blob: 2a34f20a5d8b54f31777907de577e909a93d997c [file] [log] [blame]
Rob Pikeaeb43982008-06-21 15:36:23 -07001// Copyright 2009 The Go Authors. All rights reserved.
2// Use of this source code is governed by a BSD-style
3// license that can be found in the LICENSE file.
4
5#include "runtime.h"
Russ Cox851f3012011-12-16 15:33:58 -05006#include "defs_GOOS_GOARCH.h"
7#include "os_GOOS.h"
Russ Coxe9d62a62013-03-14 11:35:13 -07008#include "signal_unix.h"
Russ Cox820dc9f2011-02-24 13:46:44 -08009#include "stack.h"
Russ Coxd28acc42008-08-04 16:43:49 -070010
Russ Cox68b42552010-11-04 14:00:19 -040011extern SigTab runtime·sigtab[];
Russ Cox5963dba2010-04-08 18:15:30 -070012
Russ Coxc7f7bbb2013-02-15 12:18:33 -050013static Sigset sigset_none;
Russ Cox224f05b2012-02-23 14:44:06 -050014static Sigset sigset_all = ~(Sigset)0;
Russ Cox6e2ae0a2012-02-28 16:18:24 -050015static Sigset sigset_prof = 1<<(SIGPROF-1);
Russ Cox224f05b2012-02-23 14:44:06 -050016
Russ Coxd28acc42008-08-04 16:43:49 -070017static void
18unimplemented(int8 *name)
19{
Russ Cox68b42552010-11-04 14:00:19 -040020 runtime·prints(name);
21 runtime·prints(" not implemented\n");
Russ Coxd28acc42008-08-04 16:43:49 -070022 *(int32*)1231 = 1231;
23}
24
Russ Cox3b860262011-11-09 15:17:05 -050025int32
26runtime·semasleep(int64 ns)
Russ Coxd28acc42008-08-04 16:43:49 -070027{
Russ Cox6e2ae0a2012-02-28 16:18:24 -050028 int32 v;
29
30 if(m->profilehz > 0)
31 runtime·setprof(false);
32 v = runtime·mach_semacquire(m->waitsema, ns);
33 if(m->profilehz > 0)
34 runtime·setprof(true);
35 return v;
Russ Coxd28acc42008-08-04 16:43:49 -070036}
37
38void
Dmitriy Vyukovee24bfc2011-11-02 16:42:01 +030039runtime·semawakeup(M *mp)
Russ Coxd28acc42008-08-04 16:43:49 -070040{
Dmitriy Vyukovee24bfc2011-11-02 16:42:01 +030041 runtime·mach_semrelease(mp->waitsema);
Russ Coxd28acc42008-08-04 16:43:49 -070042}
43
Dmitriy Vyukovee24bfc2011-11-02 16:42:01 +030044uintptr
45runtime·semacreate(void)
Russ Cox62d627f2010-02-08 21:41:54 -080046{
Dmitriy Vyukovee24bfc2011-11-02 16:42:01 +030047 return runtime·mach_semcreate();
Russ Cox62d627f2010-02-08 21:41:54 -080048}
Russ Cox376898c2008-09-09 11:50:14 -070049
Russ Cox376898c2008-09-09 11:50:14 -070050// BSD interface for threading.
51void
Russ Cox68b42552010-11-04 14:00:19 -040052runtime·osinit(void)
Russ Cox376898c2008-09-09 11:50:14 -070053{
Shenghou Ma44fd1d12012-04-30 15:55:07 -040054 // bsdthread_register delayed until end of goenvs so that we
55 // can look at the environment first.
Russ Coxd324f212011-09-30 09:40:01 -040056
57 // Use sysctl to fetch hw.ncpu.
58 uint32 mib[2];
59 uint32 out;
60 int32 ret;
61 uintptr nout;
62
63 mib[0] = 6;
64 mib[1] = 3;
65 nout = sizeof out;
66 out = 0;
67 ret = runtime·sysctl(mib, 2, (byte*)&out, &nout, nil, 0);
68 if(ret >= 0)
69 runtime·ncpu = out;
Russ Coxd28acc42008-08-04 16:43:49 -070070}
71
72void
Keith Randalla5d40242013-03-12 10:47:44 -070073runtime·get_random_data(byte **rnd, int32 *rnd_len)
74{
75 static byte urandom_data[HashRandomBytes];
76 int32 fd;
77 fd = runtime·open("/dev/urandom", 0 /* O_RDONLY */, 0);
78 if(runtime·read(fd, urandom_data, HashRandomBytes) == HashRandomBytes) {
79 *rnd = urandom_data;
80 *rnd_len = HashRandomBytes;
81 } else {
82 *rnd = nil;
83 *rnd_len = 0;
84 }
85 runtime·close(fd);
86}
87
88void
Alex Brainmana41d8542011-01-12 11:48:15 +110089runtime·goenvs(void)
90{
91 runtime·goenvs_unix();
Shenghou Ma44fd1d12012-04-30 15:55:07 -040092
93 // Register our thread-creation callback (see sys_darwin_{amd64,386}.s)
94 // but only if we're not using cgo. If we are using cgo we need
Shenghou Ma7bec1a62013-04-24 04:46:14 +080095 // to let the C pthread library install its own thread-creation callback.
Shenghou Ma44fd1d12012-04-30 15:55:07 -040096 if(!runtime·iscgo) {
97 if(runtime·bsdthread_register() != 0) {
98 if(runtime·getenv("DYLD_INSERT_LIBRARIES"))
99 runtime·throw("runtime: bsdthread_register error (unset DYLD_INSERT_LIBRARIES)");
100 runtime·throw("runtime: bsdthread_register error");
101 }
102 }
103
Alex Brainmana41d8542011-01-12 11:48:15 +1100104}
105
106void
Russ Coxe6a3e222013-03-01 11:44:43 -0500107runtime·newosproc(M *mp, void *stk)
Russ Coxd28acc42008-08-04 16:43:49 -0700108{
Russ Cox4608feb2011-01-28 15:03:26 -0500109 int32 errno;
Russ Cox224f05b2012-02-23 14:44:06 -0500110 Sigset oset;
Russ Cox4608feb2011-01-28 15:03:26 -0500111
Jingcheng Zhang70e967b2012-12-19 00:30:29 +0800112 mp->tls[0] = mp->id; // so 386 asm can find it
Russ Cox8522a472009-06-17 15:15:55 -0700113 if(0){
Russ Coxe6a3e222013-03-01 11:44:43 -0500114 runtime·printf("newosproc stk=%p m=%p g=%p id=%d/%d ostk=%p\n",
115 stk, mp, mp->g0, mp->id, (int32)mp->tls[0], &mp);
Russ Cox8522a472009-06-17 15:15:55 -0700116 }
Russ Cox224f05b2012-02-23 14:44:06 -0500117
118 runtime·sigprocmask(SIG_SETMASK, &sigset_all, &oset);
Russ Coxe6a3e222013-03-01 11:44:43 -0500119 errno = runtime·bsdthread_create(stk, mp, mp->g0, runtime·mstart);
Russ Cox224f05b2012-02-23 14:44:06 -0500120 runtime·sigprocmask(SIG_SETMASK, &oset, nil);
Russ Cox6e2ae0a2012-02-28 16:18:24 -0500121
Russ Cox224f05b2012-02-23 14:44:06 -0500122 if(errno < 0) {
Russ Cox4608feb2011-01-28 15:03:26 -0500123 runtime·printf("runtime: failed to create new OS thread (have %d already; errno=%d)\n", runtime·mcount(), -errno);
124 runtime·throw("runtime.newosproc");
125 }
Russ Coxd28acc42008-08-04 16:43:49 -0700126}
127
Russ Coxa67258f2008-09-18 15:56:46 -0700128// Called to initialize a new m (including the bootstrap m).
Dmitriy Vyukova0955a22013-02-21 16:24:38 +0400129// Called on the parent thread (main thread in case of bootstrap), can allocate memory.
130void
131runtime·mpreinit(M *mp)
132{
133 mp->gsignal = runtime·malg(32*1024); // OS X wants >=8K, Linux >=2K
134}
135
136// Called to initialize a new m (including the bootstrap m).
137// Called on the new thread, can not allocate memory.
Russ Coxa67258f2008-09-18 15:56:46 -0700138void
Russ Cox68b42552010-11-04 14:00:19 -0400139runtime·minit(void)
Russ Coxa67258f2008-09-18 15:56:46 -0700140{
141 // Initialize signal handling.
Jan Ziak334bf952012-05-30 13:07:52 -0400142 runtime·signalstack((byte*)m->gsignal->stackguard - StackGuard, 32*1024);
Russ Cox6e2ae0a2012-02-28 16:18:24 -0500143
Russ Coxc7f7bbb2013-02-15 12:18:33 -0500144 runtime·sigprocmask(SIG_SETMASK, &sigset_none, nil);
Russ Coxf3407f42013-02-15 11:18:55 -0500145 runtime·setprof(m->profilehz > 0);
Russ Coxa67258f2008-09-18 15:56:46 -0700146}
147
Russ Cox6c976392013-02-20 17:48:23 -0500148// Called from dropm to undo the effect of an minit.
149void
150runtime·unminit(void)
151{
152 runtime·signalstack(nil, 0);
153}
154
Russ Cox376898c2008-09-09 11:50:14 -0700155// Mach IPC, to get at semaphores
156// Definitions are in /usr/include/mach on a Mac.
157
158static void
Russ Cox08cfcd12009-03-24 13:51:48 -0700159macherror(int32 r, int8 *fn)
Russ Coxd28acc42008-08-04 16:43:49 -0700160{
Russ Cox68b42552010-11-04 14:00:19 -0400161 runtime·printf("mach error %s: %d\n", fn, r);
162 runtime·throw("mach error");
Russ Cox376898c2008-09-09 11:50:14 -0700163}
164
165enum
166{
167 DebugMach = 0
168};
169
Russ Cox08cfcd12009-03-24 13:51:48 -0700170static MachNDR zerondr;
Russ Cox376898c2008-09-09 11:50:14 -0700171
172#define MACH_MSGH_BITS(a, b) ((a) | ((b)<<8))
173
Russ Cox08cfcd12009-03-24 13:51:48 -0700174static int32
175mach_msg(MachHeader *h,
176 int32 op,
177 uint32 send_size,
178 uint32 rcv_size,
179 uint32 rcv_name,
180 uint32 timeout,
181 uint32 notify)
Russ Cox376898c2008-09-09 11:50:14 -0700182{
183 // TODO: Loop on interrupt.
Russ Cox68b42552010-11-04 14:00:19 -0400184 return runtime·mach_msg_trap(h, op, send_size, rcv_size, rcv_name, timeout, notify);
Russ Cox376898c2008-09-09 11:50:14 -0700185}
186
Russ Cox376898c2008-09-09 11:50:14 -0700187// Mach RPC (MIG)
Russ Cox376898c2008-09-09 11:50:14 -0700188
189enum
190{
191 MinMachMsg = 48,
192 Reply = 100,
193};
194
195#pragma pack on
196typedef struct CodeMsg CodeMsg;
197struct CodeMsg
198{
Russ Cox08cfcd12009-03-24 13:51:48 -0700199 MachHeader h;
200 MachNDR NDR;
201 int32 code;
Russ Cox376898c2008-09-09 11:50:14 -0700202};
203#pragma pack off
204
Russ Cox08cfcd12009-03-24 13:51:48 -0700205static int32
206machcall(MachHeader *h, int32 maxsize, int32 rxsize)
Russ Cox376898c2008-09-09 11:50:14 -0700207{
208 uint32 *p;
209 int32 i, ret, id;
Russ Cox08cfcd12009-03-24 13:51:48 -0700210 uint32 port;
Russ Cox376898c2008-09-09 11:50:14 -0700211 CodeMsg *c;
212
213 if((port = m->machport) == 0){
Russ Cox68b42552010-11-04 14:00:19 -0400214 port = runtime·mach_reply_port();
Russ Cox376898c2008-09-09 11:50:14 -0700215 m->machport = port;
216 }
217
Russ Cox08cfcd12009-03-24 13:51:48 -0700218 h->msgh_bits |= MACH_MSGH_BITS(MACH_MSG_TYPE_COPY_SEND, MACH_MSG_TYPE_MAKE_SEND_ONCE);
219 h->msgh_local_port = port;
220 h->msgh_reserved = 0;
221 id = h->msgh_id;
Russ Cox376898c2008-09-09 11:50:14 -0700222
223 if(DebugMach){
224 p = (uint32*)h;
Russ Cox68b42552010-11-04 14:00:19 -0400225 runtime·prints("send:\t");
Russ Cox08cfcd12009-03-24 13:51:48 -0700226 for(i=0; i<h->msgh_size/sizeof(p[0]); i++){
Russ Cox68b42552010-11-04 14:00:19 -0400227 runtime·prints(" ");
228 runtime·printpointer((void*)p[i]);
Russ Cox376898c2008-09-09 11:50:14 -0700229 if(i%8 == 7)
Russ Cox68b42552010-11-04 14:00:19 -0400230 runtime·prints("\n\t");
Russ Cox376898c2008-09-09 11:50:14 -0700231 }
232 if(i%8)
Russ Cox68b42552010-11-04 14:00:19 -0400233 runtime·prints("\n");
Russ Cox376898c2008-09-09 11:50:14 -0700234 }
235
236 ret = mach_msg(h, MACH_SEND_MSG|MACH_RCV_MSG,
Russ Cox08cfcd12009-03-24 13:51:48 -0700237 h->msgh_size, maxsize, port, 0, 0);
Russ Cox376898c2008-09-09 11:50:14 -0700238 if(ret != 0){
239 if(DebugMach){
Russ Cox68b42552010-11-04 14:00:19 -0400240 runtime·prints("mach_msg error ");
241 runtime·printint(ret);
242 runtime·prints("\n");
Russ Cox376898c2008-09-09 11:50:14 -0700243 }
244 return ret;
245 }
246
247 if(DebugMach){
248 p = (uint32*)h;
Russ Cox68b42552010-11-04 14:00:19 -0400249 runtime·prints("recv:\t");
Russ Cox08cfcd12009-03-24 13:51:48 -0700250 for(i=0; i<h->msgh_size/sizeof(p[0]); i++){
Russ Cox68b42552010-11-04 14:00:19 -0400251 runtime·prints(" ");
252 runtime·printpointer((void*)p[i]);
Russ Cox376898c2008-09-09 11:50:14 -0700253 if(i%8 == 7)
Russ Cox68b42552010-11-04 14:00:19 -0400254 runtime·prints("\n\t");
Russ Cox376898c2008-09-09 11:50:14 -0700255 }
256 if(i%8)
Russ Cox68b42552010-11-04 14:00:19 -0400257 runtime·prints("\n");
Russ Cox376898c2008-09-09 11:50:14 -0700258 }
259
Russ Cox08cfcd12009-03-24 13:51:48 -0700260 if(h->msgh_id != id+Reply){
Russ Cox376898c2008-09-09 11:50:14 -0700261 if(DebugMach){
Russ Cox68b42552010-11-04 14:00:19 -0400262 runtime·prints("mach_msg reply id mismatch ");
263 runtime·printint(h->msgh_id);
264 runtime·prints(" != ");
265 runtime·printint(id+Reply);
266 runtime·prints("\n");
Russ Cox376898c2008-09-09 11:50:14 -0700267 }
268 return -303; // MIG_REPLY_MISMATCH
269 }
270
271 // Look for a response giving the return value.
272 // Any call can send this back with an error,
273 // and some calls only have return values so they
274 // send it back on success too. I don't quite see how
275 // you know it's one of these and not the full response
276 // format, so just look if the message is right.
277 c = (CodeMsg*)h;
Russ Cox08cfcd12009-03-24 13:51:48 -0700278 if(h->msgh_size == sizeof(CodeMsg)
279 && !(h->msgh_bits & MACH_MSGH_BITS_COMPLEX)){
Russ Cox376898c2008-09-09 11:50:14 -0700280 if(DebugMach){
Russ Cox68b42552010-11-04 14:00:19 -0400281 runtime·prints("mig result ");
282 runtime·printint(c->code);
283 runtime·prints("\n");
Russ Cox376898c2008-09-09 11:50:14 -0700284 }
285 return c->code;
286 }
287
Russ Cox08cfcd12009-03-24 13:51:48 -0700288 if(h->msgh_size != rxsize){
Russ Cox376898c2008-09-09 11:50:14 -0700289 if(DebugMach){
Russ Cox68b42552010-11-04 14:00:19 -0400290 runtime·prints("mach_msg reply size mismatch ");
291 runtime·printint(h->msgh_size);
292 runtime·prints(" != ");
293 runtime·printint(rxsize);
294 runtime·prints("\n");
Russ Cox376898c2008-09-09 11:50:14 -0700295 }
296 return -307; // MIG_ARRAY_TOO_LARGE
297 }
298
Russ Coxd28acc42008-08-04 16:43:49 -0700299 return 0;
300}
Russ Cox376898c2008-09-09 11:50:14 -0700301
302
303// Semaphores!
304
305enum
306{
Russ Cox1f8a40d2009-01-22 16:23:44 -0800307 Tmach_semcreate = 3418,
308 Rmach_semcreate = Tmach_semcreate + Reply,
Russ Cox376898c2008-09-09 11:50:14 -0700309
Russ Cox1f8a40d2009-01-22 16:23:44 -0800310 Tmach_semdestroy = 3419,
311 Rmach_semdestroy = Tmach_semdestroy + Reply,
Russ Coxcd800002009-06-08 14:03:21 -0700312
Russ Cox925183c2009-06-08 14:09:04 -0700313 // Mach calls that get interrupted by Unix signals
314 // return this error code. We retry them.
Russ Coxcd800002009-06-08 14:03:21 -0700315 KERN_ABORTED = 14,
Russ Cox3b860262011-11-09 15:17:05 -0500316 KERN_OPERATION_TIMED_OUT = 49,
Russ Cox376898c2008-09-09 11:50:14 -0700317};
318
Russ Cox1f8a40d2009-01-22 16:23:44 -0800319typedef struct Tmach_semcreateMsg Tmach_semcreateMsg;
320typedef struct Rmach_semcreateMsg Rmach_semcreateMsg;
321typedef struct Tmach_semdestroyMsg Tmach_semdestroyMsg;
322// Rmach_semdestroyMsg = CodeMsg
Russ Cox376898c2008-09-09 11:50:14 -0700323
324#pragma pack on
Russ Cox1f8a40d2009-01-22 16:23:44 -0800325struct Tmach_semcreateMsg
Russ Cox376898c2008-09-09 11:50:14 -0700326{
Russ Cox08cfcd12009-03-24 13:51:48 -0700327 MachHeader h;
328 MachNDR ndr;
Russ Cox376898c2008-09-09 11:50:14 -0700329 int32 policy;
330 int32 value;
331};
332
Russ Cox1f8a40d2009-01-22 16:23:44 -0800333struct Rmach_semcreateMsg
Russ Cox376898c2008-09-09 11:50:14 -0700334{
Russ Cox08cfcd12009-03-24 13:51:48 -0700335 MachHeader h;
336 MachBody body;
337 MachPort semaphore;
Russ Cox376898c2008-09-09 11:50:14 -0700338};
339
Russ Cox1f8a40d2009-01-22 16:23:44 -0800340struct Tmach_semdestroyMsg
Russ Cox376898c2008-09-09 11:50:14 -0700341{
Russ Cox08cfcd12009-03-24 13:51:48 -0700342 MachHeader h;
343 MachBody body;
344 MachPort semaphore;
Russ Cox376898c2008-09-09 11:50:14 -0700345};
346#pragma pack off
347
Russ Cox08cfcd12009-03-24 13:51:48 -0700348uint32
Russ Cox68b42552010-11-04 14:00:19 -0400349runtime·mach_semcreate(void)
Russ Cox376898c2008-09-09 11:50:14 -0700350{
351 union {
Russ Cox1f8a40d2009-01-22 16:23:44 -0800352 Tmach_semcreateMsg tx;
353 Rmach_semcreateMsg rx;
Russ Cox376898c2008-09-09 11:50:14 -0700354 uint8 pad[MinMachMsg];
355 } m;
Russ Cox08cfcd12009-03-24 13:51:48 -0700356 int32 r;
Russ Cox376898c2008-09-09 11:50:14 -0700357
Russ Cox08cfcd12009-03-24 13:51:48 -0700358 m.tx.h.msgh_bits = 0;
359 m.tx.h.msgh_size = sizeof(m.tx);
Russ Cox68b42552010-11-04 14:00:19 -0400360 m.tx.h.msgh_remote_port = runtime·mach_task_self();
Russ Cox08cfcd12009-03-24 13:51:48 -0700361 m.tx.h.msgh_id = Tmach_semcreate;
Russ Cox376898c2008-09-09 11:50:14 -0700362 m.tx.ndr = zerondr;
363
364 m.tx.policy = 0; // 0 = SYNC_POLICY_FIFO
365 m.tx.value = 0;
366
Russ Coxcd800002009-06-08 14:03:21 -0700367 while((r = machcall(&m.tx.h, sizeof m, sizeof(m.rx))) != 0){
368 if(r == KERN_ABORTED) // interrupted
369 continue;
Russ Cox376898c2008-09-09 11:50:14 -0700370 macherror(r, "semaphore_create");
Russ Coxcd800002009-06-08 14:03:21 -0700371 }
Russ Cox08cfcd12009-03-24 13:51:48 -0700372 if(m.rx.body.msgh_descriptor_count != 1)
Russ Cox1f8a40d2009-01-22 16:23:44 -0800373 unimplemented("mach_semcreate desc count");
Russ Cox376898c2008-09-09 11:50:14 -0700374 return m.rx.semaphore.name;
375}
376
377void
Russ Cox68b42552010-11-04 14:00:19 -0400378runtime·mach_semdestroy(uint32 sem)
Russ Cox376898c2008-09-09 11:50:14 -0700379{
380 union {
Russ Cox1f8a40d2009-01-22 16:23:44 -0800381 Tmach_semdestroyMsg tx;
Russ Cox376898c2008-09-09 11:50:14 -0700382 uint8 pad[MinMachMsg];
383 } m;
Russ Cox08cfcd12009-03-24 13:51:48 -0700384 int32 r;
Russ Cox376898c2008-09-09 11:50:14 -0700385
Russ Cox08cfcd12009-03-24 13:51:48 -0700386 m.tx.h.msgh_bits = MACH_MSGH_BITS_COMPLEX;
387 m.tx.h.msgh_size = sizeof(m.tx);
Russ Cox68b42552010-11-04 14:00:19 -0400388 m.tx.h.msgh_remote_port = runtime·mach_task_self();
Russ Cox08cfcd12009-03-24 13:51:48 -0700389 m.tx.h.msgh_id = Tmach_semdestroy;
390 m.tx.body.msgh_descriptor_count = 1;
Russ Cox376898c2008-09-09 11:50:14 -0700391 m.tx.semaphore.name = sem;
392 m.tx.semaphore.disposition = MACH_MSG_TYPE_MOVE_SEND;
393 m.tx.semaphore.type = 0;
394
Russ Coxcd800002009-06-08 14:03:21 -0700395 while((r = machcall(&m.tx.h, sizeof m, 0)) != 0){
Russ Cox3ff5e722009-07-27 10:59:59 -0700396 if(r == KERN_ABORTED) // interrupted
397 continue;
Russ Cox376898c2008-09-09 11:50:14 -0700398 macherror(r, "semaphore_destroy");
Russ Coxcd800002009-06-08 14:03:21 -0700399 }
Russ Cox376898c2008-09-09 11:50:14 -0700400}
401
Shenghou Mae0213572012-01-22 10:34:17 -0800402// The other calls have simple system call traps in sys_darwin_{amd64,386}.s
Russ Cox68b42552010-11-04 14:00:19 -0400403int32 runtime·mach_semaphore_wait(uint32 sema);
404int32 runtime·mach_semaphore_timedwait(uint32 sema, uint32 sec, uint32 nsec);
405int32 runtime·mach_semaphore_signal(uint32 sema);
406int32 runtime·mach_semaphore_signal_all(uint32 sema);
Russ Cox376898c2008-09-09 11:50:14 -0700407
Russ Cox3b860262011-11-09 15:17:05 -0500408int32
409runtime·mach_semacquire(uint32 sem, int64 ns)
Russ Cox376898c2008-09-09 11:50:14 -0700410{
Russ Cox08cfcd12009-03-24 13:51:48 -0700411 int32 r;
Rémy Oudomphengba50e4f2013-03-18 20:11:11 +0100412 int64 secs;
Russ Cox376898c2008-09-09 11:50:14 -0700413
Russ Cox3b860262011-11-09 15:17:05 -0500414 if(ns >= 0) {
Rémy Oudomphengba50e4f2013-03-18 20:11:11 +0100415 secs = ns/1000000000LL;
416 // Avoid overflow
417 if(secs > 1LL<<30)
418 secs = 1LL<<30;
419 r = runtime·mach_semaphore_timedwait(sem, secs, ns%1000000000LL);
Russ Cox3b860262011-11-09 15:17:05 -0500420 if(r == KERN_ABORTED || r == KERN_OPERATION_TIMED_OUT)
421 return -1;
422 if(r != 0)
423 macherror(r, "semaphore_wait");
424 return 0;
425 }
Russ Cox68b42552010-11-04 14:00:19 -0400426 while((r = runtime·mach_semaphore_wait(sem)) != 0) {
Russ Coxcd800002009-06-08 14:03:21 -0700427 if(r == KERN_ABORTED) // interrupted
428 continue;
Russ Cox376898c2008-09-09 11:50:14 -0700429 macherror(r, "semaphore_wait");
Russ Coxcd800002009-06-08 14:03:21 -0700430 }
Russ Cox3b860262011-11-09 15:17:05 -0500431 return 0;
Russ Cox376898c2008-09-09 11:50:14 -0700432}
433
434void
Russ Cox68b42552010-11-04 14:00:19 -0400435runtime·mach_semrelease(uint32 sem)
Russ Cox376898c2008-09-09 11:50:14 -0700436{
Russ Cox08cfcd12009-03-24 13:51:48 -0700437 int32 r;
Russ Cox376898c2008-09-09 11:50:14 -0700438
Russ Cox68b42552010-11-04 14:00:19 -0400439 while((r = runtime·mach_semaphore_signal(sem)) != 0) {
Russ Coxcd800002009-06-08 14:03:21 -0700440 if(r == KERN_ABORTED) // interrupted
441 continue;
Russ Cox376898c2008-09-09 11:50:14 -0700442 macherror(r, "semaphore_signal");
Russ Coxcd800002009-06-08 14:03:21 -0700443 }
Russ Cox376898c2008-09-09 11:50:14 -0700444}
445
Russ Cox5963dba2010-04-08 18:15:30 -0700446void
Russ Cox68b42552010-11-04 14:00:19 -0400447runtime·sigpanic(void)
Russ Cox5963dba2010-04-08 18:15:30 -0700448{
449 switch(g->sig) {
450 case SIGBUS:
Russ Cox5032a7d2012-01-10 11:46:57 -0800451 if(g->sigcode0 == BUS_ADRERR && g->sigcode1 < 0x1000) {
452 if(g->sigpc == 0)
453 runtime·panicstring("call of nil func value");
Russ Cox68b42552010-11-04 14:00:19 -0400454 runtime·panicstring("invalid memory address or nil pointer dereference");
Russ Cox5032a7d2012-01-10 11:46:57 -0800455 }
Russ Cox68b42552010-11-04 14:00:19 -0400456 runtime·printf("unexpected fault address %p\n", g->sigcode1);
457 runtime·throw("fault");
Russ Cox5963dba2010-04-08 18:15:30 -0700458 case SIGSEGV:
Russ Cox5032a7d2012-01-10 11:46:57 -0800459 if((g->sigcode0 == 0 || g->sigcode0 == SEGV_MAPERR || g->sigcode0 == SEGV_ACCERR) && g->sigcode1 < 0x1000) {
460 if(g->sigpc == 0)
461 runtime·panicstring("call of nil func value");
Russ Cox68b42552010-11-04 14:00:19 -0400462 runtime·panicstring("invalid memory address or nil pointer dereference");
Russ Cox5032a7d2012-01-10 11:46:57 -0800463 }
Russ Cox68b42552010-11-04 14:00:19 -0400464 runtime·printf("unexpected fault address %p\n", g->sigcode1);
465 runtime·throw("fault");
Russ Cox5963dba2010-04-08 18:15:30 -0700466 case SIGFPE:
467 switch(g->sigcode0) {
468 case FPE_INTDIV:
Russ Cox68b42552010-11-04 14:00:19 -0400469 runtime·panicstring("integer divide by zero");
Russ Cox5963dba2010-04-08 18:15:30 -0700470 case FPE_INTOVF:
Russ Cox68b42552010-11-04 14:00:19 -0400471 runtime·panicstring("integer overflow");
Russ Cox5963dba2010-04-08 18:15:30 -0700472 }
Russ Cox68b42552010-11-04 14:00:19 -0400473 runtime·panicstring("floating point error");
Russ Cox5963dba2010-04-08 18:15:30 -0700474 }
Russ Cox68b42552010-11-04 14:00:19 -0400475 runtime·panicstring(runtime·sigtab[g->sig].name);
Russ Cox5963dba2010-04-08 18:15:30 -0700476}
Rob Pike40c26ff2011-09-30 10:52:36 -0700477
Russ Cox86d509b2013-02-18 13:43:12 -0500478#pragma textflag 7
Rob Pike40c26ff2011-09-30 10:52:36 -0700479void
480runtime·osyield(void)
481{
Russ Cox86d509b2013-02-18 13:43:12 -0500482 runtime·usleep(1);
Rob Pike40c26ff2011-09-30 10:52:36 -0700483}
Russ Cox102274a2012-02-24 15:28:51 -0500484
485uintptr
486runtime·memlimit(void)
487{
488 // NOTE(rsc): Could use getrlimit here,
489 // like on FreeBSD or Linux, but Darwin doesn't enforce
490 // ulimit -v, so it's unclear why we'd try to stay within
491 // the limit.
492 return 0;
493}
Russ Cox6e2ae0a2012-02-28 16:18:24 -0500494
495// NOTE(rsc): On OS X, when the CPU profiling timer expires, the SIGPROF
496// signal is not guaranteed to be sent to the thread that was executing to
497// cause it to expire. It can and often does go to a sleeping thread, which is
498// not interesting for our profile. This is filed Apple Bug Report #9177434,
499// copied to http://code.google.com/p/go/source/detail?r=35b716c94225.
500// To work around this bug, we disable receipt of the profiling signal on
501// a thread while in blocking system calls. This forces the kernel to deliver
502// the profiling signal to an executing thread.
503//
504// The workaround fails on OS X machines using a 64-bit Snow Leopard kernel.
505// In that configuration, the kernel appears to want to deliver SIGPROF to the
506// sleeping threads regardless of signal mask and, worse, does not deliver
507// the signal until the thread wakes up on its own.
508//
509// If necessary, we can switch to using ITIMER_REAL for OS X and handle
510// the kernel-generated SIGALRM by generating our own SIGALRMs to deliver
511// to all the running threads. SIGALRM does not appear to be affected by
512// the 64-bit Snow Leopard bug. However, as of this writing Mountain Lion
513// is in preview, making Snow Leopard two versions old, so it is unclear how
514// much effort we need to spend on one buggy kernel.
515
516// Control whether profiling signal can be delivered to this thread.
517void
518runtime·setprof(bool on)
519{
520 if(on)
521 runtime·sigprocmask(SIG_UNBLOCK, &sigset_prof, nil);
522 else
523 runtime·sigprocmask(SIG_BLOCK, &sigset_prof, nil);
524}
Russ Cox9b732382012-03-08 12:12:40 -0500525
Russ Coxe9d62a62013-03-14 11:35:13 -0700526void
527runtime·setsig(int32 i, GoSighandler *fn, bool restart)
528{
529 Sigaction sa;
530
531 runtime·memclr((byte*)&sa, sizeof sa);
532 sa.sa_flags = SA_SIGINFO|SA_ONSTACK;
533 if(restart)
534 sa.sa_flags |= SA_RESTART;
535 sa.sa_mask = ~(uintptr)0;
536 sa.sa_tramp = (void*)runtime·sigtramp; // runtime·sigtramp's job is to call into real handler
537 *(uintptr*)sa.__sigaction_u = (uintptr)fn;
538 runtime·sigaction(i, &sa, nil);
539}
540
541GoSighandler*
542runtime·getsig(int32 i)
543{
544 Sigaction sa;
545
546 runtime·memclr((byte*)&sa, sizeof sa);
547 runtime·sigaction(i, nil, &sa);
548 return *(void**)sa.__sigaction_u;
549}
550
551void
552runtime·signalstack(byte *p, int32 n)
553{
554 StackT st;
555
556 st.ss_sp = (void*)p;
557 st.ss_size = n;
558 st.ss_flags = 0;
559 if(p == nil)
560 st.ss_flags = SS_DISABLE;
561 runtime·sigaltstack(&st, nil);
562}