 884 jio_snprintf(path, len, "%s%cmodules%c%s", home, file_sep, file_sep, module_name); 885 886 struct stat st; 887 if (os::stat(path, &st) == 0) { 888 // Directory found 889 ClassPathEntry* new_entry = create_class_path_entry(path, &st, false, false, CHECK); 890 891 // If the path specification is valid, enter it into this module's list. 892 // There is no need to check for duplicate modules in the exploded entry list, 893 // since no two modules with the same name can be defined to the boot loader. 894 // This is checked at module definition time in Modules::define_module. 895 if (new_entry != NULL) { 896 ModuleClassPathList* module_cpl = new ModuleClassPathList(module_sym); 897 module_cpl->add_to_list(new_entry); 898 { 899 MutexLocker ml(Module_lock, THREAD); 900 _exploded_entries->push(module_cpl); 901 } 902 log_info(class, load)("path: %s", path); 903 } 904 } 905 FREE_C_HEAP_ARRAY(char, path); 906 } 907 908 ClassPathEntry* ClassLoader::create_class_path_entry(const char *path, const struct stat* st, 909 bool throw_exception, 910 bool is_boot_append, TRAPS) { 911 JavaThread* thread = JavaThread::current(); 912 ClassPathEntry* new_entry = NULL; 913 if ((st->st_mode & S_IFMT) == S_IFREG) { 914 ResourceMark rm(thread); 915 // Regular file, should be a zip or jimage file 916 // Canonicalized filename 917 char* canonical_path = NEW_RESOURCE_ARRAY_IN_THREAD(thread, char, JVM_MAXPATHLEN); 918 if (!get_canonical_path(path, canonical_path, JVM_MAXPATHLEN)) { 919 // This matches the classic VM 920 if (throw_exception) { 921 THROW_MSG_(vmSymbols::java_io_IOException(), "Bad pathname", NULL); 922 } else { 923 return NULL; 924 } 925 } 926 jint error; 927 JImageFile* jimage =(*JImageOpen)(canonical_path, &error); 928 if (jimage != NULL) { 929 new_entry = new ClassPathImageEntry(jimage, canonical_path); 930 } else { 931 char* error_msg = NULL; 932 jzfile* zip; 933 { 934 // enable call to C land 935 ThreadToNativeFromVM ttn(thread); 936 HandleMark hm(thread); 937 zip = (*ZipOpen)(canonical_path, &error_msg); 938 } 939 if (zip != NULL && error_msg == NULL) { 940 new_entry = new ClassPathZipEntry(zip, path, is_boot_append); 941 } else { 942 char *msg; 943 if (error_msg == NULL) { 944 msg = NEW_RESOURCE_ARRAY_IN_THREAD(thread, char, strlen(path) + 128); ; 945 jio_snprintf(msg, strlen(path) + 127, "error in opening JAR file %s", path); 946 } else { 947 int len = (int)(strlen(path) + strlen(error_msg) + 128); 948 msg = NEW_RESOURCE_ARRAY_IN_THREAD(thread, char, len); ; 949 jio_snprintf(msg, len - 1, "error in opening JAR file <%s> %s", error_msg, path); 950 } 951 // Don't complain about bad jar files added via -Xbootclasspath/a:. 952 if (throw_exception && is_init_completed()) { 953 THROW_MSG_(vmSymbols::java_lang_ClassNotFoundException(), msg, NULL); 954 } else { 955 return NULL; 956 } 957 } 958 } 959 log_info(class, path)("opened: %s", path); 960 log_info(class, load)("opened: %s", path); 961 } else { 962 // Directory 963 new_entry = new ClassPathDirEntry(path); 964 log_info(class, load)("path: %s", path); 965 } 966 return new_entry; 967 } 968 969 970 // Create a class path zip entry for a given path (return NULL if not found 971 // or zip/JAR file cannot be opened) 972 ClassPathZipEntry* ClassLoader::create_class_path_zip_entry(const char *path, bool is_boot_append) { 973 // check for a regular file 974 struct stat st; 975 if (os::stat(path, &st) == 0) { 976 if ((st.st_mode & S_IFMT) == S_IFREG) { 977 char canonical_path[JVM_MAXPATHLEN]; 978 if (get_canonical_path(path, canonical_path, JVM_MAXPATHLEN)) { 979 char* error_msg = NULL; 980 jzfile* zip; 981 { 982 // enable call to C land 983 JavaThread* thread = JavaThread::current(); 984 ThreadToNativeFromVM ttn(thread); 985 HandleMark hm(thread); 986 zip = (*ZipOpen)(canonical_path, &error_msg); 987 } 988 if (zip != NULL && error_msg == NULL) { 989 // create using canonical path 990 return new ClassPathZipEntry(zip, canonical_path, is_boot_append); 991 } 992 } 993 } 994 } 995 return NULL; 996 } 997 998 // returns true if entry already on class path 999 bool ClassLoader::contains_append_entry(const char* name) { 1000 ClassPathEntry* e = _first_append_entry; 1001 while (e != NULL) { 1002 // assume zip entries have been canonicalized 1003 if (strcmp(name, e->name()) == 0) { 1004 return true; 1005 } 1006 e = e->next(); 1007 } 1008 return false; 1009 } 1010 1011 void ClassLoader::add_to_boot_append_entries(ClassPathEntry *new_entry) { 1012 if (new_entry != NULL) { 1013 if (_last_append_entry == NULL) { 1014 assert(_first_append_entry == NULL, "boot loader's append class path entry list not empty"); 1015 _first_append_entry = _last_append_entry = new_entry; 1016 } else { 1017 _last_append_entry->set_next(new_entry); 1018 _last_append_entry = new_entry; 1019 } 1020 } 1021 } 1022 1023 // Record the path entries specified in -cp during dump time. The recorded 1024 // information will be used at runtime for loading the archived app classes. 1025 // 1026 // Note that at dump time, ClassLoader::_app_classpath_entries are NOT used for 1027 // loading app classes. Instead, the app class are loaded by the 1028 // jdk/internal/loader/ClassLoaders$AppClassLoader instance. 1029 void ClassLoader::add_to_app_classpath_entries(const char* path, 1030 ClassPathEntry* entry, 1031 bool check_for_duplicates) { 1032 #if INCLUDE_CDS 1033 assert(entry != NULL, "ClassPathEntry should not be NULL"); 1034 ClassPathEntry* e = _app_classpath_entries; 1035 if (check_for_duplicates) { 1036 while (e != NULL) { 1037 if (strcmp(e->name(), entry->name()) == 0) { 1038 // entry already exists 1039 return; 1040 } 1041 e = e->next(); 1042 } 1043 } 1044 1045 // The entry does not exist, add to the list 1046 if (_app_classpath_entries == NULL) { 1047 assert(_last_app_classpath_entry == NULL, "Sanity"); 1048 _app_classpath_entries = _last_app_classpath_entry = entry; 1049 } else { 1050 _last_app_classpath_entry->set_next(entry); 1051 _last_app_classpath_entry = entry; 1052 } 1053 1054 if (entry->is_jar_file()) { 1055 ClassLoaderExt::process_jar_manifest(entry, check_for_duplicates); 1056 } else { 1057 if (!os::dir_is_empty(path)) { 1058 tty->print_cr("Error: non-empty directory '%s'", path); 1059 exit_with_path_failure("Cannot have non-empty directory in app classpaths", NULL); 1060 } 1061 } 1062 #endif 1063 } 1064 1065 // Returns true IFF the file/dir exists and the entry was successfully created. 1066 bool ClassLoader::update_class_path_entry_list(const char *path, 1067 bool check_for_duplicates, 1068 bool is_boot_append, 1069 bool throw_exception) { 1070 struct stat st; 1071 if (os::stat(path, &st) == 0) { 1072 // File or directory found 1073 ClassPathEntry* new_entry = NULL; 1074 Thread* THREAD = Thread::current(); 1075 new_entry = create_class_path_entry(path, &st, throw_exception, is_boot_append, CHECK_(false)); 1076 if (new_entry == NULL) { 1077 return false; 1078 } 1079 1080 // Do not reorder the bootclasspath which would break get_system_package(). 1081 // Add new entry to linked list 1082 if (is_boot_append) { 1083 add_to_boot_append_entries(new_entry); 1084 } else { 1085 add_to_app_classpath_entries(path, new_entry, check_for_duplicates); 1086 } 1087 return true; 1088 } else { 1089 #if INCLUDE_CDS 1090 if (DumpSharedSpaces) { 1091 _shared_paths_misc_info->add_nonexist_path(path); 1092 } 1093 #endif 1094 return false; 1095 } 1096 } 1097 1098 #if INCLUDE_CDS 1099 void ClassLoader::add_to_module_path_entries(const char* path, 1100 ClassPathEntry* entry) { 1101 assert(entry != NULL, "ClassPathEntry should not be NULL"); 1102 ClassPathEntry* e = _module_path_entries; 1103 1104 // The entry does not exist, add to the list 1105 if (_module_path_entries == NULL) { 1106 assert(_last_module_path_entry == NULL, "Sanity"); 1107 _module_path_entries = _last_module_path_entry = entry; 1108 } else { 1109 _last_module_path_entry->set_next(entry); 1110 _last_module_path_entry = entry; 1111 } 1112 } 1113 1114 // Add a module path to the _module_path_entries list. 1115 void ClassLoader::update_module_path_entry_list(const char *path, 1116 bool throw_exception) { 1117 struct stat st; 1118 assert(os::stat(path, &st) == 0, "module path must exist"); 1119 // File or directory found 1120 ClassPathEntry* new_entry = NULL; 1121 Thread* THREAD = Thread::current(); 1122 new_entry = create_class_path_entry(path, &st, throw_exception, 1123 false /*is_boot_append */, CHECK); 1124 if (new_entry == NULL) { 1125 return; 1126 } 1127 1128 add_to_module_path_entries(path, new_entry); 1129 return; 1130 } 1131 #endif // INCLUDE_CDS 1132 1133 static void print_module_entry_table(const GrowableArray<ModuleClassPathList*>* const module_list) { 1134 ResourceMark rm; 1135 int num_of_entries = module_list->length(); 1136 for (int i = 0; i < num_of_entries; i++) { 1137 ClassPathEntry* e; 1138 ModuleClassPathList* mpl = module_list->at(i); 1139 tty->print("%s=", mpl->module_name()->as_C_string()); 1140 e = mpl->module_first_entry(); 1141 while (e != NULL) { 1142 tty->print("%s", e->name()); 1143 e = e->next(); 1144 if (e != NULL) { 1145 tty->print("%s", os::path_separator()); 1146 } 1147 } 1148 tty->print(" ;"); 1149 } 1150 } 1151 1152 void ClassLoader::print_bootclasspath() { 1153 ClassPathEntry* e; 1154 tty->print("[bootclasspath= "); 1155 1156 // Print --patch-module module/path specifications first 1157 if (_patch_mod_entries != NULL) { 1158 print_module_entry_table(_patch_mod_entries); 1159 } 1160 1161 // [jimage | exploded modules build] 1162 if (has_jrt_entry()) { 1163 // Print the location of the java runtime image 1164 tty->print("%s ;", _jrt_entry->name()); 1165 } else { 1166 // Print exploded module build path specifications 1167 if (_exploded_entries != NULL) { 1168 print_module_entry_table(_exploded_entries); 1169 } 1170 } 1171 1172 // appended entries 1173 e = _first_append_entry; 1174 while (e != NULL) { 1175 tty->print("%s ;", e->name()); 1176 e = e->next(); 1177 } 1178 tty->print_cr("]"); 1179 } 1180 1181 void ClassLoader::load_zip_library() { 1182 assert(ZipOpen == NULL, "should not load zip library twice"); 1183 // First make sure native library is loaded 1184 os::native_java_library(); 1185 // Load zip library 1186 char path[JVM_MAXPATHLEN]; 1187 char ebuf[1024]; 1188 void* handle = NULL; 1189 if (os::dll_locate_lib(path, sizeof(path), Arguments::get_dll_dir(), "zip")) { 1190 handle = os::dll_load(path, ebuf, sizeof ebuf); 1191 } 1192 if (handle == NULL) { 1193 vm_exit_during_initialization("Unable to load ZIP library", path); 1194 } 1195 // Lookup zip entry points 1196 ZipOpen = CAST_TO_FN_PTR(ZipOpen_t, os::dll_lookup(handle, "ZIP_Open")); 1197 ZipClose = CAST_TO_FN_PTR(ZipClose_t, os::dll_lookup(handle, "ZIP_Close")); 1198 FindEntry = CAST_TO_FN_PTR(FindEntry_t, os::dll_lookup(handle, "ZIP_FindEntry")); 1199 ReadEntry = CAST_TO_FN_PTR(ReadEntry_t, os::dll_lookup(handle, "ZIP_ReadEntry")); 1200 GetNextEntry = CAST_TO_FN_PTR(GetNextEntry_t, os::dll_lookup(handle, "ZIP_GetNextEntry")); 1201 ZipInflateFully = CAST_TO_FN_PTR(ZipInflateFully_t, os::dll_lookup(handle, "ZIP_InflateFully")); 1202 Crc32 = CAST_TO_FN_PTR(Crc32_t, os::dll_lookup(handle, "ZIP_CRC32")); 1203 1204 // ZIP_Close is not exported on Windows in JDK5.0 so don't abort if ZIP_Close is NULL 1205 if (ZipOpen == NULL || FindEntry == NULL || ReadEntry == NULL || 1206 GetNextEntry == NULL || Crc32 == NULL) { 1207 vm_exit_during_initialization("Corrupted ZIP library", path); 1208 } 1209 1210 if (ZipInflateFully == NULL) { 1211 vm_exit_during_initialization("Corrupted ZIP library ZIP_InflateFully missing", path); 1212 } 1213 1214 // Lookup canonicalize entry in libjava.dll 1215 void *javalib_handle = os::native_java_library(); 1216 CanonicalizeEntry = CAST_TO_FN_PTR(canonicalize_fn_t, os::dll_lookup(javalib_handle, "Canonicalize")); 1217 // This lookup only works on 1.3. Do not check for non-null here 1218 } 1219 1220 void ClassLoader::load_jimage_library() { 1221 // First make sure native library is loaded 1222 os::native_java_library(); 1223 // Load jimage library 1224 char path[JVM_MAXPATHLEN]; 1225 char ebuf[1024]; 1226 void* handle = NULL; 1227 if (os::dll_locate_lib(path, sizeof(path), Arguments::get_dll_dir(), "jimage")) { 1228 handle = os::dll_load(path, ebuf, sizeof ebuf); 1229 } 1230 if (handle == NULL) { 1231 vm_exit_during_initialization("Unable to load jimage library", path); 1232 } 1233 1234 // Lookup jimage entry points 1235 JImageOpen = CAST_TO_FN_PTR(JImageOpen_t, os::dll_lookup(handle, "JIMAGE_Open")); 1236 guarantee(JImageOpen != NULL, "function JIMAGE_Open not found"); 1237 JImageClose = CAST_TO_FN_PTR(JImageClose_t, os::dll_lookup(handle, "JIMAGE_Close")); 1238 guarantee(JImageClose != NULL, "function JIMAGE_Close not found"); 1239 JImagePackageToModule = CAST_TO_FN_PTR(JImagePackageToModule_t, os::dll_lookup(handle, "JIMAGE_PackageToModule")); 1240 guarantee(JImagePackageToModule != NULL, "function JIMAGE_PackageToModule not found"); 1241 JImageFindResource = CAST_TO_FN_PTR(JImageFindResource_t, os::dll_lookup(handle, "JIMAGE_FindResource")); 1242 guarantee(JImageFindResource != NULL, "function JIMAGE_FindResource not found"); 1243 JImageGetResource = CAST_TO_FN_PTR(JImageGetResource_t, os::dll_lookup(handle, "JIMAGE_GetResource")); 1244 guarantee(JImageGetResource != NULL, "function JIMAGE_GetResource not found"); 1245 JImageResourceIterator = CAST_TO_FN_PTR(JImageResourceIterator_t, os::dll_lookup(handle, "JIMAGE_ResourceIterator")); 1246 guarantee(JImageResourceIterator != NULL, "function JIMAGE_ResourceIterator not found"); 1247 JImageResourcePath = CAST_TO_FN_PTR(JImage_ResourcePath_t, os::dll_lookup(handle, "JIMAGE_ResourcePath")); 1248 guarantee(JImageResourcePath != NULL, "function JIMAGE_ResourcePath not found"); 1249 } 1250 1251 jboolean ClassLoader::decompress(void *in, u8 inSize, void *out, u8 outSize, char **pmsg) { 1252 return (*ZipInflateFully)(in, inSize, out, outSize, pmsg); 1253 } 1254 1255 int ClassLoader::crc32(int crc, const char* buf, int len) { 1256 assert(Crc32 != NULL, "ZIP_CRC32 is not found"); 1257 return (*Crc32)(crc, (const jbyte*)buf, len); 1258 } 1259 1260 // Function add_package extracts the package from the fully qualified class name 1261 // and checks if the package is in the boot loader's package entry table. If so, 1262 // then it sets the classpath_index in the package entry record. 1263 // 1264 // The classpath_index field is used to find the entry on the boot loader class 1265 // path for packages with classes loaded by the boot loader from -Xbootclasspath/a 1266 // in an unnamed module. It is also used to indicate (for all packages whose 1267 // classes are loaded by the boot loader) that at least one of the package's 1268 // classes has been loaded. 1269 bool ClassLoader::add_package(const char *fullq_class_name, s2 classpath_index, TRAPS) { 1270 assert(fullq_class_name != NULL, "just checking"); 1271 1272 // Get package name from fully qualified class name. 1273 ResourceMark rm; 1274 const char *cp = package_from_name(fullq_class_name); 1275 if (cp != NULL) { 1276 PackageEntryTable* pkg_entry_tbl = ClassLoaderData::the_null_class_loader_data()->packages(); 1277 TempNewSymbol pkg_symbol = SymbolTable::new_symbol(cp, CHECK_false); 1278 PackageEntry* pkg_entry = pkg_entry_tbl->lookup_only(pkg_symbol); 1279 if (pkg_entry != NULL) { 1280 assert(classpath_index != -1, "Unexpected classpath_index"); 1281 pkg_entry->set_classpath_index(classpath_index); 1282 } else { 1283 return false; 1284 } 1285 } 1286 return true; 1287 } 1288 1289 oop ClassLoader::get_system_package(const char* name, TRAPS) { 1290 // Look up the name in the boot loader's package entry table. 1291 if (name != NULL) { 1292 TempNewSymbol package_sym = SymbolTable::new_symbol(name, (int)strlen(name), CHECK_NULL); 1293 // Look for the package entry in the boot loader's package entry table. 1294 PackageEntry* package = 1295 ClassLoaderData::the_null_class_loader_data()->packages()->lookup_only(package_sym); 1296 1297 // Return NULL if package does not exist or if no classes in that package 1298 // have been loaded. 1299 if (package != NULL && package->has_loaded_class()) { 1300 ModuleEntry* module = package->module(); 1301 if (module->location() != NULL) { 1302 ResourceMark rm(THREAD); 1303 Handle ml = java_lang_String::create_from_str( 1304 module->location()->as_C_string(), THREAD); 1305 return ml(); 1306 } 1307 // Return entry on boot loader class path. 1308 Handle cph = java_lang_String::create_from_str( 1309 ClassLoader::classpath_entry(package->classpath_index())->name(), THREAD); 1310 return cph(); 1311 } 1312 } 1313 return NULL; 1314 } 1315 1316 objArrayOop ClassLoader::get_system_packages(TRAPS) { 1317 ResourceMark rm(THREAD); 1318 // List of pointers to PackageEntrys that have loaded classes. 1319 GrowableArray<PackageEntry*>* loaded_class_pkgs = new GrowableArray<PackageEntry*>(50); 1320 { 1321 MutexLocker ml(Module_lock, THREAD); 1322 1323 PackageEntryTable* pe_table = 1324 ClassLoaderData::the_null_class_loader_data()->packages(); 1325 1326 // Collect the packages that have at least one loaded class. 1327 for (int x = 0; x < pe_table->table_size(); x++) { 1328 for (PackageEntry* package_entry = pe_table->bucket(x); 1329 package_entry != NULL; 1330 package_entry = package_entry->next()) { 1331 if (package_entry->has_loaded_class()) { 1332 loaded_class_pkgs->append(package_entry); 1333 } 1334 } 1335 } 1336 } 1337 1338 1339 // Allocate objArray and fill with java.lang.String 1340 objArrayOop r = oopFactory::new_objArray(SystemDictionary::String_klass(), 1341 loaded_class_pkgs->length(), CHECK_NULL); 1342 objArrayHandle result(THREAD, r); 1343 for (int x = 0; x < loaded_class_pkgs->length(); x++) { 1344 PackageEntry* package_entry = loaded_class_pkgs->at(x); 1345 Handle str = java_lang_String::create_from_symbol(package_entry->name(), CHECK_NULL); 1346 result->obj_at_put(x, str()); 1347 } 1348 return result(); 1349 } 1350 1351 // caller needs ResourceMark 1352 const char* ClassLoader::file_name_for_class_name(const char* class_name, 1353 int class_name_len) { 1354 assert(class_name != NULL, "invariant"); 1355 assert((int)strlen(class_name) == class_name_len, "invariant"); 1356 1357 static const char class_suffix[] = ".class"; 1358 1359 char* const file_name = NEW_RESOURCE_ARRAY(char, 1360 class_name_len + 1361 sizeof(class_suffix)); // includes term NULL 1362 1363 strncpy(file_name, class_name, class_name_len); 1364 strncpy(&file_name[class_name_len], class_suffix, sizeof(class_suffix)); 1365 1366 return file_name; 1367 } 1368 1369 ClassPathEntry* find_first_module_cpe(ModuleEntry* mod_entry, 1370 const GrowableArray<ModuleClassPathList*>* const module_list) { 1371 int num_of_entries = module_list->length(); 1372 const Symbol* class_module_name = mod_entry->name(); 1373 1374 // Loop through all the modules in either the patch-module or exploded entries looking for module 1375 for (int i = 0; i < num_of_entries; i++) { 1376 ModuleClassPathList* module_cpl = module_list->at(i); 1377 Symbol* module_cpl_name = module_cpl->module_name(); 1378 1379 if (module_cpl_name->fast_compare(class_module_name) == 0) { 1380 // Class' module has been located. 1381 return module_cpl->module_first_entry(); 1382 } 1383 } 1384 return NULL; 1385 } 1386 1387 1388 // Search either the patch-module or exploded build entries for class. 1389 ClassFileStream* ClassLoader::search_module_entries(const GrowableArray<ModuleClassPathList*>* const module_list, 1390 const char* const class_name, 1391 const char* const file_name, 1392 TRAPS) { 1393 ClassFileStream* stream = NULL; 1394 1395 // Find the class' defining module in the boot loader's module entry table 1396 PackageEntry* pkg_entry = get_package_entry(class_name, ClassLoaderData::the_null_class_loader_data(), CHECK_NULL); 1397 ModuleEntry* mod_entry = (pkg_entry != NULL) ? pkg_entry->module() : NULL; 1398 1399 // If the module system has not defined java.base yet, then 1400 // classes loaded are assumed to be defined to java.base. 1401 // When java.base is eventually defined by the module system, 1402 // all packages of classes that have been previously loaded 1403 // are verified in ModuleEntryTable::verify_javabase_packages(). 1404 if (!Universe::is_module_initialized() && 1405 !ModuleEntryTable::javabase_defined() && 1406 mod_entry == NULL) { 1407 mod_entry = ModuleEntryTable::javabase_moduleEntry(); 1408 } 1409 1410 // The module must be a named module 1411 ClassPathEntry* e = NULL; 1412 if (mod_entry != NULL && mod_entry->is_named()) { 1413 if (module_list == _exploded_entries) { 1414 // The exploded build entries can be added to at any time so a lock is 1415 // needed when searching them. 1416 assert(!ClassLoader::has_jrt_entry(), "Must be exploded build"); 1417 MutexLocker ml(Module_lock, THREAD); 1418 e = find_first_module_cpe(mod_entry, module_list); 1419 } else { 1420 e = find_first_module_cpe(mod_entry, module_list); 1421 } 1422 } 1423 1424 // Try to load the class from the module's ClassPathEntry list. 1425 while (e != NULL) { 1426 stream = e->open_stream(file_name, CHECK_NULL); 1427 // No context.check is required since CDS is not supported 1428 // for an exploded modules build or if --patch-module is specified. 1429 if (NULL != stream) { 1430 return stream; 1431 } 1432 e = e->next(); 1433 } 1434 // If the module was located, break out even if the class was not 1435 // located successfully from that module's ClassPathEntry list. 1436 // There will not be another valid entry for that module. 1437 return NULL; 1438 } 1439 1440 // Called by the boot classloader to load classes 1441 InstanceKlass* ClassLoader::load_class(Symbol* name, bool search_append_only, TRAPS) { 1442 assert(name != NULL, "invariant"); 1443 assert(THREAD->is_Java_thread(), "must be a JavaThread"); 1444 1445 ResourceMark rm(THREAD); 1446 HandleMark hm(THREAD); 1447 1448 const char* const class_name = name->as_C_string(); 1449 1450 EventMark m("loading class %s", class_name); 1451 1452 const char* const file_name = file_name_for_class_name(class_name, 1453 name->utf8_length()); 1454 assert(file_name != NULL, "invariant"); 1455 1456 ClassLoaderExt::Context context(class_name, file_name, THREAD); 1457 1458 // Lookup stream for parsing .class file 1459 ClassFileStream* stream = NULL; 1460 s2 classpath_index = 0; 1461 ClassPathEntry* e = NULL; 1462 1463 // If DumpSharedSpaces is true boot loader visibility boundaries are set to: 1464 // - [jimage] + [_first_append_entry to _last_append_entry] (all path entries). 1465 // 1466 // If search_append_only is true, boot loader visibility boundaries are 1467 // set to be _first_append_entry to the end. This includes: 1468 // [-Xbootclasspath/a]; [jvmti appended entries] 1469 // 1470 // If both DumpSharedSpaces and search_append_only are false, boot loader 1471 // visibility boundaries are set to be the --patch-module entries plus the base piece. 1472 // This would include: 1473 // [--patch-module=<module>=<file>(<pathsep><file>)*]; [jimage | exploded module build] 1474 // 1475 1476 // Load Attempt #1: --patch-module 1477 // Determine the class' defining module. If it appears in the _patch_mod_entries, 1478 // attempt to load the class from those locations specific to the module. 1479 // Specifications to --patch-module can contain a partial number of classes 1480 // that are part of the overall module definition. So if a particular class is not 1481 // found within its module specification, the search should continue to Load Attempt #2. 1482 // Note: The --patch-module entries are never searched if the boot loader's 1483 // visibility boundary is limited to only searching the append entries. 1484 if (_patch_mod_entries != NULL && !search_append_only) { 1485 // At CDS dump time, the --patch-module entries are ignored. That means a 1486 // class is still loaded from the runtime image even if it might 1487 // appear in the _patch_mod_entries. The runtime shared class visibility 1488 // check will determine if a shared class is visible based on the runtime 1489 // environemnt, including the runtime --patch-module setting. 1490 if (!DumpSharedSpaces) { 1491 stream = search_module_entries(_patch_mod_entries, class_name, file_name, CHECK_NULL); 1492 } 1493 } 1494 1495 // Load Attempt #2: [jimage | exploded build] 1496 if (!search_append_only && (NULL == stream)) { 1497 if (has_jrt_entry()) { 1498 e = _jrt_entry; 1499 stream = _jrt_entry->open_stream(file_name, CHECK_NULL); 1500 } else { 1501 // Exploded build - attempt to locate class in its defining module's location. 1502 assert(_exploded_entries != NULL, "No exploded build entries present"); 1503 stream = search_module_entries(_exploded_entries, class_name, file_name, CHECK_NULL); 1504 } 1505 } 1506 1507 // Load Attempt #3: [-Xbootclasspath/a]; [jvmti appended entries] 1508 if ((search_append_only || DumpSharedSpaces) && (NULL == stream)) { 1509 // For the boot loader append path search, the starting classpath_index 1510 // for the appended piece is always 1 to account for either the 1511 // _jrt_entry or the _exploded_entries. 1512 assert(classpath_index == 0, "The classpath_index has been incremented incorrectly"); 1513 classpath_index = 1; 1514 1515 e = _first_append_entry; 1516 while (e != NULL) { 1517 stream = e->open_stream(file_name, CHECK_NULL); 1518 if (NULL != stream) { 1519 break; 1520 } 1521 e = e->next(); 1522 ++classpath_index; 1523 } 1524 } 1525 1526 if (NULL == stream) { 1527 return NULL; 1528 } 1529 1530 stream->set_verify(context.should_verify(classpath_index)); 1531 1532 ClassLoaderData* loader_data = ClassLoaderData::the_null_class_loader_data(); 1533 Handle protection_domain; 1534 1535 InstanceKlass* result = KlassFactory::create_from_stream(stream, 1536 name, 1537 loader_data, 1538 protection_domain, 1539 NULL, // host_klass 1540 NULL, // cp_patches 1541 THREAD); 1542 if (HAS_PENDING_EXCEPTION) { 1543 if (DumpSharedSpaces) { 1544 tty->print_cr("Preload Error: Failed to load %s", class_name); 1545 } 1546 return NULL; 1547 } 1548 1549 if (!add_package(file_name, classpath_index, THREAD)) { 1550 return NULL; 1551 } 1552 1553 return result; 1554 } 1555 1556 #if INCLUDE_CDS 1557 char* ClassLoader::skip_uri_protocol(char* source) { 1558 if (strncmp(source, "file:", 5) == 0) { 1559 // file: protocol path could start with file:/ or file:/// 1560 // locate the char after all the forward slashes 1561 int offset = 5; 1562 while (*(source + offset) == '/') { 1563 offset++; 1564 } 1565 source += offset; 1566 // for non-windows platforms, move back one char as the path begins with a '/' 1567 #ifndef _WINDOWS 1568 source -= 1; 1569 #endif 1570 } else if (strncmp(source, "jrt:/", 5) == 0) { 1571 source += 5; 1572 } 1573 return source; 1574 } 1575 1576 // Record the shared classpath index and loader type for classes loaded 1577 // by the builtin loaders at dump time. 1578 void ClassLoader::record_result(InstanceKlass* ik, const ClassFileStream* stream) { 1579 assert(DumpSharedSpaces, "sanity"); 1580 assert(stream != NULL, "sanity"); 1581 1582 if (ik->is_anonymous()) { 1583 // We do not archive anonymous classes. 1584 return; 1585 } 1586 1587 oop loader = ik->class_loader(); 1588 char* src = (char*)stream->source(); 1589 if (src == NULL) { 1590 if (loader == NULL) { 1591 // JFR classes 1592 ik->set_shared_classpath_index(0); 1593 ik->set_class_loader_type(ClassLoader::BOOT_LOADER); 1594 } 1595 return; 1596 } 1597 1598 assert(has_jrt_entry(), "CDS dumping does not support exploded JDK build"); 1599 1600 ResourceMark rm; 1601 Thread* THREAD = Thread::current(); 1602 int classpath_index = -1; 1603 PackageEntry* pkg_entry = ik->package(); 1604 1605 if (FileMapInfo::get_number_of_shared_paths() > 0) { 1606 char* canonical_path = NEW_RESOURCE_ARRAY(char, JVM_MAXPATHLEN); 1607 1608 // save the path from the file: protocol or the module name from the jrt: protocol 1609 // if no protocol prefix is found, path is the same as stream->source() 1610 char* path = skip_uri_protocol(src); 1611 for (int i = 0; i < FileMapInfo::get_number_of_shared_paths(); i++) { 1612 SharedClassPathEntry* ent = FileMapInfo::shared_path(i); 1613 if (get_canonical_path(ent->name(), canonical_path, JVM_MAXPATHLEN)) { 1614 // If the path (from the class stream source) is the same as the shared 1615 // class or module path, then we have a match. 1616 if (strcmp(canonical_path, os::native_path((char*)path)) == 0) { 1617 // NULL pkg_entry and pkg_entry in an unnamed module implies the class 1618 // is from the -cp. Ensure the index is within the -cp range before assigning 1619 // to the classpath_index. 1620 if ((pkg_entry == NULL) || (pkg_entry->in_unnamed_module())) { 1621 if (SystemDictionary::is_system_class_loader(loader) && 1622 (i >= ClassLoaderExt::app_class_paths_start_index()) && 1623 (i < ClassLoaderExt::app_module_paths_start_index())) { 1624 classpath_index = i; 1625 break; 1626 } else { 1627 if ((i >= 1) && 1628 (i < ClassLoaderExt::app_module_paths_start_index())) { 1629 classpath_index = i; 1630 break; 1631 } 1632 } 1633 } else { 1634 // non-NULL pkg_entry and is a named module implies the class is from the 1635 // --module-path. Ensure the index is within the --module-path range before 1636 // assigning to the classpath_index. 1637 if ((pkg_entry != NULL) && !(pkg_entry->in_unnamed_module()) && (i > 0)) { 1638 if (i >= ClassLoaderExt::app_module_paths_start_index() && 1639 i < FileMapInfo::get_number_of_shared_paths()) { 1640 classpath_index = i; 1641 break; 1642 } 1643 } 1644 } 1645 } 1646 // for index 0 and the stream->source() is the modules image or has the jrt: protocol. 1647 // The class must be from the runtime modules image. 1648 if (i == 0 && (is_modules_image(src) || string_starts_with(src, "jrt:"))) { 1649 classpath_index = i; 1650 break; 1651 } 1652 } 1653 } 1654 1655 // No path entry found for this class. Must be a shared class loaded by the 1656 // user defined classloader. 1657 if (classpath_index < 0) { 1658 assert(ik->shared_classpath_index() < 0, "Sanity"); 1659 return; 1660 } 1661 } else { 1662 assert(is_modules_image(src), "stream must be from modules image"); 1663 assert(FileMapInfo::get_number_of_shared_paths() == 0, "shared path table must not have been setup"); 1664 classpath_index = 0; 1665 } 1666 1667 const char* const class_name = ik->name()->as_C_string(); 1668 const char* const file_name = file_name_for_class_name(class_name, 1669 ik->name()->utf8_length()); 1670 assert(file_name != NULL, "invariant"); 1671 1672 ClassLoaderExt::Context context(class_name, file_name, CATCH); 1673 context.record_result(ik->name(), classpath_index, ik, THREAD); 1674 } 1675 #endif // INCLUDE_CDS 1676 1677 // Initialize the class loader's access to methods in libzip. Parse and 1678 // process the boot classpath into a list ClassPathEntry objects. Once 1679 // this list has been created, it must not change order (see class PackageInfo) 1680 // it can be appended to and is by jvmti and the kernel vm. 1681 1682 void ClassLoader::initialize() { 1683 EXCEPTION_MARK; 1684 1685 if (UsePerfData) { 1686 // jvmstat performance counters 1687 NEWPERFTICKCOUNTER(_perf_accumulated_time, SUN_CLS, "time"); 1688 NEWPERFTICKCOUNTER(_perf_class_init_time, SUN_CLS, "classInitTime"); 1689 NEWPERFTICKCOUNTER(_perf_class_init_selftime, SUN_CLS, "classInitTime.self"); 1690 NEWPERFTICKCOUNTER(_perf_class_verify_time, SUN_CLS, "classVerifyTime"); 1691 NEWPERFTICKCOUNTER(_perf_class_verify_selftime, SUN_CLS, "classVerifyTime.self"); 1692 NEWPERFTICKCOUNTER(_perf_class_link_time, SUN_CLS, "classLinkedTime"); 1693 NEWPERFTICKCOUNTER(_perf_class_link_selftime, SUN_CLS, "classLinkedTime.self"); 1694 NEWPERFEVENTCOUNTER(_perf_classes_inited, SUN_CLS, "initializedClasses"); 1695 NEWPERFEVENTCOUNTER(_perf_classes_linked, SUN_CLS, "linkedClasses"); 1696 NEWPERFEVENTCOUNTER(_perf_classes_verified, SUN_CLS, "verifiedClasses"); 1697 1698 NEWPERFTICKCOUNTER(_perf_class_parse_time, SUN_CLS, "parseClassTime"); 1699 NEWPERFTICKCOUNTER(_perf_class_parse_selftime, SUN_CLS, "parseClassTime.self"); 1700 NEWPERFTICKCOUNTER(_perf_sys_class_lookup_time, SUN_CLS, "lookupSysClassTime"); 1701 NEWPERFTICKCOUNTER(_perf_shared_classload_time, SUN_CLS, "sharedClassLoadTime"); 1702 NEWPERFTICKCOUNTER(_perf_sys_classload_time, SUN_CLS, "sysClassLoadTime"); 1703 NEWPERFTICKCOUNTER(_perf_app_classload_time, SUN_CLS, "appClassLoadTime"); 1704 NEWPERFTICKCOUNTER(_perf_app_classload_selftime, SUN_CLS, "appClassLoadTime.self"); 1705 NEWPERFEVENTCOUNTER(_perf_app_classload_count, SUN_CLS, "appClassLoadCount"); 1706 NEWPERFTICKCOUNTER(_perf_define_appclasses, SUN_CLS, "defineAppClasses"); 1707 NEWPERFTICKCOUNTER(_perf_define_appclass_time, SUN_CLS, "defineAppClassTime"); 1708 NEWPERFTICKCOUNTER(_perf_define_appclass_selftime, SUN_CLS, "defineAppClassTime.self"); 1709 NEWPERFBYTECOUNTER(_perf_app_classfile_bytes_read, SUN_CLS, "appClassBytes"); 1710 NEWPERFBYTECOUNTER(_perf_sys_classfile_bytes_read, SUN_CLS, "sysClassBytes"); 1711 1712 1713 // The following performance counters are added for measuring the impact 1714 // of the bug fix of 6365597. They are mainly focused on finding out 1715 // the behavior of system & user-defined classloader lock, whether 1716 // ClassLoader.loadClass/findClass is being called synchronized or not. 1717 NEWPERFEVENTCOUNTER(_sync_systemLoaderLockContentionRate, SUN_CLS, 1718 "systemLoaderLockContentionRate"); 1719 NEWPERFEVENTCOUNTER(_sync_nonSystemLoaderLockContentionRate, SUN_CLS, 1720 "nonSystemLoaderLockContentionRate"); 1721 NEWPERFEVENTCOUNTER(_sync_JVMFindLoadedClassLockFreeCounter, SUN_CLS, 1722 "jvmFindLoadedClassNoLockCalls"); 1723 NEWPERFEVENTCOUNTER(_sync_JVMDefineClassLockFreeCounter, SUN_CLS, 1724 "jvmDefineClassNoLockCalls"); 1725 1726 NEWPERFEVENTCOUNTER(_sync_JNIDefineClassLockFreeCounter, SUN_CLS, 1727 "jniDefineClassNoLockCalls"); 1728 1729 NEWPERFEVENTCOUNTER(_unsafe_defineClassCallCounter, SUN_CLS, 1730 "unsafeDefineClassCalls"); 1731 1732 NEWPERFEVENTCOUNTER(_load_instance_class_failCounter, SUN_CLS, 1733 "loadInstanceClassFailRate"); 1734 } 1735 1736 // lookup zip library entry points 1737 load_zip_library(); 1738 // lookup jimage library entry points 1739 load_jimage_library(); 1740 #if INCLUDE_CDS 1741 // initialize search path 1742 if (DumpSharedSpaces) { 1743 _shared_paths_misc_info = SharedClassUtil::allocate_shared_paths_misc_info(); 1744 } 1745 #endif 1746 setup_bootstrap_search_path(); 1747 } 1748 1749 #if INCLUDE_CDS 1750 void ClassLoader::initialize_shared_path() { 1751 if (DumpSharedSpaces) { 1752 ClassLoaderExt::setup_search_paths(); 1753 _shared_paths_misc_info->write_jint(0); // see comments in SharedPathsMiscInfo::check() 1754 } 1755 } 1756 1757 void ClassLoader::initialize_module_path() { 1758 if (DumpSharedSpaces) { 1759 ClassLoaderExt::setup_module_paths(); 1760 FileMapInfo::allocate_shared_path_table(); 1761 } 1762 } 1763 #endif 1764 1765 jlong ClassLoader::classloader_time_ms() { 1766 return UsePerfData ? 1767 Management::ticks_to_ms(_perf_accumulated_time->get_value()) : -1; 1768 } 1769 1770 jlong ClassLoader::class_init_count() { 1771 return UsePerfData ? _perf_classes_inited->get_value() : -1; 1772 } 1773 1774 jlong ClassLoader::class_init_time_ms() { 1775 return UsePerfData ? 1776 Management::ticks_to_ms(_perf_class_init_time->get_value()) : -1; 1777 } 1778 1779 jlong ClassLoader::class_verify_time_ms() { 1780 return UsePerfData ? 1781 Management::ticks_to_ms(_perf_class_verify_time->get_value()) : -1; 1782 } 1783 1784 jlong ClassLoader::class_link_count() { 1785 return UsePerfData ? _perf_classes_linked->get_value() : -1; 1786 } 1787 1788 jlong ClassLoader::class_link_time_ms() { 1789 return UsePerfData ? 1790 Management::ticks_to_ms(_perf_class_link_time->get_value()) : -1; 1791 } 1792 1793 int ClassLoader::compute_Object_vtable() { 1794 // hardwired for JDK1.2 -- would need to duplicate class file parsing 1795 // code to determine actual value from file 1796 // Would be value '11' if finals were in vtable 1797 int JDK_1_2_Object_vtable_size = 5; 1798 return JDK_1_2_Object_vtable_size * vtableEntry::size(); 1799 } 1800 1801 1802 void classLoader_init1() { 1803 ClassLoader::initialize(); 1804 } 1805 1806 // Complete the ClassPathEntry setup for the boot loader 1807 void ClassLoader::classLoader_init2(TRAPS) { 1808 // Setup the list of module/path pairs for --patch-module processing 1809 // This must be done after the SymbolTable is created in order 1810 // to use fast_compare on module names instead of a string compare. 1811 if (Arguments::get_patch_mod_prefix() != NULL) { 1812 setup_patch_mod_entries(); 1813 } 1814 1815 // Create the ModuleEntry for java.base (must occur after setup_patch_mod_entries 1816 // to successfully determine if java.base has been patched) 1817 create_javabase(); 1818 1819 // Setup the initial java.base/path pair for the exploded build entries. 1820 // As more modules are defined during module system initialization, more 1821 // entries will be added to the exploded build array. 1822 if (!has_jrt_entry()) { 1823 assert(!DumpSharedSpaces, "DumpSharedSpaces not supported with exploded module builds"); 1824 assert(!UseSharedSpaces, "UsedSharedSpaces not supported with exploded module builds"); 1825 // Set up the boot loader's _exploded_entries list. Note that this gets 1826 // done before loading any classes, by the same thread that will 1827 // subsequently do the first class load. So, no lock is needed for this. 1828 assert(_exploded_entries == NULL, "Should only get initialized once"); 1829 _exploded_entries = new (ResourceObj::C_HEAP, mtModule) 1830 GrowableArray<ModuleClassPathList*>(EXPLODED_ENTRY_SIZE, true); 1831 add_to_exploded_build_list(vmSymbols::java_base(), CHECK); 1832 } 1833 } 1834 1835 1836 bool ClassLoader::get_canonical_path(const char* orig, char* out, int len) { 1837 assert(orig != NULL && out != NULL && len > 0, "bad arguments"); 1838 if (CanonicalizeEntry != NULL) { 1839 JavaThread* THREAD = JavaThread::current(); 1840 JNIEnv* env = THREAD->jni_environment(); 1841 ResourceMark rm(THREAD); 1842 1843 // os::native_path writes into orig_copy 1844 char* orig_copy = NEW_RESOURCE_ARRAY_IN_THREAD(THREAD, char, strlen(orig)+1); 1845 strcpy(orig_copy, orig); 1846 if ((CanonicalizeEntry)(env, os::native_path(orig_copy), out, len) < 0) { 1847 return false; 1848 } 1849 } else { 1850 // On JDK 1.2.2 the Canonicalize does not exist, so just do nothing 1851 strncpy(out, orig, len); 1852 out[len - 1] = '\0'; 1853 } 1854 return true; 1855 } 1856 1857 void ClassLoader::create_javabase() { 1858 Thread* THREAD = Thread::current(); 1859 1860 // Create java.base's module entry for the boot 1861 // class loader prior to loading j.l.Ojbect. 1862 ClassLoaderData* null_cld = ClassLoaderData::the_null_class_loader_data(); 1863 1864 // Get module entry table 1865 ModuleEntryTable* null_cld_modules = null_cld->modules(); 1866 if (null_cld_modules == NULL) { 1867 vm_exit_during_initialization("No ModuleEntryTable for the boot class loader"); 1868 } 1869 1870 { 1871 MutexLocker ml(Module_lock, THREAD); 1872 ModuleEntry* jb_module = null_cld_modules->locked_create_entry_or_null(Handle(), 1873 false, vmSymbols::java_base(), NULL, NULL, null_cld); 1874 if (jb_module == NULL) { 1875 vm_exit_during_initialization("Unable to create ModuleEntry for " JAVA_BASE_NAME); 1876 } 1877 ModuleEntryTable::set_javabase_moduleEntry(jb_module); 1878 } 1879 } 1880 1881 #ifndef PRODUCT 1882 1883 // CompileTheWorld 1884 // 1885 // Iterates over all class path entries and forces compilation of all methods 1886 // in all classes found. Currently, only zip/jar archives are searched. 1887 // 1888 // The classes are loaded by the Java level bootstrap class loader, and the 1889 // initializer is called. If DelayCompilationDuringStartup is true (default), 1890 // the interpreter will run the initialization code. Note that forcing 1891 // initialization in this way could potentially lead to initialization order 1892 // problems, in which case we could just force the initialization bit to be set. 1893 1894 1895 // We need to iterate over the contents of a zip/jar file, so we replicate the 1896 // jzcell and jzfile definitions from zip_util.h but rename jzfile to real_jzfile, 1897 // since jzfile already has a void* definition. 1898 // 1899 // Note that this is only used in debug mode. 1900 // 1901 // HotSpot integration note: 1902 // Matches zip_util.h 1.14 99/06/01 from jdk1.3 beta H build 1903 1904 1905 // JDK 1.3 version 1906 typedef struct real_jzentry { /* Zip file entry */ 1907 char *name; /* entry name */ 1908 jint time; /* modification time */ 1909 jint size; /* size of uncompressed data */ 1910 jint csize; /* size of compressed data (zero if uncompressed) */ 1911 jint crc; /* crc of uncompressed data */ 1912 char *comment; /* optional zip file comment */ 1913 jbyte *extra; /* optional extra data */ 1914 jint pos; /* position of LOC header (if negative) or data */ 1915 } real_jzentry; 1916 1917 typedef struct real_jzfile { /* Zip file */ 1918 char *name; /* zip file name */ 1919 jint refs; /* number of active references */ 1920 jint fd; /* open file descriptor */ 1921 void *lock; /* read lock */ 1922 char *comment; /* zip file comment */ 1923 char *msg; /* zip error message */ 1924 void *entries; /* array of hash cells */ 1925 jint total; /* total number of entries */ 1926 unsigned short *table; /* Hash chain heads: indexes into entries */ 1927 jint tablelen; /* number of hash eads */ 1928 real_jzfile *next; /* next zip file in search list */ 1929 jzentry *cache; /* we cache the most recently freed jzentry */ 1930 /* Information on metadata names in META-INF directory */ 1931 char **metanames; /* array of meta names (may have null names) */ 1932 jint metacount; /* number of slots in metanames array */ 1933 /* If there are any per-entry comments, they are in the comments array */ 1934 char **comments; 1935 } real_jzfile; 1936 1937 void ClassPathDirEntry::compile_the_world(Handle loader, TRAPS) { 1938 // For now we only compile all methods in all classes in zip/jar files 1939 tty->print_cr("CompileTheWorld : Skipped classes in %s", _dir); 1940 tty->cr(); 1941 } 1942 1943 void ClassPathZipEntry::compile_the_world(Handle loader, TRAPS) { 1944 real_jzfile* zip = (real_jzfile*) _zip; 1945 tty->print_cr("CompileTheWorld : Compiling all classes in %s", zip->name); 1946 tty->cr(); 1947 // Iterate over all entries in zip file 1948 for (int n = 0; ; n++) { 1949 real_jzentry * ze = (real_jzentry *)((*GetNextEntry)(_zip, n)); 1950 if (ze == NULL) break; 1951 ClassLoader::compile_the_world_in(ze->name, loader, CHECK); 1952 } 1953 if (HAS_PENDING_EXCEPTION) { 1954 if (PENDING_EXCEPTION->is_a(SystemDictionary::OutOfMemoryError_klass())) { 1955 CLEAR_PENDING_EXCEPTION; 1956 tty->print_cr("\nCompileTheWorld : Ran out of memory\n"); 1957 tty->print_cr("Increase class metadata storage if a limit was set"); 1958 } else { 1959 tty->print_cr("\nCompileTheWorld : Unexpected exception occurred\n"); 1960 } 1961 } 1962 } 1963 1964 void ClassLoader::compile_the_world() { 1965 EXCEPTION_MARK; 1966 HandleMark hm(THREAD); 1967 ResourceMark rm(THREAD); 1968 1969 assert(has_jrt_entry(), "Compile The World not supported with exploded module build"); 1970 1971 // Find bootstrap loader 1972 Handle system_class_loader (THREAD, SystemDictionary::java_system_loader()); 1973 jlong start = os::javaTimeMillis(); 1974 1975 // Compile the world for the modular java runtime image 1976 _jrt_entry->compile_the_world(system_class_loader, CATCH); 1977 1978 // Iterate over all bootstrap class path appended entries 1979 ClassPathEntry* e = _first_append_entry; 1980 while (e != NULL) { 1981 assert(!e->is_modules_image(), "A modular java runtime image is present on the list of appended entries"); 1982 e->compile_the_world(system_class_loader, CATCH); 1983 e = e->next(); 1984 } 1985 jlong end = os::javaTimeMillis(); 1986 tty->print_cr("CompileTheWorld : Done (%d classes, %d methods, " JLONG_FORMAT " ms)", 1987 _compile_the_world_class_counter, _compile_the_world_method_counter, (end - start)); 1988 { 1989 // Print statistics as if before normal exit: 1990 extern void print_statistics(); 1991 print_statistics(); 1992 } 1993 vm_exit(0); 1994 } 1995 1996 int ClassLoader::_compile_the_world_class_counter = 0; 1997 int ClassLoader::_compile_the_world_method_counter = 0; 1998 static int _codecache_sweep_counter = 0; 1999 2000 // Filter out all exceptions except OOMs 2001 static void clear_pending_exception_if_not_oom(TRAPS) { 2002 if (HAS_PENDING_EXCEPTION && 2003 !PENDING_EXCEPTION->is_a(SystemDictionary::OutOfMemoryError_klass())) { 2004 CLEAR_PENDING_EXCEPTION; 2005 } 2006 // The CHECK at the caller will propagate the exception out 2007 } 2008 2009 /** 2010 * Returns if the given method should be compiled when doing compile-the-world. 2011 * 2012 * TODO: This should be a private method in a CompileTheWorld class. 2013 */ 2014 static bool can_be_compiled(const methodHandle& m, int comp_level) { 2015 assert(CompileTheWorld, "must be"); 2016 2017 // It's not valid to compile a native wrapper for MethodHandle methods 2018 // that take a MemberName appendix since the bytecode signature is not 2019 // correct. 2020 vmIntrinsics::ID iid = m->intrinsic_id(); 2021 if (MethodHandles::is_signature_polymorphic(iid) && MethodHandles::has_member_arg(iid)) { 2022 return false; 2023 } 2024 2025 return CompilationPolicy::can_be_compiled(m, comp_level); 2026 } 2027 2028 void ClassLoader::compile_the_world_in(char* name, Handle loader, TRAPS) { 2029 if (string_ends_with(name, ".class")) { 2030 // We have a .class file 2031 int len = (int)strlen(name); 2032 char buffer[2048]; 2033 strncpy(buffer, name, len - 6); 2034 buffer[len-6] = 0; 2035 // If the file has a period after removing .class, it's not really a 2036 // valid class file. The class loader will check everything else. 2037 if (strchr(buffer, '.') == NULL) { 2038 _compile_the_world_class_counter++; 2039 if (_compile_the_world_class_counter > CompileTheWorldStopAt) return; 2040 2041 // Construct name without extension 2042 TempNewSymbol sym = SymbolTable::new_symbol(buffer, CHECK); 2043 // Use loader to load and initialize class 2044 Klass* k = SystemDictionary::resolve_or_null(sym, loader, Handle(), THREAD); 2045 if (k != NULL && !HAS_PENDING_EXCEPTION) { 2046 k->initialize(THREAD); 2047 } 2048 bool exception_occurred = HAS_PENDING_EXCEPTION; 2049 clear_pending_exception_if_not_oom(CHECK); 2050 if (CompileTheWorldPreloadClasses && k != NULL) { 2051 InstanceKlass* ik = InstanceKlass::cast(k); 2052 ConstantPool::preload_and_initialize_all_classes(ik->constants(), THREAD); 2053 if (HAS_PENDING_EXCEPTION) { 2054 // If something went wrong in preloading we just ignore it 2055 clear_pending_exception_if_not_oom(CHECK); 2056 tty->print_cr("Preloading failed for (%d) %s", _compile_the_world_class_counter, buffer); 2057 } 2058 } 2059 2060 if (_compile_the_world_class_counter >= CompileTheWorldStartAt) { 2061 if (k == NULL || exception_occurred) { 2062 // If something went wrong (e.g. ExceptionInInitializerError) we skip this class 2063 tty->print_cr("CompileTheWorld (%d) : Skipping %s", _compile_the_world_class_counter, buffer); 2064 } else { 2065 tty->print_cr("CompileTheWorld (%d) : %s", _compile_the_world_class_counter, buffer); 2066 // Preload all classes to get around uncommon traps 2067 // Iterate over all methods in class 2068 int comp_level = CompilationPolicy::policy()->initial_compile_level(); 2069 InstanceKlass* ik = InstanceKlass::cast(k); 2070 for (int n = 0; n < ik->methods()->length(); n++) { 2071 methodHandle m (THREAD, ik->methods()->at(n)); 2072 if (can_be_compiled(m, comp_level)) { 2073 if (++_codecache_sweep_counter == CompileTheWorldSafepointInterval) { 2074 // Give sweeper a chance to keep up with CTW 2075 VM_CTWThreshold op; 2076 VMThread::execute(&op); 2077 _codecache_sweep_counter = 0; 2078 } 2079 // Force compilation 2080 CompileBroker::compile_method(m, InvocationEntryBci, comp_level, 2081 methodHandle(), 0, CompileTask::Reason_CTW, THREAD); 2082 if (HAS_PENDING_EXCEPTION) { 2083 clear_pending_exception_if_not_oom(CHECK); 2084 tty->print_cr("CompileTheWorld (%d) : Skipping method: %s", _compile_the_world_class_counter, m->name_and_sig_as_C_string()); 2085 } else { 2086 _compile_the_world_method_counter++; 2087 } 2088 if (TieredCompilation && TieredStopAtLevel >= CompLevel_full_optimization) { 2089 // Clobber the first compile and force second tier compilation 2090 CompiledMethod* nm = m->code(); 2091 if (nm != NULL && !m->is_method_handle_intrinsic()) { 2092 // Throw out the code so that the code cache doesn't fill up 2093 nm->make_not_entrant(); 2094 } 2095 CompileBroker::compile_method(m, InvocationEntryBci, CompLevel_full_optimization, 2096 methodHandle(), 0, CompileTask::Reason_CTW, THREAD); 2097 if (HAS_PENDING_EXCEPTION) { 2098 clear_pending_exception_if_not_oom(CHECK); 2099 tty->print_cr("CompileTheWorld (%d) : Skipping method: %s", _compile_the_world_class_counter, m->name_and_sig_as_C_string()); 2100 } else { 2101 _compile_the_world_method_counter++; 2102 } 2103 } 2104 } else { 2105 tty->print_cr("CompileTheWorld (%d) : Skipping method: %s", _compile_the_world_class_counter, m->name_and_sig_as_C_string()); 2106 } 2107 2108 CompiledMethod* nm = m->code(); 2109 if (nm != NULL && !m->is_method_handle_intrinsic()) { 2110 // Throw out the code so that the code cache doesn't fill up 2111 nm->make_not_entrant(); 2112 } 2113 } 2114 } 2115 } 2116 } 2117 } 2118 } 2119 2120 #endif //PRODUCT 2121 2122 // Please keep following two functions at end of this file. With them placed at top or in middle of the file, 2123 // they could get inlined by agressive compiler, an unknown trick, see bug 6966589. 2124 void PerfClassTraceTime::initialize() { 2125 if (!UsePerfData) return; 2126 2127 if (_eventp != NULL) { 2128 // increment the event counter 2129 _eventp->inc(); 2130 } 2131 2132 // stop the current active thread-local timer to measure inclusive time 2133 _prev_active_event = -1; 2134 for (int i=0; i < EVENT_TYPE_COUNT; i++) { 2135 if (_timers[i].is_active()) { 2136 assert(_prev_active_event == -1, "should have only one active timer"); 2137 _prev_active_event = i; 2138 _timers[i].stop(); 2139 } 2140 } 2141 2142 if (_recursion_counters == NULL || (_recursion_counters[_event_type])++ == 0) { 2143 // start the inclusive timer if not recursively called 2144 _t.start(); 2145 } 2146 2147 // start thread-local timer of the given event type 2148 if (!_timers[_event_type].is_active()) { 2149 _timers[_event_type].start(); 2150 } 2151 } 2152 2153 PerfClassTraceTime::~PerfClassTraceTime() { 2154 if (!UsePerfData) return; 2155 2156 // stop the thread-local timer as the event completes 2157 // and resume the thread-local timer of the event next on the stack 2158 _timers[_event_type].stop(); 2159 jlong selftime = _timers[_event_type].ticks(); 2160 2161 if (_prev_active_event >= 0) { 2162 _timers[_prev_active_event].start(); 2163 } 2164 2165 if (_recursion_counters != NULL && --(_recursion_counters[_event_type]) > 0) return; 2166 2167 // increment the counters only on the leaf call 2168 _t.stop(); 2169 _timep->inc(_t.ticks()); 2170 if (_selftimep != NULL) { 2171 _selftimep->inc(selftime); 2172 } 2173 // add all class loading related event selftime to the accumulated time counter 2174 ClassLoader::perf_accumulated_time()->inc(selftime); 2175 2176 // reset the timer 2177 _timers[_event_type].reset(); 2178 }