add vm-abort-continuation-hook, vm-restore-continuation-hook
[bpt/guile.git] / libguile / vm.c
1 /* Copyright (C) 2001, 2009, 2010 Free Software Foundation, Inc.
2 *
3 * This library is free software; you can redistribute it and/or
4 * modify it under the terms of the GNU Lesser General Public License
5 * as published by the Free Software Foundation; either version 3 of
6 * the License, or (at your option) any later version.
7 *
8 * This library is distributed in the hope that it will be useful, but
9 * WITHOUT ANY WARRANTY; without even the implied warranty of
10 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
11 * Lesser General Public License for more details.
12 *
13 * You should have received a copy of the GNU Lesser General Public
14 * License along with this library; if not, write to the Free Software
15 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
16 * 02110-1301 USA
17 */
18
19 #if HAVE_CONFIG_H
20 # include <config.h>
21 #endif
22
23 #include <stdlib.h>
24 #include <alloca.h>
25 #include <alignof.h>
26 #include <string.h>
27
28 #include "libguile/bdw-gc.h"
29 #include <gc/gc_mark.h>
30
31 #include "_scm.h"
32 #include "control.h"
33 #include "frames.h"
34 #include "instructions.h"
35 #include "objcodes.h"
36 #include "programs.h"
37 #include "vm.h"
38
39 /* I sometimes use this for debugging. */
40 #define vm_puts(OBJ) \
41 { \
42 scm_display (OBJ, scm_current_error_port ()); \
43 scm_newline (scm_current_error_port ()); \
44 }
45
46 /* The VM has a number of internal assertions that shouldn't normally be
47 necessary, but might be if you think you found a bug in the VM. */
48 #define VM_ENABLE_ASSERTIONS
49
50 /* We can add a mode that ensures that all stack items above the stack pointer
51 are NULL. This is useful for checking the internal consistency of the VM's
52 assumptions and its operators, but isn't necessary for normal operation. It
53 will ensure that assertions are enabled. Slows down the VM by about 30%. */
54 /* NB! If you enable this, search for NULLING in throw.c */
55 /* #define VM_ENABLE_STACK_NULLING */
56
57 /* #define VM_ENABLE_PARANOID_ASSERTIONS */
58
59 #if defined (VM_ENABLE_STACK_NULLING) && !defined (VM_ENABLE_ASSERTIONS)
60 #define VM_ENABLE_ASSERTIONS
61 #endif
62
63 /* When defined, arrange so that the GC doesn't scan the VM stack beyond its
64 current SP. This should help avoid excess data retention. See
65 http://thread.gmane.org/gmane.comp.programming.garbage-collection.boehmgc/3001
66 for a discussion. */
67 #define VM_ENABLE_PRECISE_STACK_GC_SCAN
68
69 /* Size in SCM objects of the stack reserve. The reserve is used to run
70 exception handling code in case of a VM stack overflow. */
71 #define VM_STACK_RESERVE_SIZE 512
72
73
74 \f
75 /*
76 * VM Continuation
77 */
78
79 void
80 scm_i_vm_cont_print (SCM x, SCM port, scm_print_state *pstate)
81 {
82 scm_puts ("#<vm-continuation ", port);
83 scm_uintprint (SCM_UNPACK (x), 16, port);
84 scm_puts (">", port);
85 }
86
87 /* In theory, a number of vm instances can be active in the call trace, and we
88 only want to reify the continuations of those in the current continuation
89 root. I don't see a nice way to do this -- ideally it would involve dynwinds,
90 and previous values of the *the-vm* fluid within the current continuation
91 root. But we don't have access to continuation roots in the dynwind stack.
92 So, just punt for now, we just capture the continuation for the current VM.
93
94 While I'm on the topic, ideally we could avoid copying the C stack if the
95 continuation root is inside VM code, and call/cc was invoked within that same
96 call to vm_run; but that's currently not implemented.
97 */
98 SCM
99 scm_i_vm_capture_stack (SCM *stack_base, SCM *fp, SCM *sp, scm_t_uint8 *ra,
100 scm_t_uint8 *mvra, scm_t_uint32 flags)
101 {
102 struct scm_vm_cont *p;
103
104 p = scm_gc_malloc (sizeof (*p), "capture_vm_cont");
105 p->stack_size = sp - stack_base + 1;
106 p->stack_base = scm_gc_malloc (p->stack_size * sizeof (SCM),
107 "capture_vm_cont");
108 #if defined(VM_ENABLE_STACK_NULLING) && 0
109 /* Tail continuations leave their frame on the stack for subsequent
110 application, but don't capture the frame -- so there are some elements on
111 the stack then, and this check doesn't work, so disable it for now. */
112 if (sp >= vp->stack_base)
113 if (!vp->sp[0] || vp->sp[1])
114 abort ();
115 memset (p->stack_base, 0, p->stack_size * sizeof (SCM));
116 #endif
117 p->ra = ra;
118 p->mvra = mvra;
119 p->sp = sp;
120 p->fp = fp;
121 memcpy (p->stack_base, stack_base, (sp + 1 - stack_base) * sizeof (SCM));
122 p->reloc = p->stack_base - stack_base;
123 p->flags = flags;
124 return scm_cell (scm_tc7_vm_cont, (scm_t_bits)p);
125 }
126
127 static void
128 vm_return_to_continuation (SCM vm, SCM cont, size_t n, SCM *argv)
129 {
130 struct scm_vm *vp;
131 struct scm_vm_cont *cp;
132 SCM *argv_copy;
133
134 argv_copy = alloca (n * sizeof(SCM));
135 memcpy (argv_copy, argv, n * sizeof(SCM));
136
137 vp = SCM_VM_DATA (vm);
138 cp = SCM_VM_CONT_DATA (cont);
139
140 if (n == 0 && !cp->mvra)
141 scm_misc_error (NULL, "Too few values returned to continuation",
142 SCM_EOL);
143
144 if (vp->stack_size < cp->stack_size + n + 1)
145 scm_misc_error ("vm-engine", "not enough space to reinstate continuation",
146 scm_list_2 (vm, cont));
147
148 #ifdef VM_ENABLE_STACK_NULLING
149 {
150 scm_t_ptrdiff nzero = (vp->sp - cp->sp);
151 if (nzero > 0)
152 memset (vp->stack_base + cp->stack_size, 0, nzero * sizeof (SCM));
153 /* actually nzero should always be negative, because vm_reset_stack will
154 unwind the stack to some point *below* this continuation */
155 }
156 #endif
157 vp->sp = cp->sp;
158 vp->fp = cp->fp;
159 memcpy (vp->stack_base, cp->stack_base, cp->stack_size * sizeof (SCM));
160
161 if (n == 1 || !cp->mvra)
162 {
163 vp->ip = cp->ra;
164 vp->sp++;
165 *vp->sp = argv_copy[0];
166 }
167 else
168 {
169 size_t i;
170 for (i = 0; i < n; i++)
171 {
172 vp->sp++;
173 *vp->sp = argv_copy[i];
174 }
175 vp->sp++;
176 *vp->sp = scm_from_size_t (n);
177 vp->ip = cp->mvra;
178 }
179 }
180
181 SCM
182 scm_i_vm_capture_continuation (SCM vm)
183 {
184 struct scm_vm *vp = SCM_VM_DATA (vm);
185 return scm_i_vm_capture_stack (vp->stack_base, vp->fp, vp->sp, vp->ip, NULL, 0);
186 }
187
188 static void
189 vm_dispatch_hook (SCM vm, int hook_num)
190 {
191 struct scm_vm *vp;
192 SCM hook;
193 struct scm_frame c_frame;
194 scm_t_aligned_cell frame;
195 SCM args[1];
196
197 vp = SCM_VM_DATA (vm);
198 hook = vp->hooks[hook_num];
199
200 if (SCM_LIKELY (scm_is_false (hook))
201 || scm_is_null (SCM_HOOK_PROCEDURES (hook)))
202 return;
203
204 vp->trace_level--;
205
206 /* Allocate a frame object on the stack. This is more efficient than calling
207 `scm_c_make_frame ()' to allocate on the heap, but it forces hooks to not
208 capture frame objects.
209
210 At the same time, procedures such as `frame-procedure' make sense only
211 while the stack frame represented by the frame object is visible, so it
212 seems reasonable to limit the lifetime of frame objects. */
213
214 c_frame.stack_holder = vm;
215 c_frame.fp = vp->fp;
216 c_frame.sp = vp->sp;
217 c_frame.ip = vp->ip;
218 c_frame.offset = 0;
219 frame.cell.word_0 = SCM_PACK (scm_tc7_frame);
220 frame.cell.word_1 = PTR2SCM (&c_frame);
221 args[0] = PTR2SCM (&frame);
222
223 scm_c_run_hookn (hook, args, 1);
224
225 vp->trace_level++;
226 }
227
228 static void vm_abort (SCM vm, size_t n, scm_t_int64 cookie) SCM_NORETURN;
229 static void
230 vm_abort (SCM vm, size_t n, scm_t_int64 vm_cookie)
231 {
232 size_t i;
233 ssize_t tail_len;
234 SCM tag, tail, *argv;
235
236 /* FIXME: VM_ENABLE_STACK_NULLING */
237 tail = *(SCM_VM_DATA (vm)->sp--);
238 /* NULLSTACK (1) */
239 tail_len = scm_ilength (tail);
240 if (tail_len < 0)
241 scm_misc_error ("vm-engine", "tail values to abort should be a list",
242 scm_list_1 (tail));
243
244 tag = SCM_VM_DATA (vm)->sp[-n];
245 argv = alloca ((n + tail_len) * sizeof (SCM));
246 for (i = 0; i < n; i++)
247 argv[i] = SCM_VM_DATA (vm)->sp[-(n-1-i)];
248 for (; i < n + tail_len; i++, tail = scm_cdr (tail))
249 argv[i] = scm_car (tail);
250 /* NULLSTACK (n + 1) */
251 SCM_VM_DATA (vm)->sp -= n + 1;
252
253 scm_c_abort (vm, tag, n + tail_len, argv, vm_cookie);
254 }
255
256 static void
257 vm_reinstate_partial_continuation (SCM vm, SCM cont, SCM intwinds,
258 size_t n, SCM *argv, scm_t_int64 vm_cookie)
259 {
260 struct scm_vm *vp;
261 struct scm_vm_cont *cp;
262 SCM *argv_copy, *base;
263 size_t i;
264
265 argv_copy = alloca (n * sizeof(SCM));
266 memcpy (argv_copy, argv, n * sizeof(SCM));
267
268 vp = SCM_VM_DATA (vm);
269 cp = SCM_VM_CONT_DATA (cont);
270 base = SCM_FRAME_UPPER_ADDRESS (vp->fp) + 1;
271
272 #define RELOC(scm_p) (scm_p + cp->reloc + (base - cp->stack_base))
273
274 if ((base - vp->stack_base) + cp->stack_size + n + 1 > vp->stack_size)
275 scm_misc_error ("vm-engine",
276 "not enough space to instate partial continuation",
277 scm_list_2 (vm, cont));
278
279 memcpy (base, cp->stack_base, cp->stack_size * sizeof (SCM));
280
281 /* now relocate frame pointers */
282 {
283 SCM *fp;
284 for (fp = RELOC (cp->fp);
285 SCM_FRAME_LOWER_ADDRESS (fp) > base;
286 fp = SCM_FRAME_DYNAMIC_LINK (fp))
287 SCM_FRAME_SET_DYNAMIC_LINK (fp, RELOC (SCM_FRAME_DYNAMIC_LINK (fp)));
288 }
289
290 vp->sp = base - 1 + cp->stack_size;
291 vp->fp = RELOC (cp->fp);
292 vp->ip = cp->mvra;
293
294 /* now push args. ip is in a MV context. */
295 for (i = 0; i < n; i++)
296 {
297 vp->sp++;
298 *vp->sp = argv_copy[i];
299 }
300 vp->sp++;
301 *vp->sp = scm_from_size_t (n);
302
303 /* Finally, rewind the dynamic state.
304
305 We have to treat prompts specially, because we could be rewinding the
306 dynamic state from a different thread, or just a different position on the
307 C and/or VM stack -- so we need to reset the jump buffers so that an abort
308 comes back here, with appropriately adjusted sp and fp registers. */
309 {
310 long delta = 0;
311 SCM newwinds = scm_i_dynwinds ();
312 for (; scm_is_pair (intwinds); intwinds = scm_cdr (intwinds), delta--)
313 {
314 SCM x = scm_car (intwinds);
315 if (SCM_PROMPT_P (x))
316 /* the jmpbuf will be reset by our caller */
317 x = scm_c_make_prompt (SCM_PROMPT_TAG (x),
318 RELOC (SCM_PROMPT_REGISTERS (x)->fp),
319 RELOC (SCM_PROMPT_REGISTERS (x)->sp),
320 SCM_PROMPT_REGISTERS (x)->ip,
321 SCM_PROMPT_ESCAPE_P (x),
322 vm_cookie,
323 newwinds);
324 newwinds = scm_cons (x, newwinds);
325 }
326 scm_dowinds (newwinds, delta);
327 }
328 #undef RELOC
329 }
330
331 \f
332 /*
333 * VM Internal functions
334 */
335
336 /* Unfortunately we can't snarf these: snarfed things are only loaded up from
337 (system vm vm), which might not be loaded before an error happens. */
338 static SCM sym_vm_run, sym_vm_error, sym_keyword_argument_error, sym_debug;
339
340 void
341 scm_i_vm_print (SCM x, SCM port, scm_print_state *pstate)
342 {
343 const struct scm_vm *vm;
344
345 vm = SCM_VM_DATA (x);
346
347 scm_puts ("#<vm ", port);
348 switch (vm->engine)
349 {
350 case SCM_VM_REGULAR_ENGINE:
351 scm_puts ("regular-engine ", port);
352 break;
353
354 case SCM_VM_DEBUG_ENGINE:
355 scm_puts ("debug-engine ", port);
356 break;
357
358 default:
359 scm_puts ("unknown-engine ", port);
360 }
361 scm_uintprint (SCM_UNPACK (x), 16, port);
362 scm_puts (">", port);
363 }
364
365 static SCM
366 really_make_boot_program (long nargs)
367 {
368 SCM u8vec;
369 scm_t_uint8 text[] = { scm_op_mv_call, 0, 0, 0, 1,
370 scm_op_make_int8_1, scm_op_halt };
371 struct scm_objcode *bp;
372 SCM ret;
373
374 if (SCM_UNLIKELY (nargs > 255 || nargs < 0))
375 scm_misc_error ("vm-engine", "too many args when making boot procedure",
376 scm_list_1 (scm_from_long (nargs)));
377
378 text[1] = (scm_t_uint8)nargs;
379
380 bp = scm_malloc (sizeof (struct scm_objcode) + sizeof (text));
381 memcpy (SCM_C_OBJCODE_BASE (bp), text, sizeof (text));
382 bp->len = sizeof(text);
383 bp->metalen = 0;
384
385 u8vec = scm_c_take_bytevector ((scm_t_int8*)bp,
386 sizeof (struct scm_objcode) + sizeof (text));
387 ret = scm_make_program (scm_bytecode_to_objcode (u8vec),
388 SCM_BOOL_F, SCM_BOOL_F);
389 SCM_SET_CELL_WORD_0 (ret, SCM_CELL_WORD_0 (ret) | SCM_F_PROGRAM_IS_BOOT);
390
391 return ret;
392 }
393 #define NUM_BOOT_PROGS 8
394 static SCM
395 vm_make_boot_program (long nargs)
396 {
397 static SCM programs[NUM_BOOT_PROGS] = { 0, };
398
399 if (SCM_UNLIKELY (!programs[0]))
400 {
401 int i;
402 for (i = 0; i < NUM_BOOT_PROGS; i++)
403 programs[i] = really_make_boot_program (i);
404 }
405
406 if (SCM_LIKELY (nargs < NUM_BOOT_PROGS))
407 return programs[nargs];
408 else
409 return really_make_boot_program (nargs);
410 }
411
412 \f
413 /*
414 * VM
415 */
416
417 static SCM
418 resolve_variable (SCM what, SCM program_module)
419 {
420 if (SCM_LIKELY (scm_is_symbol (what)))
421 {
422 if (SCM_LIKELY (scm_module_system_booted_p
423 && scm_is_true (program_module)))
424 /* might longjmp */
425 return scm_module_lookup (program_module, what);
426 else
427 {
428 SCM v = scm_sym2var (what, SCM_BOOL_F, SCM_BOOL_F);
429 if (scm_is_false (v))
430 scm_misc_error (NULL, "unbound variable: ~S", scm_list_1 (what));
431 else
432 return v;
433 }
434 }
435 else
436 {
437 SCM mod;
438 /* compilation of @ or @@
439 `what' is a three-element list: (MODNAME SYM INTERFACE?)
440 INTERFACE? is #t if we compiled @ or #f if we compiled @@
441 */
442 mod = scm_resolve_module (SCM_CAR (what));
443 if (scm_is_true (SCM_CADDR (what)))
444 mod = scm_module_public_interface (mod);
445 if (scm_is_false (mod))
446 scm_misc_error (NULL, "no such module: ~S",
447 scm_list_1 (SCM_CAR (what)));
448 /* might longjmp */
449 return scm_module_lookup (mod, SCM_CADR (what));
450 }
451 }
452
453 #define VM_DEFAULT_STACK_SIZE (64 * 1024)
454
455 #define VM_NAME vm_regular_engine
456 #define FUNC_NAME "vm-regular-engine"
457 #define VM_ENGINE SCM_VM_REGULAR_ENGINE
458 #include "vm-engine.c"
459 #undef VM_NAME
460 #undef FUNC_NAME
461 #undef VM_ENGINE
462
463 #define VM_NAME vm_debug_engine
464 #define FUNC_NAME "vm-debug-engine"
465 #define VM_ENGINE SCM_VM_DEBUG_ENGINE
466 #include "vm-engine.c"
467 #undef VM_NAME
468 #undef FUNC_NAME
469 #undef VM_ENGINE
470
471 static const scm_t_vm_engine vm_engines[] =
472 { vm_regular_engine, vm_debug_engine };
473
474 #ifdef VM_ENABLE_PRECISE_STACK_GC_SCAN
475
476 /* The GC "kind" for the VM stack. */
477 static int vm_stack_gc_kind;
478
479 #endif
480
481 static SCM
482 make_vm (void)
483 #define FUNC_NAME "make_vm"
484 {
485 int i;
486 struct scm_vm *vp;
487
488 vp = scm_gc_malloc (sizeof (struct scm_vm), "vm");
489
490 vp->stack_size = VM_DEFAULT_STACK_SIZE;
491
492 #ifdef VM_ENABLE_PRECISE_STACK_GC_SCAN
493 vp->stack_base = (SCM *)
494 GC_generic_malloc (vp->stack_size * sizeof (SCM), vm_stack_gc_kind);
495
496 /* Keep a pointer to VP so that `vm_stack_mark ()' can know what the stack
497 top is. */
498 *vp->stack_base = PTR2SCM (vp);
499 vp->stack_base++;
500 vp->stack_size--;
501 #else
502 vp->stack_base = scm_gc_malloc (vp->stack_size * sizeof (SCM),
503 "stack-base");
504 #endif
505
506 #ifdef VM_ENABLE_STACK_NULLING
507 memset (vp->stack_base, 0, vp->stack_size * sizeof (SCM));
508 #endif
509 vp->stack_limit = vp->stack_base + vp->stack_size - VM_STACK_RESERVE_SIZE;
510 vp->ip = NULL;
511 vp->sp = vp->stack_base - 1;
512 vp->fp = NULL;
513 vp->engine = SCM_VM_DEBUG_ENGINE;
514 vp->options = SCM_EOL;
515 vp->trace_level = 0;
516 for (i = 0; i < SCM_VM_NUM_HOOKS; i++)
517 vp->hooks[i] = SCM_BOOL_F;
518 vp->cookie = 0;
519 return scm_cell (scm_tc7_vm, (scm_t_bits)vp);
520 }
521 #undef FUNC_NAME
522
523 #ifdef VM_ENABLE_PRECISE_STACK_GC_SCAN
524
525 /* Mark the VM stack region between its base and its current top. */
526 static struct GC_ms_entry *
527 vm_stack_mark (GC_word *addr, struct GC_ms_entry *mark_stack_ptr,
528 struct GC_ms_entry *mark_stack_limit, GC_word env)
529 {
530 GC_word *word;
531 const struct scm_vm *vm;
532
533 /* The first word of the VM stack should contain a pointer to the
534 corresponding VM. */
535 vm = * ((struct scm_vm **) addr);
536
537 if (vm == NULL
538 || (SCM *) addr != vm->stack_base - 1)
539 /* ADDR must be a pointer to a free-list element, which we must ignore
540 (see warning in <gc/gc_mark.h>). */
541 return mark_stack_ptr;
542
543 for (word = (GC_word *) vm->stack_base; word <= (GC_word *) vm->sp; word++)
544 mark_stack_ptr = GC_MARK_AND_PUSH ((* (GC_word **) word),
545 mark_stack_ptr, mark_stack_limit,
546 NULL);
547
548 return mark_stack_ptr;
549 }
550
551 #endif /* VM_ENABLE_PRECISE_STACK_GC_SCAN */
552
553
554 SCM
555 scm_c_vm_run (SCM vm, SCM program, SCM *argv, int nargs)
556 {
557 struct scm_vm *vp = SCM_VM_DATA (vm);
558 return vm_engines[vp->engine](vm, program, argv, nargs);
559 }
560
561 SCM_DEFINE (scm_vm_apply, "vm-apply", 3, 0, 0,
562 (SCM vm, SCM program, SCM args),
563 "")
564 #define FUNC_NAME s_scm_vm_apply
565 {
566 SCM *argv;
567 int i, nargs;
568
569 SCM_VALIDATE_VM (1, vm);
570 SCM_VALIDATE_PROC (2, program);
571
572 nargs = scm_ilength (args);
573 if (SCM_UNLIKELY (nargs < 0))
574 scm_wrong_type_arg_msg (FUNC_NAME, 3, args, "list");
575
576 argv = alloca(nargs * sizeof(SCM));
577 for (i = 0; i < nargs; i++)
578 {
579 argv[i] = SCM_CAR (args);
580 args = SCM_CDR (args);
581 }
582
583 return scm_c_vm_run (vm, program, argv, nargs);
584 }
585 #undef FUNC_NAME
586
587 /* Scheme interface */
588
589 SCM_DEFINE (scm_vm_version, "vm-version", 0, 0, 0,
590 (void),
591 "")
592 #define FUNC_NAME s_scm_vm_version
593 {
594 return scm_from_locale_string (PACKAGE_VERSION);
595 }
596 #undef FUNC_NAME
597
598 SCM_DEFINE (scm_the_vm, "the-vm", 0, 0, 0,
599 (void),
600 "")
601 #define FUNC_NAME s_scm_the_vm
602 {
603 scm_i_thread *t = SCM_I_CURRENT_THREAD;
604
605 if (SCM_UNLIKELY (scm_is_false ((t->vm))))
606 t->vm = make_vm ();
607
608 return t->vm;
609 }
610 #undef FUNC_NAME
611
612
613 SCM_DEFINE (scm_vm_p, "vm?", 1, 0, 0,
614 (SCM obj),
615 "")
616 #define FUNC_NAME s_scm_vm_p
617 {
618 return scm_from_bool (SCM_VM_P (obj));
619 }
620 #undef FUNC_NAME
621
622 SCM_DEFINE (scm_make_vm, "make-vm", 0, 0, 0,
623 (void),
624 "")
625 #define FUNC_NAME s_scm_make_vm,
626 {
627 return make_vm ();
628 }
629 #undef FUNC_NAME
630
631 SCM_DEFINE (scm_vm_ip, "vm:ip", 1, 0, 0,
632 (SCM vm),
633 "")
634 #define FUNC_NAME s_scm_vm_ip
635 {
636 SCM_VALIDATE_VM (1, vm);
637 return scm_from_ulong ((unsigned long) SCM_VM_DATA (vm)->ip);
638 }
639 #undef FUNC_NAME
640
641 SCM_DEFINE (scm_vm_sp, "vm:sp", 1, 0, 0,
642 (SCM vm),
643 "")
644 #define FUNC_NAME s_scm_vm_sp
645 {
646 SCM_VALIDATE_VM (1, vm);
647 return scm_from_ulong ((unsigned long) SCM_VM_DATA (vm)->sp);
648 }
649 #undef FUNC_NAME
650
651 SCM_DEFINE (scm_vm_fp, "vm:fp", 1, 0, 0,
652 (SCM vm),
653 "")
654 #define FUNC_NAME s_scm_vm_fp
655 {
656 SCM_VALIDATE_VM (1, vm);
657 return scm_from_ulong ((unsigned long) SCM_VM_DATA (vm)->fp);
658 }
659 #undef FUNC_NAME
660
661 #define VM_DEFINE_HOOK(n) \
662 { \
663 struct scm_vm *vp; \
664 SCM_VALIDATE_VM (1, vm); \
665 vp = SCM_VM_DATA (vm); \
666 if (scm_is_false (vp->hooks[n])) \
667 vp->hooks[n] = scm_make_hook (SCM_I_MAKINUM (1)); \
668 return vp->hooks[n]; \
669 }
670
671 SCM_DEFINE (scm_vm_apply_hook, "vm-apply-hook", 1, 0, 0,
672 (SCM vm),
673 "")
674 #define FUNC_NAME s_scm_vm_apply_hook
675 {
676 VM_DEFINE_HOOK (SCM_VM_APPLY_HOOK);
677 }
678 #undef FUNC_NAME
679
680 SCM_DEFINE (scm_vm_push_continuation_hook, "vm-push-continuation-hook", 1, 0, 0,
681 (SCM vm),
682 "")
683 #define FUNC_NAME s_scm_vm_push_continuation_hook
684 {
685 VM_DEFINE_HOOK (SCM_VM_PUSH_CONTINUATION_HOOK);
686 }
687 #undef FUNC_NAME
688
689 SCM_DEFINE (scm_vm_pop_continuation_hook, "vm-pop-continuation-hook", 1, 0, 0,
690 (SCM vm),
691 "")
692 #define FUNC_NAME s_scm_vm_pop_continuation_hook
693 {
694 VM_DEFINE_HOOK (SCM_VM_POP_CONTINUATION_HOOK);
695 }
696 #undef FUNC_NAME
697
698 SCM_DEFINE (scm_vm_next_hook, "vm-next-hook", 1, 0, 0,
699 (SCM vm),
700 "")
701 #define FUNC_NAME s_scm_vm_next_hook
702 {
703 VM_DEFINE_HOOK (SCM_VM_NEXT_HOOK);
704 }
705 #undef FUNC_NAME
706
707 SCM_DEFINE (scm_vm_abort_continuation_hook, "vm-abort-continuation-hook", 1, 0, 0,
708 (SCM vm),
709 "")
710 #define FUNC_NAME s_scm_vm_abort_continuation_hook
711 {
712 VM_DEFINE_HOOK (SCM_VM_ABORT_CONTINUATION_HOOK);
713 }
714 #undef FUNC_NAME
715
716 SCM_DEFINE (scm_vm_restore_continuation_hook, "vm-restore-continuation-hook", 1, 0, 0,
717 (SCM vm),
718 "")
719 #define FUNC_NAME s_scm_vm_restore_continuation_hook
720 {
721 VM_DEFINE_HOOK (SCM_VM_RESTORE_CONTINUATION_HOOK);
722 }
723 #undef FUNC_NAME
724
725 SCM_DEFINE (scm_vm_option, "vm-option", 2, 0, 0,
726 (SCM vm, SCM key),
727 "")
728 #define FUNC_NAME s_scm_vm_option
729 {
730 SCM_VALIDATE_VM (1, vm);
731 return scm_assq_ref (SCM_VM_DATA (vm)->options, key);
732 }
733 #undef FUNC_NAME
734
735 SCM_DEFINE (scm_set_vm_option_x, "set-vm-option!", 3, 0, 0,
736 (SCM vm, SCM key, SCM val),
737 "")
738 #define FUNC_NAME s_scm_set_vm_option_x
739 {
740 SCM_VALIDATE_VM (1, vm);
741 SCM_VM_DATA (vm)->options
742 = scm_assq_set_x (SCM_VM_DATA (vm)->options, key, val);
743 return SCM_UNSPECIFIED;
744 }
745 #undef FUNC_NAME
746
747 SCM_DEFINE (scm_vm_trace_level, "vm-trace-level", 1, 0, 0,
748 (SCM vm),
749 "")
750 #define FUNC_NAME s_scm_vm_trace_level
751 {
752 SCM_VALIDATE_VM (1, vm);
753 return scm_from_int (SCM_VM_DATA (vm)->trace_level);
754 }
755 #undef FUNC_NAME
756
757 SCM_DEFINE (scm_set_vm_trace_level_x, "set-vm-trace-level!", 2, 0, 0,
758 (SCM vm, SCM level),
759 "")
760 #define FUNC_NAME s_scm_set_vm_trace_level_x
761 {
762 SCM_VALIDATE_VM (1, vm);
763 SCM_VM_DATA (vm)->trace_level = scm_to_int (level);
764 return SCM_UNSPECIFIED;
765 }
766 #undef FUNC_NAME
767
768 \f
769 /*
770 * Initialize
771 */
772
773 SCM scm_load_compiled_with_vm (SCM file)
774 {
775 SCM program = scm_make_program (scm_load_objcode (file),
776 SCM_BOOL_F, SCM_BOOL_F);
777
778 return scm_c_vm_run (scm_the_vm (), program, NULL, 0);
779 }
780
781 void
782 scm_bootstrap_vm (void)
783 {
784 scm_c_register_extension ("libguile-" SCM_EFFECTIVE_VERSION,
785 "scm_init_vm",
786 (scm_t_extension_init_func)scm_init_vm, NULL);
787
788 sym_vm_run = scm_from_locale_symbol ("vm-run");
789 sym_vm_error = scm_from_locale_symbol ("vm-error");
790 sym_keyword_argument_error = scm_from_locale_symbol ("keyword-argument-error");
791 sym_debug = scm_from_locale_symbol ("debug");
792
793 #ifdef VM_ENABLE_PRECISE_STACK_GC_SCAN
794 vm_stack_gc_kind =
795 GC_new_kind (GC_new_free_list (),
796 GC_MAKE_PROC (GC_new_proc (vm_stack_mark), 0),
797 0, 1);
798
799 #endif
800 }
801
802 void
803 scm_init_vm (void)
804 {
805 #ifndef SCM_MAGIC_SNARFER
806 #include "libguile/vm.x"
807 #endif
808 }
809
810 /*
811 Local Variables:
812 c-file-style: "gnu"
813 End:
814 */