Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

deps: switch to chromium's zlib implementation #31201

Merged
merged 1 commit into from Jan 27, 2020
Merged

Conversation

mscdex
Copy link
Contributor

@mscdex mscdex commented Jan 6, 2020

This implementation provides optimizations not included upstream.

Benchmark results:

                                                                         confidence improvement accuracy (*)    (**)   (***)
 zlib/createInflate.js n=100 chunkLen=1024 inputLen=16777216                   ***    328.08 %       ±9.21% ±12.28% ±16.05%
 zlib/deflate.js n=400000 inputLen=1024 method='createDeflate'                 ***     18.85 %       ±1.01%  ±1.35%  ±1.75%
 zlib/deflate.js n=400000 inputLen=1024 method='deflate'                         *      1.14 %       ±1.13%  ±1.51%  ±1.96%
 zlib/deflate.js n=400000 inputLen=1024 method='deflateSync'                     *      0.55 %       ±0.50%  ±0.66%  ±0.86%
 zlib/inflate.js n=400000 inputLen=1024 method='inflate'                       ***      6.05 %       ±1.33%  ±1.78%  ±2.34%
 zlib/inflate.js n=400000 inputLen=1024 method='inflateSync'                   ***     17.64 %       ±1.07%  ±1.43%  ±1.86%
 zlib/pipe.js algorithm='gzip' type='buffer' duration=5 inputLen=1024          ***     17.52 %       ±0.96%  ±1.28%  ±1.67%
 zlib/pipe.js algorithm='gzip' type='string' duration=5 inputLen=1024          ***     16.19 %       ±1.02%  ±1.36%  ±1.78%
Checklist
  • make -j4 test (UNIX), or vcbuild test (Windows) passes
  • tests and/or benchmarks are included
  • commit message follows commit guidelines

@mscdex mscdex added zlib Issues and PRs related to the zlib subsystem. performance Issues and PRs related to the performance of Node.js. labels Jan 6, 2020
@nodejs-github-bot
Copy link
Collaborator

@nodejs-github-bot
Copy link
Collaborator

@mscdex mscdex added the wip Issues and PRs that are still a work in progress. label Jan 6, 2020
@devsnek
Copy link
Member

devsnek commented Jan 6, 2020

Do we know why they aren't included upstream? If it's because of compatibility or something like that we'd need to be careful.

@devsnek
Copy link
Member

devsnek commented Jan 6, 2020

madler/zlib#346 seems related

@nodejs-github-bot
Copy link
Collaborator

@mscdex
Copy link
Contributor Author

mscdex commented Jan 6, 2020

Not sure what is up with the Windows failures. I'm not even able to successfully install the 2017 or 2019 build tools or community edition to duplicate the problem myself and the CI logs show no output.

@mscdex
Copy link
Contributor Author

mscdex commented Jan 6, 2020

/cc @nodejs/build ?

@sam-github
Copy link
Contributor

https://ci.nodejs.org/job/node-compile-windows/31073/nodes=win-vs2019/console

worrisome or not? I don't know.

21:14:10 > git push binary_tmp@169.60.150.88:binary_tmp.git :jenkins-node-test-commit-windows-fanned-6e9f471ac49c9f102c51858e3d03313e8b8e10f6-bin-win-vs2019 
21:14:11 Warning: Permanently added '169.60.150.88' (ECDSA) to the list of known hosts.
21:14:12 error: unable to delete 'jenkins-node-test-commit-windows-fanned-6e9f471ac49c9f102c51858e3d03313e8b8e10f6-bin-win-vs2019': remote ref does not exist
21:14:12 error: failed to push some refs to 'binary_tmp@169.60.150.88:binary_tmp.git'

build continued, failed at

21:14:16 creating config.gypi
21:14:16 creating config.status
21:14:16 creating config.mk
21:14:16 running: 
21:14:16     python tools/gyp_node.py --no-parallel -Dconfiguring_node=1 -f msvs -G msvs_version=auto
21:14:16 Error running GYP
21:14:16 gyp: name 'llvm_version' is not defined while evaluating condition 'OS!="win" or llvm_version!="0.0"' in deps\zlib\zlib.gyp while loading dependencies of node.gyp while trying to load node.gyp
21:14:16 
21:14:16 > if errorlevel 1 goto create-msvs-files-failed 
21:14:16 
21:14:16 > echo Failed to create vc project files. 
21:14:16 Failed to create vc project files.

possibly related to #30954 ?

@sam-github
Copy link
Contributor

Is it possible chromium only builds with llvm on Windows, so the .gyp file you pulled in doesn't work for node?

@richardlau
Copy link
Member

Is it possible chromium only builds with llvm on Windows, so the .gyp file you pulled in doesn't work for node?

Chromium doesn't use gyp any more -- the gyp file is all ours. configure doesn't currently set llvm_version for Windows at all:

node/configure.py

Lines 783 to 809 in 20fd123

def check_compiler(o):
if sys.platform == 'win32':
if not options.openssl_no_asm and options.dest_cpu in ('x86', 'x64'):
nasm_version = get_nasm_version('nasm')
o['variables']['nasm_version'] = nasm_version
if nasm_version == '0.0':
o['variables']['openssl_no_asm'] = 1
return
ok, is_clang, clang_version, gcc_version = try_check_compiler(CXX, 'c++')
if not ok:
warn('failed to autodetect C++ compiler version (CXX=%s)' % CXX)
elif clang_version < (8, 0, 0) if is_clang else gcc_version < (6, 3, 0):
warn('C++ compiler (CXX=%s, %s) too old, need g++ 6.3.0 or clang++ 8.0.0' %
(CXX, ".".join(map(str, clang_version if is_clang else gcc_version))))
ok, is_clang, clang_version, gcc_version = try_check_compiler(CC, 'c')
if not ok:
warn('failed to autodetect C compiler version (CC=%s)' % CC)
elif not is_clang and gcc_version < (4, 2, 0):
# clang 3.2 is a little white lie because any clang version will probably
# do for the C bits. However, we might as well encourage people to upgrade
# to a version that is not completely ancient.
warn('C compiler (CC=%s, %s) too old, need gcc 4.2 or clang 3.2' %
(CC, ".".join(map(str, gcc_version))))
o['variables']['llvm_version'] = get_llvm_version(CC) if is_clang else '0.0'

All current references in our gyp files to llvm_version are inside other condition blocks that have already excluded Windows.

@nodejs-github-bot
Copy link
Collaborator

@MylesBorins
Copy link
Member

Do we expose the bindings for zlib? What guarantees do we have for ABI compatibility between V8 versions? What about security releases? Not blocking, just want to ensure that coupling these dependencies won't put us in a weird place.

@richardlau
Copy link
Member

Do we expose the bindings for zlib?

Yes, we do. From https://nodejs.org/dist/latest-v13.x/docs/api/addons.html#addons_c_addons:

  • Node.js includes other statically linked libraries including OpenSSL. These other libraries are located in the deps/ directory in the Node.js source tree. Only the libuv, OpenSSL, V8 and zlib symbols are purposefully re-exported by Node.js and may be used to various extents by Addons.

@MylesBorins
Copy link
Member

Since we expose the bindings I would love to see some historical data about how much V8 has updated zlib and what ABI assurances we have. It might even make sense to duplicate the zlib and periodically update it ourselves, but that might be overkill

@nodejs-github-bot
Copy link
Collaborator

@mscdex mscdex removed the wip Issues and PRs that are still a work in progress. label Jan 6, 2020
@mscdex
Copy link
Contributor Author

mscdex commented Jan 7, 2020

Everything is passing now. AFAIK there should be no ABI issues. Do we have something in CI to check this sort of thing?

/* This include does prefixing as below, but with an updated set of names. Also
* sets up export macros in component builds. */
//#include "chromeconf.h"
//#endif
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Any particular reason this is commented out instead of #defineing CHROMIUM_ZLIB_NO_CHROMECONF in zlib.gyp?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

IIRC there were issues with zlib addon or similar tests.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The define would have to end up in common.gypi, I think.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I can do that if that's more desirable.

@addaleax
Copy link
Member

addaleax commented Jan 8, 2020

Yeah, this looks good API/ABI-wise

@mmarchini
Copy link
Contributor

mmarchini commented Jan 8, 2020

I would love to see some historical data about how much V8 has updated zlib

This seems relevant: https://cs.chromium.org/chromium/src/third_party/zlib/patches/README?g=0

If this information is updated, there are only three patches applied on top of upstream zlib, one of them being purely build infrastructure changes. The relevant changes would be in https://cs.chromium.org/chromium/src/third_party/zlib/patches/0001-simd.patch?g=0, which are (probably) the same changes available in the zlib provided by Intel (https://software.intel.com/en-us/articles/how-to-use-zlib-with-intel-ipp-optimization). The last patch is one line change which shouldn't affect API/ABI.

Edit: looking at Chromium git history, the patches listed above are outdated. There's also ARM optimizations, among other changes.


FWIW, other companies also have their zlib forks with optimizations which are not merged upstream:

Intel: https://github.com/jtkukunas/zlib
Cloudflare: https://github.com/cloudflare/zlib

@nodejs-github-bot
Copy link
Collaborator

Copy link
Member

@BridgeAR BridgeAR left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The benchmarks are LG to me % var

benchmark/zlib/createInflate.js Outdated Show resolved Hide resolved
benchmark/zlib/inflate.js Outdated Show resolved Hide resolved
benchmark/zlib/inflate.js Outdated Show resolved Hide resolved
benchmark/zlib/inflate.js Outdated Show resolved Hide resolved
@nodejs-github-bot
Copy link
Collaborator

@richardlau
Copy link
Member

For @nodejs/releasers this has broken builds from the source tarball and would need to land on, e.g. 12.x, with whatever fixes it.

sam-github added a commit to sam-github/node that referenced this pull request Feb 18, 2020
@Adenilson
Copy link

Adenilson commented Feb 21, 2020

@mscdex PTAL at #31800

I added a maintenance guide. It makes clear what parts of this are from upstream, and what are maintained by Node.js.

I also took a shot at updating to head of upstream, because then it might be worth trying to fix all the compiler warnings, but there were non-trivial changes and I couldn't get it to build after half an hour of fiddling with our zlib.gyp file. There isn't any particular feature I wanted from upstream, but was hoping it would either fix the compiler warnings, or accept patches to fix them.

gcc-9 warnings

I'm surprised it passes cleanly in a build through Chromium bots (we enable quite a few warning flags for clang, also got MSAN/ASAN active and fuzzers).

A quick look confirms that the impacted code is not part of the optimizations per-si, as it comes straight from zlib upstream:
https://github.com/madler/zlib/blob/master/infback.c#L479
https://github.com/nodejs/node/blob/master/deps/zlib/infback.c#L479

I think the fall through case is on purpose here, therefore a false positive.

Finally, I noticed that the hash imported seems to be missing the fix for an uninitialized jump (landed on 23th Jan):
https://cs.chromium.org/chromium/src/third_party/zlib/patches/0003-uninitializedjump.patch
https://github.com/nodejs/node/tree/master/deps/zlib/patches

If updating to Chromium's ToT (Top of Tree) is too hard, I would recommend to at least apply the fix on what you guys are shipping.

I'm working in some new optimizations and when I land this new work (will take a few months), I can provide a heads up, but then it would be the time to get in-sync with ToT, I'm afraid.

sam-github added a commit that referenced this pull request Feb 24, 2020
See:
- #31201

PR-URL: #31800
Reviewed-By: James M Snell <jasnell@gmail.com>
Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
Reviewed-By: Beth Griggs <Bethany.Griggs@uk.ibm.com>
@billouboq
Copy link

if you want to search for other optimisations this repo summarize it :

https://github.com/matbech/zlib

codebytere pushed a commit that referenced this pull request Feb 27, 2020
See:
- #31201

PR-URL: #31800
Reviewed-By: James M Snell <jasnell@gmail.com>
Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
Reviewed-By: Beth Griggs <Bethany.Griggs@uk.ibm.com>
codebytere pushed a commit that referenced this pull request Mar 15, 2020
This implementation provides optimizations not included upstream.

PR-URL: #31201
Reviewed-By: Matteo Collina <matteo.collina@gmail.com>
Reviewed-By: Benjamin Gruenbaum <benjamingr@gmail.com>
codebytere pushed a commit that referenced this pull request Mar 15, 2020
See:
- #31201

PR-URL: #31800
Reviewed-By: James M Snell <jasnell@gmail.com>
Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
Reviewed-By: Beth Griggs <Bethany.Griggs@uk.ibm.com>
codebytere pushed a commit that referenced this pull request Mar 17, 2020
This implementation provides optimizations not included upstream.

PR-URL: #31201
Reviewed-By: Matteo Collina <matteo.collina@gmail.com>
Reviewed-By: Benjamin Gruenbaum <benjamingr@gmail.com>
codebytere pushed a commit that referenced this pull request Mar 17, 2020
See:
- #31201

PR-URL: #31800
Reviewed-By: James M Snell <jasnell@gmail.com>
Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
Reviewed-By: Beth Griggs <Bethany.Griggs@uk.ibm.com>
@codebytere codebytere mentioned this pull request Mar 17, 2020
@targos targos removed baking-for-lts PRs that need to wait before landing in a LTS release. lts-watch-v12.x labels Apr 25, 2020
targos pushed a commit to targos/node that referenced this pull request Apr 25, 2020
This implementation provides optimizations not included upstream.

PR-URL: nodejs#31201
Reviewed-By: Matteo Collina <matteo.collina@gmail.com>
Reviewed-By: Benjamin Gruenbaum <benjamingr@gmail.com>
targos pushed a commit to targos/node that referenced this pull request Apr 25, 2020
See:
- nodejs#31201

PR-URL: nodejs#31800
Reviewed-By: James M Snell <jasnell@gmail.com>
Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
Reviewed-By: Beth Griggs <Bethany.Griggs@uk.ibm.com>
targos pushed a commit that referenced this pull request Apr 28, 2020
This implementation provides optimizations not included upstream.

PR-URL: #31201
Reviewed-By: Matteo Collina <matteo.collina@gmail.com>
Reviewed-By: Benjamin Gruenbaum <benjamingr@gmail.com>
targos pushed a commit that referenced this pull request Apr 28, 2020
See:
- #31201

PR-URL: #31800
Reviewed-By: James M Snell <jasnell@gmail.com>
Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
Reviewed-By: Beth Griggs <Bethany.Griggs@uk.ibm.com>
@Adenilson
Copy link

I'm unsure what is the best way to reach out to node.js developers, but in face of the newly reported CVE impacting zlib (https://nvd.nist.gov/vuln/detail/CVE-2018-25032), I just wanted to share that we have backported the fix to Chromium's zlib all the way back in 2018 (madler/zlib#605 (comment)).

From a security point of view, if you are running Chromium's zlib you should be fine.

I'm actively inspecting the patches featured in zlib 1.2.12 and porting them to Chromium.

@Adenilson
Copy link

The work updating Chromium's zlib to zlib 1.2.12 is tracked here:
https://bugs.chromium.org/p/chromium/issues/detail?id=1032721

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
performance Issues and PRs related to the performance of Node.js. zlib Issues and PRs related to the zlib subsystem.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet