blob: 858aeb8be77b901fec6a1c83f7fbea07f19e635c [file] [log] [blame]
Dave Allisonb373e092014-02-20 16:06:36 -08001/*
2 * Copyright (C) 2008 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17
18#include "fault_handler.h"
19#include <sys/ucontext.h>
20#include "base/macros.h"
21#include "globals.h"
22#include "base/logging.h"
23#include "base/hex_dump.h"
Dave Allison69dfe512014-07-11 17:11:58 +000024#include "mirror/art_method.h"
25#include "mirror/art_method-inl.h"
26#include "thread.h"
27#include "thread-inl.h"
Dave Allisonb373e092014-02-20 16:06:36 -080028
Dave Allison69dfe512014-07-11 17:11:58 +000029#if defined(__APPLE__)
30#define ucontext __darwin_ucontext
Dan Albert85fa7962014-08-10 10:14:59 -070031
32#if defined(__x86_64__)
33// 64 bit mac build.
34#define CTX_ESP uc_mcontext->__ss.__rsp
35#define CTX_EIP uc_mcontext->__ss.__rip
36#define CTX_EAX uc_mcontext->__ss.__rax
Dave Allison648d7112014-07-25 16:15:27 -070037#define CTX_METHOD uc_mcontext->__ss.__rdi
Dave Allison8ce6b902014-08-26 11:07:58 -070038#define CTX_JMP_BUF uc_mcontext->__ss.__rdi
Dan Albert85fa7962014-08-10 10:14:59 -070039#else
40// 32 bit mac build.
Dave Allison69dfe512014-07-11 17:11:58 +000041#define CTX_ESP uc_mcontext->__ss.__esp
42#define CTX_EIP uc_mcontext->__ss.__eip
43#define CTX_EAX uc_mcontext->__ss.__eax
Dave Allisondfd3b472014-07-16 16:04:32 -070044#define CTX_METHOD uc_mcontext->__ss.__eax
Dave Allison8ce6b902014-08-26 11:07:58 -070045#define CTX_JMP_BUF uc_mcontext->__ss.__eax
Dan Albert85fa7962014-08-10 10:14:59 -070046#endif
47
Dave Allisondfd3b472014-07-16 16:04:32 -070048#elif defined(__x86_64__)
Dan Albert85fa7962014-08-10 10:14:59 -070049// 64 bit linux build.
Dave Allisondfd3b472014-07-16 16:04:32 -070050#define CTX_ESP uc_mcontext.gregs[REG_RSP]
51#define CTX_EIP uc_mcontext.gregs[REG_RIP]
52#define CTX_EAX uc_mcontext.gregs[REG_RAX]
53#define CTX_METHOD uc_mcontext.gregs[REG_RDI]
Dave Allison8ce6b902014-08-26 11:07:58 -070054#define CTX_RDI uc_mcontext.gregs[REG_RDI]
55#define CTX_JMP_BUF uc_mcontext.gregs[REG_RDI]
Dave Allison69dfe512014-07-11 17:11:58 +000056#else
Dan Albert85fa7962014-08-10 10:14:59 -070057// 32 bit linux build.
Dave Allison69dfe512014-07-11 17:11:58 +000058#define CTX_ESP uc_mcontext.gregs[REG_ESP]
59#define CTX_EIP uc_mcontext.gregs[REG_EIP]
60#define CTX_EAX uc_mcontext.gregs[REG_EAX]
Dave Allisondfd3b472014-07-16 16:04:32 -070061#define CTX_METHOD uc_mcontext.gregs[REG_EAX]
Dave Allison8ce6b902014-08-26 11:07:58 -070062#define CTX_JMP_BUF uc_mcontext.gregs[REG_EAX]
Dave Allison69dfe512014-07-11 17:11:58 +000063#endif
Dave Allisonb373e092014-02-20 16:06:36 -080064
65//
Dave Allisondfd3b472014-07-16 16:04:32 -070066// X86 (and X86_64) specific fault handler functions.
Dave Allisonb373e092014-02-20 16:06:36 -080067//
68
69namespace art {
70
Dan Albert85fa7962014-08-10 10:14:59 -070071#if defined(__APPLE__) && defined(__x86_64__)
72// mac symbols have a prefix of _ on x86_64
73extern "C" void _art_quick_throw_null_pointer_exception();
Andreas Gampeeb0ab9e2014-08-14 11:15:22 -070074extern "C" void _art_quick_throw_stack_overflow();
Dan Albert85fa7962014-08-10 10:14:59 -070075extern "C" void _art_quick_test_suspend();
76#define EXT_SYM(sym) _ ## sym
77#else
Dave Allison69dfe512014-07-11 17:11:58 +000078extern "C" void art_quick_throw_null_pointer_exception();
Dave Allison648d7112014-07-25 16:15:27 -070079extern "C" void art_quick_throw_stack_overflow();
Dave Allison69dfe512014-07-11 17:11:58 +000080extern "C" void art_quick_test_suspend();
Dan Albert85fa7962014-08-10 10:14:59 -070081#define EXT_SYM(sym) sym
82#endif
Dave Allison69dfe512014-07-11 17:11:58 +000083
Dave Allison8ce6b902014-08-26 11:07:58 -070084// Note this is different from the others (no underscore on 64 bit mac) due to
85// the way the symbol is defined in the .S file.
86// TODO: fix the symbols for 64 bit mac - there is a double underscore prefix for some
87// of them.
88extern "C" void art_nested_signal_return();
89
Dave Allison69dfe512014-07-11 17:11:58 +000090// Get the size of an instruction in bytes.
Dave Allisondfd3b472014-07-16 16:04:32 -070091// Return 0 if the instruction is not handled.
92static uint32_t GetInstructionSize(const uint8_t* pc) {
93#if defined(__x86_64)
94 const bool x86_64 = true;
95#else
96 const bool x86_64 = false;
Dave Allison69dfe512014-07-11 17:11:58 +000097#endif
98
Dave Allisondfd3b472014-07-16 16:04:32 -070099 const uint8_t* startpc = pc;
Dave Allison69dfe512014-07-11 17:11:58 +0000100
Dave Allison69dfe512014-07-11 17:11:58 +0000101 uint8_t opcode = *pc++;
Dave Allisondfd3b472014-07-16 16:04:32 -0700102 uint8_t modrm;
103 bool has_modrm = false;
104 bool two_byte = false;
105 uint32_t displacement_size = 0;
106 uint32_t immediate_size = 0;
Mark Mendell5daf8e12014-09-25 15:13:39 -0400107 bool operand_size_prefix = false;
Dave Allisondfd3b472014-07-16 16:04:32 -0700108
109 // Prefixes.
110 while (true) {
111 bool prefix_present = false;
112 switch (opcode) {
Mark Mendell5daf8e12014-09-25 15:13:39 -0400113 // Group 3
114 case 0x66:
115 operand_size_prefix = true;
116 // fallthrough
117
Dave Allisondfd3b472014-07-16 16:04:32 -0700118 // Group 1
119 case 0xf0:
120 case 0xf2:
121 case 0xf3:
122
123 // Group 2
124 case 0x2e:
125 case 0x36:
126 case 0x3e:
127 case 0x26:
128 case 0x64:
129 case 0x65:
130
Dave Allisondfd3b472014-07-16 16:04:32 -0700131 // Group 4
132 case 0x67:
133 opcode = *pc++;
134 prefix_present = true;
135 break;
136 }
137 if (!prefix_present) {
138 break;
139 }
140 }
141
142 if (x86_64 && opcode >= 0x40 && opcode <= 0x4f) {
143 opcode = *pc++;
144 }
145
146 if (opcode == 0x0f) {
147 // Two byte opcode
Dave Allison69dfe512014-07-11 17:11:58 +0000148 two_byte = true;
149 opcode = *pc++;
150 }
151
Dave Allisondfd3b472014-07-16 16:04:32 -0700152 bool unhandled_instruction = false;
Dave Allison69dfe512014-07-11 17:11:58 +0000153
Dave Allison69dfe512014-07-11 17:11:58 +0000154 if (two_byte) {
Dave Allisondfd3b472014-07-16 16:04:32 -0700155 switch (opcode) {
Serguei Katkove2d596e2014-09-08 17:48:25 +0700156 case 0x10: // vmovsd/ss
157 case 0x11: // vmovsd/ss
Dave Allisondfd3b472014-07-16 16:04:32 -0700158 case 0xb6: // movzx
159 case 0xb7:
160 case 0xbe: // movsx
161 case 0xbf:
162 modrm = *pc++;
163 has_modrm = true;
164 break;
165 default:
166 unhandled_instruction = true;
167 break;
168 }
169 } else {
170 switch (opcode) {
Serguei Katkove2d596e2014-09-08 17:48:25 +0700171 case 0x88: // mov byte
172 case 0x89: // mov
Dave Allisondfd3b472014-07-16 16:04:32 -0700173 case 0x8b:
174 case 0x38: // cmp with memory.
175 case 0x39:
176 case 0x3a:
177 case 0x3b:
178 case 0x3c:
179 case 0x3d:
180 case 0x85: // test.
181 modrm = *pc++;
182 has_modrm = true;
183 break;
Dave Allison69dfe512014-07-11 17:11:58 +0000184
Dave Allisondfd3b472014-07-16 16:04:32 -0700185 case 0x80: // group 1, byte immediate.
186 case 0x83:
Mark Mendella9f36ee2014-10-01 08:02:43 -0400187 case 0xc6:
Dave Allisondfd3b472014-07-16 16:04:32 -0700188 modrm = *pc++;
189 has_modrm = true;
190 immediate_size = 1;
Dave Allison69dfe512014-07-11 17:11:58 +0000191 break;
Dave Allisondfd3b472014-07-16 16:04:32 -0700192
193 case 0x81: // group 1, word immediate.
194 modrm = *pc++;
195 has_modrm = true;
Mark Mendell5daf8e12014-09-25 15:13:39 -0400196 immediate_size = operand_size_prefix ? 2 : 4;
Dave Allison69dfe512014-07-11 17:11:58 +0000197 break;
Dave Allisondfd3b472014-07-16 16:04:32 -0700198
199 default:
200 unhandled_instruction = true;
Dave Allison69dfe512014-07-11 17:11:58 +0000201 break;
202 }
203 }
204
Dave Allisondfd3b472014-07-16 16:04:32 -0700205 if (unhandled_instruction) {
206 VLOG(signals) << "Unhandled x86 instruction with opcode " << static_cast<int>(opcode);
207 return 0;
208 }
209
210 if (has_modrm) {
Andreas Gampec8ccf682014-09-29 20:07:43 -0700211 uint8_t mod = (modrm >> 6) & 3U /* 0b11 */;
Dave Allisondfd3b472014-07-16 16:04:32 -0700212
213 // Check for SIB.
Andreas Gampec8ccf682014-09-29 20:07:43 -0700214 if (mod != 3U /* 0b11 */ && (modrm & 7U /* 0b111 */) == 4) {
Dave Allisondfd3b472014-07-16 16:04:32 -0700215 ++pc; // SIB
216 }
217
218 switch (mod) {
Andreas Gampec8ccf682014-09-29 20:07:43 -0700219 case 0U /* 0b00 */: break;
220 case 1U /* 0b01 */: displacement_size = 1; break;
221 case 2U /* 0b10 */: displacement_size = 4; break;
222 case 3U /* 0b11 */:
Dave Allisondfd3b472014-07-16 16:04:32 -0700223 break;
224 }
225 }
226
227 // Skip displacement and immediate.
228 pc += displacement_size + immediate_size;
229
230 VLOG(signals) << "x86 instruction length calculated as " << (pc - startpc);
231 return pc - startpc;
Dave Allison69dfe512014-07-11 17:11:58 +0000232}
233
Dave Allison8ce6b902014-08-26 11:07:58 -0700234void FaultManager::HandleNestedSignal(int sig, siginfo_t* info, void* context) {
235 // For the Intel architectures we need to go to an assembly language
236 // stub. This is because the 32 bit call to longjmp is much different
237 // from the 64 bit ABI call and pushing things onto the stack inside this
238 // handler was unwieldy and ugly. The use of the stub means we can keep
239 // this code the same for both 32 and 64 bit.
240
241 Thread* self = Thread::Current();
242 CHECK(self != nullptr); // This will cause a SIGABRT if self is nullptr.
243
244 struct ucontext* uc = reinterpret_cast<struct ucontext*>(context);
245 uc->CTX_JMP_BUF = reinterpret_cast<uintptr_t>(*self->GetNestedSignalState());
246 uc->CTX_EIP = reinterpret_cast<uintptr_t>(art_nested_signal_return);
247}
248
Dave Allisondfd3b472014-07-16 16:04:32 -0700249void FaultManager::GetMethodAndReturnPcAndSp(siginfo_t* siginfo, void* context,
Dave Allison69dfe512014-07-11 17:11:58 +0000250 mirror::ArtMethod** out_method,
Mathieu Chartierc751fdc2014-03-30 15:25:44 -0700251 uintptr_t* out_return_pc, uintptr_t* out_sp) {
Dave Allison69dfe512014-07-11 17:11:58 +0000252 struct ucontext* uc = reinterpret_cast<struct ucontext*>(context);
253 *out_sp = static_cast<uintptr_t>(uc->CTX_ESP);
254 VLOG(signals) << "sp: " << std::hex << *out_sp;
255 if (*out_sp == 0) {
256 return;
257 }
258
259 // In the case of a stack overflow, the stack is not valid and we can't
Dave Allisondfd3b472014-07-16 16:04:32 -0700260 // get the method from the top of the stack. However it's in EAX(x86)/RDI(x86_64).
Dave Allison69dfe512014-07-11 17:11:58 +0000261 uintptr_t* fault_addr = reinterpret_cast<uintptr_t*>(siginfo->si_addr);
262 uintptr_t* overflow_addr = reinterpret_cast<uintptr_t*>(
Dave Allisondfd3b472014-07-16 16:04:32 -0700263#if defined(__x86_64__)
264 reinterpret_cast<uint8_t*>(*out_sp) - GetStackOverflowReservedBytes(kX86_64));
265#else
Dave Allison69dfe512014-07-11 17:11:58 +0000266 reinterpret_cast<uint8_t*>(*out_sp) - GetStackOverflowReservedBytes(kX86));
Dave Allisondfd3b472014-07-16 16:04:32 -0700267#endif
Dave Allison69dfe512014-07-11 17:11:58 +0000268 if (overflow_addr == fault_addr) {
Dave Allisondfd3b472014-07-16 16:04:32 -0700269 *out_method = reinterpret_cast<mirror::ArtMethod*>(uc->CTX_METHOD);
Dave Allison69dfe512014-07-11 17:11:58 +0000270 } else {
271 // The method is at the top of the stack.
Dave Allisondfd3b472014-07-16 16:04:32 -0700272 *out_method = (reinterpret_cast<StackReference<mirror::ArtMethod>* >(*out_sp)[0]).AsMirrorPtr();
Dave Allison69dfe512014-07-11 17:11:58 +0000273 }
274
275 uint8_t* pc = reinterpret_cast<uint8_t*>(uc->CTX_EIP);
276 VLOG(signals) << HexDump(pc, 32, true, "PC ");
277
278 uint32_t instr_size = GetInstructionSize(pc);
Dave Allisondfd3b472014-07-16 16:04:32 -0700279 if (instr_size == 0) {
280 // Unknown instruction, tell caller it's not ours.
281 *out_method = nullptr;
282 return;
283 }
Dave Allison69dfe512014-07-11 17:11:58 +0000284 *out_return_pc = reinterpret_cast<uintptr_t>(pc + instr_size);
Dave Allisonb373e092014-02-20 16:06:36 -0800285}
286
287bool NullPointerHandler::Action(int sig, siginfo_t* info, void* context) {
Dave Allison69dfe512014-07-11 17:11:58 +0000288 struct ucontext *uc = reinterpret_cast<struct ucontext*>(context);
289 uint8_t* pc = reinterpret_cast<uint8_t*>(uc->CTX_EIP);
290 uint8_t* sp = reinterpret_cast<uint8_t*>(uc->CTX_ESP);
291
292 uint32_t instr_size = GetInstructionSize(pc);
Dave Allisondfd3b472014-07-16 16:04:32 -0700293 if (instr_size == 0) {
294 // Unknown instruction, can't really happen.
295 return false;
296 }
297
Dave Allison69dfe512014-07-11 17:11:58 +0000298 // We need to arrange for the signal handler to return to the null pointer
299 // exception generator. The return address must be the address of the
300 // next instruction (this instruction + instruction size). The return address
301 // is on the stack at the top address of the current frame.
302
303 // Push the return address onto the stack.
Dave Allisondfd3b472014-07-16 16:04:32 -0700304 uintptr_t retaddr = reinterpret_cast<uintptr_t>(pc + instr_size);
305 uintptr_t* next_sp = reinterpret_cast<uintptr_t*>(sp - sizeof(uintptr_t));
Dave Allison69dfe512014-07-11 17:11:58 +0000306 *next_sp = retaddr;
Dave Allisondfd3b472014-07-16 16:04:32 -0700307 uc->CTX_ESP = reinterpret_cast<uintptr_t>(next_sp);
Dave Allison69dfe512014-07-11 17:11:58 +0000308
Dan Albert85fa7962014-08-10 10:14:59 -0700309 uc->CTX_EIP = reinterpret_cast<uintptr_t>(EXT_SYM(art_quick_throw_null_pointer_exception));
Dave Allison69dfe512014-07-11 17:11:58 +0000310 VLOG(signals) << "Generating null pointer exception";
311 return true;
312}
313
314// A suspend check is done using the following instruction sequence:
Dave Allisondfd3b472014-07-16 16:04:32 -0700315// (x86)
Dave Allison69dfe512014-07-11 17:11:58 +0000316// 0xf720f1df: 648B058C000000 mov eax, fs:[0x8c] ; suspend_trigger
317// .. some intervening instructions.
318// 0xf720f1e6: 8500 test eax, [eax]
Dave Allisondfd3b472014-07-16 16:04:32 -0700319// (x86_64)
320// 0x7f579de45d9e: 65488B0425A8000000 movq rax, gs:[0xa8] ; suspend_trigger
321// .. some intervening instructions.
322// 0x7f579de45da7: 8500 test eax, [eax]
Dave Allison69dfe512014-07-11 17:11:58 +0000323
324// The offset from fs is Thread::ThreadSuspendTriggerOffset().
325// To check for a suspend check, we examine the instructions that caused
326// the fault.
327bool SuspensionHandler::Action(int sig, siginfo_t* info, void* context) {
328 // These are the instructions to check for. The first one is the mov eax, fs:[xxx]
329 // where xxx is the offset of the suspend trigger.
Dave Allisondfd3b472014-07-16 16:04:32 -0700330#if defined(__x86_64__)
331 uint32_t trigger = Thread::ThreadSuspendTriggerOffset<8>().Int32Value();
332#else
Dave Allison69dfe512014-07-11 17:11:58 +0000333 uint32_t trigger = Thread::ThreadSuspendTriggerOffset<4>().Int32Value();
Dave Allisondfd3b472014-07-16 16:04:32 -0700334#endif
Dave Allison69dfe512014-07-11 17:11:58 +0000335
336 VLOG(signals) << "Checking for suspension point";
Dave Allisondfd3b472014-07-16 16:04:32 -0700337#if defined(__x86_64__)
338 uint8_t checkinst1[] = {0x65, 0x48, 0x8b, 0x04, 0x25, static_cast<uint8_t>(trigger & 0xff),
339 static_cast<uint8_t>((trigger >> 8) & 0xff), 0, 0};
340#else
Dave Allison69dfe512014-07-11 17:11:58 +0000341 uint8_t checkinst1[] = {0x64, 0x8b, 0x05, static_cast<uint8_t>(trigger & 0xff),
342 static_cast<uint8_t>((trigger >> 8) & 0xff), 0, 0};
Dave Allisondfd3b472014-07-16 16:04:32 -0700343#endif
Dave Allison69dfe512014-07-11 17:11:58 +0000344 uint8_t checkinst2[] = {0x85, 0x00};
345
346 struct ucontext *uc = reinterpret_cast<struct ucontext*>(context);
347 uint8_t* pc = reinterpret_cast<uint8_t*>(uc->CTX_EIP);
348 uint8_t* sp = reinterpret_cast<uint8_t*>(uc->CTX_ESP);
349
350 if (pc[0] != checkinst2[0] || pc[1] != checkinst2[1]) {
351 // Second instruction is not correct (test eax,[eax]).
352 VLOG(signals) << "Not a suspension point";
353 return false;
354 }
355
356 // The first instruction can a little bit up the stream due to load hoisting
357 // in the compiler.
358 uint8_t* limit = pc - 100; // Compiler will hoist to a max of 20 instructions.
359 uint8_t* ptr = pc - sizeof(checkinst1);
360 bool found = false;
361 while (ptr > limit) {
362 if (memcmp(ptr, checkinst1, sizeof(checkinst1)) == 0) {
363 found = true;
364 break;
365 }
366 ptr -= 1;
367 }
368
369 if (found) {
370 VLOG(signals) << "suspend check match";
371
372 // We need to arrange for the signal handler to return to the null pointer
373 // exception generator. The return address must be the address of the
374 // next instruction (this instruction + 2). The return address
375 // is on the stack at the top address of the current frame.
376
377 // Push the return address onto the stack.
Dave Allisondfd3b472014-07-16 16:04:32 -0700378 uintptr_t retaddr = reinterpret_cast<uintptr_t>(pc + 2);
379 uintptr_t* next_sp = reinterpret_cast<uintptr_t*>(sp - sizeof(uintptr_t));
Dave Allison69dfe512014-07-11 17:11:58 +0000380 *next_sp = retaddr;
Dave Allisondfd3b472014-07-16 16:04:32 -0700381 uc->CTX_ESP = reinterpret_cast<uintptr_t>(next_sp);
Dave Allison69dfe512014-07-11 17:11:58 +0000382
Dan Albert85fa7962014-08-10 10:14:59 -0700383 uc->CTX_EIP = reinterpret_cast<uintptr_t>(EXT_SYM(art_quick_test_suspend));
Dave Allison69dfe512014-07-11 17:11:58 +0000384
385 // Now remove the suspend trigger that caused this fault.
386 Thread::Current()->RemoveSuspendTrigger();
387 VLOG(signals) << "removed suspend trigger invoking test suspend";
388 return true;
389 }
390 VLOG(signals) << "Not a suspend check match, first instruction mismatch";
Dave Allisonb373e092014-02-20 16:06:36 -0800391 return false;
392}
393
Dave Allison69dfe512014-07-11 17:11:58 +0000394// The stack overflow check is done using the following instruction:
395// test eax, [esp+ -xxx]
396// where 'xxx' is the size of the overflow area.
397//
398// This is done before any frame is established in the method. The return
399// address for the previous method is on the stack at ESP.
Dave Allisonb373e092014-02-20 16:06:36 -0800400
401bool StackOverflowHandler::Action(int sig, siginfo_t* info, void* context) {
Dave Allison69dfe512014-07-11 17:11:58 +0000402 struct ucontext *uc = reinterpret_cast<struct ucontext*>(context);
403 uintptr_t sp = static_cast<uintptr_t>(uc->CTX_ESP);
404
405 uintptr_t fault_addr = reinterpret_cast<uintptr_t>(info->si_addr);
406 VLOG(signals) << "fault_addr: " << std::hex << fault_addr;
407 VLOG(signals) << "checking for stack overflow, sp: " << std::hex << sp <<
408 ", fault_addr: " << fault_addr;
409
Dave Allisondfd3b472014-07-16 16:04:32 -0700410#if defined(__x86_64__)
411 uintptr_t overflow_addr = sp - GetStackOverflowReservedBytes(kX86_64);
412#else
Dave Allison69dfe512014-07-11 17:11:58 +0000413 uintptr_t overflow_addr = sp - GetStackOverflowReservedBytes(kX86);
Dave Allisondfd3b472014-07-16 16:04:32 -0700414#endif
Dave Allison69dfe512014-07-11 17:11:58 +0000415
Dave Allison69dfe512014-07-11 17:11:58 +0000416 // Check that the fault address is the value expected for a stack overflow.
417 if (fault_addr != overflow_addr) {
418 VLOG(signals) << "Not a stack overflow";
419 return false;
420 }
421
Dave Allison648d7112014-07-25 16:15:27 -0700422 VLOG(signals) << "Stack overflow found";
Dave Allison69dfe512014-07-11 17:11:58 +0000423
424 // Since the compiler puts the implicit overflow
425 // check before the callee save instructions, the SP is already pointing to
426 // the previous frame.
427
Dave Allison648d7112014-07-25 16:15:27 -0700428 // Now arrange for the signal handler to return to art_quick_throw_stack_overflow.
Andreas Gampeeb0ab9e2014-08-14 11:15:22 -0700429 uc->CTX_EIP = reinterpret_cast<uintptr_t>(EXT_SYM(art_quick_throw_stack_overflow));
Dave Allison69dfe512014-07-11 17:11:58 +0000430
431 return true;
Dave Allisonb373e092014-02-20 16:06:36 -0800432}
433} // namespace art