src/hotspot/os/linux/perfMemory_linux.cpp
author lkorinth
Wed, 11 Sep 2019 14:16:30 +0200
changeset 58084 cddef3bde924
parent 55733 9cfb9387a9e8
child 58679 9c3209ff7550
permissions -rw-r--r--
8230398: Remove NULL checks before FREE_C_HEAP_ARRAY Reviewed-by: dholmes, kbarrett, tschatzl
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
     1
/*
53911
65f2a401e0eb 8218811: replace open by os::open in hotspot coding
mbaesken
parents: 51106
diff changeset
     2
 * Copyright (c) 2001, 2019, Oracle and/or its affiliates. All rights reserved.
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
     3
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
489c9b5090e2 Initial load
duke
parents:
diff changeset
     4
 *
489c9b5090e2 Initial load
duke
parents:
diff changeset
     5
 * This code is free software; you can redistribute it and/or modify it
489c9b5090e2 Initial load
duke
parents:
diff changeset
     6
 * under the terms of the GNU General Public License version 2 only, as
489c9b5090e2 Initial load
duke
parents:
diff changeset
     7
 * published by the Free Software Foundation.
489c9b5090e2 Initial load
duke
parents:
diff changeset
     8
 *
489c9b5090e2 Initial load
duke
parents:
diff changeset
     9
 * This code is distributed in the hope that it will be useful, but WITHOUT
489c9b5090e2 Initial load
duke
parents:
diff changeset
    10
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
489c9b5090e2 Initial load
duke
parents:
diff changeset
    11
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
489c9b5090e2 Initial load
duke
parents:
diff changeset
    12
 * version 2 for more details (a copy is included in the LICENSE file that
489c9b5090e2 Initial load
duke
parents:
diff changeset
    13
 * accompanied this code).
489c9b5090e2 Initial load
duke
parents:
diff changeset
    14
 *
489c9b5090e2 Initial load
duke
parents:
diff changeset
    15
 * You should have received a copy of the GNU General Public License version
489c9b5090e2 Initial load
duke
parents:
diff changeset
    16
 * 2 along with this work; if not, write to the Free Software Foundation,
489c9b5090e2 Initial load
duke
parents:
diff changeset
    17
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
489c9b5090e2 Initial load
duke
parents:
diff changeset
    18
 *
5547
f4b087cbb361 6941466: Oracle rebranding changes for Hotspot repositories
trims
parents: 5237
diff changeset
    19
 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
f4b087cbb361 6941466: Oracle rebranding changes for Hotspot repositories
trims
parents: 5237
diff changeset
    20
 * or visit www.oracle.com if you need additional information or have any
f4b087cbb361 6941466: Oracle rebranding changes for Hotspot repositories
trims
parents: 5237
diff changeset
    21
 * questions.
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
    22
 *
489c9b5090e2 Initial load
duke
parents:
diff changeset
    23
 */
489c9b5090e2 Initial load
duke
parents:
diff changeset
    24
7397
5b173b4ca846 6989984: Use standard include model for Hospot
stefank
parents: 5547
diff changeset
    25
#include "precompiled.hpp"
5b173b4ca846 6989984: Use standard include model for Hospot
stefank
parents: 5547
diff changeset
    26
#include "classfile/vmSymbols.hpp"
46405
17ab5460b2cb 8168122: Update logging in perfMemory to Unified Logging
rprotacio
parents: 40103
diff changeset
    27
#include "logging/log.hpp"
7397
5b173b4ca846 6989984: Use standard include model for Hospot
stefank
parents: 5547
diff changeset
    28
#include "memory/allocation.inline.hpp"
5b173b4ca846 6989984: Use standard include model for Hospot
stefank
parents: 5547
diff changeset
    29
#include "memory/resourceArea.hpp"
5b173b4ca846 6989984: Use standard include model for Hospot
stefank
parents: 5547
diff changeset
    30
#include "oops/oop.inline.hpp"
5b173b4ca846 6989984: Use standard include model for Hospot
stefank
parents: 5547
diff changeset
    31
#include "os_linux.inline.hpp"
5b173b4ca846 6989984: Use standard include model for Hospot
stefank
parents: 5547
diff changeset
    32
#include "runtime/handles.inline.hpp"
37113
5a33bf5089ac 8148425: strerror() function is not thread-safe
stuefe
parents: 32387
diff changeset
    33
#include "runtime/os.hpp"
7397
5b173b4ca846 6989984: Use standard include model for Hospot
stefank
parents: 5547
diff changeset
    34
#include "runtime/perfMemory.hpp"
14120
7d298141c258 7199092: NMT: NMT needs to deal overlapped virtual memory ranges
zgu
parents: 13963
diff changeset
    35
#include "services/memTracker.hpp"
7397
5b173b4ca846 6989984: Use standard include model for Hospot
stefank
parents: 5547
diff changeset
    36
#include "utilities/exceptions.hpp"
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
    37
489c9b5090e2 Initial load
duke
parents:
diff changeset
    38
// put OS-includes here
489c9b5090e2 Initial load
duke
parents:
diff changeset
    39
# include <sys/types.h>
489c9b5090e2 Initial load
duke
parents:
diff changeset
    40
# include <sys/mman.h>
489c9b5090e2 Initial load
duke
parents:
diff changeset
    41
# include <errno.h>
489c9b5090e2 Initial load
duke
parents:
diff changeset
    42
# include <stdio.h>
489c9b5090e2 Initial load
duke
parents:
diff changeset
    43
# include <unistd.h>
489c9b5090e2 Initial load
duke
parents:
diff changeset
    44
# include <sys/stat.h>
489c9b5090e2 Initial load
duke
parents:
diff changeset
    45
# include <signal.h>
489c9b5090e2 Initial load
duke
parents:
diff changeset
    46
# include <pwd.h>
489c9b5090e2 Initial load
duke
parents:
diff changeset
    47
489c9b5090e2 Initial load
duke
parents:
diff changeset
    48
static char* backing_store_file_name = NULL;  // name of the backing store
489c9b5090e2 Initial load
duke
parents:
diff changeset
    49
                                              // file, if successfully created.
489c9b5090e2 Initial load
duke
parents:
diff changeset
    50
489c9b5090e2 Initial load
duke
parents:
diff changeset
    51
// Standard Memory Implementation Details
489c9b5090e2 Initial load
duke
parents:
diff changeset
    52
489c9b5090e2 Initial load
duke
parents:
diff changeset
    53
// create the PerfData memory region in standard memory.
489c9b5090e2 Initial load
duke
parents:
diff changeset
    54
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
    55
static char* create_standard_memory(size_t size) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
    56
489c9b5090e2 Initial load
duke
parents:
diff changeset
    57
  // allocate an aligned chuck of memory
489c9b5090e2 Initial load
duke
parents:
diff changeset
    58
  char* mapAddress = os::reserve_memory(size);
489c9b5090e2 Initial load
duke
parents:
diff changeset
    59
489c9b5090e2 Initial load
duke
parents:
diff changeset
    60
  if (mapAddress == NULL) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
    61
    return NULL;
489c9b5090e2 Initial load
duke
parents:
diff changeset
    62
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
    63
489c9b5090e2 Initial load
duke
parents:
diff changeset
    64
  // commit memory
18069
e6d4971c8650 8013057: assert(_needs_gc || SafepointSynchronize::is_at_safepoint()) failed: only read at safepoint
dcubed
parents: 16674
diff changeset
    65
  if (!os::commit_memory(mapAddress, size, !ExecMem)) {
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
    66
    if (PrintMiscellaneous && Verbose) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
    67
      warning("Could not commit PerfData memory\n");
489c9b5090e2 Initial load
duke
parents:
diff changeset
    68
    }
489c9b5090e2 Initial load
duke
parents:
diff changeset
    69
    os::release_memory(mapAddress, size);
489c9b5090e2 Initial load
duke
parents:
diff changeset
    70
    return NULL;
489c9b5090e2 Initial load
duke
parents:
diff changeset
    71
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
    72
489c9b5090e2 Initial load
duke
parents:
diff changeset
    73
  return mapAddress;
489c9b5090e2 Initial load
duke
parents:
diff changeset
    74
}
489c9b5090e2 Initial load
duke
parents:
diff changeset
    75
489c9b5090e2 Initial load
duke
parents:
diff changeset
    76
// delete the PerfData memory region
489c9b5090e2 Initial load
duke
parents:
diff changeset
    77
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
    78
static void delete_standard_memory(char* addr, size_t size) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
    79
489c9b5090e2 Initial load
duke
parents:
diff changeset
    80
  // there are no persistent external resources to cleanup for standard
489c9b5090e2 Initial load
duke
parents:
diff changeset
    81
  // memory. since DestroyJavaVM does not support unloading of the JVM,
489c9b5090e2 Initial load
duke
parents:
diff changeset
    82
  // cleanup of the memory resource is not performed. The memory will be
489c9b5090e2 Initial load
duke
parents:
diff changeset
    83
  // reclaimed by the OS upon termination of the process.
489c9b5090e2 Initial load
duke
parents:
diff changeset
    84
  //
489c9b5090e2 Initial load
duke
parents:
diff changeset
    85
  return;
489c9b5090e2 Initial load
duke
parents:
diff changeset
    86
}
489c9b5090e2 Initial load
duke
parents:
diff changeset
    87
489c9b5090e2 Initial load
duke
parents:
diff changeset
    88
// save the specified memory region to the given file
489c9b5090e2 Initial load
duke
parents:
diff changeset
    89
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
    90
// Note: this function might be called from signal handler (by os::abort()),
489c9b5090e2 Initial load
duke
parents:
diff changeset
    91
// don't allocate heap memory.
489c9b5090e2 Initial load
duke
parents:
diff changeset
    92
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
    93
static void save_memory_to_file(char* addr, size_t size) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
    94
489c9b5090e2 Initial load
duke
parents:
diff changeset
    95
 const char* destfile = PerfMemory::get_perfdata_file_path();
489c9b5090e2 Initial load
duke
parents:
diff changeset
    96
 assert(destfile[0] != '\0', "invalid PerfData file path");
489c9b5090e2 Initial load
duke
parents:
diff changeset
    97
489c9b5090e2 Initial load
duke
parents:
diff changeset
    98
  int result;
489c9b5090e2 Initial load
duke
parents:
diff changeset
    99
53911
65f2a401e0eb 8218811: replace open by os::open in hotspot coding
mbaesken
parents: 51106
diff changeset
   100
  RESTARTABLE(os::open(destfile, O_CREAT|O_WRONLY|O_TRUNC, S_IRUSR|S_IWUSR),
65f2a401e0eb 8218811: replace open by os::open in hotspot coding
mbaesken
parents: 51106
diff changeset
   101
              result);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   102
  if (result == OS_ERR) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   103
    if (PrintMiscellaneous && Verbose) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   104
      warning("Could not create Perfdata save file: %s: %s\n",
37113
5a33bf5089ac 8148425: strerror() function is not thread-safe
stuefe
parents: 32387
diff changeset
   105
              destfile, os::strerror(errno));
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   106
    }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   107
  } else {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   108
    int fd = result;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   109
489c9b5090e2 Initial load
duke
parents:
diff changeset
   110
    for (size_t remaining = size; remaining > 0;) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   111
489c9b5090e2 Initial load
duke
parents:
diff changeset
   112
      RESTARTABLE(::write(fd, addr, remaining), result);
489c9b5090e2 Initial load
duke
parents:
diff changeset
   113
      if (result == OS_ERR) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   114
        if (PrintMiscellaneous && Verbose) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   115
          warning("Could not write Perfdata save file: %s: %s\n",
37113
5a33bf5089ac 8148425: strerror() function is not thread-safe
stuefe
parents: 32387
diff changeset
   116
                  destfile, os::strerror(errno));
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   117
        }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   118
        break;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   119
      }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   120
489c9b5090e2 Initial load
duke
parents:
diff changeset
   121
      remaining -= (size_t)result;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   122
      addr += result;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   123
    }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   124
18078
10417cf9967d 7178026: os::close can restart ::close but that is not a restartable syscall
rdurbin
parents: 18069
diff changeset
   125
    result = ::close(fd);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   126
    if (PrintMiscellaneous && Verbose) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   127
      if (result == OS_ERR) {
37113
5a33bf5089ac 8148425: strerror() function is not thread-safe
stuefe
parents: 32387
diff changeset
   128
        warning("Could not close %s: %s\n", destfile, os::strerror(errno));
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   129
      }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   130
    }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   131
  }
27880
afb974a04396 8060074: os::free() takes MemoryTrackingLevel but doesn't need it
coleenp
parents: 27471
diff changeset
   132
  FREE_C_HEAP_ARRAY(char, destfile);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   133
}
489c9b5090e2 Initial load
duke
parents:
diff changeset
   134
489c9b5090e2 Initial load
duke
parents:
diff changeset
   135
489c9b5090e2 Initial load
duke
parents:
diff changeset
   136
// Shared Memory Implementation Details
489c9b5090e2 Initial load
duke
parents:
diff changeset
   137
489c9b5090e2 Initial load
duke
parents:
diff changeset
   138
// Note: the solaris and linux shared memory implementation uses the mmap
489c9b5090e2 Initial load
duke
parents:
diff changeset
   139
// interface with a backing store file to implement named shared memory.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   140
// Using the file system as the name space for shared memory allows a
489c9b5090e2 Initial load
duke
parents:
diff changeset
   141
// common name space to be supported across a variety of platforms. It
489c9b5090e2 Initial load
duke
parents:
diff changeset
   142
// also provides a name space that Java applications can deal with through
489c9b5090e2 Initial load
duke
parents:
diff changeset
   143
// simple file apis.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   144
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
   145
// The solaris and linux implementations store the backing store file in
489c9b5090e2 Initial load
duke
parents:
diff changeset
   146
// a user specific temporary directory located in the /tmp file system,
489c9b5090e2 Initial load
duke
parents:
diff changeset
   147
// which is always a local file system and is sometimes a RAM based file
489c9b5090e2 Initial load
duke
parents:
diff changeset
   148
// system.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   149
48801
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   150
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   151
// return the user specific temporary directory name.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   152
//
48801
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   153
// If containerized process, get dirname of
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   154
// /proc/{vmid}/root/tmp/{PERFDATA_NAME_user}
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   155
// otherwise /tmp/{PERFDATA_NAME_user}
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   156
//
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   157
// the caller is expected to free the allocated memory.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   158
//
48801
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   159
#define TMP_BUFFER_LEN (4+22)
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   160
static char* get_user_tmp_dir(const char* user, int vmid, int nspid) {
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   161
  char buffer[TMP_BUFFER_LEN];
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   162
  char* tmpdir = (char *)os::get_temp_directory();
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   163
  assert(strlen(tmpdir) == 4, "No longer using /tmp - update buffer size");
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   164
48801
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   165
  if (nspid != -1) {
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   166
    jio_snprintf(buffer, TMP_BUFFER_LEN, "/proc/%d/root%s", vmid, tmpdir);
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   167
    tmpdir = buffer;
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   168
  }
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   169
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   170
  const char* perfdir = PERFDATA_NAME;
5237
aab592fd4f44 6938627: Make temporary directory use property java.io.tmpdir when specified
coleenp
parents: 2131
diff changeset
   171
  size_t nbytes = strlen(tmpdir) + strlen(perfdir) + strlen(user) + 3;
13195
be27e1b6a4b9 6995781: Native Memory Tracking (Phase 1)
zgu
parents: 7690
diff changeset
   172
  char* dirname = NEW_C_HEAP_ARRAY(char, nbytes, mtInternal);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   173
489c9b5090e2 Initial load
duke
parents:
diff changeset
   174
  // construct the path name to user specific tmp directory
5237
aab592fd4f44 6938627: Make temporary directory use property java.io.tmpdir when specified
coleenp
parents: 2131
diff changeset
   175
  snprintf(dirname, nbytes, "%s/%s_%s", tmpdir, perfdir, user);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   176
489c9b5090e2 Initial load
duke
parents:
diff changeset
   177
  return dirname;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   178
}
489c9b5090e2 Initial load
duke
parents:
diff changeset
   179
489c9b5090e2 Initial load
duke
parents:
diff changeset
   180
// convert the given file name into a process id. if the file
489c9b5090e2 Initial load
duke
parents:
diff changeset
   181
// does not meet the file naming constraints, return 0.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   182
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
   183
static pid_t filename_to_pid(const char* filename) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   184
489c9b5090e2 Initial load
duke
parents:
diff changeset
   185
  // a filename that doesn't begin with a digit is not a
489c9b5090e2 Initial load
duke
parents:
diff changeset
   186
  // candidate for conversion.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   187
  //
489c9b5090e2 Initial load
duke
parents:
diff changeset
   188
  if (!isdigit(*filename)) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   189
    return 0;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   190
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   191
489c9b5090e2 Initial load
duke
parents:
diff changeset
   192
  // check if file name can be converted to an integer without
489c9b5090e2 Initial load
duke
parents:
diff changeset
   193
  // any leftover characters.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   194
  //
489c9b5090e2 Initial load
duke
parents:
diff changeset
   195
  char* remainder = NULL;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   196
  errno = 0;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   197
  pid_t pid = (pid_t)strtol(filename, &remainder, 10);
489c9b5090e2 Initial load
duke
parents:
diff changeset
   198
489c9b5090e2 Initial load
duke
parents:
diff changeset
   199
  if (errno != 0) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   200
    return 0;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   201
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   202
489c9b5090e2 Initial load
duke
parents:
diff changeset
   203
  // check for left over characters. If any, then the filename is
489c9b5090e2 Initial load
duke
parents:
diff changeset
   204
  // not a candidate for conversion.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   205
  //
489c9b5090e2 Initial load
duke
parents:
diff changeset
   206
  if (remainder != NULL && *remainder != '\0') {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   207
    return 0;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   208
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   209
489c9b5090e2 Initial load
duke
parents:
diff changeset
   210
  // successful conversion, return the pid
489c9b5090e2 Initial load
duke
parents:
diff changeset
   211
  return pid;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   212
}
489c9b5090e2 Initial load
duke
parents:
diff changeset
   213
489c9b5090e2 Initial load
duke
parents:
diff changeset
   214
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   215
// Check if the given statbuf is considered a secure directory for
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   216
// the backing store files. Returns true if the directory is considered
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   217
// a secure location. Returns false if the statbuf is a symbolic link or
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   218
// if an error occurred.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   219
//
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   220
static bool is_statbuf_secure(struct stat *statp) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   221
  if (S_ISLNK(statp->st_mode) || !S_ISDIR(statp->st_mode)) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   222
    // The path represents a link or some non-directory file type,
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   223
    // which is not what we expected. Declare it insecure.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   224
    //
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   225
    return false;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   226
  }
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   227
  // We have an existing directory, check if the permissions are safe.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   228
  //
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   229
  if ((statp->st_mode & (S_IWGRP|S_IWOTH)) != 0) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   230
    // The directory is open for writing and could be subjected
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   231
    // to a symlink or a hard link attack. Declare it insecure.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   232
    //
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   233
    return false;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   234
  }
32183
cd7ad76fe118 8075773: jps running as root fails after the fix of JDK-8050807
kevinw
parents: 28513
diff changeset
   235
  // If user is not root then see if the uid of the directory matches the effective uid of the process.
cd7ad76fe118 8075773: jps running as root fails after the fix of JDK-8050807
kevinw
parents: 28513
diff changeset
   236
  uid_t euid = geteuid();
cd7ad76fe118 8075773: jps running as root fails after the fix of JDK-8050807
kevinw
parents: 28513
diff changeset
   237
  if ((euid != 0) && (statp->st_uid != euid)) {
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   238
    // The directory was not created by this user, declare it insecure.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   239
    //
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   240
    return false;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   241
  }
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   242
  return true;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   243
}
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   244
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   245
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   246
// Check if the given path is considered a secure directory for
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   247
// the backing store files. Returns true if the directory exists
489c9b5090e2 Initial load
duke
parents:
diff changeset
   248
// and is considered a secure location. Returns false if the path
2131
98f9cef66a34 6810672: Comment typos
twisti
parents: 1
diff changeset
   249
// is a symbolic link or if an error occurred.
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   250
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
   251
static bool is_directory_secure(const char* path) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   252
  struct stat statbuf;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   253
  int result = 0;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   254
489c9b5090e2 Initial load
duke
parents:
diff changeset
   255
  RESTARTABLE(::lstat(path, &statbuf), result);
489c9b5090e2 Initial load
duke
parents:
diff changeset
   256
  if (result == OS_ERR) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   257
    return false;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   258
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   259
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   260
  // The path exists, see if it is secure.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   261
  return is_statbuf_secure(&statbuf);
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   262
}
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   263
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   264
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   265
// Check if the given directory file descriptor is considered a secure
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   266
// directory for the backing store files. Returns true if the directory
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   267
// exists and is considered a secure location. Returns false if the path
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   268
// is a symbolic link or if an error occurred.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   269
//
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   270
static bool is_dirfd_secure(int dir_fd) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   271
  struct stat statbuf;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   272
  int result = 0;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   273
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   274
  RESTARTABLE(::fstat(dir_fd, &statbuf), result);
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   275
  if (result == OS_ERR) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   276
    return false;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   277
  }
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   278
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   279
  // The path exists, now check its mode.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   280
  return is_statbuf_secure(&statbuf);
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   281
}
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   282
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   283
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   284
// Check to make sure fd1 and fd2 are referencing the same file system object.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   285
//
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   286
static bool is_same_fsobject(int fd1, int fd2) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   287
  struct stat statbuf1;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   288
  struct stat statbuf2;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   289
  int result = 0;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   290
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   291
  RESTARTABLE(::fstat(fd1, &statbuf1), result);
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   292
  if (result == OS_ERR) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   293
    return false;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   294
  }
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   295
  RESTARTABLE(::fstat(fd2, &statbuf2), result);
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   296
  if (result == OS_ERR) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   297
    return false;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   298
  }
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   299
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   300
  if ((statbuf1.st_ino == statbuf2.st_ino) &&
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   301
      (statbuf1.st_dev == statbuf2.st_dev)) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   302
    return true;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   303
  } else {
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   304
    return false;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   305
  }
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   306
}
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   307
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   308
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   309
// Open the directory of the given path and validate it.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   310
// Return a DIR * of the open directory.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   311
//
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   312
static DIR *open_directory_secure(const char* dirname) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   313
  // Open the directory using open() so that it can be verified
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   314
  // to be secure by calling is_dirfd_secure(), opendir() and then check
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   315
  // to see if they are the same file system object.  This method does not
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   316
  // introduce a window of opportunity for the directory to be attacked that
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   317
  // calling opendir() and is_directory_secure() does.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   318
  int result;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   319
  DIR *dirp = NULL;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   320
  RESTARTABLE(::open(dirname, O_RDONLY|O_NOFOLLOW), result);
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   321
  if (result == OS_ERR) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   322
    if (PrintMiscellaneous && Verbose) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   323
      if (errno == ELOOP) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   324
        warning("directory %s is a symlink and is not secure\n", dirname);
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   325
      } else {
37113
5a33bf5089ac 8148425: strerror() function is not thread-safe
stuefe
parents: 32387
diff changeset
   326
        warning("could not open directory %s: %s\n", dirname, os::strerror(errno));
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   327
      }
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   328
    }
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   329
    return dirp;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   330
  }
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   331
  int fd = result;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   332
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   333
  // Determine if the open directory is secure.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   334
  if (!is_dirfd_secure(fd)) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   335
    // The directory is not a secure directory.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   336
    os::close(fd);
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   337
    return dirp;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   338
  }
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   339
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   340
  // Open the directory.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   341
  dirp = ::opendir(dirname);
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   342
  if (dirp == NULL) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   343
    // The directory doesn't exist, close fd and return.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   344
    os::close(fd);
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   345
    return dirp;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   346
  }
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   347
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   348
  // Check to make sure fd and dirp are referencing the same file system object.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   349
  if (!is_same_fsobject(fd, dirfd(dirp))) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   350
    // The directory is not secure.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   351
    os::close(fd);
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   352
    os::closedir(dirp);
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   353
    dirp = NULL;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   354
    return dirp;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   355
  }
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   356
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   357
  // Close initial open now that we know directory is secure
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   358
  os::close(fd);
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   359
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   360
  return dirp;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   361
}
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   362
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   363
// NOTE: The code below uses fchdir(), open() and unlink() because
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   364
// fdopendir(), openat() and unlinkat() are not supported on all
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   365
// versions.  Once the support for fdopendir(), openat() and unlinkat()
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   366
// is available on all supported versions the code can be changed
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   367
// to use these functions.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   368
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   369
// Open the directory of the given path, validate it and set the
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   370
// current working directory to it.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   371
// Return a DIR * of the open directory and the saved cwd fd.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   372
//
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   373
static DIR *open_directory_secure_cwd(const char* dirname, int *saved_cwd_fd) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   374
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   375
  // Open the directory.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   376
  DIR* dirp = open_directory_secure(dirname);
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   377
  if (dirp == NULL) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   378
    // Directory doesn't exist or is insecure, so there is nothing to cleanup.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   379
    return dirp;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   380
  }
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   381
  int fd = dirfd(dirp);
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   382
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   383
  // Open a fd to the cwd and save it off.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   384
  int result;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   385
  RESTARTABLE(::open(".", O_RDONLY), result);
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   386
  if (result == OS_ERR) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   387
    *saved_cwd_fd = -1;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   388
  } else {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   389
    *saved_cwd_fd = result;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   390
  }
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   391
32387
a376fff9d4a5 8130910: hsperfdata file is created in wrong directory and not cleaned up if /tmp/hsperfdata_<username> has wrong permissions
dcubed
parents: 32183
diff changeset
   392
  // Set the current directory to dirname by using the fd of the directory and
a376fff9d4a5 8130910: hsperfdata file is created in wrong directory and not cleaned up if /tmp/hsperfdata_<username> has wrong permissions
dcubed
parents: 32183
diff changeset
   393
  // handle errors, otherwise shared memory files will be created in cwd.
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   394
  result = fchdir(fd);
32387
a376fff9d4a5 8130910: hsperfdata file is created in wrong directory and not cleaned up if /tmp/hsperfdata_<username> has wrong permissions
dcubed
parents: 32183
diff changeset
   395
  if (result == OS_ERR) {
a376fff9d4a5 8130910: hsperfdata file is created in wrong directory and not cleaned up if /tmp/hsperfdata_<username> has wrong permissions
dcubed
parents: 32183
diff changeset
   396
    if (PrintMiscellaneous && Verbose) {
a376fff9d4a5 8130910: hsperfdata file is created in wrong directory and not cleaned up if /tmp/hsperfdata_<username> has wrong permissions
dcubed
parents: 32183
diff changeset
   397
      warning("could not change to directory %s", dirname);
a376fff9d4a5 8130910: hsperfdata file is created in wrong directory and not cleaned up if /tmp/hsperfdata_<username> has wrong permissions
dcubed
parents: 32183
diff changeset
   398
    }
a376fff9d4a5 8130910: hsperfdata file is created in wrong directory and not cleaned up if /tmp/hsperfdata_<username> has wrong permissions
dcubed
parents: 32183
diff changeset
   399
    if (*saved_cwd_fd != -1) {
a376fff9d4a5 8130910: hsperfdata file is created in wrong directory and not cleaned up if /tmp/hsperfdata_<username> has wrong permissions
dcubed
parents: 32183
diff changeset
   400
      ::close(*saved_cwd_fd);
a376fff9d4a5 8130910: hsperfdata file is created in wrong directory and not cleaned up if /tmp/hsperfdata_<username> has wrong permissions
dcubed
parents: 32183
diff changeset
   401
      *saved_cwd_fd = -1;
a376fff9d4a5 8130910: hsperfdata file is created in wrong directory and not cleaned up if /tmp/hsperfdata_<username> has wrong permissions
dcubed
parents: 32183
diff changeset
   402
    }
a376fff9d4a5 8130910: hsperfdata file is created in wrong directory and not cleaned up if /tmp/hsperfdata_<username> has wrong permissions
dcubed
parents: 32183
diff changeset
   403
    // Close the directory.
a376fff9d4a5 8130910: hsperfdata file is created in wrong directory and not cleaned up if /tmp/hsperfdata_<username> has wrong permissions
dcubed
parents: 32183
diff changeset
   404
    os::closedir(dirp);
a376fff9d4a5 8130910: hsperfdata file is created in wrong directory and not cleaned up if /tmp/hsperfdata_<username> has wrong permissions
dcubed
parents: 32183
diff changeset
   405
    return NULL;
a376fff9d4a5 8130910: hsperfdata file is created in wrong directory and not cleaned up if /tmp/hsperfdata_<username> has wrong permissions
dcubed
parents: 32183
diff changeset
   406
  } else {
a376fff9d4a5 8130910: hsperfdata file is created in wrong directory and not cleaned up if /tmp/hsperfdata_<username> has wrong permissions
dcubed
parents: 32183
diff changeset
   407
    return dirp;
a376fff9d4a5 8130910: hsperfdata file is created in wrong directory and not cleaned up if /tmp/hsperfdata_<username> has wrong permissions
dcubed
parents: 32183
diff changeset
   408
  }
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   409
}
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   410
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   411
// Close the directory and restore the current working directory.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   412
//
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   413
static void close_directory_secure_cwd(DIR* dirp, int saved_cwd_fd) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   414
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   415
  int result;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   416
  // If we have a saved cwd change back to it and close the fd.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   417
  if (saved_cwd_fd != -1) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   418
    result = fchdir(saved_cwd_fd);
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   419
    ::close(saved_cwd_fd);
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   420
  }
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   421
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   422
  // Close the directory.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   423
  os::closedir(dirp);
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   424
}
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   425
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   426
// Check if the given file descriptor is considered a secure.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   427
//
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   428
static bool is_file_secure(int fd, const char *filename) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   429
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   430
  int result;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   431
  struct stat statbuf;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   432
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   433
  // Determine if the file is secure.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   434
  RESTARTABLE(::fstat(fd, &statbuf), result);
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   435
  if (result == OS_ERR) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   436
    if (PrintMiscellaneous && Verbose) {
37113
5a33bf5089ac 8148425: strerror() function is not thread-safe
stuefe
parents: 32387
diff changeset
   437
      warning("fstat failed on %s: %s\n", filename, os::strerror(errno));
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   438
    }
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   439
    return false;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   440
  }
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   441
  if (statbuf.st_nlink > 1) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   442
    // A file with multiple links is not expected.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   443
    if (PrintMiscellaneous && Verbose) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   444
      warning("file %s has multiple links\n", filename);
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   445
    }
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   446
    return false;
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   447
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   448
  return true;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   449
}
489c9b5090e2 Initial load
duke
parents:
diff changeset
   450
489c9b5090e2 Initial load
duke
parents:
diff changeset
   451
489c9b5090e2 Initial load
duke
parents:
diff changeset
   452
// return the user name for the given user id
489c9b5090e2 Initial load
duke
parents:
diff changeset
   453
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
   454
// the caller is expected to free the allocated memory.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   455
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
   456
static char* get_user_name(uid_t uid) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   457
489c9b5090e2 Initial load
duke
parents:
diff changeset
   458
  struct passwd pwent;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   459
489c9b5090e2 Initial load
duke
parents:
diff changeset
   460
  // determine the max pwbuf size from sysconf, and hardcode
489c9b5090e2 Initial load
duke
parents:
diff changeset
   461
  // a default if this not available through sysconf.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   462
  //
489c9b5090e2 Initial load
duke
parents:
diff changeset
   463
  long bufsize = sysconf(_SC_GETPW_R_SIZE_MAX);
489c9b5090e2 Initial load
duke
parents:
diff changeset
   464
  if (bufsize == -1)
489c9b5090e2 Initial load
duke
parents:
diff changeset
   465
    bufsize = 1024;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   466
13195
be27e1b6a4b9 6995781: Native Memory Tracking (Phase 1)
zgu
parents: 7690
diff changeset
   467
  char* pwbuf = NEW_C_HEAP_ARRAY(char, bufsize, mtInternal);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   468
489c9b5090e2 Initial load
duke
parents:
diff changeset
   469
  // POSIX interface to getpwuid_r is used on LINUX
489c9b5090e2 Initial load
duke
parents:
diff changeset
   470
  struct passwd* p;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   471
  int result = getpwuid_r(uid, &pwent, pwbuf, (size_t)bufsize, &p);
489c9b5090e2 Initial load
duke
parents:
diff changeset
   472
489c9b5090e2 Initial load
duke
parents:
diff changeset
   473
  if (result != 0 || p == NULL || p->pw_name == NULL || *(p->pw_name) == '\0') {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   474
    if (PrintMiscellaneous && Verbose) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   475
      if (result != 0) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   476
        warning("Could not retrieve passwd entry: %s\n",
37113
5a33bf5089ac 8148425: strerror() function is not thread-safe
stuefe
parents: 32387
diff changeset
   477
                os::strerror(result));
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   478
      }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   479
      else if (p == NULL) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   480
        // this check is added to protect against an observed problem
489c9b5090e2 Initial load
duke
parents:
diff changeset
   481
        // with getpwuid_r() on RedHat 9 where getpwuid_r returns 0,
489c9b5090e2 Initial load
duke
parents:
diff changeset
   482
        // indicating success, but has p == NULL. This was observed when
489c9b5090e2 Initial load
duke
parents:
diff changeset
   483
        // inserting a file descriptor exhaustion fault prior to the call
489c9b5090e2 Initial load
duke
parents:
diff changeset
   484
        // getpwuid_r() call. In this case, error is set to the appropriate
489c9b5090e2 Initial load
duke
parents:
diff changeset
   485
        // error condition, but this is undocumented behavior. This check
489c9b5090e2 Initial load
duke
parents:
diff changeset
   486
        // is safe under any condition, but the use of errno in the output
489c9b5090e2 Initial load
duke
parents:
diff changeset
   487
        // message may result in an erroneous message.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   488
        // Bug Id 89052 was opened with RedHat.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   489
        //
489c9b5090e2 Initial load
duke
parents:
diff changeset
   490
        warning("Could not retrieve passwd entry: %s\n",
37113
5a33bf5089ac 8148425: strerror() function is not thread-safe
stuefe
parents: 32387
diff changeset
   491
                os::strerror(errno));
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   492
      }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   493
      else {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   494
        warning("Could not determine user name: %s\n",
489c9b5090e2 Initial load
duke
parents:
diff changeset
   495
                p->pw_name == NULL ? "pw_name = NULL" :
489c9b5090e2 Initial load
duke
parents:
diff changeset
   496
                                     "pw_name zero length");
489c9b5090e2 Initial load
duke
parents:
diff changeset
   497
      }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   498
    }
27880
afb974a04396 8060074: os::free() takes MemoryTrackingLevel but doesn't need it
coleenp
parents: 27471
diff changeset
   499
    FREE_C_HEAP_ARRAY(char, pwbuf);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   500
    return NULL;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   501
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   502
13195
be27e1b6a4b9 6995781: Native Memory Tracking (Phase 1)
zgu
parents: 7690
diff changeset
   503
  char* user_name = NEW_C_HEAP_ARRAY(char, strlen(p->pw_name) + 1, mtInternal);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   504
  strcpy(user_name, p->pw_name);
489c9b5090e2 Initial load
duke
parents:
diff changeset
   505
27880
afb974a04396 8060074: os::free() takes MemoryTrackingLevel but doesn't need it
coleenp
parents: 27471
diff changeset
   506
  FREE_C_HEAP_ARRAY(char, pwbuf);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   507
  return user_name;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   508
}
489c9b5090e2 Initial load
duke
parents:
diff changeset
   509
489c9b5090e2 Initial load
duke
parents:
diff changeset
   510
// return the name of the user that owns the process identified by vmid.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   511
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
   512
// This method uses a slow directory search algorithm to find the backing
489c9b5090e2 Initial load
duke
parents:
diff changeset
   513
// store file for the specified vmid and returns the user name, as determined
489c9b5090e2 Initial load
duke
parents:
diff changeset
   514
// by the user name suffix of the hsperfdata_<username> directory name.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   515
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
   516
// the caller is expected to free the allocated memory.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   517
//
48801
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   518
// If nspid != -1, look in /proc/{vmid}/root/tmp for directories
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   519
// containing nspid, otherwise just look for vmid in /tmp
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   520
//
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   521
static char* get_user_name_slow(int vmid, int nspid, TRAPS) {
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   522
489c9b5090e2 Initial load
duke
parents:
diff changeset
   523
  // short circuit the directory search if the process doesn't even exist.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   524
  if (kill(vmid, 0) == OS_ERR) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   525
    if (errno == ESRCH) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   526
      THROW_MSG_0(vmSymbols::java_lang_IllegalArgumentException(),
489c9b5090e2 Initial load
duke
parents:
diff changeset
   527
                  "Process not found");
489c9b5090e2 Initial load
duke
parents:
diff changeset
   528
    }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   529
    else /* EPERM */ {
37113
5a33bf5089ac 8148425: strerror() function is not thread-safe
stuefe
parents: 32387
diff changeset
   530
      THROW_MSG_0(vmSymbols::java_io_IOException(), os::strerror(errno));
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   531
    }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   532
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   533
489c9b5090e2 Initial load
duke
parents:
diff changeset
   534
  // directory search
489c9b5090e2 Initial load
duke
parents:
diff changeset
   535
  char* oldest_user = NULL;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   536
  time_t oldest_ctime = 0;
51070
2f4c3cac8556 8206977: Minor improvements of runtime code.
goetz
parents: 50080
diff changeset
   537
  char buffer[MAXPATHLEN + 1];
48801
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   538
  int searchpid;
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   539
  char* tmpdirname = (char *)os::get_temp_directory();
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   540
  assert(strlen(tmpdirname) == 4, "No longer using /tmp - update buffer size");
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   541
48801
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   542
  if (nspid == -1) {
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   543
    searchpid = vmid;
51070
2f4c3cac8556 8206977: Minor improvements of runtime code.
goetz
parents: 50080
diff changeset
   544
  } else {
48801
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   545
    jio_snprintf(buffer, MAXPATHLEN, "/proc/%d/root%s", vmid, tmpdirname);
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   546
    tmpdirname = buffer;
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   547
    searchpid = nspid;
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   548
  }
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   549
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   550
  // open the temp directory
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   551
  DIR* tmpdirp = os::opendir(tmpdirname);
489c9b5090e2 Initial load
duke
parents:
diff changeset
   552
489c9b5090e2 Initial load
duke
parents:
diff changeset
   553
  if (tmpdirp == NULL) {
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   554
    // Cannot open the directory to get the user name, return.
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   555
    return NULL;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   556
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   557
489c9b5090e2 Initial load
duke
parents:
diff changeset
   558
  // for each entry in the directory that matches the pattern hsperfdata_*,
48801
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   559
  // open the directory and check if the file for the given vmid or nspid exists.
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   560
  // The file with the expected name and the latest creation date is used
489c9b5090e2 Initial load
duke
parents:
diff changeset
   561
  // to determine the user name for the process id.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   562
  //
489c9b5090e2 Initial load
duke
parents:
diff changeset
   563
  struct dirent* dentry;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   564
  errno = 0;
51106
f605c91e5219 8202353: os::readdir should use readdir instead of readdir_r
kbarrett
parents: 51070
diff changeset
   565
  while ((dentry = os::readdir(tmpdirp)) != NULL) {
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   566
489c9b5090e2 Initial load
duke
parents:
diff changeset
   567
    // check if the directory entry is a hsperfdata file
489c9b5090e2 Initial load
duke
parents:
diff changeset
   568
    if (strncmp(dentry->d_name, PERFDATA_NAME, strlen(PERFDATA_NAME)) != 0) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   569
      continue;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   570
    }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   571
489c9b5090e2 Initial load
duke
parents:
diff changeset
   572
    char* usrdir_name = NEW_C_HEAP_ARRAY(char,
13195
be27e1b6a4b9 6995781: Native Memory Tracking (Phase 1)
zgu
parents: 7690
diff changeset
   573
                     strlen(tmpdirname) + strlen(dentry->d_name) + 2, mtInternal);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   574
    strcpy(usrdir_name, tmpdirname);
5237
aab592fd4f44 6938627: Make temporary directory use property java.io.tmpdir when specified
coleenp
parents: 2131
diff changeset
   575
    strcat(usrdir_name, "/");
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   576
    strcat(usrdir_name, dentry->d_name);
489c9b5090e2 Initial load
duke
parents:
diff changeset
   577
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   578
    // open the user directory
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   579
    DIR* subdirp = open_directory_secure(usrdir_name);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   580
489c9b5090e2 Initial load
duke
parents:
diff changeset
   581
    if (subdirp == NULL) {
27880
afb974a04396 8060074: os::free() takes MemoryTrackingLevel but doesn't need it
coleenp
parents: 27471
diff changeset
   582
      FREE_C_HEAP_ARRAY(char, usrdir_name);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   583
      continue;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   584
    }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   585
489c9b5090e2 Initial load
duke
parents:
diff changeset
   586
    // Since we don't create the backing store files in directories
489c9b5090e2 Initial load
duke
parents:
diff changeset
   587
    // pointed to by symbolic links, we also don't follow them when
489c9b5090e2 Initial load
duke
parents:
diff changeset
   588
    // looking for the files. We check for a symbolic link after the
489c9b5090e2 Initial load
duke
parents:
diff changeset
   589
    // call to opendir in order to eliminate a small window where the
489c9b5090e2 Initial load
duke
parents:
diff changeset
   590
    // symlink can be exploited.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   591
    //
489c9b5090e2 Initial load
duke
parents:
diff changeset
   592
    if (!is_directory_secure(usrdir_name)) {
27880
afb974a04396 8060074: os::free() takes MemoryTrackingLevel but doesn't need it
coleenp
parents: 27471
diff changeset
   593
      FREE_C_HEAP_ARRAY(char, usrdir_name);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   594
      os::closedir(subdirp);
489c9b5090e2 Initial load
duke
parents:
diff changeset
   595
      continue;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   596
    }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   597
489c9b5090e2 Initial load
duke
parents:
diff changeset
   598
    struct dirent* udentry;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   599
    errno = 0;
51106
f605c91e5219 8202353: os::readdir should use readdir instead of readdir_r
kbarrett
parents: 51070
diff changeset
   600
    while ((udentry = os::readdir(subdirp)) != NULL) {
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   601
48801
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   602
      if (filename_to_pid(udentry->d_name) == searchpid) {
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   603
        struct stat statbuf;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   604
        int result;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   605
489c9b5090e2 Initial load
duke
parents:
diff changeset
   606
        char* filename = NEW_C_HEAP_ARRAY(char,
13195
be27e1b6a4b9 6995781: Native Memory Tracking (Phase 1)
zgu
parents: 7690
diff changeset
   607
                   strlen(usrdir_name) + strlen(udentry->d_name) + 2, mtInternal);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   608
489c9b5090e2 Initial load
duke
parents:
diff changeset
   609
        strcpy(filename, usrdir_name);
489c9b5090e2 Initial load
duke
parents:
diff changeset
   610
        strcat(filename, "/");
489c9b5090e2 Initial load
duke
parents:
diff changeset
   611
        strcat(filename, udentry->d_name);
489c9b5090e2 Initial load
duke
parents:
diff changeset
   612
489c9b5090e2 Initial load
duke
parents:
diff changeset
   613
        // don't follow symbolic links for the file
489c9b5090e2 Initial load
duke
parents:
diff changeset
   614
        RESTARTABLE(::lstat(filename, &statbuf), result);
489c9b5090e2 Initial load
duke
parents:
diff changeset
   615
        if (result == OS_ERR) {
27880
afb974a04396 8060074: os::free() takes MemoryTrackingLevel but doesn't need it
coleenp
parents: 27471
diff changeset
   616
           FREE_C_HEAP_ARRAY(char, filename);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   617
           continue;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   618
        }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   619
489c9b5090e2 Initial load
duke
parents:
diff changeset
   620
        // skip over files that are not regular files.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   621
        if (!S_ISREG(statbuf.st_mode)) {
27880
afb974a04396 8060074: os::free() takes MemoryTrackingLevel but doesn't need it
coleenp
parents: 27471
diff changeset
   622
          FREE_C_HEAP_ARRAY(char, filename);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   623
          continue;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   624
        }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   625
489c9b5090e2 Initial load
duke
parents:
diff changeset
   626
        // compare and save filename with latest creation time
489c9b5090e2 Initial load
duke
parents:
diff changeset
   627
        if (statbuf.st_size > 0 && statbuf.st_ctime > oldest_ctime) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   628
489c9b5090e2 Initial load
duke
parents:
diff changeset
   629
          if (statbuf.st_ctime > oldest_ctime) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   630
            char* user = strchr(dentry->d_name, '_') + 1;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   631
58084
cddef3bde924 8230398: Remove NULL checks before FREE_C_HEAP_ARRAY
lkorinth
parents: 55733
diff changeset
   632
            FREE_C_HEAP_ARRAY(char, oldest_user);
13195
be27e1b6a4b9 6995781: Native Memory Tracking (Phase 1)
zgu
parents: 7690
diff changeset
   633
            oldest_user = NEW_C_HEAP_ARRAY(char, strlen(user)+1, mtInternal);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   634
489c9b5090e2 Initial load
duke
parents:
diff changeset
   635
            strcpy(oldest_user, user);
489c9b5090e2 Initial load
duke
parents:
diff changeset
   636
            oldest_ctime = statbuf.st_ctime;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   637
          }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   638
        }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   639
27880
afb974a04396 8060074: os::free() takes MemoryTrackingLevel but doesn't need it
coleenp
parents: 27471
diff changeset
   640
        FREE_C_HEAP_ARRAY(char, filename);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   641
      }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   642
    }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   643
    os::closedir(subdirp);
27880
afb974a04396 8060074: os::free() takes MemoryTrackingLevel but doesn't need it
coleenp
parents: 27471
diff changeset
   644
    FREE_C_HEAP_ARRAY(char, usrdir_name);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   645
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   646
  os::closedir(tmpdirp);
489c9b5090e2 Initial load
duke
parents:
diff changeset
   647
489c9b5090e2 Initial load
duke
parents:
diff changeset
   648
  return(oldest_user);
489c9b5090e2 Initial load
duke
parents:
diff changeset
   649
}
489c9b5090e2 Initial load
duke
parents:
diff changeset
   650
48801
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   651
// Determine if the vmid is the parent pid
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   652
// for a child in a PID namespace.
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   653
// return the namespace pid if so, otherwise -1
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   654
static int get_namespace_pid(int vmid) {
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   655
  char fname[24];
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   656
  int retpid = -1;
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   657
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   658
  snprintf(fname, sizeof(fname), "/proc/%d/status", vmid);
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   659
  FILE *fp = fopen(fname, "r");
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   660
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   661
  if (fp) {
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   662
    int pid, nspid;
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   663
    int ret;
55457
ced62a6a7bbe 8220175: serviceability/dcmd/framework/VMVersionTest.java fails with a timeout
dtitov
parents: 53911
diff changeset
   664
    while (!feof(fp) && !ferror(fp)) {
48801
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   665
      ret = fscanf(fp, "NSpid: %d %d", &pid, &nspid);
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   666
      if (ret == 1) {
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   667
        break;
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   668
      }
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   669
      if (ret == 2) {
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   670
        retpid = nspid;
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   671
        break;
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   672
      }
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   673
      for (;;) {
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   674
        int ch = fgetc(fp);
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   675
        if (ch == EOF || ch == (int)'\n') break;
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   676
      }
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   677
    }
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   678
    fclose(fp);
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   679
  }
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   680
  return retpid;
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   681
}
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   682
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   683
// return the name of the user that owns the JVM indicated by the given vmid.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   684
//
48801
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   685
static char* get_user_name(int vmid, int *nspid, TRAPS) {
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   686
  char *result = get_user_name_slow(vmid, *nspid, THREAD);
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   687
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   688
  // If we are examining a container process without PID namespaces enabled
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   689
  // we need to use /proc/{pid}/root/tmp to find hsperfdata files.
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   690
  if (result == NULL) {
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   691
    result = get_user_name_slow(vmid, vmid, THREAD);
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   692
    // Enable nspid logic going forward
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   693
    if (result != NULL) *nspid = vmid;
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   694
  }
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   695
  return result;
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   696
}
489c9b5090e2 Initial load
duke
parents:
diff changeset
   697
489c9b5090e2 Initial load
duke
parents:
diff changeset
   698
// return the file name of the backing store file for the named
489c9b5090e2 Initial load
duke
parents:
diff changeset
   699
// shared memory region for the given user name and vmid.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   700
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
   701
// the caller is expected to free the allocated memory.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   702
//
48801
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   703
static char* get_sharedmem_filename(const char* dirname, int vmid, int nspid) {
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   704
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   705
  int pid = (nspid == -1) ? vmid : nspid;
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   706
489c9b5090e2 Initial load
duke
parents:
diff changeset
   707
  // add 2 for the file separator and a null terminator.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   708
  size_t nbytes = strlen(dirname) + UINT_CHARS + 2;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   709
13195
be27e1b6a4b9 6995781: Native Memory Tracking (Phase 1)
zgu
parents: 7690
diff changeset
   710
  char* name = NEW_C_HEAP_ARRAY(char, nbytes, mtInternal);
48801
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
   711
  snprintf(name, nbytes, "%s/%d", dirname, pid);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   712
489c9b5090e2 Initial load
duke
parents:
diff changeset
   713
  return name;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   714
}
489c9b5090e2 Initial load
duke
parents:
diff changeset
   715
489c9b5090e2 Initial load
duke
parents:
diff changeset
   716
489c9b5090e2 Initial load
duke
parents:
diff changeset
   717
// remove file
489c9b5090e2 Initial load
duke
parents:
diff changeset
   718
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
   719
// this method removes the file specified by the given path
489c9b5090e2 Initial load
duke
parents:
diff changeset
   720
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
   721
static void remove_file(const char* path) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   722
489c9b5090e2 Initial load
duke
parents:
diff changeset
   723
  int result;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   724
489c9b5090e2 Initial load
duke
parents:
diff changeset
   725
  // if the file is a directory, the following unlink will fail. since
489c9b5090e2 Initial load
duke
parents:
diff changeset
   726
  // we don't expect to find directories in the user temp directory, we
489c9b5090e2 Initial load
duke
parents:
diff changeset
   727
  // won't try to handle this situation. even if accidentially or
489c9b5090e2 Initial load
duke
parents:
diff changeset
   728
  // maliciously planted, the directory's presence won't hurt anything.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   729
  //
489c9b5090e2 Initial load
duke
parents:
diff changeset
   730
  RESTARTABLE(::unlink(path), result);
489c9b5090e2 Initial load
duke
parents:
diff changeset
   731
  if (PrintMiscellaneous && Verbose && result == OS_ERR) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   732
    if (errno != ENOENT) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   733
      warning("Could not unlink shared memory backing"
37113
5a33bf5089ac 8148425: strerror() function is not thread-safe
stuefe
parents: 32387
diff changeset
   734
              " store file %s : %s\n", path, os::strerror(errno));
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   735
    }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   736
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   737
}
489c9b5090e2 Initial load
duke
parents:
diff changeset
   738
489c9b5090e2 Initial load
duke
parents:
diff changeset
   739
489c9b5090e2 Initial load
duke
parents:
diff changeset
   740
// cleanup stale shared memory resources
489c9b5090e2 Initial load
duke
parents:
diff changeset
   741
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
   742
// This method attempts to remove all stale shared memory files in
489c9b5090e2 Initial load
duke
parents:
diff changeset
   743
// the named user temporary directory. It scans the named directory
489c9b5090e2 Initial load
duke
parents:
diff changeset
   744
// for files matching the pattern ^$[0-9]*$. For each file found, the
489c9b5090e2 Initial load
duke
parents:
diff changeset
   745
// process id is extracted from the file name and a test is run to
489c9b5090e2 Initial load
duke
parents:
diff changeset
   746
// determine if the process is alive. If the process is not alive,
489c9b5090e2 Initial load
duke
parents:
diff changeset
   747
// any stale file resources are removed.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   748
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
   749
static void cleanup_sharedmem_resources(const char* dirname) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   750
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   751
  int saved_cwd_fd;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   752
  // open the directory
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   753
  DIR* dirp = open_directory_secure_cwd(dirname, &saved_cwd_fd);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   754
  if (dirp == NULL) {
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   755
    // directory doesn't exist or is insecure, so there is nothing to cleanup
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   756
    return;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   757
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   758
489c9b5090e2 Initial load
duke
parents:
diff changeset
   759
  // for each entry in the directory that matches the expected file
489c9b5090e2 Initial load
duke
parents:
diff changeset
   760
  // name pattern, determine if the file resources are stale and if
489c9b5090e2 Initial load
duke
parents:
diff changeset
   761
  // so, remove the file resources. Note, instrumented HotSpot processes
489c9b5090e2 Initial load
duke
parents:
diff changeset
   762
  // for this user may start and/or terminate during this search and
489c9b5090e2 Initial load
duke
parents:
diff changeset
   763
  // remove or create new files in this directory. The behavior of this
489c9b5090e2 Initial load
duke
parents:
diff changeset
   764
  // loop under these conditions is dependent upon the implementation of
489c9b5090e2 Initial load
duke
parents:
diff changeset
   765
  // opendir/readdir.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   766
  //
489c9b5090e2 Initial load
duke
parents:
diff changeset
   767
  struct dirent* entry;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   768
  errno = 0;
51106
f605c91e5219 8202353: os::readdir should use readdir instead of readdir_r
kbarrett
parents: 51070
diff changeset
   769
  while ((entry = os::readdir(dirp)) != NULL) {
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   770
489c9b5090e2 Initial load
duke
parents:
diff changeset
   771
    pid_t pid = filename_to_pid(entry->d_name);
489c9b5090e2 Initial load
duke
parents:
diff changeset
   772
489c9b5090e2 Initial load
duke
parents:
diff changeset
   773
    if (pid == 0) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   774
489c9b5090e2 Initial load
duke
parents:
diff changeset
   775
      if (strcmp(entry->d_name, ".") != 0 && strcmp(entry->d_name, "..") != 0) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   776
        // attempt to remove all unexpected files, except "." and ".."
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   777
        unlink(entry->d_name);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   778
      }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   779
489c9b5090e2 Initial load
duke
parents:
diff changeset
   780
      errno = 0;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   781
      continue;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   782
    }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   783
489c9b5090e2 Initial load
duke
parents:
diff changeset
   784
    // we now have a file name that converts to a valid integer
489c9b5090e2 Initial load
duke
parents:
diff changeset
   785
    // that could represent a process id . if this process id
489c9b5090e2 Initial load
duke
parents:
diff changeset
   786
    // matches the current process id or the process is not running,
489c9b5090e2 Initial load
duke
parents:
diff changeset
   787
    // then remove the stale file resources.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   788
    //
489c9b5090e2 Initial load
duke
parents:
diff changeset
   789
    // process liveness is detected by sending signal number 0 to
489c9b5090e2 Initial load
duke
parents:
diff changeset
   790
    // the process id (see kill(2)). if kill determines that the
489c9b5090e2 Initial load
duke
parents:
diff changeset
   791
    // process does not exist, then the file resources are removed.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   792
    // if kill determines that that we don't have permission to
489c9b5090e2 Initial load
duke
parents:
diff changeset
   793
    // signal the process, then the file resources are assumed to
489c9b5090e2 Initial load
duke
parents:
diff changeset
   794
    // be stale and are removed because the resources for such a
489c9b5090e2 Initial load
duke
parents:
diff changeset
   795
    // process should be in a different user specific directory.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   796
    //
489c9b5090e2 Initial load
duke
parents:
diff changeset
   797
    if ((pid == os::current_process_id()) ||
489c9b5090e2 Initial load
duke
parents:
diff changeset
   798
        (kill(pid, 0) == OS_ERR && (errno == ESRCH || errno == EPERM))) {
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   799
        unlink(entry->d_name);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   800
    }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   801
    errno = 0;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   802
  }
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   803
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   804
  // close the directory and reset the current working directory
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   805
  close_directory_secure_cwd(dirp, saved_cwd_fd);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   806
}
489c9b5090e2 Initial load
duke
parents:
diff changeset
   807
489c9b5090e2 Initial load
duke
parents:
diff changeset
   808
// make the user specific temporary directory. Returns true if
489c9b5090e2 Initial load
duke
parents:
diff changeset
   809
// the directory exists and is secure upon return. Returns false
489c9b5090e2 Initial load
duke
parents:
diff changeset
   810
// if the directory exists but is either a symlink, is otherwise
489c9b5090e2 Initial load
duke
parents:
diff changeset
   811
// insecure, or if an error occurred.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   812
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
   813
static bool make_user_tmp_dir(const char* dirname) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   814
489c9b5090e2 Initial load
duke
parents:
diff changeset
   815
  // create the directory with 0755 permissions. note that the directory
489c9b5090e2 Initial load
duke
parents:
diff changeset
   816
  // will be owned by euid::egid, which may not be the same as uid::gid.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   817
  //
489c9b5090e2 Initial load
duke
parents:
diff changeset
   818
  if (mkdir(dirname, S_IRWXU|S_IRGRP|S_IXGRP|S_IROTH|S_IXOTH) == OS_ERR) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   819
    if (errno == EEXIST) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   820
      // The directory already exists and was probably created by another
489c9b5090e2 Initial load
duke
parents:
diff changeset
   821
      // JVM instance. However, this could also be the result of a
489c9b5090e2 Initial load
duke
parents:
diff changeset
   822
      // deliberate symlink. Verify that the existing directory is safe.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   823
      //
489c9b5090e2 Initial load
duke
parents:
diff changeset
   824
      if (!is_directory_secure(dirname)) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   825
        // directory is not secure
489c9b5090e2 Initial load
duke
parents:
diff changeset
   826
        if (PrintMiscellaneous && Verbose) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   827
          warning("%s directory is insecure\n", dirname);
489c9b5090e2 Initial load
duke
parents:
diff changeset
   828
        }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   829
        return false;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   830
      }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   831
    }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   832
    else {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   833
      // we encountered some other failure while attempting
489c9b5090e2 Initial load
duke
parents:
diff changeset
   834
      // to create the directory
489c9b5090e2 Initial load
duke
parents:
diff changeset
   835
      //
489c9b5090e2 Initial load
duke
parents:
diff changeset
   836
      if (PrintMiscellaneous && Verbose) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   837
        warning("could not create directory %s: %s\n",
37113
5a33bf5089ac 8148425: strerror() function is not thread-safe
stuefe
parents: 32387
diff changeset
   838
                dirname, os::strerror(errno));
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   839
      }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   840
      return false;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   841
    }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   842
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   843
  return true;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   844
}
489c9b5090e2 Initial load
duke
parents:
diff changeset
   845
489c9b5090e2 Initial load
duke
parents:
diff changeset
   846
// create the shared memory file resources
489c9b5090e2 Initial load
duke
parents:
diff changeset
   847
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
   848
// This method creates the shared memory file with the given size
489c9b5090e2 Initial load
duke
parents:
diff changeset
   849
// This method also creates the user specific temporary directory, if
489c9b5090e2 Initial load
duke
parents:
diff changeset
   850
// it does not yet exist.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   851
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
   852
static int create_sharedmem_resources(const char* dirname, const char* filename, size_t size) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   853
489c9b5090e2 Initial load
duke
parents:
diff changeset
   854
  // make the user temporary directory
489c9b5090e2 Initial load
duke
parents:
diff changeset
   855
  if (!make_user_tmp_dir(dirname)) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   856
    // could not make/find the directory or the found directory
489c9b5090e2 Initial load
duke
parents:
diff changeset
   857
    // was not secure
489c9b5090e2 Initial load
duke
parents:
diff changeset
   858
    return -1;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   859
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   860
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   861
  int saved_cwd_fd;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   862
  // open the directory and set the current working directory to it
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   863
  DIR* dirp = open_directory_secure_cwd(dirname, &saved_cwd_fd);
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   864
  if (dirp == NULL) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   865
    // Directory doesn't exist or is insecure, so cannot create shared
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   866
    // memory file.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   867
    return -1;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   868
  }
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   869
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   870
  // Open the filename in the current directory.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   871
  // Cannot use O_TRUNC here; truncation of an existing file has to happen
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   872
  // after the is_file_secure() check below.
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   873
  int result;
53911
65f2a401e0eb 8218811: replace open by os::open in hotspot coding
mbaesken
parents: 51106
diff changeset
   874
  RESTARTABLE(os::open(filename, O_RDWR|O_CREAT|O_NOFOLLOW, S_IRUSR|S_IWUSR), result);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   875
  if (result == OS_ERR) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   876
    if (PrintMiscellaneous && Verbose) {
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   877
      if (errno == ELOOP) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   878
        warning("file %s is a symlink and is not secure\n", filename);
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   879
      } else {
37113
5a33bf5089ac 8148425: strerror() function is not thread-safe
stuefe
parents: 32387
diff changeset
   880
        warning("could not create file %s: %s\n", filename, os::strerror(errno));
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   881
      }
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   882
    }
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   883
    // close the directory and reset the current working directory
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   884
    close_directory_secure_cwd(dirp, saved_cwd_fd);
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   885
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   886
    return -1;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   887
  }
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   888
  // close the directory and reset the current working directory
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   889
  close_directory_secure_cwd(dirp, saved_cwd_fd);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   890
489c9b5090e2 Initial load
duke
parents:
diff changeset
   891
  // save the file descriptor
489c9b5090e2 Initial load
duke
parents:
diff changeset
   892
  int fd = result;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   893
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   894
  // check to see if the file is secure
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   895
  if (!is_file_secure(fd, filename)) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   896
    ::close(fd);
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   897
    return -1;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   898
  }
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   899
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   900
  // truncate the file to get rid of any existing data
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   901
  RESTARTABLE(::ftruncate(fd, (off_t)0), result);
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   902
  if (result == OS_ERR) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   903
    if (PrintMiscellaneous && Verbose) {
37113
5a33bf5089ac 8148425: strerror() function is not thread-safe
stuefe
parents: 32387
diff changeset
   904
      warning("could not truncate shared memory file: %s\n", os::strerror(errno));
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   905
    }
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   906
    ::close(fd);
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   907
    return -1;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   908
  }
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   909
  // set the file size
489c9b5090e2 Initial load
duke
parents:
diff changeset
   910
  RESTARTABLE(::ftruncate(fd, (off_t)size), result);
489c9b5090e2 Initial load
duke
parents:
diff changeset
   911
  if (result == OS_ERR) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   912
    if (PrintMiscellaneous && Verbose) {
37113
5a33bf5089ac 8148425: strerror() function is not thread-safe
stuefe
parents: 32387
diff changeset
   913
      warning("could not set shared memory file size: %s\n", os::strerror(errno));
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   914
    }
18078
10417cf9967d 7178026: os::close can restart ::close but that is not a restartable syscall
rdurbin
parents: 18069
diff changeset
   915
    ::close(fd);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   916
    return -1;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   917
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   918
7690
23de7f961fd2 7007769: VM crashes with SIGBUS writing PerfData if tmp space is full
bobv
parents: 7397
diff changeset
   919
  // Verify that we have enough disk space for this file.
23de7f961fd2 7007769: VM crashes with SIGBUS writing PerfData if tmp space is full
bobv
parents: 7397
diff changeset
   920
  // We'll get random SIGBUS crashes on memory accesses if
23de7f961fd2 7007769: VM crashes with SIGBUS writing PerfData if tmp space is full
bobv
parents: 7397
diff changeset
   921
  // we don't.
23de7f961fd2 7007769: VM crashes with SIGBUS writing PerfData if tmp space is full
bobv
parents: 7397
diff changeset
   922
23de7f961fd2 7007769: VM crashes with SIGBUS writing PerfData if tmp space is full
bobv
parents: 7397
diff changeset
   923
  for (size_t seekpos = 0; seekpos < size; seekpos += os::vm_page_size()) {
23de7f961fd2 7007769: VM crashes with SIGBUS writing PerfData if tmp space is full
bobv
parents: 7397
diff changeset
   924
    int zero_int = 0;
23de7f961fd2 7007769: VM crashes with SIGBUS writing PerfData if tmp space is full
bobv
parents: 7397
diff changeset
   925
    result = (int)os::seek_to_file_offset(fd, (jlong)(seekpos));
23de7f961fd2 7007769: VM crashes with SIGBUS writing PerfData if tmp space is full
bobv
parents: 7397
diff changeset
   926
    if (result == -1 ) break;
23de7f961fd2 7007769: VM crashes with SIGBUS writing PerfData if tmp space is full
bobv
parents: 7397
diff changeset
   927
    RESTARTABLE(::write(fd, &zero_int, 1), result);
23de7f961fd2 7007769: VM crashes with SIGBUS writing PerfData if tmp space is full
bobv
parents: 7397
diff changeset
   928
    if (result != 1) {
23de7f961fd2 7007769: VM crashes with SIGBUS writing PerfData if tmp space is full
bobv
parents: 7397
diff changeset
   929
      if (errno == ENOSPC) {
23de7f961fd2 7007769: VM crashes with SIGBUS writing PerfData if tmp space is full
bobv
parents: 7397
diff changeset
   930
        warning("Insufficient space for shared memory file:\n   %s\nTry using the -Djava.io.tmpdir= option to select an alternate temp location.\n", filename);
23de7f961fd2 7007769: VM crashes with SIGBUS writing PerfData if tmp space is full
bobv
parents: 7397
diff changeset
   931
      }
23de7f961fd2 7007769: VM crashes with SIGBUS writing PerfData if tmp space is full
bobv
parents: 7397
diff changeset
   932
      break;
23de7f961fd2 7007769: VM crashes with SIGBUS writing PerfData if tmp space is full
bobv
parents: 7397
diff changeset
   933
    }
23de7f961fd2 7007769: VM crashes with SIGBUS writing PerfData if tmp space is full
bobv
parents: 7397
diff changeset
   934
  }
23de7f961fd2 7007769: VM crashes with SIGBUS writing PerfData if tmp space is full
bobv
parents: 7397
diff changeset
   935
23de7f961fd2 7007769: VM crashes with SIGBUS writing PerfData if tmp space is full
bobv
parents: 7397
diff changeset
   936
  if (result != -1) {
23de7f961fd2 7007769: VM crashes with SIGBUS writing PerfData if tmp space is full
bobv
parents: 7397
diff changeset
   937
    return fd;
23de7f961fd2 7007769: VM crashes with SIGBUS writing PerfData if tmp space is full
bobv
parents: 7397
diff changeset
   938
  } else {
18078
10417cf9967d 7178026: os::close can restart ::close but that is not a restartable syscall
rdurbin
parents: 18069
diff changeset
   939
    ::close(fd);
7690
23de7f961fd2 7007769: VM crashes with SIGBUS writing PerfData if tmp space is full
bobv
parents: 7397
diff changeset
   940
    return -1;
23de7f961fd2 7007769: VM crashes with SIGBUS writing PerfData if tmp space is full
bobv
parents: 7397
diff changeset
   941
  }
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   942
}
489c9b5090e2 Initial load
duke
parents:
diff changeset
   943
489c9b5090e2 Initial load
duke
parents:
diff changeset
   944
// open the shared memory file for the given user and vmid. returns
489c9b5090e2 Initial load
duke
parents:
diff changeset
   945
// the file descriptor for the open file or -1 if the file could not
489c9b5090e2 Initial load
duke
parents:
diff changeset
   946
// be opened.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   947
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
   948
static int open_sharedmem_file(const char* filename, int oflags, TRAPS) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   949
489c9b5090e2 Initial load
duke
parents:
diff changeset
   950
  // open the file
489c9b5090e2 Initial load
duke
parents:
diff changeset
   951
  int result;
53911
65f2a401e0eb 8218811: replace open by os::open in hotspot coding
mbaesken
parents: 51106
diff changeset
   952
  RESTARTABLE(os::open(filename, oflags, 0), result);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   953
  if (result == OS_ERR) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   954
    if (errno == ENOENT) {
16674
3847a5ea1846 8006001: [parfait] Possible file leak in hotspot/src/os/linux/vm/perfMemory_linux.cpp
ccheung
parents: 14120
diff changeset
   955
      THROW_MSG_(vmSymbols::java_lang_IllegalArgumentException(),
40103
3c3569845229 8162869: Small fixes for AIX perf memory and attach listener
clanger
parents: 37113
diff changeset
   956
                 "Process not found", OS_ERR);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   957
    }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   958
    else if (errno == EACCES) {
16674
3847a5ea1846 8006001: [parfait] Possible file leak in hotspot/src/os/linux/vm/perfMemory_linux.cpp
ccheung
parents: 14120
diff changeset
   959
      THROW_MSG_(vmSymbols::java_lang_IllegalArgumentException(),
40103
3c3569845229 8162869: Small fixes for AIX perf memory and attach listener
clanger
parents: 37113
diff changeset
   960
                 "Permission denied", OS_ERR);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   961
    }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   962
    else {
40103
3c3569845229 8162869: Small fixes for AIX perf memory and attach listener
clanger
parents: 37113
diff changeset
   963
      THROW_MSG_(vmSymbols::java_io_IOException(),
3c3569845229 8162869: Small fixes for AIX perf memory and attach listener
clanger
parents: 37113
diff changeset
   964
                 os::strerror(errno), OS_ERR);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   965
    }
489c9b5090e2 Initial load
duke
parents:
diff changeset
   966
  }
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   967
  int fd = result;
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   968
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   969
  // check to see if the file is secure
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   970
  if (!is_file_secure(fd, filename)) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   971
    ::close(fd);
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   972
    return -1;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   973
  }
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   974
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
   975
  return fd;
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   976
}
489c9b5090e2 Initial load
duke
parents:
diff changeset
   977
489c9b5090e2 Initial load
duke
parents:
diff changeset
   978
// create a named shared memory region. returns the address of the
489c9b5090e2 Initial load
duke
parents:
diff changeset
   979
// memory region on success or NULL on failure. A return value of
489c9b5090e2 Initial load
duke
parents:
diff changeset
   980
// NULL will ultimately disable the shared memory feature.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   981
//
40103
3c3569845229 8162869: Small fixes for AIX perf memory and attach listener
clanger
parents: 37113
diff changeset
   982
// On Linux, the name space for shared memory objects
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
   983
// is the file system name space.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   984
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
   985
// A monitoring application attaching to a JVM does not need to know
489c9b5090e2 Initial load
duke
parents:
diff changeset
   986
// the file system name of the shared memory object. However, it may
489c9b5090e2 Initial load
duke
parents:
diff changeset
   987
// be convenient for applications to discover the existence of newly
489c9b5090e2 Initial load
duke
parents:
diff changeset
   988
// created and terminating JVMs by watching the file system name space
489c9b5090e2 Initial load
duke
parents:
diff changeset
   989
// for files being created or removed.
489c9b5090e2 Initial load
duke
parents:
diff changeset
   990
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
   991
static char* mmap_create_shared(size_t size) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
   992
489c9b5090e2 Initial load
duke
parents:
diff changeset
   993
  int result;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   994
  int fd;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   995
  char* mapAddress;
489c9b5090e2 Initial load
duke
parents:
diff changeset
   996
489c9b5090e2 Initial load
duke
parents:
diff changeset
   997
  int vmid = os::current_process_id();
489c9b5090e2 Initial load
duke
parents:
diff changeset
   998
489c9b5090e2 Initial load
duke
parents:
diff changeset
   999
  char* user_name = get_user_name(geteuid());
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1000
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1001
  if (user_name == NULL)
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1002
    return NULL;
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1003
48801
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
  1004
  char* dirname = get_user_tmp_dir(user_name, vmid, -1);
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
  1005
  char* filename = get_sharedmem_filename(dirname, vmid, -1);
40103
3c3569845229 8162869: Small fixes for AIX perf memory and attach listener
clanger
parents: 37113
diff changeset
  1006
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
  1007
  // get the short filename
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
  1008
  char* short_filename = strrchr(filename, '/');
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
  1009
  if (short_filename == NULL) {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
  1010
    short_filename = filename;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
  1011
  } else {
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
  1012
    short_filename++;
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
  1013
  }
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1014
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1015
  // cleanup any stale shared memory files
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1016
  cleanup_sharedmem_resources(dirname);
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1017
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1018
  assert(((size > 0) && (size % os::vm_page_size() == 0)),
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1019
         "unexpected PerfMemory region size");
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1020
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
  1021
  fd = create_sharedmem_resources(dirname, short_filename, size);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1022
27880
afb974a04396 8060074: os::free() takes MemoryTrackingLevel but doesn't need it
coleenp
parents: 27471
diff changeset
  1023
  FREE_C_HEAP_ARRAY(char, user_name);
afb974a04396 8060074: os::free() takes MemoryTrackingLevel but doesn't need it
coleenp
parents: 27471
diff changeset
  1024
  FREE_C_HEAP_ARRAY(char, dirname);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1025
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1026
  if (fd == -1) {
27880
afb974a04396 8060074: os::free() takes MemoryTrackingLevel but doesn't need it
coleenp
parents: 27471
diff changeset
  1027
    FREE_C_HEAP_ARRAY(char, filename);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1028
    return NULL;
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1029
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1030
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1031
  mapAddress = (char*)::mmap((char*)0, size, PROT_READ|PROT_WRITE, MAP_SHARED, fd, 0);
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1032
18078
10417cf9967d 7178026: os::close can restart ::close but that is not a restartable syscall
rdurbin
parents: 18069
diff changeset
  1033
  result = ::close(fd);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1034
  assert(result != OS_ERR, "could not close file");
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1035
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1036
  if (mapAddress == MAP_FAILED) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1037
    if (PrintMiscellaneous && Verbose) {
37113
5a33bf5089ac 8148425: strerror() function is not thread-safe
stuefe
parents: 32387
diff changeset
  1038
      warning("mmap failed -  %s\n", os::strerror(errno));
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1039
    }
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1040
    remove_file(filename);
27880
afb974a04396 8060074: os::free() takes MemoryTrackingLevel but doesn't need it
coleenp
parents: 27471
diff changeset
  1041
    FREE_C_HEAP_ARRAY(char, filename);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1042
    return NULL;
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1043
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1044
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1045
  // save the file name for use in delete_shared_memory()
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1046
  backing_store_file_name = filename;
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1047
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1048
  // clear the shared memory region
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1049
  (void)::memset((void*) mapAddress, 0, size);
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1050
14120
7d298141c258 7199092: NMT: NMT needs to deal overlapped virtual memory ranges
zgu
parents: 13963
diff changeset
  1051
  // it does not go through os api, the operation has to record from here
25946
1572c9f03fb9 8046598: Scalable Native memory tracking development
zgu
parents: 24424
diff changeset
  1052
  MemTracker::record_virtual_memory_reserve_and_commit((address)mapAddress, size, CURRENT_PC, mtInternal);
14120
7d298141c258 7199092: NMT: NMT needs to deal overlapped virtual memory ranges
zgu
parents: 13963
diff changeset
  1053
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1054
  return mapAddress;
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1055
}
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1056
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1057
// release a named shared memory region
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1058
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1059
static void unmap_shared(char* addr, size_t bytes) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1060
  os::release_memory(addr, bytes);
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1061
}
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1062
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1063
// create the PerfData memory region in shared memory.
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1064
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1065
static char* create_shared_memory(size_t size) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1066
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1067
  // create the shared memory region.
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1068
  return mmap_create_shared(size);
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1069
}
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1070
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1071
// delete the shared PerfData memory region
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1072
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1073
static void delete_shared_memory(char* addr, size_t size) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1074
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1075
  // cleanup the persistent shared memory resources. since DestroyJavaVM does
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1076
  // not support unloading of the JVM, unmapping of the memory resource is
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1077
  // not performed. The memory will be reclaimed by the OS upon termination of
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1078
  // the process. The backing store file is deleted from the file system.
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1079
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1080
  assert(!PerfDisableSharedMem, "shouldn't be here");
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1081
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1082
  if (backing_store_file_name != NULL) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1083
    remove_file(backing_store_file_name);
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1084
    // Don't.. Free heap memory could deadlock os::abort() if it is called
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1085
    // from signal handler. OS will reclaim the heap memory.
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1086
    // FREE_C_HEAP_ARRAY(char, backing_store_file_name);
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1087
    backing_store_file_name = NULL;
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1088
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1089
}
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1090
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1091
// return the size of the file for the given file descriptor
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1092
// or 0 if it is not a valid size for a shared memory file
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1093
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1094
static size_t sharedmem_filesize(int fd, TRAPS) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1095
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1096
  struct stat statbuf;
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1097
  int result;
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1098
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1099
  RESTARTABLE(::fstat(fd, &statbuf), result);
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1100
  if (result == OS_ERR) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1101
    if (PrintMiscellaneous && Verbose) {
37113
5a33bf5089ac 8148425: strerror() function is not thread-safe
stuefe
parents: 32387
diff changeset
  1102
      warning("fstat failed: %s\n", os::strerror(errno));
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1103
    }
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1104
    THROW_MSG_0(vmSymbols::java_io_IOException(),
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1105
                "Could not determine PerfMemory size");
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1106
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1107
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1108
  if ((statbuf.st_size == 0) ||
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1109
     ((size_t)statbuf.st_size % os::vm_page_size() != 0)) {
55733
9cfb9387a9e8 8227435: Perf::attach() should not throw a java.lang.Exception
rschmelter
parents: 55457
diff changeset
  1110
    THROW_MSG_0(vmSymbols::java_io_IOException(),
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1111
                "Invalid PerfMemory size");
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1112
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1113
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1114
  return (size_t)statbuf.st_size;
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1115
}
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1116
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1117
// attach to a named shared memory region.
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1118
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1119
static void mmap_attach_shared(const char* user, int vmid, PerfMemory::PerfMemoryMode mode, char** addr, size_t* sizep, TRAPS) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1120
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1121
  char* mapAddress;
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1122
  int result;
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1123
  int fd;
16674
3847a5ea1846 8006001: [parfait] Possible file leak in hotspot/src/os/linux/vm/perfMemory_linux.cpp
ccheung
parents: 14120
diff changeset
  1124
  size_t size = 0;
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1125
  const char* luser = NULL;
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1126
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1127
  int mmap_prot;
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1128
  int file_flags;
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1129
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1130
  ResourceMark rm;
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1131
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1132
  // map the high level access mode to the appropriate permission
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1133
  // constructs for the file and the shared memory mapping.
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1134
  if (mode == PerfMemory::PERF_MODE_RO) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1135
    mmap_prot = PROT_READ;
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
  1136
    file_flags = O_RDONLY | O_NOFOLLOW;
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1137
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1138
  else if (mode == PerfMemory::PERF_MODE_RW) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1139
#ifdef LATER
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1140
    mmap_prot = PROT_READ | PROT_WRITE;
28513
9464a1b5c184 8050807: Better performing performance data handling
gthornbr
parents: 27883
diff changeset
  1141
    file_flags = O_RDWR | O_NOFOLLOW;
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1142
#else
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1143
    THROW_MSG(vmSymbols::java_lang_IllegalArgumentException(),
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1144
              "Unsupported access mode");
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1145
#endif
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1146
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1147
  else {
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1148
    THROW_MSG(vmSymbols::java_lang_IllegalArgumentException(),
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1149
              "Illegal access mode");
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1150
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1151
48801
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
  1152
  // determine if vmid is for a containerized process
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
  1153
  int nspid = get_namespace_pid(vmid);
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
  1154
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1155
  if (user == NULL || strlen(user) == 0) {
48801
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
  1156
    luser = get_user_name(vmid, &nspid, CHECK);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1157
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1158
  else {
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1159
    luser = user;
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1160
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1161
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1162
  if (luser == NULL) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1163
    THROW_MSG(vmSymbols::java_lang_IllegalArgumentException(),
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1164
              "Could not map vmid to user Name");
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1165
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1166
48801
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
  1167
  char* dirname = get_user_tmp_dir(luser, vmid, nspid);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1168
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1169
  // since we don't follow symbolic links when creating the backing
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1170
  // store file, we don't follow them when attaching either.
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1171
  //
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1172
  if (!is_directory_secure(dirname)) {
27880
afb974a04396 8060074: os::free() takes MemoryTrackingLevel but doesn't need it
coleenp
parents: 27471
diff changeset
  1173
    FREE_C_HEAP_ARRAY(char, dirname);
27471
6e56277909f1 8062370: Various minor code improvements
goetz
parents: 27007
diff changeset
  1174
    if (luser != user) {
27880
afb974a04396 8060074: os::free() takes MemoryTrackingLevel but doesn't need it
coleenp
parents: 27471
diff changeset
  1175
      FREE_C_HEAP_ARRAY(char, luser);
27471
6e56277909f1 8062370: Various minor code improvements
goetz
parents: 27007
diff changeset
  1176
    }
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1177
    THROW_MSG(vmSymbols::java_lang_IllegalArgumentException(),
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1178
              "Process not found");
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1179
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1180
48801
099f18e10557 8193710: jcmd -l and jps commands do not list Java processes running in Docker containers
bobv
parents: 47216
diff changeset
  1181
  char* filename = get_sharedmem_filename(dirname, vmid, nspid);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1182
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1183
  // copy heap memory to resource memory. the open_sharedmem_file
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1184
  // method below need to use the filename, but could throw an
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1185
  // exception. using a resource array prevents the leak that
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1186
  // would otherwise occur.
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1187
  char* rfilename = NEW_RESOURCE_ARRAY(char, strlen(filename) + 1);
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1188
  strcpy(rfilename, filename);
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1189
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1190
  // free the c heap resources that are no longer needed
27880
afb974a04396 8060074: os::free() takes MemoryTrackingLevel but doesn't need it
coleenp
parents: 27471
diff changeset
  1191
  if (luser != user) FREE_C_HEAP_ARRAY(char, luser);
afb974a04396 8060074: os::free() takes MemoryTrackingLevel but doesn't need it
coleenp
parents: 27471
diff changeset
  1192
  FREE_C_HEAP_ARRAY(char, dirname);
afb974a04396 8060074: os::free() takes MemoryTrackingLevel but doesn't need it
coleenp
parents: 27471
diff changeset
  1193
  FREE_C_HEAP_ARRAY(char, filename);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1194
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1195
  // open the shared memory file for the give vmid
22745
4acf6ad4c462 8029775: Solaris code cleanup
coleenp
parents: 18086
diff changeset
  1196
  fd = open_sharedmem_file(rfilename, file_flags, THREAD);
4acf6ad4c462 8029775: Solaris code cleanup
coleenp
parents: 18086
diff changeset
  1197
4acf6ad4c462 8029775: Solaris code cleanup
coleenp
parents: 18086
diff changeset
  1198
  if (fd == OS_ERR) {
4acf6ad4c462 8029775: Solaris code cleanup
coleenp
parents: 18086
diff changeset
  1199
    return;
4acf6ad4c462 8029775: Solaris code cleanup
coleenp
parents: 18086
diff changeset
  1200
  }
4acf6ad4c462 8029775: Solaris code cleanup
coleenp
parents: 18086
diff changeset
  1201
4acf6ad4c462 8029775: Solaris code cleanup
coleenp
parents: 18086
diff changeset
  1202
  if (HAS_PENDING_EXCEPTION) {
4acf6ad4c462 8029775: Solaris code cleanup
coleenp
parents: 18086
diff changeset
  1203
    ::close(fd);
4acf6ad4c462 8029775: Solaris code cleanup
coleenp
parents: 18086
diff changeset
  1204
    return;
4acf6ad4c462 8029775: Solaris code cleanup
coleenp
parents: 18086
diff changeset
  1205
  }
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1206
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1207
  if (*sizep == 0) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1208
    size = sharedmem_filesize(fd, CHECK);
16674
3847a5ea1846 8006001: [parfait] Possible file leak in hotspot/src/os/linux/vm/perfMemory_linux.cpp
ccheung
parents: 14120
diff changeset
  1209
  } else {
3847a5ea1846 8006001: [parfait] Possible file leak in hotspot/src/os/linux/vm/perfMemory_linux.cpp
ccheung
parents: 14120
diff changeset
  1210
    size = *sizep;
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1211
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1212
16674
3847a5ea1846 8006001: [parfait] Possible file leak in hotspot/src/os/linux/vm/perfMemory_linux.cpp
ccheung
parents: 14120
diff changeset
  1213
  assert(size > 0, "unexpected size <= 0");
3847a5ea1846 8006001: [parfait] Possible file leak in hotspot/src/os/linux/vm/perfMemory_linux.cpp
ccheung
parents: 14120
diff changeset
  1214
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1215
  mapAddress = (char*)::mmap((char*)0, size, mmap_prot, MAP_SHARED, fd, 0);
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1216
18078
10417cf9967d 7178026: os::close can restart ::close but that is not a restartable syscall
rdurbin
parents: 18069
diff changeset
  1217
  result = ::close(fd);
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1218
  assert(result != OS_ERR, "could not close file");
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1219
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1220
  if (mapAddress == MAP_FAILED) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1221
    if (PrintMiscellaneous && Verbose) {
37113
5a33bf5089ac 8148425: strerror() function is not thread-safe
stuefe
parents: 32387
diff changeset
  1222
      warning("mmap failed: %s\n", os::strerror(errno));
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1223
    }
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1224
    THROW_MSG(vmSymbols::java_lang_OutOfMemoryError(),
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1225
              "Could not map PerfMemory");
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1226
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1227
14120
7d298141c258 7199092: NMT: NMT needs to deal overlapped virtual memory ranges
zgu
parents: 13963
diff changeset
  1228
  // it does not go through os api, the operation has to record from here
25946
1572c9f03fb9 8046598: Scalable Native memory tracking development
zgu
parents: 24424
diff changeset
  1229
  MemTracker::record_virtual_memory_reserve_and_commit((address)mapAddress, size, CURRENT_PC, mtInternal);
14120
7d298141c258 7199092: NMT: NMT needs to deal overlapped virtual memory ranges
zgu
parents: 13963
diff changeset
  1230
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1231
  *addr = mapAddress;
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1232
  *sizep = size;
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1233
46405
17ab5460b2cb 8168122: Update logging in perfMemory to Unified Logging
rprotacio
parents: 40103
diff changeset
  1234
  log_debug(perf, memops)("mapped " SIZE_FORMAT " bytes for vmid %d at "
50080
6fd9fbefd2b4 8202889: Remove trailing LF from perf log
ysuenaga
parents: 48801
diff changeset
  1235
                          INTPTR_FORMAT, size, vmid, p2i((void*)mapAddress));
1
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1236
}
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1237
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1238
// create the PerfData memory region
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1239
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1240
// This method creates the memory region used to store performance
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1241
// data for the JVM. The memory may be created in standard or
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1242
// shared memory.
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1243
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1244
void PerfMemory::create_memory_region(size_t size) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1245
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1246
  if (PerfDisableSharedMem) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1247
    // do not share the memory for the performance data.
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1248
    _start = create_standard_memory(size);
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1249
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1250
  else {
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1251
    _start = create_shared_memory(size);
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1252
    if (_start == NULL) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1253
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1254
      // creation of the shared memory region failed, attempt
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1255
      // to create a contiguous, non-shared memory region instead.
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1256
      //
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1257
      if (PrintMiscellaneous && Verbose) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1258
        warning("Reverting to non-shared PerfMemory region.\n");
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1259
      }
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1260
      PerfDisableSharedMem = true;
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1261
      _start = create_standard_memory(size);
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1262
    }
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1263
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1264
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1265
  if (_start != NULL) _capacity = size;
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1266
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1267
}
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1268
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1269
// delete the PerfData memory region
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1270
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1271
// This method deletes the memory region used to store performance
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1272
// data for the JVM. The memory region indicated by the <address, size>
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1273
// tuple will be inaccessible after a call to this method.
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1274
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1275
void PerfMemory::delete_memory_region() {
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1276
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1277
  assert((start() != NULL && capacity() > 0), "verify proper state");
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1278
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1279
  // If user specifies PerfDataSaveFile, it will save the performance data
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1280
  // to the specified file name no matter whether PerfDataSaveToFile is specified
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1281
  // or not. In other word, -XX:PerfDataSaveFile=.. overrides flag
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1282
  // -XX:+PerfDataSaveToFile.
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1283
  if (PerfDataSaveToFile || PerfDataSaveFile != NULL) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1284
    save_memory_to_file(start(), capacity());
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1285
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1286
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1287
  if (PerfDisableSharedMem) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1288
    delete_standard_memory(start(), capacity());
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1289
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1290
  else {
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1291
    delete_shared_memory(start(), capacity());
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1292
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1293
}
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1294
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1295
// attach to the PerfData memory region for another JVM
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1296
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1297
// This method returns an <address, size> tuple that points to
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1298
// a memory buffer that is kept reasonably synchronized with
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1299
// the PerfData memory region for the indicated JVM. This
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1300
// buffer may be kept in synchronization via shared memory
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1301
// or some other mechanism that keeps the buffer updated.
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1302
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1303
// If the JVM chooses not to support the attachability feature,
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1304
// this method should throw an UnsupportedOperation exception.
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1305
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1306
// This implementation utilizes named shared memory to map
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1307
// the indicated process's PerfData memory region into this JVMs
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1308
// address space.
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1309
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1310
void PerfMemory::attach(const char* user, int vmid, PerfMemoryMode mode, char** addrp, size_t* sizep, TRAPS) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1311
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1312
  if (vmid == 0 || vmid == os::current_process_id()) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1313
     *addrp = start();
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1314
     *sizep = capacity();
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1315
     return;
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1316
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1317
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1318
  mmap_attach_shared(user, vmid, mode, addrp, sizep, CHECK);
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1319
}
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1320
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1321
// detach from the PerfData memory region of another JVM
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1322
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1323
// This method detaches the PerfData memory region of another
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1324
// JVM, specified as an <address, size> tuple of a buffer
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1325
// in this process's address space. This method may perform
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1326
// arbitrary actions to accomplish the detachment. The memory
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1327
// region specified by <address, size> will be inaccessible after
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1328
// a call to this method.
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1329
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1330
// If the JVM chooses not to support the attachability feature,
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1331
// this method should throw an UnsupportedOperation exception.
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1332
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1333
// This implementation utilizes named shared memory to detach
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1334
// the indicated process's PerfData memory region from this
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1335
// process's address space.
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1336
//
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1337
void PerfMemory::detach(char* addr, size_t bytes, TRAPS) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1338
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1339
  assert(addr != 0, "address sanity check");
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1340
  assert(bytes > 0, "capacity sanity check");
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1341
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1342
  if (PerfMemory::contains(addr) || PerfMemory::contains(addr + bytes - 1)) {
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1343
    // prevent accidental detachment of this process's PerfMemory region
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1344
    return;
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1345
  }
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1346
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1347
  unmap_shared(addr, bytes);
489c9b5090e2 Initial load
duke
parents:
diff changeset
  1348
}