File: | out/../deps/v8/src/heap/read-only-spaces.cc |
Warning: | line 680, column 5 Value stored to 'allocation_size' is never read |
Press '?' to see keyboard shortcuts
Keyboard shortcuts:
1 | // Copyright 2020 the V8 project authors. All rights reserved. |
2 | // Use of this source code is governed by a BSD-style license that can be |
3 | // found in the LICENSE file. |
4 | |
5 | #include "src/heap/read-only-spaces.h" |
6 | |
7 | #include <memory> |
8 | |
9 | #include "include/v8-internal.h" |
10 | #include "include/v8-platform.h" |
11 | #include "src/base/logging.h" |
12 | #include "src/common/globals.h" |
13 | #include "src/common/ptr-compr-inl.h" |
14 | #include "src/execution/isolate.h" |
15 | #include "src/heap/allocation-stats.h" |
16 | #include "src/heap/basic-memory-chunk.h" |
17 | #include "src/heap/combined-heap.h" |
18 | #include "src/heap/heap-inl.h" |
19 | #include "src/heap/memory-allocator.h" |
20 | #include "src/heap/memory-chunk.h" |
21 | #include "src/heap/read-only-heap.h" |
22 | #include "src/objects/objects-inl.h" |
23 | #include "src/objects/property-details.h" |
24 | #include "src/objects/string.h" |
25 | #include "src/snapshot/read-only-deserializer.h" |
26 | |
27 | namespace v8 { |
28 | namespace internal { |
29 | |
30 | void CopyAndRebaseRoots(Address* src, Address* dst, Address new_base) { |
31 | Address src_base = GetIsolateRootAddress(src[0]); |
32 | for (size_t i = 0; i < ReadOnlyHeap::kEntriesCount; ++i) { |
33 | dst[i] = src[i] - src_base + new_base; |
34 | } |
35 | } |
36 | |
37 | void ReadOnlyArtifacts::set_read_only_heap( |
38 | std::unique_ptr<ReadOnlyHeap> read_only_heap) { |
39 | read_only_heap_ = std::move(read_only_heap); |
40 | } |
41 | |
42 | void ReadOnlyArtifacts::InitializeChecksum( |
43 | SnapshotData* read_only_snapshot_data) { |
44 | #ifdef DEBUG |
45 | read_only_blob_checksum_ = Checksum(read_only_snapshot_data->Payload()); |
46 | #endif // DEBUG |
47 | } |
48 | |
49 | void ReadOnlyArtifacts::VerifyChecksum(SnapshotData* read_only_snapshot_data, |
50 | bool read_only_heap_created) { |
51 | #ifdef DEBUG |
52 | if (read_only_blob_checksum_) { |
53 | // The read-only heap was set up from a snapshot. Make sure it's the always |
54 | // the same snapshot. |
55 | uint32_t snapshot_checksum = Checksum(read_only_snapshot_data->Payload()); |
56 | CHECK_WITH_MSG(snapshot_checksum,do { if ((__builtin_expect(!!(!(snapshot_checksum)), 0))) { V8_Fatal ("Check failed: %s.", "Attempt to create the read-only heap after already " "creating from a snapshot."); } } while (false) |
57 | "Attempt to create the read-only heap after already "do { if ((__builtin_expect(!!(!(snapshot_checksum)), 0))) { V8_Fatal ("Check failed: %s.", "Attempt to create the read-only heap after already " "creating from a snapshot."); } } while (false) |
58 | "creating from a snapshot.")do { if ((__builtin_expect(!!(!(snapshot_checksum)), 0))) { V8_Fatal ("Check failed: %s.", "Attempt to create the read-only heap after already " "creating from a snapshot."); } } while (false); |
59 | if (!FLAG_stress_snapshot) { |
60 | // --stress-snapshot is only intended to check how well the |
61 | // serializer/deserializer copes with unexpected objects, and is not |
62 | // intended to test whether the newly deserialized Isolate would actually |
63 | // work since it serializes a currently running Isolate, which is not |
64 | // supported. As a result, it's possible that it will create a new |
65 | // read-only snapshot that is not compatible with the original one (for |
66 | // instance due to the string table being re-ordered). Since we won't |
67 | // acutally use that new Isoalte, we're ok with any potential corruption. |
68 | // See crbug.com/1043058. |
69 | CHECK_EQ(read_only_blob_checksum_, snapshot_checksum)do { bool _cmp = ::v8::base::CmpEQImpl< typename ::v8::base ::pass_value_or_ref<decltype(read_only_blob_checksum_)> ::type, typename ::v8::base::pass_value_or_ref<decltype(snapshot_checksum )>::type>((read_only_blob_checksum_), (snapshot_checksum )); do { if ((__builtin_expect(!!(!(_cmp)), 0))) { V8_Fatal("Check failed: %s." , "read_only_blob_checksum_" " " "==" " " "snapshot_checksum" ); } } while (false); } while (false); |
70 | } |
71 | } else { |
72 | // If there's no checksum, then that means the read-only heap objects are |
73 | // being created. |
74 | CHECK(read_only_heap_created)do { if ((__builtin_expect(!!(!(read_only_heap_created)), 0)) ) { V8_Fatal("Check failed: %s.", "read_only_heap_created"); } } while (false); |
75 | } |
76 | #endif // DEBUG |
77 | } |
78 | |
79 | SingleCopyReadOnlyArtifacts::~SingleCopyReadOnlyArtifacts() { |
80 | // This particular SharedReadOnlySpace should not destroy its own pages as |
81 | // TearDown requires MemoryAllocator which itself is tied to an Isolate. |
82 | shared_read_only_space_->pages_.resize(0); |
83 | |
84 | for (ReadOnlyPage* chunk : pages_) { |
85 | void* chunk_address = reinterpret_cast<void*>(chunk->address()); |
86 | size_t size = RoundUp(chunk->size(), page_allocator_->AllocatePageSize()); |
87 | CHECK(page_allocator_->FreePages(chunk_address, size))do { if ((__builtin_expect(!!(!(page_allocator_->FreePages (chunk_address, size))), 0))) { V8_Fatal("Check failed: %s.", "page_allocator_->FreePages(chunk_address, size)"); } } while (false); |
88 | } |
89 | } |
90 | |
91 | ReadOnlyHeap* SingleCopyReadOnlyArtifacts::GetReadOnlyHeapForIsolate( |
92 | Isolate* isolate) { |
93 | return read_only_heap(); |
94 | } |
95 | |
96 | void SingleCopyReadOnlyArtifacts::Initialize(Isolate* isolate, |
97 | std::vector<ReadOnlyPage*>&& pages, |
98 | const AllocationStats& stats) { |
99 | // Do not use the platform page allocator when sharing a pointer compression |
100 | // cage, as the Isolate's page allocator is a BoundedPageAllocator tied to the |
101 | // shared cage. |
102 | page_allocator_ = COMPRESS_POINTERS_IN_SHARED_CAGE_BOOLfalse |
103 | ? isolate->page_allocator() |
104 | : GetPlatformPageAllocator(); |
105 | pages_ = std::move(pages); |
106 | set_accounting_stats(stats); |
107 | set_shared_read_only_space( |
108 | std::make_unique<SharedReadOnlySpace>(isolate->heap(), this)); |
109 | } |
110 | |
111 | void SingleCopyReadOnlyArtifacts::ReinstallReadOnlySpace(Isolate* isolate) { |
112 | isolate->heap()->ReplaceReadOnlySpace(shared_read_only_space()); |
113 | } |
114 | |
115 | void SingleCopyReadOnlyArtifacts::VerifyHeapAndSpaceRelationships( |
116 | Isolate* isolate) { |
117 | DCHECK_EQ(read_only_heap()->read_only_space(), shared_read_only_space())((void) 0); |
118 | |
119 | // Confirm the Isolate is using the shared ReadOnlyHeap and ReadOnlySpace. |
120 | DCHECK_EQ(read_only_heap(), isolate->read_only_heap())((void) 0); |
121 | DCHECK_EQ(shared_read_only_space(), isolate->heap()->read_only_space())((void) 0); |
122 | } |
123 | |
124 | void PointerCompressedReadOnlyArtifacts::InitializeRootsFrom(Isolate* isolate) { |
125 | auto isolate_ro_roots = |
126 | isolate->roots_table().read_only_roots_begin().location(); |
127 | CopyAndRebaseRoots(isolate_ro_roots, read_only_roots_, 0); |
128 | } |
129 | |
130 | void PointerCompressedReadOnlyArtifacts::InitializeRootsIn(Isolate* isolate) { |
131 | auto isolate_ro_roots = |
132 | isolate->roots_table().read_only_roots_begin().location(); |
133 | CopyAndRebaseRoots(read_only_roots_, isolate_ro_roots, |
134 | isolate->isolate_root()); |
135 | } |
136 | |
137 | SharedReadOnlySpace* PointerCompressedReadOnlyArtifacts::CreateReadOnlySpace( |
138 | Isolate* isolate) { |
139 | AllocationStats new_stats; |
140 | new_stats.IncreaseCapacity(accounting_stats().Capacity()); |
141 | |
142 | std::vector<std::unique_ptr<v8::PageAllocator::SharedMemoryMapping>> mappings; |
143 | std::vector<ReadOnlyPage*> pages; |
144 | Address isolate_root = isolate->isolate_root(); |
145 | for (size_t i = 0; i < pages_.size(); ++i) { |
146 | const ReadOnlyPage* page = pages_[i]; |
147 | const Tagged_t offset = OffsetForPage(i); |
148 | Address new_address = isolate_root + offset; |
149 | ReadOnlyPage* new_page = nullptr; |
150 | bool success = isolate->heap() |
151 | ->memory_allocator() |
152 | ->data_page_allocator() |
153 | ->ReserveForSharedMemoryMapping( |
154 | reinterpret_cast<void*>(new_address), page->size()); |
155 | CHECK(success)do { if ((__builtin_expect(!!(!(success)), 0))) { V8_Fatal("Check failed: %s." , "success"); } } while (false); |
156 | auto shared_memory = RemapPageTo(i, new_address, new_page); |
157 | // Later it's possible that this might fail, but for now on Linux this is |
158 | // not possible. When we move onto windows, it's not possible to reserve |
159 | // memory and then map into the middle of it at which point we will have to |
160 | // reserve the memory free it and then attempt to remap to it which could |
161 | // fail. At that point this will need to change. |
162 | CHECK(shared_memory)do { if ((__builtin_expect(!!(!(shared_memory)), 0))) { V8_Fatal ("Check failed: %s.", "shared_memory"); } } while (false); |
163 | CHECK_NOT_NULL(new_page)do { if ((__builtin_expect(!!(!((new_page) != nullptr)), 0))) { V8_Fatal("Check failed: %s.", "(new_page) != nullptr"); } } while (false); |
164 | |
165 | new_stats.IncreaseAllocatedBytes(page->allocated_bytes(), new_page); |
166 | mappings.push_back(std::move(shared_memory)); |
167 | pages.push_back(new_page); |
168 | } |
169 | |
170 | auto* shared_read_only_space = |
171 | new SharedReadOnlySpace(isolate->heap(), std::move(pages), |
172 | std::move(mappings), std::move(new_stats)); |
173 | return shared_read_only_space; |
174 | } |
175 | |
176 | ReadOnlyHeap* PointerCompressedReadOnlyArtifacts::GetReadOnlyHeapForIsolate( |
177 | Isolate* isolate) { |
178 | DCHECK(ReadOnlyHeap::IsReadOnlySpaceShared())((void) 0); |
179 | InitializeRootsIn(isolate); |
180 | |
181 | SharedReadOnlySpace* shared_read_only_space = CreateReadOnlySpace(isolate); |
182 | ReadOnlyHeap* read_only_heap = new ReadOnlyHeap(shared_read_only_space); |
183 | |
184 | // TODO(v8:10699): The cache should just live uncompressed in |
185 | // ReadOnlyArtifacts and be decompressed on the fly. |
186 | auto original_cache = read_only_heap_->read_only_object_cache_; |
187 | auto& cache = read_only_heap->read_only_object_cache_; |
188 | Address isolate_root = isolate->isolate_root(); |
189 | for (Object original_object : original_cache) { |
190 | Address original_address = original_object.ptr(); |
191 | Address new_address = isolate_root + CompressTagged(original_address); |
192 | Object new_object = Object(new_address); |
193 | cache.push_back(new_object); |
194 | } |
195 | |
196 | return read_only_heap; |
197 | } |
198 | |
199 | std::unique_ptr<::v8::PageAllocator::SharedMemoryMapping> |
200 | PointerCompressedReadOnlyArtifacts::RemapPageTo(size_t i, Address new_address, |
201 | ReadOnlyPage*& new_page) { |
202 | std::unique_ptr<::v8::PageAllocator::SharedMemoryMapping> mapping = |
203 | shared_memory_[i]->RemapTo(reinterpret_cast<void*>(new_address)); |
204 | if (mapping) { |
205 | new_page = static_cast<ReadOnlyPage*>(reinterpret_cast<void*>(new_address)); |
206 | return mapping; |
207 | } else { |
208 | return {}; |
209 | } |
210 | } |
211 | |
212 | void PointerCompressedReadOnlyArtifacts::Initialize( |
213 | Isolate* isolate, std::vector<ReadOnlyPage*>&& pages, |
214 | const AllocationStats& stats) { |
215 | DCHECK(ReadOnlyHeap::IsReadOnlySpaceShared())((void) 0); |
216 | DCHECK(pages_.empty())((void) 0); |
217 | DCHECK(!pages.empty())((void) 0); |
218 | |
219 | // It's not possible to copy the AllocationStats directly as the new pages |
220 | // will be mapped to different addresses. |
221 | stats_.IncreaseCapacity(stats.Capacity()); |
222 | |
223 | v8::PageAllocator* page_allocator = GetPlatformPageAllocator(); |
224 | DCHECK(page_allocator->CanAllocateSharedPages())((void) 0); |
225 | |
226 | for (const ReadOnlyPage* page : pages) { |
227 | size_t size = RoundUp(page->size(), page_allocator->AllocatePageSize()); |
228 | // 1. Allocate some new memory for a shared copy of the page and copy the |
229 | // original contents into it. Doesn't need to be V8 page aligned, since |
230 | // we'll never use it directly. |
231 | auto shared_memory = page_allocator->AllocateSharedPages(size, page); |
232 | void* ptr = shared_memory->GetMemory(); |
233 | CHECK_NOT_NULL(ptr)do { if ((__builtin_expect(!!(!((ptr) != nullptr)), 0))) { V8_Fatal ("Check failed: %s.", "(ptr) != nullptr"); } } while (false); |
234 | |
235 | // 2. Copy the contents of the original page into the shared page. |
236 | ReadOnlyPage* new_page = reinterpret_cast<ReadOnlyPage*>(ptr); |
237 | |
238 | pages_.push_back(new_page); |
239 | shared_memory_.push_back(std::move(shared_memory)); |
240 | // This is just CompressTagged but inlined so it will always compile. |
241 | Tagged_t compressed_address = CompressTagged(page->address()); |
242 | page_offsets_.push_back(compressed_address); |
243 | |
244 | // 3. Update the accounting stats so the allocated bytes are for the new |
245 | // shared page rather than the original. |
246 | stats_.IncreaseAllocatedBytes(page->allocated_bytes(), new_page); |
247 | } |
248 | |
249 | InitializeRootsFrom(isolate); |
250 | set_shared_read_only_space( |
251 | std::make_unique<SharedReadOnlySpace>(isolate->heap(), this)); |
252 | } |
253 | |
254 | void PointerCompressedReadOnlyArtifacts::ReinstallReadOnlySpace( |
255 | Isolate* isolate) { |
256 | // We need to build a new SharedReadOnlySpace that occupies the same memory as |
257 | // the original one, so first the original space's pages must be freed. |
258 | Heap* heap = isolate->heap(); |
259 | heap->read_only_space()->TearDown(heap->memory_allocator()); |
260 | |
261 | heap->ReplaceReadOnlySpace(CreateReadOnlySpace(heap->isolate())); |
262 | |
263 | DCHECK_NE(heap->read_only_space(), shared_read_only_space())((void) 0); |
264 | |
265 | // Also recreate the ReadOnlyHeap using the this space. |
266 | auto* ro_heap = new ReadOnlyHeap(isolate->read_only_heap(), |
267 | isolate->heap()->read_only_space()); |
268 | isolate->set_read_only_heap(ro_heap); |
269 | |
270 | DCHECK_NE(*isolate->roots_table().read_only_roots_begin().location(), 0)((void) 0); |
271 | } |
272 | |
273 | void PointerCompressedReadOnlyArtifacts::VerifyHeapAndSpaceRelationships( |
274 | Isolate* isolate) { |
275 | // Confirm the canonical versions of the ReadOnlySpace/ReadOnlyHeap from the |
276 | // ReadOnlyArtifacts are not accidentally present in a real Isolate (which |
277 | // might destroy them) and the ReadOnlyHeaps and Spaces are correctly |
278 | // associated with each other. |
279 | DCHECK_NE(shared_read_only_space(), isolate->heap()->read_only_space())((void) 0); |
280 | DCHECK_NE(read_only_heap(), isolate->read_only_heap())((void) 0); |
281 | DCHECK_EQ(read_only_heap()->read_only_space(), shared_read_only_space())((void) 0); |
282 | DCHECK_EQ(isolate->read_only_heap()->read_only_space(),((void) 0) |
283 | isolate->heap()->read_only_space())((void) 0); |
284 | } |
285 | |
286 | // ----------------------------------------------------------------------------- |
287 | // ReadOnlySpace implementation |
288 | |
289 | ReadOnlySpace::ReadOnlySpace(Heap* heap) |
290 | : BaseSpace(heap, RO_SPACE), |
291 | top_(kNullAddress), |
292 | limit_(kNullAddress), |
293 | is_string_padding_cleared_(heap->isolate()->initialized_from_snapshot()), |
294 | capacity_(0), |
295 | area_size_(MemoryChunkLayout::AllocatableMemoryInMemoryChunk(RO_SPACE)) {} |
296 | |
297 | // Needs to be defined in the cc file to force the vtable to be emitted in |
298 | // component builds. |
299 | ReadOnlySpace::~ReadOnlySpace() = default; |
300 | |
301 | void SharedReadOnlySpace::TearDown(MemoryAllocator* memory_allocator) { |
302 | // SharedReadOnlySpaces do not tear down their own pages since they are either |
303 | // freed down by the ReadOnlyArtifacts that contains them or in the case of |
304 | // pointer compression, they are freed when the SharedMemoryMappings are |
305 | // freed. |
306 | pages_.resize(0); |
307 | accounting_stats_.Clear(); |
308 | } |
309 | |
310 | void ReadOnlySpace::TearDown(MemoryAllocator* memory_allocator) { |
311 | for (ReadOnlyPage* chunk : pages_) { |
312 | memory_allocator->FreeReadOnlyPage(chunk); |
313 | } |
314 | pages_.resize(0); |
315 | accounting_stats_.Clear(); |
316 | } |
317 | |
318 | void ReadOnlySpace::DetachPagesAndAddToArtifacts( |
319 | std::shared_ptr<ReadOnlyArtifacts> artifacts) { |
320 | DCHECK(ReadOnlyHeap::IsReadOnlySpaceShared())((void) 0); |
321 | |
322 | Heap* heap = ReadOnlySpace::heap(); |
323 | // Without pointer compression in a per-Isolate cage, ReadOnlySpace pages are |
324 | // directly shared between all heaps and so must be unregistered from their |
325 | // originating allocator. |
326 | Seal(COMPRESS_POINTERS_IN_ISOLATE_CAGE_BOOLfalse |
327 | ? SealMode::kDetachFromHeap |
328 | : SealMode::kDetachFromHeapAndUnregisterMemory); |
329 | artifacts->Initialize(heap->isolate(), std::move(pages_), accounting_stats_); |
330 | } |
331 | |
332 | ReadOnlyPage::ReadOnlyPage(Heap* heap, BaseSpace* space, size_t chunk_size, |
333 | Address area_start, Address area_end, |
334 | VirtualMemory reservation) |
335 | : BasicMemoryChunk(heap, space, chunk_size, area_start, area_end, |
336 | std::move(reservation)) { |
337 | allocated_bytes_ = 0; |
338 | SetFlags(Flag::NEVER_EVACUATE | Flag::READ_ONLY_HEAP); |
339 | heap->incremental_marking() |
340 | ->non_atomic_marking_state() |
341 | ->bitmap(this) |
342 | ->MarkAllBits(); |
343 | } |
344 | |
345 | void ReadOnlyPage::MakeHeaderRelocatable() { |
346 | heap_ = nullptr; |
347 | owner_ = nullptr; |
348 | reservation_.Reset(); |
349 | } |
350 | |
351 | void ReadOnlySpace::SetPermissionsForPages(MemoryAllocator* memory_allocator, |
352 | PageAllocator::Permission access) { |
353 | for (BasicMemoryChunk* chunk : pages_) { |
354 | // Read only pages don't have valid reservation object so we get proper |
355 | // page allocator manually. |
356 | v8::PageAllocator* page_allocator = |
357 | memory_allocator->page_allocator(NOT_EXECUTABLE); |
358 | CHECK(SetPermissions(page_allocator, chunk->address(), chunk->size(),do { if ((__builtin_expect(!!(!(SetPermissions(page_allocator , chunk->address(), chunk->size(), access))), 0))) { V8_Fatal ("Check failed: %s.", "SetPermissions(page_allocator, chunk->address(), chunk->size(), access)" ); } } while (false) |
359 | access))do { if ((__builtin_expect(!!(!(SetPermissions(page_allocator , chunk->address(), chunk->size(), access))), 0))) { V8_Fatal ("Check failed: %s.", "SetPermissions(page_allocator, chunk->address(), chunk->size(), access)" ); } } while (false); |
360 | } |
361 | } |
362 | |
363 | // After we have booted, we have created a map which represents free space |
364 | // on the heap. If there was already a free list then the elements on it |
365 | // were created with the wrong FreeSpaceMap (normally nullptr), so we need to |
366 | // fix them. |
367 | void ReadOnlySpace::RepairFreeSpacesAfterDeserialization() { |
368 | BasicMemoryChunk::UpdateHighWaterMark(top_); |
369 | // Each page may have a small free space that is not tracked by a free list. |
370 | // Those free spaces still contain null as their map pointer. |
371 | // Overwrite them with new fillers. |
372 | for (BasicMemoryChunk* chunk : pages_) { |
373 | Address start = chunk->HighWaterMark(); |
374 | Address end = chunk->area_end(); |
375 | // Put a filler object in the gap between the end of the allocated objects |
376 | // and the end of the allocatable area. |
377 | if (start < end) { |
378 | heap()->CreateFillerObjectAt(start, static_cast<int>(end - start), |
379 | ClearRecordedSlots::kNo); |
380 | } |
381 | } |
382 | } |
383 | |
384 | void ReadOnlySpace::ClearStringPaddingIfNeeded() { |
385 | if (V8_ENABLE_THIRD_PARTY_HEAP_BOOLfalse) { |
386 | // TODO(v8:11641): Revisit this once third-party heap supports iteration. |
387 | return; |
388 | } |
389 | if (is_string_padding_cleared_) return; |
390 | |
391 | ReadOnlyHeapObjectIterator iterator(this); |
392 | for (HeapObject o = iterator.Next(); !o.is_null(); o = iterator.Next()) { |
393 | if (o.IsSeqOneByteString()) { |
394 | SeqOneByteString::cast(o).clear_padding(); |
395 | } else if (o.IsSeqTwoByteString()) { |
396 | SeqTwoByteString::cast(o).clear_padding(); |
397 | } |
398 | } |
399 | is_string_padding_cleared_ = true; |
400 | } |
401 | |
402 | void ReadOnlySpace::Seal(SealMode ro_mode) { |
403 | DCHECK(!is_marked_read_only_)((void) 0); |
404 | |
405 | FreeLinearAllocationArea(); |
406 | is_marked_read_only_ = true; |
407 | auto* memory_allocator = heap()->memory_allocator(); |
408 | |
409 | if (ro_mode != SealMode::kDoNotDetachFromHeap) { |
410 | DetachFromHeap(); |
411 | for (ReadOnlyPage* p : pages_) { |
412 | if (ro_mode == SealMode::kDetachFromHeapAndUnregisterMemory) { |
413 | memory_allocator->UnregisterReadOnlyPage(p); |
414 | } |
415 | if (ReadOnlyHeap::IsReadOnlySpaceShared()) { |
416 | p->MakeHeaderRelocatable(); |
417 | } |
418 | } |
419 | } |
420 | |
421 | SetPermissionsForPages(memory_allocator, PageAllocator::kRead); |
422 | } |
423 | |
424 | void ReadOnlySpace::Unseal() { |
425 | DCHECK(is_marked_read_only_)((void) 0); |
426 | if (!pages_.empty()) { |
427 | SetPermissionsForPages(heap()->memory_allocator(), |
428 | PageAllocator::kReadWrite); |
429 | } |
430 | is_marked_read_only_ = false; |
431 | } |
432 | |
433 | bool ReadOnlySpace::ContainsSlow(Address addr) const { |
434 | BasicMemoryChunk* c = BasicMemoryChunk::FromAddress(addr); |
435 | for (BasicMemoryChunk* chunk : pages_) { |
436 | if (chunk == c) return true; |
437 | } |
438 | return false; |
439 | } |
440 | |
441 | namespace { |
442 | // Only iterates over a single chunk as the chunk iteration is done externally. |
443 | class ReadOnlySpaceObjectIterator : public ObjectIterator { |
444 | public: |
445 | ReadOnlySpaceObjectIterator(const Heap* heap, const ReadOnlySpace* space, |
446 | BasicMemoryChunk* chunk) |
447 | : cur_addr_(kNullAddress), cur_end_(kNullAddress), space_(space) {} |
448 | |
449 | // Advance to the next object, skipping free spaces and other fillers and |
450 | // skipping the special garbage section of which there is one per space. |
451 | // Returns nullptr when the iteration has ended. |
452 | HeapObject Next() override { |
453 | HeapObject next_obj = FromCurrentPage(); |
454 | if (!next_obj.is_null()) return next_obj; |
455 | return HeapObject(); |
456 | } |
457 | |
458 | private: |
459 | HeapObject FromCurrentPage() { |
460 | while (cur_addr_ != cur_end_) { |
461 | if (cur_addr_ == space_->top() && cur_addr_ != space_->limit()) { |
462 | cur_addr_ = space_->limit(); |
463 | continue; |
464 | } |
465 | HeapObject obj = HeapObject::FromAddress(cur_addr_); |
466 | const int obj_size = obj.Size(); |
467 | cur_addr_ += obj_size; |
468 | DCHECK_LE(cur_addr_, cur_end_)((void) 0); |
469 | if (!obj.IsFreeSpaceOrFiller()) { |
470 | if (obj.IsCode()) { |
471 | DCHECK(Code::cast(obj).is_builtin())((void) 0); |
472 | DCHECK_CODEOBJECT_SIZE(obj_size, space_)((void) 0); |
473 | } else { |
474 | DCHECK_OBJECT_SIZE(obj_size)((void) 0); |
475 | } |
476 | return obj; |
477 | } |
478 | } |
479 | return HeapObject(); |
480 | } |
481 | |
482 | Address cur_addr_; // Current iteration point. |
483 | Address cur_end_; // End iteration point. |
484 | const ReadOnlySpace* const space_; |
485 | }; |
486 | } // namespace |
487 | |
488 | #ifdef VERIFY_HEAP |
489 | namespace { |
490 | class VerifyReadOnlyPointersVisitor : public VerifyPointersVisitor { |
491 | public: |
492 | explicit VerifyReadOnlyPointersVisitor(Heap* heap) |
493 | : VerifyPointersVisitor(heap) {} |
494 | |
495 | protected: |
496 | void VerifyPointers(HeapObject host, MaybeObjectSlot start, |
497 | MaybeObjectSlot end) override { |
498 | if (!host.is_null()) { |
499 | CHECK(ReadOnlyHeap::Contains(host.map()))do { if ((__builtin_expect(!!(!(ReadOnlyHeap::Contains(host.map ()))), 0))) { V8_Fatal("Check failed: %s.", "ReadOnlyHeap::Contains(host.map())" ); } } while (false); |
500 | } |
501 | VerifyPointersVisitor::VerifyPointers(host, start, end); |
502 | |
503 | for (MaybeObjectSlot current = start; current < end; ++current) { |
504 | HeapObject heap_object; |
505 | if ((*current)->GetHeapObject(&heap_object)) { |
506 | CHECK(ReadOnlyHeap::Contains(heap_object))do { if ((__builtin_expect(!!(!(ReadOnlyHeap::Contains(heap_object ))), 0))) { V8_Fatal("Check failed: %s.", "ReadOnlyHeap::Contains(heap_object)" ); } } while (false); |
507 | } |
508 | } |
509 | } |
510 | }; |
511 | } // namespace |
512 | |
513 | void ReadOnlySpace::Verify(Isolate* isolate) const { |
514 | bool allocation_pointer_found_in_space = top_ == limit_; |
515 | VerifyReadOnlyPointersVisitor visitor(isolate->heap()); |
516 | |
517 | for (BasicMemoryChunk* page : pages_) { |
518 | if (ReadOnlyHeap::IsReadOnlySpaceShared()) { |
519 | CHECK_NULL(page->owner())do { if ((__builtin_expect(!!(!((page->owner()) == nullptr )), 0))) { V8_Fatal("Check failed: %s.", "(page->owner()) == nullptr" ); } } while (false); |
520 | } else { |
521 | CHECK_EQ(page->owner(), this)do { bool _cmp = ::v8::base::CmpEQImpl< typename ::v8::base ::pass_value_or_ref<decltype(page->owner())>::type, typename ::v8::base::pass_value_or_ref<decltype(this)>::type> ((page->owner()), (this)); do { if ((__builtin_expect(!!(! (_cmp)), 0))) { V8_Fatal("Check failed: %s.", "page->owner()" " " "==" " " "this"); } } while (false); } while (false); |
522 | } |
523 | |
524 | if (page == Page::FromAllocationAreaAddress(top_)) { |
525 | allocation_pointer_found_in_space = true; |
526 | } |
527 | ReadOnlySpaceObjectIterator it(isolate->heap(), this, page); |
528 | Address end_of_previous_object = page->area_start(); |
529 | Address top = page->area_end(); |
530 | |
531 | for (HeapObject object = it.Next(); !object.is_null(); object = it.Next()) { |
532 | CHECK(end_of_previous_object <= object.address())do { if ((__builtin_expect(!!(!(end_of_previous_object <= object .address())), 0))) { V8_Fatal("Check failed: %s.", "end_of_previous_object <= object.address()" ); } } while (false); |
533 | |
534 | Map map = object.map(); |
535 | CHECK(map.IsMap())do { if ((__builtin_expect(!!(!(map.IsMap())), 0))) { V8_Fatal ("Check failed: %s.", "map.IsMap()"); } } while (false); |
536 | |
537 | // The object itself should look OK. |
538 | object.ObjectVerify(isolate); |
539 | |
540 | // All the interior pointers should be contained in the heap. |
541 | int size = object.Size(); |
542 | object.IterateBody(map, size, &visitor); |
543 | CHECK(object.address() + size <= top)do { if ((__builtin_expect(!!(!(object.address() + size <= top)), 0))) { V8_Fatal("Check failed: %s.", "object.address() + size <= top" ); } } while (false); |
544 | end_of_previous_object = object.address() + size; |
545 | |
546 | CHECK(!object.IsExternalString())do { if ((__builtin_expect(!!(!(!object.IsExternalString())), 0))) { V8_Fatal("Check failed: %s.", "!object.IsExternalString()" ); } } while (false); |
547 | CHECK(!object.IsJSArrayBuffer())do { if ((__builtin_expect(!!(!(!object.IsJSArrayBuffer())), 0 ))) { V8_Fatal("Check failed: %s.", "!object.IsJSArrayBuffer()" ); } } while (false); |
548 | } |
549 | |
550 | CHECK(!page->IsFlagSet(Page::PAGE_NEW_OLD_PROMOTION))do { if ((__builtin_expect(!!(!(!page->IsFlagSet(Page::PAGE_NEW_OLD_PROMOTION ))), 0))) { V8_Fatal("Check failed: %s.", "!page->IsFlagSet(Page::PAGE_NEW_OLD_PROMOTION)" ); } } while (false); |
551 | CHECK(!page->IsFlagSet(Page::PAGE_NEW_NEW_PROMOTION))do { if ((__builtin_expect(!!(!(!page->IsFlagSet(Page::PAGE_NEW_NEW_PROMOTION ))), 0))) { V8_Fatal("Check failed: %s.", "!page->IsFlagSet(Page::PAGE_NEW_NEW_PROMOTION)" ); } } while (false); |
552 | } |
553 | CHECK(allocation_pointer_found_in_space)do { if ((__builtin_expect(!!(!(allocation_pointer_found_in_space )), 0))) { V8_Fatal("Check failed: %s.", "allocation_pointer_found_in_space" ); } } while (false); |
554 | |
555 | #ifdef DEBUG |
556 | VerifyCounters(isolate->heap()); |
557 | #endif |
558 | } |
559 | |
560 | #ifdef DEBUG |
561 | void ReadOnlySpace::VerifyCounters(Heap* heap) const { |
562 | size_t total_capacity = 0; |
563 | size_t total_allocated = 0; |
564 | for (BasicMemoryChunk* page : pages_) { |
565 | total_capacity += page->area_size(); |
566 | ReadOnlySpaceObjectIterator it(heap, this, page); |
567 | size_t real_allocated = 0; |
568 | for (HeapObject object = it.Next(); !object.is_null(); object = it.Next()) { |
569 | if (!object.IsFreeSpaceOrFiller()) { |
570 | real_allocated += object.Size(); |
571 | } |
572 | } |
573 | total_allocated += page->allocated_bytes(); |
574 | // The real size can be smaller than the accounted size if array trimming, |
575 | // object slack tracking happened after sweeping. |
576 | DCHECK_LE(real_allocated, accounting_stats_.AllocatedOnPage(page))((void) 0); |
577 | DCHECK_EQ(page->allocated_bytes(), accounting_stats_.AllocatedOnPage(page))((void) 0); |
578 | } |
579 | DCHECK_EQ(total_capacity, accounting_stats_.Capacity())((void) 0); |
580 | DCHECK_EQ(total_allocated, accounting_stats_.Size())((void) 0); |
581 | } |
582 | #endif // DEBUG |
583 | #endif // VERIFY_HEAP |
584 | |
585 | size_t ReadOnlySpace::CommittedPhysicalMemory() const { |
586 | if (!base::OS::HasLazyCommits()) return CommittedMemory(); |
587 | BasicMemoryChunk::UpdateHighWaterMark(top_); |
588 | size_t size = 0; |
589 | for (auto* chunk : pages_) { |
590 | size += chunk->size(); |
591 | } |
592 | |
593 | return size; |
594 | } |
595 | |
596 | void ReadOnlySpace::FreeLinearAllocationArea() { |
597 | // Mark the old linear allocation area with a free space map so it can be |
598 | // skipped when scanning the heap. |
599 | if (top_ == kNullAddress) { |
600 | DCHECK_EQ(kNullAddress, limit_)((void) 0); |
601 | return; |
602 | } |
603 | |
604 | // Clear the bits in the unused black area. |
605 | ReadOnlyPage* page = pages_.back(); |
606 | heap()->incremental_marking()->marking_state()->bitmap(page)->ClearRange( |
607 | page->AddressToMarkbitIndex(top_), page->AddressToMarkbitIndex(limit_)); |
608 | |
609 | heap()->CreateFillerObjectAt(top_, static_cast<int>(limit_ - top_), |
610 | ClearRecordedSlots::kNo); |
611 | |
612 | BasicMemoryChunk::UpdateHighWaterMark(top_); |
613 | |
614 | top_ = kNullAddress; |
615 | limit_ = kNullAddress; |
616 | } |
617 | |
618 | void ReadOnlySpace::EnsureSpaceForAllocation(int size_in_bytes) { |
619 | if (top_ + size_in_bytes <= limit_) { |
620 | return; |
621 | } |
622 | |
623 | DCHECK_GE(size_in_bytes, 0)((void) 0); |
624 | |
625 | FreeLinearAllocationArea(); |
626 | |
627 | BasicMemoryChunk* chunk = |
628 | heap()->memory_allocator()->AllocateReadOnlyPage(this); |
629 | capacity_ += AreaSize(); |
630 | |
631 | accounting_stats_.IncreaseCapacity(chunk->area_size()); |
632 | AccountCommitted(chunk->size()); |
633 | CHECK_NOT_NULL(chunk)do { if ((__builtin_expect(!!(!((chunk) != nullptr)), 0))) { V8_Fatal ("Check failed: %s.", "(chunk) != nullptr"); } } while (false ); |
634 | pages_.push_back(static_cast<ReadOnlyPage*>(chunk)); |
635 | |
636 | heap()->CreateFillerObjectAt(chunk->area_start(), |
637 | static_cast<int>(chunk->area_size()), |
638 | ClearRecordedSlots::kNo); |
639 | |
640 | top_ = chunk->area_start(); |
641 | limit_ = chunk->area_end(); |
642 | return; |
643 | } |
644 | |
645 | HeapObject ReadOnlySpace::TryAllocateLinearlyAligned( |
646 | int size_in_bytes, AllocationAlignment alignment) { |
647 | Address current_top = top_; |
648 | int filler_size = Heap::GetFillToAlign(current_top, alignment); |
649 | |
650 | Address new_top = current_top + filler_size + size_in_bytes; |
651 | if (new_top > limit_) return HeapObject(); |
652 | |
653 | // Allocation always occurs in the last chunk for RO_SPACE. |
654 | BasicMemoryChunk* chunk = pages_.back(); |
655 | int allocated_size = filler_size + size_in_bytes; |
656 | accounting_stats_.IncreaseAllocatedBytes(allocated_size, chunk); |
657 | chunk->IncreaseAllocatedBytes(allocated_size); |
658 | |
659 | top_ = new_top; |
660 | if (filler_size > 0) { |
661 | return heap()->PrecedeWithFiller(HeapObject::FromAddress(current_top), |
662 | filler_size); |
663 | } |
664 | |
665 | return HeapObject::FromAddress(current_top); |
666 | } |
667 | |
668 | AllocationResult ReadOnlySpace::AllocateRawAligned( |
669 | int size_in_bytes, AllocationAlignment alignment) { |
670 | DCHECK(!FLAG_enable_third_party_heap)((void) 0); |
671 | DCHECK(!IsDetached())((void) 0); |
672 | int allocation_size = size_in_bytes; |
673 | |
674 | HeapObject object = TryAllocateLinearlyAligned(allocation_size, alignment); |
675 | if (object.is_null()) { |
676 | // We don't know exactly how much filler we need to align until space is |
677 | // allocated, so assume the worst case. |
678 | EnsureSpaceForAllocation(allocation_size + |
679 | Heap::GetMaximumFillToAlign(alignment)); |
680 | allocation_size = size_in_bytes; |
Value stored to 'allocation_size' is never read | |
681 | object = TryAllocateLinearlyAligned(size_in_bytes, alignment); |
682 | CHECK(!object.is_null())do { if ((__builtin_expect(!!(!(!object.is_null())), 0))) { V8_Fatal ("Check failed: %s.", "!object.is_null()"); } } while (false); |
683 | } |
684 | MSAN_ALLOCATED_UNINITIALIZED_MEMORY(object.address(), size_in_bytes)static_assert((std::is_pointer<decltype(object.address())> ::value || std::is_same<v8::base::Address, decltype(object .address())>::value), "static type violation"); static_assert (std::is_convertible<decltype(size_in_bytes), size_t>:: value, "static type violation"); do { ::v8::base::Use unused_tmp_array_for_use_macro []{object.address(), size_in_bytes}; (void)unused_tmp_array_for_use_macro ; } while (false); |
685 | |
686 | return AllocationResult::FromObject(object); |
687 | } |
688 | |
689 | AllocationResult ReadOnlySpace::AllocateRawUnaligned(int size_in_bytes) { |
690 | DCHECK(!IsDetached())((void) 0); |
691 | EnsureSpaceForAllocation(size_in_bytes); |
692 | Address current_top = top_; |
693 | Address new_top = current_top + size_in_bytes; |
694 | DCHECK_LE(new_top, limit_)((void) 0); |
695 | top_ = new_top; |
696 | HeapObject object = HeapObject::FromAddress(current_top); |
697 | |
698 | DCHECK(!object.is_null())((void) 0); |
699 | MSAN_ALLOCATED_UNINITIALIZED_MEMORY(object.address(), size_in_bytes)static_assert((std::is_pointer<decltype(object.address())> ::value || std::is_same<v8::base::Address, decltype(object .address())>::value), "static type violation"); static_assert (std::is_convertible<decltype(size_in_bytes), size_t>:: value, "static type violation"); do { ::v8::base::Use unused_tmp_array_for_use_macro []{object.address(), size_in_bytes}; (void)unused_tmp_array_for_use_macro ; } while (false); |
700 | |
701 | // Allocation always occurs in the last chunk for RO_SPACE. |
702 | BasicMemoryChunk* chunk = pages_.back(); |
703 | accounting_stats_.IncreaseAllocatedBytes(size_in_bytes, chunk); |
704 | chunk->IncreaseAllocatedBytes(size_in_bytes); |
705 | |
706 | return AllocationResult::FromObject(object); |
707 | } |
708 | |
709 | AllocationResult ReadOnlySpace::AllocateRaw(int size_in_bytes, |
710 | AllocationAlignment alignment) { |
711 | AllocationResult result = |
712 | USE_ALLOCATION_ALIGNMENT_BOOLfalse && alignment != kTaggedAligned |
713 | ? AllocateRawAligned(size_in_bytes, alignment) |
714 | : AllocateRawUnaligned(size_in_bytes); |
715 | HeapObject heap_obj; |
716 | if (result.To(&heap_obj)) { |
717 | DCHECK(heap()->incremental_marking()->marking_state()->IsBlack(heap_obj))((void) 0); |
718 | } |
719 | return result; |
720 | } |
721 | |
722 | size_t ReadOnlyPage::ShrinkToHighWaterMark() { |
723 | // Shrink pages to high water mark. The water mark points either to a filler |
724 | // or the area_end. |
725 | HeapObject filler = HeapObject::FromAddress(HighWaterMark()); |
726 | if (filler.address() == area_end()) return 0; |
727 | CHECK(filler.IsFreeSpaceOrFiller())do { if ((__builtin_expect(!!(!(filler.IsFreeSpaceOrFiller()) ), 0))) { V8_Fatal("Check failed: %s.", "filler.IsFreeSpaceOrFiller()" ); } } while (false); |
728 | DCHECK_EQ(filler.address() + filler.Size(), area_end())((void) 0); |
729 | |
730 | size_t unused = RoundDown(static_cast<size_t>(area_end() - filler.address()), |
731 | MemoryAllocator::GetCommitPageSize()); |
732 | if (unused > 0) { |
733 | DCHECK_EQ(0u, unused % MemoryAllocator::GetCommitPageSize())((void) 0); |
734 | if (FLAG_trace_gc_verbose) { |
735 | PrintIsolate(heap()->isolate(), "Shrinking page %p: end %p -> %p\n", |
736 | reinterpret_cast<void*>(this), |
737 | reinterpret_cast<void*>(area_end()), |
738 | reinterpret_cast<void*>(area_end() - unused)); |
739 | } |
740 | heap()->CreateFillerObjectAt( |
741 | filler.address(), |
742 | static_cast<int>(area_end() - filler.address() - unused), |
743 | ClearRecordedSlots::kNo); |
744 | heap()->memory_allocator()->PartialFreeMemory( |
745 | this, address() + size() - unused, unused, area_end() - unused); |
746 | if (filler.address() != area_end()) { |
747 | CHECK(filler.IsFreeSpaceOrFiller())do { if ((__builtin_expect(!!(!(filler.IsFreeSpaceOrFiller()) ), 0))) { V8_Fatal("Check failed: %s.", "filler.IsFreeSpaceOrFiller()" ); } } while (false); |
748 | CHECK_EQ(filler.address() + filler.Size(), area_end())do { bool _cmp = ::v8::base::CmpEQImpl< typename ::v8::base ::pass_value_or_ref<decltype(filler.address() + filler.Size ())>::type, typename ::v8::base::pass_value_or_ref<decltype (area_end())>::type>((filler.address() + filler.Size()) , (area_end())); do { if ((__builtin_expect(!!(!(_cmp)), 0))) { V8_Fatal("Check failed: %s.", "filler.address() + filler.Size()" " " "==" " " "area_end()"); } } while (false); } while (false ); |
749 | } |
750 | } |
751 | return unused; |
752 | } |
753 | |
754 | void ReadOnlySpace::ShrinkPages() { |
755 | if (V8_ENABLE_THIRD_PARTY_HEAP_BOOLfalse) return; |
756 | BasicMemoryChunk::UpdateHighWaterMark(top_); |
757 | heap()->CreateFillerObjectAt(top_, static_cast<int>(limit_ - top_), |
758 | ClearRecordedSlots::kNo); |
759 | |
760 | for (ReadOnlyPage* chunk : pages_) { |
761 | DCHECK(chunk->IsFlagSet(Page::NEVER_EVACUATE))((void) 0); |
762 | size_t unused = chunk->ShrinkToHighWaterMark(); |
763 | capacity_ -= unused; |
764 | accounting_stats_.DecreaseCapacity(static_cast<intptr_t>(unused)); |
765 | AccountUncommitted(unused); |
766 | } |
767 | limit_ = pages_.back()->area_end(); |
768 | } |
769 | |
770 | SharedReadOnlySpace::SharedReadOnlySpace( |
771 | Heap* heap, PointerCompressedReadOnlyArtifacts* artifacts) |
772 | : SharedReadOnlySpace(heap) { |
773 | // This constructor should only be used when RO_SPACE is shared with pointer |
774 | // compression in a per-Isolate cage. |
775 | DCHECK(V8_SHARED_RO_HEAP_BOOL)((void) 0); |
776 | DCHECK(COMPRESS_POINTERS_BOOL)((void) 0); |
777 | DCHECK(COMPRESS_POINTERS_IN_ISOLATE_CAGE_BOOL)((void) 0); |
778 | DCHECK(ReadOnlyHeap::IsReadOnlySpaceShared())((void) 0); |
779 | DCHECK(!artifacts->pages().empty())((void) 0); |
780 | |
781 | accounting_stats_.IncreaseCapacity(artifacts->accounting_stats().Capacity()); |
782 | for (ReadOnlyPage* page : artifacts->pages()) { |
783 | pages_.push_back(page); |
784 | accounting_stats_.IncreaseAllocatedBytes(page->allocated_bytes(), page); |
785 | } |
786 | } |
787 | |
788 | SharedReadOnlySpace::SharedReadOnlySpace( |
789 | Heap* heap, std::vector<ReadOnlyPage*>&& new_pages, |
790 | std::vector<std::unique_ptr<::v8::PageAllocator::SharedMemoryMapping>>&& |
791 | mappings, |
792 | AllocationStats&& new_stats) |
793 | : SharedReadOnlySpace(heap) { |
794 | DCHECK(V8_SHARED_RO_HEAP_BOOL)((void) 0); |
795 | DCHECK(COMPRESS_POINTERS_BOOL)((void) 0); |
796 | DCHECK(COMPRESS_POINTERS_IN_ISOLATE_CAGE_BOOL)((void) 0); |
797 | DCHECK(ReadOnlyHeap::IsReadOnlySpaceShared())((void) 0); |
798 | |
799 | accounting_stats_ = std::move(new_stats); |
800 | pages_ = std::move(new_pages); |
801 | shared_memory_mappings_ = std::move(mappings); |
802 | } |
803 | |
804 | SharedReadOnlySpace::SharedReadOnlySpace(Heap* heap, |
805 | SingleCopyReadOnlyArtifacts* artifacts) |
806 | : SharedReadOnlySpace(heap) { |
807 | // This constructor should only be used when RO_SPACE is shared without |
808 | // pointer compression in a per-Isolate cage. |
809 | DCHECK(V8_SHARED_RO_HEAP_BOOL)((void) 0); |
810 | DCHECK(!COMPRESS_POINTERS_IN_ISOLATE_CAGE_BOOL)((void) 0); |
811 | accounting_stats_ = artifacts->accounting_stats(); |
812 | pages_ = artifacts->pages(); |
813 | } |
814 | |
815 | } // namespace internal |
816 | } // namespace v8 |