2014-08-21 00:07:42 -06:00
|
|
|
// Copyright 2009 The Go Authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style
|
|
|
|
// license that can be found in the LICENSE file.
|
|
|
|
|
2014-09-01 16:51:12 -06:00
|
|
|
// Malloc profiling.
|
|
|
|
// Patterned after tcmalloc's algorithms; shorter code.
|
|
|
|
|
2014-08-21 00:07:42 -06:00
|
|
|
package runtime
|
|
|
|
|
|
|
|
import (
|
|
|
|
"unsafe"
|
|
|
|
)
|
|
|
|
|
|
|
|
// NOTE(rsc): Everything here could use cas if contention became an issue.
|
2014-08-27 21:32:49 -06:00
|
|
|
var proflock mutex
|
2014-08-21 00:07:42 -06:00
|
|
|
|
|
|
|
// All memory allocations are local and do not escape outside of the profiler.
|
|
|
|
// The profiler is forbidden from referring to garbage-collected memory.
|
|
|
|
|
2014-09-01 16:51:12 -06:00
|
|
|
const (
|
|
|
|
// profile types
|
|
|
|
memProfile bucketType = 1 + iota
|
|
|
|
blockProfile
|
2014-08-31 22:06:26 -06:00
|
|
|
|
2014-09-01 16:51:12 -06:00
|
|
|
// size of bucket hash table
|
|
|
|
buckHashSize = 179999
|
|
|
|
|
|
|
|
// max depth of stack to record in bucket
|
|
|
|
maxStack = 32
|
|
|
|
)
|
|
|
|
|
|
|
|
type bucketType int
|
|
|
|
|
|
|
|
// A bucket holds per-call-stack profiling information.
|
|
|
|
// The representation is a bit sleazy, inherited from C.
|
|
|
|
// This struct defines the bucket header. It is followed in
|
|
|
|
// memory by the stack words and then the actual record
|
|
|
|
// data, either a memRecord or a blockRecord.
|
|
|
|
//
|
2014-08-31 22:06:26 -06:00
|
|
|
// Per-call-stack profiling information.
|
|
|
|
// Lookup by hashing call stack into a linked-list hash table.
|
2014-09-01 16:51:12 -06:00
|
|
|
type bucket struct {
|
|
|
|
next *bucket
|
|
|
|
allnext *bucket
|
|
|
|
typ bucketType // memBucket or blockBucket
|
|
|
|
hash uintptr
|
|
|
|
size uintptr
|
|
|
|
nstk uintptr
|
|
|
|
}
|
|
|
|
|
|
|
|
// A memRecord is the bucket data for a bucket of type memProfile,
|
|
|
|
// part of the memory profile.
|
|
|
|
type memRecord struct {
|
|
|
|
// The following complex 3-stage scheme of stats accumulation
|
|
|
|
// is required to obtain a consistent picture of mallocs and frees
|
|
|
|
// for some point in time.
|
|
|
|
// The problem is that mallocs come in real time, while frees
|
|
|
|
// come only after a GC during concurrent sweeping. So if we would
|
|
|
|
// naively count them, we would get a skew toward mallocs.
|
|
|
|
//
|
|
|
|
// Mallocs are accounted in recent stats.
|
|
|
|
// Explicit frees are accounted in recent stats.
|
|
|
|
// GC frees are accounted in prev stats.
|
|
|
|
// After GC prev stats are added to final stats and
|
|
|
|
// recent stats are moved into prev stats.
|
|
|
|
allocs uintptr
|
|
|
|
frees uintptr
|
|
|
|
alloc_bytes uintptr
|
|
|
|
free_bytes uintptr
|
|
|
|
|
|
|
|
// changes between next-to-last GC and last GC
|
|
|
|
prev_allocs uintptr
|
|
|
|
prev_frees uintptr
|
|
|
|
prev_alloc_bytes uintptr
|
|
|
|
prev_free_bytes uintptr
|
|
|
|
|
|
|
|
// changes since last GC
|
|
|
|
recent_allocs uintptr
|
|
|
|
recent_frees uintptr
|
|
|
|
recent_alloc_bytes uintptr
|
|
|
|
recent_free_bytes uintptr
|
|
|
|
}
|
|
|
|
|
|
|
|
// A blockRecord is the bucket data for a bucket of type blockProfile,
|
|
|
|
// part of the blocking profile.
|
|
|
|
type blockRecord struct {
|
|
|
|
count int64
|
|
|
|
cycles int64
|
|
|
|
}
|
2014-08-31 22:06:26 -06:00
|
|
|
|
2014-08-21 00:07:42 -06:00
|
|
|
var (
|
2014-09-01 16:51:12 -06:00
|
|
|
mbuckets *bucket // memory profile buckets
|
|
|
|
bbuckets *bucket // blocking profile buckets
|
|
|
|
buckhash *[179999]*bucket
|
|
|
|
bucketmem uintptr
|
2014-08-21 00:07:42 -06:00
|
|
|
)
|
|
|
|
|
2014-09-01 16:51:12 -06:00
|
|
|
// newBucket allocates a bucket with the given type and number of stack entries.
|
|
|
|
func newBucket(typ bucketType, nstk int) *bucket {
|
|
|
|
size := unsafe.Sizeof(bucket{}) + uintptr(nstk)*unsafe.Sizeof(uintptr(0))
|
|
|
|
switch typ {
|
|
|
|
default:
|
2014-12-27 21:58:00 -07:00
|
|
|
throw("invalid profile bucket type")
|
2014-09-01 16:51:12 -06:00
|
|
|
case memProfile:
|
|
|
|
size += unsafe.Sizeof(memRecord{})
|
|
|
|
case blockProfile:
|
|
|
|
size += unsafe.Sizeof(blockRecord{})
|
|
|
|
}
|
|
|
|
|
|
|
|
b := (*bucket)(persistentalloc(size, 0, &memstats.buckhash_sys))
|
|
|
|
bucketmem += size
|
|
|
|
b.typ = typ
|
|
|
|
b.nstk = uintptr(nstk)
|
|
|
|
return b
|
2014-08-31 22:06:26 -06:00
|
|
|
}
|
|
|
|
|
2014-09-01 16:51:12 -06:00
|
|
|
// stk returns the slice in b holding the stack.
|
|
|
|
func (b *bucket) stk() []uintptr {
|
|
|
|
stk := (*[maxStack]uintptr)(add(unsafe.Pointer(b), unsafe.Sizeof(*b)))
|
|
|
|
return stk[:b.nstk:b.nstk]
|
|
|
|
}
|
2014-08-31 22:06:26 -06:00
|
|
|
|
2014-09-01 16:51:12 -06:00
|
|
|
// mp returns the memRecord associated with the memProfile bucket b.
|
|
|
|
func (b *bucket) mp() *memRecord {
|
|
|
|
if b.typ != memProfile {
|
2014-12-27 21:58:00 -07:00
|
|
|
throw("bad use of bucket.mp")
|
2014-09-01 16:51:12 -06:00
|
|
|
}
|
|
|
|
data := add(unsafe.Pointer(b), unsafe.Sizeof(*b)+b.nstk*unsafe.Sizeof(uintptr(0)))
|
|
|
|
return (*memRecord)(data)
|
|
|
|
}
|
|
|
|
|
|
|
|
// bp returns the blockRecord associated with the blockProfile bucket b.
|
|
|
|
func (b *bucket) bp() *blockRecord {
|
|
|
|
if b.typ != blockProfile {
|
2014-12-27 21:58:00 -07:00
|
|
|
throw("bad use of bucket.bp")
|
2014-09-01 16:51:12 -06:00
|
|
|
}
|
|
|
|
data := add(unsafe.Pointer(b), unsafe.Sizeof(*b)+b.nstk*unsafe.Sizeof(uintptr(0)))
|
|
|
|
return (*blockRecord)(data)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Return the bucket for stk[0:nstk], allocating new bucket if needed.
|
|
|
|
func stkbucket(typ bucketType, size uintptr, stk []uintptr, alloc bool) *bucket {
|
|
|
|
if buckhash == nil {
|
|
|
|
buckhash = (*[buckHashSize]*bucket)(sysAlloc(unsafe.Sizeof(*buckhash), &memstats.buckhash_sys))
|
|
|
|
if buckhash == nil {
|
2014-12-27 21:58:00 -07:00
|
|
|
throw("runtime: cannot allocate memory")
|
2014-09-01 16:51:12 -06:00
|
|
|
}
|
2014-08-31 22:06:26 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
// Hash stack.
|
2014-09-01 16:51:12 -06:00
|
|
|
var h uintptr
|
|
|
|
for _, pc := range stk {
|
|
|
|
h += pc
|
|
|
|
h += h << 10
|
|
|
|
h ^= h >> 6
|
2014-08-31 22:06:26 -06:00
|
|
|
}
|
|
|
|
// hash in size
|
|
|
|
h += size
|
2014-09-01 16:51:12 -06:00
|
|
|
h += h << 10
|
|
|
|
h ^= h >> 6
|
2014-08-31 22:06:26 -06:00
|
|
|
// finalize
|
2014-09-01 16:51:12 -06:00
|
|
|
h += h << 3
|
|
|
|
h ^= h >> 11
|
2014-08-31 22:06:26 -06:00
|
|
|
|
2014-09-01 16:51:12 -06:00
|
|
|
i := int(h % buckHashSize)
|
|
|
|
for b := buckhash[i]; b != nil; b = b.next {
|
|
|
|
if b.typ == typ && b.hash == h && b.size == size && eqslice(b.stk(), stk) {
|
2014-08-31 22:06:26 -06:00
|
|
|
return b
|
2014-09-01 16:51:12 -06:00
|
|
|
}
|
|
|
|
}
|
2014-08-31 22:06:26 -06:00
|
|
|
|
2014-09-01 16:51:12 -06:00
|
|
|
if !alloc {
|
2014-08-31 22:06:26 -06:00
|
|
|
return nil
|
2014-09-01 16:51:12 -06:00
|
|
|
}
|
2014-08-31 22:06:26 -06:00
|
|
|
|
2014-09-01 16:51:12 -06:00
|
|
|
// Create new bucket.
|
|
|
|
b := newBucket(typ, len(stk))
|
|
|
|
copy(b.stk(), stk)
|
2014-08-31 22:06:26 -06:00
|
|
|
b.hash = h
|
|
|
|
b.size = size
|
|
|
|
b.next = buckhash[i]
|
|
|
|
buckhash[i] = b
|
2014-09-01 16:51:12 -06:00
|
|
|
if typ == memProfile {
|
2014-08-31 22:06:26 -06:00
|
|
|
b.allnext = mbuckets
|
|
|
|
mbuckets = b
|
|
|
|
} else {
|
|
|
|
b.allnext = bbuckets
|
|
|
|
bbuckets = b
|
|
|
|
}
|
|
|
|
return b
|
|
|
|
}
|
|
|
|
|
2014-09-01 16:51:12 -06:00
|
|
|
func eqslice(x, y []uintptr) bool {
|
|
|
|
if len(x) != len(y) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
for i, xi := range x {
|
|
|
|
if xi != y[i] {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
2014-08-31 22:06:26 -06:00
|
|
|
|
2014-09-01 16:51:12 -06:00
|
|
|
func mprof_GC() {
|
|
|
|
for b := mbuckets; b != nil; b = b.allnext {
|
|
|
|
mp := b.mp()
|
|
|
|
mp.allocs += mp.prev_allocs
|
|
|
|
mp.frees += mp.prev_frees
|
|
|
|
mp.alloc_bytes += mp.prev_alloc_bytes
|
|
|
|
mp.free_bytes += mp.prev_free_bytes
|
|
|
|
|
|
|
|
mp.prev_allocs = mp.recent_allocs
|
|
|
|
mp.prev_frees = mp.recent_frees
|
|
|
|
mp.prev_alloc_bytes = mp.recent_alloc_bytes
|
|
|
|
mp.prev_free_bytes = mp.recent_free_bytes
|
|
|
|
|
|
|
|
mp.recent_allocs = 0
|
|
|
|
mp.recent_frees = 0
|
|
|
|
mp.recent_alloc_bytes = 0
|
|
|
|
mp.recent_free_bytes = 0
|
2014-08-31 22:06:26 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Record that a gc just happened: all the 'recent' statistics are now real.
|
2014-09-01 16:51:12 -06:00
|
|
|
func mProf_GC() {
|
2014-08-31 22:06:26 -06:00
|
|
|
lock(&proflock)
|
2014-09-01 16:51:12 -06:00
|
|
|
mprof_GC()
|
2014-08-31 22:06:26 -06:00
|
|
|
unlock(&proflock)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Called by malloc to record a profiled block.
|
2014-09-01 16:51:12 -06:00
|
|
|
func mProf_Malloc(p unsafe.Pointer, size uintptr) {
|
|
|
|
var stk [maxStack]uintptr
|
2014-10-16 12:11:26 -06:00
|
|
|
nstk := callers(4, &stk[0], len(stk))
|
2014-08-31 22:06:26 -06:00
|
|
|
lock(&proflock)
|
2014-09-01 16:51:12 -06:00
|
|
|
b := stkbucket(memProfile, size, stk[:nstk], true)
|
|
|
|
mp := b.mp()
|
|
|
|
mp.recent_allocs++
|
|
|
|
mp.recent_alloc_bytes += size
|
2014-08-31 22:06:26 -06:00
|
|
|
unlock(&proflock)
|
|
|
|
|
|
|
|
// Setprofilebucket locks a bunch of other mutexes, so we call it outside of proflock.
|
|
|
|
// This reduces potential contention and chances of deadlocks.
|
2014-09-01 16:51:12 -06:00
|
|
|
// Since the object must be alive during call to mProf_Malloc,
|
2014-08-31 22:06:26 -06:00
|
|
|
// it's fine to do this non-atomically.
|
[dev.cc] runtime: delete scalararg, ptrarg; rename onM to systemstack
Scalararg and ptrarg are not "signal safe".
Go code filling them out can be interrupted by a signal,
and then the signal handler runs, and if it also ends up
in Go code that uses scalararg or ptrarg, now the old
values have been smashed.
For the pieces of code that do need to run in a signal handler,
we introduced onM_signalok, which is really just onM
except that the _signalok is meant to convey that the caller
asserts that scalarg and ptrarg will be restored to their old
values after the call (instead of the usual behavior, zeroing them).
Scalararg and ptrarg are also untyped and therefore error-prone.
Go code can always pass a closure instead of using scalararg
and ptrarg; they were only really necessary for C code.
And there's no more C code.
For all these reasons, delete scalararg and ptrarg, converting
the few remaining references to use closures.
Once those are gone, there is no need for a distinction between
onM and onM_signalok, so replace both with a single function
equivalent to the current onM_signalok (that is, it can be called
on any of the curg, g0, and gsignal stacks).
The name onM and the phrase 'm stack' are misnomers,
because on most system an M has two system stacks:
the main thread stack and the signal handling stack.
Correct the misnomer by naming the replacement function systemstack.
Fix a few references to "M stack" in code.
The main motivation for this change is to eliminate scalararg/ptrarg.
Rick and I have already seen them cause problems because
the calling sequence m.ptrarg[0] = p is a heap pointer assignment,
so it gets a write barrier. The write barrier also uses onM, so it has
all the same problems as if it were being invoked by a signal handler.
We worked around this by saving and restoring the old values
and by calling onM_signalok, but there's no point in keeping this nice
home for bugs around any longer.
This CL also changes funcline to return the file name as a result
instead of filling in a passed-in *string. (The *string signature is
left over from when the code was written in and called from C.)
That's arguably an unrelated change, except that once I had done
the ptrarg/scalararg/onM cleanup I started getting false positives
about the *string argument escaping (not allowed in package runtime).
The compiler is wrong, but the easiest fix is to write the code like
Go code instead of like C code. I am a bit worried that the compiler
is wrong because of some use of uninitialized memory in the escape
analysis. If that's the reason, it will go away when we convert the
compiler to Go. (And if not, we'll debug it the next time.)
LGTM=khr
R=r, khr
CC=austin, golang-codereviews, iant, rlh
https://golang.org/cl/174950043
2014-11-12 12:54:31 -07:00
|
|
|
systemstack(func() {
|
2014-11-11 15:05:02 -07:00
|
|
|
setprofilebucket(p, b)
|
|
|
|
})
|
2014-09-03 22:54:06 -06:00
|
|
|
}
|
2014-09-01 16:51:12 -06:00
|
|
|
|
|
|
|
// Called when freeing a profiled block.
|
|
|
|
func mProf_Free(b *bucket, size uintptr, freed bool) {
|
2014-08-31 22:06:26 -06:00
|
|
|
lock(&proflock)
|
2014-09-01 16:51:12 -06:00
|
|
|
mp := b.mp()
|
|
|
|
if freed {
|
|
|
|
mp.recent_frees++
|
|
|
|
mp.recent_free_bytes += size
|
2014-08-31 22:06:26 -06:00
|
|
|
} else {
|
2014-09-01 16:51:12 -06:00
|
|
|
mp.prev_frees++
|
|
|
|
mp.prev_free_bytes += size
|
2014-08-31 22:06:26 -06:00
|
|
|
}
|
|
|
|
unlock(&proflock)
|
|
|
|
}
|
|
|
|
|
2014-09-01 16:51:12 -06:00
|
|
|
var blockprofilerate uint64 // in CPU ticks
|
2014-08-31 22:06:26 -06:00
|
|
|
|
2014-09-01 16:51:12 -06:00
|
|
|
// SetBlockProfileRate controls the fraction of goroutine blocking events
|
|
|
|
// that are reported in the blocking profile. The profiler aims to sample
|
|
|
|
// an average of one blocking event per rate nanoseconds spent blocked.
|
|
|
|
//
|
|
|
|
// To include every blocking event in the profile, pass rate = 1.
|
|
|
|
// To turn off profiling entirely, pass rate <= 0.
|
|
|
|
func SetBlockProfileRate(rate int) {
|
|
|
|
var r int64
|
|
|
|
if rate <= 0 {
|
|
|
|
r = 0 // disable profiling
|
2014-10-20 16:48:42 -06:00
|
|
|
} else if rate == 1 {
|
|
|
|
r = 1 // profile everything
|
2014-09-01 16:51:12 -06:00
|
|
|
} else {
|
2014-08-31 22:06:26 -06:00
|
|
|
// convert ns to cycles, use float64 to prevent overflow during multiplication
|
2014-09-01 16:51:12 -06:00
|
|
|
r = int64(float64(rate) * float64(tickspersecond()) / (1000 * 1000 * 1000))
|
|
|
|
if r == 0 {
|
2014-08-31 22:06:26 -06:00
|
|
|
r = 1
|
2014-09-01 16:51:12 -06:00
|
|
|
}
|
2014-08-31 22:06:26 -06:00
|
|
|
}
|
2014-09-01 16:51:12 -06:00
|
|
|
|
|
|
|
atomicstore64(&blockprofilerate, uint64(r))
|
2014-08-31 22:06:26 -06:00
|
|
|
}
|
|
|
|
|
2014-09-01 16:51:12 -06:00
|
|
|
func blockevent(cycles int64, skip int) {
|
|
|
|
if cycles <= 0 {
|
2014-10-20 16:48:42 -06:00
|
|
|
cycles = 1
|
2014-09-01 16:51:12 -06:00
|
|
|
}
|
|
|
|
rate := int64(atomicload64(&blockprofilerate))
|
|
|
|
if rate <= 0 || (rate > cycles && int64(fastrand1())%rate > cycles) {
|
2014-08-31 22:06:26 -06:00
|
|
|
return
|
2014-09-01 16:51:12 -06:00
|
|
|
}
|
|
|
|
gp := getg()
|
|
|
|
var nstk int
|
|
|
|
var stk [maxStack]uintptr
|
|
|
|
if gp.m.curg == nil || gp.m.curg == gp {
|
runtime: convert traceback*.c to Go
The two converted files were nearly identical.
Instead of continuing that duplication, I merged them
into a single traceback.go.
Tested on arm, amd64, amd64p32, and 386.
LGTM=r
R=golang-codereviews, remyoudompheng, dave, r
CC=dvyukov, golang-codereviews, iant, khr
https://golang.org/cl/134200044
2014-09-02 13:12:53 -06:00
|
|
|
nstk = callers(skip, &stk[0], len(stk))
|
2014-09-01 16:51:12 -06:00
|
|
|
} else {
|
runtime: convert traceback*.c to Go
The two converted files were nearly identical.
Instead of continuing that duplication, I merged them
into a single traceback.go.
Tested on arm, amd64, amd64p32, and 386.
LGTM=r
R=golang-codereviews, remyoudompheng, dave, r
CC=dvyukov, golang-codereviews, iant, khr
https://golang.org/cl/134200044
2014-09-02 13:12:53 -06:00
|
|
|
nstk = gcallers(gp.m.curg, skip, &stk[0], len(stk))
|
2014-09-01 16:51:12 -06:00
|
|
|
}
|
2014-08-31 22:06:26 -06:00
|
|
|
lock(&proflock)
|
2014-09-01 16:51:12 -06:00
|
|
|
b := stkbucket(blockProfile, 0, stk[:nstk], true)
|
|
|
|
b.bp().count++
|
|
|
|
b.bp().cycles += cycles
|
2014-08-31 22:06:26 -06:00
|
|
|
unlock(&proflock)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Go interface to profile data.
|
|
|
|
|
2014-09-01 16:51:12 -06:00
|
|
|
// A StackRecord describes a single execution stack.
|
|
|
|
type StackRecord struct {
|
|
|
|
Stack0 [32]uintptr // stack trace for this record; ends at first 0 entry
|
|
|
|
}
|
|
|
|
|
|
|
|
// Stack returns the stack trace associated with the record,
|
|
|
|
// a prefix of r.Stack0.
|
|
|
|
func (r *StackRecord) Stack() []uintptr {
|
|
|
|
for i, v := range r.Stack0 {
|
|
|
|
if v == 0 {
|
|
|
|
return r.Stack0[0:i]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return r.Stack0[0:]
|
|
|
|
}
|
|
|
|
|
|
|
|
// MemProfileRate controls the fraction of memory allocations
|
|
|
|
// that are recorded and reported in the memory profile.
|
|
|
|
// The profiler aims to sample an average of
|
|
|
|
// one allocation per MemProfileRate bytes allocated.
|
|
|
|
//
|
|
|
|
// To include every allocated block in the profile, set MemProfileRate to 1.
|
|
|
|
// To turn off profiling entirely, set MemProfileRate to 0.
|
|
|
|
//
|
|
|
|
// The tools that process the memory profiles assume that the
|
|
|
|
// profile rate is constant across the lifetime of the program
|
|
|
|
// and equal to the current value. Programs that change the
|
|
|
|
// memory profiling rate should do so just once, as early as
|
|
|
|
// possible in the execution of the program (for example,
|
|
|
|
// at the beginning of main).
|
|
|
|
var MemProfileRate int = 512 * 1024
|
|
|
|
|
|
|
|
// A MemProfileRecord describes the live objects allocated
|
|
|
|
// by a particular call sequence (stack trace).
|
|
|
|
type MemProfileRecord struct {
|
|
|
|
AllocBytes, FreeBytes int64 // number of bytes allocated, freed
|
|
|
|
AllocObjects, FreeObjects int64 // number of objects allocated, freed
|
|
|
|
Stack0 [32]uintptr // stack trace for this record; ends at first 0 entry
|
|
|
|
}
|
|
|
|
|
|
|
|
// InUseBytes returns the number of bytes in use (AllocBytes - FreeBytes).
|
|
|
|
func (r *MemProfileRecord) InUseBytes() int64 { return r.AllocBytes - r.FreeBytes }
|
|
|
|
|
|
|
|
// InUseObjects returns the number of objects in use (AllocObjects - FreeObjects).
|
|
|
|
func (r *MemProfileRecord) InUseObjects() int64 {
|
|
|
|
return r.AllocObjects - r.FreeObjects
|
|
|
|
}
|
|
|
|
|
|
|
|
// Stack returns the stack trace associated with the record,
|
|
|
|
// a prefix of r.Stack0.
|
|
|
|
func (r *MemProfileRecord) Stack() []uintptr {
|
|
|
|
for i, v := range r.Stack0 {
|
|
|
|
if v == 0 {
|
|
|
|
return r.Stack0[0:i]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return r.Stack0[0:]
|
|
|
|
}
|
|
|
|
|
2014-08-21 00:07:42 -06:00
|
|
|
// MemProfile returns n, the number of records in the current memory profile.
|
|
|
|
// If len(p) >= n, MemProfile copies the profile into p and returns n, true.
|
|
|
|
// If len(p) < n, MemProfile does not change p and returns n, false.
|
|
|
|
//
|
|
|
|
// If inuseZero is true, the profile includes allocation records
|
|
|
|
// where r.AllocBytes > 0 but r.AllocBytes == r.FreeBytes.
|
|
|
|
// These are sites where memory was allocated, but it has all
|
|
|
|
// been released back to the runtime.
|
|
|
|
//
|
|
|
|
// Most clients should use the runtime/pprof package or
|
|
|
|
// the testing package's -test.memprofile flag instead
|
|
|
|
// of calling MemProfile directly.
|
|
|
|
func MemProfile(p []MemProfileRecord, inuseZero bool) (n int, ok bool) {
|
2014-08-27 21:32:49 -06:00
|
|
|
lock(&proflock)
|
2014-08-21 00:07:42 -06:00
|
|
|
clear := true
|
|
|
|
for b := mbuckets; b != nil; b = b.allnext {
|
2014-09-01 16:51:12 -06:00
|
|
|
mp := b.mp()
|
|
|
|
if inuseZero || mp.alloc_bytes != mp.free_bytes {
|
2014-08-21 00:07:42 -06:00
|
|
|
n++
|
|
|
|
}
|
2014-09-01 16:51:12 -06:00
|
|
|
if mp.allocs != 0 || mp.frees != 0 {
|
2014-08-21 00:07:42 -06:00
|
|
|
clear = false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if clear {
|
|
|
|
// Absolutely no data, suggesting that a garbage collection
|
|
|
|
// has not yet happened. In order to allow profiling when
|
|
|
|
// garbage collection is disabled from the beginning of execution,
|
|
|
|
// accumulate stats as if a GC just happened, and recount buckets.
|
|
|
|
mprof_GC()
|
|
|
|
mprof_GC()
|
|
|
|
n = 0
|
|
|
|
for b := mbuckets; b != nil; b = b.allnext {
|
2014-09-01 16:51:12 -06:00
|
|
|
mp := b.mp()
|
|
|
|
if inuseZero || mp.alloc_bytes != mp.free_bytes {
|
2014-08-21 00:07:42 -06:00
|
|
|
n++
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if n <= len(p) {
|
|
|
|
ok = true
|
|
|
|
idx := 0
|
|
|
|
for b := mbuckets; b != nil; b = b.allnext {
|
2014-09-01 16:51:12 -06:00
|
|
|
mp := b.mp()
|
|
|
|
if inuseZero || mp.alloc_bytes != mp.free_bytes {
|
2014-08-21 00:07:42 -06:00
|
|
|
record(&p[idx], b)
|
|
|
|
idx++
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2014-08-27 21:32:49 -06:00
|
|
|
unlock(&proflock)
|
2014-08-21 00:07:42 -06:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Write b's data to r.
|
|
|
|
func record(r *MemProfileRecord, b *bucket) {
|
2014-09-01 16:51:12 -06:00
|
|
|
mp := b.mp()
|
|
|
|
r.AllocBytes = int64(mp.alloc_bytes)
|
|
|
|
r.FreeBytes = int64(mp.free_bytes)
|
|
|
|
r.AllocObjects = int64(mp.allocs)
|
|
|
|
r.FreeObjects = int64(mp.frees)
|
|
|
|
copy(r.Stack0[:], b.stk())
|
|
|
|
for i := int(b.nstk); i < len(r.Stack0); i++ {
|
2014-08-21 00:07:42 -06:00
|
|
|
r.Stack0[i] = 0
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-09-01 16:51:12 -06:00
|
|
|
func iterate_memprof(fn func(*bucket, uintptr, *uintptr, uintptr, uintptr, uintptr)) {
|
2014-08-31 22:06:26 -06:00
|
|
|
lock(&proflock)
|
2014-09-01 16:51:12 -06:00
|
|
|
for b := mbuckets; b != nil; b = b.allnext {
|
|
|
|
mp := b.mp()
|
|
|
|
fn(b, uintptr(b.nstk), &b.stk()[0], b.size, mp.allocs, mp.frees)
|
2014-08-31 22:06:26 -06:00
|
|
|
}
|
|
|
|
unlock(&proflock)
|
|
|
|
}
|
2014-09-01 16:51:12 -06:00
|
|
|
|
|
|
|
// BlockProfileRecord describes blocking events originated
|
|
|
|
// at a particular call sequence (stack trace).
|
|
|
|
type BlockProfileRecord struct {
|
|
|
|
Count int64
|
|
|
|
Cycles int64
|
|
|
|
StackRecord
|
|
|
|
}
|
2014-08-31 22:06:26 -06:00
|
|
|
|
2014-08-21 00:07:42 -06:00
|
|
|
// BlockProfile returns n, the number of records in the current blocking profile.
|
|
|
|
// If len(p) >= n, BlockProfile copies the profile into p and returns n, true.
|
|
|
|
// If len(p) < n, BlockProfile does not change p and returns n, false.
|
|
|
|
//
|
|
|
|
// Most clients should use the runtime/pprof package or
|
|
|
|
// the testing package's -test.blockprofile flag instead
|
|
|
|
// of calling BlockProfile directly.
|
|
|
|
func BlockProfile(p []BlockProfileRecord) (n int, ok bool) {
|
2014-08-27 21:32:49 -06:00
|
|
|
lock(&proflock)
|
2014-08-21 00:07:42 -06:00
|
|
|
for b := bbuckets; b != nil; b = b.allnext {
|
|
|
|
n++
|
|
|
|
}
|
|
|
|
if n <= len(p) {
|
|
|
|
ok = true
|
|
|
|
for b := bbuckets; b != nil; b = b.allnext {
|
2014-09-01 16:51:12 -06:00
|
|
|
bp := b.bp()
|
|
|
|
r := &p[0]
|
|
|
|
r.Count = int64(bp.count)
|
|
|
|
r.Cycles = int64(bp.cycles)
|
|
|
|
i := copy(r.Stack0[:], b.stk())
|
|
|
|
for ; i < len(r.Stack0); i++ {
|
|
|
|
r.Stack0[i] = 0
|
2014-08-21 00:07:42 -06:00
|
|
|
}
|
2014-09-01 16:51:12 -06:00
|
|
|
p = p[1:]
|
2014-08-21 00:07:42 -06:00
|
|
|
}
|
|
|
|
}
|
2014-08-27 21:32:49 -06:00
|
|
|
unlock(&proflock)
|
2014-08-21 00:07:42 -06:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2014-08-31 22:06:26 -06:00
|
|
|
// ThreadCreateProfile returns n, the number of records in the thread creation profile.
|
|
|
|
// If len(p) >= n, ThreadCreateProfile copies the profile into p and returns n, true.
|
|
|
|
// If len(p) < n, ThreadCreateProfile does not change p and returns n, false.
|
|
|
|
//
|
|
|
|
// Most clients should use the runtime/pprof package instead
|
|
|
|
// of calling ThreadCreateProfile directly.
|
|
|
|
func ThreadCreateProfile(p []StackRecord) (n int, ok bool) {
|
|
|
|
first := (*m)(atomicloadp(unsafe.Pointer(&allm)))
|
|
|
|
for mp := first; mp != nil; mp = mp.alllink {
|
|
|
|
n++
|
|
|
|
}
|
|
|
|
if n <= len(p) {
|
|
|
|
ok = true
|
|
|
|
i := 0
|
|
|
|
for mp := first; mp != nil; mp = mp.alllink {
|
|
|
|
for s := range mp.createstack {
|
|
|
|
p[i].Stack0[s] = uintptr(mp.createstack[s])
|
|
|
|
}
|
|
|
|
i++
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2014-09-01 16:51:12 -06:00
|
|
|
// GoroutineProfile returns n, the number of records in the active goroutine stack profile.
|
|
|
|
// If len(p) >= n, GoroutineProfile copies the profile into p and returns n, true.
|
|
|
|
// If len(p) < n, GoroutineProfile does not change p and returns n, false.
|
|
|
|
//
|
|
|
|
// Most clients should use the runtime/pprof package instead
|
|
|
|
// of calling GoroutineProfile directly.
|
|
|
|
func GoroutineProfile(p []StackRecord) (n int, ok bool) {
|
2014-08-31 22:06:26 -06:00
|
|
|
|
2014-09-01 16:51:12 -06:00
|
|
|
n = NumGoroutine()
|
|
|
|
if n <= len(p) {
|
|
|
|
gp := getg()
|
2014-08-31 22:06:26 -06:00
|
|
|
semacquire(&worldsema, false)
|
2015-01-30 13:30:41 -07:00
|
|
|
gp.m.preemptoff = "profile"
|
[dev.cc] runtime: delete scalararg, ptrarg; rename onM to systemstack
Scalararg and ptrarg are not "signal safe".
Go code filling them out can be interrupted by a signal,
and then the signal handler runs, and if it also ends up
in Go code that uses scalararg or ptrarg, now the old
values have been smashed.
For the pieces of code that do need to run in a signal handler,
we introduced onM_signalok, which is really just onM
except that the _signalok is meant to convey that the caller
asserts that scalarg and ptrarg will be restored to their old
values after the call (instead of the usual behavior, zeroing them).
Scalararg and ptrarg are also untyped and therefore error-prone.
Go code can always pass a closure instead of using scalararg
and ptrarg; they were only really necessary for C code.
And there's no more C code.
For all these reasons, delete scalararg and ptrarg, converting
the few remaining references to use closures.
Once those are gone, there is no need for a distinction between
onM and onM_signalok, so replace both with a single function
equivalent to the current onM_signalok (that is, it can be called
on any of the curg, g0, and gsignal stacks).
The name onM and the phrase 'm stack' are misnomers,
because on most system an M has two system stacks:
the main thread stack and the signal handling stack.
Correct the misnomer by naming the replacement function systemstack.
Fix a few references to "M stack" in code.
The main motivation for this change is to eliminate scalararg/ptrarg.
Rick and I have already seen them cause problems because
the calling sequence m.ptrarg[0] = p is a heap pointer assignment,
so it gets a write barrier. The write barrier also uses onM, so it has
all the same problems as if it were being invoked by a signal handler.
We worked around this by saving and restoring the old values
and by calling onM_signalok, but there's no point in keeping this nice
home for bugs around any longer.
This CL also changes funcline to return the file name as a result
instead of filling in a passed-in *string. (The *string signature is
left over from when the code was written in and called from C.)
That's arguably an unrelated change, except that once I had done
the ptrarg/scalararg/onM cleanup I started getting false positives
about the *string argument escaping (not allowed in package runtime).
The compiler is wrong, but the easiest fix is to write the code like
Go code instead of like C code. I am a bit worried that the compiler
is wrong because of some use of uninitialized memory in the escape
analysis. If that's the reason, it will go away when we convert the
compiler to Go. (And if not, we'll debug it the next time.)
LGTM=khr
R=r, khr
CC=austin, golang-codereviews, iant, rlh
https://golang.org/cl/174950043
2014-11-12 12:54:31 -07:00
|
|
|
systemstack(stoptheworld)
|
2014-08-31 22:06:26 -06:00
|
|
|
|
2014-09-01 16:51:12 -06:00
|
|
|
n = NumGoroutine()
|
|
|
|
if n <= len(p) {
|
2014-08-31 22:06:26 -06:00
|
|
|
ok = true
|
2014-09-01 16:51:12 -06:00
|
|
|
r := p
|
runtime: avoid gentraceback of self on user goroutine stack
Gentraceback may grow the stack.
One of the gentraceback wrappers may grow the stack.
One of the gentraceback callback calls may grow the stack.
Various stack pointers are stored in various stack locations
as type uintptr during the execution of these calls.
If the stack does grow, these stack pointers will not be
updated and will start trying to decode stack memory that
is no longer valid.
It may be possible to change the type of the stack pointer
variables to be unsafe.Pointer, but that's pretty subtle and
may still have problems, even if we catch every last one.
An easier, more obviously correct fix is to require that
gentraceback of the currently running goroutine must run
on the g0 stack, not on the goroutine's own stack.
Not doing this causes faults when you set
StackFromSystem = 1
StackFaultOnFree = 1
The new check in gentraceback will catch future lapses.
The more general problem is calling getcallersp but then
calling a function that might relocate the stack, which would
invalidate the result of getcallersp. Add note to stubs.go
declaration of getcallersp explaining the problem, and
check all existing calls to getcallersp. Most needed fixes.
This affects Callers, Stack, and nearly all the runtime
profiling routines. It does not affect stack copying directly
nor garbage collection.
LGTM=khr
R=khr, bradfitz
CC=golang-codereviews, r
https://golang.org/cl/167060043
2014-11-05 21:01:48 -07:00
|
|
|
sp := getcallersp(unsafe.Pointer(&p))
|
|
|
|
pc := getcallerpc(unsafe.Pointer(&p))
|
[dev.cc] runtime: delete scalararg, ptrarg; rename onM to systemstack
Scalararg and ptrarg are not "signal safe".
Go code filling them out can be interrupted by a signal,
and then the signal handler runs, and if it also ends up
in Go code that uses scalararg or ptrarg, now the old
values have been smashed.
For the pieces of code that do need to run in a signal handler,
we introduced onM_signalok, which is really just onM
except that the _signalok is meant to convey that the caller
asserts that scalarg and ptrarg will be restored to their old
values after the call (instead of the usual behavior, zeroing them).
Scalararg and ptrarg are also untyped and therefore error-prone.
Go code can always pass a closure instead of using scalararg
and ptrarg; they were only really necessary for C code.
And there's no more C code.
For all these reasons, delete scalararg and ptrarg, converting
the few remaining references to use closures.
Once those are gone, there is no need for a distinction between
onM and onM_signalok, so replace both with a single function
equivalent to the current onM_signalok (that is, it can be called
on any of the curg, g0, and gsignal stacks).
The name onM and the phrase 'm stack' are misnomers,
because on most system an M has two system stacks:
the main thread stack and the signal handling stack.
Correct the misnomer by naming the replacement function systemstack.
Fix a few references to "M stack" in code.
The main motivation for this change is to eliminate scalararg/ptrarg.
Rick and I have already seen them cause problems because
the calling sequence m.ptrarg[0] = p is a heap pointer assignment,
so it gets a write barrier. The write barrier also uses onM, so it has
all the same problems as if it were being invoked by a signal handler.
We worked around this by saving and restoring the old values
and by calling onM_signalok, but there's no point in keeping this nice
home for bugs around any longer.
This CL also changes funcline to return the file name as a result
instead of filling in a passed-in *string. (The *string signature is
left over from when the code was written in and called from C.)
That's arguably an unrelated change, except that once I had done
the ptrarg/scalararg/onM cleanup I started getting false positives
about the *string argument escaping (not allowed in package runtime).
The compiler is wrong, but the easiest fix is to write the code like
Go code instead of like C code. I am a bit worried that the compiler
is wrong because of some use of uninitialized memory in the escape
analysis. If that's the reason, it will go away when we convert the
compiler to Go. (And if not, we'll debug it the next time.)
LGTM=khr
R=r, khr
CC=austin, golang-codereviews, iant, rlh
https://golang.org/cl/174950043
2014-11-12 12:54:31 -07:00
|
|
|
systemstack(func() {
|
runtime: avoid gentraceback of self on user goroutine stack
Gentraceback may grow the stack.
One of the gentraceback wrappers may grow the stack.
One of the gentraceback callback calls may grow the stack.
Various stack pointers are stored in various stack locations
as type uintptr during the execution of these calls.
If the stack does grow, these stack pointers will not be
updated and will start trying to decode stack memory that
is no longer valid.
It may be possible to change the type of the stack pointer
variables to be unsafe.Pointer, but that's pretty subtle and
may still have problems, even if we catch every last one.
An easier, more obviously correct fix is to require that
gentraceback of the currently running goroutine must run
on the g0 stack, not on the goroutine's own stack.
Not doing this causes faults when you set
StackFromSystem = 1
StackFaultOnFree = 1
The new check in gentraceback will catch future lapses.
The more general problem is calling getcallersp but then
calling a function that might relocate the stack, which would
invalidate the result of getcallersp. Add note to stubs.go
declaration of getcallersp explaining the problem, and
check all existing calls to getcallersp. Most needed fixes.
This affects Callers, Stack, and nearly all the runtime
profiling routines. It does not affect stack copying directly
nor garbage collection.
LGTM=khr
R=khr, bradfitz
CC=golang-codereviews, r
https://golang.org/cl/167060043
2014-11-05 21:01:48 -07:00
|
|
|
saveg(pc, sp, gp, &r[0])
|
|
|
|
})
|
2014-09-01 16:51:12 -06:00
|
|
|
r = r[1:]
|
|
|
|
for _, gp1 := range allgs {
|
|
|
|
if gp1 == gp || readgstatus(gp1) == _Gdead {
|
2014-08-31 22:06:26 -06:00
|
|
|
continue
|
2014-09-01 16:51:12 -06:00
|
|
|
}
|
|
|
|
saveg(^uintptr(0), ^uintptr(0), gp1, &r[0])
|
|
|
|
r = r[1:]
|
2014-08-31 22:06:26 -06:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-30 13:30:41 -07:00
|
|
|
gp.m.preemptoff = ""
|
2014-08-31 22:06:26 -06:00
|
|
|
semrelease(&worldsema)
|
[dev.cc] runtime: delete scalararg, ptrarg; rename onM to systemstack
Scalararg and ptrarg are not "signal safe".
Go code filling them out can be interrupted by a signal,
and then the signal handler runs, and if it also ends up
in Go code that uses scalararg or ptrarg, now the old
values have been smashed.
For the pieces of code that do need to run in a signal handler,
we introduced onM_signalok, which is really just onM
except that the _signalok is meant to convey that the caller
asserts that scalarg and ptrarg will be restored to their old
values after the call (instead of the usual behavior, zeroing them).
Scalararg and ptrarg are also untyped and therefore error-prone.
Go code can always pass a closure instead of using scalararg
and ptrarg; they were only really necessary for C code.
And there's no more C code.
For all these reasons, delete scalararg and ptrarg, converting
the few remaining references to use closures.
Once those are gone, there is no need for a distinction between
onM and onM_signalok, so replace both with a single function
equivalent to the current onM_signalok (that is, it can be called
on any of the curg, g0, and gsignal stacks).
The name onM and the phrase 'm stack' are misnomers,
because on most system an M has two system stacks:
the main thread stack and the signal handling stack.
Correct the misnomer by naming the replacement function systemstack.
Fix a few references to "M stack" in code.
The main motivation for this change is to eliminate scalararg/ptrarg.
Rick and I have already seen them cause problems because
the calling sequence m.ptrarg[0] = p is a heap pointer assignment,
so it gets a write barrier. The write barrier also uses onM, so it has
all the same problems as if it were being invoked by a signal handler.
We worked around this by saving and restoring the old values
and by calling onM_signalok, but there's no point in keeping this nice
home for bugs around any longer.
This CL also changes funcline to return the file name as a result
instead of filling in a passed-in *string. (The *string signature is
left over from when the code was written in and called from C.)
That's arguably an unrelated change, except that once I had done
the ptrarg/scalararg/onM cleanup I started getting false positives
about the *string argument escaping (not allowed in package runtime).
The compiler is wrong, but the easiest fix is to write the code like
Go code instead of like C code. I am a bit worried that the compiler
is wrong because of some use of uninitialized memory in the escape
analysis. If that's the reason, it will go away when we convert the
compiler to Go. (And if not, we'll debug it the next time.)
LGTM=khr
R=r, khr
CC=austin, golang-codereviews, iant, rlh
https://golang.org/cl/174950043
2014-11-12 12:54:31 -07:00
|
|
|
systemstack(starttheworld)
|
2014-08-31 22:06:26 -06:00
|
|
|
}
|
|
|
|
|
2014-09-01 16:51:12 -06:00
|
|
|
return n, ok
|
|
|
|
}
|
2014-08-31 22:06:26 -06:00
|
|
|
|
2014-09-01 16:51:12 -06:00
|
|
|
func saveg(pc, sp uintptr, gp *g, r *StackRecord) {
|
runtime: fix line number in first stack frame in printed stack trace
Originally traceback was only used for printing the stack
when an unexpected signal came in. In that case, the
initial PC is taken from the signal and should be used
unaltered. For the callers, the PC is the return address,
which might be on the line after the call; we subtract 1
to get to the CALL instruction.
Traceback is now used for a variety of things, and for
almost all of those the initial PC is a return address,
whether from getcallerpc, or gp->sched.pc, or gp->syscallpc.
In those cases, we need to subtract 1 from this initial PC,
but the traceback code had a hard rule "never subtract 1
from the initial PC", left over from the signal handling days.
Change gentraceback to take a flag that specifies whether
we are tracing a trap.
Change traceback to default to "starting with a return PC",
which is the overwhelmingly common case.
Add tracebacktrap, like traceback but starting with a trap PC.
Use tracebacktrap in signal handlers.
Fixes #7690.
LGTM=iant, r
R=r, iant
CC=golang-codereviews
https://golang.org/cl/167810044
2014-10-29 13:14:24 -06:00
|
|
|
n := gentraceback(pc, sp, 0, gp, 0, &r.Stack0[0], len(r.Stack0), nil, nil, 0)
|
runtime: convert traceback*.c to Go
The two converted files were nearly identical.
Instead of continuing that duplication, I merged them
into a single traceback.go.
Tested on arm, amd64, amd64p32, and 386.
LGTM=r
R=golang-codereviews, remyoudompheng, dave, r
CC=dvyukov, golang-codereviews, iant, khr
https://golang.org/cl/134200044
2014-09-02 13:12:53 -06:00
|
|
|
if n < len(r.Stack0) {
|
2014-09-01 16:51:12 -06:00
|
|
|
r.Stack0[n] = 0
|
|
|
|
}
|
2014-08-31 22:06:26 -06:00
|
|
|
}
|
|
|
|
|
2014-08-26 00:34:46 -06:00
|
|
|
// Stack formats a stack trace of the calling goroutine into buf
|
|
|
|
// and returns the number of bytes written to buf.
|
|
|
|
// If all is true, Stack formats stack traces of all other goroutines
|
|
|
|
// into buf after the trace for the current goroutine.
|
|
|
|
func Stack(buf []byte, all bool) int {
|
|
|
|
if all {
|
|
|
|
semacquire(&worldsema, false)
|
2014-12-15 15:39:28 -07:00
|
|
|
gp := getg()
|
2015-01-30 13:30:41 -07:00
|
|
|
gp.m.preemptoff = "stack trace"
|
[dev.cc] runtime: delete scalararg, ptrarg; rename onM to systemstack
Scalararg and ptrarg are not "signal safe".
Go code filling them out can be interrupted by a signal,
and then the signal handler runs, and if it also ends up
in Go code that uses scalararg or ptrarg, now the old
values have been smashed.
For the pieces of code that do need to run in a signal handler,
we introduced onM_signalok, which is really just onM
except that the _signalok is meant to convey that the caller
asserts that scalarg and ptrarg will be restored to their old
values after the call (instead of the usual behavior, zeroing them).
Scalararg and ptrarg are also untyped and therefore error-prone.
Go code can always pass a closure instead of using scalararg
and ptrarg; they were only really necessary for C code.
And there's no more C code.
For all these reasons, delete scalararg and ptrarg, converting
the few remaining references to use closures.
Once those are gone, there is no need for a distinction between
onM and onM_signalok, so replace both with a single function
equivalent to the current onM_signalok (that is, it can be called
on any of the curg, g0, and gsignal stacks).
The name onM and the phrase 'm stack' are misnomers,
because on most system an M has two system stacks:
the main thread stack and the signal handling stack.
Correct the misnomer by naming the replacement function systemstack.
Fix a few references to "M stack" in code.
The main motivation for this change is to eliminate scalararg/ptrarg.
Rick and I have already seen them cause problems because
the calling sequence m.ptrarg[0] = p is a heap pointer assignment,
so it gets a write barrier. The write barrier also uses onM, so it has
all the same problems as if it were being invoked by a signal handler.
We worked around this by saving and restoring the old values
and by calling onM_signalok, but there's no point in keeping this nice
home for bugs around any longer.
This CL also changes funcline to return the file name as a result
instead of filling in a passed-in *string. (The *string signature is
left over from when the code was written in and called from C.)
That's arguably an unrelated change, except that once I had done
the ptrarg/scalararg/onM cleanup I started getting false positives
about the *string argument escaping (not allowed in package runtime).
The compiler is wrong, but the easiest fix is to write the code like
Go code instead of like C code. I am a bit worried that the compiler
is wrong because of some use of uninitialized memory in the escape
analysis. If that's the reason, it will go away when we convert the
compiler to Go. (And if not, we'll debug it the next time.)
LGTM=khr
R=r, khr
CC=austin, golang-codereviews, iant, rlh
https://golang.org/cl/174950043
2014-11-12 12:54:31 -07:00
|
|
|
systemstack(stoptheworld)
|
2014-08-26 00:34:46 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
n := 0
|
|
|
|
if len(buf) > 0 {
|
2014-12-15 15:39:28 -07:00
|
|
|
gp := getg()
|
runtime: avoid gentraceback of self on user goroutine stack
Gentraceback may grow the stack.
One of the gentraceback wrappers may grow the stack.
One of the gentraceback callback calls may grow the stack.
Various stack pointers are stored in various stack locations
as type uintptr during the execution of these calls.
If the stack does grow, these stack pointers will not be
updated and will start trying to decode stack memory that
is no longer valid.
It may be possible to change the type of the stack pointer
variables to be unsafe.Pointer, but that's pretty subtle and
may still have problems, even if we catch every last one.
An easier, more obviously correct fix is to require that
gentraceback of the currently running goroutine must run
on the g0 stack, not on the goroutine's own stack.
Not doing this causes faults when you set
StackFromSystem = 1
StackFaultOnFree = 1
The new check in gentraceback will catch future lapses.
The more general problem is calling getcallersp but then
calling a function that might relocate the stack, which would
invalidate the result of getcallersp. Add note to stubs.go
declaration of getcallersp explaining the problem, and
check all existing calls to getcallersp. Most needed fixes.
This affects Callers, Stack, and nearly all the runtime
profiling routines. It does not affect stack copying directly
nor garbage collection.
LGTM=khr
R=khr, bradfitz
CC=golang-codereviews, r
https://golang.org/cl/167060043
2014-11-05 21:01:48 -07:00
|
|
|
sp := getcallersp(unsafe.Pointer(&buf))
|
|
|
|
pc := getcallerpc(unsafe.Pointer(&buf))
|
[dev.cc] runtime: delete scalararg, ptrarg; rename onM to systemstack
Scalararg and ptrarg are not "signal safe".
Go code filling them out can be interrupted by a signal,
and then the signal handler runs, and if it also ends up
in Go code that uses scalararg or ptrarg, now the old
values have been smashed.
For the pieces of code that do need to run in a signal handler,
we introduced onM_signalok, which is really just onM
except that the _signalok is meant to convey that the caller
asserts that scalarg and ptrarg will be restored to their old
values after the call (instead of the usual behavior, zeroing them).
Scalararg and ptrarg are also untyped and therefore error-prone.
Go code can always pass a closure instead of using scalararg
and ptrarg; they were only really necessary for C code.
And there's no more C code.
For all these reasons, delete scalararg and ptrarg, converting
the few remaining references to use closures.
Once those are gone, there is no need for a distinction between
onM and onM_signalok, so replace both with a single function
equivalent to the current onM_signalok (that is, it can be called
on any of the curg, g0, and gsignal stacks).
The name onM and the phrase 'm stack' are misnomers,
because on most system an M has two system stacks:
the main thread stack and the signal handling stack.
Correct the misnomer by naming the replacement function systemstack.
Fix a few references to "M stack" in code.
The main motivation for this change is to eliminate scalararg/ptrarg.
Rick and I have already seen them cause problems because
the calling sequence m.ptrarg[0] = p is a heap pointer assignment,
so it gets a write barrier. The write barrier also uses onM, so it has
all the same problems as if it were being invoked by a signal handler.
We worked around this by saving and restoring the old values
and by calling onM_signalok, but there's no point in keeping this nice
home for bugs around any longer.
This CL also changes funcline to return the file name as a result
instead of filling in a passed-in *string. (The *string signature is
left over from when the code was written in and called from C.)
That's arguably an unrelated change, except that once I had done
the ptrarg/scalararg/onM cleanup I started getting false positives
about the *string argument escaping (not allowed in package runtime).
The compiler is wrong, but the easiest fix is to write the code like
Go code instead of like C code. I am a bit worried that the compiler
is wrong because of some use of uninitialized memory in the escape
analysis. If that's the reason, it will go away when we convert the
compiler to Go. (And if not, we'll debug it the next time.)
LGTM=khr
R=r, khr
CC=austin, golang-codereviews, iant, rlh
https://golang.org/cl/174950043
2014-11-12 12:54:31 -07:00
|
|
|
systemstack(func() {
|
runtime: avoid gentraceback of self on user goroutine stack
Gentraceback may grow the stack.
One of the gentraceback wrappers may grow the stack.
One of the gentraceback callback calls may grow the stack.
Various stack pointers are stored in various stack locations
as type uintptr during the execution of these calls.
If the stack does grow, these stack pointers will not be
updated and will start trying to decode stack memory that
is no longer valid.
It may be possible to change the type of the stack pointer
variables to be unsafe.Pointer, but that's pretty subtle and
may still have problems, even if we catch every last one.
An easier, more obviously correct fix is to require that
gentraceback of the currently running goroutine must run
on the g0 stack, not on the goroutine's own stack.
Not doing this causes faults when you set
StackFromSystem = 1
StackFaultOnFree = 1
The new check in gentraceback will catch future lapses.
The more general problem is calling getcallersp but then
calling a function that might relocate the stack, which would
invalidate the result of getcallersp. Add note to stubs.go
declaration of getcallersp explaining the problem, and
check all existing calls to getcallersp. Most needed fixes.
This affects Callers, Stack, and nearly all the runtime
profiling routines. It does not affect stack copying directly
nor garbage collection.
LGTM=khr
R=khr, bradfitz
CC=golang-codereviews, r
https://golang.org/cl/167060043
2014-11-05 21:01:48 -07:00
|
|
|
g0 := getg()
|
|
|
|
g0.writebuf = buf[0:0:len(buf)]
|
|
|
|
goroutineheader(gp)
|
|
|
|
traceback(pc, sp, 0, gp)
|
|
|
|
if all {
|
|
|
|
tracebackothers(gp)
|
|
|
|
}
|
|
|
|
n = len(g0.writebuf)
|
|
|
|
g0.writebuf = nil
|
|
|
|
})
|
2014-08-26 00:34:46 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
if all {
|
2014-12-15 15:39:28 -07:00
|
|
|
gp := getg()
|
2015-01-30 13:30:41 -07:00
|
|
|
gp.m.preemptoff = ""
|
2014-08-26 00:34:46 -06:00
|
|
|
semrelease(&worldsema)
|
[dev.cc] runtime: delete scalararg, ptrarg; rename onM to systemstack
Scalararg and ptrarg are not "signal safe".
Go code filling them out can be interrupted by a signal,
and then the signal handler runs, and if it also ends up
in Go code that uses scalararg or ptrarg, now the old
values have been smashed.
For the pieces of code that do need to run in a signal handler,
we introduced onM_signalok, which is really just onM
except that the _signalok is meant to convey that the caller
asserts that scalarg and ptrarg will be restored to their old
values after the call (instead of the usual behavior, zeroing them).
Scalararg and ptrarg are also untyped and therefore error-prone.
Go code can always pass a closure instead of using scalararg
and ptrarg; they were only really necessary for C code.
And there's no more C code.
For all these reasons, delete scalararg and ptrarg, converting
the few remaining references to use closures.
Once those are gone, there is no need for a distinction between
onM and onM_signalok, so replace both with a single function
equivalent to the current onM_signalok (that is, it can be called
on any of the curg, g0, and gsignal stacks).
The name onM and the phrase 'm stack' are misnomers,
because on most system an M has two system stacks:
the main thread stack and the signal handling stack.
Correct the misnomer by naming the replacement function systemstack.
Fix a few references to "M stack" in code.
The main motivation for this change is to eliminate scalararg/ptrarg.
Rick and I have already seen them cause problems because
the calling sequence m.ptrarg[0] = p is a heap pointer assignment,
so it gets a write barrier. The write barrier also uses onM, so it has
all the same problems as if it were being invoked by a signal handler.
We worked around this by saving and restoring the old values
and by calling onM_signalok, but there's no point in keeping this nice
home for bugs around any longer.
This CL also changes funcline to return the file name as a result
instead of filling in a passed-in *string. (The *string signature is
left over from when the code was written in and called from C.)
That's arguably an unrelated change, except that once I had done
the ptrarg/scalararg/onM cleanup I started getting false positives
about the *string argument escaping (not allowed in package runtime).
The compiler is wrong, but the easiest fix is to write the code like
Go code instead of like C code. I am a bit worried that the compiler
is wrong because of some use of uninitialized memory in the escape
analysis. If that's the reason, it will go away when we convert the
compiler to Go. (And if not, we'll debug it the next time.)
LGTM=khr
R=r, khr
CC=austin, golang-codereviews, iant, rlh
https://golang.org/cl/174950043
2014-11-12 12:54:31 -07:00
|
|
|
systemstack(starttheworld)
|
2014-08-26 00:34:46 -06:00
|
|
|
}
|
|
|
|
return n
|
|
|
|
}
|
|
|
|
|
2014-08-31 22:06:26 -06:00
|
|
|
// Tracing of alloc/free/gc.
|
|
|
|
|
2014-09-01 16:51:12 -06:00
|
|
|
var tracelock mutex
|
2014-08-31 22:06:26 -06:00
|
|
|
|
2014-09-01 16:51:12 -06:00
|
|
|
func tracealloc(p unsafe.Pointer, size uintptr, typ *_type) {
|
2014-08-31 22:06:26 -06:00
|
|
|
lock(&tracelock)
|
2014-09-01 16:51:12 -06:00
|
|
|
gp := getg()
|
|
|
|
gp.m.traceback = 2
|
|
|
|
if typ == nil {
|
|
|
|
print("tracealloc(", p, ", ", hex(size), ")\n")
|
|
|
|
} else {
|
|
|
|
print("tracealloc(", p, ", ", hex(size), ", ", *typ._string, ")\n")
|
|
|
|
}
|
|
|
|
if gp.m.curg == nil || gp == gp.m.curg {
|
|
|
|
goroutineheader(gp)
|
runtime: avoid gentraceback of self on user goroutine stack
Gentraceback may grow the stack.
One of the gentraceback wrappers may grow the stack.
One of the gentraceback callback calls may grow the stack.
Various stack pointers are stored in various stack locations
as type uintptr during the execution of these calls.
If the stack does grow, these stack pointers will not be
updated and will start trying to decode stack memory that
is no longer valid.
It may be possible to change the type of the stack pointer
variables to be unsafe.Pointer, but that's pretty subtle and
may still have problems, even if we catch every last one.
An easier, more obviously correct fix is to require that
gentraceback of the currently running goroutine must run
on the g0 stack, not on the goroutine's own stack.
Not doing this causes faults when you set
StackFromSystem = 1
StackFaultOnFree = 1
The new check in gentraceback will catch future lapses.
The more general problem is calling getcallersp but then
calling a function that might relocate the stack, which would
invalidate the result of getcallersp. Add note to stubs.go
declaration of getcallersp explaining the problem, and
check all existing calls to getcallersp. Most needed fixes.
This affects Callers, Stack, and nearly all the runtime
profiling routines. It does not affect stack copying directly
nor garbage collection.
LGTM=khr
R=khr, bradfitz
CC=golang-codereviews, r
https://golang.org/cl/167060043
2014-11-05 21:01:48 -07:00
|
|
|
pc := getcallerpc(unsafe.Pointer(&p))
|
|
|
|
sp := getcallersp(unsafe.Pointer(&p))
|
[dev.cc] runtime: delete scalararg, ptrarg; rename onM to systemstack
Scalararg and ptrarg are not "signal safe".
Go code filling them out can be interrupted by a signal,
and then the signal handler runs, and if it also ends up
in Go code that uses scalararg or ptrarg, now the old
values have been smashed.
For the pieces of code that do need to run in a signal handler,
we introduced onM_signalok, which is really just onM
except that the _signalok is meant to convey that the caller
asserts that scalarg and ptrarg will be restored to their old
values after the call (instead of the usual behavior, zeroing them).
Scalararg and ptrarg are also untyped and therefore error-prone.
Go code can always pass a closure instead of using scalararg
and ptrarg; they were only really necessary for C code.
And there's no more C code.
For all these reasons, delete scalararg and ptrarg, converting
the few remaining references to use closures.
Once those are gone, there is no need for a distinction between
onM and onM_signalok, so replace both with a single function
equivalent to the current onM_signalok (that is, it can be called
on any of the curg, g0, and gsignal stacks).
The name onM and the phrase 'm stack' are misnomers,
because on most system an M has two system stacks:
the main thread stack and the signal handling stack.
Correct the misnomer by naming the replacement function systemstack.
Fix a few references to "M stack" in code.
The main motivation for this change is to eliminate scalararg/ptrarg.
Rick and I have already seen them cause problems because
the calling sequence m.ptrarg[0] = p is a heap pointer assignment,
so it gets a write barrier. The write barrier also uses onM, so it has
all the same problems as if it were being invoked by a signal handler.
We worked around this by saving and restoring the old values
and by calling onM_signalok, but there's no point in keeping this nice
home for bugs around any longer.
This CL also changes funcline to return the file name as a result
instead of filling in a passed-in *string. (The *string signature is
left over from when the code was written in and called from C.)
That's arguably an unrelated change, except that once I had done
the ptrarg/scalararg/onM cleanup I started getting false positives
about the *string argument escaping (not allowed in package runtime).
The compiler is wrong, but the easiest fix is to write the code like
Go code instead of like C code. I am a bit worried that the compiler
is wrong because of some use of uninitialized memory in the escape
analysis. If that's the reason, it will go away when we convert the
compiler to Go. (And if not, we'll debug it the next time.)
LGTM=khr
R=r, khr
CC=austin, golang-codereviews, iant, rlh
https://golang.org/cl/174950043
2014-11-12 12:54:31 -07:00
|
|
|
systemstack(func() {
|
runtime: avoid gentraceback of self on user goroutine stack
Gentraceback may grow the stack.
One of the gentraceback wrappers may grow the stack.
One of the gentraceback callback calls may grow the stack.
Various stack pointers are stored in various stack locations
as type uintptr during the execution of these calls.
If the stack does grow, these stack pointers will not be
updated and will start trying to decode stack memory that
is no longer valid.
It may be possible to change the type of the stack pointer
variables to be unsafe.Pointer, but that's pretty subtle and
may still have problems, even if we catch every last one.
An easier, more obviously correct fix is to require that
gentraceback of the currently running goroutine must run
on the g0 stack, not on the goroutine's own stack.
Not doing this causes faults when you set
StackFromSystem = 1
StackFaultOnFree = 1
The new check in gentraceback will catch future lapses.
The more general problem is calling getcallersp but then
calling a function that might relocate the stack, which would
invalidate the result of getcallersp. Add note to stubs.go
declaration of getcallersp explaining the problem, and
check all existing calls to getcallersp. Most needed fixes.
This affects Callers, Stack, and nearly all the runtime
profiling routines. It does not affect stack copying directly
nor garbage collection.
LGTM=khr
R=khr, bradfitz
CC=golang-codereviews, r
https://golang.org/cl/167060043
2014-11-05 21:01:48 -07:00
|
|
|
traceback(pc, sp, 0, gp)
|
|
|
|
})
|
2014-08-31 22:06:26 -06:00
|
|
|
} else {
|
2014-09-01 16:51:12 -06:00
|
|
|
goroutineheader(gp.m.curg)
|
|
|
|
traceback(^uintptr(0), ^uintptr(0), 0, gp.m.curg)
|
2014-08-21 00:07:42 -06:00
|
|
|
}
|
2014-09-01 16:51:12 -06:00
|
|
|
print("\n")
|
|
|
|
gp.m.traceback = 0
|
2014-08-31 22:06:26 -06:00
|
|
|
unlock(&tracelock)
|
|
|
|
}
|
|
|
|
|
2014-09-01 16:51:12 -06:00
|
|
|
func tracefree(p unsafe.Pointer, size uintptr) {
|
2014-08-31 22:06:26 -06:00
|
|
|
lock(&tracelock)
|
2014-09-01 16:51:12 -06:00
|
|
|
gp := getg()
|
|
|
|
gp.m.traceback = 2
|
|
|
|
print("tracefree(", p, ", ", hex(size), ")\n")
|
|
|
|
goroutineheader(gp)
|
runtime: avoid gentraceback of self on user goroutine stack
Gentraceback may grow the stack.
One of the gentraceback wrappers may grow the stack.
One of the gentraceback callback calls may grow the stack.
Various stack pointers are stored in various stack locations
as type uintptr during the execution of these calls.
If the stack does grow, these stack pointers will not be
updated and will start trying to decode stack memory that
is no longer valid.
It may be possible to change the type of the stack pointer
variables to be unsafe.Pointer, but that's pretty subtle and
may still have problems, even if we catch every last one.
An easier, more obviously correct fix is to require that
gentraceback of the currently running goroutine must run
on the g0 stack, not on the goroutine's own stack.
Not doing this causes faults when you set
StackFromSystem = 1
StackFaultOnFree = 1
The new check in gentraceback will catch future lapses.
The more general problem is calling getcallersp but then
calling a function that might relocate the stack, which would
invalidate the result of getcallersp. Add note to stubs.go
declaration of getcallersp explaining the problem, and
check all existing calls to getcallersp. Most needed fixes.
This affects Callers, Stack, and nearly all the runtime
profiling routines. It does not affect stack copying directly
nor garbage collection.
LGTM=khr
R=khr, bradfitz
CC=golang-codereviews, r
https://golang.org/cl/167060043
2014-11-05 21:01:48 -07:00
|
|
|
pc := getcallerpc(unsafe.Pointer(&p))
|
|
|
|
sp := getcallersp(unsafe.Pointer(&p))
|
[dev.cc] runtime: delete scalararg, ptrarg; rename onM to systemstack
Scalararg and ptrarg are not "signal safe".
Go code filling them out can be interrupted by a signal,
and then the signal handler runs, and if it also ends up
in Go code that uses scalararg or ptrarg, now the old
values have been smashed.
For the pieces of code that do need to run in a signal handler,
we introduced onM_signalok, which is really just onM
except that the _signalok is meant to convey that the caller
asserts that scalarg and ptrarg will be restored to their old
values after the call (instead of the usual behavior, zeroing them).
Scalararg and ptrarg are also untyped and therefore error-prone.
Go code can always pass a closure instead of using scalararg
and ptrarg; they were only really necessary for C code.
And there's no more C code.
For all these reasons, delete scalararg and ptrarg, converting
the few remaining references to use closures.
Once those are gone, there is no need for a distinction between
onM and onM_signalok, so replace both with a single function
equivalent to the current onM_signalok (that is, it can be called
on any of the curg, g0, and gsignal stacks).
The name onM and the phrase 'm stack' are misnomers,
because on most system an M has two system stacks:
the main thread stack and the signal handling stack.
Correct the misnomer by naming the replacement function systemstack.
Fix a few references to "M stack" in code.
The main motivation for this change is to eliminate scalararg/ptrarg.
Rick and I have already seen them cause problems because
the calling sequence m.ptrarg[0] = p is a heap pointer assignment,
so it gets a write barrier. The write barrier also uses onM, so it has
all the same problems as if it were being invoked by a signal handler.
We worked around this by saving and restoring the old values
and by calling onM_signalok, but there's no point in keeping this nice
home for bugs around any longer.
This CL also changes funcline to return the file name as a result
instead of filling in a passed-in *string. (The *string signature is
left over from when the code was written in and called from C.)
That's arguably an unrelated change, except that once I had done
the ptrarg/scalararg/onM cleanup I started getting false positives
about the *string argument escaping (not allowed in package runtime).
The compiler is wrong, but the easiest fix is to write the code like
Go code instead of like C code. I am a bit worried that the compiler
is wrong because of some use of uninitialized memory in the escape
analysis. If that's the reason, it will go away when we convert the
compiler to Go. (And if not, we'll debug it the next time.)
LGTM=khr
R=r, khr
CC=austin, golang-codereviews, iant, rlh
https://golang.org/cl/174950043
2014-11-12 12:54:31 -07:00
|
|
|
systemstack(func() {
|
runtime: avoid gentraceback of self on user goroutine stack
Gentraceback may grow the stack.
One of the gentraceback wrappers may grow the stack.
One of the gentraceback callback calls may grow the stack.
Various stack pointers are stored in various stack locations
as type uintptr during the execution of these calls.
If the stack does grow, these stack pointers will not be
updated and will start trying to decode stack memory that
is no longer valid.
It may be possible to change the type of the stack pointer
variables to be unsafe.Pointer, but that's pretty subtle and
may still have problems, even if we catch every last one.
An easier, more obviously correct fix is to require that
gentraceback of the currently running goroutine must run
on the g0 stack, not on the goroutine's own stack.
Not doing this causes faults when you set
StackFromSystem = 1
StackFaultOnFree = 1
The new check in gentraceback will catch future lapses.
The more general problem is calling getcallersp but then
calling a function that might relocate the stack, which would
invalidate the result of getcallersp. Add note to stubs.go
declaration of getcallersp explaining the problem, and
check all existing calls to getcallersp. Most needed fixes.
This affects Callers, Stack, and nearly all the runtime
profiling routines. It does not affect stack copying directly
nor garbage collection.
LGTM=khr
R=khr, bradfitz
CC=golang-codereviews, r
https://golang.org/cl/167060043
2014-11-05 21:01:48 -07:00
|
|
|
traceback(pc, sp, 0, gp)
|
|
|
|
})
|
2014-09-01 16:51:12 -06:00
|
|
|
print("\n")
|
|
|
|
gp.m.traceback = 0
|
2014-08-31 22:06:26 -06:00
|
|
|
unlock(&tracelock)
|
|
|
|
}
|
|
|
|
|
2014-09-01 16:51:12 -06:00
|
|
|
func tracegc() {
|
2014-08-31 22:06:26 -06:00
|
|
|
lock(&tracelock)
|
2014-09-01 16:51:12 -06:00
|
|
|
gp := getg()
|
|
|
|
gp.m.traceback = 2
|
|
|
|
print("tracegc()\n")
|
|
|
|
// running on m->g0 stack; show all non-g0 goroutines
|
|
|
|
tracebackothers(gp)
|
|
|
|
print("end tracegc\n")
|
|
|
|
print("\n")
|
|
|
|
gp.m.traceback = 0
|
2014-08-31 22:06:26 -06:00
|
|
|
unlock(&tracelock)
|
2014-08-21 00:07:42 -06:00
|
|
|
}
|