2009-03-30 13:32:28 +00:00
|
|
|
// Copyright 2009 the V8 project authors. All rights reserved.
|
2008-07-03 15:10:15 +00:00
|
|
|
// Redistribution and use in source and binary forms, with or without
|
|
|
|
// modification, are permitted provided that the following conditions are
|
|
|
|
// met:
|
|
|
|
//
|
|
|
|
// * Redistributions of source code must retain the above copyright
|
|
|
|
// notice, this list of conditions and the following disclaimer.
|
|
|
|
// * Redistributions in binary form must reproduce the above
|
|
|
|
// copyright notice, this list of conditions and the following
|
|
|
|
// disclaimer in the documentation and/or other materials provided
|
|
|
|
// with the distribution.
|
|
|
|
// * Neither the name of Google Inc. nor the names of its
|
|
|
|
// contributors may be used to endorse or promote products derived
|
|
|
|
// from this software without specific prior written permission.
|
|
|
|
//
|
|
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
|
|
// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
|
|
// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
|
|
|
// A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
|
|
// OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
|
|
// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
// DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
// THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
|
|
// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
|
|
|
|
#include "v8.h"
|
|
|
|
|
|
|
|
#include "accessors.h"
|
|
|
|
#include "api.h"
|
2009-09-30 12:25:46 +00:00
|
|
|
#include "arguments.h"
|
2008-07-03 15:10:15 +00:00
|
|
|
#include "bootstrapper.h"
|
2010-01-29 11:55:40 +00:00
|
|
|
#include "codegen.h"
|
2008-07-03 15:10:15 +00:00
|
|
|
#include "compiler.h"
|
|
|
|
#include "debug.h"
|
|
|
|
#include "execution.h"
|
|
|
|
#include "global-handles.h"
|
|
|
|
#include "natives.h"
|
|
|
|
#include "runtime.h"
|
2009-11-04 17:59:24 +00:00
|
|
|
#include "stub-cache.h"
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2009-05-25 10:05:56 +00:00
|
|
|
namespace v8 {
|
|
|
|
namespace internal {
|
2008-07-03 15:10:15 +00:00
|
|
|
|
|
|
|
|
2009-01-23 17:22:23 +00:00
|
|
|
v8::ImplementationUtilities::HandleScopeData HandleScope::current_ =
|
|
|
|
{ -1, NULL, NULL };
|
|
|
|
|
|
|
|
|
|
|
|
int HandleScope::NumberOfHandles() {
|
2009-09-28 12:25:21 +00:00
|
|
|
int n = HandleScopeImplementer::instance()->blocks()->length();
|
2009-01-23 17:22:23 +00:00
|
|
|
if (n == 0) return 0;
|
2009-11-11 09:50:06 +00:00
|
|
|
return ((n - 1) * kHandleBlockSize) + static_cast<int>(
|
|
|
|
(current_.next - HandleScopeImplementer::instance()->blocks()->last()));
|
2009-01-23 17:22:23 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-08-26 10:33:11 +00:00
|
|
|
Object** HandleScope::Extend() {
|
|
|
|
Object** result = current_.next;
|
2009-01-23 17:22:23 +00:00
|
|
|
|
2009-03-18 18:50:35 +00:00
|
|
|
ASSERT(result == current_.limit);
|
|
|
|
// Make sure there's at least one scope on the stack and that the
|
|
|
|
// top of the scope stack isn't a barrier.
|
|
|
|
if (current_.extensions < 0) {
|
|
|
|
Utils::ReportApiFailure("v8::HandleScope::CreateHandle()",
|
|
|
|
"Cannot create a handle without a HandleScope");
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
HandleScopeImplementer* impl = HandleScopeImplementer::instance();
|
|
|
|
// If there's more room in the last block, we use that. This is used
|
|
|
|
// for fast creation of scopes after scope barriers.
|
2009-09-28 12:25:21 +00:00
|
|
|
if (!impl->blocks()->is_empty()) {
|
|
|
|
Object** limit = &impl->blocks()->last()[kHandleBlockSize];
|
2009-03-18 18:50:35 +00:00
|
|
|
if (current_.limit != limit) {
|
|
|
|
current_.limit = limit;
|
2009-01-23 17:22:23 +00:00
|
|
|
}
|
|
|
|
}
|
2009-03-18 21:14:46 +00:00
|
|
|
|
2009-03-18 18:50:35 +00:00
|
|
|
// If we still haven't found a slot for the handle, we extend the
|
|
|
|
// current handle scope by allocating a new handle block.
|
|
|
|
if (result == current_.limit) {
|
|
|
|
// If there's a spare block, use it for growing the current scope.
|
|
|
|
result = impl->GetSpareOrNewBlock();
|
|
|
|
// Add the extension to the global list of blocks, but count the
|
|
|
|
// extension as part of the current scope.
|
2009-09-28 12:25:21 +00:00
|
|
|
impl->blocks()->Add(result);
|
2009-03-18 18:50:35 +00:00
|
|
|
current_.extensions++;
|
|
|
|
current_.limit = &result[kHandleBlockSize];
|
|
|
|
}
|
2009-01-23 17:22:23 +00:00
|
|
|
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void HandleScope::DeleteExtensions() {
|
|
|
|
ASSERT(current_.extensions != 0);
|
|
|
|
HandleScopeImplementer::instance()->DeleteExtensions(current_.extensions);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-08-26 10:33:11 +00:00
|
|
|
void HandleScope::ZapRange(Object** start, Object** end) {
|
2009-01-23 17:22:23 +00:00
|
|
|
if (start == NULL) return;
|
2009-08-26 10:33:11 +00:00
|
|
|
for (Object** p = start; p < end; p++) {
|
|
|
|
*reinterpret_cast<Address*>(p) = v8::internal::kHandleZapValue;
|
2009-01-23 17:22:23 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-11-04 08:51:48 +00:00
|
|
|
Address HandleScope::current_extensions_address() {
|
|
|
|
return reinterpret_cast<Address>(¤t_.extensions);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Address HandleScope::current_next_address() {
|
|
|
|
return reinterpret_cast<Address>(¤t_.next);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Address HandleScope::current_limit_address() {
|
|
|
|
return reinterpret_cast<Address>(¤t_.limit);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-07-03 15:10:15 +00:00
|
|
|
Handle<FixedArray> AddKeysFromJSArray(Handle<FixedArray> content,
|
|
|
|
Handle<JSArray> array) {
|
|
|
|
CALL_HEAP_FUNCTION(content->AddKeysFromJSArray(*array), FixedArray);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Handle<FixedArray> UnionOfKeys(Handle<FixedArray> first,
|
|
|
|
Handle<FixedArray> second) {
|
|
|
|
CALL_HEAP_FUNCTION(first->UnionOfKeys(*second), FixedArray);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
Handle<JSGlobalProxy> ReinitializeJSGlobalProxy(
|
2008-07-03 15:10:15 +00:00
|
|
|
Handle<JSFunction> constructor,
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
Handle<JSGlobalProxy> global) {
|
|
|
|
CALL_HEAP_FUNCTION(Heap::ReinitializeJSGlobalProxy(*constructor, *global),
|
|
|
|
JSGlobalProxy);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void SetExpectedNofProperties(Handle<JSFunction> func, int nof) {
|
|
|
|
func->shared()->set_expected_nof_properties(nof);
|
|
|
|
if (func->has_initial_map()) {
|
|
|
|
Handle<Map> new_initial_map =
|
2008-08-27 13:47:52 +00:00
|
|
|
Factory::CopyMapDropTransitions(Handle<Map>(func->initial_map()));
|
2008-07-03 15:10:15 +00:00
|
|
|
new_initial_map->set_unused_property_fields(nof);
|
|
|
|
func->set_initial_map(*new_initial_map);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void SetPrototypeProperty(Handle<JSFunction> func, Handle<JSObject> value) {
|
|
|
|
CALL_HEAP_FUNCTION_VOID(func->SetPrototype(*value));
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-10-03 09:16:12 +00:00
|
|
|
static int ExpectedNofPropertiesFromEstimate(int estimate) {
|
2008-07-03 15:10:15 +00:00
|
|
|
// TODO(1231235): We need dynamic feedback to estimate the number
|
|
|
|
// of expected properties in an object. The static hack below
|
|
|
|
// is barely a solution.
|
2008-10-03 09:16:12 +00:00
|
|
|
if (estimate == 0) return 4;
|
|
|
|
return estimate + 2;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void SetExpectedNofPropertiesFromEstimate(Handle<SharedFunctionInfo> shared,
|
|
|
|
int estimate) {
|
|
|
|
shared->set_expected_nof_properties(
|
|
|
|
ExpectedNofPropertiesFromEstimate(estimate));
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-01-12 10:59:58 +00:00
|
|
|
void NormalizeProperties(Handle<JSObject> object,
|
2009-07-30 09:13:48 +00:00
|
|
|
PropertyNormalizationMode mode,
|
|
|
|
int expected_additional_properties) {
|
|
|
|
CALL_HEAP_FUNCTION_VOID(object->NormalizeProperties(
|
|
|
|
mode,
|
|
|
|
expected_additional_properties));
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void NormalizeElements(Handle<JSObject> object) {
|
|
|
|
CALL_HEAP_FUNCTION_VOID(object->NormalizeElements());
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void TransformToFastProperties(Handle<JSObject> object,
|
|
|
|
int unused_property_fields) {
|
|
|
|
CALL_HEAP_FUNCTION_VOID(
|
|
|
|
object->TransformToFastProperties(unused_property_fields));
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void FlattenString(Handle<String> string) {
|
2010-02-26 14:37:33 +00:00
|
|
|
CALL_HEAP_FUNCTION_VOID(string->TryFlatten());
|
2009-03-17 09:33:06 +00:00
|
|
|
ASSERT(string->IsFlat());
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Handle<Object> SetPrototype(Handle<JSFunction> function,
|
|
|
|
Handle<Object> prototype) {
|
|
|
|
CALL_HEAP_FUNCTION(Accessors::FunctionSetPrototype(*function,
|
|
|
|
*prototype,
|
|
|
|
NULL),
|
|
|
|
Object);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Handle<Object> SetProperty(Handle<JSObject> object,
|
|
|
|
Handle<String> key,
|
|
|
|
Handle<Object> value,
|
|
|
|
PropertyAttributes attributes) {
|
|
|
|
CALL_HEAP_FUNCTION(object->SetProperty(*key, *value, attributes), Object);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Handle<Object> SetProperty(Handle<Object> object,
|
|
|
|
Handle<Object> key,
|
|
|
|
Handle<Object> value,
|
|
|
|
PropertyAttributes attributes) {
|
2008-10-02 13:45:21 +00:00
|
|
|
CALL_HEAP_FUNCTION(
|
|
|
|
Runtime::SetObjectProperty(object, key, value, attributes), Object);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-04-21 13:28:11 +00:00
|
|
|
Handle<Object> ForceSetProperty(Handle<JSObject> object,
|
|
|
|
Handle<Object> key,
|
|
|
|
Handle<Object> value,
|
|
|
|
PropertyAttributes attributes) {
|
|
|
|
CALL_HEAP_FUNCTION(
|
|
|
|
Runtime::ForceSetObjectProperty(object, key, value, attributes), Object);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-03-23 11:40:38 +00:00
|
|
|
Handle<Object> SetNormalizedProperty(Handle<JSObject> object,
|
|
|
|
Handle<String> key,
|
|
|
|
Handle<Object> value,
|
|
|
|
PropertyDetails details) {
|
|
|
|
CALL_HEAP_FUNCTION(object->SetNormalizedProperty(*key, *value, details),
|
|
|
|
Object);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-06-08 09:46:09 +00:00
|
|
|
Handle<Object> ForceDeleteProperty(Handle<JSObject> object,
|
|
|
|
Handle<Object> key) {
|
|
|
|
CALL_HEAP_FUNCTION(Runtime::ForceDeleteObjectProperty(object, key), Object);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-04-16 12:58:14 +00:00
|
|
|
Handle<Object> IgnoreAttributesAndSetLocalProperty(
|
|
|
|
Handle<JSObject> object,
|
|
|
|
Handle<String> key,
|
|
|
|
Handle<Object> value,
|
|
|
|
PropertyAttributes attributes) {
|
2008-10-02 13:45:21 +00:00
|
|
|
CALL_HEAP_FUNCTION(object->
|
|
|
|
IgnoreAttributesAndSetLocalProperty(*key, *value, attributes), Object);
|
|
|
|
}
|
|
|
|
|
2009-06-08 09:46:09 +00:00
|
|
|
|
2008-07-03 15:10:15 +00:00
|
|
|
Handle<Object> SetPropertyWithInterceptor(Handle<JSObject> object,
|
|
|
|
Handle<String> key,
|
|
|
|
Handle<Object> value,
|
|
|
|
PropertyAttributes attributes) {
|
|
|
|
CALL_HEAP_FUNCTION(object->SetPropertyWithInterceptor(*key,
|
|
|
|
*value,
|
|
|
|
attributes),
|
|
|
|
Object);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Handle<Object> GetProperty(Handle<JSObject> obj,
|
|
|
|
const char* name) {
|
|
|
|
Handle<String> str = Factory::LookupAsciiSymbol(name);
|
|
|
|
CALL_HEAP_FUNCTION(obj->GetProperty(*str), Object);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Handle<Object> GetProperty(Handle<Object> obj,
|
|
|
|
Handle<Object> key) {
|
2008-08-28 09:55:41 +00:00
|
|
|
CALL_HEAP_FUNCTION(Runtime::GetObjectProperty(obj, key), Object);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-03-02 18:47:03 +00:00
|
|
|
Handle<Object> GetElement(Handle<Object> obj,
|
|
|
|
uint32_t index) {
|
|
|
|
CALL_HEAP_FUNCTION(Runtime::GetElement(obj, index), Object);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-07-03 15:10:15 +00:00
|
|
|
Handle<Object> GetPropertyWithInterceptor(Handle<JSObject> receiver,
|
|
|
|
Handle<JSObject> holder,
|
|
|
|
Handle<String> name,
|
|
|
|
PropertyAttributes* attributes) {
|
|
|
|
CALL_HEAP_FUNCTION(holder->GetPropertyWithInterceptor(*receiver,
|
|
|
|
*name,
|
|
|
|
attributes),
|
|
|
|
Object);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Handle<Object> GetPrototype(Handle<Object> obj) {
|
|
|
|
Handle<Object> result(obj->GetPrototype());
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-02-10 14:44:15 +00:00
|
|
|
Handle<Object> SetPrototype(Handle<JSObject> obj, Handle<Object> value) {
|
|
|
|
const bool skip_hidden_prototypes = false;
|
|
|
|
CALL_HEAP_FUNCTION(obj->SetPrototype(*value, skip_hidden_prototypes), Object);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-03-19 18:50:00 +00:00
|
|
|
Handle<Object> GetHiddenProperties(Handle<JSObject> obj,
|
|
|
|
bool create_if_needed) {
|
2009-11-12 16:34:52 +00:00
|
|
|
Object* holder = obj->BypassGlobalProxy();
|
|
|
|
if (holder->IsUndefined()) return Factory::undefined_value();
|
|
|
|
obj = Handle<JSObject>(JSObject::cast(holder));
|
2009-05-12 22:07:10 +00:00
|
|
|
|
|
|
|
if (obj->HasFastProperties()) {
|
|
|
|
// If the object has fast properties, check whether the first slot
|
|
|
|
// in the descriptor array matches the hidden symbol. Since the
|
|
|
|
// hidden symbols hash code is zero (and no other string has hash
|
|
|
|
// code zero) it will always occupy the first entry if present.
|
|
|
|
DescriptorArray* descriptors = obj->map()->instance_descriptors();
|
2009-07-10 19:25:18 +00:00
|
|
|
if ((descriptors->number_of_descriptors() > 0) &&
|
2009-11-12 16:34:52 +00:00
|
|
|
(descriptors->GetKey(0) == Heap::hidden_symbol()) &&
|
2009-07-10 19:25:18 +00:00
|
|
|
descriptors->IsProperty(0)) {
|
|
|
|
ASSERT(descriptors->GetType(0) == FIELD);
|
|
|
|
return Handle<Object>(obj->FastPropertyAt(descriptors->GetFieldIndex(0)));
|
2009-05-12 22:07:10 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Only attempt to find the hidden properties in the local object and not
|
|
|
|
// in the prototype chain. Note that HasLocalProperty() can cause a GC in
|
|
|
|
// the general case in the presence of interceptors.
|
2009-11-12 16:34:52 +00:00
|
|
|
if (!obj->HasHiddenPropertiesObject()) {
|
2009-05-12 22:07:10 +00:00
|
|
|
// Hidden properties object not found. Allocate a new hidden properties
|
|
|
|
// object if requested. Otherwise return the undefined value.
|
|
|
|
if (create_if_needed) {
|
|
|
|
Handle<Object> hidden_obj = Factory::NewJSObject(Top::object_function());
|
2009-11-18 00:09:28 +00:00
|
|
|
CALL_HEAP_FUNCTION(obj->SetHiddenPropertiesObject(*hidden_obj), Object);
|
2009-05-12 22:07:10 +00:00
|
|
|
} else {
|
|
|
|
return Factory::undefined_value();
|
|
|
|
}
|
|
|
|
}
|
2009-11-12 16:34:52 +00:00
|
|
|
return Handle<Object>(obj->GetHiddenPropertiesObject());
|
2009-03-19 18:50:00 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-07-03 15:10:15 +00:00
|
|
|
Handle<Object> DeleteElement(Handle<JSObject> obj,
|
|
|
|
uint32_t index) {
|
2009-06-08 09:46:09 +00:00
|
|
|
CALL_HEAP_FUNCTION(obj->DeleteElement(index, JSObject::NORMAL_DELETION),
|
|
|
|
Object);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Handle<Object> DeleteProperty(Handle<JSObject> obj,
|
|
|
|
Handle<String> prop) {
|
2009-06-08 09:46:09 +00:00
|
|
|
CALL_HEAP_FUNCTION(obj->DeleteProperty(*prop, JSObject::NORMAL_DELETION),
|
|
|
|
Object);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-08-29 08:48:06 +00:00
|
|
|
Handle<Object> LookupSingleCharacterStringFromCode(uint32_t index) {
|
|
|
|
CALL_HEAP_FUNCTION(Heap::LookupSingleCharacterStringFromCode(index), Object);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-02-26 14:37:33 +00:00
|
|
|
Handle<String> SubString(Handle<String> str,
|
|
|
|
int start,
|
|
|
|
int end,
|
|
|
|
PretenureFlag pretenure) {
|
|
|
|
CALL_HEAP_FUNCTION(str->SubString(start, end, pretenure), String);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Handle<Object> SetElement(Handle<JSObject> object,
|
|
|
|
uint32_t index,
|
|
|
|
Handle<Object> value) {
|
2009-10-20 15:26:17 +00:00
|
|
|
if (object->HasPixelElements() || object->HasExternalArrayElements()) {
|
2009-07-28 08:43:51 +00:00
|
|
|
if (!value->IsSmi() && !value->IsHeapNumber() && !value->IsUndefined()) {
|
|
|
|
bool has_exception;
|
|
|
|
Handle<Object> number = Execution::ToNumber(value, &has_exception);
|
|
|
|
if (has_exception) return Handle<Object>();
|
|
|
|
value = number;
|
|
|
|
}
|
|
|
|
}
|
2008-08-28 09:55:41 +00:00
|
|
|
CALL_HEAP_FUNCTION(object->SetElement(index, *value), Object);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-10-22 08:21:18 +00:00
|
|
|
Handle<JSObject> Copy(Handle<JSObject> obj) {
|
|
|
|
CALL_HEAP_FUNCTION(Heap::CopyJSObject(*obj), JSObject);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// Wrappers for scripts are kept alive and cached in weak global
|
|
|
|
// handles referred from proxy objects held by the scripts as long as
|
|
|
|
// they are used. When they are not used anymore, the garbage
|
|
|
|
// collector will call the weak callback on the global handle
|
|
|
|
// associated with the wrapper and get rid of both the wrapper and the
|
|
|
|
// handle.
|
2008-10-23 08:25:23 +00:00
|
|
|
static void ClearWrapperCache(Persistent<v8::Value> handle, void*) {
|
2009-03-30 13:32:28 +00:00
|
|
|
#ifdef ENABLE_HEAP_PROTECTION
|
|
|
|
// Weak reference callbacks are called as if from outside V8. We
|
|
|
|
// need to reeenter to unprotect the heap.
|
|
|
|
VMState state(OTHER);
|
|
|
|
#endif
|
2008-07-03 15:10:15 +00:00
|
|
|
Handle<Object> cache = Utils::OpenHandle(*handle);
|
|
|
|
JSValue* wrapper = JSValue::cast(*cache);
|
|
|
|
Proxy* proxy = Script::cast(wrapper->value())->wrapper();
|
|
|
|
ASSERT(proxy->proxy() == reinterpret_cast<Address>(cache.location()));
|
|
|
|
proxy->set_proxy(0);
|
|
|
|
GlobalHandles::Destroy(cache.location());
|
|
|
|
Counters::script_wrappers.Decrement();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Handle<JSValue> GetScriptWrapper(Handle<Script> script) {
|
2009-07-07 11:41:21 +00:00
|
|
|
if (script->wrapper()->proxy() != NULL) {
|
2008-07-03 15:10:15 +00:00
|
|
|
// Return the script wrapper directly from the cache.
|
2009-07-07 11:41:21 +00:00
|
|
|
return Handle<JSValue>(
|
|
|
|
reinterpret_cast<JSValue**>(script->wrapper()->proxy()));
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Construct a new script wrapper.
|
|
|
|
Counters::script_wrappers.Increment();
|
|
|
|
Handle<JSFunction> constructor = Top::script_function();
|
|
|
|
Handle<JSValue> result =
|
|
|
|
Handle<JSValue>::cast(Factory::NewJSObject(constructor));
|
|
|
|
result->set_value(*script);
|
|
|
|
|
|
|
|
// Create a new weak global handle and use it to cache the wrapper
|
|
|
|
// for future use. The cache will automatically be cleared by the
|
|
|
|
// garbage collector when it is not used anymore.
|
|
|
|
Handle<Object> handle = GlobalHandles::Create(*result);
|
|
|
|
GlobalHandles::MakeWeak(handle.location(), NULL, &ClearWrapperCache);
|
|
|
|
script->wrapper()->set_proxy(reinterpret_cast<Address>(handle.location()));
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-03-10 15:08:45 +00:00
|
|
|
// Init line_ends array with code positions of line ends inside script
|
|
|
|
// source.
|
|
|
|
void InitScriptLineEnds(Handle<Script> script) {
|
2009-11-27 14:10:48 +00:00
|
|
|
if (!script->line_ends()->IsUndefined()) return;
|
2009-03-10 15:08:45 +00:00
|
|
|
|
|
|
|
if (!script->source()->IsString()) {
|
|
|
|
ASSERT(script->source()->IsUndefined());
|
2009-11-27 14:10:48 +00:00
|
|
|
script->set_line_ends(*(Factory::NewFixedArray(0)));
|
|
|
|
ASSERT(script->line_ends()->IsFixedArray());
|
2009-03-10 15:08:45 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
Handle<String> src(String::cast(script->source()));
|
|
|
|
const int src_len = src->length();
|
|
|
|
Handle<String> new_line = Factory::NewStringFromAscii(CStrVector("\n"));
|
|
|
|
|
|
|
|
// Pass 1: Identify line count.
|
|
|
|
int line_count = 0;
|
|
|
|
int position = 0;
|
|
|
|
while (position != -1 && position < src_len) {
|
|
|
|
position = Runtime::StringMatch(src, new_line, position);
|
|
|
|
if (position != -1) {
|
|
|
|
position++;
|
|
|
|
}
|
|
|
|
// Even if the last line misses a line end, it is counted.
|
|
|
|
line_count++;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Pass 2: Fill in line ends positions
|
|
|
|
Handle<FixedArray> array = Factory::NewFixedArray(line_count);
|
|
|
|
int array_index = 0;
|
|
|
|
position = 0;
|
|
|
|
while (position != -1 && position < src_len) {
|
|
|
|
position = Runtime::StringMatch(src, new_line, position);
|
|
|
|
// If the script does not end with a line ending add the final end
|
|
|
|
// position as just past the last line ending.
|
|
|
|
array->set(array_index++,
|
|
|
|
Smi::FromInt(position != -1 ? position++ : src_len));
|
|
|
|
}
|
|
|
|
ASSERT(array_index == line_count);
|
|
|
|
|
2009-11-27 14:10:48 +00:00
|
|
|
script->set_line_ends(*array);
|
|
|
|
ASSERT(script->line_ends()->IsFixedArray());
|
2009-03-10 15:08:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// Convert code position into line number.
|
|
|
|
int GetScriptLineNumber(Handle<Script> script, int code_pos) {
|
|
|
|
InitScriptLineEnds(script);
|
|
|
|
AssertNoAllocation no_allocation;
|
2010-02-16 12:08:10 +00:00
|
|
|
FixedArray* line_ends_array = FixedArray::cast(script->line_ends());
|
2009-11-11 09:19:39 +00:00
|
|
|
const int line_ends_len = line_ends_array->length();
|
2009-03-10 15:08:45 +00:00
|
|
|
|
2010-02-16 12:08:10 +00:00
|
|
|
if (!line_ends_len)
|
|
|
|
return -1;
|
|
|
|
|
2010-02-16 13:01:05 +00:00
|
|
|
if ((Smi::cast(line_ends_array->get(0)))->value() >= code_pos)
|
2010-02-16 12:08:10 +00:00
|
|
|
return script->line_offset()->value();
|
|
|
|
|
|
|
|
int left = 0;
|
|
|
|
int right = line_ends_len;
|
|
|
|
while (int half = (right - left) / 2) {
|
|
|
|
if ((Smi::cast(line_ends_array->get(left + half)))->value() > code_pos) {
|
|
|
|
right -= half;
|
|
|
|
} else {
|
|
|
|
left += half;
|
2009-03-10 15:08:45 +00:00
|
|
|
}
|
|
|
|
}
|
2010-02-16 12:08:10 +00:00
|
|
|
return right + script->line_offset()->value();
|
2009-03-10 15:08:45 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-03-18 22:15:54 +00:00
|
|
|
int GetScriptLineNumberSafe(Handle<Script> script, int code_pos) {
|
|
|
|
AssertNoAllocation no_allocation;
|
|
|
|
if (!script->line_ends()->IsUndefined()) {
|
|
|
|
return GetScriptLineNumber(script, code_pos);
|
|
|
|
}
|
|
|
|
// Slow mode: we do not have line_ends. We have to iterate through source.
|
|
|
|
if (!script->source()->IsString()) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
String* source = String::cast(script->source());
|
|
|
|
int line = 0;
|
|
|
|
int len = source->length();
|
|
|
|
for (int pos = 0; pos < len; pos++) {
|
|
|
|
if (pos == code_pos) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (source->Get(pos) == '\n') {
|
|
|
|
line++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return line;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-09-30 12:25:46 +00:00
|
|
|
void CustomArguments::IterateInstance(ObjectVisitor* v) {
|
|
|
|
v->VisitPointers(values_, values_ + 4);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-07-03 15:10:15 +00:00
|
|
|
// Compute the property keys from the interceptor.
|
|
|
|
v8::Handle<v8::Array> GetKeysForNamedInterceptor(Handle<JSObject> receiver,
|
|
|
|
Handle<JSObject> object) {
|
|
|
|
Handle<InterceptorInfo> interceptor(object->GetNamedInterceptor());
|
2009-09-30 12:25:46 +00:00
|
|
|
CustomArguments args(interceptor->data(), *receiver, *object);
|
|
|
|
v8::AccessorInfo info(args.end());
|
2008-07-03 15:10:15 +00:00
|
|
|
v8::Handle<v8::Array> result;
|
|
|
|
if (!interceptor->enumerator()->IsUndefined()) {
|
|
|
|
v8::NamedPropertyEnumerator enum_fun =
|
|
|
|
v8::ToCData<v8::NamedPropertyEnumerator>(interceptor->enumerator());
|
|
|
|
LOG(ApiObjectAccess("interceptor-named-enum", *object));
|
|
|
|
{
|
|
|
|
// Leaving JavaScript.
|
2009-03-27 12:32:28 +00:00
|
|
|
VMState state(EXTERNAL);
|
2008-07-03 15:10:15 +00:00
|
|
|
result = enum_fun(info);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// Compute the element keys from the interceptor.
|
|
|
|
v8::Handle<v8::Array> GetKeysForIndexedInterceptor(Handle<JSObject> receiver,
|
|
|
|
Handle<JSObject> object) {
|
|
|
|
Handle<InterceptorInfo> interceptor(object->GetIndexedInterceptor());
|
2009-09-30 12:25:46 +00:00
|
|
|
CustomArguments args(interceptor->data(), *receiver, *object);
|
|
|
|
v8::AccessorInfo info(args.end());
|
2008-07-03 15:10:15 +00:00
|
|
|
v8::Handle<v8::Array> result;
|
|
|
|
if (!interceptor->enumerator()->IsUndefined()) {
|
|
|
|
v8::IndexedPropertyEnumerator enum_fun =
|
|
|
|
v8::ToCData<v8::IndexedPropertyEnumerator>(interceptor->enumerator());
|
|
|
|
LOG(ApiObjectAccess("interceptor-indexed-enum", *object));
|
|
|
|
{
|
|
|
|
// Leaving JavaScript.
|
2009-03-27 12:32:28 +00:00
|
|
|
VMState state(EXTERNAL);
|
2008-07-03 15:10:15 +00:00
|
|
|
result = enum_fun(info);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-09-15 11:51:40 +00:00
|
|
|
Handle<FixedArray> GetKeysInFixedArrayFor(Handle<JSObject> object,
|
|
|
|
KeyCollectionType type) {
|
2008-07-03 15:10:15 +00:00
|
|
|
Handle<FixedArray> content = Factory::empty_fixed_array();
|
2009-12-01 10:25:29 +00:00
|
|
|
Handle<JSObject> arguments_boilerplate =
|
|
|
|
Handle<JSObject>(
|
|
|
|
Top::context()->global_context()->arguments_boilerplate());
|
|
|
|
Handle<JSFunction> arguments_function =
|
|
|
|
Handle<JSFunction>(
|
|
|
|
JSFunction::cast(arguments_boilerplate->map()->constructor()));
|
2008-07-03 15:10:15 +00:00
|
|
|
|
|
|
|
// Only collect keys if access is permitted.
|
2009-09-16 08:25:54 +00:00
|
|
|
for (Handle<Object> p = object;
|
|
|
|
*p != Heap::null_value();
|
|
|
|
p = Handle<Object>(p->GetPrototype())) {
|
|
|
|
Handle<JSObject> current(JSObject::cast(*p));
|
|
|
|
|
|
|
|
// Check access rights if required.
|
|
|
|
if (current->IsAccessCheckNeeded() &&
|
|
|
|
!Top::MayNamedAccess(*current, Heap::undefined_value(),
|
|
|
|
v8::ACCESS_KEYS)) {
|
|
|
|
Top::ReportFailedAccessCheck(*current, v8::ACCESS_KEYS);
|
|
|
|
break;
|
|
|
|
}
|
2009-04-16 11:30:55 +00:00
|
|
|
|
2009-09-16 08:25:54 +00:00
|
|
|
// Compute the element keys.
|
|
|
|
Handle<FixedArray> element_keys =
|
|
|
|
Factory::NewFixedArray(current->NumberOfEnumElements());
|
|
|
|
current->GetEnumElementKeys(*element_keys);
|
|
|
|
content = UnionOfKeys(content, element_keys);
|
|
|
|
|
|
|
|
// Add the element keys from the interceptor.
|
|
|
|
if (current->HasIndexedInterceptor()) {
|
|
|
|
v8::Handle<v8::Array> result =
|
|
|
|
GetKeysForIndexedInterceptor(object, current);
|
|
|
|
if (!result.IsEmpty())
|
|
|
|
content = AddKeysFromJSArray(content, v8::Utils::OpenHandle(*result));
|
|
|
|
}
|
2009-04-16 11:30:55 +00:00
|
|
|
|
2009-12-01 10:25:29 +00:00
|
|
|
// We can cache the computed property keys if access checks are
|
|
|
|
// not needed and no interceptors are involved.
|
|
|
|
//
|
|
|
|
// We do not use the cache if the object has elements and
|
|
|
|
// therefore it does not make sense to cache the property names
|
|
|
|
// for arguments objects. Arguments objects will always have
|
|
|
|
// elements.
|
|
|
|
bool cache_enum_keys =
|
|
|
|
((current->map()->constructor() != *arguments_function) &&
|
|
|
|
!current->IsAccessCheckNeeded() &&
|
|
|
|
!current->HasNamedInterceptor() &&
|
|
|
|
!current->HasIndexedInterceptor());
|
|
|
|
// Compute the property keys and cache them if possible.
|
|
|
|
content =
|
|
|
|
UnionOfKeys(content, GetEnumPropertyKeys(current, cache_enum_keys));
|
2009-09-15 11:51:40 +00:00
|
|
|
|
2009-09-16 08:25:54 +00:00
|
|
|
// Add the property keys from the interceptor.
|
|
|
|
if (current->HasNamedInterceptor()) {
|
|
|
|
v8::Handle<v8::Array> result =
|
|
|
|
GetKeysForNamedInterceptor(object, current);
|
|
|
|
if (!result.IsEmpty())
|
|
|
|
content = AddKeysFromJSArray(content, v8::Utils::OpenHandle(*result));
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
2009-09-16 08:25:54 +00:00
|
|
|
|
|
|
|
// If we only want local properties we bail out after the first
|
|
|
|
// iteration.
|
|
|
|
if (type == LOCAL_ONLY)
|
|
|
|
break;
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
return content;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Handle<JSArray> GetKeysFor(Handle<JSObject> object) {
|
|
|
|
Counters::for_in.Increment();
|
2009-09-15 11:51:40 +00:00
|
|
|
Handle<FixedArray> elements = GetKeysInFixedArrayFor(object,
|
|
|
|
INCLUDE_PROTOS);
|
2008-10-09 13:34:17 +00:00
|
|
|
return Factory::NewJSArrayWithElements(elements);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-12-01 10:25:29 +00:00
|
|
|
Handle<FixedArray> GetEnumPropertyKeys(Handle<JSObject> object,
|
|
|
|
bool cache_result) {
|
2008-07-03 15:10:15 +00:00
|
|
|
int index = 0;
|
|
|
|
if (object->HasFastProperties()) {
|
|
|
|
if (object->map()->instance_descriptors()->HasEnumCache()) {
|
|
|
|
Counters::enum_cache_hits.Increment();
|
|
|
|
DescriptorArray* desc = object->map()->instance_descriptors();
|
|
|
|
return Handle<FixedArray>(FixedArray::cast(desc->GetEnumCache()));
|
|
|
|
}
|
|
|
|
Counters::enum_cache_misses.Increment();
|
|
|
|
int num_enum = object->NumberOfEnumProperties();
|
|
|
|
Handle<FixedArray> storage = Factory::NewFixedArray(num_enum);
|
|
|
|
Handle<FixedArray> sort_array = Factory::NewFixedArray(num_enum);
|
2009-07-10 19:25:18 +00:00
|
|
|
Handle<DescriptorArray> descs =
|
|
|
|
Handle<DescriptorArray>(object->map()->instance_descriptors());
|
|
|
|
for (int i = 0; i < descs->number_of_descriptors(); i++) {
|
|
|
|
if (descs->IsProperty(i) && !descs->IsDontEnum(i)) {
|
|
|
|
(*storage)->set(index, descs->GetKey(i));
|
|
|
|
PropertyDetails details(descs->GetDetails(i));
|
|
|
|
(*sort_array)->set(index, Smi::FromInt(details.index()));
|
2008-07-03 15:10:15 +00:00
|
|
|
index++;
|
|
|
|
}
|
|
|
|
}
|
2009-04-16 11:30:55 +00:00
|
|
|
(*storage)->SortPairs(*sort_array, sort_array->length());
|
2009-12-01 10:25:29 +00:00
|
|
|
if (cache_result) {
|
|
|
|
Handle<FixedArray> bridge_storage =
|
|
|
|
Factory::NewFixedArray(DescriptorArray::kEnumCacheBridgeLength);
|
|
|
|
DescriptorArray* desc = object->map()->instance_descriptors();
|
|
|
|
desc->SetEnumCache(*bridge_storage, *storage);
|
|
|
|
}
|
2008-07-03 15:10:15 +00:00
|
|
|
ASSERT(storage->length() == index);
|
|
|
|
return storage;
|
|
|
|
} else {
|
|
|
|
int num_enum = object->NumberOfEnumProperties();
|
|
|
|
Handle<FixedArray> storage = Factory::NewFixedArray(num_enum);
|
|
|
|
Handle<FixedArray> sort_array = Factory::NewFixedArray(num_enum);
|
|
|
|
object->property_dictionary()->CopyEnumKeysTo(*storage, *sort_array);
|
|
|
|
return storage;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-01-29 09:52:51 +00:00
|
|
|
bool EnsureCompiled(Handle<SharedFunctionInfo> shared,
|
|
|
|
ClearExceptionFlag flag) {
|
|
|
|
return shared->is_compiled() || CompileLazyShared(shared, flag);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-01-29 11:55:40 +00:00
|
|
|
static bool CompileLazyHelper(CompilationInfo* info,
|
|
|
|
ClearExceptionFlag flag) {
|
2008-07-03 15:10:15 +00:00
|
|
|
// Compile the source information to a code object.
|
2010-01-29 11:55:40 +00:00
|
|
|
ASSERT(!info->shared_info()->is_compiled());
|
|
|
|
bool result = Compiler::CompileLazy(info);
|
2008-07-03 15:10:15 +00:00
|
|
|
ASSERT(result != Top::has_pending_exception());
|
|
|
|
if (!result && flag == CLEAR_EXCEPTION) Top::clear_pending_exception();
|
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-01-29 09:52:51 +00:00
|
|
|
bool CompileLazyShared(Handle<SharedFunctionInfo> shared,
|
|
|
|
ClearExceptionFlag flag) {
|
2010-02-03 16:12:55 +00:00
|
|
|
CompilationInfo info(shared);
|
2010-01-29 11:55:40 +00:00
|
|
|
return CompileLazyHelper(&info, flag);
|
2010-01-29 09:52:51 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool CompileLazy(Handle<JSFunction> function,
|
|
|
|
Handle<Object> receiver,
|
|
|
|
ClearExceptionFlag flag) {
|
2010-02-03 16:12:55 +00:00
|
|
|
CompilationInfo info(function, 0, receiver);
|
2010-01-29 11:55:40 +00:00
|
|
|
bool result = CompileLazyHelper(&info, flag);
|
Fix issue 553: function frame is skipped in profile when compare stub is called.
The problem appeared due to a fact that stubs doesn't create a stack
frame, reusing the stack frame of the caller function. When building
stack traces, the current function is retrieved from PC, and its
callees are retrieved by traversing the stack backwards. Thus, for
stubs, the stub itself was discovered via PC, and then stub's caller's
caller was retrieved from stack.
To fix this problem, a pointer to JSFunction object is now captured
from the topmost stack frame, and is saved into stack trace log
record. Then a simple heuristics is applied whether a referred
function should be added to decoded stack, or not, to avoid reporting
the same function twice (from PC and from the pointer.)
BUG=553
TEST=added to mjsunit/tools/tickprocessor
Review URL: http://codereview.chromium.org/546089
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@3673 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2010-01-21 16:42:41 +00:00
|
|
|
LOG(FunctionCreateEvent(*function));
|
|
|
|
return result;
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-01-29 09:52:51 +00:00
|
|
|
bool CompileLazyInLoop(Handle<JSFunction> function,
|
|
|
|
Handle<Object> receiver,
|
|
|
|
ClearExceptionFlag flag) {
|
2010-02-03 16:12:55 +00:00
|
|
|
CompilationInfo info(function, 1, receiver);
|
2010-01-29 11:55:40 +00:00
|
|
|
bool result = CompileLazyHelper(&info, flag);
|
Fix issue 553: function frame is skipped in profile when compare stub is called.
The problem appeared due to a fact that stubs doesn't create a stack
frame, reusing the stack frame of the caller function. When building
stack traces, the current function is retrieved from PC, and its
callees are retrieved by traversing the stack backwards. Thus, for
stubs, the stub itself was discovered via PC, and then stub's caller's
caller was retrieved from stack.
To fix this problem, a pointer to JSFunction object is now captured
from the topmost stack frame, and is saved into stack trace log
record. Then a simple heuristics is applied whether a referred
function should be added to decoded stack, or not, to avoid reporting
the same function twice (from PC and from the pointer.)
BUG=553
TEST=added to mjsunit/tools/tickprocessor
Review URL: http://codereview.chromium.org/546089
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@3673 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2010-01-21 16:42:41 +00:00
|
|
|
LOG(FunctionCreateEvent(*function));
|
|
|
|
return result;
|
2008-11-17 05:50:52 +00:00
|
|
|
}
|
|
|
|
|
2010-01-29 09:52:51 +00:00
|
|
|
|
2008-07-03 15:10:15 +00:00
|
|
|
OptimizedObjectForAddingMultipleProperties::
|
|
|
|
OptimizedObjectForAddingMultipleProperties(Handle<JSObject> object,
|
2009-07-30 09:13:48 +00:00
|
|
|
int expected_additional_properties,
|
2008-07-03 15:10:15 +00:00
|
|
|
bool condition) {
|
|
|
|
object_ = object;
|
|
|
|
if (condition && object_->HasFastProperties()) {
|
|
|
|
// Normalize the properties of object to avoid n^2 behavior
|
2009-07-30 09:13:48 +00:00
|
|
|
// when extending the object multiple properties. Indicate the number of
|
|
|
|
// properties to be added.
|
2008-07-03 15:10:15 +00:00
|
|
|
unused_property_fields_ = object->map()->unused_property_fields();
|
2009-07-30 09:13:48 +00:00
|
|
|
NormalizeProperties(object_,
|
|
|
|
KEEP_INOBJECT_PROPERTIES,
|
|
|
|
expected_additional_properties);
|
2008-07-03 15:10:15 +00:00
|
|
|
has_been_transformed_ = true;
|
|
|
|
|
|
|
|
} else {
|
|
|
|
has_been_transformed_ = false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-11-04 17:59:24 +00:00
|
|
|
Handle<Code> ComputeLazyCompile(int argc) {
|
|
|
|
CALL_HEAP_FUNCTION(StubCache::ComputeLazyCompile(argc), Code);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-07-03 15:10:15 +00:00
|
|
|
OptimizedObjectForAddingMultipleProperties::
|
|
|
|
~OptimizedObjectForAddingMultipleProperties() {
|
|
|
|
// Reoptimize the object to allow fast property access.
|
|
|
|
if (has_been_transformed_) {
|
|
|
|
TransformToFastProperties(object_, unused_property_fields_);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
} } // namespace v8::internal
|