Commit | Line | Data |
---|---|---|
aab9d46c | 1 | /* Copyright (C) 2001, 2009, 2010, 2011, 2012, 2013 Free Software Foundation, Inc. |
a98cef7e | 2 | * |
560b9c25 | 3 | * This library is free software; you can redistribute it and/or |
53befeb7 NJ |
4 | * modify it under the terms of the GNU Lesser General Public License |
5 | * as published by the Free Software Foundation; either version 3 of | |
6 | * the License, or (at your option) any later version. | |
a98cef7e | 7 | * |
53befeb7 NJ |
8 | * This library is distributed in the hope that it will be useful, but |
9 | * WITHOUT ANY WARRANTY; without even the implied warranty of | |
560b9c25 AW |
10 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU |
11 | * Lesser General Public License for more details. | |
a98cef7e | 12 | * |
560b9c25 AW |
13 | * You should have received a copy of the GNU Lesser General Public |
14 | * License along with this library; if not, write to the Free Software | |
53befeb7 NJ |
15 | * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA |
16 | * 02110-1301 USA | |
560b9c25 | 17 | */ |
a98cef7e | 18 | |
13c47753 AW |
19 | #if HAVE_CONFIG_H |
20 | # include <config.h> | |
21 | #endif | |
22 | ||
da8b4747 | 23 | #include <stdlib.h> |
6d14383e | 24 | #include <alloca.h> |
daccfef4 | 25 | #include <alignof.h> |
17e90c5e | 26 | #include <string.h> |
e78d4bf9 | 27 | #include <stdint.h> |
e3eb628d | 28 | |
1c44468d | 29 | #include "libguile/bdw-gc.h" |
e3eb628d LC |
30 | #include <gc/gc_mark.h> |
31 | ||
560b9c25 | 32 | #include "_scm.h" |
adaf86ec | 33 | #include "control.h" |
ac99cb0c | 34 | #include "frames.h" |
17e90c5e | 35 | #include "instructions.h" |
8f5cfc81 | 36 | #include "objcodes.h" |
ac99cb0c | 37 | #include "programs.h" |
a98cef7e KN |
38 | #include "vm.h" |
39 | ||
aab9d46c SIT |
40 | #include "private-gc.h" /* scm_getenv_int */ |
41 | ||
97b18a66 | 42 | static int vm_default_engine = SCM_VM_REGULAR_ENGINE; |
ea9f4f4b AW |
43 | |
44 | /* Unfortunately we can't snarf these: snarfed things are only loaded up from | |
45 | (system vm vm), which might not be loaded before an error happens. */ | |
46 | static SCM sym_vm_run; | |
47 | static SCM sym_vm_error; | |
48 | static SCM sym_keyword_argument_error; | |
49 | static SCM sym_regular; | |
50 | static SCM sym_debug; | |
a98cef7e | 51 | |
11ea1aba AW |
52 | /* The VM has a number of internal assertions that shouldn't normally be |
53 | necessary, but might be if you think you found a bug in the VM. */ | |
54 | #define VM_ENABLE_ASSERTIONS | |
55 | ||
56 | /* We can add a mode that ensures that all stack items above the stack pointer | |
57 | are NULL. This is useful for checking the internal consistency of the VM's | |
58 | assumptions and its operators, but isn't necessary for normal operation. It | |
616167fc | 59 | will ensure that assertions are enabled. Slows down the VM by about 30%. */ |
747a1635 | 60 | /* NB! If you enable this, search for NULLING in throw.c */ |
616167fc | 61 | /* #define VM_ENABLE_STACK_NULLING */ |
11ea1aba | 62 | |
53e28ed9 AW |
63 | /* #define VM_ENABLE_PARANOID_ASSERTIONS */ |
64 | ||
11ea1aba AW |
65 | #if defined (VM_ENABLE_STACK_NULLING) && !defined (VM_ENABLE_ASSERTIONS) |
66 | #define VM_ENABLE_ASSERTIONS | |
67 | #endif | |
68 | ||
e3eb628d LC |
69 | /* When defined, arrange so that the GC doesn't scan the VM stack beyond its |
70 | current SP. This should help avoid excess data retention. See | |
71 | http://thread.gmane.org/gmane.comp.programming.garbage-collection.boehmgc/3001 | |
72 | for a discussion. */ | |
73 | #define VM_ENABLE_PRECISE_STACK_GC_SCAN | |
74 | ||
f1046e6b LC |
75 | /* Size in SCM objects of the stack reserve. The reserve is used to run |
76 | exception handling code in case of a VM stack overflow. */ | |
77 | #define VM_STACK_RESERVE_SIZE 512 | |
78 | ||
e3eb628d | 79 | |
a98cef7e | 80 | \f |
a98cef7e KN |
81 | /* |
82 | * VM Continuation | |
83 | */ | |
84 | ||
6f3b0cc2 AW |
85 | void |
86 | scm_i_vm_cont_print (SCM x, SCM port, scm_print_state *pstate) | |
87 | { | |
0607ebbf | 88 | scm_puts_unlocked ("#<vm-continuation ", port); |
6f3b0cc2 | 89 | scm_uintprint (SCM_UNPACK (x), 16, port); |
0607ebbf | 90 | scm_puts_unlocked (">", port); |
6f3b0cc2 | 91 | } |
17e90c5e | 92 | |
d8873dfe AW |
93 | /* In theory, a number of vm instances can be active in the call trace, and we |
94 | only want to reify the continuations of those in the current continuation | |
95 | root. I don't see a nice way to do this -- ideally it would involve dynwinds, | |
96 | and previous values of the *the-vm* fluid within the current continuation | |
97 | root. But we don't have access to continuation roots in the dynwind stack. | |
98 | So, just punt for now, we just capture the continuation for the current VM. | |
99 | ||
100 | While I'm on the topic, ideally we could avoid copying the C stack if the | |
101 | continuation root is inside VM code, and call/cc was invoked within that same | |
102 | call to vm_run; but that's currently not implemented. | |
103 | */ | |
cee1d22c AW |
104 | SCM |
105 | scm_i_vm_capture_stack (SCM *stack_base, SCM *fp, SCM *sp, scm_t_uint8 *ra, | |
9ede013f AW |
106 | scm_t_uint8 *mvra, scm_t_dynstack *dynstack, |
107 | scm_t_uint32 flags) | |
a98cef7e | 108 | { |
d8873dfe AW |
109 | struct scm_vm_cont *p; |
110 | ||
111 | p = scm_gc_malloc (sizeof (*p), "capture_vm_cont"); | |
112 | p->stack_size = sp - stack_base + 1; | |
d8eeb67c LC |
113 | p->stack_base = scm_gc_malloc (p->stack_size * sizeof (SCM), |
114 | "capture_vm_cont"); | |
d8873dfe AW |
115 | #if defined(VM_ENABLE_STACK_NULLING) && 0 |
116 | /* Tail continuations leave their frame on the stack for subsequent | |
117 | application, but don't capture the frame -- so there are some elements on | |
118 | the stack then, and this check doesn't work, so disable it for now. */ | |
119 | if (sp >= vp->stack_base) | |
66db076a AW |
120 | if (!vp->sp[0] || vp->sp[1]) |
121 | abort (); | |
11ea1aba AW |
122 | memset (p->stack_base, 0, p->stack_size * sizeof (SCM)); |
123 | #endif | |
d8873dfe AW |
124 | p->ra = ra; |
125 | p->mvra = mvra; | |
126 | p->sp = sp; | |
127 | p->fp = fp; | |
128 | memcpy (p->stack_base, stack_base, (sp + 1 - stack_base) * sizeof (SCM)); | |
129 | p->reloc = p->stack_base - stack_base; | |
9ede013f | 130 | p->dynstack = dynstack; |
cee1d22c | 131 | p->flags = flags; |
6f3b0cc2 | 132 | return scm_cell (scm_tc7_vm_cont, (scm_t_bits)p); |
a98cef7e KN |
133 | } |
134 | ||
135 | static void | |
d8873dfe | 136 | vm_return_to_continuation (SCM vm, SCM cont, size_t n, SCM *argv) |
a98cef7e | 137 | { |
d8873dfe AW |
138 | struct scm_vm *vp; |
139 | struct scm_vm_cont *cp; | |
140 | SCM *argv_copy; | |
141 | ||
142 | argv_copy = alloca (n * sizeof(SCM)); | |
143 | memcpy (argv_copy, argv, n * sizeof(SCM)); | |
144 | ||
145 | vp = SCM_VM_DATA (vm); | |
146 | cp = SCM_VM_CONT_DATA (cont); | |
147 | ||
148 | if (n == 0 && !cp->mvra) | |
149 | scm_misc_error (NULL, "Too few values returned to continuation", | |
150 | SCM_EOL); | |
151 | ||
152 | if (vp->stack_size < cp->stack_size + n + 1) | |
29366989 AW |
153 | scm_misc_error ("vm-engine", "not enough space to reinstate continuation", |
154 | scm_list_2 (vm, cont)); | |
155 | ||
11ea1aba AW |
156 | #ifdef VM_ENABLE_STACK_NULLING |
157 | { | |
d8873dfe | 158 | scm_t_ptrdiff nzero = (vp->sp - cp->sp); |
11ea1aba | 159 | if (nzero > 0) |
d8873dfe | 160 | memset (vp->stack_base + cp->stack_size, 0, nzero * sizeof (SCM)); |
66db076a AW |
161 | /* actually nzero should always be negative, because vm_reset_stack will |
162 | unwind the stack to some point *below* this continuation */ | |
11ea1aba AW |
163 | } |
164 | #endif | |
d8873dfe AW |
165 | vp->sp = cp->sp; |
166 | vp->fp = cp->fp; | |
167 | memcpy (vp->stack_base, cp->stack_base, cp->stack_size * sizeof (SCM)); | |
bfffd258 | 168 | |
d8873dfe AW |
169 | if (n == 1 || !cp->mvra) |
170 | { | |
171 | vp->ip = cp->ra; | |
172 | vp->sp++; | |
173 | *vp->sp = argv_copy[0]; | |
174 | } | |
175 | else | |
176 | { | |
177 | size_t i; | |
178 | for (i = 0; i < n; i++) | |
179 | { | |
180 | vp->sp++; | |
181 | *vp->sp = argv_copy[i]; | |
182 | } | |
183 | vp->sp++; | |
184 | *vp->sp = scm_from_size_t (n); | |
185 | vp->ip = cp->mvra; | |
186 | } | |
187 | } | |
bfffd258 | 188 | |
bfffd258 | 189 | SCM |
9ede013f | 190 | scm_i_capture_current_stack (void) |
bfffd258 | 191 | { |
9ede013f AW |
192 | scm_i_thread *thread; |
193 | SCM vm; | |
194 | struct scm_vm *vp; | |
195 | ||
196 | thread = SCM_I_CURRENT_THREAD; | |
197 | vm = scm_the_vm (); | |
198 | vp = SCM_VM_DATA (vm); | |
199 | ||
200 | return scm_i_vm_capture_stack (vp->stack_base, vp->fp, vp->sp, vp->ip, NULL, | |
201 | scm_dynstack_capture_all (&thread->dynstack), | |
202 | 0); | |
a98cef7e KN |
203 | } |
204 | ||
c850a0ff AW |
205 | static void vm_dispatch_hook (SCM vm, int hook_num, |
206 | SCM *argv, int n) SCM_NOINLINE; | |
207 | ||
b1b942b7 | 208 | static void |
c850a0ff | 209 | vm_dispatch_hook (SCM vm, int hook_num, SCM *argv, int n) |
b1b942b7 | 210 | { |
7656f194 AW |
211 | struct scm_vm *vp; |
212 | SCM hook; | |
b3567435 | 213 | struct scm_frame c_frame; |
8e4c60ff | 214 | scm_t_cell *frame; |
893fb8d0 | 215 | int saved_trace_level; |
b1b942b7 | 216 | |
7656f194 AW |
217 | vp = SCM_VM_DATA (vm); |
218 | hook = vp->hooks[hook_num]; | |
b1b942b7 | 219 | |
7656f194 AW |
220 | if (SCM_LIKELY (scm_is_false (hook)) |
221 | || scm_is_null (SCM_HOOK_PROCEDURES (hook))) | |
222 | return; | |
b3567435 | 223 | |
893fb8d0 AW |
224 | saved_trace_level = vp->trace_level; |
225 | vp->trace_level = 0; | |
b3567435 LC |
226 | |
227 | /* Allocate a frame object on the stack. This is more efficient than calling | |
228 | `scm_c_make_frame ()' to allocate on the heap, but it forces hooks to not | |
229 | capture frame objects. | |
230 | ||
231 | At the same time, procedures such as `frame-procedure' make sense only | |
232 | while the stack frame represented by the frame object is visible, so it | |
233 | seems reasonable to limit the lifetime of frame objects. */ | |
234 | ||
235 | c_frame.stack_holder = vm; | |
236 | c_frame.fp = vp->fp; | |
237 | c_frame.sp = vp->sp; | |
238 | c_frame.ip = vp->ip; | |
239 | c_frame.offset = 0; | |
8e4c60ff LC |
240 | |
241 | /* Arrange for FRAME to be 8-byte aligned, like any other cell. */ | |
242 | frame = alloca (sizeof (*frame) + 8); | |
243 | frame = (scm_t_cell *) ROUND_UP ((scm_t_uintptr) frame, 8UL); | |
244 | ||
245 | frame->word_0 = SCM_PACK (scm_tc7_frame); | |
21041372 | 246 | frame->word_1 = SCM_PACK_POINTER (&c_frame); |
b3567435 | 247 | |
c850a0ff AW |
248 | if (n == 0) |
249 | { | |
250 | SCM args[1]; | |
251 | ||
252 | args[0] = SCM_PACK_POINTER (frame); | |
253 | scm_c_run_hookn (hook, args, 1); | |
254 | } | |
255 | else if (n == 1) | |
256 | { | |
257 | SCM args[2]; | |
258 | ||
259 | args[0] = SCM_PACK_POINTER (frame); | |
260 | args[1] = argv[0]; | |
261 | scm_c_run_hookn (hook, args, 2); | |
262 | } | |
263 | else | |
264 | { | |
265 | SCM args = SCM_EOL; | |
266 | ||
267 | while (n--) | |
268 | args = scm_cons (argv[n], args); | |
269 | scm_c_run_hook (hook, scm_cons (SCM_PACK_POINTER (frame), args)); | |
270 | } | |
b3567435 | 271 | |
893fb8d0 | 272 | vp->trace_level = saved_trace_level; |
b1b942b7 AW |
273 | } |
274 | ||
4f66bcde | 275 | static void |
99511cd0 AW |
276 | vm_abort (SCM vm, SCM tag, size_t nstack, SCM *stack_args, SCM tail, SCM *sp, |
277 | scm_i_jmp_buf *current_registers) SCM_NORETURN; | |
9d381ba4 AW |
278 | |
279 | static void | |
99511cd0 AW |
280 | vm_abort (SCM vm, SCM tag, size_t nstack, SCM *stack_args, SCM tail, SCM *sp, |
281 | scm_i_jmp_buf *current_registers) | |
4f66bcde | 282 | { |
eaefabee | 283 | size_t i; |
2d026f04 | 284 | ssize_t tail_len; |
99511cd0 | 285 | SCM *argv; |
eaefabee | 286 | |
2d026f04 AW |
287 | tail_len = scm_ilength (tail); |
288 | if (tail_len < 0) | |
29366989 AW |
289 | scm_misc_error ("vm-engine", "tail values to abort should be a list", |
290 | scm_list_1 (tail)); | |
291 | ||
99511cd0 AW |
292 | argv = alloca ((nstack + tail_len) * sizeof (SCM)); |
293 | for (i = 0; i < nstack; i++) | |
294 | argv[i] = stack_args[i]; | |
295 | for (; i < nstack + tail_len; i++, tail = scm_cdr (tail)) | |
2d026f04 | 296 | argv[i] = scm_car (tail); |
eaefabee | 297 | |
99511cd0 AW |
298 | /* FIXME: NULLSTACK (SCM_VM_DATA (vp)->sp - sp) */ |
299 | SCM_VM_DATA (vm)->sp = sp; | |
300 | ||
301 | scm_c_abort (vm, tag, nstack + tail_len, argv, current_registers); | |
cee1d22c AW |
302 | } |
303 | ||
9d381ba4 AW |
304 | static void |
305 | vm_reinstate_partial_continuation (SCM vm, SCM cont, size_t n, SCM *argv, | |
306 | scm_t_dynstack *dynstack, | |
307 | scm_i_jmp_buf *registers) | |
cee1d22c | 308 | { |
07801437 AW |
309 | struct scm_vm *vp; |
310 | struct scm_vm_cont *cp; | |
311 | SCM *argv_copy, *base; | |
9ede013f | 312 | scm_t_ptrdiff reloc; |
07801437 AW |
313 | size_t i; |
314 | ||
315 | argv_copy = alloca (n * sizeof(SCM)); | |
316 | memcpy (argv_copy, argv, n * sizeof(SCM)); | |
317 | ||
318 | vp = SCM_VM_DATA (vm); | |
319 | cp = SCM_VM_CONT_DATA (cont); | |
320 | base = SCM_FRAME_UPPER_ADDRESS (vp->fp) + 1; | |
9ede013f | 321 | reloc = cp->reloc + (base - cp->stack_base); |
07801437 | 322 | |
0fc9040f | 323 | #define RELOC(scm_p) \ |
9ede013f | 324 | (((SCM *) (scm_p)) + reloc) |
07801437 AW |
325 | |
326 | if ((base - vp->stack_base) + cp->stack_size + n + 1 > vp->stack_size) | |
29366989 AW |
327 | scm_misc_error ("vm-engine", |
328 | "not enough space to instate partial continuation", | |
329 | scm_list_2 (vm, cont)); | |
07801437 AW |
330 | |
331 | memcpy (base, cp->stack_base, cp->stack_size * sizeof (SCM)); | |
332 | ||
333 | /* now relocate frame pointers */ | |
334 | { | |
335 | SCM *fp; | |
336 | for (fp = RELOC (cp->fp); | |
337 | SCM_FRAME_LOWER_ADDRESS (fp) > base; | |
338 | fp = SCM_FRAME_DYNAMIC_LINK (fp)) | |
339 | SCM_FRAME_SET_DYNAMIC_LINK (fp, RELOC (SCM_FRAME_DYNAMIC_LINK (fp))); | |
340 | } | |
341 | ||
342 | vp->sp = base - 1 + cp->stack_size; | |
343 | vp->fp = RELOC (cp->fp); | |
344 | vp->ip = cp->mvra; | |
345 | ||
07801437 AW |
346 | /* now push args. ip is in a MV context. */ |
347 | for (i = 0; i < n; i++) | |
348 | { | |
349 | vp->sp++; | |
350 | *vp->sp = argv_copy[i]; | |
351 | } | |
352 | vp->sp++; | |
353 | *vp->sp = scm_from_size_t (n); | |
9a1c6f1f | 354 | |
9d381ba4 AW |
355 | /* The prompt captured a slice of the dynamic stack. Here we wind |
356 | those entries onto the current thread's stack. We also have to | |
357 | relocate any prompts that we see along the way. */ | |
358 | { | |
359 | scm_t_bits *walk; | |
360 | ||
361 | for (walk = SCM_DYNSTACK_FIRST (cp->dynstack); | |
362 | SCM_DYNSTACK_TAG (walk); | |
363 | walk = SCM_DYNSTACK_NEXT (walk)) | |
364 | { | |
365 | scm_t_bits tag = SCM_DYNSTACK_TAG (walk); | |
366 | ||
367 | if (SCM_DYNSTACK_TAG_TYPE (tag) == SCM_DYNSTACK_TYPE_PROMPT) | |
368 | scm_dynstack_wind_prompt (dynstack, walk, reloc, registers); | |
369 | else | |
370 | scm_dynstack_wind_1 (dynstack, walk); | |
371 | } | |
372 | } | |
adbdfd6d | 373 | #undef RELOC |
4f66bcde AW |
374 | } |
375 | ||
376 | \f | |
17e90c5e KN |
377 | /* |
378 | * VM Internal functions | |
379 | */ | |
380 | ||
6f3b0cc2 AW |
381 | void |
382 | scm_i_vm_print (SCM x, SCM port, scm_print_state *pstate) | |
383 | { | |
0a935b2a LC |
384 | const struct scm_vm *vm; |
385 | ||
386 | vm = SCM_VM_DATA (x); | |
387 | ||
0607ebbf | 388 | scm_puts_unlocked ("#<vm ", port); |
0a935b2a LC |
389 | switch (vm->engine) |
390 | { | |
391 | case SCM_VM_REGULAR_ENGINE: | |
0607ebbf | 392 | scm_puts_unlocked ("regular-engine ", port); |
0a935b2a LC |
393 | break; |
394 | ||
395 | case SCM_VM_DEBUG_ENGINE: | |
0607ebbf | 396 | scm_puts_unlocked ("debug-engine ", port); |
0a935b2a LC |
397 | break; |
398 | ||
399 | default: | |
0607ebbf | 400 | scm_puts_unlocked ("unknown-engine ", port); |
0a935b2a | 401 | } |
6f3b0cc2 | 402 | scm_uintprint (SCM_UNPACK (x), 16, port); |
0607ebbf | 403 | scm_puts_unlocked (">", port); |
6f3b0cc2 AW |
404 | } |
405 | ||
53bdfcf0 AW |
406 | \f |
407 | /* | |
408 | * VM Error Handling | |
409 | */ | |
410 | ||
411 | static void vm_error (const char *msg, SCM arg) SCM_NORETURN; | |
4d497b62 AW |
412 | static void vm_error_bad_instruction (scm_t_uint32 inst) SCM_NORETURN SCM_NOINLINE; |
413 | static void vm_error_unbound (SCM proc, SCM sym) SCM_NORETURN SCM_NOINLINE; | |
414 | static void vm_error_unbound_fluid (SCM proc, SCM fluid) SCM_NORETURN SCM_NOINLINE; | |
415 | static void vm_error_not_a_variable (const char *func_name, SCM x) SCM_NORETURN SCM_NOINLINE; | |
416 | static void vm_error_apply_to_non_list (SCM x) SCM_NORETURN SCM_NOINLINE; | |
417 | static void vm_error_kwargs_length_not_even (SCM proc) SCM_NORETURN SCM_NOINLINE; | |
28d5d253 MW |
418 | static void vm_error_kwargs_invalid_keyword (SCM proc, SCM obj) SCM_NORETURN SCM_NOINLINE; |
419 | static void vm_error_kwargs_unrecognized_keyword (SCM proc, SCM kw) SCM_NORETURN SCM_NOINLINE; | |
4d497b62 AW |
420 | static void vm_error_too_many_args (int nargs) SCM_NORETURN SCM_NOINLINE; |
421 | static void vm_error_wrong_num_args (SCM proc) SCM_NORETURN SCM_NOINLINE; | |
422 | static void vm_error_wrong_type_apply (SCM proc) SCM_NORETURN SCM_NOINLINE; | |
423 | static void vm_error_stack_overflow (struct scm_vm *vp) SCM_NORETURN SCM_NOINLINE; | |
424 | static void vm_error_stack_underflow (void) SCM_NORETURN SCM_NOINLINE; | |
425 | static void vm_error_improper_list (SCM x) SCM_NORETURN SCM_NOINLINE; | |
426 | static void vm_error_not_a_pair (const char *subr, SCM x) SCM_NORETURN SCM_NOINLINE; | |
427 | static void vm_error_not_a_bytevector (const char *subr, SCM x) SCM_NORETURN SCM_NOINLINE; | |
428 | static void vm_error_not_a_struct (const char *subr, SCM x) SCM_NORETURN SCM_NOINLINE; | |
429 | static void vm_error_no_values (void) SCM_NORETURN SCM_NOINLINE; | |
430 | static void vm_error_not_enough_values (void) SCM_NORETURN SCM_NOINLINE; | |
82f4bac4 | 431 | static void vm_error_wrong_number_of_values (scm_t_uint32 expected) SCM_NORETURN SCM_NOINLINE; |
4d497b62 AW |
432 | static void vm_error_continuation_not_rewindable (SCM cont) SCM_NORETURN SCM_NOINLINE; |
433 | static void vm_error_bad_wide_string_length (size_t len) SCM_NORETURN SCM_NOINLINE; | |
53bdfcf0 AW |
434 | |
435 | static void | |
436 | vm_error (const char *msg, SCM arg) | |
437 | { | |
438 | scm_throw (sym_vm_error, | |
439 | scm_list_3 (sym_vm_run, scm_from_latin1_string (msg), | |
440 | SCM_UNBNDP (arg) ? SCM_EOL : scm_list_1 (arg))); | |
441 | abort(); /* not reached */ | |
442 | } | |
443 | ||
444 | static void | |
445 | vm_error_bad_instruction (scm_t_uint32 inst) | |
446 | { | |
447 | vm_error ("VM: Bad instruction: ~s", scm_from_uint32 (inst)); | |
448 | } | |
449 | ||
450 | static void | |
451 | vm_error_unbound (SCM proc, SCM sym) | |
452 | { | |
453 | scm_error_scm (scm_misc_error_key, proc, | |
454 | scm_from_latin1_string ("Unbound variable: ~s"), | |
455 | scm_list_1 (sym), SCM_BOOL_F); | |
456 | } | |
457 | ||
458 | static void | |
459 | vm_error_unbound_fluid (SCM proc, SCM fluid) | |
460 | { | |
461 | scm_error_scm (scm_misc_error_key, proc, | |
462 | scm_from_latin1_string ("Unbound fluid: ~s"), | |
463 | scm_list_1 (fluid), SCM_BOOL_F); | |
464 | } | |
465 | ||
466 | static void | |
467 | vm_error_not_a_variable (const char *func_name, SCM x) | |
468 | { | |
469 | scm_error (scm_arg_type_key, func_name, "Not a variable: ~S", | |
470 | scm_list_1 (x), scm_list_1 (x)); | |
471 | } | |
472 | ||
53bdfcf0 AW |
473 | static void |
474 | vm_error_apply_to_non_list (SCM x) | |
475 | { | |
476 | scm_error (scm_arg_type_key, "apply", "Apply to non-list: ~S", | |
477 | scm_list_1 (x), scm_list_1 (x)); | |
478 | } | |
479 | ||
480 | static void | |
481 | vm_error_kwargs_length_not_even (SCM proc) | |
482 | { | |
483 | scm_error_scm (sym_keyword_argument_error, proc, | |
484 | scm_from_latin1_string ("Odd length of keyword argument list"), | |
485 | SCM_EOL, SCM_BOOL_F); | |
486 | } | |
487 | ||
488 | static void | |
4af0d97e | 489 | vm_error_kwargs_invalid_keyword (SCM proc, SCM obj) |
53bdfcf0 AW |
490 | { |
491 | scm_error_scm (sym_keyword_argument_error, proc, | |
492 | scm_from_latin1_string ("Invalid keyword"), | |
4af0d97e | 493 | SCM_EOL, scm_list_1 (obj)); |
53bdfcf0 AW |
494 | } |
495 | ||
496 | static void | |
4af0d97e | 497 | vm_error_kwargs_unrecognized_keyword (SCM proc, SCM kw) |
53bdfcf0 AW |
498 | { |
499 | scm_error_scm (sym_keyword_argument_error, proc, | |
500 | scm_from_latin1_string ("Unrecognized keyword"), | |
4af0d97e | 501 | SCM_EOL, scm_list_1 (kw)); |
53bdfcf0 AW |
502 | } |
503 | ||
504 | static void | |
505 | vm_error_too_many_args (int nargs) | |
506 | { | |
507 | vm_error ("VM: Too many arguments", scm_from_int (nargs)); | |
508 | } | |
509 | ||
510 | static void | |
511 | vm_error_wrong_num_args (SCM proc) | |
512 | { | |
513 | scm_wrong_num_args (proc); | |
514 | } | |
515 | ||
516 | static void | |
517 | vm_error_wrong_type_apply (SCM proc) | |
518 | { | |
519 | scm_error (scm_arg_type_key, NULL, "Wrong type to apply: ~S", | |
520 | scm_list_1 (proc), scm_list_1 (proc)); | |
521 | } | |
522 | ||
523 | static void | |
524 | vm_error_stack_overflow (struct scm_vm *vp) | |
525 | { | |
526 | if (vp->stack_limit < vp->stack_base + vp->stack_size) | |
527 | /* There are VM_STACK_RESERVE_SIZE bytes left. Make them available so | |
528 | that `throw' below can run on this VM. */ | |
529 | vp->stack_limit = vp->stack_base + vp->stack_size; | |
530 | else | |
531 | /* There is no space left on the stack. FIXME: Do something more | |
532 | sensible here! */ | |
533 | abort (); | |
534 | vm_error ("VM: Stack overflow", SCM_UNDEFINED); | |
535 | } | |
536 | ||
537 | static void | |
538 | vm_error_stack_underflow (void) | |
539 | { | |
540 | vm_error ("VM: Stack underflow", SCM_UNDEFINED); | |
541 | } | |
542 | ||
543 | static void | |
544 | vm_error_improper_list (SCM x) | |
545 | { | |
546 | vm_error ("Expected a proper list, but got object with tail ~s", x); | |
547 | } | |
548 | ||
549 | static void | |
550 | vm_error_not_a_pair (const char *subr, SCM x) | |
551 | { | |
552 | scm_wrong_type_arg_msg (subr, 1, x, "pair"); | |
553 | } | |
554 | ||
555 | static void | |
556 | vm_error_not_a_bytevector (const char *subr, SCM x) | |
557 | { | |
558 | scm_wrong_type_arg_msg (subr, 1, x, "bytevector"); | |
559 | } | |
560 | ||
561 | static void | |
562 | vm_error_not_a_struct (const char *subr, SCM x) | |
563 | { | |
564 | scm_wrong_type_arg_msg (subr, 1, x, "struct"); | |
565 | } | |
566 | ||
567 | static void | |
568 | vm_error_no_values (void) | |
569 | { | |
570 | vm_error ("Zero values returned to single-valued continuation", | |
571 | SCM_UNDEFINED); | |
572 | } | |
573 | ||
574 | static void | |
575 | vm_error_not_enough_values (void) | |
576 | { | |
577 | vm_error ("Too few values returned to continuation", SCM_UNDEFINED); | |
578 | } | |
579 | ||
82f4bac4 AW |
580 | static void |
581 | vm_error_wrong_number_of_values (scm_t_uint32 expected) | |
582 | { | |
583 | vm_error ("Wrong number of values returned to continuation (expected ~a)", | |
584 | scm_from_uint32 (expected)); | |
585 | } | |
586 | ||
53bdfcf0 AW |
587 | static void |
588 | vm_error_continuation_not_rewindable (SCM cont) | |
589 | { | |
590 | vm_error ("Unrewindable partial continuation", cont); | |
591 | } | |
592 | ||
593 | static void | |
594 | vm_error_bad_wide_string_length (size_t len) | |
595 | { | |
596 | vm_error ("VM: Bad wide string length: ~S", scm_from_size_t (len)); | |
597 | } | |
598 | ||
53bdfcf0 AW |
599 | |
600 | \f | |
28b119ee | 601 | |
67b699cc | 602 | static SCM boot_continuation; |
2fda0242 | 603 | |
510ca126 AW |
604 | static SCM rtl_boot_continuation; |
605 | static SCM rtl_apply; | |
606 | static SCM rtl_values; | |
607 | ||
608 | static const scm_t_uint32 rtl_boot_continuation_code[] = { | |
7396d216 | 609 | SCM_PACK_RTL_24 (scm_rtl_op_halt, 0) |
510ca126 AW |
610 | }; |
611 | ||
510ca126 | 612 | static const scm_t_uint32 rtl_apply_code[] = { |
adb8d905 | 613 | SCM_PACK_RTL_24 (scm_rtl_op_tail_apply, 0) /* proc in r1, args from r2, nargs set */ |
510ca126 AW |
614 | }; |
615 | ||
616 | static const scm_t_uint32 rtl_values_code[] = { | |
af95414f | 617 | SCM_PACK_RTL_24 (scm_rtl_op_return_values, 0) /* vals from r1 */ |
510ca126 AW |
618 | }; |
619 | ||
620 | ||
a98cef7e KN |
621 | \f |
622 | /* | |
623 | * VM | |
624 | */ | |
625 | ||
b7393ea1 | 626 | static SCM |
b782ed01 | 627 | resolve_variable (SCM what, SCM module) |
b7393ea1 | 628 | { |
9bd48cb1 | 629 | if (SCM_LIKELY (scm_is_symbol (what))) |
b7393ea1 | 630 | { |
b782ed01 AW |
631 | if (scm_is_true (module)) |
632 | return scm_module_lookup (module, what); | |
b7393ea1 | 633 | else |
62e15979 | 634 | return scm_module_lookup (scm_the_root_module (), what); |
b7393ea1 AW |
635 | } |
636 | else | |
637 | { | |
b782ed01 AW |
638 | SCM modname, sym, public; |
639 | ||
640 | modname = SCM_CAR (what); | |
641 | sym = SCM_CADR (what); | |
642 | public = SCM_CADDR (what); | |
643 | ||
d6fbf0c0 AW |
644 | if (!scm_module_system_booted_p) |
645 | { | |
646 | #ifdef VM_ENABLE_PARANOID_ASSERTIONS | |
647 | ASSERT (scm_is_false (public)); | |
648 | ASSERT (scm_is_true | |
649 | (scm_equal_p (modname, | |
650 | scm_list_1 (scm_from_utf8_symbol ("guile"))))); | |
651 | #endif | |
652 | return scm_lookup (sym); | |
653 | } | |
654 | else if (scm_is_true (public)) | |
b782ed01 AW |
655 | return scm_public_lookup (modname, sym); |
656 | else | |
657 | return scm_private_lookup (modname, sym); | |
b7393ea1 AW |
658 | } |
659 | } | |
660 | ||
aab9d46c | 661 | #define VM_MIN_STACK_SIZE (1024) |
51e9ba2f | 662 | #define VM_DEFAULT_STACK_SIZE (64 * 1024) |
aab9d46c SIT |
663 | static size_t vm_stack_size = VM_DEFAULT_STACK_SIZE; |
664 | ||
665 | static void | |
666 | initialize_default_stack_size (void) | |
667 | { | |
668 | int size = scm_getenv_int ("GUILE_STACK_SIZE", vm_stack_size); | |
669 | if (size >= VM_MIN_STACK_SIZE) | |
670 | vm_stack_size = size; | |
671 | } | |
17e90c5e | 672 | |
17e90c5e | 673 | #define VM_NAME vm_regular_engine |
510ca126 | 674 | #define RTL_VM_NAME rtl_vm_regular_engine |
6d14383e AW |
675 | #define FUNC_NAME "vm-regular-engine" |
676 | #define VM_ENGINE SCM_VM_REGULAR_ENGINE | |
83495480 | 677 | #include "vm-engine.c" |
17e90c5e | 678 | #undef VM_NAME |
510ca126 | 679 | #undef RTL_VM_NAME |
6d14383e | 680 | #undef FUNC_NAME |
17e90c5e | 681 | #undef VM_ENGINE |
17e90c5e KN |
682 | |
683 | #define VM_NAME vm_debug_engine | |
510ca126 | 684 | #define RTL_VM_NAME rtl_vm_debug_engine |
6d14383e AW |
685 | #define FUNC_NAME "vm-debug-engine" |
686 | #define VM_ENGINE SCM_VM_DEBUG_ENGINE | |
83495480 | 687 | #include "vm-engine.c" |
17e90c5e | 688 | #undef VM_NAME |
510ca126 | 689 | #undef RTL_VM_NAME |
6d14383e | 690 | #undef FUNC_NAME |
17e90c5e KN |
691 | #undef VM_ENGINE |
692 | ||
6d14383e AW |
693 | static const scm_t_vm_engine vm_engines[] = |
694 | { vm_regular_engine, vm_debug_engine }; | |
695 | ||
73c3db66 AW |
696 | typedef SCM (*scm_t_rtl_vm_engine) (SCM vm, SCM program, SCM *argv, size_t nargs); |
697 | ||
698 | static const scm_t_rtl_vm_engine rtl_vm_engines[] = | |
699 | { rtl_vm_regular_engine, rtl_vm_debug_engine }; | |
700 | ||
e3eb628d LC |
701 | #ifdef VM_ENABLE_PRECISE_STACK_GC_SCAN |
702 | ||
703 | /* The GC "kind" for the VM stack. */ | |
704 | static int vm_stack_gc_kind; | |
705 | ||
706 | #endif | |
707 | ||
a98cef7e | 708 | static SCM |
17e90c5e KN |
709 | make_vm (void) |
710 | #define FUNC_NAME "make_vm" | |
a98cef7e | 711 | { |
17e90c5e | 712 | int i; |
7f991c7d | 713 | struct scm_vm *vp; |
747a1635 | 714 | |
7f991c7d | 715 | vp = scm_gc_malloc (sizeof (struct scm_vm), "vm"); |
d8eeb67c | 716 | |
aab9d46c | 717 | vp->stack_size= vm_stack_size; |
e3eb628d LC |
718 | |
719 | #ifdef VM_ENABLE_PRECISE_STACK_GC_SCAN | |
4168aa46 TTN |
720 | vp->stack_base = (SCM *) |
721 | GC_generic_malloc (vp->stack_size * sizeof (SCM), vm_stack_gc_kind); | |
e3eb628d LC |
722 | |
723 | /* Keep a pointer to VP so that `vm_stack_mark ()' can know what the stack | |
724 | top is. */ | |
21041372 | 725 | *vp->stack_base = SCM_PACK_POINTER (vp); |
e3eb628d LC |
726 | vp->stack_base++; |
727 | vp->stack_size--; | |
728 | #else | |
d8eeb67c LC |
729 | vp->stack_base = scm_gc_malloc (vp->stack_size * sizeof (SCM), |
730 | "stack-base"); | |
e3eb628d LC |
731 | #endif |
732 | ||
2bbe1533 AW |
733 | #ifdef VM_ENABLE_STACK_NULLING |
734 | memset (vp->stack_base, 0, vp->stack_size * sizeof (SCM)); | |
735 | #endif | |
f1046e6b | 736 | vp->stack_limit = vp->stack_base + vp->stack_size - VM_STACK_RESERVE_SIZE; |
3616e9e9 KN |
737 | vp->ip = NULL; |
738 | vp->sp = vp->stack_base - 1; | |
739 | vp->fp = NULL; | |
ea9f4f4b | 740 | vp->engine = vm_default_engine; |
7656f194 | 741 | vp->trace_level = 0; |
17e90c5e | 742 | for (i = 0; i < SCM_VM_NUM_HOOKS; i++) |
3d5ee0cd | 743 | vp->hooks[i] = SCM_BOOL_F; |
6f3b0cc2 | 744 | return scm_cell (scm_tc7_vm, (scm_t_bits)vp); |
a98cef7e | 745 | } |
17e90c5e | 746 | #undef FUNC_NAME |
a98cef7e | 747 | |
e3eb628d LC |
748 | #ifdef VM_ENABLE_PRECISE_STACK_GC_SCAN |
749 | ||
750 | /* Mark the VM stack region between its base and its current top. */ | |
751 | static struct GC_ms_entry * | |
752 | vm_stack_mark (GC_word *addr, struct GC_ms_entry *mark_stack_ptr, | |
753 | struct GC_ms_entry *mark_stack_limit, GC_word env) | |
754 | { | |
755 | GC_word *word; | |
756 | const struct scm_vm *vm; | |
757 | ||
758 | /* The first word of the VM stack should contain a pointer to the | |
759 | corresponding VM. */ | |
760 | vm = * ((struct scm_vm **) addr); | |
761 | ||
8071c490 | 762 | if (vm == NULL |
f1046e6b | 763 | || (SCM *) addr != vm->stack_base - 1) |
e3eb628d LC |
764 | /* ADDR must be a pointer to a free-list element, which we must ignore |
765 | (see warning in <gc/gc_mark.h>). */ | |
766 | return mark_stack_ptr; | |
767 | ||
e3eb628d LC |
768 | for (word = (GC_word *) vm->stack_base; word <= (GC_word *) vm->sp; word++) |
769 | mark_stack_ptr = GC_MARK_AND_PUSH ((* (GC_word **) word), | |
770 | mark_stack_ptr, mark_stack_limit, | |
771 | NULL); | |
772 | ||
773 | return mark_stack_ptr; | |
774 | } | |
775 | ||
776 | #endif /* VM_ENABLE_PRECISE_STACK_GC_SCAN */ | |
777 | ||
778 | ||
6d14383e | 779 | SCM |
4abef68f | 780 | scm_c_vm_run (SCM vm, SCM program, SCM *argv, int nargs) |
6d14383e | 781 | { |
4abef68f | 782 | struct scm_vm *vp = SCM_VM_DATA (vm); |
b95d76fc | 783 | SCM_CHECK_STACK; |
73c3db66 AW |
784 | if (SCM_RTL_PROGRAM_P (program)) |
785 | return rtl_vm_engines[vp->engine](vm, program, argv, nargs); | |
786 | else | |
787 | return vm_engines[vp->engine](vm, program, argv, nargs); | |
6d14383e AW |
788 | } |
789 | ||
a98cef7e KN |
790 | /* Scheme interface */ |
791 | ||
271c3d31 LC |
792 | SCM_DEFINE (scm_the_vm, "the-vm", 0, 0, 0, |
793 | (void), | |
794 | "Return the current thread's VM.") | |
795 | #define FUNC_NAME s_scm_the_vm | |
796 | { | |
ea9f4f4b AW |
797 | scm_i_thread *t = SCM_I_CURRENT_THREAD; |
798 | ||
799 | if (SCM_UNLIKELY (scm_is_false (t->vm))) | |
800 | t->vm = make_vm (); | |
801 | ||
802 | return t->vm; | |
271c3d31 | 803 | } |
499a4c07 KN |
804 | #undef FUNC_NAME |
805 | ||
806 | ||
a98cef7e KN |
807 | SCM_DEFINE (scm_vm_p, "vm?", 1, 0, 0, |
808 | (SCM obj), | |
17e90c5e | 809 | "") |
a98cef7e KN |
810 | #define FUNC_NAME s_scm_vm_p |
811 | { | |
9bd48cb1 | 812 | return scm_from_bool (SCM_VM_P (obj)); |
a98cef7e KN |
813 | } |
814 | #undef FUNC_NAME | |
815 | ||
816 | SCM_DEFINE (scm_make_vm, "make-vm", 0, 0, 0, | |
17e90c5e KN |
817 | (void), |
818 | "") | |
819 | #define FUNC_NAME s_scm_make_vm, | |
a98cef7e | 820 | { |
17e90c5e | 821 | return make_vm (); |
a98cef7e KN |
822 | } |
823 | #undef FUNC_NAME | |
824 | ||
17e90c5e | 825 | SCM_DEFINE (scm_vm_ip, "vm:ip", 1, 0, 0, |
a98cef7e | 826 | (SCM vm), |
17e90c5e KN |
827 | "") |
828 | #define FUNC_NAME s_scm_vm_ip | |
a98cef7e KN |
829 | { |
830 | SCM_VALIDATE_VM (1, vm); | |
3d27ef4b | 831 | return scm_from_unsigned_integer ((scm_t_bits) SCM_VM_DATA (vm)->ip); |
a98cef7e KN |
832 | } |
833 | #undef FUNC_NAME | |
834 | ||
835 | SCM_DEFINE (scm_vm_sp, "vm:sp", 1, 0, 0, | |
836 | (SCM vm), | |
17e90c5e | 837 | "") |
a98cef7e KN |
838 | #define FUNC_NAME s_scm_vm_sp |
839 | { | |
840 | SCM_VALIDATE_VM (1, vm); | |
3d27ef4b | 841 | return scm_from_unsigned_integer ((scm_t_bits) SCM_VM_DATA (vm)->sp); |
a98cef7e KN |
842 | } |
843 | #undef FUNC_NAME | |
844 | ||
845 | SCM_DEFINE (scm_vm_fp, "vm:fp", 1, 0, 0, | |
846 | (SCM vm), | |
17e90c5e | 847 | "") |
a98cef7e KN |
848 | #define FUNC_NAME s_scm_vm_fp |
849 | { | |
850 | SCM_VALIDATE_VM (1, vm); | |
3d27ef4b | 851 | return scm_from_unsigned_integer ((scm_t_bits) SCM_VM_DATA (vm)->fp); |
a98cef7e KN |
852 | } |
853 | #undef FUNC_NAME | |
854 | ||
17e90c5e KN |
855 | #define VM_DEFINE_HOOK(n) \ |
856 | { \ | |
3d5ee0cd | 857 | struct scm_vm *vp; \ |
17e90c5e | 858 | SCM_VALIDATE_VM (1, vm); \ |
3d5ee0cd | 859 | vp = SCM_VM_DATA (vm); \ |
8b22ed7a | 860 | if (scm_is_false (vp->hooks[n])) \ |
238e7a11 | 861 | vp->hooks[n] = scm_make_hook (SCM_I_MAKINUM (1)); \ |
3d5ee0cd | 862 | return vp->hooks[n]; \ |
17e90c5e KN |
863 | } |
864 | ||
c45d4d77 | 865 | SCM_DEFINE (scm_vm_apply_hook, "vm-apply-hook", 1, 0, 0, |
17e90c5e KN |
866 | (SCM vm), |
867 | "") | |
c45d4d77 | 868 | #define FUNC_NAME s_scm_vm_apply_hook |
a98cef7e | 869 | { |
c45d4d77 | 870 | VM_DEFINE_HOOK (SCM_VM_APPLY_HOOK); |
a98cef7e KN |
871 | } |
872 | #undef FUNC_NAME | |
873 | ||
c45d4d77 | 874 | SCM_DEFINE (scm_vm_push_continuation_hook, "vm-push-continuation-hook", 1, 0, 0, |
17e90c5e KN |
875 | (SCM vm), |
876 | "") | |
c45d4d77 | 877 | #define FUNC_NAME s_scm_vm_push_continuation_hook |
a98cef7e | 878 | { |
c45d4d77 | 879 | VM_DEFINE_HOOK (SCM_VM_PUSH_CONTINUATION_HOOK); |
a98cef7e KN |
880 | } |
881 | #undef FUNC_NAME | |
882 | ||
c45d4d77 | 883 | SCM_DEFINE (scm_vm_pop_continuation_hook, "vm-pop-continuation-hook", 1, 0, 0, |
a98cef7e | 884 | (SCM vm), |
17e90c5e | 885 | "") |
c45d4d77 | 886 | #define FUNC_NAME s_scm_vm_pop_continuation_hook |
a98cef7e | 887 | { |
c45d4d77 | 888 | VM_DEFINE_HOOK (SCM_VM_POP_CONTINUATION_HOOK); |
a98cef7e KN |
889 | } |
890 | #undef FUNC_NAME | |
891 | ||
c45d4d77 | 892 | SCM_DEFINE (scm_vm_next_hook, "vm-next-hook", 1, 0, 0, |
a98cef7e | 893 | (SCM vm), |
17e90c5e | 894 | "") |
c45d4d77 | 895 | #define FUNC_NAME s_scm_vm_next_hook |
a98cef7e | 896 | { |
c45d4d77 | 897 | VM_DEFINE_HOOK (SCM_VM_NEXT_HOOK); |
a98cef7e KN |
898 | } |
899 | #undef FUNC_NAME | |
f3120251 AW |
900 | |
901 | SCM_DEFINE (scm_vm_abort_continuation_hook, "vm-abort-continuation-hook", 1, 0, 0, | |
902 | (SCM vm), | |
903 | "") | |
904 | #define FUNC_NAME s_scm_vm_abort_continuation_hook | |
905 | { | |
906 | VM_DEFINE_HOOK (SCM_VM_ABORT_CONTINUATION_HOOK); | |
907 | } | |
908 | #undef FUNC_NAME | |
909 | ||
910 | SCM_DEFINE (scm_vm_restore_continuation_hook, "vm-restore-continuation-hook", 1, 0, 0, | |
911 | (SCM vm), | |
912 | "") | |
913 | #define FUNC_NAME s_scm_vm_restore_continuation_hook | |
914 | { | |
915 | VM_DEFINE_HOOK (SCM_VM_RESTORE_CONTINUATION_HOOK); | |
916 | } | |
917 | #undef FUNC_NAME | |
a98cef7e | 918 | |
7656f194 | 919 | SCM_DEFINE (scm_vm_trace_level, "vm-trace-level", 1, 0, 0, |
17e90c5e KN |
920 | (SCM vm), |
921 | "") | |
7656f194 | 922 | #define FUNC_NAME s_scm_vm_trace_level |
a98cef7e | 923 | { |
a98cef7e | 924 | SCM_VALIDATE_VM (1, vm); |
7656f194 AW |
925 | return scm_from_int (SCM_VM_DATA (vm)->trace_level); |
926 | } | |
927 | #undef FUNC_NAME | |
928 | ||
929 | SCM_DEFINE (scm_set_vm_trace_level_x, "set-vm-trace-level!", 2, 0, 0, | |
930 | (SCM vm, SCM level), | |
931 | "") | |
932 | #define FUNC_NAME s_scm_set_vm_trace_level_x | |
933 | { | |
934 | SCM_VALIDATE_VM (1, vm); | |
935 | SCM_VM_DATA (vm)->trace_level = scm_to_int (level); | |
936 | return SCM_UNSPECIFIED; | |
a98cef7e KN |
937 | } |
938 | #undef FUNC_NAME | |
939 | ||
940 | \f | |
ea9f4f4b AW |
941 | /* |
942 | * VM engines | |
943 | */ | |
944 | ||
945 | static int | |
946 | symbol_to_vm_engine (SCM engine, const char *FUNC_NAME) | |
947 | { | |
948 | if (scm_is_eq (engine, sym_regular)) | |
949 | return SCM_VM_REGULAR_ENGINE; | |
950 | else if (scm_is_eq (engine, sym_debug)) | |
951 | return SCM_VM_DEBUG_ENGINE; | |
952 | else | |
953 | SCM_MISC_ERROR ("Unknown VM engine: ~a", scm_list_1 (engine)); | |
954 | } | |
955 | ||
956 | static SCM | |
957 | vm_engine_to_symbol (int engine, const char *FUNC_NAME) | |
958 | { | |
959 | switch (engine) | |
960 | { | |
961 | case SCM_VM_REGULAR_ENGINE: | |
962 | return sym_regular; | |
963 | case SCM_VM_DEBUG_ENGINE: | |
964 | return sym_debug; | |
965 | default: | |
966 | /* ? */ | |
967 | SCM_MISC_ERROR ("Unknown VM engine: ~a", | |
968 | scm_list_1 (scm_from_int (engine))); | |
969 | } | |
970 | } | |
971 | ||
ea9f4f4b AW |
972 | SCM_DEFINE (scm_vm_engine, "vm-engine", 1, 0, 0, |
973 | (SCM vm), | |
974 | "") | |
975 | #define FUNC_NAME s_scm_vm_engine | |
976 | { | |
977 | SCM_VALIDATE_VM (1, vm); | |
978 | return vm_engine_to_symbol (SCM_VM_DATA (vm)->engine, FUNC_NAME); | |
979 | } | |
980 | #undef FUNC_NAME | |
981 | ||
982 | void | |
983 | scm_c_set_vm_engine_x (SCM vm, int engine) | |
984 | #define FUNC_NAME "set-vm-engine!" | |
985 | { | |
986 | SCM_VALIDATE_VM (1, vm); | |
987 | ||
ea9f4f4b AW |
988 | if (engine < 0 || engine >= SCM_VM_NUM_ENGINES) |
989 | SCM_MISC_ERROR ("Unknown VM engine: ~a", | |
990 | scm_list_1 (scm_from_int (engine))); | |
991 | ||
992 | SCM_VM_DATA (vm)->engine = engine; | |
993 | } | |
994 | #undef FUNC_NAME | |
995 | ||
996 | SCM_DEFINE (scm_set_vm_engine_x, "set-vm-engine!", 2, 0, 0, | |
997 | (SCM vm, SCM engine), | |
998 | "") | |
999 | #define FUNC_NAME s_scm_set_vm_engine_x | |
1000 | { | |
1001 | scm_c_set_vm_engine_x (vm, symbol_to_vm_engine (engine, FUNC_NAME)); | |
1002 | return SCM_UNSPECIFIED; | |
1003 | } | |
1004 | #undef FUNC_NAME | |
1005 | ||
1006 | void | |
1007 | scm_c_set_default_vm_engine_x (int engine) | |
1008 | #define FUNC_NAME "set-default-vm-engine!" | |
1009 | { | |
1010 | if (engine < 0 || engine >= SCM_VM_NUM_ENGINES) | |
1011 | SCM_MISC_ERROR ("Unknown VM engine: ~a", | |
1012 | scm_list_1 (scm_from_int (engine))); | |
1013 | ||
1014 | vm_default_engine = engine; | |
1015 | } | |
1016 | #undef FUNC_NAME | |
1017 | ||
1018 | SCM_DEFINE (scm_set_default_vm_engine_x, "set-default-vm-engine!", 1, 0, 0, | |
1019 | (SCM engine), | |
1020 | "") | |
1021 | #define FUNC_NAME s_scm_set_default_vm_engine_x | |
1022 | { | |
1023 | scm_c_set_default_vm_engine_x (symbol_to_vm_engine (engine, FUNC_NAME)); | |
1024 | return SCM_UNSPECIFIED; | |
1025 | } | |
1026 | #undef FUNC_NAME | |
1027 | ||
1028 | static void reinstate_vm (SCM vm) | |
1029 | { | |
1030 | scm_i_thread *t = SCM_I_CURRENT_THREAD; | |
1031 | t->vm = vm; | |
1032 | } | |
1033 | ||
1034 | SCM_DEFINE (scm_call_with_vm, "call-with-vm", 2, 0, 1, | |
1035 | (SCM vm, SCM proc, SCM args), | |
1036 | "Apply @var{proc} to @var{args} in a dynamic extent in which\n" | |
1037 | "@var{vm} is the current VM.\n\n" | |
1038 | "As an implementation restriction, if @var{vm} is not the same\n" | |
1039 | "as the current thread's VM, continuations captured within the\n" | |
1040 | "call to @var{proc} may not be reinstated once control leaves\n" | |
1041 | "@var{proc}.") | |
1042 | #define FUNC_NAME s_scm_call_with_vm | |
1043 | { | |
1044 | SCM prev_vm, ret; | |
1045 | SCM *argv; | |
1046 | int i, nargs; | |
1047 | scm_t_wind_flags flags; | |
1048 | scm_i_thread *t = SCM_I_CURRENT_THREAD; | |
1049 | ||
1050 | SCM_VALIDATE_VM (1, vm); | |
1051 | SCM_VALIDATE_PROC (2, proc); | |
1052 | ||
1053 | nargs = scm_ilength (args); | |
1054 | if (SCM_UNLIKELY (nargs < 0)) | |
1055 | scm_wrong_type_arg_msg (FUNC_NAME, 3, args, "list"); | |
1056 | ||
1057 | argv = alloca (nargs * sizeof(SCM)); | |
1058 | for (i = 0; i < nargs; i++) | |
1059 | { | |
1060 | argv[i] = SCM_CAR (args); | |
1061 | args = SCM_CDR (args); | |
1062 | } | |
1063 | ||
1064 | prev_vm = t->vm; | |
1065 | ||
1066 | /* Reentry can happen via invokation of a saved continuation, but | |
1067 | continuations only save the state of the VM that they are in at | |
1068 | capture-time, which might be different from this one. So, in the | |
1069 | case that the VMs are different, set up a non-rewindable frame to | |
1070 | prevent reinstating an incomplete continuation. */ | |
1071 | flags = scm_is_eq (prev_vm, vm) ? 0 : SCM_F_WIND_EXPLICITLY; | |
1072 | if (flags) | |
1073 | { | |
1074 | scm_dynwind_begin (0); | |
1075 | scm_dynwind_unwind_handler_with_scm (reinstate_vm, prev_vm, flags); | |
1076 | t->vm = vm; | |
1077 | } | |
1078 | ||
1079 | ret = scm_c_vm_run (vm, proc, argv, nargs); | |
1080 | ||
1081 | if (flags) | |
1082 | scm_dynwind_end (); | |
1083 | ||
1084 | return ret; | |
1085 | } | |
1086 | #undef FUNC_NAME | |
1087 | ||
1088 | \f | |
a98cef7e | 1089 | /* |
17e90c5e | 1090 | * Initialize |
a98cef7e KN |
1091 | */ |
1092 | ||
07e56b27 AW |
1093 | SCM scm_load_compiled_with_vm (SCM file) |
1094 | { | |
b8bc86bc AW |
1095 | SCM program = scm_load_thunk_from_file (file); |
1096 | ||
4abef68f | 1097 | return scm_c_vm_run (scm_the_vm (), program, NULL, 0); |
07e56b27 AW |
1098 | } |
1099 | ||
67b699cc AW |
1100 | |
1101 | static SCM | |
1102 | make_boot_program (void) | |
1103 | { | |
1104 | struct scm_objcode *bp; | |
1105 | size_t bp_size; | |
1106 | SCM u8vec, ret; | |
968a9add AW |
1107 | |
1108 | const scm_t_uint8 text[] = { | |
67b699cc AW |
1109 | scm_op_make_int8_1, |
1110 | scm_op_halt | |
1111 | }; | |
1112 | ||
1113 | bp_size = sizeof (struct scm_objcode) + sizeof (text); | |
1114 | bp = scm_gc_malloc_pointerless (bp_size, "boot-program"); | |
1115 | memcpy (SCM_C_OBJCODE_BASE (bp), text, sizeof (text)); | |
1116 | bp->len = sizeof(text); | |
1117 | bp->metalen = 0; | |
1118 | ||
968a9add | 1119 | u8vec = scm_c_take_gc_bytevector ((scm_t_int8*)bp, bp_size, SCM_BOOL_F); |
b8bc86bc | 1120 | ret = scm_make_program (scm_bytecode_to_objcode (u8vec, SCM_UNDEFINED), |
67b699cc AW |
1121 | SCM_BOOL_F, SCM_BOOL_F); |
1122 | SCM_SET_CELL_WORD_0 (ret, (SCM_CELL_WORD_0 (ret) | SCM_F_PROGRAM_IS_BOOT)); | |
1123 | ||
1124 | return ret; | |
1125 | } | |
1126 | ||
17e90c5e | 1127 | void |
07e56b27 | 1128 | scm_bootstrap_vm (void) |
17e90c5e | 1129 | { |
44602b08 AW |
1130 | scm_c_register_extension ("libguile-" SCM_EFFECTIVE_VERSION, |
1131 | "scm_init_vm", | |
60ae5ca2 AW |
1132 | (scm_t_extension_init_func)scm_init_vm, NULL); |
1133 | ||
aab9d46c SIT |
1134 | initialize_default_stack_size (); |
1135 | ||
4a655e50 AW |
1136 | sym_vm_run = scm_from_latin1_symbol ("vm-run"); |
1137 | sym_vm_error = scm_from_latin1_symbol ("vm-error"); | |
1138 | sym_keyword_argument_error = scm_from_latin1_symbol ("keyword-argument-error"); | |
1139 | sym_regular = scm_from_latin1_symbol ("regular"); | |
1140 | sym_debug = scm_from_latin1_symbol ("debug"); | |
0404c97d | 1141 | |
67b699cc AW |
1142 | boot_continuation = make_boot_program (); |
1143 | ||
73c3db66 AW |
1144 | rtl_boot_continuation = scm_i_make_rtl_program (rtl_boot_continuation_code); |
1145 | SCM_SET_CELL_WORD_0 (rtl_boot_continuation, | |
1146 | (SCM_CELL_WORD_0 (rtl_boot_continuation) | |
1147 | | SCM_F_PROGRAM_IS_BOOT)); | |
1148 | rtl_apply = scm_i_make_rtl_program (rtl_apply_code); | |
1149 | rtl_values = scm_i_make_rtl_program (rtl_values_code); | |
1150 | ||
e3eb628d LC |
1151 | #ifdef VM_ENABLE_PRECISE_STACK_GC_SCAN |
1152 | vm_stack_gc_kind = | |
1153 | GC_new_kind (GC_new_free_list (), | |
1154 | GC_MAKE_PROC (GC_new_proc (vm_stack_mark), 0), | |
1155 | 0, 1); | |
1156 | ||
1157 | #endif | |
07e56b27 AW |
1158 | } |
1159 | ||
1160 | void | |
1161 | scm_init_vm (void) | |
1162 | { | |
17e90c5e | 1163 | #ifndef SCM_MAGIC_SNARFER |
aeeff258 | 1164 | #include "libguile/vm.x" |
17e90c5e | 1165 | #endif |
a98cef7e | 1166 | } |
17e90c5e KN |
1167 | |
1168 | /* | |
1169 | Local Variables: | |
1170 | c-file-style: "gnu" | |
1171 | End: | |
1172 | */ |