X-Git-Url: http://repo.macrolet.net/gitweb/?a=blobdiff_plain;f=src%2Fruntime%2Flinux-os.c;h=c757711ed998316254ef4a598515409bbc3777bf;hb=8ee426cacceebd52f18232cd748ba8a1f211e9fd;hp=def0b6afe237385907aa0a2c3dab7447d8727c08;hpb=c9bb20c4b0d1f232ec83569d3456b3f3edc4aa1c;p=sbcl.git diff --git a/src/runtime/linux-os.c b/src/runtime/linux-os.c index def0b6a..c757711 100644 --- a/src/runtime/linux-os.c +++ b/src/runtime/linux-os.c @@ -1,5 +1,6 @@ /* - * the Linux incarnation of OS-dependent routines + * the Linux incarnation of OS-dependent routines. See also + * $(sbcl_arch)-linux-os.c * * This file (along with os.h) exports an OS-independent interface to * the operating system VM facilities. Surprise surprise, this @@ -39,161 +40,96 @@ #include #include #include +#include -#include "x86-validate.h" +#include "validate.h" +#include "thread.h" size_t os_vm_page_size; -#if defined GENCGC -#include "gencgc.h" -#endif +#include "gc.h" +int linux_sparc_siginfo_bug = 0; + void os_init(void) { - /* Early versions of Linux don't support the mmap(..) functionality - * that we need. */ + /* Conduct various version checks: do we have enough mmap(), is + * this a sparc running 2.2, can we do threads? */ { struct utsname name; int major_version; + int minor_version; + char *p; uname(&name); - major_version = atoi(name.release); - if (major_version < 2) { - lose("linux major version=%d (can't run in version < 2.0.0)", + p=name.release; + major_version = atoi(p); + p=strchr(p,'.')+1; + minor_version = atoi(p); + if (major_version<2) { + lose("linux kernel version too old: major version=%d (can't run in version < 2.0.0)", major_version); } +#ifdef LISP_FEATURE_SB_THREAD + if ((major_version <2) || (major_version==2 && minor_version < 4)) { + lose("linux kernel 2.4 required for thread-enabled SBCL"); + } +#endif +#ifdef LISP_FEATURE_SPARC + if ((major_version <2) || (major_version==2 && minor_version < 4)) { + FSHOW((stderr,"linux kernel %d.%d predates 2.4;\n enabling workarounds for SPARC kernel bugs in signal handling.\n", major_version,minor_version)); + linux_sparc_siginfo_bug = 1; + } +#endif } os_vm_page_size = getpagesize(); - - SET_FPU_CONTROL_WORD(0x1372|4|8|16|32); /* no interrupts */ + /* This could just as well be in arch_init(), but it's not. */ +#ifdef __i386__ + /* FIXME: This used to be here. However, I have just removed it + with no apparent ill effects (it may be that earlier kernels + started up a process with a different set of traps, or + something?) Find out what this was meant to do, and reenable it + or delete it if possible. -- CSR, 2002-07-15 */ + /* SET_FPU_CONTROL_WORD(0x1372|4|8|16|32); no interrupts */ +#endif } -/* KLUDGE: As of kernel 2.2.14 on Red Hat 6.2, there's code in the - * file to define symbolic names for offsets into - * gregs[], but it's conditional on __USE_GNU and not defined, so - * we need to do this nasty absolute index magic number thing - * instead. */ -int * -os_context_register_addr(os_context_t *context, int offset) -{ - switch(offset) { - case 0: return &context->uc_mcontext.gregs[11]; /* EAX */ - case 2: return &context->uc_mcontext.gregs[10]; /* ECX */ - case 4: return &context->uc_mcontext.gregs[9]; /* EDX */ - case 6: return &context->uc_mcontext.gregs[8]; /* EBX */ - case 8: return &context->uc_mcontext.gregs[7]; /* ESP */ - case 10: return &context->uc_mcontext.gregs[6]; /* EBP */ - case 12: return &context->uc_mcontext.gregs[5]; /* ESI */ - case 14: return &context->uc_mcontext.gregs[4]; /* EDI */ - default: return 0; - } -} -int * -os_context_pc_addr(os_context_t *context) -{ - return &context->uc_mcontext.gregs[14]; -} -int * -os_context_sp_addr(os_context_t *context) -{ - return &context->uc_mcontext.gregs[17]; -} -sigset_t * -os_context_sigmask_addr(os_context_t *context) -{ - return &context->uc_sigmask; -} +#ifdef LISP_FEATURE_ALPHA +/* The Alpha is a 64 bit CPU. SBCL is a 32 bit application. Due to all + * the places that assume we can get a pointer into a fixnum with no + * information loss, we have to make sure it allocates all its ram in the + * 0-2Gb region. */ -/* In Debian CMU CL ca. 2.4.9, it was possible to get an infinite - * cascade of errors from do_mmap(..). This variable is a counter to - * prevent that; when it counts down to zero, an error in do_mmap - * causes the low-level monitor to be called. */ -int n_do_mmap_ignorable_errors = 3; +static void * under_2gb_free_pointer=DYNAMIC_1_SPACE_END; +#endif -/* Return 0 for success. */ -static int -do_mmap(os_vm_address_t *addr, os_vm_size_t len, int flags) +os_vm_address_t +os_validate(os_vm_address_t addr, os_vm_size_t len) { - /* We *must* have the memory where we want it. */ - os_vm_address_t old_addr=*addr; + int flags = MAP_PRIVATE | MAP_ANONYMOUS | MAP_NORESERVE; + os_vm_address_t actual ; - *addr = mmap(*addr, len, OS_VM_PROT_ALL, flags, -1, 0); - if (*addr == MAP_FAILED || - ((old_addr != NULL) && (*addr != old_addr))) { - FSHOW((stderr, - "error in allocating memory from the OS\n" - "(addr=%lx, len=%lx, flags=%lx)\n", - (long) addr, - (long) len, - (long) flags)); - if (n_do_mmap_ignorable_errors > 0) { - --n_do_mmap_ignorable_errors; - } else { - lose("too many errors in allocating memory from the OS"); - } + if (addr) + flags |= MAP_FIXED; +#ifdef LISP_FEATURE_ALPHA + else { + flags |= MAP_FIXED; + addr=under_2gb_free_pointer; + } +#endif + actual = mmap(addr, len, OS_VM_PROT_ALL, flags, -1, 0); + if (actual == MAP_FAILED || (addr && (addr!=actual))) { perror("mmap"); - return 1; + return 0; /* caller should check this */ } - return 0; -} -os_vm_address_t -os_validate(os_vm_address_t addr, os_vm_size_t len) -{ - if (addr) { - int flags = MAP_PRIVATE | MAP_ANONYMOUS | MAP_FIXED; - os_vm_address_t base_addr = addr; - do { - /* KLUDGE: It looks as though this code allocates memory - * in chunks of size no larger than 'magic', but why? What - * is the significance of 0x1000000 here? Also, can it be - * right that if the first few 'do_mmap' calls succeed, - * then one fails, we leave the memory allocated by the - * first few in place even while we return a code for - * complete failure? -- WHN 19991020 - * - * Peter Van Eynde writes (20000211) - * This was done because the kernel would only check for - * overcommit for every allocation seperately. So if you - * had 16MB of free mem+swap you could allocate 16M. And - * again, and again, etc. - * This in [Linux] 2.X could be bad as they changed the memory - * system. A side effect was/is (I don't really know) that - * programs with a lot of memory mappings run slower. But - * of course for 2.2.2X we now have the NO_RESERVE flag that - * helps... - * - * FIXME: The logic is also flaky w.r.t. failed - * allocations. If we make one or more successful calls to - * do_mmap(..) before one fails, then we've allocated - * memory, and we should ensure that it gets deallocated - * sometime somehow. If this function's response to any - * failed do_mmap(..) is to give up and return NULL (as in - * sbcl-0.6.7), then any failed do_mmap(..) after any - * successful do_mmap(..) causes a memory leak. */ - int magic = 0x1000000; - if (len <= magic) { - if (do_mmap(&addr, len, flags)) { - return NULL; - } - len = 0; - } else { - if (do_mmap(&addr, magic, flags)) { - return NULL; - } - addr += magic; - len = len - magic; - } - } while (len > 0); - return base_addr; - } else { - int flags = MAP_PRIVATE | MAP_ANONYMOUS; - if (do_mmap(&addr, len, flags)) { - return NULL; - } else { - return addr; - } - } +#ifdef LISP_FEATURE_ALPHA + + len=(len+(os_vm_page_size-1))&(~(os_vm_page_size-1)); + under_2gb_free_pointer+=len; +#endif + + return actual; } void @@ -212,7 +148,7 @@ os_map(int fd, int offset, os_vm_address_t addr, os_vm_size_t len) MAP_PRIVATE | MAP_FILE | MAP_FIXED, fd, (off_t) offset); - if(addr == MAP_FAILED) { + if (addr == MAP_FAILED) { perror("mmap"); lose("unexpected mmap(..) failure"); } @@ -221,11 +157,6 @@ os_map(int fd, int offset, os_vm_address_t addr, os_vm_size_t len) } void -os_flush_icache(os_vm_address_t address, os_vm_size_t length) -{ -} - -void os_protect(os_vm_address_t address, os_vm_size_t length, os_vm_prot_t prot) { if (mprotect(address, length, prot) == -1) { @@ -239,8 +170,8 @@ os_protect(os_vm_address_t address, os_vm_size_t length, os_vm_prot_t prot) static boolean in_range_p(os_vm_address_t a, lispobj sbeg, size_t slen) { - char* beg = (char*)sbeg; - char* end = (char*)sbeg + slen; + char* beg = (char*)((long)sbeg); + char* end = (char*)((long)sbeg) + slen; char* adr = (char*)a; return (adr >= beg && adr < end); } @@ -248,25 +179,26 @@ in_range_p(os_vm_address_t a, lispobj sbeg, size_t slen) boolean is_valid_lisp_addr(os_vm_address_t addr) { - return - in_range_p(addr, READ_ONLY_SPACE_START, READ_ONLY_SPACE_SIZE) || - in_range_p(addr, STATIC_SPACE_START , STATIC_SPACE_SIZE) || - in_range_p(addr, DYNAMIC_SPACE_START , DYNAMIC_SPACE_SIZE) || - in_range_p(addr, CONTROL_STACK_START , CONTROL_STACK_SIZE) || - in_range_p(addr, BINDING_STACK_START , BINDING_STACK_SIZE); + struct thread *th; + if(in_range_p(addr, READ_ONLY_SPACE_START, READ_ONLY_SPACE_SIZE) || + in_range_p(addr, STATIC_SPACE_START , STATIC_SPACE_SIZE) || + in_range_p(addr, DYNAMIC_SPACE_START , DYNAMIC_SPACE_SIZE)) + return 1; + for_each_thread(th) { + if((th->control_stack_start <= addr) && (addr < th->control_stack_end)) + return 1; + if(in_range_p(addr, th->binding_stack_start, BINDING_STACK_SIZE)) + return 1; + } + return 0; } /* * any OS-dependent special low-level handling for signals */ -#if !defined GENCGC -void -os_install_interrupt_handlers(void) -{} - -#else +#if defined LISP_FEATURE_GENCGC /* * The GENCGC needs to be hooked into whatever signal is raised for @@ -275,16 +207,60 @@ os_install_interrupt_handlers(void) void sigsegv_handler(int signal, siginfo_t *info, void* void_context) { - os_context_t *context = (os_context_t*)void_context; + os_context_t *context = arch_os_get_context(&void_context); void* fault_addr = (void*)context->uc_mcontext.cr2; - if (!gencgc_handle_wp_violation(fault_addr)) { - interrupt_handle_now(signal, info, void_context); + if (!gencgc_handle_wp_violation(fault_addr)) + if(!handle_control_stack_guard_triggered(context,fault_addr)) + interrupt_handle_now(signal, info, void_context); +} + +#else + +static void +sigsegv_handler(int signal, siginfo_t *info, void* void_context) +{ + os_context_t *context = arch_os_get_context(&void_context); + os_vm_address_t addr; + + addr = arch_get_bad_addr(signal,info,context); + if (addr != NULL && + *os_context_register_addr(context,reg_ALLOC) & (1L<<63)){ + + /* Alpha stuff: This is the end of a pseudo-atomic section + * during which a signal was received. We must deal with the + * pending interrupt (see also interrupt.c, + * ../code/interrupt.lisp) + */ + /* (how we got here: when interrupting, we set bit 63 in + * reg_Alloc. At the end of the atomic section we tried to + * write to reg_ALLOC, got a SIGSEGV (there's nothing mapped + * there) so ended up here + */ + *os_context_register_addr(context,reg_ALLOC) -= (1L<<63); + interrupt_handle_pending(context); + } else { + if(!interrupt_maybe_gc(signal, info, context)) + if(!handle_control_stack_guard_triggered(context,addr)) + interrupt_handle_now(signal, info, context); } } +#endif + +void sigcont_handler(int signal, siginfo_t *info, void *void_context) +{ + /* we need to have a handler installed for this signal so that + * sigwaitinfo() for it actually returns at the appropriate time + */ + fprintf(stderr, "Thread %d received stray SIGCONT\n", + arch_os_get_current_thread()->pid); +} + void os_install_interrupt_handlers(void) { - interrupt_install_low_level_handler(SIGSEGV, sigsegv_handler); + undoably_install_low_level_interrupt_handler(SIG_MEMORY_FAULT, + sigsegv_handler); + undoably_install_low_level_interrupt_handler(SIGCONT, + sigcont_handler); } -#endif