1 /* 2 * Copyright (c) 2003, 2014, Oracle and/or its affiliates. All rights reserved. 3 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. 4 * 5 * This code is free software; you can redistribute it and/or modify it 6 * under the terms of the GNU General Public License version 2 only, as 7 * published by the Free Software Foundation. 8 * 9 * This code is distributed in the hope that it will be useful, but WITHOUT 10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or 11 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License 12 * version 2 for more details (a copy is included in the LICENSE file that 13 * accompanied this code). 14 * 15 * You should have received a copy of the GNU General Public License version 16 * 2 along with this work; if not, write to the Free Software Foundation, 17 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. 18 * 19 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA 20 * or visit www.oracle.com if you need additional information or have any 21 * questions. 22 * 23 */ 24 25 #include "precompiled.hpp" 26 #include "classfile/classLoader.hpp" 27 #include "classfile/symbolTable.hpp" 28 #include "classfile/altHashing.hpp" 29 #include "memory/filemap.hpp" 30 #include "runtime/arguments.hpp" 31 #include "runtime/java.hpp" 32 #include "runtime/os.hpp" 33 #include "runtime/vm_version.hpp" 34 #include "services/memTracker.hpp" 35 #include "utilities/defaultStream.hpp" 36 37 # include <sys/stat.h> 38 # include <errno.h> 39 40 #ifndef O_BINARY // if defined (Win32) use binary files. 41 #define O_BINARY 0 // otherwise do nothing. 42 #endif 43 44 PRAGMA_FORMAT_MUTE_WARNINGS_FOR_GCC 45 46 extern address JVM_FunctionAtStart(); 47 extern address JVM_FunctionAtEnd(); 48 49 // Complain and stop. All error conditions occurring during the writing of 50 // an archive file should stop the process. Unrecoverable errors during 51 // the reading of the archive file should stop the process. 52 53 static void fail(const char *msg, va_list ap) { 54 // This occurs very early during initialization: tty is not initialized. 55 jio_fprintf(defaultStream::error_stream(), 56 "An error has occurred while processing the" 57 " shared archive file.\n"); 58 jio_vfprintf(defaultStream::error_stream(), msg, ap); 59 jio_fprintf(defaultStream::error_stream(), "\n"); 60 // Do not change the text of the below message because some tests check for it. 61 vm_exit_during_initialization("Unable to use shared archive.", NULL); 62 } 63 64 65 void FileMapInfo::fail_stop(const char *msg, ...) { 66 va_list ap; 67 va_start(ap, msg); 68 fail(msg, ap); // Never returns. 69 va_end(ap); // for completeness. 70 } 71 72 73 // Complain and continue. Recoverable errors during the reading of the 74 // archive file may continue (with sharing disabled). 75 // 76 // If we continue, then disable shared spaces and close the file. 77 78 void FileMapInfo::fail_continue(const char *msg, ...) { 79 va_list ap; 80 va_start(ap, msg); 81 if (RequireSharedSpaces) { 82 fail(msg, ap); 83 } else { 84 if (PrintSharedSpaces) { 85 tty->print_cr("UseSharedSpaces: %s", msg); 86 } 87 } 88 va_end(ap); 89 UseSharedSpaces = false; 90 close(); 91 } 92 93 // Fill in the fileMapInfo structure with data about this VM instance. 94 95 // This method copies the vm version info into header_version. If the version is too 96 // long then a truncated version, which has a hash code appended to it, is copied. 97 // 98 // Using a template enables this method to verify that header_version is an array of 99 // length JVM_IDENT_MAX. This ensures that the code that writes to the CDS file and 100 // the code that reads the CDS file will both use the same size buffer. Hence, will 101 // use identical truncation. This is necessary for matching of truncated versions. 102 template <int N> static void get_header_version(char (&header_version) [N]) { 103 assert(N == JVM_IDENT_MAX, "Bad header_version size"); 104 105 const char *vm_version = VM_Version::internal_vm_info_string(); 106 const int version_len = (int)strlen(vm_version); 107 108 if (version_len < (JVM_IDENT_MAX-1)) { 109 strcpy(header_version, vm_version); 110 111 } else { 112 // Get the hash value. Use a static seed because the hash needs to return the same 113 // value over multiple jvm invocations. 114 unsigned int hash = AltHashing::murmur3_32(8191, (const jbyte*)vm_version, version_len); 115 116 // Truncate the ident, saving room for the 8 hex character hash value. 117 strncpy(header_version, vm_version, JVM_IDENT_MAX-9); 118 119 // Append the hash code as eight hex digits. 120 sprintf(&header_version[JVM_IDENT_MAX-9], "%08x", hash); 121 header_version[JVM_IDENT_MAX-1] = 0; // Null terminate. 122 } 123 } 124 125 void FileMapInfo::populate_header(size_t alignment) { 126 _header._magic = 0xf00baba2; 127 _header._version = _current_version; 128 _header._alignment = alignment; 129 _header._obj_alignment = ObjectAlignmentInBytes; 130 131 // The following fields are for sanity checks for whether this archive 132 // will function correctly with this JVM and the bootclasspath it's 133 // invoked with. 134 135 // JVM version string ... changes on each build. 136 get_header_version(_header._jvm_ident); 137 138 // Build checks on classpath and jar files 139 _header._num_jars = 0; 140 ClassPathEntry *cpe = ClassLoader::classpath_entry(0); 141 for ( ; cpe != NULL; cpe = cpe->next()) { 142 143 if (cpe->is_jar_file()) { 144 if (_header._num_jars >= JVM_SHARED_JARS_MAX) { 145 fail_stop("Too many jar files to share.", NULL); 146 } 147 148 // Jar file - record timestamp and file size. 149 struct stat st; 150 const char *path = cpe->name(); 151 if (os::stat(path, &st) != 0) { 152 // If we can't access a jar file in the boot path, then we can't 153 // make assumptions about where classes get loaded from. 154 fail_stop("Unable to open jar file %s.", path); 155 } 156 _header._jar[_header._num_jars]._timestamp = st.st_mtime; 157 _header._jar[_header._num_jars]._filesize = st.st_size; 158 _header._num_jars++; 159 } else { 160 161 // If directories appear in boot classpath, they must be empty to 162 // avoid having to verify each individual class file. 163 const char* name = ((ClassPathDirEntry*)cpe)->name(); 164 if (!os::dir_is_empty(name)) { 165 fail_stop("Boot classpath directory %s is not empty.", name); 166 } 167 } 168 } 169 } 170 171 172 // Read the FileMapInfo information from the file. 173 174 bool FileMapInfo::init_from_file(int fd) { 175 176 size_t n = read(fd, &_header, sizeof(struct FileMapHeader)); 177 if (n != sizeof(struct FileMapHeader)) { 178 fail_continue("Unable to read the file header."); 179 return false; 180 } 181 if (_header._version != current_version()) { 182 fail_continue("The shared archive file has the wrong version."); 183 return false; 184 } 185 _file_offset = (long)n; 186 return true; 187 } 188 189 190 // Read the FileMapInfo information from the file. 191 bool FileMapInfo::open_for_read() { 192 _full_path = Arguments::GetSharedArchivePath(); 193 int fd = open(_full_path, O_RDONLY | O_BINARY, 0); 194 if (fd < 0) { 195 if (errno == ENOENT) { 196 // Not locating the shared archive is ok. 197 fail_continue("Specified shared archive not found."); 198 } else { 199 fail_continue("Failed to open shared archive file (%s).", 200 strerror(errno)); 201 } 202 return false; 203 } 204 205 _fd = fd; 206 _file_open = true; 207 return true; 208 } 209 210 211 // Write the FileMapInfo information to the file. 212 213 void FileMapInfo::open_for_write() { 214 _full_path = Arguments::GetSharedArchivePath(); 215 if (PrintSharedSpaces) { 216 tty->print_cr("Dumping shared data to file: "); 217 tty->print_cr(" %s", _full_path); 218 } 219 220 #ifdef _WINDOWS // On Windows, need WRITE permission to remove the file. 221 chmod(_full_path, _S_IREAD | _S_IWRITE); 222 #endif 223 224 // Use remove() to delete the existing file because, on Unix, this will 225 // allow processes that have it open continued access to the file. 226 remove(_full_path); 227 int fd = open(_full_path, O_RDWR | O_CREAT | O_TRUNC | O_BINARY, 0444); 228 if (fd < 0) { 229 fail_stop("Unable to create shared archive file %s.", _full_path); 230 } 231 _fd = fd; 232 _file_offset = 0; 233 _file_open = true; 234 } 235 236 237 // Write the header to the file, seek to the next allocation boundary. 238 239 void FileMapInfo::write_header() { 240 write_bytes_aligned(&_header, sizeof(FileMapHeader)); 241 } 242 243 244 // Dump shared spaces to file. 245 246 void FileMapInfo::write_space(int i, Metaspace* space, bool read_only) { 247 align_file_position(); 248 size_t used = space->used_bytes_slow(Metaspace::NonClassType); 249 size_t capacity = space->capacity_bytes_slow(Metaspace::NonClassType); 250 struct FileMapInfo::FileMapHeader::space_info* si = &_header._space[i]; 251 write_region(i, (char*)space->bottom(), used, capacity, read_only, false); 252 } 253 254 255 // Dump region to file. 256 257 void FileMapInfo::write_region(int region, char* base, size_t size, 258 size_t capacity, bool read_only, 259 bool allow_exec) { 260 struct FileMapInfo::FileMapHeader::space_info* si = &_header._space[region]; 261 262 if (_file_open) { 263 guarantee(si->_file_offset == _file_offset, "file offset mismatch."); 264 if (PrintSharedSpaces) { 265 tty->print_cr("Shared file region %d: 0x%6x bytes, addr " INTPTR_FORMAT 266 " file offset 0x%6x", region, size, base, _file_offset); 267 } 268 } else { 269 si->_file_offset = _file_offset; 270 } 271 si->_base = base; 272 si->_used = size; 273 si->_capacity = capacity; 274 si->_read_only = read_only; 275 si->_allow_exec = allow_exec; 276 write_bytes_aligned(base, (int)size); 277 } 278 279 280 // Dump bytes to file -- at the current file position. 281 282 void FileMapInfo::write_bytes(const void* buffer, int nbytes) { 283 if (_file_open) { 284 int n = ::write(_fd, buffer, nbytes); 285 if (n != nbytes) { 286 // It is dangerous to leave the corrupted shared archive file around, 287 // close and remove the file. See bug 6372906. 288 close(); 289 remove(_full_path); 290 fail_stop("Unable to write to shared archive file.", NULL); 291 } 292 } 293 _file_offset += nbytes; 294 } 295 296 297 // Align file position to an allocation unit boundary. 298 299 void FileMapInfo::align_file_position() { 300 long new_file_offset = align_size_up(_file_offset, os::vm_allocation_granularity()); 301 if (new_file_offset != _file_offset) { 302 _file_offset = new_file_offset; 303 if (_file_open) { 304 // Seek one byte back from the target and write a byte to insure 305 // that the written file is the correct length. 306 _file_offset -= 1; 307 if (lseek(_fd, _file_offset, SEEK_SET) < 0) { 308 fail_stop("Unable to seek.", NULL); 309 } 310 char zero = 0; 311 write_bytes(&zero, 1); 312 } 313 } 314 } 315 316 317 // Dump bytes to file -- at the current file position. 318 319 void FileMapInfo::write_bytes_aligned(const void* buffer, int nbytes) { 320 align_file_position(); 321 write_bytes(buffer, nbytes); 322 align_file_position(); 323 } 324 325 326 // Close the shared archive file. This does NOT unmap mapped regions. 327 328 void FileMapInfo::close() { 329 if (_file_open) { 330 if (::close(_fd) < 0) { 331 fail_stop("Unable to close the shared archive file."); 332 } 333 _file_open = false; 334 _fd = -1; 335 } 336 } 337 338 339 // JVM/TI RedefineClasses() support: 340 // Remap the shared readonly space to shared readwrite, private. 341 bool FileMapInfo::remap_shared_readonly_as_readwrite() { 342 struct FileMapInfo::FileMapHeader::space_info* si = &_header._space[0]; 343 if (!si->_read_only) { 344 // the space is already readwrite so we are done 345 return true; 346 } 347 size_t used = si->_used; 348 size_t size = align_size_up(used, os::vm_allocation_granularity()); 349 if (!open_for_read()) { 350 return false; 351 } 352 char *base = os::remap_memory(_fd, _full_path, si->_file_offset, 353 si->_base, size, false /* !read_only */, 354 si->_allow_exec); 355 close(); 356 if (base == NULL) { 357 fail_continue("Unable to remap shared readonly space (errno=%d).", errno); 358 return false; 359 } 360 if (base != si->_base) { 361 fail_continue("Unable to remap shared readonly space at required address."); 362 return false; 363 } 364 si->_read_only = false; 365 return true; 366 } 367 368 // Map the whole region at once, assumed to be allocated contiguously. 369 ReservedSpace FileMapInfo::reserve_shared_memory() { 370 struct FileMapInfo::FileMapHeader::space_info* si = &_header._space[0]; 371 char* requested_addr = si->_base; 372 373 size_t size = FileMapInfo::shared_spaces_size(); 374 375 // Reserve the space first, then map otherwise map will go right over some 376 // other reserved memory (like the code cache). 377 ReservedSpace rs(size, os::vm_allocation_granularity(), false, requested_addr); 378 if (!rs.is_reserved()) { 379 fail_continue(err_msg("Unable to reserve shared space at required address " INTPTR_FORMAT, requested_addr)); 380 return rs; 381 } 382 // the reserved virtual memory is for mapping class data sharing archive 383 MemTracker::record_virtual_memory_type((address)rs.base(), mtClassShared); 384 385 return rs; 386 } 387 388 // Memory map a region in the address space. 389 static const char* shared_region_name[] = { "ReadOnly", "ReadWrite", "MiscData", "MiscCode"}; 390 391 char* FileMapInfo::map_region(int i) { 392 struct FileMapInfo::FileMapHeader::space_info* si = &_header._space[i]; 393 size_t used = si->_used; 394 size_t alignment = os::vm_allocation_granularity(); 395 size_t size = align_size_up(used, alignment); 396 char *requested_addr = si->_base; 397 398 // map the contents of the CDS archive in this memory 399 char *base = os::map_memory(_fd, _full_path, si->_file_offset, 400 requested_addr, size, si->_read_only, 401 si->_allow_exec); 402 if (base == NULL || base != si->_base) { 403 fail_continue(err_msg("Unable to map %s shared space at required address.", shared_region_name[i])); 404 return NULL; 405 } 406 #ifdef _WINDOWS 407 // This call is Windows-only because the memory_type gets recorded for the other platforms 408 // in method FileMapInfo::reserve_shared_memory(), which is not called on Windows. 409 MemTracker::record_virtual_memory_type((address)base, mtClassShared); 410 #endif 411 return base; 412 } 413 414 415 // Unmap a memory region in the address space. 416 417 void FileMapInfo::unmap_region(int i) { 418 struct FileMapInfo::FileMapHeader::space_info* si = &_header._space[i]; 419 size_t used = si->_used; 420 size_t size = align_size_up(used, os::vm_allocation_granularity()); 421 if (!os::unmap_memory(si->_base, size)) { 422 fail_stop("Unable to unmap shared space."); 423 } 424 } 425 426 427 void FileMapInfo::assert_mark(bool check) { 428 if (!check) { 429 fail_stop("Mark mismatch while restoring from shared file.", NULL); 430 } 431 } 432 433 434 FileMapInfo* FileMapInfo::_current_info = NULL; 435 436 437 // Open the shared archive file, read and validate the header 438 // information (version, boot classpath, etc.). If initialization 439 // fails, shared spaces are disabled and the file is closed. [See 440 // fail_continue.] 441 bool FileMapInfo::initialize() { 442 assert(UseSharedSpaces, "UseSharedSpaces expected."); 443 444 if (JvmtiExport::can_modify_any_class() || JvmtiExport::can_walk_any_space()) { 445 fail_continue("Tool agent requires sharing to be disabled."); 446 return false; 447 } 448 449 if (!open_for_read()) { 450 return false; 451 } 452 453 init_from_file(_fd); 454 if (!validate()) { 455 return false; 456 } 457 458 SharedReadOnlySize = _header._space[0]._capacity; 459 SharedReadWriteSize = _header._space[1]._capacity; 460 SharedMiscDataSize = _header._space[2]._capacity; 461 SharedMiscCodeSize = _header._space[3]._capacity; 462 return true; 463 } 464 465 466 bool FileMapInfo::validate() { 467 if (_header._version != current_version()) { 468 fail_continue("The shared archive file is the wrong version."); 469 return false; 470 } 471 if (_header._magic != (int)0xf00baba2) { 472 fail_continue("The shared archive file has a bad magic number."); 473 return false; 474 } 475 char header_version[JVM_IDENT_MAX]; 476 get_header_version(header_version); 477 if (strncmp(_header._jvm_ident, header_version, JVM_IDENT_MAX-1) != 0) { 478 fail_continue("The shared archive file was created by a different" 479 " version or build of HotSpot."); 480 return false; 481 } 482 if (_header._obj_alignment != ObjectAlignmentInBytes) { 483 fail_continue("The shared archive file's ObjectAlignmentInBytes of %d" 484 " does not equal the current ObjectAlignmentInBytes of %d.", 485 _header._obj_alignment, ObjectAlignmentInBytes); 486 return false; 487 } 488 489 // Cannot verify interpreter yet, as it can only be created after the GC 490 // heap has been initialized. 491 492 if (_header._num_jars >= JVM_SHARED_JARS_MAX) { 493 fail_continue("Too many jar files to share."); 494 return false; 495 } 496 497 // Build checks on classpath and jar files 498 int num_jars_now = 0; 499 ClassPathEntry *cpe = ClassLoader::classpath_entry(0); 500 for ( ; cpe != NULL; cpe = cpe->next()) { 501 502 if (cpe->is_jar_file()) { 503 if (num_jars_now < _header._num_jars) { 504 505 // Jar file - verify timestamp and file size. 506 struct stat st; 507 const char *path = cpe->name(); 508 if (os::stat(path, &st) != 0) { 509 fail_continue("Unable to open jar file %s.", path); 510 return false; 511 } 512 if (_header._jar[num_jars_now]._timestamp != st.st_mtime || 513 _header._jar[num_jars_now]._filesize != st.st_size) { 514 fail_continue("A jar file is not the one used while building" 515 " the shared archive file."); 516 return false; 517 } 518 } 519 ++num_jars_now; 520 } else { 521 522 // If directories appear in boot classpath, they must be empty to 523 // avoid having to verify each individual class file. 524 const char* name = ((ClassPathDirEntry*)cpe)->name(); 525 if (!os::dir_is_empty(name)) { 526 fail_continue("Boot classpath directory %s is not empty.", name); 527 return false; 528 } 529 } 530 } 531 if (num_jars_now < _header._num_jars) { 532 fail_continue("The number of jar files in the boot classpath is" 533 " less than the number the shared archive was created with."); 534 return false; 535 } 536 537 return true; 538 } 539 540 // The following method is provided to see whether a given pointer 541 // falls in the mapped shared space. 542 // Param: 543 // p, The given pointer 544 // Return: 545 // True if the p is within the mapped shared space, otherwise, false. 546 bool FileMapInfo::is_in_shared_space(const void* p) { 547 for (int i = 0; i < MetaspaceShared::n_regions; i++) { 548 if (p >= _header._space[i]._base && 549 p < _header._space[i]._base + _header._space[i]._used) { 550 return true; 551 } 552 } 553 554 return false; 555 } 556 557 void FileMapInfo::print_shared_spaces() { 558 gclog_or_tty->print_cr("Shared Spaces:"); 559 for (int i = 0; i < MetaspaceShared::n_regions; i++) { 560 struct FileMapInfo::FileMapHeader::space_info* si = &_header._space[i]; 561 gclog_or_tty->print(" %s " INTPTR_FORMAT "-" INTPTR_FORMAT, 562 shared_region_name[i], 563 si->_base, si->_base + si->_used); 564 } 565 } 566 567 // Unmap mapped regions of shared space. 568 void FileMapInfo::stop_sharing_and_unmap(const char* msg) { 569 FileMapInfo *map_info = FileMapInfo::current_info(); 570 if (map_info) { 571 map_info->fail_continue(msg); 572 for (int i = 0; i < MetaspaceShared::n_regions; i++) { 573 if (map_info->_header._space[i]._base != NULL) { 574 map_info->unmap_region(i); 575 map_info->_header._space[i]._base = NULL; 576 } 577 } 578 } else if (DumpSharedSpaces) { 579 fail_stop(msg, NULL); 580 } 581 }