2021-02-16 15:57:39 +01:00
|
|
|
/*
|
|
|
|
* Copyright (C) Internet Systems Consortium, Inc. ("ISC")
|
|
|
|
*
|
2021-06-03 08:37:05 +02:00
|
|
|
* SPDX-License-Identifier: MPL-2.0
|
|
|
|
*
|
2021-02-16 15:57:39 +01:00
|
|
|
* This Source Code Form is subject to the terms of the Mozilla Public
|
|
|
|
* License, v. 2.0. If a copy of the MPL was not distributed with this
|
|
|
|
* file, you can obtain one at https://mozilla.org/MPL/2.0/.
|
|
|
|
*
|
|
|
|
* See the COPYRIGHT file distributed with this work for additional
|
|
|
|
* information regarding copyright ownership.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*! \file */
|
|
|
|
|
|
|
|
#include <inttypes.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
|
|
|
|
#include <isc/mem.h>
|
|
|
|
#include <isc/mutex.h>
|
|
|
|
#include <isc/once.h>
|
|
|
|
#include <isc/thread.h>
|
|
|
|
#include <isc/util.h>
|
|
|
|
|
|
|
|
#include "trampoline_p.h"
|
|
|
|
|
|
|
|
#define ISC__TRAMPOLINE_UNUSED 0
|
|
|
|
|
|
|
|
struct isc__trampoline {
|
|
|
|
int tid; /* const */
|
2021-02-16 19:54:04 +01:00
|
|
|
uintptr_t self;
|
2021-02-16 15:57:39 +01:00
|
|
|
isc_threadfunc_t start;
|
|
|
|
isc_threadarg_t arg;
|
Prevent memory bloat caused by a jemalloc quirk
Since version 5.0.0, decay-based purging is the only available dirty
page cleanup mechanism in jemalloc. It relies on so-called tickers,
which are simple data structures used for ensuring that certain actions
are taken "once every N times". Ticker data (state) is stored in a
thread-specific data structure called tsd in jemalloc parlance. Ticks
are triggered when extents are allocated and deallocated. Once every
1000 ticks, jemalloc attempts to release some of the dirty pages hanging
around (if any). This allows memory use to be kept in check over time.
This dirty page cleanup mechanism has a quirk. If the first
allocator-related action for a given thread is a free(), a
minimally-initialized tsd is set up which does not include ticker data.
When that thread subsequently calls *alloc(), the tsd transitions to its
nominal state, but due to a certain flag being set during minimal tsd
initialization, ticker data remains unallocated. This prevents
decay-based dirty page purging from working, effectively enabling memory
exhaustion over time. [1]
The quirk described above has been addressed (by moving ticker state to
a different structure) in jemalloc's development branch [2], but not in
any numbered jemalloc version released to date (the latest one being
5.2.1 as of this writing).
Work around the problem by ensuring that every thread spawned by
isc_thread_create() starts with a malloc() call. Avoid immediately
calling free() for the dummy allocation to prevent an optimizing
compiler from stripping away the malloc() + free() pair altogether.
An alternative implementation of this workaround was considered that
used a pair of isc_mem_create() + isc_mem_destroy() calls instead of
malloc() + free(), enabling the change to be fully contained within
isc__trampoline_run() (i.e. to not touch struct isc__trampoline), as the
compiler is not allowed to strip away arbitrary function calls.
However, that solution was eventually dismissed as it triggered
ThreadSanitizer reports when tools like dig, nsupdate, or rndc exited
abruptly without waiting for all worker threads to finish their work.
[1] https://github.com/jemalloc/jemalloc/issues/2251
[2] https://github.com/jemalloc/jemalloc/commit/c259323ab3082324100c708109dbfff660d0f4b8
2022-04-21 14:19:39 +02:00
|
|
|
void *jemalloc_enforce_init;
|
2021-02-16 15:57:39 +01:00
|
|
|
};
|
|
|
|
|
|
|
|
static isc_once_t isc__trampoline_initialize_once = ISC_ONCE_INIT;
|
|
|
|
static isc_once_t isc__trampoline_shutdown_once = ISC_ONCE_INIT;
|
|
|
|
static isc_mutex_t isc__trampoline_lock;
|
|
|
|
static isc__trampoline_t **trampolines;
|
|
|
|
thread_local size_t isc_tid_v = SIZE_MAX;
|
|
|
|
static size_t isc__trampoline_min = 1;
|
|
|
|
static size_t isc__trampoline_max = 65;
|
|
|
|
|
|
|
|
/*
|
2021-05-11 12:59:35 +02:00
|
|
|
* We can't use isc_mem API here, because it's called too early and the
|
|
|
|
* isc_mem_debugging flags can be changed later causing mismatch between flags
|
|
|
|
* used for isc_mem_get() and isc_mem_put().
|
2021-02-16 15:57:39 +01:00
|
|
|
*
|
2021-05-11 12:59:35 +02:00
|
|
|
* Since this is a single allocation at library load and deallocation at library
|
|
|
|
* unload, using the standard allocator without the tracking is fine for this
|
|
|
|
* single purpose.
|
2021-02-16 15:57:39 +01:00
|
|
|
*/
|
|
|
|
static isc__trampoline_t *
|
|
|
|
isc__trampoline_new(int tid, isc_threadfunc_t start, isc_threadarg_t arg) {
|
|
|
|
isc__trampoline_t *trampoline = calloc(1, sizeof(*trampoline));
|
|
|
|
RUNTIME_CHECK(trampoline != NULL);
|
|
|
|
|
|
|
|
*trampoline = (isc__trampoline_t){
|
|
|
|
.tid = tid,
|
|
|
|
.start = start,
|
|
|
|
.arg = arg,
|
|
|
|
.self = ISC__TRAMPOLINE_UNUSED,
|
|
|
|
};
|
|
|
|
|
|
|
|
return (trampoline);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
trampoline_initialize(void) {
|
|
|
|
isc_mutex_init(&isc__trampoline_lock);
|
|
|
|
|
|
|
|
trampolines = calloc(isc__trampoline_max, sizeof(trampolines[0]));
|
|
|
|
RUNTIME_CHECK(trampolines != NULL);
|
|
|
|
|
|
|
|
/* Get the trampoline slot 0 for the main thread */
|
|
|
|
trampolines[0] = isc__trampoline_new(0, NULL, NULL);
|
|
|
|
trampolines[0]->self = isc_thread_self();
|
|
|
|
isc_tid_v = trampolines[0]->tid;
|
|
|
|
|
|
|
|
/* Initialize the other trampolines */
|
|
|
|
for (size_t i = 1; i < isc__trampoline_max; i++) {
|
|
|
|
trampolines[i] = NULL;
|
|
|
|
}
|
|
|
|
isc__trampoline_min = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
isc__trampoline_initialize(void) {
|
|
|
|
isc_result_t result = isc_once_do(&isc__trampoline_initialize_once,
|
|
|
|
trampoline_initialize);
|
|
|
|
RUNTIME_CHECK(result == ISC_R_SUCCESS);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
trampoline_shutdown(void) {
|
|
|
|
/*
|
|
|
|
* When the program using the library exits abruptly and the library
|
|
|
|
* gets unloaded, there might be some existing trampolines from unjoined
|
|
|
|
* threads. We intentionally ignore those and don't check whether all
|
|
|
|
* trampolines have been cleared before exiting.
|
|
|
|
*/
|
|
|
|
free(trampolines[0]);
|
|
|
|
free(trampolines);
|
|
|
|
trampolines = NULL;
|
|
|
|
isc_mutex_destroy(&isc__trampoline_lock);
|
|
|
|
}
|
|
|
|
|
|
|
|
void
|
|
|
|
isc__trampoline_shutdown(void) {
|
|
|
|
isc_result_t result = isc_once_do(&isc__trampoline_shutdown_once,
|
|
|
|
trampoline_shutdown);
|
|
|
|
RUNTIME_CHECK(result == ISC_R_SUCCESS);
|
|
|
|
}
|
|
|
|
|
|
|
|
isc__trampoline_t *
|
|
|
|
isc__trampoline_get(isc_threadfunc_t start, isc_threadarg_t arg) {
|
|
|
|
isc__trampoline_t **tmp = NULL;
|
|
|
|
isc__trampoline_t *trampoline = NULL;
|
|
|
|
LOCK(&isc__trampoline_lock);
|
|
|
|
again:
|
|
|
|
for (size_t i = isc__trampoline_min; i < isc__trampoline_max; i++) {
|
|
|
|
if (trampolines[i] == NULL) {
|
|
|
|
trampoline = isc__trampoline_new(i, start, arg);
|
|
|
|
trampolines[i] = trampoline;
|
|
|
|
isc__trampoline_min = i + 1;
|
|
|
|
goto done;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
tmp = calloc(2 * isc__trampoline_max, sizeof(trampolines[0]));
|
|
|
|
RUNTIME_CHECK(tmp != NULL);
|
|
|
|
for (size_t i = 0; i < isc__trampoline_max; i++) {
|
|
|
|
tmp[i] = trampolines[i];
|
|
|
|
}
|
|
|
|
for (size_t i = isc__trampoline_max; i < 2 * isc__trampoline_max; i++) {
|
|
|
|
tmp[i] = NULL;
|
|
|
|
}
|
|
|
|
free(trampolines);
|
|
|
|
trampolines = tmp;
|
|
|
|
isc__trampoline_max = isc__trampoline_max * 2;
|
|
|
|
goto again;
|
|
|
|
done:
|
|
|
|
INSIST(trampoline != NULL);
|
|
|
|
UNLOCK(&isc__trampoline_lock);
|
|
|
|
|
|
|
|
return (trampoline);
|
|
|
|
}
|
|
|
|
|
2021-08-31 17:25:07 +00:00
|
|
|
void
|
|
|
|
isc__trampoline_detach(isc__trampoline_t *trampoline) {
|
2021-02-16 15:57:39 +01:00
|
|
|
LOCK(&isc__trampoline_lock);
|
|
|
|
REQUIRE(trampoline->tid > 0 &&
|
|
|
|
(size_t)trampoline->tid < isc__trampoline_max);
|
|
|
|
REQUIRE(trampoline->self == isc_thread_self());
|
|
|
|
REQUIRE(trampolines[trampoline->tid] == trampoline);
|
|
|
|
|
|
|
|
trampolines[trampoline->tid] = NULL;
|
|
|
|
|
|
|
|
if (isc__trampoline_min > (size_t)trampoline->tid) {
|
|
|
|
isc__trampoline_min = trampoline->tid;
|
|
|
|
}
|
|
|
|
|
Prevent memory bloat caused by a jemalloc quirk
Since version 5.0.0, decay-based purging is the only available dirty
page cleanup mechanism in jemalloc. It relies on so-called tickers,
which are simple data structures used for ensuring that certain actions
are taken "once every N times". Ticker data (state) is stored in a
thread-specific data structure called tsd in jemalloc parlance. Ticks
are triggered when extents are allocated and deallocated. Once every
1000 ticks, jemalloc attempts to release some of the dirty pages hanging
around (if any). This allows memory use to be kept in check over time.
This dirty page cleanup mechanism has a quirk. If the first
allocator-related action for a given thread is a free(), a
minimally-initialized tsd is set up which does not include ticker data.
When that thread subsequently calls *alloc(), the tsd transitions to its
nominal state, but due to a certain flag being set during minimal tsd
initialization, ticker data remains unallocated. This prevents
decay-based dirty page purging from working, effectively enabling memory
exhaustion over time. [1]
The quirk described above has been addressed (by moving ticker state to
a different structure) in jemalloc's development branch [2], but not in
any numbered jemalloc version released to date (the latest one being
5.2.1 as of this writing).
Work around the problem by ensuring that every thread spawned by
isc_thread_create() starts with a malloc() call. Avoid immediately
calling free() for the dummy allocation to prevent an optimizing
compiler from stripping away the malloc() + free() pair altogether.
An alternative implementation of this workaround was considered that
used a pair of isc_mem_create() + isc_mem_destroy() calls instead of
malloc() + free(), enabling the change to be fully contained within
isc__trampoline_run() (i.e. to not touch struct isc__trampoline), as the
compiler is not allowed to strip away arbitrary function calls.
However, that solution was eventually dismissed as it triggered
ThreadSanitizer reports when tools like dig, nsupdate, or rndc exited
abruptly without waiting for all worker threads to finish their work.
[1] https://github.com/jemalloc/jemalloc/issues/2251
[2] https://github.com/jemalloc/jemalloc/commit/c259323ab3082324100c708109dbfff660d0f4b8
2022-04-21 14:19:39 +02:00
|
|
|
free(trampoline->jemalloc_enforce_init);
|
2021-02-16 15:57:39 +01:00
|
|
|
free(trampoline);
|
|
|
|
|
|
|
|
UNLOCK(&isc__trampoline_lock);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2021-08-31 17:25:07 +00:00
|
|
|
void
|
|
|
|
isc__trampoline_attach(isc__trampoline_t *trampoline) {
|
2021-02-16 15:57:39 +01:00
|
|
|
REQUIRE(trampoline->tid > 0 &&
|
|
|
|
(size_t)trampoline->tid < isc__trampoline_max);
|
|
|
|
REQUIRE(trampoline->self == ISC__TRAMPOLINE_UNUSED);
|
|
|
|
|
|
|
|
/* Initialize the trampoline */
|
|
|
|
isc_tid_v = trampoline->tid;
|
|
|
|
trampoline->self = isc_thread_self();
|
Prevent memory bloat caused by a jemalloc quirk
Since version 5.0.0, decay-based purging is the only available dirty
page cleanup mechanism in jemalloc. It relies on so-called tickers,
which are simple data structures used for ensuring that certain actions
are taken "once every N times". Ticker data (state) is stored in a
thread-specific data structure called tsd in jemalloc parlance. Ticks
are triggered when extents are allocated and deallocated. Once every
1000 ticks, jemalloc attempts to release some of the dirty pages hanging
around (if any). This allows memory use to be kept in check over time.
This dirty page cleanup mechanism has a quirk. If the first
allocator-related action for a given thread is a free(), a
minimally-initialized tsd is set up which does not include ticker data.
When that thread subsequently calls *alloc(), the tsd transitions to its
nominal state, but due to a certain flag being set during minimal tsd
initialization, ticker data remains unallocated. This prevents
decay-based dirty page purging from working, effectively enabling memory
exhaustion over time. [1]
The quirk described above has been addressed (by moving ticker state to
a different structure) in jemalloc's development branch [2], but not in
any numbered jemalloc version released to date (the latest one being
5.2.1 as of this writing).
Work around the problem by ensuring that every thread spawned by
isc_thread_create() starts with a malloc() call. Avoid immediately
calling free() for the dummy allocation to prevent an optimizing
compiler from stripping away the malloc() + free() pair altogether.
An alternative implementation of this workaround was considered that
used a pair of isc_mem_create() + isc_mem_destroy() calls instead of
malloc() + free(), enabling the change to be fully contained within
isc__trampoline_run() (i.e. to not touch struct isc__trampoline), as the
compiler is not allowed to strip away arbitrary function calls.
However, that solution was eventually dismissed as it triggered
ThreadSanitizer reports when tools like dig, nsupdate, or rndc exited
abruptly without waiting for all worker threads to finish their work.
[1] https://github.com/jemalloc/jemalloc/issues/2251
[2] https://github.com/jemalloc/jemalloc/commit/c259323ab3082324100c708109dbfff660d0f4b8
2022-04-21 14:19:39 +02:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Ensure every thread starts with a malloc() call to prevent memory
|
|
|
|
* bloat caused by a jemalloc quirk. While this dummy allocation is
|
|
|
|
* not used for anything, free() must not be immediately called for it
|
|
|
|
* so that an optimizing compiler does not strip away such a pair of
|
|
|
|
* malloc() + free() calls altogether, as it would foil the fix.
|
|
|
|
*/
|
|
|
|
trampoline->jemalloc_enforce_init = malloc(8);
|
2021-08-31 17:25:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
isc_threadresult_t
|
|
|
|
isc__trampoline_run(isc_threadarg_t arg) {
|
|
|
|
isc__trampoline_t *trampoline = (isc__trampoline_t *)arg;
|
|
|
|
isc_threadresult_t result;
|
|
|
|
|
|
|
|
isc__trampoline_attach(trampoline);
|
2021-02-16 15:57:39 +01:00
|
|
|
|
|
|
|
/* Run the main function */
|
|
|
|
result = (trampoline->start)(trampoline->arg);
|
|
|
|
|
2021-08-31 17:25:07 +00:00
|
|
|
isc__trampoline_detach(trampoline);
|
2021-02-16 15:57:39 +01:00
|
|
|
|
|
|
|
return (result);
|
|
|
|
}
|