mirror of
				https://github.com/python/cpython.git
				synced 2025-10-26 11:14:33 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			491 lines
		
	
	
	
		
			20 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			491 lines
		
	
	
	
		
			20 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
| #ifdef _Py_JIT
 | |
| 
 | |
| #include "Python.h"
 | |
| 
 | |
| #include "pycore_abstract.h"
 | |
| #include "pycore_call.h"
 | |
| #include "pycore_ceval.h"
 | |
| #include "pycore_dict.h"
 | |
| #include "pycore_intrinsics.h"
 | |
| #include "pycore_long.h"
 | |
| #include "pycore_opcode_metadata.h"
 | |
| #include "pycore_opcode_utils.h"
 | |
| #include "pycore_optimizer.h"
 | |
| #include "pycore_pyerrors.h"
 | |
| #include "pycore_setobject.h"
 | |
| #include "pycore_sliceobject.h"
 | |
| #include "pycore_jit.h"
 | |
| 
 | |
| #include "jit_stencils.h"
 | |
| 
 | |
| // Memory management stuff: ////////////////////////////////////////////////////
 | |
| 
 | |
| #ifndef MS_WINDOWS
 | |
|     #include <sys/mman.h>
 | |
| #endif
 | |
| 
 | |
| static size_t
 | |
| get_page_size(void)
 | |
| {
 | |
| #ifdef MS_WINDOWS
 | |
|     SYSTEM_INFO si;
 | |
|     GetSystemInfo(&si);
 | |
|     return si.dwPageSize;
 | |
| #else
 | |
|     return sysconf(_SC_PAGESIZE);
 | |
| #endif
 | |
| }
 | |
| 
 | |
| static void
 | |
| jit_error(const char *message)
 | |
| {
 | |
| #ifdef MS_WINDOWS
 | |
|     int hint = GetLastError();
 | |
| #else
 | |
|     int hint = errno;
 | |
| #endif
 | |
|     PyErr_Format(PyExc_RuntimeWarning, "JIT %s (%d)", message, hint);
 | |
| }
 | |
| 
 | |
| static unsigned char *
 | |
| jit_alloc(size_t size)
 | |
| {
 | |
|     assert(size);
 | |
|     assert(size % get_page_size() == 0);
 | |
| #ifdef MS_WINDOWS
 | |
|     int flags = MEM_COMMIT | MEM_RESERVE;
 | |
|     unsigned char *memory = VirtualAlloc(NULL, size, flags, PAGE_READWRITE);
 | |
|     int failed = memory == NULL;
 | |
| #else
 | |
|     int flags = MAP_ANONYMOUS | MAP_PRIVATE;
 | |
|     unsigned char *memory = mmap(NULL, size, PROT_READ | PROT_WRITE, flags, -1, 0);
 | |
|     int failed = memory == MAP_FAILED;
 | |
| #endif
 | |
|     if (failed) {
 | |
|         jit_error("unable to allocate memory");
 | |
|         return NULL;
 | |
|     }
 | |
|     return memory;
 | |
| }
 | |
| 
 | |
| static int
 | |
| jit_free(unsigned char *memory, size_t size)
 | |
| {
 | |
|     assert(size);
 | |
|     assert(size % get_page_size() == 0);
 | |
| #ifdef MS_WINDOWS
 | |
|     int failed = !VirtualFree(memory, 0, MEM_RELEASE);
 | |
| #else
 | |
|     int failed = munmap(memory, size);
 | |
| #endif
 | |
|     if (failed) {
 | |
|         jit_error("unable to free memory");
 | |
|         return -1;
 | |
|     }
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| static int
 | |
| mark_executable(unsigned char *memory, size_t size)
 | |
| {
 | |
|     if (size == 0) {
 | |
|         return 0;
 | |
|     }
 | |
|     assert(size % get_page_size() == 0);
 | |
|     // Do NOT ever leave the memory writable! Also, don't forget to flush the
 | |
|     // i-cache (I cannot begin to tell you how horrible that is to debug):
 | |
| #ifdef MS_WINDOWS
 | |
|     if (!FlushInstructionCache(GetCurrentProcess(), memory, size)) {
 | |
|         jit_error("unable to flush instruction cache");
 | |
|         return -1;
 | |
|     }
 | |
|     int old;
 | |
|     int failed = !VirtualProtect(memory, size, PAGE_EXECUTE_READ, &old);
 | |
| #else
 | |
|     __builtin___clear_cache((char *)memory, (char *)memory + size);
 | |
|     int failed = mprotect(memory, size, PROT_EXEC | PROT_READ);
 | |
| #endif
 | |
|     if (failed) {
 | |
|         jit_error("unable to protect executable memory");
 | |
|         return -1;
 | |
|     }
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| // JIT compiler stuff: /////////////////////////////////////////////////////////
 | |
| 
 | |
| // Warning! AArch64 requires you to get your hands dirty. These are your gloves:
 | |
| 
 | |
| // value[value_start : value_start + len]
 | |
| static uint32_t
 | |
| get_bits(uint64_t value, uint8_t value_start, uint8_t width)
 | |
| {
 | |
|     assert(width <= 32);
 | |
|     return (value >> value_start) & ((1ULL << width) - 1);
 | |
| }
 | |
| 
 | |
| // *loc[loc_start : loc_start + width] = value[value_start : value_start + width]
 | |
| static void
 | |
| set_bits(uint32_t *loc, uint8_t loc_start, uint64_t value, uint8_t value_start,
 | |
|          uint8_t width)
 | |
| {
 | |
|     assert(loc_start + width <= 32);
 | |
|     // Clear the bits we're about to patch:
 | |
|     *loc &= ~(((1ULL << width) - 1) << loc_start);
 | |
|     assert(get_bits(*loc, loc_start, width) == 0);
 | |
|     // Patch the bits:
 | |
|     *loc |= get_bits(value, value_start, width) << loc_start;
 | |
|     assert(get_bits(*loc, loc_start, width) == get_bits(value, value_start, width));
 | |
| }
 | |
| 
 | |
| // See https://developer.arm.com/documentation/ddi0602/2023-09/Base-Instructions
 | |
| // for instruction encodings:
 | |
| #define IS_AARCH64_ADD_OR_SUB(I) (((I) & 0x11C00000) == 0x11000000)
 | |
| #define IS_AARCH64_ADRP(I)       (((I) & 0x9F000000) == 0x90000000)
 | |
| #define IS_AARCH64_BRANCH(I)     (((I) & 0x7C000000) == 0x14000000)
 | |
| #define IS_AARCH64_LDR_OR_STR(I) (((I) & 0x3B000000) == 0x39000000)
 | |
| #define IS_AARCH64_MOV(I)        (((I) & 0x9F800000) == 0x92800000)
 | |
| 
 | |
| // Fill all of stencil's holes in the memory pointed to by base, using the
 | |
| // values in patches.
 | |
| static void
 | |
| patch(unsigned char *base, const Stencil *stencil, uintptr_t patches[])
 | |
| {
 | |
|     for (size_t i = 0; i < stencil->holes_size; i++) {
 | |
|         const Hole *hole = &stencil->holes[i];
 | |
|         unsigned char *location = base + hole->offset;
 | |
|         uint64_t value = patches[hole->value] + (uintptr_t)hole->symbol + hole->addend;
 | |
|         uint8_t *loc8 = (uint8_t *)location;
 | |
|         uint32_t *loc32 = (uint32_t *)location;
 | |
|         uint64_t *loc64 = (uint64_t *)location;
 | |
|         // LLD is a great reference for performing relocations... just keep in
 | |
|         // mind that Tools/jit/build.py does filtering and preprocessing for us!
 | |
|         // Here's a good place to start for each platform:
 | |
|         // - aarch64-apple-darwin:
 | |
|         //   - https://github.com/llvm/llvm-project/blob/main/lld/MachO/Arch/ARM64.cpp
 | |
|         //   - https://github.com/llvm/llvm-project/blob/main/lld/MachO/Arch/ARM64Common.cpp
 | |
|         //   - https://github.com/llvm/llvm-project/blob/main/lld/MachO/Arch/ARM64Common.h
 | |
|         // - aarch64-pc-windows-msvc:
 | |
|         //   - https://github.com/llvm/llvm-project/blob/main/lld/COFF/Chunks.cpp
 | |
|         // - aarch64-unknown-linux-gnu:
 | |
|         //   - https://github.com/llvm/llvm-project/blob/main/lld/ELF/Arch/AArch64.cpp
 | |
|         // - i686-pc-windows-msvc:
 | |
|         //   - https://github.com/llvm/llvm-project/blob/main/lld/COFF/Chunks.cpp
 | |
|         // - x86_64-apple-darwin:
 | |
|         //   - https://github.com/llvm/llvm-project/blob/main/lld/MachO/Arch/X86_64.cpp
 | |
|         // - x86_64-pc-windows-msvc:
 | |
|         //   - https://github.com/llvm/llvm-project/blob/main/lld/COFF/Chunks.cpp
 | |
|         // - x86_64-unknown-linux-gnu:
 | |
|         //   - https://github.com/llvm/llvm-project/blob/main/lld/ELF/Arch/X86_64.cpp
 | |
|         switch (hole->kind) {
 | |
|             case HoleKind_IMAGE_REL_I386_DIR32:
 | |
|                 // 32-bit absolute address.
 | |
|                 // Check that we're not out of range of 32 unsigned bits:
 | |
|                 assert(value < (1ULL << 32));
 | |
|                 *loc32 = (uint32_t)value;
 | |
|                 continue;
 | |
|             case HoleKind_ARM64_RELOC_UNSIGNED:
 | |
|             case HoleKind_R_AARCH64_ABS64:
 | |
|             case HoleKind_X86_64_RELOC_UNSIGNED:
 | |
|             case HoleKind_R_X86_64_64:
 | |
|                 // 64-bit absolute address.
 | |
|                 *loc64 = value;
 | |
|                 continue;
 | |
|             case HoleKind_IMAGE_REL_AMD64_REL32:
 | |
|             case HoleKind_IMAGE_REL_I386_REL32:
 | |
|             case HoleKind_R_X86_64_GOTPCRELX:
 | |
|             case HoleKind_R_X86_64_REX_GOTPCRELX:
 | |
|             case HoleKind_X86_64_RELOC_GOT:
 | |
|             case HoleKind_X86_64_RELOC_GOT_LOAD: {
 | |
|                 // 32-bit relative address.
 | |
|                 // Try to relax the GOT load into an immediate value:
 | |
|                 uint64_t relaxed = *(uint64_t *)(value + 4) - 4;
 | |
|                 if ((int64_t)relaxed - (int64_t)location >= -(1LL << 31) &&
 | |
|                     (int64_t)relaxed - (int64_t)location + 1 < (1LL << 31))
 | |
|                 {
 | |
|                     if (loc8[-2] == 0x8B) {
 | |
|                         // mov reg, dword ptr [rip + AAA] -> lea reg, [rip + XXX]
 | |
|                         loc8[-2] = 0x8D;
 | |
|                         value = relaxed;
 | |
|                     }
 | |
|                     else if (loc8[-2] == 0xFF && loc8[-1] == 0x15) {
 | |
|                         // call qword ptr [rip + AAA] -> nop; call XXX
 | |
|                         loc8[-2] = 0x90;
 | |
|                         loc8[-1] = 0xE8;
 | |
|                         value = relaxed;
 | |
|                     }
 | |
|                     else if (loc8[-2] == 0xFF && loc8[-1] == 0x25) {
 | |
|                         // jmp qword ptr [rip + AAA] -> nop; jmp XXX
 | |
|                         loc8[-2] = 0x90;
 | |
|                         loc8[-1] = 0xE9;
 | |
|                         value = relaxed;
 | |
|                     }
 | |
|                 }
 | |
|             }
 | |
|             // Fall through...
 | |
|             case HoleKind_R_X86_64_GOTPCREL:
 | |
|             case HoleKind_R_X86_64_PC32:
 | |
|             case HoleKind_X86_64_RELOC_SIGNED:
 | |
|             case HoleKind_X86_64_RELOC_BRANCH:
 | |
|                 // 32-bit relative address.
 | |
|                 value -= (uintptr_t)location;
 | |
|                 // Check that we're not out of range of 32 signed bits:
 | |
|                 assert((int64_t)value >= -(1LL << 31));
 | |
|                 assert((int64_t)value < (1LL << 31));
 | |
|                 *loc32 = (uint32_t)value;
 | |
|                 continue;
 | |
|             case HoleKind_IMAGE_REL_ARM64_BRANCH26:
 | |
|             case HoleKind_R_AARCH64_CALL26:
 | |
|             case HoleKind_R_AARCH64_JUMP26:
 | |
|                 // 28-bit relative branch.
 | |
|                 assert(IS_AARCH64_BRANCH(*loc32));
 | |
|                 value -= (uintptr_t)location;
 | |
|                 // Check that we're not out of range of 28 signed bits:
 | |
|                 assert((int64_t)value >= -(1 << 27));
 | |
|                 assert((int64_t)value < (1 << 27));
 | |
|                 // Since instructions are 4-byte aligned, only use 26 bits:
 | |
|                 assert(get_bits(value, 0, 2) == 0);
 | |
|                 set_bits(loc32, 0, value, 2, 26);
 | |
|                 continue;
 | |
|             case HoleKind_R_AARCH64_MOVW_UABS_G0_NC:
 | |
|                 // 16-bit low part of an absolute address.
 | |
|                 assert(IS_AARCH64_MOV(*loc32));
 | |
|                 // Check the implicit shift (this is "part 0 of 3"):
 | |
|                 assert(get_bits(*loc32, 21, 2) == 0);
 | |
|                 set_bits(loc32, 5, value, 0, 16);
 | |
|                 continue;
 | |
|             case HoleKind_R_AARCH64_MOVW_UABS_G1_NC:
 | |
|                 // 16-bit middle-low part of an absolute address.
 | |
|                 assert(IS_AARCH64_MOV(*loc32));
 | |
|                 // Check the implicit shift (this is "part 1 of 3"):
 | |
|                 assert(get_bits(*loc32, 21, 2) == 1);
 | |
|                 set_bits(loc32, 5, value, 16, 16);
 | |
|                 continue;
 | |
|             case HoleKind_R_AARCH64_MOVW_UABS_G2_NC:
 | |
|                 // 16-bit middle-high part of an absolute address.
 | |
|                 assert(IS_AARCH64_MOV(*loc32));
 | |
|                 // Check the implicit shift (this is "part 2 of 3"):
 | |
|                 assert(get_bits(*loc32, 21, 2) == 2);
 | |
|                 set_bits(loc32, 5, value, 32, 16);
 | |
|                 continue;
 | |
|             case HoleKind_R_AARCH64_MOVW_UABS_G3:
 | |
|                 // 16-bit high part of an absolute address.
 | |
|                 assert(IS_AARCH64_MOV(*loc32));
 | |
|                 // Check the implicit shift (this is "part 3 of 3"):
 | |
|                 assert(get_bits(*loc32, 21, 2) == 3);
 | |
|                 set_bits(loc32, 5, value, 48, 16);
 | |
|                 continue;
 | |
|             case HoleKind_ARM64_RELOC_GOT_LOAD_PAGE21:
 | |
|             case HoleKind_IMAGE_REL_ARM64_PAGEBASE_REL21:
 | |
|             case HoleKind_R_AARCH64_ADR_GOT_PAGE:
 | |
|                 // 21-bit count of pages between this page and an absolute address's
 | |
|                 // page... I know, I know, it's weird. Pairs nicely with
 | |
|                 // ARM64_RELOC_GOT_LOAD_PAGEOFF12 (below).
 | |
|                 assert(IS_AARCH64_ADRP(*loc32));
 | |
|                 // Try to relax the pair of GOT loads into an immediate value:
 | |
|                 const Hole *next_hole = &stencil->holes[i + 1];
 | |
|                 if (i + 1 < stencil->holes_size &&
 | |
|                     (next_hole->kind == HoleKind_ARM64_RELOC_GOT_LOAD_PAGEOFF12 ||
 | |
|                      next_hole->kind == HoleKind_IMAGE_REL_ARM64_PAGEOFFSET_12L ||
 | |
|                      next_hole->kind == HoleKind_R_AARCH64_LD64_GOT_LO12_NC) &&
 | |
|                     next_hole->offset == hole->offset + 4 &&
 | |
|                     next_hole->symbol == hole->symbol &&
 | |
|                     next_hole->addend == hole->addend &&
 | |
|                     next_hole->value == hole->value)
 | |
|                 {
 | |
|                     unsigned char reg = get_bits(loc32[0], 0, 5);
 | |
|                     assert(IS_AARCH64_LDR_OR_STR(loc32[1]));
 | |
|                     // There should be only one register involved:
 | |
|                     assert(reg == get_bits(loc32[1], 0, 5));  // ldr's output register.
 | |
|                     assert(reg == get_bits(loc32[1], 5, 5));  // ldr's input register.
 | |
|                     uint64_t relaxed = *(uint64_t *)value;
 | |
|                     if (relaxed < (1UL << 16)) {
 | |
|                         // adrp reg, AAA; ldr reg, [reg + BBB] -> movz reg, XXX; nop
 | |
|                         loc32[0] = 0xD2800000 | (get_bits(relaxed, 0, 16) << 5) | reg;
 | |
|                         loc32[1] = 0xD503201F;
 | |
|                         i++;
 | |
|                         continue;
 | |
|                     }
 | |
|                     if (relaxed < (1ULL << 32)) {
 | |
|                         // adrp reg, AAA; ldr reg, [reg + BBB] -> movz reg, XXX; movk reg, YYY
 | |
|                         loc32[0] = 0xD2800000 | (get_bits(relaxed,  0, 16) << 5) | reg;
 | |
|                         loc32[1] = 0xF2A00000 | (get_bits(relaxed, 16, 16) << 5) | reg;
 | |
|                         i++;
 | |
|                         continue;
 | |
|                     }
 | |
|                     relaxed = value - (uintptr_t)location;
 | |
|                     if ((relaxed & 0x3) == 0 &&
 | |
|                         (int64_t)relaxed >= -(1L << 19) &&
 | |
|                         (int64_t)relaxed < (1L << 19))
 | |
|                     {
 | |
|                         // adrp reg, AAA; ldr reg, [reg + BBB] -> ldr reg, XXX; nop
 | |
|                         loc32[0] = 0x58000000 | (get_bits(relaxed, 2, 19) << 5) | reg;
 | |
|                         loc32[1] = 0xD503201F;
 | |
|                         i++;
 | |
|                         continue;
 | |
|                     }
 | |
|                 }
 | |
|                 // Fall through...
 | |
|             case HoleKind_ARM64_RELOC_PAGE21:
 | |
|                 // Number of pages between this page and the value's page:
 | |
|                 value = (value >> 12) - ((uintptr_t)location >> 12);
 | |
|                 // Check that we're not out of range of 21 signed bits:
 | |
|                 assert((int64_t)value >= -(1 << 20));
 | |
|                 assert((int64_t)value < (1 << 20));
 | |
|                 // value[0:2] goes in loc[29:31]:
 | |
|                 set_bits(loc32, 29, value, 0, 2);
 | |
|                 // value[2:21] goes in loc[5:26]:
 | |
|                 set_bits(loc32, 5, value, 2, 19);
 | |
|                 continue;
 | |
|             case HoleKind_ARM64_RELOC_GOT_LOAD_PAGEOFF12:
 | |
|             case HoleKind_ARM64_RELOC_PAGEOFF12:
 | |
|             case HoleKind_IMAGE_REL_ARM64_PAGEOFFSET_12A:
 | |
|             case HoleKind_IMAGE_REL_ARM64_PAGEOFFSET_12L:
 | |
|             case HoleKind_R_AARCH64_LD64_GOT_LO12_NC:
 | |
|                 // 12-bit low part of an absolute address. Pairs nicely with
 | |
|                 // ARM64_RELOC_GOT_LOAD_PAGE21 (above).
 | |
|                 assert(IS_AARCH64_LDR_OR_STR(*loc32) || IS_AARCH64_ADD_OR_SUB(*loc32));
 | |
|                 // There might be an implicit shift encoded in the instruction:
 | |
|                 uint8_t shift = 0;
 | |
|                 if (IS_AARCH64_LDR_OR_STR(*loc32)) {
 | |
|                     shift = (uint8_t)get_bits(*loc32, 30, 2);
 | |
|                     // If both of these are set, the shift is supposed to be 4.
 | |
|                     // That's pretty weird, and it's never actually been observed...
 | |
|                     assert(get_bits(*loc32, 23, 1) == 0 || get_bits(*loc32, 26, 1) == 0);
 | |
|                 }
 | |
|                 value = get_bits(value, 0, 12);
 | |
|                 assert(get_bits(value, 0, shift) == 0);
 | |
|                 set_bits(loc32, 10, value, shift, 12);
 | |
|                 continue;
 | |
|         }
 | |
|         Py_UNREACHABLE();
 | |
|     }
 | |
| }
 | |
| 
 | |
| static void
 | |
| copy_and_patch(unsigned char *base, const Stencil *stencil, uintptr_t patches[])
 | |
| {
 | |
|     memcpy(base, stencil->body, stencil->body_size);
 | |
|     patch(base, stencil, patches);
 | |
| }
 | |
| 
 | |
| static void
 | |
| emit(const StencilGroup *group, uintptr_t patches[])
 | |
| {
 | |
|     copy_and_patch((unsigned char *)patches[HoleValue_DATA], &group->data, patches);
 | |
|     copy_and_patch((unsigned char *)patches[HoleValue_CODE], &group->code, patches);
 | |
| }
 | |
| 
 | |
| // Compiles executor in-place. Don't forget to call _PyJIT_Free later!
 | |
| int
 | |
| _PyJIT_Compile(_PyExecutorObject *executor, const _PyUOpInstruction *trace, size_t length)
 | |
| {
 | |
|     // Loop once to find the total compiled size:
 | |
|     size_t instruction_starts[UOP_MAX_TRACE_LENGTH];
 | |
|     size_t code_size = 0;
 | |
|     size_t data_size = 0;
 | |
|     for (size_t i = 0; i < length; i++) {
 | |
|         _PyUOpInstruction *instruction = (_PyUOpInstruction *)&trace[i];
 | |
|         const StencilGroup *group = &stencil_groups[instruction->opcode];
 | |
|         instruction_starts[i] = code_size;
 | |
|         code_size += group->code.body_size;
 | |
|         data_size += group->data.body_size;
 | |
|     }
 | |
|     code_size += stencil_groups[_FATAL_ERROR].code.body_size;
 | |
|     data_size += stencil_groups[_FATAL_ERROR].data.body_size;
 | |
|     // Round up to the nearest page:
 | |
|     size_t page_size = get_page_size();
 | |
|     assert((page_size & (page_size - 1)) == 0);
 | |
|     size_t padding = page_size - ((code_size + data_size) & (page_size - 1));
 | |
|     size_t total_size = code_size + data_size + padding;
 | |
|     unsigned char *memory = jit_alloc(total_size);
 | |
|     if (memory == NULL) {
 | |
|         return -1;
 | |
|     }
 | |
|     // Loop again to emit the code:
 | |
|     unsigned char *code = memory;
 | |
|     unsigned char *data = memory + code_size;
 | |
|     assert(trace[0].opcode == _START_EXECUTOR || trace[0].opcode == _COLD_EXIT);
 | |
|     for (size_t i = 0; i < length; i++) {
 | |
|         _PyUOpInstruction *instruction = (_PyUOpInstruction *)&trace[i];
 | |
|         const StencilGroup *group = &stencil_groups[instruction->opcode];
 | |
|         // Think of patches as a dictionary mapping HoleValue to uintptr_t:
 | |
|         uintptr_t patches[] = GET_PATCHES();
 | |
|         patches[HoleValue_CODE] = (uintptr_t)code;
 | |
|         patches[HoleValue_CONTINUE] = (uintptr_t)code + group->code.body_size;
 | |
|         patches[HoleValue_DATA] = (uintptr_t)data;
 | |
|         patches[HoleValue_EXECUTOR] = (uintptr_t)executor;
 | |
|         patches[HoleValue_OPARG] = instruction->oparg;
 | |
|     #if SIZEOF_VOID_P == 8
 | |
|         patches[HoleValue_OPERAND] = instruction->operand;
 | |
|     #else
 | |
|         assert(SIZEOF_VOID_P == 4);
 | |
|         patches[HoleValue_OPERAND_HI] = instruction->operand >> 32;
 | |
|         patches[HoleValue_OPERAND_LO] = instruction->operand & UINT32_MAX;
 | |
|     #endif
 | |
|         switch (instruction->format) {
 | |
|             case UOP_FORMAT_TARGET:
 | |
|                 patches[HoleValue_TARGET] = instruction->target;
 | |
|                 break;
 | |
|             case UOP_FORMAT_EXIT:
 | |
|                 assert(instruction->exit_index < executor->exit_count);
 | |
|                 patches[HoleValue_EXIT_INDEX] = instruction->exit_index;
 | |
|                 if (instruction->error_target < length) {
 | |
|                     patches[HoleValue_ERROR_TARGET] = (uintptr_t)memory + instruction_starts[instruction->error_target];
 | |
|                 }
 | |
|                 break;
 | |
|             case UOP_FORMAT_JUMP:
 | |
|                 assert(instruction->jump_target < length);
 | |
|                 patches[HoleValue_JUMP_TARGET] = (uintptr_t)memory + instruction_starts[instruction->jump_target];
 | |
|                 if (instruction->error_target < length) {
 | |
|                     patches[HoleValue_ERROR_TARGET] = (uintptr_t)memory + instruction_starts[instruction->error_target];
 | |
|                 }
 | |
|                 break;
 | |
|             default:
 | |
|                 assert(0);
 | |
|                 Py_FatalError("Illegal instruction format");
 | |
|         }
 | |
|         patches[HoleValue_TOP] = (uintptr_t)memory + instruction_starts[1];
 | |
|         patches[HoleValue_ZERO] = 0;
 | |
|         emit(group, patches);
 | |
|         code += group->code.body_size;
 | |
|         data += group->data.body_size;
 | |
|     }
 | |
|     // Protect against accidental buffer overrun into data:
 | |
|     const StencilGroup *group = &stencil_groups[_FATAL_ERROR];
 | |
|     uintptr_t patches[] = GET_PATCHES();
 | |
|     patches[HoleValue_CODE] = (uintptr_t)code;
 | |
|     patches[HoleValue_CONTINUE] = (uintptr_t)code;
 | |
|     patches[HoleValue_DATA] = (uintptr_t)data;
 | |
|     patches[HoleValue_EXECUTOR] = (uintptr_t)executor;
 | |
|     patches[HoleValue_TOP] = (uintptr_t)code;
 | |
|     patches[HoleValue_ZERO] = 0;
 | |
|     emit(group, patches);
 | |
|     code += group->code.body_size;
 | |
|     data += group->data.body_size;
 | |
|     assert(code == memory + code_size);
 | |
|     assert(data == memory + code_size + data_size);
 | |
|     if (mark_executable(memory, total_size)) {
 | |
|         jit_free(memory, total_size);
 | |
|         return -1;
 | |
|     }
 | |
|     executor->jit_code = memory;
 | |
|     executor->jit_size = total_size;
 | |
|     return 0;
 | |
| }
 | |
| 
 | |
| void
 | |
| _PyJIT_Free(_PyExecutorObject *executor)
 | |
| {
 | |
|     unsigned char *memory = (unsigned char *)executor->jit_code;
 | |
|     size_t size = executor->jit_size;
 | |
|     if (memory) {
 | |
|         executor->jit_code = NULL;
 | |
|         executor->jit_size = 0;
 | |
|         if (jit_free(memory, size)) {
 | |
|             PyErr_WriteUnraisable(NULL);
 | |
|         }
 | |
|     }
 | |
| }
 | |
| 
 | |
| #endif  // _Py_JIT
 | 
