src/os_cpu/linux_x86/vm/thread_linux_x86.hpp

Wed, 25 Sep 2013 13:58:13 +0200

author
dsimms
date
Wed, 25 Sep 2013 13:58:13 +0200
changeset 5781
899ecf76b570
parent 5237
f2110083203d
child 6876
710a3c8b516e
child 8877
f04097176542
permissions
-rw-r--r--

8023956: Provide a work-around to broken Linux 32 bit "Exec Shield" using CS for NX emulation (crashing with SI_KERNEL)
Summary: Execute some code at a high virtual address value, and keep mapped
Reviewed-by: coleenp, zgu

     1 /*
     2  * Copyright (c) 2000, 2013, Oracle and/or its affiliates. All rights reserved.
     3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
     4  *
     5  * This code is free software; you can redistribute it and/or modify it
     6  * under the terms of the GNU General Public License version 2 only, as
     7  * published by the Free Software Foundation.
     8  *
     9  * This code is distributed in the hope that it will be useful, but WITHOUT
    10  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
    11  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
    12  * version 2 for more details (a copy is included in the LICENSE file that
    13  * accompanied this code).
    14  *
    15  * You should have received a copy of the GNU General Public License version
    16  * 2 along with this work; if not, write to the Free Software Foundation,
    17  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
    18  *
    19  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
    20  * or visit www.oracle.com if you need additional information or have any
    21  * questions.
    22  *
    23  */
    25 #ifndef OS_CPU_LINUX_X86_VM_THREAD_LINUX_X86_HPP
    26 #define OS_CPU_LINUX_X86_VM_THREAD_LINUX_X86_HPP
    28  private:
    29   void pd_initialize() {
    30     _anchor.clear();
    31   }
    33   frame pd_last_frame() {
    34     assert(has_last_Java_frame(), "must have last_Java_sp() when suspended");
    35     if (_anchor.last_Java_pc() != NULL) {
    36       return frame(_anchor.last_Java_sp(), _anchor.last_Java_fp(), _anchor.last_Java_pc());
    37     } else {
    38       // This will pick up pc from sp
    39       return frame(_anchor.last_Java_sp(), _anchor.last_Java_fp());
    40     }
    41   }
    43  public:
    44   // Mutators are highly dangerous....
    45   intptr_t* last_Java_fp()                       { return _anchor.last_Java_fp(); }
    46   void  set_last_Java_fp(intptr_t* fp)           { _anchor.set_last_Java_fp(fp);   }
    48   void set_base_of_stack_pointer(intptr_t* base_sp) {
    49   }
    51   static ByteSize last_Java_fp_offset()          {
    52     return byte_offset_of(JavaThread, _anchor) + JavaFrameAnchor::last_Java_fp_offset();
    53   }
    55   intptr_t* base_of_stack_pointer() {
    56     return NULL;
    57   }
    58   void record_base_of_stack_pointer() {
    59   }
    61   bool pd_get_top_frame_for_signal_handler(frame* fr_addr, void* ucontext,
    62     bool isInJava);
    64   bool pd_get_top_frame_for_profiling(frame* fr_addr, void* ucontext, bool isInJava);
    65 private:
    66   bool pd_get_top_frame(frame* fr_addr, void* ucontext, bool isInJava);
    67 public:
    69   // These routines are only used on cpu architectures that
    70   // have separate register stacks (Itanium).
    71   static bool register_stack_overflow() { return false; }
    72   static void enable_register_stack_guard() {}
    73   static void disable_register_stack_guard() {}
    75 #endif // OS_CPU_LINUX_X86_VM_THREAD_LINUX_X86_HPP

mercurial