mirror of
https://github.com/ziglang/zig.git
synced 2025-12-09 15:53:08 +00:00
* Reuse bytes of async function frames when non-async functions make `noasync` calls. This prevents explosive stack growth. * Zig now passes a stack size argument to the linker when linking ELF binaries. Linux ignores this value, but it is available as a program header called GNU_STACK. I prototyped some code that memory maps extra space to the stack using this program header, but there was still a problem when accessing stack memory very far down. Stack probing is needed or not working or something. I also prototyped using `@newStackCall` to call main and that does work around the issue but it also brings its own issues. That code is commented out for now in std/special/start.zig. I'm on a plane with no Internet, but I plan to consult with the musl community for advice when I get a chance. * Added `noasync` to a bunch of function calls in std.debug. It's very messy but it's a workaround that makes stack traces functional with evented I/O enabled. Eventually these will be cleaned up as the root bugs are found and fixed. Programs built in blocking mode are unaffected. * Lowered the default stack size of std.io.InStream (for the async version) to 1 MiB instead of 4. Until we figure out how to get choosing a stack size working (see 2nd bullet point above), 4 MiB tends to cause segfaults due to stack size running out, or usage of stack memory too far apart, or something like that. * Default thread stack size is bumped from 8 MiB to 16 to match the size we give for the main thread. It's planned to eventually remove this hard coded value and have Zig able to determine this value during semantic analysis, with call graph analysis and function pointer annotations and extern function annotations.
182 lines
6.0 KiB
Zig
182 lines
6.0 KiB
Zig
// This file is included in the compilation unit when exporting an executable.
|
|
|
|
const root = @import("root");
|
|
const std = @import("std");
|
|
const builtin = @import("builtin");
|
|
const assert = std.debug.assert;
|
|
|
|
var starting_stack_ptr: [*]usize = undefined;
|
|
|
|
const is_wasm = switch (builtin.arch) {
|
|
.wasm32, .wasm64 => true,
|
|
else => false,
|
|
};
|
|
|
|
comptime {
|
|
if (builtin.link_libc) {
|
|
@export("main", main, .Strong);
|
|
} else if (builtin.os == .windows) {
|
|
@export("WinMainCRTStartup", WinMainCRTStartup, .Strong);
|
|
} else if (is_wasm and builtin.os == .freestanding) {
|
|
@export("_start", wasm_freestanding_start, .Strong);
|
|
} else {
|
|
@export("_start", _start, .Strong);
|
|
}
|
|
}
|
|
|
|
extern fn wasm_freestanding_start() void {
|
|
_ = callMain();
|
|
}
|
|
|
|
nakedcc fn _start() noreturn {
|
|
if (builtin.os == builtin.Os.wasi) {
|
|
std.os.wasi.proc_exit(callMain());
|
|
}
|
|
|
|
switch (builtin.arch) {
|
|
.x86_64 => {
|
|
starting_stack_ptr = asm (""
|
|
: [argc] "={rsp}" (-> [*]usize)
|
|
);
|
|
},
|
|
.i386 => {
|
|
starting_stack_ptr = asm (""
|
|
: [argc] "={esp}" (-> [*]usize)
|
|
);
|
|
},
|
|
.aarch64, .aarch64_be, .arm => {
|
|
starting_stack_ptr = asm ("mov %[argc], sp"
|
|
: [argc] "=r" (-> [*]usize)
|
|
);
|
|
},
|
|
else => @compileError("unsupported arch"),
|
|
}
|
|
// If LLVM inlines stack variables into _start, they will overwrite
|
|
// the command line argument data.
|
|
@noInlineCall(posixCallMainAndExit);
|
|
}
|
|
|
|
extern fn WinMainCRTStartup() noreturn {
|
|
@setAlignStack(16);
|
|
if (!builtin.single_threaded) {
|
|
_ = @import("start_windows_tls.zig");
|
|
}
|
|
|
|
std.debug.maybeEnableSegfaultHandler();
|
|
|
|
std.os.windows.kernel32.ExitProcess(callMain());
|
|
}
|
|
|
|
// TODO https://github.com/ziglang/zig/issues/265
|
|
fn posixCallMainAndExit() noreturn {
|
|
if (builtin.os == builtin.Os.freebsd) {
|
|
@setAlignStack(16);
|
|
}
|
|
const argc = starting_stack_ptr[0];
|
|
const argv = @ptrCast([*][*]u8, starting_stack_ptr + 1);
|
|
|
|
const envp_optional = @ptrCast([*]?[*]u8, argv + argc + 1);
|
|
var envp_count: usize = 0;
|
|
while (envp_optional[envp_count]) |_| : (envp_count += 1) {}
|
|
const envp = @ptrCast([*][*]u8, envp_optional)[0..envp_count];
|
|
|
|
if (builtin.os == .linux) {
|
|
// Find the beginning of the auxiliary vector
|
|
const auxv = @ptrCast([*]std.elf.Auxv, envp.ptr + envp_count + 1);
|
|
std.os.linux.elf_aux_maybe = auxv;
|
|
// Initialize the TLS area
|
|
const gnu_stack_phdr = std.os.linux.tls.initTLS() orelse @panic("ELF missing stack size");
|
|
|
|
if (std.os.linux.tls.tls_image) |tls_img| {
|
|
const tls_addr = std.os.linux.tls.allocateTLS(tls_img.alloc_size);
|
|
const tp = std.os.linux.tls.copyTLS(tls_addr);
|
|
std.os.linux.tls.setThreadPointer(tp);
|
|
}
|
|
|
|
// TODO This is disabled because what should we do when linking libc and this code
|
|
// does not execute? And also it's causing a test failure in stack traces in release modes.
|
|
|
|
//// Linux ignores the stack size from the ELF file, and instead always does 8 MiB. A further
|
|
//// problem is that it uses PROT_GROWSDOWN which prevents stores to addresses too far down
|
|
//// the stack and requires "probing". So here we allocate our own stack.
|
|
//const wanted_stack_size = gnu_stack_phdr.p_memsz;
|
|
//assert(wanted_stack_size % std.mem.page_size == 0);
|
|
//// Allocate an extra page as the guard page.
|
|
//const total_size = wanted_stack_size + std.mem.page_size;
|
|
//const new_stack = std.os.mmap(
|
|
// null,
|
|
// total_size,
|
|
// std.os.PROT_READ | std.os.PROT_WRITE,
|
|
// std.os.MAP_PRIVATE | std.os.MAP_ANONYMOUS,
|
|
// -1,
|
|
// 0,
|
|
//) catch @panic("out of memory");
|
|
//std.os.mprotect(new_stack[0..std.mem.page_size], std.os.PROT_NONE) catch {};
|
|
//std.os.exit(@newStackCall(new_stack, callMainWithArgs, argc, argv, envp));
|
|
}
|
|
|
|
std.os.exit(@inlineCall(callMainWithArgs, argc, argv, envp));
|
|
}
|
|
|
|
fn callMainWithArgs(argc: usize, argv: [*][*]u8, envp: [][*]u8) u8 {
|
|
std.os.argv = argv[0..argc];
|
|
std.os.environ = envp;
|
|
|
|
std.debug.maybeEnableSegfaultHandler();
|
|
|
|
return callMain();
|
|
}
|
|
|
|
extern fn main(c_argc: i32, c_argv: [*][*]u8, c_envp: [*]?[*]u8) i32 {
|
|
var env_count: usize = 0;
|
|
while (c_envp[env_count] != null) : (env_count += 1) {}
|
|
const envp = @ptrCast([*][*]u8, c_envp)[0..env_count];
|
|
return @inlineCall(callMainWithArgs, @intCast(usize, c_argc), c_argv, envp);
|
|
}
|
|
|
|
// General error message for a malformed return type
|
|
const bad_main_ret = "expected return type of main to be 'void', '!void', 'noreturn', 'u8', or '!u8'";
|
|
|
|
// This is marked inline because for some reason LLVM in release mode fails to inline it,
|
|
// and we want fewer call frames in stack traces.
|
|
inline fn callMain() u8 {
|
|
switch (@typeInfo(@typeOf(root.main).ReturnType)) {
|
|
.NoReturn => {
|
|
root.main();
|
|
},
|
|
.Void => {
|
|
root.main();
|
|
return 0;
|
|
},
|
|
.Int => |info| {
|
|
if (info.bits != 8) {
|
|
@compileError(bad_main_ret);
|
|
}
|
|
return root.main();
|
|
},
|
|
.ErrorUnion => {
|
|
const result = root.main() catch |err| {
|
|
std.debug.warn("error: {}\n", @errorName(err));
|
|
if (@errorReturnTrace()) |trace| {
|
|
std.debug.dumpStackTrace(trace.*);
|
|
}
|
|
return 1;
|
|
};
|
|
switch (@typeInfo(@typeOf(result))) {
|
|
.Void => return 0,
|
|
.Int => |info| {
|
|
if (info.bits != 8) {
|
|
@compileError(bad_main_ret);
|
|
}
|
|
return result;
|
|
},
|
|
else => @compileError(bad_main_ret),
|
|
}
|
|
},
|
|
else => @compileError(bad_main_ret),
|
|
}
|
|
}
|
|
|
|
const main_thread_tls_align = 32;
|
|
var main_thread_tls_bytes: [64]u8 align(main_thread_tls_align) = [1]u8{0} ** 64;
|