Index: src/arm64/regexp-macro-assembler-arm64.cc |
diff --git a/src/arm64/regexp-macro-assembler-arm64.cc b/src/arm64/regexp-macro-assembler-arm64.cc |
index 1630f212bf7114bf9700e6852bff28ee959f0a3e..4315fd6a45cbc3f4ef36b282c1399639c832b465 100644 |
--- a/src/arm64/regexp-macro-assembler-arm64.cc |
+++ b/src/arm64/regexp-macro-assembler-arm64.cc |
@@ -1285,104 +1285,19 @@ static T& frame_entry(Address re_frame, int frame_offset) { |
} |
-int RegExpMacroAssemblerARM64::CheckStackGuardState(Address* return_address, |
- Code* re_code, |
- Address re_frame, |
- int start_offset, |
- const byte** input_start, |
- const byte** input_end) { |
- Isolate* isolate = frame_entry<Isolate*>(re_frame, kIsolate); |
- StackLimitCheck check(isolate); |
- if (check.JsHasOverflowed()) { |
- isolate->StackOverflow(); |
- return EXCEPTION; |
- } |
- |
- // If not real stack overflow the stack guard was used to interrupt |
- // execution for another purpose. |
- |
- // If this is a direct call from JavaScript retry the RegExp forcing the call |
- // through the runtime system. Currently the direct call cannot handle a GC. |
- if (frame_entry<int>(re_frame, kDirectCall) == 1) { |
- return RETRY; |
- } |
- |
- // Prepare for possible GC. |
- HandleScope handles(isolate); |
- Handle<Code> code_handle(re_code); |
- |
- Handle<String> subject(frame_entry<String*>(re_frame, kInput)); |
- |
- // Current string. |
- bool is_one_byte = subject->IsOneByteRepresentationUnderneath(); |
- |
- DCHECK(re_code->instruction_start() <= *return_address); |
- DCHECK(*return_address <= |
- re_code->instruction_start() + re_code->instruction_size()); |
- |
- Object* result = isolate->stack_guard()->HandleInterrupts(); |
- |
- if (*code_handle != re_code) { // Return address no longer valid |
- int delta = code_handle->address() - re_code->address(); |
- // Overwrite the return address on the stack. |
- *return_address += delta; |
- } |
- |
- if (result->IsException()) { |
- return EXCEPTION; |
- } |
- |
- Handle<String> subject_tmp = subject; |
- int slice_offset = 0; |
- |
- // Extract the underlying string and the slice offset. |
- if (StringShape(*subject_tmp).IsCons()) { |
- subject_tmp = Handle<String>(ConsString::cast(*subject_tmp)->first()); |
- } else if (StringShape(*subject_tmp).IsSliced()) { |
- SlicedString* slice = SlicedString::cast(*subject_tmp); |
- subject_tmp = Handle<String>(slice->parent()); |
- slice_offset = slice->offset(); |
- } |
- |
- // String might have changed. |
- if (subject_tmp->IsOneByteRepresentation() != is_one_byte) { |
- // If we changed between an Latin1 and an UC16 string, the specialized |
- // code cannot be used, and we need to restart regexp matching from |
- // scratch (including, potentially, compiling a new version of the code). |
- return RETRY; |
- } |
+template <typename T> |
+static T* frame_entry_address(Address re_frame, int frame_offset) { |
+ return reinterpret_cast<T*>(re_frame + frame_offset); |
+} |
- // Otherwise, the content of the string might have moved. It must still |
- // be a sequential or external string with the same content. |
- // Update the start and end pointers in the stack frame to the current |
- // location (whether it has actually moved or not). |
- DCHECK(StringShape(*subject_tmp).IsSequential() || |
- StringShape(*subject_tmp).IsExternal()); |
- |
- // The original start address of the characters to match. |
- const byte* start_address = *input_start; |
- |
- // Find the current start address of the same character at the current string |
- // position. |
- const byte* new_address = StringCharacterPosition(*subject_tmp, |
- start_offset + slice_offset); |
- |
- if (start_address != new_address) { |
- // If there is a difference, update the object pointer and start and end |
- // addresses in the RegExp stack frame to match the new value. |
- const byte* end_address = *input_end; |
- int byte_length = static_cast<int>(end_address - start_address); |
- frame_entry<const String*>(re_frame, kInput) = *subject; |
- *input_start = new_address; |
- *input_end = new_address + byte_length; |
- } else if (frame_entry<const String*>(re_frame, kInput) != *subject) { |
- // Subject string might have been a ConsString that underwent |
- // short-circuiting during GC. That will not change start_address but |
- // will change pointer inside the subject handle. |
- frame_entry<const String*>(re_frame, kInput) = *subject; |
- } |
- return 0; |
+int RegExpMacroAssemblerARM64::CheckStackGuardState( |
+ Address* return_address, Code* re_code, Address re_frame, int start_index, |
+ const byte** input_start, const byte** input_end) { |
+ return NativeRegExpMacroAssembler::CheckStackGuardState( |
+ frame_entry<Isolate*>(re_frame, kIsolate), start_index, |
+ frame_entry<int>(re_frame, kDirectCall) == 1, return_address, re_code, |
+ frame_entry_address<String*>(re_frame, kInput), input_start, input_end); |
} |