2016-08-31 09:08:54 +08:00
|
|
|
[![crates][crates-badge]][crates-url]
|
2015-04-16 21:37:32 +08:00
|
|
|
[![travis][travis-badge]][travis-url]
|
|
|
|
[![rustdoc][rustdoc-badge]][rustdoc-url]
|
|
|
|
|
2016-08-31 09:08:54 +08:00
|
|
|
[crates-badge]: https://img.shields.io/crates/v/fringe.svg?style=flat-square
|
|
|
|
[crates-url]: https://crates.io/crates/fringe
|
2016-07-18 04:12:45 +08:00
|
|
|
[travis-badge]: https://img.shields.io/travis/edef1c/libfringe/master.svg?style=flat-square&label=travis
|
2015-04-16 21:37:32 +08:00
|
|
|
[travis-url]: https://travis-ci.org/edef1c/libfringe
|
|
|
|
[rustdoc-badge]: https://img.shields.io/badge/docs-rustdoc-brightgreen.svg?style=flat-square
|
|
|
|
[rustdoc-url]: https://edef1c.github.io/libfringe
|
|
|
|
|
|
|
|
# libfringe
|
|
|
|
|
2016-08-11 12:05:36 +08:00
|
|
|
libfringe is a library implementing safe, lightweight context switches,
|
2016-07-17 11:11:33 +08:00
|
|
|
without relying on kernel services. It can be used in hosted environments
|
|
|
|
(using `std`) as well as on bare metal (using `core`).
|
|
|
|
|
2016-08-11 12:05:36 +08:00
|
|
|
It provides the following safe abstractions:
|
2016-08-12 05:04:40 +08:00
|
|
|
* an implementation of generators,
|
2016-07-17 11:11:33 +08:00
|
|
|
[Generator](https://edef1c.github.io/libfringe/fringe/generator/struct.Generator.html).
|
|
|
|
|
2016-08-11 12:05:36 +08:00
|
|
|
It also provides the necessary low-level building blocks:
|
2016-07-17 11:11:33 +08:00
|
|
|
* a trait that can be implemented by stack allocators,
|
2016-09-03 22:54:02 +08:00
|
|
|
[Stack](https://edef1c.github.io/libfringe/fringe/trait.Stack.html);
|
2016-08-19 21:58:45 +08:00
|
|
|
* a wrapper for using slice references as stacks,
|
|
|
|
[SliceStack](https://edef1c.github.io/libfringe/fringe/struct.SliceStack.html);
|
|
|
|
* a stack allocator based on `Box<[u8]>`,
|
|
|
|
[OwnedStack](https://edef1c.github.io/libfringe/fringe/struct.OwnedStack.html);
|
2016-07-17 11:11:33 +08:00
|
|
|
* a stack allocator based on anonymous memory mappings with guard pages,
|
|
|
|
[OsStack](https://edef1c.github.io/libfringe/fringe/struct.OsStack.html).
|
2015-04-16 21:37:32 +08:00
|
|
|
|
2016-08-11 12:05:36 +08:00
|
|
|
libfringe emphasizes safety and correctness, and goes to great lengths to never
|
|
|
|
violate the platform ABI.
|
2015-04-16 21:37:32 +08:00
|
|
|
|
2016-08-12 06:49:30 +08:00
|
|
|
## Usage example
|
|
|
|
|
|
|
|
```rust
|
|
|
|
extern crate fringe;
|
|
|
|
|
|
|
|
use fringe::{OsStack, Generator};
|
|
|
|
|
|
|
|
fn main() {
|
|
|
|
let stack = OsStack::new(1 << 16).unwrap();
|
|
|
|
let mut gen = Generator::new(stack, move |yielder, ()| {
|
2016-09-01 20:36:08 +08:00
|
|
|
for i in 1..4 { yielder.suspend(i) }
|
2016-08-12 06:49:30 +08:00
|
|
|
});
|
|
|
|
|
|
|
|
println!("{:?}", gen.resume(())); // Some(1)
|
|
|
|
println!("{:?}", gen.resume(())); // Some(2)
|
|
|
|
println!("{:?}", gen.resume(())); // Some(3)
|
|
|
|
println!("{:?}", gen.resume(())); // None
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
2016-08-11 12:05:36 +08:00
|
|
|
## Performance
|
2015-04-17 01:17:37 +08:00
|
|
|
|
2016-08-11 12:05:36 +08:00
|
|
|
libfringe does context switches in 3ns flat on x86 and x86_64!
|
2015-04-17 01:17:37 +08:00
|
|
|
|
|
|
|
```
|
2016-08-11 12:05:36 +08:00
|
|
|
test swap ... bench: 6 ns/iter (+/- 0)
|
2015-04-16 21:37:32 +08:00
|
|
|
```
|
|
|
|
|
2016-08-12 06:49:30 +08:00
|
|
|
## Debuggability
|
|
|
|
|
|
|
|
Uniquely among libraries implementing context switching, libfringe ensures that the call stack
|
|
|
|
does not abruptly end at the boundary of a generator. Let's consider this buggy code:
|
|
|
|
|
|
|
|
```rust
|
|
|
|
extern crate fringe;
|
|
|
|
|
|
|
|
use fringe::{OsStack, Generator};
|
|
|
|
|
|
|
|
fn main() {
|
|
|
|
let stack = OsStack::new(1 << 16).unwrap();
|
|
|
|
let mut gen = Generator::new(stack, move |yielder, mut index| {
|
|
|
|
let values = [1, 2, 3];
|
2016-09-01 20:36:08 +08:00
|
|
|
loop { index = yielder.suspend(values[index]) }
|
2016-08-12 06:49:30 +08:00
|
|
|
});
|
|
|
|
|
|
|
|
println!("{:?}", gen.resume(5));
|
|
|
|
}
|
|
|
|
```
|
|
|
|
|
|
|
|
It crashes with the following backtrace (redacted for clarity):
|
|
|
|
|
|
|
|
```
|
|
|
|
thread 'main' panicked at 'assertion failed: index < self.len()', ../src/libcore/slice.rs:531
|
|
|
|
stack backtrace:
|
|
|
|
[... core::panicking internals ...]
|
|
|
|
9: 0x559ee50f677b - core::panicking::panic::hbfac80217e56ecbe
|
|
|
|
10: 0x559ee50b6b4c - core::slice::_<impl core..ops..Index<usize> for [T]>::index::hcb117ddcc7cf2f33
|
|
|
|
at .../src/libcore/slice.rs:21
|
|
|
|
11: 0x559ee50b7288 - crash_test::main::_{{closure}}::hc7da249d76d51364
|
|
|
|
at .../crash_test.rs:9
|
|
|
|
12: 0x559ee50b6f23 - _<fringe..generator..Generator<Input, Output, Stack>>::unsafe_new::generator_wrapper::ha2da172d4f041d38
|
|
|
|
at .../libfringe/src/generator.rs:94
|
|
|
|
13: 0x559ee50b76d3 - fringe::arch::imp::init::trampoline_2::hdb11eb4bdafcdeb9
|
|
|
|
at .../libfringe/src/arch/x86_64.rs:71
|
|
|
|
14: 0x559ee50b76c4 - fringe::arch::imp::init::trampoline_1::h6b071b2a8ea6aab3
|
|
|
|
at .../libfringe/src/arch/x86_64.rs:43
|
|
|
|
15: 0x559ee50b7098 - _<fringe..generator..Generator<Input, Output, Stack>>::resume::h8d2b90d386543e29
|
|
|
|
at .../libfringe/src/arch/x86_64.rs:131
|
|
|
|
at .../libfringe/src/context.rs:52
|
|
|
|
at .../libfringe/src/generator.rs:129
|
|
|
|
16: 0x559ee50b71c8 - crash_test::main::hfc5e04bc99de7a6a
|
|
|
|
at .../crash_test.rs:12
|
|
|
|
[... standard library startup internals ...]
|
|
|
|
```
|
|
|
|
|
|
|
|
Similarly, debuggers, profilers, and all other tools using the DWARF debug information have
|
|
|
|
full insight into the call stacks.
|
|
|
|
|
|
|
|
Note that the stack should be deep enough for the panic machinery to store its state—at any point
|
|
|
|
there should be at least 8 KiB of free stack space, or panicking will result in a segfault.
|
|
|
|
|
2015-04-16 21:37:32 +08:00
|
|
|
## Limitations
|
|
|
|
|
2016-08-31 20:00:36 +08:00
|
|
|
The architectures currently supported are: x86, x86_64, or1k.
|
2016-09-01 06:04:35 +08:00
|
|
|
|
2016-09-03 20:30:48 +08:00
|
|
|
The platforms currently supported are: bare metal, Linux (any libc),
|
|
|
|
FreeBSD, DragonFly BSD, macOS.
|
2016-08-11 12:05:36 +08:00
|
|
|
Windows is not supported (see [explanation](#windows-compatibility) below).
|
2015-04-16 21:37:32 +08:00
|
|
|
|
|
|
|
## Installation
|
|
|
|
|
2016-08-11 12:05:36 +08:00
|
|
|
libfringe is a [Cargo](https://crates.io) package.
|
|
|
|
Add this to your `Cargo.toml`:
|
|
|
|
|
2015-04-16 21:37:32 +08:00
|
|
|
```toml
|
|
|
|
[dependencies.fringe]
|
2016-09-01 08:25:43 +08:00
|
|
|
version = "1.0.4"
|
2015-04-16 21:37:32 +08:00
|
|
|
```
|
|
|
|
|
2016-08-19 17:35:49 +08:00
|
|
|
To use libfringe on a bare-metal target, add the `no-default-features` key:
|
|
|
|
|
|
|
|
```toml
|
|
|
|
[dependencies.fringe]
|
2016-09-01 08:25:43 +08:00
|
|
|
version = "1.0.4"
|
2016-08-19 17:35:49 +08:00
|
|
|
no-default-features = true
|
|
|
|
```
|
|
|
|
|
2015-04-16 21:37:32 +08:00
|
|
|
### Feature flags
|
|
|
|
|
2016-08-11 12:05:36 +08:00
|
|
|
[Cargo's feature flags]: http://doc.crates.io/manifest.html#the-[features]-section
|
|
|
|
libfringe provides some optional features through [Cargo's feature flags].
|
|
|
|
Currently, all of them are enabled by default.
|
2015-04-16 21:37:32 +08:00
|
|
|
|
2016-08-19 21:58:45 +08:00
|
|
|
#### `alloc`
|
|
|
|
|
|
|
|
This flag enables dependency on the `alloc` crate, which is required for
|
|
|
|
the [OwnedStack](https://edef1c.github.io/libfringe/fringe/struct.OwnedStack.html).
|
|
|
|
|
2015-04-16 21:37:32 +08:00
|
|
|
#### `valgrind`
|
|
|
|
|
2016-08-19 21:58:45 +08:00
|
|
|
This flag enables [Valgrind] integration. libfringe will register context stacks with Valgrind.
|
|
|
|
|
2016-08-11 12:05:36 +08:00
|
|
|
[Valgrind]: http://valgrind.org
|
|
|
|
|
|
|
|
## Internals
|
|
|
|
|
|
|
|
libfringe uses two key implementation techniques.
|
|
|
|
|
|
|
|
### Compiler-assisted register spilling
|
|
|
|
|
|
|
|
Traditionally, libraries implementing context switches in userspace have to spill all callee-saved
|
|
|
|
registers. On the other hand, libfringe fully inlines calls to every function that eventually
|
|
|
|
results in a context switch, and uses an inline assembly statement marking every register as
|
|
|
|
clobbered to implement the context switching itself.
|
|
|
|
|
|
|
|
As a result, only minimal work needs to be performed in the context switching code (LLVM does not
|
|
|
|
support spilling the frame pointer), which is especially important on architectures with lots
|
|
|
|
of callee-saved registers.
|
|
|
|
|
|
|
|
### Call stack splicing
|
|
|
|
|
|
|
|
Non-Windows platforms use [DWARF][] for both stack unwinding and debugging. DWARF call frame
|
|
|
|
information is very generic to be ABI-agnostic—it defines a bytecode that describes the actions
|
|
|
|
that need to be performed to simulate returning from a function. libfringe uses this bytecode
|
|
|
|
to specify that, after the generator function has returned, execution continues at the point
|
|
|
|
where the generator function was resumed the last time.
|
|
|
|
|
|
|
|
[dwarf]: http://dwarfstd.org
|
|
|
|
|
|
|
|
## Windows compatibility
|
|
|
|
|
|
|
|
As was said, libfringe emphasizes following the platform ABI. On Windows, the platform ABI
|
|
|
|
does not allow moving the stack pointer from the range designated by the OS during thread creation.
|
|
|
|
Therefore, the technique used by libfringe on *nix platforms is not applicable, and libfringe
|
|
|
|
does not provide Windows support.
|
|
|
|
|
|
|
|
You might ask, "but what about [mioco][]?" The mioco library uses the [context][] library to
|
|
|
|
implement context switches, which is little more than a wrapper of [boost::context][boostcontext].
|
|
|
|
The boost::context library changes undocumented fields in the [TIB][] during every context switch
|
|
|
|
to try and work around the restrictions placed by the Windows platform ABI. This has
|
|
|
|
[failed before][tibfail] and it is bound fail again, breaking existing code that uses
|
|
|
|
boost::context in unexpected and complicated ways. The authors of libfringe consider this
|
|
|
|
unacceptable.
|
|
|
|
|
|
|
|
[mioco]: https://github.com/dpc/mioco
|
|
|
|
[context]: https://github.com/zonyitoo/context-rs
|
|
|
|
[boostcontext]: http://www.boost.org/doc/libs/1_60_0/libs/context/doc/html/context/overview.html
|
|
|
|
[TIB]: https://en.wikipedia.org/wiki/Win32_Thread_Information_Block
|
|
|
|
[tibfail]: https://svn.boost.org/trac/boost/ticket/8544
|
|
|
|
|
2016-08-31 23:11:54 +08:00
|
|
|
The only supported way to implement user-mode context switching on Windows is [fibers][].
|
2016-08-11 12:05:36 +08:00
|
|
|
There are no reasons the safe abstractions provided by libfringe could not be implemented on top
|
|
|
|
of that; it is simply not yet done. This should be straightforward and an implementation is
|
2016-08-31 23:11:54 +08:00
|
|
|
welcome. Note that while [UMS threads][] are capable of providing user-mode context switching,
|
|
|
|
they involve managing scheduler threads to run UMS threads on, which is incompatible with
|
|
|
|
libfringe's design.
|
2016-08-11 12:05:36 +08:00
|
|
|
|
|
|
|
[fibers]: https://msdn.microsoft.com/en-us/library/windows/desktop/ms682661(v=vs.85).aspx
|
2016-08-31 23:11:54 +08:00
|
|
|
[UMS threads]: https://msdn.microsoft.com/en-us/library/windows/desktop/dd627187(v=vs.85).aspx
|
2016-07-18 09:12:37 +08:00
|
|
|
|
|
|
|
## License
|
|
|
|
|
|
|
|
Licensed under either of
|
|
|
|
|
|
|
|
* Apache License, Version 2.0, ([LICENSE-APACHE](LICENSE-APACHE) or http://www.apache.org/licenses/LICENSE-2.0)
|
|
|
|
* MIT license ([LICENSE-MIT](LICENSE-MIT) or http://opensource.org/licenses/MIT)
|
|
|
|
|
|
|
|
at your option.
|
|
|
|
|
|
|
|
### Contribution
|
|
|
|
|
|
|
|
Unless you explicitly state otherwise, any contribution intentionally
|
|
|
|
submitted for inclusion in the work by you, as defined in the Apache-2.0
|
|
|
|
license, shall be dual licensed as above, without any additional terms or
|
|
|
|
conditions.
|