src/os_cpu/linux_x86/vm/thread_linux_x86.hpp

Wed, 25 Sep 2013 13:58:13 +0200

author
dsimms
date
Wed, 25 Sep 2013 13:58:13 +0200
changeset 5781
899ecf76b570
parent 5237
f2110083203d
child 6876
710a3c8b516e
child 8877
f04097176542
permissions
-rw-r--r--

8023956: Provide a work-around to broken Linux 32 bit "Exec Shield" using CS for NX emulation (crashing with SI_KERNEL)
Summary: Execute some code at a high virtual address value, and keep mapped
Reviewed-by: coleenp, zgu

duke@435 1 /*
sla@5237 2 * Copyright (c) 2000, 2013, Oracle and/or its affiliates. All rights reserved.
duke@435 3 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
duke@435 4 *
duke@435 5 * This code is free software; you can redistribute it and/or modify it
duke@435 6 * under the terms of the GNU General Public License version 2 only, as
duke@435 7 * published by the Free Software Foundation.
duke@435 8 *
duke@435 9 * This code is distributed in the hope that it will be useful, but WITHOUT
duke@435 10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
duke@435 11 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
duke@435 12 * version 2 for more details (a copy is included in the LICENSE file that
duke@435 13 * accompanied this code).
duke@435 14 *
duke@435 15 * You should have received a copy of the GNU General Public License version
duke@435 16 * 2 along with this work; if not, write to the Free Software Foundation,
duke@435 17 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
duke@435 18 *
trims@1907 19 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
trims@1907 20 * or visit www.oracle.com if you need additional information or have any
trims@1907 21 * questions.
duke@435 22 *
duke@435 23 */
duke@435 24
stefank@2314 25 #ifndef OS_CPU_LINUX_X86_VM_THREAD_LINUX_X86_HPP
stefank@2314 26 #define OS_CPU_LINUX_X86_VM_THREAD_LINUX_X86_HPP
stefank@2314 27
duke@435 28 private:
duke@435 29 void pd_initialize() {
duke@435 30 _anchor.clear();
duke@435 31 }
duke@435 32
duke@435 33 frame pd_last_frame() {
duke@435 34 assert(has_last_Java_frame(), "must have last_Java_sp() when suspended");
duke@435 35 if (_anchor.last_Java_pc() != NULL) {
duke@435 36 return frame(_anchor.last_Java_sp(), _anchor.last_Java_fp(), _anchor.last_Java_pc());
duke@435 37 } else {
duke@435 38 // This will pick up pc from sp
duke@435 39 return frame(_anchor.last_Java_sp(), _anchor.last_Java_fp());
duke@435 40 }
duke@435 41 }
duke@435 42
duke@435 43 public:
duke@435 44 // Mutators are highly dangerous....
duke@435 45 intptr_t* last_Java_fp() { return _anchor.last_Java_fp(); }
duke@435 46 void set_last_Java_fp(intptr_t* fp) { _anchor.set_last_Java_fp(fp); }
duke@435 47
duke@435 48 void set_base_of_stack_pointer(intptr_t* base_sp) {
duke@435 49 }
duke@435 50
duke@435 51 static ByteSize last_Java_fp_offset() {
duke@435 52 return byte_offset_of(JavaThread, _anchor) + JavaFrameAnchor::last_Java_fp_offset();
duke@435 53 }
duke@435 54
duke@435 55 intptr_t* base_of_stack_pointer() {
duke@435 56 return NULL;
duke@435 57 }
duke@435 58 void record_base_of_stack_pointer() {
duke@435 59 }
duke@435 60
duke@435 61 bool pd_get_top_frame_for_signal_handler(frame* fr_addr, void* ucontext,
duke@435 62 bool isInJava);
duke@435 63
sla@5237 64 bool pd_get_top_frame_for_profiling(frame* fr_addr, void* ucontext, bool isInJava);
sla@5237 65 private:
sla@5237 66 bool pd_get_top_frame(frame* fr_addr, void* ucontext, bool isInJava);
sla@5237 67 public:
sla@5237 68
duke@435 69 // These routines are only used on cpu architectures that
duke@435 70 // have separate register stacks (Itanium).
duke@435 71 static bool register_stack_overflow() { return false; }
duke@435 72 static void enable_register_stack_guard() {}
duke@435 73 static void disable_register_stack_guard() {}
stefank@2314 74
stefank@2314 75 #endif // OS_CPU_LINUX_X86_VM_THREAD_LINUX_X86_HPP

mercurial