summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorAaron Patterson <tenderlove@ruby-lang.org>2021-10-26 16:57:30 -0700
committerAaron Patterson <aaron.patterson@gmail.com>2021-12-01 12:45:59 -0800
commit157095b3a44d8b0130a532a0b7be3f5ac197111c (patch)
tree362d1b19c520ebf270b92921671dc5b312b2307c
parent94ee88b38cf0a20666e3965f5c9c4d520cf02b22 (diff)
Mark JIT code as writeable / executable depending on the situation
Some platforms don't want memory to be marked as writeable and executable at the same time. When we write to the code block, we calculate the OS page that the buffer position maps to. Then we call `mprotect` to allow writes on that particular page. As an optimization, we cache the "last written" aligned page which allows us to amortize the cost of the `mprotect` call. In other words, sequential writes to the same page will only call `mprotect` on the page once. When we're done writing, we call `mprotect` on the entire JIT buffer. This means we don't need to keep track of which pages were marked as writeable, we let the OS take care of that. Co-authored-by: John Hawthorn <john@hawthorn.email>
Notes
Notes: Merged: https://github.com/ruby/ruby/pull/5032
-rw-r--r--misc/yjit_asm_tests.c2
-rw-r--r--yjit_asm.c48
-rw-r--r--yjit_asm.h9
-rw-r--r--yjit_codegen.c3
-rw-r--r--yjit_core.c13
-rw-r--r--yjit_iface.c11
6 files changed, 81 insertions, 5 deletions
diff --git a/misc/yjit_asm_tests.c b/misc/yjit_asm_tests.c
index 5548af07f5..b37d483ecf 100644
--- a/misc/yjit_asm_tests.c
+++ b/misc/yjit_asm_tests.c
@@ -401,7 +401,7 @@ void run_runtime_tests(void)
int (*function)(void);
function = (int (*)(void))mem_block;
- #define TEST(BODY) cb_set_pos(cb, 0); BODY ret(cb); assert_equal(7, function());
+ #define TEST(BODY) cb_set_pos(cb, 0); BODY ret(cb); cb_mark_all_executable(cb); assert_equal(7, function());
// add
TEST({ mov(cb, RAX, imm_opnd(0)); add(cb, RAX, imm_opnd(7)); })
diff --git a/yjit_asm.c b/yjit_asm.c
index 2ae50295a9..d093b2edde 100644
--- a/yjit_asm.c
+++ b/yjit_asm.c
@@ -163,7 +163,7 @@ static uint8_t *alloc_exec_mem(uint32_t mem_size)
mem_block = (uint8_t*)mmap(
(void*)req_addr,
mem_size,
- PROT_READ | PROT_WRITE | PROT_EXEC,
+ PROT_READ | PROT_EXEC,
MAP_PRIVATE | MAP_ANONYMOUS | MAP_FIXED_NOREPLACE,
-1,
0
@@ -184,7 +184,7 @@ static uint8_t *alloc_exec_mem(uint32_t mem_size)
mem_block = (uint8_t*)mmap(
(void*)alloc_exec_mem,
mem_size,
- PROT_READ | PROT_WRITE | PROT_EXEC,
+ PROT_READ | PROT_EXEC,
MAP_PRIVATE | MAP_ANONYMOUS,
-1,
0
@@ -197,7 +197,7 @@ static uint8_t *alloc_exec_mem(uint32_t mem_size)
mem_block = (uint8_t*)mmap(
NULL,
mem_size,
- PROT_READ | PROT_WRITE | PROT_EXEC,
+ PROT_READ | PROT_EXEC,
MAP_PRIVATE | MAP_ANONYMOUS,
-1,
0
@@ -210,9 +210,17 @@ static uint8_t *alloc_exec_mem(uint32_t mem_size)
exit(-1);
}
+ codeblock_t block;
+ block.current_aligned_write_pos = ALIGNED_WRITE_POSITION_NONE;
+ block.mem_block = mem_block;
+ block.mem_size = mem_size;
+
+ codeblock_t * cb = &block;
// Fill the executable memory with INT3 (0xCC) so that
// executing uninitialized memory will fault
+ cb_mark_all_writeable(cb);
memset(mem_block, 0xCC, mem_size);
+ cb_mark_all_executable(cb);
return mem_block;
#else
@@ -230,6 +238,7 @@ void cb_init(codeblock_t *cb, uint8_t *mem_block, uint32_t mem_size)
cb->write_pos = 0;
cb->num_labels = 0;
cb->num_refs = 0;
+ cb->current_aligned_write_pos = ALIGNED_WRITE_POSITION_NONE;
}
// Align the current write position to a multiple of bytes
@@ -277,6 +286,7 @@ void cb_write_byte(codeblock_t *cb, uint8_t byte)
{
assert (cb->mem_block);
assert (cb->write_pos + 1 <= cb->mem_size);
+ cb_mark_position_writeable(cb, cb->write_pos);
cb->mem_block[cb->write_pos++] = byte;
}
@@ -1771,3 +1781,35 @@ void cb_write_lock_prefix(codeblock_t *cb)
{
cb_write_byte(cb, 0xF0);
}
+
+void cb_mark_all_writeable(codeblock_t * cb)
+{
+ if (mprotect(cb->mem_block, cb->mem_size, PROT_READ | PROT_WRITE)) {
+ fprintf(stderr, "Couldn't make JIT page (%p) writeable, errno: %s", (void *)cb->mem_block, strerror(errno));
+ abort();
+ }
+}
+
+void cb_mark_position_writeable(codeblock_t * cb, uint32_t write_pos)
+{
+ uint32_t pagesize = (uint32_t)sysconf(_SC_PAGESIZE);
+ uint32_t aligned_position = (write_pos / pagesize) * pagesize;
+
+ if (cb->current_aligned_write_pos != aligned_position) {
+ cb->current_aligned_write_pos = aligned_position;
+ if (mprotect(cb->mem_block + aligned_position, pagesize, PROT_READ | PROT_WRITE)) {
+ fprintf(stderr, "Couldn't make JIT page (%p) writeable, errno: %s", (void *)(cb->mem_block + aligned_position), strerror(errno));
+ abort();
+ }
+ }
+}
+
+void cb_mark_all_executable(codeblock_t * cb)
+{
+ cb->current_aligned_write_pos = ALIGNED_WRITE_POSITION_NONE;
+ if (mprotect(cb->mem_block, cb->mem_size, PROT_READ | PROT_EXEC)) {
+ fprintf(stderr, "Couldn't make JIT page (%p) executable, errno: %s", (void *)cb->mem_block, strerror(errno));
+ abort();
+ }
+}
+
diff --git a/yjit_asm.h b/yjit_asm.h
index b1b2baae2e..ad032d0139 100644
--- a/yjit_asm.h
+++ b/yjit_asm.h
@@ -55,8 +55,14 @@ typedef struct CodeBlock
// Flag to enable or disable comments
bool has_asm;
+ // Keep track of the current aligned write position.
+ // Used for changing protection when writing to the JIT buffer
+ uint32_t current_aligned_write_pos;
} codeblock_t;
+// 1 is not aligned so this won't match any pages
+#define ALIGNED_WRITE_POSITION_NONE 1
+
enum OpndType
{
OPND_NONE,
@@ -261,6 +267,9 @@ static inline uint32_t cb_new_label(codeblock_t *cb, const char *name);
static inline void cb_write_label(codeblock_t *cb, uint32_t label_idx);
static inline void cb_label_ref(codeblock_t *cb, uint32_t label_idx);
static inline void cb_link_labels(codeblock_t *cb);
+static inline void cb_mark_all_writeable(codeblock_t *cb);
+static inline void cb_mark_position_writeable(codeblock_t *cb, uint32_t write_pos);
+static inline void cb_mark_all_executable(codeblock_t *cb);
// Encode individual instructions into a code block
static inline void add(codeblock_t *cb, x86opnd_t opnd0, x86opnd_t opnd1);
diff --git a/yjit_codegen.c b/yjit_codegen.c
index 7b44874af8..96f895b934 100644
--- a/yjit_codegen.c
+++ b/yjit_codegen.c
@@ -4876,6 +4876,8 @@ rb_yjit_tracing_invalidate_all(void)
RUBY_ASSERT_ALWAYS(yjit_codepage_frozen_bytes <= old_pos && "frozen bytes should increase monotonically");
yjit_codepage_frozen_bytes = old_pos;
+ cb_mark_all_executable(ocb);
+ cb_mark_all_executable(cb);
RB_VM_LOCK_LEAVE();
}
@@ -4957,6 +4959,7 @@ yjit_init_codegen(void)
// Generate full exit code for C func
gen_full_cfunc_return();
+ cb_mark_all_executable(cb);
// Map YARV opcodes to the corresponding codegen functions
yjit_reg_op(BIN(nop), gen_nop);
diff --git a/yjit_core.c b/yjit_core.c
index f19b83c5ff..00905e7f24 100644
--- a/yjit_core.c
+++ b/yjit_core.c
@@ -833,12 +833,16 @@ gen_entry_point(const rb_iseq_t *iseq, uint32_t insn_idx, rb_execution_context_t
// The entry context makes no assumptions about types
blockid_t blockid = { iseq, insn_idx };
+ rb_vm_barrier();
// Write the interpreter entry prologue. Might be NULL when out of memory.
uint8_t *code_ptr = yjit_entry_prologue(cb, iseq);
// Try to generate code for the entry block
block_t *block = gen_block_version(blockid, &DEFAULT_CTX, ec);
+ cb_mark_all_executable(ocb);
+ cb_mark_all_executable(cb);
+
// If we couldn't generate any code
if (!block || block->end_idx == insn_idx) {
return NULL;
@@ -872,6 +876,8 @@ branch_stub_hit(branch_t *branch, const uint32_t target_idx, rb_execution_contex
dst_addr = branch->dst_addrs[target_idx];
}
else {
+ rb_vm_barrier();
+
// :stub-sp-flush:
// Generated code do stack operations without modifying cfp->sp, while the
// cfp->sp tells the GC what values on the stack to root. Generated code
@@ -952,6 +958,9 @@ branch_stub_hit(branch_t *branch, const uint32_t target_idx, rb_execution_contex
// frame. We do that in code_for_exit_from_stub.
dst_addr = code_for_exit_from_stub;
}
+
+ cb_mark_all_executable(ocb);
+ cb_mark_all_executable(cb);
}
const ptrdiff_t new_branch_size = branch_code_size(branch);
@@ -1201,6 +1210,7 @@ static void
invalidate_block_version(block_t *block)
{
ASSERT_vm_locking();
+
// TODO: want to assert that all other ractors are stopped here. Can't patch
// machine code that some other thread is running.
@@ -1324,6 +1334,9 @@ invalidate_block_version(block_t *block)
yjit_runtime_counters.invalidation_count++;
#endif
+ cb_mark_all_executable(ocb);
+ cb_mark_all_executable(cb);
+
// fprintf(stderr, "invalidation done\n");
}
diff --git a/yjit_iface.c b/yjit_iface.c
index 8605a4162e..39967a89a9 100644
--- a/yjit_iface.c
+++ b/yjit_iface.c
@@ -478,7 +478,7 @@ rb_yjit_compile_iseq(const rb_iseq_t *iseq, rb_execution_context_t *ec)
#if (OPT_DIRECT_THREADED_CODE || OPT_CALL_THREADED_CODE) && JIT_ENABLED
bool success = true;
RB_VM_LOCK_ENTER();
- // TODO: I think we need to stop all other ractors here
+ rb_vm_barrier();
// Compile a block version starting at the first instruction
uint8_t *code_ptr = gen_entry_point(iseq, 0, ec);
@@ -914,6 +914,8 @@ rb_yjit_iseq_mark(const struct rb_iseq_constant_body *body)
void
rb_yjit_iseq_update_references(const struct rb_iseq_constant_body *body)
{
+ rb_vm_barrier();
+
rb_darray_for(body->yjit_blocks, version_array_idx) {
rb_yjit_block_array_t version_array = rb_darray_get(body->yjit_blocks, version_array_idx);
@@ -947,6 +949,11 @@ rb_yjit_iseq_update_references(const struct rb_iseq_constant_body *body)
VALUE possibly_moved = rb_gc_location(object);
// Only write when the VALUE moves, to be CoW friendly.
if (possibly_moved != object) {
+ // Possibly unlock the page we need to update
+ cb_mark_position_writeable(cb, offset_to_value);
+
+ // Object could cross a page boundary, so unlock there as well
+ cb_mark_position_writeable(cb, offset_to_value + SIZEOF_VALUE - 1);
memcpy(value_address, &possibly_moved, SIZEOF_VALUE);
}
}
@@ -955,6 +962,8 @@ rb_yjit_iseq_update_references(const struct rb_iseq_constant_body *body)
//block->code_page = rb_gc_location(block->code_page);
}
}
+ cb_mark_all_executable(cb);
+ cb_mark_all_executable(ocb);
}
// Free the yjit resources associated with an iseq