| 1 | // Licensed to the .NET Foundation under one or more agreements. |
| 2 | // The .NET Foundation licenses this file to you under the MIT license. |
| 3 | // See the LICENSE file in the project root for more information. |
| 4 | // |
| 5 | // ProfAttachClient.cpp |
| 6 | // |
| 7 | |
| 8 | // |
| 9 | // Implementation of the AttachProfiler() API, used by CLRProfilingImpl::AttachProfiler. |
| 10 | // |
| 11 | // CLRProfilingImpl::AttachProfiler (in ndp\clr\src\DLLS\shim\shimapi.cpp) just thunks down |
| 12 | // to mscorwks!AttachProfiler (below), which calls other functions in this file, all of |
| 13 | // which are in mscorwks.dll. The AttachProfiler() API is consumed by trigger processes |
| 14 | // in order to force the runtime of a target process to load a profiler. The prime |
| 15 | // portion of this implementation lives in ProfilingAPIAttachClient, which handles |
| 16 | // opening a client connection to the pipe created by the target profilee, and sending |
| 17 | // requests across that pipe to force the target profilee (which acts as the pipe server) |
| 18 | // to attach a profiler. |
| 19 | |
| 20 | // |
| 21 | // Since these functions are executed by the trigger process, they intentionally seek the |
| 22 | // event and pipe objects by names based on the PID of the target app to profile (which |
| 23 | // is NOT the PID of the current process, as the current process is just the trigger |
| 24 | // process). This implies, for example, that the variable |
| 25 | // ProfilingAPIAttachDetach::s_hAttachEvent is of no use to the current process, as |
| 26 | // s_hAttachEvent is only applicable to the target profilee app's process. |
| 27 | // |
| 28 | // Most of the contracts in this file follow the lead of default contracts throughout the |
| 29 | // CLR (triggers, throws, etc.). Since AttachProfiler() is called by native code either |
| 30 | // on a native thread created by the trigger process, or via a P/Invoke, these functions |
| 31 | // will all run on threads in MODE_PREEMPTIVE. |
| 32 | // * MODE_PREEMPTIVE also allows for GetThread() == NULL, which will be the case for |
| 33 | // a native-only thread calling AttachProfiler() |
| 34 | // |
| 35 | |
| 36 | // ====================================================================================== |
| 37 | |
| 38 | #include "common.h" |
| 39 | |
| 40 | #ifdef FEATURE_PROFAPI_ATTACH_DETACH |
| 41 | #include "tlhelp32.h" // For CreateToolhelp32Snapshot, etc. in MightProcessExist() |
| 42 | #include "profilinghelper.h" |
| 43 | #include "profattach.h" |
| 44 | #include "profattach.inl" |
| 45 | #include "profattachclient.h" |
| 46 | |
| 47 | // CLRProfilingImpl::AttachProfiler calls this, which itself is just a simple wrapper around |
| 48 | // code:ProfilingAPIAttachClient::AttachProfiler. See public documentation for a |
| 49 | // description of the parameters, return value, etc. |
| 50 | extern "C" HRESULT STDMETHODCALLTYPE AttachProfiler( |
| 51 | DWORD dwProfileeProcessID, |
| 52 | DWORD dwMillisecondsMax, |
| 53 | const CLSID * pClsidProfiler, |
| 54 | LPCWSTR wszProfilerPath, |
| 55 | void * pvClientData, |
| 56 | UINT cbClientData, |
| 57 | LPCWSTR wszRuntimeVersion) |
| 58 | { |
| 59 | CONTRACTL |
| 60 | { |
| 61 | NOTHROW; |
| 62 | GC_TRIGGERS; |
| 63 | MODE_PREEMPTIVE; |
| 64 | CAN_TAKE_LOCK; |
| 65 | |
| 66 | // This is the entrypoint into the EE by a trigger process. As such, this |
| 67 | // is profiling-specific and not considered mainline EE code. |
| 68 | SO_NOT_MAINLINE; |
| 69 | } |
| 70 | CONTRACTL_END; |
| 71 | |
| 72 | HRESULT hr = E_UNEXPECTED; |
| 73 | |
| 74 | EX_TRY |
| 75 | { |
| 76 | ProfilingAPIAttachClient attachClient; |
| 77 | hr = attachClient.AttachProfiler( |
| 78 | dwProfileeProcessID, |
| 79 | dwMillisecondsMax, |
| 80 | pClsidProfiler, |
| 81 | wszProfilerPath, |
| 82 | pvClientData, |
| 83 | cbClientData, |
| 84 | wszRuntimeVersion); |
| 85 | } |
| 86 | EX_CATCH |
| 87 | { |
| 88 | hr = GET_EXCEPTION()->GetHR(); |
| 89 | _ASSERTE(!"Unhandled exception executing AttachProfiler API" ); |
| 90 | } |
| 91 | EX_END_CATCH(RethrowTerminalExceptions); |
| 92 | |
| 93 | // For ease-of-use by profilers, normalize similar HRESULTs down. |
| 94 | if ((hr == HRESULT_FROM_WIN32(ERROR_BROKEN_PIPE)) || |
| 95 | (hr == HRESULT_FROM_WIN32(ERROR_PIPE_NOT_CONNECTED)) || |
| 96 | (hr == HRESULT_FROM_WIN32(ERROR_BAD_PIPE))) |
| 97 | { |
| 98 | hr = CORPROF_E_IPC_FAILED; |
| 99 | } |
| 100 | |
| 101 | return hr; |
| 102 | } |
| 103 | |
| 104 | |
| 105 | // ---------------------------------------------------------------------------- |
| 106 | // AdjustRemainingMs |
| 107 | // |
| 108 | // Description: |
| 109 | // Simple helper to do timeout arithmetic. Timeout arithmetic is based on |
| 110 | // CLRGetTickCount64, which returns an unsigned 64-bit int representing the number of |
| 111 | // milliseconds transpired since the machine has been up. Since a machine is unlikely |
| 112 | // to be up for > 500 million years, wraparound issues may be ignored. |
| 113 | // |
| 114 | // Caller repeatedly calls this function (usually once before a lenghty operation |
| 115 | // with a timeout) to check on its remaining time allotment and get alerted when time |
| 116 | // runs out. |
| 117 | // |
| 118 | // Arguments: |
| 119 | // * ui64StartTimeMs - [in] When did caller begin, in tick counts (ms)? |
| 120 | // * dwMillisecondsMax - [in] How much time does caller have, total? |
| 121 | // * pdwMillisecondsRemaining - [out] Remaining ms caller has before exceeding its |
| 122 | // timeout. |
| 123 | // |
| 124 | // Return Value: |
| 125 | // HRESULT_FROM_WIN32(ERROR_TIMEOUT) if caller is out of time; else S_OK |
| 126 | // |
| 127 | |
| 128 | static HRESULT AdjustRemainingMs( |
| 129 | ULONGLONG ui64StartTimeMs, |
| 130 | DWORD dwMillisecondsMax, |
| 131 | DWORD * pdwMillisecondsRemaining) |
| 132 | { |
| 133 | CONTRACTL |
| 134 | { |
| 135 | THROWS; |
| 136 | GC_TRIGGERS; |
| 137 | MODE_PREEMPTIVE; |
| 138 | CAN_TAKE_LOCK; |
| 139 | } |
| 140 | CONTRACTL_END; |
| 141 | |
| 142 | _ASSERTE(pdwMillisecondsRemaining != NULL); |
| 143 | |
| 144 | ULONGLONG ui64NowMs = CLRGetTickCount64(); |
| 145 | |
| 146 | if (ui64NowMs - ui64StartTimeMs > dwMillisecondsMax) |
| 147 | { |
| 148 | // Out of time! |
| 149 | return HRESULT_FROM_WIN32(ERROR_TIMEOUT); |
| 150 | } |
| 151 | |
| 152 | // How much of dwMillisecondsMax remain to be used? |
| 153 | *pdwMillisecondsRemaining = dwMillisecondsMax - static_cast<DWORD>(ui64NowMs - ui64StartTimeMs); |
| 154 | return S_OK; |
| 155 | } |
| 156 | |
| 157 | |
| 158 | // ---------------------------------------------------------------------------- |
| 159 | // ProfilingAPIAttachClient::AttachProfiler |
| 160 | // |
| 161 | // Description: |
| 162 | // Main worker for AttachProfiler API. Trigger process calls mscoree!AttachProfiler |
| 163 | // which just defers to this function to do all the work. |
| 164 | // |
| 165 | // ** See public API docs for description of params / return value. ** |
| 166 | // |
| 167 | // Note that, in the trigger process, the dwMillisecondsMax timeouts are cumulative: |
| 168 | // the caller specifies a single timeout value for the entire AttachProfiler API call. |
| 169 | // So we must constantly adjust the timeouts we use so they're based on the time |
| 170 | // remaining from the original dwMillisecondsMax specified by the AttachProfiler API |
| 171 | // client. |
| 172 | // |
| 173 | |
| 174 | HRESULT ProfilingAPIAttachClient::AttachProfiler( |
| 175 | DWORD dwProfileeProcessID, |
| 176 | DWORD dwMillisecondsMax, |
| 177 | const CLSID * pClsidProfiler, |
| 178 | LPCWSTR wszProfilerPath, |
| 179 | void * pvClientData, |
| 180 | UINT cbClientData, |
| 181 | LPCWSTR wszRuntimeVersion) |
| 182 | { |
| 183 | CONTRACTL |
| 184 | { |
| 185 | THROWS; |
| 186 | GC_TRIGGERS; |
| 187 | MODE_PREEMPTIVE; |
| 188 | CAN_TAKE_LOCK; |
| 189 | } |
| 190 | CONTRACTL_END; |
| 191 | |
| 192 | InitializeLogging(); |
| 193 | |
| 194 | HRESULT hr; |
| 195 | |
| 196 | // Is cbClientData just crazy-sick-overflow big? |
| 197 | if (cbClientData >= 0xFFFFffffUL - sizeof(AttachRequestMessage)) |
| 198 | { |
| 199 | return E_OUTOFMEMORY; |
| 200 | } |
| 201 | |
| 202 | if ((pvClientData == NULL) && (cbClientData != 0)) |
| 203 | { |
| 204 | return E_INVALIDARG; |
| 205 | } |
| 206 | |
| 207 | if (pClsidProfiler == NULL) |
| 208 | { |
| 209 | return E_INVALIDARG; |
| 210 | } |
| 211 | |
| 212 | if ((wszProfilerPath != NULL) && (wcslen(wszProfilerPath) >= MAX_LONGPATH)) |
| 213 | { |
| 214 | return E_INVALIDARG; |
| 215 | } |
| 216 | |
| 217 | // See if we can early-out due to the profilee process ID not existing. |
| 218 | // MightProcessExist() only returns FALSE if it has positively verified the process |
| 219 | // ID didn't exist when MightProcessExist() was called. So it might incorrectly |
| 220 | // return TRUE (if it hit an error trying to determine whether the process exists). |
| 221 | // But that's ok, as we'll catch a nonexistent process later on when we try to fiddle |
| 222 | // with its event & pipe. MightProcessExist() is used strictly as an optional |
| 223 | // optimization to early-out before waiting for the event to appear. |
| 224 | if (!MightProcessExist(dwProfileeProcessID)) |
| 225 | { |
| 226 | return CORPROF_E_PROFILEE_PROCESS_NOT_FOUND; |
| 227 | } |
| 228 | |
| 229 | // Adjust time out value according to env var COMPlus_ProfAPI_AttachProfilerTimeoutInMs |
| 230 | // The default is 10 seconds as we want to avoid client (trigger process) time out too early |
| 231 | // due to wait operation for concurrent GC in the server (profilee side) |
| 232 | DWORD dwMillisecondsMinFromEnv = CLRConfig::GetConfigValue(CLRConfig::EXTERNAL_ProfAPI_AttachProfilerMinTimeoutInMs); |
| 233 | |
| 234 | if (dwMillisecondsMax < dwMillisecondsMinFromEnv) |
| 235 | dwMillisecondsMax = dwMillisecondsMinFromEnv; |
| 236 | |
| 237 | #ifdef _DEBUG |
| 238 | { |
| 239 | WCHAR wszClsidProfiler[40]; |
| 240 | if (!StringFromGUID2(*pClsidProfiler, wszClsidProfiler, _countof(wszClsidProfiler))) |
| 241 | { |
| 242 | wcscpy_s(&wszClsidProfiler[0], _countof(wszClsidProfiler), W("(error)" )); |
| 243 | } |
| 244 | LOG(( |
| 245 | LF_CORPROF, |
| 246 | LL_INFO10, |
| 247 | "**PROF TRIGGER: mscorwks!AttachProfiler invoked with Trigger Process ID: '%d', " |
| 248 | "Target Profilee Process ID: '%d', dwMillisecondsMax: '%d', pClsidProfiler: '%S'," |
| 249 | "wszProfilerPath: '%S'\n" , |
| 250 | GetProcessId(GetCurrentProcess()), |
| 251 | dwProfileeProcessID, |
| 252 | dwMillisecondsMax, |
| 253 | wszClsidProfiler, |
| 254 | wszProfilerPath == NULL ? W("" ) : wszProfilerPath)); |
| 255 | } |
| 256 | #endif // _DEBUG |
| 257 | |
| 258 | // See code:AdjustRemainingMs |
| 259 | ULONGLONG ui64StartTimeMs = CLRGetTickCount64(); |
| 260 | DWORD dwMillisecondsRemaining = dwMillisecondsMax; |
| 261 | |
| 262 | HandleHolder hProfileeProcess = ::OpenProcess(PROCESS_QUERY_INFORMATION, FALSE, dwProfileeProcessID); |
| 263 | if (!hProfileeProcess) |
| 264 | { |
| 265 | LOG(( |
| 266 | LF_CORPROF, |
| 267 | LL_ERROR, |
| 268 | "**PROF TRIGGER: OpenProcess failed. LastError=0x%x.\n" , |
| 269 | ::GetLastError())); |
| 270 | return HRESULT_FROM_GetLastError(); |
| 271 | } |
| 272 | |
| 273 | StackSString attachPipeName; |
| 274 | ProfilingAPIAttachDetach::GetAttachPipeNameForPidAndVersion(hProfileeProcess, wszRuntimeVersion, &attachPipeName); |
| 275 | |
| 276 | // Try to open pipe with 0ms timeout in case the pipe is still around from |
| 277 | // a previous attach request |
| 278 | hr = OpenPipeClient(attachPipeName.GetUnicode(), 0); |
| 279 | if (hr == HRESULT_FROM_WIN32(ERROR_FILE_NOT_FOUND)) |
| 280 | { |
| 281 | // Pipe doesn't exist, so signal attach event and retry. Note that any other |
| 282 | // failure from the above OpenPipeClient call will NOT cause us to signal |
| 283 | // the attach event, as signaling the attach event can only help with making |
| 284 | // sure the pipe gets created, and nothing else. |
| 285 | StackSString attachEventName; |
| 286 | ProfilingAPIAttachDetach::GetAttachEventNameForPidAndVersion(hProfileeProcess, wszRuntimeVersion, &attachEventName); |
| 287 | hr = SignalAttachEvent(attachEventName.GetUnicode()); |
| 288 | if (FAILED(hr)) |
| 289 | { |
| 290 | LOG(( |
| 291 | LF_CORPROF, |
| 292 | LL_ERROR, |
| 293 | "**PROF TRIGGER: Unable to signal the global attach event. hr=0x%x.\n" , |
| 294 | hr)); |
| 295 | |
| 296 | // It's reasonable for SignalAttachEvent to err out if the event |
| 297 | // simply doesn't exist. This happens on server apps that just circumvent |
| 298 | // using an event. They just create the AttachThread and attach pipe on |
| 299 | // startup, and are always listening on the pipe. So if event signaling |
| 300 | // failed due to nonexistent event, keep on going and try connecting to the |
| 301 | // pipe again. But if event signaling failed for any other reason, that's |
| 302 | // unexpected so give up. |
| 303 | if (hr != HRESULT_FROM_WIN32(ERROR_FILE_NOT_FOUND)) |
| 304 | { |
| 305 | return hr; |
| 306 | } |
| 307 | } |
| 308 | |
| 309 | hr = AdjustRemainingMs(ui64StartTimeMs, dwMillisecondsMax, &dwMillisecondsRemaining); |
| 310 | if (FAILED(hr)) |
| 311 | { |
| 312 | return hr; |
| 313 | } |
| 314 | |
| 315 | hr = OpenPipeClient(attachPipeName.GetUnicode(), dwMillisecondsRemaining); |
| 316 | } |
| 317 | |
| 318 | // hr now holds the result of either the original OpenPipeClient call (if it |
| 319 | // failed for a reason other than ERROR_FILE_NOT_FOUND) or the 2nd |
| 320 | // OpenPipeClient call (if the first call yielded ERROR_FILE_NOT_FOUND and we |
| 321 | // signaled the event and retried). |
| 322 | if (FAILED(hr)) |
| 323 | { |
| 324 | LOG(( |
| 325 | LF_CORPROF, |
| 326 | LL_ERROR, |
| 327 | "**PROF TRIGGER: Unable to open a client connection to the pipe. hr=0x%x.\n" , |
| 328 | hr)); |
| 329 | return hr; |
| 330 | } |
| 331 | |
| 332 | // At this point the pipe is definitely open |
| 333 | _ASSERTE(IsValidHandle(m_hPipeClient)); |
| 334 | |
| 335 | hr = AdjustRemainingMs(ui64StartTimeMs, dwMillisecondsMax, &dwMillisecondsRemaining); |
| 336 | if (FAILED(hr)) |
| 337 | { |
| 338 | return hr; |
| 339 | } |
| 340 | |
| 341 | // Send the GetVersion message and verify we're talking the same language |
| 342 | hr = VerifyVersionIsCompatible(dwMillisecondsRemaining); |
| 343 | if (FAILED(hr)) |
| 344 | { |
| 345 | return hr; |
| 346 | } |
| 347 | |
| 348 | hr = AdjustRemainingMs(ui64StartTimeMs, dwMillisecondsMax, &dwMillisecondsRemaining); |
| 349 | if (FAILED(hr)) |
| 350 | { |
| 351 | return hr; |
| 352 | } |
| 353 | |
| 354 | // Send the attach message! |
| 355 | HRESULT hrAttach; |
| 356 | hr = SendAttachRequest( |
| 357 | dwMillisecondsRemaining, |
| 358 | pClsidProfiler, |
| 359 | wszProfilerPath, |
| 360 | pvClientData, |
| 361 | cbClientData, |
| 362 | &hrAttach); |
| 363 | if (FAILED(hr)) |
| 364 | { |
| 365 | return hr; |
| 366 | } |
| 367 | |
| 368 | LOG(( |
| 369 | LF_CORPROF, |
| 370 | LL_INFO10, |
| 371 | "**PROF TRIGGER: AttachProfiler succeeded sending attach request. Trigger Process ID: '%d', " |
| 372 | "Target Profilee Process ID: '%d', Attach HRESULT: '0x%x'\n" , |
| 373 | GetProcessId(GetCurrentProcess()), |
| 374 | dwProfileeProcessID, |
| 375 | hrAttach)); |
| 376 | |
| 377 | return hrAttach; |
| 378 | } |
| 379 | |
| 380 | // ---------------------------------------------------------------------------- |
| 381 | // ProfilingAPIAttachClient::MightProcessExist |
| 382 | // |
| 383 | // Description: |
| 384 | // Returns BOOL indicating whether a process with the specified process ID might exist |
| 385 | // on the local computer. |
| 386 | // |
| 387 | // Arguments: |
| 388 | // * dwProcessID - Process ID to look up |
| 389 | // |
| 390 | // Return Value: |
| 391 | // nonzero if process might possibly exist; FALSE if not |
| 392 | // |
| 393 | // Notes: |
| 394 | // * Since processes come and go while this function executes, this should only be |
| 395 | // used on a process ID that is supposed to exist both before and after this |
| 396 | // function returns. A return of FALSE reliably tells you that supposition is |
| 397 | // wrong. A return of TRUE, however, only means the process ID existed when this |
| 398 | // function did its search. It's still possible the process has exited by the time |
| 399 | // this function returns. |
| 400 | // * If this function is unsure of a process's existence (e.g., if it encounters an |
| 401 | // error while trying to find out), it errs on the side of optimism and returns |
| 402 | // TRUE. |
| 403 | // |
| 404 | |
| 405 | BOOL ProfilingAPIAttachClient::MightProcessExist(DWORD dwProcessID) |
| 406 | { |
| 407 | CONTRACTL |
| 408 | { |
| 409 | NOTHROW; |
| 410 | GC_NOTRIGGER; |
| 411 | FORBID_FAULT; |
| 412 | MODE_ANY; |
| 413 | CANNOT_TAKE_LOCK; |
| 414 | } |
| 415 | CONTRACTL_END; |
| 416 | |
| 417 | // There are a few ways to check whether a process exists. Some dismissed |
| 418 | // alternatives: |
| 419 | // |
| 420 | // * OpenProcess() with a "limited" access right. |
| 421 | // * Even relatively limited access rights such as SYNCHRONIZE and |
| 422 | // PROCESS_QUERY_INFORMATION often fail with ERROR_ACCESS_DENIED, even if |
| 423 | // the caller is running as administrator. |
| 424 | // |
| 425 | // * EnumProcesses() + search through returned PIDs |
| 426 | // * EnumProcesses() requires psychic powers to know how big to allocate the |
| 427 | // array of PIDs to receive (EnumProcesses() won't give you a hint if |
| 428 | // you're wrong). |
| 429 | // |
| 430 | // Method of choice is CreateToolhelp32Snapshot, which gives an enumerator to iterate |
| 431 | // through all processes. |
| 432 | |
| 433 | // Take a snapshot of all processes in the system. |
| 434 | HandleHolder hProcessSnap = CreateToolhelp32Snapshot( |
| 435 | TH32CS_SNAPPROCESS, |
| 436 | 0 // Unused when snap type is TH32CS_SNAPPROCESS |
| 437 | ); |
| 438 | if (hProcessSnap == INVALID_HANDLE_VALUE) |
| 439 | { |
| 440 | // Dunno if process exists. Err on the side of optimism |
| 441 | return TRUE; |
| 442 | } |
| 443 | |
| 444 | // Set the size of the structure before using it. |
| 445 | PROCESSENTRY32 entry; |
| 446 | ZeroMemory(&entry, sizeof(entry)); |
| 447 | entry.dwSize = sizeof(PROCESSENTRY32); |
| 448 | |
| 449 | // Start enumeration with Process32First. It will set dwSize to tell us how many |
| 450 | // members of PROCESSENTRY32 we can trust. We only need th32ProcessID |
| 451 | if (!Process32First(hProcessSnap, &entry) || |
| 452 | (offsetof(PROCESSENTRY32, th32ProcessID) + sizeof(entry.th32ProcessID) > entry.dwSize)) |
| 453 | { |
| 454 | // Can't tell if process exists, so assume it might |
| 455 | return TRUE; |
| 456 | } |
| 457 | |
| 458 | do |
| 459 | { |
| 460 | if (entry.th32ProcessID == dwProcessID) |
| 461 | { |
| 462 | // Definitely exists |
| 463 | return TRUE; |
| 464 | } |
| 465 | } while (Process32Next(hProcessSnap, &entry)); |
| 466 | |
| 467 | // Process32Next() failed. Return FALSE only if we exhausted our search |
| 468 | return (GetLastError() != ERROR_NO_MORE_FILES); |
| 469 | } |
| 470 | |
| 471 | |
| 472 | |
| 473 | // ---------------------------------------------------------------------------- |
| 474 | // ProfilingAPIAttachClient::OpenPipeClient |
| 475 | // |
| 476 | // Description: |
| 477 | // Attempts to create a client connection to the remote server pipe |
| 478 | // |
| 479 | // Arguments: |
| 480 | // * wszPipeName - Name of pipe to connect to. |
| 481 | // * dwMillisecondsMax - Total ms to spend trying to connect to the pipe. |
| 482 | // |
| 483 | // Return Value: |
| 484 | // HRESULT indicating success / failure |
| 485 | // |
| 486 | |
| 487 | HRESULT ProfilingAPIAttachClient::OpenPipeClient( |
| 488 | LPCWSTR wszPipeName, |
| 489 | DWORD dwMillisecondsMax) |
| 490 | { |
| 491 | CONTRACTL |
| 492 | { |
| 493 | THROWS; |
| 494 | GC_TRIGGERS; |
| 495 | MODE_PREEMPTIVE; |
| 496 | CAN_TAKE_LOCK; |
| 497 | } |
| 498 | CONTRACTL_END; |
| 499 | |
| 500 | const DWORD kSleepMsUntilRetryCreateFile = 100; |
| 501 | HRESULT hr; |
| 502 | DWORD dwErr; |
| 503 | |
| 504 | // See code:AdjustRemainingMs |
| 505 | ULONGLONG ui64StartTimeMs = CLRGetTickCount64(); |
| 506 | DWORD dwMillisecondsRemaining = dwMillisecondsMax; |
| 507 | |
| 508 | HandleHolder hPipeClient; |
| 509 | |
| 510 | // We need to wait until the pipe is both CREATED (i.e., target profilee app has |
| 511 | // created the server end of the pipe) and AVAILABLE (i.e., no other trigger has opened |
| 512 | // the client end to the pipe). There is no Win32 API to wait until the pipe is |
| 513 | // CREATED, so we must make our own retry loop that calls CreateFileW. Once the pipe |
| 514 | // is known to be CREATED, we can use WaitNamedPipe to wait until the pipe is |
| 515 | // AVAILABLE. (Note: It would have been nice if we could use WaitNamedPipe to wait |
| 516 | // until the pipe is both CREATED and AVAILABLE. But WaitNamedPipe just returns an |
| 517 | // error immediately if the pipe is not yet CREATED, regardless of the timeout value |
| 518 | // specified.) |
| 519 | while (TRUE) |
| 520 | { |
| 521 | // This CreateFile call doesn't create the pipe. The pipe must be created by the |
| 522 | // target profilee. This CreateFile call attempts to open a client connection to |
| 523 | // the pipe. If CreateFile succeeds, that implies the pipe had already been |
| 524 | // successfully CREATED by the target profilee, and is AVAILABLE, and we now have |
| 525 | // a client connection to the pipe ready to go. |
| 526 | hPipeClient = CreateFileW( |
| 527 | wszPipeName, |
| 528 | GENERIC_READ | GENERIC_WRITE, |
| 529 | 0, // dwShareMode (i.e., no sharing) |
| 530 | NULL, // lpSecurityAttributes (i.e., handle not inheritable and |
| 531 | // only current user may access this handle) |
| 532 | OPEN_EXISTING, // Only open (don't create) the pipe |
| 533 | FILE_FLAG_OVERLAPPED, // Using overlapped I/O allows async ops w/ timeout |
| 534 | NULL); // hTemplateFile |
| 535 | |
| 536 | if (hPipeClient != INVALID_HANDLE_VALUE) |
| 537 | { |
| 538 | // CreateFile succeeded! Pipe is CREATED (by target profilee) |
| 539 | // and AVAILABLE and we're connected |
| 540 | break; |
| 541 | } |
| 542 | |
| 543 | // Opening the pipe failed. Why? |
| 544 | dwErr = GetLastError(); |
| 545 | switch(dwErr) |
| 546 | { |
| 547 | default: |
| 548 | // Any error other than the ones specifically brought out below isn't |
| 549 | // retry-able (e.g., security failure) |
| 550 | return HRESULT_FROM_WIN32(dwErr); |
| 551 | |
| 552 | case ERROR_FILE_NOT_FOUND: |
| 553 | // Pipe not CREATED yet. Can we retry? |
| 554 | if (dwMillisecondsRemaining <= kSleepMsUntilRetryCreateFile) |
| 555 | { |
| 556 | // No time left, gotta bail! |
| 557 | return HRESULT_FROM_WIN32(ERROR_FILE_NOT_FOUND); |
| 558 | } |
| 559 | |
| 560 | // Sleep and retry |
| 561 | // (bAlertable=FALSE: don't wake up due to overlapped I/O) |
| 562 | ClrSleepEx(kSleepMsUntilRetryCreateFile, FALSE); |
| 563 | dwMillisecondsRemaining -= kSleepMsUntilRetryCreateFile; |
| 564 | break; |
| 565 | |
| 566 | case ERROR_PIPE_BUSY: |
| 567 | // Pipe CREATED, but it's not AVAILABLE. Wait until it's AVAILABLE |
| 568 | |
| 569 | LOG(( |
| 570 | LF_CORPROF, |
| 571 | LL_INFO10, |
| 572 | "**PROF TRIGGER: Found pipe, but pipe is busy. Waiting until pipe is available.\n" )); |
| 573 | |
| 574 | hr = AdjustRemainingMs(ui64StartTimeMs, dwMillisecondsMax, &dwMillisecondsRemaining); |
| 575 | if (FAILED(hr)) |
| 576 | { |
| 577 | return HRESULT_FROM_WIN32(ERROR_PIPE_BUSY); |
| 578 | } |
| 579 | |
| 580 | if (!WaitNamedPipeW(wszPipeName, dwMillisecondsRemaining)) |
| 581 | { |
| 582 | // If we timeout here, convert the error into something more useful |
| 583 | dwErr = GetLastError(); |
| 584 | if ((dwErr == ERROR_TIMEOUT) || (dwErr == ERROR_SEM_TIMEOUT)) |
| 585 | { |
| 586 | return HRESULT_FROM_WIN32(ERROR_PIPE_BUSY); |
| 587 | } |
| 588 | |
| 589 | // Failed for a reason other timeout. Send that reason back to caller |
| 590 | LOG(( |
| 591 | LF_CORPROF, |
| 592 | LL_ERROR, |
| 593 | "**PROF TRIGGER: WaitNamedPipe failed for a reason other timeout. hr=0x%x.\n" , |
| 594 | HRESULT_FROM_WIN32(dwErr))); |
| 595 | return HRESULT_FROM_WIN32(dwErr); |
| 596 | } |
| 597 | |
| 598 | // Pipe should be ready to open now, so retry. Note that it's still |
| 599 | // possible that another client sneaks in and connects before we get a |
| 600 | // chance to. If that happens, CreateFile will fail again, and we'll end up |
| 601 | // here waiting again (until we timeout). |
| 602 | break; |
| 603 | } |
| 604 | } |
| 605 | |
| 606 | // Only way to exit loop above is if pipe is CREATED and AVAILABLE. |
| 607 | _ASSERTE(IsValidHandle(hPipeClient)); |
| 608 | |
| 609 | // We now have a valid handle on the pipe, which means we're connected |
| 610 | // to the pipe, and no one else is |
| 611 | |
| 612 | // change to message-read mode. |
| 613 | DWORD dwMode = PIPE_READMODE_MESSAGE; |
| 614 | if (!SetNamedPipeHandleState( |
| 615 | hPipeClient, // pipe handle |
| 616 | &dwMode, // new pipe mode (PIPE_READMODE_MESSAGE) |
| 617 | NULL, // lpMaxCollectionCount, must be NULL when client & server on same box |
| 618 | NULL)) // lpCollectDataTimeout, must be NULL when client & server on same box |
| 619 | { |
| 620 | hr = HRESULT_FROM_GetLastError(); |
| 621 | LOG(( |
| 622 | LF_CORPROF, |
| 623 | LL_ERROR, |
| 624 | "**PROF TRIGGER: SetNamedPipeHandleState failed. hr=0x%x.\n" , |
| 625 | hr)); |
| 626 | return hr; |
| 627 | } |
| 628 | |
| 629 | // Pipe's client handle is now ready for use by this class |
| 630 | m_hPipeClient = (HANDLE) hPipeClient; |
| 631 | |
| 632 | // Ownership transferred to this class, so this function shouldn't call CloseHandle() |
| 633 | hPipeClient.SuppressRelease(); |
| 634 | |
| 635 | return S_OK; |
| 636 | } |
| 637 | |
| 638 | |
| 639 | // ---------------------------------------------------------------------------- |
| 640 | // ProfilingAPIAttachClient::SignalAttachEvent |
| 641 | // |
| 642 | // Description: |
| 643 | // Trigger process calls this (indirectly via AttachProfiler()) to find, open, and |
| 644 | // signal the Globally Named Attach Event. |
| 645 | // |
| 646 | // Arguments: |
| 647 | // * wszEventName - Name of event to signal |
| 648 | // |
| 649 | // Return Value: |
| 650 | // HRESULT indicating success or failure. |
| 651 | // |
| 652 | |
| 653 | HRESULT ProfilingAPIAttachClient::SignalAttachEvent(LPCWSTR wszEventName) |
| 654 | { |
| 655 | CONTRACTL |
| 656 | { |
| 657 | THROWS; |
| 658 | GC_TRIGGERS; |
| 659 | MODE_PREEMPTIVE; |
| 660 | CAN_TAKE_LOCK; |
| 661 | } |
| 662 | CONTRACTL_END; |
| 663 | |
| 664 | HandleHolder hAttachEvent; |
| 665 | |
| 666 | hAttachEvent = OpenEventW( |
| 667 | EVENT_MODIFY_STATE, // dwDesiredAccess |
| 668 | FALSE, // bInheritHandle |
| 669 | wszEventName); |
| 670 | if (hAttachEvent == NULL) |
| 671 | { |
| 672 | return HRESULT_FROM_GetLastError(); |
| 673 | } |
| 674 | |
| 675 | // Dealing directly with Windows event objects, not CLR event cookies, so |
| 676 | // using Win32 API directly. Note that none of this code executes on Unix, |
| 677 | // so the CLR wrapper is of no use to us anyway. |
| 678 | #pragma push_macro("SetEvent") |
| 679 | #undef SetEvent |
| 680 | if (!SetEvent(hAttachEvent)) |
| 681 | #pragma pop_macro("SetEvent") |
| 682 | { |
| 683 | return HRESULT_FROM_GetLastError(); |
| 684 | } |
| 685 | |
| 686 | return S_OK; |
| 687 | } |
| 688 | |
| 689 | |
| 690 | // ---------------------------------------------------------------------------- |
| 691 | // ProfilingAPIAttachClient::VerifyVersionIsCompatible |
| 692 | // |
| 693 | // Description: |
| 694 | // Sends a GetVersion request message across the pipe to the target profilee, reads |
| 695 | // the response, and determines if the response allows for compatible communication. |
| 696 | // |
| 697 | // Arguments: |
| 698 | // * dwMillisecondsMax - How much time do we have left to wait for the response? |
| 699 | // |
| 700 | // Return Value: |
| 701 | // HRESULT indicating success or failure. If pipe communication succeeds, but we |
| 702 | // determine that the response doesn't allow for compatible communication, return |
| 703 | // CORPROF_E_PROFILEE_INCOMPATIBLE_WITH_TRIGGER. |
| 704 | // |
| 705 | // Assumptions: |
| 706 | // * Client connection should be established before calling this function (or a |
| 707 | // callee will assert). |
| 708 | // |
| 709 | |
| 710 | HRESULT ProfilingAPIAttachClient::VerifyVersionIsCompatible( |
| 711 | DWORD dwMillisecondsMax) |
| 712 | { |
| 713 | STANDARD_VM_CONTRACT; |
| 714 | HRESULT hr; |
| 715 | DWORD cbReceived; |
| 716 | GetVersionRequestMessage requestMsg; |
| 717 | GetVersionResponseMessage responseMsg; |
| 718 | |
| 719 | hr = SendAndReceive( |
| 720 | dwMillisecondsMax, |
| 721 | reinterpret_cast<LPVOID>(&requestMsg), |
| 722 | static_cast<DWORD>(sizeof(requestMsg)), |
| 723 | reinterpret_cast<LPVOID>(&responseMsg), |
| 724 | static_cast<DWORD>(sizeof(responseMsg)), |
| 725 | &cbReceived); |
| 726 | if (FAILED(hr)) |
| 727 | { |
| 728 | return hr; |
| 729 | } |
| 730 | |
| 731 | // Did profilee successfully carry out the GetVersion request? |
| 732 | if (FAILED(responseMsg.m_hr)) |
| 733 | { |
| 734 | return responseMsg.m_hr; |
| 735 | } |
| 736 | |
| 737 | // We should have valid version info for the target profilee. Now do the |
| 738 | // comparisons to determine if we're compatible. |
| 739 | if ( |
| 740 | // Am I too old (i.e., profilee requires a newer trigger)? |
| 741 | (ProfilingAPIAttachDetach::kCurrentProcessVersion < |
| 742 | responseMsg.m_minimumAllowableTriggerVersion) || |
| 743 | |
| 744 | // Is the profilee too old (i.e., this trigger requires a newer profilee)? |
| 745 | (responseMsg.m_profileeVersion < |
| 746 | ProfilingAPIAttachDetach::kMinimumAllowableProfileeVersion)) |
| 747 | { |
| 748 | return CORPROF_E_PROFILEE_INCOMPATIBLE_WITH_TRIGGER; |
| 749 | } |
| 750 | |
| 751 | return S_OK; |
| 752 | } |
| 753 | |
| 754 | |
| 755 | // ---------------------------------------------------------------------------- |
| 756 | // ProfilingAPIAttachClient::SendAttachRequest |
| 757 | // |
| 758 | // Description: |
| 759 | // Sends an Attach request message across the pipe to the target profilee, and returns |
| 760 | // the response. |
| 761 | // |
| 762 | // Arguments: |
| 763 | // * dwMillisecondsMax - [in] How much time is left to wait for response? |
| 764 | // * pClsidProfiler - [in] CLSID of profiler to attach |
| 765 | // * pvClientData - [in] Client data to pass to profiler's InitializeForAttach |
| 766 | // callback |
| 767 | // * cbClientData - [in] Size of client data |
| 768 | // * phrAttach - [out] Response HRESULT sent back by target profilee |
| 769 | // |
| 770 | // Return Value: |
| 771 | // HRESULT indicating success / failure with sending request & receiving response. If |
| 772 | // S_OK is returned, consult phrAttach to determine success / failure of the actual |
| 773 | // attach operation. |
| 774 | // |
| 775 | // Assumptions: |
| 776 | // * Client connection should be established before calling this function (or a callee |
| 777 | // will assert). |
| 778 | // |
| 779 | |
| 780 | HRESULT ProfilingAPIAttachClient::SendAttachRequest( |
| 781 | DWORD dwMillisecondsMax, |
| 782 | const CLSID * pClsidProfiler, |
| 783 | LPCWSTR wszProfilerPath, |
| 784 | void * pvClientData, |
| 785 | UINT cbClientData, |
| 786 | HRESULT * phrAttach) |
| 787 | { |
| 788 | CONTRACTL |
| 789 | { |
| 790 | THROWS; |
| 791 | GC_TRIGGERS; |
| 792 | MODE_PREEMPTIVE; |
| 793 | CAN_TAKE_LOCK; |
| 794 | } |
| 795 | CONTRACTL_END; |
| 796 | |
| 797 | _ASSERTE(phrAttach != NULL); |
| 798 | |
| 799 | // These were already verified early on |
| 800 | _ASSERTE(cbClientData < 0xFFFFffffUL - sizeof(AttachRequestMessageV2)); |
| 801 | _ASSERTE((pvClientData != NULL) || (cbClientData == 0)); |
| 802 | |
| 803 | // Allocate enough space for the message, including the variable-length client data. |
| 804 | DWORD cbMessage = sizeof(AttachRequestMessageV2) + cbClientData; |
| 805 | _ASSERTE(cbMessage >= sizeof(AttachRequestMessageV2)); |
| 806 | NewHolder<BYTE> pbMessageStart(new (nothrow) BYTE[cbMessage]); |
| 807 | if (pbMessageStart == NULL) |
| 808 | { |
| 809 | return E_OUTOFMEMORY; |
| 810 | } |
| 811 | |
| 812 | // Initialize the message. First the client data at the tail end... |
| 813 | memcpy(pbMessageStart + sizeof(AttachRequestMessageV2), pvClientData, cbClientData); |
| 814 | |
| 815 | // ...then the message struct fields (use constructor in-place) |
| 816 | new ((void *) pbMessageStart) AttachRequestMessageV2( |
| 817 | cbMessage, |
| 818 | ProfilingAPIAttachDetach::kCurrentProcessVersion, // Version of the trigger process |
| 819 | pClsidProfiler, |
| 820 | wszProfilerPath, |
| 821 | sizeof(AttachRequestMessageV2), // dwClientDataStartOffset |
| 822 | cbClientData, |
| 823 | dwMillisecondsMax |
| 824 | ); |
| 825 | |
| 826 | HRESULT hr; |
| 827 | DWORD cbReceived; |
| 828 | AttachResponseMessage attachResponseMessage(E_UNEXPECTED); |
| 829 | |
| 830 | hr = SendAndReceive( |
| 831 | dwMillisecondsMax, |
| 832 | (LPVOID) pbMessageStart, |
| 833 | cbMessage, |
| 834 | reinterpret_cast<LPVOID>(&attachResponseMessage), |
| 835 | static_cast<DWORD>(sizeof(attachResponseMessage)), |
| 836 | &cbReceived); |
| 837 | if (FAILED(hr)) |
| 838 | { |
| 839 | return hr; |
| 840 | } |
| 841 | |
| 842 | // Successfully got a response from target. The response contained the HRESULT |
| 843 | // indicating whether the attach was successful, so return that HRESULT in the [out] |
| 844 | // param. |
| 845 | *phrAttach = attachResponseMessage.m_hr; |
| 846 | return S_OK; |
| 847 | } |
| 848 | |
| 849 | |
| 850 | // ---------------------------------------------------------------------------- |
| 851 | // ProfilingAPIAttachClient::SendAndReceive |
| 852 | // |
| 853 | // Description: |
| 854 | // Used in trigger process to send a request and receive the response. |
| 855 | // |
| 856 | // Arguments: |
| 857 | // * dwMillisecondsMax - [in] Timeout for entire send/receive operation |
| 858 | // * pvInBuffer - [in] Buffer contaning the request message |
| 859 | // * cbInBuffer - [in] Number of bytes in the request message |
| 860 | // * pvOutBuffer - [in/out] Buffer to write the response into |
| 861 | // * cbOutBuffer - [in] Size of the response buffer |
| 862 | // * pcbReceived - [out] Number of bytes actually written into response buffer |
| 863 | // |
| 864 | // Return Value: |
| 865 | // HRESULT indicating success or failure |
| 866 | // |
| 867 | // Notes: |
| 868 | // * The [out] parameters may be written to even if this function fails. But their |
| 869 | // contents should be ignored by the caller in this case. |
| 870 | // |
| 871 | |
| 872 | HRESULT ProfilingAPIAttachClient::SendAndReceive( |
| 873 | DWORD dwMillisecondsMax, |
| 874 | LPVOID pvInBuffer, |
| 875 | DWORD cbInBuffer, |
| 876 | LPVOID pvOutBuffer, |
| 877 | DWORD cbOutBuffer, |
| 878 | DWORD * pcbReceived) |
| 879 | { |
| 880 | CONTRACTL |
| 881 | { |
| 882 | THROWS; |
| 883 | GC_TRIGGERS; |
| 884 | MODE_PREEMPTIVE; |
| 885 | CAN_TAKE_LOCK; |
| 886 | } |
| 887 | CONTRACTL_END; |
| 888 | |
| 889 | _ASSERTE(IsValidHandle(m_hPipeClient)); |
| 890 | _ASSERTE(pvInBuffer != NULL); |
| 891 | _ASSERTE(pvOutBuffer != NULL); |
| 892 | _ASSERTE(pcbReceived != NULL); |
| 893 | |
| 894 | HRESULT hr; |
| 895 | DWORD dwErr; |
| 896 | ProfilingAPIAttachDetach::OverlappedResultHolder overlapped; |
| 897 | hr = overlapped.Initialize(); |
| 898 | if (FAILED(hr)) |
| 899 | { |
| 900 | return hr; |
| 901 | } |
| 902 | |
| 903 | if (TransactNamedPipe( |
| 904 | m_hPipeClient, |
| 905 | pvInBuffer, |
| 906 | cbInBuffer, |
| 907 | pvOutBuffer, |
| 908 | cbOutBuffer, |
| 909 | pcbReceived, |
| 910 | overlapped)) |
| 911 | { |
| 912 | // Hot dog! Send and receive succeeded immediately! All done. |
| 913 | return S_OK; |
| 914 | } |
| 915 | |
| 916 | dwErr = GetLastError(); |
| 917 | if (dwErr != ERROR_IO_PENDING) |
| 918 | { |
| 919 | // An unexpected error. Caller has to deal with it |
| 920 | hr = HRESULT_FROM_WIN32(dwErr); |
| 921 | LOG(( |
| 922 | LF_CORPROF, |
| 923 | LL_ERROR, |
| 924 | "**PROF TRIGGER: TransactNamedPipe failed. hr=0x%x.\n" , |
| 925 | hr)); |
| 926 | return hr; |
| 927 | } |
| 928 | |
| 929 | // Typical case=ERROR_IO_PENDING: TransactNamedPipe has begun the transaction, and |
| 930 | // it's still in progress. Wait until it's done (or timeout expires). |
| 931 | hr = overlapped.Wait( |
| 932 | dwMillisecondsMax, |
| 933 | m_hPipeClient, |
| 934 | pcbReceived); |
| 935 | if (FAILED(hr)) |
| 936 | { |
| 937 | LOG(( |
| 938 | LF_CORPROF, |
| 939 | LL_ERROR, |
| 940 | "**PROF TRIGGER: Waiting for overlapped result for TransactNamedPipe failed. hr=0x%x.\n" , |
| 941 | hr)); |
| 942 | return hr; |
| 943 | } |
| 944 | |
| 945 | return S_OK; |
| 946 | } |
| 947 | |
| 948 | #endif // FEATURE_PROFAPI_ATTACH_DETACH |
| 949 | |