Tue, 30 Oct 2012 10:23:55 -0700
8000988: VM deadlock when running btree006 on windows-i586
Reviewed-by: johnc, jcoomes, ysr
duke@435 | 1 | /* |
coleenp@4037 | 2 | * Copyright (c) 2003, 2012, Oracle and/or its affiliates. All rights reserved. |
duke@435 | 3 | * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. |
duke@435 | 4 | * |
duke@435 | 5 | * This code is free software; you can redistribute it and/or modify it |
duke@435 | 6 | * under the terms of the GNU General Public License version 2 only, as |
duke@435 | 7 | * published by the Free Software Foundation. |
duke@435 | 8 | * |
duke@435 | 9 | * This code is distributed in the hope that it will be useful, but WITHOUT |
duke@435 | 10 | * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or |
duke@435 | 11 | * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License |
duke@435 | 12 | * version 2 for more details (a copy is included in the LICENSE file that |
duke@435 | 13 | * accompanied this code). |
duke@435 | 14 | * |
duke@435 | 15 | * You should have received a copy of the GNU General Public License version |
duke@435 | 16 | * 2 along with this work; if not, write to the Free Software Foundation, |
duke@435 | 17 | * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. |
duke@435 | 18 | * |
trims@1907 | 19 | * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA |
trims@1907 | 20 | * or visit www.oracle.com if you need additional information or have any |
trims@1907 | 21 | * questions. |
duke@435 | 22 | * |
duke@435 | 23 | */ |
duke@435 | 24 | |
stefank@2314 | 25 | #include "precompiled.hpp" |
stefank@2314 | 26 | #include "classfile/classLoader.hpp" |
stefank@2314 | 27 | #include "classfile/symbolTable.hpp" |
stefank@2314 | 28 | #include "memory/filemap.hpp" |
stefank@2314 | 29 | #include "runtime/arguments.hpp" |
stefank@2314 | 30 | #include "runtime/java.hpp" |
stefank@2314 | 31 | #include "runtime/os.hpp" |
zgu@4193 | 32 | #include "services/memTracker.hpp" |
stefank@2314 | 33 | #include "utilities/defaultStream.hpp" |
stefank@2314 | 34 | |
duke@435 | 35 | # include <sys/stat.h> |
duke@435 | 36 | # include <errno.h> |
duke@435 | 37 | |
duke@435 | 38 | #ifndef O_BINARY // if defined (Win32) use binary files. |
duke@435 | 39 | #define O_BINARY 0 // otherwise do nothing. |
duke@435 | 40 | #endif |
duke@435 | 41 | |
duke@435 | 42 | |
duke@435 | 43 | extern address JVM_FunctionAtStart(); |
duke@435 | 44 | extern address JVM_FunctionAtEnd(); |
duke@435 | 45 | |
twisti@1040 | 46 | // Complain and stop. All error conditions occurring during the writing of |
duke@435 | 47 | // an archive file should stop the process. Unrecoverable errors during |
duke@435 | 48 | // the reading of the archive file should stop the process. |
duke@435 | 49 | |
duke@435 | 50 | static void fail(const char *msg, va_list ap) { |
duke@435 | 51 | // This occurs very early during initialization: tty is not initialized. |
duke@435 | 52 | jio_fprintf(defaultStream::error_stream(), |
twisti@1040 | 53 | "An error has occurred while processing the" |
duke@435 | 54 | " shared archive file.\n"); |
duke@435 | 55 | jio_vfprintf(defaultStream::error_stream(), msg, ap); |
duke@435 | 56 | jio_fprintf(defaultStream::error_stream(), "\n"); |
duke@435 | 57 | vm_exit_during_initialization("Unable to use shared archive.", NULL); |
duke@435 | 58 | } |
duke@435 | 59 | |
duke@435 | 60 | |
duke@435 | 61 | void FileMapInfo::fail_stop(const char *msg, ...) { |
duke@435 | 62 | va_list ap; |
duke@435 | 63 | va_start(ap, msg); |
duke@435 | 64 | fail(msg, ap); // Never returns. |
duke@435 | 65 | va_end(ap); // for completeness. |
duke@435 | 66 | } |
duke@435 | 67 | |
duke@435 | 68 | |
duke@435 | 69 | // Complain and continue. Recoverable errors during the reading of the |
duke@435 | 70 | // archive file may continue (with sharing disabled). |
duke@435 | 71 | // |
duke@435 | 72 | // If we continue, then disable shared spaces and close the file. |
duke@435 | 73 | |
duke@435 | 74 | void FileMapInfo::fail_continue(const char *msg, ...) { |
duke@435 | 75 | va_list ap; |
duke@435 | 76 | va_start(ap, msg); |
duke@435 | 77 | if (RequireSharedSpaces) { |
duke@435 | 78 | fail(msg, ap); |
duke@435 | 79 | } |
duke@435 | 80 | va_end(ap); |
duke@435 | 81 | UseSharedSpaces = false; |
duke@435 | 82 | close(); |
duke@435 | 83 | } |
duke@435 | 84 | |
duke@435 | 85 | |
duke@435 | 86 | // Fill in the fileMapInfo structure with data about this VM instance. |
duke@435 | 87 | |
duke@435 | 88 | void FileMapInfo::populate_header(size_t alignment) { |
duke@435 | 89 | _header._magic = 0xf00baba2; |
duke@435 | 90 | _header._version = _current_version; |
duke@435 | 91 | _header._alignment = alignment; |
duke@435 | 92 | |
duke@435 | 93 | // The following fields are for sanity checks for whether this archive |
duke@435 | 94 | // will function correctly with this JVM and the bootclasspath it's |
duke@435 | 95 | // invoked with. |
duke@435 | 96 | |
duke@435 | 97 | // JVM version string ... changes on each build. |
duke@435 | 98 | const char *vm_version = VM_Version::internal_vm_info_string(); |
duke@435 | 99 | if (strlen(vm_version) < (JVM_IDENT_MAX-1)) { |
duke@435 | 100 | strcpy(_header._jvm_ident, vm_version); |
duke@435 | 101 | } else { |
duke@435 | 102 | fail_stop("JVM Ident field for shared archive is too long" |
duke@435 | 103 | " - truncated to <%s>", _header._jvm_ident); |
duke@435 | 104 | } |
duke@435 | 105 | |
duke@435 | 106 | // Build checks on classpath and jar files |
duke@435 | 107 | _header._num_jars = 0; |
duke@435 | 108 | ClassPathEntry *cpe = ClassLoader::classpath_entry(0); |
duke@435 | 109 | for ( ; cpe != NULL; cpe = cpe->next()) { |
duke@435 | 110 | |
duke@435 | 111 | if (cpe->is_jar_file()) { |
duke@435 | 112 | if (_header._num_jars >= JVM_SHARED_JARS_MAX) { |
duke@435 | 113 | fail_stop("Too many jar files to share.", NULL); |
duke@435 | 114 | } |
duke@435 | 115 | |
duke@435 | 116 | // Jar file - record timestamp and file size. |
duke@435 | 117 | struct stat st; |
duke@435 | 118 | const char *path = cpe->name(); |
duke@435 | 119 | if (os::stat(path, &st) != 0) { |
duke@435 | 120 | // If we can't access a jar file in the boot path, then we can't |
duke@435 | 121 | // make assumptions about where classes get loaded from. |
duke@435 | 122 | fail_stop("Unable to open jar file %s.", path); |
duke@435 | 123 | } |
duke@435 | 124 | _header._jar[_header._num_jars]._timestamp = st.st_mtime; |
duke@435 | 125 | _header._jar[_header._num_jars]._filesize = st.st_size; |
duke@435 | 126 | _header._num_jars++; |
duke@435 | 127 | } else { |
duke@435 | 128 | |
duke@435 | 129 | // If directories appear in boot classpath, they must be empty to |
duke@435 | 130 | // avoid having to verify each individual class file. |
duke@435 | 131 | const char* name = ((ClassPathDirEntry*)cpe)->name(); |
duke@435 | 132 | if (!os::dir_is_empty(name)) { |
duke@435 | 133 | fail_stop("Boot classpath directory %s is not empty.", name); |
duke@435 | 134 | } |
duke@435 | 135 | } |
duke@435 | 136 | } |
duke@435 | 137 | } |
duke@435 | 138 | |
duke@435 | 139 | |
duke@435 | 140 | // Read the FileMapInfo information from the file. |
duke@435 | 141 | |
duke@435 | 142 | bool FileMapInfo::init_from_file(int fd) { |
duke@435 | 143 | |
duke@435 | 144 | size_t n = read(fd, &_header, sizeof(struct FileMapHeader)); |
duke@435 | 145 | if (n != sizeof(struct FileMapHeader)) { |
duke@435 | 146 | fail_continue("Unable to read the file header."); |
duke@435 | 147 | return false; |
duke@435 | 148 | } |
duke@435 | 149 | if (_header._version != current_version()) { |
duke@435 | 150 | fail_continue("The shared archive file has the wrong version."); |
duke@435 | 151 | return false; |
duke@435 | 152 | } |
duke@435 | 153 | _file_offset = (long)n; |
duke@435 | 154 | return true; |
duke@435 | 155 | } |
duke@435 | 156 | |
duke@435 | 157 | |
duke@435 | 158 | // Read the FileMapInfo information from the file. |
duke@435 | 159 | bool FileMapInfo::open_for_read() { |
duke@435 | 160 | _full_path = Arguments::GetSharedArchivePath(); |
duke@435 | 161 | int fd = open(_full_path, O_RDONLY | O_BINARY, 0); |
duke@435 | 162 | if (fd < 0) { |
duke@435 | 163 | if (errno == ENOENT) { |
duke@435 | 164 | // Not locating the shared archive is ok. |
duke@435 | 165 | fail_continue("Specified shared archive not found."); |
duke@435 | 166 | } else { |
duke@435 | 167 | fail_continue("Failed to open shared archive file (%s).", |
duke@435 | 168 | strerror(errno)); |
duke@435 | 169 | } |
duke@435 | 170 | return false; |
duke@435 | 171 | } |
duke@435 | 172 | |
duke@435 | 173 | _fd = fd; |
duke@435 | 174 | _file_open = true; |
duke@435 | 175 | return true; |
duke@435 | 176 | } |
duke@435 | 177 | |
duke@435 | 178 | |
duke@435 | 179 | // Write the FileMapInfo information to the file. |
duke@435 | 180 | |
duke@435 | 181 | void FileMapInfo::open_for_write() { |
duke@435 | 182 | _full_path = Arguments::GetSharedArchivePath(); |
duke@435 | 183 | if (PrintSharedSpaces) { |
duke@435 | 184 | tty->print_cr("Dumping shared data to file: "); |
duke@435 | 185 | tty->print_cr(" %s", _full_path); |
duke@435 | 186 | } |
duke@435 | 187 | |
duke@435 | 188 | // Remove the existing file in case another process has it open. |
duke@435 | 189 | remove(_full_path); |
duke@435 | 190 | int fd = open(_full_path, O_RDWR | O_CREAT | O_TRUNC | O_BINARY, 0444); |
duke@435 | 191 | if (fd < 0) { |
duke@435 | 192 | fail_stop("Unable to create shared archive file %s.", _full_path); |
duke@435 | 193 | } |
duke@435 | 194 | _fd = fd; |
duke@435 | 195 | _file_offset = 0; |
duke@435 | 196 | _file_open = true; |
duke@435 | 197 | } |
duke@435 | 198 | |
duke@435 | 199 | |
duke@435 | 200 | // Write the header to the file, seek to the next allocation boundary. |
duke@435 | 201 | |
duke@435 | 202 | void FileMapInfo::write_header() { |
duke@435 | 203 | write_bytes_aligned(&_header, sizeof(FileMapHeader)); |
duke@435 | 204 | } |
duke@435 | 205 | |
duke@435 | 206 | |
duke@435 | 207 | // Dump shared spaces to file. |
duke@435 | 208 | |
coleenp@4037 | 209 | void FileMapInfo::write_space(int i, Metaspace* space, bool read_only) { |
duke@435 | 210 | align_file_position(); |
coleenp@4037 | 211 | size_t used = space->used_words(Metaspace::NonClassType) * BytesPerWord; |
coleenp@4037 | 212 | size_t capacity = space->capacity_words(Metaspace::NonClassType) * BytesPerWord; |
duke@435 | 213 | struct FileMapInfo::FileMapHeader::space_info* si = &_header._space[i]; |
coleenp@4037 | 214 | write_region(i, (char*)space->bottom(), used, capacity, read_only, false); |
duke@435 | 215 | } |
duke@435 | 216 | |
duke@435 | 217 | |
duke@435 | 218 | // Dump region to file. |
duke@435 | 219 | |
duke@435 | 220 | void FileMapInfo::write_region(int region, char* base, size_t size, |
duke@435 | 221 | size_t capacity, bool read_only, |
duke@435 | 222 | bool allow_exec) { |
duke@435 | 223 | struct FileMapInfo::FileMapHeader::space_info* si = &_header._space[region]; |
duke@435 | 224 | |
duke@435 | 225 | if (_file_open) { |
duke@435 | 226 | guarantee(si->_file_offset == _file_offset, "file offset mismatch."); |
duke@435 | 227 | if (PrintSharedSpaces) { |
coleenp@4037 | 228 | tty->print_cr("Shared file region %d: 0x%6x bytes, addr " INTPTR_FORMAT |
coleenp@4037 | 229 | " file offset 0x%6x", region, size, base, _file_offset); |
duke@435 | 230 | } |
duke@435 | 231 | } else { |
duke@435 | 232 | si->_file_offset = _file_offset; |
duke@435 | 233 | } |
duke@435 | 234 | si->_base = base; |
duke@435 | 235 | si->_used = size; |
duke@435 | 236 | si->_capacity = capacity; |
duke@435 | 237 | si->_read_only = read_only; |
duke@435 | 238 | si->_allow_exec = allow_exec; |
duke@435 | 239 | write_bytes_aligned(base, (int)size); |
duke@435 | 240 | } |
duke@435 | 241 | |
duke@435 | 242 | |
duke@435 | 243 | // Dump bytes to file -- at the current file position. |
duke@435 | 244 | |
duke@435 | 245 | void FileMapInfo::write_bytes(const void* buffer, int nbytes) { |
duke@435 | 246 | if (_file_open) { |
duke@435 | 247 | int n = ::write(_fd, buffer, nbytes); |
duke@435 | 248 | if (n != nbytes) { |
duke@435 | 249 | // It is dangerous to leave the corrupted shared archive file around, |
duke@435 | 250 | // close and remove the file. See bug 6372906. |
duke@435 | 251 | close(); |
duke@435 | 252 | remove(_full_path); |
duke@435 | 253 | fail_stop("Unable to write to shared archive file.", NULL); |
duke@435 | 254 | } |
duke@435 | 255 | } |
duke@435 | 256 | _file_offset += nbytes; |
duke@435 | 257 | } |
duke@435 | 258 | |
duke@435 | 259 | |
duke@435 | 260 | // Align file position to an allocation unit boundary. |
duke@435 | 261 | |
duke@435 | 262 | void FileMapInfo::align_file_position() { |
duke@435 | 263 | long new_file_offset = align_size_up(_file_offset, os::vm_allocation_granularity()); |
duke@435 | 264 | if (new_file_offset != _file_offset) { |
duke@435 | 265 | _file_offset = new_file_offset; |
duke@435 | 266 | if (_file_open) { |
duke@435 | 267 | // Seek one byte back from the target and write a byte to insure |
duke@435 | 268 | // that the written file is the correct length. |
duke@435 | 269 | _file_offset -= 1; |
duke@435 | 270 | if (lseek(_fd, _file_offset, SEEK_SET) < 0) { |
duke@435 | 271 | fail_stop("Unable to seek.", NULL); |
duke@435 | 272 | } |
duke@435 | 273 | char zero = 0; |
duke@435 | 274 | write_bytes(&zero, 1); |
duke@435 | 275 | } |
duke@435 | 276 | } |
duke@435 | 277 | } |
duke@435 | 278 | |
duke@435 | 279 | |
duke@435 | 280 | // Dump bytes to file -- at the current file position. |
duke@435 | 281 | |
duke@435 | 282 | void FileMapInfo::write_bytes_aligned(const void* buffer, int nbytes) { |
duke@435 | 283 | align_file_position(); |
duke@435 | 284 | write_bytes(buffer, nbytes); |
duke@435 | 285 | align_file_position(); |
duke@435 | 286 | } |
duke@435 | 287 | |
duke@435 | 288 | |
duke@435 | 289 | // Close the shared archive file. This does NOT unmap mapped regions. |
duke@435 | 290 | |
duke@435 | 291 | void FileMapInfo::close() { |
duke@435 | 292 | if (_file_open) { |
duke@435 | 293 | if (::close(_fd) < 0) { |
duke@435 | 294 | fail_stop("Unable to close the shared archive file."); |
duke@435 | 295 | } |
duke@435 | 296 | _file_open = false; |
duke@435 | 297 | _fd = -1; |
duke@435 | 298 | } |
duke@435 | 299 | } |
duke@435 | 300 | |
duke@435 | 301 | |
duke@435 | 302 | // JVM/TI RedefineClasses() support: |
duke@435 | 303 | // Remap the shared readonly space to shared readwrite, private. |
duke@435 | 304 | bool FileMapInfo::remap_shared_readonly_as_readwrite() { |
duke@435 | 305 | struct FileMapInfo::FileMapHeader::space_info* si = &_header._space[0]; |
duke@435 | 306 | if (!si->_read_only) { |
duke@435 | 307 | // the space is already readwrite so we are done |
duke@435 | 308 | return true; |
duke@435 | 309 | } |
duke@435 | 310 | size_t used = si->_used; |
duke@435 | 311 | size_t size = align_size_up(used, os::vm_allocation_granularity()); |
duke@435 | 312 | if (!open_for_read()) { |
duke@435 | 313 | return false; |
duke@435 | 314 | } |
duke@435 | 315 | char *base = os::remap_memory(_fd, _full_path, si->_file_offset, |
duke@435 | 316 | si->_base, size, false /* !read_only */, |
duke@435 | 317 | si->_allow_exec); |
duke@435 | 318 | close(); |
duke@435 | 319 | if (base == NULL) { |
duke@435 | 320 | fail_continue("Unable to remap shared readonly space (errno=%d).", errno); |
duke@435 | 321 | return false; |
duke@435 | 322 | } |
duke@435 | 323 | if (base != si->_base) { |
duke@435 | 324 | fail_continue("Unable to remap shared readonly space at required address."); |
duke@435 | 325 | return false; |
duke@435 | 326 | } |
duke@435 | 327 | si->_read_only = false; |
duke@435 | 328 | return true; |
duke@435 | 329 | } |
duke@435 | 330 | |
coleenp@4037 | 331 | // Map the whole region at once, assumed to be allocated contiguously. |
coleenp@4037 | 332 | ReservedSpace FileMapInfo::reserve_shared_memory() { |
coleenp@4037 | 333 | struct FileMapInfo::FileMapHeader::space_info* si = &_header._space[0]; |
coleenp@4037 | 334 | char* requested_addr = si->_base; |
coleenp@4037 | 335 | size_t alignment = os::vm_allocation_granularity(); |
coleenp@4037 | 336 | |
coleenp@4037 | 337 | size_t size = align_size_up(SharedReadOnlySize + SharedReadWriteSize + |
coleenp@4037 | 338 | SharedMiscDataSize + SharedMiscCodeSize, |
coleenp@4037 | 339 | alignment); |
coleenp@4037 | 340 | |
coleenp@4037 | 341 | // Reserve the space first, then map otherwise map will go right over some |
coleenp@4037 | 342 | // other reserved memory (like the code cache). |
coleenp@4037 | 343 | ReservedSpace rs(size, alignment, false, requested_addr); |
coleenp@4037 | 344 | if (!rs.is_reserved()) { |
coleenp@4037 | 345 | fail_continue(err_msg("Unable to reserved shared space at required address " INTPTR_FORMAT, requested_addr)); |
coleenp@4037 | 346 | return rs; |
coleenp@4037 | 347 | } |
zgu@4193 | 348 | // the reserved virtual memory is for mapping class data sharing archive |
zgu@4193 | 349 | if (MemTracker::is_on()) { |
zgu@4193 | 350 | MemTracker::record_virtual_memory_type((address)rs.base(), mtClassShared); |
zgu@4193 | 351 | } |
coleenp@4037 | 352 | return rs; |
coleenp@4037 | 353 | } |
duke@435 | 354 | |
duke@435 | 355 | // Memory map a region in the address space. |
coleenp@4037 | 356 | static const char* shared_region_name[] = { "ReadOnly", "ReadWrite", "MiscData", "MiscCode"}; |
duke@435 | 357 | |
coleenp@4037 | 358 | char* FileMapInfo::map_region(int i) { |
duke@435 | 359 | struct FileMapInfo::FileMapHeader::space_info* si = &_header._space[i]; |
duke@435 | 360 | size_t used = si->_used; |
coleenp@4037 | 361 | size_t alignment = os::vm_allocation_granularity(); |
coleenp@4037 | 362 | size_t size = align_size_up(used, alignment); |
coleenp@4037 | 363 | char *requested_addr = si->_base; |
coleenp@4037 | 364 | |
coleenp@4037 | 365 | // map the contents of the CDS archive in this memory |
duke@435 | 366 | char *base = os::map_memory(_fd, _full_path, si->_file_offset, |
duke@435 | 367 | requested_addr, size, si->_read_only, |
duke@435 | 368 | si->_allow_exec); |
coleenp@4037 | 369 | if (base == NULL || base != si->_base) { |
coleenp@4037 | 370 | fail_continue(err_msg("Unable to map %s shared space at required address.", shared_region_name[i])); |
duke@435 | 371 | return NULL; |
duke@435 | 372 | } |
duke@435 | 373 | return base; |
duke@435 | 374 | } |
duke@435 | 375 | |
duke@435 | 376 | |
duke@435 | 377 | // Unmap a memory region in the address space. |
duke@435 | 378 | |
duke@435 | 379 | void FileMapInfo::unmap_region(int i) { |
duke@435 | 380 | struct FileMapInfo::FileMapHeader::space_info* si = &_header._space[i]; |
duke@435 | 381 | size_t used = si->_used; |
duke@435 | 382 | size_t size = align_size_up(used, os::vm_allocation_granularity()); |
duke@435 | 383 | if (!os::unmap_memory(si->_base, size)) { |
duke@435 | 384 | fail_stop("Unable to unmap shared space."); |
duke@435 | 385 | } |
duke@435 | 386 | } |
duke@435 | 387 | |
duke@435 | 388 | |
duke@435 | 389 | void FileMapInfo::assert_mark(bool check) { |
duke@435 | 390 | if (!check) { |
duke@435 | 391 | fail_stop("Mark mismatch while restoring from shared file.", NULL); |
duke@435 | 392 | } |
duke@435 | 393 | } |
duke@435 | 394 | |
duke@435 | 395 | |
duke@435 | 396 | FileMapInfo* FileMapInfo::_current_info = NULL; |
duke@435 | 397 | |
duke@435 | 398 | |
duke@435 | 399 | // Open the shared archive file, read and validate the header |
duke@435 | 400 | // information (version, boot classpath, etc.). If initialization |
duke@435 | 401 | // fails, shared spaces are disabled and the file is closed. [See |
duke@435 | 402 | // fail_continue.] |
duke@435 | 403 | bool FileMapInfo::initialize() { |
duke@435 | 404 | assert(UseSharedSpaces, "UseSharedSpaces expected."); |
duke@435 | 405 | |
duke@435 | 406 | if (JvmtiExport::can_modify_any_class() || JvmtiExport::can_walk_any_space()) { |
duke@435 | 407 | fail_continue("Tool agent requires sharing to be disabled."); |
duke@435 | 408 | return false; |
duke@435 | 409 | } |
duke@435 | 410 | |
duke@435 | 411 | if (!open_for_read()) { |
duke@435 | 412 | return false; |
duke@435 | 413 | } |
duke@435 | 414 | |
duke@435 | 415 | init_from_file(_fd); |
duke@435 | 416 | if (!validate()) { |
duke@435 | 417 | return false; |
duke@435 | 418 | } |
duke@435 | 419 | |
duke@435 | 420 | SharedReadOnlySize = _header._space[0]._capacity; |
duke@435 | 421 | SharedReadWriteSize = _header._space[1]._capacity; |
duke@435 | 422 | SharedMiscDataSize = _header._space[2]._capacity; |
duke@435 | 423 | SharedMiscCodeSize = _header._space[3]._capacity; |
duke@435 | 424 | return true; |
duke@435 | 425 | } |
duke@435 | 426 | |
duke@435 | 427 | |
duke@435 | 428 | bool FileMapInfo::validate() { |
duke@435 | 429 | if (_header._version != current_version()) { |
duke@435 | 430 | fail_continue("The shared archive file is the wrong version."); |
duke@435 | 431 | return false; |
duke@435 | 432 | } |
duke@435 | 433 | if (_header._magic != (int)0xf00baba2) { |
duke@435 | 434 | fail_continue("The shared archive file has a bad magic number."); |
duke@435 | 435 | return false; |
duke@435 | 436 | } |
duke@435 | 437 | if (strncmp(_header._jvm_ident, VM_Version::internal_vm_info_string(), |
duke@435 | 438 | JVM_IDENT_MAX-1) != 0) { |
duke@435 | 439 | fail_continue("The shared archive file was created by a different" |
duke@435 | 440 | " version or build of HotSpot."); |
duke@435 | 441 | return false; |
duke@435 | 442 | } |
duke@435 | 443 | |
duke@435 | 444 | // Cannot verify interpreter yet, as it can only be created after the GC |
duke@435 | 445 | // heap has been initialized. |
duke@435 | 446 | |
duke@435 | 447 | if (_header._num_jars >= JVM_SHARED_JARS_MAX) { |
duke@435 | 448 | fail_continue("Too many jar files to share."); |
duke@435 | 449 | return false; |
duke@435 | 450 | } |
duke@435 | 451 | |
duke@435 | 452 | // Build checks on classpath and jar files |
duke@435 | 453 | int num_jars_now = 0; |
duke@435 | 454 | ClassPathEntry *cpe = ClassLoader::classpath_entry(0); |
duke@435 | 455 | for ( ; cpe != NULL; cpe = cpe->next()) { |
duke@435 | 456 | |
duke@435 | 457 | if (cpe->is_jar_file()) { |
duke@435 | 458 | if (num_jars_now < _header._num_jars) { |
duke@435 | 459 | |
duke@435 | 460 | // Jar file - verify timestamp and file size. |
duke@435 | 461 | struct stat st; |
duke@435 | 462 | const char *path = cpe->name(); |
duke@435 | 463 | if (os::stat(path, &st) != 0) { |
duke@435 | 464 | fail_continue("Unable to open jar file %s.", path); |
duke@435 | 465 | return false; |
duke@435 | 466 | } |
duke@435 | 467 | if (_header._jar[num_jars_now]._timestamp != st.st_mtime || |
duke@435 | 468 | _header._jar[num_jars_now]._filesize != st.st_size) { |
duke@435 | 469 | fail_continue("A jar file is not the one used while building" |
duke@435 | 470 | " the shared archive file."); |
duke@435 | 471 | return false; |
duke@435 | 472 | } |
duke@435 | 473 | } |
duke@435 | 474 | ++num_jars_now; |
duke@435 | 475 | } else { |
duke@435 | 476 | |
duke@435 | 477 | // If directories appear in boot classpath, they must be empty to |
duke@435 | 478 | // avoid having to verify each individual class file. |
duke@435 | 479 | const char* name = ((ClassPathDirEntry*)cpe)->name(); |
duke@435 | 480 | if (!os::dir_is_empty(name)) { |
duke@435 | 481 | fail_continue("Boot classpath directory %s is not empty.", name); |
duke@435 | 482 | return false; |
duke@435 | 483 | } |
duke@435 | 484 | } |
duke@435 | 485 | } |
duke@435 | 486 | if (num_jars_now < _header._num_jars) { |
duke@435 | 487 | fail_continue("The number of jar files in the boot classpath is" |
duke@435 | 488 | " less than the number the shared archive was created with."); |
duke@435 | 489 | return false; |
duke@435 | 490 | } |
duke@435 | 491 | |
duke@435 | 492 | return true; |
duke@435 | 493 | } |
duke@435 | 494 | |
duke@435 | 495 | // The following method is provided to see whether a given pointer |
duke@435 | 496 | // falls in the mapped shared space. |
duke@435 | 497 | // Param: |
duke@435 | 498 | // p, The given pointer |
duke@435 | 499 | // Return: |
duke@435 | 500 | // True if the p is within the mapped shared space, otherwise, false. |
duke@435 | 501 | bool FileMapInfo::is_in_shared_space(const void* p) { |
coleenp@4037 | 502 | for (int i = 0; i < MetaspaceShared::n_regions; i++) { |
duke@435 | 503 | if (p >= _header._space[i]._base && |
duke@435 | 504 | p < _header._space[i]._base + _header._space[i]._used) { |
duke@435 | 505 | return true; |
duke@435 | 506 | } |
duke@435 | 507 | } |
duke@435 | 508 | |
duke@435 | 509 | return false; |
duke@435 | 510 | } |