Skip to content
Permalink
Browse files
8227275: Within native OOM error handling, assertions may hang the pr…
…ocess

Backport-of: ac0e723
  • Loading branch information
Ekaterina Vergizova authored and Yuri Nesterenko committed Feb 11, 2021
1 parent 9f7f443 commit 86ccee1af0b641eca97fe975dacc700e83fd28a9
Showing 10 changed files with 40 additions and 15 deletions.
@@ -132,8 +132,9 @@ static void crash_handler(int sig, siginfo_t* info, void* ucVoid) {
// Needed because asserts may happen in error handling too.
#ifdef CAN_SHOW_REGISTERS_ON_ASSERT
if ((sig == SIGSEGV || sig == SIGBUS) && info != NULL && info->si_addr == g_assert_poison) {
handle_assert_poison_fault(ucVoid, info->si_addr);
return;
if (handle_assert_poison_fault(ucVoid, info->si_addr)) {
return;
}
}
#endif // CAN_SHOW_REGISTERS_ON_ASSERT

@@ -242,8 +242,9 @@ JVM_handle_linux_signal(int sig,

#ifdef CAN_SHOW_REGISTERS_ON_ASSERT
if ((sig == SIGSEGV || sig == SIGBUS) && info != NULL && info->si_addr == g_assert_poison) {
handle_assert_poison_fault(ucVoid, info->si_addr);
return 1;
if (handle_assert_poison_fault(ucVoid, info->si_addr)) {
return 1;
}
}
#endif

@@ -301,8 +301,9 @@ extern "C" int JVM_handle_linux_signal(int sig, siginfo_t* info,

#ifdef CAN_SHOW_REGISTERS_ON_ASSERT
if ((sig == SIGSEGV || sig == SIGBUS) && info != NULL && info->si_addr == g_assert_poison) {
handle_assert_poison_fault(ucVoid, info->si_addr);
return 1;
if (handle_assert_poison_fault(ucVoid, info->si_addr)) {
return 1;
}
}
#endif

@@ -271,8 +271,9 @@ JVM_handle_linux_signal(int sig,

#ifdef CAN_SHOW_REGISTERS_ON_ASSERT
if ((sig == SIGSEGV || sig == SIGBUS) && info != NULL && info->si_addr == g_assert_poison) {
handle_assert_poison_fault(ucVoid, info->si_addr);
return 1;
if (handle_assert_poison_fault(ucVoid, info->si_addr)) {
return 1;
}
}
#endif

@@ -270,8 +270,9 @@ JVM_handle_linux_signal(int sig,

#ifdef CAN_SHOW_REGISTERS_ON_ASSERT
if ((sig == SIGSEGV || sig == SIGBUS) && info != NULL && info->si_addr == g_assert_poison) {
handle_assert_poison_fault(ucVoid, info->si_addr);
return 1;
if (handle_assert_poison_fault(ucVoid, info->si_addr)) {
return 1;
}
}
#endif

@@ -510,8 +510,9 @@ JVM_handle_linux_signal(int sig,

#ifdef CAN_SHOW_REGISTERS_ON_ASSERT
if ((sig == SIGSEGV || sig == SIGBUS) && info != NULL && info->si_addr == g_assert_poison) {
handle_assert_poison_fault(ucVoid, info->si_addr);
return 1;
if (handle_assert_poison_fault(ucVoid, info->si_addr)) {
return 1;
}
}
#endif

@@ -303,8 +303,9 @@ JVM_handle_linux_signal(int sig,

#ifdef CAN_SHOW_REGISTERS_ON_ASSERT
if ((sig == SIGSEGV || sig == SIGBUS) && info != NULL && info->si_addr == g_assert_poison) {
handle_assert_poison_fault(ucVoid, info->si_addr);
return 1;
if (handle_assert_poison_fault(ucVoid, info->si_addr)) {
return 1;
}
}
#endif

@@ -734,6 +734,10 @@ void initialize_assert_poison() {
}
}

void disarm_assert_poison() {
g_assert_poison = &g_dummy;
}

static void store_context(const void* context) {
memcpy(&g_stored_assertion_context, context, sizeof(ucontext_t));
#if defined(__linux) && defined(PPC64)
@@ -746,7 +750,14 @@ static void store_context(const void* context) {
bool handle_assert_poison_fault(const void* ucVoid, const void* faulting_address) {
if (faulting_address == g_assert_poison) {
// Disarm poison page.
os::protect_memory((char*)g_assert_poison, os::vm_page_size(), os::MEM_PROT_RWX);
if (os::protect_memory((char*)g_assert_poison, os::vm_page_size(), os::MEM_PROT_RWX) == false) {
#ifdef ASSERT
fprintf(stderr, "Assertion poison page cannot be unprotected - mprotect failed with %d (%s)",
errno, os::strerror(errno));
fflush(stderr);
#endif
return false; // unprotecting memory may fail in OOM situations, as surprising as this sounds.
}
// Store Context away.
if (ucVoid) {
const intx my_tid = os::current_thread_id();
@@ -37,6 +37,7 @@
extern char* g_assert_poison;
#define TOUCH_ASSERT_POISON (*g_assert_poison) = 'X';
void initialize_assert_poison();
void disarm_assert_poison();
bool handle_assert_poison_fault(const void* ucVoid, const void* faulting_address);
#else
#define TOUCH_ASSERT_POISON
@@ -1336,6 +1336,12 @@ void VMError::report_and_die(int id, const char* message, const char* detail_fmt
// File descriptor to the error log file.
static int fd_log = -1;

#ifdef CAN_SHOW_REGISTERS_ON_ASSERT
// Disarm assertion poison page, since from this point on we do not need this mechanism anymore and it may
// cause problems in error handling during native OOM, see JDK-8227275.
disarm_assert_poison();
#endif

// Use local fdStream objects only. Do not use global instances whose initialization
// relies on dynamic initialization (see JDK-8214975). Do not rely on these instances
// to carry over into recursions or invocations from other threads.

1 comment on commit 86ccee1

@openjdk-notifier
Copy link

@openjdk-notifier openjdk-notifier bot commented on 86ccee1 Feb 11, 2021

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Please sign in to comment.