Thursday, March 3, 2011

crazy CSS, thanks DTrace

I hate many enterprise applications because of very unpleasant user experiences. Here's a recent example.
When I opened an application in firefox browser, my computer nearly hanged. Using basic Solaris commands prstat, mpstat, etc, I found displaying this page caused huge number of (40K) context switches per second.
At first, I thought it might be because of some ugly javascripts. So I first checked the source of this web page, well it contains several big java script files (sum up over 1MB), then I disabled the javascript in browser, however, the problem remained. I also tried offline browsing, it didn't solve the problem, so this is not a networking issue.

What's wrong?

~# truss -c -p 1224  (#1244 is firefox process ID)
^C
syscall               seconds   calls  errors
read                     .016    3097     777
write                    .022    2126       1
open                     .000       2
close                    .000       4
fstat                    .000       2
access                   .000       1       1
ioctl                    .005    1145
fdsync                   .003       1
fcntl                    .000       6
lwp_park                 .236   28575     330
lwp_unpark               .177   28340
sigaction                .000      52
...

It looks like lwp_park/lwp_unpark are evils. Use a Dtrace script to find who caused this.

~# cat lwp_park.d
#!/usr/sbin/dtrace -qs
syscall::lwp_park:entry
/pid==$target/
{
 @[ustack()]=count();
}
END
{
trunc(@, 10);
}

./lwp_park.d -p 1244   

Then switch to the problemed web page in firefox, go back to that terminal running DTrace, type Ctrl-C.
The DTrace output the user stacks for causing both lwp_park() and lwp_unpark() which is interesting. After demangling C++ symbols, I got:

              libc.so.1`__lwp_unpark+0x19
              libnspr4.so`PR_Unlock+0x102
              libxul.so`unsigned TimerThread::RemoveTimer(nsTimerImpl*)+0x7e
              libxul.so`unsigned nsTimerImpl::Cancel()+0x32
              libxul.so`unsigned imgContainer::FrameUpdated(unsigned,nsIntRect&)+0xbd
              libxul.so`void row_callback(png_struct_def*,unsigned char*,unsigned long,int)+0x187
              libxul.so`MOZ_PNG_proc_IDAT_data+0x190
              libxul.so`MOZ_PNG_process_data+0x4ce
              libxul.so`unsigned ReadDataOut(nsIInputStream*,void*,const char*,unsigned,unsigned,unsigned*)+0x8c
              libxul.so`unsigned nsStringInputStream::ReadSegments(unsigned(*)(nsIInputStream*,void*,const char*,unsigned,unsigned,unsigned*),void*,unsigned,unsigned*)+0x47
              libxul.so`unsigned nsPNGDecoder::WriteFrom(nsIInputStream*,unsigned,unsigned*)+0x3a
              libxul.so`unsigned imgContainer::ReloadImages()+0x339
              libxul.so`unsigned imgContainer::GetCurrentFrameRect(nsIntRect&)+0x1a1
              libxul.so`unsigned imgRequest::NotifyProxyListener(imgRequestProxy*)+0x10f
              libxul.so`unsigned imgRequestProxy::Clone(imgIDecoderObserver*,imgIRequest**)+0xe7
              libxul.so`unsigned nsImageLoader::Load(imgIRequest*)+0x52

libxul.so`already_AddRefednsImageLoader::Create(nsIFrame*,imgIRequest*,int,nsImageLoader*)+0x57
              libxul.so`void nsPresContext::SetupBackgroundImageLoaders(nsIFrame*,const nsStyleBackground*)+0x98
              libxul.so`void nsCSSRendering::PaintBackgroundWithSC(nsPresContext*,nsIRenderingContext&,nsIFrame*,const nsRect&,const nsRect&,const nsStyleBackground&,const nsStyleBorder&,unsigned,nsRect*)+0x93f
              libxul.so`void nsCSSRendering::PaintBackground(nsPresContext*,nsIRenderingContext&,nsIFrame*,const nsRect&,const nsRect&,unsigned,nsRect*)+0xea
            24658

              libc.so.1`__lwp_park+0x19
              libc.so.1`cond_wait_queue+0x60
              libc.so.1`cond_wait_common+0x1eb
              libc.so.1`__cond_timedwait+0x66
              libc.so.1`cond_timedwait+0x27
              libc.so.1`pthread_cond_timedwait+0x24
              libnspr4.so`PR_WaitCondVar+0x24a
              libxul.so`unsigned TimerThread::Run()+0x11c
              libxul.so`unsigned nsThread::ProcessNextEvent(int,int*)+0x121
              libxul.so`int NS_ProcessNextEvent_P(nsIThread*,int)+0x2d
              libxul.so`void nsThread::ThreadFunc(void*)+0xa7
              libnspr4.so`_pt_root+0xe7
              libc.so.1`_thrp_setup+0x9b
              libc.so.1`_lwp_start
            26335 
The stack of lwp_unpark() is often more interesting, because lwp_park() is usually caused by waiting for a condition variable which does not directly tell you what the application is waiting for. While if there are many lwp_park(), then there are many lwp_unpark() accordingly, so I looked at lwp_unpark() stack. I'm not a browser expert, from the function name, the firefox seemed to do rendering background based on CSS.  Then I checked the CSS file which size is 150KB, Damn, there're 571 occurences like below:

{background: url(../xxx/yyy/zzz.png)} 

Then I wanted to check how many times  nsCSSRendering::PaintBackground() was called by using another DTrace script.

 From:
libxul.so`void nsCSSRendering::PaintBackground(nsPresContext*,nsIRenderingContext&,nsIFrame*,const nsRect&,const nsRect&,unsigned,nsRect*)+0xea  

#!/usr/sbin/dtrace -s
pid$target:libxul:__1cOnsCSSRenderingPPaintBackground6FpnNnsPresContext_rnTnsIRenderingContext_pnInsIFrame_rknGnsRect_9AIp7_v_:ea
{
 @ =count();
 Ran this DTrace script, and switched to the problemed web page in firefox. this time DTrace output:
~# ./pid.d -p 1244
dtrace: script './pid.d' matched 1 probe
^C
              422
It indicated rendering this web page caused the firefox painted background 422 times (via X window), crazy!!! On the other hand, it looks like firefox's libxul.so should be improved when it renders these images. It caused about 25,000 context switches. Is it because that rendering the images is in asynchronous way and the rendered data are in local memory or on fast network so that context switches occurred so fast?

Workaround: In firefox settings, Preference -> Contents -> Load images automatically -> Exceptions -> add this website to block list.