comparison src/os/solaris/vm/attachListener_solaris.cpp @ 0:a61af66fc99e jdk7-b24

Initial load
author duke
date Sat, 01 Dec 2007 00:00:00 +0000
parents
children e392695de029
comparison
equal deleted inserted replaced
-1:000000000000 0:a61af66fc99e
1 /*
2 * Copyright 2005-2006 Sun Microsystems, Inc. All Rights Reserved.
3 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
4 *
5 * This code is free software; you can redistribute it and/or modify it
6 * under the terms of the GNU General Public License version 2 only, as
7 * published by the Free Software Foundation.
8 *
9 * This code is distributed in the hope that it will be useful, but WITHOUT
10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
11 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
12 * version 2 for more details (a copy is included in the LICENSE file that
13 * accompanied this code).
14 *
15 * You should have received a copy of the GNU General Public License version
16 * 2 along with this work; if not, write to the Free Software Foundation,
17 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
18 *
19 * Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
20 * CA 95054 USA or visit www.sun.com if you need additional information or
21 * have any questions.
22 *
23 */
24
25 # include "incls/_precompiled.incl"
26 # include "incls/_attachListener_solaris.cpp.incl"
27
28 #include <door.h>
29 #include <string.h>
30 #include <signal.h>
31 #include <sys/types.h>
32 #include <sys/socket.h>
33 #include <sys/stat.h>
34
35 // stropts.h uses STR in stream ioctl defines
36 #undef STR
37 #include <stropts.h>
38 #undef STR
39 #define STR(a) #a
40
41 // The attach mechanism on Solaris is implemented using the Doors IPC
42 // mechanism. The first tool to attempt to attach causes the attach
43 // listener thread to startup. This thread creats a door that is
44 // associated with a function that enqueues an operation to the attach
45 // listener. The door is attached to a file in the file system so that
46 // client (tools) can locate it. To enqueue an operation to the VM the
47 // client calls through the door which invokes the enqueue function in
48 // this process. The credentials of the client are checked and if the
49 // effective uid matches this process then the operation is enqueued.
50 // When an operation completes the attach listener is required to send the
51 // operation result and any result data to the client. In this implementation
52 // the result is returned via a UNIX domain socket. A pair of connected
53 // sockets (socketpair) is created in the enqueue function and the file
54 // descriptor for one of the sockets is returned to the client as the
55 // return from the door call. The other end is retained in this process.
56 // When the operation completes the result is sent to the client and
57 // the socket is closed.
58
59 // forward reference
60 class SolarisAttachOperation;
61
62 class SolarisAttachListener: AllStatic {
63 private:
64
65 // the path to which we attach the door file descriptor
66 static char _door_path[PATH_MAX+1];
67 static volatile bool _has_door_path;
68
69 // door descriptor returned by door_create
70 static int _door_descriptor;
71
72 static void set_door_path(char* path) {
73 if (path == NULL) {
74 _has_door_path = false;
75 } else {
76 strncpy(_door_path, path, PATH_MAX);
77 _door_path[PATH_MAX] = '\0'; // ensure it's nul terminated
78 _has_door_path = true;
79 }
80 }
81
82 static void set_door_descriptor(int dd) { _door_descriptor = dd; }
83
84 // mutex to protect operation list
85 static mutex_t _mutex;
86
87 // semaphore to wakeup listener thread
88 static sema_t _wakeup;
89
90 static mutex_t* mutex() { return &_mutex; }
91 static sema_t* wakeup() { return &_wakeup; }
92
93 // enqueued operation list
94 static SolarisAttachOperation* _head;
95 static SolarisAttachOperation* _tail;
96
97 static SolarisAttachOperation* head() { return _head; }
98 static void set_head(SolarisAttachOperation* head) { _head = head; }
99
100 static SolarisAttachOperation* tail() { return _tail; }
101 static void set_tail(SolarisAttachOperation* tail) { _tail = tail; }
102
103 // create the door
104 static int create_door();
105
106 public:
107 enum {
108 ATTACH_PROTOCOL_VER = 1 // protocol version
109 };
110 enum {
111 ATTACH_ERROR_BADREQUEST = 100, // error code returned by
112 ATTACH_ERROR_BADVERSION = 101, // the door call
113 ATTACH_ERROR_RESOURCE = 102,
114 ATTACH_ERROR_INTERNAL = 103,
115 ATTACH_ERROR_DENIED = 104
116 };
117
118 // initialize the listener
119 static int init();
120
121 static bool has_door_path() { return _has_door_path; }
122 static char* door_path() { return _door_path; }
123 static int door_descriptor() { return _door_descriptor; }
124
125 // enqueue an operation
126 static void enqueue(SolarisAttachOperation* op);
127
128 // dequeue an operation
129 static SolarisAttachOperation* dequeue();
130 };
131
132
133 // SolarisAttachOperation is an AttachOperation that additionally encapsulates
134 // a socket connection to the requesting client/tool. SolarisAttachOperation
135 // can additionally be held in a linked list.
136
137 class SolarisAttachOperation: public AttachOperation {
138 private:
139 friend class SolarisAttachListener;
140
141 // connection to client
142 int _socket;
143
144 // linked list support
145 SolarisAttachOperation* _next;
146
147 SolarisAttachOperation* next() { return _next; }
148 void set_next(SolarisAttachOperation* next) { _next = next; }
149
150 public:
151 void complete(jint res, bufferedStream* st);
152
153 int socket() const { return _socket; }
154 void set_socket(int s) { _socket = s; }
155
156 SolarisAttachOperation(char* name) : AttachOperation(name) {
157 set_socket(-1);
158 set_next(NULL);
159 }
160 };
161
162 // statics
163 char SolarisAttachListener::_door_path[PATH_MAX+1];
164 volatile bool SolarisAttachListener::_has_door_path;
165 int SolarisAttachListener::_door_descriptor = -1;
166 mutex_t SolarisAttachListener::_mutex;
167 sema_t SolarisAttachListener::_wakeup;
168 SolarisAttachOperation* SolarisAttachListener::_head = NULL;
169 SolarisAttachOperation* SolarisAttachListener::_tail = NULL;
170
171 // Supporting class to help split a buffer into individual components
172 class ArgumentIterator : public StackObj {
173 private:
174 char* _pos;
175 char* _end;
176 public:
177 ArgumentIterator(char* arg_buffer, size_t arg_size) {
178 _pos = arg_buffer;
179 _end = _pos + arg_size - 1;
180 }
181 char* next() {
182 if (*_pos == '\0') {
183 return NULL;
184 }
185 char* res = _pos;
186 char* next_pos = strchr(_pos, '\0');
187 if (next_pos < _end) {
188 next_pos++;
189 }
190 _pos = next_pos;
191 return res;
192 }
193 };
194
195 // Calls from the door function to check that the client credentials
196 // match this process. Returns 0 if credentials okay, otherwise -1.
197 static int check_credentials() {
198 door_cred_t cred_info;
199
200 // get client credentials
201 if (door_cred(&cred_info) == -1) {
202 return -1; // unable to get them
203 }
204
205 // get our euid/eguid (probably could cache these)
206 uid_t euid = geteuid();
207 gid_t egid = getegid();
208
209 // check that the effective uid/gid matches - discuss this with Jeff.
210 if (cred_info.dc_euid == euid && cred_info.dc_egid == egid) {
211 return 0; // okay
212 } else {
213 return -1; // denied
214 }
215 }
216
217
218 // Parses the argument buffer to create an AttachOperation that we should
219 // enqueue to the attach listener.
220 // The buffer is expected to be formatted as follows:
221 // <ver>0<cmd>0<arg>0<arg>0<arg>0
222 // where <ver> is the version number (must be "1"), <cmd> is the command
223 // name ("load, "datadump", ...) and <arg> is an argument.
224 //
225 static SolarisAttachOperation* create_operation(char* argp, size_t arg_size, int* err) {
226 // assume bad request until parsed
227 *err = SolarisAttachListener::ATTACH_ERROR_BADREQUEST;
228
229 if (arg_size < 2 || argp[arg_size-1] != '\0') {
230 return NULL; // no ver or not null terminated
231 }
232
233 // Use supporting class to iterate over the buffer
234 ArgumentIterator args(argp, arg_size);
235
236 // First check the protocol version
237 char* ver = args.next();
238 if (ver == NULL) {
239 return NULL;
240 }
241 if (atoi(ver) != SolarisAttachListener::ATTACH_PROTOCOL_VER) {
242 *err = SolarisAttachListener::ATTACH_ERROR_BADVERSION;
243 return NULL;
244 }
245
246 // Get command name and create the operation
247 char* name = args.next();
248 if (name == NULL || strlen(name) > AttachOperation::name_length_max) {
249 return NULL;
250 }
251 SolarisAttachOperation* op = new SolarisAttachOperation(name);
252
253 // Iterate over the arguments
254 for (int i=0; i<AttachOperation::arg_count_max; i++) {
255 char* arg = args.next();
256 if (arg == NULL) {
257 op->set_arg(i, NULL);
258 } else {
259 if (strlen(arg) > AttachOperation::arg_length_max) {
260 delete op;
261 return NULL;
262 }
263 op->set_arg(i, arg);
264 }
265 }
266
267 // return operation
268 *err = 0;
269 return op;
270 }
271
272 // create special operation to indicate all clients have detached
273 static SolarisAttachOperation* create_detachall_operation() {
274 return new SolarisAttachOperation(AttachOperation::detachall_operation_name());
275 }
276
277 // This is door function which the client executes via a door_call.
278 extern "C" {
279 static void enqueue_proc(void* cookie, char* argp, size_t arg_size,
280 door_desc_t* dt, uint_t n_desc)
281 {
282 int return_fd = -1;
283 SolarisAttachOperation* op = NULL;
284
285 // no listener
286 jint res = 0;
287 if (!AttachListener::is_initialized()) {
288 // how did we get here?
289 debug_only(warning("door_call when not enabled"));
290 res = (jint)SolarisAttachListener::ATTACH_ERROR_INTERNAL;
291 }
292
293 // check client credentials
294 if (res == 0) {
295 if (check_credentials() != 0) {
296 res = (jint)SolarisAttachListener::ATTACH_ERROR_DENIED;
297 }
298 }
299
300 // if we are stopped at ShowMessageBoxOnError then maybe we can
301 // load a diagnostic library
302 if (res == 0 && is_error_reported()) {
303 if (ShowMessageBoxOnError) {
304 // TBD - support loading of diagnostic library here
305 }
306
307 // can't enqueue operation after fatal error
308 res = (jint)SolarisAttachListener::ATTACH_ERROR_RESOURCE;
309 }
310
311 // create the operation
312 if (res == 0) {
313 int err;
314 op = create_operation(argp, arg_size, &err);
315 res = (op == NULL) ? (jint)err : 0;
316 }
317
318 // create a pair of connected sockets. Store the file descriptor
319 // for one end in the operation and enqueue the operation. The
320 // file descriptor for the other end wil be returned to the client.
321 if (res == 0) {
322 int s[2];
323 if (socketpair(PF_UNIX, SOCK_STREAM, 0, s) < 0) {
324 delete op;
325 res = (jint)SolarisAttachListener::ATTACH_ERROR_RESOURCE;
326 } else {
327 op->set_socket(s[0]);
328 return_fd = s[1];
329 SolarisAttachListener::enqueue(op);
330 }
331 }
332
333 // Return 0 (success) + file descriptor, or non-0 (error)
334 if (res == 0) {
335 door_desc_t desc;
336 desc.d_attributes = DOOR_DESCRIPTOR;
337 desc.d_data.d_desc.d_descriptor = return_fd;
338 door_return((char*)&res, sizeof(res), &desc, 1);
339 } else {
340 door_return((char*)&res, sizeof(res), NULL, 0);
341 }
342 }
343 }
344
345 // atexit hook to detach the door and remove the file
346 extern "C" {
347 static void listener_cleanup() {
348 static int cleanup_done;
349 if (!cleanup_done) {
350 cleanup_done = 1;
351 int dd = SolarisAttachListener::door_descriptor();
352 if (dd >= 0) {
353 ::close(dd);
354 }
355 if (SolarisAttachListener::has_door_path()) {
356 char* path = SolarisAttachListener::door_path();
357 ::fdetach(path);
358 ::unlink(path);
359 }
360 }
361 }
362 }
363
364 // Create the door
365 int SolarisAttachListener::create_door() {
366 char door_path[PATH_MAX+1];
367 int fd, res;
368
369 // register exit function
370 ::atexit(listener_cleanup);
371
372 // create the door descriptor
373 int dd = ::door_create(enqueue_proc, NULL, 0);
374 if (dd < 0) {
375 return -1;
376 }
377
378 sprintf(door_path, "%s/.java_pid%d", os::get_temp_directory(), os::current_process_id());
379 RESTARTABLE(::creat(door_path, S_IRUSR | S_IWUSR), fd);
380
381 if (fd == -1) {
382 debug_only(warning("attempt to create %s failed", door_path));
383 return -1;
384 }
385 assert(fd >= 0, "bad file descriptor");
386 set_door_path(door_path);
387 RESTARTABLE(::close(fd), res);
388
389 // attach the door descriptor to the file
390 if ((res = ::fattach(dd, door_path)) == -1) {
391 // if busy then detach and try again
392 if (errno == EBUSY) {
393 ::fdetach(door_path);
394 res = ::fattach(dd, door_path);
395 }
396 if (res == -1) {
397 ::door_revoke(dd);
398 dd = -1;
399 }
400 }
401 if (dd >= 0) {
402 set_door_descriptor(dd);
403 } else {
404 // unable to create door or attach it to the file
405 ::unlink(door_path);
406 set_door_path(NULL);
407 return -1;
408 }
409
410 return 0;
411 }
412
413 // Initialization - create the door, locks, and other initialization
414 int SolarisAttachListener::init() {
415 if (create_door()) {
416 return -1;
417 }
418
419 int status = os::Solaris::mutex_init(&_mutex);
420 assert_status(status==0, status, "mutex_init");
421
422 status = ::sema_init(&_wakeup, 0, NULL, NULL);
423 assert_status(status==0, status, "sema_init");
424
425 set_head(NULL);
426 set_tail(NULL);
427
428 return 0;
429 }
430
431 // Dequeue an operation
432 SolarisAttachOperation* SolarisAttachListener::dequeue() {
433 for (;;) {
434 int res;
435
436 // wait for somebody to enqueue something
437 while ((res = ::sema_wait(wakeup())) == EINTR)
438 ;
439 if (res) {
440 warning("sema_wait failed: %s", strerror(res));
441 return NULL;
442 }
443
444 // lock the list
445 res = os::Solaris::mutex_lock(mutex());
446 assert(res == 0, "mutex_lock failed");
447
448 // remove the head of the list
449 SolarisAttachOperation* op = head();
450 if (op != NULL) {
451 set_head(op->next());
452 if (head() == NULL) {
453 set_tail(NULL);
454 }
455 }
456
457 // unlock
458 os::Solaris::mutex_unlock(mutex());
459
460 // if we got an operation when return it.
461 if (op != NULL) {
462 return op;
463 }
464 }
465 }
466
467 // Enqueue an operation
468 void SolarisAttachListener::enqueue(SolarisAttachOperation* op) {
469 // lock list
470 int res = os::Solaris::mutex_lock(mutex());
471 assert(res == 0, "mutex_lock failed");
472
473 // enqueue at tail
474 op->set_next(NULL);
475 if (head() == NULL) {
476 set_head(op);
477 } else {
478 tail()->set_next(op);
479 }
480 set_tail(op);
481
482 // wakeup the attach listener
483 RESTARTABLE(::sema_post(wakeup()), res);
484 assert(res == 0, "sema_post failed");
485
486 // unlock
487 os::Solaris::mutex_unlock(mutex());
488 }
489
490
491 // support function - writes the (entire) buffer to a socket
492 static int write_fully(int s, char* buf, int len) {
493 do {
494 int n = ::write(s, buf, len);
495 if (n == -1) {
496 if (errno != EINTR) return -1;
497 } else {
498 buf += n;
499 len -= n;
500 }
501 }
502 while (len > 0);
503 return 0;
504 }
505
506 // Complete an operation by sending the operation result and any result
507 // output to the client. At this time the socket is in blocking mode so
508 // potentially we can block if there is a lot of data and the client is
509 // non-responsive. For most operations this is a non-issue because the
510 // default send buffer is sufficient to buffer everything. In the future
511 // if there are operations that involves a very big reply then it the
512 // socket could be made non-blocking and a timeout could be used.
513
514 void SolarisAttachOperation::complete(jint res, bufferedStream* st) {
515 if (this->socket() >= 0) {
516 JavaThread* thread = JavaThread::current();
517 ThreadBlockInVM tbivm(thread);
518
519 thread->set_suspend_equivalent();
520 // cleared by handle_special_suspend_equivalent_condition() or
521 // java_suspend_self() via check_and_wait_while_suspended()
522
523 // write operation result
524 char msg[32];
525 sprintf(msg, "%d\n", res);
526 int rc = write_fully(this->socket(), msg, strlen(msg));
527
528 // write any result data
529 if (rc == 0) {
530 write_fully(this->socket(), (char*) st->base(), st->size());
531 ::shutdown(this->socket(), 2);
532 }
533
534 // close socket and we're done
535 RESTARTABLE(::close(this->socket()), rc);
536
537 // were we externally suspended while we were waiting?
538 thread->check_and_wait_while_suspended();
539 }
540 delete this;
541 }
542
543
544 // AttachListener functions
545
546 AttachOperation* AttachListener::dequeue() {
547 JavaThread* thread = JavaThread::current();
548 ThreadBlockInVM tbivm(thread);
549
550 thread->set_suspend_equivalent();
551 // cleared by handle_special_suspend_equivalent_condition() or
552 // java_suspend_self() via check_and_wait_while_suspended()
553
554 AttachOperation* op = SolarisAttachListener::dequeue();
555
556 // were we externally suspended while we were waiting?
557 thread->check_and_wait_while_suspended();
558
559 return op;
560 }
561
562 int AttachListener::pd_init() {
563 JavaThread* thread = JavaThread::current();
564 ThreadBlockInVM tbivm(thread);
565
566 thread->set_suspend_equivalent();
567 // cleared by handle_special_suspend_equivalent_condition() or
568 // java_suspend_self()
569
570 int ret_code = SolarisAttachListener::init();
571
572 // were we externally suspended while we were waiting?
573 thread->check_and_wait_while_suspended();
574
575 return ret_code;
576 }
577
578 // Attach Listener is started lazily except in the case when
579 // +ReduseSignalUsage is used
580 bool AttachListener::init_at_startup() {
581 if (ReduceSignalUsage) {
582 return true;
583 } else {
584 return false;
585 }
586 }
587
588 // If the file .attach_pid<pid> exists in the working directory
589 // or /tmp then this is the trigger to start the attach mechanism
590 bool AttachListener::is_init_trigger() {
591 if (init_at_startup() || is_initialized()) {
592 return false; // initialized at startup or already initialized
593 }
594 char fn[32];
595 sprintf(fn, ".attach_pid%d", os::current_process_id());
596 int ret;
597 struct stat64 st;
598 RESTARTABLE(::stat64(fn, &st), ret);
599 if (ret == -1) {
600 sprintf(fn, "/tmp/.attach_pid%d", os::current_process_id());
601 RESTARTABLE(::stat64(fn, &st), ret);
602 }
603 if (ret == 0) {
604 // simple check to avoid starting the attach mechanism when
605 // a bogus user creates the file
606 if (st.st_uid == geteuid()) {
607 init();
608 return true;
609 }
610 }
611 return false;
612 }
613
614 // if VM aborts then detach/cleanup
615 void AttachListener::abort() {
616 listener_cleanup();
617 }
618
619 void AttachListener::pd_data_dump() {
620 os::signal_notify(SIGQUIT);
621 }
622
623 static jint enable_dprobes(AttachOperation* op, outputStream* out) {
624 const char* probe = op->arg(0);
625 if (probe == NULL || probe[0] == '\0') {
626 out->print_cr("No probe specified");
627 return JNI_ERR;
628 } else {
629 int probe_typess = atoi(probe);
630 if (errno) {
631 out->print_cr("invalid probe type");
632 return JNI_ERR;
633 } else {
634 DTrace::enable_dprobes(probe_typess);
635 return JNI_OK;
636 }
637 }
638 }
639
640 // platform specific operations table
641 static AttachOperationFunctionInfo funcs[] = {
642 { "enabledprobes", enable_dprobes },
643 { NULL, NULL }
644 };
645
646 AttachOperationFunctionInfo* AttachListener::pd_find_operation(const char* name) {
647 int i;
648 for (i = 0; funcs[i].name != NULL; i++) {
649 if (strcmp(funcs[i].name, name) == 0) {
650 return &funcs[i];
651 }
652 }
653 return NULL;
654 }
655
656 // Solaris specific global flag set. Currently, we support only
657 // changing ExtendedDTraceProbes flag.
658 jint AttachListener::pd_set_flag(AttachOperation* op, outputStream* out) {
659 const char* name = op->arg(0);
660 assert(name != NULL, "flag name should not be null");
661 bool flag = true;
662 const char* arg1;
663 if ((arg1 = op->arg(1)) != NULL) {
664 flag = (atoi(arg1) != 0);
665 if (errno) {
666 out->print_cr("flag value has to be an integer");
667 return JNI_ERR;
668 }
669 }
670
671 if (strcmp(name, "ExtendedDTraceProbes") != 0) {
672 out->print_cr("flag '%s' cannot be changed", name);
673 return JNI_ERR;
674 }
675
676 DTrace::set_extended_dprobes(flag);
677 return JNI_OK;
678 }
679
680 void AttachListener::pd_detachall() {
681 DTrace::detach_all_clients();
682 }