1
|
1 |
/*
|
|
2 |
* Copyright 2003-2006 Sun Microsystems, Inc. All Rights Reserved.
|
|
3 |
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
|
4 |
*
|
|
5 |
* This code is free software; you can redistribute it and/or modify it
|
|
6 |
* under the terms of the GNU General Public License version 2 only, as
|
|
7 |
* published by the Free Software Foundation.
|
|
8 |
*
|
|
9 |
* This code is distributed in the hope that it will be useful, but WITHOUT
|
|
10 |
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
|
11 |
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
|
12 |
* version 2 for more details (a copy is included in the LICENSE file that
|
|
13 |
* accompanied this code).
|
|
14 |
*
|
|
15 |
* You should have received a copy of the GNU General Public License version
|
|
16 |
* 2 along with this work; if not, write to the Free Software Foundation,
|
|
17 |
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
|
18 |
*
|
|
19 |
* Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
|
|
20 |
* CA 95054 USA or visit www.sun.com if you need additional information or
|
|
21 |
* have any questions.
|
|
22 |
*
|
|
23 |
*/
|
|
24 |
|
|
25 |
# include "incls/_precompiled.incl"
|
|
26 |
# include "incls/_filemap.cpp.incl"
|
|
27 |
# include <sys/stat.h>
|
|
28 |
# include <errno.h>
|
|
29 |
|
|
30 |
#ifndef O_BINARY // if defined (Win32) use binary files.
|
|
31 |
#define O_BINARY 0 // otherwise do nothing.
|
|
32 |
#endif
|
|
33 |
|
|
34 |
|
|
35 |
extern address JVM_FunctionAtStart();
|
|
36 |
extern address JVM_FunctionAtEnd();
|
|
37 |
|
|
38 |
// Complain and stop. All error conditions occuring during the writing of
|
|
39 |
// an archive file should stop the process. Unrecoverable errors during
|
|
40 |
// the reading of the archive file should stop the process.
|
|
41 |
|
|
42 |
static void fail(const char *msg, va_list ap) {
|
|
43 |
// This occurs very early during initialization: tty is not initialized.
|
|
44 |
jio_fprintf(defaultStream::error_stream(),
|
|
45 |
"An error has occured while processing the"
|
|
46 |
" shared archive file.\n");
|
|
47 |
jio_vfprintf(defaultStream::error_stream(), msg, ap);
|
|
48 |
jio_fprintf(defaultStream::error_stream(), "\n");
|
|
49 |
vm_exit_during_initialization("Unable to use shared archive.", NULL);
|
|
50 |
}
|
|
51 |
|
|
52 |
|
|
53 |
void FileMapInfo::fail_stop(const char *msg, ...) {
|
|
54 |
va_list ap;
|
|
55 |
va_start(ap, msg);
|
|
56 |
fail(msg, ap); // Never returns.
|
|
57 |
va_end(ap); // for completeness.
|
|
58 |
}
|
|
59 |
|
|
60 |
|
|
61 |
// Complain and continue. Recoverable errors during the reading of the
|
|
62 |
// archive file may continue (with sharing disabled).
|
|
63 |
//
|
|
64 |
// If we continue, then disable shared spaces and close the file.
|
|
65 |
|
|
66 |
void FileMapInfo::fail_continue(const char *msg, ...) {
|
|
67 |
va_list ap;
|
|
68 |
va_start(ap, msg);
|
|
69 |
if (RequireSharedSpaces) {
|
|
70 |
fail(msg, ap);
|
|
71 |
}
|
|
72 |
va_end(ap);
|
|
73 |
UseSharedSpaces = false;
|
|
74 |
close();
|
|
75 |
}
|
|
76 |
|
|
77 |
|
|
78 |
// Fill in the fileMapInfo structure with data about this VM instance.
|
|
79 |
|
|
80 |
void FileMapInfo::populate_header(size_t alignment) {
|
|
81 |
_header._magic = 0xf00baba2;
|
|
82 |
_header._version = _current_version;
|
|
83 |
_header._alignment = alignment;
|
|
84 |
|
|
85 |
// The following fields are for sanity checks for whether this archive
|
|
86 |
// will function correctly with this JVM and the bootclasspath it's
|
|
87 |
// invoked with.
|
|
88 |
|
|
89 |
// JVM version string ... changes on each build.
|
|
90 |
const char *vm_version = VM_Version::internal_vm_info_string();
|
|
91 |
if (strlen(vm_version) < (JVM_IDENT_MAX-1)) {
|
|
92 |
strcpy(_header._jvm_ident, vm_version);
|
|
93 |
} else {
|
|
94 |
fail_stop("JVM Ident field for shared archive is too long"
|
|
95 |
" - truncated to <%s>", _header._jvm_ident);
|
|
96 |
}
|
|
97 |
|
|
98 |
// Build checks on classpath and jar files
|
|
99 |
_header._num_jars = 0;
|
|
100 |
ClassPathEntry *cpe = ClassLoader::classpath_entry(0);
|
|
101 |
for ( ; cpe != NULL; cpe = cpe->next()) {
|
|
102 |
|
|
103 |
if (cpe->is_jar_file()) {
|
|
104 |
if (_header._num_jars >= JVM_SHARED_JARS_MAX) {
|
|
105 |
fail_stop("Too many jar files to share.", NULL);
|
|
106 |
}
|
|
107 |
|
|
108 |
// Jar file - record timestamp and file size.
|
|
109 |
struct stat st;
|
|
110 |
const char *path = cpe->name();
|
|
111 |
if (os::stat(path, &st) != 0) {
|
|
112 |
// If we can't access a jar file in the boot path, then we can't
|
|
113 |
// make assumptions about where classes get loaded from.
|
|
114 |
fail_stop("Unable to open jar file %s.", path);
|
|
115 |
}
|
|
116 |
_header._jar[_header._num_jars]._timestamp = st.st_mtime;
|
|
117 |
_header._jar[_header._num_jars]._filesize = st.st_size;
|
|
118 |
_header._num_jars++;
|
|
119 |
} else {
|
|
120 |
|
|
121 |
// If directories appear in boot classpath, they must be empty to
|
|
122 |
// avoid having to verify each individual class file.
|
|
123 |
const char* name = ((ClassPathDirEntry*)cpe)->name();
|
|
124 |
if (!os::dir_is_empty(name)) {
|
|
125 |
fail_stop("Boot classpath directory %s is not empty.", name);
|
|
126 |
}
|
|
127 |
}
|
|
128 |
}
|
|
129 |
}
|
|
130 |
|
|
131 |
|
|
132 |
// Read the FileMapInfo information from the file.
|
|
133 |
|
|
134 |
bool FileMapInfo::init_from_file(int fd) {
|
|
135 |
|
|
136 |
size_t n = read(fd, &_header, sizeof(struct FileMapHeader));
|
|
137 |
if (n != sizeof(struct FileMapHeader)) {
|
|
138 |
fail_continue("Unable to read the file header.");
|
|
139 |
return false;
|
|
140 |
}
|
|
141 |
if (_header._version != current_version()) {
|
|
142 |
fail_continue("The shared archive file has the wrong version.");
|
|
143 |
return false;
|
|
144 |
}
|
|
145 |
_file_offset = (long)n;
|
|
146 |
return true;
|
|
147 |
}
|
|
148 |
|
|
149 |
|
|
150 |
// Read the FileMapInfo information from the file.
|
|
151 |
bool FileMapInfo::open_for_read() {
|
|
152 |
_full_path = Arguments::GetSharedArchivePath();
|
|
153 |
int fd = open(_full_path, O_RDONLY | O_BINARY, 0);
|
|
154 |
if (fd < 0) {
|
|
155 |
if (errno == ENOENT) {
|
|
156 |
// Not locating the shared archive is ok.
|
|
157 |
fail_continue("Specified shared archive not found.");
|
|
158 |
} else {
|
|
159 |
fail_continue("Failed to open shared archive file (%s).",
|
|
160 |
strerror(errno));
|
|
161 |
}
|
|
162 |
return false;
|
|
163 |
}
|
|
164 |
|
|
165 |
_fd = fd;
|
|
166 |
_file_open = true;
|
|
167 |
return true;
|
|
168 |
}
|
|
169 |
|
|
170 |
|
|
171 |
// Write the FileMapInfo information to the file.
|
|
172 |
|
|
173 |
void FileMapInfo::open_for_write() {
|
|
174 |
_full_path = Arguments::GetSharedArchivePath();
|
|
175 |
if (PrintSharedSpaces) {
|
|
176 |
tty->print_cr("Dumping shared data to file: ");
|
|
177 |
tty->print_cr(" %s", _full_path);
|
|
178 |
}
|
|
179 |
|
|
180 |
// Remove the existing file in case another process has it open.
|
|
181 |
remove(_full_path);
|
|
182 |
int fd = open(_full_path, O_RDWR | O_CREAT | O_TRUNC | O_BINARY, 0444);
|
|
183 |
if (fd < 0) {
|
|
184 |
fail_stop("Unable to create shared archive file %s.", _full_path);
|
|
185 |
}
|
|
186 |
_fd = fd;
|
|
187 |
_file_offset = 0;
|
|
188 |
_file_open = true;
|
|
189 |
}
|
|
190 |
|
|
191 |
|
|
192 |
// Write the header to the file, seek to the next allocation boundary.
|
|
193 |
|
|
194 |
void FileMapInfo::write_header() {
|
|
195 |
write_bytes_aligned(&_header, sizeof(FileMapHeader));
|
|
196 |
}
|
|
197 |
|
|
198 |
|
|
199 |
// Dump shared spaces to file.
|
|
200 |
|
|
201 |
void FileMapInfo::write_space(int i, CompactibleSpace* space, bool read_only) {
|
|
202 |
align_file_position();
|
|
203 |
struct FileMapInfo::FileMapHeader::space_info* si = &_header._space[i];
|
|
204 |
write_region(i, (char*)space->bottom(), space->used(),
|
|
205 |
space->capacity(), read_only, false);
|
|
206 |
}
|
|
207 |
|
|
208 |
|
|
209 |
// Dump region to file.
|
|
210 |
|
|
211 |
void FileMapInfo::write_region(int region, char* base, size_t size,
|
|
212 |
size_t capacity, bool read_only,
|
|
213 |
bool allow_exec) {
|
|
214 |
struct FileMapInfo::FileMapHeader::space_info* si = &_header._space[region];
|
|
215 |
|
|
216 |
if (_file_open) {
|
|
217 |
guarantee(si->_file_offset == _file_offset, "file offset mismatch.");
|
|
218 |
if (PrintSharedSpaces) {
|
|
219 |
tty->print_cr("Shared file region %d: 0x%x bytes, addr 0x%x,"
|
|
220 |
" file offset 0x%x", region, size, base, _file_offset);
|
|
221 |
}
|
|
222 |
} else {
|
|
223 |
si->_file_offset = _file_offset;
|
|
224 |
}
|
|
225 |
si->_base = base;
|
|
226 |
si->_used = size;
|
|
227 |
si->_capacity = capacity;
|
|
228 |
si->_read_only = read_only;
|
|
229 |
si->_allow_exec = allow_exec;
|
|
230 |
write_bytes_aligned(base, (int)size);
|
|
231 |
}
|
|
232 |
|
|
233 |
|
|
234 |
// Dump bytes to file -- at the current file position.
|
|
235 |
|
|
236 |
void FileMapInfo::write_bytes(const void* buffer, int nbytes) {
|
|
237 |
if (_file_open) {
|
|
238 |
int n = ::write(_fd, buffer, nbytes);
|
|
239 |
if (n != nbytes) {
|
|
240 |
// It is dangerous to leave the corrupted shared archive file around,
|
|
241 |
// close and remove the file. See bug 6372906.
|
|
242 |
close();
|
|
243 |
remove(_full_path);
|
|
244 |
fail_stop("Unable to write to shared archive file.", NULL);
|
|
245 |
}
|
|
246 |
}
|
|
247 |
_file_offset += nbytes;
|
|
248 |
}
|
|
249 |
|
|
250 |
|
|
251 |
// Align file position to an allocation unit boundary.
|
|
252 |
|
|
253 |
void FileMapInfo::align_file_position() {
|
|
254 |
long new_file_offset = align_size_up(_file_offset, os::vm_allocation_granularity());
|
|
255 |
if (new_file_offset != _file_offset) {
|
|
256 |
_file_offset = new_file_offset;
|
|
257 |
if (_file_open) {
|
|
258 |
// Seek one byte back from the target and write a byte to insure
|
|
259 |
// that the written file is the correct length.
|
|
260 |
_file_offset -= 1;
|
|
261 |
if (lseek(_fd, _file_offset, SEEK_SET) < 0) {
|
|
262 |
fail_stop("Unable to seek.", NULL);
|
|
263 |
}
|
|
264 |
char zero = 0;
|
|
265 |
write_bytes(&zero, 1);
|
|
266 |
}
|
|
267 |
}
|
|
268 |
}
|
|
269 |
|
|
270 |
|
|
271 |
// Dump bytes to file -- at the current file position.
|
|
272 |
|
|
273 |
void FileMapInfo::write_bytes_aligned(const void* buffer, int nbytes) {
|
|
274 |
align_file_position();
|
|
275 |
write_bytes(buffer, nbytes);
|
|
276 |
align_file_position();
|
|
277 |
}
|
|
278 |
|
|
279 |
|
|
280 |
// Close the shared archive file. This does NOT unmap mapped regions.
|
|
281 |
|
|
282 |
void FileMapInfo::close() {
|
|
283 |
if (_file_open) {
|
|
284 |
if (::close(_fd) < 0) {
|
|
285 |
fail_stop("Unable to close the shared archive file.");
|
|
286 |
}
|
|
287 |
_file_open = false;
|
|
288 |
_fd = -1;
|
|
289 |
}
|
|
290 |
}
|
|
291 |
|
|
292 |
|
|
293 |
// Memory map a shared space from the archive file.
|
|
294 |
|
|
295 |
bool FileMapInfo::map_space(int i, ReservedSpace rs, ContiguousSpace* space) {
|
|
296 |
struct FileMapInfo::FileMapHeader::space_info* si = &_header._space[i];
|
|
297 |
if (space != NULL) {
|
|
298 |
if (si->_base != (char*)space->bottom() ||
|
|
299 |
si->_capacity != space->capacity()) {
|
|
300 |
fail_continue("Shared space base address does not match.");
|
|
301 |
return false;
|
|
302 |
}
|
|
303 |
}
|
|
304 |
bool result = (map_region(i, rs) != NULL);
|
|
305 |
if (space != NULL && result) {
|
|
306 |
space->set_top((HeapWord*)(si->_base + si->_used));
|
|
307 |
space->set_saved_mark();
|
|
308 |
}
|
|
309 |
return result;
|
|
310 |
}
|
|
311 |
|
|
312 |
|
|
313 |
// JVM/TI RedefineClasses() support:
|
|
314 |
// Remap the shared readonly space to shared readwrite, private.
|
|
315 |
bool FileMapInfo::remap_shared_readonly_as_readwrite() {
|
|
316 |
struct FileMapInfo::FileMapHeader::space_info* si = &_header._space[0];
|
|
317 |
if (!si->_read_only) {
|
|
318 |
// the space is already readwrite so we are done
|
|
319 |
return true;
|
|
320 |
}
|
|
321 |
size_t used = si->_used;
|
|
322 |
size_t size = align_size_up(used, os::vm_allocation_granularity());
|
|
323 |
if (!open_for_read()) {
|
|
324 |
return false;
|
|
325 |
}
|
|
326 |
char *base = os::remap_memory(_fd, _full_path, si->_file_offset,
|
|
327 |
si->_base, size, false /* !read_only */,
|
|
328 |
si->_allow_exec);
|
|
329 |
close();
|
|
330 |
if (base == NULL) {
|
|
331 |
fail_continue("Unable to remap shared readonly space (errno=%d).", errno);
|
|
332 |
return false;
|
|
333 |
}
|
|
334 |
if (base != si->_base) {
|
|
335 |
fail_continue("Unable to remap shared readonly space at required address.");
|
|
336 |
return false;
|
|
337 |
}
|
|
338 |
si->_read_only = false;
|
|
339 |
return true;
|
|
340 |
}
|
|
341 |
|
|
342 |
|
|
343 |
// Memory map a region in the address space.
|
|
344 |
|
|
345 |
char* FileMapInfo::map_region(int i, ReservedSpace rs) {
|
|
346 |
struct FileMapInfo::FileMapHeader::space_info* si = &_header._space[i];
|
|
347 |
size_t used = si->_used;
|
|
348 |
size_t size = align_size_up(used, os::vm_allocation_granularity());
|
|
349 |
|
|
350 |
ReservedSpace mapped_rs = rs.first_part(size, true, true);
|
|
351 |
ReservedSpace unmapped_rs = rs.last_part(size);
|
|
352 |
mapped_rs.release();
|
|
353 |
|
|
354 |
return map_region(i, true);
|
|
355 |
}
|
|
356 |
|
|
357 |
|
|
358 |
// Memory map a region in the address space.
|
|
359 |
|
|
360 |
char* FileMapInfo::map_region(int i, bool address_must_match) {
|
|
361 |
struct FileMapInfo::FileMapHeader::space_info* si = &_header._space[i];
|
|
362 |
size_t used = si->_used;
|
|
363 |
size_t size = align_size_up(used, os::vm_allocation_granularity());
|
|
364 |
char *requested_addr = 0;
|
|
365 |
if (address_must_match) {
|
|
366 |
requested_addr = si->_base;
|
|
367 |
}
|
|
368 |
char *base = os::map_memory(_fd, _full_path, si->_file_offset,
|
|
369 |
requested_addr, size, si->_read_only,
|
|
370 |
si->_allow_exec);
|
|
371 |
if (base == NULL) {
|
|
372 |
fail_continue("Unable to map shared space.");
|
|
373 |
return NULL;
|
|
374 |
}
|
|
375 |
if (address_must_match) {
|
|
376 |
if (base != si->_base) {
|
|
377 |
fail_continue("Unable to map shared space at required address.");
|
|
378 |
return NULL;
|
|
379 |
}
|
|
380 |
} else {
|
|
381 |
si->_base = base; // save mapped address for unmapping.
|
|
382 |
}
|
|
383 |
return base;
|
|
384 |
}
|
|
385 |
|
|
386 |
|
|
387 |
// Unmap a memory region in the address space.
|
|
388 |
|
|
389 |
void FileMapInfo::unmap_region(int i) {
|
|
390 |
struct FileMapInfo::FileMapHeader::space_info* si = &_header._space[i];
|
|
391 |
size_t used = si->_used;
|
|
392 |
size_t size = align_size_up(used, os::vm_allocation_granularity());
|
|
393 |
if (!os::unmap_memory(si->_base, size)) {
|
|
394 |
fail_stop("Unable to unmap shared space.");
|
|
395 |
}
|
|
396 |
}
|
|
397 |
|
|
398 |
|
|
399 |
void FileMapInfo::assert_mark(bool check) {
|
|
400 |
if (!check) {
|
|
401 |
fail_stop("Mark mismatch while restoring from shared file.", NULL);
|
|
402 |
}
|
|
403 |
}
|
|
404 |
|
|
405 |
|
|
406 |
FileMapInfo* FileMapInfo::_current_info = NULL;
|
|
407 |
|
|
408 |
|
|
409 |
// Open the shared archive file, read and validate the header
|
|
410 |
// information (version, boot classpath, etc.). If initialization
|
|
411 |
// fails, shared spaces are disabled and the file is closed. [See
|
|
412 |
// fail_continue.]
|
|
413 |
|
|
414 |
|
|
415 |
bool FileMapInfo::initialize() {
|
|
416 |
assert(UseSharedSpaces, "UseSharedSpaces expected.");
|
|
417 |
|
|
418 |
if (JvmtiExport::can_modify_any_class() || JvmtiExport::can_walk_any_space()) {
|
|
419 |
fail_continue("Tool agent requires sharing to be disabled.");
|
|
420 |
return false;
|
|
421 |
}
|
|
422 |
|
|
423 |
if (!open_for_read()) {
|
|
424 |
return false;
|
|
425 |
}
|
|
426 |
|
|
427 |
init_from_file(_fd);
|
|
428 |
if (!validate()) {
|
|
429 |
return false;
|
|
430 |
}
|
|
431 |
|
|
432 |
SharedReadOnlySize = _header._space[0]._capacity;
|
|
433 |
SharedReadWriteSize = _header._space[1]._capacity;
|
|
434 |
SharedMiscDataSize = _header._space[2]._capacity;
|
|
435 |
SharedMiscCodeSize = _header._space[3]._capacity;
|
|
436 |
return true;
|
|
437 |
}
|
|
438 |
|
|
439 |
|
|
440 |
bool FileMapInfo::validate() {
|
|
441 |
if (_header._version != current_version()) {
|
|
442 |
fail_continue("The shared archive file is the wrong version.");
|
|
443 |
return false;
|
|
444 |
}
|
|
445 |
if (_header._magic != (int)0xf00baba2) {
|
|
446 |
fail_continue("The shared archive file has a bad magic number.");
|
|
447 |
return false;
|
|
448 |
}
|
|
449 |
if (strncmp(_header._jvm_ident, VM_Version::internal_vm_info_string(),
|
|
450 |
JVM_IDENT_MAX-1) != 0) {
|
|
451 |
fail_continue("The shared archive file was created by a different"
|
|
452 |
" version or build of HotSpot.");
|
|
453 |
return false;
|
|
454 |
}
|
|
455 |
|
|
456 |
// Cannot verify interpreter yet, as it can only be created after the GC
|
|
457 |
// heap has been initialized.
|
|
458 |
|
|
459 |
if (_header._num_jars >= JVM_SHARED_JARS_MAX) {
|
|
460 |
fail_continue("Too many jar files to share.");
|
|
461 |
return false;
|
|
462 |
}
|
|
463 |
|
|
464 |
// Build checks on classpath and jar files
|
|
465 |
int num_jars_now = 0;
|
|
466 |
ClassPathEntry *cpe = ClassLoader::classpath_entry(0);
|
|
467 |
for ( ; cpe != NULL; cpe = cpe->next()) {
|
|
468 |
|
|
469 |
if (cpe->is_jar_file()) {
|
|
470 |
if (num_jars_now < _header._num_jars) {
|
|
471 |
|
|
472 |
// Jar file - verify timestamp and file size.
|
|
473 |
struct stat st;
|
|
474 |
const char *path = cpe->name();
|
|
475 |
if (os::stat(path, &st) != 0) {
|
|
476 |
fail_continue("Unable to open jar file %s.", path);
|
|
477 |
return false;
|
|
478 |
}
|
|
479 |
if (_header._jar[num_jars_now]._timestamp != st.st_mtime ||
|
|
480 |
_header._jar[num_jars_now]._filesize != st.st_size) {
|
|
481 |
fail_continue("A jar file is not the one used while building"
|
|
482 |
" the shared archive file.");
|
|
483 |
return false;
|
|
484 |
}
|
|
485 |
}
|
|
486 |
++num_jars_now;
|
|
487 |
} else {
|
|
488 |
|
|
489 |
// If directories appear in boot classpath, they must be empty to
|
|
490 |
// avoid having to verify each individual class file.
|
|
491 |
const char* name = ((ClassPathDirEntry*)cpe)->name();
|
|
492 |
if (!os::dir_is_empty(name)) {
|
|
493 |
fail_continue("Boot classpath directory %s is not empty.", name);
|
|
494 |
return false;
|
|
495 |
}
|
|
496 |
}
|
|
497 |
}
|
|
498 |
if (num_jars_now < _header._num_jars) {
|
|
499 |
fail_continue("The number of jar files in the boot classpath is"
|
|
500 |
" less than the number the shared archive was created with.");
|
|
501 |
return false;
|
|
502 |
}
|
|
503 |
|
|
504 |
return true;
|
|
505 |
}
|
|
506 |
|
|
507 |
// The following method is provided to see whether a given pointer
|
|
508 |
// falls in the mapped shared space.
|
|
509 |
// Param:
|
|
510 |
// p, The given pointer
|
|
511 |
// Return:
|
|
512 |
// True if the p is within the mapped shared space, otherwise, false.
|
|
513 |
bool FileMapInfo::is_in_shared_space(const void* p) {
|
|
514 |
for (int i = 0; i < CompactingPermGenGen::n_regions; i++) {
|
|
515 |
if (p >= _header._space[i]._base &&
|
|
516 |
p < _header._space[i]._base + _header._space[i]._used) {
|
|
517 |
return true;
|
|
518 |
}
|
|
519 |
}
|
|
520 |
|
|
521 |
return false;
|
|
522 |
}
|