OLD | NEW |
1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #ifndef StackFrameDepth_h | 5 #ifndef StackFrameDepth_h |
6 #define StackFrameDepth_h | 6 #define StackFrameDepth_h |
7 | 7 |
8 #include "platform/PlatformExport.h" | 8 #include "platform/PlatformExport.h" |
9 #include "wtf/Allocator.h" | 9 #include "wtf/Allocator.h" |
10 #include "wtf/Assertions.h" | 10 #include "wtf/Assertions.h" |
11 #include <cstddef> | 11 #include <cstddef> |
12 #include <stdint.h> | 12 #include <stdint.h> |
13 | 13 |
14 namespace blink { | 14 namespace blink { |
15 | 15 |
16 // StackFrameDepth keeps track of current call stack frame depth. | 16 // StackFrameDepth keeps track of current call stack frame depth. |
17 // Use isSafeToRecurse() to query if there is a room in current | 17 // It is specifically used to control stack usage while tracing |
18 // call stack for more recursive call. | 18 // the object graph during a GC. |
| 19 // |
| 20 // Use isSafeToRecurse() to determine if it is safe to consume |
| 21 // more stack by invoking another recursive call. |
19 class PLATFORM_EXPORT StackFrameDepth final { | 22 class PLATFORM_EXPORT StackFrameDepth final { |
20 STATIC_ONLY(StackFrameDepth); | 23 STATIC_ONLY(StackFrameDepth); |
21 public: | 24 public: |
22 inline static bool isSafeToRecurse() | 25 inline static bool isSafeToRecurse() |
23 { | 26 { |
24 ASSERT(s_stackFrameLimit || !s_isEnabled); | |
25 | |
26 // Asssume that the stack grows towards lower addresses, which | 27 // Asssume that the stack grows towards lower addresses, which |
27 // all the ABIs currently supported do. | 28 // all the ABIs currently supported do. |
28 // | 29 // |
29 // A unit test checks that the assumption holds for a target | 30 // A unit test checks that the assumption holds for a target |
30 // (HeapTest.StackGrowthDirection.) | 31 // (HeapTest.StackGrowthDirection.) |
31 return currentStackFrame() > s_stackFrameLimit; | 32 return currentStackFrame() > s_stackFrameLimit; |
32 } | 33 } |
33 | 34 |
34 static void enableStackLimit(); | 35 static void enableStackLimit(); |
35 static void disableStackLimit() | 36 static void disableStackLimit() |
36 { | 37 { |
37 s_stackFrameLimit = 0; | 38 s_stackFrameLimit = kMinimumStackLimit; |
38 #if ENABLE(ASSERT) | |
39 s_isEnabled = false; | |
40 #endif | |
41 } | 39 } |
42 | 40 |
43 #if ENABLE(ASSERT) | 41 #if ENABLE(ASSERT) |
44 inline static bool isEnabled() { return s_isEnabled; } | 42 inline static bool isEnabled() { return s_stackFrameLimit != kMinimumStackLi
mit; } |
45 inline static bool isAcceptableStackUse() | 43 inline static bool isAcceptableStackUse() |
46 { | 44 { |
| 45 #if defined(ADDRESS_SANITIZER) |
47 // ASan adds extra stack usage leading to too noisy asserts. | 46 // ASan adds extra stack usage leading to too noisy asserts. |
48 #if defined(ADDRESS_SANITIZER) | |
49 return true; | 47 return true; |
50 #else | 48 #else |
51 // If a conservative fallback stack size is in effect, use | 49 return !isEnabled() || isSafeToRecurse(); |
52 // a larger stack limit so as to avoid false positives. | |
53 if (!s_isEnabled || isSafeToRecurse()) | |
54 return true; | |
55 if (s_isUsingFallbackStackSize) | |
56 return (s_stackFrameLimit - currentStackFrame()) < 3 * kSafeStackFra
meSize; | |
57 return false; | |
58 #endif | 50 #endif |
59 } | 51 } |
60 #endif | 52 #endif |
61 | 53 |
62 static size_t getUnderestimatedStackSize(); | 54 static size_t getUnderestimatedStackSize(); |
63 static void* getStackStart(); | 55 static void* getStackStart(); |
64 | 56 |
65 #if COMPILER(MSVC) | 57 #if COMPILER(MSVC) |
66 // Ignore C4172: returning address of local variable or temporary: dummy. This | 58 // Ignore C4172: returning address of local variable or temporary: dummy. This |
67 // warning suppression has to go outside of the function to take effect. | 59 // warning suppression has to go outside of the function to take effect. |
(...skipping 10 matching lines...) Expand all Loading... |
78 #error "Stack frame pointer estimation not supported on this platform." | 70 #error "Stack frame pointer estimation not supported on this platform." |
79 return 0; | 71 return 0; |
80 #endif | 72 #endif |
81 } | 73 } |
82 #if COMPILER(MSVC) | 74 #if COMPILER(MSVC) |
83 #pragma warning(pop) | 75 #pragma warning(pop) |
84 #endif | 76 #endif |
85 | 77 |
86 private: | 78 private: |
87 // The maximum depth of eager, unrolled trace() calls that is | 79 // The maximum depth of eager, unrolled trace() calls that is |
88 // considered safe and allowed. | 80 // considered safe and allowed for targets with an unknown |
| 81 // thread stack size. |
89 static const int kSafeStackFrameSize = 32 * 1024; | 82 static const int kSafeStackFrameSize = 32 * 1024; |
90 | 83 |
| 84 // The stack pointer is assumed to grow towards lower addresses; |
| 85 // |kMinimumStackLimit| then being the limit that a stack |
| 86 // pointer will always exceed. |
| 87 static const uintptr_t kMinimumStackLimit = ~0ul; |
| 88 |
91 static uintptr_t getFallbackStackLimit(); | 89 static uintptr_t getFallbackStackLimit(); |
92 | 90 |
| 91 // The (pointer-valued) stack limit. |
93 static uintptr_t s_stackFrameLimit; | 92 static uintptr_t s_stackFrameLimit; |
94 #if ENABLE(ASSERT) | |
95 static bool s_isEnabled; | |
96 static bool s_isUsingFallbackStackSize; | |
97 #endif | |
98 }; | 93 }; |
99 | 94 |
100 class StackFrameDepthScope { | 95 class StackFrameDepthScope { |
101 STACK_ALLOCATED(); | 96 STACK_ALLOCATED(); |
102 WTF_MAKE_NONCOPYABLE(StackFrameDepthScope); | 97 WTF_MAKE_NONCOPYABLE(StackFrameDepthScope); |
103 public: | 98 public: |
104 StackFrameDepthScope() | 99 StackFrameDepthScope() |
105 { | 100 { |
106 StackFrameDepth::enableStackLimit(); | 101 StackFrameDepth::enableStackLimit(); |
107 // Enabled unless under stack pressure. | 102 // Enabled unless under stack pressure. |
108 ASSERT(StackFrameDepth::isSafeToRecurse() || !StackFrameDepth::isEnabled
()); | 103 ASSERT(StackFrameDepth::isSafeToRecurse() || !StackFrameDepth::isEnabled
()); |
109 } | 104 } |
110 | 105 |
111 ~StackFrameDepthScope() | 106 ~StackFrameDepthScope() |
112 { | 107 { |
113 StackFrameDepth::disableStackLimit(); | 108 StackFrameDepth::disableStackLimit(); |
114 } | 109 } |
115 }; | 110 }; |
116 | 111 |
117 } // namespace blink | 112 } // namespace blink |
118 | 113 |
119 #endif // StackFrameDepth_h | 114 #endif // StackFrameDepth_h |
OLD | NEW |