Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings

GH-113710: Add a "globals to constants" pass#114592

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to ourterms of service andprivacy statement. We’ll occasionally send you account related emails.

Already on GitHub?Sign in to your account

Merged
markshannon merged 16 commits intopython:mainfromfaster-cpython:globals-to-constants
Feb 2, 2024

Conversation

@markshannon
Copy link
Member

@markshannonmarkshannon commentedJan 26, 2024
edited
Loading

Adds a tier 2 optimizer pass that converts the micro-ops for loading globals and builtins to constants.
This should have two benefits:

  • The resulting code is faster
  • It will enable further optimizations thanks to better constant and type propagation.

Benchmarking and stats show a ~1% speedup, but it is the stats that are interesting.

The tier 2 stats show that we have replaced 3 billion guards with 1.2 cheaper guards, and that allLOAD_GLOBAL_MODULE andLOAD_GLOBAL_BUILTINS have been replaced with inline constants.

There are some changes to the tier 1 stats, whichI think are a result of not optimizing when the global/builtin keys version doesn't match, so we avoid poor optimization. This drops us back into tier 1 for later re-optimization to tier 2, hopefully when the set of global variables has stabilized.
This shows up in the tier 1 stats and optimization attempts.
What this suggests is that we should be de-optimizing faster in tier 1 in this case, as once the keys version has changed it will never go back to the original value. But that's for another PR.

@gvanrossum
Copy link
Member

Hey@carljm, could you review the changes to the dict watcher here please? I've never seen that code before (sorry).

carljm reacted with thumbs up emoji

Copy link
Member

@gvanrossumgvanrossum left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

This looks pretty good, I mostly have suggestions for clarifying comments and a few style nits.

Copy link
Member

@carljmcarljm left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

The dict watchers changes look good to me! Nice to see this in use.

Copy link
Member

@gvanrossumgvanrossum left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Go for it!

@Fidget-Spinner
Copy link
Member

The JIT tests are failing. We should probably force enable uops and hammer the test suite.

{
RARE_EVENT_INC(builtin_dict);
PyInterpreterState*interp=_PyInterpreterState_GET();
if (event!=PyDict_EVENT_CLONED&&interp->rare_events.builtin_dict<_Py_MAX_ALLOWED_BUILTINS_MODIFICATIONS) {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Maybe I'm just misunderstanding, but shouldn't this be>? As in, if we've modified builtins too many times, we invalidate everything?

Also, what is the purpose of excludingPyDict_EVENT_CLONED here?

Copy link
MemberAuthor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Maybe I'm just misunderstanding, but shouldn't this be >? As in, if we've modified builtins too many times, we invalidate everything?

Every time the builtins changes any executors that depend on it not changing must be invalidated.
So we invalidate the executor(s) every time it the builtins changes.
Upon reaching the threshold we no longer perform those optimizations, so the executors no longer depend on the builtins not changing, and we no longer need to invalidate.

Also, what is the purpose of excluding PyDict_EVENT_CLONED here?

Cloning doesn't modify the dict, so we don't care about it.

Copy link
MemberAuthor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

@carljm OOI, why does Cinder care about dict cloning?

Copy link
Member

@carljmcarljmFeb 2, 2024
edited
Loading

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

PyDict_EVENT_CLONED is probably a bad name, because grammatically it implies the subject dict was cloned. What it actually means is that the subject dict was empty, and another dict was clonedinto it, via e.g..update(). So it does represent a change in the subject dict; all dict watcher events do.

I think it is probably irrelevant here, since it is (at least in practice) impossible(?) for builtins or module globals to be empty when code is running.

And I don't think Cinder cares about it in practice either, for that same reason, it was just for completeness in the dict watcher implementation, since all changes to a dict should be notified by dict watchers.

}

if (PyDict_Watch(interp->rare_events.builtins_dict_watcher_id,interp->builtins)!=0) {
interp->dict_state.watchers[0]=&builtins_dict_watcher;
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

Since the first two slots are "reserved", it might be clearer to have#defines for these slots. e.g.BUILTINS_DICT_WATCHER_ID for 0 here.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

What is the rationale for bypassingPyDict_AddWatcher here and special-casing? Just a small amount of startup performance? Here, consistency and encapsulating management of thedict_state.watchers array might be better maintenance-wise.

Copy link
MemberAuthor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others.Learn more.

It keeps things simpler if we are guaranteed to have IDs. Otherwise we need to worry about what happens if we can't add either or both of the watchers.

@brandtbucher
Copy link
Member

Confirmed locally that the same failures happen with tier two (not just the JIT).

@bedevere-bot
Copy link

⚠️⚠️⚠️ Buildbot failure⚠️⚠️⚠️

Hi! The buildbotAMD64 Ubuntu NoGIL Refleaks 3.x has failed when building commit0e71a29.

What do you need to do:

  1. Don't panic.
  2. Checkthe buildbot page in the devguide if you don't know what the buildbots are or how they work.
  3. Go to the page of the buildbot that failed (https://buildbot.python.org/all/#builders/1226/builds/1106) and take a look at the build logs.
  4. Check if the failure is related to this commit (0e71a29) or if it is a false positive.
  5. If the failure is related to this commit, please, reflect that on the issue and make a new Pull Request with a fix.

You can take a look at the buildbot page here:

https://buildbot.python.org/all/#builders/1226/builds/1106

Failed tests:

  • test_ssl

Test leaking resources:

  • test_ssl: memory blocks

Summary of the results of the build (if available):

==

Click to see traceback logs
Traceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: NO_SHARED_CIPHER] no shared cipher (_ssl.c:1032)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLCertVerificationError: [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: self-signed certificate (_ssl.c:1032)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: DECRYPTION_FAILED_OR_BAD_RECORD_MAC] decryption failed or bad record mac (_ssl.c:1032) server:  new connection from ('127.0.0.1', 48084) server: connection cipher is now ('ECDHE-PSK-CHACHA20-POLY1305', 'TLSv1.2', 256) server:  new connection from ('127.0.0.1', 50240) server: connection cipher is now ('ECDHE-PSK-CHACHA20-POLY1305', 'TLSv1.2', 256)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: SSLV3_ALERT_BAD_CERTIFICATE] sslv3 alert bad certificate (_ssl.c:1032)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2326, in run    msg=self.read()~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2303, in readreturnself.sslconn.read()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1132, in readreturnself._sslobj.read(len)~~~~~~~~~~~~~~~~~^^^^^ ssl.SSLError: [SSL: PEER_DID_NOT_RETURN_A_CERTIFICATE] peer did not return a certificate (_ssl.c:2592)TLS:(<ssl.SSLSocket fd=5, family=2, type=1, proto=0, laddr=('127.0.0.1', 40228)>, 'read', <TLSVersion.TLSv1_3: 772>, <_TLSContentType.ALERT: 21>, <_TLSAlertType.CERTIFICATE_REQUIRED: 116>, b'\x02t')kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: DECRYPTION_FAILED_OR_BAD_RECORD_MAC] decryption failed or bad record mac (_ssl.c:1032) server:  new connection from ('127.0.0.1', 53352) server: connection cipher is now ('ECDHE-PSK-CHACHA20-POLY1305', 'TLSv1.2', 256) server:  new connection from ('127.0.0.1', 58058) server: connection cipher is now ('ECDHE-PSK-CHACHA20-POLY1305', 'TLSv1.2', 256)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: TLSV1_ALERT_UNKNOWN_CA] tlsv1 alert unknown ca (_ssl.c:1032) server:  new connection from ('127.0.0.1', 42900) server: connection cipher is now ('TLS_AES_256_GCM_SHA384', 'TLSv1.3', 256)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: TLSV1_ALERT_UNKNOWN_CA] tlsv1 alert unknown ca (_ssl.c:1032) server:  new connection from ('127.0.0.1', 54282) server: connection cipher is now ('TLS_AES_256_GCM_SHA384', 'TLSv1.3', 256)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2326, in run    msg=self.read()~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2303, in readreturnself.sslconn.read()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1132, in readreturnself._sslobj.read(len)~~~~~~~~~~~~~~~~~^^^^^ ssl.SSLError: [SSL: PEER_DID_NOT_RETURN_A_CERTIFICATE] peer did not return a certificate (_ssl.c:2592)TLS:(<ssl.SSLSocket fd=5, family=2, type=1, proto=0, laddr=('127.0.0.1', 37680), raddr=('127.0.0.1', 47657)>, 'read', <TLSVersion.TLSv1_3: 772>, <_TLSContentType.ALERT: 21>, <_TLSAlertType.CERTIFICATE_REQUIRED: 116>, b'\x02t')kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLCertVerificationError: [SSL: CERTIFICATE_VERIFY_FAILED] certificate verify failed: self-signed certificate (_ssl.c:1032)Traceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2326, in run    msg=self.read()~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2303, in readreturnself.sslconn.read()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1132, in readreturnself._sslobj.read(len)~~~~~~~~~~~~~~~~~^^^^^ ssl.SSLError: [SSL: PEER_DID_NOT_RETURN_A_CERTIFICATE] peer did not return a certificate (_ssl.c:2592)TLS:(<ssl.SSLSocket fd=4, family=2, type=1, proto=0, laddr=('127.0.0.1', 44768)>, 'read', <TLSVersion.TLSv1_3: 772>, <_TLSContentType.ALERT: 21>, <_TLSAlertType.CERTIFICATE_REQUIRED: 116>, b'\x02t')kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: TLSV1_ALERT_UNKNOWN_CA] tlsv1 alert unknown ca (_ssl.c:1032)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: NO_SUITABLE_KEY_SHARE] no suitable key share (_ssl.c:1032)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: TLSV1_ALERT_UNKNOWN_CA] tlsv1 alert unknown ca (_ssl.c:1032) server:  new connection from ('127.0.0.1', 35742) server: connection cipher is now ('TLS_AES_256_GCM_SHA384', 'TLSv1.3', 256)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: TLSV1_ALERT_UNKNOWN_CA] tlsv1 alert unknown ca (_ssl.c:1032) server:  new connection from ('127.0.0.1', 34030) server: connection cipher is now ('TLS_AES_256_GCM_SHA384', 'TLSv1.3', 256)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: DECRYPTION_FAILED_OR_BAD_RECORD_MAC] decryption failed or bad record mac (_ssl.c:1032) server:  new connection from ('127.0.0.1', 57176) server: connection cipher is now ('ECDHE-PSK-CHACHA20-POLY1305', 'TLSv1.2', 256) server:  new connection from ('127.0.0.1', 35480) server: connection cipher is now ('ECDHE-PSK-CHACHA20-POLY1305', 'TLSv1.2', 256)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: TLSV1_ALERT_UNKNOWN_CA] tlsv1 alert unknown ca (_ssl.c:1032) server:  new connection from ('127.0.0.1', 38506) server: connection cipher is now ('TLS_AES_256_GCM_SHA384', 'TLSv1.3', 256)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: DECRYPTION_FAILED_OR_BAD_RECORD_MAC] decryption failed or bad record mac (_ssl.c:1032) server:  new connection from ('127.0.0.1', 37516) server: connection cipher is now ('ECDHE-PSK-CHACHA20-POLY1305', 'TLSv1.2', 256) server:  new connection from ('127.0.0.1', 45262) server: connection cipher is now ('ECDHE-PSK-CHACHA20-POLY1305', 'TLSv1.2', 256)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLEOFError: [SSL: UNEXPECTED_EOF_WHILE_READING] EOF occurred in violation of protocol (_ssl.c:1032)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: TLSV1_ALERT_UNKNOWN_CA] tlsv1 alert unknown ca (_ssl.c:1032) server:  new connection from ('127.0.0.1', 40022) server: connection cipher is now ('TLS_AES_256_GCM_SHA384', 'TLSv1.3', 256)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: SSLV3_ALERT_BAD_CERTIFICATE] sslv3 alert bad certificate (_ssl.c:1032) connection timeout TimeoutError('timed out')kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2326, in run    msg=self.read()~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2303, in readreturnself.sslconn.read()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1132, in readreturnself._sslobj.read(len)~~~~~~~~~~~~~~~~~^^^^^ ssl.SSLError: [SSL: PEER_DID_NOT_RETURN_A_CERTIFICATE] peer did not return a certificate (_ssl.c:2592)TLS:(<ssl.SSLSocket fd=4, family=2, type=1, proto=0, laddr=('127.0.0.1', 38146)>, 'read', <TLSVersion.TLSv1_3: 772>, <_TLSContentType.ALERT: 21>, <_TLSAlertType.CERTIFICATE_REQUIRED: 116>, b'\x02t')kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2326, in run    msg=self.read()~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2303, in readreturnself.sslconn.read()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1132, in readreturnself._sslobj.read(len)~~~~~~~~~~~~~~~~~^^^^^ ssl.SSLError: [SSL: PEER_DID_NOT_RETURN_A_CERTIFICATE] peer did not return a certificate (_ssl.c:2592)TLS:(<ssl.SSLSocket fd=4, family=2, type=1, proto=0, laddr=('127.0.0.1', 37864)>, 'read', <TLSVersion.TLSv1_3: 772>, <_TLSContentType.ALERT: 21>, <_TLSAlertType.CERTIFICATE_REQUIRED: 116>, b'\x02t')kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: TLSV1_ALERT_UNKNOWN_CA] tlsv1 alert unknown ca (_ssl.c:1032) server:  new connection from ('127.0.0.1', 34476) server: connection cipher is now ('TLS_AES_256_GCM_SHA384', 'TLSv1.3', 256)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: TLSV1_ALERT_UNKNOWN_CA] tlsv1 alert unknown ca (_ssl.c:1032) server:  new connection from ('127.0.0.1', 39488) server: connection cipher is now ('TLS_AES_256_GCM_SHA384', 'TLSv1.3', 256)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: TLSV1_ALERT_UNKNOWN_CA] tlsv1 alert unknown ca (_ssl.c:1032) server:  new connection from ('127.0.0.1', 36086) server: connection cipher is now ('TLS_AES_256_GCM_SHA384', 'TLSv1.3', 256)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2396, in runself.write(msg.lower())~~~~~~~~~~^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2309, in writereturnself.sslconn.write(bytes)~~~~~~~~~~~~~~~~~~^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1149, in writereturnself._sslobj.write(data)~~~~~~~~~~~~~~~~~~^^^^^^ ssl.SSLEOFError: EOF occurred in violation of protocol (_ssl.c:2439)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: DECRYPTION_FAILED_OR_BAD_RECORD_MAC] decryption failed or bad record mac (_ssl.c:1032) server:  new connection from ('127.0.0.1', 45372) server: connection cipher is now ('ECDHE-PSK-CHACHA20-POLY1305', 'TLSv1.2', 256) server:  new connection from ('127.0.0.1', 53690) server: connection cipher is now ('ECDHE-PSK-CHACHA20-POLY1305', 'TLSv1.2', 256)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2326, in run    msg=self.read()~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2303, in readreturnself.sslconn.read()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1132, in readreturnself._sslobj.read(len)~~~~~~~~~~~~~~~~~^^^^^ ssl.SSLError: [SSL: PEER_DID_NOT_RETURN_A_CERTIFICATE] peer did not return a certificate (_ssl.c:2592)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: DECRYPTION_FAILED_OR_BAD_RECORD_MAC] decryption failed or bad record mac (_ssl.c:1032) server:  new connection from ('127.0.0.1', 44652) server: connection cipher is now ('ECDHE-PSK-CHACHA20-POLY1305', 'TLSv1.2', 256) server:  new connection from ('127.0.0.1', 58722) server: connection cipher is now ('ECDHE-PSK-CHACHA20-POLY1305', 'TLSv1.2', 256)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: DECRYPTION_FAILED_OR_BAD_RECORD_MAC] decryption failed or bad record mac (_ssl.c:1032) server:  new connection from ('127.0.0.1', 53698) server: connection cipher is now ('ECDHE-PSK-CHACHA20-POLY1305', 'TLSv1.2', 256) server:  new connection from ('127.0.0.1', 46830) server: connection cipher is now ('ECDHE-PSK-CHACHA20-POLY1305', 'TLSv1.2', 256)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: TLSV1_ALERT_UNKNOWN_CA] tlsv1 alert unknown ca (_ssl.c:1032) server:  new connection from ('127.0.0.1', 48144) server: connection cipher is now ('TLS_AES_256_GCM_SHA384', 'TLSv1.3', 256)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: TLSV1_ALERT_UNKNOWN_CA] tlsv1 alert unknown ca (_ssl.c:1032) server:  new connection from ('127.0.0.1', 53976) server: connection cipher is now ('TLS_AES_256_GCM_SHA384', 'TLSv1.3', 256)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2326, in run    msg=self.read()~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2303, in readreturnself.sslconn.read()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1132, in readreturnself._sslobj.read(len)~~~~~~~~~~~~~~~~~^^^^^ ssl.SSLError: [SSL: PEER_DID_NOT_RETURN_A_CERTIFICATE] peer did not return a certificate (_ssl.c:2592)TLS:(<ssl.SSLSocket fd=4, family=2, type=1, proto=0, laddr=('127.0.0.1', 55210)>, 'read', <TLSVersion.TLSv1_3: 772>, <_TLSContentType.ALERT: 21>, <_TLSAlertType.CERTIFICATE_REQUIRED: 116>, b'\x02t')kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: DECRYPTION_FAILED_OR_BAD_RECORD_MAC] decryption failed or bad record mac (_ssl.c:1032) server:  new connection from ('127.0.0.1', 54396) server: connection cipher is now ('ECDHE-PSK-CHACHA20-POLY1305', 'TLSv1.2', 256) server:  new connection from ('127.0.0.1', 48032) server: connection cipher is now ('ECDHE-PSK-CHACHA20-POLY1305', 'TLSv1.2', 256)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2326, in run    msg=self.read()~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2303, in readreturnself.sslconn.read()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1132, in readreturnself._sslobj.read(len)~~~~~~~~~~~~~~~~~^^^^^ ssl.SSLError: [SSL: PEER_DID_NOT_RETURN_A_CERTIFICATE] peer did not return a certificate (_ssl.c:2592)TLS:(<ssl.SSLSocket fd=4, family=2, type=1, proto=0, laddr=('127.0.0.1', 34188)>, 'read', <TLSVersion.TLSv1_3: 772>, <_TLSContentType.ALERT: 21>, <_TLSAlertType.CERTIFICATE_REQUIRED: 116>, b'\x02t')kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: TLSV1_ALERT_UNKNOWN_CA] tlsv1 alert unknown ca (_ssl.c:1032)[SSL:CERTIFICATE_VERIFY_FAILED] certificate verify failed: unable to get local issuer certificate (_ssl.c:1032)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: DECRYPTION_FAILED_OR_BAD_RECORD_MAC] decryption failed or bad record mac (_ssl.c:1032) server:  new connection from ('127.0.0.1', 40044) server: connection cipher is now ('ECDHE-PSK-CHACHA20-POLY1305', 'TLSv1.2', 256) server:  new connection from ('127.0.0.1', 60028) server: connection cipher is now ('ECDHE-PSK-CHACHA20-POLY1305', 'TLSv1.2', 256)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: DECRYPTION_FAILED_OR_BAD_RECORD_MAC] decryption failed or bad record mac (_ssl.c:1032) server:  new connection from ('127.0.0.1', 58058) server: connection cipher is now ('ECDHE-PSK-CHACHA20-POLY1305', 'TLSv1.2', 256) server:  new connection from ('127.0.0.1', 56822) server: connection cipher is now ('ECDHE-PSK-CHACHA20-POLY1305', 'TLSv1.2', 256)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: DECRYPTION_FAILED_OR_BAD_RECORD_MAC] decryption failed or bad record mac (_ssl.c:1032) server:  new connection from ('127.0.0.1', 36198) server: connection cipher is now ('ECDHE-PSK-CHACHA20-POLY1305', 'TLSv1.2', 256) server:  new connection from ('127.0.0.1', 59286) server: connection cipher is now ('ECDHE-PSK-CHACHA20-POLY1305', 'TLSv1.2', 256)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: TLSV1_ALERT_UNKNOWN_CA] tlsv1 alert unknown ca (_ssl.c:1032) server:  new connection from ('127.0.0.1', 47254) server: connection cipher is now ('TLS_AES_256_GCM_SHA384', 'TLSv1.3', 256)kTraceback (most recent call last):   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/test/test_ssl.py", line 2241, in wrap_connself.sslconn=self.server.context.wrap_socket(~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~^self.sock, server_side=True)^^^^^^^^^^^^^^^^^^^^^^^^^^^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 455, in wrap_socketreturnself.sslsocket_class._create(~~~~~~~~~~~~~~~~~~~~~~~~~~~~^        sock=sock,^^^^^^^^^^...<5 lines>...        session=session^^^^^^^^^^^^^^^    )^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1071, in _createself.do_handshake()~~~~~~~~~~~~~~~~~^^   File "/home/ubuntu/buildarea/3.x.itamaro-ubuntu-aws.refleak.nogil/build/Lib/ssl.py", line 1354, in do_handshakeself._sslobj.do_handshake()~~~~~~~~~~~~~~~~~~~~~~~~~^^ ssl.SSLError: [SSL: DECRYPTION_FAILED_OR_BAD_RECORD_MAC] decryption failed or bad record mac (_ssl.c:1032) server:  new connection from ('127.0.0.1', 33390) server: connection cipher is now ('ECDHE-PSK-CHACHA20-POLY1305', 'TLSv1.2', 256) server:  new connection from ('127.0.0.1', 43742) server: connection cipher is now ('ECDHE-PSK-CHACHA20-POLY1305', 'TLSv1.2', 256)k

@markshannonmarkshannon deleted the globals-to-constants branchFebruary 2, 2024 13:56
@brandtbucher
Copy link
Member

Just curious: why is the error optimizer being called now?

@markshannon
Copy link
MemberAuthor

Just curious: why is the error optimizer being called now?

Maybe we aren't updating a threshold when we change the optimizer?
It seems benign, and will be changed by#114142 so I don't think it's a concern.

mdboom pushed a commit to mdboom/cpython that referenced this pull requestFeb 7, 2024
Converts specializations of `LOAD_GLOBAL` into constants during tier 2 optimization.
aisk pushed a commit to aisk/cpython that referenced this pull requestFeb 11, 2024
Converts specializations of `LOAD_GLOBAL` into constants during tier 2 optimization.
fsc-eriker pushed a commit to fsc-eriker/cpython that referenced this pull requestFeb 14, 2024
Converts specializations of `LOAD_GLOBAL` into constants during tier 2 optimization.
Sign up for freeto join this conversation on GitHub. Already have an account?Sign in to comment

Reviewers

@mdboommdboommdboom left review comments

@carljmcarljmcarljm left review comments

@Fidget-SpinnerFidget-SpinnerFidget-Spinner left review comments

@gvanrossumgvanrossumgvanrossum approved these changes

@methanemethaneAwaiting requested review from methanemethane is a code owner

@ericsnowcurrentlyericsnowcurrentlyAwaiting requested review from ericsnowcurrentlyericsnowcurrently is a code owner

Assignees

No one assigned

Labels

Projects

None yet

Milestone

No milestone

Development

Successfully merging this pull request may close these issues.

7 participants

@markshannon@gvanrossum@Fidget-Spinner@brandtbucher@bedevere-bot@mdboom@carljm

[8]ページ先頭

©2009-2025 Movatter.jp