1@node Non-Local Exits, Signal Handling, Resource Usage And Limitation, Top
2@c %MENU% Jumping out of nested function calls
3@chapter Non-Local Exits
4@cindex non-local exits
5@cindex long jumps
6
7Sometimes when your program detects an unusual situation inside a deeply
8nested set of function calls, you would like to be able to immediately
9return to an outer level of control.  This section describes how you can
10do such @dfn{non-local exits} using the @code{setjmp} and @code{longjmp}
11functions.
12
13@menu
14* Intro: Non-Local Intro.        When and how to use these facilities.
15* Details: Non-Local Details.    Functions for non-local exits.
16* Non-Local Exits and Signals::  Portability issues.
17* System V contexts::            Complete context control a la System V.
18@end menu
19
20@node Non-Local Intro, Non-Local Details,  , Non-Local Exits
21@section Introduction to Non-Local Exits
22
23As an example of a situation where a non-local exit can be useful,
24suppose you have an interactive program that has a ``main loop'' that
25prompts for and executes commands.  Suppose the ``read'' command reads
26input from a file, doing some lexical analysis and parsing of the input
27while processing it.  If a low-level input error is detected, it would
28be useful to be able to return immediately to the ``main loop'' instead
29of having to make each of the lexical analysis, parsing, and processing
30phases all have to explicitly deal with error situations initially
31detected by nested calls.
32
33(On the other hand, if each of these phases has to do a substantial
34amount of cleanup when it exits---such as closing files, deallocating
35buffers or other data structures, and the like---then it can be more
36appropriate to do a normal return and have each phase do its own
37cleanup, because a non-local exit would bypass the intervening phases and
38their associated cleanup code entirely.  Alternatively, you could use a
39non-local exit but do the cleanup explicitly either before or after
40returning to the ``main loop''.)
41
42In some ways, a non-local exit is similar to using the @samp{return}
43statement to return from a function.  But while @samp{return} abandons
44only a single function call, transferring control back to the point at
45which it was called, a non-local exit can potentially abandon many
46levels of nested function calls.
47
48You identify return points for non-local exits by calling the function
49@code{setjmp}.  This function saves information about the execution
50environment in which the call to @code{setjmp} appears in an object of
51type @code{jmp_buf}.  Execution of the program continues normally after
52the call to @code{setjmp}, but if an exit is later made to this return
53point by calling @code{longjmp} with the corresponding @w{@code{jmp_buf}}
54object, control is transferred back to the point where @code{setjmp} was
55called.  The return value from @code{setjmp} is used to distinguish
56between an ordinary return and a return made by a call to
57@code{longjmp}, so calls to @code{setjmp} usually appear in an @samp{if}
58statement.
59
60Here is how the example program described above might be set up:
61
62@smallexample
63@include setjmp.c.texi
64@end smallexample
65
66The function @code{abort_to_main_loop} causes an immediate transfer of
67control back to the main loop of the program, no matter where it is
68called from.
69
70The flow of control inside the @code{main} function may appear a little
71mysterious at first, but it is actually a common idiom with
72@code{setjmp}.  A normal call to @code{setjmp} returns zero, so the
73``else'' clause of the conditional is executed.  If
74@code{abort_to_main_loop} is called somewhere within the execution of
75@code{do_command}, then it actually appears as if the @emph{same} call
76to @code{setjmp} in @code{main} were returning a second time with a value
77of @code{-1}.
78
79@need 250
80So, the general pattern for using @code{setjmp} looks something like:
81
82@smallexample
83if (setjmp (@var{buffer}))
84  /* @r{Code to clean up after premature return.} */
85  @dots{}
86else
87  /* @r{Code to be executed normally after setting up the return point.} */
88  @dots{}
89@end smallexample
90
91@node Non-Local Details, Non-Local Exits and Signals, Non-Local Intro, Non-Local Exits
92@section Details of Non-Local Exits
93
94Here are the details on the functions and data structures used for
95performing non-local exits.  These facilities are declared in
96@file{setjmp.h}.
97@pindex setjmp.h
98
99@deftp {Data Type} jmp_buf
100@standards{ISO, setjmp.h}
101Objects of type @code{jmp_buf} hold the state information to
102be restored by a non-local exit.  The contents of a @code{jmp_buf}
103identify a specific place to return to.
104@end deftp
105
106@deftypefn Macro int setjmp (jmp_buf @var{state})
107@standards{ISO, setjmp.h}
108@safety{@prelim{}@mtsafe{}@assafe{}@acsafe{}}
109@c _setjmp ok
110@c  __sigsetjmp(!savemask) ok
111@c   __sigjmp_save(!savemask) ok, does not call sigprocmask
112When called normally, @code{setjmp} stores information about the
113execution state of the program in @var{state} and returns zero.  If
114@code{longjmp} is later used to perform a non-local exit to this
115@var{state}, @code{setjmp} returns a nonzero value.
116@end deftypefn
117
118@deftypefun void longjmp (jmp_buf @var{state}, int @var{value})
119@standards{ISO, setjmp.h}
120@safety{@prelim{}@mtsafe{}@asunsafe{@ascuplugin{} @asucorrupt{} @asulock{/hurd}}@acunsafe{@acucorrupt{} @aculock{/hurd}}}
121@c __libc_siglongjmp @ascuplugin @asucorrupt @asulock/hurd @acucorrupt @aculock/hurd
122@c  _longjmp_unwind @ascuplugin @asucorrupt @acucorrupt
123@c   __pthread_cleanup_upto @ascuplugin @asucorrupt @acucorrupt
124@c     plugins may be unsafe themselves, but even if they weren't, this
125@c     function isn't robust WRT async signals and cancellation:
126@c     cleanups aren't taken off the stack right away, only after all
127@c     cleanups have been run.  This means that async-cancelling
128@c     longjmp, or interrupting longjmp with an async signal handler
129@c     that calls longjmp may run the same cleanups multiple times.
130@c    _JMPBUF_UNWINDS_ADJ ok
131@c    *cleanup_buf->__routine @ascuplugin
132@c  sigprocmask(SIG_SETMASK) dup @asulock/hurd @aculock/hurd
133@c  __longjmp ok
134This function restores current execution to the state saved in
135@var{state}, and continues execution from the call to @code{setjmp} that
136established that return point.  Returning from @code{setjmp} by means of
137@code{longjmp} returns the @var{value} argument that was passed to
138@code{longjmp}, rather than @code{0}.  (But if @var{value} is given as
139@code{0}, @code{setjmp} returns @code{1}).
140@end deftypefun
141
142There are a lot of obscure but important restrictions on the use of
143@code{setjmp} and @code{longjmp}.  Most of these restrictions are
144present because non-local exits require a fair amount of magic on the
145part of the C compiler and can interact with other parts of the language
146in strange ways.
147
148The @code{setjmp} function is actually a macro without an actual
149function definition, so you shouldn't try to @samp{#undef} it or take
150its address.  In addition, calls to @code{setjmp} are safe in only the
151following contexts:
152
153@itemize @bullet
154@item
155As the test expression of a selection or iteration
156statement (such as @samp{if}, @samp{switch}, or @samp{while}).
157
158@item
159As one operand of an equality or comparison operator that appears as the
160test expression of a selection or iteration statement.  The other
161operand must be an integer constant expression.
162
163@item
164As the operand of a unary @samp{!} operator, that appears as the
165test expression of a selection or iteration statement.
166
167@item
168By itself as an expression statement.
169@end itemize
170
171Return points are valid only during the dynamic extent of the function
172that called @code{setjmp} to establish them.  If you @code{longjmp} to
173a return point that was established in a function that has already
174returned, unpredictable and disastrous things are likely to happen.
175
176You should use a nonzero @var{value} argument to @code{longjmp}.  While
177@code{longjmp} refuses to pass back a zero argument as the return value
178from @code{setjmp}, this is intended as a safety net against accidental
179misuse and is not really good programming style.
180
181When you perform a non-local exit, accessible objects generally retain
182whatever values they had at the time @code{longjmp} was called.  The
183exception is that the values of automatic variables local to the
184function containing the @code{setjmp} call that have been changed since
185the call to @code{setjmp} are indeterminate, unless you have declared
186them @code{volatile}.
187
188@node Non-Local Exits and Signals, System V contexts, Non-Local Details, Non-Local Exits
189@section Non-Local Exits and Signals
190
191In BSD Unix systems, @code{setjmp} and @code{longjmp} also save and
192restore the set of blocked signals; see @ref{Blocking Signals}.  However,
193the POSIX.1 standard requires @code{setjmp} and @code{longjmp} not to
194change the set of blocked signals, and provides an additional pair of
195functions (@code{sigsetjmp} and @code{siglongjmp}) to get the BSD
196behavior.
197
198The behavior of @code{setjmp} and @code{longjmp} in @theglibc{} is
199controlled by feature test macros; see @ref{Feature Test Macros}.  The
200default in @theglibc{} is the POSIX.1 behavior rather than the BSD
201behavior.
202
203The facilities in this section are declared in the header file
204@file{setjmp.h}.
205@pindex setjmp.h
206
207@deftp {Data Type} sigjmp_buf
208@standards{POSIX.1, setjmp.h}
209This is similar to @code{jmp_buf}, except that it can also store state
210information about the set of blocked signals.
211@end deftp
212
213@deftypefun int sigsetjmp (sigjmp_buf @var{state}, int @var{savesigs})
214@standards{POSIX.1, setjmp.h}
215@safety{@prelim{}@mtsafe{}@asunsafe{@asulock{/hurd}}@acunsafe{@aculock{/hurd}}}
216@c sigsetjmp @asulock/hurd @aculock/hurd
217@c  __sigsetjmp(savemask) @asulock/hurd @aculock/hurd
218@c   __sigjmp_save(savemask) @asulock/hurd @aculock/hurd
219@c    sigprocmask(SIG_BLOCK probe) dup @asulock/hurd @aculock/hurd
220This is similar to @code{setjmp}.  If @var{savesigs} is nonzero, the set
221of blocked signals is saved in @var{state} and will be restored if a
222@code{siglongjmp} is later performed with this @var{state}.
223@end deftypefun
224
225@deftypefun void siglongjmp (sigjmp_buf @var{state}, int @var{value})
226@standards{POSIX.1, setjmp.h}
227@safety{@prelim{}@mtsafe{}@asunsafe{@ascuplugin{} @asucorrupt{} @asulock{/hurd}}@acunsafe{@acucorrupt{} @aculock{/hurd}}}
228@c Alias to longjmp.
229This is similar to @code{longjmp} except for the type of its @var{state}
230argument.  If the @code{sigsetjmp} call that set this @var{state} used a
231nonzero @var{savesigs} flag, @code{siglongjmp} also restores the set of
232blocked signals.
233@end deftypefun
234
235@node System V contexts,, Non-Local Exits and Signals, Non-Local Exits
236@section Complete Context Control
237
238The Unix standard provides one more set of functions to control the
239execution path and these functions are more powerful than those
240discussed in this chapter so far.  These functions were part of the
241original @w{System V} API and by this route were added to the Unix
242API.  Besides on branded Unix implementations these interfaces are not
243widely available.  Not all platforms and/or architectures @theglibc{}
244is available on provide this interface.  Use @file{configure} to
245detect the availability.
246
247Similar to the @code{jmp_buf} and @code{sigjmp_buf} types used for the
248variables to contain the state of the @code{longjmp} functions the
249interfaces of interest here have an appropriate type as well.  Objects
250of this type are normally much larger since more information is
251contained.  The type is also used in a few more places as we will see.
252The types and functions described in this section are all defined and
253declared respectively in the @file{ucontext.h} header file.
254
255@deftp {Data Type} ucontext_t
256@standards{SVID, ucontext.h}
257
258The @code{ucontext_t} type is defined as a structure with at least the
259following elements:
260
261@table @code
262@item ucontext_t *uc_link
263This is a pointer to the next context structure which is used if the
264context described in the current structure returns.
265
266@item sigset_t uc_sigmask
267Set of signals which are blocked when this context is used.
268
269@item stack_t uc_stack
270Stack used for this context.  The value need not be (and normally is
271not) the stack pointer.  @xref{Signal Stack}.
272
273@item mcontext_t uc_mcontext
274This element contains the actual state of the process.  The
275@code{mcontext_t} type is also defined in this header but the definition
276should be treated as opaque.  Any use of knowledge of the type makes
277applications less portable.
278
279@end table
280@end deftp
281
282Objects of this type have to be created by the user.  The initialization
283and modification happens through one of the following functions:
284
285@deftypefun int getcontext (ucontext_t *@var{ucp})
286@standards{SVID, ucontext.h}
287@safety{@prelim{}@mtsafe{@mtsrace{:ucp}}@assafe{}@acsafe{}}
288@c Linux-only implementations in assembly, including sigprocmask
289@c syscall.  A few cases call the sigprocmask function, but that's safe
290@c too.  The ppc case is implemented in terms of a swapcontext syscall.
291The @code{getcontext} function initializes the variable pointed to by
292@var{ucp} with the context of the calling thread.  The context contains
293the content of the registers, the signal mask, and the current stack.
294Executing the contents would start at the point where the
295@code{getcontext} call just returned.
296
297@strong{Compatibility Note:} Depending on the operating system,
298information about the current context's stack may be in the
299@code{uc_stack} field of @var{ucp}, or it may instead be in
300architecture-specific subfields of the @code{uc_mcontext} field.
301
302The function returns @code{0} if successful.  Otherwise it returns
303@code{-1} and sets @code{errno} accordingly.
304@end deftypefun
305
306The @code{getcontext} function is similar to @code{setjmp} but it does
307not provide an indication of whether @code{getcontext} is returning for
308the first time or whether an initialized context has just been restored.
309If this is necessary the user has to determine this herself.  This must
310be done carefully since the context contains registers which might contain
311register variables.  This is a good situation to define variables with
312@code{volatile}.
313
314Once the context variable is initialized it can be used as is or it can
315be modified using the @code{makecontext} function.  The latter is normally
316done when implementing co-routines or similar constructs.
317
318@deftypefun void makecontext (ucontext_t *@var{ucp}, void (*@var{func}) (void), int @var{argc}, @dots{})
319@standards{SVID, ucontext.h}
320@safety{@prelim{}@mtsafe{@mtsrace{:ucp}}@assafe{}@acsafe{}}
321@c Linux-only implementations mostly in assembly, nothing unsafe.
322
323The @var{ucp} parameter passed to @code{makecontext} shall be
324initialized by a call to @code{getcontext}.  The context will be
325modified in a way such that if the context is resumed it will start by
326calling the function @code{func} which gets @var{argc} integer arguments
327passed.  The integer arguments which are to be passed should follow the
328@var{argc} parameter in the call to @code{makecontext}.
329
330Before the call to this function the @code{uc_stack} and @code{uc_link}
331element of the @var{ucp} structure should be initialized.  The
332@code{uc_stack} element describes the stack which is used for this
333context.  No two contexts which are used at the same time should use the
334same memory region for a stack.
335
336The @code{uc_link} element of the object pointed to by @var{ucp} should
337be a pointer to the context to be executed when the function @var{func}
338returns or it should be a null pointer.  See @code{setcontext} for more
339information about the exact use.
340@end deftypefun
341
342While allocating the memory for the stack one has to be careful.  Most
343modern processors keep track of whether a certain memory region is
344allowed to contain code which is executed or not.  Data segments and
345heap memory are normally not tagged to allow this.  The result is that
346programs would fail.  Examples for such code include the calling
347sequences the GNU C compiler generates for calls to nested functions.
348Safe ways to allocate stacks correctly include using memory on the
349original thread's stack or explicitly allocating memory tagged for
350execution using (@pxref{Memory-mapped I/O}).
351
352@strong{Compatibility note}: The current Unix standard is very imprecise
353about the way the stack is allocated.  All implementations seem to agree
354that the @code{uc_stack} element must be used but the values stored in
355the elements of the @code{stack_t} value are unclear.  @Theglibc{}
356and most other Unix implementations require the @code{ss_sp} value of
357the @code{uc_stack} element to point to the base of the memory region
358allocated for the stack and the size of the memory region is stored in
359@code{ss_size}.  There are implementations out there which require
360@code{ss_sp} to be set to the value the stack pointer will have (which
361can, depending on the direction the stack grows, be different).  This
362difference makes the @code{makecontext} function hard to use and it
363requires detection of the platform at compile time.
364
365@deftypefun int setcontext (const ucontext_t *@var{ucp})
366@standards{SVID, ucontext.h}
367@safety{@prelim{}@mtsafe{@mtsrace{:ucp}}@asunsafe{@asucorrupt{}}@acunsafe{@acucorrupt{}}}
368@c Linux-only implementations mostly in assembly.  Some ports use
369@c sigreturn or swapcontext syscalls; others restore the signal mask
370@c first and then proceed restore other registers in userland, which
371@c leaves a window for cancellation or async signals with misaligned or
372@c otherwise corrupt stack.  ??? Switching to a different stack, or even
373@c to an earlier state on the same stack, may conflict with pthread
374@c cleanups.  This is not quite MT-Unsafe, it's a different kind of
375@c safety issue.
376
377The @code{setcontext} function restores the context described by
378@var{ucp}.  The context is not modified and can be reused as often as
379wanted.
380
381If the context was created by @code{getcontext} execution resumes with
382the registers filled with the same values and the same stack as if the
383@code{getcontext} call just returned.
384
385If the context was modified with a call to @code{makecontext} execution
386continues with the function passed to @code{makecontext} which gets the
387specified parameters passed.  If this function returns execution is
388resumed in the context which was referenced by the @code{uc_link}
389element of the context structure passed to @code{makecontext} at the
390time of the call.  If @code{uc_link} was a null pointer the application
391terminates normally with an exit status value of @code{EXIT_SUCCESS}
392(@pxref{Program Termination}).
393
394If the context was created by a call to a signal handler or from any
395other source then the behaviour of @code{setcontext} is unspecified.
396
397Since the context contains information about the stack no two threads
398should use the same context at the same time.  The result in most cases
399would be disastrous.
400
401The @code{setcontext} function does not return unless an error occurred
402in which case it returns @code{-1}.
403@end deftypefun
404
405The @code{setcontext} function simply replaces the current context with
406the one described by the @var{ucp} parameter.  This is often useful but
407there are situations where the current context has to be preserved.
408
409@deftypefun int swapcontext (ucontext_t *restrict @var{oucp}, const ucontext_t *restrict @var{ucp})
410@standards{SVID, ucontext.h}
411@safety{@prelim{}@mtsafe{@mtsrace{:oucp} @mtsrace{:ucp}}@asunsafe{@asucorrupt{}}@acunsafe{@acucorrupt{}}}
412@c Linux-only implementations mostly in assembly.  Some ports call or
413@c inline getcontext and/or setcontext, adjusting the saved context in
414@c between, so we inherit the potential issues of both.
415
416The @code{swapcontext} function is similar to @code{setcontext} but
417instead of just replacing the current context the latter is first saved
418in the object pointed to by @var{oucp} as if this was a call to
419@code{getcontext}.  The saved context would resume after the call to
420@code{swapcontext}.
421
422Once the current context is saved the context described in @var{ucp} is
423installed and execution continues as described in this context.
424
425If @code{swapcontext} succeeds the function does not return unless the
426context @var{oucp} is used without prior modification by
427@code{makecontext}.  The return value in this case is @code{0}.  If the
428function fails it returns @code{-1} and sets @code{errno} accordingly.
429@end deftypefun
430
431@heading Example for SVID Context Handling
432
433The easiest way to use the context handling functions is as a
434replacement for @code{setjmp} and @code{longjmp}.  The context contains
435on most platforms more information which may lead to fewer surprises
436but this also means using these functions is more expensive (besides
437being less portable).
438
439@smallexample
440int
441random_search (int n, int (*fp) (int, ucontext_t *))
442@{
443  volatile int cnt = 0;
444  ucontext_t uc;
445
446  /* @r{Safe current context.}  */
447  if (getcontext (&uc) < 0)
448    return -1;
449
450  /* @r{If we have not tried @var{n} times try again.}  */
451  if (cnt++ < n)
452    /* @r{Call the function with a new random number}
453       @r{and the context}.  */
454    if (fp (rand (), &uc) != 0)
455      /* @r{We found what we were looking for.}  */
456      return 1;
457
458  /* @r{Not found.}  */
459  return 0;
460@}
461@end smallexample
462
463Using contexts in such a way enables emulating exception handling.  The
464search functions passed in the @var{fp} parameter could be very large,
465nested, and complex which would make it complicated (or at least would
466require a lot of code) to leave the function with an error value which
467has to be passed down to the caller.  By using the context it is
468possible to leave the search function in one step and allow restarting
469the search which also has the nice side effect that it can be
470significantly faster.
471
472Something which is harder to implement with @code{setjmp} and
473@code{longjmp} is to switch temporarily to a different execution path
474and then resume where execution was stopped.
475
476@smallexample
477@include swapcontext.c.texi
478@end smallexample
479
480This an example how the context functions can be used to implement
481co-routines or cooperative multi-threading.  All that has to be done is
482to call every once in a while @code{swapcontext} to continue running a
483different context.  It is not recommended to do the context switching from
484the signal handler directly since leaving the signal handler via
485@code{setcontext} if the signal was delivered during code that was not
486asynchronous signal safe could lead to problems. Setting a variable in
487the signal handler and checking it in the body of the functions which
488are executed is a safer approach.  Since @code{swapcontext} is saving the
489current context it is possible to have multiple different scheduling points
490in the code.  Execution will always resume where it was left.
491