2012-01-26 21:47:57 +00:00
|
|
|
// Copyright 2012 the V8 project authors. All rights reserved.
|
2008-07-03 15:10:15 +00:00
|
|
|
// Redistribution and use in source and binary forms, with or without
|
|
|
|
// modification, are permitted provided that the following conditions are
|
|
|
|
// met:
|
|
|
|
//
|
|
|
|
// * Redistributions of source code must retain the above copyright
|
|
|
|
// notice, this list of conditions and the following disclaimer.
|
|
|
|
// * Redistributions in binary form must reproduce the above
|
|
|
|
// copyright notice, this list of conditions and the following
|
|
|
|
// disclaimer in the documentation and/or other materials provided
|
|
|
|
// with the distribution.
|
|
|
|
// * Neither the name of Google Inc. nor the names of its
|
|
|
|
// contributors may be used to endorse or promote products derived
|
|
|
|
// from this software without specific prior written permission.
|
|
|
|
//
|
|
|
|
// THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
|
|
// "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
|
|
// LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
|
|
|
|
// A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
|
|
|
|
// OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
|
|
|
|
// SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
|
|
|
|
// LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
// DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
// THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
|
|
|
// OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
|
|
|
|
#include "v8.h"
|
|
|
|
|
|
|
|
#include "accessors.h"
|
|
|
|
#include "api.h"
|
|
|
|
#include "bootstrapper.h"
|
|
|
|
#include "compiler.h"
|
|
|
|
#include "debug.h"
|
|
|
|
#include "execution.h"
|
|
|
|
#include "global-handles.h"
|
2011-10-03 11:13:20 +00:00
|
|
|
#include "isolate-inl.h"
|
2008-07-03 15:10:15 +00:00
|
|
|
#include "macro-assembler.h"
|
|
|
|
#include "natives.h"
|
2010-08-11 14:30:14 +00:00
|
|
|
#include "objects-visiting.h"
|
2011-10-25 13:43:19 +00:00
|
|
|
#include "platform.h"
|
2009-11-06 13:48:33 +00:00
|
|
|
#include "snapshot.h"
|
2013-11-22 08:25:50 +00:00
|
|
|
#include "trig-table.h"
|
2010-11-17 12:28:30 +00:00
|
|
|
#include "extensions/externalize-string-extension.h"
|
2013-12-05 17:26:22 +00:00
|
|
|
#include "extensions/free-buffer-extension.h"
|
2010-11-17 12:28:30 +00:00
|
|
|
#include "extensions/gc-extension.h"
|
2012-07-18 12:27:29 +00:00
|
|
|
#include "extensions/statistics-extension.h"
|
2013-12-05 17:26:22 +00:00
|
|
|
#include "extensions/trigger-failure-extension.h"
|
2013-04-25 16:00:32 +00:00
|
|
|
#include "code-stubs.h"
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2009-05-25 10:05:56 +00:00
|
|
|
namespace v8 {
|
|
|
|
namespace internal {
|
2008-07-03 15:10:15 +00:00
|
|
|
|
|
|
|
|
2011-03-18 20:35:07 +00:00
|
|
|
NativesExternalStringResource::NativesExternalStringResource(
|
|
|
|
Bootstrapper* bootstrapper,
|
2011-06-06 20:47:30 +00:00
|
|
|
const char* source,
|
|
|
|
size_t length)
|
|
|
|
: data_(source), length_(length) {
|
2011-03-18 20:35:07 +00:00
|
|
|
if (bootstrapper->delete_these_non_arrays_on_tear_down_ == NULL) {
|
|
|
|
bootstrapper->delete_these_non_arrays_on_tear_down_ = new List<char*>(2);
|
2009-11-09 13:30:50 +00:00
|
|
|
}
|
|
|
|
// The resources are small objects and we only make a fixed number of
|
|
|
|
// them, but let's clean them up on exit for neatness.
|
2011-03-18 20:35:07 +00:00
|
|
|
bootstrapper->delete_these_non_arrays_on_tear_down_->
|
2009-11-09 13:30:50 +00:00
|
|
|
Add(reinterpret_cast<char*>(this));
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-02-15 09:27:10 +00:00
|
|
|
Bootstrapper::Bootstrapper(Isolate* isolate)
|
|
|
|
: isolate_(isolate),
|
|
|
|
nesting_(0),
|
2011-03-18 20:35:07 +00:00
|
|
|
extensions_cache_(Script::TYPE_EXTENSION),
|
|
|
|
delete_these_non_arrays_on_tear_down_(NULL),
|
|
|
|
delete_these_arrays_on_tear_down_(NULL) {
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-07-03 15:10:15 +00:00
|
|
|
Handle<String> Bootstrapper::NativesSourceLookup(int index) {
|
|
|
|
ASSERT(0 <= index && index < Natives::GetBuiltinsCount());
|
2013-02-15 09:27:10 +00:00
|
|
|
Heap* heap = isolate_->heap();
|
2011-03-28 13:09:37 +00:00
|
|
|
if (heap->natives_source_cache()->get(index)->IsUndefined()) {
|
2012-01-30 12:25:29 +00:00
|
|
|
// We can use external strings for the natives.
|
|
|
|
Vector<const char> source = Natives::GetRawScriptSource(index);
|
|
|
|
NativesExternalStringResource* resource =
|
|
|
|
new NativesExternalStringResource(this,
|
|
|
|
source.start(),
|
|
|
|
source.length());
|
|
|
|
Handle<String> source_code =
|
2013-02-15 09:27:10 +00:00
|
|
|
isolate_->factory()->NewExternalStringFromAscii(resource);
|
2014-03-25 09:09:24 +00:00
|
|
|
// We do not expect this to throw an exception. Change this if it does.
|
|
|
|
CHECK_NOT_EMPTY_HANDLE(isolate_, source_code);
|
2012-01-30 12:25:29 +00:00
|
|
|
heap->natives_source_cache()->set(index, *source_code);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
2013-02-25 14:46:09 +00:00
|
|
|
Handle<Object> cached_source(heap->natives_source_cache()->get(index),
|
|
|
|
isolate_);
|
2008-07-03 15:10:15 +00:00
|
|
|
return Handle<String>::cast(cached_source);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Bootstrapper::Initialize(bool create_heap_objects) {
|
2013-09-11 08:39:38 +00:00
|
|
|
extensions_cache_.Initialize(isolate_, create_heap_objects);
|
2013-05-21 12:03:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-01-17 10:52:00 +00:00
|
|
|
static const char* GCFunctionName() {
|
|
|
|
bool flag_given = FLAG_expose_gc_as != NULL && strlen(FLAG_expose_gc_as) != 0;
|
|
|
|
return flag_given ? FLAG_expose_gc_as : "gc";
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
v8::Extension* Bootstrapper::free_buffer_extension_ = NULL;
|
|
|
|
v8::Extension* Bootstrapper::gc_extension_ = NULL;
|
|
|
|
v8::Extension* Bootstrapper::externalize_string_extension_ = NULL;
|
|
|
|
v8::Extension* Bootstrapper::statistics_extension_ = NULL;
|
|
|
|
v8::Extension* Bootstrapper::trigger_failure_extension_ = NULL;
|
|
|
|
|
|
|
|
|
2013-05-21 12:03:49 +00:00
|
|
|
void Bootstrapper::InitializeOncePerProcess() {
|
2014-01-17 10:52:00 +00:00
|
|
|
free_buffer_extension_ = new FreeBufferExtension;
|
|
|
|
v8::RegisterExtension(free_buffer_extension_);
|
|
|
|
gc_extension_ = new GCExtension(GCFunctionName());
|
|
|
|
v8::RegisterExtension(gc_extension_);
|
|
|
|
externalize_string_extension_ = new ExternalizeStringExtension;
|
|
|
|
v8::RegisterExtension(externalize_string_extension_);
|
|
|
|
statistics_extension_ = new StatisticsExtension;
|
|
|
|
v8::RegisterExtension(statistics_extension_);
|
|
|
|
trigger_failure_extension_ = new TriggerFailureExtension;
|
|
|
|
v8::RegisterExtension(trigger_failure_extension_);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Bootstrapper::TearDownExtensions() {
|
|
|
|
delete free_buffer_extension_;
|
|
|
|
delete gc_extension_;
|
|
|
|
delete externalize_string_extension_;
|
|
|
|
delete statistics_extension_;
|
|
|
|
delete trigger_failure_extension_;
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-12-11 10:40:01 +00:00
|
|
|
char* Bootstrapper::AllocateAutoDeletedArray(int bytes) {
|
|
|
|
char* memory = new char[bytes];
|
|
|
|
if (memory != NULL) {
|
2011-03-18 20:35:07 +00:00
|
|
|
if (delete_these_arrays_on_tear_down_ == NULL) {
|
|
|
|
delete_these_arrays_on_tear_down_ = new List<char*>(2);
|
2009-12-11 10:40:01 +00:00
|
|
|
}
|
2011-03-18 20:35:07 +00:00
|
|
|
delete_these_arrays_on_tear_down_->Add(memory);
|
2009-12-11 10:40:01 +00:00
|
|
|
}
|
|
|
|
return memory;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-07-03 15:10:15 +00:00
|
|
|
void Bootstrapper::TearDown() {
|
2011-03-18 20:35:07 +00:00
|
|
|
if (delete_these_non_arrays_on_tear_down_ != NULL) {
|
|
|
|
int len = delete_these_non_arrays_on_tear_down_->length();
|
2014-03-27 16:42:34 +00:00
|
|
|
ASSERT(len < 24); // Don't use this mechanism for unbounded allocations.
|
2009-11-06 13:48:33 +00:00
|
|
|
for (int i = 0; i < len; i++) {
|
2011-03-18 20:35:07 +00:00
|
|
|
delete delete_these_non_arrays_on_tear_down_->at(i);
|
|
|
|
delete_these_non_arrays_on_tear_down_->at(i) = NULL;
|
2009-11-06 13:48:33 +00:00
|
|
|
}
|
2011-03-18 20:35:07 +00:00
|
|
|
delete delete_these_non_arrays_on_tear_down_;
|
|
|
|
delete_these_non_arrays_on_tear_down_ = NULL;
|
2009-11-06 13:48:33 +00:00
|
|
|
}
|
|
|
|
|
2011-03-18 20:35:07 +00:00
|
|
|
if (delete_these_arrays_on_tear_down_ != NULL) {
|
|
|
|
int len = delete_these_arrays_on_tear_down_->length();
|
2009-12-11 10:40:01 +00:00
|
|
|
ASSERT(len < 1000); // Don't use this mechanism for unbounded allocations.
|
|
|
|
for (int i = 0; i < len; i++) {
|
2011-03-18 20:35:07 +00:00
|
|
|
delete[] delete_these_arrays_on_tear_down_->at(i);
|
|
|
|
delete_these_arrays_on_tear_down_->at(i) = NULL;
|
2009-12-11 10:40:01 +00:00
|
|
|
}
|
2011-03-18 20:35:07 +00:00
|
|
|
delete delete_these_arrays_on_tear_down_;
|
|
|
|
delete_these_arrays_on_tear_down_ = NULL;
|
2009-12-11 10:40:01 +00:00
|
|
|
}
|
|
|
|
|
2013-09-11 08:39:38 +00:00
|
|
|
extensions_cache_.Initialize(isolate_, false); // Yes, symmetrical
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
class Genesis BASE_EMBEDDED {
|
|
|
|
public:
|
2011-04-14 08:01:19 +00:00
|
|
|
Genesis(Isolate* isolate,
|
|
|
|
Handle<Object> global_object,
|
2008-07-03 15:10:15 +00:00
|
|
|
v8::Handle<v8::ObjectTemplate> global_template,
|
|
|
|
v8::ExtensionConfiguration* extensions);
|
2010-03-23 11:40:38 +00:00
|
|
|
~Genesis() { }
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2011-04-14 08:01:19 +00:00
|
|
|
Isolate* isolate() const { return isolate_; }
|
|
|
|
Factory* factory() const { return isolate_->factory(); }
|
|
|
|
Heap* heap() const { return isolate_->heap(); }
|
|
|
|
|
2013-03-18 17:36:47 +00:00
|
|
|
Handle<Context> result() { return result_; }
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2013-03-18 17:36:47 +00:00
|
|
|
private:
|
2012-08-17 09:03:08 +00:00
|
|
|
Handle<Context> native_context() { return native_context_; }
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2010-03-23 11:40:38 +00:00
|
|
|
// Creates some basic objects. Used for creating a context from scratch.
|
|
|
|
void CreateRoots();
|
|
|
|
// Creates the empty function. Used for creating a context from scratch.
|
2011-04-14 08:01:19 +00:00
|
|
|
Handle<JSFunction> CreateEmptyFunction(Isolate* isolate);
|
2011-03-17 20:28:17 +00:00
|
|
|
// Creates the ThrowTypeError function. ECMA 5th Ed. 13.2.3
|
2011-05-24 11:07:06 +00:00
|
|
|
Handle<JSFunction> GetThrowTypeErrorFunction();
|
2011-03-17 20:28:17 +00:00
|
|
|
|
|
|
|
void CreateStrictModeFunctionMaps(Handle<JSFunction> empty);
|
2012-02-20 08:42:18 +00:00
|
|
|
|
|
|
|
// Make the "arguments" and "caller" properties throw a TypeError on access.
|
|
|
|
void PoisonArgumentsAndCaller(Handle<Map> map);
|
|
|
|
|
2010-03-23 11:40:38 +00:00
|
|
|
// Creates the global objects using the global and the template passed in
|
|
|
|
// through the API. We call this regardless of whether we are building a
|
|
|
|
// context from scratch or using a deserialized one from the partial snapshot
|
|
|
|
// but in the latter case we don't use the objects it produces directly, as
|
|
|
|
// we have to used the deserialized ones that are linked together with the
|
|
|
|
// rest of the context snapshot.
|
|
|
|
Handle<JSGlobalProxy> CreateNewGlobals(
|
|
|
|
v8::Handle<v8::ObjectTemplate> global_template,
|
|
|
|
Handle<Object> global_object,
|
|
|
|
Handle<GlobalObject>* global_proxy_out);
|
|
|
|
// Hooks the given global proxy into the context. If the context was created
|
|
|
|
// by deserialization then this will unhook the global proxy that was
|
|
|
|
// deserialized, leaving the GC to pick it up.
|
|
|
|
void HookUpGlobalProxy(Handle<GlobalObject> inner_global,
|
|
|
|
Handle<JSGlobalProxy> global_proxy);
|
|
|
|
// Similarly, we want to use the inner global that has been created by the
|
|
|
|
// templates passed through the API. The inner global from the snapshot is
|
|
|
|
// detached from the other objects in the snapshot.
|
|
|
|
void HookUpInnerGlobal(Handle<GlobalObject> inner_global);
|
|
|
|
// New context initialization. Used for creating a context from scratch.
|
2013-07-18 07:59:48 +00:00
|
|
|
void InitializeGlobal(Handle<GlobalObject> inner_global,
|
2010-03-23 11:40:38 +00:00
|
|
|
Handle<JSFunction> empty_function);
|
2011-08-03 11:55:13 +00:00
|
|
|
void InitializeExperimentalGlobal();
|
2010-03-23 11:40:38 +00:00
|
|
|
// Installs the contents of the native .js files on the global objects.
|
|
|
|
// Used for creating a context from scratch.
|
2008-07-03 15:10:15 +00:00
|
|
|
void InstallNativeFunctions();
|
2014-02-19 13:51:49 +00:00
|
|
|
void InstallExperimentalBuiltinFunctionIds();
|
2011-05-18 14:00:34 +00:00
|
|
|
void InstallExperimentalNativeFunctions();
|
2013-02-15 15:20:05 +00:00
|
|
|
Handle<JSFunction> InstallInternalArray(Handle<JSBuiltinsObject> builtins,
|
|
|
|
const char* name,
|
|
|
|
ElementsKind elements_kind);
|
2008-07-03 15:10:15 +00:00
|
|
|
bool InstallNatives();
|
2013-04-16 14:16:30 +00:00
|
|
|
|
2013-05-15 15:23:53 +00:00
|
|
|
Handle<JSFunction> InstallTypedArray(const char* name,
|
|
|
|
ElementsKind elementsKind);
|
2011-04-15 12:31:03 +00:00
|
|
|
bool InstallExperimentalNatives();
|
2010-12-14 18:53:48 +00:00
|
|
|
void InstallBuiltinFunctionIds();
|
2010-04-14 14:46:15 +00:00
|
|
|
void InstallJSFunctionResultCaches();
|
2010-08-25 13:25:54 +00:00
|
|
|
void InitializeNormalizedMapCaches();
|
2011-11-15 23:26:22 +00:00
|
|
|
|
2011-11-15 22:48:55 +00:00
|
|
|
enum ExtensionTraversalState {
|
|
|
|
UNVISITED, VISITED, INSTALLED
|
|
|
|
};
|
|
|
|
|
|
|
|
class ExtensionStates {
|
2012-02-23 09:12:57 +00:00
|
|
|
public:
|
2011-11-15 22:48:55 +00:00
|
|
|
ExtensionStates();
|
|
|
|
ExtensionTraversalState get_state(RegisteredExtension* extension);
|
|
|
|
void set_state(RegisteredExtension* extension,
|
|
|
|
ExtensionTraversalState state);
|
2012-02-23 09:12:57 +00:00
|
|
|
private:
|
2011-11-15 22:48:55 +00:00
|
|
|
HashMap map_;
|
2011-11-15 23:26:22 +00:00
|
|
|
DISALLOW_COPY_AND_ASSIGN(ExtensionStates);
|
2011-11-15 22:48:55 +00:00
|
|
|
};
|
|
|
|
|
2010-03-23 11:40:38 +00:00
|
|
|
// Used both for deserialized and from-scratch contexts to add the extensions
|
|
|
|
// provided.
|
2012-08-17 09:03:08 +00:00
|
|
|
static bool InstallExtensions(Handle<Context> native_context,
|
2010-03-23 11:40:38 +00:00
|
|
|
v8::ExtensionConfiguration* extensions);
|
2014-01-16 13:18:28 +00:00
|
|
|
static bool InstallAutoExtensions(Isolate* isolate,
|
|
|
|
ExtensionStates* extension_states);
|
|
|
|
static bool InstallRequestedExtensions(Isolate* isolate,
|
|
|
|
v8::ExtensionConfiguration* extensions,
|
|
|
|
ExtensionStates* extension_states);
|
2013-02-15 09:27:10 +00:00
|
|
|
static bool InstallExtension(Isolate* isolate,
|
|
|
|
const char* name,
|
2011-11-15 22:48:55 +00:00
|
|
|
ExtensionStates* extension_states);
|
2013-02-15 09:27:10 +00:00
|
|
|
static bool InstallExtension(Isolate* isolate,
|
|
|
|
v8::RegisteredExtension* current,
|
2011-11-15 22:48:55 +00:00
|
|
|
ExtensionStates* extension_states);
|
2014-01-16 13:18:28 +00:00
|
|
|
static bool InstallSpecialObjects(Handle<Context> native_context);
|
2010-02-11 08:05:33 +00:00
|
|
|
bool InstallJSBuiltins(Handle<JSBuiltinsObject> builtins);
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
bool ConfigureApiObject(Handle<JSObject> object,
|
|
|
|
Handle<ObjectTemplateInfo> object_template);
|
|
|
|
bool ConfigureGlobalObjects(v8::Handle<v8::ObjectTemplate> global_template);
|
2008-07-03 15:10:15 +00:00
|
|
|
|
|
|
|
// Migrates all properties from the 'from' object to the 'to'
|
|
|
|
// object and overrides the prototype in 'to' with the one from
|
|
|
|
// 'from'.
|
|
|
|
void TransferObject(Handle<JSObject> from, Handle<JSObject> to);
|
|
|
|
void TransferNamedProperties(Handle<JSObject> from, Handle<JSObject> to);
|
|
|
|
void TransferIndexedProperties(Handle<JSObject> from, Handle<JSObject> to);
|
|
|
|
|
2010-04-28 12:05:40 +00:00
|
|
|
enum PrototypePropertyMode {
|
|
|
|
DONT_ADD_PROTOTYPE,
|
|
|
|
ADD_READONLY_PROTOTYPE,
|
|
|
|
ADD_WRITEABLE_PROTOTYPE
|
|
|
|
};
|
2011-03-17 20:28:17 +00:00
|
|
|
|
|
|
|
Handle<Map> CreateFunctionMap(PrototypePropertyMode prototype_mode);
|
|
|
|
|
2012-07-18 15:38:58 +00:00
|
|
|
void SetFunctionInstanceDescriptor(Handle<Map> map,
|
|
|
|
PrototypePropertyMode prototypeMode);
|
2008-07-03 15:10:15 +00:00
|
|
|
void MakeFunctionInstancePrototypeWritable();
|
|
|
|
|
2014-03-11 14:41:22 +00:00
|
|
|
Handle<Map> CreateStrictFunctionMap(
|
2011-03-17 20:28:17 +00:00
|
|
|
PrototypePropertyMode prototype_mode,
|
2012-02-20 08:42:18 +00:00
|
|
|
Handle<JSFunction> empty_function);
|
2011-03-17 20:28:17 +00:00
|
|
|
|
2012-07-18 15:38:58 +00:00
|
|
|
void SetStrictFunctionInstanceDescriptor(Handle<Map> map,
|
|
|
|
PrototypePropertyMode propertyMode);
|
2011-03-17 20:28:17 +00:00
|
|
|
|
2011-04-14 08:01:19 +00:00
|
|
|
static bool CompileBuiltin(Isolate* isolate, int index);
|
2011-04-15 12:31:03 +00:00
|
|
|
static bool CompileExperimentalBuiltin(Isolate* isolate, int index);
|
2013-02-15 09:27:10 +00:00
|
|
|
static bool CompileNative(Isolate* isolate,
|
|
|
|
Vector<const char> name,
|
|
|
|
Handle<String> source);
|
|
|
|
static bool CompileScriptCached(Isolate* isolate,
|
|
|
|
Vector<const char> name,
|
2008-07-03 15:10:15 +00:00
|
|
|
Handle<String> source,
|
|
|
|
SourceCodeCache* cache,
|
|
|
|
v8::Extension* extension,
|
2010-03-23 11:40:38 +00:00
|
|
|
Handle<Context> top_context,
|
2008-07-03 15:10:15 +00:00
|
|
|
bool use_runtime_context);
|
|
|
|
|
2013-03-18 17:36:47 +00:00
|
|
|
Isolate* isolate_;
|
2008-07-03 15:10:15 +00:00
|
|
|
Handle<Context> result_;
|
2013-03-18 17:36:47 +00:00
|
|
|
Handle<Context> native_context_;
|
2011-03-17 20:28:17 +00:00
|
|
|
|
2013-05-10 12:59:20 +00:00
|
|
|
// Function maps. Function maps are created initially with a read only
|
|
|
|
// prototype for the processing of JS builtins. Later the function maps are
|
|
|
|
// replaced in order to make prototype writable. These are the final, writable
|
|
|
|
// prototype, maps.
|
2014-03-11 14:41:22 +00:00
|
|
|
Handle<Map> sloppy_function_map_writable_prototype_;
|
|
|
|
Handle<Map> strict_function_map_writable_prototype_;
|
2011-05-24 11:07:06 +00:00
|
|
|
Handle<JSFunction> throw_type_error_function;
|
2011-03-17 20:28:17 +00:00
|
|
|
|
2010-03-23 11:40:38 +00:00
|
|
|
BootstrapperActive active_;
|
|
|
|
friend class Bootstrapper;
|
2008-07-03 15:10:15 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
void Bootstrapper::Iterate(ObjectVisitor* v) {
|
2011-03-18 20:35:07 +00:00
|
|
|
extensions_cache_.Iterate(v);
|
2011-12-06 17:41:47 +00:00
|
|
|
v->Synchronize(VisitorSynchronization::kExtensions);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Handle<Context> Bootstrapper::CreateEnvironment(
|
|
|
|
Handle<Object> global_object,
|
|
|
|
v8::Handle<v8::ObjectTemplate> global_template,
|
|
|
|
v8::ExtensionConfiguration* extensions) {
|
2013-02-15 09:27:10 +00:00
|
|
|
HandleScope scope(isolate_);
|
|
|
|
Genesis genesis(isolate_, global_object, global_template, extensions);
|
2013-04-10 09:34:37 +00:00
|
|
|
Handle<Context> env = genesis.result();
|
|
|
|
if (env.is_null() || !InstallExtensions(env, extensions)) {
|
|
|
|
return Handle<Context>();
|
2010-03-23 11:40:38 +00:00
|
|
|
}
|
2013-04-10 09:34:37 +00:00
|
|
|
return scope.CloseAndEscape(env);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
static void SetObjectPrototype(Handle<JSObject> object, Handle<Object> proto) {
|
|
|
|
// object.__proto__ = proto;
|
2011-04-14 08:01:19 +00:00
|
|
|
Factory* factory = object->GetIsolate()->factory();
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
Handle<Map> old_to_map = Handle<Map>(object->map());
|
2012-07-17 13:50:19 +00:00
|
|
|
Handle<Map> new_to_map = factory->CopyMap(old_to_map);
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
new_to_map->set_prototype(*proto);
|
|
|
|
object->set_map(*new_to_map);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Bootstrapper::DetachGlobal(Handle<Context> env) {
|
2011-04-14 08:01:19 +00:00
|
|
|
Factory* factory = env->GetIsolate()->factory();
|
2012-08-28 11:25:08 +00:00
|
|
|
Handle<JSGlobalProxy> global_proxy(JSGlobalProxy::cast(env->global_proxy()));
|
|
|
|
global_proxy->set_native_context(*factory->null_value());
|
|
|
|
SetObjectPrototype(global_proxy, factory->null_value());
|
2010-03-24 13:24:46 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-07-03 15:10:15 +00:00
|
|
|
static Handle<JSFunction> InstallFunction(Handle<JSObject> target,
|
|
|
|
const char* name,
|
|
|
|
InstanceType type,
|
|
|
|
int instance_size,
|
|
|
|
Handle<JSObject> prototype,
|
|
|
|
Builtins::Name call,
|
2013-05-15 15:23:53 +00:00
|
|
|
bool install_initial_map,
|
|
|
|
bool set_instance_class_name) {
|
2011-04-14 08:01:19 +00:00
|
|
|
Isolate* isolate = target->GetIsolate();
|
2011-03-28 13:09:37 +00:00
|
|
|
Factory* factory = isolate->factory();
|
2013-02-28 17:03:34 +00:00
|
|
|
Handle<String> internalized_name = factory->InternalizeUtf8String(name);
|
2011-03-28 13:09:37 +00:00
|
|
|
Handle<Code> call_code = Handle<Code>(isolate->builtins()->builtin(call));
|
2010-04-28 12:05:40 +00:00
|
|
|
Handle<JSFunction> function = prototype.is_null() ?
|
2013-02-28 17:03:34 +00:00
|
|
|
factory->NewFunctionWithoutPrototype(internalized_name, call_code) :
|
|
|
|
factory->NewFunctionWithPrototype(internalized_name,
|
2008-07-03 15:10:15 +00:00
|
|
|
type,
|
|
|
|
instance_size,
|
|
|
|
prototype,
|
|
|
|
call_code,
|
2013-05-15 15:23:53 +00:00
|
|
|
install_initial_map);
|
2011-09-01 11:57:02 +00:00
|
|
|
PropertyAttributes attributes;
|
|
|
|
if (target->IsJSBuiltinsObject()) {
|
|
|
|
attributes =
|
|
|
|
static_cast<PropertyAttributes>(DONT_ENUM | DONT_DELETE | READ_ONLY);
|
|
|
|
} else {
|
|
|
|
attributes = DONT_ENUM;
|
|
|
|
}
|
2012-01-05 17:16:19 +00:00
|
|
|
CHECK_NOT_EMPTY_HANDLE(isolate,
|
|
|
|
JSObject::SetLocalPropertyIgnoreAttributes(
|
2013-02-28 17:03:34 +00:00
|
|
|
target, internalized_name, function, attributes));
|
2013-05-15 15:23:53 +00:00
|
|
|
if (set_instance_class_name) {
|
2013-02-28 17:03:34 +00:00
|
|
|
function->shared()->set_instance_class_name(*internalized_name);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
2011-10-20 12:31:33 +00:00
|
|
|
function->shared()->set_native(true);
|
2008-07-03 15:10:15 +00:00
|
|
|
return function;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-07-18 15:38:58 +00:00
|
|
|
void Genesis::SetFunctionInstanceDescriptor(
|
|
|
|
Handle<Map> map, PrototypePropertyMode prototypeMode) {
|
2012-02-20 08:42:18 +00:00
|
|
|
int size = (prototypeMode == DONT_ADD_PROTOTYPE) ? 4 : 5;
|
2012-09-18 13:25:12 +00:00
|
|
|
Handle<DescriptorArray> descriptors(factory()->NewDescriptorArray(0, size));
|
2012-07-23 16:18:25 +00:00
|
|
|
DescriptorArray::WhitenessWitness witness(*descriptors);
|
|
|
|
|
|
|
|
Handle<Foreign> length(factory()->NewForeign(&Accessors::FunctionLength));
|
|
|
|
Handle<Foreign> name(factory()->NewForeign(&Accessors::FunctionName));
|
|
|
|
Handle<Foreign> args(factory()->NewForeign(&Accessors::FunctionArguments));
|
|
|
|
Handle<Foreign> caller(factory()->NewForeign(&Accessors::FunctionCaller));
|
|
|
|
Handle<Foreign> prototype;
|
|
|
|
if (prototypeMode != DONT_ADD_PROTOTYPE) {
|
|
|
|
prototype = factory()->NewForeign(&Accessors::FunctionPrototype);
|
|
|
|
}
|
2014-02-07 15:29:18 +00:00
|
|
|
PropertyAttributes attribs = static_cast<PropertyAttributes>(
|
2012-02-20 08:42:18 +00:00
|
|
|
DONT_ENUM | DONT_DELETE | READ_ONLY);
|
2012-10-17 13:04:49 +00:00
|
|
|
map->set_instance_descriptors(*descriptors);
|
2011-10-21 10:32:38 +00:00
|
|
|
|
2011-03-17 20:28:17 +00:00
|
|
|
{ // Add length.
|
2014-02-07 15:29:18 +00:00
|
|
|
CallbacksDescriptor d(*factory()->length_string(), *length, attribs);
|
2012-07-19 10:01:52 +00:00
|
|
|
map->AppendDescriptor(&d, witness);
|
2011-03-17 20:28:17 +00:00
|
|
|
}
|
|
|
|
{ // Add name.
|
2014-02-07 15:29:18 +00:00
|
|
|
CallbacksDescriptor d(*factory()->name_string(), *name, attribs);
|
2012-07-19 10:01:52 +00:00
|
|
|
map->AppendDescriptor(&d, witness);
|
2011-03-17 20:28:17 +00:00
|
|
|
}
|
|
|
|
{ // Add arguments.
|
2014-02-07 15:29:18 +00:00
|
|
|
CallbacksDescriptor d(*factory()->arguments_string(), *args, attribs);
|
2012-07-19 10:01:52 +00:00
|
|
|
map->AppendDescriptor(&d, witness);
|
2011-03-17 20:28:17 +00:00
|
|
|
}
|
|
|
|
{ // Add caller.
|
2014-02-07 15:29:18 +00:00
|
|
|
CallbacksDescriptor d(*factory()->caller_string(), *caller, attribs);
|
2012-07-19 10:01:52 +00:00
|
|
|
map->AppendDescriptor(&d, witness);
|
2011-03-17 20:28:17 +00:00
|
|
|
}
|
2010-04-28 12:05:40 +00:00
|
|
|
if (prototypeMode != DONT_ADD_PROTOTYPE) {
|
2011-03-17 20:28:17 +00:00
|
|
|
// Add prototype.
|
2014-02-07 15:29:18 +00:00
|
|
|
if (prototypeMode == ADD_WRITEABLE_PROTOTYPE) {
|
|
|
|
attribs = static_cast<PropertyAttributes>(attribs & ~READ_ONLY);
|
|
|
|
}
|
2013-02-28 17:03:34 +00:00
|
|
|
CallbacksDescriptor d(*factory()->prototype_string(), *prototype, attribs);
|
2012-07-19 10:01:52 +00:00
|
|
|
map->AppendDescriptor(&d, witness);
|
2010-04-28 12:05:40 +00:00
|
|
|
}
|
2011-03-17 20:28:17 +00:00
|
|
|
}
|
2008-07-03 15:10:15 +00:00
|
|
|
|
|
|
|
|
2011-03-17 20:28:17 +00:00
|
|
|
Handle<Map> Genesis::CreateFunctionMap(PrototypePropertyMode prototype_mode) {
|
2011-04-14 08:01:19 +00:00
|
|
|
Handle<Map> map = factory()->NewMap(JS_FUNCTION_TYPE, JSFunction::kSize);
|
2012-07-18 15:38:58 +00:00
|
|
|
SetFunctionInstanceDescriptor(map, prototype_mode);
|
2011-03-17 20:28:17 +00:00
|
|
|
map->set_function_with_prototype(prototype_mode != DONT_ADD_PROTOTYPE);
|
|
|
|
return map;
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-04-14 08:01:19 +00:00
|
|
|
Handle<JSFunction> Genesis::CreateEmptyFunction(Isolate* isolate) {
|
2011-03-17 20:28:17 +00:00
|
|
|
// Allocate the map for function instances. Maps are allocated first and their
|
|
|
|
// prototypes patched later, once empty function is created.
|
|
|
|
|
2010-04-28 12:05:40 +00:00
|
|
|
// Functions with this map will not have a 'prototype' property, and
|
|
|
|
// can not be used as constructors.
|
2011-03-30 10:46:55 +00:00
|
|
|
Handle<Map> function_without_prototype_map =
|
|
|
|
CreateFunctionMap(DONT_ADD_PROTOTYPE);
|
2014-03-11 14:41:22 +00:00
|
|
|
native_context()->set_sloppy_function_without_prototype_map(
|
2011-03-30 10:46:55 +00:00
|
|
|
*function_without_prototype_map);
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2011-03-17 20:28:17 +00:00
|
|
|
// Allocate the function map. This map is temporary, used only for processing
|
|
|
|
// of builtins.
|
|
|
|
// Later the map is replaced with writable prototype map, allocated below.
|
2011-03-30 10:46:55 +00:00
|
|
|
Handle<Map> function_map = CreateFunctionMap(ADD_READONLY_PROTOTYPE);
|
2014-03-11 14:41:22 +00:00
|
|
|
native_context()->set_sloppy_function_map(*function_map);
|
2011-03-17 20:28:17 +00:00
|
|
|
|
|
|
|
// The final map for functions. Writeable prototype.
|
|
|
|
// This map is installed in MakeFunctionInstancePrototypeWritable.
|
2014-03-11 14:41:22 +00:00
|
|
|
sloppy_function_map_writable_prototype_ =
|
|
|
|
CreateFunctionMap(ADD_WRITEABLE_PROTOTYPE);
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2011-03-28 13:09:37 +00:00
|
|
|
Factory* factory = isolate->factory();
|
|
|
|
|
2013-05-13 10:59:00 +00:00
|
|
|
Handle<String> object_name = factory->Object_string();
|
2008-07-03 15:10:15 +00:00
|
|
|
|
|
|
|
{ // --- O b j e c t ---
|
|
|
|
Handle<JSFunction> object_fun =
|
2011-03-28 13:09:37 +00:00
|
|
|
factory->NewFunction(object_name, factory->null_value());
|
2008-07-03 15:10:15 +00:00
|
|
|
Handle<Map> object_function_map =
|
2011-03-28 13:09:37 +00:00
|
|
|
factory->NewMap(JS_OBJECT_TYPE, JSObject::kHeaderSize);
|
2008-07-03 15:10:15 +00:00
|
|
|
object_fun->set_initial_map(*object_function_map);
|
|
|
|
object_function_map->set_constructor(*object_fun);
|
|
|
|
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_object_function(*object_fun);
|
2008-07-03 15:10:15 +00:00
|
|
|
|
|
|
|
// Allocate a new prototype for the object function.
|
2013-04-04 12:10:23 +00:00
|
|
|
Handle<JSObject> prototype = factory->NewJSObject(
|
|
|
|
isolate->object_function(),
|
2013-02-26 10:46:00 +00:00
|
|
|
TENURED);
|
2013-04-04 12:10:23 +00:00
|
|
|
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_initial_object_prototype(*prototype);
|
2013-05-13 07:35:26 +00:00
|
|
|
// For bootstrapping set the array prototype to be the same as the object
|
|
|
|
// prototype, otherwise the missing initial_array_prototype will cause
|
|
|
|
// assertions during startup.
|
|
|
|
native_context()->set_initial_array_prototype(*prototype);
|
2013-08-16 21:27:11 +00:00
|
|
|
Accessors::FunctionSetPrototype(object_fun, prototype);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Allocate the empty function as the prototype for function ECMAScript
|
|
|
|
// 262 15.3.4.
|
2013-02-28 17:03:34 +00:00
|
|
|
Handle<String> empty_string =
|
|
|
|
factory->InternalizeOneByteString(STATIC_ASCII_VECTOR("Empty"));
|
2008-07-03 15:10:15 +00:00
|
|
|
Handle<JSFunction> empty_function =
|
2014-03-11 14:41:22 +00:00
|
|
|
factory->NewFunctionWithoutPrototype(empty_string, SLOPPY);
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2010-03-23 11:40:38 +00:00
|
|
|
// --- E m p t y ---
|
|
|
|
Handle<Code> code =
|
2011-03-28 13:09:37 +00:00
|
|
|
Handle<Code>(isolate->builtins()->builtin(
|
2011-03-23 13:40:07 +00:00
|
|
|
Builtins::kEmptyFunction));
|
2010-03-23 11:40:38 +00:00
|
|
|
empty_function->set_code(*code);
|
2010-08-11 08:12:53 +00:00
|
|
|
empty_function->shared()->set_code(*code);
|
2013-01-09 10:30:54 +00:00
|
|
|
Handle<String> source =
|
|
|
|
factory->NewStringFromOneByte(STATIC_ASCII_VECTOR("() {}"));
|
2011-03-28 13:09:37 +00:00
|
|
|
Handle<Script> script = factory->NewScript(source);
|
2010-03-23 11:40:38 +00:00
|
|
|
script->set_type(Smi::FromInt(Script::TYPE_NATIVE));
|
|
|
|
empty_function->shared()->set_script(*script);
|
|
|
|
empty_function->shared()->set_start_position(0);
|
|
|
|
empty_function->shared()->set_end_position(source->length());
|
|
|
|
empty_function->shared()->DontAdaptArguments();
|
2011-03-17 20:28:17 +00:00
|
|
|
|
|
|
|
// Set prototypes for the function maps.
|
2014-03-11 14:41:22 +00:00
|
|
|
native_context()->sloppy_function_map()->set_prototype(*empty_function);
|
|
|
|
native_context()->sloppy_function_without_prototype_map()->
|
2010-04-29 10:39:36 +00:00
|
|
|
set_prototype(*empty_function);
|
2014-03-11 14:41:22 +00:00
|
|
|
sloppy_function_map_writable_prototype_->set_prototype(*empty_function);
|
2010-04-28 12:05:40 +00:00
|
|
|
|
2010-03-23 11:40:38 +00:00
|
|
|
// Allocate the function map first and then patch the prototype later
|
2012-05-16 07:52:41 +00:00
|
|
|
Handle<Map> empty_function_map = CreateFunctionMap(DONT_ADD_PROTOTYPE);
|
|
|
|
empty_function_map->set_prototype(
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->object_function()->prototype());
|
2012-05-16 07:52:41 +00:00
|
|
|
empty_function->set_map(*empty_function_map);
|
2010-03-23 11:40:38 +00:00
|
|
|
return empty_function;
|
|
|
|
}
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
|
|
|
|
|
2012-07-18 15:38:58 +00:00
|
|
|
void Genesis::SetStrictFunctionInstanceDescriptor(
|
|
|
|
Handle<Map> map, PrototypePropertyMode prototypeMode) {
|
2012-02-20 08:42:18 +00:00
|
|
|
int size = (prototypeMode == DONT_ADD_PROTOTYPE) ? 4 : 5;
|
2012-09-18 13:25:12 +00:00
|
|
|
Handle<DescriptorArray> descriptors(factory()->NewDescriptorArray(0, size));
|
2012-07-23 16:18:25 +00:00
|
|
|
DescriptorArray::WhitenessWitness witness(*descriptors);
|
|
|
|
|
|
|
|
Handle<Foreign> length(factory()->NewForeign(&Accessors::FunctionLength));
|
|
|
|
Handle<Foreign> name(factory()->NewForeign(&Accessors::FunctionName));
|
|
|
|
Handle<AccessorPair> arguments(factory()->NewAccessorPair());
|
|
|
|
Handle<AccessorPair> caller(factory()->NewAccessorPair());
|
|
|
|
Handle<Foreign> prototype;
|
|
|
|
if (prototypeMode != DONT_ADD_PROTOTYPE) {
|
|
|
|
prototype = factory()->NewForeign(&Accessors::FunctionPrototype);
|
|
|
|
}
|
2013-06-18 07:51:50 +00:00
|
|
|
PropertyAttributes rw_attribs =
|
|
|
|
static_cast<PropertyAttributes>(DONT_ENUM | DONT_DELETE);
|
|
|
|
PropertyAttributes ro_attribs =
|
|
|
|
static_cast<PropertyAttributes>(DONT_ENUM | DONT_DELETE | READ_ONLY);
|
2012-10-17 13:04:49 +00:00
|
|
|
map->set_instance_descriptors(*descriptors);
|
2011-10-21 10:32:38 +00:00
|
|
|
|
2012-02-20 08:42:18 +00:00
|
|
|
{ // Add length.
|
2014-02-07 15:29:18 +00:00
|
|
|
CallbacksDescriptor d(*factory()->length_string(), *length, ro_attribs);
|
2012-07-19 10:01:52 +00:00
|
|
|
map->AppendDescriptor(&d, witness);
|
2011-03-17 20:28:17 +00:00
|
|
|
}
|
2012-02-20 08:42:18 +00:00
|
|
|
{ // Add name.
|
2014-02-07 15:29:18 +00:00
|
|
|
CallbacksDescriptor d(*factory()->name_string(), *name, ro_attribs);
|
2012-07-19 10:01:52 +00:00
|
|
|
map->AppendDescriptor(&d, witness);
|
2011-03-17 20:28:17 +00:00
|
|
|
}
|
2012-02-20 08:42:18 +00:00
|
|
|
{ // Add arguments.
|
2013-06-18 07:51:50 +00:00
|
|
|
CallbacksDescriptor d(*factory()->arguments_string(), *arguments,
|
|
|
|
rw_attribs);
|
2012-07-19 10:01:52 +00:00
|
|
|
map->AppendDescriptor(&d, witness);
|
2011-03-17 20:28:17 +00:00
|
|
|
}
|
2012-02-20 08:42:18 +00:00
|
|
|
{ // Add caller.
|
2013-06-18 07:51:50 +00:00
|
|
|
CallbacksDescriptor d(*factory()->caller_string(), *caller, rw_attribs);
|
2012-07-19 10:01:52 +00:00
|
|
|
map->AppendDescriptor(&d, witness);
|
2011-03-17 20:28:17 +00:00
|
|
|
}
|
|
|
|
if (prototypeMode != DONT_ADD_PROTOTYPE) {
|
2012-02-20 08:42:18 +00:00
|
|
|
// Add prototype.
|
2013-06-18 07:51:50 +00:00
|
|
|
PropertyAttributes attribs =
|
|
|
|
prototypeMode == ADD_WRITEABLE_PROTOTYPE ? rw_attribs : ro_attribs;
|
2013-02-28 17:03:34 +00:00
|
|
|
CallbacksDescriptor d(*factory()->prototype_string(), *prototype, attribs);
|
2012-07-19 10:01:52 +00:00
|
|
|
map->AppendDescriptor(&d, witness);
|
2011-03-17 20:28:17 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// ECMAScript 5th Edition, 13.2.3
|
2011-05-24 11:07:06 +00:00
|
|
|
Handle<JSFunction> Genesis::GetThrowTypeErrorFunction() {
|
|
|
|
if (throw_type_error_function.is_null()) {
|
2013-02-28 17:03:34 +00:00
|
|
|
Handle<String> name = factory()->InternalizeOneByteString(
|
2012-12-17 15:56:16 +00:00
|
|
|
STATIC_ASCII_VECTOR("ThrowTypeError"));
|
2011-05-24 11:07:06 +00:00
|
|
|
throw_type_error_function =
|
2014-03-11 14:41:22 +00:00
|
|
|
factory()->NewFunctionWithoutPrototype(name, SLOPPY);
|
2011-05-24 11:07:06 +00:00
|
|
|
Handle<Code> code(isolate()->builtins()->builtin(
|
|
|
|
Builtins::kStrictModePoisonPill));
|
2014-03-11 14:41:22 +00:00
|
|
|
throw_type_error_function->set_map(native_context()->sloppy_function_map());
|
2011-05-24 11:07:06 +00:00
|
|
|
throw_type_error_function->set_code(*code);
|
|
|
|
throw_type_error_function->shared()->set_code(*code);
|
|
|
|
throw_type_error_function->shared()->DontAdaptArguments();
|
|
|
|
|
2012-01-05 17:16:19 +00:00
|
|
|
JSObject::PreventExtensions(throw_type_error_function);
|
2011-05-24 11:07:06 +00:00
|
|
|
}
|
|
|
|
return throw_type_error_function;
|
2011-03-17 20:28:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-03-11 14:41:22 +00:00
|
|
|
Handle<Map> Genesis::CreateStrictFunctionMap(
|
2011-03-17 20:28:17 +00:00
|
|
|
PrototypePropertyMode prototype_mode,
|
2012-02-20 08:42:18 +00:00
|
|
|
Handle<JSFunction> empty_function) {
|
2011-04-14 08:01:19 +00:00
|
|
|
Handle<Map> map = factory()->NewMap(JS_FUNCTION_TYPE, JSFunction::kSize);
|
2012-07-18 15:38:58 +00:00
|
|
|
SetStrictFunctionInstanceDescriptor(map, prototype_mode);
|
2011-03-17 20:28:17 +00:00
|
|
|
map->set_function_with_prototype(prototype_mode != DONT_ADD_PROTOTYPE);
|
|
|
|
map->set_prototype(*empty_function);
|
|
|
|
return map;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Genesis::CreateStrictModeFunctionMaps(Handle<JSFunction> empty) {
|
|
|
|
// Allocate map for the prototype-less strict mode instances.
|
2014-03-11 14:41:22 +00:00
|
|
|
Handle<Map> strict_function_without_prototype_map =
|
|
|
|
CreateStrictFunctionMap(DONT_ADD_PROTOTYPE, empty);
|
|
|
|
native_context()->set_strict_function_without_prototype_map(
|
|
|
|
*strict_function_without_prototype_map);
|
2011-03-17 20:28:17 +00:00
|
|
|
|
|
|
|
// Allocate map for the strict mode functions. This map is temporary, used
|
|
|
|
// only for processing of builtins.
|
|
|
|
// Later the map is replaced with writable prototype map, allocated below.
|
2014-03-11 14:41:22 +00:00
|
|
|
Handle<Map> strict_function_map =
|
|
|
|
CreateStrictFunctionMap(ADD_READONLY_PROTOTYPE, empty);
|
|
|
|
native_context()->set_strict_function_map(*strict_function_map);
|
2011-03-17 20:28:17 +00:00
|
|
|
|
|
|
|
// The final map for the strict mode functions. Writeable prototype.
|
|
|
|
// This map is installed in MakeFunctionInstancePrototypeWritable.
|
2014-03-11 14:41:22 +00:00
|
|
|
strict_function_map_writable_prototype_ =
|
|
|
|
CreateStrictFunctionMap(ADD_WRITEABLE_PROTOTYPE, empty);
|
2011-03-17 20:28:17 +00:00
|
|
|
|
2012-01-10 16:11:33 +00:00
|
|
|
// Complete the callbacks.
|
2014-03-11 14:41:22 +00:00
|
|
|
PoisonArgumentsAndCaller(strict_function_without_prototype_map);
|
|
|
|
PoisonArgumentsAndCaller(strict_function_map);
|
|
|
|
PoisonArgumentsAndCaller(strict_function_map_writable_prototype_);
|
2012-02-20 08:42:18 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void SetAccessors(Handle<Map> map,
|
|
|
|
Handle<String> name,
|
|
|
|
Handle<JSFunction> func) {
|
|
|
|
DescriptorArray* descs = map->instance_descriptors();
|
Sharing of descriptor arrays.
This CL adds multiple things:
Transition arrays do not directly point at their descriptor array anymore, but rather do so via an indirect pointer (a JSGlobalPropertyCell).
An ownership bit is added to maps indicating whether it owns its own descriptor array or not.
Maps owning a descriptor array can pass on ownership if a transition from that map is generated; but only if the descriptor array stays exactly the same; or if a descriptor is added.
Maps that don't have ownership get ownership back if their direct child to which ownership was passed is cleared in ClearNonLiveTransitions.
To detect which descriptors in an array are valid, each map knows its own NumberOfOwnDescriptors. Since the descriptors are sorted in order of addition, if we search and find a descriptor with index bigger than this number, it is not valid for the given map.
We currently still build up an enumeration cache (although this may disappear). The enumeration cache is always built for the entire descriptor array, even if not all descriptors are owned by the map. Once a descriptor array has an enumeration cache for a given map; this invariant will always be true, even if the descriptor array was extended. The extended array will inherit the enumeration cache from the smaller descriptor array. If a map with more descriptors needs an enumeration cache, it's EnumLength will still be set to invalid, so it will have to recompute the enumeration cache. This new cache will also be valid for smaller maps since they have their own enumlength; and use this to loop over the cache. If the EnumLength is still invalid, but there is already a cache present that is big enough; we just initialize the EnumLength field for the map.
When we apply ClearNonLiveTransitions and descriptor ownership is passed back to a parent map, the descriptor array is trimmed in-place and resorted. At the same time, the enumeration cache is trimmed in-place.
Only transition arrays contain descriptor arrays. If we transition to a map and pass ownership of the descriptor array along, the child map will not store the descriptor array it owns. Rather its parent will keep the pointer. So for every leaf-map, we find the descriptor array by following the back pointer, reading out the transition array, and fetching the descriptor array from the JSGlobalPropertyCell. If a map has a transition array, we fetch it from there. If a map has undefined as its back-pointer and has no transition array; it is considered to have an empty descriptor array.
When we modify properties, we cannot share the descriptor array. To accommodate this, the child map will get its own transition array; even if there are not necessarily any transitions leaving from the child map. This is necessary since it's the only way to store its own descriptor array.
Review URL: https://chromiumcodereview.appspot.com/10909007
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@12492 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2012-09-12 16:43:57 +00:00
|
|
|
int number = descs->SearchWithCache(*name, *map);
|
2012-02-20 08:42:18 +00:00
|
|
|
AccessorPair* accessors = AccessorPair::cast(descs->GetValue(number));
|
|
|
|
accessors->set_getter(*func);
|
|
|
|
accessors->set_setter(*func);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Genesis::PoisonArgumentsAndCaller(Handle<Map> map) {
|
2013-02-28 17:03:34 +00:00
|
|
|
SetAccessors(map, factory()->arguments_string(), GetThrowTypeErrorFunction());
|
|
|
|
SetAccessors(map, factory()->caller_string(), GetThrowTypeErrorFunction());
|
2011-03-17 20:28:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-08-17 09:03:08 +00:00
|
|
|
static void AddToWeakNativeContextList(Context* context) {
|
|
|
|
ASSERT(context->IsNativeContext());
|
2011-04-14 08:01:19 +00:00
|
|
|
Heap* heap = context->GetIsolate()->heap();
|
2010-12-07 11:31:57 +00:00
|
|
|
#ifdef DEBUG
|
|
|
|
{ // NOLINT
|
|
|
|
ASSERT(context->get(Context::NEXT_CONTEXT_LINK)->IsUndefined());
|
|
|
|
// Check that context is not in the list yet.
|
2012-08-17 09:03:08 +00:00
|
|
|
for (Object* current = heap->native_contexts_list();
|
2010-12-07 11:31:57 +00:00
|
|
|
!current->IsUndefined();
|
|
|
|
current = Context::cast(current)->get(Context::NEXT_CONTEXT_LINK)) {
|
|
|
|
ASSERT(current != context);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
2012-08-17 09:03:08 +00:00
|
|
|
context->set(Context::NEXT_CONTEXT_LINK, heap->native_contexts_list());
|
|
|
|
heap->set_native_contexts_list(context);
|
2010-12-07 11:31:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-03-23 11:40:38 +00:00
|
|
|
void Genesis::CreateRoots() {
|
2012-08-17 09:03:08 +00:00
|
|
|
// Allocate the native context FixedArray first and then patch the
|
2010-03-23 11:40:38 +00:00
|
|
|
// closure and extension object later (we need the empty function
|
|
|
|
// and the global object, but in order to create those, we need the
|
2012-08-17 09:03:08 +00:00
|
|
|
// native context).
|
2013-03-18 17:36:47 +00:00
|
|
|
native_context_ = factory()->NewNativeContext();
|
|
|
|
AddToWeakNativeContextList(*native_context());
|
2012-08-17 09:03:08 +00:00
|
|
|
isolate()->set_context(*native_context());
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2010-03-23 11:40:38 +00:00
|
|
|
// Allocate the message listeners object.
|
|
|
|
{
|
2014-01-08 14:44:30 +00:00
|
|
|
v8::NeanderArray listeners(isolate());
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_message_listeners(*listeners.value());
|
2010-03-23 11:40:38 +00:00
|
|
|
}
|
|
|
|
}
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
|
|
|
|
|
2010-03-23 11:40:38 +00:00
|
|
|
Handle<JSGlobalProxy> Genesis::CreateNewGlobals(
|
|
|
|
v8::Handle<v8::ObjectTemplate> global_template,
|
|
|
|
Handle<Object> global_object,
|
|
|
|
Handle<GlobalObject>* inner_global_out) {
|
|
|
|
// The argument global_template aka data is an ObjectTemplateInfo.
|
|
|
|
// It has a constructor pointer that points at global_constructor which is a
|
|
|
|
// FunctionTemplateInfo.
|
|
|
|
// The global_constructor is used to create or reinitialize the global_proxy.
|
|
|
|
// The global_constructor also has a prototype_template pointer that points at
|
|
|
|
// js_global_template which is an ObjectTemplateInfo.
|
|
|
|
// That in turn has a constructor pointer that points at
|
|
|
|
// js_global_constructor which is a FunctionTemplateInfo.
|
|
|
|
// js_global_constructor is used to make js_global_function
|
|
|
|
// js_global_function is used to make the new inner_global.
|
|
|
|
//
|
|
|
|
// --- G l o b a l ---
|
|
|
|
// Step 1: Create a fresh inner JSGlobalObject.
|
|
|
|
Handle<JSFunction> js_global_function;
|
|
|
|
Handle<ObjectTemplateInfo> js_global_template;
|
|
|
|
if (!global_template.IsEmpty()) {
|
|
|
|
// Get prototype template of the global_template.
|
|
|
|
Handle<ObjectTemplateInfo> data =
|
|
|
|
v8::Utils::OpenHandle(*global_template);
|
|
|
|
Handle<FunctionTemplateInfo> global_constructor =
|
|
|
|
Handle<FunctionTemplateInfo>(
|
|
|
|
FunctionTemplateInfo::cast(data->constructor()));
|
2013-02-25 14:46:09 +00:00
|
|
|
Handle<Object> proto_template(global_constructor->prototype_template(),
|
|
|
|
isolate());
|
2010-03-23 11:40:38 +00:00
|
|
|
if (!proto_template->IsUndefined()) {
|
|
|
|
js_global_template =
|
|
|
|
Handle<ObjectTemplateInfo>::cast(proto_template);
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
}
|
2010-03-23 11:40:38 +00:00
|
|
|
}
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2010-03-23 11:40:38 +00:00
|
|
|
if (js_global_template.is_null()) {
|
2013-02-28 17:03:34 +00:00
|
|
|
Handle<String> name = Handle<String>(heap()->empty_string());
|
2011-04-14 08:01:19 +00:00
|
|
|
Handle<Code> code = Handle<Code>(isolate()->builtins()->builtin(
|
2011-03-23 13:40:07 +00:00
|
|
|
Builtins::kIllegal));
|
2010-03-23 11:40:38 +00:00
|
|
|
js_global_function =
|
2011-04-14 08:01:19 +00:00
|
|
|
factory()->NewFunction(name, JS_GLOBAL_OBJECT_TYPE,
|
|
|
|
JSGlobalObject::kSize, code, true);
|
2010-03-23 11:40:38 +00:00
|
|
|
// Change the constructor property of the prototype of the
|
|
|
|
// hidden global function to refer to the Object function.
|
|
|
|
Handle<JSObject> prototype =
|
|
|
|
Handle<JSObject>(
|
|
|
|
JSObject::cast(js_global_function->instance_prototype()));
|
2012-01-05 17:16:19 +00:00
|
|
|
CHECK_NOT_EMPTY_HANDLE(isolate(),
|
|
|
|
JSObject::SetLocalPropertyIgnoreAttributes(
|
2013-02-28 17:03:34 +00:00
|
|
|
prototype, factory()->constructor_string(),
|
2012-01-05 17:16:19 +00:00
|
|
|
isolate()->object_function(), NONE));
|
2010-03-23 11:40:38 +00:00
|
|
|
} else {
|
|
|
|
Handle<FunctionTemplateInfo> js_global_constructor(
|
|
|
|
FunctionTemplateInfo::cast(js_global_template->constructor()));
|
|
|
|
js_global_function =
|
2011-04-14 08:01:19 +00:00
|
|
|
factory()->CreateApiFunction(js_global_constructor,
|
|
|
|
factory()->InnerGlobalObject);
|
2010-03-23 11:40:38 +00:00
|
|
|
}
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2010-03-23 11:40:38 +00:00
|
|
|
js_global_function->initial_map()->set_is_hidden_prototype();
|
2012-08-06 14:25:19 +00:00
|
|
|
js_global_function->initial_map()->set_dictionary_map(true);
|
2010-03-23 11:40:38 +00:00
|
|
|
Handle<GlobalObject> inner_global =
|
2011-04-14 08:01:19 +00:00
|
|
|
factory()->NewGlobalObject(js_global_function);
|
2010-03-23 11:40:38 +00:00
|
|
|
if (inner_global_out != NULL) {
|
|
|
|
*inner_global_out = inner_global;
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
2010-03-23 11:40:38 +00:00
|
|
|
// Step 2: create or re-initialize the global proxy object.
|
|
|
|
Handle<JSFunction> global_proxy_function;
|
|
|
|
if (global_template.IsEmpty()) {
|
2013-02-28 17:03:34 +00:00
|
|
|
Handle<String> name = Handle<String>(heap()->empty_string());
|
2011-04-14 08:01:19 +00:00
|
|
|
Handle<Code> code = Handle<Code>(isolate()->builtins()->builtin(
|
2011-03-23 13:40:07 +00:00
|
|
|
Builtins::kIllegal));
|
2010-03-23 11:40:38 +00:00
|
|
|
global_proxy_function =
|
2011-04-14 08:01:19 +00:00
|
|
|
factory()->NewFunction(name, JS_GLOBAL_PROXY_TYPE,
|
|
|
|
JSGlobalProxy::kSize, code, true);
|
2010-03-23 11:40:38 +00:00
|
|
|
} else {
|
|
|
|
Handle<ObjectTemplateInfo> data =
|
|
|
|
v8::Utils::OpenHandle(*global_template);
|
|
|
|
Handle<FunctionTemplateInfo> global_constructor(
|
|
|
|
FunctionTemplateInfo::cast(data->constructor()));
|
|
|
|
global_proxy_function =
|
2011-04-14 08:01:19 +00:00
|
|
|
factory()->CreateApiFunction(global_constructor,
|
|
|
|
factory()->OuterGlobalObject);
|
2010-03-23 11:40:38 +00:00
|
|
|
}
|
|
|
|
|
2013-02-28 17:03:34 +00:00
|
|
|
Handle<String> global_name = factory()->InternalizeOneByteString(
|
2012-12-17 15:56:16 +00:00
|
|
|
STATIC_ASCII_VECTOR("global"));
|
2010-03-23 11:40:38 +00:00
|
|
|
global_proxy_function->shared()->set_instance_class_name(*global_name);
|
|
|
|
global_proxy_function->initial_map()->set_is_access_check_needed(true);
|
|
|
|
|
|
|
|
// Set global_proxy.__proto__ to js_global after ConfigureGlobalObjects
|
|
|
|
// Return the global proxy.
|
|
|
|
|
|
|
|
if (global_object.location() != NULL) {
|
|
|
|
ASSERT(global_object->IsJSGlobalProxy());
|
|
|
|
return ReinitializeJSGlobalProxy(
|
|
|
|
global_proxy_function,
|
|
|
|
Handle<JSGlobalProxy>::cast(global_object));
|
|
|
|
} else {
|
|
|
|
return Handle<JSGlobalProxy>::cast(
|
2011-04-14 08:01:19 +00:00
|
|
|
factory()->NewJSObject(global_proxy_function, TENURED));
|
2010-03-23 11:40:38 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Genesis::HookUpGlobalProxy(Handle<GlobalObject> inner_global,
|
|
|
|
Handle<JSGlobalProxy> global_proxy) {
|
2012-08-17 09:03:08 +00:00
|
|
|
// Set the native context for the global object.
|
|
|
|
inner_global->set_native_context(*native_context());
|
2012-08-28 11:25:08 +00:00
|
|
|
inner_global->set_global_context(*native_context());
|
2010-03-23 11:40:38 +00:00
|
|
|
inner_global->set_global_receiver(*global_proxy);
|
2012-08-20 11:35:50 +00:00
|
|
|
global_proxy->set_native_context(*native_context());
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_global_proxy(*global_proxy);
|
2010-03-23 11:40:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Genesis::HookUpInnerGlobal(Handle<GlobalObject> inner_global) {
|
|
|
|
Handle<GlobalObject> inner_global_from_snapshot(
|
2013-03-18 17:36:47 +00:00
|
|
|
GlobalObject::cast(native_context()->extension()));
|
|
|
|
Handle<JSBuiltinsObject> builtins_global(native_context()->builtins());
|
|
|
|
native_context()->set_extension(*inner_global);
|
|
|
|
native_context()->set_global_object(*inner_global);
|
|
|
|
native_context()->set_security_token(*inner_global);
|
2010-03-23 11:40:38 +00:00
|
|
|
static const PropertyAttributes attributes =
|
|
|
|
static_cast<PropertyAttributes>(READ_ONLY | DONT_DELETE);
|
|
|
|
ForceSetProperty(builtins_global,
|
2013-02-28 17:03:34 +00:00
|
|
|
factory()->InternalizeOneByteString(
|
2012-12-17 15:56:16 +00:00
|
|
|
STATIC_ASCII_VECTOR("global")),
|
2010-03-23 11:40:38 +00:00
|
|
|
inner_global,
|
|
|
|
attributes);
|
2012-01-13 13:09:52 +00:00
|
|
|
// Set up the reference from the global object to the builtins object.
|
2010-03-23 11:40:38 +00:00
|
|
|
JSGlobalObject::cast(*inner_global)->set_builtins(*builtins_global);
|
|
|
|
TransferNamedProperties(inner_global_from_snapshot, inner_global);
|
|
|
|
TransferIndexedProperties(inner_global_from_snapshot, inner_global);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// This is only called if we are not using snapshots. The equivalent
|
|
|
|
// work in the snapshot case is done in HookUpInnerGlobal.
|
2013-07-18 07:59:48 +00:00
|
|
|
void Genesis::InitializeGlobal(Handle<GlobalObject> inner_global,
|
2010-03-23 11:40:38 +00:00
|
|
|
Handle<JSFunction> empty_function) {
|
2013-10-14 13:25:36 +00:00
|
|
|
// --- N a t i v e C o n t e x t ---
|
2010-03-23 11:40:38 +00:00
|
|
|
// Use the empty function as closure (no scope info).
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_closure(*empty_function);
|
|
|
|
native_context()->set_previous(NULL);
|
2010-03-23 11:40:38 +00:00
|
|
|
// Set extension and global object.
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_extension(*inner_global);
|
2012-08-17 12:59:00 +00:00
|
|
|
native_context()->set_global_object(*inner_global);
|
2010-03-23 11:40:38 +00:00
|
|
|
// Security setup: Set the security token of the global object to
|
|
|
|
// its the inner global. This makes the security check between two
|
|
|
|
// different contexts fail by default even in case of global
|
|
|
|
// object reinitialization.
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_security_token(*inner_global);
|
2010-03-23 11:40:38 +00:00
|
|
|
|
2011-04-14 08:01:19 +00:00
|
|
|
Isolate* isolate = inner_global->GetIsolate();
|
2011-03-28 13:09:37 +00:00
|
|
|
Factory* factory = isolate->factory();
|
|
|
|
Heap* heap = isolate->heap();
|
|
|
|
|
2013-05-13 10:59:00 +00:00
|
|
|
Handle<String> object_name = factory->Object_string();
|
2012-01-05 17:16:19 +00:00
|
|
|
CHECK_NOT_EMPTY_HANDLE(isolate,
|
|
|
|
JSObject::SetLocalPropertyIgnoreAttributes(
|
|
|
|
inner_global, object_name,
|
|
|
|
isolate->object_function(), DONT_ENUM));
|
2010-03-23 11:40:38 +00:00
|
|
|
|
2012-08-17 12:59:00 +00:00
|
|
|
Handle<JSObject> global = Handle<JSObject>(native_context()->global_object());
|
2008-07-03 15:10:15 +00:00
|
|
|
|
|
|
|
// Install global Function object
|
|
|
|
InstallFunction(global, "Function", JS_FUNCTION_TYPE, JSFunction::kSize,
|
2013-05-15 15:23:53 +00:00
|
|
|
empty_function, Builtins::kIllegal, true, true);
|
2008-07-03 15:10:15 +00:00
|
|
|
|
|
|
|
{ // --- A r r a y ---
|
|
|
|
Handle<JSFunction> array_function =
|
|
|
|
InstallFunction(global, "Array", JS_ARRAY_TYPE, JSArray::kSize,
|
2011-03-28 13:09:37 +00:00
|
|
|
isolate->initial_object_prototype(),
|
2013-05-15 15:23:53 +00:00
|
|
|
Builtins::kArrayCode, true, true);
|
2008-09-16 10:12:32 +00:00
|
|
|
array_function->shared()->DontAdaptArguments();
|
2013-06-19 09:25:24 +00:00
|
|
|
array_function->shared()->set_function_data(Smi::FromInt(kArrayCode));
|
2008-07-03 15:10:15 +00:00
|
|
|
|
|
|
|
// This seems a bit hackish, but we need to make sure Array.length
|
|
|
|
// is 1.
|
|
|
|
array_function->shared()->set_length(1);
|
2012-07-18 14:00:58 +00:00
|
|
|
|
2012-08-13 08:43:16 +00:00
|
|
|
Handle<Map> initial_map(array_function->initial_map());
|
2013-06-28 13:16:14 +00:00
|
|
|
|
|
|
|
// This assert protects an optimization in
|
|
|
|
// HGraphBuilder::JSArrayBuilder::EmitMapCode()
|
|
|
|
ASSERT(initial_map->elements_kind() == GetInitialFastElementsKind());
|
|
|
|
|
2012-09-18 13:25:12 +00:00
|
|
|
Handle<DescriptorArray> array_descriptors(
|
|
|
|
factory->NewDescriptorArray(0, 1));
|
2012-07-23 16:18:25 +00:00
|
|
|
DescriptorArray::WhitenessWitness witness(*array_descriptors);
|
|
|
|
|
|
|
|
Handle<Foreign> array_length(factory->NewForeign(&Accessors::ArrayLength));
|
2012-07-18 14:00:58 +00:00
|
|
|
PropertyAttributes attribs = static_cast<PropertyAttributes>(
|
|
|
|
DONT_ENUM | DONT_DELETE);
|
2012-10-17 13:04:49 +00:00
|
|
|
initial_map->set_instance_descriptors(*array_descriptors);
|
2012-07-18 14:00:58 +00:00
|
|
|
|
|
|
|
{ // Add length.
|
2013-02-28 17:03:34 +00:00
|
|
|
CallbacksDescriptor d(*factory->length_string(), *array_length, attribs);
|
2012-07-19 10:01:52 +00:00
|
|
|
array_function->initial_map()->AppendDescriptor(&d, witness);
|
2012-07-18 14:00:58 +00:00
|
|
|
}
|
2008-07-03 15:10:15 +00:00
|
|
|
|
|
|
|
// array_function is used internally. JS code creating array object should
|
|
|
|
// search for the 'Array' property on the global object and use that one
|
|
|
|
// as the constructor. 'Array' property on a global object can be
|
|
|
|
// overwritten by JS code.
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_array_function(*array_function);
|
2013-04-25 16:00:32 +00:00
|
|
|
|
2013-06-25 16:31:07 +00:00
|
|
|
// Cache the array maps, needed by ArrayConstructorStub
|
|
|
|
CacheInitialJSArrayMaps(native_context(), initial_map);
|
|
|
|
ArrayConstructorStub array_constructor_stub(isolate);
|
|
|
|
Handle<Code> code = array_constructor_stub.GetCode(isolate);
|
|
|
|
array_function->shared()->set_construct_stub(*code);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
{ // --- N u m b e r ---
|
|
|
|
Handle<JSFunction> number_fun =
|
|
|
|
InstallFunction(global, "Number", JS_VALUE_TYPE, JSValue::kSize,
|
2011-03-28 13:09:37 +00:00
|
|
|
isolate->initial_object_prototype(),
|
2013-05-15 15:23:53 +00:00
|
|
|
Builtins::kIllegal, true, true);
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_number_function(*number_fun);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
{ // --- B o o l e a n ---
|
|
|
|
Handle<JSFunction> boolean_fun =
|
|
|
|
InstallFunction(global, "Boolean", JS_VALUE_TYPE, JSValue::kSize,
|
2011-03-28 13:09:37 +00:00
|
|
|
isolate->initial_object_prototype(),
|
2013-05-15 15:23:53 +00:00
|
|
|
Builtins::kIllegal, true, true);
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_boolean_function(*boolean_fun);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
{ // --- S t r i n g ---
|
|
|
|
Handle<JSFunction> string_fun =
|
|
|
|
InstallFunction(global, "String", JS_VALUE_TYPE, JSValue::kSize,
|
2011-03-28 13:09:37 +00:00
|
|
|
isolate->initial_object_prototype(),
|
2013-05-15 15:23:53 +00:00
|
|
|
Builtins::kIllegal, true, true);
|
2010-08-26 13:59:37 +00:00
|
|
|
string_fun->shared()->set_construct_stub(
|
2011-03-28 13:09:37 +00:00
|
|
|
isolate->builtins()->builtin(Builtins::kStringConstructCode));
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_string_function(*string_fun);
|
2012-07-18 14:00:58 +00:00
|
|
|
|
2012-07-19 10:01:52 +00:00
|
|
|
Handle<Map> string_map =
|
2012-08-17 09:03:08 +00:00
|
|
|
Handle<Map>(native_context()->string_function()->initial_map());
|
2012-09-18 13:25:12 +00:00
|
|
|
Handle<DescriptorArray> string_descriptors(
|
|
|
|
factory->NewDescriptorArray(0, 1));
|
2012-07-23 16:18:25 +00:00
|
|
|
DescriptorArray::WhitenessWitness witness(*string_descriptors);
|
|
|
|
|
|
|
|
Handle<Foreign> string_length(
|
|
|
|
factory->NewForeign(&Accessors::StringLength));
|
2012-07-18 14:00:58 +00:00
|
|
|
PropertyAttributes attribs = static_cast<PropertyAttributes>(
|
|
|
|
DONT_ENUM | DONT_DELETE | READ_ONLY);
|
2012-10-17 13:04:49 +00:00
|
|
|
string_map->set_instance_descriptors(*string_descriptors);
|
2012-07-18 14:00:58 +00:00
|
|
|
|
|
|
|
{ // Add length.
|
2013-02-28 17:03:34 +00:00
|
|
|
CallbacksDescriptor d(*factory->length_string(), *string_length, attribs);
|
2012-07-19 10:01:52 +00:00
|
|
|
string_map->AppendDescriptor(&d, witness);
|
2012-07-18 14:00:58 +00:00
|
|
|
}
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
{ // --- D a t e ---
|
|
|
|
// Builtin functions for Date.prototype.
|
|
|
|
Handle<JSFunction> date_fun =
|
2012-03-09 11:11:55 +00:00
|
|
|
InstallFunction(global, "Date", JS_DATE_TYPE, JSDate::kSize,
|
2011-03-28 13:09:37 +00:00
|
|
|
isolate->initial_object_prototype(),
|
2013-05-15 15:23:53 +00:00
|
|
|
Builtins::kIllegal, true, true);
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_date_function(*date_fun);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
{ // -- R e g E x p
|
|
|
|
// Builtin functions for RegExp.prototype.
|
|
|
|
Handle<JSFunction> regexp_fun =
|
2008-09-23 11:45:43 +00:00
|
|
|
InstallFunction(global, "RegExp", JS_REGEXP_TYPE, JSRegExp::kSize,
|
2011-03-28 13:09:37 +00:00
|
|
|
isolate->initial_object_prototype(),
|
2013-05-15 15:23:53 +00:00
|
|
|
Builtins::kIllegal, true, true);
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_regexp_function(*regexp_fun);
|
2010-03-26 14:19:47 +00:00
|
|
|
|
|
|
|
ASSERT(regexp_fun->has_initial_map());
|
|
|
|
Handle<Map> initial_map(regexp_fun->initial_map());
|
|
|
|
|
|
|
|
ASSERT_EQ(0, initial_map->inobject_properties());
|
|
|
|
|
|
|
|
PropertyAttributes final =
|
|
|
|
static_cast<PropertyAttributes>(DONT_ENUM | DONT_DELETE | READ_ONLY);
|
2012-09-18 13:25:12 +00:00
|
|
|
Handle<DescriptorArray> descriptors = factory->NewDescriptorArray(0, 5);
|
2012-07-19 10:01:52 +00:00
|
|
|
DescriptorArray::WhitenessWitness witness(*descriptors);
|
2012-10-17 13:04:49 +00:00
|
|
|
initial_map->set_instance_descriptors(*descriptors);
|
2012-07-19 10:01:52 +00:00
|
|
|
|
2010-03-26 14:19:47 +00:00
|
|
|
{
|
|
|
|
// ECMA-262, section 15.10.7.1.
|
2013-02-28 17:03:34 +00:00
|
|
|
FieldDescriptor field(heap->source_string(),
|
2010-03-26 14:19:47 +00:00
|
|
|
JSRegExp::kSourceFieldIndex,
|
2013-04-26 15:30:41 +00:00
|
|
|
final,
|
|
|
|
Representation::Tagged());
|
2012-07-19 10:01:52 +00:00
|
|
|
initial_map->AppendDescriptor(&field, witness);
|
2010-03-26 14:19:47 +00:00
|
|
|
}
|
|
|
|
{
|
|
|
|
// ECMA-262, section 15.10.7.2.
|
2013-02-28 17:03:34 +00:00
|
|
|
FieldDescriptor field(heap->global_string(),
|
2010-03-26 14:19:47 +00:00
|
|
|
JSRegExp::kGlobalFieldIndex,
|
2013-04-26 15:30:41 +00:00
|
|
|
final,
|
|
|
|
Representation::Tagged());
|
2012-07-19 10:01:52 +00:00
|
|
|
initial_map->AppendDescriptor(&field, witness);
|
2010-03-26 14:19:47 +00:00
|
|
|
}
|
|
|
|
{
|
|
|
|
// ECMA-262, section 15.10.7.3.
|
2013-02-28 17:03:34 +00:00
|
|
|
FieldDescriptor field(heap->ignore_case_string(),
|
2010-03-26 14:19:47 +00:00
|
|
|
JSRegExp::kIgnoreCaseFieldIndex,
|
2013-04-26 15:30:41 +00:00
|
|
|
final,
|
|
|
|
Representation::Tagged());
|
2012-07-19 10:01:52 +00:00
|
|
|
initial_map->AppendDescriptor(&field, witness);
|
2010-03-26 14:19:47 +00:00
|
|
|
}
|
|
|
|
{
|
|
|
|
// ECMA-262, section 15.10.7.4.
|
2013-02-28 17:03:34 +00:00
|
|
|
FieldDescriptor field(heap->multiline_string(),
|
2010-03-26 14:19:47 +00:00
|
|
|
JSRegExp::kMultilineFieldIndex,
|
2013-04-26 15:30:41 +00:00
|
|
|
final,
|
|
|
|
Representation::Tagged());
|
2012-07-19 10:01:52 +00:00
|
|
|
initial_map->AppendDescriptor(&field, witness);
|
2010-03-26 14:19:47 +00:00
|
|
|
}
|
|
|
|
{
|
|
|
|
// ECMA-262, section 15.10.7.5.
|
|
|
|
PropertyAttributes writable =
|
|
|
|
static_cast<PropertyAttributes>(DONT_ENUM | DONT_DELETE);
|
2013-02-28 17:03:34 +00:00
|
|
|
FieldDescriptor field(heap->last_index_string(),
|
2010-03-26 14:19:47 +00:00
|
|
|
JSRegExp::kLastIndexFieldIndex,
|
2013-04-26 15:30:41 +00:00
|
|
|
writable,
|
|
|
|
Representation::Tagged());
|
2012-07-19 10:01:52 +00:00
|
|
|
initial_map->AppendDescriptor(&field, witness);
|
2010-03-26 14:19:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
initial_map->set_inobject_properties(5);
|
|
|
|
initial_map->set_pre_allocated_property_fields(5);
|
|
|
|
initial_map->set_unused_property_fields(0);
|
|
|
|
initial_map->set_instance_size(
|
|
|
|
initial_map->instance_size() + 5 * kPointerSize);
|
2010-08-11 14:30:14 +00:00
|
|
|
initial_map->set_visitor_id(StaticVisitorBase::GetVisitorId(*initial_map));
|
2011-09-26 08:42:01 +00:00
|
|
|
|
|
|
|
// RegExp prototype object is itself a RegExp.
|
2012-07-17 13:50:19 +00:00
|
|
|
Handle<Map> proto_map = factory->CopyMap(initial_map);
|
2012-08-17 09:03:08 +00:00
|
|
|
proto_map->set_prototype(native_context()->initial_object_prototype());
|
2011-09-26 08:42:01 +00:00
|
|
|
Handle<JSObject> proto = factory->NewJSObjectFromMap(proto_map);
|
|
|
|
proto->InObjectPropertyAtPut(JSRegExp::kSourceFieldIndex,
|
2013-02-28 17:03:34 +00:00
|
|
|
heap->query_colon_string());
|
2011-09-26 08:42:01 +00:00
|
|
|
proto->InObjectPropertyAtPut(JSRegExp::kGlobalFieldIndex,
|
|
|
|
heap->false_value());
|
|
|
|
proto->InObjectPropertyAtPut(JSRegExp::kIgnoreCaseFieldIndex,
|
|
|
|
heap->false_value());
|
|
|
|
proto->InObjectPropertyAtPut(JSRegExp::kMultilineFieldIndex,
|
|
|
|
heap->false_value());
|
|
|
|
proto->InObjectPropertyAtPut(JSRegExp::kLastIndexFieldIndex,
|
|
|
|
Smi::FromInt(0),
|
|
|
|
SKIP_WRITE_BARRIER); // It's a Smi.
|
|
|
|
initial_map->set_prototype(*proto);
|
|
|
|
factory->SetRegExpIrregexpData(Handle<JSRegExp>::cast(proto),
|
|
|
|
JSRegExp::IRREGEXP, factory->empty_string(),
|
|
|
|
JSRegExp::Flags(0), 0);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
2009-04-24 08:13:09 +00:00
|
|
|
{ // -- J S O N
|
2013-09-25 15:11:48 +00:00
|
|
|
Handle<String> name = factory->InternalizeUtf8String("JSON");
|
2012-01-05 17:16:19 +00:00
|
|
|
Handle<JSFunction> cons = factory->NewFunction(name,
|
|
|
|
factory->the_hole_value());
|
2013-07-18 07:59:48 +00:00
|
|
|
JSFunction::SetInstancePrototype(cons,
|
|
|
|
Handle<Object>(native_context()->initial_object_prototype(), isolate));
|
2009-04-24 08:13:09 +00:00
|
|
|
cons->SetInstanceClassName(*name);
|
2011-03-28 13:09:37 +00:00
|
|
|
Handle<JSObject> json_object = factory->NewJSObject(cons, TENURED);
|
2009-04-24 08:13:09 +00:00
|
|
|
ASSERT(json_object->IsJSObject());
|
2012-01-05 17:16:19 +00:00
|
|
|
CHECK_NOT_EMPTY_HANDLE(isolate,
|
|
|
|
JSObject::SetLocalPropertyIgnoreAttributes(
|
|
|
|
global, name, json_object, DONT_ENUM));
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_json_object(*json_object);
|
2009-04-24 08:13:09 +00:00
|
|
|
}
|
|
|
|
|
2013-08-20 13:55:52 +00:00
|
|
|
{ // -- A r r a y B u f f e r
|
|
|
|
Handle<JSFunction> array_buffer_fun =
|
|
|
|
InstallFunction(
|
|
|
|
global, "ArrayBuffer", JS_ARRAY_BUFFER_TYPE,
|
|
|
|
JSArrayBuffer::kSizeWithInternalFields,
|
|
|
|
isolate->initial_object_prototype(),
|
|
|
|
Builtins::kIllegal, true, true);
|
|
|
|
native_context()->set_array_buffer_fun(*array_buffer_fun);
|
|
|
|
}
|
|
|
|
|
|
|
|
{ // -- T y p e d A r r a y s
|
2014-01-24 16:01:15 +00:00
|
|
|
#define INSTALL_TYPED_ARRAY(Type, type, TYPE, ctype, size) \
|
|
|
|
{ \
|
|
|
|
Handle<JSFunction> fun = InstallTypedArray(#Type "Array", \
|
2014-03-26 12:50:13 +00:00
|
|
|
TYPE##_ELEMENTS); \
|
2014-01-24 16:01:15 +00:00
|
|
|
native_context()->set_##type##_array_fun(*fun); \
|
|
|
|
}
|
|
|
|
TYPED_ARRAYS(INSTALL_TYPED_ARRAY)
|
|
|
|
#undef INSTALL_TYPED_ARRAY
|
2013-08-20 13:55:52 +00:00
|
|
|
|
|
|
|
Handle<JSFunction> data_view_fun =
|
|
|
|
InstallFunction(
|
|
|
|
global, "DataView", JS_DATA_VIEW_TYPE,
|
|
|
|
JSDataView::kSizeWithInternalFields,
|
|
|
|
isolate->initial_object_prototype(),
|
|
|
|
Builtins::kIllegal, true, true);
|
|
|
|
native_context()->set_data_view_fun(*data_view_fun);
|
|
|
|
}
|
|
|
|
|
2014-03-27 16:42:34 +00:00
|
|
|
{ // -- W e a k M a p
|
|
|
|
InstallFunction(global, "WeakMap", JS_WEAK_MAP_TYPE, JSWeakMap::kSize,
|
|
|
|
isolate->initial_object_prototype(),
|
|
|
|
Builtins::kIllegal, true, true);
|
|
|
|
}
|
|
|
|
|
|
|
|
{ // -- W e a k S e t
|
|
|
|
InstallFunction(global, "WeakSet", JS_WEAK_SET_TYPE, JSWeakSet::kSize,
|
|
|
|
isolate->initial_object_prototype(),
|
|
|
|
Builtins::kIllegal, true, true);
|
|
|
|
}
|
|
|
|
|
2008-07-03 15:10:15 +00:00
|
|
|
{ // --- arguments_boilerplate_
|
|
|
|
// Make sure we can recognize argument objects at runtime.
|
|
|
|
// This is done by introducing an anonymous function with
|
|
|
|
// class_name equals 'Arguments'.
|
2013-02-28 17:03:34 +00:00
|
|
|
Handle<String> arguments_string = factory->InternalizeOneByteString(
|
2012-12-17 15:56:16 +00:00
|
|
|
STATIC_ASCII_VECTOR("Arguments"));
|
2011-03-18 20:35:07 +00:00
|
|
|
Handle<Code> code = Handle<Code>(
|
2011-03-28 13:09:37 +00:00
|
|
|
isolate->builtins()->builtin(Builtins::kIllegal));
|
2008-07-03 15:10:15 +00:00
|
|
|
Handle<JSObject> prototype =
|
|
|
|
Handle<JSObject>(
|
2012-08-17 09:03:08 +00:00
|
|
|
JSObject::cast(native_context()->object_function()->prototype()));
|
2008-10-23 08:46:32 +00:00
|
|
|
|
2008-07-03 15:10:15 +00:00
|
|
|
Handle<JSFunction> function =
|
2013-02-28 17:03:34 +00:00
|
|
|
factory->NewFunctionWithPrototype(arguments_string,
|
2008-10-23 08:46:32 +00:00
|
|
|
JS_OBJECT_TYPE,
|
|
|
|
JSObject::kHeaderSize,
|
|
|
|
prototype,
|
|
|
|
code,
|
|
|
|
false);
|
|
|
|
ASSERT(!function->has_initial_map());
|
2013-02-28 17:03:34 +00:00
|
|
|
function->shared()->set_instance_class_name(*arguments_string);
|
2008-10-23 08:46:32 +00:00
|
|
|
function->shared()->set_expected_nof_properties(2);
|
2011-03-28 13:09:37 +00:00
|
|
|
Handle<JSObject> result = factory->NewJSObject(function);
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2014-03-11 14:41:22 +00:00
|
|
|
native_context()->set_sloppy_arguments_boilerplate(*result);
|
2011-03-17 20:28:41 +00:00
|
|
|
// Note: length must be added as the first property and
|
|
|
|
// callee must be added as the second property.
|
2012-01-05 17:16:19 +00:00
|
|
|
CHECK_NOT_EMPTY_HANDLE(isolate,
|
|
|
|
JSObject::SetLocalPropertyIgnoreAttributes(
|
2013-02-28 17:03:34 +00:00
|
|
|
result, factory->length_string(),
|
2013-06-06 14:21:35 +00:00
|
|
|
factory->undefined_value(), DONT_ENUM,
|
2013-08-22 13:43:06 +00:00
|
|
|
Object::FORCE_TAGGED, FORCE_FIELD));
|
2012-01-05 17:16:19 +00:00
|
|
|
CHECK_NOT_EMPTY_HANDLE(isolate,
|
|
|
|
JSObject::SetLocalPropertyIgnoreAttributes(
|
2013-02-28 17:03:34 +00:00
|
|
|
result, factory->callee_string(),
|
2013-06-06 14:21:35 +00:00
|
|
|
factory->undefined_value(), DONT_ENUM,
|
2013-08-22 13:43:06 +00:00
|
|
|
Object::FORCE_TAGGED, FORCE_FIELD));
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2008-10-23 08:46:32 +00:00
|
|
|
#ifdef DEBUG
|
2011-10-18 11:18:55 +00:00
|
|
|
LookupResult lookup(isolate);
|
2013-02-28 17:03:34 +00:00
|
|
|
result->LocalLookup(heap->callee_string(), &lookup);
|
2012-06-21 15:32:52 +00:00
|
|
|
ASSERT(lookup.IsField());
|
2012-11-13 11:07:04 +00:00
|
|
|
ASSERT(lookup.GetFieldIndex().field_index() == Heap::kArgumentsCalleeIndex);
|
2011-03-17 20:28:41 +00:00
|
|
|
|
2013-02-28 17:03:34 +00:00
|
|
|
result->LocalLookup(heap->length_string(), &lookup);
|
2012-06-21 15:32:52 +00:00
|
|
|
ASSERT(lookup.IsField());
|
2012-11-13 11:07:04 +00:00
|
|
|
ASSERT(lookup.GetFieldIndex().field_index() == Heap::kArgumentsLengthIndex);
|
2011-03-17 20:28:41 +00:00
|
|
|
|
|
|
|
ASSERT(result->map()->inobject_properties() > Heap::kArgumentsCalleeIndex);
|
|
|
|
ASSERT(result->map()->inobject_properties() > Heap::kArgumentsLengthIndex);
|
|
|
|
|
|
|
|
// Check the state of the object.
|
|
|
|
ASSERT(result->HasFastProperties());
|
2012-05-23 14:24:29 +00:00
|
|
|
ASSERT(result->HasFastObjectElements());
|
2011-03-17 20:28:41 +00:00
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2011-06-16 14:12:58 +00:00
|
|
|
{ // --- aliased_arguments_boilerplate_
|
|
|
|
// Set up a well-formed parameter map to make assertions happy.
|
|
|
|
Handle<FixedArray> elements = factory->NewFixedArray(2);
|
2014-03-11 14:39:08 +00:00
|
|
|
elements->set_map(heap->sloppy_arguments_elements_map());
|
2011-06-16 14:12:58 +00:00
|
|
|
Handle<FixedArray> array;
|
|
|
|
array = factory->NewFixedArray(0);
|
|
|
|
elements->set(0, *array);
|
|
|
|
array = factory->NewFixedArray(0);
|
|
|
|
elements->set(1, *array);
|
2011-10-18 11:32:57 +00:00
|
|
|
|
2014-03-11 14:41:22 +00:00
|
|
|
Handle<Map> old_map(
|
|
|
|
native_context()->sloppy_arguments_boilerplate()->map());
|
2012-07-17 13:50:19 +00:00
|
|
|
Handle<Map> new_map = factory->CopyMap(old_map);
|
2011-10-18 11:32:57 +00:00
|
|
|
new_map->set_pre_allocated_property_fields(2);
|
|
|
|
Handle<JSObject> result = factory->NewJSObjectFromMap(new_map);
|
|
|
|
// Set elements kind after allocating the object because
|
|
|
|
// NewJSObjectFromMap assumes a fast elements map.
|
2014-03-11 14:39:08 +00:00
|
|
|
new_map->set_elements_kind(SLOPPY_ARGUMENTS_ELEMENTS);
|
2011-06-16 14:12:58 +00:00
|
|
|
result->set_elements(*elements);
|
2014-03-11 14:39:08 +00:00
|
|
|
ASSERT(result->HasSloppyArgumentsElements());
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_aliased_arguments_boilerplate(*result);
|
2011-06-16 14:12:58 +00:00
|
|
|
}
|
|
|
|
|
2011-03-17 20:28:41 +00:00
|
|
|
{ // --- strict mode arguments boilerplate
|
|
|
|
const PropertyAttributes attributes =
|
|
|
|
static_cast<PropertyAttributes>(DONT_ENUM | DONT_DELETE | READ_ONLY);
|
|
|
|
|
|
|
|
// Create the ThrowTypeError functions.
|
2012-01-10 16:11:33 +00:00
|
|
|
Handle<AccessorPair> callee = factory->NewAccessorPair();
|
|
|
|
Handle<AccessorPair> caller = factory->NewAccessorPair();
|
2011-03-17 20:28:41 +00:00
|
|
|
|
2011-05-24 11:07:06 +00:00
|
|
|
Handle<JSFunction> throw_function =
|
|
|
|
GetThrowTypeErrorFunction();
|
2011-03-17 20:28:41 +00:00
|
|
|
|
|
|
|
// Install the ThrowTypeError functions.
|
2012-01-10 16:11:33 +00:00
|
|
|
callee->set_getter(*throw_function);
|
|
|
|
callee->set_setter(*throw_function);
|
|
|
|
caller->set_getter(*throw_function);
|
|
|
|
caller->set_setter(*throw_function);
|
2011-03-17 20:28:41 +00:00
|
|
|
|
2012-07-18 15:38:58 +00:00
|
|
|
// Create the map. Allocate one in-object field for length.
|
|
|
|
Handle<Map> map = factory->NewMap(JS_OBJECT_TYPE,
|
2014-03-11 14:41:22 +00:00
|
|
|
Heap::kStrictArgumentsObjectSize);
|
2011-03-17 20:28:41 +00:00
|
|
|
// Create the descriptor array for the arguments object.
|
2012-09-18 13:25:12 +00:00
|
|
|
Handle<DescriptorArray> descriptors = factory->NewDescriptorArray(0, 3);
|
2011-10-21 10:32:38 +00:00
|
|
|
DescriptorArray::WhitenessWitness witness(*descriptors);
|
2012-10-17 13:04:49 +00:00
|
|
|
map->set_instance_descriptors(*descriptors);
|
2012-07-19 10:01:52 +00:00
|
|
|
|
2011-03-17 20:28:41 +00:00
|
|
|
{ // length
|
2013-04-26 15:30:41 +00:00
|
|
|
FieldDescriptor d(
|
|
|
|
*factory->length_string(), 0, DONT_ENUM, Representation::Tagged());
|
2012-07-19 10:01:52 +00:00
|
|
|
map->AppendDescriptor(&d, witness);
|
2011-03-17 20:28:41 +00:00
|
|
|
}
|
|
|
|
{ // callee
|
2013-02-28 17:03:34 +00:00
|
|
|
CallbacksDescriptor d(*factory->callee_string(),
|
2012-07-11 14:26:42 +00:00
|
|
|
*callee,
|
2012-07-12 15:14:54 +00:00
|
|
|
attributes);
|
2012-07-19 10:01:52 +00:00
|
|
|
map->AppendDescriptor(&d, witness);
|
2011-03-17 20:28:41 +00:00
|
|
|
}
|
|
|
|
{ // caller
|
2013-02-28 17:03:34 +00:00
|
|
|
CallbacksDescriptor d(*factory->caller_string(),
|
2012-07-11 14:26:42 +00:00
|
|
|
*caller,
|
2012-07-12 15:14:54 +00:00
|
|
|
attributes);
|
2012-07-19 10:01:52 +00:00
|
|
|
map->AppendDescriptor(&d, witness);
|
2011-03-17 20:28:41 +00:00
|
|
|
}
|
2012-07-18 15:38:58 +00:00
|
|
|
|
2011-03-17 20:28:41 +00:00
|
|
|
map->set_function_with_prototype(true);
|
2012-08-17 09:03:08 +00:00
|
|
|
map->set_prototype(native_context()->object_function()->prototype());
|
2011-03-17 20:28:41 +00:00
|
|
|
map->set_pre_allocated_property_fields(1);
|
|
|
|
map->set_inobject_properties(1);
|
|
|
|
|
2014-03-11 14:39:08 +00:00
|
|
|
// Copy constructor from the sloppy arguments boilerplate.
|
2011-03-17 20:28:41 +00:00
|
|
|
map->set_constructor(
|
2014-03-11 14:41:22 +00:00
|
|
|
native_context()->sloppy_arguments_boilerplate()->map()->constructor());
|
2008-10-23 08:46:32 +00:00
|
|
|
|
2011-03-17 20:28:41 +00:00
|
|
|
// Allocate the arguments boilerplate object.
|
2011-03-28 13:09:37 +00:00
|
|
|
Handle<JSObject> result = factory->NewJSObjectFromMap(map);
|
2014-03-11 14:41:22 +00:00
|
|
|
native_context()->set_strict_arguments_boilerplate(*result);
|
2011-03-17 20:28:41 +00:00
|
|
|
|
|
|
|
// Add length property only for strict mode boilerplate.
|
2012-01-05 17:16:19 +00:00
|
|
|
CHECK_NOT_EMPTY_HANDLE(isolate,
|
|
|
|
JSObject::SetLocalPropertyIgnoreAttributes(
|
2013-02-28 17:03:34 +00:00
|
|
|
result, factory->length_string(),
|
2012-01-05 17:16:19 +00:00
|
|
|
factory->undefined_value(), DONT_ENUM));
|
2011-03-17 20:28:41 +00:00
|
|
|
|
|
|
|
#ifdef DEBUG
|
2011-10-18 11:18:55 +00:00
|
|
|
LookupResult lookup(isolate);
|
2013-02-28 17:03:34 +00:00
|
|
|
result->LocalLookup(heap->length_string(), &lookup);
|
2012-06-21 15:32:52 +00:00
|
|
|
ASSERT(lookup.IsField());
|
2012-11-13 11:07:04 +00:00
|
|
|
ASSERT(lookup.GetFieldIndex().field_index() == Heap::kArgumentsLengthIndex);
|
2008-10-23 08:46:32 +00:00
|
|
|
|
2011-03-17 20:28:41 +00:00
|
|
|
ASSERT(result->map()->inobject_properties() > Heap::kArgumentsLengthIndex);
|
2008-10-23 08:46:32 +00:00
|
|
|
|
2008-07-03 15:10:15 +00:00
|
|
|
// Check the state of the object.
|
|
|
|
ASSERT(result->HasFastProperties());
|
2012-05-23 14:24:29 +00:00
|
|
|
ASSERT(result->HasFastObjectElements());
|
2008-10-23 08:46:32 +00:00
|
|
|
#endif
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
{ // --- context extension
|
|
|
|
// Create a function for the context extension objects.
|
2011-03-18 20:35:07 +00:00
|
|
|
Handle<Code> code = Handle<Code>(
|
2011-03-28 13:09:37 +00:00
|
|
|
isolate->builtins()->builtin(Builtins::kIllegal));
|
2008-07-03 15:10:15 +00:00
|
|
|
Handle<JSFunction> context_extension_fun =
|
2013-02-28 17:03:34 +00:00
|
|
|
factory->NewFunction(factory->empty_string(),
|
2009-01-14 12:13:26 +00:00
|
|
|
JS_CONTEXT_EXTENSION_OBJECT_TYPE,
|
|
|
|
JSObject::kHeaderSize,
|
|
|
|
code,
|
|
|
|
true);
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2013-02-28 17:03:34 +00:00
|
|
|
Handle<String> name = factory->InternalizeOneByteString(
|
|
|
|
STATIC_ASCII_VECTOR("context_extension"));
|
2008-07-03 15:10:15 +00:00
|
|
|
context_extension_fun->shared()->set_instance_class_name(*name);
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_context_extension_function(*context_extension_fun);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
2009-05-20 19:33:44 +00:00
|
|
|
|
|
|
|
{
|
2011-08-30 09:35:20 +00:00
|
|
|
// Set up the call-as-function delegate.
|
2009-05-20 19:33:44 +00:00
|
|
|
Handle<Code> code =
|
2011-03-28 13:09:37 +00:00
|
|
|
Handle<Code>(isolate->builtins()->builtin(
|
2011-03-23 13:40:07 +00:00
|
|
|
Builtins::kHandleApiCallAsFunction));
|
2009-05-20 19:33:44 +00:00
|
|
|
Handle<JSFunction> delegate =
|
2013-02-28 17:03:34 +00:00
|
|
|
factory->NewFunction(factory->empty_string(), JS_OBJECT_TYPE,
|
2009-05-20 19:33:44 +00:00
|
|
|
JSObject::kHeaderSize, code, true);
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_call_as_function_delegate(*delegate);
|
2009-05-20 19:33:44 +00:00
|
|
|
delegate->shared()->DontAdaptArguments();
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
2011-08-30 09:35:20 +00:00
|
|
|
// Set up the call-as-constructor delegate.
|
2009-05-20 19:33:44 +00:00
|
|
|
Handle<Code> code =
|
2011-03-28 13:09:37 +00:00
|
|
|
Handle<Code>(isolate->builtins()->builtin(
|
2011-03-23 13:40:07 +00:00
|
|
|
Builtins::kHandleApiCallAsConstructor));
|
2009-05-20 19:33:44 +00:00
|
|
|
Handle<JSFunction> delegate =
|
2013-02-28 17:03:34 +00:00
|
|
|
factory->NewFunction(factory->empty_string(), JS_OBJECT_TYPE,
|
2009-05-20 19:33:44 +00:00
|
|
|
JSObject::kHeaderSize, code, true);
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_call_as_constructor_delegate(*delegate);
|
2009-05-20 19:33:44 +00:00
|
|
|
delegate->shared()->DontAdaptArguments();
|
|
|
|
}
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2012-11-13 12:27:03 +00:00
|
|
|
// Initialize the embedder data slot.
|
2013-12-18 08:45:17 +00:00
|
|
|
Handle<FixedArray> embedder_data = factory->NewFixedArray(3);
|
2012-11-13 12:27:03 +00:00
|
|
|
native_context()->set_embedder_data(*embedder_data);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-05-15 15:23:53 +00:00
|
|
|
Handle<JSFunction> Genesis::InstallTypedArray(
|
|
|
|
const char* name, ElementsKind elementsKind) {
|
2013-04-16 14:16:30 +00:00
|
|
|
Handle<JSObject> global = Handle<JSObject>(native_context()->global_object());
|
2013-05-15 15:23:53 +00:00
|
|
|
Handle<JSFunction> result = InstallFunction(global, name, JS_TYPED_ARRAY_TYPE,
|
2013-04-29 11:09:03 +00:00
|
|
|
JSTypedArray::kSize, isolate()->initial_object_prototype(),
|
2013-05-15 15:23:53 +00:00
|
|
|
Builtins::kIllegal, false, true);
|
|
|
|
|
|
|
|
Handle<Map> initial_map = isolate()->factory()->NewMap(
|
2013-07-05 10:12:36 +00:00
|
|
|
JS_TYPED_ARRAY_TYPE, JSTypedArray::kSizeWithInternalFields, elementsKind);
|
2013-05-15 15:23:53 +00:00
|
|
|
result->set_initial_map(*initial_map);
|
|
|
|
initial_map->set_constructor(*result);
|
|
|
|
return result;
|
2013-04-16 14:16:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-08-03 11:55:13 +00:00
|
|
|
void Genesis::InitializeExperimentalGlobal() {
|
2012-08-17 12:59:00 +00:00
|
|
|
Handle<JSObject> global = Handle<JSObject>(native_context()->global_object());
|
2011-08-03 11:55:13 +00:00
|
|
|
|
2011-08-03 12:23:55 +00:00
|
|
|
// TODO(mstarzinger): Move this into Genesis::InitializeGlobal once we no
|
2013-03-22 16:33:50 +00:00
|
|
|
// longer need to live behind flags, so functions get added to the snapshot.
|
|
|
|
|
|
|
|
if (FLAG_harmony_symbols) {
|
|
|
|
// --- S y m b o l ---
|
|
|
|
Handle<JSFunction> symbol_fun =
|
|
|
|
InstallFunction(global, "Symbol", JS_VALUE_TYPE, JSValue::kSize,
|
|
|
|
isolate()->initial_object_prototype(),
|
2013-05-15 15:23:53 +00:00
|
|
|
Builtins::kIllegal, true, true);
|
2013-03-22 16:33:50 +00:00
|
|
|
native_context()->set_symbol_function(*symbol_fun);
|
|
|
|
}
|
|
|
|
|
2011-10-25 14:14:56 +00:00
|
|
|
if (FLAG_harmony_collections) {
|
2014-03-18 09:57:14 +00:00
|
|
|
{ // -- M a p
|
|
|
|
InstallFunction(global, "Map", JS_MAP_TYPE, JSMap::kSize,
|
2013-04-11 13:31:51 +00:00
|
|
|
isolate()->initial_object_prototype(),
|
2013-05-15 15:23:53 +00:00
|
|
|
Builtins::kIllegal, true, true);
|
2011-10-25 14:14:56 +00:00
|
|
|
}
|
2014-03-18 09:57:14 +00:00
|
|
|
{ // -- S e t
|
|
|
|
InstallFunction(global, "Set", JS_SET_TYPE, JSSet::kSize,
|
2013-04-11 13:31:51 +00:00
|
|
|
isolate()->initial_object_prototype(),
|
2013-05-15 15:23:53 +00:00
|
|
|
Builtins::kIllegal, true, true);
|
2011-10-25 14:14:56 +00:00
|
|
|
}
|
2014-03-18 09:57:14 +00:00
|
|
|
}
|
|
|
|
|
2013-04-11 16:28:19 +00:00
|
|
|
if (FLAG_harmony_generators) {
|
|
|
|
// Create generator meta-objects and install them on the builtins object.
|
|
|
|
Handle<JSObject> builtins(native_context()->builtins());
|
|
|
|
Handle<JSObject> generator_object_prototype =
|
|
|
|
factory()->NewJSObject(isolate()->object_function(), TENURED);
|
|
|
|
Handle<JSFunction> generator_function_prototype =
|
|
|
|
InstallFunction(builtins, "GeneratorFunctionPrototype",
|
|
|
|
JS_FUNCTION_TYPE, JSFunction::kHeaderSize,
|
|
|
|
generator_object_prototype, Builtins::kIllegal,
|
2013-05-15 15:23:53 +00:00
|
|
|
false, false);
|
2013-04-11 16:28:19 +00:00
|
|
|
InstallFunction(builtins, "GeneratorFunction",
|
|
|
|
JS_FUNCTION_TYPE, JSFunction::kSize,
|
|
|
|
generator_function_prototype, Builtins::kIllegal,
|
2013-05-15 15:23:53 +00:00
|
|
|
false, false);
|
2013-04-11 16:28:19 +00:00
|
|
|
|
|
|
|
// Create maps for generator functions and their prototypes. Store those
|
|
|
|
// maps in the native context.
|
2014-03-11 14:41:22 +00:00
|
|
|
Handle<Map> function_map(native_context()->sloppy_function_map());
|
2013-04-11 16:28:19 +00:00
|
|
|
Handle<Map> generator_function_map = factory()->CopyMap(function_map);
|
|
|
|
generator_function_map->set_prototype(*generator_function_prototype);
|
2014-03-11 14:41:22 +00:00
|
|
|
native_context()->set_sloppy_generator_function_map(
|
|
|
|
*generator_function_map);
|
2013-04-11 16:28:19 +00:00
|
|
|
|
|
|
|
Handle<Map> strict_mode_function_map(
|
2014-03-11 14:41:22 +00:00
|
|
|
native_context()->strict_function_map());
|
2013-04-11 16:28:19 +00:00
|
|
|
Handle<Map> strict_mode_generator_function_map = factory()->CopyMap(
|
|
|
|
strict_mode_function_map);
|
|
|
|
strict_mode_generator_function_map->set_prototype(
|
|
|
|
*generator_function_prototype);
|
2014-03-11 14:41:22 +00:00
|
|
|
native_context()->set_strict_generator_function_map(
|
2013-04-11 16:28:19 +00:00
|
|
|
*strict_mode_generator_function_map);
|
|
|
|
|
|
|
|
Handle<Map> object_map(native_context()->object_function()->initial_map());
|
|
|
|
Handle<Map> generator_object_prototype_map = factory()->CopyMap(
|
|
|
|
object_map, 0);
|
|
|
|
generator_object_prototype_map->set_prototype(
|
|
|
|
*generator_object_prototype);
|
|
|
|
native_context()->set_generator_object_prototype_map(
|
|
|
|
*generator_object_prototype_map);
|
2013-05-07 08:46:42 +00:00
|
|
|
|
|
|
|
// Create a map for generator result objects.
|
|
|
|
ASSERT(object_map->inobject_properties() == 0);
|
|
|
|
STATIC_ASSERT(JSGeneratorObject::kResultPropertyCount == 2);
|
|
|
|
Handle<Map> generator_result_map = factory()->CopyMap(object_map,
|
|
|
|
JSGeneratorObject::kResultPropertyCount);
|
|
|
|
ASSERT(generator_result_map->inobject_properties() ==
|
|
|
|
JSGeneratorObject::kResultPropertyCount);
|
|
|
|
|
|
|
|
Handle<DescriptorArray> descriptors = factory()->NewDescriptorArray(0,
|
|
|
|
JSGeneratorObject::kResultPropertyCount);
|
|
|
|
DescriptorArray::WhitenessWitness witness(*descriptors);
|
|
|
|
generator_result_map->set_instance_descriptors(*descriptors);
|
|
|
|
|
|
|
|
Handle<String> value_string = factory()->InternalizeOneByteString(
|
|
|
|
STATIC_ASCII_VECTOR("value"));
|
|
|
|
FieldDescriptor value_descr(*value_string,
|
|
|
|
JSGeneratorObject::kResultValuePropertyIndex,
|
|
|
|
NONE,
|
|
|
|
Representation::Tagged());
|
|
|
|
generator_result_map->AppendDescriptor(&value_descr, witness);
|
|
|
|
|
|
|
|
Handle<String> done_string = factory()->InternalizeOneByteString(
|
|
|
|
STATIC_ASCII_VECTOR("done"));
|
|
|
|
FieldDescriptor done_descr(*done_string,
|
|
|
|
JSGeneratorObject::kResultDonePropertyIndex,
|
|
|
|
NONE,
|
|
|
|
Representation::Tagged());
|
|
|
|
generator_result_map->AppendDescriptor(&done_descr, witness);
|
|
|
|
|
|
|
|
generator_result_map->set_unused_property_fields(0);
|
|
|
|
ASSERT_EQ(JSGeneratorObject::kResultSize,
|
|
|
|
generator_result_map->instance_size());
|
|
|
|
native_context()->set_generator_result_map(*generator_result_map);
|
2013-04-11 16:28:19 +00:00
|
|
|
}
|
2011-08-03 11:55:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-04-14 08:01:19 +00:00
|
|
|
bool Genesis::CompileBuiltin(Isolate* isolate, int index) {
|
2008-07-03 15:10:15 +00:00
|
|
|
Vector<const char> name = Natives::GetScriptName(index);
|
2011-03-18 20:35:07 +00:00
|
|
|
Handle<String> source_code =
|
2011-04-14 08:01:19 +00:00
|
|
|
isolate->bootstrapper()->NativesSourceLookup(index);
|
2013-02-15 09:27:10 +00:00
|
|
|
return CompileNative(isolate, name, source_code);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-04-15 12:31:03 +00:00
|
|
|
bool Genesis::CompileExperimentalBuiltin(Isolate* isolate, int index) {
|
|
|
|
Vector<const char> name = ExperimentalNatives::GetScriptName(index);
|
|
|
|
Factory* factory = isolate->factory();
|
|
|
|
Handle<String> source_code =
|
2011-06-06 20:47:30 +00:00
|
|
|
factory->NewStringFromAscii(
|
|
|
|
ExperimentalNatives::GetRawScriptSource(index));
|
2014-03-25 09:09:24 +00:00
|
|
|
RETURN_IF_EMPTY_HANDLE_VALUE(isolate, source_code, false);
|
2013-02-15 09:27:10 +00:00
|
|
|
return CompileNative(isolate, name, source_code);
|
2011-04-15 12:31:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-02-15 09:27:10 +00:00
|
|
|
bool Genesis::CompileNative(Isolate* isolate,
|
|
|
|
Vector<const char> name,
|
|
|
|
Handle<String> source) {
|
|
|
|
HandleScope scope(isolate);
|
2009-04-20 16:36:13 +00:00
|
|
|
#ifdef ENABLE_DEBUGGER_SUPPORT
|
2011-03-18 20:35:07 +00:00
|
|
|
isolate->debugger()->set_compiling_natives(true);
|
2009-04-20 16:36:13 +00:00
|
|
|
#endif
|
2012-04-03 15:54:07 +00:00
|
|
|
// During genesis, the boilerplate for stack overflow won't work until the
|
|
|
|
// environment has been at least partially initialized. Add a stack check
|
|
|
|
// before entering JS code to catch overflow early.
|
2013-02-15 09:27:10 +00:00
|
|
|
StackLimitCheck check(isolate);
|
2012-04-03 15:54:07 +00:00
|
|
|
if (check.HasOverflowed()) return false;
|
|
|
|
|
2013-02-15 09:27:10 +00:00
|
|
|
bool result = CompileScriptCached(isolate,
|
|
|
|
name,
|
2010-03-23 11:40:38 +00:00
|
|
|
source,
|
|
|
|
NULL,
|
|
|
|
NULL,
|
2011-03-18 20:35:07 +00:00
|
|
|
Handle<Context>(isolate->context()),
|
2010-03-23 11:40:38 +00:00
|
|
|
true);
|
2011-03-18 20:35:07 +00:00
|
|
|
ASSERT(isolate->has_pending_exception() != result);
|
|
|
|
if (!result) isolate->clear_pending_exception();
|
2009-04-20 16:36:13 +00:00
|
|
|
#ifdef ENABLE_DEBUGGER_SUPPORT
|
2011-03-18 20:35:07 +00:00
|
|
|
isolate->debugger()->set_compiling_natives(false);
|
2009-04-20 16:36:13 +00:00
|
|
|
#endif
|
2008-07-03 15:10:15 +00:00
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-02-15 09:27:10 +00:00
|
|
|
bool Genesis::CompileScriptCached(Isolate* isolate,
|
|
|
|
Vector<const char> name,
|
2008-07-03 15:10:15 +00:00
|
|
|
Handle<String> source,
|
|
|
|
SourceCodeCache* cache,
|
|
|
|
v8::Extension* extension,
|
2010-03-23 11:40:38 +00:00
|
|
|
Handle<Context> top_context,
|
2008-07-03 15:10:15 +00:00
|
|
|
bool use_runtime_context) {
|
2013-02-15 09:27:10 +00:00
|
|
|
Factory* factory = isolate->factory();
|
|
|
|
HandleScope scope(isolate);
|
2010-03-23 06:04:44 +00:00
|
|
|
Handle<SharedFunctionInfo> function_info;
|
2008-07-03 15:10:15 +00:00
|
|
|
|
|
|
|
// If we can't find the function in the cache, we compile a new
|
|
|
|
// function and insert it into the cache.
|
2010-03-23 11:40:38 +00:00
|
|
|
if (cache == NULL || !cache->Lookup(name, &function_info)) {
|
2012-11-21 10:01:05 +00:00
|
|
|
ASSERT(source->IsOneByteRepresentation());
|
2011-03-28 13:09:37 +00:00
|
|
|
Handle<String> script_name = factory->NewStringFromUtf8(name);
|
2014-03-25 09:09:24 +00:00
|
|
|
ASSERT(!script_name.is_null());
|
2013-12-23 14:30:35 +00:00
|
|
|
function_info = Compiler::CompileScript(
|
2010-03-23 06:04:44 +00:00
|
|
|
source,
|
|
|
|
script_name,
|
|
|
|
0,
|
|
|
|
0,
|
2013-07-30 17:05:50 +00:00
|
|
|
false,
|
2012-08-28 10:49:23 +00:00
|
|
|
top_context,
|
2010-03-23 06:04:44 +00:00
|
|
|
extension,
|
|
|
|
NULL,
|
2014-03-19 13:24:13 +00:00
|
|
|
NO_CACHED_DATA,
|
2010-03-23 06:04:44 +00:00
|
|
|
use_runtime_context ? NATIVES_CODE : NOT_NATIVES_CODE);
|
|
|
|
if (function_info.is_null()) return false;
|
2010-03-23 11:40:38 +00:00
|
|
|
if (cache != NULL) cache->Add(name, function_info);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
2012-01-13 13:09:52 +00:00
|
|
|
// Set up the function context. Conceptually, we should clone the
|
2008-07-03 15:10:15 +00:00
|
|
|
// function before overwriting the context but since we're in a
|
|
|
|
// single-threaded environment it is not strictly necessary.
|
2012-08-17 09:03:08 +00:00
|
|
|
ASSERT(top_context->IsNativeContext());
|
2008-07-03 15:10:15 +00:00
|
|
|
Handle<Context> context =
|
|
|
|
Handle<Context>(use_runtime_context
|
2010-03-23 11:40:38 +00:00
|
|
|
? Handle<Context>(top_context->runtime_context())
|
|
|
|
: top_context);
|
2008-07-03 15:10:15 +00:00
|
|
|
Handle<JSFunction> fun =
|
2011-03-28 13:09:37 +00:00
|
|
|
factory->NewFunctionFromSharedFunctionInfo(function_info, context);
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2010-01-28 10:46:58 +00:00
|
|
|
// Call function using either the runtime object or the global
|
2008-07-03 15:10:15 +00:00
|
|
|
// object as the receiver. Provide no parameters.
|
|
|
|
Handle<Object> receiver =
|
|
|
|
Handle<Object>(use_runtime_context
|
2010-03-23 11:40:38 +00:00
|
|
|
? top_context->builtins()
|
2013-02-25 14:46:09 +00:00
|
|
|
: top_context->global_object(),
|
|
|
|
isolate);
|
2008-07-03 15:10:15 +00:00
|
|
|
bool has_pending_exception;
|
2013-09-05 08:48:34 +00:00
|
|
|
Execution::Call(isolate, fun, receiver, 0, NULL, &has_pending_exception);
|
2008-07-03 15:10:15 +00:00
|
|
|
if (has_pending_exception) return false;
|
2010-02-11 08:05:33 +00:00
|
|
|
return true;
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-12-17 15:56:16 +00:00
|
|
|
#define INSTALL_NATIVE(Type, name, var) \
|
|
|
|
Handle<String> var##_name = \
|
2013-02-28 17:03:34 +00:00
|
|
|
factory()->InternalizeOneByteString(STATIC_ASCII_VECTOR(name)); \
|
2012-12-17 15:56:16 +00:00
|
|
|
Object* var##_native = \
|
|
|
|
native_context()->builtins()->GetPropertyNoExceptionThrown( \
|
|
|
|
*var##_name); \
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_##var(Type::cast(var##_native));
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2011-03-18 20:35:07 +00:00
|
|
|
|
2008-07-03 15:10:15 +00:00
|
|
|
void Genesis::InstallNativeFunctions() {
|
2013-02-15 09:27:10 +00:00
|
|
|
HandleScope scope(isolate());
|
2008-07-03 15:10:15 +00:00
|
|
|
INSTALL_NATIVE(JSFunction, "CreateDate", create_date_fun);
|
2014-03-27 16:42:34 +00:00
|
|
|
|
2008-07-03 15:10:15 +00:00
|
|
|
INSTALL_NATIVE(JSFunction, "ToNumber", to_number_fun);
|
|
|
|
INSTALL_NATIVE(JSFunction, "ToString", to_string_fun);
|
|
|
|
INSTALL_NATIVE(JSFunction, "ToDetailString", to_detail_string_fun);
|
|
|
|
INSTALL_NATIVE(JSFunction, "ToObject", to_object_fun);
|
|
|
|
INSTALL_NATIVE(JSFunction, "ToInteger", to_integer_fun);
|
|
|
|
INSTALL_NATIVE(JSFunction, "ToUint32", to_uint32_fun);
|
|
|
|
INSTALL_NATIVE(JSFunction, "ToInt32", to_int32_fun);
|
2014-03-27 16:42:34 +00:00
|
|
|
|
2010-01-05 09:38:02 +00:00
|
|
|
INSTALL_NATIVE(JSFunction, "GlobalEval", global_eval_fun);
|
2008-07-03 15:10:15 +00:00
|
|
|
INSTALL_NATIVE(JSFunction, "Instantiate", instantiate_fun);
|
|
|
|
INSTALL_NATIVE(JSFunction, "ConfigureTemplateInstance",
|
|
|
|
configure_instance_fun);
|
|
|
|
INSTALL_NATIVE(JSFunction, "GetStackTraceLine", get_stack_trace_line_fun);
|
|
|
|
INSTALL_NATIVE(JSObject, "functionCache", function_cache);
|
2011-09-21 12:45:51 +00:00
|
|
|
INSTALL_NATIVE(JSFunction, "ToCompletePropertyDescriptor",
|
|
|
|
to_complete_property_descriptor);
|
2014-03-27 16:42:34 +00:00
|
|
|
|
|
|
|
INSTALL_NATIVE(JSFunction, "IsPromise", is_promise);
|
|
|
|
INSTALL_NATIVE(JSFunction, "PromiseCreate", promise_create);
|
|
|
|
INSTALL_NATIVE(JSFunction, "PromiseResolve", promise_resolve);
|
|
|
|
INSTALL_NATIVE(JSFunction, "PromiseReject", promise_reject);
|
|
|
|
INSTALL_NATIVE(JSFunction, "PromiseChain", promise_chain);
|
|
|
|
INSTALL_NATIVE(JSFunction, "PromiseCatch", promise_catch);
|
|
|
|
|
2014-03-13 00:20:06 +00:00
|
|
|
INSTALL_NATIVE(JSFunction, "NotifyChange", observers_notify_change);
|
|
|
|
INSTALL_NATIVE(JSFunction, "EnqueueSpliceRecord", observers_enqueue_splice);
|
|
|
|
INSTALL_NATIVE(JSFunction, "BeginPerformSplice",
|
|
|
|
observers_begin_perform_splice);
|
|
|
|
INSTALL_NATIVE(JSFunction, "EndPerformSplice",
|
|
|
|
observers_end_perform_splice);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
2013-07-05 09:52:11 +00:00
|
|
|
|
2011-05-18 14:00:34 +00:00
|
|
|
void Genesis::InstallExperimentalNativeFunctions() {
|
2013-11-27 17:21:40 +00:00
|
|
|
INSTALL_NATIVE(JSFunction, "RunMicrotasks", run_microtasks);
|
2014-02-12 22:04:19 +00:00
|
|
|
INSTALL_NATIVE(JSFunction, "EnqueueExternalMicrotask",
|
|
|
|
enqueue_external_microtask);
|
|
|
|
|
2011-05-18 14:00:34 +00:00
|
|
|
if (FLAG_harmony_proxies) {
|
2011-07-19 09:38:59 +00:00
|
|
|
INSTALL_NATIVE(JSFunction, "DerivedHasTrap", derived_has_trap);
|
2011-05-18 14:00:34 +00:00
|
|
|
INSTALL_NATIVE(JSFunction, "DerivedGetTrap", derived_get_trap);
|
Implement set trap for proxies, and revamp class hierarchy in preparation:
- Introduce a class JSReceiver, that is a common superclass of JSObject and
JSProxy. Use JSReceiver where appropriate (probably lots of places that we
still have to migrate, but we will find those later with proxy test suite).
- Move appropriate methods to JSReceiver class (SetProperty,
GetPropertyAttribute, Get/SetPrototype, Lookup, and so on).
- Introduce new JSFunctionProxy subclass of JSProxy. Currently only a stub.
- Overhaul enum InstanceType:
* Introduce FIRST/LAST_SPEC_OBJECT_TYPE that ranges over all types that
represent JS objects, and use that consistently to check language types.
* Rename FIRST/LAST_JS_OBJECT_TYPE and FIRST/LAST_FUNCTION_CLASS_TYPE
to FIRST/LAST_[NON]CALLABLE_SPEC_OBJECT_TYPE for clarity.
* Eliminate the overlap over JS_REGEXP_TYPE.
* Also replace FIRST_JS_OBJECT with FIRST_JS_RECEIVER, but only use it where
we exclusively talk about the internal representation type.
* Insert JS_PROXY and JS_FUNCTION_PROXY in the appropriate places.
- Fix all checks concerning classification, especially for functions, to
use the CALLABLE_SPEC_OBJECT range (that includes funciton proxies).
- Handle proxies in SetProperty (that was the easiest part :) ).
- A few simple test cases.
R=kmillikin@chromium.org
Review URL: http://codereview.chromium.org/6992072
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@8126 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2011-05-31 16:38:40 +00:00
|
|
|
INSTALL_NATIVE(JSFunction, "DerivedSetTrap", derived_set_trap);
|
2011-10-24 15:56:18 +00:00
|
|
|
INSTALL_NATIVE(JSFunction, "ProxyEnumerate", proxy_enumerate);
|
2011-05-18 14:00:34 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2008-07-03 15:10:15 +00:00
|
|
|
#undef INSTALL_NATIVE
|
|
|
|
|
|
|
|
|
2013-02-15 15:20:05 +00:00
|
|
|
Handle<JSFunction> Genesis::InstallInternalArray(
|
|
|
|
Handle<JSBuiltinsObject> builtins,
|
|
|
|
const char* name,
|
|
|
|
ElementsKind elements_kind) {
|
|
|
|
// --- I n t e r n a l A r r a y ---
|
|
|
|
// An array constructor on the builtins object that works like
|
|
|
|
// the public Array constructor, except that its prototype
|
|
|
|
// doesn't inherit from Object.prototype.
|
|
|
|
// To be used only for internal work by builtins. Instances
|
|
|
|
// must not be leaked to user code.
|
|
|
|
Handle<JSFunction> array_function =
|
|
|
|
InstallFunction(builtins,
|
|
|
|
name,
|
|
|
|
JS_ARRAY_TYPE,
|
|
|
|
JSArray::kSize,
|
|
|
|
isolate()->initial_object_prototype(),
|
|
|
|
Builtins::kInternalArrayCode,
|
2013-05-15 15:23:53 +00:00
|
|
|
true, true);
|
2013-02-15 15:20:05 +00:00
|
|
|
Handle<JSObject> prototype =
|
|
|
|
factory()->NewJSObject(isolate()->object_function(), TENURED);
|
2013-08-16 21:27:11 +00:00
|
|
|
Accessors::FunctionSetPrototype(array_function, prototype);
|
2013-02-15 15:20:05 +00:00
|
|
|
|
2013-06-25 16:31:07 +00:00
|
|
|
InternalArrayConstructorStub internal_array_constructor_stub(isolate());
|
|
|
|
Handle<Code> code = internal_array_constructor_stub.GetCode(isolate());
|
|
|
|
array_function->shared()->set_construct_stub(*code);
|
2013-02-15 15:20:05 +00:00
|
|
|
array_function->shared()->DontAdaptArguments();
|
|
|
|
|
2013-05-29 15:38:09 +00:00
|
|
|
Handle<Map> original_map(array_function->initial_map());
|
|
|
|
Handle<Map> initial_map = factory()->CopyMap(original_map);
|
|
|
|
initial_map->set_elements_kind(elements_kind);
|
|
|
|
array_function->set_initial_map(*initial_map);
|
2013-02-15 15:20:05 +00:00
|
|
|
|
|
|
|
// Make "length" magic on instances.
|
|
|
|
Handle<DescriptorArray> array_descriptors(
|
|
|
|
factory()->NewDescriptorArray(0, 1));
|
|
|
|
DescriptorArray::WhitenessWitness witness(*array_descriptors);
|
|
|
|
|
|
|
|
Handle<Foreign> array_length(factory()->NewForeign(
|
|
|
|
&Accessors::ArrayLength));
|
|
|
|
PropertyAttributes attribs = static_cast<PropertyAttributes>(
|
|
|
|
DONT_ENUM | DONT_DELETE);
|
|
|
|
initial_map->set_instance_descriptors(*array_descriptors);
|
|
|
|
|
|
|
|
{ // Add length.
|
|
|
|
CallbacksDescriptor d(
|
2013-02-28 17:03:34 +00:00
|
|
|
*factory()->length_string(), *array_length, attribs);
|
2013-02-15 15:20:05 +00:00
|
|
|
array_function->initial_map()->AppendDescriptor(&d, witness);
|
|
|
|
}
|
|
|
|
|
|
|
|
return array_function;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2008-07-03 15:10:15 +00:00
|
|
|
bool Genesis::InstallNatives() {
|
2013-02-15 09:27:10 +00:00
|
|
|
HandleScope scope(isolate());
|
2008-07-03 15:10:15 +00:00
|
|
|
|
|
|
|
// Create a function for the builtins object. Allocate space for the
|
|
|
|
// JavaScript builtins, a reference to the builtins object
|
2012-08-17 09:03:08 +00:00
|
|
|
// (itself) and a reference to the native_context directly in the object.
|
2011-03-18 20:35:07 +00:00
|
|
|
Handle<Code> code = Handle<Code>(
|
2011-04-14 08:01:19 +00:00
|
|
|
isolate()->builtins()->builtin(Builtins::kIllegal));
|
2008-07-03 15:10:15 +00:00
|
|
|
Handle<JSFunction> builtins_fun =
|
2013-02-28 17:03:34 +00:00
|
|
|
factory()->NewFunction(factory()->empty_string(),
|
2011-04-14 08:01:19 +00:00
|
|
|
JS_BUILTINS_OBJECT_TYPE,
|
|
|
|
JSBuiltinsObject::kSize, code, true);
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2012-12-17 15:56:16 +00:00
|
|
|
Handle<String> name =
|
2013-02-28 17:03:34 +00:00
|
|
|
factory()->InternalizeOneByteString(STATIC_ASCII_VECTOR("builtins"));
|
2008-07-03 15:10:15 +00:00
|
|
|
builtins_fun->shared()->set_instance_class_name(*name);
|
2012-08-06 14:25:19 +00:00
|
|
|
builtins_fun->initial_map()->set_dictionary_map(true);
|
2012-08-13 15:34:49 +00:00
|
|
|
builtins_fun->initial_map()->set_prototype(heap()->null_value());
|
2008-07-03 15:10:15 +00:00
|
|
|
|
|
|
|
// Allocate the builtins object.
|
|
|
|
Handle<JSBuiltinsObject> builtins =
|
2011-04-14 08:01:19 +00:00
|
|
|
Handle<JSBuiltinsObject>::cast(factory()->NewGlobalObject(builtins_fun));
|
2008-07-03 15:10:15 +00:00
|
|
|
builtins->set_builtins(*builtins);
|
2012-08-17 09:03:08 +00:00
|
|
|
builtins->set_native_context(*native_context());
|
2012-08-28 11:25:08 +00:00
|
|
|
builtins->set_global_context(*native_context());
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
builtins->set_global_receiver(*builtins);
|
2014-01-07 10:46:39 +00:00
|
|
|
builtins->set_global_receiver(native_context()->global_proxy());
|
|
|
|
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2012-01-13 13:09:52 +00:00
|
|
|
// Set up the 'global' properties of the builtins object. The
|
2008-07-03 15:10:15 +00:00
|
|
|
// 'global' property that refers to the global object is the only
|
|
|
|
// way to get from code running in the builtins context to the
|
|
|
|
// global object.
|
|
|
|
static const PropertyAttributes attributes =
|
|
|
|
static_cast<PropertyAttributes>(READ_ONLY | DONT_DELETE);
|
2013-02-28 17:03:34 +00:00
|
|
|
Handle<String> global_string =
|
|
|
|
factory()->InternalizeOneByteString(STATIC_ASCII_VECTOR("global"));
|
2013-02-25 14:46:09 +00:00
|
|
|
Handle<Object> global_obj(native_context()->global_object(), isolate());
|
2012-01-05 17:16:19 +00:00
|
|
|
CHECK_NOT_EMPTY_HANDLE(isolate(),
|
|
|
|
JSObject::SetLocalPropertyIgnoreAttributes(
|
2013-02-28 17:03:34 +00:00
|
|
|
builtins, global_string, global_obj, attributes));
|
2014-01-07 10:46:39 +00:00
|
|
|
Handle<String> builtins_string =
|
|
|
|
factory()->InternalizeOneByteString(STATIC_ASCII_VECTOR("builtins"));
|
|
|
|
CHECK_NOT_EMPTY_HANDLE(isolate(),
|
|
|
|
JSObject::SetLocalPropertyIgnoreAttributes(
|
|
|
|
builtins, builtins_string, builtins, attributes));
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2012-01-13 13:09:52 +00:00
|
|
|
// Set up the reference from the global object to the builtins object.
|
2012-08-17 12:59:00 +00:00
|
|
|
JSGlobalObject::cast(native_context()->global_object())->
|
|
|
|
set_builtins(*builtins);
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2012-08-17 09:03:08 +00:00
|
|
|
// Create a bridge function that has context in the native context.
|
2008-07-03 15:10:15 +00:00
|
|
|
Handle<JSFunction> bridge =
|
2013-02-28 17:03:34 +00:00
|
|
|
factory()->NewFunction(factory()->empty_string(),
|
2011-04-14 08:01:19 +00:00
|
|
|
factory()->undefined_value());
|
2012-08-17 09:03:08 +00:00
|
|
|
ASSERT(bridge->context() == *isolate()->native_context());
|
2008-07-03 15:10:15 +00:00
|
|
|
|
|
|
|
// Allocate the builtins context.
|
|
|
|
Handle<Context> context =
|
2011-04-14 08:01:19 +00:00
|
|
|
factory()->NewFunctionContext(Context::MIN_CONTEXT_SLOTS, bridge);
|
2012-08-17 12:59:00 +00:00
|
|
|
context->set_global_object(*builtins); // override builtins global object
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_runtime_context(*context);
|
2008-07-03 15:10:15 +00:00
|
|
|
|
|
|
|
{ // -- S c r i p t
|
|
|
|
// Builtin functions for Script.
|
|
|
|
Handle<JSFunction> script_fun =
|
|
|
|
InstallFunction(builtins, "Script", JS_VALUE_TYPE, JSValue::kSize,
|
2011-04-14 08:01:19 +00:00
|
|
|
isolate()->initial_object_prototype(),
|
2013-05-15 15:23:53 +00:00
|
|
|
Builtins::kIllegal, false, false);
|
2008-07-03 15:10:15 +00:00
|
|
|
Handle<JSObject> prototype =
|
2011-04-14 08:01:19 +00:00
|
|
|
factory()->NewJSObject(isolate()->object_function(), TENURED);
|
2013-08-16 21:27:11 +00:00
|
|
|
Accessors::FunctionSetPrototype(script_fun, prototype);
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_script_function(*script_fun);
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2012-07-18 15:38:58 +00:00
|
|
|
Handle<Map> script_map = Handle<Map>(script_fun->initial_map());
|
|
|
|
|
2012-07-18 14:00:58 +00:00
|
|
|
Handle<DescriptorArray> script_descriptors(
|
2012-09-18 13:25:12 +00:00
|
|
|
factory()->NewDescriptorArray(0, 13));
|
2012-07-18 14:00:58 +00:00
|
|
|
DescriptorArray::WhitenessWitness witness(*script_descriptors);
|
2012-07-23 16:18:25 +00:00
|
|
|
|
|
|
|
Handle<Foreign> script_source(
|
|
|
|
factory()->NewForeign(&Accessors::ScriptSource));
|
|
|
|
Handle<Foreign> script_name(factory()->NewForeign(&Accessors::ScriptName));
|
2013-02-28 17:03:34 +00:00
|
|
|
Handle<String> id_string(factory()->InternalizeOneByteString(
|
2012-12-17 15:56:16 +00:00
|
|
|
STATIC_ASCII_VECTOR("id")));
|
2012-07-23 16:18:25 +00:00
|
|
|
Handle<Foreign> script_id(factory()->NewForeign(&Accessors::ScriptId));
|
2013-02-28 17:03:34 +00:00
|
|
|
Handle<String> line_offset_string(
|
|
|
|
factory()->InternalizeOneByteString(
|
|
|
|
STATIC_ASCII_VECTOR("line_offset")));
|
2012-07-23 16:18:25 +00:00
|
|
|
Handle<Foreign> script_line_offset(
|
|
|
|
factory()->NewForeign(&Accessors::ScriptLineOffset));
|
2013-02-28 17:03:34 +00:00
|
|
|
Handle<String> column_offset_string(
|
|
|
|
factory()->InternalizeOneByteString(
|
|
|
|
STATIC_ASCII_VECTOR("column_offset")));
|
2012-07-23 16:18:25 +00:00
|
|
|
Handle<Foreign> script_column_offset(
|
|
|
|
factory()->NewForeign(&Accessors::ScriptColumnOffset));
|
2013-02-28 17:03:34 +00:00
|
|
|
Handle<String> type_string(factory()->InternalizeOneByteString(
|
2012-12-17 15:56:16 +00:00
|
|
|
STATIC_ASCII_VECTOR("type")));
|
2012-07-23 16:18:25 +00:00
|
|
|
Handle<Foreign> script_type(factory()->NewForeign(&Accessors::ScriptType));
|
2013-02-28 17:03:34 +00:00
|
|
|
Handle<String> compilation_type_string(
|
|
|
|
factory()->InternalizeOneByteString(
|
2012-12-17 15:56:16 +00:00
|
|
|
STATIC_ASCII_VECTOR("compilation_type")));
|
2012-07-23 16:18:25 +00:00
|
|
|
Handle<Foreign> script_compilation_type(
|
|
|
|
factory()->NewForeign(&Accessors::ScriptCompilationType));
|
2013-02-28 17:03:34 +00:00
|
|
|
Handle<String> line_ends_string(factory()->InternalizeOneByteString(
|
2012-12-17 15:56:16 +00:00
|
|
|
STATIC_ASCII_VECTOR("line_ends")));
|
2012-07-23 16:18:25 +00:00
|
|
|
Handle<Foreign> script_line_ends(
|
|
|
|
factory()->NewForeign(&Accessors::ScriptLineEnds));
|
2013-02-28 17:03:34 +00:00
|
|
|
Handle<String> context_data_string(
|
|
|
|
factory()->InternalizeOneByteString(
|
|
|
|
STATIC_ASCII_VECTOR("context_data")));
|
2012-07-23 16:18:25 +00:00
|
|
|
Handle<Foreign> script_context_data(
|
|
|
|
factory()->NewForeign(&Accessors::ScriptContextData));
|
2013-02-28 17:03:34 +00:00
|
|
|
Handle<String> eval_from_script_string(
|
|
|
|
factory()->InternalizeOneByteString(
|
2012-12-17 15:56:16 +00:00
|
|
|
STATIC_ASCII_VECTOR("eval_from_script")));
|
2012-07-23 16:18:25 +00:00
|
|
|
Handle<Foreign> script_eval_from_script(
|
|
|
|
factory()->NewForeign(&Accessors::ScriptEvalFromScript));
|
2013-02-28 17:03:34 +00:00
|
|
|
Handle<String> eval_from_script_position_string(
|
|
|
|
factory()->InternalizeOneByteString(
|
2012-12-17 15:56:16 +00:00
|
|
|
STATIC_ASCII_VECTOR("eval_from_script_position")));
|
2012-07-23 16:18:25 +00:00
|
|
|
Handle<Foreign> script_eval_from_script_position(
|
|
|
|
factory()->NewForeign(&Accessors::ScriptEvalFromScriptPosition));
|
2013-02-28 17:03:34 +00:00
|
|
|
Handle<String> eval_from_function_name_string(
|
|
|
|
factory()->InternalizeOneByteString(
|
2012-12-17 15:56:16 +00:00
|
|
|
STATIC_ASCII_VECTOR("eval_from_function_name")));
|
2012-07-23 16:18:25 +00:00
|
|
|
Handle<Foreign> script_eval_from_function_name(
|
|
|
|
factory()->NewForeign(&Accessors::ScriptEvalFromFunctionName));
|
|
|
|
PropertyAttributes attribs =
|
|
|
|
static_cast<PropertyAttributes>(DONT_ENUM | DONT_DELETE | READ_ONLY);
|
2012-10-17 13:04:49 +00:00
|
|
|
script_map->set_instance_descriptors(*script_descriptors);
|
2012-07-18 14:00:58 +00:00
|
|
|
|
|
|
|
{
|
|
|
|
CallbacksDescriptor d(
|
2013-02-28 17:03:34 +00:00
|
|
|
*factory()->source_string(), *script_source, attribs);
|
2012-07-19 10:01:52 +00:00
|
|
|
script_map->AppendDescriptor(&d, witness);
|
2012-07-18 14:00:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
{
|
2013-02-28 17:03:34 +00:00
|
|
|
CallbacksDescriptor d(*factory()->name_string(), *script_name, attribs);
|
2012-07-19 10:01:52 +00:00
|
|
|
script_map->AppendDescriptor(&d, witness);
|
2012-07-18 14:00:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
{
|
2013-02-28 17:03:34 +00:00
|
|
|
CallbacksDescriptor d(*id_string, *script_id, attribs);
|
2012-07-19 10:01:52 +00:00
|
|
|
script_map->AppendDescriptor(&d, witness);
|
2012-07-18 14:00:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
{
|
2013-02-28 17:03:34 +00:00
|
|
|
CallbacksDescriptor d(*line_offset_string, *script_line_offset, attribs);
|
2012-07-19 10:01:52 +00:00
|
|
|
script_map->AppendDescriptor(&d, witness);
|
2012-07-18 14:00:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
CallbacksDescriptor d(
|
2013-02-28 17:03:34 +00:00
|
|
|
*column_offset_string, *script_column_offset, attribs);
|
2012-07-19 10:01:52 +00:00
|
|
|
script_map->AppendDescriptor(&d, witness);
|
2012-07-18 14:00:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
{
|
2013-02-28 17:03:34 +00:00
|
|
|
CallbacksDescriptor d(*type_string, *script_type, attribs);
|
2012-07-19 10:01:52 +00:00
|
|
|
script_map->AppendDescriptor(&d, witness);
|
2012-07-18 14:00:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
CallbacksDescriptor d(
|
2013-02-28 17:03:34 +00:00
|
|
|
*compilation_type_string, *script_compilation_type, attribs);
|
2012-07-19 10:01:52 +00:00
|
|
|
script_map->AppendDescriptor(&d, witness);
|
2012-07-18 14:00:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
{
|
2013-02-28 17:03:34 +00:00
|
|
|
CallbacksDescriptor d(*line_ends_string, *script_line_ends, attribs);
|
2012-07-19 10:01:52 +00:00
|
|
|
script_map->AppendDescriptor(&d, witness);
|
2012-07-18 14:00:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
CallbacksDescriptor d(
|
2013-02-28 17:03:34 +00:00
|
|
|
*context_data_string, *script_context_data, attribs);
|
2012-07-19 10:01:52 +00:00
|
|
|
script_map->AppendDescriptor(&d, witness);
|
2012-07-18 14:00:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
CallbacksDescriptor d(
|
2013-02-28 17:03:34 +00:00
|
|
|
*eval_from_script_string, *script_eval_from_script, attribs);
|
2012-07-19 10:01:52 +00:00
|
|
|
script_map->AppendDescriptor(&d, witness);
|
2012-07-18 14:00:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
CallbacksDescriptor d(
|
2013-02-28 17:03:34 +00:00
|
|
|
*eval_from_script_position_string,
|
2012-07-23 16:18:25 +00:00
|
|
|
*script_eval_from_script_position,
|
2012-07-18 14:00:58 +00:00
|
|
|
attribs);
|
2012-07-19 10:01:52 +00:00
|
|
|
script_map->AppendDescriptor(&d, witness);
|
2012-07-18 14:00:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
CallbacksDescriptor d(
|
2013-02-28 17:03:34 +00:00
|
|
|
*eval_from_function_name_string,
|
2012-07-23 16:18:25 +00:00
|
|
|
*script_eval_from_function_name,
|
2012-07-18 14:00:58 +00:00
|
|
|
attribs);
|
2012-07-19 10:01:52 +00:00
|
|
|
script_map->AppendDescriptor(&d, witness);
|
2012-07-18 14:00:58 +00:00
|
|
|
}
|
|
|
|
|
2008-07-03 15:10:15 +00:00
|
|
|
// Allocate the empty script.
|
2011-04-14 08:01:19 +00:00
|
|
|
Handle<Script> script = factory()->NewScript(factory()->empty_string());
|
2009-06-08 10:47:49 +00:00
|
|
|
script->set_type(Smi::FromInt(Script::TYPE_NATIVE));
|
2011-04-14 08:01:19 +00:00
|
|
|
heap()->public_set_empty_script(*script);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
2010-02-24 19:59:09 +00:00
|
|
|
{
|
|
|
|
// Builtin function for OpaqueReference -- a JSValue-based object,
|
|
|
|
// that keeps its field isolated from JavaScript code. It may store
|
|
|
|
// objects, that JavaScript code may not access.
|
|
|
|
Handle<JSFunction> opaque_reference_fun =
|
|
|
|
InstallFunction(builtins, "OpaqueReference", JS_VALUE_TYPE,
|
2011-03-18 20:35:07 +00:00
|
|
|
JSValue::kSize,
|
2011-04-14 08:01:19 +00:00
|
|
|
isolate()->initial_object_prototype(),
|
2013-05-15 15:23:53 +00:00
|
|
|
Builtins::kIllegal, false, false);
|
2010-02-24 19:59:09 +00:00
|
|
|
Handle<JSObject> prototype =
|
2011-04-14 08:01:19 +00:00
|
|
|
factory()->NewJSObject(isolate()->object_function(), TENURED);
|
2013-08-16 21:27:11 +00:00
|
|
|
Accessors::FunctionSetPrototype(opaque_reference_fun, prototype);
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_opaque_reference_function(*opaque_reference_fun);
|
2010-02-24 19:59:09 +00:00
|
|
|
}
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2013-02-15 15:20:05 +00:00
|
|
|
// InternalArrays should not use Smi-Only array optimizations. There are too
|
|
|
|
// many places in the C++ runtime code (e.g. RegEx) that assume that
|
|
|
|
// elements in InternalArrays can be set to non-Smi values without going
|
|
|
|
// through a common bottleneck that would make the SMI_ONLY -> FAST_ELEMENT
|
|
|
|
// transition easy to trap. Moreover, they rarely are smi-only.
|
|
|
|
{
|
|
|
|
Handle<JSFunction> array_function =
|
|
|
|
InstallInternalArray(builtins, "InternalArray", FAST_HOLEY_ELEMENTS);
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_internal_array_function(*array_function);
|
2011-03-03 11:49:03 +00:00
|
|
|
}
|
|
|
|
|
2013-02-15 15:20:05 +00:00
|
|
|
{
|
2013-05-29 15:38:09 +00:00
|
|
|
InstallInternalArray(builtins, "InternalPackedArray", FAST_ELEMENTS);
|
2013-02-15 15:20:05 +00:00
|
|
|
}
|
|
|
|
|
2010-03-23 15:04:45 +00:00
|
|
|
if (FLAG_disable_native_files) {
|
|
|
|
PrintF("Warning: Running without installed natives!\n");
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2010-03-23 11:40:38 +00:00
|
|
|
// Install natives.
|
|
|
|
for (int i = Natives::GetDebuggerCount();
|
|
|
|
i < Natives::GetBuiltinsCount();
|
|
|
|
i++) {
|
2011-04-14 08:01:19 +00:00
|
|
|
if (!CompileBuiltin(isolate(), i)) return false;
|
2010-03-23 11:40:38 +00:00
|
|
|
// TODO(ager): We really only need to install the JS builtin
|
|
|
|
// functions on the builtins object after compiling and running
|
|
|
|
// runtime.js.
|
|
|
|
if (!InstallJSBuiltins(builtins)) return false;
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
InstallNativeFunctions();
|
|
|
|
|
2010-08-12 13:43:08 +00:00
|
|
|
// Store the map for the string prototype after the natives has been compiled
|
2012-01-13 13:09:52 +00:00
|
|
|
// and the String function has been set up.
|
2012-08-17 09:03:08 +00:00
|
|
|
Handle<JSFunction> string_function(native_context()->string_function());
|
2010-08-12 13:43:08 +00:00
|
|
|
ASSERT(JSObject::cast(
|
|
|
|
string_function->initial_map()->prototype())->HasFastProperties());
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_string_function_prototype_map(
|
2010-08-12 13:43:08 +00:00
|
|
|
HeapObject::cast(string_function->initial_map()->prototype())->map());
|
|
|
|
|
2008-09-15 15:02:38 +00:00
|
|
|
// Install Function.prototype.call and apply.
|
2013-02-28 17:03:34 +00:00
|
|
|
{ Handle<String> key = factory()->function_class_string();
|
2008-09-15 15:02:38 +00:00
|
|
|
Handle<JSFunction> function =
|
2013-02-25 14:46:09 +00:00
|
|
|
Handle<JSFunction>::cast(
|
|
|
|
GetProperty(isolate(), isolate()->global_object(), key));
|
2008-07-03 15:10:15 +00:00
|
|
|
Handle<JSObject> proto =
|
|
|
|
Handle<JSObject>(JSObject::cast(function->instance_prototype()));
|
2008-09-15 15:02:38 +00:00
|
|
|
|
|
|
|
// Install the call and the apply functions.
|
2008-07-03 15:10:15 +00:00
|
|
|
Handle<JSFunction> call =
|
2008-09-15 15:02:38 +00:00
|
|
|
InstallFunction(proto, "call", JS_OBJECT_TYPE, JSObject::kHeaderSize,
|
2010-04-28 12:05:40 +00:00
|
|
|
Handle<JSObject>::null(),
|
2011-03-23 13:40:07 +00:00
|
|
|
Builtins::kFunctionCall,
|
2013-05-15 15:23:53 +00:00
|
|
|
false, false);
|
2008-09-15 15:02:38 +00:00
|
|
|
Handle<JSFunction> apply =
|
|
|
|
InstallFunction(proto, "apply", JS_OBJECT_TYPE, JSObject::kHeaderSize,
|
2010-04-28 12:05:40 +00:00
|
|
|
Handle<JSObject>::null(),
|
2011-03-23 13:40:07 +00:00
|
|
|
Builtins::kFunctionApply,
|
2013-05-15 15:23:53 +00:00
|
|
|
false, false);
|
2008-07-03 15:10:15 +00:00
|
|
|
|
|
|
|
// Make sure that Function.prototype.call appears to be compiled.
|
|
|
|
// The code will never be called, but inline caching for call will
|
|
|
|
// only work if it appears to be compiled.
|
2008-09-15 15:02:38 +00:00
|
|
|
call->shared()->DontAdaptArguments();
|
2008-07-03 15:10:15 +00:00
|
|
|
ASSERT(call->is_compiled());
|
|
|
|
|
2009-01-15 19:08:34 +00:00
|
|
|
// Set the expected parameters for apply to 2; required by builtin.
|
2008-09-15 15:02:38 +00:00
|
|
|
apply->shared()->set_formal_parameter_count(2);
|
|
|
|
|
|
|
|
// Set the lengths for the functions to satisfy ECMA-262.
|
|
|
|
call->shared()->set_length(1);
|
|
|
|
apply->shared()->set_length(2);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
2011-08-10 16:05:17 +00:00
|
|
|
InstallBuiltinFunctionIds();
|
|
|
|
|
2010-04-13 09:31:03 +00:00
|
|
|
// Create a constructor for RegExp results (a variant of Array that
|
|
|
|
// predefines the two properties index and match).
|
|
|
|
{
|
|
|
|
// RegExpResult initial map.
|
|
|
|
|
|
|
|
// Find global.Array.prototype to inherit from.
|
2012-08-17 09:03:08 +00:00
|
|
|
Handle<JSFunction> array_constructor(native_context()->array_function());
|
2010-04-13 09:31:03 +00:00
|
|
|
Handle<JSObject> array_prototype(
|
|
|
|
JSObject::cast(array_constructor->instance_prototype()));
|
|
|
|
|
|
|
|
// Add initial map.
|
|
|
|
Handle<Map> initial_map =
|
2013-02-18 10:25:21 +00:00
|
|
|
factory()->NewMap(JS_ARRAY_TYPE, JSRegExpResult::kSize);
|
2010-04-13 09:31:03 +00:00
|
|
|
initial_map->set_constructor(*array_constructor);
|
|
|
|
|
|
|
|
// Set prototype on map.
|
|
|
|
initial_map->set_non_instance_prototype(false);
|
|
|
|
initial_map->set_prototype(*array_prototype);
|
|
|
|
|
|
|
|
// Update map with length accessor from Array and add "index" and "input".
|
|
|
|
Handle<DescriptorArray> reresult_descriptors =
|
2012-09-18 13:25:12 +00:00
|
|
|
factory()->NewDescriptorArray(0, 3);
|
2011-10-21 10:32:38 +00:00
|
|
|
DescriptorArray::WhitenessWitness witness(*reresult_descriptors);
|
2012-10-17 13:04:49 +00:00
|
|
|
initial_map->set_instance_descriptors(*reresult_descriptors);
|
2011-10-21 10:32:38 +00:00
|
|
|
|
2012-07-19 10:01:52 +00:00
|
|
|
{
|
2012-08-17 09:03:08 +00:00
|
|
|
JSFunction* array_function = native_context()->array_function();
|
2012-07-19 10:01:52 +00:00
|
|
|
Handle<DescriptorArray> array_descriptors(
|
|
|
|
array_function->initial_map()->instance_descriptors());
|
2013-02-28 17:03:34 +00:00
|
|
|
String* length = heap()->length_string();
|
Sharing of descriptor arrays.
This CL adds multiple things:
Transition arrays do not directly point at their descriptor array anymore, but rather do so via an indirect pointer (a JSGlobalPropertyCell).
An ownership bit is added to maps indicating whether it owns its own descriptor array or not.
Maps owning a descriptor array can pass on ownership if a transition from that map is generated; but only if the descriptor array stays exactly the same; or if a descriptor is added.
Maps that don't have ownership get ownership back if their direct child to which ownership was passed is cleared in ClearNonLiveTransitions.
To detect which descriptors in an array are valid, each map knows its own NumberOfOwnDescriptors. Since the descriptors are sorted in order of addition, if we search and find a descriptor with index bigger than this number, it is not valid for the given map.
We currently still build up an enumeration cache (although this may disappear). The enumeration cache is always built for the entire descriptor array, even if not all descriptors are owned by the map. Once a descriptor array has an enumeration cache for a given map; this invariant will always be true, even if the descriptor array was extended. The extended array will inherit the enumeration cache from the smaller descriptor array. If a map with more descriptors needs an enumeration cache, it's EnumLength will still be set to invalid, so it will have to recompute the enumeration cache. This new cache will also be valid for smaller maps since they have their own enumlength; and use this to loop over the cache. If the EnumLength is still invalid, but there is already a cache present that is big enough; we just initialize the EnumLength field for the map.
When we apply ClearNonLiveTransitions and descriptor ownership is passed back to a parent map, the descriptor array is trimmed in-place and resorted. At the same time, the enumeration cache is trimmed in-place.
Only transition arrays contain descriptor arrays. If we transition to a map and pass ownership of the descriptor array along, the child map will not store the descriptor array it owns. Rather its parent will keep the pointer. So for every leaf-map, we find the descriptor array by following the back pointer, reading out the transition array, and fetching the descriptor array from the JSGlobalPropertyCell. If a map has a transition array, we fetch it from there. If a map has undefined as its back-pointer and has no transition array; it is considered to have an empty descriptor array.
When we modify properties, we cannot share the descriptor array. To accommodate this, the child map will get its own transition array; even if there are not necessarily any transitions leaving from the child map. This is necessary since it's the only way to store its own descriptor array.
Review URL: https://chromiumcodereview.appspot.com/10909007
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@12492 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2012-09-12 16:43:57 +00:00
|
|
|
int old = array_descriptors->SearchWithCache(
|
|
|
|
length, array_function->initial_map());
|
2012-07-19 10:01:52 +00:00
|
|
|
ASSERT(old != DescriptorArray::kNotFound);
|
|
|
|
CallbacksDescriptor desc(length,
|
|
|
|
array_descriptors->GetValue(old),
|
|
|
|
array_descriptors->GetDetails(old).attributes());
|
|
|
|
initial_map->AppendDescriptor(&desc, witness);
|
|
|
|
}
|
2010-04-13 09:31:03 +00:00
|
|
|
{
|
2013-02-28 17:03:34 +00:00
|
|
|
FieldDescriptor index_field(heap()->index_string(),
|
2010-04-13 09:31:03 +00:00
|
|
|
JSRegExpResult::kIndexIndex,
|
2013-04-26 15:30:41 +00:00
|
|
|
NONE,
|
|
|
|
Representation::Tagged());
|
2012-07-19 10:01:52 +00:00
|
|
|
initial_map->AppendDescriptor(&index_field, witness);
|
2010-04-13 09:31:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
{
|
2013-02-28 17:03:34 +00:00
|
|
|
FieldDescriptor input_field(heap()->input_string(),
|
2010-04-13 09:31:03 +00:00
|
|
|
JSRegExpResult::kInputIndex,
|
2013-04-26 15:30:41 +00:00
|
|
|
NONE,
|
|
|
|
Representation::Tagged());
|
2012-07-19 10:01:52 +00:00
|
|
|
initial_map->AppendDescriptor(&input_field, witness);
|
2010-04-13 09:31:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
initial_map->set_inobject_properties(2);
|
|
|
|
initial_map->set_pre_allocated_property_fields(2);
|
|
|
|
initial_map->set_unused_property_fields(0);
|
|
|
|
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_regexp_result_map(*initial_map);
|
2010-04-13 09:31:03 +00:00
|
|
|
}
|
|
|
|
|
2012-10-15 06:34:22 +00:00
|
|
|
#ifdef VERIFY_HEAP
|
2008-07-03 15:10:15 +00:00
|
|
|
builtins->Verify();
|
|
|
|
#endif
|
2010-03-23 11:40:38 +00:00
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-11-27 17:21:40 +00:00
|
|
|
#define INSTALL_EXPERIMENTAL_NATIVE(i, flag, file) \
|
|
|
|
if (FLAG_harmony_##flag && \
|
|
|
|
strcmp(ExperimentalNatives::GetScriptName(i).start(), \
|
|
|
|
"native " file) == 0) { \
|
|
|
|
if (!CompileExperimentalBuiltin(isolate(), i)) return false; \
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-04-15 12:31:03 +00:00
|
|
|
bool Genesis::InstallExperimentalNatives() {
|
2011-05-13 10:58:25 +00:00
|
|
|
for (int i = ExperimentalNatives::GetDebuggerCount();
|
|
|
|
i < ExperimentalNatives::GetBuiltinsCount();
|
|
|
|
i++) {
|
2013-11-27 17:21:40 +00:00
|
|
|
INSTALL_EXPERIMENTAL_NATIVE(i, symbols, "symbol.js")
|
|
|
|
INSTALL_EXPERIMENTAL_NATIVE(i, proxies, "proxy.js")
|
|
|
|
INSTALL_EXPERIMENTAL_NATIVE(i, collections, "collection.js")
|
|
|
|
INSTALL_EXPERIMENTAL_NATIVE(i, generators, "generator.js")
|
|
|
|
INSTALL_EXPERIMENTAL_NATIVE(i, iteration, "array-iterator.js")
|
|
|
|
INSTALL_EXPERIMENTAL_NATIVE(i, strings, "harmony-string.js")
|
|
|
|
INSTALL_EXPERIMENTAL_NATIVE(i, arrays, "harmony-array.js")
|
|
|
|
INSTALL_EXPERIMENTAL_NATIVE(i, maths, "harmony-math.js")
|
2011-04-15 12:31:03 +00:00
|
|
|
}
|
2011-05-18 14:00:34 +00:00
|
|
|
|
|
|
|
InstallExperimentalNativeFunctions();
|
2014-02-19 13:51:49 +00:00
|
|
|
InstallExperimentalBuiltinFunctionIds();
|
2011-04-15 12:31:03 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-12-14 18:53:48 +00:00
|
|
|
static Handle<JSObject> ResolveBuiltinIdHolder(
|
2012-08-17 09:03:08 +00:00
|
|
|
Handle<Context> native_context,
|
2010-09-21 12:54:12 +00:00
|
|
|
const char* holder_expr) {
|
2013-02-25 14:46:09 +00:00
|
|
|
Isolate* isolate = native_context->GetIsolate();
|
|
|
|
Factory* factory = isolate->factory();
|
2012-08-17 12:59:00 +00:00
|
|
|
Handle<GlobalObject> global(native_context->global_object());
|
2010-09-21 12:54:12 +00:00
|
|
|
const char* period_pos = strchr(holder_expr, '.');
|
|
|
|
if (period_pos == NULL) {
|
2013-02-28 17:03:34 +00:00
|
|
|
return Handle<JSObject>::cast(GetProperty(
|
|
|
|
isolate, global, factory->InternalizeUtf8String(holder_expr)));
|
2010-09-09 13:38:01 +00:00
|
|
|
}
|
2010-09-21 12:54:12 +00:00
|
|
|
ASSERT_EQ(".prototype", period_pos);
|
2010-09-21 13:04:42 +00:00
|
|
|
Vector<const char> property(holder_expr,
|
|
|
|
static_cast<int>(period_pos - holder_expr));
|
2014-03-25 09:09:24 +00:00
|
|
|
Handle<String> property_string = factory->InternalizeUtf8String(property);
|
|
|
|
ASSERT(!property_string.is_null());
|
2010-09-21 12:54:12 +00:00
|
|
|
Handle<JSFunction> function = Handle<JSFunction>::cast(
|
2014-03-25 09:09:24 +00:00
|
|
|
GetProperty(isolate, global, property_string));
|
2010-09-21 12:54:12 +00:00
|
|
|
return Handle<JSObject>(JSObject::cast(function->prototype()));
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-12-14 18:53:48 +00:00
|
|
|
static void InstallBuiltinFunctionId(Handle<JSObject> holder,
|
|
|
|
const char* function_name,
|
|
|
|
BuiltinFunctionId id) {
|
2011-04-14 08:01:19 +00:00
|
|
|
Factory* factory = holder->GetIsolate()->factory();
|
2013-02-28 17:03:34 +00:00
|
|
|
Handle<String> name = factory->InternalizeUtf8String(function_name);
|
2010-10-25 15:22:03 +00:00
|
|
|
Object* function_object = holder->GetProperty(*name)->ToObjectUnchecked();
|
|
|
|
Handle<JSFunction> function(JSFunction::cast(function_object));
|
2010-05-06 13:21:53 +00:00
|
|
|
function->shared()->set_function_data(Smi::FromInt(id));
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-12-14 18:53:48 +00:00
|
|
|
void Genesis::InstallBuiltinFunctionIds() {
|
2013-02-15 09:27:10 +00:00
|
|
|
HandleScope scope(isolate());
|
2010-12-14 18:53:48 +00:00
|
|
|
#define INSTALL_BUILTIN_ID(holder_expr, fun_name, name) \
|
|
|
|
{ \
|
|
|
|
Handle<JSObject> holder = ResolveBuiltinIdHolder( \
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context(), #holder_expr); \
|
2010-12-14 18:53:48 +00:00
|
|
|
BuiltinFunctionId id = k##name; \
|
|
|
|
InstallBuiltinFunctionId(holder, #fun_name, id); \
|
2010-05-06 13:21:53 +00:00
|
|
|
}
|
2010-12-14 18:53:48 +00:00
|
|
|
FUNCTIONS_WITH_ID_LIST(INSTALL_BUILTIN_ID)
|
|
|
|
#undef INSTALL_BUILTIN_ID
|
2010-05-06 13:21:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-02-19 13:51:49 +00:00
|
|
|
void Genesis::InstallExperimentalBuiltinFunctionIds() {
|
|
|
|
HandleScope scope(isolate());
|
|
|
|
if (FLAG_harmony_maths) {
|
|
|
|
Handle<JSObject> holder = ResolveBuiltinIdHolder(native_context(), "Math");
|
|
|
|
InstallBuiltinFunctionId(holder, "clz32", kMathClz32);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-04-14 14:46:15 +00:00
|
|
|
// Do not forget to update macros.py with named constant
|
|
|
|
// of cache id.
|
|
|
|
#define JSFUNCTION_RESULT_CACHE_LIST(F) \
|
2012-08-17 09:03:08 +00:00
|
|
|
F(16, native_context()->regexp_function())
|
2010-04-14 14:46:15 +00:00
|
|
|
|
|
|
|
|
2011-05-16 09:06:16 +00:00
|
|
|
static FixedArray* CreateCache(int size, Handle<JSFunction> factory_function) {
|
2011-04-14 08:01:19 +00:00
|
|
|
Factory* factory = factory_function->GetIsolate()->factory();
|
2010-04-14 14:46:15 +00:00
|
|
|
// Caches are supposed to live for a long time, allocate in old space.
|
|
|
|
int array_size = JSFunctionResultCache::kEntriesIndex + 2 * size;
|
2010-05-04 16:42:11 +00:00
|
|
|
// Cannot use cast as object is not fully initialized yet.
|
|
|
|
JSFunctionResultCache* cache = reinterpret_cast<JSFunctionResultCache*>(
|
2011-04-14 08:01:19 +00:00
|
|
|
*factory->NewFixedArrayWithHoles(array_size, TENURED));
|
2011-05-16 09:06:16 +00:00
|
|
|
cache->set(JSFunctionResultCache::kFactoryIndex, *factory_function);
|
2010-05-04 16:42:11 +00:00
|
|
|
cache->MakeZeroSize();
|
|
|
|
return cache;
|
2010-04-14 14:46:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Genesis::InstallJSFunctionResultCaches() {
|
|
|
|
const int kNumberOfCaches = 0 +
|
|
|
|
#define F(size, func) + 1
|
|
|
|
JSFUNCTION_RESULT_CACHE_LIST(F)
|
|
|
|
#undef F
|
|
|
|
;
|
|
|
|
|
2013-06-04 10:30:05 +00:00
|
|
|
Handle<FixedArray> caches =
|
|
|
|
factory()->NewFixedArray(kNumberOfCaches, TENURED);
|
2010-04-14 14:46:15 +00:00
|
|
|
|
|
|
|
int index = 0;
|
2010-09-23 08:27:51 +00:00
|
|
|
|
2011-05-16 09:06:16 +00:00
|
|
|
#define F(size, func) do { \
|
|
|
|
FixedArray* cache = CreateCache((size), Handle<JSFunction>(func)); \
|
|
|
|
caches->set(index++, cache); \
|
2010-09-23 08:27:51 +00:00
|
|
|
} while (false)
|
|
|
|
|
|
|
|
JSFUNCTION_RESULT_CACHE_LIST(F);
|
|
|
|
|
2010-04-14 14:46:15 +00:00
|
|
|
#undef F
|
|
|
|
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_jsfunction_result_caches(*caches);
|
2010-04-14 14:46:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-08-25 13:25:54 +00:00
|
|
|
void Genesis::InitializeNormalizedMapCaches() {
|
|
|
|
Handle<FixedArray> array(
|
2013-06-04 10:30:05 +00:00
|
|
|
factory()->NewFixedArray(NormalizedMapCache::kEntries, TENURED));
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_normalized_map_cache(NormalizedMapCache::cast(*array));
|
2010-08-25 13:25:54 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-08-17 09:03:08 +00:00
|
|
|
bool Bootstrapper::InstallExtensions(Handle<Context> native_context,
|
2010-03-23 11:40:38 +00:00
|
|
|
v8::ExtensionConfiguration* extensions) {
|
2013-02-15 09:27:10 +00:00
|
|
|
BootstrapperActive active(this);
|
|
|
|
SaveContext saved_context(isolate_);
|
|
|
|
isolate_->set_context(*native_context);
|
2014-01-16 13:18:28 +00:00
|
|
|
return Genesis::InstallExtensions(native_context, extensions) &&
|
|
|
|
Genesis::InstallSpecialObjects(native_context);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-01-16 13:18:28 +00:00
|
|
|
bool Genesis::InstallSpecialObjects(Handle<Context> native_context) {
|
2012-08-17 09:03:08 +00:00
|
|
|
Isolate* isolate = native_context->GetIsolate();
|
2012-01-05 17:16:19 +00:00
|
|
|
Factory* factory = isolate->factory();
|
2013-02-15 09:27:10 +00:00
|
|
|
HandleScope scope(isolate);
|
2012-08-17 12:59:00 +00:00
|
|
|
Handle<JSGlobalObject> global(JSGlobalObject::cast(
|
|
|
|
native_context->global_object()));
|
2008-08-14 13:41:48 +00:00
|
|
|
// Expose the natives in global if a name for it is specified.
|
|
|
|
if (FLAG_expose_natives_as != NULL && strlen(FLAG_expose_natives_as) != 0) {
|
2013-02-28 17:03:34 +00:00
|
|
|
Handle<String> natives =
|
|
|
|
factory->InternalizeUtf8String(FLAG_expose_natives_as);
|
2014-01-16 13:18:28 +00:00
|
|
|
JSObject::SetLocalPropertyIgnoreAttributes(
|
|
|
|
global, natives, Handle<JSObject>(global->builtins()), DONT_ENUM);
|
|
|
|
if (isolate->has_pending_exception()) return false;
|
2008-08-14 13:41:48 +00:00
|
|
|
}
|
|
|
|
|
2012-01-05 17:16:19 +00:00
|
|
|
Handle<Object> Error = GetProperty(global, "Error");
|
2009-07-02 12:26:31 +00:00
|
|
|
if (Error->IsJSObject()) {
|
2013-02-28 17:03:34 +00:00
|
|
|
Handle<String> name = factory->InternalizeOneByteString(
|
|
|
|
STATIC_ASCII_VECTOR("stackTraceLimit"));
|
|
|
|
Handle<Smi> stack_trace_limit(
|
|
|
|
Smi::FromInt(FLAG_stack_trace_limit), isolate);
|
2014-01-16 13:18:28 +00:00
|
|
|
JSObject::SetLocalPropertyIgnoreAttributes(
|
|
|
|
Handle<JSObject>::cast(Error), name, stack_trace_limit, NONE);
|
|
|
|
if (isolate->has_pending_exception()) return false;
|
2009-06-30 11:08:37 +00:00
|
|
|
}
|
|
|
|
|
2009-04-20 16:36:13 +00:00
|
|
|
#ifdef ENABLE_DEBUGGER_SUPPORT
|
2008-08-14 13:41:48 +00:00
|
|
|
// Expose the debug global object in global if a name for it is specified.
|
|
|
|
if (FLAG_expose_debug_as != NULL && strlen(FLAG_expose_debug_as) != 0) {
|
2013-02-15 09:27:10 +00:00
|
|
|
Debug* debug = isolate->debug();
|
2008-08-14 13:41:48 +00:00
|
|
|
// If loading fails we just bail out without installing the
|
|
|
|
// debugger but without tanking the whole context.
|
2014-01-16 13:18:28 +00:00
|
|
|
if (!debug->Load()) return true;
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
// Set the security token for the debugger context to the same as
|
2012-08-17 09:03:08 +00:00
|
|
|
// the shell native context to allow calling between these (otherwise
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
// exposing debug global object doesn't make much sense).
|
2011-03-18 20:35:07 +00:00
|
|
|
debug->debug_context()->set_security_token(
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context->security_token());
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
|
2008-08-14 13:41:48 +00:00
|
|
|
Handle<String> debug_string =
|
2013-02-28 17:03:34 +00:00
|
|
|
factory->InternalizeUtf8String(FLAG_expose_debug_as);
|
|
|
|
Handle<Object> global_proxy(
|
|
|
|
debug->debug_context()->global_proxy(), isolate);
|
2014-01-16 13:18:28 +00:00
|
|
|
JSObject::SetLocalPropertyIgnoreAttributes(
|
|
|
|
global, debug_string, global_proxy, DONT_ENUM);
|
|
|
|
if (isolate->has_pending_exception()) return false;
|
2008-08-14 13:41:48 +00:00
|
|
|
}
|
2009-04-20 16:36:13 +00:00
|
|
|
#endif
|
2014-01-16 13:18:28 +00:00
|
|
|
return true;
|
2008-08-14 13:41:48 +00:00
|
|
|
}
|
|
|
|
|
2013-07-05 09:52:11 +00:00
|
|
|
|
2011-11-15 22:48:55 +00:00
|
|
|
static uint32_t Hash(RegisteredExtension* extension) {
|
|
|
|
return v8::internal::ComputePointerHash(extension);
|
|
|
|
}
|
|
|
|
|
2013-07-05 09:52:11 +00:00
|
|
|
|
2011-11-15 22:48:55 +00:00
|
|
|
static bool MatchRegisteredExtensions(void* key1, void* key2) {
|
|
|
|
return key1 == key2;
|
|
|
|
}
|
|
|
|
|
|
|
|
Genesis::ExtensionStates::ExtensionStates()
|
2012-02-23 09:12:57 +00:00
|
|
|
: map_(MatchRegisteredExtensions, 8) { }
|
2011-11-15 22:48:55 +00:00
|
|
|
|
|
|
|
Genesis::ExtensionTraversalState Genesis::ExtensionStates::get_state(
|
|
|
|
RegisteredExtension* extension) {
|
|
|
|
i::HashMap::Entry* entry = map_.Lookup(extension, Hash(extension), false);
|
|
|
|
if (entry == NULL) {
|
|
|
|
return UNVISITED;
|
|
|
|
}
|
|
|
|
return static_cast<ExtensionTraversalState>(
|
|
|
|
reinterpret_cast<intptr_t>(entry->value));
|
|
|
|
}
|
|
|
|
|
|
|
|
void Genesis::ExtensionStates::set_state(RegisteredExtension* extension,
|
|
|
|
ExtensionTraversalState state) {
|
|
|
|
map_.Lookup(extension, Hash(extension), true)->value =
|
|
|
|
reinterpret_cast<void*>(static_cast<intptr_t>(state));
|
|
|
|
}
|
2008-08-14 13:41:48 +00:00
|
|
|
|
2014-01-16 13:18:28 +00:00
|
|
|
|
2012-08-17 09:03:08 +00:00
|
|
|
bool Genesis::InstallExtensions(Handle<Context> native_context,
|
2010-03-23 11:40:38 +00:00
|
|
|
v8::ExtensionConfiguration* extensions) {
|
2013-02-15 09:27:10 +00:00
|
|
|
Isolate* isolate = native_context->GetIsolate();
|
2011-11-15 23:26:22 +00:00
|
|
|
ExtensionStates extension_states; // All extensions have state UNVISITED.
|
2014-01-16 13:18:28 +00:00
|
|
|
return InstallAutoExtensions(isolate, &extension_states) &&
|
|
|
|
(!FLAG_expose_free_buffer ||
|
|
|
|
InstallExtension(isolate, "v8/free-buffer", &extension_states)) &&
|
|
|
|
(!FLAG_expose_gc ||
|
|
|
|
InstallExtension(isolate, "v8/gc", &extension_states)) &&
|
|
|
|
(!FLAG_expose_externalize_string ||
|
|
|
|
InstallExtension(isolate, "v8/externalize", &extension_states)) &&
|
|
|
|
(!FLAG_track_gc_object_stats ||
|
|
|
|
InstallExtension(isolate, "v8/statistics", &extension_states)) &&
|
|
|
|
(!FLAG_expose_trigger_failure ||
|
|
|
|
InstallExtension(isolate, "v8/trigger-failure", &extension_states)) &&
|
|
|
|
InstallRequestedExtensions(isolate, extensions, &extension_states);
|
|
|
|
}
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2014-01-16 13:18:28 +00:00
|
|
|
|
|
|
|
bool Genesis::InstallAutoExtensions(Isolate* isolate,
|
|
|
|
ExtensionStates* extension_states) {
|
|
|
|
for (v8::RegisteredExtension* it = v8::RegisteredExtension::first_extension();
|
|
|
|
it != NULL;
|
|
|
|
it = it->next()) {
|
|
|
|
if (it->extension()->auto_enable() &&
|
|
|
|
!InstallExtension(isolate, it, extension_states)) {
|
|
|
|
return false;
|
|
|
|
}
|
2013-12-05 17:26:22 +00:00
|
|
|
}
|
2014-01-16 13:18:28 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2014-01-16 13:18:28 +00:00
|
|
|
bool Genesis::InstallRequestedExtensions(Isolate* isolate,
|
|
|
|
v8::ExtensionConfiguration* extensions,
|
|
|
|
ExtensionStates* extension_states) {
|
2014-01-16 08:17:40 +00:00
|
|
|
for (const char** it = extensions->begin(); it != extensions->end(); ++it) {
|
2014-01-16 13:18:28 +00:00
|
|
|
if (!InstallExtension(isolate, *it, extension_states)) return false;
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// Installs a named extension. This methods is unoptimized and does
|
|
|
|
// not scale well if we want to support a large number of extensions.
|
2013-02-15 09:27:10 +00:00
|
|
|
bool Genesis::InstallExtension(Isolate* isolate,
|
|
|
|
const char* name,
|
2011-11-15 22:48:55 +00:00
|
|
|
ExtensionStates* extension_states) {
|
2014-01-16 13:18:28 +00:00
|
|
|
for (v8::RegisteredExtension* it = v8::RegisteredExtension::first_extension();
|
|
|
|
it != NULL;
|
|
|
|
it = it->next()) {
|
|
|
|
if (strcmp(name, it->extension()->name()) == 0) {
|
|
|
|
return InstallExtension(isolate, it, extension_states);
|
|
|
|
}
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
2014-01-16 13:18:28 +00:00
|
|
|
return Utils::ApiCheck(false,
|
|
|
|
"v8::Context::New()",
|
|
|
|
"Cannot find required extension");
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-02-15 09:27:10 +00:00
|
|
|
bool Genesis::InstallExtension(Isolate* isolate,
|
|
|
|
v8::RegisteredExtension* current,
|
2011-11-15 22:48:55 +00:00
|
|
|
ExtensionStates* extension_states) {
|
2013-02-15 09:27:10 +00:00
|
|
|
HandleScope scope(isolate);
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2011-11-15 22:48:55 +00:00
|
|
|
if (extension_states->get_state(current) == INSTALLED) return true;
|
2008-07-03 15:10:15 +00:00
|
|
|
// The current node has already been visited so there must be a
|
|
|
|
// cycle in the dependency graph; fail.
|
2014-01-13 09:42:23 +00:00
|
|
|
if (!Utils::ApiCheck(extension_states->get_state(current) != VISITED,
|
|
|
|
"v8::Context::New()",
|
|
|
|
"Circular extension dependency")) {
|
2008-07-03 15:10:15 +00:00
|
|
|
return false;
|
|
|
|
}
|
2011-11-15 22:48:55 +00:00
|
|
|
ASSERT(extension_states->get_state(current) == UNVISITED);
|
|
|
|
extension_states->set_state(current, VISITED);
|
2008-07-03 15:10:15 +00:00
|
|
|
v8::Extension* extension = current->extension();
|
|
|
|
// Install the extension's dependencies
|
|
|
|
for (int i = 0; i < extension->dependency_count(); i++) {
|
2013-02-15 09:27:10 +00:00
|
|
|
if (!InstallExtension(isolate,
|
|
|
|
extension->dependencies()[i],
|
|
|
|
extension_states)) {
|
2011-11-15 22:48:55 +00:00
|
|
|
return false;
|
2013-02-15 09:27:10 +00:00
|
|
|
}
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
2011-09-22 09:15:43 +00:00
|
|
|
Handle<String> source_code =
|
|
|
|
isolate->factory()->NewExternalStringFromAscii(extension->source());
|
2014-03-25 09:09:24 +00:00
|
|
|
// We do not expect this to throw an exception. Change this if it does.
|
|
|
|
CHECK_NOT_EMPTY_HANDLE(isolate, source_code);
|
2013-02-15 09:27:10 +00:00
|
|
|
bool result = CompileScriptCached(isolate,
|
|
|
|
CStrVector(extension->name()),
|
|
|
|
source_code,
|
|
|
|
isolate->bootstrapper()->extensions_cache(),
|
|
|
|
extension,
|
|
|
|
Handle<Context>(isolate->context()),
|
|
|
|
false);
|
2011-03-28 13:09:37 +00:00
|
|
|
ASSERT(isolate->has_pending_exception() != result);
|
2008-07-03 15:10:15 +00:00
|
|
|
if (!result) {
|
2011-10-25 13:43:19 +00:00
|
|
|
// We print out the name of the extension that fail to install.
|
|
|
|
// When an error is thrown during bootstrapping we automatically print
|
|
|
|
// the line number at which this happened to the console in the isolate
|
|
|
|
// error throwing functionality.
|
|
|
|
OS::PrintError("Error installing extension '%s'.\n",
|
|
|
|
current->extension()->name());
|
2011-03-28 13:09:37 +00:00
|
|
|
isolate->clear_pending_exception();
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
2011-11-15 22:48:55 +00:00
|
|
|
extension_states->set_state(current, INSTALLED);
|
|
|
|
isolate->NotifyExtensionInstalled();
|
2008-07-03 15:10:15 +00:00
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-02-11 08:05:33 +00:00
|
|
|
bool Genesis::InstallJSBuiltins(Handle<JSBuiltinsObject> builtins) {
|
2013-02-15 09:27:10 +00:00
|
|
|
HandleScope scope(isolate());
|
2010-02-11 08:05:33 +00:00
|
|
|
for (int i = 0; i < Builtins::NumberOfJavaScriptBuiltins(); i++) {
|
|
|
|
Builtins::JavaScript id = static_cast<Builtins::JavaScript>(i);
|
2013-02-28 17:03:34 +00:00
|
|
|
Handle<String> name =
|
|
|
|
factory()->InternalizeUtf8String(Builtins::GetName(id));
|
2010-10-25 15:22:03 +00:00
|
|
|
Object* function_object = builtins->GetPropertyNoExceptionThrown(*name);
|
2010-02-11 08:05:33 +00:00
|
|
|
Handle<JSFunction> function
|
2010-10-25 15:22:03 +00:00
|
|
|
= Handle<JSFunction>(JSFunction::cast(function_object));
|
2010-02-11 08:05:33 +00:00
|
|
|
builtins->set_javascript_builtin(id, *function);
|
2013-12-23 14:30:35 +00:00
|
|
|
if (!Compiler::EnsureCompiled(function, CLEAR_EXCEPTION)) {
|
2011-10-19 12:04:16 +00:00
|
|
|
return false;
|
|
|
|
}
|
2012-06-05 13:15:35 +00:00
|
|
|
builtins->set_javascript_builtin_code(id, function->shared()->code());
|
2010-02-11 08:05:33 +00:00
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
bool Genesis::ConfigureGlobalObjects(
|
|
|
|
v8::Handle<v8::ObjectTemplate> global_proxy_template) {
|
|
|
|
Handle<JSObject> global_proxy(
|
2012-08-17 09:03:08 +00:00
|
|
|
JSObject::cast(native_context()->global_proxy()));
|
2012-08-17 12:59:00 +00:00
|
|
|
Handle<JSObject> inner_global(
|
|
|
|
JSObject::cast(native_context()->global_object()));
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
|
|
|
|
if (!global_proxy_template.IsEmpty()) {
|
2008-10-21 20:08:49 +00:00
|
|
|
// Configure the global proxy object.
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
Handle<ObjectTemplateInfo> proxy_data =
|
|
|
|
v8::Utils::OpenHandle(*global_proxy_template);
|
|
|
|
if (!ConfigureApiObject(global_proxy, proxy_data)) return false;
|
|
|
|
|
|
|
|
// Configure the inner global object.
|
|
|
|
Handle<FunctionTemplateInfo> proxy_constructor(
|
|
|
|
FunctionTemplateInfo::cast(proxy_data->constructor()));
|
|
|
|
if (!proxy_constructor->prototype_template()->IsUndefined()) {
|
2008-10-21 20:08:49 +00:00
|
|
|
Handle<ObjectTemplateInfo> inner_data(
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
ObjectTemplateInfo::cast(proxy_constructor->prototype_template()));
|
2010-03-23 11:40:38 +00:00
|
|
|
if (!ConfigureApiObject(inner_global, inner_data)) return false;
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
}
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
|
2010-03-23 11:40:38 +00:00
|
|
|
SetObjectPrototype(global_proxy, inner_global);
|
2013-05-13 07:35:26 +00:00
|
|
|
|
|
|
|
native_context()->set_initial_array_prototype(
|
|
|
|
JSArray::cast(native_context()->array_function()->prototype()));
|
|
|
|
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2008-10-21 20:08:49 +00:00
|
|
|
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
bool Genesis::ConfigureApiObject(Handle<JSObject> object,
|
|
|
|
Handle<ObjectTemplateInfo> object_template) {
|
|
|
|
ASSERT(!object_template.is_null());
|
2013-11-19 13:38:15 +00:00
|
|
|
ASSERT(FunctionTemplateInfo::cast(object_template->constructor())
|
|
|
|
->IsTemplateFor(object->map()));;
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
|
|
|
|
bool pending_exception = false;
|
|
|
|
Handle<JSObject> obj =
|
|
|
|
Execution::InstantiateObject(object_template, &pending_exception);
|
|
|
|
if (pending_exception) {
|
2011-04-14 08:01:19 +00:00
|
|
|
ASSERT(isolate()->has_pending_exception());
|
|
|
|
isolate()->clear_pending_exception();
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
TransferObject(obj, object);
|
2008-07-03 15:10:15 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Genesis::TransferNamedProperties(Handle<JSObject> from,
|
|
|
|
Handle<JSObject> to) {
|
|
|
|
if (from->HasFastProperties()) {
|
|
|
|
Handle<DescriptorArray> descs =
|
|
|
|
Handle<DescriptorArray>(from->map()->instance_descriptors());
|
2013-05-07 13:09:23 +00:00
|
|
|
for (int i = 0; i < from->map()->NumberOfOwnDescriptors(); i++) {
|
2012-04-17 07:16:19 +00:00
|
|
|
PropertyDetails details = descs->GetDetails(i);
|
2008-07-03 15:10:15 +00:00
|
|
|
switch (details.type()) {
|
|
|
|
case FIELD: {
|
2013-02-15 09:27:10 +00:00
|
|
|
HandleScope inner(isolate());
|
2013-03-04 15:00:57 +00:00
|
|
|
Handle<Name> key = Handle<Name>(descs->GetKey(i));
|
2009-07-10 19:25:18 +00:00
|
|
|
int index = descs->GetFieldIndex(i);
|
2013-05-08 15:02:08 +00:00
|
|
|
ASSERT(!descs->GetDetails(i).representation().IsDouble());
|
|
|
|
Handle<Object> value = Handle<Object>(from->RawFastPropertyAt(index),
|
2013-02-25 14:46:09 +00:00
|
|
|
isolate());
|
|
|
|
CHECK_NOT_EMPTY_HANDLE(isolate(),
|
2012-01-05 17:16:19 +00:00
|
|
|
JSObject::SetLocalPropertyIgnoreAttributes(
|
|
|
|
to, key, value, details.attributes()));
|
2008-07-03 15:10:15 +00:00
|
|
|
break;
|
|
|
|
}
|
2013-07-24 12:34:50 +00:00
|
|
|
case CONSTANT: {
|
2013-02-15 09:27:10 +00:00
|
|
|
HandleScope inner(isolate());
|
2013-03-04 15:00:57 +00:00
|
|
|
Handle<Name> key = Handle<Name>(descs->GetKey(i));
|
2013-07-24 12:34:50 +00:00
|
|
|
Handle<Object> constant(descs->GetConstant(i), isolate());
|
2013-02-25 14:46:09 +00:00
|
|
|
CHECK_NOT_EMPTY_HANDLE(isolate(),
|
2012-01-05 17:16:19 +00:00
|
|
|
JSObject::SetLocalPropertyIgnoreAttributes(
|
2013-07-24 12:34:50 +00:00
|
|
|
to, key, constant, details.attributes()));
|
2008-07-03 15:10:15 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case CALLBACKS: {
|
2011-10-18 11:18:55 +00:00
|
|
|
LookupResult result(isolate());
|
2009-07-10 19:25:18 +00:00
|
|
|
to->LocalLookup(descs->GetKey(i), &result);
|
2008-07-03 15:10:15 +00:00
|
|
|
// If the property is already there we skip it
|
2012-07-16 14:47:28 +00:00
|
|
|
if (result.IsFound()) continue;
|
2013-02-15 09:27:10 +00:00
|
|
|
HandleScope inner(isolate());
|
2010-03-23 11:40:38 +00:00
|
|
|
ASSERT(!to->HasFastProperties());
|
|
|
|
// Add to dictionary.
|
2013-03-04 15:00:57 +00:00
|
|
|
Handle<Name> key = Handle<Name>(descs->GetKey(i));
|
2013-02-25 14:46:09 +00:00
|
|
|
Handle<Object> callbacks(descs->GetCallbacksObject(i), isolate());
|
2013-05-07 13:09:23 +00:00
|
|
|
PropertyDetails d = PropertyDetails(
|
|
|
|
details.attributes(), CALLBACKS, i + 1);
|
2012-01-05 17:16:19 +00:00
|
|
|
JSObject::SetNormalizedProperty(to, key, callbacks, d);
|
2008-07-03 15:10:15 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
case NORMAL:
|
|
|
|
// Do not occur since the from object has fast properties.
|
2011-05-16 16:33:58 +00:00
|
|
|
case HANDLER:
|
2008-07-03 15:10:15 +00:00
|
|
|
case INTERCEPTOR:
|
2012-07-05 13:54:20 +00:00
|
|
|
case TRANSITION:
|
2012-06-25 13:10:54 +00:00
|
|
|
case NONEXISTENT:
|
2011-05-16 16:33:58 +00:00
|
|
|
// No element in instance descriptors have proxy or interceptor type.
|
2008-07-03 15:10:15 +00:00
|
|
|
UNREACHABLE();
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
2013-03-04 15:00:57 +00:00
|
|
|
Handle<NameDictionary> properties =
|
|
|
|
Handle<NameDictionary>(from->property_dictionary());
|
2008-07-03 15:10:15 +00:00
|
|
|
int capacity = properties->Capacity();
|
|
|
|
for (int i = 0; i < capacity; i++) {
|
|
|
|
Object* raw_key(properties->KeyAt(i));
|
|
|
|
if (properties->IsKey(raw_key)) {
|
2013-03-04 15:00:57 +00:00
|
|
|
ASSERT(raw_key->IsName());
|
2008-07-03 15:10:15 +00:00
|
|
|
// If the property is already there we skip it.
|
2011-10-18 11:18:55 +00:00
|
|
|
LookupResult result(isolate());
|
2013-03-04 15:00:57 +00:00
|
|
|
to->LocalLookup(Name::cast(raw_key), &result);
|
2012-07-16 14:47:28 +00:00
|
|
|
if (result.IsFound()) continue;
|
2008-07-03 15:10:15 +00:00
|
|
|
// Set the property.
|
2013-03-04 15:00:57 +00:00
|
|
|
Handle<Name> key = Handle<Name>(Name::cast(raw_key));
|
2013-02-25 14:46:09 +00:00
|
|
|
Handle<Object> value = Handle<Object>(properties->ValueAt(i),
|
|
|
|
isolate());
|
2013-06-12 15:03:44 +00:00
|
|
|
ASSERT(!value->IsCell());
|
2013-06-14 16:06:12 +00:00
|
|
|
if (value->IsPropertyCell()) {
|
|
|
|
value = Handle<Object>(PropertyCell::cast(*value)->value(),
|
2013-02-25 14:46:09 +00:00
|
|
|
isolate());
|
2009-06-30 10:05:36 +00:00
|
|
|
}
|
2008-07-03 15:10:15 +00:00
|
|
|
PropertyDetails details = properties->DetailsAt(i);
|
2013-02-25 14:46:09 +00:00
|
|
|
CHECK_NOT_EMPTY_HANDLE(isolate(),
|
2012-01-05 17:16:19 +00:00
|
|
|
JSObject::SetLocalPropertyIgnoreAttributes(
|
|
|
|
to, key, value, details.attributes()));
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Genesis::TransferIndexedProperties(Handle<JSObject> from,
|
|
|
|
Handle<JSObject> to) {
|
|
|
|
// Cloning the elements array is sufficient.
|
|
|
|
Handle<FixedArray> from_elements =
|
|
|
|
Handle<FixedArray>(FixedArray::cast(from->elements()));
|
2013-06-04 10:30:05 +00:00
|
|
|
Handle<FixedArray> to_elements = factory()->CopyFixedArray(from_elements);
|
2008-07-03 15:10:15 +00:00
|
|
|
to->set_elements(*to_elements);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Genesis::TransferObject(Handle<JSObject> from, Handle<JSObject> to) {
|
2013-02-15 09:27:10 +00:00
|
|
|
HandleScope outer(isolate());
|
2008-07-03 15:10:15 +00:00
|
|
|
|
|
|
|
ASSERT(!from->IsJSArray());
|
|
|
|
ASSERT(!to->IsJSArray());
|
|
|
|
|
|
|
|
TransferNamedProperties(from, to);
|
|
|
|
TransferIndexedProperties(from, to);
|
|
|
|
|
|
|
|
// Transfer the prototype (new map is needed).
|
|
|
|
Handle<Map> old_to_map = Handle<Map>(to->map());
|
2013-06-04 10:30:05 +00:00
|
|
|
Handle<Map> new_to_map = factory()->CopyMap(old_to_map);
|
2008-07-03 15:10:15 +00:00
|
|
|
new_to_map->set_prototype(from->map()->prototype());
|
|
|
|
to->set_map(*new_to_map);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Genesis::MakeFunctionInstancePrototypeWritable() {
|
2011-03-17 20:28:17 +00:00
|
|
|
// The maps with writable prototype are created in CreateEmptyFunction
|
|
|
|
// and CreateStrictModeFunctionMaps respectively. Initially the maps are
|
|
|
|
// created with read-only prototype for JS builtins processing.
|
2014-03-11 14:41:22 +00:00
|
|
|
ASSERT(!sloppy_function_map_writable_prototype_.is_null());
|
|
|
|
ASSERT(!strict_function_map_writable_prototype_.is_null());
|
2011-03-17 20:28:17 +00:00
|
|
|
|
|
|
|
// Replace function instance maps to make prototype writable.
|
2014-03-11 14:41:22 +00:00
|
|
|
native_context()->set_sloppy_function_map(
|
|
|
|
*sloppy_function_map_writable_prototype_);
|
|
|
|
native_context()->set_strict_function_map(
|
|
|
|
*strict_function_map_writable_prototype_);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-01-29 14:18:55 +00:00
|
|
|
class NoTrackDoubleFieldsForSerializerScope {
|
|
|
|
public:
|
|
|
|
NoTrackDoubleFieldsForSerializerScope() : flag_(FLAG_track_double_fields) {
|
|
|
|
if (Serializer::enabled()) {
|
|
|
|
// Disable tracking double fields because heap numbers treated as
|
|
|
|
// immutable by the serializer.
|
|
|
|
FLAG_track_double_fields = false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
~NoTrackDoubleFieldsForSerializerScope() {
|
2014-02-10 13:56:59 +00:00
|
|
|
if (Serializer::enabled()) {
|
|
|
|
FLAG_track_double_fields = flag_;
|
|
|
|
}
|
2014-01-29 14:18:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
bool flag_;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2011-04-14 08:01:19 +00:00
|
|
|
Genesis::Genesis(Isolate* isolate,
|
|
|
|
Handle<Object> global_object,
|
2008-07-03 15:10:15 +00:00
|
|
|
v8::Handle<v8::ObjectTemplate> global_template,
|
2013-02-15 09:27:10 +00:00
|
|
|
v8::ExtensionConfiguration* extensions)
|
|
|
|
: isolate_(isolate),
|
|
|
|
active_(isolate->bootstrapper()) {
|
2014-01-29 14:18:55 +00:00
|
|
|
NoTrackDoubleFieldsForSerializerScope disable_double_tracking_for_serializer;
|
2009-07-07 11:41:21 +00:00
|
|
|
result_ = Handle<Context>::null();
|
2013-09-02 17:06:08 +00:00
|
|
|
// If V8 cannot be initialized, just return.
|
|
|
|
if (!V8::Initialize(NULL)) return;
|
2008-07-03 15:10:15 +00:00
|
|
|
|
|
|
|
// Before creating the roots we must save the context and restore it
|
|
|
|
// on all function exits.
|
2011-03-18 20:35:07 +00:00
|
|
|
SaveContext saved_context(isolate);
|
2010-03-23 11:40:38 +00:00
|
|
|
|
2012-04-05 14:01:39 +00:00
|
|
|
// During genesis, the boilerplate for stack overflow won't work until the
|
|
|
|
// environment has been at least partially initialized. Add a stack check
|
|
|
|
// before entering JS code to catch overflow early.
|
2013-02-15 09:27:10 +00:00
|
|
|
StackLimitCheck check(isolate);
|
2012-04-05 14:01:39 +00:00
|
|
|
if (check.HasOverflowed()) return;
|
|
|
|
|
2013-06-28 13:40:41 +00:00
|
|
|
// We can only de-serialize a context if the isolate was initialized from
|
|
|
|
// a snapshot. Otherwise we have to build the context from scratch.
|
|
|
|
if (isolate->initialized_from_snapshot()) {
|
2013-09-03 11:54:08 +00:00
|
|
|
native_context_ = Snapshot::NewContextFromSnapshot(isolate);
|
2013-06-28 13:40:41 +00:00
|
|
|
} else {
|
|
|
|
native_context_ = Handle<Context>();
|
|
|
|
}
|
|
|
|
|
2013-03-18 17:36:47 +00:00
|
|
|
if (!native_context().is_null()) {
|
|
|
|
AddToWeakNativeContextList(*native_context());
|
|
|
|
isolate->set_context(*native_context());
|
2011-03-18 20:35:07 +00:00
|
|
|
isolate->counters()->contexts_created_by_snapshot()->Increment();
|
2010-03-23 11:40:38 +00:00
|
|
|
Handle<GlobalObject> inner_global;
|
|
|
|
Handle<JSGlobalProxy> global_proxy =
|
|
|
|
CreateNewGlobals(global_template,
|
|
|
|
global_object,
|
|
|
|
&inner_global);
|
|
|
|
|
|
|
|
HookUpGlobalProxy(inner_global, global_proxy);
|
|
|
|
HookUpInnerGlobal(inner_global);
|
2014-01-07 10:46:39 +00:00
|
|
|
native_context()->builtins()->set_global_receiver(
|
|
|
|
native_context()->global_proxy());
|
2010-03-23 11:40:38 +00:00
|
|
|
|
|
|
|
if (!ConfigureGlobalObjects(global_template)) return;
|
|
|
|
} else {
|
|
|
|
// We get here if there was no context snapshot.
|
|
|
|
CreateRoots();
|
2011-04-14 08:01:19 +00:00
|
|
|
Handle<JSFunction> empty_function = CreateEmptyFunction(isolate);
|
2011-03-17 20:28:17 +00:00
|
|
|
CreateStrictModeFunctionMaps(empty_function);
|
2010-03-23 11:40:38 +00:00
|
|
|
Handle<GlobalObject> inner_global;
|
|
|
|
Handle<JSGlobalProxy> global_proxy =
|
|
|
|
CreateNewGlobals(global_template, global_object, &inner_global);
|
|
|
|
HookUpGlobalProxy(inner_global, global_proxy);
|
2013-07-18 07:59:48 +00:00
|
|
|
InitializeGlobal(inner_global, empty_function);
|
2010-04-14 14:46:15 +00:00
|
|
|
InstallJSFunctionResultCaches();
|
2010-08-25 13:25:54 +00:00
|
|
|
InitializeNormalizedMapCaches();
|
2010-05-12 12:44:00 +00:00
|
|
|
if (!InstallNatives()) return;
|
2010-03-23 11:40:38 +00:00
|
|
|
|
|
|
|
MakeFunctionInstancePrototypeWritable();
|
|
|
|
|
2014-02-12 13:27:13 +00:00
|
|
|
if (!ConfigureGlobalObjects(global_template)) return;
|
|
|
|
isolate->counters()->contexts_created_from_scratch()->Increment();
|
2010-03-23 11:40:38 +00:00
|
|
|
}
|
2008-08-14 13:41:48 +00:00
|
|
|
|
2011-08-03 11:55:13 +00:00
|
|
|
// Initialize experimental globals and install experimental natives.
|
|
|
|
InitializeExperimentalGlobal();
|
2011-04-15 12:31:03 +00:00
|
|
|
if (!InstallExperimentalNatives()) return;
|
|
|
|
|
2013-11-22 11:35:39 +00:00
|
|
|
// We can't (de-)serialize typed arrays currently, but we are lucky: The state
|
|
|
|
// of the random number generator needs no initialization during snapshot
|
|
|
|
// creation time and we don't need trigonometric functions then.
|
2013-11-22 08:25:50 +00:00
|
|
|
if (!Serializer::enabled()) {
|
2013-11-22 11:35:39 +00:00
|
|
|
// Initially seed the per-context random number generator using the
|
|
|
|
// per-isolate random number generator.
|
|
|
|
const int num_elems = 2;
|
|
|
|
const int num_bytes = num_elems * sizeof(uint32_t);
|
|
|
|
uint32_t* state = reinterpret_cast<uint32_t*>(malloc(num_bytes));
|
|
|
|
|
|
|
|
do {
|
|
|
|
isolate->random_number_generator()->NextBytes(state, num_bytes);
|
|
|
|
} while (state[0] == 0 || state[1] == 0);
|
|
|
|
|
2013-11-28 08:21:26 +00:00
|
|
|
v8::Local<v8::ArrayBuffer> buffer = v8::ArrayBuffer::New(
|
|
|
|
reinterpret_cast<v8::Isolate*>(isolate), state, num_bytes);
|
2013-11-22 11:35:39 +00:00
|
|
|
Utils::OpenHandle(*buffer)->set_should_be_freed(true);
|
|
|
|
v8::Local<v8::Uint32Array> ta = v8::Uint32Array::New(buffer, 0, num_elems);
|
2013-11-22 08:25:50 +00:00
|
|
|
Handle<JSBuiltinsObject> builtins(native_context()->builtins());
|
2013-11-22 11:35:39 +00:00
|
|
|
ForceSetProperty(builtins,
|
|
|
|
factory()->InternalizeOneByteString(
|
|
|
|
STATIC_ASCII_VECTOR("rngstate")),
|
|
|
|
Utils::OpenHandle(*ta),
|
|
|
|
NONE);
|
|
|
|
|
2013-11-22 08:25:50 +00:00
|
|
|
// Initialize trigonometric lookup tables and constants.
|
|
|
|
const int table_num_bytes = TrigonometricLookupTable::table_num_bytes();
|
|
|
|
v8::Local<v8::ArrayBuffer> sin_buffer = v8::ArrayBuffer::New(
|
2013-11-28 08:21:26 +00:00
|
|
|
reinterpret_cast<v8::Isolate*>(isolate),
|
2013-11-22 08:25:50 +00:00
|
|
|
TrigonometricLookupTable::sin_table(), table_num_bytes);
|
|
|
|
v8::Local<v8::ArrayBuffer> cos_buffer = v8::ArrayBuffer::New(
|
2013-11-28 08:21:26 +00:00
|
|
|
reinterpret_cast<v8::Isolate*>(isolate),
|
2013-11-22 08:25:50 +00:00
|
|
|
TrigonometricLookupTable::cos_x_interval_table(), table_num_bytes);
|
|
|
|
v8::Local<v8::Float64Array> sin_table = v8::Float64Array::New(
|
|
|
|
sin_buffer, 0, TrigonometricLookupTable::table_size());
|
|
|
|
v8::Local<v8::Float64Array> cos_table = v8::Float64Array::New(
|
|
|
|
cos_buffer, 0, TrigonometricLookupTable::table_size());
|
|
|
|
|
|
|
|
ForceSetProperty(builtins,
|
|
|
|
factory()->InternalizeOneByteString(
|
|
|
|
STATIC_ASCII_VECTOR("kSinTable")),
|
|
|
|
Utils::OpenHandle(*sin_table),
|
|
|
|
NONE);
|
|
|
|
ForceSetProperty(builtins,
|
|
|
|
factory()->InternalizeOneByteString(
|
|
|
|
STATIC_ASCII_VECTOR("kCosXIntervalTable")),
|
|
|
|
Utils::OpenHandle(*cos_table),
|
|
|
|
NONE);
|
|
|
|
ForceSetProperty(builtins,
|
|
|
|
factory()->InternalizeOneByteString(
|
|
|
|
STATIC_ASCII_VECTOR("kSamples")),
|
|
|
|
factory()->NewHeapNumber(
|
|
|
|
TrigonometricLookupTable::samples()),
|
|
|
|
NONE);
|
|
|
|
ForceSetProperty(builtins,
|
|
|
|
factory()->InternalizeOneByteString(
|
|
|
|
STATIC_ASCII_VECTOR("kIndexConvert")),
|
|
|
|
factory()->NewHeapNumber(
|
|
|
|
TrigonometricLookupTable::samples_over_pi_half()),
|
|
|
|
NONE);
|
|
|
|
}
|
|
|
|
|
2013-03-18 17:36:47 +00:00
|
|
|
result_ = native_context();
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
2009-01-26 18:09:46 +00:00
|
|
|
|
|
|
|
// Support for thread preemption.
|
|
|
|
|
|
|
|
// Reserve space for statics needing saving and restoring.
|
|
|
|
int Bootstrapper::ArchiveSpacePerThread() {
|
2011-03-18 20:35:07 +00:00
|
|
|
return sizeof(NestingCounterType);
|
2009-01-26 18:09:46 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// Archive statics that are thread local.
|
|
|
|
char* Bootstrapper::ArchiveState(char* to) {
|
2011-03-18 20:35:07 +00:00
|
|
|
*reinterpret_cast<NestingCounterType*>(to) = nesting_;
|
|
|
|
nesting_ = 0;
|
|
|
|
return to + sizeof(NestingCounterType);
|
2009-01-26 18:09:46 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// Restore statics that are thread local.
|
|
|
|
char* Bootstrapper::RestoreState(char* from) {
|
2011-03-18 20:35:07 +00:00
|
|
|
nesting_ = *reinterpret_cast<NestingCounterType*>(from);
|
|
|
|
return from + sizeof(NestingCounterType);
|
2009-01-26 18:09:46 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-09-28 12:25:21 +00:00
|
|
|
// Called when the top-level V8 mutex is destroyed.
|
|
|
|
void Bootstrapper::FreeThreadResources() {
|
2011-03-18 20:35:07 +00:00
|
|
|
ASSERT(!IsActive());
|
2009-01-26 18:09:46 +00:00
|
|
|
}
|
|
|
|
|
2008-07-03 15:10:15 +00:00
|
|
|
} } // namespace v8::internal
|