1. 27 Jan, 2015 3 commits
    • Dmitry Vyukov's avatar
      runtime: fix wbshadow mode · d9419218
      Dmitry Vyukov authored
      Half of tests currently crash with GODEBUG=wbshadow.
      _PageSize is set to 8192. So data can be extended outside
      of actually mapped region during rounding. Which leads to crash
      during initial copying to shadow.
      Use _PhysPageSize instead.
      
      Change-Id: Iaa89992bd57f86dafa16b092b53fdc0606213acb
      Reviewed-on: https://go-review.googlesource.com/3286Reviewed-by: 's avatarRuss Cox <rsc@golang.org>
      d9419218
    • Dmitry Vyukov's avatar
      runtime: do not scan maps when k/v do not contain pointers · 85e7bee1
      Dmitry Vyukov authored
      Currently we scan maps even if k/v does not contain pointers.
      This is required because overflow buckets are hanging off the main table.
      This change introduces a separate array that contains pointers to all
      overflow buckets and keeps them alive. Buckets themselves are marked
      as containing no pointers and are not scanned by GC (if k/v does not
      contain pointers).
      
      This brings maps in line with slices and chans -- GC does not scan
      their contents if elements do not contain pointers.
      
      Currently scanning of a map[int]int with 2e8 entries (~8GB heap)
      takes ~8 seconds. With this change scanning takes negligible time.
      
      Update #9477.
      
      Change-Id: Id8a04066a53d2f743474cad406afb9f30f00eaae
      Reviewed-on: https://go-review.googlesource.com/3288Reviewed-by: 's avatarKeith Randall <khr@golang.org>
      85e7bee1
    • Dmitry Vyukov's avatar
      runtime: fix crash during heapdump · 561ce92f
      Dmitry Vyukov authored
      runtime/debug test crashes with GOMAXPROCS>1:
      
      fatal error: unexpected signal during runtime execution
      [signal 0xb code=0x1 addr=0x0 pc=0x80521b8]
      runtime stack:
      runtime.throw(0x8195028, 0x2a)
      	src/runtime/panic.go:508 +0x71 fp=0x18427f24 sp=0x18427f18
      runtime.sigpanic()
      	src/runtime/sigpanic_unix.go:12 +0x53 fp=0x18427f4c sp=0x18427f24
      runtime.finq_callback(0x0, 0x0, 0x0, 0x8129140, 0x0)
      	src/runtime/heapdump.go:410 +0x58 fp=0x18427f58 sp=0x18427f4c
      runtime.iterate_finq(0x81a6860)
      	src/runtime/mfinal.go:89 +0x73 fp=0x18427f78 sp=0x18427f58
      runtime.dumproots()
      	src/runtime/heapdump.go:448 +0x17a fp=0x18427fa4 sp=0x18427f78
      runtime.mdump()
      	src/runtime/heapdump.go:652 +0xbc fp=0x18427fb4 sp=0x18427fa4
      runtime.writeheapdump_m(0x3)
      
      This happens because runfinq goroutine nils some elements in allfin after
      execution of finalizers:
      
      	// drop finalizer queue references to finalized object
      	f.fn = nil
      	f.arg = nil
      	f.ot = nil
      
      Then heapdump crashes trying to dereference fn.fn here:
      
      func finq_callback(fn *funcval, obj unsafe.Pointer, nret uintptr, fint *_type, ot *ptrtype) {
      	dumpint(tagQueuedFinalizer)
      	dumpint(uint64(uintptr(obj)))
      	dumpint(uint64(uintptr(unsafe.Pointer(fn))))
      	dumpint(uint64(uintptr(unsafe.Pointer(fn.fn))))
      	dumpint(uint64(uintptr(unsafe.Pointer(fint))))
      	dumpint(uint64(uintptr(unsafe.Pointer(ot))))
      }
      
      Change-Id: I372433c964180d782967be63d4355e568666980d
      Reviewed-on: https://go-review.googlesource.com/3287Reviewed-by: 's avatarKeith Randall <khr@golang.org>
      561ce92f
  2. 26 Jan, 2015 10 commits
  3. 25 Jan, 2015 1 commit
  4. 24 Jan, 2015 3 commits
    • INADA Naoki's avatar
      database/sql: reduce lock contention in Stmt.connStmt · 1b61a978
      INADA Naoki authored
      Previouslly, Stmt.connStmt calls DB.connIfFree on each Stmt.css.
      Since Stmt.connStmt locks Stmt.mu, a concurrent use of Stmt causes lock
      contention on Stmt.mu.
      Additionally, DB.connIfFree locks DB.mu which is shared by DB.addDep and
      DB.removeDep.
      
      This change removes DB.connIfFree and makes use of a first unused
      connection in idle connection pool to reduce lock contention
      without making it complicated.
      
      Fixes #9484
      
      On EC2 c3.8xlarge (E5-2680 v2 @ 2.80GHz * 32 vCPU):
      
      benchmark                           old ns/op     new ns/op     delta
      BenchmarkManyConcurrentQuery-8      40249         34721         -13.73%
      BenchmarkManyConcurrentQuery-16     45610         40176         -11.91%
      BenchmarkManyConcurrentQuery-32     109831        43179         -60.69%
      
      benchmark                           old allocs     new allocs     delta
      BenchmarkManyConcurrentQuery-8      25             25             +0.00%
      BenchmarkManyConcurrentQuery-16     25             25             +0.00%
      BenchmarkManyConcurrentQuery-32     25             25             +0.00%
      
      benchmark                           old bytes     new bytes     delta
      BenchmarkManyConcurrentQuery-8      3980          3969          -0.28%
      BenchmarkManyConcurrentQuery-16     3980          3982          +0.05%
      BenchmarkManyConcurrentQuery-32     3993          3990          -0.08%
      
      Change-Id: Ic96296922c465bac38a260018c58324dae1531d9
      Reviewed-on: https://go-review.googlesource.com/2207Reviewed-by: 's avatarMikio Hara <mikioh.mikioh@gmail.com>
      1b61a978
    • Robert Griesemer's avatar
      math/big: disable some tests on 32bit platforms (fix build) · 3acb9fd9
      Robert Griesemer authored
      TBR: adonovan
      
      Change-Id: I59757b5b46a2c533fc5f888423c99d550d3c7648
      Reviewed-on: https://go-review.googlesource.com/3264Reviewed-by: 's avatarRobert Griesemer <gri@golang.org>
      3acb9fd9
    • Robert Griesemer's avatar
      math/big: multi-precision Floats (starting point) · bd275b23
      Robert Griesemer authored
      Implemented:
      - +, -, *, /, and some unary ops
      - all rounding modes
      - basic conversions
      - string to float conversion
      - tests
      
      Missing:
      - float to string conversion, formatting
      - handling of +/-0 and +/-inf (under- and overflow)
      - various TODOs and cleanups
      
      With precision set to 24 or 53, the results match
      float32 or float64 operations exactly (excluding
      NaNs and denormalized numbers which will not be
      supported).
      
      Change-Id: I3121e90fc4b1528e40bb6ff526008da18b3c6520
      Reviewed-on: https://go-review.googlesource.com/1218Reviewed-by: 's avatarAlan Donovan <adonovan@google.com>
      bd275b23
  5. 23 Jan, 2015 5 commits
  6. 22 Jan, 2015 4 commits
  7. 21 Jan, 2015 12 commits
  8. 20 Jan, 2015 2 commits
    • Paul van Brouwershaven's avatar
      crypto/x509: Authority Key Identifier must be included in all CRLs issued · 4e7f0651
      Paul van Brouwershaven authored
      According to RFC5280 the authority key identifier extension MUST included in all
      CRLs issued. This patch includes the authority key identifier extension when the
      Subject Key Identifier is present in the signing certificate.
      
      RFC5280 states:
      
      "The authority key identifier extension provides a means of identifying the
      public key corresponding to the private key used to sign a CRL.  The
      identification can be based on either the key identifier (the subject key
      identifier in the CRL signer's certificate) or the issuer name and serial
      number.  This extension is especially useful where an issuer has more than one
      signing key, either due to multiple concurrent key pairs or due to changeover."
      
      Conforming CRL issuers MUST use the key identifier method, and MUST include this
      extension in all CRLs issued."
      
      This CL has been discussed at: http://golang.org/cl/177760043
      
      Change-Id: I9bf50521908bfe777ea2398f154c13e8c90d14ad
      Reviewed-on: https://go-review.googlesource.com/2258Reviewed-by: 's avatarAdam Langley <agl@golang.org>
      4e7f0651
    • Paul van Brouwershaven's avatar
      crypto/x509: implement crypto.Signer · cef15faa
      Paul van Brouwershaven authored
      Signer is an interface to support opaque private keys.
      These keys typically result from being kept in special hardware
      (i.e. a TPM) although sometimes operating systems provide a
      similar interface using process isolation for security rather
      than hardware boundaries.
      
      This changes provides updates implements crypto.Signer in
      CreateCRL and CreateCertificate so that they can be used with
      opaque keys.
      
      This CL has been discussed at: http://golang.org/cl/145910043
      
      Change-Id: Ie4a4a583fb120ff484a5ccf267ecd2a9c5a3902b
      Reviewed-on: https://go-review.googlesource.com/2254Reviewed-by: 's avatarAdam Langley <agl@golang.org>
      cef15faa