2014-11-11 15:08:54 -07:00
|
|
|
// Copyright 2009 The Go Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
|
|
|
package runtime
|
|
|
|
|
|
|
|
import "unsafe"
|
|
|
|
|
|
|
|
var sigset_none sigset
|
|
|
|
var sigset_all sigset = sigset{^uint32(0), ^uint32(0)}
|
|
|
|
|
|
|
|
// Linux futex.
|
|
|
|
//
|
|
|
|
// futexsleep(uint32 *addr, uint32 val)
|
|
|
|
// futexwakeup(uint32 *addr)
|
|
|
|
//
|
|
|
|
// Futexsleep atomically checks if *addr == val and if so, sleeps on addr.
|
|
|
|
// Futexwakeup wakes up threads sleeping on addr.
|
|
|
|
// Futexsleep is allowed to wake up spuriously.
|
|
|
|
|
|
|
|
const (
|
|
|
|
_FUTEX_WAIT = 0
|
|
|
|
_FUTEX_WAKE = 1
|
|
|
|
)
|
|
|
|
|
|
|
|
// Atomically,
|
|
|
|
// if(*addr == val) sleep
|
|
|
|
// Might be woken up spuriously; that's allowed.
|
|
|
|
// Don't sleep longer than ns; ns < 0 means forever.
|
|
|
|
//go:nosplit
|
|
|
|
func futexsleep(addr *uint32, val uint32, ns int64) {
|
|
|
|
var ts timespec
|
|
|
|
|
|
|
|
// Some Linux kernels have a bug where futex of
|
|
|
|
// FUTEX_WAIT returns an internal error code
|
|
|
|
// as an errno. Libpthread ignores the return value
|
|
|
|
// here, and so can we: as it says a few lines up,
|
|
|
|
// spurious wakeups are allowed.
|
|
|
|
if ns < 0 {
|
|
|
|
futex(unsafe.Pointer(addr), _FUTEX_WAIT, val, nil, nil, 0)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2014-11-14 10:10:52 -07:00
|
|
|
// It's difficult to live within the no-split stack limits here.
|
|
|
|
// On ARM and 386, a 64-bit divide invokes a general software routine
|
|
|
|
// that needs more stack than we can afford. So we use timediv instead.
|
|
|
|
// But on real 64-bit systems, where words are larger but the stack limit
|
|
|
|
// is not, even timediv is too heavy, and we really need to use just an
|
|
|
|
// ordinary machine instruction.
|
|
|
|
if ptrSize == 8 {
|
2014-11-14 12:50:00 -07:00
|
|
|
ts.set_sec(ns / 1000000000)
|
2014-11-14 10:55:10 -07:00
|
|
|
ts.set_nsec(int32(ns % 1000000000))
|
2014-11-14 10:10:52 -07:00
|
|
|
} else {
|
|
|
|
ts.tv_nsec = 0
|
2014-11-14 12:50:00 -07:00
|
|
|
ts.set_sec(int64(timediv(ns, 1000000000, (*int32)(unsafe.Pointer(&ts.tv_nsec)))))
|
2014-11-14 10:10:52 -07:00
|
|
|
}
|
2014-11-11 15:08:54 -07:00
|
|
|
futex(unsafe.Pointer(addr), _FUTEX_WAIT, val, unsafe.Pointer(&ts), nil, 0)
|
|
|
|
}
|
|
|
|
|
|
|
|
// If any procs are sleeping on addr, wake up at most cnt.
|
|
|
|
//go:nosplit
|
|
|
|
func futexwakeup(addr *uint32, cnt uint32) {
|
|
|
|
ret := futex(unsafe.Pointer(addr), _FUTEX_WAKE, cnt, nil, nil, 0)
|
|
|
|
if ret >= 0 {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// I don't know that futex wakeup can return
|
|
|
|
// EAGAIN or EINTR, but if it does, it would be
|
|
|
|
// safe to loop and call futex again.
|
[dev.cc] runtime: delete scalararg, ptrarg; rename onM to systemstack
Scalararg and ptrarg are not "signal safe".
Go code filling them out can be interrupted by a signal,
and then the signal handler runs, and if it also ends up
in Go code that uses scalararg or ptrarg, now the old
values have been smashed.
For the pieces of code that do need to run in a signal handler,
we introduced onM_signalok, which is really just onM
except that the _signalok is meant to convey that the caller
asserts that scalarg and ptrarg will be restored to their old
values after the call (instead of the usual behavior, zeroing them).
Scalararg and ptrarg are also untyped and therefore error-prone.
Go code can always pass a closure instead of using scalararg
and ptrarg; they were only really necessary for C code.
And there's no more C code.
For all these reasons, delete scalararg and ptrarg, converting
the few remaining references to use closures.
Once those are gone, there is no need for a distinction between
onM and onM_signalok, so replace both with a single function
equivalent to the current onM_signalok (that is, it can be called
on any of the curg, g0, and gsignal stacks).
The name onM and the phrase 'm stack' are misnomers,
because on most system an M has two system stacks:
the main thread stack and the signal handling stack.
Correct the misnomer by naming the replacement function systemstack.
Fix a few references to "M stack" in code.
The main motivation for this change is to eliminate scalararg/ptrarg.
Rick and I have already seen them cause problems because
the calling sequence m.ptrarg[0] = p is a heap pointer assignment,
so it gets a write barrier. The write barrier also uses onM, so it has
all the same problems as if it were being invoked by a signal handler.
We worked around this by saving and restoring the old values
and by calling onM_signalok, but there's no point in keeping this nice
home for bugs around any longer.
This CL also changes funcline to return the file name as a result
instead of filling in a passed-in *string. (The *string signature is
left over from when the code was written in and called from C.)
That's arguably an unrelated change, except that once I had done
the ptrarg/scalararg/onM cleanup I started getting false positives
about the *string argument escaping (not allowed in package runtime).
The compiler is wrong, but the easiest fix is to write the code like
Go code instead of like C code. I am a bit worried that the compiler
is wrong because of some use of uninitialized memory in the escape
analysis. If that's the reason, it will go away when we convert the
compiler to Go. (And if not, we'll debug it the next time.)
LGTM=khr
R=r, khr
CC=austin, golang-codereviews, iant, rlh
https://golang.org/cl/174950043
2014-11-12 12:54:31 -07:00
|
|
|
systemstack(func() {
|
2014-11-11 15:08:54 -07:00
|
|
|
print("futexwakeup addr=", addr, " returned ", ret, "\n")
|
|
|
|
})
|
|
|
|
|
|
|
|
*(*int32)(unsafe.Pointer(uintptr(0x1006))) = 0x1006
|
|
|
|
}
|
|
|
|
|
|
|
|
func getproccount() int32 {
|
|
|
|
var buf [16]uintptr
|
|
|
|
r := sched_getaffinity(0, unsafe.Sizeof(buf), &buf[0])
|
|
|
|
n := int32(0)
|
|
|
|
for _, v := range buf[:r/ptrSize] {
|
|
|
|
for i := 0; i < 64; i++ {
|
|
|
|
n += int32(v & 1)
|
|
|
|
v >>= 1
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if n == 0 {
|
|
|
|
n = 1
|
|
|
|
}
|
|
|
|
return n
|
|
|
|
}
|
|
|
|
|
|
|
|
// Clone, the Linux rfork.
|
|
|
|
const (
|
|
|
|
_CLONE_VM = 0x100
|
|
|
|
_CLONE_FS = 0x200
|
|
|
|
_CLONE_FILES = 0x400
|
|
|
|
_CLONE_SIGHAND = 0x800
|
|
|
|
_CLONE_PTRACE = 0x2000
|
|
|
|
_CLONE_VFORK = 0x4000
|
|
|
|
_CLONE_PARENT = 0x8000
|
|
|
|
_CLONE_THREAD = 0x10000
|
|
|
|
_CLONE_NEWNS = 0x20000
|
|
|
|
_CLONE_SYSVSEM = 0x40000
|
|
|
|
_CLONE_SETTLS = 0x80000
|
|
|
|
_CLONE_PARENT_SETTID = 0x100000
|
|
|
|
_CLONE_CHILD_CLEARTID = 0x200000
|
|
|
|
_CLONE_UNTRACED = 0x800000
|
|
|
|
_CLONE_CHILD_SETTID = 0x1000000
|
|
|
|
_CLONE_STOPPED = 0x2000000
|
|
|
|
_CLONE_NEWUTS = 0x4000000
|
|
|
|
_CLONE_NEWIPC = 0x8000000
|
|
|
|
)
|
|
|
|
|
|
|
|
func newosproc(mp *m, stk unsafe.Pointer) {
|
|
|
|
/*
|
|
|
|
* note: strace gets confused if we use CLONE_PTRACE here.
|
|
|
|
*/
|
|
|
|
var flags int32 = _CLONE_VM | /* share memory */
|
|
|
|
_CLONE_FS | /* share cwd, etc */
|
|
|
|
_CLONE_FILES | /* share fd table */
|
|
|
|
_CLONE_SIGHAND | /* share sig handler table */
|
|
|
|
_CLONE_THREAD /* revisit - okay for now */
|
|
|
|
|
|
|
|
mp.tls[0] = uintptr(mp.id) // so 386 asm can find it
|
|
|
|
if false {
|
|
|
|
print("newosproc stk=", stk, " m=", mp, " g=", mp.g0, " clone=", funcPC(clone), " id=", mp.id, "/", mp.tls[0], " ostk=", &mp, "\n")
|
|
|
|
}
|
|
|
|
|
|
|
|
// Disable signals during clone, so that the new thread starts
|
|
|
|
// with signals disabled. It will enable them in minit.
|
|
|
|
var oset sigset
|
|
|
|
rtsigprocmask(_SIG_SETMASK, &sigset_all, &oset, int32(unsafe.Sizeof(oset)))
|
|
|
|
ret := clone(flags, stk, unsafe.Pointer(mp), unsafe.Pointer(mp.g0), unsafe.Pointer(funcPC(mstart)))
|
|
|
|
rtsigprocmask(_SIG_SETMASK, &oset, nil, int32(unsafe.Sizeof(oset)))
|
|
|
|
|
|
|
|
if ret < 0 {
|
|
|
|
print("runtime: failed to create new OS thread (have ", mcount(), " already; errno=", -ret, ")\n")
|
2014-12-27 21:58:00 -07:00
|
|
|
throw("newosproc")
|
2014-11-11 15:08:54 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func osinit() {
|
|
|
|
ncpu = getproccount()
|
|
|
|
}
|
|
|
|
|
2015-01-08 16:30:22 -07:00
|
|
|
var urandom_dev = []byte("/dev/urandom\x00")
|
2014-11-11 15:08:54 -07:00
|
|
|
|
2014-12-09 15:40:40 -07:00
|
|
|
func getRandomData(r []byte) {
|
|
|
|
if startupRandomData != nil {
|
|
|
|
n := copy(r, startupRandomData)
|
|
|
|
extendRandom(r, n)
|
2014-11-11 15:08:54 -07:00
|
|
|
return
|
|
|
|
}
|
|
|
|
fd := open(&urandom_dev[0], 0 /* O_RDONLY */, 0)
|
2014-12-09 15:40:40 -07:00
|
|
|
n := read(fd, unsafe.Pointer(&r[0]), int32(len(r)))
|
2014-11-11 15:08:54 -07:00
|
|
|
close(fd)
|
2014-12-09 15:40:40 -07:00
|
|
|
extendRandom(r, int(n))
|
2014-11-11 15:08:54 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
func goenvs() {
|
|
|
|
goenvs_unix()
|
|
|
|
}
|
|
|
|
|
|
|
|
// Called to initialize a new m (including the bootstrap m).
|
|
|
|
// Called on the parent thread (main thread in case of bootstrap), can allocate memory.
|
|
|
|
func mpreinit(mp *m) {
|
|
|
|
mp.gsignal = malg(32 * 1024) // Linux wants >= 2K
|
|
|
|
mp.gsignal.m = mp
|
|
|
|
}
|
|
|
|
|
|
|
|
// Called to initialize a new m (including the bootstrap m).
|
|
|
|
// Called on the new thread, can not allocate memory.
|
|
|
|
func minit() {
|
|
|
|
// Initialize signal handling.
|
|
|
|
_g_ := getg()
|
|
|
|
signalstack((*byte)(unsafe.Pointer(_g_.m.gsignal.stack.lo)), 32*1024)
|
|
|
|
rtsigprocmask(_SIG_SETMASK, &sigset_none, nil, int32(unsafe.Sizeof(sigset_none)))
|
|
|
|
}
|
|
|
|
|
|
|
|
// Called from dropm to undo the effect of an minit.
|
|
|
|
func unminit() {
|
|
|
|
signalstack(nil, 0)
|
|
|
|
}
|
|
|
|
|
|
|
|
func memlimit() uintptr {
|
|
|
|
/*
|
|
|
|
TODO: Convert to Go when something actually uses the result.
|
|
|
|
|
|
|
|
Rlimit rl;
|
|
|
|
extern byte runtime·text[], runtime·end[];
|
|
|
|
uintptr used;
|
|
|
|
|
|
|
|
if(runtime·getrlimit(RLIMIT_AS, &rl) != 0)
|
|
|
|
return 0;
|
|
|
|
if(rl.rlim_cur >= 0x7fffffff)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
// Estimate our VM footprint excluding the heap.
|
|
|
|
// Not an exact science: use size of binary plus
|
|
|
|
// some room for thread stacks.
|
|
|
|
used = runtime·end - runtime·text + (64<<20);
|
|
|
|
if(used >= rl.rlim_cur)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
// If there's not at least 16 MB left, we're probably
|
|
|
|
// not going to be able to do much. Treat as no limit.
|
|
|
|
rl.rlim_cur -= used;
|
|
|
|
if(rl.rlim_cur < (16<<20))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return rl.rlim_cur - used;
|
|
|
|
*/
|
|
|
|
|
|
|
|
return 0
|
|
|
|
}
|
|
|
|
|
|
|
|
//#ifdef GOARCH_386
|
|
|
|
//#define sa_handler k_sa_handler
|
|
|
|
//#endif
|
|
|
|
|
|
|
|
func sigreturn()
|
|
|
|
func sigtramp()
|
|
|
|
|
|
|
|
func setsig(i int32, fn uintptr, restart bool) {
|
|
|
|
var sa sigactiont
|
|
|
|
memclr(unsafe.Pointer(&sa), unsafe.Sizeof(sa))
|
|
|
|
sa.sa_flags = _SA_SIGINFO | _SA_ONSTACK | _SA_RESTORER
|
|
|
|
if restart {
|
|
|
|
sa.sa_flags |= _SA_RESTART
|
|
|
|
}
|
|
|
|
sa.sa_mask = ^uint64(0)
|
|
|
|
// Although Linux manpage says "sa_restorer element is obsolete and
|
|
|
|
// should not be used". x86_64 kernel requires it. Only use it on
|
|
|
|
// x86.
|
|
|
|
if GOARCH == "386" || GOARCH == "amd64" {
|
|
|
|
sa.sa_restorer = funcPC(sigreturn)
|
|
|
|
}
|
|
|
|
if fn == funcPC(sighandler) {
|
|
|
|
fn = funcPC(sigtramp)
|
|
|
|
}
|
|
|
|
sa.sa_handler = fn
|
|
|
|
if rt_sigaction(uintptr(i), &sa, nil, unsafe.Sizeof(sa.sa_mask)) != 0 {
|
2014-12-27 21:58:00 -07:00
|
|
|
throw("rt_sigaction failure")
|
2014-11-11 15:08:54 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-12-19 14:16:17 -07:00
|
|
|
func setsigstack(i int32) {
|
|
|
|
var sa sigactiont
|
|
|
|
if rt_sigaction(uintptr(i), nil, &sa, unsafe.Sizeof(sa.sa_mask)) != 0 {
|
2014-12-27 21:58:00 -07:00
|
|
|
throw("rt_sigaction failure")
|
2014-12-19 14:16:17 -07:00
|
|
|
}
|
|
|
|
if sa.sa_handler == 0 || sa.sa_handler == _SIG_DFL || sa.sa_handler == _SIG_IGN || sa.sa_flags&_SA_ONSTACK != 0 {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
sa.sa_flags |= _SA_ONSTACK
|
|
|
|
if rt_sigaction(uintptr(i), &sa, nil, unsafe.Sizeof(sa.sa_mask)) != 0 {
|
2014-12-27 21:58:00 -07:00
|
|
|
throw("rt_sigaction failure")
|
2014-12-19 14:16:17 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-11-11 15:08:54 -07:00
|
|
|
func getsig(i int32) uintptr {
|
|
|
|
var sa sigactiont
|
|
|
|
|
|
|
|
memclr(unsafe.Pointer(&sa), unsafe.Sizeof(sa))
|
|
|
|
if rt_sigaction(uintptr(i), nil, &sa, unsafe.Sizeof(sa.sa_mask)) != 0 {
|
2014-12-27 21:58:00 -07:00
|
|
|
throw("rt_sigaction read failure")
|
2014-11-11 15:08:54 -07:00
|
|
|
}
|
|
|
|
if sa.sa_handler == funcPC(sigtramp) {
|
|
|
|
return funcPC(sighandler)
|
|
|
|
}
|
|
|
|
return sa.sa_handler
|
|
|
|
}
|
|
|
|
|
|
|
|
func signalstack(p *byte, n int32) {
|
|
|
|
var st sigaltstackt
|
|
|
|
st.ss_sp = p
|
|
|
|
st.ss_size = uintptr(n)
|
|
|
|
st.ss_flags = 0
|
|
|
|
if p == nil {
|
|
|
|
st.ss_flags = _SS_DISABLE
|
|
|
|
}
|
|
|
|
sigaltstack(&st, nil)
|
|
|
|
}
|
|
|
|
|
|
|
|
func unblocksignals() {
|
|
|
|
rtsigprocmask(_SIG_SETMASK, &sigset_none, nil, int32(unsafe.Sizeof(sigset_none)))
|
|
|
|
}
|