5 THREADHANDLE start_thread(void* (*start_routine)(void*), void* args) {
8 if (pthread_attr_init(&attr) != 0)
9 fatal_error("pthread_attr_init() failed", 0);
10 if (pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_JOINABLE) != 0)
11 fatal_error("pthread_attr_setdetachstate() failed", 0);
12 if (pthread_create(&thread, &attr, start_routine, args) != 0)
13 fatal_error("pthread_create() failed", 0);
14 pthread_attr_destroy(&attr);
18 static void* null_dll;
20 void sleep_nanos(uint64_t nsec) {
24 ts.tv_sec = nsec / 1000000000;
25 ts.tv_nsec = nsec % 1000000000;
26 ret = nanosleep(&ts, &ts_rem);
27 while (ret == -1 && errno == EINTR) {
28 memcpy(&ts, &ts_rem, sizeof(ts));
29 ret = nanosleep(&ts, &ts_rem);
33 fatal_error("nanosleep failed", 0);
36 void factor_vm::init_ffi() { null_dll = dlopen(NULL, RTLD_LAZY); }
38 void factor_vm::ffi_dlopen(dll* dll) {
39 dll->handle = dlopen(alien_offset(dll->path), RTLD_LAZY | RTLD_GLOBAL);
42 cell factor_vm::ffi_dlsym_raw(dll* dll, symbol_char* symbol) {
43 return (cell)dlsym(dll ? dll->handle : null_dll, symbol);
46 cell factor_vm::ffi_dlsym(dll* dll, symbol_char* symbol) {
47 return FUNCTION_CODE_POINTER(ffi_dlsym_raw(dll, symbol));
51 cell factor_vm::ffi_dlsym_toc(dll* dll, symbol_char* symbol) {
52 return FUNCTION_TOC_POINTER(ffi_dlsym_raw(dll, symbol));
56 void factor_vm::ffi_dlclose(dll* dll) {
57 if (dlclose(dll->handle))
58 general_error(ERROR_FFI, false_object, false_object);
62 void factor_vm::primitive_existsp() {
64 char* path = (char*)(untag_check<byte_array>(ctx->pop()) + 1);
65 ctx->push(tag_boolean(stat(path, &sb) >= 0));
68 void factor_vm::move_file(const vm_char* path1, const vm_char* path2) {
71 ret = rename((path1), (path2));
72 } while (ret < 0 && errno == EINTR);
75 general_error(ERROR_IO, tag_fixnum(errno), false_object);
78 void check_ENOMEM(const char* msg) {
83 segment::segment(cell size_, bool executable_p) {
86 int pagesize = getpagesize();
90 prot = PROT_READ | PROT_WRITE | PROT_EXEC;
92 prot = PROT_READ | PROT_WRITE;
94 char* array = (char*)mmap(NULL, 2 * pagesize + size, prot,
95 MAP_ANON | MAP_PRIVATE, -1, 0);
97 if (array == (char*)-1)
98 out_of_memory("mmap");
100 start = (cell)(array + pagesize);
103 set_border_locked(true);
106 void segment::set_border_locked(bool locked) {
107 int prot = locked ? PROT_NONE : PROT_READ | PROT_WRITE;
108 int pagesize = getpagesize();
110 cell lo = start - pagesize;
111 if (mprotect((char*)lo, pagesize, prot) == -1) {
112 check_ENOMEM("mprotect low");
113 fatal_error("Cannot (un)protect low guard page", lo);
117 if (mprotect((char*)hi, pagesize, prot) == -1) {
118 check_ENOMEM("mprotect high");
119 fatal_error("Cannot protect high guard page", lo);
123 segment::~segment() {
124 int pagesize = getpagesize();
125 int retval = munmap((void*)(start - pagesize), pagesize + size + pagesize);
127 fatal_error("Segment deallocation failed", 0);
130 void code_heap::guard_safepoint() {
131 if (mprotect(safepoint_page, getpagesize(), PROT_NONE) == -1)
132 fatal_error("Cannot protect safepoint guard page", (cell)safepoint_page);
135 void code_heap::unguard_safepoint() {
136 if (mprotect(safepoint_page, getpagesize(), PROT_WRITE) == -1)
137 fatal_error("Cannot unprotect safepoint guard page", (cell)safepoint_page);
140 void factor_vm::dispatch_signal(void* uap, void(handler)()) {
141 dispatch_signal_handler((cell*)&UAP_STACK_POINTER(uap),
142 (cell*)&UAP_PROGRAM_COUNTER(uap),
143 (cell)FUNCTION_CODE_POINTER(handler));
144 UAP_SET_TOC_POINTER(uap, (cell)FUNCTION_TOC_POINTER(handler));
147 void factor_vm::start_sampling_profiler_timer() {
148 struct itimerval timer;
149 memset((void*)&timer, 0, sizeof(struct itimerval));
150 timer.it_value.tv_usec = 1000000 / samples_per_second;
151 timer.it_interval.tv_usec = 1000000 / samples_per_second;
152 setitimer(ITIMER_REAL, &timer, NULL);
155 void factor_vm::end_sampling_profiler_timer() {
156 struct itimerval timer;
157 memset((void*)&timer, 0, sizeof(struct itimerval));
158 setitimer(ITIMER_REAL, &timer, NULL);
161 void memory_signal_handler(int signal, siginfo_t* siginfo, void* uap) {
163 cell fault_addr = (cell)siginfo->si_addr;
164 cell fault_pc = (cell)UAP_PROGRAM_COUNTER(uap);
165 factor_vm* vm = current_vm();
166 vm->verify_memory_protection_error(fault_addr);
167 vm->signal_fault_addr = fault_addr;
168 vm->signal_fault_pc = fault_pc;
169 vm->dispatch_signal(uap, factor::memory_signal_handler_impl);
172 void synchronous_signal_handler(int signal, siginfo_t* siginfo, void* uap) {
173 if (factor_vm::fatal_erroring_p)
176 factor_vm* vm = current_vm_p();
178 vm->signal_number = signal;
179 vm->dispatch_signal(uap, factor::synchronous_signal_handler_impl);
181 fatal_error("Foreign thread received signal", signal);
184 void safe_write_nonblock(int fd, void* data, ssize_t size);
186 static void enqueue_signal(factor_vm* vm, int signal) {
187 if (vm->signal_pipe_output != 0)
188 safe_write_nonblock(vm->signal_pipe_output, &signal, sizeof(int));
191 void enqueue_signal_handler(int signal, siginfo_t* siginfo, void* uap) {
192 if (factor_vm::fatal_erroring_p)
195 factor_vm* vm = current_vm_p();
197 enqueue_signal(vm, signal);
200 void fep_signal_handler(int signal, siginfo_t* siginfo, void* uap) {
201 if (factor_vm::fatal_erroring_p)
204 factor_vm* vm = current_vm_p();
206 vm->safepoint.enqueue_fep(vm);
207 enqueue_signal(vm, signal);
209 fatal_error("Foreign thread received signal", signal);
212 void sample_signal_handler(int signal, siginfo_t* siginfo, void* uap) {
213 factor_vm* vm = current_vm_p();
214 bool foreign_thread = false;
216 foreign_thread = true;
217 vm = thread_vms.begin()->second;
219 if (atomic::load(&vm->sampling_profiler_p))
220 vm->safepoint.enqueue_samples(vm, 1, (cell)UAP_PROGRAM_COUNTER(uap),
222 else if (!foreign_thread)
223 enqueue_signal(vm, signal);
226 void ignore_signal_handler(int signal, siginfo_t* siginfo, void* uap) {}
228 void fpe_signal_handler(int signal, siginfo_t* siginfo, void* uap) {
229 factor_vm* vm = current_vm();
230 vm->signal_number = signal;
231 vm->signal_fpu_status = fpu_status(uap_fpu_status(uap));
232 uap_clear_fpu_status(uap);
235 uap, (siginfo->si_code == FPE_INTDIV || siginfo->si_code == FPE_INTOVF)
236 ? factor::synchronous_signal_handler_impl
237 : factor::fp_signal_handler_impl);
240 static void sigaction_safe(int signum, const struct sigaction* act,
241 struct sigaction* oldact) {
244 ret = sigaction(signum, act, oldact);
245 } while (ret == -1 && errno == EINTR);
248 fatal_error("sigaction failed", errno);
251 static void init_sigaction_with_handler(struct sigaction* act,
252 void (*handler)(int, siginfo_t*,
254 memset(act, 0, sizeof(struct sigaction));
255 sigemptyset(&act->sa_mask);
256 act->sa_sigaction = handler;
257 act->sa_flags = SA_SIGINFO | SA_ONSTACK;
260 static void safe_pipe(int* in, int* out) {
263 if (pipe(filedes) < 0)
264 fatal_error("Error opening pipe", errno);
269 if (fcntl(*in, F_SETFD, FD_CLOEXEC) < 0)
270 fatal_error("Error with fcntl", errno);
272 if (fcntl(*out, F_SETFD, FD_CLOEXEC) < 0)
273 fatal_error("Error with fcntl", errno);
276 static void init_signal_pipe(factor_vm* vm) {
277 safe_pipe(&vm->signal_pipe_input, &vm->signal_pipe_output);
279 if (fcntl(vm->signal_pipe_output, F_SETFL, O_NONBLOCK) < 0)
280 fatal_error("Error with fcntl", errno);
282 vm->special_objects[OBJ_SIGNAL_PIPE] = tag_fixnum(vm->signal_pipe_input);
285 void factor_vm::unix_init_signals() {
286 init_signal_pipe(this);
288 signal_callstack_seg = new segment(callstack_size, false);
290 stack_t signal_callstack;
291 signal_callstack.ss_sp = (char*)signal_callstack_seg->start;
292 signal_callstack.ss_size = signal_callstack_seg->size;
293 signal_callstack.ss_flags = 0;
295 if (sigaltstack(&signal_callstack, (stack_t*)NULL) < 0)
296 fatal_error("sigaltstack() failed", 0);
299 struct sigaction memory_sigaction;
300 init_sigaction_with_handler(&memory_sigaction, memory_signal_handler);
301 sigaction_safe(SIGBUS, &memory_sigaction, NULL);
302 sigaction_safe(SIGSEGV, &memory_sigaction, NULL);
303 sigaction_safe(SIGTRAP, &memory_sigaction, NULL);
307 struct sigaction fpe_sigaction;
308 init_sigaction_with_handler(&fpe_sigaction, fpe_signal_handler);
309 sigaction_safe(SIGFPE, &fpe_sigaction, NULL);
313 struct sigaction synchronous_sigaction;
314 init_sigaction_with_handler(&synchronous_sigaction,
315 synchronous_signal_handler);
316 sigaction_safe(SIGILL, &synchronous_sigaction, NULL);
317 sigaction_safe(SIGABRT, &synchronous_sigaction, NULL);
321 struct sigaction enqueue_sigaction;
322 init_sigaction_with_handler(&enqueue_sigaction, enqueue_signal_handler);
323 sigaction_safe(SIGWINCH, &enqueue_sigaction, NULL);
324 sigaction_safe(SIGUSR1, &enqueue_sigaction, NULL);
325 sigaction_safe(SIGCONT, &enqueue_sigaction, NULL);
326 sigaction_safe(SIGURG, &enqueue_sigaction, NULL);
327 sigaction_safe(SIGIO, &enqueue_sigaction, NULL);
328 sigaction_safe(SIGPROF, &enqueue_sigaction, NULL);
329 sigaction_safe(SIGVTALRM, &enqueue_sigaction, NULL);
331 sigaction_safe(SIGINFO, &enqueue_sigaction, NULL);
338 struct sigaction sample_sigaction;
339 init_sigaction_with_handler(&sample_sigaction, sample_signal_handler);
340 sigaction_safe(SIGALRM, &sample_sigaction, NULL);
343 /* We don't use SA_IGN here because then the ignore action is inherited
344 by subprocesses, which we don't want. There is a unit test in
345 io.launcher.unix for this. */
347 struct sigaction ignore_sigaction;
348 init_sigaction_with_handler(&ignore_sigaction, ignore_signal_handler);
349 sigaction_safe(SIGPIPE, &ignore_sigaction, NULL);
350 /* We send SIGUSR2 to the stdin_loop thread to interrupt it on FEP */
351 sigaction_safe(SIGUSR2, &ignore_sigaction, NULL);
355 /* On Unix, shared fds such as stdin cannot be set to non-blocking mode
356 (http://homepages.tesco.net/J.deBoynePollard/FGA/dont-set-shared-file-descriptors-to-non-blocking-mode.html)
357 so we kludge around this by spawning a thread, which waits on a control pipe
358 for a signal, upon receiving this signal it reads one block of data from
359 stdin and writes it to a data pipe. Upon completion, it writes a 4-byte
360 integer to the size pipe, indicating how much data was written to the data
363 The read end of the size pipe can be set to non-blocking. */
374 bool stdin_thread_initialized_p = false;
375 THREADHANDLE stdin_thread;
376 pthread_mutex_t stdin_mutex;
379 void safe_close(int fd) {
381 fatal_error("error closing fd", errno);
384 bool check_write(int fd, void* data, ssize_t size) {
385 if (write(fd, data, size) == size)
388 return check_write(fd, data, size);
392 void safe_write(int fd, void* data, ssize_t size) {
393 if (!check_write(fd, data, size))
394 fatal_error("error writing fd", errno);
397 void safe_write_nonblock(int fd, void* data, ssize_t size) {
398 if (!check_write(fd, data, size) && errno != EAGAIN)
399 fatal_error("error writing fd", errno);
402 bool safe_read(int fd, void* data, ssize_t size) {
403 ssize_t bytes = read(fd, data, size);
406 return safe_read(fd, data, size);
408 fatal_error("error reading fd", errno);
412 return (bytes == size);
415 void* stdin_loop(void* arg) {
416 unsigned char buf[4096];
417 bool loop_running = true;
421 sigdelset(&mask, SIGUSR2);
422 sigdelset(&mask, SIGTTIN);
423 sigdelset(&mask, SIGTERM);
424 sigdelset(&mask, SIGQUIT);
425 pthread_sigmask(SIG_SETMASK, &mask, NULL);
428 pthread_setcancelstate(PTHREAD_CANCEL_ENABLE, &unused);
429 pthread_setcanceltype(PTHREAD_CANCEL_ASYNCHRONOUS, &unused);
431 while (loop_running) {
432 if (!safe_read(control_read, buf, 1))
436 fatal_error("stdin_loop: bad data on control fd", buf[0]);
439 /* If we fep, the parent thread will grab stdin_mutex and send us
440 SIGUSR2 to interrupt the read() call. */
441 pthread_mutex_lock(&stdin_mutex);
442 pthread_mutex_unlock(&stdin_mutex);
443 ssize_t bytes = read(0, buf, sizeof(buf));
448 loop_running = false;
451 } else if (bytes >= 0) {
452 safe_write(size_write, &bytes, sizeof(bytes));
454 if (!check_write(stdin_write, buf, bytes))
455 loop_running = false;
461 safe_close(stdin_write);
462 safe_close(control_read);
467 void open_console() {
468 FACTOR_ASSERT(!stdin_thread_initialized_p);
469 safe_pipe(&control_read, &control_write);
470 safe_pipe(&size_read, &size_write);
471 safe_pipe(&stdin_read, &stdin_write);
472 stdin_thread = start_thread(stdin_loop, NULL);
473 stdin_thread_initialized_p = true;
474 pthread_mutex_init(&stdin_mutex, NULL);
477 /* This method is used to kill the stdin_loop before exiting from factor.
478 A Nvidia driver bug on Linux is the reason this has to be done, see:
479 http://www.nvnews.net/vbulletin/showthread.php?t=164619 */
480 void close_console() {
481 if (stdin_thread_initialized_p) {
482 pthread_cancel(stdin_thread);
483 pthread_join(stdin_thread, 0);
487 void lock_console() {
488 FACTOR_ASSERT(stdin_thread_initialized_p);
489 /* Lock the stdin_mutex and send the stdin_loop thread a signal to interrupt
490 any read() it has in progress. When the stdin loop iterates again, it will
491 try to lock the same mutex and wait until unlock_console() is called. */
492 pthread_mutex_lock(&stdin_mutex);
493 pthread_kill(stdin_thread, SIGUSR2);
496 void unlock_console() {
497 FACTOR_ASSERT(stdin_thread_initialized_p);
498 pthread_mutex_unlock(&stdin_mutex);
501 void ignore_ctrl_c() {
504 ret = signal(SIGINT, SIG_DFL);
505 } while (ret == SIG_ERR && errno == EINTR);
508 void handle_ctrl_c() {
509 struct sigaction fep_sigaction;
510 init_sigaction_with_handler(&fep_sigaction, fep_signal_handler);
511 sigaction_safe(SIGINT, &fep_sigaction, NULL);
517 ret = signal(SIGABRT, SIG_DFL);
518 } while (ret == SIG_ERR && errno == EINTR);