1@node Non-Local Exits, Signal Handling, Resource Usage And Limitation, Top 2@c %MENU% Jumping out of nested function calls 3@chapter Non-Local Exits 4@cindex non-local exits 5@cindex long jumps 6 7Sometimes when your program detects an unusual situation inside a deeply 8nested set of function calls, you would like to be able to immediately 9return to an outer level of control. This section describes how you can 10do such @dfn{non-local exits} using the @code{setjmp} and @code{longjmp} 11functions. 12 13@menu 14* Intro: Non-Local Intro. When and how to use these facilities. 15* Details: Non-Local Details. Functions for non-local exits. 16* Non-Local Exits and Signals:: Portability issues. 17* System V contexts:: Complete context control a la System V. 18@end menu 19 20@node Non-Local Intro, Non-Local Details, , Non-Local Exits 21@section Introduction to Non-Local Exits 22 23As an example of a situation where a non-local exit can be useful, 24suppose you have an interactive program that has a ``main loop'' that 25prompts for and executes commands. Suppose the ``read'' command reads 26input from a file, doing some lexical analysis and parsing of the input 27while processing it. If a low-level input error is detected, it would 28be useful to be able to return immediately to the ``main loop'' instead 29of having to make each of the lexical analysis, parsing, and processing 30phases all have to explicitly deal with error situations initially 31detected by nested calls. 32 33(On the other hand, if each of these phases has to do a substantial 34amount of cleanup when it exits---such as closing files, deallocating 35buffers or other data structures, and the like---then it can be more 36appropriate to do a normal return and have each phase do its own 37cleanup, because a non-local exit would bypass the intervening phases and 38their associated cleanup code entirely. Alternatively, you could use a 39non-local exit but do the cleanup explicitly either before or after 40returning to the ``main loop''.) 41 42In some ways, a non-local exit is similar to using the @samp{return} 43statement to return from a function. But while @samp{return} abandons 44only a single function call, transferring control back to the point at 45which it was called, a non-local exit can potentially abandon many 46levels of nested function calls. 47 48You identify return points for non-local exits by calling the function 49@code{setjmp}. This function saves information about the execution 50environment in which the call to @code{setjmp} appears in an object of 51type @code{jmp_buf}. Execution of the program continues normally after 52the call to @code{setjmp}, but if an exit is later made to this return 53point by calling @code{longjmp} with the corresponding @w{@code{jmp_buf}} 54object, control is transferred back to the point where @code{setjmp} was 55called. The return value from @code{setjmp} is used to distinguish 56between an ordinary return and a return made by a call to 57@code{longjmp}, so calls to @code{setjmp} usually appear in an @samp{if} 58statement. 59 60Here is how the example program described above might be set up: 61 62@smallexample 63@include setjmp.c.texi 64@end smallexample 65 66The function @code{abort_to_main_loop} causes an immediate transfer of 67control back to the main loop of the program, no matter where it is 68called from. 69 70The flow of control inside the @code{main} function may appear a little 71mysterious at first, but it is actually a common idiom with 72@code{setjmp}. A normal call to @code{setjmp} returns zero, so the 73``else'' clause of the conditional is executed. If 74@code{abort_to_main_loop} is called somewhere within the execution of 75@code{do_command}, then it actually appears as if the @emph{same} call 76to @code{setjmp} in @code{main} were returning a second time with a value 77of @code{-1}. 78 79@need 250 80So, the general pattern for using @code{setjmp} looks something like: 81 82@smallexample 83if (setjmp (@var{buffer})) 84 /* @r{Code to clean up after premature return.} */ 85 @dots{} 86else 87 /* @r{Code to be executed normally after setting up the return point.} */ 88 @dots{} 89@end smallexample 90 91@node Non-Local Details, Non-Local Exits and Signals, Non-Local Intro, Non-Local Exits 92@section Details of Non-Local Exits 93 94Here are the details on the functions and data structures used for 95performing non-local exits. These facilities are declared in 96@file{setjmp.h}. 97@pindex setjmp.h 98 99@deftp {Data Type} jmp_buf 100@standards{ISO, setjmp.h} 101Objects of type @code{jmp_buf} hold the state information to 102be restored by a non-local exit. The contents of a @code{jmp_buf} 103identify a specific place to return to. 104@end deftp 105 106@deftypefn Macro int setjmp (jmp_buf @var{state}) 107@standards{ISO, setjmp.h} 108@safety{@prelim{}@mtsafe{}@assafe{}@acsafe{}} 109@c _setjmp ok 110@c __sigsetjmp(!savemask) ok 111@c __sigjmp_save(!savemask) ok, does not call sigprocmask 112When called normally, @code{setjmp} stores information about the 113execution state of the program in @var{state} and returns zero. If 114@code{longjmp} is later used to perform a non-local exit to this 115@var{state}, @code{setjmp} returns a nonzero value. 116@end deftypefn 117 118@deftypefun void longjmp (jmp_buf @var{state}, int @var{value}) 119@standards{ISO, setjmp.h} 120@safety{@prelim{}@mtsafe{}@asunsafe{@ascuplugin{} @asucorrupt{} @asulock{/hurd}}@acunsafe{@acucorrupt{} @aculock{/hurd}}} 121@c __libc_siglongjmp @ascuplugin @asucorrupt @asulock/hurd @acucorrupt @aculock/hurd 122@c _longjmp_unwind @ascuplugin @asucorrupt @acucorrupt 123@c __pthread_cleanup_upto @ascuplugin @asucorrupt @acucorrupt 124@c plugins may be unsafe themselves, but even if they weren't, this 125@c function isn't robust WRT async signals and cancellation: 126@c cleanups aren't taken off the stack right away, only after all 127@c cleanups have been run. This means that async-cancelling 128@c longjmp, or interrupting longjmp with an async signal handler 129@c that calls longjmp may run the same cleanups multiple times. 130@c _JMPBUF_UNWINDS_ADJ ok 131@c *cleanup_buf->__routine @ascuplugin 132@c sigprocmask(SIG_SETMASK) dup @asulock/hurd @aculock/hurd 133@c __longjmp ok 134This function restores current execution to the state saved in 135@var{state}, and continues execution from the call to @code{setjmp} that 136established that return point. Returning from @code{setjmp} by means of 137@code{longjmp} returns the @var{value} argument that was passed to 138@code{longjmp}, rather than @code{0}. (But if @var{value} is given as 139@code{0}, @code{setjmp} returns @code{1}). 140@end deftypefun 141 142There are a lot of obscure but important restrictions on the use of 143@code{setjmp} and @code{longjmp}. Most of these restrictions are 144present because non-local exits require a fair amount of magic on the 145part of the C compiler and can interact with other parts of the language 146in strange ways. 147 148The @code{setjmp} function is actually a macro without an actual 149function definition, so you shouldn't try to @samp{#undef} it or take 150its address. In addition, calls to @code{setjmp} are safe in only the 151following contexts: 152 153@itemize @bullet 154@item 155As the test expression of a selection or iteration 156statement (such as @samp{if}, @samp{switch}, or @samp{while}). 157 158@item 159As one operand of an equality or comparison operator that appears as the 160test expression of a selection or iteration statement. The other 161operand must be an integer constant expression. 162 163@item 164As the operand of a unary @samp{!} operator, that appears as the 165test expression of a selection or iteration statement. 166 167@item 168By itself as an expression statement. 169@end itemize 170 171Return points are valid only during the dynamic extent of the function 172that called @code{setjmp} to establish them. If you @code{longjmp} to 173a return point that was established in a function that has already 174returned, unpredictable and disastrous things are likely to happen. 175 176You should use a nonzero @var{value} argument to @code{longjmp}. While 177@code{longjmp} refuses to pass back a zero argument as the return value 178from @code{setjmp}, this is intended as a safety net against accidental 179misuse and is not really good programming style. 180 181When you perform a non-local exit, accessible objects generally retain 182whatever values they had at the time @code{longjmp} was called. The 183exception is that the values of automatic variables local to the 184function containing the @code{setjmp} call that have been changed since 185the call to @code{setjmp} are indeterminate, unless you have declared 186them @code{volatile}. 187 188@node Non-Local Exits and Signals, System V contexts, Non-Local Details, Non-Local Exits 189@section Non-Local Exits and Signals 190 191In BSD Unix systems, @code{setjmp} and @code{longjmp} also save and 192restore the set of blocked signals; see @ref{Blocking Signals}. However, 193the POSIX.1 standard requires @code{setjmp} and @code{longjmp} not to 194change the set of blocked signals, and provides an additional pair of 195functions (@code{sigsetjmp} and @code{siglongjmp}) to get the BSD 196behavior. 197 198The behavior of @code{setjmp} and @code{longjmp} in @theglibc{} is 199controlled by feature test macros; see @ref{Feature Test Macros}. The 200default in @theglibc{} is the POSIX.1 behavior rather than the BSD 201behavior. 202 203The facilities in this section are declared in the header file 204@file{setjmp.h}. 205@pindex setjmp.h 206 207@deftp {Data Type} sigjmp_buf 208@standards{POSIX.1, setjmp.h} 209This is similar to @code{jmp_buf}, except that it can also store state 210information about the set of blocked signals. 211@end deftp 212 213@deftypefun int sigsetjmp (sigjmp_buf @var{state}, int @var{savesigs}) 214@standards{POSIX.1, setjmp.h} 215@safety{@prelim{}@mtsafe{}@asunsafe{@asulock{/hurd}}@acunsafe{@aculock{/hurd}}} 216@c sigsetjmp @asulock/hurd @aculock/hurd 217@c __sigsetjmp(savemask) @asulock/hurd @aculock/hurd 218@c __sigjmp_save(savemask) @asulock/hurd @aculock/hurd 219@c sigprocmask(SIG_BLOCK probe) dup @asulock/hurd @aculock/hurd 220This is similar to @code{setjmp}. If @var{savesigs} is nonzero, the set 221of blocked signals is saved in @var{state} and will be restored if a 222@code{siglongjmp} is later performed with this @var{state}. 223@end deftypefun 224 225@deftypefun void siglongjmp (sigjmp_buf @var{state}, int @var{value}) 226@standards{POSIX.1, setjmp.h} 227@safety{@prelim{}@mtsafe{}@asunsafe{@ascuplugin{} @asucorrupt{} @asulock{/hurd}}@acunsafe{@acucorrupt{} @aculock{/hurd}}} 228@c Alias to longjmp. 229This is similar to @code{longjmp} except for the type of its @var{state} 230argument. If the @code{sigsetjmp} call that set this @var{state} used a 231nonzero @var{savesigs} flag, @code{siglongjmp} also restores the set of 232blocked signals. 233@end deftypefun 234 235@node System V contexts,, Non-Local Exits and Signals, Non-Local Exits 236@section Complete Context Control 237 238The Unix standard provides one more set of functions to control the 239execution path and these functions are more powerful than those 240discussed in this chapter so far. These functions were part of the 241original @w{System V} API and by this route were added to the Unix 242API. Besides on branded Unix implementations these interfaces are not 243widely available. Not all platforms and/or architectures @theglibc{} 244is available on provide this interface. Use @file{configure} to 245detect the availability. 246 247Similar to the @code{jmp_buf} and @code{sigjmp_buf} types used for the 248variables to contain the state of the @code{longjmp} functions the 249interfaces of interest here have an appropriate type as well. Objects 250of this type are normally much larger since more information is 251contained. The type is also used in a few more places as we will see. 252The types and functions described in this section are all defined and 253declared respectively in the @file{ucontext.h} header file. 254 255@deftp {Data Type} ucontext_t 256@standards{SVID, ucontext.h} 257 258The @code{ucontext_t} type is defined as a structure with at least the 259following elements: 260 261@table @code 262@item ucontext_t *uc_link 263This is a pointer to the next context structure which is used if the 264context described in the current structure returns. 265 266@item sigset_t uc_sigmask 267Set of signals which are blocked when this context is used. 268 269@item stack_t uc_stack 270Stack used for this context. The value need not be (and normally is 271not) the stack pointer. @xref{Signal Stack}. 272 273@item mcontext_t uc_mcontext 274This element contains the actual state of the process. The 275@code{mcontext_t} type is also defined in this header but the definition 276should be treated as opaque. Any use of knowledge of the type makes 277applications less portable. 278 279@end table 280@end deftp 281 282Objects of this type have to be created by the user. The initialization 283and modification happens through one of the following functions: 284 285@deftypefun int getcontext (ucontext_t *@var{ucp}) 286@standards{SVID, ucontext.h} 287@safety{@prelim{}@mtsafe{@mtsrace{:ucp}}@assafe{}@acsafe{}} 288@c Linux-only implementations in assembly, including sigprocmask 289@c syscall. A few cases call the sigprocmask function, but that's safe 290@c too. The ppc case is implemented in terms of a swapcontext syscall. 291The @code{getcontext} function initializes the variable pointed to by 292@var{ucp} with the context of the calling thread. The context contains 293the content of the registers, the signal mask, and the current stack. 294Executing the contents would start at the point where the 295@code{getcontext} call just returned. 296 297@strong{Compatibility Note:} Depending on the operating system, 298information about the current context's stack may be in the 299@code{uc_stack} field of @var{ucp}, or it may instead be in 300architecture-specific subfields of the @code{uc_mcontext} field. 301 302The function returns @code{0} if successful. Otherwise it returns 303@code{-1} and sets @code{errno} accordingly. 304@end deftypefun 305 306The @code{getcontext} function is similar to @code{setjmp} but it does 307not provide an indication of whether @code{getcontext} is returning for 308the first time or whether an initialized context has just been restored. 309If this is necessary the user has to determine this herself. This must 310be done carefully since the context contains registers which might contain 311register variables. This is a good situation to define variables with 312@code{volatile}. 313 314Once the context variable is initialized it can be used as is or it can 315be modified using the @code{makecontext} function. The latter is normally 316done when implementing co-routines or similar constructs. 317 318@deftypefun void makecontext (ucontext_t *@var{ucp}, void (*@var{func}) (void), int @var{argc}, @dots{}) 319@standards{SVID, ucontext.h} 320@safety{@prelim{}@mtsafe{@mtsrace{:ucp}}@assafe{}@acsafe{}} 321@c Linux-only implementations mostly in assembly, nothing unsafe. 322 323The @var{ucp} parameter passed to @code{makecontext} shall be 324initialized by a call to @code{getcontext}. The context will be 325modified in a way such that if the context is resumed it will start by 326calling the function @code{func} which gets @var{argc} integer arguments 327passed. The integer arguments which are to be passed should follow the 328@var{argc} parameter in the call to @code{makecontext}. 329 330Before the call to this function the @code{uc_stack} and @code{uc_link} 331element of the @var{ucp} structure should be initialized. The 332@code{uc_stack} element describes the stack which is used for this 333context. No two contexts which are used at the same time should use the 334same memory region for a stack. 335 336The @code{uc_link} element of the object pointed to by @var{ucp} should 337be a pointer to the context to be executed when the function @var{func} 338returns or it should be a null pointer. See @code{setcontext} for more 339information about the exact use. 340@end deftypefun 341 342While allocating the memory for the stack one has to be careful. Most 343modern processors keep track of whether a certain memory region is 344allowed to contain code which is executed or not. Data segments and 345heap memory are normally not tagged to allow this. The result is that 346programs would fail. Examples for such code include the calling 347sequences the GNU C compiler generates for calls to nested functions. 348Safe ways to allocate stacks correctly include using memory on the 349original thread's stack or explicitly allocating memory tagged for 350execution using (@pxref{Memory-mapped I/O}). 351 352@strong{Compatibility note}: The current Unix standard is very imprecise 353about the way the stack is allocated. All implementations seem to agree 354that the @code{uc_stack} element must be used but the values stored in 355the elements of the @code{stack_t} value are unclear. @Theglibc{} 356and most other Unix implementations require the @code{ss_sp} value of 357the @code{uc_stack} element to point to the base of the memory region 358allocated for the stack and the size of the memory region is stored in 359@code{ss_size}. There are implementations out there which require 360@code{ss_sp} to be set to the value the stack pointer will have (which 361can, depending on the direction the stack grows, be different). This 362difference makes the @code{makecontext} function hard to use and it 363requires detection of the platform at compile time. 364 365@deftypefun int setcontext (const ucontext_t *@var{ucp}) 366@standards{SVID, ucontext.h} 367@safety{@prelim{}@mtsafe{@mtsrace{:ucp}}@asunsafe{@asucorrupt{}}@acunsafe{@acucorrupt{}}} 368@c Linux-only implementations mostly in assembly. Some ports use 369@c sigreturn or swapcontext syscalls; others restore the signal mask 370@c first and then proceed restore other registers in userland, which 371@c leaves a window for cancellation or async signals with misaligned or 372@c otherwise corrupt stack. ??? Switching to a different stack, or even 373@c to an earlier state on the same stack, may conflict with pthread 374@c cleanups. This is not quite MT-Unsafe, it's a different kind of 375@c safety issue. 376 377The @code{setcontext} function restores the context described by 378@var{ucp}. The context is not modified and can be reused as often as 379wanted. 380 381If the context was created by @code{getcontext} execution resumes with 382the registers filled with the same values and the same stack as if the 383@code{getcontext} call just returned. 384 385If the context was modified with a call to @code{makecontext} execution 386continues with the function passed to @code{makecontext} which gets the 387specified parameters passed. If this function returns execution is 388resumed in the context which was referenced by the @code{uc_link} 389element of the context structure passed to @code{makecontext} at the 390time of the call. If @code{uc_link} was a null pointer the application 391terminates normally with an exit status value of @code{EXIT_SUCCESS} 392(@pxref{Program Termination}). 393 394If the context was created by a call to a signal handler or from any 395other source then the behaviour of @code{setcontext} is unspecified. 396 397Since the context contains information about the stack no two threads 398should use the same context at the same time. The result in most cases 399would be disastrous. 400 401The @code{setcontext} function does not return unless an error occurred 402in which case it returns @code{-1}. 403@end deftypefun 404 405The @code{setcontext} function simply replaces the current context with 406the one described by the @var{ucp} parameter. This is often useful but 407there are situations where the current context has to be preserved. 408 409@deftypefun int swapcontext (ucontext_t *restrict @var{oucp}, const ucontext_t *restrict @var{ucp}) 410@standards{SVID, ucontext.h} 411@safety{@prelim{}@mtsafe{@mtsrace{:oucp} @mtsrace{:ucp}}@asunsafe{@asucorrupt{}}@acunsafe{@acucorrupt{}}} 412@c Linux-only implementations mostly in assembly. Some ports call or 413@c inline getcontext and/or setcontext, adjusting the saved context in 414@c between, so we inherit the potential issues of both. 415 416The @code{swapcontext} function is similar to @code{setcontext} but 417instead of just replacing the current context the latter is first saved 418in the object pointed to by @var{oucp} as if this was a call to 419@code{getcontext}. The saved context would resume after the call to 420@code{swapcontext}. 421 422Once the current context is saved the context described in @var{ucp} is 423installed and execution continues as described in this context. 424 425If @code{swapcontext} succeeds the function does not return unless the 426context @var{oucp} is used without prior modification by 427@code{makecontext}. The return value in this case is @code{0}. If the 428function fails it returns @code{-1} and sets @code{errno} accordingly. 429@end deftypefun 430 431@heading Example for SVID Context Handling 432 433The easiest way to use the context handling functions is as a 434replacement for @code{setjmp} and @code{longjmp}. The context contains 435on most platforms more information which may lead to fewer surprises 436but this also means using these functions is more expensive (besides 437being less portable). 438 439@smallexample 440int 441random_search (int n, int (*fp) (int, ucontext_t *)) 442@{ 443 volatile int cnt = 0; 444 ucontext_t uc; 445 446 /* @r{Safe current context.} */ 447 if (getcontext (&uc) < 0) 448 return -1; 449 450 /* @r{If we have not tried @var{n} times try again.} */ 451 if (cnt++ < n) 452 /* @r{Call the function with a new random number} 453 @r{and the context}. */ 454 if (fp (rand (), &uc) != 0) 455 /* @r{We found what we were looking for.} */ 456 return 1; 457 458 /* @r{Not found.} */ 459 return 0; 460@} 461@end smallexample 462 463Using contexts in such a way enables emulating exception handling. The 464search functions passed in the @var{fp} parameter could be very large, 465nested, and complex which would make it complicated (or at least would 466require a lot of code) to leave the function with an error value which 467has to be passed down to the caller. By using the context it is 468possible to leave the search function in one step and allow restarting 469the search which also has the nice side effect that it can be 470significantly faster. 471 472Something which is harder to implement with @code{setjmp} and 473@code{longjmp} is to switch temporarily to a different execution path 474and then resume where execution was stopped. 475 476@smallexample 477@include swapcontext.c.texi 478@end smallexample 479 480This an example how the context functions can be used to implement 481co-routines or cooperative multi-threading. All that has to be done is 482to call every once in a while @code{swapcontext} to continue running a 483different context. It is not recommended to do the context switching from 484the signal handler directly since leaving the signal handler via 485@code{setcontext} if the signal was delivered during code that was not 486asynchronous signal safe could lead to problems. Setting a variable in 487the signal handler and checking it in the body of the functions which 488are executed is a safer approach. Since @code{swapcontext} is saving the 489current context it is possible to have multiple different scheduling points 490in the code. Execution will always resume where it was left. 491