2009-05-02 05:04:19 -04:00
|
|
|
#include "master.hpp"
|
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
namespace factor {
|
2009-05-04 02:46:13 -04:00
|
|
|
|
2015-08-24 02:47:36 -04:00
|
|
|
bool set_memory_locked(cell base, cell size, bool locked) {
|
|
|
|
int prot = locked ? PROT_NONE : PROT_READ | PROT_WRITE;
|
|
|
|
int status = mprotect((char*)base, size, prot);
|
|
|
|
return status != -1;
|
|
|
|
}
|
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
THREADHANDLE start_thread(void* (*start_routine)(void*), void* args) {
|
|
|
|
pthread_attr_t attr;
|
|
|
|
pthread_t thread;
|
|
|
|
if (pthread_attr_init(&attr) != 0)
|
|
|
|
fatal_error("pthread_attr_init() failed", 0);
|
|
|
|
if (pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_JOINABLE) != 0)
|
|
|
|
fatal_error("pthread_attr_setdetachstate() failed", 0);
|
|
|
|
if (pthread_create(&thread, &attr, start_routine, args) != 0)
|
|
|
|
fatal_error("pthread_create() failed", 0);
|
|
|
|
pthread_attr_destroy(&attr);
|
|
|
|
return thread;
|
2009-05-02 05:04:19 -04:00
|
|
|
}
|
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
static void* null_dll;
|
2009-05-02 05:04:19 -04:00
|
|
|
|
2013-05-13 00:28:25 -04:00
|
|
|
void sleep_nanos(uint64_t nsec) {
|
2013-05-11 22:24:31 -04:00
|
|
|
timespec ts;
|
|
|
|
timespec ts_rem;
|
|
|
|
int ret;
|
|
|
|
ts.tv_sec = nsec / 1000000000;
|
|
|
|
ts.tv_nsec = nsec % 1000000000;
|
|
|
|
ret = nanosleep(&ts, &ts_rem);
|
|
|
|
while (ret == -1 && errno == EINTR) {
|
|
|
|
memcpy(&ts, &ts_rem, sizeof(ts));
|
|
|
|
ret = nanosleep(&ts, &ts_rem);
|
|
|
|
}
|
2009-11-18 16:58:48 -05:00
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
if (ret == -1)
|
|
|
|
fatal_error("nanosleep failed", 0);
|
2009-11-18 05:20:05 -05:00
|
|
|
}
|
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
void factor_vm::init_ffi() { null_dll = dlopen(NULL, RTLD_LAZY); }
|
2009-05-02 05:04:19 -04:00
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
void factor_vm::ffi_dlopen(dll* dll) {
|
2014-02-08 10:31:59 -05:00
|
|
|
dll->handle = dlopen(alien_offset(dll->path), RTLD_LAZY | RTLD_GLOBAL);
|
2009-05-02 05:04:19 -04:00
|
|
|
}
|
|
|
|
|
2015-08-18 02:18:41 -04:00
|
|
|
cell factor_vm::ffi_dlsym_raw(dll* dll, symbol_char* symbol) {
|
|
|
|
return (cell)dlsym(dll ? dll->handle : null_dll, symbol);
|
2011-05-20 18:11:50 -04:00
|
|
|
}
|
|
|
|
|
2015-08-18 02:18:41 -04:00
|
|
|
cell factor_vm::ffi_dlsym(dll* dll, symbol_char* symbol) {
|
2013-05-11 22:24:31 -04:00
|
|
|
return FUNCTION_CODE_POINTER(ffi_dlsym_raw(dll, symbol));
|
2011-05-20 18:11:50 -04:00
|
|
|
}
|
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
void factor_vm::ffi_dlclose(dll* dll) {
|
|
|
|
if (dlclose(dll->handle))
|
|
|
|
general_error(ERROR_FFI, false_object, false_object);
|
|
|
|
dll->handle = NULL;
|
2009-05-02 05:04:19 -04:00
|
|
|
}
|
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
void factor_vm::primitive_existsp() {
|
|
|
|
struct stat sb;
|
|
|
|
char* path = (char*)(untag_check<byte_array>(ctx->pop()) + 1);
|
|
|
|
ctx->push(tag_boolean(stat(path, &sb) >= 0));
|
2009-05-02 05:04:19 -04:00
|
|
|
}
|
|
|
|
|
2015-09-29 17:08:45 -04:00
|
|
|
bool move_file(const vm_char* path1, const vm_char* path2) {
|
2013-05-11 22:24:31 -04:00
|
|
|
int ret = 0;
|
|
|
|
do {
|
|
|
|
ret = rename((path1), (path2));
|
|
|
|
} while (ret < 0 && errno == EINTR);
|
2010-03-28 12:52:16 -04:00
|
|
|
|
2015-09-29 17:08:45 -04:00
|
|
|
return ret == 0;
|
2010-02-03 16:12:13 -05:00
|
|
|
}
|
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
segment::segment(cell size_, bool executable_p) {
|
|
|
|
size = size_;
|
2009-09-25 22:17:20 -04:00
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
int pagesize = getpagesize();
|
2009-05-02 05:04:19 -04:00
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
int prot;
|
|
|
|
if (executable_p)
|
2015-05-07 07:29:57 -04:00
|
|
|
prot = PROT_READ | PROT_WRITE | PROT_EXEC;
|
2013-05-11 22:24:31 -04:00
|
|
|
else
|
2015-05-07 07:29:57 -04:00
|
|
|
prot = PROT_READ | PROT_WRITE;
|
2009-05-02 05:04:19 -04:00
|
|
|
|
2015-10-08 14:41:59 -04:00
|
|
|
cell alloc_size = 2 * pagesize + size;
|
|
|
|
char* array = (char*)mmap(NULL, alloc_size, prot,
|
2013-05-11 22:24:31 -04:00
|
|
|
MAP_ANON | MAP_PRIVATE, -1, 0);
|
2014-11-11 01:23:38 -05:00
|
|
|
|
2015-08-14 18:06:59 -04:00
|
|
|
if (array == (char*)-1)
|
2015-10-08 14:41:59 -04:00
|
|
|
fatal_error("Out of memory in mmap", alloc_size);
|
2009-05-02 05:04:19 -04:00
|
|
|
|
2015-08-14 18:06:59 -04:00
|
|
|
start = (cell)(array + pagesize);
|
|
|
|
end = start + size;
|
|
|
|
|
|
|
|
set_border_locked(true);
|
|
|
|
}
|
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
segment::~segment() {
|
|
|
|
int pagesize = getpagesize();
|
2016-09-21 19:49:12 -04:00
|
|
|
int retval = munmap((void*)(start - pagesize), 2 * pagesize + size);
|
2013-05-11 22:24:31 -04:00
|
|
|
if (retval)
|
|
|
|
fatal_error("Segment deallocation failed", 0);
|
2009-05-02 05:04:19 -04:00
|
|
|
}
|
2009-10-22 06:22:59 -04:00
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
void factor_vm::start_sampling_profiler_timer() {
|
|
|
|
struct itimerval timer;
|
|
|
|
memset((void*)&timer, 0, sizeof(struct itimerval));
|
|
|
|
timer.it_value.tv_usec = 1000000 / samples_per_second;
|
|
|
|
timer.it_interval.tv_usec = 1000000 / samples_per_second;
|
|
|
|
setitimer(ITIMER_REAL, &timer, NULL);
|
2011-10-28 18:42:33 -04:00
|
|
|
}
|
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
void factor_vm::end_sampling_profiler_timer() {
|
|
|
|
struct itimerval timer;
|
|
|
|
memset((void*)&timer, 0, sizeof(struct itimerval));
|
|
|
|
setitimer(ITIMER_REAL, &timer, NULL);
|
2011-10-28 18:42:33 -04:00
|
|
|
}
|
|
|
|
|
2016-09-21 19:49:12 -04:00
|
|
|
void factor_vm::dispatch_signal(void* uap, void(handler)()) {
|
|
|
|
dispatch_signal_handler((cell*)&UAP_STACK_POINTER(uap),
|
|
|
|
(cell*)&UAP_PROGRAM_COUNTER(uap),
|
|
|
|
(cell)FUNCTION_CODE_POINTER(handler));
|
|
|
|
}
|
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
void memory_signal_handler(int signal, siginfo_t* siginfo, void* uap) {
|
2015-08-14 18:06:59 -04:00
|
|
|
|
|
|
|
cell fault_addr = (cell)siginfo->si_addr;
|
|
|
|
cell fault_pc = (cell)UAP_PROGRAM_COUNTER(uap);
|
2013-05-11 22:24:31 -04:00
|
|
|
factor_vm* vm = current_vm();
|
2016-09-21 19:49:12 -04:00
|
|
|
vm->set_memory_protection_error(fault_addr, fault_pc);
|
2013-05-11 22:24:31 -04:00
|
|
|
vm->dispatch_signal(uap, factor::memory_signal_handler_impl);
|
2009-05-02 05:04:19 -04:00
|
|
|
}
|
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
void synchronous_signal_handler(int signal, siginfo_t* siginfo, void* uap) {
|
|
|
|
if (factor_vm::fatal_erroring_p)
|
|
|
|
return;
|
2011-11-11 16:29:46 -05:00
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
factor_vm* vm = current_vm_p();
|
2016-03-30 18:06:35 -04:00
|
|
|
if (!vm)
|
2013-05-11 22:24:31 -04:00
|
|
|
fatal_error("Foreign thread received signal", signal);
|
2016-03-30 18:06:35 -04:00
|
|
|
vm->signal_number = signal;
|
|
|
|
vm->dispatch_signal(uap, factor::synchronous_signal_handler_impl);
|
2011-10-19 18:39:44 -04:00
|
|
|
}
|
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
void safe_write_nonblock(int fd, void* data, ssize_t size);
|
2011-11-07 21:53:07 -05:00
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
static void enqueue_signal(factor_vm* vm, int signal) {
|
|
|
|
if (vm->signal_pipe_output != 0)
|
|
|
|
safe_write_nonblock(vm->signal_pipe_output, &signal, sizeof(int));
|
2011-11-07 21:53:07 -05:00
|
|
|
}
|
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
void enqueue_signal_handler(int signal, siginfo_t* siginfo, void* uap) {
|
|
|
|
if (factor_vm::fatal_erroring_p)
|
|
|
|
return;
|
2011-11-11 16:29:46 -05:00
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
factor_vm* vm = current_vm_p();
|
|
|
|
if (vm)
|
|
|
|
enqueue_signal(vm, signal);
|
2009-05-02 05:04:19 -04:00
|
|
|
}
|
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
void fep_signal_handler(int signal, siginfo_t* siginfo, void* uap) {
|
|
|
|
if (factor_vm::fatal_erroring_p)
|
|
|
|
return;
|
2011-11-11 16:29:46 -05:00
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
factor_vm* vm = current_vm_p();
|
|
|
|
if (vm) {
|
2016-08-15 09:13:30 -04:00
|
|
|
vm->enqueue_fep();
|
2013-05-11 22:24:31 -04:00
|
|
|
enqueue_signal(vm, signal);
|
|
|
|
} else
|
|
|
|
fatal_error("Foreign thread received signal", signal);
|
2011-10-21 00:00:25 -04:00
|
|
|
}
|
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
void sample_signal_handler(int signal, siginfo_t* siginfo, void* uap) {
|
|
|
|
factor_vm* vm = current_vm_p();
|
|
|
|
bool foreign_thread = false;
|
|
|
|
if (vm == NULL) {
|
|
|
|
foreign_thread = true;
|
|
|
|
vm = thread_vms.begin()->second;
|
|
|
|
}
|
|
|
|
if (atomic::load(&vm->sampling_profiler_p))
|
2016-08-15 09:13:30 -04:00
|
|
|
vm->enqueue_samples(1, (cell)UAP_PROGRAM_COUNTER(uap), foreign_thread);
|
2013-05-11 22:24:31 -04:00
|
|
|
else if (!foreign_thread)
|
|
|
|
enqueue_signal(vm, signal);
|
2011-10-21 00:00:25 -04:00
|
|
|
}
|
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
void ignore_signal_handler(int signal, siginfo_t* siginfo, void* uap) {}
|
2010-09-03 01:11:45 -04:00
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
void fpe_signal_handler(int signal, siginfo_t* siginfo, void* uap) {
|
|
|
|
factor_vm* vm = current_vm();
|
|
|
|
vm->signal_number = signal;
|
|
|
|
vm->signal_fpu_status = fpu_status(uap_fpu_status(uap));
|
|
|
|
uap_clear_fpu_status(uap);
|
2009-09-13 16:50:20 -04:00
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
vm->dispatch_signal(
|
|
|
|
uap, (siginfo->si_code == FPE_INTDIV || siginfo->si_code == FPE_INTOVF)
|
|
|
|
? factor::synchronous_signal_handler_impl
|
|
|
|
: factor::fp_signal_handler_impl);
|
2009-09-06 09:44:25 -04:00
|
|
|
}
|
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
static void sigaction_safe(int signum, const struct sigaction* act,
|
|
|
|
struct sigaction* oldact) {
|
|
|
|
int ret;
|
|
|
|
do {
|
|
|
|
ret = sigaction(signum, act, oldact);
|
|
|
|
} while (ret == -1 && errno == EINTR);
|
2009-05-02 05:04:19 -04:00
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
if (ret == -1)
|
|
|
|
fatal_error("sigaction failed", errno);
|
2009-05-02 05:04:19 -04:00
|
|
|
}
|
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
static void init_sigaction_with_handler(struct sigaction* act,
|
|
|
|
void (*handler)(int, siginfo_t*,
|
|
|
|
void*)) {
|
|
|
|
memset(act, 0, sizeof(struct sigaction));
|
|
|
|
sigemptyset(&act->sa_mask);
|
|
|
|
act->sa_sigaction = handler;
|
|
|
|
act->sa_flags = SA_SIGINFO | SA_ONSTACK;
|
2011-10-21 00:00:25 -04:00
|
|
|
}
|
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
static void safe_pipe(int* in, int* out) {
|
|
|
|
int filedes[2];
|
2011-11-07 15:51:49 -05:00
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
if (pipe(filedes) < 0)
|
|
|
|
fatal_error("Error opening pipe", errno);
|
2011-11-07 15:51:49 -05:00
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
*in = filedes[0];
|
|
|
|
*out = filedes[1];
|
2011-11-07 15:51:49 -05:00
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
if (fcntl(*in, F_SETFD, FD_CLOEXEC) < 0)
|
|
|
|
fatal_error("Error with fcntl", errno);
|
2011-11-07 15:51:49 -05:00
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
if (fcntl(*out, F_SETFD, FD_CLOEXEC) < 0)
|
|
|
|
fatal_error("Error with fcntl", errno);
|
2011-11-07 15:51:49 -05:00
|
|
|
}
|
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
static void init_signal_pipe(factor_vm* vm) {
|
|
|
|
safe_pipe(&vm->signal_pipe_input, &vm->signal_pipe_output);
|
2011-11-09 01:07:22 -05:00
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
if (fcntl(vm->signal_pipe_output, F_SETFL, O_NONBLOCK) < 0)
|
|
|
|
fatal_error("Error with fcntl", errno);
|
2011-11-09 01:07:22 -05:00
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
vm->special_objects[OBJ_SIGNAL_PIPE] = tag_fixnum(vm->signal_pipe_input);
|
2011-11-07 15:51:49 -05:00
|
|
|
}
|
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
void factor_vm::unix_init_signals() {
|
|
|
|
init_signal_pipe(this);
|
2011-11-07 15:51:49 -05:00
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
signal_callstack_seg = new segment(callstack_size, false);
|
2011-11-03 14:50:23 -04:00
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
stack_t signal_callstack;
|
|
|
|
signal_callstack.ss_sp = (char*)signal_callstack_seg->start;
|
|
|
|
signal_callstack.ss_size = signal_callstack_seg->size;
|
|
|
|
signal_callstack.ss_flags = 0;
|
2011-11-03 14:50:23 -04:00
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
if (sigaltstack(&signal_callstack, (stack_t*)NULL) < 0)
|
|
|
|
fatal_error("sigaltstack() failed", 0);
|
2009-05-02 05:04:19 -04:00
|
|
|
|
2014-06-19 16:12:25 -04:00
|
|
|
{
|
|
|
|
struct sigaction memory_sigaction;
|
|
|
|
init_sigaction_with_handler(&memory_sigaction, memory_signal_handler);
|
|
|
|
sigaction_safe(SIGBUS, &memory_sigaction, NULL);
|
|
|
|
sigaction_safe(SIGSEGV, &memory_sigaction, NULL);
|
|
|
|
sigaction_safe(SIGTRAP, &memory_sigaction, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
struct sigaction fpe_sigaction;
|
|
|
|
init_sigaction_with_handler(&fpe_sigaction, fpe_signal_handler);
|
|
|
|
sigaction_safe(SIGFPE, &fpe_sigaction, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
struct sigaction synchronous_sigaction;
|
|
|
|
init_sigaction_with_handler(&synchronous_sigaction,
|
|
|
|
synchronous_signal_handler);
|
|
|
|
sigaction_safe(SIGILL, &synchronous_sigaction, NULL);
|
|
|
|
sigaction_safe(SIGABRT, &synchronous_sigaction, NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
struct sigaction enqueue_sigaction;
|
|
|
|
init_sigaction_with_handler(&enqueue_sigaction, enqueue_signal_handler);
|
|
|
|
sigaction_safe(SIGWINCH, &enqueue_sigaction, NULL);
|
|
|
|
sigaction_safe(SIGUSR1, &enqueue_sigaction, NULL);
|
|
|
|
sigaction_safe(SIGCONT, &enqueue_sigaction, NULL);
|
|
|
|
sigaction_safe(SIGURG, &enqueue_sigaction, NULL);
|
|
|
|
sigaction_safe(SIGIO, &enqueue_sigaction, NULL);
|
|
|
|
sigaction_safe(SIGPROF, &enqueue_sigaction, NULL);
|
|
|
|
sigaction_safe(SIGVTALRM, &enqueue_sigaction, NULL);
|
2011-10-21 00:00:25 -04:00
|
|
|
#ifdef SIGINFO
|
2014-06-19 16:12:25 -04:00
|
|
|
sigaction_safe(SIGINFO, &enqueue_sigaction, NULL);
|
2011-10-21 00:00:25 -04:00
|
|
|
#endif
|
2014-06-19 16:12:25 -04:00
|
|
|
}
|
2011-10-21 00:00:25 -04:00
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
handle_ctrl_c();
|
2011-10-21 00:00:25 -04:00
|
|
|
|
2014-06-19 16:12:25 -04:00
|
|
|
{
|
|
|
|
struct sigaction sample_sigaction;
|
|
|
|
init_sigaction_with_handler(&sample_sigaction, sample_signal_handler);
|
|
|
|
sigaction_safe(SIGALRM, &sample_sigaction, NULL);
|
|
|
|
}
|
2009-05-02 05:04:19 -04:00
|
|
|
|
2016-08-21 10:26:04 -04:00
|
|
|
// We don't use SA_IGN here because then the ignore action is inherited
|
|
|
|
// by subprocesses, which we don't want. There is a unit test in
|
|
|
|
// io.launcher.unix for this.
|
2014-06-19 16:12:25 -04:00
|
|
|
{
|
|
|
|
struct sigaction ignore_sigaction;
|
|
|
|
init_sigaction_with_handler(&ignore_sigaction, ignore_signal_handler);
|
|
|
|
sigaction_safe(SIGPIPE, &ignore_sigaction, NULL);
|
2016-08-21 10:26:04 -04:00
|
|
|
// We send SIGUSR2 to the stdin_loop thread to interrupt it on FEP
|
2014-06-19 16:12:25 -04:00
|
|
|
sigaction_safe(SIGUSR2, &ignore_sigaction, NULL);
|
|
|
|
}
|
2009-05-02 05:04:19 -04:00
|
|
|
}
|
|
|
|
|
2016-08-21 10:26:04 -04:00
|
|
|
// On Unix, shared fds such as stdin cannot be set to non-blocking mode
|
|
|
|
// (http://homepages.tesco.net/J.deBoynePollard/FGA/dont-set-shared-file-descriptors-to-non-blocking-mode.html)
|
|
|
|
// so we kludge around this by spawning a thread, which waits on a control pipe
|
|
|
|
// for a signal, upon receiving this signal it reads one block of data from
|
|
|
|
// stdin and writes it to a data pipe. Upon completion, it writes a 4-byte
|
|
|
|
// integer to the size pipe, indicating how much data was written to the data
|
|
|
|
// pipe.
|
2013-05-11 22:24:31 -04:00
|
|
|
|
2016-08-21 10:26:04 -04:00
|
|
|
// The read end of the size pipe can be set to non-blocking.
|
2009-05-02 05:04:19 -04:00
|
|
|
extern "C" {
|
2013-05-11 22:24:31 -04:00
|
|
|
int stdin_read;
|
|
|
|
int stdin_write;
|
|
|
|
|
|
|
|
int control_read;
|
|
|
|
int control_write;
|
|
|
|
|
|
|
|
int size_read;
|
|
|
|
int size_write;
|
|
|
|
|
|
|
|
bool stdin_thread_initialized_p = false;
|
|
|
|
THREADHANDLE stdin_thread;
|
|
|
|
pthread_mutex_t stdin_mutex;
|
|
|
|
}
|
|
|
|
|
|
|
|
void safe_close(int fd) {
|
|
|
|
if (close(fd) < 0)
|
|
|
|
fatal_error("error closing fd", errno);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool check_write(int fd, void* data, ssize_t size) {
|
|
|
|
if (write(fd, data, size) == size)
|
|
|
|
return true;
|
2015-08-18 02:18:41 -04:00
|
|
|
if (errno == EINTR)
|
|
|
|
return check_write(fd, data, size);
|
|
|
|
return false;
|
2013-05-11 22:24:31 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
void safe_write(int fd, void* data, ssize_t size) {
|
|
|
|
if (!check_write(fd, data, size))
|
|
|
|
fatal_error("error writing fd", errno);
|
|
|
|
}
|
|
|
|
|
|
|
|
void safe_write_nonblock(int fd, void* data, ssize_t size) {
|
|
|
|
if (!check_write(fd, data, size) && errno != EAGAIN)
|
|
|
|
fatal_error("error writing fd", errno);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool safe_read(int fd, void* data, ssize_t size) {
|
|
|
|
ssize_t bytes = read(fd, data, size);
|
|
|
|
if (bytes < 0) {
|
|
|
|
if (errno == EINTR)
|
|
|
|
return safe_read(fd, data, size);
|
|
|
|
else {
|
|
|
|
fatal_error("error reading fd", errno);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
} else
|
|
|
|
return (bytes == size);
|
|
|
|
}
|
|
|
|
|
|
|
|
void* stdin_loop(void* arg) {
|
|
|
|
unsigned char buf[4096];
|
|
|
|
bool loop_running = true;
|
|
|
|
|
|
|
|
sigset_t mask;
|
|
|
|
sigfillset(&mask);
|
|
|
|
sigdelset(&mask, SIGUSR2);
|
|
|
|
sigdelset(&mask, SIGTTIN);
|
|
|
|
sigdelset(&mask, SIGTERM);
|
|
|
|
sigdelset(&mask, SIGQUIT);
|
|
|
|
pthread_sigmask(SIG_SETMASK, &mask, NULL);
|
|
|
|
|
|
|
|
int unused;
|
|
|
|
pthread_setcancelstate(PTHREAD_CANCEL_ENABLE, &unused);
|
|
|
|
pthread_setcanceltype(PTHREAD_CANCEL_ASYNCHRONOUS, &unused);
|
|
|
|
|
|
|
|
while (loop_running) {
|
|
|
|
if (!safe_read(control_read, buf, 1))
|
|
|
|
break;
|
|
|
|
|
|
|
|
if (buf[0] != 'X')
|
|
|
|
fatal_error("stdin_loop: bad data on control fd", buf[0]);
|
|
|
|
|
|
|
|
for (;;) {
|
2016-08-21 10:26:04 -04:00
|
|
|
// If we fep, the parent thread will grab stdin_mutex and send us
|
|
|
|
// SIGUSR2 to interrupt the read() call.
|
2013-05-11 22:24:31 -04:00
|
|
|
pthread_mutex_lock(&stdin_mutex);
|
|
|
|
pthread_mutex_unlock(&stdin_mutex);
|
|
|
|
ssize_t bytes = read(0, buf, sizeof(buf));
|
|
|
|
if (bytes < 0) {
|
|
|
|
if (errno == EINTR)
|
|
|
|
continue;
|
|
|
|
else {
|
|
|
|
loop_running = false;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
} else if (bytes >= 0) {
|
|
|
|
safe_write(size_write, &bytes, sizeof(bytes));
|
|
|
|
|
|
|
|
if (!check_write(stdin_write, buf, bytes))
|
|
|
|
loop_running = false;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
safe_close(stdin_write);
|
|
|
|
safe_close(control_read);
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2015-08-03 17:06:02 -04:00
|
|
|
void open_console() {
|
2013-05-11 22:24:31 -04:00
|
|
|
FACTOR_ASSERT(!stdin_thread_initialized_p);
|
|
|
|
safe_pipe(&control_read, &control_write);
|
|
|
|
safe_pipe(&size_read, &size_write);
|
|
|
|
safe_pipe(&stdin_read, &stdin_write);
|
|
|
|
stdin_thread = start_thread(stdin_loop, NULL);
|
|
|
|
stdin_thread_initialized_p = true;
|
|
|
|
pthread_mutex_init(&stdin_mutex, NULL);
|
2011-11-08 00:12:11 -05:00
|
|
|
}
|
|
|
|
|
2016-08-21 10:26:04 -04:00
|
|
|
// This method is used to kill the stdin_loop before exiting from factor.
|
|
|
|
// An Nvidia driver bug on Linux is the reason this has to be done, see:
|
|
|
|
// http://www.nvnews.net/vbulletin/showthread.php?t=164619
|
2015-08-03 17:06:02 -04:00
|
|
|
void close_console() {
|
2013-05-11 22:24:31 -04:00
|
|
|
if (stdin_thread_initialized_p) {
|
|
|
|
pthread_cancel(stdin_thread);
|
|
|
|
pthread_join(stdin_thread, 0);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-08-03 17:06:02 -04:00
|
|
|
void lock_console() {
|
2013-05-11 22:24:31 -04:00
|
|
|
FACTOR_ASSERT(stdin_thread_initialized_p);
|
2016-08-21 10:26:04 -04:00
|
|
|
// Lock the stdin_mutex and send the stdin_loop thread a signal to interrupt
|
|
|
|
// any read() it has in progress. When the stdin loop iterates again, it will
|
|
|
|
// try to lock the same mutex and wait until unlock_console() is called.
|
2013-05-11 22:24:31 -04:00
|
|
|
pthread_mutex_lock(&stdin_mutex);
|
|
|
|
pthread_kill(stdin_thread, SIGUSR2);
|
|
|
|
}
|
|
|
|
|
2015-08-03 17:06:02 -04:00
|
|
|
void unlock_console() {
|
2013-05-11 22:24:31 -04:00
|
|
|
FACTOR_ASSERT(stdin_thread_initialized_p);
|
|
|
|
pthread_mutex_unlock(&stdin_mutex);
|
|
|
|
}
|
|
|
|
|
2015-08-03 17:06:02 -04:00
|
|
|
void ignore_ctrl_c() {
|
2013-05-11 22:24:31 -04:00
|
|
|
sig_t ret;
|
|
|
|
do {
|
|
|
|
ret = signal(SIGINT, SIG_DFL);
|
|
|
|
} while (ret == SIG_ERR && errno == EINTR);
|
|
|
|
}
|
|
|
|
|
2015-08-03 17:06:02 -04:00
|
|
|
void handle_ctrl_c() {
|
2013-05-11 22:24:31 -04:00
|
|
|
struct sigaction fep_sigaction;
|
|
|
|
init_sigaction_with_handler(&fep_sigaction, fep_signal_handler);
|
|
|
|
sigaction_safe(SIGINT, &fep_sigaction, NULL);
|
|
|
|
}
|
|
|
|
|
2016-06-15 09:19:52 -04:00
|
|
|
void factor_vm::primitive_disable_ctrl_break() {
|
|
|
|
stop_on_ctrl_break = false;
|
|
|
|
}
|
|
|
|
|
|
|
|
void factor_vm::primitive_enable_ctrl_break() {
|
|
|
|
stop_on_ctrl_break = true;
|
|
|
|
}
|
|
|
|
|
2013-05-11 22:24:31 -04:00
|
|
|
void abort() {
|
|
|
|
sig_t ret;
|
|
|
|
do {
|
|
|
|
ret = signal(SIGABRT, SIG_DFL);
|
|
|
|
} while (ret == SIG_ERR && errno == EINTR);
|
|
|
|
|
2015-08-03 17:06:02 -04:00
|
|
|
close_console();
|
2013-05-11 22:24:31 -04:00
|
|
|
::abort();
|
2011-11-11 16:29:46 -05:00
|
|
|
}
|
|
|
|
|
2009-05-04 02:46:13 -04:00
|
|
|
}
|