| Index: third_party/WebKit/Source/wtf/PageAllocator.cpp
|
| diff --git a/third_party/WebKit/Source/wtf/PageAllocator.cpp b/third_party/WebKit/Source/wtf/PageAllocator.cpp
|
| index 5f5eb440e4bfa5c87cc5b0ea2ee1093bc78a1d31..ece956f58c099c1c0d8d205b19493abfe1a595c3 100644
|
| --- a/third_party/WebKit/Source/wtf/PageAllocator.cpp
|
| +++ b/third_party/WebKit/Source/wtf/PageAllocator.cpp
|
| @@ -48,59 +48,76 @@
|
| #define MAP_ANONYMOUS MAP_ANON
|
| #endif
|
|
|
| +// On POSIX memmap uses a nearby address if the hint address is blocked.
|
| +static const bool kHintIsAdvisory = true;
|
| +
|
| #elif OS(WIN)
|
|
|
| #include <windows.h>
|
|
|
| +// VirtualAlloc will fail if allocation at the hint address is blocked.
|
| +static const bool kHintIsAdvisory = false;
|
| +
|
| #else
|
| #error Unknown OS
|
| #endif // OS(POSIX)
|
|
|
| namespace WTF {
|
|
|
| -// This simple internal function wraps the OS-specific page allocation call so
|
| -// that it behaves consistently: the address is a hint and if it cannot be used,
|
| -// the allocation will be placed elsewhere.
|
| -static void* systemAllocPages(void* addr, size_t len, PageAccessibilityConfiguration pageAccessibility)
|
| +// This internal function wraps the OS-specific page allocation call. The
|
| +// behavior of the hint address is determined by the kHintIsAdvisory constant.
|
| +// If true, a non-zero hint is advisory and the returned address may differ from
|
| +// the hint. If false, the hint is mandatory and a successful allocation will
|
| +// not differ from the hint.
|
| +static void* systemAllocPages(void* hint, size_t len, PageAccessibilityConfiguration pageAccessibility)
|
| {
|
| ASSERT(!(len & kPageAllocationGranularityOffsetMask));
|
| - ASSERT(!(reinterpret_cast<uintptr_t>(addr) & kPageAllocationGranularityOffsetMask));
|
| + ASSERT(!(reinterpret_cast<uintptr_t>(hint) & kPageAllocationGranularityOffsetMask));
|
| void* ret;
|
| #if OS(WIN)
|
| - int accessFlag = pageAccessibility == PageAccessible ? PAGE_READWRITE : PAGE_NOACCESS;
|
| - ret = VirtualAlloc(addr, len, MEM_RESERVE | MEM_COMMIT, accessFlag);
|
| - if (!ret)
|
| - ret = VirtualAlloc(0, len, MEM_RESERVE | MEM_COMMIT, accessFlag);
|
| + DWORD accessFlag = pageAccessibility == PageAccessible ? PAGE_READWRITE : PAGE_NOACCESS;
|
| + ret = VirtualAlloc(hint, len, MEM_RESERVE | MEM_COMMIT, accessFlag);
|
| #else
|
| int accessFlag = pageAccessibility == PageAccessible ? (PROT_READ | PROT_WRITE) : PROT_NONE;
|
| - ret = mmap(addr, len, accessFlag, MAP_ANONYMOUS | MAP_PRIVATE, -1, 0);
|
| + ret = mmap(hint, len, accessFlag, MAP_ANONYMOUS | MAP_PRIVATE, -1, 0);
|
| if (ret == MAP_FAILED)
|
| ret = 0;
|
| #endif
|
| return ret;
|
| }
|
|
|
| -static bool trimMapping(void* baseAddr, size_t baseLen, void* trimAddr, size_t trimLen)
|
| +// Trims base to given length and alignment. Windows returns null on failure and frees base.
|
| +static void* trimMapping(void *base, size_t baseLen, size_t trimLen, uintptr_t align, PageAccessibilityConfiguration pageAccessibility)
|
| {
|
| -#if OS(WIN)
|
| - return false;
|
| -#else
|
| - char* basePtr = static_cast<char*>(baseAddr);
|
| - char* trimPtr = static_cast<char*>(trimAddr);
|
| - ASSERT(trimPtr >= basePtr);
|
| - ASSERT(trimPtr + trimLen <= basePtr + baseLen);
|
| - size_t preLen = trimPtr - basePtr;
|
| - if (preLen) {
|
| - int ret = munmap(basePtr, preLen);
|
| - RELEASE_ASSERT(!ret);
|
| + size_t preSlack = reinterpret_cast<uintptr_t>(base) & (align - 1);
|
| + if (preSlack)
|
| + preSlack = align - preSlack;
|
| + size_t postSlack = baseLen - preSlack - trimLen;
|
| + ASSERT(baseLen >= trimLen || preSlack || postSlack);
|
| + ASSERT(preSlack < baseLen);
|
| + ASSERT(postSlack < baseLen);
|
| + void* ret = base;
|
| +
|
| +#if OS(POSIX) // On POSIX we can resize the allocation run.
|
| + (void) pageAccessibility;
|
| + if (preSlack) {
|
| + int res = munmap(base, preSlack);
|
| + RELEASE_ASSERT(!res);
|
| + ret = reinterpret_cast<char*>(base) + preSlack;
|
| + }
|
| + if (postSlack) {
|
| + int res = munmap(reinterpret_cast<char*>(ret) + trimLen, postSlack);
|
| + RELEASE_ASSERT(!res);
|
| }
|
| - size_t postLen = (basePtr + baseLen) - (trimPtr + trimLen);
|
| - if (postLen) {
|
| - int ret = munmap(trimPtr + trimLen, postLen);
|
| - RELEASE_ASSERT(!ret);
|
| +#else // On Windows we can't resize the allocation run.
|
| + if (preSlack || postSlack) {
|
| + ret = reinterpret_cast<char*>(base) + preSlack;
|
| + freePages(base, baseLen);
|
| + ret = systemAllocPages(ret, trimLen, pageAccessibility);
|
| }
|
| - return true;
|
| #endif
|
| +
|
| + return ret;
|
| }
|
|
|
| void* allocPages(void* addr, size_t len, size_t align, PageAccessibilityConfiguration pageAccessibility)
|
| @@ -110,59 +127,55 @@ void* allocPages(void* addr, size_t len, size_t align, PageAccessibilityConfigur
|
| ASSERT(align >= kPageAllocationGranularity);
|
| ASSERT(!(align & kPageAllocationGranularityOffsetMask));
|
| ASSERT(!(reinterpret_cast<uintptr_t>(addr) & kPageAllocationGranularityOffsetMask));
|
| - size_t alignOffsetMask = align - 1;
|
| - size_t alignBaseMask = ~alignOffsetMask;
|
| + uintptr_t alignOffsetMask = align - 1;
|
| + uintptr_t alignBaseMask = ~alignOffsetMask;
|
| ASSERT(!(reinterpret_cast<uintptr_t>(addr) & alignOffsetMask));
|
| +
|
| // If the client passed null as the address, choose a good one.
|
| if (!addr) {
|
| addr = getRandomPageBase();
|
| addr = reinterpret_cast<void*>(reinterpret_cast<uintptr_t>(addr) & alignBaseMask);
|
| }
|
|
|
| - // The common case, which is also the least work we can do, is that the
|
| - // address and length are suitable. Just try it.
|
| - void* ret = systemAllocPages(addr, len, pageAccessibility);
|
| - // If the alignment is to our liking, we're done.
|
| - if (!ret || !(reinterpret_cast<uintptr_t>(ret) & alignOffsetMask))
|
| - return ret;
|
| -
|
| - // Annoying. Unmap and map a larger range to be sure to succeed on the
|
| - // second, slower attempt.
|
| - freePages(ret, len);
|
| + // First try to force an exact-size, aligned allocation from our random base.
|
| + for (int count = 0; count < 3; ++count) {
|
| + void* ret = systemAllocPages(addr, len, pageAccessibility);
|
| + if (kHintIsAdvisory || ret) {
|
| + // If the alignment is to our liking, we're done.
|
| + if (!(reinterpret_cast<uintptr_t>(ret)& alignOffsetMask))
|
| + return ret;
|
| + freePages(ret, len);
|
| +#if CPU(32BIT)
|
| + addr = reinterpret_cast<void*>((reinterpret_cast<uintptr_t>(ret)+align) & alignBaseMask);
|
| +#endif
|
| + } else if (!addr) { // We know we're OOM when an unhinted allocation fails.
|
| + return nullptr;
|
|
|
| - size_t tryLen = len + (align - kPageAllocationGranularity);
|
| - RELEASE_ASSERT(tryLen > len);
|
| + } else {
|
| +#if CPU(32BIT)
|
| + addr = reinterpret_cast<char*>(addr) + align;
|
| +#endif
|
| + }
|
|
|
| - // We loop to cater for the unlikely case where another thread maps on top
|
| - // of the aligned location we choose.
|
| - int count = 0;
|
| - while (count++ < 100) {
|
| - ret = systemAllocPages(addr, tryLen, pageAccessibility);
|
| - if (!ret)
|
| - return 0;
|
| - // We can now try and trim out a subset of the mapping.
|
| - addr = reinterpret_cast<void*>((reinterpret_cast<uintptr_t>(ret) + alignOffsetMask) & alignBaseMask);
|
| -
|
| - // On POSIX systems, we can trim the oversized mapping to fit exactly.
|
| - // This will always work on POSIX systems.
|
| - if (trimMapping(ret, tryLen, addr, len))
|
| - return addr;
|
| -
|
| - // On Windows, you can't trim an existing mapping so we unmap and remap
|
| - // a subset. We used to do for all platforms, but OSX 10.8 has a
|
| - // broken mmap() that ignores address hints for valid, unused addresses.
|
| - freePages(ret, tryLen);
|
| - ret = systemAllocPages(addr, len, pageAccessibility);
|
| - if (ret == addr || !ret)
|
| - return ret;
|
| -
|
| - // Unlikely race / collision. Do the simple thing and just start again.
|
| - freePages(ret, len);
|
| +#if !CPU(32BIT) // Keep trying random addresses on systems that have a large address space.
|
| addr = getRandomPageBase();
|
| addr = reinterpret_cast<void*>(reinterpret_cast<uintptr_t>(addr) & alignBaseMask);
|
| +#endif
|
| }
|
| - IMMEDIATE_CRASH();
|
| - return 0;
|
| +
|
| + // Map a larger allocation so we can force alignment, but continue randomizing only on 64-bit POSIX.
|
| + size_t tryLen = len + (align - kPageAllocationGranularity);
|
| + RELEASE_ASSERT(tryLen >= len);
|
| + void* ret;
|
| +
|
| + do {
|
| + // Don't continue to burn cycles on mandatory hints (Windows).
|
| + addr = kHintIsAdvisory ? getRandomPageBase() : nullptr;
|
| + ret = systemAllocPages(addr, tryLen, pageAccessibility);
|
| + // The retries are for Windows, where a race can steal our mapping on resize.
|
| + } while (ret && !(ret = trimMapping(ret, tryLen, len, align, pageAccessibility)));
|
| +
|
| + return ret;
|
| }
|
|
|
| void freePages(void* addr, size_t len)
|
|
|