-
Notifications
You must be signed in to change notification settings - Fork 10.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Revert "[scudo] Use getMonotonicTimeFast for tryLock." #86590
Conversation
This reverts commit 36ca9a2. We were using the `time` as the seed while choosing a new TSD. To make the access of TSDs evenly distributed, we require a higher precision in `time`. Otherwise, many threads may result in having the same random access pattern on TSDs because they share the same `time` in certain period. On Linux, CLOCK_MONOTONIC_COARSE usually adopts 4 ms precision. This is way higher than the average accessing time of TSD (which is usually less than 1 us). As a result, when multiple threads try to select a new TSD in a 4 ms interval, they share the same `time` seed and end up choosing and congesting on the same TSD.
@llvm/pr-subscribers-compiler-rt-sanitizer Author: None (ChiaHungDuan) ChangesThis reverts commit 36ca9a2. We were using the Full diff: https://github.com/llvm/llvm-project/pull/86590.diff 1 Files Affected:
diff --git a/compiler-rt/lib/scudo/standalone/tsd.h b/compiler-rt/lib/scudo/standalone/tsd.h
index b2108a01900bcc..72773f2f72b116 100644
--- a/compiler-rt/lib/scudo/standalone/tsd.h
+++ b/compiler-rt/lib/scudo/standalone/tsd.h
@@ -41,9 +41,9 @@ template <class Allocator> struct alignas(SCUDO_CACHE_LINE_SIZE) TSD {
return true;
}
if (atomic_load_relaxed(&Precedence) == 0)
- atomic_store_relaxed(&Precedence,
- static_cast<uptr>(getMonotonicTimeFast() >>
- FIRST_32_SECOND_64(16, 0)));
+ atomic_store_relaxed(
+ &Precedence,
+ static_cast<uptr>(getMonotonicTime() >> FIRST_32_SECOND_64(16, 0)));
return false;
}
inline void lock() NO_THREAD_SAFETY_ANALYSIS {
|
✅ With the latest revision this PR passed the Python code formatter. |
✅ With the latest revision this PR passed the C/C++ code formatter. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We could also continue to use this function if we did a right shift to get better resolution.
However, I'm not sure that using a random seed here make a lot of sense. It almost might be better to just use a round-robin especially when there are only two TSDs.
But that requires more experimentation.
In this case, for example, |
Yeah, I'm not sure what the original intent of making this random was. I don't think it makes anything more secure doing this, especially if there are only two TSDs. The more TSDs there are, then doing something more random is probably a better strategy, so whatever we do might need to incorporate the number of TSDs. |
Agree, let's do it in a follow up CL |
This reverts commit 36ca9a2.
We were using the
time
as the seed while choosing a new TSD. To make the access of TSDs evenly distributed, we require a higher precision intime
. Otherwise, many threads may result in having the same random access pattern on TSDs because they share the sametime
in certain period. On Linux, CLOCK_MONOTONIC_COARSE usually adopts 4 ms precision. This is way higher than the average accessing time of TSD (which is usually less than 1 us). As a result, when multiple threads try to select a new TSD in a 4 ms interval, they share the sametime
seed and end up choosing and congesting on the same TSD.