File: | jdk/src/hotspot/os/posix/signals_posix.cpp |
Warning: | line 1304, column 5 Called function pointer is null (null dereference) |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
1 | /* | |||
2 | * Copyright (c) 2021, Oracle and/or its affiliates. All rights reserved. | |||
3 | * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. | |||
4 | * | |||
5 | * This code is free software; you can redistribute it and/or modify it | |||
6 | * under the terms of the GNU General Public License version 2 only, as | |||
7 | * published by the Free Software Foundation. | |||
8 | * | |||
9 | * This code is distributed in the hope that it will be useful, but WITHOUT | |||
10 | * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or | |||
11 | * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License | |||
12 | * version 2 for more details (a copy is included in the LICENSE file that | |||
13 | * accompanied this code). | |||
14 | * | |||
15 | * You should have received a copy of the GNU General Public License version | |||
16 | * 2 along with this work; if not, write to the Free Software Foundation, | |||
17 | * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. | |||
18 | * | |||
19 | * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA | |||
20 | * or visit www.oracle.com if you need additional information or have any | |||
21 | * questions. | |||
22 | * | |||
23 | */ | |||
24 | ||||
25 | #include "precompiled.hpp" | |||
26 | ||||
27 | #include "jvm.h" | |||
28 | #include "logging/log.hpp" | |||
29 | #include "runtime/atomic.hpp" | |||
30 | #include "runtime/globals.hpp" | |||
31 | #include "runtime/interfaceSupport.inline.hpp" | |||
32 | #include "runtime/java.hpp" | |||
33 | #include "runtime/os.hpp" | |||
34 | #include "runtime/osThread.hpp" | |||
35 | #include "runtime/semaphore.inline.hpp" | |||
36 | #include "runtime/stubRoutines.hpp" | |||
37 | #include "runtime/thread.hpp" | |||
38 | #include "signals_posix.hpp" | |||
39 | #include "utilities/events.hpp" | |||
40 | #include "utilities/ostream.hpp" | |||
41 | #include "utilities/vmError.hpp" | |||
42 | ||||
43 | #ifdef ZERO | |||
44 | // See stubGenerator_zero.cpp | |||
45 | #include <setjmp.h> | |||
46 | extern sigjmp_buf* get_jmp_buf_for_continuation(); | |||
47 | #endif | |||
48 | ||||
49 | #include <signal.h> | |||
50 | ||||
51 | ||||
52 | static const char* get_signal_name(int sig, char* out, size_t outlen); | |||
53 | ||||
54 | // Returns address of a handler associated with the given sigaction | |||
55 | static address get_signal_handler(const struct sigaction* action); | |||
56 | ||||
57 | #define HANDLER_IS(handler, address)((handler) == ((void*)((address_word)((address))))) ((handler) == CAST_FROM_FN_PTR(void*, (address))((void*)((address_word)((address))))) | |||
58 | #define HANDLER_IS_IGN(handler)(((handler) == ((void*)((address_word)((((__sighandler_t) 1)) ))))) (HANDLER_IS(handler, SIG_IGN)((handler) == ((void*)((address_word)((((__sighandler_t) 1))) )))) | |||
59 | #define HANDLER_IS_DFL(handler)(((handler) == ((void*)((address_word)((((__sighandler_t) 0)) ))))) (HANDLER_IS(handler, SIG_DFL)((handler) == ((void*)((address_word)((((__sighandler_t) 0))) )))) | |||
60 | #define HANDLER_IS_IGN_OR_DFL(handler)((((handler) == ((void*)((address_word)((((__sighandler_t) 1) )))))) || (((handler) == ((void*)((address_word)((((__sighandler_t ) 0)))))))) (HANDLER_IS_IGN(handler)(((handler) == ((void*)((address_word)((((__sighandler_t) 1)) ))))) || HANDLER_IS_DFL(handler)(((handler) == ((void*)((address_word)((((__sighandler_t) 0)) )))))) | |||
61 | ||||
62 | // Various signal related mechanism are laid out in the following order: | |||
63 | // | |||
64 | // sun.misc.Signal | |||
65 | // signal chaining | |||
66 | // signal handling (except suspend/resume) | |||
67 | // suspend/resume | |||
68 | ||||
69 | // Helper function to strip any flags from a sigaction sa_flag | |||
70 | // which are not needed for semantic comparison (see remarks below | |||
71 | // about SA_RESTORER on Linux). | |||
72 | // Also to work around the fact that not all platforms define sa_flags | |||
73 | // as signed int (looking at you, zlinux). | |||
74 | static int get_sanitized_sa_flags(const struct sigaction* sa) { | |||
75 | int f = (int) sa->sa_flags; | |||
76 | #ifdef LINUX1 | |||
77 | // Glibc on Linux uses the SA_RESTORER flag to indicate | |||
78 | // the use of a "signal trampoline". We have no interest | |||
79 | // in this flag and need to ignore it when checking our | |||
80 | // own flag settings. | |||
81 | // Note: SA_RESTORER is not exposed through signal.h so we | |||
82 | // have to hardcode its 0x04000000 value here. | |||
83 | const int sa_restorer_flag = 0x04000000; | |||
84 | f &= ~sa_restorer_flag; | |||
85 | #endif // LINUX | |||
86 | return f; | |||
87 | } | |||
88 | ||||
89 | // Todo: provide a os::get_max_process_id() or similar. Number of processes | |||
90 | // may have been configured, can be read more accurately from proc fs etc. | |||
91 | #ifndef MAX_PID2147483647 | |||
92 | #define MAX_PID2147483647 INT_MAX2147483647 | |||
93 | #endif | |||
94 | #define IS_VALID_PID(p)(p > 0 && p < 2147483647) (p > 0 && p < MAX_PID2147483647) | |||
95 | ||||
96 | #define NUM_IMPORTANT_SIGS32 32 | |||
97 | ||||
98 | extern "C" { | |||
99 | typedef void (*sa_handler_t)(int); | |||
100 | typedef void (*sa_sigaction_t)(int, siginfo_t *, void *); | |||
101 | } | |||
102 | ||||
103 | // At various places we store handler information for each installed handler. | |||
104 | // SavedSignalHandlers is a helper class for those cases, keeping an array of sigaction | |||
105 | // structures. | |||
106 | class SavedSignalHandlers { | |||
107 | // Note: NSIG can be largish, depending on platform, and this array is expected | |||
108 | // to be sparsely populated. To save space the contained structures are | |||
109 | // C-heap allocated. Since they only get added outside of signal handling | |||
110 | // this is no problem. | |||
111 | struct sigaction* _sa[NSIG(64 + 1)]; | |||
112 | ||||
113 | bool check_signal_number(int sig) const { | |||
114 | assert(sig > 0 && sig < NSIG, "invalid signal number %d", sig)do { if (!(sig > 0 && sig < (64 + 1))) { (*g_assert_poison ) = 'X';; report_vm_error("/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 114, "assert(" "sig > 0 && sig < (64 + 1)" ") failed" , "invalid signal number %d", sig); ::breakpoint(); } } while (0); | |||
115 | return sig > 0 && sig < NSIG(64 + 1); | |||
116 | } | |||
117 | ||||
118 | public: | |||
119 | ||||
120 | SavedSignalHandlers() { | |||
121 | ::memset(_sa, 0, sizeof(_sa)); | |||
122 | } | |||
123 | ||||
124 | ~SavedSignalHandlers() { | |||
125 | for (int i = 0; i < NSIG(64 + 1); i ++) { | |||
126 | FREE_C_HEAP_OBJ(_sa[i])FreeHeap((char*)_sa[i]);; | |||
127 | } | |||
128 | } | |||
129 | ||||
130 | void set(int sig, const struct sigaction* act) { | |||
131 | if (check_signal_number(sig)) { | |||
132 | assert(_sa[sig] == NULL, "Overwriting signal handler?")do { if (!(_sa[sig] == __null)) { (*g_assert_poison) = 'X';; report_vm_error ("/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 132, "assert(" "_sa[sig] == __null" ") failed", "Overwriting signal handler?" ); ::breakpoint(); } } while (0); | |||
133 | _sa[sig] = NEW_C_HEAP_OBJ(struct sigaction, mtInternal)(struct sigaction*) (AllocateHeap((1) * sizeof(struct sigaction ), mtInternal)); | |||
134 | *_sa[sig] = *act; | |||
135 | } | |||
136 | } | |||
137 | ||||
138 | const struct sigaction* get(int sig) const { | |||
139 | if (check_signal_number(sig)) { | |||
140 | return _sa[sig]; | |||
141 | } | |||
142 | return NULL__null; | |||
143 | } | |||
144 | }; | |||
145 | ||||
146 | ||||
147 | debug_only(static bool signal_sets_initialized = false)static bool signal_sets_initialized = false; | |||
148 | static sigset_t unblocked_sigs, vm_sigs, preinstalled_sigs; | |||
149 | ||||
150 | // Our own signal handlers should never ever get replaced by a third party one. | |||
151 | // To check that, and to aid with diagnostics, store a copy of the handler setup | |||
152 | // and compare it periodically against reality (see os::run_periodic_checks()). | |||
153 | static bool check_signals = true; | |||
154 | static SavedSignalHandlers vm_handlers; | |||
155 | static bool do_check_signal_periodically[NSIG(64 + 1)] = { 0 }; | |||
156 | ||||
157 | // For signal-chaining: | |||
158 | // if chaining is active, chained_handlers contains all handlers which we | |||
159 | // replaced with our own and to which we must delegate. | |||
160 | static SavedSignalHandlers chained_handlers; | |||
161 | static bool libjsig_is_loaded = false; | |||
162 | typedef struct sigaction *(*get_signal_t)(int); | |||
163 | static get_signal_t get_signal_action = NULL__null; | |||
164 | ||||
165 | // suspend/resume support | |||
166 | #if defined(__APPLE__) | |||
167 | static OSXSemaphore sr_semaphore; | |||
168 | #else | |||
169 | static PosixSemaphore sr_semaphore; | |||
170 | #endif | |||
171 | ||||
172 | // Signal number used to suspend/resume a thread | |||
173 | // do not use any signal number less than SIGSEGV, see 4355769 | |||
174 | int PosixSignals::SR_signum = SIGUSR212; | |||
175 | ||||
176 | // sun.misc.Signal support | |||
177 | static Semaphore* sig_semaphore = NULL__null; | |||
178 | // a counter for each possible signal value | |||
179 | static volatile jint pending_signals[NSIG(64 + 1)+1] = { 0 }; | |||
180 | ||||
181 | static const struct { | |||
182 | int sig; const char* name; | |||
183 | } g_signal_info[] = { | |||
184 | { SIGABRT6, "SIGABRT" }, | |||
185 | #ifdef SIGAIO | |||
186 | { SIGAIO, "SIGAIO" }, | |||
187 | #endif | |||
188 | { SIGALRM14, "SIGALRM" }, | |||
189 | #ifdef SIGALRM1 | |||
190 | { SIGALRM1, "SIGALRM1" }, | |||
191 | #endif | |||
192 | { SIGBUS7, "SIGBUS" }, | |||
193 | #ifdef SIGCANCEL | |||
194 | { SIGCANCEL, "SIGCANCEL" }, | |||
195 | #endif | |||
196 | { SIGCHLD17, "SIGCHLD" }, | |||
197 | #ifdef SIGCLD17 | |||
198 | { SIGCLD17, "SIGCLD" }, | |||
199 | #endif | |||
200 | { SIGCONT18, "SIGCONT" }, | |||
201 | #ifdef SIGCPUFAIL | |||
202 | { SIGCPUFAIL, "SIGCPUFAIL" }, | |||
203 | #endif | |||
204 | #ifdef SIGDANGER | |||
205 | { SIGDANGER, "SIGDANGER" }, | |||
206 | #endif | |||
207 | #ifdef SIGDIL | |||
208 | { SIGDIL, "SIGDIL" }, | |||
209 | #endif | |||
210 | #ifdef SIGEMT | |||
211 | { SIGEMT, "SIGEMT" }, | |||
212 | #endif | |||
213 | { SIGFPE8, "SIGFPE" }, | |||
214 | #ifdef SIGFREEZE | |||
215 | { SIGFREEZE, "SIGFREEZE" }, | |||
216 | #endif | |||
217 | #ifdef SIGGFAULT | |||
218 | { SIGGFAULT, "SIGGFAULT" }, | |||
219 | #endif | |||
220 | #ifdef SIGGRANT | |||
221 | { SIGGRANT, "SIGGRANT" }, | |||
222 | #endif | |||
223 | { SIGHUP1, "SIGHUP" }, | |||
224 | { SIGILL4, "SIGILL" }, | |||
225 | #ifdef SIGINFO | |||
226 | { SIGINFO, "SIGINFO" }, | |||
227 | #endif | |||
228 | { SIGINT2, "SIGINT" }, | |||
229 | #ifdef SIGIO29 | |||
230 | { SIGIO29, "SIGIO" }, | |||
231 | #endif | |||
232 | #ifdef SIGIOINT | |||
233 | { SIGIOINT, "SIGIOINT" }, | |||
234 | #endif | |||
235 | #ifdef SIGIOT6 | |||
236 | // SIGIOT is there for BSD compatibility, but on most Unices just a | |||
237 | // synonym for SIGABRT. The result should be "SIGABRT", not | |||
238 | // "SIGIOT". | |||
239 | #if (SIGIOT6 != SIGABRT6 ) | |||
240 | { SIGIOT6, "SIGIOT" }, | |||
241 | #endif | |||
242 | #endif | |||
243 | #ifdef SIGKAP | |||
244 | { SIGKAP, "SIGKAP" }, | |||
245 | #endif | |||
246 | { SIGKILL9, "SIGKILL" }, | |||
247 | #ifdef SIGLOST | |||
248 | { SIGLOST, "SIGLOST" }, | |||
249 | #endif | |||
250 | #ifdef SIGLWP | |||
251 | { SIGLWP, "SIGLWP" }, | |||
252 | #endif | |||
253 | #ifdef SIGLWPTIMER | |||
254 | { SIGLWPTIMER, "SIGLWPTIMER" }, | |||
255 | #endif | |||
256 | #ifdef SIGMIGRATE | |||
257 | { SIGMIGRATE, "SIGMIGRATE" }, | |||
258 | #endif | |||
259 | #ifdef SIGMSG | |||
260 | { SIGMSG, "SIGMSG" }, | |||
261 | #endif | |||
262 | { SIGPIPE13, "SIGPIPE" }, | |||
263 | #ifdef SIGPOLL29 | |||
264 | { SIGPOLL29, "SIGPOLL" }, | |||
265 | #endif | |||
266 | #ifdef SIGPRE | |||
267 | { SIGPRE, "SIGPRE" }, | |||
268 | #endif | |||
269 | { SIGPROF27, "SIGPROF" }, | |||
270 | #ifdef SIGPTY | |||
271 | { SIGPTY, "SIGPTY" }, | |||
272 | #endif | |||
273 | #ifdef SIGPWR30 | |||
274 | { SIGPWR30, "SIGPWR" }, | |||
275 | #endif | |||
276 | { SIGQUIT3, "SIGQUIT" }, | |||
277 | #ifdef SIGRECONFIG | |||
278 | { SIGRECONFIG, "SIGRECONFIG" }, | |||
279 | #endif | |||
280 | #ifdef SIGRECOVERY | |||
281 | { SIGRECOVERY, "SIGRECOVERY" }, | |||
282 | #endif | |||
283 | #ifdef SIGRESERVE | |||
284 | { SIGRESERVE, "SIGRESERVE" }, | |||
285 | #endif | |||
286 | #ifdef SIGRETRACT | |||
287 | { SIGRETRACT, "SIGRETRACT" }, | |||
288 | #endif | |||
289 | #ifdef SIGSAK | |||
290 | { SIGSAK, "SIGSAK" }, | |||
291 | #endif | |||
292 | { SIGSEGV11, "SIGSEGV" }, | |||
293 | #ifdef SIGSOUND | |||
294 | { SIGSOUND, "SIGSOUND" }, | |||
295 | #endif | |||
296 | #ifdef SIGSTKFLT16 | |||
297 | { SIGSTKFLT16, "SIGSTKFLT" }, | |||
298 | #endif | |||
299 | { SIGSTOP19, "SIGSTOP" }, | |||
300 | { SIGSYS31, "SIGSYS" }, | |||
301 | #ifdef SIGSYSERROR | |||
302 | { SIGSYSERROR, "SIGSYSERROR" }, | |||
303 | #endif | |||
304 | #ifdef SIGTALRM | |||
305 | { SIGTALRM, "SIGTALRM" }, | |||
306 | #endif | |||
307 | { SIGTERM15, "SIGTERM" }, | |||
308 | #ifdef SIGTHAW | |||
309 | { SIGTHAW, "SIGTHAW" }, | |||
310 | #endif | |||
311 | { SIGTRAP5, "SIGTRAP" }, | |||
312 | #ifdef SIGTSTP20 | |||
313 | { SIGTSTP20, "SIGTSTP" }, | |||
314 | #endif | |||
315 | { SIGTTIN21, "SIGTTIN" }, | |||
316 | { SIGTTOU22, "SIGTTOU" }, | |||
317 | #ifdef SIGURG23 | |||
318 | { SIGURG23, "SIGURG" }, | |||
319 | #endif | |||
320 | { SIGUSR110, "SIGUSR1" }, | |||
321 | { SIGUSR212, "SIGUSR2" }, | |||
322 | #ifdef SIGVIRT | |||
323 | { SIGVIRT, "SIGVIRT" }, | |||
324 | #endif | |||
325 | { SIGVTALRM26, "SIGVTALRM" }, | |||
326 | #ifdef SIGWAITING | |||
327 | { SIGWAITING, "SIGWAITING" }, | |||
328 | #endif | |||
329 | #ifdef SIGWINCH28 | |||
330 | { SIGWINCH28, "SIGWINCH" }, | |||
331 | #endif | |||
332 | #ifdef SIGWINDOW | |||
333 | { SIGWINDOW, "SIGWINDOW" }, | |||
334 | #endif | |||
335 | { SIGXCPU24, "SIGXCPU" }, | |||
336 | { SIGXFSZ25, "SIGXFSZ" }, | |||
337 | #ifdef SIGXRES | |||
338 | { SIGXRES, "SIGXRES" }, | |||
339 | #endif | |||
340 | { -1, NULL__null } | |||
341 | }; | |||
342 | ||||
343 | //////////////////////////////////////////////////////////////////////////////// | |||
344 | // sun.misc.Signal support | |||
345 | ||||
346 | void jdk_misc_signal_init() { | |||
347 | // Initialize signal structures | |||
348 | ::memset((void*)pending_signals, 0, sizeof(pending_signals)); | |||
349 | ||||
350 | // Initialize signal semaphore | |||
351 | sig_semaphore = new Semaphore(); | |||
352 | } | |||
353 | ||||
354 | void os::signal_notify(int sig) { | |||
355 | if (sig_semaphore != NULL__null) { | |||
356 | Atomic::inc(&pending_signals[sig]); | |||
357 | sig_semaphore->signal(); | |||
358 | } else { | |||
359 | // Signal thread is not created with ReduceSignalUsage and jdk_misc_signal_init | |||
360 | // initialization isn't called. | |||
361 | assert(ReduceSignalUsage, "signal semaphore should be created")do { if (!(ReduceSignalUsage)) { (*g_assert_poison) = 'X';; report_vm_error ("/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 361, "assert(" "ReduceSignalUsage" ") failed", "signal semaphore should be created" ); ::breakpoint(); } } while (0); | |||
362 | } | |||
363 | } | |||
364 | ||||
365 | static int check_pending_signals() { | |||
366 | for (;;) { | |||
367 | for (int i = 0; i < NSIG(64 + 1) + 1; i++) { | |||
368 | jint n = pending_signals[i]; | |||
369 | if (n > 0 && n == Atomic::cmpxchg(&pending_signals[i], n, n - 1)) { | |||
370 | return i; | |||
371 | } | |||
372 | } | |||
373 | sig_semaphore->wait_with_safepoint_check(JavaThread::current()); | |||
374 | } | |||
375 | ShouldNotReachHere()do { (*g_assert_poison) = 'X';; report_should_not_reach_here( "/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 375); ::breakpoint(); } while (0); | |||
376 | return 0; // Satisfy compiler | |||
377 | } | |||
378 | ||||
379 | int os::signal_wait() { | |||
380 | return check_pending_signals(); | |||
381 | } | |||
382 | ||||
383 | //////////////////////////////////////////////////////////////////////////////// | |||
384 | // signal chaining support | |||
385 | ||||
386 | struct sigaction* get_chained_signal_action(int sig) { | |||
387 | struct sigaction *actp = NULL__null; | |||
388 | ||||
389 | if (libjsig_is_loaded) { | |||
390 | // Retrieve the old signal handler from libjsig | |||
391 | actp = (*get_signal_action)(sig); | |||
392 | } | |||
393 | if (actp == NULL__null) { | |||
394 | // Retrieve the preinstalled signal handler from jvm | |||
395 | actp = const_cast<struct sigaction*>(chained_handlers.get(sig)); | |||
396 | } | |||
397 | ||||
398 | return actp; | |||
399 | } | |||
400 | ||||
401 | static bool call_chained_handler(struct sigaction *actp, int sig, | |||
402 | siginfo_t *siginfo, void *context) { | |||
403 | // Call the old signal handler | |||
404 | if (actp->sa_handler__sigaction_handler.sa_handler == SIG_DFL((__sighandler_t) 0)) { | |||
405 | // It's more reasonable to let jvm treat it as an unexpected exception | |||
406 | // instead of taking the default action. | |||
407 | return false; | |||
408 | } else if (actp->sa_handler__sigaction_handler.sa_handler != SIG_IGN((__sighandler_t) 1)) { | |||
409 | if ((actp->sa_flags & SA_NODEFER0x40000000) == 0) { | |||
410 | // automaticlly block the signal | |||
411 | sigaddset(&(actp->sa_mask), sig); | |||
412 | } | |||
413 | ||||
414 | sa_handler_t hand = NULL__null; | |||
415 | sa_sigaction_t sa = NULL__null; | |||
416 | bool siginfo_flag_set = (actp->sa_flags & SA_SIGINFO4) != 0; | |||
417 | // retrieve the chained handler | |||
418 | if (siginfo_flag_set) { | |||
419 | sa = actp->sa_sigaction__sigaction_handler.sa_sigaction; | |||
420 | } else { | |||
421 | hand = actp->sa_handler__sigaction_handler.sa_handler; | |||
422 | } | |||
423 | ||||
424 | if ((actp->sa_flags & SA_RESETHAND0x80000000) != 0) { | |||
425 | actp->sa_handler__sigaction_handler.sa_handler = SIG_DFL((__sighandler_t) 0); | |||
426 | } | |||
427 | ||||
428 | // try to honor the signal mask | |||
429 | sigset_t oset; | |||
430 | sigemptyset(&oset); | |||
431 | pthread_sigmask(SIG_SETMASK2, &(actp->sa_mask), &oset); | |||
432 | ||||
433 | // call into the chained handler | |||
434 | if (siginfo_flag_set) { | |||
435 | (*sa)(sig, siginfo, context); | |||
436 | } else { | |||
437 | (*hand)(sig); | |||
438 | } | |||
439 | ||||
440 | // restore the signal mask | |||
441 | pthread_sigmask(SIG_SETMASK2, &oset, NULL__null); | |||
442 | } | |||
443 | // Tell jvm's signal handler the signal is taken care of. | |||
444 | return true; | |||
445 | } | |||
446 | ||||
447 | bool PosixSignals::chained_handler(int sig, siginfo_t* siginfo, void* context) { | |||
448 | bool chained = false; | |||
449 | // signal-chaining | |||
450 | if (UseSignalChaining) { | |||
451 | struct sigaction *actp = get_chained_signal_action(sig); | |||
452 | if (actp != NULL__null) { | |||
453 | chained = call_chained_handler(actp, sig, siginfo, context); | |||
454 | } | |||
455 | } | |||
456 | return chained; | |||
457 | } | |||
458 | ||||
459 | ///// Synchronous (non-deferrable) error signals (ILL, SEGV, FPE, BUS, TRAP): | |||
460 | ||||
461 | // These signals are special because they cannot be deferred and, if they | |||
462 | // happen while delivery is blocked for the receiving thread, will cause UB | |||
463 | // (in practice typically resulting in sudden process deaths or hangs, see | |||
464 | // JDK-8252533). So we must take care never to block them when we cannot be | |||
465 | // absolutely sure they won't happen. In practice, this is always. | |||
466 | // | |||
467 | // Relevant Posix quote: | |||
468 | // "The behavior of a process is undefined after it ignores a SIGFPE, SIGILL, | |||
469 | // SIGSEGV, or SIGBUS signal that was not generated by kill(), sigqueue(), or | |||
470 | // raise()." | |||
471 | // | |||
472 | // We also include SIGTRAP in that list of never-to-block-signals. While not | |||
473 | // mentioned by the Posix documentation, in our (SAPs) experience blocking it | |||
474 | // causes similar problems. Beside, during normal operation - outside of error | |||
475 | // handling - SIGTRAP may be used for implicit NULL checking, so it makes sense | |||
476 | // to never block it. | |||
477 | // | |||
478 | // We deal with those signals in two ways: | |||
479 | // - we just never explicitly block them, which includes not accidentally blocking | |||
480 | // them via sa_mask when establishing signal handlers. | |||
481 | // - as an additional safety measure, at the entrance of a signal handler, we | |||
482 | // unblock them explicitly. | |||
483 | ||||
484 | static void add_error_signals_to_set(sigset_t* set) { | |||
485 | sigaddset(set, SIGILL4); | |||
486 | sigaddset(set, SIGBUS7); | |||
487 | sigaddset(set, SIGFPE8); | |||
488 | sigaddset(set, SIGSEGV11); | |||
489 | sigaddset(set, SIGTRAP5); | |||
490 | } | |||
491 | ||||
492 | static void remove_error_signals_from_set(sigset_t* set) { | |||
493 | sigdelset(set, SIGILL4); | |||
494 | sigdelset(set, SIGBUS7); | |||
495 | sigdelset(set, SIGFPE8); | |||
496 | sigdelset(set, SIGSEGV11); | |||
497 | sigdelset(set, SIGTRAP5); | |||
498 | } | |||
499 | ||||
500 | // Unblock all signals whose delivery cannot be deferred and which, if they happen | |||
501 | // while delivery is blocked, would cause crashes or hangs (JDK-8252533). | |||
502 | void PosixSignals::unblock_error_signals() { | |||
503 | sigset_t set; | |||
504 | sigemptyset(&set); | |||
505 | add_error_signals_to_set(&set); | |||
506 | ::pthread_sigmask(SIG_UNBLOCK1, &set, NULL__null); | |||
507 | } | |||
508 | ||||
509 | class ErrnoPreserver: public StackObj { | |||
510 | const int _saved; | |||
511 | public: | |||
512 | ErrnoPreserver() : _saved(errno(*__errno_location ())) {} | |||
513 | ~ErrnoPreserver() { errno(*__errno_location ()) = _saved; } | |||
514 | }; | |||
515 | ||||
516 | //////////////////////////////////////////////////////////////////////////////// | |||
517 | // JVM_handle_(linux|aix|bsd)_signal() | |||
518 | ||||
519 | // This routine is the shared part of the central hotspot signal handler. It can | |||
520 | // also be called by a user application, if a user application prefers to do | |||
521 | // signal handling itself - in that case it needs to pass signals the VM | |||
522 | // internally uses on to the VM first. | |||
523 | // | |||
524 | // The user-defined signal handler must pass unrecognized signals to this | |||
525 | // routine, and if it returns true (non-zero), then the signal handler must | |||
526 | // return immediately. If the flag "abort_if_unrecognized" is true, then this | |||
527 | // routine will never return false (zero), but instead will execute a VM panic | |||
528 | // routine to kill the process. | |||
529 | // | |||
530 | // If this routine returns false, it is OK to call it again. This allows | |||
531 | // the user-defined signal handler to perform checks either before or after | |||
532 | // the VM performs its own checks. Naturally, the user code would be making | |||
533 | // a serious error if it tried to handle an exception (such as a null check | |||
534 | // or breakpoint) that the VM was generating for its own correct operation. | |||
535 | // | |||
536 | // This routine may recognize any of the following kinds of signals: | |||
537 | // SIGBUS, SIGSEGV, SIGILL, SIGFPE, SIGQUIT, SIGPIPE, SIGXFSZ, SIGUSR1. | |||
538 | // It should be consulted by handlers for any of those signals. | |||
539 | // | |||
540 | // The caller of this routine must pass in the three arguments supplied | |||
541 | // to the function referred to in the "sa_sigaction" (not the "sa_handler") | |||
542 | // field of the structure passed to sigaction(). This routine assumes that | |||
543 | // the sa_flags field passed to sigaction() includes SA_SIGINFO and SA_RESTART. | |||
544 | // | |||
545 | // Note that the VM will print warnings if it detects conflicting signal | |||
546 | // handlers, unless invoked with the option "-XX:+AllowUserSignalHandlers". | |||
547 | // | |||
548 | ||||
549 | #if defined(BSD) | |||
550 | #define JVM_HANDLE_XXX_SIGNALJVM_handle_linux_signal JVM_handle_bsd_signal | |||
551 | #elif defined(AIX) | |||
552 | #define JVM_HANDLE_XXX_SIGNALJVM_handle_linux_signal JVM_handle_aix_signal | |||
553 | #elif defined(LINUX1) | |||
554 | #define JVM_HANDLE_XXX_SIGNALJVM_handle_linux_signal JVM_handle_linux_signal | |||
555 | #else | |||
556 | #error who are you? | |||
557 | #endif | |||
558 | ||||
559 | extern "C" JNIEXPORT__attribute__((visibility("default"))) | |||
560 | int JVM_HANDLE_XXX_SIGNALJVM_handle_linux_signal(int sig, siginfo_t* info, | |||
561 | void* ucVoid, int abort_if_unrecognized) | |||
562 | { | |||
563 | assert(info != NULL && ucVoid != NULL, "sanity")do { if (!(info != __null && ucVoid != __null)) { (*g_assert_poison ) = 'X';; report_vm_error("/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 563, "assert(" "info != __null && ucVoid != __null" ") failed", "sanity"); ::breakpoint(); } } while (0); | |||
564 | ||||
565 | // Note: it's not uncommon that JNI code uses signal/sigset to install, | |||
566 | // then restore certain signal handler (e.g. to temporarily block SIGPIPE, | |||
567 | // or have a SIGILL handler when detecting CPU type). When that happens, | |||
568 | // this handler might be invoked with junk info/ucVoid. To avoid unnecessary | |||
569 | // crash when libjsig is not preloaded, try handle signals that do not require | |||
570 | // siginfo/ucontext first. | |||
571 | ||||
572 | // Preserve errno value over signal handler. | |||
573 | // (note: RAII ok here, even with JFR thread crash protection, see below). | |||
574 | ErrnoPreserver ep; | |||
575 | ||||
576 | // Unblock all synchronous error signals (see JDK-8252533) | |||
577 | PosixSignals::unblock_error_signals(); | |||
578 | ||||
579 | ucontext_t* const uc = (ucontext_t*) ucVoid; | |||
580 | Thread* const t = Thread::current_or_null_safe(); | |||
581 | ||||
582 | // Handle JFR thread crash protection. | |||
583 | // Note: this may cause us to longjmp away. Do not use any code before this | |||
584 | // point which really needs any form of epilogue code running, eg RAII objects. | |||
585 | os::ThreadCrashProtection::check_crash_protection(sig, t); | |||
586 | ||||
587 | bool signal_was_handled = false; | |||
588 | ||||
589 | // Handle assertion poison page accesses. | |||
590 | #ifdef CAN_SHOW_REGISTERS_ON_ASSERT | |||
591 | if (!signal_was_handled && | |||
592 | ((sig == SIGSEGV11 || sig == SIGBUS7) && info != NULL__null && info->si_addr_sifields._sigfault.si_addr == g_assert_poison)) { | |||
593 | signal_was_handled = handle_assert_poison_fault(ucVoid, info->si_addr_sifields._sigfault.si_addr); | |||
594 | } | |||
595 | #endif | |||
596 | ||||
597 | if (!signal_was_handled) { | |||
598 | // Handle SafeFetch access. | |||
599 | #ifndef ZERO | |||
600 | if (uc != NULL__null) { | |||
601 | address pc = os::Posix::ucontext_get_pc(uc); | |||
602 | if (StubRoutines::is_safefetch_fault(pc)) { | |||
603 | os::Posix::ucontext_set_pc(uc, StubRoutines::continuation_for_safefetch_fault(pc)); | |||
604 | signal_was_handled = true; | |||
605 | } | |||
606 | } | |||
607 | #else | |||
608 | // See JDK-8076185 | |||
609 | if (sig == SIGSEGV11 || sig == SIGBUS7) { | |||
610 | sigjmp_buf* const pjb = get_jmp_buf_for_continuation(); | |||
611 | if (pjb) { | |||
612 | siglongjmp(*pjb, 1); | |||
613 | } | |||
614 | } | |||
615 | #endif // ZERO | |||
616 | } | |||
617 | ||||
618 | // Ignore SIGPIPE and SIGXFSZ (4229104, 6499219). | |||
619 | if (!signal_was_handled && | |||
620 | (sig == SIGPIPE13 || sig == SIGXFSZ25)) { | |||
621 | PosixSignals::chained_handler(sig, info, ucVoid); | |||
622 | signal_was_handled = true; // unconditionally. | |||
623 | } | |||
624 | ||||
625 | // Call platform dependent signal handler. | |||
626 | if (!signal_was_handled) { | |||
627 | JavaThread* const jt = (t != NULL__null && t->is_Java_thread()) ? (JavaThread*) t : NULL__null; | |||
628 | signal_was_handled = PosixSignals::pd_hotspot_signal_handler(sig, info, uc, jt); | |||
629 | } | |||
630 | ||||
631 | // From here on, if the signal had not been handled, it is a fatal error. | |||
632 | ||||
633 | // Give the chained signal handler - should it exist - a shot. | |||
634 | if (!signal_was_handled) { | |||
635 | signal_was_handled = PosixSignals::chained_handler(sig, info, ucVoid); | |||
636 | } | |||
637 | ||||
638 | // Invoke fatal error handling. | |||
639 | if (!signal_was_handled && abort_if_unrecognized) { | |||
640 | // Extract pc from context for the error handler to display. | |||
641 | address pc = NULL__null; | |||
642 | if (uc != NULL__null) { | |||
643 | // prepare fault pc address for error reporting. | |||
644 | if (S390_ONLY(sig == SIGILL || sig == SIGFPE) NOT_S390(false)false) { | |||
645 | pc = (address)info->si_addr_sifields._sigfault.si_addr; | |||
646 | } else if (ZERO_ONLY(true) NOT_ZERO(false)false) { | |||
647 | // Non-arch-specific Zero code does not really know the pc. | |||
648 | // This can be alleviated by making arch-specific os::Posix::ucontext_get_pc | |||
649 | // available for Zero for known architectures. But for generic Zero | |||
650 | // code, it would still remain unknown. | |||
651 | pc = NULL__null; | |||
652 | } else { | |||
653 | pc = os::Posix::ucontext_get_pc(uc); | |||
654 | } | |||
655 | } | |||
656 | // For Zero, we ignore the crash context, because: | |||
657 | // a) The crash would be in C++ interpreter code, so context is not really relevant; | |||
658 | // b) Generic Zero code would not be able to parse it, so when generic error | |||
659 | // reporting code asks e.g. about frames on stack, Zero would experience | |||
660 | // a secondary ShouldNotCallThis() crash. | |||
661 | VMError::report_and_die(t, sig, pc, info, NOT_ZERO(ucVoid)ucVoid ZERO_ONLY(NULL)); | |||
662 | // VMError should not return. | |||
663 | ShouldNotReachHere()do { (*g_assert_poison) = 'X';; report_should_not_reach_here( "/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 663); ::breakpoint(); } while (0); | |||
664 | } | |||
665 | return signal_was_handled; | |||
666 | } | |||
667 | ||||
668 | // Entry point for the hotspot signal handler. | |||
669 | static void javaSignalHandler(int sig, siginfo_t* info, void* ucVoid) { | |||
670 | // Do not add any code here! | |||
671 | // Only add code to either JVM_HANDLE_XXX_SIGNAL or PosixSignals::pd_hotspot_signal_handler. | |||
672 | (void)JVM_HANDLE_XXX_SIGNALJVM_handle_linux_signal(sig, info, ucVoid, true); | |||
673 | } | |||
674 | ||||
675 | static void UserHandler(int sig, void *siginfo, void *context) { | |||
676 | ||||
677 | PosixSignals::unblock_error_signals(); | |||
678 | ||||
679 | // Ctrl-C is pressed during error reporting, likely because the error | |||
680 | // handler fails to abort. Let VM die immediately. | |||
681 | if (sig == SIGINT2 && VMError::is_error_reported()) { | |||
682 | os::die(); | |||
683 | } | |||
684 | ||||
685 | os::signal_notify(sig); | |||
686 | } | |||
687 | ||||
688 | static void print_signal_handler_name(outputStream* os, address handler, char* buf, size_t buflen) { | |||
689 | // We demangle, but omit arguments - signal handlers should have always the same prototype. | |||
690 | os::print_function_and_library_name(os, handler, buf, buflen, | |||
691 | true, // shorten_path | |||
692 | true, // demangle | |||
693 | true // omit arguments | |||
694 | ); | |||
695 | } | |||
696 | ||||
697 | // Writes one-line description of a combination of sigaction.sa_flags into a user | |||
698 | // provided buffer. Returns that buffer. | |||
699 | static const char* describe_sa_flags(int flags, char* buffer, size_t size) { | |||
700 | char* p = buffer; | |||
701 | size_t remaining = size; | |||
702 | bool first = true; | |||
703 | int idx = 0; | |||
704 | ||||
705 | assert(buffer, "invalid argument")do { if (!(buffer)) { (*g_assert_poison) = 'X';; report_vm_error ("/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 705, "assert(" "buffer" ") failed", "invalid argument"); :: breakpoint(); } } while (0); | |||
706 | ||||
707 | if (size == 0) { | |||
708 | return buffer; | |||
709 | } | |||
710 | ||||
711 | strncpy(buffer, "none", size); | |||
712 | ||||
713 | const unsigned int unknown_flag = ~(SA_NOCLDSTOP1 | | |||
714 | SA_ONSTACK0x08000000 | | |||
715 | SA_NOCLDSTOP1 | | |||
716 | SA_RESTART0x10000000 | | |||
717 | SA_SIGINFO4 | | |||
718 | SA_NOCLDWAIT2 | | |||
719 | SA_NODEFER0x40000000 | |||
720 | AIX_ONLY(| SA_OLDSTYLE) | |||
721 | ); | |||
722 | ||||
723 | const struct { | |||
724 | // NB: i is an unsigned int here because SA_RESETHAND is on some | |||
725 | // systems 0x80000000, which is implicitly unsigned. Assigning | |||
726 | // it to an int field would be an overflow in unsigned-to-signed | |||
727 | // conversion. | |||
728 | unsigned int i; | |||
729 | const char* s; | |||
730 | } flaginfo [] = { | |||
731 | { SA_NOCLDSTOP1, "SA_NOCLDSTOP" }, | |||
732 | { SA_ONSTACK0x08000000, "SA_ONSTACK" }, | |||
733 | { SA_RESETHAND0x80000000, "SA_RESETHAND" }, | |||
734 | { SA_RESTART0x10000000, "SA_RESTART" }, | |||
735 | { SA_SIGINFO4, "SA_SIGINFO" }, | |||
736 | { SA_NOCLDWAIT2, "SA_NOCLDWAIT" }, | |||
737 | { SA_NODEFER0x40000000, "SA_NODEFER" }, | |||
738 | #if defined(AIX) | |||
739 | { SA_OLDSTYLE, "SA_OLDSTYLE" }, | |||
740 | #endif | |||
741 | { unknown_flag, "NOT USED" } | |||
742 | }; | |||
743 | ||||
744 | for (idx = 0; flaginfo[idx].i != unknown_flag && remaining > 1; idx++) { | |||
745 | if (flags & flaginfo[idx].i) { | |||
746 | if (first) { | |||
747 | jio_snprintf(p, remaining, "%s", flaginfo[idx].s); | |||
748 | first = false; | |||
749 | } else { | |||
750 | jio_snprintf(p, remaining, "|%s", flaginfo[idx].s); | |||
751 | } | |||
752 | const size_t len = strlen(p); | |||
753 | p += len; | |||
754 | remaining -= len; | |||
755 | } | |||
756 | } | |||
757 | unsigned int unknowns = flags & unknown_flag; | |||
758 | if (unknowns != 0) { | |||
759 | jio_snprintf(p, remaining, "|Unknown_flags:%x", unknowns); | |||
760 | } | |||
761 | ||||
762 | buffer[size - 1] = '\0'; | |||
763 | ||||
764 | return buffer; | |||
765 | } | |||
766 | ||||
767 | // Prints one-line description of a combination of sigaction.sa_flags. | |||
768 | static void print_sa_flags(outputStream* st, int flags) { | |||
769 | char buffer[0x100]; | |||
770 | describe_sa_flags(flags, buffer, sizeof(buffer)); | |||
771 | st->print("%s", buffer); | |||
772 | } | |||
773 | ||||
774 | // Implementation may use the same storage for both the sa_sigaction field and the sa_handler field, | |||
775 | // so check for "sigAct.sa_flags == SA_SIGINFO" | |||
776 | static address get_signal_handler(const struct sigaction* action) { | |||
777 | bool siginfo_flag_set = (action->sa_flags & SA_SIGINFO4) != 0; | |||
778 | if (siginfo_flag_set) { | |||
779 | return CAST_FROM_FN_PTR(address, action->sa_sigaction)((address)((address_word)(action->__sigaction_handler.sa_sigaction ))); | |||
780 | } else { | |||
781 | return CAST_FROM_FN_PTR(address, action->sa_handler)((address)((address_word)(action->__sigaction_handler.sa_handler ))); | |||
782 | } | |||
783 | } | |||
784 | ||||
785 | typedef int (*os_sigaction_t)(int, const struct sigaction *, struct sigaction *); | |||
786 | ||||
787 | static void SR_handler(int sig, siginfo_t* siginfo, ucontext_t* context); | |||
788 | ||||
789 | // Semantically compare two sigaction structures. Return true if they are referring to | |||
790 | // the same handler, using the same flags. | |||
791 | static bool are_handlers_equal(const struct sigaction* sa, | |||
792 | const struct sigaction* expected_sa) { | |||
793 | address this_handler = get_signal_handler(sa); | |||
794 | address expected_handler = get_signal_handler(expected_sa); | |||
795 | const int this_flags = get_sanitized_sa_flags(sa); | |||
796 | const int expected_flags = get_sanitized_sa_flags(expected_sa); | |||
797 | return (this_handler == expected_handler) && | |||
798 | (this_flags == expected_flags); | |||
799 | } | |||
800 | ||||
801 | // If we installed one of our signal handlers for sig, check that the current | |||
802 | // setup matches what we originally installed. | |||
803 | static void check_signal_handler(int sig) { | |||
804 | char buf[O_BUFLEN2000]; | |||
805 | bool mismatch = false; | |||
806 | ||||
807 | if (!do_check_signal_periodically[sig]) { | |||
808 | return; | |||
809 | } | |||
810 | ||||
811 | const struct sigaction* expected_act = vm_handlers.get(sig); | |||
812 | assert(expected_act != NULL, "Sanity")do { if (!(expected_act != __null)) { (*g_assert_poison) = 'X' ;; report_vm_error("/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 812, "assert(" "expected_act != __null" ") failed", "Sanity" ); ::breakpoint(); } } while (0); | |||
813 | ||||
814 | // Retrieve current signal setup. | |||
815 | struct sigaction act; | |||
816 | static os_sigaction_t os_sigaction = NULL__null; | |||
817 | if (os_sigaction == NULL__null) { | |||
818 | // only trust the default sigaction, in case it has been interposed | |||
819 | os_sigaction = (os_sigaction_t)dlsym(RTLD_DEFAULT((void *) 0), "sigaction"); | |||
820 | if (os_sigaction == NULL__null) return; | |||
821 | } | |||
822 | ||||
823 | os_sigaction(sig, (struct sigaction*)NULL__null, &act); | |||
824 | ||||
825 | // Compare both sigaction structures (intelligently; only the members we care about). | |||
826 | if (!are_handlers_equal(&act, expected_act)) { | |||
827 | tty->print_cr("Warning: %s handler modified!", os::exception_name(sig, buf, sizeof(buf))); | |||
828 | // If we had a mismatch: | |||
829 | // - print all signal handlers. As part of that printout, details will be printed | |||
830 | // about any modified handlers. | |||
831 | // - Disable any further checks for this signal - we do not want to flood stdout. Though | |||
832 | // depending on which signal had been overwritten, we may die very soon anyway. | |||
833 | os::print_signal_handlers(tty, buf, O_BUFLEN2000); | |||
834 | do_check_signal_periodically[sig] = false; | |||
835 | tty->print_cr("Consider using jsig library."); | |||
836 | // Running under non-interactive shell, SHUTDOWN2_SIGNAL will be reassigned SIG_IGN | |||
837 | if (sig == SHUTDOWN2_SIGNAL2 && !isatty(fileno(stdinstdin))) { | |||
838 | tty->print_cr("Note: Running in non-interactive shell, %s handler is replaced by shell", | |||
839 | os::exception_name(sig, buf, O_BUFLEN2000)); | |||
840 | } | |||
841 | } | |||
842 | } | |||
843 | ||||
844 | void* os::user_handler() { | |||
845 | return CAST_FROM_FN_PTR(void*, UserHandler)((void*)((address_word)(UserHandler))); | |||
846 | } | |||
847 | ||||
848 | void* os::signal(int signal_number, void* handler) { | |||
849 | struct sigaction sigAct, oldSigAct; | |||
850 | ||||
851 | sigfillset(&(sigAct.sa_mask)); | |||
852 | remove_error_signals_from_set(&(sigAct.sa_mask)); | |||
853 | ||||
854 | sigAct.sa_flags = SA_RESTART0x10000000|SA_SIGINFO4; | |||
855 | sigAct.sa_handler__sigaction_handler.sa_handler = CAST_TO_FN_PTR(sa_handler_t, handler)(reinterpret_cast<sa_handler_t>(handler)); | |||
856 | ||||
857 | if (sigaction(signal_number, &sigAct, &oldSigAct)) { | |||
858 | // -1 means registration failed | |||
859 | return (void *)-1; | |||
860 | } | |||
861 | ||||
862 | return get_signal_handler(&oldSigAct); | |||
863 | } | |||
864 | ||||
865 | void os::signal_raise(int signal_number) { | |||
866 | ::raise(signal_number); | |||
867 | } | |||
868 | ||||
869 | // Will be modified when max signal is changed to be dynamic | |||
870 | int os::sigexitnum_pd() { | |||
871 | return NSIG(64 + 1); | |||
872 | } | |||
873 | ||||
874 | // This method is a periodic task to check for misbehaving JNI applications | |||
875 | // under CheckJNI, we can add any periodic checks here | |||
876 | void os::run_periodic_checks() { | |||
877 | ||||
878 | if (check_signals == false) return; | |||
879 | ||||
880 | // SEGV and BUS if overridden could potentially prevent | |||
881 | // generation of hs*.log in the event of a crash, debugging | |||
882 | // such a case can be very challenging, so we absolutely | |||
883 | // check the following for a good measure: | |||
884 | check_signal_handler(SIGSEGV11); | |||
885 | check_signal_handler(SIGILL4); | |||
886 | check_signal_handler(SIGFPE8); | |||
887 | check_signal_handler(SIGBUS7); | |||
888 | check_signal_handler(SIGPIPE13); | |||
889 | check_signal_handler(SIGXFSZ25); | |||
890 | PPC64_ONLY(check_signal_handler(SIGTRAP);) | |||
891 | ||||
892 | // ReduceSignalUsage allows the user to override these handlers | |||
893 | // see comments at the very top and jvm_md.h | |||
894 | if (!ReduceSignalUsage) { | |||
895 | check_signal_handler(SHUTDOWN1_SIGNAL1); | |||
896 | check_signal_handler(SHUTDOWN2_SIGNAL2); | |||
897 | check_signal_handler(SHUTDOWN3_SIGNAL15); | |||
898 | check_signal_handler(BREAK_SIGNAL3); | |||
899 | } | |||
900 | ||||
901 | check_signal_handler(PosixSignals::SR_signum); | |||
902 | } | |||
903 | ||||
904 | // Helper function for PosixSignals::print_siginfo_...(): | |||
905 | // return a textual description for signal code. | |||
906 | struct enum_sigcode_desc_t { | |||
907 | const char* s_name; | |||
908 | const char* s_desc; | |||
909 | }; | |||
910 | ||||
911 | static bool get_signal_code_description(const siginfo_t* si, enum_sigcode_desc_t* out) { | |||
912 | ||||
913 | const struct { | |||
914 | int sig; int code; const char* s_code; const char* s_desc; | |||
915 | } t1 [] = { | |||
916 | { SIGILL4, ILL_ILLOPCILL_ILLOPC, "ILL_ILLOPC", "Illegal opcode." }, | |||
917 | { SIGILL4, ILL_ILLOPNILL_ILLOPN, "ILL_ILLOPN", "Illegal operand." }, | |||
918 | { SIGILL4, ILL_ILLADRILL_ILLADR, "ILL_ILLADR", "Illegal addressing mode." }, | |||
919 | { SIGILL4, ILL_ILLTRPILL_ILLTRP, "ILL_ILLTRP", "Illegal trap." }, | |||
920 | { SIGILL4, ILL_PRVOPCILL_PRVOPC, "ILL_PRVOPC", "Privileged opcode." }, | |||
921 | { SIGILL4, ILL_PRVREGILL_PRVREG, "ILL_PRVREG", "Privileged register." }, | |||
922 | { SIGILL4, ILL_COPROCILL_COPROC, "ILL_COPROC", "Coprocessor error." }, | |||
923 | { SIGILL4, ILL_BADSTKILL_BADSTK, "ILL_BADSTK", "Internal stack error." }, | |||
924 | #if defined(IA64) && defined(LINUX1) | |||
925 | { SIGILL4, ILL_BADIADDR, "ILL_BADIADDR", "Unimplemented instruction address" }, | |||
926 | { SIGILL4, ILL_BREAK, "ILL_BREAK", "Application Break instruction" }, | |||
927 | #endif | |||
928 | { SIGFPE8, FPE_INTDIVFPE_INTDIV, "FPE_INTDIV", "Integer divide by zero." }, | |||
929 | { SIGFPE8, FPE_INTOVFFPE_INTOVF, "FPE_INTOVF", "Integer overflow." }, | |||
930 | { SIGFPE8, FPE_FLTDIVFPE_FLTDIV, "FPE_FLTDIV", "Floating-point divide by zero." }, | |||
931 | { SIGFPE8, FPE_FLTOVFFPE_FLTOVF, "FPE_FLTOVF", "Floating-point overflow." }, | |||
932 | { SIGFPE8, FPE_FLTUNDFPE_FLTUND, "FPE_FLTUND", "Floating-point underflow." }, | |||
933 | { SIGFPE8, FPE_FLTRESFPE_FLTRES, "FPE_FLTRES", "Floating-point inexact result." }, | |||
934 | { SIGFPE8, FPE_FLTINVFPE_FLTINV, "FPE_FLTINV", "Invalid floating-point operation." }, | |||
935 | { SIGFPE8, FPE_FLTSUBFPE_FLTSUB, "FPE_FLTSUB", "Subscript out of range." }, | |||
936 | { SIGSEGV11, SEGV_MAPERRSEGV_MAPERR, "SEGV_MAPERR", "Address not mapped to object." }, | |||
937 | { SIGSEGV11, SEGV_ACCERRSEGV_ACCERR, "SEGV_ACCERR", "Invalid permissions for mapped object." }, | |||
938 | #if defined(AIX) | |||
939 | // no explanation found what keyerr would be | |||
940 | { SIGSEGV11, SEGV_KEYERR, "SEGV_KEYERR", "key error" }, | |||
941 | #endif | |||
942 | #if defined(IA64) && !defined(AIX) | |||
943 | { SIGSEGV11, SEGV_PSTKOVF, "SEGV_PSTKOVF", "Paragraph stack overflow" }, | |||
944 | #endif | |||
945 | { SIGBUS7, BUS_ADRALNBUS_ADRALN, "BUS_ADRALN", "Invalid address alignment." }, | |||
946 | { SIGBUS7, BUS_ADRERRBUS_ADRERR, "BUS_ADRERR", "Nonexistent physical address." }, | |||
947 | { SIGBUS7, BUS_OBJERRBUS_OBJERR, "BUS_OBJERR", "Object-specific hardware error." }, | |||
948 | { SIGTRAP5, TRAP_BRKPTTRAP_BRKPT, "TRAP_BRKPT", "Process breakpoint." }, | |||
949 | { SIGTRAP5, TRAP_TRACETRAP_TRACE, "TRAP_TRACE", "Process trace trap." }, | |||
950 | { SIGCHLD17, CLD_EXITEDCLD_EXITED, "CLD_EXITED", "Child has exited." }, | |||
951 | { SIGCHLD17, CLD_KILLEDCLD_KILLED, "CLD_KILLED", "Child has terminated abnormally and did not create a core file." }, | |||
952 | { SIGCHLD17, CLD_DUMPEDCLD_DUMPED, "CLD_DUMPED", "Child has terminated abnormally and created a core file." }, | |||
953 | { SIGCHLD17, CLD_TRAPPEDCLD_TRAPPED, "CLD_TRAPPED", "Traced child has trapped." }, | |||
954 | { SIGCHLD17, CLD_STOPPEDCLD_STOPPED, "CLD_STOPPED", "Child has stopped." }, | |||
955 | { SIGCHLD17, CLD_CONTINUEDCLD_CONTINUED,"CLD_CONTINUED","Stopped child has continued." }, | |||
956 | #ifdef SIGPOLL29 | |||
957 | { SIGPOLL29, POLL_OUTPOLL_OUT, "POLL_OUT", "Output buffers available." }, | |||
958 | { SIGPOLL29, POLL_MSGPOLL_MSG, "POLL_MSG", "Input message available." }, | |||
959 | { SIGPOLL29, POLL_ERRPOLL_ERR, "POLL_ERR", "I/O error." }, | |||
960 | { SIGPOLL29, POLL_PRIPOLL_PRI, "POLL_PRI", "High priority input available." }, | |||
961 | { SIGPOLL29, POLL_HUPPOLL_HUP, "POLL_HUP", "Device disconnected. [Option End]" }, | |||
962 | #endif | |||
963 | { -1, -1, NULL__null, NULL__null } | |||
964 | }; | |||
965 | ||||
966 | // Codes valid in any signal context. | |||
967 | const struct { | |||
968 | int code; const char* s_code; const char* s_desc; | |||
969 | } t2 [] = { | |||
970 | { SI_USERSI_USER, "SI_USER", "Signal sent by kill()." }, | |||
971 | { SI_QUEUESI_QUEUE, "SI_QUEUE", "Signal sent by the sigqueue()." }, | |||
972 | { SI_TIMERSI_TIMER, "SI_TIMER", "Signal generated by expiration of a timer set by timer_settime()." }, | |||
973 | { SI_ASYNCIOSI_ASYNCIO, "SI_ASYNCIO", "Signal generated by completion of an asynchronous I/O request." }, | |||
974 | { SI_MESGQSI_MESGQ, "SI_MESGQ", "Signal generated by arrival of a message on an empty message queue." }, | |||
975 | // Linux specific | |||
976 | #ifdef SI_TKILLSI_TKILL | |||
977 | { SI_TKILLSI_TKILL, "SI_TKILL", "Signal sent by tkill (pthread_kill)" }, | |||
978 | #endif | |||
979 | #ifdef SI_DETHREAD | |||
980 | { SI_DETHREAD, "SI_DETHREAD", "Signal sent by execve() killing subsidiary threads" }, | |||
981 | #endif | |||
982 | #ifdef SI_KERNELSI_KERNEL | |||
983 | { SI_KERNELSI_KERNEL, "SI_KERNEL", "Signal sent by kernel." }, | |||
984 | #endif | |||
985 | #ifdef SI_SIGIOSI_SIGIO | |||
986 | { SI_SIGIOSI_SIGIO, "SI_SIGIO", "Signal sent by queued SIGIO" }, | |||
987 | #endif | |||
988 | ||||
989 | #if defined(AIX) | |||
990 | { SI_UNDEFINED, "SI_UNDEFINED","siginfo contains partial information" }, | |||
991 | { SI_EMPTY, "SI_EMPTY", "siginfo contains no useful information" }, | |||
992 | #endif | |||
993 | ||||
994 | { -1, NULL__null, NULL__null } | |||
995 | }; | |||
996 | ||||
997 | const char* s_code = NULL__null; | |||
998 | const char* s_desc = NULL__null; | |||
999 | ||||
1000 | for (int i = 0; t1[i].sig != -1; i ++) { | |||
1001 | if (t1[i].sig == si->si_signo && t1[i].code == si->si_code) { | |||
1002 | s_code = t1[i].s_code; | |||
1003 | s_desc = t1[i].s_desc; | |||
1004 | break; | |||
1005 | } | |||
1006 | } | |||
1007 | ||||
1008 | if (s_code == NULL__null) { | |||
1009 | for (int i = 0; t2[i].s_code != NULL__null; i ++) { | |||
1010 | if (t2[i].code == si->si_code) { | |||
1011 | s_code = t2[i].s_code; | |||
1012 | s_desc = t2[i].s_desc; | |||
1013 | } | |||
1014 | } | |||
1015 | } | |||
1016 | ||||
1017 | if (s_code == NULL__null) { | |||
1018 | out->s_name = "unknown"; | |||
1019 | out->s_desc = "unknown"; | |||
1020 | return false; | |||
1021 | } | |||
1022 | ||||
1023 | out->s_name = s_code; | |||
1024 | out->s_desc = s_desc; | |||
1025 | ||||
1026 | return true; | |||
1027 | } | |||
1028 | ||||
1029 | bool os::signal_sent_by_kill(const void* siginfo) { | |||
1030 | const siginfo_t* const si = (const siginfo_t*)siginfo; | |||
1031 | return si->si_code == SI_USERSI_USER || si->si_code == SI_QUEUESI_QUEUE | |||
1032 | #ifdef SI_TKILLSI_TKILL | |||
1033 | || si->si_code == SI_TKILLSI_TKILL | |||
1034 | #endif | |||
1035 | ; | |||
1036 | } | |||
1037 | ||||
1038 | // Returns true if signal number is valid. | |||
1039 | static bool is_valid_signal(int sig) { | |||
1040 | // MacOS not really POSIX compliant: sigaddset does not return | |||
1041 | // an error for invalid signal numbers. However, MacOS does not | |||
1042 | // support real time signals and simply seems to have just 33 | |||
1043 | // signals with no holes in the signal range. | |||
1044 | #if defined(__APPLE__) | |||
1045 | return sig >= 1 && sig < NSIG(64 + 1); | |||
1046 | #else | |||
1047 | // Use sigaddset to check for signal validity. | |||
1048 | sigset_t set; | |||
1049 | sigemptyset(&set); | |||
1050 | if (sigaddset(&set, sig) == -1 && errno(*__errno_location ()) == EINVAL22) { | |||
1051 | return false; | |||
1052 | } | |||
1053 | return true; | |||
1054 | #endif | |||
1055 | } | |||
1056 | ||||
1057 | static const char* get_signal_name(int sig, char* out, size_t outlen) { | |||
1058 | ||||
1059 | const char* ret = NULL__null; | |||
1060 | ||||
1061 | #ifdef SIGRTMIN(__libc_current_sigrtmin ()) | |||
1062 | if (sig >= SIGRTMIN(__libc_current_sigrtmin ()) && sig <= SIGRTMAX(__libc_current_sigrtmax ())) { | |||
1063 | if (sig == SIGRTMIN(__libc_current_sigrtmin ())) { | |||
1064 | ret = "SIGRTMIN"; | |||
1065 | } else if (sig == SIGRTMAX(__libc_current_sigrtmax ())) { | |||
1066 | ret = "SIGRTMAX"; | |||
1067 | } else { | |||
1068 | jio_snprintf(out, outlen, "SIGRTMIN+%d", sig - SIGRTMIN(__libc_current_sigrtmin ())); | |||
1069 | return out; | |||
1070 | } | |||
1071 | } | |||
1072 | #endif | |||
1073 | ||||
1074 | if (sig > 0) { | |||
1075 | for (int idx = 0; g_signal_info[idx].sig != -1; idx ++) { | |||
1076 | if (g_signal_info[idx].sig == sig) { | |||
1077 | ret = g_signal_info[idx].name; | |||
1078 | break; | |||
1079 | } | |||
1080 | } | |||
1081 | } | |||
1082 | ||||
1083 | if (!ret) { | |||
1084 | if (!is_valid_signal(sig)) { | |||
1085 | ret = "INVALID"; | |||
1086 | } else { | |||
1087 | ret = "UNKNOWN"; | |||
1088 | } | |||
1089 | } | |||
1090 | ||||
1091 | if (out && outlen > 0) { | |||
1092 | strncpy(out, ret, outlen); | |||
1093 | out[outlen - 1] = '\0'; | |||
1094 | } | |||
1095 | return out; | |||
1096 | } | |||
1097 | ||||
1098 | void os::print_siginfo(outputStream* os, const void* si0) { | |||
1099 | ||||
1100 | const siginfo_t* const si = (const siginfo_t*) si0; | |||
1101 | ||||
1102 | char buf[20]; | |||
1103 | os->print("siginfo:"); | |||
1104 | ||||
1105 | if (!si) { | |||
1106 | os->print(" <null>"); | |||
1107 | return; | |||
1108 | } | |||
1109 | ||||
1110 | const int sig = si->si_signo; | |||
1111 | ||||
1112 | os->print(" si_signo: %d (%s)", sig, get_signal_name(sig, buf, sizeof(buf))); | |||
1113 | ||||
1114 | enum_sigcode_desc_t ed; | |||
1115 | get_signal_code_description(si, &ed); | |||
1116 | os->print(", si_code: %d (%s)", si->si_code, ed.s_name); | |||
1117 | ||||
1118 | if (si->si_errno) { | |||
1119 | os->print(", si_errno: %d", si->si_errno); | |||
1120 | } | |||
1121 | ||||
1122 | // Output additional information depending on the signal code. | |||
1123 | ||||
1124 | // Note: Many implementations lump si_addr, si_pid, si_uid etc. together as unions, | |||
1125 | // so it depends on the context which member to use. For synchronous error signals, | |||
1126 | // we print si_addr, unless the signal was sent by another process or thread, in | |||
1127 | // which case we print out pid or tid of the sender. | |||
1128 | if (os::signal_sent_by_kill(si)) { | |||
1129 | const pid_t pid = si->si_pid_sifields._kill.si_pid; | |||
1130 | os->print(", si_pid: %ld", (long) pid); | |||
1131 | if (IS_VALID_PID(pid)(pid > 0 && pid < 2147483647)) { | |||
1132 | const pid_t me = getpid(); | |||
1133 | if (me == pid) { | |||
1134 | os->print(" (current process)"); | |||
1135 | } | |||
1136 | } else { | |||
1137 | os->print(" (invalid)"); | |||
1138 | } | |||
1139 | os->print(", si_uid: %ld", (long) si->si_uid_sifields._kill.si_uid); | |||
1140 | if (sig == SIGCHLD17) { | |||
1141 | os->print(", si_status: %d", si->si_status_sifields._sigchld.si_status); | |||
1142 | } | |||
1143 | } else if (sig == SIGSEGV11 || sig == SIGBUS7 || sig == SIGILL4 || | |||
1144 | sig == SIGTRAP5 || sig == SIGFPE8) { | |||
1145 | os->print(", si_addr: " PTR_FORMAT"0x%016" "l" "x", p2i(si->si_addr_sifields._sigfault.si_addr)); | |||
1146 | #ifdef SIGPOLL29 | |||
1147 | } else if (sig == SIGPOLL29) { | |||
1148 | // siginfo_t.si_band is defined as "long", and it is so in most | |||
1149 | // implementations. But SPARC64 glibc has a bug: si_band is "int". | |||
1150 | // Cast si_band to "long" to prevent format specifier mismatch. | |||
1151 | // See: https://sourceware.org/bugzilla/show_bug.cgi?id=23821 | |||
1152 | os->print(", si_band: %ld", (long) si->si_band_sifields._sigpoll.si_band); | |||
1153 | #endif | |||
1154 | } | |||
1155 | } | |||
1156 | ||||
1157 | bool os::signal_thread(Thread* thread, int sig, const char* reason) { | |||
1158 | OSThread* osthread = thread->osthread(); | |||
1159 | if (osthread) { | |||
1160 | int status = pthread_kill(osthread->pthread_id(), sig); | |||
1161 | if (status == 0) { | |||
1162 | Events::log(Thread::current(), "sent signal %d to Thread " INTPTR_FORMAT"0x%016" "l" "x" " because %s.", | |||
1163 | sig, p2i(thread), reason); | |||
1164 | return true; | |||
1165 | } | |||
1166 | } | |||
1167 | return false; | |||
1168 | } | |||
1169 | ||||
1170 | // Returns: | |||
1171 | // NULL for an invalid signal number | |||
1172 | // "SIG<num>" for a valid but unknown signal number | |||
1173 | // signal name otherwise. | |||
1174 | const char* os::exception_name(int sig, char* buf, size_t size) { | |||
1175 | if (!is_valid_signal(sig)) { | |||
1176 | return NULL__null; | |||
1177 | } | |||
1178 | const char* const name = get_signal_name(sig, buf, size); | |||
1179 | if (strcmp(name, "UNKNOWN") == 0) { | |||
1180 | jio_snprintf(buf, size, "SIG%d", sig); | |||
1181 | } | |||
1182 | return buf; | |||
1183 | } | |||
1184 | ||||
1185 | int os::get_signal_number(const char* signal_name) { | |||
1186 | char tmp[30]; | |||
1187 | const char* s = signal_name; | |||
1188 | if (s[0] != 'S' || s[1] != 'I' || s[2] != 'G') { | |||
1189 | jio_snprintf(tmp, sizeof(tmp), "SIG%s", signal_name); | |||
1190 | s = tmp; | |||
1191 | } | |||
1192 | for (int idx = 0; g_signal_info[idx].sig != -1; idx ++) { | |||
1193 | if (strcmp(g_signal_info[idx].name, s) == 0) { | |||
1194 | return g_signal_info[idx].sig; | |||
1195 | } | |||
1196 | } | |||
1197 | return -1; | |||
1198 | } | |||
1199 | ||||
1200 | void set_signal_handler(int sig) { | |||
1201 | // Check for overwrite. | |||
1202 | struct sigaction oldAct; | |||
1203 | sigaction(sig, (struct sigaction*)NULL__null, &oldAct); | |||
1204 | ||||
1205 | // Query the current signal handler. Needs to be a separate operation | |||
1206 | // from installing a new handler since we need to honor AllowUserSignalHandlers. | |||
1207 | void* oldhand = get_signal_handler(&oldAct); | |||
1208 | if (!HANDLER_IS_IGN_OR_DFL(oldhand)((((oldhand) == ((void*)((address_word)((((__sighandler_t) 1) )))))) || (((oldhand) == ((void*)((address_word)((((__sighandler_t ) 0)))))))) && | |||
1209 | !HANDLER_IS(oldhand, javaSignalHandler)((oldhand) == ((void*)((address_word)((javaSignalHandler)))))) { | |||
1210 | if (AllowUserSignalHandlers) { | |||
1211 | // Do not overwrite; user takes responsibility to forward to us. | |||
1212 | return; | |||
1213 | } else if (UseSignalChaining) { | |||
1214 | // save the old handler in jvm | |||
1215 | chained_handlers.set(sig, &oldAct); | |||
1216 | // libjsig also interposes the sigaction() call below and saves the | |||
1217 | // old sigaction on it own. | |||
1218 | } else { | |||
1219 | fatal("Encountered unexpected pre-existing sigaction handler "do { (*g_assert_poison) = 'X';; report_fatal(INTERNAL_ERROR, "/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 1220, "Encountered unexpected pre-existing sigaction handler " "%#lx for signal %d.", (long)oldhand, sig); ::breakpoint(); } while (0) | |||
1220 | "%#lx for signal %d.", (long)oldhand, sig)do { (*g_assert_poison) = 'X';; report_fatal(INTERNAL_ERROR, "/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 1220, "Encountered unexpected pre-existing sigaction handler " "%#lx for signal %d.", (long)oldhand, sig); ::breakpoint(); } while (0); | |||
1221 | } | |||
1222 | } | |||
1223 | ||||
1224 | struct sigaction sigAct; | |||
1225 | sigfillset(&(sigAct.sa_mask)); | |||
1226 | remove_error_signals_from_set(&(sigAct.sa_mask)); | |||
1227 | sigAct.sa_sigaction__sigaction_handler.sa_sigaction = javaSignalHandler; | |||
1228 | sigAct.sa_flags = SA_SIGINFO4|SA_RESTART0x10000000; | |||
1229 | #if defined(__APPLE__) | |||
1230 | // Needed for main thread as XNU (Mac OS X kernel) will only deliver SIGSEGV | |||
1231 | // (which starts as SIGBUS) on main thread with faulting address inside "stack+guard pages" | |||
1232 | // if the signal handler declares it will handle it on alternate stack. | |||
1233 | // Notice we only declare we will handle it on alt stack, but we are not | |||
1234 | // actually going to use real alt stack - this is just a workaround. | |||
1235 | // Please see ux_exception.c, method catch_mach_exception_raise for details | |||
1236 | // link http://www.opensource.apple.com/source/xnu/xnu-2050.18.24/bsd/uxkern/ux_exception.c | |||
1237 | if (sig == SIGSEGV11) { | |||
1238 | sigAct.sa_flags |= SA_ONSTACK0x08000000; | |||
1239 | } | |||
1240 | #endif | |||
1241 | ||||
1242 | // Save handler setup for later checking | |||
1243 | vm_handlers.set(sig, &sigAct); | |||
1244 | do_check_signal_periodically[sig] = true; | |||
1245 | ||||
1246 | int ret = sigaction(sig, &sigAct, &oldAct); | |||
1247 | assert(ret == 0, "check")do { if (!(ret == 0)) { (*g_assert_poison) = 'X';; report_vm_error ("/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 1247, "assert(" "ret == 0" ") failed", "check"); ::breakpoint (); } } while (0); | |||
1248 | ||||
1249 | void* oldhand2 = get_signal_handler(&oldAct); | |||
1250 | assert(oldhand2 == oldhand, "no concurrent signal handler installation")do { if (!(oldhand2 == oldhand)) { (*g_assert_poison) = 'X';; report_vm_error("/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 1250, "assert(" "oldhand2 == oldhand" ") failed", "no concurrent signal handler installation" ); ::breakpoint(); } } while (0); | |||
1251 | } | |||
1252 | ||||
1253 | // install signal handlers for signals that HotSpot needs to | |||
1254 | // handle in order to support Java-level exception handling. | |||
1255 | void install_signal_handlers() { | |||
1256 | // signal-chaining | |||
1257 | typedef void (*signal_setting_t)(); | |||
1258 | signal_setting_t begin_signal_setting = NULL__null; | |||
1259 | signal_setting_t end_signal_setting = NULL__null; | |||
1260 | begin_signal_setting = CAST_TO_FN_PTR(signal_setting_t,(reinterpret_cast<signal_setting_t>(dlsym(((void *) 0), "JVM_begin_signal_setting"))) | |||
1261 | dlsym(RTLD_DEFAULT, "JVM_begin_signal_setting"))(reinterpret_cast<signal_setting_t>(dlsym(((void *) 0), "JVM_begin_signal_setting"))); | |||
1262 | if (begin_signal_setting != NULL__null) { | |||
1263 | end_signal_setting = CAST_TO_FN_PTR(signal_setting_t,(reinterpret_cast<signal_setting_t>(dlsym(((void *) 0), "JVM_end_signal_setting"))) | |||
1264 | dlsym(RTLD_DEFAULT, "JVM_end_signal_setting"))(reinterpret_cast<signal_setting_t>(dlsym(((void *) 0), "JVM_end_signal_setting"))); | |||
1265 | get_signal_action = CAST_TO_FN_PTR(get_signal_t,(reinterpret_cast<get_signal_t>(dlsym(((void *) 0), "JVM_get_signal_action" ))) | |||
1266 | dlsym(RTLD_DEFAULT, "JVM_get_signal_action"))(reinterpret_cast<get_signal_t>(dlsym(((void *) 0), "JVM_get_signal_action" ))); | |||
1267 | libjsig_is_loaded = true; | |||
1268 | assert(UseSignalChaining, "should enable signal-chaining")do { if (!(UseSignalChaining)) { (*g_assert_poison) = 'X';; report_vm_error ("/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 1268, "assert(" "UseSignalChaining" ") failed", "should enable signal-chaining" ); ::breakpoint(); } } while (0); | |||
1269 | } | |||
1270 | if (libjsig_is_loaded) { | |||
1271 | // Tell libjsig jvm is setting signal handlers | |||
1272 | (*begin_signal_setting)(); | |||
1273 | } | |||
1274 | ||||
1275 | set_signal_handler(SIGSEGV11); | |||
1276 | set_signal_handler(SIGPIPE13); | |||
1277 | set_signal_handler(SIGBUS7); | |||
1278 | set_signal_handler(SIGILL4); | |||
1279 | set_signal_handler(SIGFPE8); | |||
1280 | PPC64_ONLY(set_signal_handler(SIGTRAP);) | |||
1281 | set_signal_handler(SIGXFSZ25); | |||
1282 | ||||
1283 | #if defined(__APPLE__) | |||
1284 | // lldb (gdb) installs both standard BSD signal handlers, and mach exception | |||
1285 | // handlers. By replacing the existing task exception handler, we disable lldb's mach | |||
1286 | // exception handling, while leaving the standard BSD signal handlers functional. | |||
1287 | // | |||
1288 | // EXC_MASK_BAD_ACCESS needed by all architectures for NULL ptr checking | |||
1289 | // EXC_MASK_ARITHMETIC needed by all architectures for div by 0 checking | |||
1290 | // EXC_MASK_BAD_INSTRUCTION needed by aarch64 to initiate deoptimization | |||
1291 | kern_return_t kr; | |||
1292 | kr = task_set_exception_ports(mach_task_self(), | |||
1293 | EXC_MASK_BAD_ACCESS | EXC_MASK_ARITHMETIC | |||
1294 | AARCH64_ONLY(| EXC_MASK_BAD_INSTRUCTION), | |||
1295 | MACH_PORT_NULL, | |||
1296 | EXCEPTION_STATE_IDENTITY, | |||
1297 | MACHINE_THREAD_STATE); | |||
1298 | ||||
1299 | assert(kr == KERN_SUCCESS, "could not set mach task signal handler")do { if (!(kr == KERN_SUCCESS)) { (*g_assert_poison) = 'X';; report_vm_error ("/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 1299, "assert(" "kr == KERN_SUCCESS" ") failed", "could not set mach task signal handler" ); ::breakpoint(); } } while (0); | |||
1300 | #endif | |||
1301 | ||||
1302 | if (libjsig_is_loaded) { | |||
1303 | // Tell libjsig jvm finishes setting signal handlers | |||
1304 | (*end_signal_setting)(); | |||
| ||||
1305 | } | |||
1306 | ||||
1307 | // We don't activate signal checker if libjsig is in place, we trust ourselves | |||
1308 | // and if UserSignalHandler is installed all bets are off. | |||
1309 | // Log that signal checking is off only if -verbose:jni is specified. | |||
1310 | if (CheckJNICalls) { | |||
1311 | if (libjsig_is_loaded) { | |||
1312 | log_debug(jni, resolve)(!(LogImpl<(LogTag::_jni), (LogTag::_resolve), (LogTag::__NO_TAG ), (LogTag::__NO_TAG), (LogTag::__NO_TAG), (LogTag::__NO_TAG) >::is_level(LogLevel::Debug))) ? (void)0 : LogImpl<(LogTag ::_jni), (LogTag::_resolve), (LogTag::__NO_TAG), (LogTag::__NO_TAG ), (LogTag::__NO_TAG), (LogTag::__NO_TAG)>::write<LogLevel ::Debug>("Info: libjsig is activated, all active signal checking is disabled"); | |||
1313 | check_signals = false; | |||
1314 | } | |||
1315 | if (AllowUserSignalHandlers) { | |||
1316 | log_debug(jni, resolve)(!(LogImpl<(LogTag::_jni), (LogTag::_resolve), (LogTag::__NO_TAG ), (LogTag::__NO_TAG), (LogTag::__NO_TAG), (LogTag::__NO_TAG) >::is_level(LogLevel::Debug))) ? (void)0 : LogImpl<(LogTag ::_jni), (LogTag::_resolve), (LogTag::__NO_TAG), (LogTag::__NO_TAG ), (LogTag::__NO_TAG), (LogTag::__NO_TAG)>::write<LogLevel ::Debug>("Info: AllowUserSignalHandlers is activated, all active signal checking is disabled"); | |||
1317 | check_signals = false; | |||
1318 | } | |||
1319 | } | |||
1320 | } | |||
1321 | ||||
1322 | // Returns one-line short description of a signal set in a user provided buffer. | |||
1323 | static const char* describe_signal_set_short(const sigset_t* set, char* buffer, size_t buf_size) { | |||
1324 | assert(buf_size == (NUM_IMPORTANT_SIGS + 1), "wrong buffer size")do { if (!(buf_size == (32 + 1))) { (*g_assert_poison) = 'X'; ; report_vm_error("/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 1324, "assert(" "buf_size == (32 + 1)" ") failed", "wrong buffer size" ); ::breakpoint(); } } while (0); | |||
1325 | // Note: for shortness, just print out the first 32. That should | |||
1326 | // cover most of the useful ones, apart from realtime signals. | |||
1327 | for (int sig = 1; sig <= NUM_IMPORTANT_SIGS32; sig++) { | |||
1328 | const int rc = sigismember(set, sig); | |||
1329 | if (rc == -1 && errno(*__errno_location ()) == EINVAL22) { | |||
1330 | buffer[sig-1] = '?'; | |||
1331 | } else { | |||
1332 | buffer[sig-1] = rc == 0 ? '0' : '1'; | |||
1333 | } | |||
1334 | } | |||
1335 | buffer[NUM_IMPORTANT_SIGS32] = 0; | |||
1336 | return buffer; | |||
1337 | } | |||
1338 | ||||
1339 | // Prints one-line description of a signal set. | |||
1340 | static void print_signal_set_short(outputStream* st, const sigset_t* set) { | |||
1341 | char buf[NUM_IMPORTANT_SIGS32 + 1]; | |||
1342 | describe_signal_set_short(set, buf, sizeof(buf)); | |||
1343 | st->print("%s", buf); | |||
1344 | } | |||
1345 | ||||
1346 | static void print_single_signal_handler(outputStream* st, | |||
1347 | const struct sigaction* act, | |||
1348 | char* buf, size_t buflen) { | |||
1349 | ||||
1350 | address handler = get_signal_handler(act); | |||
1351 | if (HANDLER_IS_DFL(handler)(((handler) == ((void*)((address_word)((((__sighandler_t) 0)) )))))) { | |||
1352 | st->print("SIG_DFL"); | |||
1353 | } else if (HANDLER_IS_IGN(handler)(((handler) == ((void*)((address_word)((((__sighandler_t) 1)) )))))) { | |||
1354 | st->print("SIG_IGN"); | |||
1355 | } else { | |||
1356 | print_signal_handler_name(st, handler, buf, buflen); | |||
1357 | } | |||
1358 | ||||
1359 | st->print(", mask="); | |||
1360 | print_signal_set_short(st, &(act->sa_mask)); | |||
1361 | ||||
1362 | st->print(", flags="); | |||
1363 | int flags = get_sanitized_sa_flags(act); | |||
1364 | print_sa_flags(st, flags); | |||
1365 | ||||
1366 | } | |||
1367 | ||||
1368 | // Print established signal handler for this signal. | |||
1369 | // - if this signal handler was installed by us and is chained to a pre-established user handler | |||
1370 | // it replaced, print that one too. | |||
1371 | // - otherwise, if this signal handler was installed by us and replaced another handler to which we | |||
1372 | // are not chained (e.g. if chaining is off), print that one too. | |||
1373 | void PosixSignals::print_signal_handler(outputStream* st, int sig, | |||
1374 | char* buf, size_t buflen) { | |||
1375 | ||||
1376 | st->print("%10s: ", os::exception_name(sig, buf, buflen)); | |||
1377 | ||||
1378 | struct sigaction current_act; | |||
1379 | sigaction(sig, NULL__null, ¤t_act); | |||
1380 | ||||
1381 | print_single_signal_handler(st, ¤t_act, buf, buflen); | |||
1382 | st->cr(); | |||
1383 | ||||
1384 | // If we expected to see our own hotspot signal handler but found a different one, | |||
1385 | // print a warning (unless the handler replacing it is our own crash handler, which can | |||
1386 | // happen if this function is called during error reporting). | |||
1387 | const struct sigaction* expected_act = vm_handlers.get(sig); | |||
1388 | if (expected_act != NULL__null) { | |||
1389 | const address current_handler = get_signal_handler(¤t_act); | |||
1390 | if (!(HANDLER_IS(current_handler, VMError::crash_handler_address)((current_handler) == ((void*)((address_word)((VMError::crash_handler_address ))))))) { | |||
1391 | if (!are_handlers_equal(¤t_act, expected_act)) { | |||
1392 | st->print_cr(" *** Handler was modified!"); | |||
1393 | st->print (" *** Expected: "); | |||
1394 | print_single_signal_handler(st, expected_act, buf, buflen); | |||
1395 | st->cr(); | |||
1396 | } | |||
1397 | } | |||
1398 | } | |||
1399 | ||||
1400 | // If there is a chained handler waiting behind the current one, print it too. | |||
1401 | const struct sigaction* chained_act = get_chained_signal_action(sig); | |||
1402 | if (chained_act != NULL__null) { | |||
1403 | st->print(" chained to: "); | |||
1404 | print_single_signal_handler(st, ¤t_act, buf, buflen); | |||
1405 | st->cr(); | |||
1406 | } | |||
1407 | } | |||
1408 | ||||
1409 | void os::print_signal_handlers(outputStream* st, char* buf, size_t buflen) { | |||
1410 | st->print_cr("Signal Handlers:"); | |||
1411 | PosixSignals::print_signal_handler(st, SIGSEGV11, buf, buflen); | |||
1412 | PosixSignals::print_signal_handler(st, SIGBUS7 , buf, buflen); | |||
1413 | PosixSignals::print_signal_handler(st, SIGFPE8 , buf, buflen); | |||
1414 | PosixSignals::print_signal_handler(st, SIGPIPE13, buf, buflen); | |||
1415 | PosixSignals::print_signal_handler(st, SIGXFSZ25, buf, buflen); | |||
1416 | PosixSignals::print_signal_handler(st, SIGILL4 , buf, buflen); | |||
1417 | PosixSignals::print_signal_handler(st, PosixSignals::SR_signum, buf, buflen); | |||
1418 | PosixSignals::print_signal_handler(st, SHUTDOWN1_SIGNAL1, buf, buflen); | |||
1419 | PosixSignals::print_signal_handler(st, SHUTDOWN2_SIGNAL2 , buf, buflen); | |||
1420 | PosixSignals::print_signal_handler(st, SHUTDOWN3_SIGNAL15 , buf, buflen); | |||
1421 | PosixSignals::print_signal_handler(st, BREAK_SIGNAL3, buf, buflen); | |||
1422 | #if defined(SIGDANGER) | |||
1423 | // We also want to know if someone else adds a SIGDANGER handler because | |||
1424 | // that will interfere with OOM killling. | |||
1425 | PosixSignals::print_signal_handler(st, SIGDANGER, buf, buflen); | |||
1426 | #endif | |||
1427 | #if defined(SIGTRAP5) | |||
1428 | PosixSignals::print_signal_handler(st, SIGTRAP5, buf, buflen); | |||
1429 | #endif | |||
1430 | } | |||
1431 | ||||
1432 | bool PosixSignals::is_sig_ignored(int sig) { | |||
1433 | struct sigaction oact; | |||
1434 | sigaction(sig, (struct sigaction*)NULL__null, &oact); | |||
1435 | if (HANDLER_IS_IGN(get_signal_handler(&oact))(((get_signal_handler(&oact)) == ((void*)((address_word)( (((__sighandler_t) 1)))))))) { | |||
1436 | return true; | |||
1437 | } else { | |||
1438 | return false; | |||
1439 | } | |||
1440 | } | |||
1441 | ||||
1442 | static void signal_sets_init() { | |||
1443 | sigemptyset(&preinstalled_sigs); | |||
1444 | ||||
1445 | // Should also have an assertion stating we are still single-threaded. | |||
1446 | assert(!signal_sets_initialized, "Already initialized")do { if (!(!signal_sets_initialized)) { (*g_assert_poison) = 'X' ;; report_vm_error("/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 1446, "assert(" "!signal_sets_initialized" ") failed", "Already initialized" ); ::breakpoint(); } } while (0); | |||
1447 | // Fill in signals that are necessarily unblocked for all threads in | |||
1448 | // the VM. Currently, we unblock the following signals: | |||
1449 | // SHUTDOWN{1,2,3}_SIGNAL: for shutdown hooks support (unless over-ridden | |||
1450 | // by -Xrs (=ReduceSignalUsage)); | |||
1451 | // BREAK_SIGNAL which is unblocked only by the VM thread and blocked by all | |||
1452 | // other threads. The "ReduceSignalUsage" boolean tells us not to alter | |||
1453 | // the dispositions or masks wrt these signals. | |||
1454 | // Programs embedding the VM that want to use the above signals for their | |||
1455 | // own purposes must, at this time, use the "-Xrs" option to prevent | |||
1456 | // interference with shutdown hooks and BREAK_SIGNAL thread dumping. | |||
1457 | // (See bug 4345157, and other related bugs). | |||
1458 | // In reality, though, unblocking these signals is really a nop, since | |||
1459 | // these signals are not blocked by default. | |||
1460 | sigemptyset(&unblocked_sigs); | |||
1461 | sigaddset(&unblocked_sigs, SIGILL4); | |||
1462 | sigaddset(&unblocked_sigs, SIGSEGV11); | |||
1463 | sigaddset(&unblocked_sigs, SIGBUS7); | |||
1464 | sigaddset(&unblocked_sigs, SIGFPE8); | |||
1465 | PPC64_ONLY(sigaddset(&unblocked_sigs, SIGTRAP);) | |||
1466 | sigaddset(&unblocked_sigs, PosixSignals::SR_signum); | |||
1467 | ||||
1468 | if (!ReduceSignalUsage) { | |||
1469 | if (!PosixSignals::is_sig_ignored(SHUTDOWN1_SIGNAL1)) { | |||
1470 | sigaddset(&unblocked_sigs, SHUTDOWN1_SIGNAL1); | |||
1471 | } | |||
1472 | if (!PosixSignals::is_sig_ignored(SHUTDOWN2_SIGNAL2)) { | |||
1473 | sigaddset(&unblocked_sigs, SHUTDOWN2_SIGNAL2); | |||
1474 | } | |||
1475 | if (!PosixSignals::is_sig_ignored(SHUTDOWN3_SIGNAL15)) { | |||
1476 | sigaddset(&unblocked_sigs, SHUTDOWN3_SIGNAL15); | |||
1477 | } | |||
1478 | } | |||
1479 | // Fill in signals that are blocked by all but the VM thread. | |||
1480 | sigemptyset(&vm_sigs); | |||
1481 | if (!ReduceSignalUsage) { | |||
1482 | sigaddset(&vm_sigs, BREAK_SIGNAL3); | |||
1483 | } | |||
1484 | debug_only(signal_sets_initialized = true)signal_sets_initialized = true; | |||
1485 | } | |||
1486 | ||||
1487 | // These are signals that are unblocked while a thread is running Java. | |||
1488 | // (For some reason, they get blocked by default.) | |||
1489 | static sigset_t* unblocked_signals() { | |||
1490 | assert(signal_sets_initialized, "Not initialized")do { if (!(signal_sets_initialized)) { (*g_assert_poison) = 'X' ;; report_vm_error("/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 1490, "assert(" "signal_sets_initialized" ") failed", "Not initialized" ); ::breakpoint(); } } while (0); | |||
1491 | return &unblocked_sigs; | |||
1492 | } | |||
1493 | ||||
1494 | // These are the signals that are blocked while a (non-VM) thread is | |||
1495 | // running Java. Only the VM thread handles these signals. | |||
1496 | static sigset_t* vm_signals() { | |||
1497 | assert(signal_sets_initialized, "Not initialized")do { if (!(signal_sets_initialized)) { (*g_assert_poison) = 'X' ;; report_vm_error("/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 1497, "assert(" "signal_sets_initialized" ") failed", "Not initialized" ); ::breakpoint(); } } while (0); | |||
1498 | return &vm_sigs; | |||
1499 | } | |||
1500 | ||||
1501 | void PosixSignals::hotspot_sigmask(Thread* thread) { | |||
1502 | ||||
1503 | //Save caller's signal mask before setting VM signal mask | |||
1504 | sigset_t caller_sigmask; | |||
1505 | pthread_sigmask(SIG_BLOCK0, NULL__null, &caller_sigmask); | |||
1506 | ||||
1507 | OSThread* osthread = thread->osthread(); | |||
1508 | osthread->set_caller_sigmask(caller_sigmask); | |||
1509 | ||||
1510 | pthread_sigmask(SIG_UNBLOCK1, unblocked_signals(), NULL__null); | |||
1511 | ||||
1512 | if (!ReduceSignalUsage) { | |||
1513 | if (thread->is_VM_thread()) { | |||
1514 | // Only the VM thread handles BREAK_SIGNAL ... | |||
1515 | pthread_sigmask(SIG_UNBLOCK1, vm_signals(), NULL__null); | |||
1516 | } else { | |||
1517 | // ... all other threads block BREAK_SIGNAL | |||
1518 | pthread_sigmask(SIG_BLOCK0, vm_signals(), NULL__null); | |||
1519 | } | |||
1520 | } | |||
1521 | } | |||
1522 | ||||
1523 | //////////////////////////////////////////////////////////////////////////////// | |||
1524 | // suspend/resume support | |||
1525 | ||||
1526 | // The low-level signal-based suspend/resume support is a remnant from the | |||
1527 | // old VM-suspension that used to be for java-suspension, safepoints etc, | |||
1528 | // within hotspot. Currently used by JFR's OSThreadSampler | |||
1529 | // | |||
1530 | // The remaining code is greatly simplified from the more general suspension | |||
1531 | // code that used to be used. | |||
1532 | // | |||
1533 | // The protocol is quite simple: | |||
1534 | // - suspend: | |||
1535 | // - sends a signal to the target thread | |||
1536 | // - polls the suspend state of the osthread using a yield loop | |||
1537 | // - target thread signal handler (SR_handler) sets suspend state | |||
1538 | // and blocks in sigsuspend until continued | |||
1539 | // - resume: | |||
1540 | // - sets target osthread state to continue | |||
1541 | // - sends signal to end the sigsuspend loop in the SR_handler | |||
1542 | // | |||
1543 | // Note that resume_clear_context() and suspend_save_context() are needed | |||
1544 | // by SR_handler(), so that fetch_frame_from_context() works, | |||
1545 | // which in part is used by: | |||
1546 | // - Forte Analyzer: AsyncGetCallTrace() | |||
1547 | // - StackBanging: get_frame_at_stack_banging_point() | |||
1548 | ||||
1549 | sigset_t SR_sigset; | |||
1550 | ||||
1551 | static void resume_clear_context(OSThread *osthread) { | |||
1552 | osthread->set_ucontext(NULL__null); | |||
1553 | osthread->set_siginfo(NULL__null); | |||
1554 | } | |||
1555 | ||||
1556 | static void suspend_save_context(OSThread *osthread, siginfo_t* siginfo, ucontext_t* context) { | |||
1557 | osthread->set_ucontext(context); | |||
1558 | osthread->set_siginfo(siginfo); | |||
1559 | } | |||
1560 | ||||
1561 | // Handler function invoked when a thread's execution is suspended or | |||
1562 | // resumed. We have to be careful that only async-safe functions are | |||
1563 | // called here (Note: most pthread functions are not async safe and | |||
1564 | // should be avoided.) | |||
1565 | // | |||
1566 | // Note: sigwait() is a more natural fit than sigsuspend() from an | |||
1567 | // interface point of view, but sigwait() prevents the signal handler | |||
1568 | // from being run. libpthread would get very confused by not having | |||
1569 | // its signal handlers run and prevents sigwait()'s use with the | |||
1570 | // mutex granting signal. | |||
1571 | // | |||
1572 | // Currently only ever called on the VMThread and JavaThreads (PC sampling) | |||
1573 | // | |||
1574 | static void SR_handler(int sig, siginfo_t* siginfo, ucontext_t* context) { | |||
1575 | ||||
1576 | // Save and restore errno to avoid confusing native code with EINTR | |||
1577 | // after sigsuspend. | |||
1578 | int old_errno = errno(*__errno_location ()); | |||
1579 | ||||
1580 | PosixSignals::unblock_error_signals(); | |||
1581 | ||||
1582 | Thread* thread = Thread::current_or_null_safe(); | |||
1583 | assert(thread != NULL, "Missing current thread in SR_handler")do { if (!(thread != __null)) { (*g_assert_poison) = 'X';; report_vm_error ("/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 1583, "assert(" "thread != __null" ") failed", "Missing current thread in SR_handler" ); ::breakpoint(); } } while (0); | |||
1584 | ||||
1585 | // On some systems we have seen signal delivery get "stuck" until the signal | |||
1586 | // mask is changed as part of thread termination. Check that the current thread | |||
1587 | // has not already terminated - else the following assertion | |||
1588 | // will fail because the thread is no longer a JavaThread as the ~JavaThread | |||
1589 | // destructor has completed. | |||
1590 | ||||
1591 | if (thread->has_terminated()) { | |||
1592 | return; | |||
1593 | } | |||
1594 | ||||
1595 | assert(thread->is_VM_thread() || thread->is_Java_thread(), "Must be VMThread or JavaThread")do { if (!(thread->is_VM_thread() || thread->is_Java_thread ())) { (*g_assert_poison) = 'X';; report_vm_error("/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 1595, "assert(" "thread->is_VM_thread() || thread->is_Java_thread()" ") failed", "Must be VMThread or JavaThread"); ::breakpoint( ); } } while (0); | |||
1596 | ||||
1597 | OSThread* osthread = thread->osthread(); | |||
1598 | ||||
1599 | os::SuspendResume::State current = osthread->sr.state(); | |||
1600 | ||||
1601 | if (current == os::SuspendResume::SR_SUSPEND_REQUEST) { | |||
1602 | suspend_save_context(osthread, siginfo, context); | |||
1603 | ||||
1604 | // attempt to switch the state, we assume we had a SUSPEND_REQUEST | |||
1605 | os::SuspendResume::State state = osthread->sr.suspended(); | |||
1606 | if (state == os::SuspendResume::SR_SUSPENDED) { | |||
1607 | sigset_t suspend_set; // signals for sigsuspend() | |||
1608 | sigemptyset(&suspend_set); | |||
1609 | ||||
1610 | // get current set of blocked signals and unblock resume signal | |||
1611 | pthread_sigmask(SIG_BLOCK0, NULL__null, &suspend_set); | |||
1612 | sigdelset(&suspend_set, PosixSignals::SR_signum); | |||
1613 | ||||
1614 | sr_semaphore.signal(); | |||
1615 | ||||
1616 | // wait here until we are resumed | |||
1617 | while (1) { | |||
1618 | sigsuspend(&suspend_set); | |||
1619 | ||||
1620 | os::SuspendResume::State result = osthread->sr.running(); | |||
1621 | if (result == os::SuspendResume::SR_RUNNING) { | |||
1622 | // double check AIX doesn't need this! | |||
1623 | sr_semaphore.signal(); | |||
1624 | break; | |||
1625 | } else if (result != os::SuspendResume::SR_SUSPENDED) { | |||
1626 | ShouldNotReachHere()do { (*g_assert_poison) = 'X';; report_should_not_reach_here( "/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 1626); ::breakpoint(); } while (0); | |||
1627 | } | |||
1628 | } | |||
1629 | ||||
1630 | } else if (state == os::SuspendResume::SR_RUNNING) { | |||
1631 | // request was cancelled, continue | |||
1632 | } else { | |||
1633 | ShouldNotReachHere()do { (*g_assert_poison) = 'X';; report_should_not_reach_here( "/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 1633); ::breakpoint(); } while (0); | |||
1634 | } | |||
1635 | ||||
1636 | resume_clear_context(osthread); | |||
1637 | } else if (current == os::SuspendResume::SR_RUNNING) { | |||
1638 | // request was cancelled, continue | |||
1639 | } else if (current == os::SuspendResume::SR_WAKEUP_REQUEST) { | |||
1640 | // ignore | |||
1641 | } else { | |||
1642 | // ignore | |||
1643 | } | |||
1644 | ||||
1645 | errno(*__errno_location ()) = old_errno; | |||
1646 | } | |||
1647 | ||||
1648 | int SR_initialize() { | |||
1649 | struct sigaction act; | |||
1650 | char *s; | |||
1651 | // Get signal number to use for suspend/resume | |||
1652 | if ((s = ::getenv("_JAVA_SR_SIGNUM")) != 0) { | |||
1653 | int sig = ::strtol(s, 0, 10); | |||
1654 | if (sig > MAX2(SIGSEGV11, SIGBUS7) && // See 4355769. | |||
1655 | sig < NSIG(64 + 1)) { // Must be legal signal and fit into sigflags[]. | |||
1656 | PosixSignals::SR_signum = sig; | |||
1657 | } else { | |||
1658 | warning("You set _JAVA_SR_SIGNUM=%d. It must be in range [%d, %d]. Using %d instead.", | |||
1659 | sig, MAX2(SIGSEGV11, SIGBUS7)+1, NSIG(64 + 1)-1, PosixSignals::SR_signum); | |||
1660 | } | |||
1661 | } | |||
1662 | ||||
1663 | assert(PosixSignals::SR_signum > SIGSEGV && PosixSignals::SR_signum > SIGBUS,do { if (!(PosixSignals::SR_signum > 11 && PosixSignals ::SR_signum > 7)) { (*g_assert_poison) = 'X';; report_vm_error ("/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 1664, "assert(" "PosixSignals::SR_signum > 11 && PosixSignals::SR_signum > 7" ") failed", "SR_signum must be greater than max(SIGSEGV, SIGBUS), see 4355769" ); ::breakpoint(); } } while (0) | |||
1664 | "SR_signum must be greater than max(SIGSEGV, SIGBUS), see 4355769")do { if (!(PosixSignals::SR_signum > 11 && PosixSignals ::SR_signum > 7)) { (*g_assert_poison) = 'X';; report_vm_error ("/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 1664, "assert(" "PosixSignals::SR_signum > 11 && PosixSignals::SR_signum > 7" ") failed", "SR_signum must be greater than max(SIGSEGV, SIGBUS), see 4355769" ); ::breakpoint(); } } while (0); | |||
1665 | ||||
1666 | sigemptyset(&SR_sigset); | |||
1667 | sigaddset(&SR_sigset, PosixSignals::SR_signum); | |||
1668 | ||||
1669 | // Set up signal handler for suspend/resume | |||
1670 | act.sa_flags = SA_RESTART0x10000000|SA_SIGINFO4; | |||
1671 | act.sa_handler__sigaction_handler.sa_handler = (void (*)(int)) SR_handler; | |||
1672 | ||||
1673 | // SR_signum is blocked by default. | |||
1674 | pthread_sigmask(SIG_BLOCK0, NULL__null, &act.sa_mask); | |||
1675 | remove_error_signals_from_set(&(act.sa_mask)); | |||
1676 | ||||
1677 | if (sigaction(PosixSignals::SR_signum, &act, 0) == -1) { | |||
1678 | return -1; | |||
1679 | } | |||
1680 | ||||
1681 | // Save signal setup information for later checking. | |||
1682 | vm_handlers.set(PosixSignals::SR_signum, &act); | |||
1683 | do_check_signal_periodically[PosixSignals::SR_signum] = true; | |||
1684 | ||||
1685 | return 0; | |||
1686 | } | |||
1687 | ||||
1688 | static int sr_notify(OSThread* osthread) { | |||
1689 | int status = pthread_kill(osthread->pthread_id(), PosixSignals::SR_signum); | |||
1690 | assert_status(status == 0, status, "pthread_kill")do { if (!(status == 0)) { (*g_assert_poison) = 'X';; report_vm_status_error ("/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 1690, "assert(" "status == 0" ") failed", status, "pthread_kill" ); ::breakpoint(); } } while (0); | |||
1691 | return status; | |||
1692 | } | |||
1693 | ||||
1694 | // returns true on success and false on error - really an error is fatal | |||
1695 | // but this seems the normal response to library errors | |||
1696 | bool PosixSignals::do_suspend(OSThread* osthread) { | |||
1697 | assert(osthread->sr.is_running(), "thread should be running")do { if (!(osthread->sr.is_running())) { (*g_assert_poison ) = 'X';; report_vm_error("/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 1697, "assert(" "osthread->sr.is_running()" ") failed", "thread should be running" ); ::breakpoint(); } } while (0); | |||
1698 | assert(!sr_semaphore.trywait(), "semaphore has invalid state")do { if (!(!sr_semaphore.trywait())) { (*g_assert_poison) = 'X' ;; report_vm_error("/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 1698, "assert(" "!sr_semaphore.trywait()" ") failed", "semaphore has invalid state" ); ::breakpoint(); } } while (0); | |||
1699 | ||||
1700 | // mark as suspended and send signal | |||
1701 | if (osthread->sr.request_suspend() != os::SuspendResume::SR_SUSPEND_REQUEST) { | |||
1702 | // failed to switch, state wasn't running? | |||
1703 | ShouldNotReachHere()do { (*g_assert_poison) = 'X';; report_should_not_reach_here( "/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 1703); ::breakpoint(); } while (0); | |||
1704 | return false; | |||
1705 | } | |||
1706 | ||||
1707 | if (sr_notify(osthread) != 0) { | |||
1708 | ShouldNotReachHere()do { (*g_assert_poison) = 'X';; report_should_not_reach_here( "/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 1708); ::breakpoint(); } while (0); | |||
1709 | } | |||
1710 | ||||
1711 | // managed to send the signal and switch to SUSPEND_REQUEST, now wait for SUSPENDED | |||
1712 | while (true) { | |||
1713 | if (sr_semaphore.timedwait(2)) { | |||
1714 | break; | |||
1715 | } else { | |||
1716 | // timeout | |||
1717 | os::SuspendResume::State cancelled = osthread->sr.cancel_suspend(); | |||
1718 | if (cancelled == os::SuspendResume::SR_RUNNING) { | |||
1719 | return false; | |||
1720 | } else if (cancelled == os::SuspendResume::SR_SUSPENDED) { | |||
1721 | // make sure that we consume the signal on the semaphore as well | |||
1722 | sr_semaphore.wait(); | |||
1723 | break; | |||
1724 | } else { | |||
1725 | ShouldNotReachHere()do { (*g_assert_poison) = 'X';; report_should_not_reach_here( "/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 1725); ::breakpoint(); } while (0); | |||
1726 | return false; | |||
1727 | } | |||
1728 | } | |||
1729 | } | |||
1730 | ||||
1731 | guarantee(osthread->sr.is_suspended(), "Must be suspended")do { if (!(osthread->sr.is_suspended())) { (*g_assert_poison ) = 'X';; report_vm_error("/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 1731, "guarantee(" "osthread->sr.is_suspended()" ") failed" , "Must be suspended"); ::breakpoint(); } } while (0); | |||
1732 | return true; | |||
1733 | } | |||
1734 | ||||
1735 | void PosixSignals::do_resume(OSThread* osthread) { | |||
1736 | assert(osthread->sr.is_suspended(), "thread should be suspended")do { if (!(osthread->sr.is_suspended())) { (*g_assert_poison ) = 'X';; report_vm_error("/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 1736, "assert(" "osthread->sr.is_suspended()" ") failed" , "thread should be suspended"); ::breakpoint(); } } while (0 ); | |||
1737 | assert(!sr_semaphore.trywait(), "invalid semaphore state")do { if (!(!sr_semaphore.trywait())) { (*g_assert_poison) = 'X' ;; report_vm_error("/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 1737, "assert(" "!sr_semaphore.trywait()" ") failed", "invalid semaphore state" ); ::breakpoint(); } } while (0); | |||
1738 | ||||
1739 | if (osthread->sr.request_wakeup() != os::SuspendResume::SR_WAKEUP_REQUEST) { | |||
1740 | // failed to switch to WAKEUP_REQUEST | |||
1741 | ShouldNotReachHere()do { (*g_assert_poison) = 'X';; report_should_not_reach_here( "/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 1741); ::breakpoint(); } while (0); | |||
1742 | return; | |||
1743 | } | |||
1744 | ||||
1745 | while (true) { | |||
1746 | if (sr_notify(osthread) == 0) { | |||
1747 | if (sr_semaphore.timedwait(2)) { | |||
1748 | if (osthread->sr.is_running()) { | |||
1749 | return; | |||
1750 | } | |||
1751 | } | |||
1752 | } else { | |||
1753 | ShouldNotReachHere()do { (*g_assert_poison) = 'X';; report_should_not_reach_here( "/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 1753); ::breakpoint(); } while (0); | |||
1754 | } | |||
1755 | } | |||
1756 | ||||
1757 | guarantee(osthread->sr.is_running(), "Must be running!")do { if (!(osthread->sr.is_running())) { (*g_assert_poison ) = 'X';; report_vm_error("/home/daniel/Projects/java/jdk/src/hotspot/os/posix/signals_posix.cpp" , 1757, "guarantee(" "osthread->sr.is_running()" ") failed" , "Must be running!"); ::breakpoint(); } } while (0); | |||
1758 | } | |||
1759 | ||||
1760 | void os::SuspendedThreadTask::internal_do_task() { | |||
1761 | if (PosixSignals::do_suspend(_thread->osthread())) { | |||
1762 | os::SuspendedThreadTaskContext context(_thread, _thread->osthread()->ucontext()); | |||
1763 | do_task(context); | |||
1764 | PosixSignals::do_resume(_thread->osthread()); | |||
1765 | } | |||
1766 | } | |||
1767 | ||||
1768 | int PosixSignals::init() { | |||
1769 | // initialize suspend/resume support - must do this before signal_sets_init() | |||
1770 | if (SR_initialize() != 0) { | |||
| ||||
1771 | vm_exit_during_initialization("SR_initialize failed"); | |||
1772 | return JNI_ERR(-1); | |||
1773 | } | |||
1774 | ||||
1775 | signal_sets_init(); | |||
1776 | ||||
1777 | install_signal_handlers(); | |||
1778 | ||||
1779 | // Initialize data for jdk.internal.misc.Signal | |||
1780 | if (!ReduceSignalUsage) { | |||
1781 | jdk_misc_signal_init(); | |||
1782 | } | |||
1783 | ||||
1784 | return JNI_OK0; | |||
1785 | } |