2017-01-20 13:41:41 +08:00
|
|
|
#define JEMALLOC_TSD_C_
|
2017-04-11 09:17:55 +08:00
|
|
|
#include "jemalloc/internal/jemalloc_preamble.h"
|
|
|
|
#include "jemalloc/internal/jemalloc_internal_includes.h"
|
2012-03-22 09:33:03 +08:00
|
|
|
|
2017-04-12 05:43:12 +08:00
|
|
|
#include "jemalloc/internal/assert.h"
|
2017-05-24 03:28:19 +08:00
|
|
|
#include "jemalloc/internal/mutex.h"
|
2017-05-24 05:26:31 +08:00
|
|
|
#include "jemalloc/internal/rtree.h"
|
2017-04-12 05:43:12 +08:00
|
|
|
|
2012-03-22 09:33:03 +08:00
|
|
|
/******************************************************************************/
|
|
|
|
/* Data. */
|
|
|
|
|
|
|
|
static unsigned ncleanups;
|
|
|
|
static malloc_tsd_cleanup_t cleanups[MALLOC_TSD_CLEANUPS_MAX];
|
|
|
|
|
2017-04-27 09:37:44 +08:00
|
|
|
#ifdef JEMALLOC_MALLOC_THREAD_CLEANUP
|
|
|
|
__thread tsd_t JEMALLOC_TLS_MODEL tsd_tls = TSD_INITIALIZER;
|
|
|
|
__thread bool JEMALLOC_TLS_MODEL tsd_initialized = false;
|
|
|
|
bool tsd_booted = false;
|
|
|
|
#elif (defined(JEMALLOC_TLS))
|
|
|
|
__thread tsd_t JEMALLOC_TLS_MODEL tsd_tls = TSD_INITIALIZER;
|
|
|
|
pthread_key_t tsd_tsd;
|
|
|
|
bool tsd_booted = false;
|
|
|
|
#elif (defined(_WIN32))
|
|
|
|
DWORD tsd_tsd;
|
|
|
|
tsd_wrapper_t tsd_boot_wrapper = {false, TSD_INITIALIZER};
|
|
|
|
bool tsd_booted = false;
|
|
|
|
#else
|
2017-05-24 03:28:19 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* This contains a mutex, but it's pretty convenient to allow the mutex code to
|
|
|
|
* have a dependency on tsd. So we define the struct here, and only refer to it
|
|
|
|
* by pointer in the header.
|
|
|
|
*/
|
|
|
|
struct tsd_init_head_s {
|
|
|
|
ql_head(tsd_init_block_t) blocks;
|
|
|
|
malloc_mutex_t lock;
|
|
|
|
};
|
|
|
|
|
2017-04-27 09:37:44 +08:00
|
|
|
pthread_key_t tsd_tsd;
|
|
|
|
tsd_init_head_t tsd_init_head = {
|
|
|
|
ql_head_initializer(blocks),
|
|
|
|
MALLOC_MUTEX_INITIALIZER
|
|
|
|
};
|
|
|
|
tsd_wrapper_t tsd_boot_wrapper = {
|
|
|
|
false,
|
|
|
|
TSD_INITIALIZER
|
|
|
|
};
|
|
|
|
bool tsd_booted = false;
|
|
|
|
#endif
|
|
|
|
|
2014-09-23 12:09:23 +08:00
|
|
|
|
2012-03-22 09:33:03 +08:00
|
|
|
/******************************************************************************/
|
|
|
|
|
2017-04-12 14:13:45 +08:00
|
|
|
void
|
|
|
|
tsd_slow_update(tsd_t *tsd) {
|
|
|
|
if (tsd_nominal(tsd)) {
|
2017-04-27 09:37:44 +08:00
|
|
|
if (malloc_slow || !tsd_tcache_enabled_get(tsd) ||
|
2017-04-13 07:16:27 +08:00
|
|
|
tsd_reentrancy_level_get(tsd) > 0) {
|
2017-04-12 14:13:45 +08:00
|
|
|
tsd->state = tsd_state_nominal_slow;
|
|
|
|
} else {
|
|
|
|
tsd->state = tsd_state_nominal;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-06-07 12:44:39 +08:00
|
|
|
static bool
|
|
|
|
tsd_data_init(tsd_t *tsd) {
|
|
|
|
/*
|
|
|
|
* We initialize the rtree context first (before the tcache), since the
|
|
|
|
* tcache initialization depends on it.
|
|
|
|
*/
|
|
|
|
rtree_ctx_data_init(tsd_rtree_ctxp_get_unsafe(tsd));
|
|
|
|
|
|
|
|
return tsd_tcache_enabled_data_init(tsd);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
assert_tsd_data_cleanup_done(tsd_t *tsd) {
|
|
|
|
assert(!tsd_nominal(tsd));
|
|
|
|
assert(*tsd_arenap_get_unsafe(tsd) == NULL);
|
|
|
|
assert(*tsd_iarenap_get_unsafe(tsd) == NULL);
|
|
|
|
assert(*tsd_arenas_tdata_bypassp_get_unsafe(tsd) == true);
|
|
|
|
assert(*tsd_arenas_tdatap_get_unsafe(tsd) == NULL);
|
|
|
|
assert(*tsd_tcache_enabledp_get_unsafe(tsd) == false);
|
|
|
|
assert(*tsd_prof_tdatap_get_unsafe(tsd) == NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool
|
|
|
|
tsd_data_init_nocleanup(tsd_t *tsd) {
|
|
|
|
assert(tsd->state == tsd_state_reincarnated);
|
|
|
|
/*
|
|
|
|
* During reincarnation, there is no guarantee that the cleanup function
|
|
|
|
* will be called (deallocation may happen after all tsd destructors).
|
|
|
|
* We set up tsd in a way that no cleanup is needed.
|
|
|
|
*/
|
|
|
|
rtree_ctx_data_init(tsd_rtree_ctxp_get_unsafe(tsd));
|
|
|
|
*tsd_arenas_tdata_bypassp_get(tsd) = true;
|
|
|
|
*tsd_tcache_enabledp_get_unsafe(tsd) = false;
|
|
|
|
*tsd_reentrancy_levelp_get(tsd) = 1;
|
|
|
|
assert_tsd_data_cleanup_done(tsd);
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2017-04-12 14:13:45 +08:00
|
|
|
tsd_t *
|
|
|
|
tsd_fetch_slow(tsd_t *tsd) {
|
|
|
|
if (tsd->state == tsd_state_nominal_slow) {
|
|
|
|
/* On slow path but no work needed. */
|
|
|
|
assert(malloc_slow || !tsd_tcache_enabled_get(tsd) ||
|
2017-04-13 07:16:27 +08:00
|
|
|
tsd_reentrancy_level_get(tsd) > 0 ||
|
2017-04-12 14:13:45 +08:00
|
|
|
*tsd_arenas_tdata_bypassp_get(tsd));
|
|
|
|
} else if (tsd->state == tsd_state_uninitialized) {
|
|
|
|
tsd->state = tsd_state_nominal;
|
|
|
|
tsd_slow_update(tsd);
|
|
|
|
/* Trigger cleanup handler registration. */
|
|
|
|
tsd_set(tsd);
|
|
|
|
tsd_data_init(tsd);
|
|
|
|
} else if (tsd->state == tsd_state_purgatory) {
|
|
|
|
tsd->state = tsd_state_reincarnated;
|
|
|
|
tsd_set(tsd);
|
2017-06-07 12:44:39 +08:00
|
|
|
tsd_data_init_nocleanup(tsd);
|
2017-04-12 14:13:45 +08:00
|
|
|
} else {
|
|
|
|
assert(tsd->state == tsd_state_reincarnated);
|
|
|
|
}
|
|
|
|
|
|
|
|
return tsd;
|
|
|
|
}
|
|
|
|
|
2012-03-22 09:33:03 +08:00
|
|
|
void *
|
2017-01-16 08:56:30 +08:00
|
|
|
malloc_tsd_malloc(size_t size) {
|
2017-01-20 10:15:45 +08:00
|
|
|
return a0malloc(CACHELINE_CEILING(size));
|
2012-03-22 09:33:03 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2017-01-16 08:56:30 +08:00
|
|
|
malloc_tsd_dalloc(void *wrapper) {
|
2015-01-21 07:37:51 +08:00
|
|
|
a0dalloc(wrapper);
|
2012-03-22 09:33:03 +08:00
|
|
|
}
|
|
|
|
|
2012-04-22 12:27:46 +08:00
|
|
|
#if defined(JEMALLOC_MALLOC_THREAD_CLEANUP) || defined(_WIN32)
|
2012-04-30 18:38:29 +08:00
|
|
|
#ifndef _WIN32
|
|
|
|
JEMALLOC_EXPORT
|
|
|
|
#endif
|
2012-03-22 09:33:03 +08:00
|
|
|
void
|
2017-01-16 08:56:30 +08:00
|
|
|
_malloc_thread_cleanup(void) {
|
2012-04-25 05:22:02 +08:00
|
|
|
bool pending[MALLOC_TSD_CLEANUPS_MAX], again;
|
2012-03-22 09:33:03 +08:00
|
|
|
unsigned i;
|
|
|
|
|
2017-01-16 08:56:30 +08:00
|
|
|
for (i = 0; i < ncleanups; i++) {
|
2012-03-22 09:33:03 +08:00
|
|
|
pending[i] = true;
|
2017-01-16 08:56:30 +08:00
|
|
|
}
|
2012-03-22 09:33:03 +08:00
|
|
|
|
|
|
|
do {
|
|
|
|
again = false;
|
|
|
|
for (i = 0; i < ncleanups; i++) {
|
|
|
|
if (pending[i]) {
|
2012-04-19 00:29:49 +08:00
|
|
|
pending[i] = cleanups[i]();
|
2017-01-16 08:56:30 +08:00
|
|
|
if (pending[i]) {
|
2012-03-22 09:33:03 +08:00
|
|
|
again = true;
|
2017-01-16 08:56:30 +08:00
|
|
|
}
|
2012-03-22 09:33:03 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
} while (again);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
void
|
2017-01-16 08:56:30 +08:00
|
|
|
malloc_tsd_cleanup_register(bool (*f)(void)) {
|
2012-03-22 09:33:03 +08:00
|
|
|
assert(ncleanups < MALLOC_TSD_CLEANUPS_MAX);
|
2012-04-19 00:29:49 +08:00
|
|
|
cleanups[ncleanups] = f;
|
2012-03-22 09:33:03 +08:00
|
|
|
ncleanups++;
|
|
|
|
}
|
|
|
|
|
2017-04-27 09:37:44 +08:00
|
|
|
static void
|
|
|
|
tsd_do_data_cleanup(tsd_t *tsd) {
|
|
|
|
prof_tdata_cleanup(tsd);
|
|
|
|
iarena_cleanup(tsd);
|
|
|
|
arena_cleanup(tsd);
|
|
|
|
arenas_tdata_cleanup(tsd);
|
|
|
|
tcache_cleanup(tsd);
|
2017-05-23 10:32:04 +08:00
|
|
|
witnesses_cleanup(tsd_witness_tsdp_get_unsafe(tsd));
|
2017-04-27 09:37:44 +08:00
|
|
|
}
|
|
|
|
|
2012-03-22 09:33:03 +08:00
|
|
|
void
|
2017-01-16 08:56:30 +08:00
|
|
|
tsd_cleanup(void *arg) {
|
2014-09-23 12:09:23 +08:00
|
|
|
tsd_t *tsd = (tsd_t *)arg;
|
|
|
|
|
|
|
|
switch (tsd->state) {
|
2015-09-25 07:53:18 +08:00
|
|
|
case tsd_state_uninitialized:
|
|
|
|
/* Do nothing. */
|
|
|
|
break;
|
2017-03-30 08:00:52 +08:00
|
|
|
case tsd_state_reincarnated:
|
|
|
|
/*
|
|
|
|
* Reincarnated means another destructor deallocated memory
|
2017-06-07 12:44:39 +08:00
|
|
|
* after the destructor was called. Cleanup isn't required but
|
|
|
|
* is still called for testing and completeness.
|
2017-03-30 08:00:52 +08:00
|
|
|
*/
|
2017-06-07 12:44:39 +08:00
|
|
|
assert_tsd_data_cleanup_done(tsd);
|
|
|
|
/* Fall through. */
|
|
|
|
case tsd_state_nominal:
|
|
|
|
case tsd_state_nominal_slow:
|
2017-04-27 09:37:44 +08:00
|
|
|
tsd_do_data_cleanup(tsd);
|
2014-09-23 12:09:23 +08:00
|
|
|
tsd->state = tsd_state_purgatory;
|
|
|
|
tsd_set(tsd);
|
|
|
|
break;
|
|
|
|
case tsd_state_purgatory:
|
|
|
|
/*
|
|
|
|
* The previous time this destructor was called, we set the
|
|
|
|
* state to tsd_state_purgatory so that other destructors
|
|
|
|
* wouldn't cause re-creation of the tsd. This time, do
|
|
|
|
* nothing, and do not request another callback.
|
|
|
|
*/
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
not_reached();
|
|
|
|
}
|
2017-04-27 09:37:44 +08:00
|
|
|
#ifdef JEMALLOC_JET
|
|
|
|
test_callback_t test_callback = *tsd_test_callbackp_get_unsafe(tsd);
|
|
|
|
int *data = tsd_test_datap_get_unsafe(tsd);
|
|
|
|
if (test_callback != NULL) {
|
|
|
|
test_callback(data);
|
|
|
|
}
|
|
|
|
#endif
|
2014-09-23 12:09:23 +08:00
|
|
|
}
|
|
|
|
|
2016-04-14 14:36:15 +08:00
|
|
|
tsd_t *
|
2017-01-16 08:56:30 +08:00
|
|
|
malloc_tsd_boot0(void) {
|
2016-04-14 14:36:15 +08:00
|
|
|
tsd_t *tsd;
|
2012-03-22 09:33:03 +08:00
|
|
|
|
|
|
|
ncleanups = 0;
|
2017-01-16 08:56:30 +08:00
|
|
|
if (tsd_boot0()) {
|
2017-01-20 10:15:45 +08:00
|
|
|
return NULL;
|
2017-01-16 08:56:30 +08:00
|
|
|
}
|
2016-04-14 14:36:15 +08:00
|
|
|
tsd = tsd_fetch();
|
|
|
|
*tsd_arenas_tdata_bypassp_get(tsd) = true;
|
2017-01-20 10:15:45 +08:00
|
|
|
return tsd;
|
2012-03-22 09:33:03 +08:00
|
|
|
}
|
2012-04-22 12:27:46 +08:00
|
|
|
|
Refactor/fix arenas manipulation.
Abstract arenas access to use arena_get() (or a0get() where appropriate)
rather than directly reading e.g. arenas[ind]. Prior to the addition of
the arenas.extend mallctl, the worst possible outcome of directly
accessing arenas was a stale read, but arenas.extend may allocate and
assign a new array to arenas.
Add a tsd-based arenas_cache, which amortizes arenas reads. This
introduces some subtle bootstrapping issues, with tsd_boot() now being
split into tsd_boot[01]() to support tsd wrapper allocation
bootstrapping, as well as an arenas_cache_bypass tsd variable which
dynamically terminates allocation of arenas_cache itself.
Promote a0malloc(), a0calloc(), and a0free() to be generally useful for
internal allocation, and use them in several places (more may be
appropriate).
Abstract arena->nthreads management and fix a missing decrement during
thread destruction (recent tsd refactoring left arenas_cleanup()
unused).
Change arena_choose() to propagate OOM, and handle OOM in all callers.
This is important for providing consistent allocation behavior when the
MALLOCX_ARENA() flag is being used. Prior to this fix, it was possible
for an OOM to result in allocation silently allocating from a different
arena than the one specified.
2014-10-08 14:14:57 +08:00
|
|
|
void
|
2017-01-16 08:56:30 +08:00
|
|
|
malloc_tsd_boot1(void) {
|
Refactor/fix arenas manipulation.
Abstract arenas access to use arena_get() (or a0get() where appropriate)
rather than directly reading e.g. arenas[ind]. Prior to the addition of
the arenas.extend mallctl, the worst possible outcome of directly
accessing arenas was a stale read, but arenas.extend may allocate and
assign a new array to arenas.
Add a tsd-based arenas_cache, which amortizes arenas reads. This
introduces some subtle bootstrapping issues, with tsd_boot() now being
split into tsd_boot[01]() to support tsd wrapper allocation
bootstrapping, as well as an arenas_cache_bypass tsd variable which
dynamically terminates allocation of arenas_cache itself.
Promote a0malloc(), a0calloc(), and a0free() to be generally useful for
internal allocation, and use them in several places (more may be
appropriate).
Abstract arena->nthreads management and fix a missing decrement during
thread destruction (recent tsd refactoring left arenas_cleanup()
unused).
Change arena_choose() to propagate OOM, and handle OOM in all callers.
This is important for providing consistent allocation behavior when the
MALLOCX_ARENA() flag is being used. Prior to this fix, it was possible
for an OOM to result in allocation silently allocating from a different
arena than the one specified.
2014-10-08 14:14:57 +08:00
|
|
|
tsd_boot1();
|
2017-04-12 14:13:45 +08:00
|
|
|
tsd_t *tsd = tsd_fetch();
|
|
|
|
/* malloc_slow has been set properly. Update tsd_slow. */
|
|
|
|
tsd_slow_update(tsd);
|
|
|
|
*tsd_arenas_tdata_bypassp_get(tsd) = false;
|
Refactor/fix arenas manipulation.
Abstract arenas access to use arena_get() (or a0get() where appropriate)
rather than directly reading e.g. arenas[ind]. Prior to the addition of
the arenas.extend mallctl, the worst possible outcome of directly
accessing arenas was a stale read, but arenas.extend may allocate and
assign a new array to arenas.
Add a tsd-based arenas_cache, which amortizes arenas reads. This
introduces some subtle bootstrapping issues, with tsd_boot() now being
split into tsd_boot[01]() to support tsd wrapper allocation
bootstrapping, as well as an arenas_cache_bypass tsd variable which
dynamically terminates allocation of arenas_cache itself.
Promote a0malloc(), a0calloc(), and a0free() to be generally useful for
internal allocation, and use them in several places (more may be
appropriate).
Abstract arena->nthreads management and fix a missing decrement during
thread destruction (recent tsd refactoring left arenas_cleanup()
unused).
Change arena_choose() to propagate OOM, and handle OOM in all callers.
This is important for providing consistent allocation behavior when the
MALLOCX_ARENA() flag is being used. Prior to this fix, it was possible
for an OOM to result in allocation silently allocating from a different
arena than the one specified.
2014-10-08 14:14:57 +08:00
|
|
|
}
|
|
|
|
|
2012-04-22 12:27:46 +08:00
|
|
|
#ifdef _WIN32
|
|
|
|
static BOOL WINAPI
|
2017-01-16 08:56:30 +08:00
|
|
|
_tls_callback(HINSTANCE hinstDLL, DWORD fdwReason, LPVOID lpvReserved) {
|
2012-04-22 12:27:46 +08:00
|
|
|
switch (fdwReason) {
|
|
|
|
#ifdef JEMALLOC_LAZY_LOCK
|
|
|
|
case DLL_THREAD_ATTACH:
|
|
|
|
isthreaded = true;
|
|
|
|
break;
|
|
|
|
#endif
|
|
|
|
case DLL_THREAD_DETACH:
|
|
|
|
_malloc_thread_cleanup();
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
2017-01-20 10:15:45 +08:00
|
|
|
return true;
|
2012-04-22 12:27:46 +08:00
|
|
|
}
|
|
|
|
|
2017-03-29 08:30:54 +08:00
|
|
|
/*
|
|
|
|
* We need to be able to say "read" here (in the "pragma section"), but have
|
|
|
|
* hooked "read". We won't read for the rest of the file, so we can get away
|
|
|
|
* with unhooking.
|
|
|
|
*/
|
|
|
|
#ifdef read
|
|
|
|
# undef read
|
|
|
|
#endif
|
|
|
|
|
2012-04-30 18:38:31 +08:00
|
|
|
#ifdef _MSC_VER
|
|
|
|
# ifdef _M_IX86
|
|
|
|
# pragma comment(linker, "/INCLUDE:__tls_used")
|
2016-02-02 18:27:18 +08:00
|
|
|
# pragma comment(linker, "/INCLUDE:_tls_callback")
|
2012-04-30 18:38:31 +08:00
|
|
|
# else
|
|
|
|
# pragma comment(linker, "/INCLUDE:_tls_used")
|
2016-02-02 18:27:18 +08:00
|
|
|
# pragma comment(linker, "/INCLUDE:tls_callback")
|
2012-04-30 18:38:31 +08:00
|
|
|
# endif
|
|
|
|
# pragma section(".CRT$XLY",long,read)
|
|
|
|
#endif
|
2012-04-30 18:38:29 +08:00
|
|
|
JEMALLOC_SECTION(".CRT$XLY") JEMALLOC_ATTR(used)
|
2016-02-02 18:27:18 +08:00
|
|
|
BOOL (WINAPI *const tls_callback)(HINSTANCE hinstDLL,
|
2015-07-08 11:28:22 +08:00
|
|
|
DWORD fdwReason, LPVOID lpvReserved) = _tls_callback;
|
2012-04-22 12:27:46 +08:00
|
|
|
#endif
|
2013-10-22 05:12:16 +08:00
|
|
|
|
|
|
|
#if (!defined(JEMALLOC_MALLOC_THREAD_CLEANUP) && !defined(JEMALLOC_TLS) && \
|
|
|
|
!defined(_WIN32))
|
|
|
|
void *
|
2017-01-16 08:56:30 +08:00
|
|
|
tsd_init_check_recursion(tsd_init_head_t *head, tsd_init_block_t *block) {
|
2013-10-22 05:12:16 +08:00
|
|
|
pthread_t self = pthread_self();
|
|
|
|
tsd_init_block_t *iter;
|
|
|
|
|
|
|
|
/* Check whether this thread has already inserted into the list. */
|
2016-05-13 12:07:08 +08:00
|
|
|
malloc_mutex_lock(TSDN_NULL, &head->lock);
|
2013-10-22 05:12:16 +08:00
|
|
|
ql_foreach(iter, &head->blocks, link) {
|
|
|
|
if (iter->thread == self) {
|
2016-05-13 12:07:08 +08:00
|
|
|
malloc_mutex_unlock(TSDN_NULL, &head->lock);
|
2017-01-20 10:15:45 +08:00
|
|
|
return iter->data;
|
2013-10-22 05:12:16 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
/* Insert block into list. */
|
|
|
|
ql_elm_new(block, link);
|
|
|
|
block->thread = self;
|
|
|
|
ql_tail_insert(&head->blocks, block, link);
|
2016-05-13 12:07:08 +08:00
|
|
|
malloc_mutex_unlock(TSDN_NULL, &head->lock);
|
2017-01-20 10:15:45 +08:00
|
|
|
return NULL;
|
2013-10-22 05:12:16 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
void
|
2017-01-16 08:56:30 +08:00
|
|
|
tsd_init_finish(tsd_init_head_t *head, tsd_init_block_t *block) {
|
2016-05-13 12:07:08 +08:00
|
|
|
malloc_mutex_lock(TSDN_NULL, &head->lock);
|
2013-10-22 05:12:16 +08:00
|
|
|
ql_remove(&head->blocks, block, link);
|
2016-05-13 12:07:08 +08:00
|
|
|
malloc_mutex_unlock(TSDN_NULL, &head->lock);
|
2013-10-22 05:12:16 +08:00
|
|
|
}
|
|
|
|
#endif
|