Commit | Line | Data |
---|---|---|
aab9d46c | 1 | /* Copyright (C) 2001, 2009, 2010, 2011, 2012, 2013 Free Software Foundation, Inc. |
a98cef7e | 2 | * |
560b9c25 | 3 | * This library is free software; you can redistribute it and/or |
53befeb7 NJ |
4 | * modify it under the terms of the GNU Lesser General Public License |
5 | * as published by the Free Software Foundation; either version 3 of | |
6 | * the License, or (at your option) any later version. | |
a98cef7e | 7 | * |
53befeb7 NJ |
8 | * This library is distributed in the hope that it will be useful, but |
9 | * WITHOUT ANY WARRANTY; without even the implied warranty of | |
560b9c25 AW |
10 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
11 | * Lesser General Public License for more details. | |
a98cef7e | 12 | * |
560b9c25 AW |
13 | * You should have received a copy of the GNU Lesser General Public |
14 | * License along with this library; if not, write to the Free Software | |
53befeb7 NJ |
15 | * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA |
16 | * 02110-1301 USA | |
560b9c25 | 17 | */ |
a98cef7e | 18 | |
13c47753 AW |
19 | #if HAVE_CONFIG_H |
20 | # include <config.h> | |
21 | #endif | |
22 | ||
da8b4747 | 23 | #include <stdlib.h> |
6d14383e | 24 | #include <alloca.h> |
daccfef4 | 25 | #include <alignof.h> |
17e90c5e | 26 | #include <string.h> |
e78d4bf9 | 27 | #include <stdint.h> |
e3eb628d | 28 | |
1c44468d | 29 | #include "libguile/bdw-gc.h" |
e3eb628d LC |
30 | #include <gc/gc_mark.h> |
31 | ||
560b9c25 | 32 | #include "_scm.h" |
adaf86ec | 33 | #include "control.h" |
ac99cb0c | 34 | #include "frames.h" |
17e90c5e | 35 | #include "instructions.h" |
8f5cfc81 | 36 | #include "objcodes.h" |
ac99cb0c | 37 | #include "programs.h" |
a98cef7e KN |
38 | #include "vm.h" |
39 | ||
aab9d46c SIT |
40 | #include "private-gc.h" /* scm_getenv_int */ |
41 | ||
97b18a66 | 42 | static int vm_default_engine = SCM_VM_REGULAR_ENGINE; |
ea9f4f4b AW |
43 | |
44 | /* Unfortunately we can't snarf these: snarfed things are only loaded up from | |
45 | (system vm vm), which might not be loaded before an error happens. */ | |
46 | static SCM sym_vm_run; | |
47 | static SCM sym_vm_error; | |
48 | static SCM sym_keyword_argument_error; | |
49 | static SCM sym_regular; | |
50 | static SCM sym_debug; | |
a98cef7e | 51 | |
11ea1aba AW |
52 | /* The VM has a number of internal assertions that shouldn't normally be |
53 | necessary, but might be if you think you found a bug in the VM. */ | |
54 | #define VM_ENABLE_ASSERTIONS | |
55 | ||
56 | /* We can add a mode that ensures that all stack items above the stack pointer | |
57 | are NULL. This is useful for checking the internal consistency of the VM's | |
58 | assumptions and its operators, but isn't necessary for normal operation. It | |
616167fc | 59 | will ensure that assertions are enabled. Slows down the VM by about 30%. */ |
747a1635 | 60 | /* NB! If you enable this, search for NULLING in throw.c */ |
616167fc | 61 | /* #define VM_ENABLE_STACK_NULLING */ |
11ea1aba | 62 | |
53e28ed9 AW |
63 | /* #define VM_ENABLE_PARANOID_ASSERTIONS */ |
64 | ||
11ea1aba AW |
65 | #if defined (VM_ENABLE_STACK_NULLING) && !defined (VM_ENABLE_ASSERTIONS) |
66 | #define VM_ENABLE_ASSERTIONS | |
67 | #endif | |
68 | ||
e3eb628d LC |
69 | /* When defined, arrange so that the GC doesn't scan the VM stack beyond its |
70 | current SP. This should help avoid excess data retention. See | |
71 | http://thread.gmane.org/gmane.comp.programming.garbage-collection.boehmgc/3001 | |
72 | for a discussion. */ | |
73 | #define VM_ENABLE_PRECISE_STACK_GC_SCAN | |
74 | ||
f1046e6b LC |
75 | /* Size in SCM objects of the stack reserve. The reserve is used to run |
76 | exception handling code in case of a VM stack overflow. */ | |
77 | #define VM_STACK_RESERVE_SIZE 512 | |
78 | ||
e3eb628d | 79 | |
a98cef7e | 80 | \f |
a98cef7e KN |
81 | /* |
82 | * VM Continuation | |
83 | */ | |
84 | ||
6f3b0cc2 AW |
85 | void |
86 | scm_i_vm_cont_print (SCM x, SCM port, scm_print_state *pstate) | |
87 | { | |
0607ebbf | 88 | scm_puts_unlocked ("#<vm-continuation ", port); |
6f3b0cc2 | 89 | scm_uintprint (SCM_UNPACK (x), 16, port); |
0607ebbf | 90 | scm_puts_unlocked (">", port); |
6f3b0cc2 | 91 | } |
17e90c5e | 92 | |
d8873dfe AW |
93 | /* In theory, a number of vm instances can be active in the call trace, and we |
94 | only want to reify the continuations of those in the current continuation | |
95 | root. I don't see a nice way to do this -- ideally it would involve dynwinds, | |
96 | and previous values of the *the-vm* fluid within the current continuation | |
97 | root. But we don't have access to continuation roots in the dynwind stack. | |
98 | So, just punt for now, we just capture the continuation for the current VM. | |
99 | ||
100 | While I'm on the topic, ideally we could avoid copying the C stack if the | |
101 | continuation root is inside VM code, and call/cc was invoked within that same | |
102 | call to vm_run; but that's currently not implemented. | |
103 | */ | |
cee1d22c AW |
104 | SCM |
105 | scm_i_vm_capture_stack (SCM *stack_base, SCM *fp, SCM *sp, scm_t_uint8 *ra, | |
9ede013f AW |
106 | scm_t_uint8 *mvra, scm_t_dynstack *dynstack, |
107 | scm_t_uint32 flags) | |
a98cef7e | 108 | { |
d8873dfe AW |
109 | struct scm_vm_cont *p; |
110 | ||
111 | p = scm_gc_malloc (sizeof (*p), "capture_vm_cont"); | |
112 | p->stack_size = sp - stack_base + 1; | |
d8eeb67c LC |
113 | p->stack_base = scm_gc_malloc (p->stack_size * sizeof (SCM), |
114 | "capture_vm_cont"); | |
d8873dfe AW |
115 | #if defined(VM_ENABLE_STACK_NULLING) && 0 |
116 | /* Tail continuations leave their frame on the stack for subsequent | |
117 | application, but don't capture the frame -- so there are some elements on | |
118 | the stack then, and this check doesn't work, so disable it for now. */ | |
119 | if (sp >= vp->stack_base) | |
66db076a AW |
120 | if (!vp->sp[0] || vp->sp[1]) |
121 | abort (); | |
11ea1aba AW |
122 | memset (p->stack_base, 0, p->stack_size * sizeof (SCM)); |
123 | #endif | |
d8873dfe AW |
124 | p->ra = ra; |
125 | p->mvra = mvra; | |
126 | p->sp = sp; | |
127 | p->fp = fp; | |
128 | memcpy (p->stack_base, stack_base, (sp + 1 - stack_base) * sizeof (SCM)); | |
129 | p->reloc = p->stack_base - stack_base; | |
9ede013f | 130 | p->dynstack = dynstack; |
cee1d22c | 131 | p->flags = flags; |
6f3b0cc2 | 132 | return scm_cell (scm_tc7_vm_cont, (scm_t_bits)p); |
a98cef7e KN |
133 | } |
134 | ||
135 | static void | |
d8873dfe | 136 | vm_return_to_continuation (SCM vm, SCM cont, size_t n, SCM *argv) |
a98cef7e | 137 | { |
d8873dfe AW |
138 | struct scm_vm *vp; |
139 | struct scm_vm_cont *cp; | |
140 | SCM *argv_copy; | |
141 | ||
142 | argv_copy = alloca (n * sizeof(SCM)); | |
143 | memcpy (argv_copy, argv, n * sizeof(SCM)); | |
144 | ||
145 | vp = SCM_VM_DATA (vm); | |
146 | cp = SCM_VM_CONT_DATA (cont); | |
147 | ||
148 | if (n == 0 && !cp->mvra) | |
149 | scm_misc_error (NULL, "Too few values returned to continuation", | |
150 | SCM_EOL); | |
151 | ||
152 | if (vp->stack_size < cp->stack_size + n + 1) | |
29366989 AW |
153 | scm_misc_error ("vm-engine", "not enough space to reinstate continuation", |
154 | scm_list_2 (vm, cont)); | |
155 | ||
11ea1aba AW |
156 | #ifdef VM_ENABLE_STACK_NULLING |
157 | { | |
d8873dfe | 158 | scm_t_ptrdiff nzero = (vp->sp - cp->sp); |
11ea1aba | 159 | if (nzero > 0) |
d8873dfe | 160 | memset (vp->stack_base + cp->stack_size, 0, nzero * sizeof (SCM)); |
66db076a AW |
161 | /* actually nzero should always be negative, because vm_reset_stack will |
162 | unwind the stack to some point *below* this continuation */ | |
11ea1aba AW |
163 | } |
164 | #endif | |
d8873dfe AW |
165 | vp->sp = cp->sp; |
166 | vp->fp = cp->fp; | |
167 | memcpy (vp->stack_base, cp->stack_base, cp->stack_size * sizeof (SCM)); | |
bfffd258 | 168 | |
d8873dfe AW |
169 | if (n == 1 || !cp->mvra) |
170 | { | |
171 | vp->ip = cp->ra; | |
172 | vp->sp++; | |
173 | *vp->sp = argv_copy[0]; | |
174 | } | |
175 | else | |
176 | { | |
177 | size_t i; | |
178 | for (i = 0; i < n; i++) | |
179 | { | |
180 | vp->sp++; | |
181 | *vp->sp = argv_copy[i]; | |
182 | } | |
183 | vp->sp++; | |
184 | *vp->sp = scm_from_size_t (n); | |
185 | vp->ip = cp->mvra; | |
186 | } | |
187 | } | |
bfffd258 | 188 | |
bfffd258 | 189 | SCM |
9ede013f | 190 | scm_i_capture_current_stack (void) |
bfffd258 | 191 | { |
9ede013f AW |
192 | scm_i_thread *thread; |
193 | SCM vm; | |
194 | struct scm_vm *vp; | |
195 | ||
196 | thread = SCM_I_CURRENT_THREAD; | |
197 | vm = scm_the_vm (); | |
198 | vp = SCM_VM_DATA (vm); | |
199 | ||
200 | return scm_i_vm_capture_stack (vp->stack_base, vp->fp, vp->sp, vp->ip, NULL, | |
201 | scm_dynstack_capture_all (&thread->dynstack), | |
202 | 0); | |
a98cef7e KN |
203 | } |
204 | ||
c850a0ff AW |
205 | static void vm_dispatch_hook (SCM vm, int hook_num, |
206 | SCM *argv, int n) SCM_NOINLINE; | |
207 | ||
b1b942b7 | 208 | static void |
c850a0ff | 209 | vm_dispatch_hook (SCM vm, int hook_num, SCM *argv, int n) |
b1b942b7 | 210 | { |
7656f194 AW |
211 | struct scm_vm *vp; |
212 | SCM hook; | |
b3567435 | 213 | struct scm_frame c_frame; |
8e4c60ff | 214 | scm_t_cell *frame; |
893fb8d0 | 215 | int saved_trace_level; |
b1b942b7 | 216 | |
7656f194 AW |
217 | vp = SCM_VM_DATA (vm); |
218 | hook = vp->hooks[hook_num]; | |
b1b942b7 | 219 | |
7656f194 AW |
220 | if (SCM_LIKELY (scm_is_false (hook)) |
221 | || scm_is_null (SCM_HOOK_PROCEDURES (hook))) | |
222 | return; | |
b3567435 | 223 | |
893fb8d0 AW |
224 | saved_trace_level = vp->trace_level; |
225 | vp->trace_level = 0; | |
b3567435 LC |
226 | |
227 | /* Allocate a frame object on the stack. This is more efficient than calling | |
228 | `scm_c_make_frame ()' to allocate on the heap, but it forces hooks to not | |
229 | capture frame objects. | |
230 | ||
231 | At the same time, procedures such as `frame-procedure' make sense only | |
232 | while the stack frame represented by the frame object is visible, so it | |
233 | seems reasonable to limit the lifetime of frame objects. */ | |
234 | ||
235 | c_frame.stack_holder = vm; | |
236 | c_frame.fp = vp->fp; | |
237 | c_frame.sp = vp->sp; | |
238 | c_frame.ip = vp->ip; | |
239 | c_frame.offset = 0; | |
8e4c60ff LC |
240 | |
241 | /* Arrange for FRAME to be 8-byte aligned, like any other cell. */ | |
242 | frame = alloca (sizeof (*frame) + 8); | |
243 | frame = (scm_t_cell *) ROUND_UP ((scm_t_uintptr) frame, 8UL); | |
244 | ||
245 | frame->word_0 = SCM_PACK (scm_tc7_frame); | |
21041372 | 246 | frame->word_1 = SCM_PACK_POINTER (&c_frame); |
b3567435 | 247 | |
c850a0ff AW |
248 | if (n == 0) |
249 | { | |
250 | SCM args[1]; | |
251 | ||
252 | args[0] = SCM_PACK_POINTER (frame); | |
253 | scm_c_run_hookn (hook, args, 1); | |
254 | } | |
255 | else if (n == 1) | |
256 | { | |
257 | SCM args[2]; | |
258 | ||
259 | args[0] = SCM_PACK_POINTER (frame); | |
260 | args[1] = argv[0]; | |
261 | scm_c_run_hookn (hook, args, 2); | |
262 | } | |
263 | else | |
264 | { | |
265 | SCM args = SCM_EOL; | |
266 | ||
267 | while (n--) | |
268 | args = scm_cons (argv[n], args); | |
269 | scm_c_run_hook (hook, scm_cons (SCM_PACK_POINTER (frame), args)); | |
270 | } | |
b3567435 | 271 | |
893fb8d0 | 272 | vp->trace_level = saved_trace_level; |
b1b942b7 AW |
273 | } |
274 | ||
4f66bcde | 275 | static void |
9d381ba4 AW |
276 | vm_abort (SCM vm, size_t n, scm_i_jmp_buf *current_registers) SCM_NORETURN; |
277 | ||
278 | static void | |
279 | vm_abort (SCM vm, size_t n, scm_i_jmp_buf *current_registers) | |
4f66bcde | 280 | { |
eaefabee | 281 | size_t i; |
2d026f04 AW |
282 | ssize_t tail_len; |
283 | SCM tag, tail, *argv; | |
eaefabee | 284 | |
2d026f04 AW |
285 | /* FIXME: VM_ENABLE_STACK_NULLING */ |
286 | tail = *(SCM_VM_DATA (vm)->sp--); | |
287 | /* NULLSTACK (1) */ | |
288 | tail_len = scm_ilength (tail); | |
289 | if (tail_len < 0) | |
29366989 AW |
290 | scm_misc_error ("vm-engine", "tail values to abort should be a list", |
291 | scm_list_1 (tail)); | |
292 | ||
eaefabee | 293 | tag = SCM_VM_DATA (vm)->sp[-n]; |
2d026f04 | 294 | argv = alloca ((n + tail_len) * sizeof (SCM)); |
eaefabee AW |
295 | for (i = 0; i < n; i++) |
296 | argv[i] = SCM_VM_DATA (vm)->sp[-(n-1-i)]; | |
2d026f04 AW |
297 | for (; i < n + tail_len; i++, tail = scm_cdr (tail)) |
298 | argv[i] = scm_car (tail); | |
299 | /* NULLSTACK (n + 1) */ | |
eaefabee AW |
300 | SCM_VM_DATA (vm)->sp -= n + 1; |
301 | ||
9d381ba4 | 302 | scm_c_abort (vm, tag, n + tail_len, argv, current_registers); |
cee1d22c AW |
303 | } |
304 | ||
9d381ba4 AW |
305 | static void |
306 | vm_reinstate_partial_continuation (SCM vm, SCM cont, size_t n, SCM *argv, | |
307 | scm_t_dynstack *dynstack, | |
308 | scm_i_jmp_buf *registers) | |
cee1d22c | 309 | { |
07801437 AW |
310 | struct scm_vm *vp; |
311 | struct scm_vm_cont *cp; | |
312 | SCM *argv_copy, *base; | |
9ede013f | 313 | scm_t_ptrdiff reloc; |
07801437 AW |
314 | size_t i; |
315 | ||
316 | argv_copy = alloca (n * sizeof(SCM)); | |
317 | memcpy (argv_copy, argv, n * sizeof(SCM)); | |
318 | ||
319 | vp = SCM_VM_DATA (vm); | |
320 | cp = SCM_VM_CONT_DATA (cont); | |
321 | base = SCM_FRAME_UPPER_ADDRESS (vp->fp) + 1; | |
9ede013f | 322 | reloc = cp->reloc + (base - cp->stack_base); |
07801437 | 323 | |
0fc9040f | 324 | #define RELOC(scm_p) \ |
9ede013f | 325 | (((SCM *) (scm_p)) + reloc) |
07801437 AW |
326 | |
327 | if ((base - vp->stack_base) + cp->stack_size + n + 1 > vp->stack_size) | |
29366989 AW |
328 | scm_misc_error ("vm-engine", |
329 | "not enough space to instate partial continuation", | |
330 | scm_list_2 (vm, cont)); | |
07801437 AW |
331 | |
332 | memcpy (base, cp->stack_base, cp->stack_size * sizeof (SCM)); | |
333 | ||
334 | /* now relocate frame pointers */ | |
335 | { | |
336 | SCM *fp; | |
337 | for (fp = RELOC (cp->fp); | |
338 | SCM_FRAME_LOWER_ADDRESS (fp) > base; | |
339 | fp = SCM_FRAME_DYNAMIC_LINK (fp)) | |
340 | SCM_FRAME_SET_DYNAMIC_LINK (fp, RELOC (SCM_FRAME_DYNAMIC_LINK (fp))); | |
341 | } | |
342 | ||
343 | vp->sp = base - 1 + cp->stack_size; | |
344 | vp->fp = RELOC (cp->fp); | |
345 | vp->ip = cp->mvra; | |
346 | ||
07801437 AW |
347 | /* now push args. ip is in a MV context. */ |
348 | for (i = 0; i < n; i++) | |
349 | { | |
350 | vp->sp++; | |
351 | *vp->sp = argv_copy[i]; | |
352 | } | |
353 | vp->sp++; | |
354 | *vp->sp = scm_from_size_t (n); | |
9a1c6f1f | 355 | |
9d381ba4 AW |
356 | /* The prompt captured a slice of the dynamic stack. Here we wind |
357 | those entries onto the current thread's stack. We also have to | |
358 | relocate any prompts that we see along the way. */ | |
359 | { | |
360 | scm_t_bits *walk; | |
361 | ||
362 | for (walk = SCM_DYNSTACK_FIRST (cp->dynstack); | |
363 | SCM_DYNSTACK_TAG (walk); | |
364 | walk = SCM_DYNSTACK_NEXT (walk)) | |
365 | { | |
366 | scm_t_bits tag = SCM_DYNSTACK_TAG (walk); | |
367 | ||
368 | if (SCM_DYNSTACK_TAG_TYPE (tag) == SCM_DYNSTACK_TYPE_PROMPT) | |
369 | scm_dynstack_wind_prompt (dynstack, walk, reloc, registers); | |
370 | else | |
371 | scm_dynstack_wind_1 (dynstack, walk); | |
372 | } | |
373 | } | |
adbdfd6d | 374 | #undef RELOC |
4f66bcde AW |
375 | } |
376 | ||
377 | \f | |
17e90c5e KN |
378 | /* |
379 | * VM Internal functions | |
380 | */ | |
381 | ||
6f3b0cc2 AW |
382 | void |
383 | scm_i_vm_print (SCM x, SCM port, scm_print_state *pstate) | |
384 | { | |
0a935b2a LC |
385 | const struct scm_vm *vm; |
386 | ||
387 | vm = SCM_VM_DATA (x); | |
388 | ||
0607ebbf | 389 | scm_puts_unlocked ("#<vm ", port); |
0a935b2a LC |
390 | switch (vm->engine) |
391 | { | |
392 | case SCM_VM_REGULAR_ENGINE: | |
0607ebbf | 393 | scm_puts_unlocked ("regular-engine ", port); |
0a935b2a LC |
394 | break; |
395 | ||
396 | case SCM_VM_DEBUG_ENGINE: | |
0607ebbf | 397 | scm_puts_unlocked ("debug-engine ", port); |
0a935b2a LC |
398 | break; |
399 | ||
400 | default: | |
0607ebbf | 401 | scm_puts_unlocked ("unknown-engine ", port); |
0a935b2a | 402 | } |
6f3b0cc2 | 403 | scm_uintprint (SCM_UNPACK (x), 16, port); |
0607ebbf | 404 | scm_puts_unlocked (">", port); |
6f3b0cc2 AW |
405 | } |
406 | ||
53bdfcf0 AW |
407 | \f |
408 | /* | |
409 | * VM Error Handling | |
410 | */ | |
411 | ||
412 | static void vm_error (const char *msg, SCM arg) SCM_NORETURN; | |
4d497b62 AW |
413 | static void vm_error_bad_instruction (scm_t_uint32 inst) SCM_NORETURN SCM_NOINLINE; |
414 | static void vm_error_unbound (SCM proc, SCM sym) SCM_NORETURN SCM_NOINLINE; | |
415 | static void vm_error_unbound_fluid (SCM proc, SCM fluid) SCM_NORETURN SCM_NOINLINE; | |
416 | static void vm_error_not_a_variable (const char *func_name, SCM x) SCM_NORETURN SCM_NOINLINE; | |
417 | static void vm_error_apply_to_non_list (SCM x) SCM_NORETURN SCM_NOINLINE; | |
418 | static void vm_error_kwargs_length_not_even (SCM proc) SCM_NORETURN SCM_NOINLINE; | |
419 | static void vm_error_kwargs_invalid_keyword (SCM proc) SCM_NORETURN SCM_NOINLINE; | |
420 | static void vm_error_kwargs_unrecognized_keyword (SCM proc) SCM_NORETURN SCM_NOINLINE; | |
421 | static void vm_error_too_many_args (int nargs) SCM_NORETURN SCM_NOINLINE; | |
422 | static void vm_error_wrong_num_args (SCM proc) SCM_NORETURN SCM_NOINLINE; | |
423 | static void vm_error_wrong_type_apply (SCM proc) SCM_NORETURN SCM_NOINLINE; | |
424 | static void vm_error_stack_overflow (struct scm_vm *vp) SCM_NORETURN SCM_NOINLINE; | |
425 | static void vm_error_stack_underflow (void) SCM_NORETURN SCM_NOINLINE; | |
426 | static void vm_error_improper_list (SCM x) SCM_NORETURN SCM_NOINLINE; | |
427 | static void vm_error_not_a_pair (const char *subr, SCM x) SCM_NORETURN SCM_NOINLINE; | |
428 | static void vm_error_not_a_bytevector (const char *subr, SCM x) SCM_NORETURN SCM_NOINLINE; | |
429 | static void vm_error_not_a_struct (const char *subr, SCM x) SCM_NORETURN SCM_NOINLINE; | |
430 | static void vm_error_no_values (void) SCM_NORETURN SCM_NOINLINE; | |
431 | static void vm_error_not_enough_values (void) SCM_NORETURN SCM_NOINLINE; | |
432 | static void vm_error_continuation_not_rewindable (SCM cont) SCM_NORETURN SCM_NOINLINE; | |
433 | static void vm_error_bad_wide_string_length (size_t len) SCM_NORETURN SCM_NOINLINE; | |
53bdfcf0 AW |
434 | |
435 | static void | |
436 | vm_error (const char *msg, SCM arg) | |
437 | { | |
438 | scm_throw (sym_vm_error, | |
439 | scm_list_3 (sym_vm_run, scm_from_latin1_string (msg), | |
440 | SCM_UNBNDP (arg) ? SCM_EOL : scm_list_1 (arg))); | |
441 | abort(); /* not reached */ | |
442 | } | |
443 | ||
444 | static void | |
445 | vm_error_bad_instruction (scm_t_uint32 inst) | |
446 | { | |
447 | vm_error ("VM: Bad instruction: ~s", scm_from_uint32 (inst)); | |
448 | } | |
449 | ||
450 | static void | |
451 | vm_error_unbound (SCM proc, SCM sym) | |
452 | { | |
453 | scm_error_scm (scm_misc_error_key, proc, | |
454 | scm_from_latin1_string ("Unbound variable: ~s"), | |
455 | scm_list_1 (sym), SCM_BOOL_F); | |
456 | } | |
457 | ||
458 | static void | |
459 | vm_error_unbound_fluid (SCM proc, SCM fluid) | |
460 | { | |
461 | scm_error_scm (scm_misc_error_key, proc, | |
462 | scm_from_latin1_string ("Unbound fluid: ~s"), | |
463 | scm_list_1 (fluid), SCM_BOOL_F); | |
464 | } | |
465 | ||
466 | static void | |
467 | vm_error_not_a_variable (const char *func_name, SCM x) | |
468 | { | |
469 | scm_error (scm_arg_type_key, func_name, "Not a variable: ~S", | |
470 | scm_list_1 (x), scm_list_1 (x)); | |
471 | } | |
472 | ||
53bdfcf0 AW |
473 | static void |
474 | vm_error_apply_to_non_list (SCM x) | |
475 | { | |
476 | scm_error (scm_arg_type_key, "apply", "Apply to non-list: ~S", | |
477 | scm_list_1 (x), scm_list_1 (x)); | |
478 | } | |
479 | ||
480 | static void | |
481 | vm_error_kwargs_length_not_even (SCM proc) | |
482 | { | |
483 | scm_error_scm (sym_keyword_argument_error, proc, | |
484 | scm_from_latin1_string ("Odd length of keyword argument list"), | |
485 | SCM_EOL, SCM_BOOL_F); | |
486 | } | |
487 | ||
488 | static void | |
489 | vm_error_kwargs_invalid_keyword (SCM proc) | |
490 | { | |
491 | scm_error_scm (sym_keyword_argument_error, proc, | |
492 | scm_from_latin1_string ("Invalid keyword"), | |
493 | SCM_EOL, SCM_BOOL_F); | |
494 | } | |
495 | ||
496 | static void | |
497 | vm_error_kwargs_unrecognized_keyword (SCM proc) | |
498 | { | |
499 | scm_error_scm (sym_keyword_argument_error, proc, | |
500 | scm_from_latin1_string ("Unrecognized keyword"), | |
501 | SCM_EOL, SCM_BOOL_F); | |
502 | } | |
503 | ||
504 | static void | |
505 | vm_error_too_many_args (int nargs) | |
506 | { | |
507 | vm_error ("VM: Too many arguments", scm_from_int (nargs)); | |
508 | } | |
509 | ||
510 | static void | |
511 | vm_error_wrong_num_args (SCM proc) | |
512 | { | |
513 | scm_wrong_num_args (proc); | |
514 | } | |
515 | ||
516 | static void | |
517 | vm_error_wrong_type_apply (SCM proc) | |
518 | { | |
519 | scm_error (scm_arg_type_key, NULL, "Wrong type to apply: ~S", | |
520 | scm_list_1 (proc), scm_list_1 (proc)); | |
521 | } | |
522 | ||
523 | static void | |
524 | vm_error_stack_overflow (struct scm_vm *vp) | |
525 | { | |
526 | if (vp->stack_limit < vp->stack_base + vp->stack_size) | |
527 | /* There are VM_STACK_RESERVE_SIZE bytes left. Make them available so | |
528 | that `throw' below can run on this VM. */ | |
529 | vp->stack_limit = vp->stack_base + vp->stack_size; | |
530 | else | |
531 | /* There is no space left on the stack. FIXME: Do something more | |
532 | sensible here! */ | |
533 | abort (); | |
534 | vm_error ("VM: Stack overflow", SCM_UNDEFINED); | |
535 | } | |
536 | ||
537 | static void | |
538 | vm_error_stack_underflow (void) | |
539 | { | |
540 | vm_error ("VM: Stack underflow", SCM_UNDEFINED); | |
541 | } | |
542 | ||
543 | static void | |
544 | vm_error_improper_list (SCM x) | |
545 | { | |
546 | vm_error ("Expected a proper list, but got object with tail ~s", x); | |
547 | } | |
548 | ||
549 | static void | |
550 | vm_error_not_a_pair (const char *subr, SCM x) | |
551 | { | |
552 | scm_wrong_type_arg_msg (subr, 1, x, "pair"); | |
553 | } | |
554 | ||
555 | static void | |
556 | vm_error_not_a_bytevector (const char *subr, SCM x) | |
557 | { | |
558 | scm_wrong_type_arg_msg (subr, 1, x, "bytevector"); | |
559 | } | |
560 | ||
561 | static void | |
562 | vm_error_not_a_struct (const char *subr, SCM x) | |
563 | { | |
564 | scm_wrong_type_arg_msg (subr, 1, x, "struct"); | |
565 | } | |
566 | ||
567 | static void | |
568 | vm_error_no_values (void) | |
569 | { | |
570 | vm_error ("Zero values returned to single-valued continuation", | |
571 | SCM_UNDEFINED); | |
572 | } | |
573 | ||
574 | static void | |
575 | vm_error_not_enough_values (void) | |
576 | { | |
577 | vm_error ("Too few values returned to continuation", SCM_UNDEFINED); | |
578 | } | |
579 | ||
580 | static void | |
581 | vm_error_continuation_not_rewindable (SCM cont) | |
582 | { | |
583 | vm_error ("Unrewindable partial continuation", cont); | |
584 | } | |
585 | ||
586 | static void | |
587 | vm_error_bad_wide_string_length (size_t len) | |
588 | { | |
589 | vm_error ("VM: Bad wide string length: ~S", scm_from_size_t (len)); | |
590 | } | |
591 | ||
53bdfcf0 AW |
592 | |
593 | \f | |
28b119ee | 594 | |
67b699cc | 595 | static SCM boot_continuation; |
2fda0242 | 596 | |
a98cef7e KN |
597 | \f |
598 | /* | |
599 | * VM | |
600 | */ | |
601 | ||
b7393ea1 | 602 | static SCM |
b782ed01 | 603 | resolve_variable (SCM what, SCM module) |
b7393ea1 | 604 | { |
9bd48cb1 | 605 | if (SCM_LIKELY (scm_is_symbol (what))) |
b7393ea1 | 606 | { |
b782ed01 AW |
607 | if (scm_is_true (module)) |
608 | return scm_module_lookup (module, what); | |
b7393ea1 | 609 | else |
62e15979 | 610 | return scm_module_lookup (scm_the_root_module (), what); |
b7393ea1 AW |
611 | } |
612 | else | |
613 | { | |
b782ed01 AW |
614 | SCM modname, sym, public; |
615 | ||
616 | modname = SCM_CAR (what); | |
617 | sym = SCM_CADR (what); | |
618 | public = SCM_CADDR (what); | |
619 | ||
620 | if (scm_is_true (public)) | |
621 | return scm_public_lookup (modname, sym); | |
622 | else | |
623 | return scm_private_lookup (modname, sym); | |
b7393ea1 AW |
624 | } |
625 | } | |
626 | ||
aab9d46c | 627 | #define VM_MIN_STACK_SIZE (1024) |
51e9ba2f | 628 | #define VM_DEFAULT_STACK_SIZE (64 * 1024) |
aab9d46c SIT |
629 | static size_t vm_stack_size = VM_DEFAULT_STACK_SIZE; |
630 | ||
631 | static void | |
632 | initialize_default_stack_size (void) | |
633 | { | |
634 | int size = scm_getenv_int ("GUILE_STACK_SIZE", vm_stack_size); | |
635 | if (size >= VM_MIN_STACK_SIZE) | |
636 | vm_stack_size = size; | |
637 | } | |
17e90c5e | 638 | |
17e90c5e | 639 | #define VM_NAME vm_regular_engine |
6d14383e AW |
640 | #define FUNC_NAME "vm-regular-engine" |
641 | #define VM_ENGINE SCM_VM_REGULAR_ENGINE | |
83495480 | 642 | #include "vm-engine.c" |
17e90c5e | 643 | #undef VM_NAME |
6d14383e | 644 | #undef FUNC_NAME |
17e90c5e | 645 | #undef VM_ENGINE |
17e90c5e KN |
646 | |
647 | #define VM_NAME vm_debug_engine | |
6d14383e AW |
648 | #define FUNC_NAME "vm-debug-engine" |
649 | #define VM_ENGINE SCM_VM_DEBUG_ENGINE | |
83495480 | 650 | #include "vm-engine.c" |
17e90c5e | 651 | #undef VM_NAME |
6d14383e | 652 | #undef FUNC_NAME |
17e90c5e KN |
653 | #undef VM_ENGINE |
654 | ||
6d14383e AW |
655 | static const scm_t_vm_engine vm_engines[] = |
656 | { vm_regular_engine, vm_debug_engine }; | |
657 | ||
e3eb628d LC |
658 | #ifdef VM_ENABLE_PRECISE_STACK_GC_SCAN |
659 | ||
660 | /* The GC "kind" for the VM stack. */ | |
661 | static int vm_stack_gc_kind; | |
662 | ||
663 | #endif | |
664 | ||
a98cef7e | 665 | static SCM |
17e90c5e KN |
666 | make_vm (void) |
667 | #define FUNC_NAME "make_vm" | |
a98cef7e | 668 | { |
17e90c5e | 669 | int i; |
7f991c7d | 670 | struct scm_vm *vp; |
747a1635 | 671 | |
7f991c7d | 672 | vp = scm_gc_malloc (sizeof (struct scm_vm), "vm"); |
d8eeb67c | 673 | |
aab9d46c | 674 | vp->stack_size= vm_stack_size; |
e3eb628d LC |
675 | |
676 | #ifdef VM_ENABLE_PRECISE_STACK_GC_SCAN | |
4168aa46 TTN |
677 | vp->stack_base = (SCM *) |
678 | GC_generic_malloc (vp->stack_size * sizeof (SCM), vm_stack_gc_kind); | |
e3eb628d LC |
679 | |
680 | /* Keep a pointer to VP so that `vm_stack_mark ()' can know what the stack | |
681 | top is. */ | |
21041372 | 682 | *vp->stack_base = SCM_PACK_POINTER (vp); |
e3eb628d LC |
683 | vp->stack_base++; |
684 | vp->stack_size--; | |
685 | #else | |
d8eeb67c LC |
686 | vp->stack_base = scm_gc_malloc (vp->stack_size * sizeof (SCM), |
687 | "stack-base"); | |
e3eb628d LC |
688 | #endif |
689 | ||
2bbe1533 AW |
690 | #ifdef VM_ENABLE_STACK_NULLING |
691 | memset (vp->stack_base, 0, vp->stack_size * sizeof (SCM)); | |
692 | #endif | |
f1046e6b | 693 | vp->stack_limit = vp->stack_base + vp->stack_size - VM_STACK_RESERVE_SIZE; |
3616e9e9 KN |
694 | vp->ip = NULL; |
695 | vp->sp = vp->stack_base - 1; | |
696 | vp->fp = NULL; | |
ea9f4f4b | 697 | vp->engine = vm_default_engine; |
7656f194 | 698 | vp->trace_level = 0; |
17e90c5e | 699 | for (i = 0; i < SCM_VM_NUM_HOOKS; i++) |
3d5ee0cd | 700 | vp->hooks[i] = SCM_BOOL_F; |
6f3b0cc2 | 701 | return scm_cell (scm_tc7_vm, (scm_t_bits)vp); |
a98cef7e | 702 | } |
17e90c5e | 703 | #undef FUNC_NAME |
a98cef7e | 704 | |
e3eb628d LC |
705 | #ifdef VM_ENABLE_PRECISE_STACK_GC_SCAN |
706 | ||
707 | /* Mark the VM stack region between its base and its current top. */ | |
708 | static struct GC_ms_entry * | |
709 | vm_stack_mark (GC_word *addr, struct GC_ms_entry *mark_stack_ptr, | |
710 | struct GC_ms_entry *mark_stack_limit, GC_word env) | |
711 | { | |
712 | GC_word *word; | |
713 | const struct scm_vm *vm; | |
714 | ||
715 | /* The first word of the VM stack should contain a pointer to the | |
716 | corresponding VM. */ | |
717 | vm = * ((struct scm_vm **) addr); | |
718 | ||
8071c490 | 719 | if (vm == NULL |
f1046e6b | 720 | || (SCM *) addr != vm->stack_base - 1) |
e3eb628d LC |
721 | /* ADDR must be a pointer to a free-list element, which we must ignore |
722 | (see warning in <gc/gc_mark.h>). */ | |
723 | return mark_stack_ptr; | |
724 | ||
e3eb628d LC |
725 | for (word = (GC_word *) vm->stack_base; word <= (GC_word *) vm->sp; word++) |
726 | mark_stack_ptr = GC_MARK_AND_PUSH ((* (GC_word **) word), | |
727 | mark_stack_ptr, mark_stack_limit, | |
728 | NULL); | |
729 | ||
730 | return mark_stack_ptr; | |
731 | } | |
732 | ||
733 | #endif /* VM_ENABLE_PRECISE_STACK_GC_SCAN */ | |
734 | ||
735 | ||
6d14383e | 736 | SCM |
4abef68f | 737 | scm_c_vm_run (SCM vm, SCM program, SCM *argv, int nargs) |
6d14383e | 738 | { |
4abef68f | 739 | struct scm_vm *vp = SCM_VM_DATA (vm); |
b95d76fc | 740 | SCM_CHECK_STACK; |
7656f194 | 741 | return vm_engines[vp->engine](vm, program, argv, nargs); |
6d14383e AW |
742 | } |
743 | ||
a98cef7e KN |
744 | /* Scheme interface */ |
745 | ||
271c3d31 LC |
746 | SCM_DEFINE (scm_the_vm, "the-vm", 0, 0, 0, |
747 | (void), | |
748 | "Return the current thread's VM.") | |
749 | #define FUNC_NAME s_scm_the_vm | |
750 | { | |
ea9f4f4b AW |
751 | scm_i_thread *t = SCM_I_CURRENT_THREAD; |
752 | ||
753 | if (SCM_UNLIKELY (scm_is_false (t->vm))) | |
754 | t->vm = make_vm (); | |
755 | ||
756 | return t->vm; | |
271c3d31 | 757 | } |
499a4c07 KN |
758 | #undef FUNC_NAME |
759 | ||
760 | ||
a98cef7e KN |
761 | SCM_DEFINE (scm_vm_p, "vm?", 1, 0, 0, |
762 | (SCM obj), | |
17e90c5e | 763 | "") |
a98cef7e KN |
764 | #define FUNC_NAME s_scm_vm_p |
765 | { | |
9bd48cb1 | 766 | return scm_from_bool (SCM_VM_P (obj)); |
a98cef7e KN |
767 | } |
768 | #undef FUNC_NAME | |
769 | ||
770 | SCM_DEFINE (scm_make_vm, "make-vm", 0, 0, 0, | |
17e90c5e KN |
771 | (void), |
772 | "") | |
773 | #define FUNC_NAME s_scm_make_vm, | |
a98cef7e | 774 | { |
17e90c5e | 775 | return make_vm (); |
a98cef7e KN |
776 | } |
777 | #undef FUNC_NAME | |
778 | ||
17e90c5e | 779 | SCM_DEFINE (scm_vm_ip, "vm:ip", 1, 0, 0, |
a98cef7e | 780 | (SCM vm), |
17e90c5e KN |
781 | "") |
782 | #define FUNC_NAME s_scm_vm_ip | |
a98cef7e KN |
783 | { |
784 | SCM_VALIDATE_VM (1, vm); | |
3d27ef4b | 785 | return scm_from_unsigned_integer ((scm_t_bits) SCM_VM_DATA (vm)->ip); |
a98cef7e KN |
786 | } |
787 | #undef FUNC_NAME | |
788 | ||
789 | SCM_DEFINE (scm_vm_sp, "vm:sp", 1, 0, 0, | |
790 | (SCM vm), | |
17e90c5e | 791 | "") |
a98cef7e KN |
792 | #define FUNC_NAME s_scm_vm_sp |
793 | { | |
794 | SCM_VALIDATE_VM (1, vm); | |
3d27ef4b | 795 | return scm_from_unsigned_integer ((scm_t_bits) SCM_VM_DATA (vm)->sp); |
a98cef7e KN |
796 | } |
797 | #undef FUNC_NAME | |
798 | ||
799 | SCM_DEFINE (scm_vm_fp, "vm:fp", 1, 0, 0, | |
800 | (SCM vm), | |
17e90c5e | 801 | "") |
a98cef7e KN |
802 | #define FUNC_NAME s_scm_vm_fp |
803 | { | |
804 | SCM_VALIDATE_VM (1, vm); | |
3d27ef4b | 805 | return scm_from_unsigned_integer ((scm_t_bits) SCM_VM_DATA (vm)->fp); |
a98cef7e KN |
806 | } |
807 | #undef FUNC_NAME | |
808 | ||
17e90c5e KN |
809 | #define VM_DEFINE_HOOK(n) \ |
810 | { \ | |
3d5ee0cd | 811 | struct scm_vm *vp; \ |
17e90c5e | 812 | SCM_VALIDATE_VM (1, vm); \ |
3d5ee0cd | 813 | vp = SCM_VM_DATA (vm); \ |
8b22ed7a | 814 | if (scm_is_false (vp->hooks[n])) \ |
238e7a11 | 815 | vp->hooks[n] = scm_make_hook (SCM_I_MAKINUM (1)); \ |
3d5ee0cd | 816 | return vp->hooks[n]; \ |
17e90c5e KN |
817 | } |
818 | ||
c45d4d77 | 819 | SCM_DEFINE (scm_vm_apply_hook, "vm-apply-hook", 1, 0, 0, |
17e90c5e KN |
820 | (SCM vm), |
821 | "") | |
c45d4d77 | 822 | #define FUNC_NAME s_scm_vm_apply_hook |
a98cef7e | 823 | { |
c45d4d77 | 824 | VM_DEFINE_HOOK (SCM_VM_APPLY_HOOK); |
a98cef7e KN |
825 | } |
826 | #undef FUNC_NAME | |
827 | ||
c45d4d77 | 828 | SCM_DEFINE (scm_vm_push_continuation_hook, "vm-push-continuation-hook", 1, 0, 0, |
17e90c5e KN |
829 | (SCM vm), |
830 | "") | |
c45d4d77 | 831 | #define FUNC_NAME s_scm_vm_push_continuation_hook |
a98cef7e | 832 | { |
c45d4d77 | 833 | VM_DEFINE_HOOK (SCM_VM_PUSH_CONTINUATION_HOOK); |
a98cef7e KN |
834 | } |
835 | #undef FUNC_NAME | |
836 | ||
c45d4d77 | 837 | SCM_DEFINE (scm_vm_pop_continuation_hook, "vm-pop-continuation-hook", 1, 0, 0, |
a98cef7e | 838 | (SCM vm), |
17e90c5e | 839 | "") |
c45d4d77 | 840 | #define FUNC_NAME s_scm_vm_pop_continuation_hook |
a98cef7e | 841 | { |
c45d4d77 | 842 | VM_DEFINE_HOOK (SCM_VM_POP_CONTINUATION_HOOK); |
a98cef7e KN |
843 | } |
844 | #undef FUNC_NAME | |
845 | ||
c45d4d77 | 846 | SCM_DEFINE (scm_vm_next_hook, "vm-next-hook", 1, 0, 0, |
a98cef7e | 847 | (SCM vm), |
17e90c5e | 848 | "") |
c45d4d77 | 849 | #define FUNC_NAME s_scm_vm_next_hook |
a98cef7e | 850 | { |
c45d4d77 | 851 | VM_DEFINE_HOOK (SCM_VM_NEXT_HOOK); |
a98cef7e KN |
852 | } |
853 | #undef FUNC_NAME | |
f3120251 AW |
854 | |
855 | SCM_DEFINE (scm_vm_abort_continuation_hook, "vm-abort-continuation-hook", 1, 0, 0, | |
856 | (SCM vm), | |
857 | "") | |
858 | #define FUNC_NAME s_scm_vm_abort_continuation_hook | |
859 | { | |
860 | VM_DEFINE_HOOK (SCM_VM_ABORT_CONTINUATION_HOOK); | |
861 | } | |
862 | #undef FUNC_NAME | |
863 | ||
864 | SCM_DEFINE (scm_vm_restore_continuation_hook, "vm-restore-continuation-hook", 1, 0, 0, | |
865 | (SCM vm), | |
866 | "") | |
867 | #define FUNC_NAME s_scm_vm_restore_continuation_hook | |
868 | { | |
869 | VM_DEFINE_HOOK (SCM_VM_RESTORE_CONTINUATION_HOOK); | |
870 | } | |
871 | #undef FUNC_NAME | |
a98cef7e | 872 | |
7656f194 | 873 | SCM_DEFINE (scm_vm_trace_level, "vm-trace-level", 1, 0, 0, |
17e90c5e KN |
874 | (SCM vm), |
875 | "") | |
7656f194 | 876 | #define FUNC_NAME s_scm_vm_trace_level |
a98cef7e | 877 | { |
a98cef7e | 878 | SCM_VALIDATE_VM (1, vm); |
7656f194 AW |
879 | return scm_from_int (SCM_VM_DATA (vm)->trace_level); |
880 | } | |
881 | #undef FUNC_NAME | |
882 | ||
883 | SCM_DEFINE (scm_set_vm_trace_level_x, "set-vm-trace-level!", 2, 0, 0, | |
884 | (SCM vm, SCM level), | |
885 | "") | |
886 | #define FUNC_NAME s_scm_set_vm_trace_level_x | |
887 | { | |
888 | SCM_VALIDATE_VM (1, vm); | |
889 | SCM_VM_DATA (vm)->trace_level = scm_to_int (level); | |
890 | return SCM_UNSPECIFIED; | |
a98cef7e KN |
891 | } |
892 | #undef FUNC_NAME | |
893 | ||
894 | \f | |
ea9f4f4b AW |
895 | /* |
896 | * VM engines | |
897 | */ | |
898 | ||
899 | static int | |
900 | symbol_to_vm_engine (SCM engine, const char *FUNC_NAME) | |
901 | { | |
902 | if (scm_is_eq (engine, sym_regular)) | |
903 | return SCM_VM_REGULAR_ENGINE; | |
904 | else if (scm_is_eq (engine, sym_debug)) | |
905 | return SCM_VM_DEBUG_ENGINE; | |
906 | else | |
907 | SCM_MISC_ERROR ("Unknown VM engine: ~a", scm_list_1 (engine)); | |
908 | } | |
909 | ||
910 | static SCM | |
911 | vm_engine_to_symbol (int engine, const char *FUNC_NAME) | |
912 | { | |
913 | switch (engine) | |
914 | { | |
915 | case SCM_VM_REGULAR_ENGINE: | |
916 | return sym_regular; | |
917 | case SCM_VM_DEBUG_ENGINE: | |
918 | return sym_debug; | |
919 | default: | |
920 | /* ? */ | |
921 | SCM_MISC_ERROR ("Unknown VM engine: ~a", | |
922 | scm_list_1 (scm_from_int (engine))); | |
923 | } | |
924 | } | |
925 | ||
ea9f4f4b AW |
926 | SCM_DEFINE (scm_vm_engine, "vm-engine", 1, 0, 0, |
927 | (SCM vm), | |
928 | "") | |
929 | #define FUNC_NAME s_scm_vm_engine | |
930 | { | |
931 | SCM_VALIDATE_VM (1, vm); | |
932 | return vm_engine_to_symbol (SCM_VM_DATA (vm)->engine, FUNC_NAME); | |
933 | } | |
934 | #undef FUNC_NAME | |
935 | ||
936 | void | |
937 | scm_c_set_vm_engine_x (SCM vm, int engine) | |
938 | #define FUNC_NAME "set-vm-engine!" | |
939 | { | |
940 | SCM_VALIDATE_VM (1, vm); | |
941 | ||
ea9f4f4b AW |
942 | if (engine < 0 || engine >= SCM_VM_NUM_ENGINES) |
943 | SCM_MISC_ERROR ("Unknown VM engine: ~a", | |
944 | scm_list_1 (scm_from_int (engine))); | |
945 | ||
946 | SCM_VM_DATA (vm)->engine = engine; | |
947 | } | |
948 | #undef FUNC_NAME | |
949 | ||
950 | SCM_DEFINE (scm_set_vm_engine_x, "set-vm-engine!", 2, 0, 0, | |
951 | (SCM vm, SCM engine), | |
952 | "") | |
953 | #define FUNC_NAME s_scm_set_vm_engine_x | |
954 | { | |
955 | scm_c_set_vm_engine_x (vm, symbol_to_vm_engine (engine, FUNC_NAME)); | |
956 | return SCM_UNSPECIFIED; | |
957 | } | |
958 | #undef FUNC_NAME | |
959 | ||
960 | void | |
961 | scm_c_set_default_vm_engine_x (int engine) | |
962 | #define FUNC_NAME "set-default-vm-engine!" | |
963 | { | |
964 | if (engine < 0 || engine >= SCM_VM_NUM_ENGINES) | |
965 | SCM_MISC_ERROR ("Unknown VM engine: ~a", | |
966 | scm_list_1 (scm_from_int (engine))); | |
967 | ||
968 | vm_default_engine = engine; | |
969 | } | |
970 | #undef FUNC_NAME | |
971 | ||
972 | SCM_DEFINE (scm_set_default_vm_engine_x, "set-default-vm-engine!", 1, 0, 0, | |
973 | (SCM engine), | |
974 | "") | |
975 | #define FUNC_NAME s_scm_set_default_vm_engine_x | |
976 | { | |
977 | scm_c_set_default_vm_engine_x (symbol_to_vm_engine (engine, FUNC_NAME)); | |
978 | return SCM_UNSPECIFIED; | |
979 | } | |
980 | #undef FUNC_NAME | |
981 | ||
982 | static void reinstate_vm (SCM vm) | |
983 | { | |
984 | scm_i_thread *t = SCM_I_CURRENT_THREAD; | |
985 | t->vm = vm; | |
986 | } | |
987 | ||
988 | SCM_DEFINE (scm_call_with_vm, "call-with-vm", 2, 0, 1, | |
989 | (SCM vm, SCM proc, SCM args), | |
990 | "Apply @var{proc} to @var{args} in a dynamic extent in which\n" | |
991 | "@var{vm} is the current VM.\n\n" | |
992 | "As an implementation restriction, if @var{vm} is not the same\n" | |
993 | "as the current thread's VM, continuations captured within the\n" | |
994 | "call to @var{proc} may not be reinstated once control leaves\n" | |
995 | "@var{proc}.") | |
996 | #define FUNC_NAME s_scm_call_with_vm | |
997 | { | |
998 | SCM prev_vm, ret; | |
999 | SCM *argv; | |
1000 | int i, nargs; | |
1001 | scm_t_wind_flags flags; | |
1002 | scm_i_thread *t = SCM_I_CURRENT_THREAD; | |
1003 | ||
1004 | SCM_VALIDATE_VM (1, vm); | |
1005 | SCM_VALIDATE_PROC (2, proc); | |
1006 | ||
1007 | nargs = scm_ilength (args); | |
1008 | if (SCM_UNLIKELY (nargs < 0)) | |
1009 | scm_wrong_type_arg_msg (FUNC_NAME, 3, args, "list"); | |
1010 | ||
1011 | argv = alloca (nargs * sizeof(SCM)); | |
1012 | for (i = 0; i < nargs; i++) | |
1013 | { | |
1014 | argv[i] = SCM_CAR (args); | |
1015 | args = SCM_CDR (args); | |
1016 | } | |
1017 | ||
1018 | prev_vm = t->vm; | |
1019 | ||
1020 | /* Reentry can happen via invokation of a saved continuation, but | |
1021 | continuations only save the state of the VM that they are in at | |
1022 | capture-time, which might be different from this one. So, in the | |
1023 | case that the VMs are different, set up a non-rewindable frame to | |
1024 | prevent reinstating an incomplete continuation. */ | |
1025 | flags = scm_is_eq (prev_vm, vm) ? 0 : SCM_F_WIND_EXPLICITLY; | |
1026 | if (flags) | |
1027 | { | |
1028 | scm_dynwind_begin (0); | |
1029 | scm_dynwind_unwind_handler_with_scm (reinstate_vm, prev_vm, flags); | |
1030 | t->vm = vm; | |
1031 | } | |
1032 | ||
1033 | ret = scm_c_vm_run (vm, proc, argv, nargs); | |
1034 | ||
1035 | if (flags) | |
1036 | scm_dynwind_end (); | |
1037 | ||
1038 | return ret; | |
1039 | } | |
1040 | #undef FUNC_NAME | |
1041 | ||
1042 | \f | |
a98cef7e | 1043 | /* |
17e90c5e | 1044 | * Initialize |
a98cef7e KN |
1045 | */ |
1046 | ||
07e56b27 AW |
1047 | SCM scm_load_compiled_with_vm (SCM file) |
1048 | { | |
b8bc86bc AW |
1049 | SCM program = scm_load_thunk_from_file (file); |
1050 | ||
4abef68f | 1051 | return scm_c_vm_run (scm_the_vm (), program, NULL, 0); |
07e56b27 AW |
1052 | } |
1053 | ||
67b699cc AW |
1054 | |
1055 | static SCM | |
1056 | make_boot_program (void) | |
1057 | { | |
1058 | struct scm_objcode *bp; | |
1059 | size_t bp_size; | |
1060 | SCM u8vec, ret; | |
968a9add AW |
1061 | |
1062 | const scm_t_uint8 text[] = { | |
67b699cc AW |
1063 | scm_op_make_int8_1, |
1064 | scm_op_halt | |
1065 | }; | |
1066 | ||
1067 | bp_size = sizeof (struct scm_objcode) + sizeof (text); | |
1068 | bp = scm_gc_malloc_pointerless (bp_size, "boot-program"); | |
1069 | memcpy (SCM_C_OBJCODE_BASE (bp), text, sizeof (text)); | |
1070 | bp->len = sizeof(text); | |
1071 | bp->metalen = 0; | |
1072 | ||
968a9add | 1073 | u8vec = scm_c_take_gc_bytevector ((scm_t_int8*)bp, bp_size, SCM_BOOL_F); |
b8bc86bc | 1074 | ret = scm_make_program (scm_bytecode_to_objcode (u8vec, SCM_UNDEFINED), |
67b699cc AW |
1075 | SCM_BOOL_F, SCM_BOOL_F); |
1076 | SCM_SET_CELL_WORD_0 (ret, (SCM_CELL_WORD_0 (ret) | SCM_F_PROGRAM_IS_BOOT)); | |
1077 | ||
1078 | return ret; | |
1079 | } | |
1080 | ||
17e90c5e | 1081 | void |
07e56b27 | 1082 | scm_bootstrap_vm (void) |
17e90c5e | 1083 | { |
44602b08 AW |
1084 | scm_c_register_extension ("libguile-" SCM_EFFECTIVE_VERSION, |
1085 | "scm_init_vm", | |
60ae5ca2 AW |
1086 | (scm_t_extension_init_func)scm_init_vm, NULL); |
1087 | ||
aab9d46c SIT |
1088 | initialize_default_stack_size (); |
1089 | ||
4a655e50 AW |
1090 | sym_vm_run = scm_from_latin1_symbol ("vm-run"); |
1091 | sym_vm_error = scm_from_latin1_symbol ("vm-error"); | |
1092 | sym_keyword_argument_error = scm_from_latin1_symbol ("keyword-argument-error"); | |
1093 | sym_regular = scm_from_latin1_symbol ("regular"); | |
1094 | sym_debug = scm_from_latin1_symbol ("debug"); | |
0404c97d | 1095 | |
67b699cc AW |
1096 | boot_continuation = make_boot_program (); |
1097 | ||
e3eb628d LC |
1098 | #ifdef VM_ENABLE_PRECISE_STACK_GC_SCAN |
1099 | vm_stack_gc_kind = | |
1100 | GC_new_kind (GC_new_free_list (), | |
1101 | GC_MAKE_PROC (GC_new_proc (vm_stack_mark), 0), | |
1102 | 0, 1); | |
1103 | ||
1104 | #endif | |
07e56b27 AW |
1105 | } |
1106 | ||
1107 | void | |
1108 | scm_init_vm (void) | |
1109 | { | |
17e90c5e | 1110 | #ifndef SCM_MAGIC_SNARFER |
aeeff258 | 1111 | #include "libguile/vm.x" |
17e90c5e | 1112 | #endif |
a98cef7e | 1113 | } |
17e90c5e KN |
1114 | |
1115 | /* | |
1116 | Local Variables: | |
1117 | c-file-style: "gnu" | |
1118 | End: | |
1119 | */ |