zone.cc 8.71 KB
Newer Older
1
// Copyright 2012 the V8 project authors. All rights reserved.
2 3
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
4

5
#include "src/zone.h"
yangguo@chromium.org's avatar
yangguo@chromium.org committed
6

7 8
#include <cstring>

9 10
#include "src/v8.h"

11 12 13
#ifdef V8_USE_ADDRESS_SANITIZER
#include <sanitizer/asan_interface.h>
#endif  // V8_USE_ADDRESS_SANITIZER
14

15 16
namespace v8 {
namespace internal {
17

18 19 20 21
namespace {

#if V8_USE_ADDRESS_SANITIZER

22
const size_t kASanRedzoneBytes = 24;  // Must be a multiple of 8.
23 24 25 26 27 28 29 30 31 32 33 34 35 36 37

#else

#define ASAN_POISON_MEMORY_REGION(start, size) \
  do {                                         \
    USE(start);                                \
    USE(size);                                 \
  } while (false)

#define ASAN_UNPOISON_MEMORY_REGION(start, size) \
  do {                                           \
    USE(start);                                  \
    USE(size);                                   \
  } while (false)

38
const size_t kASanRedzoneBytes = 0;
39 40 41 42 43

#endif  // V8_USE_ADDRESS_SANITIZER

}  // namespace

44

45 46 47
// Segments represent chunks of memory: They have starting address
// (encoded in the this pointer) and a size in bytes. Segments are
// chained together forming a LIFO structure with the newest segment
48
// available as segment_head_. Segments are allocated using malloc()
49 50 51 52
// and de-allocated using free().

class Segment {
 public:
53
  void Initialize(Segment* next, size_t size) {
54 55 56 57
    next_ = next;
    size_ = size;
  }

58
  Segment* next() const { return next_; }
59
  void clear_next() { next_ = nullptr; }
60

61 62
  size_t size() const { return size_; }
  size_t capacity() const { return size_ - sizeof(Segment); }
63 64 65 66 67 68

  Address start() const { return address(sizeof(Segment)); }
  Address end() const { return address(size_); }

 private:
  // Computes the address of the nth byte in this segment.
69
  Address address(size_t n) const { return Address(this) + n; }
70 71

  Segment* next_;
72
  size_t size_;
73 74
};

75
Zone::Zone(base::AccountingAllocator* allocator)
76
    : allocation_size_(0),
77 78 79
      segment_bytes_allocated_(0),
      position_(0),
      limit_(0),
80
      allocator_(allocator),
81
      segment_head_(nullptr) {}
82

83
Zone::~Zone() {
84 85 86
  DeleteAll();
  DeleteKeptSegment();

87
  DCHECK(segment_bytes_allocated_ == 0);
88 89 90
}


91
void* Zone::New(size_t size) {
92 93 94 95 96 97 98 99 100 101 102 103 104 105
  // Round up the requested size to fit the alignment.
  size = RoundUp(size, kAlignment);

  // If the allocation size is divisible by 8 then we return an 8-byte aligned
  // address.
  if (kPointerSize == 4 && kAlignment == 4) {
    position_ += ((~size) & 4) & (reinterpret_cast<intptr_t>(position_) & 4);
  } else {
    DCHECK(kAlignment >= kPointerSize);
  }

  // Check if the requested size is available without expanding.
  Address result = position_;

106
  const size_t size_with_redzone = size + kASanRedzoneBytes;
107 108 109 110
  const uintptr_t limit = reinterpret_cast<uintptr_t>(limit_);
  const uintptr_t position = reinterpret_cast<uintptr_t>(position_);
  // position_ > limit_ can be true after the alignment correction above.
  if (limit < position || size_with_redzone > limit - position) {
111
    result = NewExpand(size_with_redzone);
112
  } else {
113
    position_ += size_with_redzone;
114 115 116 117 118 119 120 121 122 123 124 125 126
  }

  Address redzone_position = result + size;
  DCHECK(redzone_position + kASanRedzoneBytes == position_);
  ASAN_POISON_MEMORY_REGION(redzone_position, kASanRedzoneBytes);

  // Check that the result has the proper alignment and return it.
  DCHECK(IsAddressAligned(result, kAlignment, 0));
  allocation_size_ += size;
  return reinterpret_cast<void*>(result);
}


127
void Zone::DeleteAll() {
128 129 130 131 132
#ifdef DEBUG
  // Constant byte value used for zapping dead memory in debug mode.
  static const unsigned char kZapDeadByte = 0xcd;
#endif

133
  // Find a segment with a suitable size to keep around.
134
  Segment* keep = nullptr;
135 136
  // Traverse the chained list of segments, zapping (in debug mode)
  // and freeing every segment except the one we wish to keep.
137
  for (Segment* current = segment_head_; current;) {
138
    Segment* next = current->next();
139
    if (!keep && current->size() <= kMaximumKeptSegmentSize) {
140
      // Unlink the segment we wish to keep from the list.
141 142
      keep = current;
      keep->clear_next();
143
    } else {
144
      size_t size = current->size();
145
#ifdef DEBUG
146 147
      // Un-poison first so the zapping doesn't trigger ASan complaints.
      ASAN_UNPOISON_MEMORY_REGION(current, size);
148 149
      // Zap the entire current segment (including the header).
      memset(current, kZapDeadByte, size);
150
#endif
151 152
      DeleteSegment(current, size);
    }
153 154 155
    current = next;
  }

156 157 158 159
  // If we have found a segment we want to keep, we must recompute the
  // variables 'position' and 'limit' to prepare for future allocate
  // attempts. Otherwise, we must clear the position and limit to
  // force a new segment to be allocated on demand.
160
  if (keep) {
161 162 163
    Address start = keep->start();
    position_ = RoundUp(start, kAlignment);
    limit_ = keep->end();
164 165
    // Un-poison so we can re-use the segment later.
    ASAN_UNPOISON_MEMORY_REGION(start, keep->capacity());
166 167 168 169 170 171 172 173
#ifdef DEBUG
    // Zap the contents of the kept segment (but not the header).
    memset(start, kZapDeadByte, keep->capacity());
#endif
  } else {
    position_ = limit_ = 0;
  }

174
  allocation_size_ = 0;
175 176 177 178 179 180 181 182 183 184 185
  // Update the head segment to be the kept segment (if any).
  segment_head_ = keep;
}


void Zone::DeleteKeptSegment() {
#ifdef DEBUG
  // Constant byte value used for zapping dead memory in debug mode.
  static const unsigned char kZapDeadByte = 0xcd;
#endif

186 187
  DCHECK(segment_head_ == nullptr || segment_head_->next() == nullptr);
  if (segment_head_ != nullptr) {
188
    size_t size = segment_head_->size();
189
#ifdef DEBUG
190 191
    // Un-poison first so the zapping doesn't trigger ASan complaints.
    ASAN_UNPOISON_MEMORY_REGION(segment_head_, size);
192 193 194 195
    // Zap the entire kept segment (including the header).
    memset(segment_head_, kZapDeadByte, size);
#endif
    DeleteSegment(segment_head_, size);
196
    segment_head_ = nullptr;
197
  }
198

199
  DCHECK(segment_bytes_allocated_ == 0);
200 201 202
}


203 204
// Creates a new segment, sets it size, and pushes it to the front
// of the segment chain. Returns the new segment.
205
Segment* Zone::NewSegment(size_t size) {
206
  Segment* result = reinterpret_cast<Segment*>(allocator_->Allocate(size));
207 208
  segment_bytes_allocated_ += size;
  if (result != nullptr) {
209
    result->Initialize(segment_head_, size);
210 211 212 213 214 215 216
    segment_head_ = result;
  }
  return result;
}


// Deletes the given segment. Does not touch the segment chain.
217
void Zone::DeleteSegment(Segment* segment, size_t size) {
218
  segment_bytes_allocated_ -= size;
219
  allocator_->Free(segment, size);
220
}
221 222


223
Address Zone::NewExpand(size_t size) {
224 225
  // Make sure the requested size is already properly aligned and that
  // there isn't enough room in the Zone to satisfy the request.
226
  DCHECK_EQ(size, RoundDown(size, kAlignment));
227 228 229 230
  DCHECK(limit_ < position_ ||
         reinterpret_cast<uintptr_t>(limit_) -
                 reinterpret_cast<uintptr_t>(position_) <
             size);
231 232 233 234 235

  // Compute the new segment size. We use a 'high water mark'
  // strategy, where we increase the segment size every time we expand
  // except that we employ a maximum segment size when we delete. This
  // is to avoid excessive malloc() and free() overhead.
236
  Segment* head = segment_head_;
237
  const size_t old_size = (head == nullptr) ? 0 : head->size();
238 239 240
  static const size_t kSegmentOverhead = sizeof(Segment) + kAlignment;
  const size_t new_size_no_overhead = size + (old_size << 1);
  size_t new_size = kSegmentOverhead + new_size_no_overhead;
241
  const size_t min_new_size = kSegmentOverhead + size;
242
  // Guard against integer overflow.
243
  if (new_size_no_overhead < size || new_size < kSegmentOverhead) {
244
    V8::FatalProcessOutOfMemory("Zone");
245
    return nullptr;
246
  }
247
  if (new_size < kMinimumSegmentSize) {
248
    new_size = kMinimumSegmentSize;
249
  } else if (new_size > kMaximumSegmentSize) {
250
    // Limit the size of new segments to avoid growing the segment size
251 252 253
    // exponentially, thus putting pressure on contiguous virtual address space.
    // All the while making sure to allocate a segment large enough to hold the
    // requested size.
254
    new_size = Max(min_new_size, kMaximumSegmentSize);
255
  }
256
  if (new_size > INT_MAX) {
257
    V8::FatalProcessOutOfMemory("Zone");
258
    return nullptr;
259
  }
260
  Segment* segment = NewSegment(new_size);
261
  if (segment == nullptr) {
262
    V8::FatalProcessOutOfMemory("Zone");
263
    return nullptr;
264
  }
265 266 267 268

  // Recompute 'top' and 'limit' based on the new segment.
  Address result = RoundUp(segment->start(), kAlignment);
  position_ = result + size;
269
  // Check for address overflow.
270 271
  // (Should not happen since the segment is guaranteed to accomodate
  // size bytes + header and alignment padding)
272 273
  DCHECK(reinterpret_cast<uintptr_t>(position_) >=
         reinterpret_cast<uintptr_t>(result));
274
  limit_ = segment->end();
275
  DCHECK(position_ <= limit_);
276 277 278
  return result;
}

279 280
}  // namespace internal
}  // namespace v8