src/os_cpu/linux_sparc/vm/os_linux_sparc.cpp

Wed, 17 Jul 2013 13:48:15 +0200

author
rbackman
date
Wed, 17 Jul 2013 13:48:15 +0200
changeset 5424
5e3b6f79d280
parent 4993
746b070f5022
child 5426
af21010d1062
permissions
-rw-r--r--

8020701: Avoid crashes in WatcherThread
Reviewed-by: acorn, dcubed, dsimms

     1 /*
     2  * Copyright (c) 1999, 2012, Oracle and/or its affiliates. All rights reserved.
     3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
     4  *
     5  * This code is free software; you can redistribute it and/or modify it
     6  * under the terms of the GNU General Public License version 2 only, as
     7  * published by the Free Software Foundation.
     8  *
     9  * This code is distributed in the hope that it will be useful, but WITHOUT
    10  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
    11  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
    12  * version 2 for more details (a copy is included in the LICENSE file that
    13  * accompanied this code).
    14  *
    15  * You should have received a copy of the GNU General Public License version
    16  * 2 along with this work; if not, write to the Free Software Foundation,
    17  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
    18  *
    19  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
    20  * or visit www.oracle.com if you need additional information or have any
    21  * questions.
    22  *
    23  */
    25 // no precompiled headers
    26 #include "asm/macroAssembler.hpp"
    27 #include "classfile/classLoader.hpp"
    28 #include "classfile/systemDictionary.hpp"
    29 #include "classfile/vmSymbols.hpp"
    30 #include "code/icBuffer.hpp"
    31 #include "code/vtableStubs.hpp"
    32 #include "interpreter/interpreter.hpp"
    33 #include "jvm_linux.h"
    34 #include "memory/allocation.inline.hpp"
    35 #include "mutex_linux.inline.hpp"
    36 #include "nativeInst_sparc.hpp"
    37 #include "os_share_linux.hpp"
    38 #include "prims/jniFastGetField.hpp"
    39 #include "prims/jvm.h"
    40 #include "prims/jvm_misc.hpp"
    41 #include "runtime/arguments.hpp"
    42 #include "runtime/extendedPC.hpp"
    43 #include "runtime/frame.inline.hpp"
    44 #include "runtime/interfaceSupport.hpp"
    45 #include "runtime/java.hpp"
    46 #include "runtime/javaCalls.hpp"
    47 #include "runtime/mutexLocker.hpp"
    48 #include "runtime/osThread.hpp"
    49 #include "runtime/sharedRuntime.hpp"
    50 #include "runtime/stubRoutines.hpp"
    51 #include "runtime/thread.inline.hpp"
    52 #include "runtime/timer.hpp"
    53 #include "utilities/events.hpp"
    54 #include "utilities/vmError.hpp"
    56 // Linux/Sparc has rather obscure naming of registers in sigcontext
    57 // different between 32 and 64 bits
    58 #ifdef _LP64
    59 #define SIG_PC(x) ((x)->sigc_regs.tpc)
    60 #define SIG_NPC(x) ((x)->sigc_regs.tnpc)
    61 #define SIG_REGS(x) ((x)->sigc_regs)
    62 #else
    63 #define SIG_PC(x) ((x)->si_regs.pc)
    64 #define SIG_NPC(x) ((x)->si_regs.npc)
    65 #define SIG_REGS(x) ((x)->si_regs)
    66 #endif
    68 // those are to reference registers in sigcontext
    69 enum {
    70   CON_G0 = 0,
    71   CON_G1,
    72   CON_G2,
    73   CON_G3,
    74   CON_G4,
    75   CON_G5,
    76   CON_G6,
    77   CON_G7,
    78   CON_O0,
    79   CON_O1,
    80   CON_O2,
    81   CON_O3,
    82   CON_O4,
    83   CON_O5,
    84   CON_O6,
    85   CON_O7,
    86 };
    88 static inline void set_cont_address(sigcontext* ctx, address addr) {
    89   SIG_PC(ctx)  = (intptr_t)addr;
    90   SIG_NPC(ctx) = (intptr_t)(addr+4);
    91 }
    93 // For Forte Analyzer AsyncGetCallTrace profiling support - thread is
    94 // currently interrupted by SIGPROF.
    95 // os::Solaris::fetch_frame_from_ucontext() tries to skip nested
    96 // signal frames. Currently we don't do that on Linux, so it's the
    97 // same as os::fetch_frame_from_context().
    98 ExtendedPC os::Linux::fetch_frame_from_ucontext(Thread* thread,
    99                                                 ucontext_t* uc,
   100                                                 intptr_t** ret_sp,
   101                                                 intptr_t** ret_fp) {
   102   assert(thread != NULL, "just checking");
   103   assert(ret_sp != NULL, "just checking");
   104   assert(ret_fp != NULL, "just checking");
   106   return os::fetch_frame_from_context(uc, ret_sp, ret_fp);
   107 }
   109 ExtendedPC os::fetch_frame_from_context(void* ucVoid,
   110                                         intptr_t** ret_sp,
   111                                         intptr_t** ret_fp) {
   112   ucontext_t* uc = (ucontext_t*) ucVoid;
   113   ExtendedPC  epc;
   115   if (uc != NULL) {
   116     epc = ExtendedPC(os::Linux::ucontext_get_pc(uc));
   117     if (ret_sp) {
   118       *ret_sp = os::Linux::ucontext_get_sp(uc);
   119     }
   120     if (ret_fp) {
   121       *ret_fp = os::Linux::ucontext_get_fp(uc);
   122     }
   123   } else {
   124     // construct empty ExtendedPC for return value checking
   125     epc = ExtendedPC(NULL);
   126     if (ret_sp) {
   127       *ret_sp = (intptr_t*) NULL;
   128     }
   129     if (ret_fp) {
   130       *ret_fp = (intptr_t*) NULL;
   131     }
   132   }
   134   return epc;
   135 }
   137 frame os::fetch_frame_from_context(void* ucVoid) {
   138   intptr_t* sp;
   139   intptr_t* fp;
   140   ExtendedPC epc = fetch_frame_from_context(ucVoid, &sp, &fp);
   141   return frame(sp, fp, epc.pc());
   142 }
   144 frame os::get_sender_for_C_frame(frame* fr) {
   145   return frame(fr->sender_sp(), fr->link(), fr->sender_pc());
   146 }
   148 frame os::current_frame() {
   149   fprintf(stderr, "current_frame()");
   151   intptr_t* sp = StubRoutines::Sparc::flush_callers_register_windows_func()();
   152   frame myframe(sp, frame::unpatchable,
   153                 CAST_FROM_FN_PTR(address, os::current_frame));
   154   if (os::is_first_C_frame(&myframe)) {
   155     // stack is not walkable
   156     return frame(NULL, frame::unpatchable, NULL);
   157   } else {
   158     return os::get_sender_for_C_frame(&myframe);
   159   }
   160 }
   162 address os::current_stack_pointer() {
   163   register void *sp __asm__ ("sp");
   164   return (address)sp;
   165 }
   167 static void current_stack_region(address* bottom, size_t* size) {
   168   if (os::Linux::is_initial_thread()) {
   169     // initial thread needs special handling because pthread_getattr_np()
   170     // may return bogus value.
   171     *bottom = os::Linux::initial_thread_stack_bottom();
   172     *size = os::Linux::initial_thread_stack_size();
   173   } else {
   174     pthread_attr_t attr;
   176     int rslt = pthread_getattr_np(pthread_self(), &attr);
   178     // JVM needs to know exact stack location, abort if it fails
   179     if (rslt != 0) {
   180       if (rslt == ENOMEM) {
   181         vm_exit_out_of_memory(0, OOM_MMAP_ERROR, "pthread_getattr_np");
   182       } else {
   183         fatal(err_msg("pthread_getattr_np failed with errno = %d", rslt));
   184       }
   185     }
   187     if (pthread_attr_getstack(&attr, (void**)bottom, size) != 0) {
   188       fatal("Can not locate current stack attributes!");
   189     }
   191     pthread_attr_destroy(&attr);
   192   }
   193   assert(os::current_stack_pointer() >= *bottom &&
   194          os::current_stack_pointer() < *bottom + *size, "just checking");
   195 }
   197 address os::current_stack_base() {
   198   address bottom;
   199   size_t size;
   200   current_stack_region(&bottom, &size);
   201   return bottom + size;
   202 }
   204 size_t os::current_stack_size() {
   205   // stack size includes normal stack and HotSpot guard pages
   206   address bottom;
   207   size_t size;
   208   current_stack_region(&bottom, &size);
   209   return size;
   210 }
   212 char* os::non_memory_address_word() {
   213   // Must never look like an address returned by reserve_memory,
   214   // even in its subfields (as defined by the CPU immediate fields,
   215   // if the CPU splits constants across multiple instructions).
   216   // On SPARC, 0 != %hi(any real address), because there is no
   217   // allocation in the first 1Kb of the virtual address space.
   218   return (char*) 0;
   219 }
   221 void os::initialize_thread(Thread* thr) {}
   223 void os::print_context(outputStream *st, void *context) {
   224   if (context == NULL) return;
   226   ucontext_t* uc = (ucontext_t*)context;
   227   sigcontext* sc = (sigcontext*)context;
   228   st->print_cr("Registers:");
   230   st->print_cr(" G1=" INTPTR_FORMAT " G2=" INTPTR_FORMAT
   231                " G3=" INTPTR_FORMAT " G4=" INTPTR_FORMAT,
   232                SIG_REGS(sc).u_regs[CON_G1],
   233                SIG_REGS(sc).u_regs[CON_G2],
   234                SIG_REGS(sc).u_regs[CON_G3],
   235                SIG_REGS(sc).u_regs[CON_G4]);
   236   st->print_cr(" G5=" INTPTR_FORMAT " G6=" INTPTR_FORMAT
   237                " G7=" INTPTR_FORMAT " Y=" INTPTR_FORMAT,
   238                SIG_REGS(sc).u_regs[CON_G5],
   239                SIG_REGS(sc).u_regs[CON_G6],
   240                SIG_REGS(sc).u_regs[CON_G7],
   241                SIG_REGS(sc).y);
   242   st->print_cr(" O0=" INTPTR_FORMAT " O1=" INTPTR_FORMAT
   243                " O2=" INTPTR_FORMAT " O3=" INTPTR_FORMAT,
   244                SIG_REGS(sc).u_regs[CON_O0],
   245                SIG_REGS(sc).u_regs[CON_O1],
   246                SIG_REGS(sc).u_regs[CON_O2],
   247                SIG_REGS(sc).u_regs[CON_O3]);
   248   st->print_cr(" O4=" INTPTR_FORMAT " O5=" INTPTR_FORMAT
   249                " O6=" INTPTR_FORMAT " O7=" INTPTR_FORMAT,
   250                SIG_REGS(sc).u_regs[CON_O4],
   251                SIG_REGS(sc).u_regs[CON_O5],
   252                SIG_REGS(sc).u_regs[CON_O6],
   253                SIG_REGS(sc).u_regs[CON_O7]);
   256   intptr_t *sp = (intptr_t *)os::Linux::ucontext_get_sp(uc);
   257   st->print_cr(" L0=" INTPTR_FORMAT " L1=" INTPTR_FORMAT
   258                " L2=" INTPTR_FORMAT " L3=" INTPTR_FORMAT,
   259                sp[L0->sp_offset_in_saved_window()],
   260                sp[L1->sp_offset_in_saved_window()],
   261                sp[L2->sp_offset_in_saved_window()],
   262                sp[L3->sp_offset_in_saved_window()]);
   263   st->print_cr(" L4=" INTPTR_FORMAT " L5=" INTPTR_FORMAT
   264                " L6=" INTPTR_FORMAT " L7=" INTPTR_FORMAT,
   265                sp[L4->sp_offset_in_saved_window()],
   266                sp[L5->sp_offset_in_saved_window()],
   267                sp[L6->sp_offset_in_saved_window()],
   268                sp[L7->sp_offset_in_saved_window()]);
   269   st->print_cr(" I0=" INTPTR_FORMAT " I1=" INTPTR_FORMAT
   270                " I2=" INTPTR_FORMAT " I3=" INTPTR_FORMAT,
   271                sp[I0->sp_offset_in_saved_window()],
   272                sp[I1->sp_offset_in_saved_window()],
   273                sp[I2->sp_offset_in_saved_window()],
   274                sp[I3->sp_offset_in_saved_window()]);
   275   st->print_cr(" I4=" INTPTR_FORMAT " I5=" INTPTR_FORMAT
   276                " I6=" INTPTR_FORMAT " I7=" INTPTR_FORMAT,
   277                sp[I4->sp_offset_in_saved_window()],
   278                sp[I5->sp_offset_in_saved_window()],
   279                sp[I6->sp_offset_in_saved_window()],
   280                sp[I7->sp_offset_in_saved_window()]);
   282   st->print_cr(" PC=" INTPTR_FORMAT " nPC=" INTPTR_FORMAT,
   283                SIG_PC(sc),
   284                SIG_NPC(sc));
   285   st->cr();
   286   st->cr();
   288   st->print_cr("Top of Stack: (sp=" PTR_FORMAT ")", sp);
   289   print_hex_dump(st, (address)sp, (address)(sp + 32), sizeof(intptr_t));
   290   st->cr();
   292   // Note: it may be unsafe to inspect memory near pc. For example, pc may
   293   // point to garbage if entry point in an nmethod is corrupted. Leave
   294   // this at the end, and hope for the best.
   295   address pc = os::Linux::ucontext_get_pc(uc);
   296   st->print_cr("Instructions: (pc=" PTR_FORMAT ")", pc);
   297   print_hex_dump(st, pc - 32, pc + 32, sizeof(char));
   298 }
   301 void os::print_register_info(outputStream *st, void *context) {
   302   if (context == NULL) return;
   304   ucontext_t *uc = (ucontext_t*)context;
   305   intptr_t *sp = (intptr_t *)os::Linux::ucontext_get_sp(uc);
   307   st->print_cr("Register to memory mapping:");
   308   st->cr();
   310   // this is only for the "general purpose" registers
   311   st->print("G1="); print_location(st, SIG_REGS(sc).u_regs[CON__G1]);
   312   st->print("G2="); print_location(st, SIG_REGS(sc).u_regs[CON__G2]);
   313   st->print("G3="); print_location(st, SIG_REGS(sc).u_regs[CON__G3]);
   314   st->print("G4="); print_location(st, SIG_REGS(sc).u_regs[CON__G4]);
   315   st->print("G5="); print_location(st, SIG_REGS(sc).u_regs[CON__G5]);
   316   st->print("G6="); print_location(st, SIG_REGS(sc).u_regs[CON__G6]);
   317   st->print("G7="); print_location(st, SIG_REGS(sc).u_regs[CON__G7]);
   318   st->cr();
   320   st->print("O0="); print_location(st, SIG_REGS(sc).u_regs[CON__O0]);
   321   st->print("O1="); print_location(st, SIG_REGS(sc).u_regs[CON__O1]);
   322   st->print("O2="); print_location(st, SIG_REGS(sc).u_regs[CON__O2]);
   323   st->print("O3="); print_location(st, SIG_REGS(sc).u_regs[CON__O3]);
   324   st->print("O4="); print_location(st, SIG_REGS(sc).u_regs[CON__O4]);
   325   st->print("O5="); print_location(st, SIG_REGS(sc).u_regs[CON__O5]);
   326   st->print("O6="); print_location(st, SIG_REGS(sc).u_regs[CON__O6]);
   327   st->print("O7="); print_location(st, SIG_REGS(sc).u_regs[CON__O7]);
   328   st->cr();
   330   st->print("L0="); print_location(st, sp[L0->sp_offset_in_saved_window()]);
   331   st->print("L1="); print_location(st, sp[L1->sp_offset_in_saved_window()]);
   332   st->print("L2="); print_location(st, sp[L2->sp_offset_in_saved_window()]);
   333   st->print("L3="); print_location(st, sp[L3->sp_offset_in_saved_window()]);
   334   st->print("L4="); print_location(st, sp[L4->sp_offset_in_saved_window()]);
   335   st->print("L5="); print_location(st, sp[L5->sp_offset_in_saved_window()]);
   336   st->print("L6="); print_location(st, sp[L6->sp_offset_in_saved_window()]);
   337   st->print("L7="); print_location(st, sp[L7->sp_offset_in_saved_window()]);
   338   st->cr();
   340   st->print("I0="); print_location(st, sp[I0->sp_offset_in_saved_window()]);
   341   st->print("I1="); print_location(st, sp[I1->sp_offset_in_saved_window()]);
   342   st->print("I2="); print_location(st, sp[I2->sp_offset_in_saved_window()]);
   343   st->print("I3="); print_location(st, sp[I3->sp_offset_in_saved_window()]);
   344   st->print("I4="); print_location(st, sp[I4->sp_offset_in_saved_window()]);
   345   st->print("I5="); print_location(st, sp[I5->sp_offset_in_saved_window()]);
   346   st->print("I6="); print_location(st, sp[I6->sp_offset_in_saved_window()]);
   347   st->print("I7="); print_location(st, sp[I7->sp_offset_in_saved_window()]);
   348   st->cr();
   349 }
   352 address os::Linux::ucontext_get_pc(ucontext_t* uc) {
   353   return (address) SIG_PC((sigcontext*)uc);
   354 }
   356 intptr_t* os::Linux::ucontext_get_sp(ucontext_t *uc) {
   357   return (intptr_t*)
   358     ((intptr_t)SIG_REGS((sigcontext*)uc).u_regs[CON_O6] + STACK_BIAS);
   359 }
   361 // not used on Sparc
   362 intptr_t* os::Linux::ucontext_get_fp(ucontext_t *uc) {
   363   ShouldNotReachHere();
   364   return NULL;
   365 }
   367 // Utility functions
   369 extern "C" void Fetch32PFI();
   370 extern "C" void Fetch32Resume();
   371 extern "C" void FetchNPFI();
   372 extern "C" void FetchNResume();
   374 inline static bool checkPrefetch(sigcontext* uc, address pc) {
   375   if (pc == (address) Fetch32PFI) {
   376     set_cont_address(uc, address(Fetch32Resume));
   377     return true;
   378   }
   379   if (pc == (address) FetchNPFI) {
   380     set_cont_address(uc, address(FetchNResume));
   381     return true;
   382   }
   383   return false;
   384 }
   386 inline static bool checkOverflow(sigcontext* uc,
   387                                  address pc,
   388                                  address addr,
   389                                  JavaThread* thread,
   390                                  address* stub) {
   391   // check if fault address is within thread stack
   392   if (addr < thread->stack_base() &&
   393       addr >= thread->stack_base() - thread->stack_size()) {
   394     // stack overflow
   395     if (thread->in_stack_yellow_zone(addr)) {
   396       thread->disable_stack_yellow_zone();
   397       if (thread->thread_state() == _thread_in_Java) {
   398         // Throw a stack overflow exception.  Guard pages will be reenabled
   399         // while unwinding the stack.
   400         *stub =
   401           SharedRuntime::continuation_for_implicit_exception(thread,
   402                                                              pc,
   403                                                              SharedRuntime::STACK_OVERFLOW);
   404       } else {
   405         // Thread was in the vm or native code.  Return and try to finish.
   406         return true;
   407       }
   408     } else if (thread->in_stack_red_zone(addr)) {
   409       // Fatal red zone violation.  Disable the guard pages and fall through
   410       // to handle_unexpected_exception way down below.
   411       thread->disable_stack_red_zone();
   412       tty->print_raw_cr("An irrecoverable stack overflow has occurred.");
   414       // This is a likely cause, but hard to verify. Let's just print
   415       // it as a hint.
   416       tty->print_raw_cr("Please check if any of your loaded .so files has "
   417                         "enabled executable stack (see man page execstack(8))");
   418     } else {
   419       // Accessing stack address below sp may cause SEGV if current
   420       // thread has MAP_GROWSDOWN stack. This should only happen when
   421       // current thread was created by user code with MAP_GROWSDOWN flag
   422       // and then attached to VM. See notes in os_linux.cpp.
   423       if (thread->osthread()->expanding_stack() == 0) {
   424         thread->osthread()->set_expanding_stack();
   425         if (os::Linux::manually_expand_stack(thread, addr)) {
   426           thread->osthread()->clear_expanding_stack();
   427           return true;
   428         }
   429         thread->osthread()->clear_expanding_stack();
   430       } else {
   431         fatal("recursive segv. expanding stack.");
   432       }
   433     }
   434   }
   435   return false;
   436 }
   438 inline static bool checkPollingPage(address pc, address fault, address* stub) {
   439   if (fault == os::get_polling_page()) {
   440     *stub = SharedRuntime::get_poll_stub(pc);
   441     return true;
   442   }
   443   return false;
   444 }
   446 inline static bool checkByteBuffer(address pc, address* stub) {
   447   // BugId 4454115: A read from a MappedByteBuffer can fault
   448   // here if the underlying file has been truncated.
   449   // Do not crash the VM in such a case.
   450   CodeBlob* cb = CodeCache::find_blob_unsafe(pc);
   451   nmethod* nm = cb->is_nmethod() ? (nmethod*)cb : NULL;
   452   if (nm != NULL && nm->has_unsafe_access()) {
   453     *stub = StubRoutines::handler_for_unsafe_access();
   454     return true;
   455   }
   456   return false;
   457 }
   459 inline static bool checkVerifyOops(address pc, address fault, address* stub) {
   460   if (pc >= MacroAssembler::_verify_oop_implicit_branch[0]
   461       && pc <  MacroAssembler::_verify_oop_implicit_branch[1] ) {
   462     *stub     =  MacroAssembler::_verify_oop_implicit_branch[2];
   463     warning("fixed up memory fault in +VerifyOops at address "
   464             INTPTR_FORMAT, fault);
   465     return true;
   466   }
   467   return false;
   468 }
   470 inline static bool checkFPFault(address pc, int code,
   471                                 JavaThread* thread, address* stub) {
   472   if (code == FPE_INTDIV || code == FPE_FLTDIV) {
   473     *stub =
   474       SharedRuntime::
   475       continuation_for_implicit_exception(thread,
   476                                           pc,
   477                                           SharedRuntime::IMPLICIT_DIVIDE_BY_ZERO);
   478     return true;
   479   }
   480   return false;
   481 }
   483 inline static bool checkNullPointer(address pc, intptr_t fault,
   484                                     JavaThread* thread, address* stub) {
   485   if (!MacroAssembler::needs_explicit_null_check(fault)) {
   486     // Determination of interpreter/vtable stub/compiled code null
   487     // exception
   488     *stub =
   489       SharedRuntime::
   490       continuation_for_implicit_exception(thread, pc,
   491                                           SharedRuntime::IMPLICIT_NULL);
   492     return true;
   493   }
   494   return false;
   495 }
   497 inline static bool checkFastJNIAccess(address pc, address* stub) {
   498   address addr = JNI_FastGetField::find_slowcase_pc(pc);
   499   if (addr != (address)-1) {
   500     *stub = addr;
   501     return true;
   502   }
   503   return false;
   504 }
   506 inline static bool checkSerializePage(JavaThread* thread, address addr) {
   507   return os::is_memory_serialize_page(thread, addr);
   508 }
   510 inline static bool checkZombie(sigcontext* uc, address* pc, address* stub) {
   511   if (nativeInstruction_at(*pc)->is_zombie()) {
   512     // zombie method (ld [%g0],%o7 instruction)
   513     *stub = SharedRuntime::get_handle_wrong_method_stub();
   515     // At the stub it needs to look like a call from the caller of this
   516     // method (not a call from the segv site).
   517     *pc = (address)SIG_REGS(uc).u_regs[CON_O7];
   518     return true;
   519   }
   520   return false;
   521 }
   523 inline static bool checkICMiss(sigcontext* uc, address* pc, address* stub) {
   524 #ifdef COMPILER2
   525   if (nativeInstruction_at(*pc)->is_ic_miss_trap()) {
   526 #ifdef ASSERT
   527 #ifdef TIERED
   528     CodeBlob* cb = CodeCache::find_blob_unsafe(pc);
   529     assert(cb->is_compiled_by_c2(), "Wrong compiler");
   530 #endif // TIERED
   531 #endif // ASSERT
   532     // Inline cache missed and user trap "Tne G0+ST_RESERVED_FOR_USER_0+2" taken.
   533     *stub = SharedRuntime::get_ic_miss_stub();
   534     // At the stub it needs to look like a call from the caller of this
   535     // method (not a call from the segv site).
   536     *pc = (address)SIG_REGS(uc).u_regs[CON_O7];
   537     return true;
   538   }
   539 #endif  // COMPILER2
   540   return false;
   541 }
   543 extern "C" JNIEXPORT int
   544 JVM_handle_linux_signal(int sig,
   545                         siginfo_t* info,
   546                         void* ucVoid,
   547                         int abort_if_unrecognized) {
   548   // in fact this isn't ucontext_t* at all, but struct sigcontext*
   549   // but Linux porting layer uses ucontext_t, so to minimize code change
   550   // we cast as needed
   551   ucontext_t* ucFake = (ucontext_t*) ucVoid;
   552   sigcontext* uc = (sigcontext*)ucVoid;
   554   Thread* t = ThreadLocalStorage::get_thread_slow();
   556   // Must do this before SignalHandlerMark, if crash protection installed we will longjmp away
   557   // (no destructors can be run)
   558   os::WatcherThreadCrashProtection::check_crash_protection(sig, t);
   560   SignalHandlerMark shm(t);
   562   // Note: it's not uncommon that JNI code uses signal/sigset to install
   563   // then restore certain signal handler (e.g. to temporarily block SIGPIPE,
   564   // or have a SIGILL handler when detecting CPU type). When that happens,
   565   // JVM_handle_linux_signal() might be invoked with junk info/ucVoid. To
   566   // avoid unnecessary crash when libjsig is not preloaded, try handle signals
   567   // that do not require siginfo/ucontext first.
   569   if (sig == SIGPIPE || sig == SIGXFSZ) {
   570     // allow chained handler to go first
   571     if (os::Linux::chained_handler(sig, info, ucVoid)) {
   572       return true;
   573     } else {
   574       if (PrintMiscellaneous && (WizardMode || Verbose)) {
   575         char buf[64];
   576         warning("Ignoring %s - see bugs 4229104 or 646499219",
   577                 os::exception_name(sig, buf, sizeof(buf)));
   578       }
   579       return true;
   580     }
   581   }
   583   JavaThread* thread = NULL;
   584   VMThread* vmthread = NULL;
   585   if (os::Linux::signal_handlers_are_installed) {
   586     if (t != NULL ){
   587       if(t->is_Java_thread()) {
   588         thread = (JavaThread*)t;
   589       }
   590       else if(t->is_VM_thread()){
   591         vmthread = (VMThread *)t;
   592       }
   593     }
   594   }
   596   // decide if this trap can be handled by a stub
   597   address stub = NULL;
   598   address pc = NULL;
   599   address npc = NULL;
   601   //%note os_trap_1
   602   if (info != NULL && uc != NULL && thread != NULL) {
   603     pc = address(SIG_PC(uc));
   604     npc = address(SIG_NPC(uc));
   606     // Check to see if we caught the safepoint code in the
   607     // process of write protecting the memory serialization page.
   608     // It write enables the page immediately after protecting it
   609     // so we can just return to retry the write.
   610     if ((sig == SIGSEGV) && checkSerializePage(thread, (address)info->si_addr)) {
   611       // Block current thread until the memory serialize page permission restored.
   612       os::block_on_serialize_page_trap();
   613       return 1;
   614     }
   616     if (checkPrefetch(uc, pc)) {
   617       return 1;
   618     }
   620     // Handle ALL stack overflow variations here
   621     if (sig == SIGSEGV) {
   622       if (checkOverflow(uc, pc, (address)info->si_addr, thread, &stub)) {
   623         return 1;
   624       }
   625     }
   627     if (sig == SIGBUS &&
   628         thread->thread_state() == _thread_in_vm &&
   629         thread->doing_unsafe_access()) {
   630       stub = StubRoutines::handler_for_unsafe_access();
   631     }
   633     if (thread->thread_state() == _thread_in_Java) {
   634       do {
   635         // Java thread running in Java code => find exception handler if any
   636         // a fault inside compiled code, the interpreter, or a stub
   638         if ((sig == SIGSEGV) && checkPollingPage(pc, (address)info->si_addr, &stub)) {
   639           break;
   640         }
   642         if ((sig == SIGBUS) && checkByteBuffer(pc, &stub)) {
   643           break;
   644         }
   646         if ((sig == SIGSEGV || sig == SIGBUS) &&
   647             checkVerifyOops(pc, (address)info->si_addr, &stub)) {
   648           break;
   649         }
   651         if ((sig == SIGSEGV) && checkZombie(uc, &pc, &stub)) {
   652           break;
   653         }
   655         if ((sig == SIGILL) && checkICMiss(uc, &pc, &stub)) {
   656           break;
   657         }
   659         if ((sig == SIGFPE) && checkFPFault(pc, info->si_code, thread, &stub)) {
   660           break;
   661         }
   663         if ((sig == SIGSEGV) &&
   664             checkNullPointer(pc, (intptr_t)info->si_addr, thread, &stub)) {
   665           break;
   666         }
   667       } while (0);
   669       // jni_fast_Get<Primitive>Field can trap at certain pc's if a GC kicks in
   670       // and the heap gets shrunk before the field access.
   671       if ((sig == SIGSEGV) || (sig == SIGBUS)) {
   672         checkFastJNIAccess(pc, &stub);
   673       }
   674     }
   676     if (stub != NULL) {
   677       // save all thread context in case we need to restore it
   678       thread->set_saved_exception_pc(pc);
   679       thread->set_saved_exception_npc(npc);
   680       set_cont_address(uc, stub);
   681       return true;
   682     }
   683   }
   685   // signal-chaining
   686   if (os::Linux::chained_handler(sig, info, ucVoid)) {
   687     return true;
   688   }
   690   if (!abort_if_unrecognized) {
   691     // caller wants another chance, so give it to him
   692     return false;
   693   }
   695   if (pc == NULL && uc != NULL) {
   696     pc = os::Linux::ucontext_get_pc((ucontext_t*)uc);
   697   }
   699   // unmask current signal
   700   sigset_t newset;
   701   sigemptyset(&newset);
   702   sigaddset(&newset, sig);
   703   sigprocmask(SIG_UNBLOCK, &newset, NULL);
   705   VMError err(t, sig, pc, info, ucVoid);
   706   err.report_and_die();
   708   ShouldNotReachHere();
   709 }
   711 void os::Linux::init_thread_fpu_state(void) {
   712   // Nothing to do
   713 }
   715 int os::Linux::get_fpu_control_word() {
   716   return 0;
   717 }
   719 void os::Linux::set_fpu_control_word(int fpu) {
   720   // nothing
   721 }
   723 bool os::is_allocatable(size_t bytes) {
   724 #ifdef _LP64
   725   return true;
   726 #else
   727   if (bytes < 2 * G) {
   728     return true;
   729   }
   731   char* addr = reserve_memory(bytes, NULL);
   733   if (addr != NULL) {
   734     release_memory(addr, bytes);
   735   }
   737   return addr != NULL;
   738 #endif // _LP64
   739 }
   741 ///////////////////////////////////////////////////////////////////////////////
   742 // thread stack
   744 size_t os::Linux::min_stack_allowed  = 128 * K;
   746 // pthread on Ubuntu is always in floating stack mode
   747 bool os::Linux::supports_variable_stack_size() {  return true; }
   749 // return default stack size for thr_type
   750 size_t os::Linux::default_stack_size(os::ThreadType thr_type) {
   751   // default stack size (compiler thread needs larger stack)
   752   size_t s = (thr_type == os::compiler_thread ? 4 * M : 1 * M);
   753   return s;
   754 }
   756 size_t os::Linux::default_guard_size(os::ThreadType thr_type) {
   757   // Creating guard page is very expensive. Java thread has HotSpot
   758   // guard page, only enable glibc guard page for non-Java threads.
   759   return (thr_type == java_thread ? 0 : page_size());
   760 }
   762 #ifndef PRODUCT
   763 void os::verify_stack_alignment() {
   764 }
   765 #endif

mercurial