blob: d02244896bcf8930ecd895a92a7b2ab5a5365b32 [file] [log] [blame]
ulan@chromium.org2efb9002012-01-19 15:36:35 +00001// Copyright 2012 the V8 project authors. All rights reserved.
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +00002// Redistribution and use in source and binary forms, with or without
3// modification, are permitted provided that the following conditions are
4// met:
5//
6// * Redistributions of source code must retain the above copyright
7// notice, this list of conditions and the following disclaimer.
8// * Redistributions in binary form must reproduce the above
9// copyright notice, this list of conditions and the following
10// disclaimer in the documentation and/or other materials provided
11// with the distribution.
12// * Neither the name of Google Inc. nor the names of its
13// contributors may be used to endorse or promote products derived
14// from this software without specific prior written permission.
15//
16// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
17// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
18// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
19// A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
20// OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
21// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
22// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
23// DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
24// THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
25// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
26// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
27
ager@chromium.orgbb29dc92009-03-24 13:25:23 +000028// Platform specific code for Linux goes here. For the POSIX comaptible parts
29// the implementation is in platform-posix.cc.
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +000030
31#include <pthread.h>
32#include <semaphore.h>
33#include <signal.h>
lrn@chromium.org5d00b602011-01-05 09:51:43 +000034#include <sys/prctl.h>
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +000035#include <sys/time.h>
36#include <sys/resource.h>
lrn@chromium.org303ada72010-10-27 09:33:13 +000037#include <sys/syscall.h>
ager@chromium.org381abbb2009-02-25 13:23:22 +000038#include <sys/types.h>
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +000039#include <stdlib.h>
40
41// Ubuntu Dapper requires memory pages to be marked as
42// executable. Otherwise, OS raises an exception when executing code
43// in that page.
44#include <sys/types.h> // mmap & munmap
ager@chromium.org236ad962008-09-25 09:45:57 +000045#include <sys/mman.h> // mmap & munmap
46#include <sys/stat.h> // open
ager@chromium.orgbb29dc92009-03-24 13:25:23 +000047#include <fcntl.h> // open
48#include <unistd.h> // sysconf
fschneider@chromium.org7d10be52012-04-10 12:30:14 +000049#if defined(__GLIBC__) && !defined(__UCLIBC__)
ager@chromium.org236ad962008-09-25 09:45:57 +000050#include <execinfo.h> // backtrace, backtrace_symbols
fschneider@chromium.org7d10be52012-04-10 12:30:14 +000051#endif // defined(__GLIBC__) && !defined(__UCLIBC__)
ager@chromium.org236ad962008-09-25 09:45:57 +000052#include <strings.h> // index
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +000053#include <errno.h>
54#include <stdarg.h>
55
mstarzinger@chromium.org471f2f12012-08-10 14:46:33 +000056// GLibc on ARM defines mcontext_t has a typedef for 'struct sigcontext'.
57// Old versions of the C library <signal.h> didn't define the type.
58#if defined(__ANDROID__) && !defined(__BIONIC_HAVE_UCONTEXT_T) && \
59 defined(__arm__) && !defined(__BIONIC_HAVE_STRUCT_SIGCONTEXT)
60#include <asm/sigcontext.h>
61#endif
62
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +000063#undef MAP_TYPE
64
65#include "v8.h"
66
danno@chromium.org8c0a43f2012-04-03 08:37:53 +000067#include "platform-posix.h"
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +000068#include "platform.h"
ager@chromium.orga1645e22009-09-09 19:27:10 +000069#include "v8threads.h"
kasperl@chromium.orga5551262010-12-07 12:49:48 +000070#include "vm-state-inl.h"
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +000071
72
kasperl@chromium.org71affb52009-05-26 05:44:31 +000073namespace v8 {
74namespace internal {
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +000075
76// 0 is never a valid thread id on Linux since tids and pids share a
77// name space and pid 0 is reserved (see man 2 kill).
78static const pthread_t kNoThread = (pthread_t) 0;
79
80
81double ceiling(double x) {
82 return ceil(x);
83}
84
85
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +000086static Mutex* limit_mutex = NULL;
87
88
danno@chromium.org8c0a43f2012-04-03 08:37:53 +000089void OS::PostSetUp() {
fschneider@chromium.org7d10be52012-04-10 12:30:14 +000090 POSIXPostSetUp();
danno@chromium.org8c0a43f2012-04-03 08:37:53 +000091}
92
93
ager@chromium.orgc4c92722009-11-18 14:12:51 +000094uint64_t OS::CpuFeaturesImpliedByPlatform() {
ager@chromium.orgc4c92722009-11-18 14:12:51 +000095 return 0; // Linux runs on anything.
ager@chromium.orgc4c92722009-11-18 14:12:51 +000096}
97
98
ager@chromium.orgc4c92722009-11-18 14:12:51 +000099#ifdef __arm__
lrn@chromium.orgfa943b72010-11-03 08:14:36 +0000100static bool CPUInfoContainsString(const char * search_string) {
ager@chromium.orgc4c92722009-11-18 14:12:51 +0000101 const char* file_name = "/proc/cpuinfo";
ager@chromium.orgc4c92722009-11-18 14:12:51 +0000102 // This is written as a straight shot one pass parser
103 // and not using STL string and ifstream because,
104 // on Linux, it's reading from a (non-mmap-able)
105 // character special device.
ager@chromium.orgc4c92722009-11-18 14:12:51 +0000106 FILE* f = NULL;
107 const char* what = search_string;
108
109 if (NULL == (f = fopen(file_name, "r")))
110 return false;
111
112 int k;
113 while (EOF != (k = fgetc(f))) {
114 if (k == *what) {
115 ++what;
116 while ((*what != '\0') && (*what == fgetc(f))) {
117 ++what;
118 }
119 if (*what == '\0') {
120 fclose(f);
121 return true;
122 } else {
123 what = search_string;
124 }
125 }
126 }
127 fclose(f);
128
129 // Did not find string in the proc file.
130 return false;
131}
lrn@chromium.orgfa943b72010-11-03 08:14:36 +0000132
sgjesse@chromium.org8e8294a2011-05-02 14:30:53 +0000133
lrn@chromium.orgfa943b72010-11-03 08:14:36 +0000134bool OS::ArmCpuHasFeature(CpuFeature feature) {
ager@chromium.org5f0c45f2010-12-17 08:51:21 +0000135 const char* search_string = NULL;
lrn@chromium.orgfa943b72010-11-03 08:14:36 +0000136 // Simple detection of VFP at runtime for Linux.
137 // It is based on /proc/cpuinfo, which reveals hardware configuration
138 // to user-space applications. According to ARM (mid 2009), no similar
139 // facility is universally available on the ARM architectures,
140 // so it's up to individual OSes to provide such.
141 switch (feature) {
verwaest@chromium.orgb6d052d2012-07-27 08:03:27 +0000142 case VFP2:
143 search_string = "vfp";
144 break;
lrn@chromium.orgfa943b72010-11-03 08:14:36 +0000145 case VFP3:
ager@chromium.org5f0c45f2010-12-17 08:51:21 +0000146 search_string = "vfpv3";
lrn@chromium.orgfa943b72010-11-03 08:14:36 +0000147 break;
148 case ARMv7:
ager@chromium.org5f0c45f2010-12-17 08:51:21 +0000149 search_string = "ARMv7";
lrn@chromium.orgfa943b72010-11-03 08:14:36 +0000150 break;
151 default:
152 UNREACHABLE();
153 }
154
ager@chromium.org5f0c45f2010-12-17 08:51:21 +0000155 if (CPUInfoContainsString(search_string)) {
156 return true;
157 }
158
159 if (feature == VFP3) {
160 // Some old kernels will report vfp not vfpv3. Here we make a last attempt
161 // to detect vfpv3 by checking for vfp *and* neon, since neon is only
162 // available on architectures with vfpv3.
163 // Checking neon on its own is not enough as it is possible to have neon
164 // without vfp.
165 if (CPUInfoContainsString("vfp") && CPUInfoContainsString("neon")) {
lrn@chromium.orgfa943b72010-11-03 08:14:36 +0000166 return true;
167 }
168 }
169
170 return false;
171}
sgjesse@chromium.org8e8294a2011-05-02 14:30:53 +0000172
173
sgjesse@chromium.org8e8294a2011-05-02 14:30:53 +0000174bool OS::ArmUsingHardFloat() {
yangguo@chromium.orgc74d6742012-06-29 15:15:45 +0000175 // GCC versions 4.6 and above define __ARM_PCS or __ARM_PCS_VFP to specify
176 // the Floating Point ABI used (PCS stands for Procedure Call Standard).
177 // We use these as well as a couple of other defines to statically determine
178 // what FP ABI used.
179 // GCC versions 4.4 and below don't support hard-fp.
180 // GCC versions 4.5 may support hard-fp without defining __ARM_PCS or
181 // __ARM_PCS_VFP.
182
183#define GCC_VERSION (__GNUC__ * 10000 \
184 + __GNUC_MINOR__ * 100 \
185 + __GNUC_PATCHLEVEL__)
186#if GCC_VERSION >= 40600
187#if defined(__ARM_PCS_VFP)
188 return true;
189#else
190 return false;
191#endif
192
193#elif GCC_VERSION < 40500
194 return false;
195
196#else
197#if defined(__ARM_PCS_VFP)
198 return true;
199#elif defined(__ARM_PCS) || defined(__SOFTFP) || !defined(__VFP_FP__)
200 return false;
201#else
202#error "Your version of GCC does not report the FP ABI compiled for." \
203 "Please report it on this issue" \
204 "http://code.google.com/p/v8/issues/detail?id=2140"
205
206#endif
207#endif
208#undef GCC_VERSION
sgjesse@chromium.org8e8294a2011-05-02 14:30:53 +0000209}
yangguo@chromium.orgc74d6742012-06-29 15:15:45 +0000210
ager@chromium.orgc4c92722009-11-18 14:12:51 +0000211#endif // def __arm__
212
213
lrn@chromium.org7516f052011-03-30 08:52:27 +0000214#ifdef __mips__
215bool OS::MipsCpuHasFeature(CpuFeature feature) {
216 const char* search_string = NULL;
217 const char* file_name = "/proc/cpuinfo";
218 // Simple detection of FPU at runtime for Linux.
219 // It is based on /proc/cpuinfo, which reveals hardware configuration
220 // to user-space applications. According to MIPS (early 2010), no similar
221 // facility is universally available on the MIPS architectures,
222 // so it's up to individual OSes to provide such.
223 //
224 // This is written as a straight shot one pass parser
225 // and not using STL string and ifstream because,
226 // on Linux, it's reading from a (non-mmap-able)
227 // character special device.
228
229 switch (feature) {
230 case FPU:
231 search_string = "FPU";
232 break;
233 default:
234 UNREACHABLE();
235 }
236
237 FILE* f = NULL;
238 const char* what = search_string;
239
240 if (NULL == (f = fopen(file_name, "r")))
241 return false;
242
243 int k;
244 while (EOF != (k = fgetc(f))) {
245 if (k == *what) {
246 ++what;
247 while ((*what != '\0') && (*what == fgetc(f))) {
248 ++what;
249 }
250 if (*what == '\0') {
251 fclose(f);
252 return true;
253 } else {
254 what = search_string;
255 }
256 }
257 }
258 fclose(f);
259
260 // Did not find string in the proc file.
261 return false;
262}
263#endif // def __mips__
264
265
ager@chromium.org236ad962008-09-25 09:45:57 +0000266int OS::ActivationFrameAlignment() {
ager@chromium.orge2902be2009-06-08 12:21:35 +0000267#ifdef V8_TARGET_ARCH_ARM
kasperl@chromium.orgb3284ad2009-05-18 06:12:45 +0000268 // On EABI ARM targets this is required for fp correctness in the
269 // runtime system.
ager@chromium.org3a6061e2009-03-12 14:24:36 +0000270 return 8;
ager@chromium.org5c838252010-02-19 08:53:10 +0000271#elif V8_TARGET_ARCH_MIPS
272 return 8;
273#endif
ricow@chromium.orgc9c80822010-04-21 08:22:37 +0000274 // With gcc 4.4 the tree vectorization optimizer can generate code
ager@chromium.orge2902be2009-06-08 12:21:35 +0000275 // that requires 16 byte alignment such as movdqa on x86.
276 return 16;
ager@chromium.org236ad962008-09-25 09:45:57 +0000277}
278
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000279
kmillikin@chromium.org9155e252010-05-26 13:27:57 +0000280void OS::ReleaseStore(volatile AtomicWord* ptr, AtomicWord value) {
lrn@chromium.org7516f052011-03-30 08:52:27 +0000281#if (defined(V8_TARGET_ARCH_ARM) && defined(__arm__)) || \
282 (defined(V8_TARGET_ARCH_MIPS) && defined(__mips__))
283 // Only use on ARM or MIPS hardware.
kasperl@chromium.orga5551262010-12-07 12:49:48 +0000284 MemoryBarrier();
kmillikin@chromium.org9155e252010-05-26 13:27:57 +0000285#else
286 __asm__ __volatile__("" : : : "memory");
287 // An x86 store acts as a release barrier.
288#endif
289 *ptr = value;
290}
291
292
sgjesse@chromium.orgb302e562010-02-03 11:26:59 +0000293const char* OS::LocalTimezone(double time) {
294 if (isnan(time)) return "";
295 time_t tv = static_cast<time_t>(floor(time/msPerSecond));
296 struct tm* t = localtime(&tv);
297 if (NULL == t) return "";
298 return t->tm_zone;
299}
300
301
302double OS::LocalTimeOffset() {
303 time_t tv = time(NULL);
304 struct tm* t = localtime(&tv);
305 // tm_gmtoff includes any daylight savings offset, so subtract it.
306 return static_cast<double>(t->tm_gmtoff * msPerSecond -
307 (t->tm_isdst > 0 ? 3600 * msPerSecond : 0));
308}
309
310
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000311// We keep the lowest and highest addresses mapped as a quick way of
312// determining that pointers are outside the heap (used mostly in assertions
ulan@chromium.org2efb9002012-01-19 15:36:35 +0000313// and verification). The estimate is conservative, i.e., not all addresses in
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000314// 'allocated' space are actually allocated to our heap. The range is
315// [lowest, highest), inclusive on the low and and exclusive on the high end.
316static void* lowest_ever_allocated = reinterpret_cast<void*>(-1);
317static void* highest_ever_allocated = reinterpret_cast<void*>(0);
318
319
320static void UpdateAllocatedSpaceLimits(void* address, int size) {
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +0000321 ASSERT(limit_mutex != NULL);
322 ScopedLock lock(limit_mutex);
323
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000324 lowest_ever_allocated = Min(lowest_ever_allocated, address);
325 highest_ever_allocated =
326 Max(highest_ever_allocated,
327 reinterpret_cast<void*>(reinterpret_cast<char*>(address) + size));
328}
329
330
331bool OS::IsOutsideAllocatedSpace(void* address) {
332 return address < lowest_ever_allocated || address >= highest_ever_allocated;
333}
334
335
336size_t OS::AllocateAlignment() {
ager@chromium.orgbb29dc92009-03-24 13:25:23 +0000337 return sysconf(_SC_PAGESIZE);
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000338}
339
340
kasper.lund7276f142008-07-30 08:49:36 +0000341void* OS::Allocate(const size_t requested,
342 size_t* allocated,
kasperl@chromium.orgf5aa8372009-03-24 14:47:14 +0000343 bool is_executable) {
erik.corry@gmail.comc3b670f2011-10-05 21:44:48 +0000344 const size_t msize = RoundUp(requested, AllocateAlignment());
kasperl@chromium.orgf5aa8372009-03-24 14:47:14 +0000345 int prot = PROT_READ | PROT_WRITE | (is_executable ? PROT_EXEC : 0);
rossberg@chromium.orgb4b2aa62011-10-13 09:49:59 +0000346 void* addr = OS::GetRandomMmapAddr();
ricow@chromium.org9fa09672011-07-25 11:05:35 +0000347 void* mbase = mmap(addr, msize, prot, MAP_PRIVATE | MAP_ANONYMOUS, -1, 0);
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000348 if (mbase == MAP_FAILED) {
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +0000349 LOG(i::Isolate::Current(),
350 StringEvent("OS::Allocate", "mmap failed"));
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000351 return NULL;
352 }
353 *allocated = msize;
354 UpdateAllocatedSpaceLimits(mbase, msize);
355 return mbase;
356}
357
358
kasperl@chromium.orgf5aa8372009-03-24 14:47:14 +0000359void OS::Free(void* address, const size_t size) {
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000360 // TODO(1240712): munmap has a return value which is ignored here.
ager@chromium.orga1645e22009-09-09 19:27:10 +0000361 int result = munmap(address, size);
362 USE(result);
363 ASSERT(result == 0);
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000364}
365
366
367void OS::Sleep(int milliseconds) {
368 unsigned int ms = static_cast<unsigned int>(milliseconds);
369 usleep(1000 * ms);
370}
371
372
373void OS::Abort() {
374 // Redirect to std abort to signal abnormal program termination.
rossberg@chromium.org2c067b12012-03-19 11:01:52 +0000375 if (FLAG_break_on_abort) {
376 DebugBreak();
377 }
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000378 abort();
379}
380
381
kasper.lund7276f142008-07-30 08:49:36 +0000382void OS::DebugBreak() {
ager@chromium.org5ec48922009-05-05 07:25:34 +0000383// TODO(lrn): Introduce processor define for runtime system (!= V8_ARCH_x,
384// which is the architecture of generated code).
ager@chromium.orgea4f62e2010-08-16 16:28:43 +0000385#if (defined(__arm__) || defined(__thumb__))
386# if defined(CAN_USE_ARMV5_INSTRUCTIONS)
kasper.lund7276f142008-07-30 08:49:36 +0000387 asm("bkpt 0");
ager@chromium.orgea4f62e2010-08-16 16:28:43 +0000388# endif
ager@chromium.org5c838252010-02-19 08:53:10 +0000389#elif defined(__mips__)
390 asm("break");
kasper.lund7276f142008-07-30 08:49:36 +0000391#else
392 asm("int $3");
393#endif
394}
395
396
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000397class PosixMemoryMappedFile : public OS::MemoryMappedFile {
398 public:
399 PosixMemoryMappedFile(FILE* file, void* memory, int size)
400 : file_(file), memory_(memory), size_(size) { }
401 virtual ~PosixMemoryMappedFile();
402 virtual void* memory() { return memory_; }
vegorov@chromium.org0a4e9012011-01-24 12:33:13 +0000403 virtual int size() { return size_; }
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000404 private:
405 FILE* file_;
406 void* memory_;
407 int size_;
408};
409
410
vegorov@chromium.org0a4e9012011-01-24 12:33:13 +0000411OS::MemoryMappedFile* OS::MemoryMappedFile::open(const char* name) {
fschneider@chromium.org3a5fd782011-02-24 10:10:44 +0000412 FILE* file = fopen(name, "r+");
vegorov@chromium.org0a4e9012011-01-24 12:33:13 +0000413 if (file == NULL) return NULL;
414
415 fseek(file, 0, SEEK_END);
416 int size = ftell(file);
417
418 void* memory =
rossberg@chromium.orgb4b2aa62011-10-13 09:49:59 +0000419 mmap(OS::GetRandomMmapAddr(),
420 size,
421 PROT_READ | PROT_WRITE,
422 MAP_SHARED,
423 fileno(file),
424 0);
vegorov@chromium.org0a4e9012011-01-24 12:33:13 +0000425 return new PosixMemoryMappedFile(file, memory, size);
426}
427
428
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000429OS::MemoryMappedFile* OS::MemoryMappedFile::create(const char* name, int size,
430 void* initial) {
431 FILE* file = fopen(name, "w+");
432 if (file == NULL) return NULL;
ager@chromium.org9258b6b2008-09-11 09:11:10 +0000433 int result = fwrite(initial, size, 1, file);
434 if (result < 1) {
435 fclose(file);
436 return NULL;
437 }
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000438 void* memory =
rossberg@chromium.orgb4b2aa62011-10-13 09:49:59 +0000439 mmap(OS::GetRandomMmapAddr(),
440 size,
441 PROT_READ | PROT_WRITE,
442 MAP_SHARED,
443 fileno(file),
444 0);
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000445 return new PosixMemoryMappedFile(file, memory, size);
446}
447
448
449PosixMemoryMappedFile::~PosixMemoryMappedFile() {
erik.corry@gmail.comc3b670f2011-10-05 21:44:48 +0000450 if (memory_) OS::Free(memory_, size_);
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000451 fclose(file_);
452}
453
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000454
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000455void OS::LogSharedLibraryAddresses() {
sgjesse@chromium.orgb9d7da12009-08-05 08:38:10 +0000456 // This function assumes that the layout of the file is as follows:
457 // hex_start_addr-hex_end_addr rwxp <unused data> [binary_file_name]
458 // If we encounter an unexpected situation we abort scanning further entries.
ager@chromium.orgc4c92722009-11-18 14:12:51 +0000459 FILE* fp = fopen("/proc/self/maps", "r");
sgjesse@chromium.org0b6db592009-07-30 14:48:31 +0000460 if (fp == NULL) return;
sgjesse@chromium.orgb9d7da12009-08-05 08:38:10 +0000461
462 // Allocate enough room to be able to store a full file name.
463 const int kLibNameLen = FILENAME_MAX + 1;
464 char* lib_name = reinterpret_cast<char*>(malloc(kLibNameLen));
465
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +0000466 i::Isolate* isolate = ISOLATE;
sgjesse@chromium.orgb9d7da12009-08-05 08:38:10 +0000467 // This loop will terminate once the scanning hits an EOF.
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000468 while (true) {
sgjesse@chromium.org0b6db592009-07-30 14:48:31 +0000469 uintptr_t start, end;
470 char attr_r, attr_w, attr_x, attr_p;
sgjesse@chromium.orgb9d7da12009-08-05 08:38:10 +0000471 // Parse the addresses and permission bits at the beginning of the line.
sgjesse@chromium.org0b6db592009-07-30 14:48:31 +0000472 if (fscanf(fp, "%" V8PRIxPTR "-%" V8PRIxPTR, &start, &end) != 2) break;
473 if (fscanf(fp, " %c%c%c%c", &attr_r, &attr_w, &attr_x, &attr_p) != 4) break;
sgjesse@chromium.orgb9d7da12009-08-05 08:38:10 +0000474
sgjesse@chromium.org0b6db592009-07-30 14:48:31 +0000475 int c;
ager@chromium.orgce5e87b2010-03-10 10:24:18 +0000476 if (attr_r == 'r' && attr_w != 'w' && attr_x == 'x') {
477 // Found a read-only executable entry. Skip characters until we reach
sgjesse@chromium.orgb9d7da12009-08-05 08:38:10 +0000478 // the beginning of the filename or the end of the line.
479 do {
480 c = getc(fp);
481 } while ((c != EOF) && (c != '\n') && (c != '/'));
482 if (c == EOF) break; // EOF: Was unexpected, just exit.
483
484 // Process the filename if found.
sgjesse@chromium.org0b6db592009-07-30 14:48:31 +0000485 if (c == '/') {
sgjesse@chromium.orgb9d7da12009-08-05 08:38:10 +0000486 ungetc(c, fp); // Push the '/' back into the stream to be read below.
487
488 // Read to the end of the line. Exit if the read fails.
489 if (fgets(lib_name, kLibNameLen, fp) == NULL) break;
490
491 // Drop the newline character read by fgets. We do not need to check
492 // for a zero-length string because we know that we at least read the
493 // '/' character.
sgjesse@chromium.org0b6db592009-07-30 14:48:31 +0000494 lib_name[strlen(lib_name) - 1] = '\0';
495 } else {
sgjesse@chromium.orgb9d7da12009-08-05 08:38:10 +0000496 // No library name found, just record the raw address range.
497 snprintf(lib_name, kLibNameLen,
sgjesse@chromium.org0b6db592009-07-30 14:48:31 +0000498 "%08" V8PRIxPTR "-%08" V8PRIxPTR, start, end);
499 }
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +0000500 LOG(isolate, SharedLibraryEvent(lib_name, start, end));
sgjesse@chromium.orgb9d7da12009-08-05 08:38:10 +0000501 } else {
erik.corry@gmail.comf2038fb2012-01-16 11:42:08 +0000502 // Entry not describing executable data. Skip to end of line to set up
sgjesse@chromium.orgb9d7da12009-08-05 08:38:10 +0000503 // reading the next entry.
504 do {
505 c = getc(fp);
506 } while ((c != EOF) && (c != '\n'));
507 if (c == EOF) break;
ager@chromium.org5aa501c2009-06-23 07:57:28 +0000508 }
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000509 }
sgjesse@chromium.orgb9d7da12009-08-05 08:38:10 +0000510 free(lib_name);
sgjesse@chromium.org0b6db592009-07-30 14:48:31 +0000511 fclose(fp);
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000512}
513
514
whesse@chromium.org4a5224e2010-10-20 12:37:07 +0000515static const char kGCFakeMmap[] = "/tmp/__v8_gc__";
516
517
518void OS::SignalCodeMovingGC() {
whesse@chromium.org4a5224e2010-10-20 12:37:07 +0000519 // Support for ll_prof.py.
520 //
521 // The Linux profiler built into the kernel logs all mmap's with
522 // PROT_EXEC so that analysis tools can properly attribute ticks. We
523 // do a mmap with a name known by ll_prof.py and immediately munmap
524 // it. This injects a GC marker into the stream of events generated
525 // by the kernel and allows us to synchronize V8 code log and the
526 // kernel log.
527 int size = sysconf(_SC_PAGESIZE);
528 FILE* f = fopen(kGCFakeMmap, "w+");
rossberg@chromium.orgb4b2aa62011-10-13 09:49:59 +0000529 void* addr = mmap(OS::GetRandomMmapAddr(),
530 size,
531 PROT_READ | PROT_EXEC,
532 MAP_PRIVATE,
533 fileno(f),
534 0);
whesse@chromium.org4a5224e2010-10-20 12:37:07 +0000535 ASSERT(addr != MAP_FAILED);
erik.corry@gmail.comc3b670f2011-10-05 21:44:48 +0000536 OS::Free(addr, size);
whesse@chromium.org4a5224e2010-10-20 12:37:07 +0000537 fclose(f);
whesse@chromium.org4a5224e2010-10-20 12:37:07 +0000538}
539
540
ager@chromium.org65dad4b2009-04-23 08:48:43 +0000541int OS::StackWalk(Vector<OS::StackFrame> frames) {
ager@chromium.orgbb29dc92009-03-24 13:25:23 +0000542 // backtrace is a glibc extension.
fschneider@chromium.org7d10be52012-04-10 12:30:14 +0000543#if defined(__GLIBC__) && !defined(__UCLIBC__)
ager@chromium.org65dad4b2009-04-23 08:48:43 +0000544 int frames_size = frames.length();
sgjesse@chromium.org720dc0b2010-05-10 09:25:39 +0000545 ScopedVector<void*> addresses(frames_size);
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000546
sgjesse@chromium.org720dc0b2010-05-10 09:25:39 +0000547 int frames_count = backtrace(addresses.start(), frames_size);
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000548
sgjesse@chromium.org720dc0b2010-05-10 09:25:39 +0000549 char** symbols = backtrace_symbols(addresses.start(), frames_count);
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000550 if (symbols == NULL) {
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000551 return kStackWalkError;
552 }
553
554 for (int i = 0; i < frames_count; i++) {
555 frames[i].address = addresses[i];
556 // Format a text representation of the frame based on the information
557 // available.
kasperl@chromium.orgb9123622008-09-17 14:05:56 +0000558 SNPrintF(MutableCStrVector(frames[i].text, kStackWalkMaxTextLen),
559 "%s",
560 symbols[i]);
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000561 // Make sure line termination is in place.
562 frames[i].text[kStackWalkMaxTextLen - 1] = '\0';
563 }
564
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000565 free(symbols);
566
567 return frames_count;
fschneider@chromium.org7d10be52012-04-10 12:30:14 +0000568#else // defined(__GLIBC__) && !defined(__UCLIBC__)
ager@chromium.orgbb29dc92009-03-24 13:25:23 +0000569 return 0;
fschneider@chromium.org7d10be52012-04-10 12:30:14 +0000570#endif // defined(__GLIBC__) && !defined(__UCLIBC__)
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000571}
572
573
574// Constants used for mmap.
575static const int kMmapFd = -1;
576static const int kMmapFdOffset = 0;
577
erik.corry@gmail.comc3b670f2011-10-05 21:44:48 +0000578VirtualMemory::VirtualMemory() : address_(NULL), size_(0) { }
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000579
ager@chromium.org9258b6b2008-09-11 09:11:10 +0000580VirtualMemory::VirtualMemory(size_t size) {
erik.corry@gmail.comc3b670f2011-10-05 21:44:48 +0000581 address_ = ReserveRegion(size);
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000582 size_ = size;
583}
584
585
erik.corry@gmail.comc3b670f2011-10-05 21:44:48 +0000586VirtualMemory::VirtualMemory(size_t size, size_t alignment)
587 : address_(NULL), size_(0) {
588 ASSERT(IsAligned(alignment, static_cast<intptr_t>(OS::AllocateAlignment())));
589 size_t request_size = RoundUp(size + alignment,
590 static_cast<intptr_t>(OS::AllocateAlignment()));
rossberg@chromium.orgb4b2aa62011-10-13 09:49:59 +0000591 void* reservation = mmap(OS::GetRandomMmapAddr(),
erik.corry@gmail.comc3b670f2011-10-05 21:44:48 +0000592 request_size,
593 PROT_NONE,
594 MAP_PRIVATE | MAP_ANONYMOUS | MAP_NORESERVE,
595 kMmapFd,
596 kMmapFdOffset);
597 if (reservation == MAP_FAILED) return;
598
599 Address base = static_cast<Address>(reservation);
600 Address aligned_base = RoundUp(base, alignment);
601 ASSERT_LE(base, aligned_base);
602
603 // Unmap extra memory reserved before and after the desired block.
604 if (aligned_base != base) {
605 size_t prefix_size = static_cast<size_t>(aligned_base - base);
606 OS::Free(base, prefix_size);
607 request_size -= prefix_size;
608 }
609
610 size_t aligned_size = RoundUp(size, OS::AllocateAlignment());
611 ASSERT_LE(aligned_size, request_size);
612
613 if (aligned_size != request_size) {
614 size_t suffix_size = request_size - aligned_size;
615 OS::Free(aligned_base + aligned_size, suffix_size);
616 request_size -= suffix_size;
617 }
618
619 ASSERT(aligned_size == request_size);
620
621 address_ = static_cast<void*>(aligned_base);
622 size_ = aligned_size;
623}
624
625
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000626VirtualMemory::~VirtualMemory() {
627 if (IsReserved()) {
erik.corry@gmail.comc3b670f2011-10-05 21:44:48 +0000628 bool result = ReleaseRegion(address(), size());
629 ASSERT(result);
630 USE(result);
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000631 }
632}
633
634
635bool VirtualMemory::IsReserved() {
erik.corry@gmail.comc3b670f2011-10-05 21:44:48 +0000636 return address_ != NULL;
637}
638
639
640void VirtualMemory::Reset() {
641 address_ = NULL;
642 size_ = 0;
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000643}
644
645
kasperl@chromium.orgf5aa8372009-03-24 14:47:14 +0000646bool VirtualMemory::Commit(void* address, size_t size, bool is_executable) {
erik.corry@gmail.comc3b670f2011-10-05 21:44:48 +0000647 return CommitRegion(address, size, is_executable);
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000648}
649
650
651bool VirtualMemory::Uncommit(void* address, size_t size) {
erik.corry@gmail.comc3b670f2011-10-05 21:44:48 +0000652 return UncommitRegion(address, size);
653}
654
655
yangguo@chromium.orgab30bb82012-02-24 14:41:46 +0000656bool VirtualMemory::Guard(void* address) {
657 OS::Guard(address, OS::CommitPageSize());
658 return true;
659}
660
661
erik.corry@gmail.comc3b670f2011-10-05 21:44:48 +0000662void* VirtualMemory::ReserveRegion(size_t size) {
rossberg@chromium.orgb4b2aa62011-10-13 09:49:59 +0000663 void* result = mmap(OS::GetRandomMmapAddr(),
erik.corry@gmail.comc3b670f2011-10-05 21:44:48 +0000664 size,
665 PROT_NONE,
666 MAP_PRIVATE | MAP_ANONYMOUS | MAP_NORESERVE,
667 kMmapFd,
668 kMmapFdOffset);
669
670 if (result == MAP_FAILED) return NULL;
671
672 return result;
673}
674
675
676bool VirtualMemory::CommitRegion(void* base, size_t size, bool is_executable) {
677 int prot = PROT_READ | PROT_WRITE | (is_executable ? PROT_EXEC : 0);
678 if (MAP_FAILED == mmap(base,
679 size,
680 prot,
681 MAP_PRIVATE | MAP_ANONYMOUS | MAP_FIXED,
682 kMmapFd,
683 kMmapFdOffset)) {
684 return false;
685 }
686
687 UpdateAllocatedSpaceLimits(base, size);
688 return true;
689}
690
691
692bool VirtualMemory::UncommitRegion(void* base, size_t size) {
693 return mmap(base,
694 size,
695 PROT_NONE,
ager@chromium.orga1645e22009-09-09 19:27:10 +0000696 MAP_PRIVATE | MAP_ANONYMOUS | MAP_NORESERVE | MAP_FIXED,
erik.corry@gmail.comc3b670f2011-10-05 21:44:48 +0000697 kMmapFd,
698 kMmapFdOffset) != MAP_FAILED;
699}
700
701
702bool VirtualMemory::ReleaseRegion(void* base, size_t size) {
703 return munmap(base, size) == 0;
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000704}
705
706
ager@chromium.orga9aa5fa2011-04-13 08:46:07 +0000707class Thread::PlatformData : public Malloced {
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000708 public:
ager@chromium.orga9aa5fa2011-04-13 08:46:07 +0000709 PlatformData() : thread_(kNoThread) {}
ager@chromium.org41826e72009-03-30 13:30:57 +0000710
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000711 pthread_t thread_; // Thread handle for pthread.
712};
713
svenpanne@chromium.org6d786c92011-06-15 10:58:27 +0000714Thread::Thread(const Options& options)
ager@chromium.orga9aa5fa2011-04-13 08:46:07 +0000715 : data_(new PlatformData()),
yangguo@chromium.org659ceec2012-01-26 07:37:54 +0000716 stack_size_(options.stack_size()) {
717 set_name(options.name());
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000718}
719
720
721Thread::~Thread() {
ager@chromium.orga9aa5fa2011-04-13 08:46:07 +0000722 delete data_;
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000723}
724
725
726static void* ThreadEntry(void* arg) {
727 Thread* thread = reinterpret_cast<Thread*>(arg);
728 // This is also initialized by the first argument to pthread_create() but we
729 // don't know which thread will run first (the original thread or the new
730 // one) so we initialize it here too.
danno@chromium.orgb6451162011-08-17 14:33:23 +0000731#ifdef PR_SET_NAME
karlklose@chromium.org8f806e82011-03-07 14:06:08 +0000732 prctl(PR_SET_NAME,
733 reinterpret_cast<unsigned long>(thread->name()), // NOLINT
734 0, 0, 0);
danno@chromium.orgb6451162011-08-17 14:33:23 +0000735#endif
ager@chromium.orga9aa5fa2011-04-13 08:46:07 +0000736 thread->data()->thread_ = pthread_self();
737 ASSERT(thread->data()->thread_ != kNoThread);
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000738 thread->Run();
739 return NULL;
740}
741
742
lrn@chromium.org5d00b602011-01-05 09:51:43 +0000743void Thread::set_name(const char* name) {
744 strncpy(name_, name, sizeof(name_));
745 name_[sizeof(name_) - 1] = '\0';
746}
747
748
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000749void Thread::Start() {
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +0000750 pthread_attr_t* attr_ptr = NULL;
751 pthread_attr_t attr;
752 if (stack_size_ > 0) {
753 pthread_attr_init(&attr);
754 pthread_attr_setstacksize(&attr, static_cast<size_t>(stack_size_));
755 attr_ptr = &attr;
756 }
danno@chromium.orgc612e022011-11-10 11:38:15 +0000757 int result = pthread_create(&data_->thread_, attr_ptr, ThreadEntry, this);
758 CHECK_EQ(0, result);
ager@chromium.orga9aa5fa2011-04-13 08:46:07 +0000759 ASSERT(data_->thread_ != kNoThread);
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000760}
761
762
763void Thread::Join() {
ager@chromium.orga9aa5fa2011-04-13 08:46:07 +0000764 pthread_join(data_->thread_, NULL);
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000765}
766
767
768Thread::LocalStorageKey Thread::CreateThreadLocalKey() {
769 pthread_key_t key;
770 int result = pthread_key_create(&key, NULL);
771 USE(result);
772 ASSERT(result == 0);
773 return static_cast<LocalStorageKey>(key);
774}
775
776
777void Thread::DeleteThreadLocalKey(LocalStorageKey key) {
778 pthread_key_t pthread_key = static_cast<pthread_key_t>(key);
779 int result = pthread_key_delete(pthread_key);
780 USE(result);
781 ASSERT(result == 0);
782}
783
784
785void* Thread::GetThreadLocal(LocalStorageKey key) {
786 pthread_key_t pthread_key = static_cast<pthread_key_t>(key);
787 return pthread_getspecific(pthread_key);
788}
789
790
791void Thread::SetThreadLocal(LocalStorageKey key, void* value) {
792 pthread_key_t pthread_key = static_cast<pthread_key_t>(key);
793 pthread_setspecific(pthread_key, value);
794}
795
796
797void Thread::YieldCPU() {
798 sched_yield();
799}
800
801
802class LinuxMutex : public Mutex {
803 public:
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000804 LinuxMutex() {
805 pthread_mutexattr_t attrs;
806 int result = pthread_mutexattr_init(&attrs);
807 ASSERT(result == 0);
808 result = pthread_mutexattr_settype(&attrs, PTHREAD_MUTEX_RECURSIVE);
809 ASSERT(result == 0);
810 result = pthread_mutex_init(&mutex_, &attrs);
811 ASSERT(result == 0);
rossberg@chromium.org717967f2011-07-20 13:44:42 +0000812 USE(result);
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000813 }
814
815 virtual ~LinuxMutex() { pthread_mutex_destroy(&mutex_); }
816
817 virtual int Lock() {
818 int result = pthread_mutex_lock(&mutex_);
819 return result;
820 }
821
822 virtual int Unlock() {
823 int result = pthread_mutex_unlock(&mutex_);
824 return result;
825 }
826
kasperl@chromium.orga5551262010-12-07 12:49:48 +0000827 virtual bool TryLock() {
828 int result = pthread_mutex_trylock(&mutex_);
829 // Return false if the lock is busy and locking failed.
830 if (result == EBUSY) {
831 return false;
832 }
833 ASSERT(result == 0); // Verify no other errors.
834 return true;
835 }
836
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000837 private:
838 pthread_mutex_t mutex_; // Pthread mutex for POSIX platforms.
839};
840
841
842Mutex* OS::CreateMutex() {
843 return new LinuxMutex();
844}
845
846
847class LinuxSemaphore : public Semaphore {
848 public:
849 explicit LinuxSemaphore(int count) { sem_init(&sem_, 0, count); }
850 virtual ~LinuxSemaphore() { sem_destroy(&sem_); }
851
kasper.lund7276f142008-07-30 08:49:36 +0000852 virtual void Wait();
ager@chromium.orgbb29dc92009-03-24 13:25:23 +0000853 virtual bool Wait(int timeout);
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000854 virtual void Signal() { sem_post(&sem_); }
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000855 private:
856 sem_t sem_;
857};
858
ager@chromium.orgbb29dc92009-03-24 13:25:23 +0000859
kasper.lund7276f142008-07-30 08:49:36 +0000860void LinuxSemaphore::Wait() {
861 while (true) {
862 int result = sem_wait(&sem_);
863 if (result == 0) return; // Successfully got semaphore.
864 CHECK(result == -1 && errno == EINTR); // Signal caused spurious wakeup.
865 }
866}
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000867
ager@chromium.orgbb29dc92009-03-24 13:25:23 +0000868
ager@chromium.org65dad4b2009-04-23 08:48:43 +0000869#ifndef TIMEVAL_TO_TIMESPEC
870#define TIMEVAL_TO_TIMESPEC(tv, ts) do { \
871 (ts)->tv_sec = (tv)->tv_sec; \
872 (ts)->tv_nsec = (tv)->tv_usec * 1000; \
873} while (false)
874#endif
875
876
ager@chromium.orgbb29dc92009-03-24 13:25:23 +0000877bool LinuxSemaphore::Wait(int timeout) {
878 const long kOneSecondMicros = 1000000; // NOLINT
ager@chromium.orgbb29dc92009-03-24 13:25:23 +0000879
880 // Split timeout into second and nanosecond parts.
ager@chromium.org65dad4b2009-04-23 08:48:43 +0000881 struct timeval delta;
882 delta.tv_usec = timeout % kOneSecondMicros;
883 delta.tv_sec = timeout / kOneSecondMicros;
ager@chromium.orgbb29dc92009-03-24 13:25:23 +0000884
ager@chromium.org65dad4b2009-04-23 08:48:43 +0000885 struct timeval current_time;
886 // Get the current time.
887 if (gettimeofday(&current_time, NULL) == -1) {
ager@chromium.orgbb29dc92009-03-24 13:25:23 +0000888 return false;
889 }
890
ager@chromium.org65dad4b2009-04-23 08:48:43 +0000891 // Calculate time for end of timeout.
892 struct timeval end_time;
893 timeradd(&current_time, &delta, &end_time);
ager@chromium.orgbb29dc92009-03-24 13:25:23 +0000894
ager@chromium.org65dad4b2009-04-23 08:48:43 +0000895 struct timespec ts;
896 TIMEVAL_TO_TIMESPEC(&end_time, &ts);
ager@chromium.orgbb29dc92009-03-24 13:25:23 +0000897 // Wait for semaphore signalled or timeout.
898 while (true) {
899 int result = sem_timedwait(&sem_, &ts);
900 if (result == 0) return true; // Successfully got semaphore.
901 if (result > 0) {
902 // For glibc prior to 2.3.4 sem_timedwait returns the error instead of -1.
903 errno = result;
904 result = -1;
905 }
906 if (result == -1 && errno == ETIMEDOUT) return false; // Timeout.
907 CHECK(result == -1 && errno == EINTR); // Signal caused spurious wakeup.
908 }
909}
910
911
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +0000912Semaphore* OS::CreateSemaphore(int count) {
913 return new LinuxSemaphore(count);
914}
915
ager@chromium.org381abbb2009-02-25 13:23:22 +0000916
mstarzinger@chromium.org471f2f12012-08-10 14:46:33 +0000917#if defined(__ANDROID__) && !defined(__BIONIC_HAVE_UCONTEXT_T)
kasperl@chromium.orgacae3782009-04-11 09:17:08 +0000918
mstarzinger@chromium.org471f2f12012-08-10 14:46:33 +0000919// Not all versions of Android's C library provide ucontext_t.
920// Detect this and provide custom but compatible definitions. Note that these
921// follow the GLibc naming convention to access register values from
922// mcontext_t.
923//
924// See http://code.google.com/p/android/issues/detail?id=34784
925
926#if defined(__arm__)
927
kasperl@chromium.orgacae3782009-04-11 09:17:08 +0000928typedef struct sigcontext mcontext_t;
mstarzinger@chromium.org471f2f12012-08-10 14:46:33 +0000929
kasperl@chromium.orgacae3782009-04-11 09:17:08 +0000930typedef struct ucontext {
931 uint32_t uc_flags;
ager@chromium.orgc4c92722009-11-18 14:12:51 +0000932 struct ucontext* uc_link;
kasperl@chromium.orgacae3782009-04-11 09:17:08 +0000933 stack_t uc_stack;
934 mcontext_t uc_mcontext;
mstarzinger@chromium.org471f2f12012-08-10 14:46:33 +0000935 // Other fields are not used by V8, don't define them here.
kasperl@chromium.orgacae3782009-04-11 09:17:08 +0000936} ucontext_t;
kasperl@chromium.orgacae3782009-04-11 09:17:08 +0000937
mstarzinger@chromium.org471f2f12012-08-10 14:46:33 +0000938#elif defined(__mips__)
danno@chromium.orgfa458e42012-02-01 10:48:36 +0000939// MIPS version of sigcontext, for Android bionic.
mstarzinger@chromium.org471f2f12012-08-10 14:46:33 +0000940typedef struct {
danno@chromium.orgfa458e42012-02-01 10:48:36 +0000941 uint32_t regmask;
942 uint32_t status;
943 uint64_t pc;
944 uint64_t gregs[32];
945 uint64_t fpregs[32];
946 uint32_t acx;
947 uint32_t fpc_csr;
948 uint32_t fpc_eir;
949 uint32_t used_math;
950 uint32_t dsp;
951 uint64_t mdhi;
952 uint64_t mdlo;
953 uint32_t hi1;
954 uint32_t lo1;
955 uint32_t hi2;
956 uint32_t lo2;
957 uint32_t hi3;
958 uint32_t lo3;
mstarzinger@chromium.org471f2f12012-08-10 14:46:33 +0000959} mcontext_t;
960
danno@chromium.orgfa458e42012-02-01 10:48:36 +0000961typedef struct ucontext {
962 uint32_t uc_flags;
963 struct ucontext* uc_link;
964 stack_t uc_stack;
965 mcontext_t uc_mcontext;
mstarzinger@chromium.org471f2f12012-08-10 14:46:33 +0000966 // Other fields are not used by V8, don't define them here.
danno@chromium.orgfa458e42012-02-01 10:48:36 +0000967} ucontext_t;
968
mstarzinger@chromium.org471f2f12012-08-10 14:46:33 +0000969#elif defined(__i386__)
erik.corry@gmail.comed49e962012-04-17 11:57:53 +0000970// x86 version for Android.
mstarzinger@chromium.org471f2f12012-08-10 14:46:33 +0000971typedef struct {
yangguo@chromium.orgcb9affa2012-05-15 12:16:38 +0000972 uint32_t gregs[19];
973 void* fpregs;
974 uint32_t oldmask;
975 uint32_t cr2;
mstarzinger@chromium.org471f2f12012-08-10 14:46:33 +0000976} mcontext_t;
erik.corry@gmail.comed49e962012-04-17 11:57:53 +0000977
mstarzinger@chromium.org471f2f12012-08-10 14:46:33 +0000978typedef uint32_t kernel_sigset_t[2]; // x86 kernel uses 64-bit signal masks
erik.corry@gmail.comed49e962012-04-17 11:57:53 +0000979typedef struct ucontext {
yangguo@chromium.orgcb9affa2012-05-15 12:16:38 +0000980 uint32_t uc_flags;
981 struct ucontext* uc_link;
erik.corry@gmail.comed49e962012-04-17 11:57:53 +0000982 stack_t uc_stack;
983 mcontext_t uc_mcontext;
mstarzinger@chromium.org471f2f12012-08-10 14:46:33 +0000984 // Other fields are not used by V8, don't define them here.
erik.corry@gmail.comed49e962012-04-17 11:57:53 +0000985} ucontext_t;
erik.corry@gmail.comed49e962012-04-17 11:57:53 +0000986enum { REG_EBP = 6, REG_ESP = 7, REG_EIP = 14 };
kasperl@chromium.orgacae3782009-04-11 09:17:08 +0000987#endif
988
mstarzinger@chromium.org471f2f12012-08-10 14:46:33 +0000989#endif // __ANDROID__ && !defined(__BIONIC_HAVE_UCONTEXT_T)
kasperl@chromium.orgacae3782009-04-11 09:17:08 +0000990
kasperl@chromium.orga5551262010-12-07 12:49:48 +0000991static int GetThreadID() {
mstarzinger@chromium.org471f2f12012-08-10 14:46:33 +0000992#if defined(__ANDROID__)
993 // Android's C library provides gettid(2).
994 return gettid();
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +0000995#else
mstarzinger@chromium.org471f2f12012-08-10 14:46:33 +0000996 // Glibc doesn't provide a wrapper for gettid(2).
kasperl@chromium.orga5551262010-12-07 12:49:48 +0000997 return syscall(SYS_gettid);
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +0000998#endif
kasperl@chromium.orga5551262010-12-07 12:49:48 +0000999}
1000
1001
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +00001002static void ProfilerSignalHandler(int signal, siginfo_t* info, void* context) {
1003 USE(info);
1004 if (signal != SIGPROF) return;
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001005 Isolate* isolate = Isolate::UncheckedCurrent();
1006 if (isolate == NULL || !isolate->IsInitialized() || !isolate->IsInUse()) {
1007 // We require a fully initialized and entered isolate.
1008 return;
1009 }
vitalyr@chromium.org0ec56d62011-04-15 22:22:08 +00001010 if (v8::Locker::IsActive() &&
1011 !isolate->thread_manager()->IsLockedByCurrentThread()) {
1012 return;
1013 }
1014
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001015 Sampler* sampler = isolate->logger()->sampler();
1016 if (sampler == NULL || !sampler->IsActive()) return;
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +00001017
lrn@chromium.org25156de2010-04-06 13:10:27 +00001018 TickSample sample_obj;
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001019 TickSample* sample = CpuProfiler::TickSampleEvent(isolate);
ager@chromium.org357bf652010-04-12 11:30:10 +00001020 if (sample == NULL) sample = &sample_obj;
mads.s.ager@gmail.com9a4089a2008-09-01 08:55:01 +00001021
kasperl@chromium.orga5551262010-12-07 12:49:48 +00001022 // Extracting the sample from the context is extremely machine dependent.
1023 ucontext_t* ucontext = reinterpret_cast<ucontext_t*>(context);
1024 mcontext_t& mcontext = ucontext->uc_mcontext;
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001025 sample->state = isolate->current_vm_state();
ager@chromium.org9085a012009-05-11 19:22:57 +00001026#if V8_HOST_ARCH_IA32
kasperl@chromium.orga5551262010-12-07 12:49:48 +00001027 sample->pc = reinterpret_cast<Address>(mcontext.gregs[REG_EIP]);
1028 sample->sp = reinterpret_cast<Address>(mcontext.gregs[REG_ESP]);
1029 sample->fp = reinterpret_cast<Address>(mcontext.gregs[REG_EBP]);
ager@chromium.org9085a012009-05-11 19:22:57 +00001030#elif V8_HOST_ARCH_X64
kasperl@chromium.orga5551262010-12-07 12:49:48 +00001031 sample->pc = reinterpret_cast<Address>(mcontext.gregs[REG_RIP]);
1032 sample->sp = reinterpret_cast<Address>(mcontext.gregs[REG_RSP]);
1033 sample->fp = reinterpret_cast<Address>(mcontext.gregs[REG_RBP]);
ager@chromium.org9085a012009-05-11 19:22:57 +00001034#elif V8_HOST_ARCH_ARM
mstarzinger@chromium.org471f2f12012-08-10 14:46:33 +00001035#if defined(__GLIBC__) && !defined(__UCLIBC__) && \
1036 (__GLIBC__ < 2 || (__GLIBC__ == 2 && __GLIBC_MINOR__ <= 3))
1037 // Old GLibc ARM versions used a gregs[] array to access the register
1038 // values from mcontext_t.
kasperl@chromium.orga5551262010-12-07 12:49:48 +00001039 sample->pc = reinterpret_cast<Address>(mcontext.gregs[R15]);
1040 sample->sp = reinterpret_cast<Address>(mcontext.gregs[R13]);
1041 sample->fp = reinterpret_cast<Address>(mcontext.gregs[R11]);
kasperl@chromium.orgb3284ad2009-05-18 06:12:45 +00001042#else
kasperl@chromium.orga5551262010-12-07 12:49:48 +00001043 sample->pc = reinterpret_cast<Address>(mcontext.arm_pc);
1044 sample->sp = reinterpret_cast<Address>(mcontext.arm_sp);
1045 sample->fp = reinterpret_cast<Address>(mcontext.arm_fp);
mstarzinger@chromium.org471f2f12012-08-10 14:46:33 +00001046#endif // defined(__GLIBC__) && !defined(__UCLIBC__) &&
1047 // (__GLIBC__ < 2 || (__GLIBC__ == 2 && __GLIBC_MINOR__ <= 3))
ager@chromium.org5c838252010-02-19 08:53:10 +00001048#elif V8_HOST_ARCH_MIPS
danno@chromium.orgc612e022011-11-10 11:38:15 +00001049 sample->pc = reinterpret_cast<Address>(mcontext.pc);
1050 sample->sp = reinterpret_cast<Address>(mcontext.gregs[29]);
1051 sample->fp = reinterpret_cast<Address>(mcontext.gregs[30]);
1052#endif // V8_HOST_ARCH_*
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001053 sampler->SampleStack(sample);
1054 sampler->Tick(sample);
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +00001055}
1056
1057
mads.s.ager@gmail.com9a4089a2008-09-01 08:55:01 +00001058class Sampler::PlatformData : public Malloced {
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +00001059 public:
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001060 PlatformData() : vm_tid_(GetThreadID()) {}
1061
1062 int vm_tid() const { return vm_tid_; }
1063
1064 private:
1065 const int vm_tid_;
1066};
1067
1068
1069class SignalSender : public Thread {
1070 public:
kasperl@chromium.orga5551262010-12-07 12:49:48 +00001071 enum SleepInterval {
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001072 HALF_INTERVAL,
1073 FULL_INTERVAL
kasperl@chromium.orga5551262010-12-07 12:49:48 +00001074 };
1075
jkummerow@chromium.orgab7dad42012-02-07 12:07:34 +00001076 static const int kSignalSenderStackSize = 64 * KB;
yangguo@chromium.org659ceec2012-01-26 07:37:54 +00001077
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001078 explicit SignalSender(int interval)
yangguo@chromium.org659ceec2012-01-26 07:37:54 +00001079 : Thread(Thread::Options("SignalSender", kSignalSenderStackSize)),
lrn@chromium.org303ada72010-10-27 09:33:13 +00001080 vm_tgid_(getpid()),
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001081 interval_(interval) {}
1082
erik.corry@gmail.comed49e962012-04-17 11:57:53 +00001083 static void SetUp() { if (!mutex_) mutex_ = OS::CreateMutex(); }
1084 static void TearDown() { delete mutex_; }
fschneider@chromium.org7d10be52012-04-10 12:30:14 +00001085
erik.corry@gmail.comd6076d92011-06-06 09:39:18 +00001086 static void InstallSignalHandler() {
1087 struct sigaction sa;
1088 sa.sa_sigaction = ProfilerSignalHandler;
1089 sigemptyset(&sa.sa_mask);
1090 sa.sa_flags = SA_RESTART | SA_SIGINFO;
1091 signal_handler_installed_ =
1092 (sigaction(SIGPROF, &sa, &old_signal_handler_) == 0);
1093 }
1094
1095 static void RestoreSignalHandler() {
1096 if (signal_handler_installed_) {
1097 sigaction(SIGPROF, &old_signal_handler_, 0);
1098 signal_handler_installed_ = false;
1099 }
1100 }
1101
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001102 static void AddActiveSampler(Sampler* sampler) {
fschneider@chromium.org7d10be52012-04-10 12:30:14 +00001103 ScopedLock lock(mutex_);
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001104 SamplerRegistry::AddActiveSampler(sampler);
1105 if (instance_ == NULL) {
erik.corry@gmail.comd6076d92011-06-06 09:39:18 +00001106 // Start a thread that will send SIGPROF signal to VM threads,
1107 // when CPU profiling will be enabled.
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001108 instance_ = new SignalSender(sampler->interval());
1109 instance_->Start();
1110 } else {
1111 ASSERT(instance_->interval_ == sampler->interval());
1112 }
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +00001113 }
1114
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001115 static void RemoveActiveSampler(Sampler* sampler) {
fschneider@chromium.org7d10be52012-04-10 12:30:14 +00001116 ScopedLock lock(mutex_);
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001117 SamplerRegistry::RemoveActiveSampler(sampler);
1118 if (SamplerRegistry::GetState() == SamplerRegistry::HAS_NO_SAMPLERS) {
jkummerow@chromium.orgddda9e82011-07-06 11:27:02 +00001119 RuntimeProfiler::StopRuntimeProfilerThreadBeforeShutdown(instance_);
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001120 delete instance_;
1121 instance_ = NULL;
erik.corry@gmail.comd6076d92011-06-06 09:39:18 +00001122 RestoreSignalHandler();
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001123 }
1124 }
1125
1126 // Implement Thread::Run().
1127 virtual void Run() {
1128 SamplerRegistry::State state;
1129 while ((state = SamplerRegistry::GetState()) !=
1130 SamplerRegistry::HAS_NO_SAMPLERS) {
1131 bool cpu_profiling_enabled =
1132 (state == SamplerRegistry::HAS_CPU_PROFILING_SAMPLERS);
1133 bool runtime_profiler_enabled = RuntimeProfiler::IsEnabled();
erik.corry@gmail.comd6076d92011-06-06 09:39:18 +00001134 if (cpu_profiling_enabled && !signal_handler_installed_) {
1135 InstallSignalHandler();
1136 } else if (!cpu_profiling_enabled && signal_handler_installed_) {
1137 RestoreSignalHandler();
1138 }
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001139 // When CPU profiling is enabled both JavaScript and C++ code is
1140 // profiled. We must not suspend.
1141 if (!cpu_profiling_enabled) {
1142 if (rate_limiter_.SuspendIfNecessary()) continue;
1143 }
1144 if (cpu_profiling_enabled && runtime_profiler_enabled) {
1145 if (!SamplerRegistry::IterateActiveSamplers(&DoCpuProfile, this)) {
1146 return;
1147 }
kasperl@chromium.orga5551262010-12-07 12:49:48 +00001148 Sleep(HALF_INTERVAL);
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001149 if (!SamplerRegistry::IterateActiveSamplers(&DoRuntimeProfile, NULL)) {
1150 return;
1151 }
kasperl@chromium.orga5551262010-12-07 12:49:48 +00001152 Sleep(HALF_INTERVAL);
1153 } else {
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001154 if (cpu_profiling_enabled) {
1155 if (!SamplerRegistry::IterateActiveSamplers(&DoCpuProfile,
1156 this)) {
1157 return;
1158 }
1159 }
1160 if (runtime_profiler_enabled) {
1161 if (!SamplerRegistry::IterateActiveSamplers(&DoRuntimeProfile,
1162 NULL)) {
1163 return;
1164 }
1165 }
kasperl@chromium.orga5551262010-12-07 12:49:48 +00001166 Sleep(FULL_INTERVAL);
whesse@chromium.orgf0ac72d2010-11-08 12:47:26 +00001167 }
lrn@chromium.org303ada72010-10-27 09:33:13 +00001168 }
1169 }
1170
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001171 static void DoCpuProfile(Sampler* sampler, void* raw_sender) {
1172 if (!sampler->IsProfiling()) return;
1173 SignalSender* sender = reinterpret_cast<SignalSender*>(raw_sender);
1174 sender->SendProfilingSignal(sampler->platform_data()->vm_tid());
1175 }
1176
1177 static void DoRuntimeProfile(Sampler* sampler, void* ignored) {
1178 if (!sampler->isolate()->IsInitialized()) return;
1179 sampler->isolate()->runtime_profiler()->NotifyTick();
1180 }
1181
1182 void SendProfilingSignal(int tid) {
karlklose@chromium.org8f806e82011-03-07 14:06:08 +00001183 if (!signal_handler_installed_) return;
kasperl@chromium.orga5551262010-12-07 12:49:48 +00001184 // Glibc doesn't provide a wrapper for tgkill(2).
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001185#if defined(ANDROID)
1186 syscall(__NR_tgkill, vm_tgid_, tid, SIGPROF);
1187#else
1188 syscall(SYS_tgkill, vm_tgid_, tid, SIGPROF);
1189#endif
kasperl@chromium.orga5551262010-12-07 12:49:48 +00001190 }
1191
1192 void Sleep(SleepInterval full_or_half) {
1193 // Convert ms to us and subtract 100 us to compensate delays
1194 // occuring during signal delivery.
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001195 useconds_t interval = interval_ * 1000 - 100;
kasperl@chromium.orga5551262010-12-07 12:49:48 +00001196 if (full_or_half == HALF_INTERVAL) interval /= 2;
ulan@chromium.org2efb9002012-01-19 15:36:35 +00001197#if defined(ANDROID)
1198 usleep(interval);
1199#else
kasperl@chromium.orga5551262010-12-07 12:49:48 +00001200 int result = usleep(interval);
1201#ifdef DEBUG
1202 if (result != 0 && errno != EINTR) {
1203 fprintf(stderr,
1204 "SignalSender usleep error; interval = %u, errno = %d\n",
1205 interval,
1206 errno);
1207 ASSERT(result == 0 || errno == EINTR);
1208 }
ulan@chromium.org2efb9002012-01-19 15:36:35 +00001209#endif // DEBUG
kasperl@chromium.orga5551262010-12-07 12:49:48 +00001210 USE(result);
ulan@chromium.org2efb9002012-01-19 15:36:35 +00001211#endif // ANDROID
kasperl@chromium.orga5551262010-12-07 12:49:48 +00001212 }
1213
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001214 const int vm_tgid_;
1215 const int interval_;
kasperl@chromium.orga5551262010-12-07 12:49:48 +00001216 RuntimeProfilerRateLimiter rate_limiter_;
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001217
1218 // Protects the process wide state below.
fschneider@chromium.org7d10be52012-04-10 12:30:14 +00001219 static Mutex* mutex_;
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001220 static SignalSender* instance_;
1221 static bool signal_handler_installed_;
1222 static struct sigaction old_signal_handler_;
1223
jkummerow@chromium.org05ed9dd2012-01-23 14:42:48 +00001224 private:
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001225 DISALLOW_COPY_AND_ASSIGN(SignalSender);
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +00001226};
1227
1228
fschneider@chromium.org7d10be52012-04-10 12:30:14 +00001229Mutex* SignalSender::mutex_ = NULL;
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001230SignalSender* SignalSender::instance_ = NULL;
1231struct sigaction SignalSender::old_signal_handler_;
1232bool SignalSender::signal_handler_installed_ = false;
lrn@chromium.org303ada72010-10-27 09:33:13 +00001233
1234
fschneider@chromium.org7d10be52012-04-10 12:30:14 +00001235void OS::SetUp() {
1236 // Seed the random number generator. We preserve microsecond resolution.
1237 uint64_t seed = Ticks() ^ (getpid() << 16);
1238 srandom(static_cast<unsigned int>(seed));
1239 limit_mutex = CreateMutex();
1240
1241#ifdef __arm__
1242 // When running on ARM hardware check that the EABI used by V8 and
1243 // by the C code is the same.
1244 bool hard_float = OS::ArmUsingHardFloat();
1245 if (hard_float) {
1246#if !USE_EABI_HARDFLOAT
1247 PrintF("ERROR: Binary compiled with -mfloat-abi=hard but without "
1248 "-DUSE_EABI_HARDFLOAT\n");
1249 exit(1);
1250#endif
1251 } else {
1252#if USE_EABI_HARDFLOAT
1253 PrintF("ERROR: Binary not compiled with -mfloat-abi=hard but with "
1254 "-DUSE_EABI_HARDFLOAT\n");
1255 exit(1);
1256#endif
1257 }
1258#endif
1259 SignalSender::SetUp();
1260}
1261
1262
erik.corry@gmail.comed49e962012-04-17 11:57:53 +00001263void OS::TearDown() {
1264 SignalSender::TearDown();
1265 delete limit_mutex;
1266}
1267
1268
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001269Sampler::Sampler(Isolate* isolate, int interval)
1270 : isolate_(isolate),
1271 interval_(interval),
kasperl@chromium.orga5551262010-12-07 12:49:48 +00001272 profiling_(false),
ager@chromium.orgbeb25712010-11-29 08:02:25 +00001273 active_(false),
1274 samples_taken_(0) {
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001275 data_ = new PlatformData;
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +00001276}
1277
1278
mads.s.ager@gmail.com9a4089a2008-09-01 08:55:01 +00001279Sampler::~Sampler() {
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001280 ASSERT(!IsActive());
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +00001281 delete data_;
1282}
1283
1284
mads.s.ager@gmail.com9a4089a2008-09-01 08:55:01 +00001285void Sampler::Start() {
kasperl@chromium.orga5551262010-12-07 12:49:48 +00001286 ASSERT(!IsActive());
kasperl@chromium.orga5551262010-12-07 12:49:48 +00001287 SetActive(true);
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001288 SignalSender::AddActiveSampler(this);
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +00001289}
1290
1291
mads.s.ager@gmail.com9a4089a2008-09-01 08:55:01 +00001292void Sampler::Stop() {
sgjesse@chromium.orgea88ce92011-03-23 11:19:56 +00001293 ASSERT(IsActive());
1294 SignalSender::RemoveActiveSampler(this);
kasperl@chromium.orga5551262010-12-07 12:49:48 +00001295 SetActive(false);
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +00001296}
1297
christian.plesner.hansen43d26ec2008-07-03 15:10:15 +00001298
1299} } // namespace v8::internal