2014-03-31 12:01:02 +00:00
|
|
|
// Copyright 2014 the V8 project authors. All rights reserved.
|
|
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
|
|
// found in the LICENSE file.
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2014-06-03 08:12:43 +00:00
|
|
|
#include "src/bootstrapper.h"
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2014-06-03 08:12:43 +00:00
|
|
|
#include "src/accessors.h"
|
2015-02-04 13:01:34 +00:00
|
|
|
#include "src/api-natives.h"
|
2014-06-20 08:40:11 +00:00
|
|
|
#include "src/code-stubs.h"
|
2014-06-03 08:12:43 +00:00
|
|
|
#include "src/extensions/externalize-string-extension.h"
|
|
|
|
#include "src/extensions/free-buffer-extension.h"
|
|
|
|
#include "src/extensions/gc-extension.h"
|
|
|
|
#include "src/extensions/statistics-extension.h"
|
|
|
|
#include "src/extensions/trigger-failure-extension.h"
|
2015-08-21 06:44:17 +00:00
|
|
|
#include "src/heap/heap.h"
|
2015-09-01 09:25:19 +00:00
|
|
|
#include "src/isolate-inl.h"
|
2015-03-27 15:28:55 +00:00
|
|
|
#include "src/snapshot/natives.h"
|
|
|
|
#include "src/snapshot/snapshot.h"
|
2014-08-06 11:39:39 +00:00
|
|
|
#include "third_party/fdlibm/fdlibm.h"
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2015-08-27 14:42:36 +00:00
|
|
|
#if defined(V8_WASM)
|
|
|
|
#include "src/wasm/wasm-js.h"
|
|
|
|
#endif
|
|
|
|
|
2009-05-25 10:05:56 +00:00
|
|
|
namespace v8 {
|
|
|
|
namespace internal {
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2013-02-15 09:27:10 +00:00
|
|
|
Bootstrapper::Bootstrapper(Isolate* isolate)
|
|
|
|
: isolate_(isolate),
|
|
|
|
nesting_(0),
|
2015-02-09 09:04:45 +00:00
|
|
|
extensions_cache_(Script::TYPE_EXTENSION) {}
|
2011-03-18 20:35:07 +00:00
|
|
|
|
2015-04-30 15:10:43 +00:00
|
|
|
template <class Source>
|
|
|
|
Handle<String> Bootstrapper::SourceLookup(int index) {
|
|
|
|
DCHECK(0 <= index && index < Source::GetBuiltinsCount());
|
2013-02-15 09:27:10 +00:00
|
|
|
Heap* heap = isolate_->heap();
|
2015-08-14 18:47:46 +00:00
|
|
|
if (Source::GetSourceCache(heap)->get(index)->IsUndefined()) {
|
2012-01-30 12:25:29 +00:00
|
|
|
// We can use external strings for the natives.
|
2015-04-30 15:10:43 +00:00
|
|
|
Vector<const char> source = Source::GetScriptSource(index);
|
2012-01-30 12:25:29 +00:00
|
|
|
NativesExternalStringResource* resource =
|
2015-02-09 09:04:45 +00:00
|
|
|
new NativesExternalStringResource(source.start(), source.length());
|
2014-03-25 09:09:24 +00:00
|
|
|
// We do not expect this to throw an exception. Change this if it does.
|
2014-09-10 12:38:12 +00:00
|
|
|
Handle<String> source_code = isolate_->factory()
|
|
|
|
->NewExternalStringFromOneByte(resource)
|
|
|
|
.ToHandleChecked();
|
2014-10-02 09:39:13 +00:00
|
|
|
// Mark this external string with a special map.
|
|
|
|
source_code->set_map(isolate_->heap()->native_source_string_map());
|
2015-08-14 18:47:46 +00:00
|
|
|
Source::GetSourceCache(heap)->set(index, *source_code);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
2015-08-14 18:47:46 +00:00
|
|
|
Handle<Object> cached_source(Source::GetSourceCache(heap)->get(index),
|
|
|
|
isolate_);
|
2008-07-03 15:10:15 +00:00
|
|
|
return Handle<String>::cast(cached_source);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-04-30 15:10:43 +00:00
|
|
|
template Handle<String> Bootstrapper::SourceLookup<Natives>(int index);
|
|
|
|
template Handle<String> Bootstrapper::SourceLookup<ExperimentalNatives>(
|
|
|
|
int index);
|
2015-08-20 00:01:07 +00:00
|
|
|
template Handle<String> Bootstrapper::SourceLookup<ExperimentalExtraNatives>(
|
|
|
|
int index);
|
2015-05-08 08:44:47 +00:00
|
|
|
template Handle<String> Bootstrapper::SourceLookup<ExtraNatives>(int index);
|
2015-07-13 09:45:43 +00:00
|
|
|
template Handle<String> Bootstrapper::SourceLookup<CodeStubNatives>(int index);
|
2015-04-30 15:10:43 +00:00
|
|
|
|
|
|
|
|
2008-07-03 15:10:15 +00:00
|
|
|
void Bootstrapper::Initialize(bool create_heap_objects) {
|
2013-09-11 08:39:38 +00:00
|
|
|
extensions_cache_.Initialize(isolate_, create_heap_objects);
|
2013-05-21 12:03:49 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-01-17 10:52:00 +00:00
|
|
|
static const char* GCFunctionName() {
|
|
|
|
bool flag_given = FLAG_expose_gc_as != NULL && strlen(FLAG_expose_gc_as) != 0;
|
|
|
|
return flag_given ? FLAG_expose_gc_as : "gc";
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
v8::Extension* Bootstrapper::free_buffer_extension_ = NULL;
|
|
|
|
v8::Extension* Bootstrapper::gc_extension_ = NULL;
|
|
|
|
v8::Extension* Bootstrapper::externalize_string_extension_ = NULL;
|
|
|
|
v8::Extension* Bootstrapper::statistics_extension_ = NULL;
|
|
|
|
v8::Extension* Bootstrapper::trigger_failure_extension_ = NULL;
|
|
|
|
|
|
|
|
|
2013-05-21 12:03:49 +00:00
|
|
|
void Bootstrapper::InitializeOncePerProcess() {
|
2014-01-17 10:52:00 +00:00
|
|
|
free_buffer_extension_ = new FreeBufferExtension;
|
|
|
|
v8::RegisterExtension(free_buffer_extension_);
|
|
|
|
gc_extension_ = new GCExtension(GCFunctionName());
|
|
|
|
v8::RegisterExtension(gc_extension_);
|
|
|
|
externalize_string_extension_ = new ExternalizeStringExtension;
|
|
|
|
v8::RegisterExtension(externalize_string_extension_);
|
|
|
|
statistics_extension_ = new StatisticsExtension;
|
|
|
|
v8::RegisterExtension(statistics_extension_);
|
|
|
|
trigger_failure_extension_ = new TriggerFailureExtension;
|
|
|
|
v8::RegisterExtension(trigger_failure_extension_);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Bootstrapper::TearDownExtensions() {
|
|
|
|
delete free_buffer_extension_;
|
2014-08-26 13:07:18 +00:00
|
|
|
free_buffer_extension_ = NULL;
|
2014-01-17 10:52:00 +00:00
|
|
|
delete gc_extension_;
|
2014-08-26 13:07:18 +00:00
|
|
|
gc_extension_ = NULL;
|
2014-01-17 10:52:00 +00:00
|
|
|
delete externalize_string_extension_;
|
2014-08-26 13:07:18 +00:00
|
|
|
externalize_string_extension_ = NULL;
|
2014-01-17 10:52:00 +00:00
|
|
|
delete statistics_extension_;
|
2014-08-26 13:07:18 +00:00
|
|
|
statistics_extension_ = NULL;
|
2014-01-17 10:52:00 +00:00
|
|
|
delete trigger_failure_extension_;
|
2014-08-26 13:07:18 +00:00
|
|
|
trigger_failure_extension_ = NULL;
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-04-30 15:10:43 +00:00
|
|
|
void DeleteNativeSources(Object* maybe_array) {
|
|
|
|
if (maybe_array->IsFixedArray()) {
|
|
|
|
FixedArray* array = FixedArray::cast(maybe_array);
|
|
|
|
for (int i = 0; i < array->length(); i++) {
|
|
|
|
Object* natives_source = array->get(i);
|
2015-02-09 09:04:45 +00:00
|
|
|
if (!natives_source->IsUndefined()) {
|
|
|
|
const NativesExternalStringResource* resource =
|
|
|
|
reinterpret_cast<const NativesExternalStringResource*>(
|
|
|
|
ExternalOneByteString::cast(natives_source)->resource());
|
|
|
|
delete resource;
|
|
|
|
}
|
2009-12-11 10:40:01 +00:00
|
|
|
}
|
|
|
|
}
|
2015-04-30 15:10:43 +00:00
|
|
|
}
|
2009-12-11 10:40:01 +00:00
|
|
|
|
2015-04-30 15:10:43 +00:00
|
|
|
|
|
|
|
void Bootstrapper::TearDown() {
|
2015-08-14 18:47:46 +00:00
|
|
|
DeleteNativeSources(Natives::GetSourceCache(isolate_->heap()));
|
|
|
|
DeleteNativeSources(ExperimentalNatives::GetSourceCache(isolate_->heap()));
|
|
|
|
DeleteNativeSources(ExtraNatives::GetSourceCache(isolate_->heap()));
|
2015-08-20 00:01:07 +00:00
|
|
|
DeleteNativeSources(
|
|
|
|
ExperimentalExtraNatives::GetSourceCache(isolate_->heap()));
|
2015-08-14 18:47:46 +00:00
|
|
|
DeleteNativeSources(CodeStubNatives::GetSourceCache(isolate_->heap()));
|
2015-08-20 00:01:07 +00:00
|
|
|
|
2013-09-11 08:39:38 +00:00
|
|
|
extensions_cache_.Initialize(isolate_, false); // Yes, symmetrical
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
class Genesis BASE_EMBEDDED {
|
|
|
|
public:
|
2015-07-06 07:09:07 +00:00
|
|
|
Genesis(Isolate* isolate, MaybeHandle<JSGlobalProxy> maybe_global_proxy,
|
|
|
|
v8::Local<v8::ObjectTemplate> global_proxy_template,
|
2015-07-13 09:45:43 +00:00
|
|
|
v8::ExtensionConfiguration* extensions, ContextType context_type);
|
2010-03-23 11:40:38 +00:00
|
|
|
~Genesis() { }
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2011-04-14 08:01:19 +00:00
|
|
|
Isolate* isolate() const { return isolate_; }
|
|
|
|
Factory* factory() const { return isolate_->factory(); }
|
|
|
|
Heap* heap() const { return isolate_->heap(); }
|
|
|
|
|
2013-03-18 17:36:47 +00:00
|
|
|
Handle<Context> result() { return result_; }
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2013-03-18 17:36:47 +00:00
|
|
|
private:
|
2012-08-17 09:03:08 +00:00
|
|
|
Handle<Context> native_context() { return native_context_; }
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2010-03-23 11:40:38 +00:00
|
|
|
// Creates some basic objects. Used for creating a context from scratch.
|
|
|
|
void CreateRoots();
|
|
|
|
// Creates the empty function. Used for creating a context from scratch.
|
2011-04-14 08:01:19 +00:00
|
|
|
Handle<JSFunction> CreateEmptyFunction(Isolate* isolate);
|
2011-03-17 20:28:17 +00:00
|
|
|
// Creates the ThrowTypeError function. ECMA 5th Ed. 13.2.3
|
2015-04-09 22:40:16 +00:00
|
|
|
Handle<JSFunction> GetRestrictedFunctionPropertiesThrower();
|
|
|
|
Handle<JSFunction> GetStrictArgumentsPoisonFunction();
|
2015-04-15 17:15:32 +00:00
|
|
|
Handle<JSFunction> GetThrowTypeErrorIntrinsic(Builtins::Name builtin_name);
|
2011-03-17 20:28:17 +00:00
|
|
|
|
|
|
|
void CreateStrictModeFunctionMaps(Handle<JSFunction> empty);
|
2015-02-25 14:52:36 +00:00
|
|
|
void CreateStrongModeFunctionMaps(Handle<JSFunction> empty);
|
2015-10-16 11:27:14 +00:00
|
|
|
void CreateIteratorMaps();
|
2012-02-20 08:42:18 +00:00
|
|
|
|
|
|
|
// Make the "arguments" and "caller" properties throw a TypeError on access.
|
2015-04-09 22:40:16 +00:00
|
|
|
void AddRestrictedFunctionProperties(Handle<Map> map);
|
2012-02-20 08:42:18 +00:00
|
|
|
|
2015-01-14 16:42:15 +00:00
|
|
|
// Creates the global objects using the global proxy and the template passed
|
|
|
|
// in through the API. We call this regardless of whether we are building a
|
2010-03-23 11:40:38 +00:00
|
|
|
// context from scratch or using a deserialized one from the partial snapshot
|
|
|
|
// but in the latter case we don't use the objects it produces directly, as
|
|
|
|
// we have to used the deserialized ones that are linked together with the
|
|
|
|
// rest of the context snapshot.
|
2015-11-02 14:57:59 +00:00
|
|
|
Handle<JSGlobalObject> CreateNewGlobals(
|
2015-07-06 07:09:07 +00:00
|
|
|
v8::Local<v8::ObjectTemplate> global_proxy_template,
|
2015-01-14 16:42:15 +00:00
|
|
|
Handle<JSGlobalProxy> global_proxy);
|
2010-03-23 11:40:38 +00:00
|
|
|
// Hooks the given global proxy into the context. If the context was created
|
|
|
|
// by deserialization then this will unhook the global proxy that was
|
|
|
|
// deserialized, leaving the GC to pick it up.
|
2015-11-02 14:57:59 +00:00
|
|
|
void HookUpGlobalProxy(Handle<JSGlobalObject> global_object,
|
2010-03-23 11:40:38 +00:00
|
|
|
Handle<JSGlobalProxy> global_proxy);
|
2014-07-01 12:12:34 +00:00
|
|
|
// Similarly, we want to use the global that has been created by the templates
|
|
|
|
// passed through the API. The global from the snapshot is detached from the
|
|
|
|
// other objects in the snapshot.
|
2015-11-02 14:57:59 +00:00
|
|
|
void HookUpGlobalObject(Handle<JSGlobalObject> global_object,
|
2015-01-13 08:48:00 +00:00
|
|
|
Handle<FixedArray> outdated_contexts);
|
2015-06-12 12:34:10 +00:00
|
|
|
// The native context has a ScriptContextTable that store declarative bindings
|
|
|
|
// made in script scopes. Add a "this" binding to that table pointing to the
|
|
|
|
// global proxy.
|
|
|
|
void InstallGlobalThisBinding();
|
|
|
|
void HookUpGlobalThisBinding(Handle<FixedArray> outdated_contexts);
|
2010-03-23 11:40:38 +00:00
|
|
|
// New context initialization. Used for creating a context from scratch.
|
2015-11-02 14:57:59 +00:00
|
|
|
void InitializeGlobal(Handle<JSGlobalObject> global_object,
|
2015-07-13 09:45:43 +00:00
|
|
|
Handle<JSFunction> empty_function,
|
|
|
|
ContextType context_type);
|
2014-09-19 07:36:05 +00:00
|
|
|
void InitializeExperimentalGlobal();
|
2015-10-16 11:27:14 +00:00
|
|
|
// Depending on the situation, expose and/or get rid of the utils object.
|
|
|
|
void ConfigureUtilsObject(ContextType context_type);
|
2014-10-20 13:33:34 +00:00
|
|
|
|
|
|
|
#define DECLARE_FEATURE_INITIALIZATION(id, descr) \
|
|
|
|
void InitializeGlobal_##id();
|
|
|
|
|
2014-11-04 16:05:27 +00:00
|
|
|
HARMONY_INPROGRESS(DECLARE_FEATURE_INITIALIZATION)
|
|
|
|
HARMONY_STAGED(DECLARE_FEATURE_INITIALIZATION)
|
|
|
|
HARMONY_SHIPPING(DECLARE_FEATURE_INITIALIZATION)
|
2014-10-20 13:33:34 +00:00
|
|
|
#undef DECLARE_FEATURE_INITIALIZATION
|
|
|
|
|
2015-05-12 14:00:47 +00:00
|
|
|
Handle<JSFunction> InstallInternalArray(Handle<JSObject> target,
|
2013-02-15 15:20:05 +00:00
|
|
|
const char* name,
|
|
|
|
ElementsKind elements_kind);
|
2015-07-13 09:45:43 +00:00
|
|
|
bool InstallNatives(ContextType context_type);
|
2013-04-16 14:16:30 +00:00
|
|
|
|
2015-07-28 09:29:34 +00:00
|
|
|
void InstallTypedArray(const char* name, ElementsKind elements_kind,
|
|
|
|
Handle<JSFunction>* fun);
|
2011-04-15 12:31:03 +00:00
|
|
|
bool InstallExperimentalNatives();
|
2015-05-08 08:44:47 +00:00
|
|
|
bool InstallExtraNatives();
|
2015-08-20 00:01:07 +00:00
|
|
|
bool InstallExperimentalExtraNatives();
|
2015-08-12 14:22:07 +00:00
|
|
|
bool InstallDebuggerNatives();
|
2010-12-14 18:53:48 +00:00
|
|
|
void InstallBuiltinFunctionIds();
|
2015-06-03 17:58:29 +00:00
|
|
|
void InstallExperimentalBuiltinFunctionIds();
|
2010-08-25 13:25:54 +00:00
|
|
|
void InitializeNormalizedMapCaches();
|
2011-11-15 23:26:22 +00:00
|
|
|
|
2011-11-15 22:48:55 +00:00
|
|
|
enum ExtensionTraversalState {
|
|
|
|
UNVISITED, VISITED, INSTALLED
|
|
|
|
};
|
|
|
|
|
|
|
|
class ExtensionStates {
|
2012-02-23 09:12:57 +00:00
|
|
|
public:
|
2011-11-15 22:48:55 +00:00
|
|
|
ExtensionStates();
|
|
|
|
ExtensionTraversalState get_state(RegisteredExtension* extension);
|
|
|
|
void set_state(RegisteredExtension* extension,
|
|
|
|
ExtensionTraversalState state);
|
2012-02-23 09:12:57 +00:00
|
|
|
private:
|
2011-11-15 22:48:55 +00:00
|
|
|
HashMap map_;
|
2011-11-15 23:26:22 +00:00
|
|
|
DISALLOW_COPY_AND_ASSIGN(ExtensionStates);
|
2011-11-15 22:48:55 +00:00
|
|
|
};
|
|
|
|
|
2010-03-23 11:40:38 +00:00
|
|
|
// Used both for deserialized and from-scratch contexts to add the extensions
|
|
|
|
// provided.
|
2012-08-17 09:03:08 +00:00
|
|
|
static bool InstallExtensions(Handle<Context> native_context,
|
2010-03-23 11:40:38 +00:00
|
|
|
v8::ExtensionConfiguration* extensions);
|
2014-01-16 13:18:28 +00:00
|
|
|
static bool InstallAutoExtensions(Isolate* isolate,
|
|
|
|
ExtensionStates* extension_states);
|
|
|
|
static bool InstallRequestedExtensions(Isolate* isolate,
|
|
|
|
v8::ExtensionConfiguration* extensions,
|
|
|
|
ExtensionStates* extension_states);
|
2013-02-15 09:27:10 +00:00
|
|
|
static bool InstallExtension(Isolate* isolate,
|
|
|
|
const char* name,
|
2011-11-15 22:48:55 +00:00
|
|
|
ExtensionStates* extension_states);
|
2013-02-15 09:27:10 +00:00
|
|
|
static bool InstallExtension(Isolate* isolate,
|
|
|
|
v8::RegisteredExtension* current,
|
2011-11-15 22:48:55 +00:00
|
|
|
ExtensionStates* extension_states);
|
2014-01-16 13:18:28 +00:00
|
|
|
static bool InstallSpecialObjects(Handle<Context> native_context);
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
bool ConfigureApiObject(Handle<JSObject> object,
|
|
|
|
Handle<ObjectTemplateInfo> object_template);
|
2014-07-01 12:12:34 +00:00
|
|
|
bool ConfigureGlobalObjects(
|
2015-07-06 07:09:07 +00:00
|
|
|
v8::Local<v8::ObjectTemplate> global_proxy_template);
|
2008-07-03 15:10:15 +00:00
|
|
|
|
|
|
|
// Migrates all properties from the 'from' object to the 'to'
|
|
|
|
// object and overrides the prototype in 'to' with the one from
|
|
|
|
// 'from'.
|
|
|
|
void TransferObject(Handle<JSObject> from, Handle<JSObject> to);
|
|
|
|
void TransferNamedProperties(Handle<JSObject> from, Handle<JSObject> to);
|
|
|
|
void TransferIndexedProperties(Handle<JSObject> from, Handle<JSObject> to);
|
|
|
|
|
2014-06-13 12:19:04 +00:00
|
|
|
enum FunctionMode {
|
|
|
|
// With prototype.
|
|
|
|
FUNCTION_WITH_WRITEABLE_PROTOTYPE,
|
|
|
|
FUNCTION_WITH_READONLY_PROTOTYPE,
|
|
|
|
// Without prototype.
|
|
|
|
FUNCTION_WITHOUT_PROTOTYPE,
|
|
|
|
BOUND_FUNCTION
|
2010-04-28 12:05:40 +00:00
|
|
|
};
|
2011-03-17 20:28:17 +00:00
|
|
|
|
2014-06-13 12:19:04 +00:00
|
|
|
static bool IsFunctionModeWithPrototype(FunctionMode function_mode) {
|
|
|
|
return (function_mode == FUNCTION_WITH_WRITEABLE_PROTOTYPE ||
|
|
|
|
function_mode == FUNCTION_WITH_READONLY_PROTOTYPE);
|
|
|
|
}
|
|
|
|
|
2015-02-25 14:52:36 +00:00
|
|
|
Handle<Map> CreateSloppyFunctionMap(FunctionMode function_mode);
|
2011-03-17 20:28:17 +00:00
|
|
|
|
2012-07-18 15:38:58 +00:00
|
|
|
void SetFunctionInstanceDescriptor(Handle<Map> map,
|
2014-06-13 12:19:04 +00:00
|
|
|
FunctionMode function_mode);
|
2008-07-03 15:10:15 +00:00
|
|
|
void MakeFunctionInstancePrototypeWritable();
|
|
|
|
|
2015-02-25 14:52:36 +00:00
|
|
|
Handle<Map> CreateStrictFunctionMap(FunctionMode function_mode,
|
|
|
|
Handle<JSFunction> empty_function);
|
|
|
|
Handle<Map> CreateStrongFunctionMap(Handle<JSFunction> empty_function,
|
|
|
|
bool is_constructor);
|
|
|
|
|
2011-03-17 20:28:17 +00:00
|
|
|
|
2012-07-18 15:38:58 +00:00
|
|
|
void SetStrictFunctionInstanceDescriptor(Handle<Map> map,
|
2014-06-13 12:19:04 +00:00
|
|
|
FunctionMode function_mode);
|
2015-02-25 14:52:36 +00:00
|
|
|
void SetStrongFunctionInstanceDescriptor(Handle<Map> map);
|
2011-03-17 20:28:17 +00:00
|
|
|
|
2015-05-21 06:15:33 +00:00
|
|
|
static bool CallUtilsFunction(Isolate* isolate, const char* name);
|
|
|
|
|
2015-05-12 14:00:47 +00:00
|
|
|
static bool CompileExtension(Isolate* isolate, v8::Extension* extension);
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2013-03-18 17:36:47 +00:00
|
|
|
Isolate* isolate_;
|
2008-07-03 15:10:15 +00:00
|
|
|
Handle<Context> result_;
|
2013-03-18 17:36:47 +00:00
|
|
|
Handle<Context> native_context_;
|
2011-03-17 20:28:17 +00:00
|
|
|
|
2013-05-10 12:59:20 +00:00
|
|
|
// Function maps. Function maps are created initially with a read only
|
|
|
|
// prototype for the processing of JS builtins. Later the function maps are
|
|
|
|
// replaced in order to make prototype writable. These are the final, writable
|
|
|
|
// prototype, maps.
|
2014-03-11 14:41:22 +00:00
|
|
|
Handle<Map> sloppy_function_map_writable_prototype_;
|
|
|
|
Handle<Map> strict_function_map_writable_prototype_;
|
2015-04-15 17:15:32 +00:00
|
|
|
Handle<JSFunction> strict_poison_function_;
|
|
|
|
Handle<JSFunction> restricted_function_properties_thrower_;
|
2011-03-17 20:28:17 +00:00
|
|
|
|
2010-03-23 11:40:38 +00:00
|
|
|
BootstrapperActive active_;
|
|
|
|
friend class Bootstrapper;
|
2008-07-03 15:10:15 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
void Bootstrapper::Iterate(ObjectVisitor* v) {
|
2011-03-18 20:35:07 +00:00
|
|
|
extensions_cache_.Iterate(v);
|
2011-12-06 17:41:47 +00:00
|
|
|
v->Synchronize(VisitorSynchronization::kExtensions);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Handle<Context> Bootstrapper::CreateEnvironment(
|
2014-07-01 12:12:34 +00:00
|
|
|
MaybeHandle<JSGlobalProxy> maybe_global_proxy,
|
2015-07-06 07:09:07 +00:00
|
|
|
v8::Local<v8::ObjectTemplate> global_proxy_template,
|
2015-07-13 09:45:43 +00:00
|
|
|
v8::ExtensionConfiguration* extensions, ContextType context_type) {
|
2013-02-15 09:27:10 +00:00
|
|
|
HandleScope scope(isolate_);
|
2015-07-13 09:45:43 +00:00
|
|
|
Genesis genesis(isolate_, maybe_global_proxy, global_proxy_template,
|
|
|
|
extensions, context_type);
|
2013-04-10 09:34:37 +00:00
|
|
|
Handle<Context> env = genesis.result();
|
2015-07-13 09:45:43 +00:00
|
|
|
if (env.is_null() ||
|
2015-08-12 14:22:07 +00:00
|
|
|
(context_type != THIN_CONTEXT && !InstallExtensions(env, extensions))) {
|
2013-04-10 09:34:37 +00:00
|
|
|
return Handle<Context>();
|
2010-03-23 11:40:38 +00:00
|
|
|
}
|
2013-04-10 09:34:37 +00:00
|
|
|
return scope.CloseAndEscape(env);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-13 09:45:43 +00:00
|
|
|
bool Bootstrapper::CreateCodeStubContext(Isolate* isolate) {
|
|
|
|
HandleScope scope(isolate);
|
|
|
|
SaveContext save_context(isolate);
|
|
|
|
BootstrapperActive active(this);
|
|
|
|
|
|
|
|
v8::ExtensionConfiguration no_extensions;
|
|
|
|
Handle<Context> native_context = CreateEnvironment(
|
|
|
|
MaybeHandle<JSGlobalProxy>(), v8::Local<v8::ObjectTemplate>(),
|
|
|
|
&no_extensions, THIN_CONTEXT);
|
2015-08-27 12:30:03 +00:00
|
|
|
isolate->heap()->SetRootCodeStubContext(*native_context);
|
2015-07-13 09:45:43 +00:00
|
|
|
isolate->set_context(*native_context);
|
|
|
|
Handle<JSObject> code_stub_exports =
|
|
|
|
isolate->factory()->NewJSObject(isolate->object_function());
|
|
|
|
JSObject::NormalizeProperties(code_stub_exports, CLEAR_INOBJECT_PROPERTIES, 2,
|
|
|
|
"container to export to extra natives");
|
2015-08-27 12:30:03 +00:00
|
|
|
isolate->heap()->SetRootCodeStubExportsObject(*code_stub_exports);
|
2015-07-13 09:45:43 +00:00
|
|
|
return InstallCodeStubNatives(isolate);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
static void SetObjectPrototype(Handle<JSObject> object, Handle<Object> proto) {
|
|
|
|
// object.__proto__ = proto;
|
2014-06-24 14:53:48 +00:00
|
|
|
Handle<Map> old_map = Handle<Map>(object->map());
|
2014-11-07 16:03:11 +00:00
|
|
|
Handle<Map> new_map = Map::Copy(old_map, "SetObjectPrototype");
|
2015-04-10 12:13:18 +00:00
|
|
|
Map::SetPrototype(new_map, proto, FAST_PROTOTYPE);
|
2014-06-24 14:53:48 +00:00
|
|
|
JSObject::MigrateToMap(object, new_map);
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Bootstrapper::DetachGlobal(Handle<Context> env) {
|
2011-04-14 08:01:19 +00:00
|
|
|
Factory* factory = env->GetIsolate()->factory();
|
2012-08-28 11:25:08 +00:00
|
|
|
Handle<JSGlobalProxy> global_proxy(JSGlobalProxy::cast(env->global_proxy()));
|
|
|
|
global_proxy->set_native_context(*factory->null_value());
|
|
|
|
SetObjectPrototype(global_proxy, factory->null_value());
|
2015-02-24 20:50:06 +00:00
|
|
|
global_proxy->map()->SetConstructor(*factory->null_value());
|
2015-02-05 09:35:47 +00:00
|
|
|
if (FLAG_track_detached_contexts) {
|
|
|
|
env->GetIsolate()->AddDetachedContext(env);
|
|
|
|
}
|
2010-03-24 13:24:46 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-08-31 12:52:59 +00:00
|
|
|
namespace {
|
|
|
|
|
|
|
|
Handle<JSFunction> InstallFunction(Handle<JSObject> target, Handle<Name> name,
|
|
|
|
InstanceType type, int instance_size,
|
|
|
|
MaybeHandle<JSObject> maybe_prototype,
|
|
|
|
Builtins::Name call,
|
|
|
|
PropertyAttributes attributes,
|
|
|
|
bool strict_function_map = false) {
|
2011-04-14 08:01:19 +00:00
|
|
|
Isolate* isolate = target->GetIsolate();
|
2011-03-28 13:09:37 +00:00
|
|
|
Factory* factory = isolate->factory();
|
2015-08-31 12:52:59 +00:00
|
|
|
Handle<String> name_string = Name::ToFunctionName(name).ToHandleChecked();
|
2011-03-28 13:09:37 +00:00
|
|
|
Handle<Code> call_code = Handle<Code>(isolate->builtins()->builtin(call));
|
2015-08-31 10:09:52 +00:00
|
|
|
Handle<JSObject> prototype;
|
2015-04-09 22:40:16 +00:00
|
|
|
static const bool kReadOnlyPrototype = false;
|
|
|
|
static const bool kInstallConstructor = false;
|
2015-08-31 10:09:52 +00:00
|
|
|
Handle<JSFunction> function =
|
|
|
|
maybe_prototype.ToHandle(&prototype)
|
2015-08-31 12:52:59 +00:00
|
|
|
? factory->NewFunction(name_string, call_code, prototype, type,
|
2015-08-31 10:09:52 +00:00
|
|
|
instance_size, kReadOnlyPrototype,
|
|
|
|
kInstallConstructor, strict_function_map)
|
2015-08-31 12:52:59 +00:00
|
|
|
: factory->NewFunctionWithoutPrototype(name_string, call_code,
|
2015-08-31 10:09:52 +00:00
|
|
|
strict_function_map);
|
2015-08-31 12:52:59 +00:00
|
|
|
JSObject::AddProperty(target, name, function, attributes);
|
|
|
|
if (target->IsJSGlobalObject()) {
|
|
|
|
function->shared()->set_instance_class_name(*name_string);
|
|
|
|
}
|
|
|
|
function->shared()->set_native(true);
|
|
|
|
return function;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Handle<JSFunction> InstallFunction(Handle<JSObject> target, const char* name,
|
|
|
|
InstanceType type, int instance_size,
|
|
|
|
MaybeHandle<JSObject> maybe_prototype,
|
|
|
|
Builtins::Name call,
|
|
|
|
bool strict_function_map = false) {
|
|
|
|
Factory* const factory = target->GetIsolate()->factory();
|
2015-11-02 13:04:20 +00:00
|
|
|
PropertyAttributes attributes = DONT_ENUM;
|
2015-08-31 12:52:59 +00:00
|
|
|
return InstallFunction(target, factory->InternalizeUtf8String(name), type,
|
|
|
|
instance_size, maybe_prototype, call, attributes,
|
|
|
|
strict_function_map);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
2015-08-31 12:52:59 +00:00
|
|
|
} // namespace
|
|
|
|
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2015-04-09 22:40:16 +00:00
|
|
|
void Genesis::SetFunctionInstanceDescriptor(Handle<Map> map,
|
|
|
|
FunctionMode function_mode) {
|
2014-06-13 12:19:04 +00:00
|
|
|
int size = IsFunctionModeWithPrototype(function_mode) ? 5 : 4;
|
2014-04-11 12:13:53 +00:00
|
|
|
Map::EnsureDescriptorSlack(map, size);
|
2012-07-23 16:18:25 +00:00
|
|
|
|
2015-03-04 16:56:55 +00:00
|
|
|
PropertyAttributes ro_attribs =
|
|
|
|
static_cast<PropertyAttributes>(DONT_ENUM | DONT_DELETE | READ_ONLY);
|
|
|
|
PropertyAttributes roc_attribs =
|
|
|
|
static_cast<PropertyAttributes>(DONT_ENUM | READ_ONLY);
|
2011-10-21 10:32:38 +00:00
|
|
|
|
2014-04-24 11:24:13 +00:00
|
|
|
Handle<AccessorInfo> length =
|
2015-03-13 17:19:40 +00:00
|
|
|
Accessors::FunctionLengthInfo(isolate(), roc_attribs);
|
2011-03-17 20:28:17 +00:00
|
|
|
{ // Add length.
|
2015-01-19 17:49:13 +00:00
|
|
|
AccessorConstantDescriptor d(Handle<Name>(Name::cast(length->name())),
|
2015-03-13 17:19:40 +00:00
|
|
|
length, roc_attribs);
|
2014-04-11 12:13:53 +00:00
|
|
|
map->AppendDescriptor(&d);
|
2011-03-17 20:28:17 +00:00
|
|
|
}
|
2014-04-28 08:26:35 +00:00
|
|
|
Handle<AccessorInfo> name =
|
2015-03-04 16:56:55 +00:00
|
|
|
Accessors::FunctionNameInfo(isolate(), ro_attribs);
|
2011-03-17 20:28:17 +00:00
|
|
|
{ // Add name.
|
2015-01-19 17:49:13 +00:00
|
|
|
AccessorConstantDescriptor d(Handle<Name>(Name::cast(name->name())), name,
|
2015-03-04 16:56:55 +00:00
|
|
|
roc_attribs);
|
2014-04-11 12:13:53 +00:00
|
|
|
map->AppendDescriptor(&d);
|
2011-03-17 20:28:17 +00:00
|
|
|
}
|
2014-04-28 12:02:11 +00:00
|
|
|
Handle<AccessorInfo> args =
|
2015-03-04 16:56:55 +00:00
|
|
|
Accessors::FunctionArgumentsInfo(isolate(), ro_attribs);
|
2011-03-17 20:28:17 +00:00
|
|
|
{ // Add arguments.
|
2015-01-19 17:49:13 +00:00
|
|
|
AccessorConstantDescriptor d(Handle<Name>(Name::cast(args->name())), args,
|
2015-03-04 16:56:55 +00:00
|
|
|
ro_attribs);
|
2014-04-11 12:13:53 +00:00
|
|
|
map->AppendDescriptor(&d);
|
2011-03-17 20:28:17 +00:00
|
|
|
}
|
2014-04-28 13:41:12 +00:00
|
|
|
Handle<AccessorInfo> caller =
|
2015-03-04 16:56:55 +00:00
|
|
|
Accessors::FunctionCallerInfo(isolate(), ro_attribs);
|
2011-03-17 20:28:17 +00:00
|
|
|
{ // Add caller.
|
2015-01-19 17:49:13 +00:00
|
|
|
AccessorConstantDescriptor d(Handle<Name>(Name::cast(caller->name())),
|
2015-03-04 16:56:55 +00:00
|
|
|
caller, ro_attribs);
|
2014-04-11 12:13:53 +00:00
|
|
|
map->AppendDescriptor(&d);
|
2011-03-17 20:28:17 +00:00
|
|
|
}
|
2014-06-13 12:19:04 +00:00
|
|
|
if (IsFunctionModeWithPrototype(function_mode)) {
|
|
|
|
if (function_mode == FUNCTION_WITH_WRITEABLE_PROTOTYPE) {
|
2015-03-04 16:56:55 +00:00
|
|
|
ro_attribs = static_cast<PropertyAttributes>(ro_attribs & ~READ_ONLY);
|
2014-02-07 15:29:18 +00:00
|
|
|
}
|
2014-04-24 08:35:53 +00:00
|
|
|
Handle<AccessorInfo> prototype =
|
2015-03-04 16:56:55 +00:00
|
|
|
Accessors::FunctionPrototypeInfo(isolate(), ro_attribs);
|
2015-01-19 17:49:13 +00:00
|
|
|
AccessorConstantDescriptor d(Handle<Name>(Name::cast(prototype->name())),
|
2015-03-04 16:56:55 +00:00
|
|
|
prototype, ro_attribs);
|
2014-04-11 12:13:53 +00:00
|
|
|
map->AppendDescriptor(&d);
|
2010-04-28 12:05:40 +00:00
|
|
|
}
|
2011-03-17 20:28:17 +00:00
|
|
|
}
|
2008-07-03 15:10:15 +00:00
|
|
|
|
|
|
|
|
2015-02-25 14:52:36 +00:00
|
|
|
Handle<Map> Genesis::CreateSloppyFunctionMap(FunctionMode function_mode) {
|
2011-04-14 08:01:19 +00:00
|
|
|
Handle<Map> map = factory()->NewMap(JS_FUNCTION_TYPE, JSFunction::kSize);
|
2014-06-13 12:19:04 +00:00
|
|
|
SetFunctionInstanceDescriptor(map, function_mode);
|
2015-09-24 06:50:01 +00:00
|
|
|
map->set_is_constructor(IsFunctionModeWithPrototype(function_mode));
|
2015-09-03 06:01:12 +00:00
|
|
|
map->set_is_callable();
|
2011-03-17 20:28:17 +00:00
|
|
|
return map;
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-04-14 08:01:19 +00:00
|
|
|
Handle<JSFunction> Genesis::CreateEmptyFunction(Isolate* isolate) {
|
2011-03-17 20:28:17 +00:00
|
|
|
// Allocate the map for function instances. Maps are allocated first and their
|
|
|
|
// prototypes patched later, once empty function is created.
|
|
|
|
|
2010-04-28 12:05:40 +00:00
|
|
|
// Functions with this map will not have a 'prototype' property, and
|
|
|
|
// can not be used as constructors.
|
2011-03-30 10:46:55 +00:00
|
|
|
Handle<Map> function_without_prototype_map =
|
2015-02-25 14:52:36 +00:00
|
|
|
CreateSloppyFunctionMap(FUNCTION_WITHOUT_PROTOTYPE);
|
2014-03-11 14:41:22 +00:00
|
|
|
native_context()->set_sloppy_function_without_prototype_map(
|
2011-03-30 10:46:55 +00:00
|
|
|
*function_without_prototype_map);
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2011-03-17 20:28:17 +00:00
|
|
|
// Allocate the function map. This map is temporary, used only for processing
|
|
|
|
// of builtins.
|
|
|
|
// Later the map is replaced with writable prototype map, allocated below.
|
2014-06-13 12:19:04 +00:00
|
|
|
Handle<Map> function_map =
|
2015-02-25 14:52:36 +00:00
|
|
|
CreateSloppyFunctionMap(FUNCTION_WITH_READONLY_PROTOTYPE);
|
2014-03-11 14:41:22 +00:00
|
|
|
native_context()->set_sloppy_function_map(*function_map);
|
2014-05-09 17:59:15 +00:00
|
|
|
native_context()->set_sloppy_function_with_readonly_prototype_map(
|
|
|
|
*function_map);
|
2011-03-17 20:28:17 +00:00
|
|
|
|
|
|
|
// The final map for functions. Writeable prototype.
|
|
|
|
// This map is installed in MakeFunctionInstancePrototypeWritable.
|
2014-03-11 14:41:22 +00:00
|
|
|
sloppy_function_map_writable_prototype_ =
|
2015-02-25 14:52:36 +00:00
|
|
|
CreateSloppyFunctionMap(FUNCTION_WITH_WRITEABLE_PROTOTYPE);
|
2011-03-28 13:09:37 +00:00
|
|
|
Factory* factory = isolate->factory();
|
|
|
|
|
2013-05-13 10:59:00 +00:00
|
|
|
Handle<String> object_name = factory->Object_string();
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2014-12-15 19:57:37 +00:00
|
|
|
Handle<JSObject> object_function_prototype;
|
|
|
|
|
2008-07-03 15:10:15 +00:00
|
|
|
{ // --- O b j e c t ---
|
2014-05-09 16:39:33 +00:00
|
|
|
Handle<JSFunction> object_fun = factory->NewFunction(object_name);
|
2014-09-19 13:40:38 +00:00
|
|
|
int unused = JSObject::kInitialGlobalObjectUnusedPropertiesCount;
|
|
|
|
int instance_size = JSObject::kHeaderSize + kPointerSize * unused;
|
2008-07-03 15:10:15 +00:00
|
|
|
Handle<Map> object_function_map =
|
2014-09-19 13:40:38 +00:00
|
|
|
factory->NewMap(JS_OBJECT_TYPE, instance_size);
|
2015-08-11 19:36:04 +00:00
|
|
|
object_function_map->SetInObjectProperties(unused);
|
2014-08-11 14:00:58 +00:00
|
|
|
JSFunction::SetInitialMap(object_fun, object_function_map,
|
|
|
|
isolate->factory()->null_value());
|
2014-09-19 13:40:38 +00:00
|
|
|
object_function_map->set_unused_property_fields(unused);
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_object_function(*object_fun);
|
2008-07-03 15:10:15 +00:00
|
|
|
|
|
|
|
// Allocate a new prototype for the object function.
|
2014-12-15 19:57:37 +00:00
|
|
|
object_function_prototype =
|
|
|
|
factory->NewJSObject(isolate->object_function(), TENURED);
|
|
|
|
Handle<Map> map = Map::Copy(handle(object_function_prototype->map()),
|
|
|
|
"EmptyObjectPrototype");
|
2014-08-11 14:00:58 +00:00
|
|
|
map->set_is_prototype_map(true);
|
2014-12-15 19:57:37 +00:00
|
|
|
object_function_prototype->set_map(*map);
|
2013-04-04 12:10:23 +00:00
|
|
|
|
2014-12-15 19:57:37 +00:00
|
|
|
native_context()->set_initial_object_prototype(*object_function_prototype);
|
2013-05-13 07:35:26 +00:00
|
|
|
// For bootstrapping set the array prototype to be the same as the object
|
|
|
|
// prototype, otherwise the missing initial_array_prototype will cause
|
|
|
|
// assertions during startup.
|
2014-12-15 19:57:37 +00:00
|
|
|
native_context()->set_initial_array_prototype(*object_function_prototype);
|
|
|
|
Accessors::FunctionSetPrototype(object_fun, object_function_prototype)
|
|
|
|
.Assert();
|
2015-05-22 10:51:49 +00:00
|
|
|
|
|
|
|
// Allocate initial strong object map.
|
|
|
|
Handle<Map> strong_object_map =
|
2015-05-27 13:55:02 +00:00
|
|
|
Map::Copy(Handle<Map>(object_fun->initial_map()), "EmptyStrongObject");
|
2015-05-22 10:51:49 +00:00
|
|
|
strong_object_map->set_is_strong();
|
|
|
|
native_context()->set_js_object_strong_map(*strong_object_map);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
2015-04-23 00:29:40 +00:00
|
|
|
// Allocate the empty function as the prototype for function - ES6 19.2.3
|
2014-04-17 11:57:32 +00:00
|
|
|
Handle<Code> code(isolate->builtins()->builtin(Builtins::kEmptyFunction));
|
2015-04-23 00:29:40 +00:00
|
|
|
Handle<JSFunction> empty_function =
|
|
|
|
factory->NewFunctionWithoutPrototype(factory->empty_string(), code);
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2014-08-11 14:00:58 +00:00
|
|
|
// Allocate the function map first and then patch the prototype later
|
|
|
|
Handle<Map> empty_function_map =
|
2015-02-25 14:52:36 +00:00
|
|
|
CreateSloppyFunctionMap(FUNCTION_WITHOUT_PROTOTYPE);
|
2014-08-11 14:00:58 +00:00
|
|
|
DCHECK(!empty_function_map->is_dictionary_map());
|
2015-04-10 12:13:18 +00:00
|
|
|
Map::SetPrototype(empty_function_map, object_function_prototype);
|
2014-08-11 14:00:58 +00:00
|
|
|
empty_function_map->set_is_prototype_map(true);
|
2015-04-09 22:40:16 +00:00
|
|
|
|
2014-08-11 14:00:58 +00:00
|
|
|
empty_function->set_map(*empty_function_map);
|
|
|
|
|
2010-03-23 11:40:38 +00:00
|
|
|
// --- E m p t y ---
|
2014-09-10 12:38:12 +00:00
|
|
|
Handle<String> source = factory->NewStringFromStaticChars("() {}");
|
2011-03-28 13:09:37 +00:00
|
|
|
Handle<Script> script = factory->NewScript(source);
|
2015-09-28 13:10:13 +00:00
|
|
|
script->set_type(Script::TYPE_NATIVE);
|
2010-03-23 11:40:38 +00:00
|
|
|
empty_function->shared()->set_start_position(0);
|
|
|
|
empty_function->shared()->set_end_position(source->length());
|
|
|
|
empty_function->shared()->DontAdaptArguments();
|
2015-06-25 12:19:55 +00:00
|
|
|
SharedFunctionInfo::SetScript(handle(empty_function->shared()), script);
|
2011-03-17 20:28:17 +00:00
|
|
|
|
|
|
|
// Set prototypes for the function maps.
|
2015-04-10 12:13:18 +00:00
|
|
|
Handle<Map> sloppy_function_map(native_context()->sloppy_function_map(),
|
|
|
|
isolate);
|
|
|
|
Handle<Map> sloppy_function_without_prototype_map(
|
|
|
|
native_context()->sloppy_function_without_prototype_map(), isolate);
|
|
|
|
Map::SetPrototype(sloppy_function_map, empty_function);
|
|
|
|
Map::SetPrototype(sloppy_function_without_prototype_map, empty_function);
|
|
|
|
Map::SetPrototype(sloppy_function_map_writable_prototype_, empty_function);
|
2015-04-09 22:40:16 +00:00
|
|
|
|
|
|
|
// ES6 draft 03-17-2015, section 8.2.2 step 12
|
|
|
|
AddRestrictedFunctionProperties(empty_function_map);
|
|
|
|
|
2010-03-23 11:40:38 +00:00
|
|
|
return empty_function;
|
|
|
|
}
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
|
|
|
|
|
2015-04-09 22:40:16 +00:00
|
|
|
void Genesis::SetStrictFunctionInstanceDescriptor(Handle<Map> map,
|
|
|
|
FunctionMode function_mode) {
|
2014-06-13 12:19:04 +00:00
|
|
|
int size = IsFunctionModeWithPrototype(function_mode) ? 5 : 4;
|
2014-04-11 12:13:53 +00:00
|
|
|
Map::EnsureDescriptorSlack(map, size);
|
2012-07-23 16:18:25 +00:00
|
|
|
|
2013-06-18 07:51:50 +00:00
|
|
|
PropertyAttributes rw_attribs =
|
|
|
|
static_cast<PropertyAttributes>(DONT_ENUM | DONT_DELETE);
|
|
|
|
PropertyAttributes ro_attribs =
|
|
|
|
static_cast<PropertyAttributes>(DONT_ENUM | DONT_DELETE | READ_ONLY);
|
2015-03-04 16:56:55 +00:00
|
|
|
PropertyAttributes roc_attribs =
|
|
|
|
static_cast<PropertyAttributes>(DONT_ENUM | READ_ONLY);
|
2011-10-21 10:32:38 +00:00
|
|
|
|
2014-06-13 12:19:04 +00:00
|
|
|
if (function_mode == BOUND_FUNCTION) {
|
2015-07-15 15:56:19 +00:00
|
|
|
{ // Add length.
|
|
|
|
Handle<String> length_string = isolate()->factory()->length_string();
|
|
|
|
DataDescriptor d(length_string, 0, roc_attribs, Representation::Tagged());
|
|
|
|
map->AppendDescriptor(&d);
|
|
|
|
}
|
|
|
|
{ // Add name.
|
|
|
|
Handle<String> name_string = isolate()->factory()->name_string();
|
|
|
|
DataDescriptor d(name_string, 1, roc_attribs, Representation::Tagged());
|
|
|
|
map->AppendDescriptor(&d);
|
|
|
|
}
|
2014-06-13 12:19:04 +00:00
|
|
|
} else {
|
2014-08-04 11:34:54 +00:00
|
|
|
DCHECK(function_mode == FUNCTION_WITH_WRITEABLE_PROTOTYPE ||
|
2014-06-13 12:19:04 +00:00
|
|
|
function_mode == FUNCTION_WITH_READONLY_PROTOTYPE ||
|
|
|
|
function_mode == FUNCTION_WITHOUT_PROTOTYPE);
|
2015-07-15 15:56:19 +00:00
|
|
|
{ // Add length.
|
|
|
|
Handle<AccessorInfo> length =
|
|
|
|
Accessors::FunctionLengthInfo(isolate(), roc_attribs);
|
|
|
|
AccessorConstantDescriptor d(Handle<Name>(Name::cast(length->name())),
|
|
|
|
length, roc_attribs);
|
|
|
|
map->AppendDescriptor(&d);
|
|
|
|
}
|
|
|
|
{ // Add name.
|
|
|
|
Handle<AccessorInfo> name =
|
|
|
|
Accessors::FunctionNameInfo(isolate(), roc_attribs);
|
|
|
|
AccessorConstantDescriptor d(Handle<Name>(Name::cast(name->name())), name,
|
|
|
|
roc_attribs);
|
|
|
|
map->AppendDescriptor(&d);
|
|
|
|
}
|
2011-03-17 20:28:17 +00:00
|
|
|
}
|
2014-06-13 12:19:04 +00:00
|
|
|
if (IsFunctionModeWithPrototype(function_mode)) {
|
2012-02-20 08:42:18 +00:00
|
|
|
// Add prototype.
|
2013-06-18 07:51:50 +00:00
|
|
|
PropertyAttributes attribs =
|
2014-06-13 12:19:04 +00:00
|
|
|
function_mode == FUNCTION_WITH_WRITEABLE_PROTOTYPE ? rw_attribs
|
|
|
|
: ro_attribs;
|
2014-04-24 08:35:53 +00:00
|
|
|
Handle<AccessorInfo> prototype =
|
|
|
|
Accessors::FunctionPrototypeInfo(isolate(), attribs);
|
2015-01-19 17:49:13 +00:00
|
|
|
AccessorConstantDescriptor d(Handle<Name>(Name::cast(prototype->name())),
|
|
|
|
prototype, attribs);
|
2014-04-11 12:13:53 +00:00
|
|
|
map->AppendDescriptor(&d);
|
2011-03-17 20:28:17 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-02-25 14:52:36 +00:00
|
|
|
void Genesis::SetStrongFunctionInstanceDescriptor(Handle<Map> map) {
|
|
|
|
Map::EnsureDescriptorSlack(map, 2);
|
|
|
|
|
|
|
|
PropertyAttributes ro_attribs =
|
|
|
|
static_cast<PropertyAttributes>(DONT_ENUM | DONT_DELETE | READ_ONLY);
|
|
|
|
|
|
|
|
Handle<AccessorInfo> length =
|
|
|
|
Accessors::FunctionLengthInfo(isolate(), ro_attribs);
|
|
|
|
{ // Add length.
|
|
|
|
AccessorConstantDescriptor d(Handle<Name>(Name::cast(length->name())),
|
|
|
|
length, ro_attribs);
|
|
|
|
map->AppendDescriptor(&d);
|
|
|
|
}
|
|
|
|
Handle<AccessorInfo> name =
|
|
|
|
Accessors::FunctionNameInfo(isolate(), ro_attribs);
|
|
|
|
{ // Add name.
|
|
|
|
AccessorConstantDescriptor d(Handle<Name>(Name::cast(name->name())), name,
|
|
|
|
ro_attribs);
|
|
|
|
map->AppendDescriptor(&d);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-04-15 17:15:32 +00:00
|
|
|
// Creates the %ThrowTypeError% function.
|
|
|
|
Handle<JSFunction> Genesis::GetThrowTypeErrorIntrinsic(
|
|
|
|
Builtins::Name builtin_name) {
|
|
|
|
Handle<String> name =
|
|
|
|
factory()->InternalizeOneByteString(STATIC_CHAR_VECTOR("ThrowTypeError"));
|
|
|
|
Handle<Code> code(isolate()->builtins()->builtin(builtin_name));
|
|
|
|
Handle<JSFunction> function =
|
|
|
|
factory()->NewFunctionWithoutPrototype(name, code);
|
|
|
|
function->set_map(native_context()->sloppy_function_map());
|
|
|
|
function->shared()->DontAdaptArguments();
|
|
|
|
|
|
|
|
// %ThrowTypeError% must not have a name property.
|
|
|
|
JSReceiver::DeleteProperty(function, factory()->name_string()).Assert();
|
|
|
|
|
|
|
|
// length needs to be non configurable.
|
|
|
|
Handle<Object> value(Smi::FromInt(function->shared()->length()), isolate());
|
|
|
|
JSObject::SetOwnPropertyIgnoreAttributes(
|
|
|
|
function, factory()->length_string(), value,
|
|
|
|
static_cast<PropertyAttributes>(DONT_ENUM | DONT_DELETE | READ_ONLY))
|
|
|
|
.Assert();
|
|
|
|
|
2015-10-23 09:39:37 +00:00
|
|
|
if (JSObject::PreventExtensions(function, Object::THROW_ON_ERROR).IsNothing())
|
2015-10-21 09:23:33 +00:00
|
|
|
DCHECK(false);
|
2015-04-15 17:15:32 +00:00
|
|
|
|
|
|
|
return function;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-03-17 20:28:17 +00:00
|
|
|
// ECMAScript 5th Edition, 13.2.3
|
2015-04-09 22:40:16 +00:00
|
|
|
Handle<JSFunction> Genesis::GetRestrictedFunctionPropertiesThrower() {
|
2015-04-15 17:15:32 +00:00
|
|
|
if (restricted_function_properties_thrower_.is_null()) {
|
|
|
|
restricted_function_properties_thrower_ = GetThrowTypeErrorIntrinsic(
|
|
|
|
Builtins::kRestrictedFunctionPropertiesThrower);
|
2014-05-19 10:47:00 +00:00
|
|
|
}
|
2015-04-15 17:15:32 +00:00
|
|
|
return restricted_function_properties_thrower_;
|
2014-05-19 10:47:00 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-04-09 22:40:16 +00:00
|
|
|
Handle<JSFunction> Genesis::GetStrictArgumentsPoisonFunction() {
|
2015-04-15 17:15:32 +00:00
|
|
|
if (strict_poison_function_.is_null()) {
|
|
|
|
strict_poison_function_ = GetThrowTypeErrorIntrinsic(
|
|
|
|
Builtins::kRestrictedStrictArgumentsPropertiesThrower);
|
2011-05-24 11:07:06 +00:00
|
|
|
}
|
2015-04-15 17:15:32 +00:00
|
|
|
return strict_poison_function_;
|
2011-03-17 20:28:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-03-11 14:41:22 +00:00
|
|
|
Handle<Map> Genesis::CreateStrictFunctionMap(
|
2015-04-09 22:40:16 +00:00
|
|
|
FunctionMode function_mode, Handle<JSFunction> empty_function) {
|
2011-04-14 08:01:19 +00:00
|
|
|
Handle<Map> map = factory()->NewMap(JS_FUNCTION_TYPE, JSFunction::kSize);
|
2014-06-13 12:19:04 +00:00
|
|
|
SetStrictFunctionInstanceDescriptor(map, function_mode);
|
2015-09-24 06:50:01 +00:00
|
|
|
map->set_is_constructor(IsFunctionModeWithPrototype(function_mode));
|
2015-09-03 06:01:12 +00:00
|
|
|
map->set_is_callable();
|
2015-04-10 12:13:18 +00:00
|
|
|
Map::SetPrototype(map, empty_function);
|
2011-03-17 20:28:17 +00:00
|
|
|
return map;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-02-25 14:52:36 +00:00
|
|
|
Handle<Map> Genesis::CreateStrongFunctionMap(
|
|
|
|
Handle<JSFunction> empty_function, bool is_constructor) {
|
|
|
|
Handle<Map> map = factory()->NewMap(JS_FUNCTION_TYPE, JSFunction::kSize);
|
|
|
|
SetStrongFunctionInstanceDescriptor(map);
|
2015-09-24 06:50:01 +00:00
|
|
|
map->set_is_constructor(is_constructor);
|
2015-04-10 12:13:18 +00:00
|
|
|
Map::SetPrototype(map, empty_function);
|
2015-09-03 06:01:12 +00:00
|
|
|
map->set_is_callable();
|
2015-02-25 14:52:36 +00:00
|
|
|
map->set_is_extensible(is_constructor);
|
2015-05-22 10:51:49 +00:00
|
|
|
map->set_is_strong();
|
2015-02-25 14:52:36 +00:00
|
|
|
return map;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-03-17 20:28:17 +00:00
|
|
|
void Genesis::CreateStrictModeFunctionMaps(Handle<JSFunction> empty) {
|
|
|
|
// Allocate map for the prototype-less strict mode instances.
|
2014-03-11 14:41:22 +00:00
|
|
|
Handle<Map> strict_function_without_prototype_map =
|
2014-06-13 12:19:04 +00:00
|
|
|
CreateStrictFunctionMap(FUNCTION_WITHOUT_PROTOTYPE, empty);
|
2014-03-11 14:41:22 +00:00
|
|
|
native_context()->set_strict_function_without_prototype_map(
|
|
|
|
*strict_function_without_prototype_map);
|
2011-03-17 20:28:17 +00:00
|
|
|
|
|
|
|
// Allocate map for the strict mode functions. This map is temporary, used
|
|
|
|
// only for processing of builtins.
|
|
|
|
// Later the map is replaced with writable prototype map, allocated below.
|
2014-03-11 14:41:22 +00:00
|
|
|
Handle<Map> strict_function_map =
|
2014-06-13 12:19:04 +00:00
|
|
|
CreateStrictFunctionMap(FUNCTION_WITH_READONLY_PROTOTYPE, empty);
|
2014-03-11 14:41:22 +00:00
|
|
|
native_context()->set_strict_function_map(*strict_function_map);
|
2011-03-17 20:28:17 +00:00
|
|
|
|
|
|
|
// The final map for the strict mode functions. Writeable prototype.
|
|
|
|
// This map is installed in MakeFunctionInstancePrototypeWritable.
|
2014-03-11 14:41:22 +00:00
|
|
|
strict_function_map_writable_prototype_ =
|
2014-06-13 12:19:04 +00:00
|
|
|
CreateStrictFunctionMap(FUNCTION_WITH_WRITEABLE_PROTOTYPE, empty);
|
2015-04-09 22:40:16 +00:00
|
|
|
|
2015-10-02 16:51:20 +00:00
|
|
|
// Special map for non-constructor bound functions.
|
|
|
|
// TODO(bmeurer): Bound functions should not be represented as JSFunctions.
|
|
|
|
Handle<Map> bound_function_without_constructor_map =
|
2014-06-13 12:19:04 +00:00
|
|
|
CreateStrictFunctionMap(BOUND_FUNCTION, empty);
|
2015-10-02 16:51:20 +00:00
|
|
|
native_context()->set_bound_function_without_constructor_map(
|
|
|
|
*bound_function_without_constructor_map);
|
|
|
|
|
|
|
|
// Special map for constructor bound functions.
|
|
|
|
// TODO(bmeurer): Bound functions should not be represented as JSFunctions.
|
|
|
|
Handle<Map> bound_function_with_constructor_map =
|
|
|
|
Map::Copy(bound_function_without_constructor_map, "IsConstructor");
|
|
|
|
bound_function_with_constructor_map->set_is_constructor(true);
|
|
|
|
native_context()->set_bound_function_with_constructor_map(
|
|
|
|
*bound_function_with_constructor_map);
|
2012-02-20 08:42:18 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-02-25 14:52:36 +00:00
|
|
|
void Genesis::CreateStrongModeFunctionMaps(Handle<JSFunction> empty) {
|
|
|
|
// Allocate map for strong mode instances, which never have prototypes.
|
|
|
|
Handle<Map> strong_function_map = CreateStrongFunctionMap(empty, false);
|
|
|
|
native_context()->set_strong_function_map(*strong_function_map);
|
|
|
|
// Constructors do, though.
|
|
|
|
Handle<Map> strong_constructor_map = CreateStrongFunctionMap(empty, true);
|
|
|
|
native_context()->set_strong_constructor_map(*strong_constructor_map);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-10-16 11:27:14 +00:00
|
|
|
void Genesis::CreateIteratorMaps() {
|
|
|
|
// Create iterator-related meta-objects.
|
|
|
|
Handle<JSObject> iterator_prototype =
|
|
|
|
factory()->NewJSObject(isolate()->object_function(), TENURED);
|
|
|
|
Handle<JSObject> generator_object_prototype =
|
|
|
|
factory()->NewJSObject(isolate()->object_function(), TENURED);
|
|
|
|
Handle<JSObject> generator_function_prototype =
|
|
|
|
factory()->NewJSObject(isolate()->object_function(), TENURED);
|
|
|
|
SetObjectPrototype(generator_object_prototype, iterator_prototype);
|
|
|
|
|
|
|
|
JSObject::AddProperty(generator_function_prototype,
|
|
|
|
factory()->InternalizeUtf8String("prototype"),
|
|
|
|
generator_object_prototype,
|
|
|
|
static_cast<PropertyAttributes>(DONT_ENUM | READ_ONLY));
|
|
|
|
|
|
|
|
// Create maps for generator functions and their prototypes. Store those
|
|
|
|
// maps in the native context. The "prototype" property descriptor is
|
|
|
|
// writable, non-enumerable, and non-configurable (as per ES6 draft
|
|
|
|
// 04-14-15, section 25.2.4.3).
|
|
|
|
Handle<Map> strict_function_map(strict_function_map_writable_prototype_);
|
|
|
|
// Generator functions do not have "caller" or "arguments" accessors.
|
|
|
|
Handle<Map> sloppy_generator_function_map =
|
|
|
|
Map::Copy(strict_function_map, "SloppyGeneratorFunction");
|
|
|
|
Map::SetPrototype(sloppy_generator_function_map,
|
|
|
|
generator_function_prototype);
|
|
|
|
native_context()->set_sloppy_generator_function_map(
|
|
|
|
*sloppy_generator_function_map);
|
|
|
|
|
|
|
|
Handle<Map> strict_generator_function_map =
|
|
|
|
Map::Copy(strict_function_map, "StrictGeneratorFunction");
|
|
|
|
Map::SetPrototype(strict_generator_function_map,
|
|
|
|
generator_function_prototype);
|
|
|
|
native_context()->set_strict_generator_function_map(
|
|
|
|
*strict_generator_function_map);
|
|
|
|
|
|
|
|
Handle<Map> strong_function_map(native_context()->strong_function_map());
|
|
|
|
Handle<Map> strong_generator_function_map =
|
|
|
|
Map::Copy(strong_function_map, "StrongGeneratorFunction");
|
|
|
|
Map::SetPrototype(strong_generator_function_map,
|
|
|
|
generator_function_prototype);
|
|
|
|
native_context()->set_strong_generator_function_map(
|
|
|
|
*strong_generator_function_map);
|
|
|
|
|
|
|
|
Handle<JSFunction> object_function(native_context()->object_function());
|
|
|
|
Handle<Map> generator_object_prototype_map = Map::Create(isolate(), 0);
|
|
|
|
Map::SetPrototype(generator_object_prototype_map, generator_object_prototype);
|
|
|
|
native_context()->set_generator_object_prototype_map(
|
|
|
|
*generator_object_prototype_map);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-05-19 10:47:00 +00:00
|
|
|
static void ReplaceAccessors(Handle<Map> map,
|
|
|
|
Handle<String> name,
|
|
|
|
PropertyAttributes attributes,
|
|
|
|
Handle<AccessorPair> accessor_pair) {
|
|
|
|
DescriptorArray* descriptors = map->instance_descriptors();
|
|
|
|
int idx = descriptors->SearchWithCache(*name, *map);
|
2015-01-19 17:49:13 +00:00
|
|
|
AccessorConstantDescriptor descriptor(name, accessor_pair, attributes);
|
2014-05-19 10:47:00 +00:00
|
|
|
descriptors->Replace(idx, &descriptor);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-04-09 22:40:16 +00:00
|
|
|
void Genesis::AddRestrictedFunctionProperties(Handle<Map> map) {
|
|
|
|
PropertyAttributes rw_attribs = static_cast<PropertyAttributes>(DONT_ENUM);
|
|
|
|
Handle<JSFunction> thrower = GetRestrictedFunctionPropertiesThrower();
|
|
|
|
Handle<AccessorPair> accessors = factory()->NewAccessorPair();
|
|
|
|
accessors->set_getter(*thrower);
|
|
|
|
accessors->set_setter(*thrower);
|
|
|
|
|
|
|
|
ReplaceAccessors(map, factory()->arguments_string(), rw_attribs, accessors);
|
|
|
|
ReplaceAccessors(map, factory()->caller_string(), rw_attribs, accessors);
|
2011-03-17 20:28:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-08-17 09:03:08 +00:00
|
|
|
static void AddToWeakNativeContextList(Context* context) {
|
2014-08-04 11:34:54 +00:00
|
|
|
DCHECK(context->IsNativeContext());
|
2011-04-14 08:01:19 +00:00
|
|
|
Heap* heap = context->GetIsolate()->heap();
|
2010-12-07 11:31:57 +00:00
|
|
|
#ifdef DEBUG
|
|
|
|
{ // NOLINT
|
2014-08-04 11:34:54 +00:00
|
|
|
DCHECK(context->get(Context::NEXT_CONTEXT_LINK)->IsUndefined());
|
2010-12-07 11:31:57 +00:00
|
|
|
// Check that context is not in the list yet.
|
2012-08-17 09:03:08 +00:00
|
|
|
for (Object* current = heap->native_contexts_list();
|
2010-12-07 11:31:57 +00:00
|
|
|
!current->IsUndefined();
|
|
|
|
current = Context::cast(current)->get(Context::NEXT_CONTEXT_LINK)) {
|
2014-08-04 11:34:54 +00:00
|
|
|
DCHECK(current != context);
|
2010-12-07 11:31:57 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
2015-05-27 14:13:04 +00:00
|
|
|
context->set(Context::NEXT_CONTEXT_LINK, heap->native_contexts_list(),
|
|
|
|
UPDATE_WEAK_WRITE_BARRIER);
|
2012-08-17 09:03:08 +00:00
|
|
|
heap->set_native_contexts_list(context);
|
2010-12-07 11:31:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-03-23 11:40:38 +00:00
|
|
|
void Genesis::CreateRoots() {
|
2012-08-17 09:03:08 +00:00
|
|
|
// Allocate the native context FixedArray first and then patch the
|
2010-03-23 11:40:38 +00:00
|
|
|
// closure and extension object later (we need the empty function
|
|
|
|
// and the global object, but in order to create those, we need the
|
2012-08-17 09:03:08 +00:00
|
|
|
// native context).
|
2013-03-18 17:36:47 +00:00
|
|
|
native_context_ = factory()->NewNativeContext();
|
|
|
|
AddToWeakNativeContextList(*native_context());
|
2012-08-17 09:03:08 +00:00
|
|
|
isolate()->set_context(*native_context());
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2010-03-23 11:40:38 +00:00
|
|
|
// Allocate the message listeners object.
|
|
|
|
{
|
2014-01-08 14:44:30 +00:00
|
|
|
v8::NeanderArray listeners(isolate());
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_message_listeners(*listeners.value());
|
2010-03-23 11:40:38 +00:00
|
|
|
}
|
|
|
|
}
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
|
|
|
|
|
2015-06-12 12:34:10 +00:00
|
|
|
void Genesis::InstallGlobalThisBinding() {
|
|
|
|
Handle<ScriptContextTable> script_contexts(
|
|
|
|
native_context()->script_context_table());
|
|
|
|
Handle<ScopeInfo> scope_info = ScopeInfo::CreateGlobalThisBinding(isolate());
|
|
|
|
Handle<JSFunction> closure(native_context()->closure());
|
|
|
|
Handle<Context> context = factory()->NewScriptContext(closure, scope_info);
|
|
|
|
|
|
|
|
// Go ahead and hook it up while we're at it.
|
|
|
|
int slot = scope_info->ReceiverContextSlotIndex();
|
|
|
|
DCHECK_EQ(slot, Context::MIN_CONTEXT_SLOTS);
|
|
|
|
context->set(slot, native_context()->global_proxy());
|
|
|
|
|
|
|
|
Handle<ScriptContextTable> new_script_contexts =
|
|
|
|
ScriptContextTable::Extend(script_contexts, context);
|
|
|
|
native_context()->set_script_context_table(*new_script_contexts);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Genesis::HookUpGlobalThisBinding(Handle<FixedArray> outdated_contexts) {
|
|
|
|
// One of these contexts should be the one that declares the global "this"
|
|
|
|
// binding.
|
|
|
|
for (int i = 0; i < outdated_contexts->length(); ++i) {
|
|
|
|
Context* context = Context::cast(outdated_contexts->get(i));
|
|
|
|
if (context->IsScriptContext()) {
|
[es6] Parameter scopes for sloppy eval
This CL is a nightmare! For the utterly irrelevant edge case of a sloppy function with non-simple parameters and a call to direct eval, like here,
let x = 1;
function f(g = () => x) {
var y
eval("var x = 2")
return g() + x // f() = 3
}
we have to do all of the following, on top of the declaration block ("varblock") contexts we already introduce around the body:
- Introduce the ability for varblock contexts to have both a ScopeInfo and an extension object (e.g., the body varblock in the example will contain both a static var y and a dynamic var x). No other scope needs that. Since there are no context slots left, a special new struct is introduced that pairs up scope info and extension object.
- When declaring lookup slots in the runtime, this new struct is allocated in the case where an extension object has to be added to a block scope (at which point the block's extension slot still contains a plain ScopeInfo).
- While at it, introduce some abstraction to access context extension slots in a more controlled manner, in order to keep special-casing to a minimum.
- Make sure that even empty varblock contexts do not get optimised away when they contain a sloppy eval, so that they can host the potential extension object.
- Extend dynamic search for declaration contexts (used by sloppy direct eval) to recognize varblock contexts.
- In the parser, if a function has a sloppy direct eval, introduce an additional varblock scope around each non-simple (desugared) parameter, as required by the spec to contain possible dynamic var bindings.
- In the pattern rewriter, add the ability to hoist the named variables the pattern declares to an outer scope. That is required because the actual destructuring has to be evaluated inside the protecting varblock scope, but the bindings that the desugaring introduces are in the outer scope.
- ScopeInfos need to save the information whether a block is a varblock, to make sloppy eval calls work correctly that deserialise them as part of the scope chain.
- Add the ability to materialize block scopes with extension objects in the debugger. Likewise, enable setting extension variables in block scopes via the debugger interface.
- While at it, refactor and unify some respective code in the debugger.
Sorry, this CL is large. I could try to split it up, but everything is rather entangled.
@mstarzinger: Please review the changes to contexts.
@yangguo: Please have a look at the debugger stuff.
R=littledan@chromium.org, mstarzinger@chromium.org, yangguo@chromium.org
BUG=v8:811,v8:2160
LOG=N
Review URL: https://codereview.chromium.org/1292753007
Cr-Commit-Position: refs/heads/master@{#30295}
2015-08-21 10:58:35 +00:00
|
|
|
ScopeInfo* scope_info = context->scope_info();
|
2015-06-12 12:34:10 +00:00
|
|
|
int slot = scope_info->ReceiverContextSlotIndex();
|
|
|
|
if (slot >= 0) {
|
|
|
|
DCHECK_EQ(slot, Context::MIN_CONTEXT_SLOTS);
|
|
|
|
context->set(slot, native_context()->global_proxy());
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-11-02 14:57:59 +00:00
|
|
|
Handle<JSGlobalObject> Genesis::CreateNewGlobals(
|
2015-07-06 07:09:07 +00:00
|
|
|
v8::Local<v8::ObjectTemplate> global_proxy_template,
|
2015-01-14 16:42:15 +00:00
|
|
|
Handle<JSGlobalProxy> global_proxy) {
|
2014-07-01 12:12:34 +00:00
|
|
|
// The argument global_proxy_template aka data is an ObjectTemplateInfo.
|
2010-03-23 11:40:38 +00:00
|
|
|
// It has a constructor pointer that points at global_constructor which is a
|
|
|
|
// FunctionTemplateInfo.
|
2015-01-14 16:42:15 +00:00
|
|
|
// The global_proxy_constructor is used to (re)initialize the
|
2014-07-01 12:12:34 +00:00
|
|
|
// global_proxy. The global_proxy_constructor also has a prototype_template
|
|
|
|
// pointer that points at js_global_object_template which is an
|
|
|
|
// ObjectTemplateInfo.
|
2010-03-23 11:40:38 +00:00
|
|
|
// That in turn has a constructor pointer that points at
|
2014-07-01 12:12:34 +00:00
|
|
|
// js_global_object_constructor which is a FunctionTemplateInfo.
|
|
|
|
// js_global_object_constructor is used to make js_global_object_function
|
|
|
|
// js_global_object_function is used to make the new global_object.
|
2010-03-23 11:40:38 +00:00
|
|
|
//
|
|
|
|
// --- G l o b a l ---
|
2014-07-01 12:12:34 +00:00
|
|
|
// Step 1: Create a fresh JSGlobalObject.
|
|
|
|
Handle<JSFunction> js_global_object_function;
|
|
|
|
Handle<ObjectTemplateInfo> js_global_object_template;
|
|
|
|
if (!global_proxy_template.IsEmpty()) {
|
|
|
|
// Get prototype template of the global_proxy_template.
|
2010-03-23 11:40:38 +00:00
|
|
|
Handle<ObjectTemplateInfo> data =
|
2014-07-01 12:12:34 +00:00
|
|
|
v8::Utils::OpenHandle(*global_proxy_template);
|
2010-03-23 11:40:38 +00:00
|
|
|
Handle<FunctionTemplateInfo> global_constructor =
|
|
|
|
Handle<FunctionTemplateInfo>(
|
|
|
|
FunctionTemplateInfo::cast(data->constructor()));
|
2013-02-25 14:46:09 +00:00
|
|
|
Handle<Object> proto_template(global_constructor->prototype_template(),
|
|
|
|
isolate());
|
2010-03-23 11:40:38 +00:00
|
|
|
if (!proto_template->IsUndefined()) {
|
2014-07-01 12:12:34 +00:00
|
|
|
js_global_object_template =
|
2010-03-23 11:40:38 +00:00
|
|
|
Handle<ObjectTemplateInfo>::cast(proto_template);
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
}
|
2010-03-23 11:40:38 +00:00
|
|
|
}
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2014-07-01 12:12:34 +00:00
|
|
|
if (js_global_object_template.is_null()) {
|
2013-02-28 17:03:34 +00:00
|
|
|
Handle<String> name = Handle<String>(heap()->empty_string());
|
2011-04-14 08:01:19 +00:00
|
|
|
Handle<Code> code = Handle<Code>(isolate()->builtins()->builtin(
|
2011-03-23 13:40:07 +00:00
|
|
|
Builtins::kIllegal));
|
2014-07-07 13:12:29 +00:00
|
|
|
Handle<JSObject> prototype =
|
2014-07-07 13:27:37 +00:00
|
|
|
factory()->NewFunctionPrototype(isolate()->object_function());
|
|
|
|
js_global_object_function = factory()->NewFunction(
|
|
|
|
name, code, prototype, JS_GLOBAL_OBJECT_TYPE, JSGlobalObject::kSize);
|
|
|
|
#ifdef DEBUG
|
|
|
|
LookupIterator it(prototype, factory()->constructor_string(),
|
2014-09-03 14:05:55 +00:00
|
|
|
LookupIterator::OWN_SKIP_INTERCEPTOR);
|
2014-07-07 13:27:37 +00:00
|
|
|
Handle<Object> value = JSReceiver::GetProperty(&it).ToHandleChecked();
|
2014-08-04 11:34:54 +00:00
|
|
|
DCHECK(it.IsFound());
|
|
|
|
DCHECK_EQ(*isolate()->object_function(), *value);
|
2014-07-07 13:27:37 +00:00
|
|
|
#endif
|
2010-03-23 11:40:38 +00:00
|
|
|
} else {
|
2014-07-01 12:12:34 +00:00
|
|
|
Handle<FunctionTemplateInfo> js_global_object_constructor(
|
|
|
|
FunctionTemplateInfo::cast(js_global_object_template->constructor()));
|
2015-02-04 13:01:34 +00:00
|
|
|
js_global_object_function = ApiNatives::CreateApiFunction(
|
|
|
|
isolate(), js_global_object_constructor, factory()->the_hole_value(),
|
|
|
|
ApiNatives::GlobalObjectType);
|
2010-03-23 11:40:38 +00:00
|
|
|
}
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2015-04-07 10:42:45 +00:00
|
|
|
js_global_object_function->initial_map()->set_is_prototype_map(true);
|
2014-07-01 12:12:34 +00:00
|
|
|
js_global_object_function->initial_map()->set_is_hidden_prototype();
|
|
|
|
js_global_object_function->initial_map()->set_dictionary_map(true);
|
2015-11-02 14:57:59 +00:00
|
|
|
Handle<JSGlobalObject> global_object =
|
|
|
|
factory()->NewJSGlobalObject(js_global_object_function);
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2015-01-14 16:42:15 +00:00
|
|
|
// Step 2: (re)initialize the global proxy object.
|
2010-03-23 11:40:38 +00:00
|
|
|
Handle<JSFunction> global_proxy_function;
|
2014-07-01 12:12:34 +00:00
|
|
|
if (global_proxy_template.IsEmpty()) {
|
2013-02-28 17:03:34 +00:00
|
|
|
Handle<String> name = Handle<String>(heap()->empty_string());
|
2011-04-14 08:01:19 +00:00
|
|
|
Handle<Code> code = Handle<Code>(isolate()->builtins()->builtin(
|
2011-03-23 13:40:07 +00:00
|
|
|
Builtins::kIllegal));
|
2014-05-09 16:42:57 +00:00
|
|
|
global_proxy_function = factory()->NewFunction(
|
2014-05-09 17:39:54 +00:00
|
|
|
name, code, JS_GLOBAL_PROXY_TYPE, JSGlobalProxy::kSize);
|
2010-03-23 11:40:38 +00:00
|
|
|
} else {
|
|
|
|
Handle<ObjectTemplateInfo> data =
|
2014-07-01 12:12:34 +00:00
|
|
|
v8::Utils::OpenHandle(*global_proxy_template);
|
2010-03-23 11:40:38 +00:00
|
|
|
Handle<FunctionTemplateInfo> global_constructor(
|
|
|
|
FunctionTemplateInfo::cast(data->constructor()));
|
2015-02-04 13:01:34 +00:00
|
|
|
global_proxy_function = ApiNatives::CreateApiFunction(
|
|
|
|
isolate(), global_constructor, factory()->the_hole_value(),
|
|
|
|
ApiNatives::GlobalProxyType);
|
2010-03-23 11:40:38 +00:00
|
|
|
}
|
|
|
|
|
2014-08-18 07:54:19 +00:00
|
|
|
Handle<String> global_name = factory()->global_string();
|
2010-03-23 11:40:38 +00:00
|
|
|
global_proxy_function->shared()->set_instance_class_name(*global_name);
|
|
|
|
global_proxy_function->initial_map()->set_is_access_check_needed(true);
|
|
|
|
|
|
|
|
// Set global_proxy.__proto__ to js_global after ConfigureGlobalObjects
|
|
|
|
// Return the global proxy.
|
|
|
|
|
2015-01-14 16:42:15 +00:00
|
|
|
factory()->ReinitializeJSGlobalProxy(global_proxy, global_proxy_function);
|
|
|
|
return global_object;
|
2010-03-23 11:40:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-11-02 14:57:59 +00:00
|
|
|
void Genesis::HookUpGlobalProxy(Handle<JSGlobalObject> global_object,
|
2010-03-23 11:40:38 +00:00
|
|
|
Handle<JSGlobalProxy> global_proxy) {
|
2012-08-17 09:03:08 +00:00
|
|
|
// Set the native context for the global object.
|
2014-07-01 12:12:34 +00:00
|
|
|
global_object->set_native_context(*native_context());
|
|
|
|
global_object->set_global_proxy(*global_proxy);
|
2012-08-20 11:35:50 +00:00
|
|
|
global_proxy->set_native_context(*native_context());
|
2015-01-14 16:42:15 +00:00
|
|
|
// If we deserialized the context, the global proxy is already
|
|
|
|
// correctly set up. Otherwise it's undefined.
|
|
|
|
DCHECK(native_context()->get(Context::GLOBAL_PROXY_INDEX)->IsUndefined() ||
|
|
|
|
native_context()->global_proxy() == *global_proxy);
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_global_proxy(*global_proxy);
|
2010-03-23 11:40:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-11-02 14:57:59 +00:00
|
|
|
void Genesis::HookUpGlobalObject(Handle<JSGlobalObject> global_object,
|
2015-01-13 08:48:00 +00:00
|
|
|
Handle<FixedArray> outdated_contexts) {
|
2015-11-02 14:57:59 +00:00
|
|
|
Handle<JSGlobalObject> global_object_from_snapshot(
|
|
|
|
JSGlobalObject::cast(native_context()->extension()));
|
2014-07-01 12:12:34 +00:00
|
|
|
native_context()->set_extension(*global_object);
|
|
|
|
native_context()->set_security_token(*global_object);
|
2015-01-13 08:48:00 +00:00
|
|
|
|
|
|
|
// Replace outdated global objects in deserialized contexts.
|
|
|
|
for (int i = 0; i < outdated_contexts->length(); ++i) {
|
|
|
|
Context* context = Context::cast(outdated_contexts->get(i));
|
2015-04-20 09:57:15 +00:00
|
|
|
// Assert that there is only one native context.
|
|
|
|
DCHECK(!context->IsNativeContext() || context == *native_context());
|
2015-01-13 08:48:00 +00:00
|
|
|
DCHECK_EQ(context->global_object(), *global_object_from_snapshot);
|
|
|
|
context->set_global_object(*global_object);
|
|
|
|
}
|
|
|
|
|
2014-07-01 12:12:34 +00:00
|
|
|
TransferNamedProperties(global_object_from_snapshot, global_object);
|
|
|
|
TransferIndexedProperties(global_object_from_snapshot, global_object);
|
2010-03-23 11:40:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// This is only called if we are not using snapshots. The equivalent
|
2014-07-01 12:12:34 +00:00
|
|
|
// work in the snapshot case is done in HookUpGlobalObject.
|
2015-11-02 14:57:59 +00:00
|
|
|
void Genesis::InitializeGlobal(Handle<JSGlobalObject> global_object,
|
2015-07-13 09:45:43 +00:00
|
|
|
Handle<JSFunction> empty_function,
|
|
|
|
ContextType context_type) {
|
2013-10-14 13:25:36 +00:00
|
|
|
// --- N a t i v e C o n t e x t ---
|
2010-03-23 11:40:38 +00:00
|
|
|
// Use the empty function as closure (no scope info).
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_closure(*empty_function);
|
|
|
|
native_context()->set_previous(NULL);
|
2010-03-23 11:40:38 +00:00
|
|
|
// Set extension and global object.
|
2014-07-01 12:12:34 +00:00
|
|
|
native_context()->set_extension(*global_object);
|
|
|
|
native_context()->set_global_object(*global_object);
|
|
|
|
// Security setup: Set the security token of the native context to the global
|
|
|
|
// object. This makes the security check between two different contexts fail
|
|
|
|
// by default even in case of global object reinitialization.
|
|
|
|
native_context()->set_security_token(*global_object);
|
|
|
|
|
|
|
|
Isolate* isolate = global_object->GetIsolate();
|
2011-03-28 13:09:37 +00:00
|
|
|
Factory* factory = isolate->factory();
|
|
|
|
|
2014-11-12 11:34:09 +00:00
|
|
|
Handle<ScriptContextTable> script_context_table =
|
|
|
|
factory->NewScriptContextTable();
|
|
|
|
native_context()->set_script_context_table(*script_context_table);
|
2015-06-12 12:34:10 +00:00
|
|
|
InstallGlobalThisBinding();
|
2014-11-07 16:29:13 +00:00
|
|
|
|
2013-05-13 10:59:00 +00:00
|
|
|
Handle<String> object_name = factory->Object_string();
|
2014-06-30 13:48:57 +00:00
|
|
|
JSObject::AddProperty(
|
2014-07-01 12:12:34 +00:00
|
|
|
global_object, object_name, isolate->object_function(), DONT_ENUM);
|
2010-03-23 11:40:38 +00:00
|
|
|
|
2014-05-09 17:21:51 +00:00
|
|
|
Handle<JSObject> global(native_context()->global_object());
|
2008-07-03 15:10:15 +00:00
|
|
|
|
|
|
|
// Install global Function object
|
2015-09-03 06:01:12 +00:00
|
|
|
Handle<JSFunction> function_function =
|
|
|
|
InstallFunction(global, "Function", JS_FUNCTION_TYPE, JSFunction::kSize,
|
|
|
|
empty_function, Builtins::kIllegal);
|
|
|
|
function_function->initial_map()->set_is_callable();
|
2015-11-03 16:42:21 +00:00
|
|
|
function_function->initial_map()->set_is_constructor(true);
|
2008-07-03 15:10:15 +00:00
|
|
|
|
|
|
|
{ // --- A r r a y ---
|
2015-08-31 10:09:52 +00:00
|
|
|
Handle<JSFunction> array_function =
|
|
|
|
InstallFunction(global, "Array", JS_ARRAY_TYPE, JSArray::kSize,
|
|
|
|
isolate->initial_object_prototype(),
|
|
|
|
Builtins::kArrayCode);
|
2008-09-16 10:12:32 +00:00
|
|
|
array_function->shared()->DontAdaptArguments();
|
2013-06-19 09:25:24 +00:00
|
|
|
array_function->shared()->set_function_data(Smi::FromInt(kArrayCode));
|
2008-07-03 15:10:15 +00:00
|
|
|
|
|
|
|
// This seems a bit hackish, but we need to make sure Array.length
|
|
|
|
// is 1.
|
|
|
|
array_function->shared()->set_length(1);
|
2012-07-18 14:00:58 +00:00
|
|
|
|
2012-08-13 08:43:16 +00:00
|
|
|
Handle<Map> initial_map(array_function->initial_map());
|
2013-06-28 13:16:14 +00:00
|
|
|
|
|
|
|
// This assert protects an optimization in
|
|
|
|
// HGraphBuilder::JSArrayBuilder::EmitMapCode()
|
2014-08-04 11:34:54 +00:00
|
|
|
DCHECK(initial_map->elements_kind() == GetInitialFastElementsKind());
|
2014-04-11 12:13:53 +00:00
|
|
|
Map::EnsureDescriptorSlack(initial_map, 1);
|
2012-07-23 16:18:25 +00:00
|
|
|
|
2012-07-18 14:00:58 +00:00
|
|
|
PropertyAttributes attribs = static_cast<PropertyAttributes>(
|
|
|
|
DONT_ENUM | DONT_DELETE);
|
|
|
|
|
2014-04-28 14:59:29 +00:00
|
|
|
Handle<AccessorInfo> array_length =
|
|
|
|
Accessors::ArrayLengthInfo(isolate, attribs);
|
2012-07-18 14:00:58 +00:00
|
|
|
{ // Add length.
|
2015-01-19 17:49:13 +00:00
|
|
|
AccessorConstantDescriptor d(
|
|
|
|
Handle<Name>(Name::cast(array_length->name())), array_length,
|
|
|
|
attribs);
|
2014-11-11 10:24:52 +00:00
|
|
|
initial_map->AppendDescriptor(&d);
|
2012-07-18 14:00:58 +00:00
|
|
|
}
|
2008-07-03 15:10:15 +00:00
|
|
|
|
|
|
|
// array_function is used internally. JS code creating array object should
|
|
|
|
// search for the 'Array' property on the global object and use that one
|
|
|
|
// as the constructor. 'Array' property on a global object can be
|
|
|
|
// overwritten by JS code.
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_array_function(*array_function);
|
2013-04-25 16:00:32 +00:00
|
|
|
|
2013-06-25 16:31:07 +00:00
|
|
|
// Cache the array maps, needed by ArrayConstructorStub
|
|
|
|
CacheInitialJSArrayMaps(native_context(), initial_map);
|
|
|
|
ArrayConstructorStub array_constructor_stub(isolate);
|
2014-04-24 12:07:40 +00:00
|
|
|
Handle<Code> code = array_constructor_stub.GetCode();
|
2013-06-25 16:31:07 +00:00
|
|
|
array_function->shared()->set_construct_stub(*code);
|
2015-05-20 07:07:54 +00:00
|
|
|
|
|
|
|
Handle<Map> initial_strong_map =
|
|
|
|
Map::Copy(initial_map, "SetInstancePrototype");
|
2015-05-22 10:51:49 +00:00
|
|
|
initial_strong_map->set_is_strong();
|
2015-05-20 07:07:54 +00:00
|
|
|
CacheInitialJSArrayMaps(native_context(), initial_strong_map);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
{ // --- N u m b e r ---
|
2015-08-31 10:09:52 +00:00
|
|
|
Handle<JSFunction> number_fun =
|
|
|
|
InstallFunction(global, "Number", JS_VALUE_TYPE, JSValue::kSize,
|
|
|
|
isolate->initial_object_prototype(),
|
|
|
|
Builtins::kIllegal);
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_number_function(*number_fun);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
{ // --- B o o l e a n ---
|
2015-08-31 10:09:52 +00:00
|
|
|
Handle<JSFunction> boolean_fun =
|
|
|
|
InstallFunction(global, "Boolean", JS_VALUE_TYPE, JSValue::kSize,
|
|
|
|
isolate->initial_object_prototype(),
|
|
|
|
Builtins::kIllegal);
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_boolean_function(*boolean_fun);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
{ // --- S t r i n g ---
|
2015-09-16 10:44:36 +00:00
|
|
|
Handle<JSFunction> string_fun = InstallFunction(
|
|
|
|
global, "String", JS_VALUE_TYPE, JSValue::kSize,
|
|
|
|
isolate->initial_object_prototype(), Builtins::kStringConstructor);
|
|
|
|
string_fun->shared()->set_construct_stub(isolate->builtins()->builtin(
|
|
|
|
Builtins::kStringConstructor_ConstructStub));
|
|
|
|
string_fun->shared()->DontAdaptArguments();
|
|
|
|
string_fun->shared()->set_length(1);
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_string_function(*string_fun);
|
2012-07-18 14:00:58 +00:00
|
|
|
|
2012-07-19 10:01:52 +00:00
|
|
|
Handle<Map> string_map =
|
2012-08-17 09:03:08 +00:00
|
|
|
Handle<Map>(native_context()->string_function()->initial_map());
|
2014-04-11 12:13:53 +00:00
|
|
|
Map::EnsureDescriptorSlack(string_map, 1);
|
2012-07-23 16:18:25 +00:00
|
|
|
|
2012-07-18 14:00:58 +00:00
|
|
|
PropertyAttributes attribs = static_cast<PropertyAttributes>(
|
|
|
|
DONT_ENUM | DONT_DELETE | READ_ONLY);
|
2014-04-15 13:25:17 +00:00
|
|
|
Handle<AccessorInfo> string_length(
|
|
|
|
Accessors::StringLengthInfo(isolate, attribs));
|
2012-07-18 14:00:58 +00:00
|
|
|
|
|
|
|
{ // Add length.
|
2015-01-19 17:49:13 +00:00
|
|
|
AccessorConstantDescriptor d(factory->length_string(), string_length,
|
|
|
|
attribs);
|
2014-04-11 12:13:53 +00:00
|
|
|
string_map->AppendDescriptor(&d);
|
2012-07-18 14:00:58 +00:00
|
|
|
}
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
2014-08-06 09:31:21 +00:00
|
|
|
{
|
|
|
|
// --- S y m b o l ---
|
2015-08-31 10:09:52 +00:00
|
|
|
Handle<JSFunction> symbol_fun = InstallFunction(
|
2014-08-06 09:31:21 +00:00
|
|
|
global, "Symbol", JS_VALUE_TYPE, JSValue::kSize,
|
2015-09-16 11:35:15 +00:00
|
|
|
isolate->initial_object_prototype(), Builtins::kSymbolConstructor);
|
|
|
|
symbol_fun->shared()->set_construct_stub(isolate->builtins()->builtin(
|
|
|
|
Builtins::kSymbolConstructor_ConstructStub));
|
|
|
|
symbol_fun->shared()->set_internal_formal_parameter_count(1);
|
|
|
|
symbol_fun->shared()->set_length(1);
|
2014-08-06 09:31:21 +00:00
|
|
|
native_context()->set_symbol_function(*symbol_fun);
|
|
|
|
}
|
|
|
|
|
2008-07-03 15:10:15 +00:00
|
|
|
{ // --- D a t e ---
|
|
|
|
// Builtin functions for Date.prototype.
|
2015-08-31 10:09:52 +00:00
|
|
|
InstallFunction(global, "Date", JS_DATE_TYPE, JSDate::kSize,
|
|
|
|
isolate->initial_object_prototype(), Builtins::kIllegal);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
{ // -- R e g E x p
|
|
|
|
// Builtin functions for RegExp.prototype.
|
2015-08-31 10:09:52 +00:00
|
|
|
Handle<JSFunction> regexp_fun =
|
|
|
|
InstallFunction(global, "RegExp", JS_REGEXP_TYPE, JSRegExp::kSize,
|
|
|
|
isolate->initial_object_prototype(),
|
|
|
|
Builtins::kIllegal);
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_regexp_function(*regexp_fun);
|
2010-03-26 14:19:47 +00:00
|
|
|
|
2014-08-04 11:34:54 +00:00
|
|
|
DCHECK(regexp_fun->has_initial_map());
|
2010-03-26 14:19:47 +00:00
|
|
|
Handle<Map> initial_map(regexp_fun->initial_map());
|
|
|
|
|
2015-08-11 19:36:04 +00:00
|
|
|
DCHECK_EQ(0, initial_map->GetInObjectProperties());
|
2010-03-26 14:19:47 +00:00
|
|
|
|
2015-11-05 09:07:27 +00:00
|
|
|
PropertyAttributes final =
|
|
|
|
static_cast<PropertyAttributes>(DONT_ENUM | DONT_DELETE | READ_ONLY);
|
|
|
|
Map::EnsureDescriptorSlack(initial_map, 5);
|
|
|
|
|
|
|
|
{
|
2015-11-05 09:08:40 +00:00
|
|
|
// ECMA-262, section 15.10.7.1.
|
|
|
|
DataDescriptor field(factory->source_string(),
|
2015-11-05 09:07:27 +00:00
|
|
|
JSRegExp::kSourceFieldIndex, final,
|
|
|
|
Representation::Tagged());
|
|
|
|
initial_map->AppendDescriptor(&field);
|
|
|
|
}
|
|
|
|
{
|
2015-11-05 09:08:40 +00:00
|
|
|
// ECMA-262, section 15.10.7.2.
|
|
|
|
DataDescriptor field(factory->global_string(),
|
|
|
|
JSRegExp::kGlobalFieldIndex, final,
|
|
|
|
Representation::Tagged());
|
|
|
|
initial_map->AppendDescriptor(&field);
|
|
|
|
}
|
|
|
|
{
|
|
|
|
// ECMA-262, section 15.10.7.3.
|
|
|
|
DataDescriptor field(factory->ignore_case_string(),
|
|
|
|
JSRegExp::kIgnoreCaseFieldIndex, final,
|
|
|
|
Representation::Tagged());
|
|
|
|
initial_map->AppendDescriptor(&field);
|
|
|
|
}
|
|
|
|
{
|
|
|
|
// ECMA-262, section 15.10.7.4.
|
|
|
|
DataDescriptor field(factory->multiline_string(),
|
|
|
|
JSRegExp::kMultilineFieldIndex, final,
|
|
|
|
Representation::Tagged());
|
2015-11-05 09:07:27 +00:00
|
|
|
initial_map->AppendDescriptor(&field);
|
|
|
|
}
|
|
|
|
{
|
|
|
|
// ECMA-262, section 15.10.7.5.
|
|
|
|
PropertyAttributes writable =
|
|
|
|
static_cast<PropertyAttributes>(DONT_ENUM | DONT_DELETE);
|
|
|
|
DataDescriptor field(factory->last_index_string(),
|
|
|
|
JSRegExp::kLastIndexFieldIndex, writable,
|
|
|
|
Representation::Tagged());
|
|
|
|
initial_map->AppendDescriptor(&field);
|
|
|
|
}
|
2010-03-26 14:19:47 +00:00
|
|
|
|
2014-11-21 10:50:12 +00:00
|
|
|
static const int num_fields = JSRegExp::kInObjectFieldCount;
|
2015-08-11 19:36:04 +00:00
|
|
|
initial_map->SetInObjectProperties(num_fields);
|
2010-03-26 14:19:47 +00:00
|
|
|
initial_map->set_unused_property_fields(0);
|
2014-11-21 10:50:12 +00:00
|
|
|
initial_map->set_instance_size(initial_map->instance_size() +
|
|
|
|
num_fields * kPointerSize);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
2015-07-13 09:45:43 +00:00
|
|
|
// Initialize the embedder data slot.
|
|
|
|
Handle<FixedArray> embedder_data = factory->NewFixedArray(3);
|
|
|
|
native_context()->set_embedder_data(*embedder_data);
|
|
|
|
|
|
|
|
if (context_type == THIN_CONTEXT) return;
|
|
|
|
|
2009-04-24 08:13:09 +00:00
|
|
|
{ // -- J S O N
|
2013-09-25 15:11:48 +00:00
|
|
|
Handle<String> name = factory->InternalizeUtf8String("JSON");
|
2014-05-09 16:39:33 +00:00
|
|
|
Handle<JSFunction> cons = factory->NewFunction(name);
|
2013-07-18 07:59:48 +00:00
|
|
|
JSFunction::SetInstancePrototype(cons,
|
|
|
|
Handle<Object>(native_context()->initial_object_prototype(), isolate));
|
2015-11-04 14:56:11 +00:00
|
|
|
cons->shared()->set_instance_class_name(*name);
|
2011-03-28 13:09:37 +00:00
|
|
|
Handle<JSObject> json_object = factory->NewJSObject(cons, TENURED);
|
2014-08-04 11:34:54 +00:00
|
|
|
DCHECK(json_object->IsJSObject());
|
2014-06-30 13:48:57 +00:00
|
|
|
JSObject::AddProperty(global, name, json_object, DONT_ENUM);
|
2015-08-14 15:12:34 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
{ // -- M a t h
|
|
|
|
Handle<String> name = factory->InternalizeUtf8String("Math");
|
|
|
|
Handle<JSFunction> cons = factory->NewFunction(name);
|
|
|
|
JSFunction::SetInstancePrototype(
|
|
|
|
cons,
|
|
|
|
Handle<Object>(native_context()->initial_object_prototype(), isolate));
|
2015-11-04 14:56:11 +00:00
|
|
|
cons->shared()->set_instance_class_name(*name);
|
2015-08-14 15:12:34 +00:00
|
|
|
Handle<JSObject> json_object = factory->NewJSObject(cons, TENURED);
|
|
|
|
DCHECK(json_object->IsJSObject());
|
|
|
|
JSObject::AddProperty(global, name, json_object, DONT_ENUM);
|
2009-04-24 08:13:09 +00:00
|
|
|
}
|
|
|
|
|
2014-06-06 08:15:05 +00:00
|
|
|
{ // -- A r r a y B u f f e r
|
2015-08-31 10:09:52 +00:00
|
|
|
Handle<JSFunction> array_buffer_fun =
|
|
|
|
InstallFunction(
|
|
|
|
global, "ArrayBuffer", JS_ARRAY_BUFFER_TYPE,
|
|
|
|
JSArrayBuffer::kSizeWithInternalFields,
|
|
|
|
isolate->initial_object_prototype(),
|
|
|
|
Builtins::kIllegal);
|
2013-08-20 13:55:52 +00:00
|
|
|
native_context()->set_array_buffer_fun(*array_buffer_fun);
|
|
|
|
}
|
|
|
|
|
2014-06-06 08:15:05 +00:00
|
|
|
{ // -- T y p e d A r r a y s
|
2015-07-28 09:29:34 +00:00
|
|
|
#define INSTALL_TYPED_ARRAY(Type, type, TYPE, ctype, size) \
|
|
|
|
{ \
|
|
|
|
Handle<JSFunction> fun; \
|
|
|
|
InstallTypedArray(#Type "Array", TYPE##_ELEMENTS, &fun); \
|
|
|
|
native_context()->set_##type##_array_fun(*fun); \
|
|
|
|
}
|
2014-01-24 16:01:15 +00:00
|
|
|
TYPED_ARRAYS(INSTALL_TYPED_ARRAY)
|
|
|
|
#undef INSTALL_TYPED_ARRAY
|
2013-08-20 13:55:52 +00:00
|
|
|
|
2015-08-31 10:09:52 +00:00
|
|
|
Handle<JSFunction> data_view_fun =
|
|
|
|
InstallFunction(
|
|
|
|
global, "DataView", JS_DATA_VIEW_TYPE,
|
|
|
|
JSDataView::kSizeWithInternalFields,
|
|
|
|
isolate->initial_object_prototype(),
|
|
|
|
Builtins::kIllegal);
|
2013-08-20 13:55:52 +00:00
|
|
|
native_context()->set_data_view_fun(*data_view_fun);
|
|
|
|
}
|
|
|
|
|
2015-05-26 17:36:48 +00:00
|
|
|
{ // -- M a p
|
2015-08-31 10:09:52 +00:00
|
|
|
Handle<JSFunction> js_map_fun = InstallFunction(
|
2015-05-26 17:36:48 +00:00
|
|
|
global, "Map", JS_MAP_TYPE, JSMap::kSize,
|
|
|
|
isolate->initial_object_prototype(), Builtins::kIllegal);
|
2015-06-01 23:16:27 +00:00
|
|
|
native_context()->set_js_map_fun(*js_map_fun);
|
2015-05-26 17:36:48 +00:00
|
|
|
}
|
2014-08-05 19:37:32 +00:00
|
|
|
|
2015-05-26 17:36:48 +00:00
|
|
|
{ // -- S e t
|
2015-08-31 10:09:52 +00:00
|
|
|
Handle<JSFunction> js_set_fun = InstallFunction(
|
2015-05-26 17:36:48 +00:00
|
|
|
global, "Set", JS_SET_TYPE, JSSet::kSize,
|
|
|
|
isolate->initial_object_prototype(), Builtins::kIllegal);
|
2015-06-01 23:16:27 +00:00
|
|
|
native_context()->set_js_set_fun(*js_set_fun);
|
2015-05-26 17:36:48 +00:00
|
|
|
}
|
2014-08-05 19:37:32 +00:00
|
|
|
|
2015-09-03 12:16:15 +00:00
|
|
|
{ // -- I t e r a t o r R e s u l t
|
|
|
|
Handle<Map> map =
|
|
|
|
factory->NewMap(JS_ITERATOR_RESULT_TYPE, JSIteratorResult::kSize);
|
|
|
|
Map::SetPrototype(map, isolate->initial_object_prototype());
|
|
|
|
Map::EnsureDescriptorSlack(map, 2);
|
|
|
|
|
|
|
|
{ // value
|
|
|
|
DataDescriptor d(factory->value_string(), JSIteratorResult::kValueIndex,
|
|
|
|
NONE, Representation::Tagged());
|
|
|
|
map->AppendDescriptor(&d);
|
|
|
|
}
|
|
|
|
|
|
|
|
{ // done
|
|
|
|
DataDescriptor d(factory->done_string(), JSIteratorResult::kDoneIndex,
|
|
|
|
NONE, Representation::Tagged());
|
|
|
|
map->AppendDescriptor(&d);
|
|
|
|
}
|
|
|
|
|
|
|
|
map->SetInObjectProperties(2);
|
|
|
|
native_context()->set_iterator_result_map(*map);
|
2014-08-05 19:37:32 +00:00
|
|
|
}
|
|
|
|
|
2014-05-09 16:34:58 +00:00
|
|
|
// -- W e a k M a p
|
2015-08-31 10:09:52 +00:00
|
|
|
InstallFunction(global, "WeakMap", JS_WEAK_MAP_TYPE, JSWeakMap::kSize,
|
|
|
|
isolate->initial_object_prototype(), Builtins::kIllegal);
|
2014-05-09 16:34:58 +00:00
|
|
|
// -- W e a k S e t
|
2015-08-31 10:09:52 +00:00
|
|
|
InstallFunction(global, "WeakSet", JS_WEAK_SET_TYPE, JSWeakSet::kSize,
|
|
|
|
isolate->initial_object_prototype(), Builtins::kIllegal);
|
2014-05-06 14:48:34 +00:00
|
|
|
|
2014-07-07 13:27:37 +00:00
|
|
|
{ // --- sloppy arguments map
|
2008-07-03 15:10:15 +00:00
|
|
|
// Make sure we can recognize argument objects at runtime.
|
|
|
|
// This is done by introducing an anonymous function with
|
|
|
|
// class_name equals 'Arguments'.
|
2014-08-18 07:54:19 +00:00
|
|
|
Handle<String> arguments_string = factory->Arguments_string();
|
2014-04-22 08:30:09 +00:00
|
|
|
Handle<Code> code(isolate->builtins()->builtin(Builtins::kIllegal));
|
2014-05-09 17:39:54 +00:00
|
|
|
Handle<JSFunction> function = factory->NewFunctionWithoutPrototype(
|
|
|
|
arguments_string, code);
|
2014-07-07 13:12:29 +00:00
|
|
|
function->shared()->set_instance_class_name(*arguments_string);
|
2011-03-17 20:28:41 +00:00
|
|
|
|
2014-07-07 13:27:37 +00:00
|
|
|
Handle<Map> map =
|
|
|
|
factory->NewMap(JS_OBJECT_TYPE, Heap::kSloppyArgumentsObjectSize);
|
|
|
|
// Create the descriptor array for the arguments object.
|
|
|
|
Map::EnsureDescriptorSlack(map, 2);
|
|
|
|
|
|
|
|
{ // length
|
2015-01-19 17:49:13 +00:00
|
|
|
DataDescriptor d(factory->length_string(), Heap::kArgumentsLengthIndex,
|
|
|
|
DONT_ENUM, Representation::Tagged());
|
2014-07-07 13:27:37 +00:00
|
|
|
map->AppendDescriptor(&d);
|
|
|
|
}
|
|
|
|
{ // callee
|
2015-01-19 17:49:13 +00:00
|
|
|
DataDescriptor d(factory->callee_string(), Heap::kArgumentsCalleeIndex,
|
|
|
|
DONT_ENUM, Representation::Tagged());
|
2014-07-07 13:27:37 +00:00
|
|
|
map->AppendDescriptor(&d);
|
|
|
|
}
|
2014-08-25 09:12:22 +00:00
|
|
|
// @@iterator method is added later.
|
2014-07-07 13:27:37 +00:00
|
|
|
|
2015-08-11 19:36:04 +00:00
|
|
|
map->SetInObjectProperties(2);
|
2014-07-07 13:27:37 +00:00
|
|
|
native_context()->set_sloppy_arguments_map(*map);
|
|
|
|
|
2014-08-04 11:34:54 +00:00
|
|
|
DCHECK(!function->has_initial_map());
|
2014-08-11 14:00:58 +00:00
|
|
|
JSFunction::SetInitialMap(function, map,
|
|
|
|
isolate->initial_object_prototype());
|
2014-07-07 13:27:37 +00:00
|
|
|
|
2015-08-11 19:36:04 +00:00
|
|
|
DCHECK(map->GetInObjectProperties() > Heap::kArgumentsCalleeIndex);
|
|
|
|
DCHECK(map->GetInObjectProperties() > Heap::kArgumentsLengthIndex);
|
2014-08-04 11:34:54 +00:00
|
|
|
DCHECK(!map->is_dictionary_map());
|
|
|
|
DCHECK(IsFastObjectElementsKind(map->elements_kind()));
|
2014-07-07 12:21:01 +00:00
|
|
|
}
|
|
|
|
|
2015-07-02 14:38:37 +00:00
|
|
|
{ // --- fast and slow aliased arguments map
|
|
|
|
Handle<Map> map = isolate->sloppy_arguments_map();
|
|
|
|
map = Map::Copy(map, "FastAliasedArguments");
|
|
|
|
map->set_elements_kind(FAST_SLOPPY_ARGUMENTS_ELEMENTS);
|
2015-08-11 19:36:04 +00:00
|
|
|
DCHECK_EQ(2, map->GetInObjectProperties());
|
2015-07-02 14:38:37 +00:00
|
|
|
native_context()->set_fast_aliased_arguments_map(*map);
|
|
|
|
|
|
|
|
map = Map::Copy(map, "SlowAliasedArguments");
|
|
|
|
map->set_elements_kind(SLOW_SLOPPY_ARGUMENTS_ELEMENTS);
|
2015-08-11 19:36:04 +00:00
|
|
|
DCHECK_EQ(2, map->GetInObjectProperties());
|
2015-07-02 14:38:37 +00:00
|
|
|
native_context()->set_slow_aliased_arguments_map(*map);
|
2014-07-07 13:27:37 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
{ // --- strict mode arguments map
|
2011-03-17 20:28:41 +00:00
|
|
|
const PropertyAttributes attributes =
|
|
|
|
static_cast<PropertyAttributes>(DONT_ENUM | DONT_DELETE | READ_ONLY);
|
|
|
|
|
|
|
|
// Create the ThrowTypeError functions.
|
2012-01-10 16:11:33 +00:00
|
|
|
Handle<AccessorPair> callee = factory->NewAccessorPair();
|
|
|
|
Handle<AccessorPair> caller = factory->NewAccessorPair();
|
2011-03-17 20:28:41 +00:00
|
|
|
|
2015-04-09 22:40:16 +00:00
|
|
|
Handle<JSFunction> poison = GetStrictArgumentsPoisonFunction();
|
2011-03-17 20:28:41 +00:00
|
|
|
|
|
|
|
// Install the ThrowTypeError functions.
|
2014-05-19 10:47:00 +00:00
|
|
|
callee->set_getter(*poison);
|
|
|
|
callee->set_setter(*poison);
|
|
|
|
caller->set_getter(*poison);
|
|
|
|
caller->set_setter(*poison);
|
2011-03-17 20:28:41 +00:00
|
|
|
|
2012-07-18 15:38:58 +00:00
|
|
|
// Create the map. Allocate one in-object field for length.
|
|
|
|
Handle<Map> map = factory->NewMap(JS_OBJECT_TYPE,
|
2014-03-11 14:41:22 +00:00
|
|
|
Heap::kStrictArgumentsObjectSize);
|
2011-03-17 20:28:41 +00:00
|
|
|
// Create the descriptor array for the arguments object.
|
2014-04-11 12:13:53 +00:00
|
|
|
Map::EnsureDescriptorSlack(map, 3);
|
2012-07-19 10:01:52 +00:00
|
|
|
|
2011-03-17 20:28:41 +00:00
|
|
|
{ // length
|
2015-01-19 17:49:13 +00:00
|
|
|
DataDescriptor d(factory->length_string(), Heap::kArgumentsLengthIndex,
|
|
|
|
DONT_ENUM, Representation::Tagged());
|
2014-04-11 12:13:53 +00:00
|
|
|
map->AppendDescriptor(&d);
|
2011-03-17 20:28:41 +00:00
|
|
|
}
|
|
|
|
{ // callee
|
2015-01-19 17:49:13 +00:00
|
|
|
AccessorConstantDescriptor d(factory->callee_string(), callee,
|
|
|
|
attributes);
|
2014-04-11 12:13:53 +00:00
|
|
|
map->AppendDescriptor(&d);
|
2011-03-17 20:28:41 +00:00
|
|
|
}
|
|
|
|
{ // caller
|
2015-01-19 17:49:13 +00:00
|
|
|
AccessorConstantDescriptor d(factory->caller_string(), caller,
|
|
|
|
attributes);
|
2014-04-11 12:13:53 +00:00
|
|
|
map->AppendDescriptor(&d);
|
2011-03-17 20:28:41 +00:00
|
|
|
}
|
2014-08-25 09:12:22 +00:00
|
|
|
// @@iterator method is added later.
|
2012-07-18 15:38:58 +00:00
|
|
|
|
2014-12-15 19:57:37 +00:00
|
|
|
DCHECK_EQ(native_context()->object_function()->prototype(),
|
|
|
|
*isolate->initial_object_prototype());
|
2015-04-10 12:13:18 +00:00
|
|
|
Map::SetPrototype(map, isolate->initial_object_prototype());
|
2015-08-11 19:36:04 +00:00
|
|
|
map->SetInObjectProperties(1);
|
2011-03-17 20:28:41 +00:00
|
|
|
|
2014-03-11 14:39:08 +00:00
|
|
|
// Copy constructor from the sloppy arguments boilerplate.
|
2015-02-24 20:50:06 +00:00
|
|
|
map->SetConstructor(
|
|
|
|
native_context()->sloppy_arguments_map()->GetConstructor());
|
2014-07-07 13:12:29 +00:00
|
|
|
|
2014-07-07 13:27:37 +00:00
|
|
|
native_context()->set_strict_arguments_map(*map);
|
2008-10-23 08:46:32 +00:00
|
|
|
|
2015-08-11 19:36:04 +00:00
|
|
|
DCHECK(map->GetInObjectProperties() > Heap::kArgumentsLengthIndex);
|
2014-08-04 11:34:54 +00:00
|
|
|
DCHECK(!map->is_dictionary_map());
|
|
|
|
DCHECK(IsFastObjectElementsKind(map->elements_kind()));
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
{ // --- context extension
|
|
|
|
// Create a function for the context extension objects.
|
2011-03-18 20:35:07 +00:00
|
|
|
Handle<Code> code = Handle<Code>(
|
2011-03-28 13:09:37 +00:00
|
|
|
isolate->builtins()->builtin(Builtins::kIllegal));
|
2014-05-09 16:42:57 +00:00
|
|
|
Handle<JSFunction> context_extension_fun = factory->NewFunction(
|
2014-05-09 17:39:54 +00:00
|
|
|
factory->empty_string(), code, JS_CONTEXT_EXTENSION_OBJECT_TYPE,
|
|
|
|
JSObject::kHeaderSize);
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2013-02-28 17:03:34 +00:00
|
|
|
Handle<String> name = factory->InternalizeOneByteString(
|
2014-09-10 12:38:12 +00:00
|
|
|
STATIC_CHAR_VECTOR("context_extension"));
|
2008-07-03 15:10:15 +00:00
|
|
|
context_extension_fun->shared()->set_instance_class_name(*name);
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_context_extension_function(*context_extension_fun);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
2009-05-20 19:33:44 +00:00
|
|
|
|
|
|
|
{
|
2011-08-30 09:35:20 +00:00
|
|
|
// Set up the call-as-function delegate.
|
2009-05-20 19:33:44 +00:00
|
|
|
Handle<Code> code =
|
2011-03-28 13:09:37 +00:00
|
|
|
Handle<Code>(isolate->builtins()->builtin(
|
2011-03-23 13:40:07 +00:00
|
|
|
Builtins::kHandleApiCallAsFunction));
|
2014-05-09 16:42:57 +00:00
|
|
|
Handle<JSFunction> delegate = factory->NewFunction(
|
2014-05-09 17:39:54 +00:00
|
|
|
factory->empty_string(), code, JS_OBJECT_TYPE, JSObject::kHeaderSize);
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_call_as_function_delegate(*delegate);
|
2009-05-20 19:33:44 +00:00
|
|
|
delegate->shared()->DontAdaptArguments();
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
2011-08-30 09:35:20 +00:00
|
|
|
// Set up the call-as-constructor delegate.
|
2009-05-20 19:33:44 +00:00
|
|
|
Handle<Code> code =
|
2011-03-28 13:09:37 +00:00
|
|
|
Handle<Code>(isolate->builtins()->builtin(
|
2011-03-23 13:40:07 +00:00
|
|
|
Builtins::kHandleApiCallAsConstructor));
|
2014-05-09 16:42:57 +00:00
|
|
|
Handle<JSFunction> delegate = factory->NewFunction(
|
2014-05-09 17:39:54 +00:00
|
|
|
factory->empty_string(), code, JS_OBJECT_TYPE, JSObject::kHeaderSize);
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_call_as_constructor_delegate(*delegate);
|
2009-05-20 19:33:44 +00:00
|
|
|
delegate->shared()->DontAdaptArguments();
|
|
|
|
}
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-28 09:29:34 +00:00
|
|
|
void Genesis::InstallTypedArray(const char* name, ElementsKind elements_kind,
|
|
|
|
Handle<JSFunction>* fun) {
|
2013-04-16 14:16:30 +00:00
|
|
|
Handle<JSObject> global = Handle<JSObject>(native_context()->global_object());
|
2015-08-31 10:09:52 +00:00
|
|
|
Handle<JSFunction> result = InstallFunction(
|
2014-05-09 17:21:51 +00:00
|
|
|
global, name, JS_TYPED_ARRAY_TYPE, JSTypedArray::kSize,
|
|
|
|
isolate()->initial_object_prototype(), Builtins::kIllegal);
|
2013-05-15 15:23:53 +00:00
|
|
|
|
|
|
|
Handle<Map> initial_map = isolate()->factory()->NewMap(
|
2014-04-22 12:24:28 +00:00
|
|
|
JS_TYPED_ARRAY_TYPE,
|
|
|
|
JSTypedArray::kSizeWithInternalFields,
|
|
|
|
elements_kind);
|
2014-08-11 14:00:58 +00:00
|
|
|
JSFunction::SetInitialMap(result, initial_map,
|
|
|
|
handle(initial_map->prototype(), isolate()));
|
2014-04-22 12:24:28 +00:00
|
|
|
*fun = result;
|
2013-04-16 14:16:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-09-19 07:36:05 +00:00
|
|
|
void Genesis::InitializeExperimentalGlobal() {
|
2014-10-20 13:33:34 +00:00
|
|
|
#define FEATURE_INITIALIZE_GLOBAL(id, descr) InitializeGlobal_##id();
|
2014-09-19 07:36:05 +00:00
|
|
|
|
2014-11-04 16:05:27 +00:00
|
|
|
HARMONY_INPROGRESS(FEATURE_INITIALIZE_GLOBAL)
|
|
|
|
HARMONY_STAGED(FEATURE_INITIALIZE_GLOBAL)
|
2014-11-28 20:07:11 +00:00
|
|
|
HARMONY_SHIPPING(FEATURE_INITIALIZE_GLOBAL)
|
2014-10-20 13:33:34 +00:00
|
|
|
#undef FEATURE_INITIALIZE_GLOBAL
|
2014-09-19 07:36:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-13 09:45:43 +00:00
|
|
|
bool Bootstrapper::CompileBuiltin(Isolate* isolate, int index) {
|
2008-07-03 15:10:15 +00:00
|
|
|
Vector<const char> name = Natives::GetScriptName(index);
|
2011-03-18 20:35:07 +00:00
|
|
|
Handle<String> source_code =
|
2015-04-30 15:10:43 +00:00
|
|
|
isolate->bootstrapper()->SourceLookup<Natives>(index);
|
2015-09-16 21:00:45 +00:00
|
|
|
|
|
|
|
// We pass in extras_utils so that builtin code can set it up for later use
|
|
|
|
// by actual extras code, compiled with CompileExtraBuiltin.
|
2015-05-12 14:00:47 +00:00
|
|
|
Handle<Object> global = isolate->global_object();
|
2015-05-21 06:15:33 +00:00
|
|
|
Handle<Object> utils = isolate->natives_utils_object();
|
2015-09-16 21:00:45 +00:00
|
|
|
Handle<Object> extras_utils = isolate->extras_utils_object();
|
|
|
|
Handle<Object> args[] = {global, utils, extras_utils};
|
2015-07-13 09:45:43 +00:00
|
|
|
|
2015-11-02 13:04:20 +00:00
|
|
|
return Bootstrapper::CompileNative(isolate, name, source_code,
|
|
|
|
arraysize(args), args);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-13 09:45:43 +00:00
|
|
|
bool Bootstrapper::CompileExperimentalBuiltin(Isolate* isolate, int index) {
|
2015-05-12 14:00:47 +00:00
|
|
|
HandleScope scope(isolate);
|
2011-04-15 12:31:03 +00:00
|
|
|
Vector<const char> name = ExperimentalNatives::GetScriptName(index);
|
2015-04-30 15:10:43 +00:00
|
|
|
Handle<String> source_code =
|
|
|
|
isolate->bootstrapper()->SourceLookup<ExperimentalNatives>(index);
|
2015-05-12 14:00:47 +00:00
|
|
|
Handle<Object> global = isolate->global_object();
|
2015-05-21 06:15:33 +00:00
|
|
|
Handle<Object> utils = isolate->natives_utils_object();
|
|
|
|
Handle<Object> args[] = {global, utils};
|
2015-11-02 13:04:20 +00:00
|
|
|
return Bootstrapper::CompileNative(isolate, name, source_code,
|
|
|
|
arraysize(args), args);
|
2011-04-15 12:31:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-13 09:45:43 +00:00
|
|
|
bool Bootstrapper::CompileExtraBuiltin(Isolate* isolate, int index) {
|
2015-05-12 14:00:47 +00:00
|
|
|
HandleScope scope(isolate);
|
2015-05-08 08:44:47 +00:00
|
|
|
Vector<const char> name = ExtraNatives::GetScriptName(index);
|
|
|
|
Handle<String> source_code =
|
|
|
|
isolate->bootstrapper()->SourceLookup<ExtraNatives>(index);
|
2015-05-12 14:00:47 +00:00
|
|
|
Handle<Object> global = isolate->global_object();
|
2015-08-06 23:52:47 +00:00
|
|
|
Handle<Object> binding = isolate->extras_binding_object();
|
2015-09-16 21:00:45 +00:00
|
|
|
Handle<Object> extras_utils = isolate->extras_utils_object();
|
|
|
|
Handle<Object> args[] = {global, binding, extras_utils};
|
2015-11-02 13:04:20 +00:00
|
|
|
return Bootstrapper::CompileNative(isolate, name, source_code,
|
|
|
|
arraysize(args), args);
|
2015-05-08 08:44:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-08-20 00:01:07 +00:00
|
|
|
bool Bootstrapper::CompileExperimentalExtraBuiltin(Isolate* isolate,
|
|
|
|
int index) {
|
|
|
|
HandleScope scope(isolate);
|
|
|
|
Vector<const char> name = ExperimentalExtraNatives::GetScriptName(index);
|
|
|
|
Handle<String> source_code =
|
|
|
|
isolate->bootstrapper()->SourceLookup<ExperimentalExtraNatives>(index);
|
|
|
|
Handle<Object> global = isolate->global_object();
|
|
|
|
Handle<Object> binding = isolate->extras_binding_object();
|
2015-09-16 21:00:45 +00:00
|
|
|
Handle<Object> extras_utils = isolate->extras_utils_object();
|
|
|
|
Handle<Object> args[] = {global, binding, extras_utils};
|
2015-11-02 13:04:20 +00:00
|
|
|
return Bootstrapper::CompileNative(isolate, name, source_code,
|
|
|
|
arraysize(args), args);
|
2015-08-20 00:01:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-13 09:45:43 +00:00
|
|
|
bool Bootstrapper::CompileCodeStubBuiltin(Isolate* isolate, int index) {
|
|
|
|
HandleScope scope(isolate);
|
|
|
|
Vector<const char> name = CodeStubNatives::GetScriptName(index);
|
|
|
|
Handle<String> source_code =
|
|
|
|
isolate->bootstrapper()->SourceLookup<CodeStubNatives>(index);
|
|
|
|
Handle<JSObject> global(isolate->global_object());
|
|
|
|
Handle<JSObject> exports(isolate->heap()->code_stub_exports_object());
|
|
|
|
Handle<Object> args[] = {global, exports};
|
|
|
|
bool result =
|
2015-11-02 13:04:20 +00:00
|
|
|
CompileNative(isolate, name, source_code, arraysize(args), args);
|
2015-07-13 09:45:43 +00:00
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
bool Bootstrapper::CompileNative(Isolate* isolate, Vector<const char> name,
|
|
|
|
Handle<String> source, int argc,
|
|
|
|
Handle<Object> argv[]) {
|
2014-06-02 11:41:50 +00:00
|
|
|
SuppressDebug compiling_natives(isolate->debug());
|
2014-03-28 14:16:11 +00:00
|
|
|
// During genesis, the boilerplate for stack overflow won't work until the
|
|
|
|
// environment has been at least partially initialized. Add a stack check
|
|
|
|
// before entering JS code to catch overflow early.
|
|
|
|
StackLimitCheck check(isolate);
|
2015-06-24 14:57:39 +00:00
|
|
|
if (check.JsHasOverflowed(1 * KB)) {
|
2015-05-29 11:37:10 +00:00
|
|
|
isolate->StackOverflow();
|
|
|
|
return false;
|
|
|
|
}
|
2012-04-03 15:54:07 +00:00
|
|
|
|
2015-05-12 14:00:47 +00:00
|
|
|
Handle<Context> context(isolate->context());
|
|
|
|
|
|
|
|
Handle<String> script_name =
|
|
|
|
isolate->factory()->NewStringFromUtf8(name).ToHandleChecked();
|
|
|
|
Handle<SharedFunctionInfo> function_info = Compiler::CompileScript(
|
2015-05-19 03:11:33 +00:00
|
|
|
source, script_name, 0, 0, ScriptOriginOptions(), Handle<Object>(),
|
|
|
|
context, NULL, NULL, ScriptCompiler::kNoCompileOptions, NATIVES_CODE,
|
|
|
|
false);
|
2015-05-18 15:50:38 +00:00
|
|
|
if (function_info.is_null()) return false;
|
2015-05-12 14:00:47 +00:00
|
|
|
|
|
|
|
DCHECK(context->IsNativeContext());
|
|
|
|
|
|
|
|
Handle<Context> runtime_context(context->runtime_context());
|
|
|
|
Handle<JSFunction> fun =
|
|
|
|
isolate->factory()->NewFunctionFromSharedFunctionInfo(function_info,
|
|
|
|
runtime_context);
|
2015-11-02 13:04:20 +00:00
|
|
|
Handle<Object> receiver = isolate->factory()->undefined_value();
|
2015-05-12 14:00:47 +00:00
|
|
|
|
|
|
|
// For non-extension scripts, run script to get the function wrapper.
|
|
|
|
Handle<Object> wrapper;
|
|
|
|
if (!Execution::Call(isolate, fun, receiver, 0, NULL).ToHandle(&wrapper)) {
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
// Then run the function wrapper.
|
|
|
|
return !Execution::Call(isolate, Handle<JSFunction>::cast(wrapper), receiver,
|
|
|
|
argc, argv).is_null();
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-05-21 06:15:33 +00:00
|
|
|
bool Genesis::CallUtilsFunction(Isolate* isolate, const char* name) {
|
|
|
|
Handle<JSObject> utils =
|
|
|
|
Handle<JSObject>::cast(isolate->natives_utils_object());
|
2015-08-31 10:09:52 +00:00
|
|
|
Handle<String> name_string =
|
|
|
|
isolate->factory()->NewStringFromAsciiChecked(name);
|
2015-05-21 06:15:33 +00:00
|
|
|
Handle<Object> fun = JSObject::GetDataProperty(utils, name_string);
|
|
|
|
Handle<Object> receiver = isolate->factory()->undefined_value();
|
2015-05-26 07:24:13 +00:00
|
|
|
Handle<Object> args[] = {utils};
|
|
|
|
return !Execution::Call(isolate, fun, receiver, 1, args).is_null();
|
2015-05-21 06:15:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-05-12 14:00:47 +00:00
|
|
|
bool Genesis::CompileExtension(Isolate* isolate, v8::Extension* extension) {
|
2013-02-15 09:27:10 +00:00
|
|
|
Factory* factory = isolate->factory();
|
|
|
|
HandleScope scope(isolate);
|
2010-03-23 06:04:44 +00:00
|
|
|
Handle<SharedFunctionInfo> function_info;
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2015-05-12 14:00:47 +00:00
|
|
|
Handle<String> source =
|
|
|
|
isolate->factory()
|
|
|
|
->NewExternalStringFromOneByte(extension->source())
|
|
|
|
.ToHandleChecked();
|
|
|
|
DCHECK(source->IsOneByteRepresentation());
|
|
|
|
|
2008-07-03 15:10:15 +00:00
|
|
|
// If we can't find the function in the cache, we compile a new
|
|
|
|
// function and insert it into the cache.
|
2015-05-12 14:00:47 +00:00
|
|
|
Vector<const char> name = CStrVector(extension->name());
|
|
|
|
SourceCodeCache* cache = isolate->bootstrapper()->extensions_cache();
|
|
|
|
Handle<Context> context(isolate->context());
|
|
|
|
DCHECK(context->IsNativeContext());
|
|
|
|
|
|
|
|
if (!cache->Lookup(name, &function_info)) {
|
2014-04-17 13:27:02 +00:00
|
|
|
Handle<String> script_name =
|
|
|
|
factory->NewStringFromUtf8(name).ToHandleChecked();
|
2013-12-23 14:30:35 +00:00
|
|
|
function_info = Compiler::CompileScript(
|
2015-05-19 03:11:33 +00:00
|
|
|
source, script_name, 0, 0, ScriptOriginOptions(), Handle<Object>(),
|
|
|
|
context, extension, NULL, ScriptCompiler::kNoCompileOptions,
|
|
|
|
NOT_NATIVES_CODE, false);
|
2010-03-23 06:04:44 +00:00
|
|
|
if (function_info.is_null()) return false;
|
2015-05-12 14:00:47 +00:00
|
|
|
cache->Add(name, function_info);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
2012-01-13 13:09:52 +00:00
|
|
|
// Set up the function context. Conceptually, we should clone the
|
2008-07-03 15:10:15 +00:00
|
|
|
// function before overwriting the context but since we're in a
|
|
|
|
// single-threaded environment it is not strictly necessary.
|
|
|
|
Handle<JSFunction> fun =
|
2011-03-28 13:09:37 +00:00
|
|
|
factory->NewFunctionFromSharedFunctionInfo(function_info, context);
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2010-01-28 10:46:58 +00:00
|
|
|
// Call function using either the runtime object or the global
|
2008-07-03 15:10:15 +00:00
|
|
|
// object as the receiver. Provide no parameters.
|
2015-05-12 14:00:47 +00:00
|
|
|
Handle<Object> receiver = isolate->global_object();
|
|
|
|
return !Execution::Call(isolate, fun, receiver, 0, NULL).is_null();
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-07-30 13:54:45 +00:00
|
|
|
static Handle<JSObject> ResolveBuiltinIdHolder(Handle<Context> native_context,
|
|
|
|
const char* holder_expr) {
|
|
|
|
Isolate* isolate = native_context->GetIsolate();
|
|
|
|
Factory* factory = isolate->factory();
|
2015-11-02 14:57:59 +00:00
|
|
|
Handle<JSGlobalObject> global(native_context->global_object());
|
2014-07-30 13:54:45 +00:00
|
|
|
const char* period_pos = strchr(holder_expr, '.');
|
|
|
|
if (period_pos == NULL) {
|
|
|
|
return Handle<JSObject>::cast(
|
|
|
|
Object::GetPropertyOrElement(
|
|
|
|
global, factory->InternalizeUtf8String(holder_expr))
|
|
|
|
.ToHandleChecked());
|
|
|
|
}
|
|
|
|
const char* inner = period_pos + 1;
|
2015-01-30 09:29:25 +00:00
|
|
|
DCHECK(!strchr(inner, '.'));
|
2014-07-30 13:54:45 +00:00
|
|
|
Vector<const char> property(holder_expr,
|
|
|
|
static_cast<int>(period_pos - holder_expr));
|
|
|
|
Handle<String> property_string = factory->InternalizeUtf8String(property);
|
2014-08-04 11:34:54 +00:00
|
|
|
DCHECK(!property_string.is_null());
|
2014-07-30 13:54:45 +00:00
|
|
|
Handle<JSObject> object = Handle<JSObject>::cast(
|
|
|
|
Object::GetProperty(global, property_string).ToHandleChecked());
|
|
|
|
if (strcmp("prototype", inner) == 0) {
|
|
|
|
Handle<JSFunction> function = Handle<JSFunction>::cast(object);
|
|
|
|
return Handle<JSObject>(JSObject::cast(function->prototype()));
|
|
|
|
}
|
|
|
|
Handle<String> inner_string = factory->InternalizeUtf8String(inner);
|
2014-08-04 11:34:54 +00:00
|
|
|
DCHECK(!inner_string.is_null());
|
2014-07-30 13:54:45 +00:00
|
|
|
Handle<Object> value =
|
|
|
|
Object::GetProperty(object, inner_string).ToHandleChecked();
|
|
|
|
return Handle<JSObject>::cast(value);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-02-06 09:54:58 +00:00
|
|
|
template <typename Data>
|
2015-10-22 14:40:43 +00:00
|
|
|
Handle<JSTypedArray> CreateTypedArray(Isolate* isolate, ExternalArrayType type,
|
|
|
|
size_t num_elements, Data** data) {
|
|
|
|
size_t byte_length = num_elements * sizeof(**data);
|
2015-09-17 14:47:37 +00:00
|
|
|
Handle<JSArrayBuffer> buffer =
|
2015-10-22 14:40:43 +00:00
|
|
|
isolate->factory()->NewJSArrayBuffer(SharedFlag::kNotShared, TENURED);
|
|
|
|
bool is_external = (*data != nullptr);
|
2015-04-28 11:25:25 +00:00
|
|
|
if (!is_external) {
|
2015-10-22 14:40:43 +00:00
|
|
|
*data = reinterpret_cast<Data*>(
|
2015-04-29 09:54:34 +00:00
|
|
|
isolate->array_buffer_allocator()->Allocate(byte_length));
|
2015-02-06 09:54:58 +00:00
|
|
|
}
|
2015-10-22 14:40:43 +00:00
|
|
|
JSArrayBuffer::Setup(buffer, isolate, is_external, *data, byte_length,
|
|
|
|
SharedFlag::kNotShared);
|
|
|
|
return isolate->factory()->NewJSTypedArray(type, buffer, 0, num_elements,
|
|
|
|
TENURED);
|
2015-02-06 09:54:58 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-10-16 11:27:14 +00:00
|
|
|
void Genesis::ConfigureUtilsObject(ContextType context_type) {
|
|
|
|
switch (context_type) {
|
|
|
|
// We still need the utils object to find debug functions.
|
|
|
|
case DEBUG_CONTEXT:
|
|
|
|
return;
|
|
|
|
// Expose the natives in global if a valid name for it is specified.
|
|
|
|
case FULL_CONTEXT: {
|
|
|
|
// We still need the utils object after deserialization.
|
|
|
|
if (isolate()->serializer_enabled()) return;
|
|
|
|
if (FLAG_expose_natives_as == NULL) break;
|
|
|
|
if (strlen(FLAG_expose_natives_as) == 0) break;
|
|
|
|
HandleScope scope(isolate());
|
|
|
|
Handle<String> natives_key =
|
|
|
|
factory()->InternalizeUtf8String(FLAG_expose_natives_as);
|
|
|
|
uint32_t dummy_index;
|
|
|
|
if (natives_key->AsArrayIndex(&dummy_index)) break;
|
|
|
|
Handle<Object> utils = isolate()->natives_utils_object();
|
|
|
|
Handle<JSObject> global = isolate()->global_object();
|
|
|
|
JSObject::AddProperty(global, natives_key, utils, DONT_ENUM);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case THIN_CONTEXT:
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
// The utils object can be removed for cases that reach this point.
|
|
|
|
native_context()->set_natives_utils_object(heap()->undefined_value());
|
2015-11-02 13:04:20 +00:00
|
|
|
|
|
|
|
#ifdef DEBUG
|
2015-11-02 14:57:59 +00:00
|
|
|
JSGlobalObject* dummy = native_context()->runtime_context()->global_object();
|
2015-11-02 13:04:20 +00:00
|
|
|
DCHECK_EQ(0, dummy->elements()->length());
|
|
|
|
DCHECK_EQ(0, GlobalDictionary::cast(dummy->properties())->NumberOfElements());
|
|
|
|
#endif
|
2015-10-16 11:27:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-08-28 10:22:31 +00:00
|
|
|
void Bootstrapper::ExportFromRuntime(Isolate* isolate,
|
|
|
|
Handle<JSObject> container) {
|
2015-10-19 11:36:00 +00:00
|
|
|
Factory* factory = isolate->factory();
|
2015-08-21 06:44:17 +00:00
|
|
|
HandleScope scope(isolate);
|
2015-10-19 11:36:00 +00:00
|
|
|
Handle<Context> native_context = isolate->native_context();
|
|
|
|
#define EXPORT_PRIVATE_SYMBOL(NAME) \
|
|
|
|
Handle<String> NAME##_name = factory->NewStringFromAsciiChecked(#NAME); \
|
|
|
|
JSObject::AddProperty(container, NAME##_name, factory->NAME(), NONE);
|
2015-08-21 06:44:17 +00:00
|
|
|
PRIVATE_SYMBOL_LIST(EXPORT_PRIVATE_SYMBOL)
|
|
|
|
#undef EXPORT_PRIVATE_SYMBOL
|
2015-08-28 10:22:31 +00:00
|
|
|
|
2015-10-19 11:36:00 +00:00
|
|
|
#define EXPORT_PUBLIC_SYMBOL(NAME, DESCRIPTION) \
|
|
|
|
Handle<String> NAME##_name = factory->NewStringFromAsciiChecked(#NAME); \
|
|
|
|
JSObject::AddProperty(container, NAME##_name, factory->NAME(), NONE);
|
2015-08-28 10:22:31 +00:00
|
|
|
PUBLIC_SYMBOL_LIST(EXPORT_PUBLIC_SYMBOL)
|
2015-10-06 18:10:20 +00:00
|
|
|
WELL_KNOWN_SYMBOL_LIST(EXPORT_PUBLIC_SYMBOL)
|
2015-08-28 10:22:31 +00:00
|
|
|
#undef EXPORT_PUBLIC_SYMBOL
|
|
|
|
|
2015-09-28 09:42:09 +00:00
|
|
|
{
|
|
|
|
Handle<JSFunction> apply = InstallFunction(
|
|
|
|
container, "reflect_apply", JS_OBJECT_TYPE, JSObject::kHeaderSize,
|
|
|
|
MaybeHandle<JSObject>(), Builtins::kReflectApply);
|
|
|
|
apply->shared()->set_internal_formal_parameter_count(3);
|
|
|
|
apply->shared()->set_length(3);
|
|
|
|
Handle<TypeFeedbackVector> feedback_vector =
|
|
|
|
TypeFeedbackVector::CreatePushAppliedArgumentsVector(isolate);
|
|
|
|
apply->shared()->set_feedback_vector(*feedback_vector);
|
2015-10-19 11:36:00 +00:00
|
|
|
native_context->set_reflect_apply(*apply);
|
2015-09-28 09:42:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
{
|
|
|
|
Handle<JSFunction> construct = InstallFunction(
|
|
|
|
container, "reflect_construct", JS_OBJECT_TYPE, JSObject::kHeaderSize,
|
|
|
|
MaybeHandle<JSObject>(), Builtins::kReflectConstruct);
|
|
|
|
construct->shared()->set_internal_formal_parameter_count(3);
|
|
|
|
construct->shared()->set_length(2);
|
|
|
|
Handle<TypeFeedbackVector> feedback_vector =
|
|
|
|
TypeFeedbackVector::CreatePushAppliedArgumentsVector(isolate);
|
|
|
|
construct->shared()->set_feedback_vector(*feedback_vector);
|
2015-10-19 11:36:00 +00:00
|
|
|
native_context->set_reflect_construct(*construct);
|
2015-09-28 09:42:09 +00:00
|
|
|
}
|
2015-10-16 11:27:14 +00:00
|
|
|
|
|
|
|
Handle<JSObject> iterator_prototype;
|
|
|
|
|
|
|
|
{
|
2015-10-19 11:36:00 +00:00
|
|
|
PrototypeIterator iter(native_context->generator_object_prototype_map());
|
2015-10-16 11:27:14 +00:00
|
|
|
iter.Advance(); // Advance to the prototype of generator_object_prototype.
|
|
|
|
iterator_prototype = Handle<JSObject>(iter.GetCurrent<JSObject>());
|
|
|
|
|
2015-10-19 11:36:00 +00:00
|
|
|
JSObject::AddProperty(container,
|
|
|
|
factory->InternalizeUtf8String("IteratorPrototype"),
|
2015-10-16 11:27:14 +00:00
|
|
|
iterator_prototype, NONE);
|
|
|
|
}
|
|
|
|
|
|
|
|
{
|
2015-10-19 11:36:00 +00:00
|
|
|
PrototypeIterator iter(native_context->sloppy_generator_function_map());
|
2015-10-16 11:27:14 +00:00
|
|
|
Handle<JSObject> generator_function_prototype(iter.GetCurrent<JSObject>());
|
|
|
|
|
2015-10-19 11:36:00 +00:00
|
|
|
JSObject::AddProperty(
|
|
|
|
container, factory->InternalizeUtf8String("GeneratorFunctionPrototype"),
|
|
|
|
generator_function_prototype, NONE);
|
2015-10-16 11:27:14 +00:00
|
|
|
|
|
|
|
static const bool kUseStrictFunctionMap = true;
|
|
|
|
Handle<JSFunction> generator_function_function =
|
|
|
|
InstallFunction(container, "GeneratorFunction", JS_FUNCTION_TYPE,
|
|
|
|
JSFunction::kSize, generator_function_prototype,
|
|
|
|
Builtins::kIllegal, kUseStrictFunctionMap);
|
|
|
|
generator_function_function->initial_map()->set_is_callable();
|
2015-11-03 16:42:21 +00:00
|
|
|
generator_function_function->initial_map()->set_is_constructor(true);
|
2015-10-16 11:27:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
{ // -- S e t I t e r a t o r
|
|
|
|
Handle<JSObject> set_iterator_prototype =
|
|
|
|
isolate->factory()->NewJSObject(isolate->object_function(), TENURED);
|
|
|
|
SetObjectPrototype(set_iterator_prototype, iterator_prototype);
|
|
|
|
Handle<JSFunction> set_iterator_function = InstallFunction(
|
|
|
|
container, "SetIterator", JS_SET_ITERATOR_TYPE, JSSetIterator::kSize,
|
|
|
|
set_iterator_prototype, Builtins::kIllegal);
|
2015-10-19 11:36:00 +00:00
|
|
|
native_context->set_set_iterator_map(set_iterator_function->initial_map());
|
2015-10-16 11:27:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
{ // -- M a p I t e r a t o r
|
|
|
|
Handle<JSObject> map_iterator_prototype =
|
|
|
|
isolate->factory()->NewJSObject(isolate->object_function(), TENURED);
|
|
|
|
SetObjectPrototype(map_iterator_prototype, iterator_prototype);
|
|
|
|
Handle<JSFunction> map_iterator_function = InstallFunction(
|
|
|
|
container, "MapIterator", JS_MAP_ITERATOR_TYPE, JSMapIterator::kSize,
|
|
|
|
map_iterator_prototype, Builtins::kIllegal);
|
2015-10-19 11:36:00 +00:00
|
|
|
native_context->set_map_iterator_map(map_iterator_function->initial_map());
|
|
|
|
}
|
|
|
|
|
|
|
|
{ // -- S c r i p t
|
|
|
|
// Builtin functions for Script.
|
|
|
|
Handle<JSFunction> script_fun = InstallFunction(
|
|
|
|
container, "Script", JS_VALUE_TYPE, JSValue::kSize,
|
|
|
|
isolate->initial_object_prototype(), Builtins::kIllegal);
|
|
|
|
Handle<JSObject> prototype =
|
|
|
|
factory->NewJSObject(isolate->object_function(), TENURED);
|
|
|
|
Accessors::FunctionSetPrototype(script_fun, prototype).Assert();
|
|
|
|
native_context->set_script_function(*script_fun);
|
|
|
|
|
|
|
|
Handle<Map> script_map = Handle<Map>(script_fun->initial_map());
|
|
|
|
Map::EnsureDescriptorSlack(script_map, 15);
|
|
|
|
|
|
|
|
PropertyAttributes attribs =
|
|
|
|
static_cast<PropertyAttributes>(DONT_ENUM | DONT_DELETE | READ_ONLY);
|
|
|
|
|
|
|
|
Handle<AccessorInfo> script_column =
|
|
|
|
Accessors::ScriptColumnOffsetInfo(isolate, attribs);
|
|
|
|
{
|
|
|
|
AccessorConstantDescriptor d(
|
|
|
|
Handle<Name>(Name::cast(script_column->name())), script_column,
|
|
|
|
attribs);
|
|
|
|
script_map->AppendDescriptor(&d);
|
|
|
|
}
|
|
|
|
|
|
|
|
Handle<AccessorInfo> script_id = Accessors::ScriptIdInfo(isolate, attribs);
|
|
|
|
{
|
|
|
|
AccessorConstantDescriptor d(Handle<Name>(Name::cast(script_id->name())),
|
|
|
|
script_id, attribs);
|
|
|
|
script_map->AppendDescriptor(&d);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Handle<AccessorInfo> script_name =
|
|
|
|
Accessors::ScriptNameInfo(isolate, attribs);
|
|
|
|
{
|
|
|
|
AccessorConstantDescriptor d(
|
|
|
|
Handle<Name>(Name::cast(script_name->name())), script_name, attribs);
|
|
|
|
script_map->AppendDescriptor(&d);
|
|
|
|
}
|
|
|
|
|
|
|
|
Handle<AccessorInfo> script_line =
|
|
|
|
Accessors::ScriptLineOffsetInfo(isolate, attribs);
|
|
|
|
{
|
|
|
|
AccessorConstantDescriptor d(
|
|
|
|
Handle<Name>(Name::cast(script_line->name())), script_line, attribs);
|
|
|
|
script_map->AppendDescriptor(&d);
|
|
|
|
}
|
|
|
|
|
|
|
|
Handle<AccessorInfo> script_source =
|
|
|
|
Accessors::ScriptSourceInfo(isolate, attribs);
|
|
|
|
{
|
|
|
|
AccessorConstantDescriptor d(
|
|
|
|
Handle<Name>(Name::cast(script_source->name())), script_source,
|
|
|
|
attribs);
|
|
|
|
script_map->AppendDescriptor(&d);
|
|
|
|
}
|
|
|
|
|
|
|
|
Handle<AccessorInfo> script_type =
|
|
|
|
Accessors::ScriptTypeInfo(isolate, attribs);
|
|
|
|
{
|
|
|
|
AccessorConstantDescriptor d(
|
|
|
|
Handle<Name>(Name::cast(script_type->name())), script_type, attribs);
|
|
|
|
script_map->AppendDescriptor(&d);
|
|
|
|
}
|
|
|
|
|
|
|
|
Handle<AccessorInfo> script_compilation_type =
|
|
|
|
Accessors::ScriptCompilationTypeInfo(isolate, attribs);
|
|
|
|
{
|
|
|
|
AccessorConstantDescriptor d(
|
|
|
|
Handle<Name>(Name::cast(script_compilation_type->name())),
|
|
|
|
script_compilation_type, attribs);
|
|
|
|
script_map->AppendDescriptor(&d);
|
|
|
|
}
|
|
|
|
|
|
|
|
Handle<AccessorInfo> script_line_ends =
|
|
|
|
Accessors::ScriptLineEndsInfo(isolate, attribs);
|
|
|
|
{
|
|
|
|
AccessorConstantDescriptor d(
|
|
|
|
Handle<Name>(Name::cast(script_line_ends->name())), script_line_ends,
|
|
|
|
attribs);
|
|
|
|
script_map->AppendDescriptor(&d);
|
|
|
|
}
|
|
|
|
|
|
|
|
Handle<AccessorInfo> script_context_data =
|
|
|
|
Accessors::ScriptContextDataInfo(isolate, attribs);
|
|
|
|
{
|
|
|
|
AccessorConstantDescriptor d(
|
|
|
|
Handle<Name>(Name::cast(script_context_data->name())),
|
|
|
|
script_context_data, attribs);
|
|
|
|
script_map->AppendDescriptor(&d);
|
|
|
|
}
|
|
|
|
|
|
|
|
Handle<AccessorInfo> script_eval_from_script =
|
|
|
|
Accessors::ScriptEvalFromScriptInfo(isolate, attribs);
|
|
|
|
{
|
|
|
|
AccessorConstantDescriptor d(
|
|
|
|
Handle<Name>(Name::cast(script_eval_from_script->name())),
|
|
|
|
script_eval_from_script, attribs);
|
|
|
|
script_map->AppendDescriptor(&d);
|
|
|
|
}
|
|
|
|
|
|
|
|
Handle<AccessorInfo> script_eval_from_script_position =
|
|
|
|
Accessors::ScriptEvalFromScriptPositionInfo(isolate, attribs);
|
|
|
|
{
|
|
|
|
AccessorConstantDescriptor d(
|
|
|
|
Handle<Name>(Name::cast(script_eval_from_script_position->name())),
|
|
|
|
script_eval_from_script_position, attribs);
|
|
|
|
script_map->AppendDescriptor(&d);
|
|
|
|
}
|
|
|
|
|
|
|
|
Handle<AccessorInfo> script_eval_from_function_name =
|
|
|
|
Accessors::ScriptEvalFromFunctionNameInfo(isolate, attribs);
|
|
|
|
{
|
|
|
|
AccessorConstantDescriptor d(
|
|
|
|
Handle<Name>(Name::cast(script_eval_from_function_name->name())),
|
|
|
|
script_eval_from_function_name, attribs);
|
|
|
|
script_map->AppendDescriptor(&d);
|
|
|
|
}
|
|
|
|
|
|
|
|
Handle<AccessorInfo> script_source_url =
|
|
|
|
Accessors::ScriptSourceUrlInfo(isolate, attribs);
|
|
|
|
{
|
|
|
|
AccessorConstantDescriptor d(
|
|
|
|
Handle<Name>(Name::cast(script_source_url->name())),
|
|
|
|
script_source_url, attribs);
|
|
|
|
script_map->AppendDescriptor(&d);
|
|
|
|
}
|
|
|
|
|
|
|
|
Handle<AccessorInfo> script_source_mapping_url =
|
|
|
|
Accessors::ScriptSourceMappingUrlInfo(isolate, attribs);
|
|
|
|
{
|
|
|
|
AccessorConstantDescriptor d(
|
|
|
|
Handle<Name>(Name::cast(script_source_mapping_url->name())),
|
|
|
|
script_source_mapping_url, attribs);
|
|
|
|
script_map->AppendDescriptor(&d);
|
|
|
|
}
|
|
|
|
|
|
|
|
Handle<AccessorInfo> script_is_embedder_debug_script =
|
|
|
|
Accessors::ScriptIsEmbedderDebugScriptInfo(isolate, attribs);
|
|
|
|
{
|
|
|
|
AccessorConstantDescriptor d(
|
|
|
|
Handle<Name>(Name::cast(script_is_embedder_debug_script->name())),
|
|
|
|
script_is_embedder_debug_script, attribs);
|
|
|
|
script_map->AppendDescriptor(&d);
|
|
|
|
}
|
2015-10-16 11:27:14 +00:00
|
|
|
}
|
2015-08-28 13:39:34 +00:00
|
|
|
}
|
2015-08-28 10:22:31 +00:00
|
|
|
|
2015-08-31 10:09:52 +00:00
|
|
|
|
2015-08-28 10:22:31 +00:00
|
|
|
void Bootstrapper::ExportExperimentalFromRuntime(Isolate* isolate,
|
|
|
|
Handle<JSObject> container) {
|
|
|
|
HandleScope scope(isolate);
|
|
|
|
|
2015-08-31 10:09:52 +00:00
|
|
|
#define INITIALIZE_FLAG(FLAG) \
|
|
|
|
{ \
|
|
|
|
Handle<String> name = \
|
|
|
|
isolate->factory()->NewStringFromAsciiChecked(#FLAG); \
|
|
|
|
JSObject::AddProperty(container, name, \
|
|
|
|
isolate->factory()->ToBoolean(FLAG), NONE); \
|
2015-08-28 10:22:31 +00:00
|
|
|
}
|
|
|
|
|
2015-11-05 09:08:40 +00:00
|
|
|
INITIALIZE_FLAG(FLAG_harmony_regexps)
|
|
|
|
INITIALIZE_FLAG(FLAG_harmony_unicode_regexps)
|
2015-08-28 10:22:31 +00:00
|
|
|
INITIALIZE_FLAG(FLAG_harmony_tostring)
|
2015-10-16 11:27:14 +00:00
|
|
|
INITIALIZE_FLAG(FLAG_harmony_tolength)
|
2015-08-28 10:22:31 +00:00
|
|
|
|
|
|
|
#undef INITIALIZE_FLAG
|
2015-08-21 06:44:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-10-20 13:33:34 +00:00
|
|
|
#define EMPTY_INITIALIZE_GLOBAL_FOR_FEATURE(id) \
|
|
|
|
void Genesis::InitializeGlobal_##id() {}
|
|
|
|
|
|
|
|
EMPTY_INITIALIZE_GLOBAL_FOR_FEATURE(harmony_modules)
|
2014-12-10 08:58:04 +00:00
|
|
|
EMPTY_INITIALIZE_GLOBAL_FOR_FEATURE(harmony_array_includes)
|
2014-11-04 16:05:27 +00:00
|
|
|
EMPTY_INITIALIZE_GLOBAL_FOR_FEATURE(harmony_proxies)
|
2014-11-20 10:51:49 +00:00
|
|
|
EMPTY_INITIALIZE_GLOBAL_FOR_FEATURE(harmony_sloppy)
|
2015-08-11 23:59:47 +00:00
|
|
|
EMPTY_INITIALIZE_GLOBAL_FOR_FEATURE(harmony_sloppy_function)
|
2015-07-25 00:05:08 +00:00
|
|
|
EMPTY_INITIALIZE_GLOBAL_FOR_FEATURE(harmony_sloppy_let)
|
2015-01-30 15:21:41 +00:00
|
|
|
EMPTY_INITIALIZE_GLOBAL_FOR_FEATURE(harmony_rest_parameters)
|
2015-08-17 12:01:55 +00:00
|
|
|
EMPTY_INITIALIZE_GLOBAL_FOR_FEATURE(harmony_default_parameters)
|
2015-04-22 12:35:05 +00:00
|
|
|
EMPTY_INITIALIZE_GLOBAL_FOR_FEATURE(harmony_destructuring)
|
2015-08-04 20:52:42 +00:00
|
|
|
EMPTY_INITIALIZE_GLOBAL_FOR_FEATURE(harmony_object_observe)
|
2015-08-28 10:22:31 +00:00
|
|
|
EMPTY_INITIALIZE_GLOBAL_FOR_FEATURE(harmony_regexps)
|
|
|
|
EMPTY_INITIALIZE_GLOBAL_FOR_FEATURE(harmony_unicode_regexps)
|
2015-10-08 13:56:49 +00:00
|
|
|
EMPTY_INITIALIZE_GLOBAL_FOR_FEATURE(harmony_completion)
|
2015-10-16 11:27:14 +00:00
|
|
|
EMPTY_INITIALIZE_GLOBAL_FOR_FEATURE(harmony_tolength)
|
2015-10-21 02:55:47 +00:00
|
|
|
EMPTY_INITIALIZE_GLOBAL_FOR_FEATURE(harmony_do_expressions)
|
2015-09-16 18:01:38 +00:00
|
|
|
|
|
|
|
|
2015-10-08 14:23:03 +00:00
|
|
|
static void SimpleInstallFunction(Handle<JSObject>& base, const char* name,
|
|
|
|
Builtins::Name call, int len, bool adapt) {
|
2015-10-07 11:45:12 +00:00
|
|
|
Handle<JSFunction> fun =
|
|
|
|
InstallFunction(base, name, JS_OBJECT_TYPE, JSObject::kHeaderSize,
|
|
|
|
MaybeHandle<JSObject>(), call);
|
2015-10-08 14:23:03 +00:00
|
|
|
if (adapt) {
|
|
|
|
fun->shared()->set_internal_formal_parameter_count(len);
|
|
|
|
} else {
|
|
|
|
fun->shared()->DontAdaptArguments();
|
|
|
|
}
|
2015-10-07 11:45:12 +00:00
|
|
|
fun->shared()->set_length(len);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-11-02 08:42:43 +00:00
|
|
|
void InstallPublicSymbol(Factory* factory, Handle<Context> native_context,
|
|
|
|
const char* name, Handle<Symbol> value) {
|
|
|
|
Handle<JSGlobalObject> global(
|
|
|
|
JSGlobalObject::cast(native_context->global_object()));
|
|
|
|
Handle<String> symbol_string = factory->InternalizeUtf8String("Symbol");
|
|
|
|
Handle<JSObject> symbol = Handle<JSObject>::cast(
|
|
|
|
JSObject::GetProperty(global, symbol_string).ToHandleChecked());
|
|
|
|
Handle<String> name_string = factory->InternalizeUtf8String(name);
|
|
|
|
PropertyAttributes attributes =
|
|
|
|
static_cast<PropertyAttributes>(DONT_ENUM | DONT_DELETE | READ_ONLY);
|
|
|
|
JSObject::AddProperty(symbol, name_string, value, attributes);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Genesis::InitializeGlobal_harmony_tostring() {
|
|
|
|
if (!FLAG_harmony_tostring) return;
|
|
|
|
InstallPublicSymbol(factory(), native_context(), "toStringTag",
|
|
|
|
factory()->to_string_tag_symbol());
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Genesis::InitializeGlobal_harmony_concat_spreadable() {
|
|
|
|
if (!FLAG_harmony_concat_spreadable) return;
|
|
|
|
InstallPublicSymbol(factory(), native_context(), "isConcatSpreadable",
|
|
|
|
factory()->is_concat_spreadable_symbol());
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Genesis::InitializeGlobal_harmony_regexp_subclass() {
|
|
|
|
if (!FLAG_harmony_regexp_subclass) return;
|
|
|
|
InstallPublicSymbol(factory(), native_context(), "match",
|
|
|
|
factory()->match_symbol());
|
|
|
|
InstallPublicSymbol(factory(), native_context(), "replace",
|
|
|
|
factory()->replace_symbol());
|
|
|
|
InstallPublicSymbol(factory(), native_context(), "search",
|
|
|
|
factory()->search_symbol());
|
|
|
|
InstallPublicSymbol(factory(), native_context(), "split",
|
|
|
|
factory()->split_symbol());
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-03-19 14:47:18 +00:00
|
|
|
void Genesis::InitializeGlobal_harmony_reflect() {
|
2015-04-09 19:37:14 +00:00
|
|
|
if (!FLAG_harmony_reflect) return;
|
2015-07-20 13:50:19 +00:00
|
|
|
|
2015-08-31 10:09:52 +00:00
|
|
|
Handle<JSGlobalObject> global(JSGlobalObject::cast(
|
|
|
|
native_context()->global_object()));
|
2015-03-19 14:47:18 +00:00
|
|
|
Handle<String> reflect_string =
|
|
|
|
factory()->NewStringFromStaticChars("Reflect");
|
2015-10-07 11:45:12 +00:00
|
|
|
Handle<JSObject> reflect =
|
2015-03-19 14:47:18 +00:00
|
|
|
factory()->NewJSObject(isolate()->object_function(), TENURED);
|
|
|
|
JSObject::AddProperty(global, reflect_string, reflect, DONT_ENUM);
|
|
|
|
|
2015-10-29 15:39:37 +00:00
|
|
|
SimpleInstallFunction(reflect, "defineProperty",
|
|
|
|
Builtins::kReflectDefineProperty, 3, true);
|
2015-10-07 11:45:12 +00:00
|
|
|
SimpleInstallFunction(reflect, "deleteProperty",
|
2015-10-08 14:23:03 +00:00
|
|
|
Builtins::kReflectDeleteProperty, 2, true);
|
2015-10-07 11:45:12 +00:00
|
|
|
SimpleInstallFunction(reflect, "get",
|
2015-10-08 14:23:03 +00:00
|
|
|
Builtins::kReflectGet, 3, false);
|
2015-10-30 10:04:53 +00:00
|
|
|
SimpleInstallFunction(reflect, "getOwnPropertyDescriptor",
|
|
|
|
Builtins::kReflectGetOwnPropertyDescriptor, 2, true);
|
2015-10-21 15:45:11 +00:00
|
|
|
SimpleInstallFunction(reflect, "getPrototypeOf",
|
|
|
|
Builtins::kReflectGetPrototypeOf, 1, true);
|
2015-10-07 11:45:12 +00:00
|
|
|
SimpleInstallFunction(reflect, "has",
|
2015-10-08 14:23:03 +00:00
|
|
|
Builtins::kReflectHas, 2, true);
|
2015-10-07 11:45:12 +00:00
|
|
|
SimpleInstallFunction(reflect, "isExtensible",
|
2015-10-08 14:23:03 +00:00
|
|
|
Builtins::kReflectIsExtensible, 1, true);
|
2015-10-21 09:23:33 +00:00
|
|
|
SimpleInstallFunction(reflect, "preventExtensions",
|
|
|
|
Builtins::kReflectPreventExtensions, 1, true);
|
2015-10-30 11:48:19 +00:00
|
|
|
SimpleInstallFunction(reflect, "set",
|
|
|
|
Builtins::kReflectSet, 3, false);
|
2015-10-22 11:21:22 +00:00
|
|
|
SimpleInstallFunction(reflect, "setPrototypeOf",
|
|
|
|
Builtins::kReflectSetPrototypeOf, 2, true);
|
2015-10-07 11:45:12 +00:00
|
|
|
}
|
2015-03-19 14:47:18 +00:00
|
|
|
|
2015-08-31 10:09:52 +00:00
|
|
|
|
2015-05-22 13:43:38 +00:00
|
|
|
void Genesis::InitializeGlobal_harmony_sharedarraybuffer() {
|
|
|
|
if (!FLAG_harmony_sharedarraybuffer) return;
|
|
|
|
|
|
|
|
Handle<JSGlobalObject> global(
|
|
|
|
JSGlobalObject::cast(native_context()->global_object()));
|
|
|
|
|
2015-08-31 10:09:52 +00:00
|
|
|
Handle<JSFunction> shared_array_buffer_fun = InstallFunction(
|
2015-05-22 13:43:38 +00:00
|
|
|
global, "SharedArrayBuffer", JS_ARRAY_BUFFER_TYPE,
|
|
|
|
JSArrayBuffer::kSizeWithInternalFields,
|
|
|
|
isolate()->initial_object_prototype(), Builtins::kIllegal);
|
|
|
|
native_context()->set_shared_array_buffer_fun(*shared_array_buffer_fun);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-16 19:43:21 +00:00
|
|
|
void Genesis::InitializeGlobal_harmony_simd() {
|
2015-07-20 10:37:43 +00:00
|
|
|
if (!FLAG_harmony_simd) return;
|
|
|
|
|
2015-07-16 19:43:21 +00:00
|
|
|
Handle<JSGlobalObject> global(
|
|
|
|
JSGlobalObject::cast(native_context()->global_object()));
|
|
|
|
Isolate* isolate = global->GetIsolate();
|
|
|
|
Factory* factory = isolate->factory();
|
|
|
|
|
|
|
|
Handle<String> name = factory->InternalizeUtf8String("SIMD");
|
|
|
|
Handle<JSFunction> cons = factory->NewFunction(name);
|
|
|
|
JSFunction::SetInstancePrototype(
|
|
|
|
cons,
|
|
|
|
Handle<Object>(native_context()->initial_object_prototype(), isolate));
|
2015-11-04 14:56:11 +00:00
|
|
|
cons->shared()->set_instance_class_name(*name);
|
2015-07-16 19:43:21 +00:00
|
|
|
Handle<JSObject> simd_object = factory->NewJSObject(cons, TENURED);
|
|
|
|
DCHECK(simd_object->IsJSObject());
|
|
|
|
JSObject::AddProperty(global, name, simd_object, DONT_ENUM);
|
|
|
|
|
2015-08-03 13:02:39 +00:00
|
|
|
// Install SIMD type functions. Set the instance class names since
|
2015-11-02 14:57:59 +00:00
|
|
|
// InstallFunction only does this when we install on the JSGlobalObject.
|
2015-08-11 09:45:25 +00:00
|
|
|
#define SIMD128_INSTALL_FUNCTION(TYPE, Type, type, lane_count, lane_type) \
|
2015-08-31 10:09:52 +00:00
|
|
|
Handle<JSFunction> type##_function = InstallFunction( \
|
2015-08-11 09:45:25 +00:00
|
|
|
simd_object, #Type, JS_VALUE_TYPE, JSValue::kSize, \
|
|
|
|
isolate->initial_object_prototype(), Builtins::kIllegal); \
|
|
|
|
native_context()->set_##type##_function(*type##_function); \
|
2015-11-04 14:56:11 +00:00
|
|
|
type##_function->shared()->set_instance_class_name(*factory->Type##_string());
|
2015-08-03 13:02:39 +00:00
|
|
|
SIMD128_TYPES(SIMD128_INSTALL_FUNCTION)
|
2015-08-11 09:45:25 +00:00
|
|
|
#undef SIMD128_INSTALL_FUNCTION
|
2015-07-16 19:43:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-05-12 14:00:47 +00:00
|
|
|
Handle<JSFunction> Genesis::InstallInternalArray(Handle<JSObject> target,
|
|
|
|
const char* name,
|
|
|
|
ElementsKind elements_kind) {
|
2013-02-15 15:20:05 +00:00
|
|
|
// --- I n t e r n a l A r r a y ---
|
|
|
|
// An array constructor on the builtins object that works like
|
|
|
|
// the public Array constructor, except that its prototype
|
|
|
|
// doesn't inherit from Object.prototype.
|
|
|
|
// To be used only for internal work by builtins. Instances
|
|
|
|
// must not be leaked to user code.
|
|
|
|
Handle<JSObject> prototype =
|
|
|
|
factory()->NewJSObject(isolate()->object_function(), TENURED);
|
2015-05-12 14:00:47 +00:00
|
|
|
Handle<JSFunction> array_function =
|
2015-08-31 10:09:52 +00:00
|
|
|
InstallFunction(target, name, JS_ARRAY_TYPE, JSArray::kSize, prototype,
|
|
|
|
Builtins::kInternalArrayCode);
|
2013-02-15 15:20:05 +00:00
|
|
|
|
2013-06-25 16:31:07 +00:00
|
|
|
InternalArrayConstructorStub internal_array_constructor_stub(isolate());
|
2014-04-24 12:07:40 +00:00
|
|
|
Handle<Code> code = internal_array_constructor_stub.GetCode();
|
2013-06-25 16:31:07 +00:00
|
|
|
array_function->shared()->set_construct_stub(*code);
|
2013-02-15 15:20:05 +00:00
|
|
|
array_function->shared()->DontAdaptArguments();
|
|
|
|
|
2013-05-29 15:38:09 +00:00
|
|
|
Handle<Map> original_map(array_function->initial_map());
|
2014-11-07 16:03:11 +00:00
|
|
|
Handle<Map> initial_map = Map::Copy(original_map, "InternalArray");
|
2013-05-29 15:38:09 +00:00
|
|
|
initial_map->set_elements_kind(elements_kind);
|
2014-08-11 14:00:58 +00:00
|
|
|
JSFunction::SetInitialMap(array_function, initial_map, prototype);
|
2013-02-15 15:20:05 +00:00
|
|
|
|
|
|
|
// Make "length" magic on instances.
|
2014-04-11 12:13:53 +00:00
|
|
|
Map::EnsureDescriptorSlack(initial_map, 1);
|
2013-02-15 15:20:05 +00:00
|
|
|
|
|
|
|
PropertyAttributes attribs = static_cast<PropertyAttributes>(
|
|
|
|
DONT_ENUM | DONT_DELETE);
|
|
|
|
|
2014-04-28 14:59:29 +00:00
|
|
|
Handle<AccessorInfo> array_length =
|
|
|
|
Accessors::ArrayLengthInfo(isolate(), attribs);
|
2013-02-15 15:20:05 +00:00
|
|
|
{ // Add length.
|
2015-01-19 17:49:13 +00:00
|
|
|
AccessorConstantDescriptor d(Handle<Name>(Name::cast(array_length->name())),
|
|
|
|
array_length, attribs);
|
2014-11-11 10:24:52 +00:00
|
|
|
initial_map->AppendDescriptor(&d);
|
2013-02-15 15:20:05 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return array_function;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-13 09:45:43 +00:00
|
|
|
bool Genesis::InstallNatives(ContextType context_type) {
|
2013-02-15 09:27:10 +00:00
|
|
|
HandleScope scope(isolate());
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2012-08-17 09:03:08 +00:00
|
|
|
// Create a bridge function that has context in the native context.
|
2014-05-09 16:39:33 +00:00
|
|
|
Handle<JSFunction> bridge = factory()->NewFunction(factory()->empty_string());
|
2014-08-04 11:34:54 +00:00
|
|
|
DCHECK(bridge->context() == *isolate()->native_context());
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2015-11-02 13:04:20 +00:00
|
|
|
// Allocate the runtime context.
|
|
|
|
{
|
|
|
|
Handle<Context> context =
|
|
|
|
factory()->NewFunctionContext(Context::MIN_CONTEXT_SLOTS, bridge);
|
|
|
|
native_context()->set_runtime_context(*context);
|
|
|
|
Handle<Code> code = isolate()->builtins()->Illegal();
|
|
|
|
Handle<JSFunction> global_fun =
|
|
|
|
factory()->NewFunction(factory()->empty_string(), code,
|
|
|
|
JS_GLOBAL_OBJECT_TYPE, JSGlobalObject::kSize);
|
|
|
|
global_fun->initial_map()->set_dictionary_map(true);
|
|
|
|
global_fun->initial_map()->set_prototype(heap()->null_value());
|
|
|
|
Handle<JSGlobalObject> dummy_global =
|
2015-11-02 14:57:59 +00:00
|
|
|
Handle<JSGlobalObject>::cast(factory()->NewJSGlobalObject(global_fun));
|
2015-11-02 13:04:20 +00:00
|
|
|
dummy_global->set_native_context(*native_context());
|
|
|
|
dummy_global->set_global_proxy(native_context()->global_proxy());
|
|
|
|
context->set_global_object(*dummy_global);
|
|
|
|
// Something went wrong if we actually need to write into the dummy global.
|
|
|
|
dummy_global->set_properties(*GlobalDictionary::New(isolate(), 0));
|
|
|
|
dummy_global->set_elements(heap()->empty_fixed_array());
|
|
|
|
}
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2015-05-21 06:15:33 +00:00
|
|
|
// Set up the utils object as shared container between native scripts.
|
|
|
|
Handle<JSObject> utils = factory()->NewJSObject(isolate()->object_function());
|
|
|
|
JSObject::NormalizeProperties(utils, CLEAR_INOBJECT_PROPERTIES, 16,
|
|
|
|
"utils container for native scripts");
|
|
|
|
native_context()->set_natives_utils_object(*utils);
|
2015-05-12 14:00:47 +00:00
|
|
|
|
2015-09-16 21:00:45 +00:00
|
|
|
// Set up the extras utils object as a shared container between native
|
|
|
|
// scripts and extras. (Extras consume things added there by native scripts.)
|
|
|
|
Handle<JSObject> extras_utils =
|
|
|
|
factory()->NewJSObject(isolate()->object_function());
|
|
|
|
native_context()->set_extras_utils_object(*extras_utils);
|
|
|
|
|
|
|
|
InstallInternalArray(extras_utils, "InternalPackedArray", FAST_ELEMENTS);
|
|
|
|
|
2015-08-18 11:15:34 +00:00
|
|
|
int builtin_index = Natives::GetDebuggerCount();
|
|
|
|
// Only run prologue.js and runtime.js at this point.
|
|
|
|
DCHECK_EQ(builtin_index, Natives::GetIndex("prologue"));
|
|
|
|
if (!Bootstrapper::CompileBuiltin(isolate(), builtin_index++)) return false;
|
|
|
|
DCHECK_EQ(builtin_index, Natives::GetIndex("runtime"));
|
|
|
|
if (!Bootstrapper::CompileBuiltin(isolate(), builtin_index++)) return false;
|
|
|
|
|
|
|
|
// A thin context is ready at this point.
|
|
|
|
if (context_type == THIN_CONTEXT) return true;
|
|
|
|
|
2010-02-24 19:59:09 +00:00
|
|
|
{
|
|
|
|
// Builtin function for OpaqueReference -- a JSValue-based object,
|
|
|
|
// that keeps its field isolated from JavaScript code. It may store
|
|
|
|
// objects, that JavaScript code may not access.
|
2015-10-19 11:36:00 +00:00
|
|
|
Handle<JSFunction> opaque_reference_fun = factory()->NewFunction(
|
|
|
|
factory()->empty_string(), isolate()->builtins()->Illegal(),
|
|
|
|
isolate()->initial_object_prototype(), JS_VALUE_TYPE, JSValue::kSize);
|
2010-02-24 19:59:09 +00:00
|
|
|
Handle<JSObject> prototype =
|
2011-04-14 08:01:19 +00:00
|
|
|
factory()->NewJSObject(isolate()->object_function(), TENURED);
|
2014-10-14 14:46:11 +00:00
|
|
|
Accessors::FunctionSetPrototype(opaque_reference_fun, prototype).Assert();
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_opaque_reference_function(*opaque_reference_fun);
|
2010-02-24 19:59:09 +00:00
|
|
|
}
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2013-02-15 15:20:05 +00:00
|
|
|
// InternalArrays should not use Smi-Only array optimizations. There are too
|
|
|
|
// many places in the C++ runtime code (e.g. RegEx) that assume that
|
|
|
|
// elements in InternalArrays can be set to non-Smi values without going
|
|
|
|
// through a common bottleneck that would make the SMI_ONLY -> FAST_ELEMENT
|
|
|
|
// transition easy to trap. Moreover, they rarely are smi-only.
|
|
|
|
{
|
2015-05-12 14:00:47 +00:00
|
|
|
HandleScope scope(isolate());
|
2015-05-21 06:15:33 +00:00
|
|
|
Handle<JSObject> utils =
|
|
|
|
Handle<JSObject>::cast(isolate()->natives_utils_object());
|
|
|
|
Handle<JSFunction> array_function =
|
|
|
|
InstallInternalArray(utils, "InternalArray", FAST_HOLEY_ELEMENTS);
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_internal_array_function(*array_function);
|
2015-05-21 06:15:33 +00:00
|
|
|
InstallInternalArray(utils, "InternalPackedArray", FAST_ELEMENTS);
|
2013-02-15 15:20:05 +00:00
|
|
|
}
|
|
|
|
|
2015-08-18 11:15:34 +00:00
|
|
|
// Run the rest of the native scripts.
|
|
|
|
while (builtin_index < Natives::GetBuiltinsCount()) {
|
|
|
|
if (!Bootstrapper::CompileBuiltin(isolate(), builtin_index++)) return false;
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
2015-05-21 06:15:33 +00:00
|
|
|
if (!CallUtilsFunction(isolate(), "PostNatives")) return false;
|
|
|
|
|
2015-03-09 12:26:22 +00:00
|
|
|
auto function_cache =
|
2015-08-05 12:50:46 +00:00
|
|
|
ObjectHashTable::New(isolate(), ApiNatives::kInitialFunctionCacheSize,
|
|
|
|
USE_CUSTOM_MINIMUM_CAPACITY);
|
2015-03-09 12:26:22 +00:00
|
|
|
native_context()->set_function_cache(*function_cache);
|
2015-02-04 13:01:34 +00:00
|
|
|
|
2015-09-23 13:49:09 +00:00
|
|
|
// Store the map for the %ObjectPrototype% after the natives has been compiled
|
|
|
|
// and the Object function has been set up.
|
|
|
|
Handle<JSFunction> object_function(native_context()->object_function());
|
|
|
|
DCHECK(JSObject::cast(object_function->initial_map()->prototype())
|
|
|
|
->HasFastProperties());
|
|
|
|
native_context()->set_object_function_prototype_map(
|
|
|
|
HeapObject::cast(object_function->initial_map()->prototype())->map());
|
|
|
|
|
|
|
|
// Store the map for the %StringPrototype% after the natives has been compiled
|
2012-01-13 13:09:52 +00:00
|
|
|
// and the String function has been set up.
|
2012-08-17 09:03:08 +00:00
|
|
|
Handle<JSFunction> string_function(native_context()->string_function());
|
2014-08-04 11:34:54 +00:00
|
|
|
DCHECK(JSObject::cast(
|
2010-08-12 13:43:08 +00:00
|
|
|
string_function->initial_map()->prototype())->HasFastProperties());
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_string_function_prototype_map(
|
2010-08-12 13:43:08 +00:00
|
|
|
HeapObject::cast(string_function->initial_map()->prototype())->map());
|
|
|
|
|
2015-08-31 12:52:59 +00:00
|
|
|
// Install Date.prototype[@@toPrimitive].
|
|
|
|
{
|
|
|
|
Handle<String> key = factory()->Date_string();
|
|
|
|
Handle<JSFunction> date = Handle<JSFunction>::cast(
|
|
|
|
Object::GetProperty(handle(native_context()->global_object()), key)
|
|
|
|
.ToHandleChecked());
|
|
|
|
Handle<JSObject> proto =
|
|
|
|
Handle<JSObject>(JSObject::cast(date->instance_prototype()));
|
|
|
|
|
|
|
|
// Install the @@toPrimitive function.
|
|
|
|
Handle<JSFunction> to_primitive =
|
|
|
|
InstallFunction(proto, factory()->to_primitive_symbol(), JS_OBJECT_TYPE,
|
|
|
|
JSObject::kHeaderSize, MaybeHandle<JSObject>(),
|
|
|
|
Builtins::kDateToPrimitive,
|
|
|
|
static_cast<PropertyAttributes>(DONT_ENUM | READ_ONLY));
|
|
|
|
|
|
|
|
// Set the expected parameters for @@toPrimitive to 1; required by builtin.
|
|
|
|
to_primitive->shared()->set_internal_formal_parameter_count(1);
|
|
|
|
|
|
|
|
// Set the length for the function to satisfy ECMA-262.
|
|
|
|
to_primitive->shared()->set_length(1);
|
|
|
|
}
|
|
|
|
|
2015-09-07 13:44:44 +00:00
|
|
|
// Install Array.prototype.concat
|
|
|
|
{
|
|
|
|
Handle<JSFunction> array_constructor(native_context()->array_function());
|
|
|
|
Handle<JSObject> proto(JSObject::cast(array_constructor->prototype()));
|
|
|
|
Handle<JSFunction> concat =
|
|
|
|
InstallFunction(proto, "concat", JS_OBJECT_TYPE, JSObject::kHeaderSize,
|
|
|
|
MaybeHandle<JSObject>(), Builtins::kArrayConcat);
|
|
|
|
|
|
|
|
// Make sure that Array.prototype.concat appears to be compiled.
|
|
|
|
// The code will never be called, but inline caching for call will
|
|
|
|
// only work if it appears to be compiled.
|
|
|
|
concat->shared()->DontAdaptArguments();
|
|
|
|
DCHECK(concat->is_compiled());
|
|
|
|
// Set the lengths for the functions to satisfy ECMA-262.
|
|
|
|
concat->shared()->set_length(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Install InternalArray.prototype.concat
|
|
|
|
{
|
|
|
|
Handle<JSFunction> array_constructor(
|
|
|
|
native_context()->internal_array_function());
|
|
|
|
Handle<JSObject> proto(JSObject::cast(array_constructor->prototype()));
|
|
|
|
Handle<JSFunction> concat =
|
|
|
|
InstallFunction(proto, "concat", JS_OBJECT_TYPE, JSObject::kHeaderSize,
|
|
|
|
MaybeHandle<JSObject>(), Builtins::kArrayConcat);
|
|
|
|
|
|
|
|
// Make sure that InternalArray.prototype.concat appears to be compiled.
|
|
|
|
// The code will never be called, but inline caching for call will
|
|
|
|
// only work if it appears to be compiled.
|
|
|
|
concat->shared()->DontAdaptArguments();
|
|
|
|
DCHECK(concat->is_compiled());
|
|
|
|
// Set the lengths for the functions to satisfy ECMA-262.
|
|
|
|
concat->shared()->set_length(1);
|
|
|
|
}
|
2008-09-15 15:02:38 +00:00
|
|
|
// Install Function.prototype.call and apply.
|
2014-08-18 07:54:19 +00:00
|
|
|
{
|
|
|
|
Handle<String> key = factory()->Function_string();
|
2008-09-15 15:02:38 +00:00
|
|
|
Handle<JSFunction> function =
|
2014-03-28 09:49:27 +00:00
|
|
|
Handle<JSFunction>::cast(Object::GetProperty(
|
2014-07-01 12:12:34 +00:00
|
|
|
handle(native_context()->global_object()), key).ToHandleChecked());
|
2008-07-03 15:10:15 +00:00
|
|
|
Handle<JSObject> proto =
|
|
|
|
Handle<JSObject>(JSObject::cast(function->instance_prototype()));
|
2008-09-15 15:02:38 +00:00
|
|
|
|
|
|
|
// Install the call and the apply functions.
|
2008-07-03 15:10:15 +00:00
|
|
|
Handle<JSFunction> call =
|
2015-08-31 10:09:52 +00:00
|
|
|
InstallFunction(proto, "call", JS_OBJECT_TYPE, JSObject::kHeaderSize,
|
|
|
|
MaybeHandle<JSObject>(), Builtins::kFunctionCall);
|
|
|
|
Handle<JSFunction> apply =
|
|
|
|
InstallFunction(proto, "apply", JS_OBJECT_TYPE, JSObject::kHeaderSize,
|
|
|
|
MaybeHandle<JSObject>(), Builtins::kFunctionApply);
|
2015-09-28 09:42:09 +00:00
|
|
|
Handle<TypeFeedbackVector> feedback_vector =
|
|
|
|
TypeFeedbackVector::CreatePushAppliedArgumentsVector(isolate());
|
|
|
|
apply->shared()->set_feedback_vector(*feedback_vector);
|
2015-08-31 10:09:52 +00:00
|
|
|
|
2008-07-03 15:10:15 +00:00
|
|
|
// Make sure that Function.prototype.call appears to be compiled.
|
|
|
|
// The code will never be called, but inline caching for call will
|
|
|
|
// only work if it appears to be compiled.
|
2015-08-31 10:09:52 +00:00
|
|
|
call->shared()->DontAdaptArguments();
|
2014-08-04 11:34:54 +00:00
|
|
|
DCHECK(call->is_compiled());
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2009-01-15 19:08:34 +00:00
|
|
|
// Set the expected parameters for apply to 2; required by builtin.
|
2015-02-11 09:47:32 +00:00
|
|
|
apply->shared()->set_internal_formal_parameter_count(2);
|
2015-08-31 10:09:52 +00:00
|
|
|
|
|
|
|
// Set the lengths for the functions to satisfy ECMA-262.
|
|
|
|
call->shared()->set_length(1);
|
|
|
|
apply->shared()->set_length(2);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
2011-08-10 16:05:17 +00:00
|
|
|
InstallBuiltinFunctionIds();
|
|
|
|
|
2010-04-13 09:31:03 +00:00
|
|
|
// Create a constructor for RegExp results (a variant of Array that
|
|
|
|
// predefines the two properties index and match).
|
|
|
|
{
|
|
|
|
// RegExpResult initial map.
|
|
|
|
|
|
|
|
// Find global.Array.prototype to inherit from.
|
2012-08-17 09:03:08 +00:00
|
|
|
Handle<JSFunction> array_constructor(native_context()->array_function());
|
2010-04-13 09:31:03 +00:00
|
|
|
Handle<JSObject> array_prototype(
|
|
|
|
JSObject::cast(array_constructor->instance_prototype()));
|
|
|
|
|
|
|
|
// Add initial map.
|
|
|
|
Handle<Map> initial_map =
|
2013-02-18 10:25:21 +00:00
|
|
|
factory()->NewMap(JS_ARRAY_TYPE, JSRegExpResult::kSize);
|
2015-02-24 20:50:06 +00:00
|
|
|
initial_map->SetConstructor(*array_constructor);
|
2010-04-13 09:31:03 +00:00
|
|
|
|
|
|
|
// Set prototype on map.
|
|
|
|
initial_map->set_non_instance_prototype(false);
|
2015-04-10 12:13:18 +00:00
|
|
|
Map::SetPrototype(initial_map, array_prototype);
|
2010-04-13 09:31:03 +00:00
|
|
|
|
|
|
|
// Update map with length accessor from Array and add "index" and "input".
|
2014-04-11 12:13:53 +00:00
|
|
|
Map::EnsureDescriptorSlack(initial_map, 3);
|
2011-10-21 10:32:38 +00:00
|
|
|
|
2012-07-19 10:01:52 +00:00
|
|
|
{
|
2012-08-17 09:03:08 +00:00
|
|
|
JSFunction* array_function = native_context()->array_function();
|
2012-07-19 10:01:52 +00:00
|
|
|
Handle<DescriptorArray> array_descriptors(
|
|
|
|
array_function->initial_map()->instance_descriptors());
|
2014-04-09 14:26:32 +00:00
|
|
|
Handle<String> length = factory()->length_string();
|
Sharing of descriptor arrays.
This CL adds multiple things:
Transition arrays do not directly point at their descriptor array anymore, but rather do so via an indirect pointer (a JSGlobalPropertyCell).
An ownership bit is added to maps indicating whether it owns its own descriptor array or not.
Maps owning a descriptor array can pass on ownership if a transition from that map is generated; but only if the descriptor array stays exactly the same; or if a descriptor is added.
Maps that don't have ownership get ownership back if their direct child to which ownership was passed is cleared in ClearNonLiveTransitions.
To detect which descriptors in an array are valid, each map knows its own NumberOfOwnDescriptors. Since the descriptors are sorted in order of addition, if we search and find a descriptor with index bigger than this number, it is not valid for the given map.
We currently still build up an enumeration cache (although this may disappear). The enumeration cache is always built for the entire descriptor array, even if not all descriptors are owned by the map. Once a descriptor array has an enumeration cache for a given map; this invariant will always be true, even if the descriptor array was extended. The extended array will inherit the enumeration cache from the smaller descriptor array. If a map with more descriptors needs an enumeration cache, it's EnumLength will still be set to invalid, so it will have to recompute the enumeration cache. This new cache will also be valid for smaller maps since they have their own enumlength; and use this to loop over the cache. If the EnumLength is still invalid, but there is already a cache present that is big enough; we just initialize the EnumLength field for the map.
When we apply ClearNonLiveTransitions and descriptor ownership is passed back to a parent map, the descriptor array is trimmed in-place and resorted. At the same time, the enumeration cache is trimmed in-place.
Only transition arrays contain descriptor arrays. If we transition to a map and pass ownership of the descriptor array along, the child map will not store the descriptor array it owns. Rather its parent will keep the pointer. So for every leaf-map, we find the descriptor array by following the back pointer, reading out the transition array, and fetching the descriptor array from the JSGlobalPropertyCell. If a map has a transition array, we fetch it from there. If a map has undefined as its back-pointer and has no transition array; it is considered to have an empty descriptor array.
When we modify properties, we cannot share the descriptor array. To accommodate this, the child map will get its own transition array; even if there are not necessarily any transitions leaving from the child map. This is necessary since it's the only way to store its own descriptor array.
Review URL: https://chromiumcodereview.appspot.com/10909007
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@12492 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2012-09-12 16:43:57 +00:00
|
|
|
int old = array_descriptors->SearchWithCache(
|
2014-04-09 14:26:32 +00:00
|
|
|
*length, array_function->initial_map());
|
2014-08-04 11:34:54 +00:00
|
|
|
DCHECK(old != DescriptorArray::kNotFound);
|
2015-01-19 17:49:13 +00:00
|
|
|
AccessorConstantDescriptor desc(
|
|
|
|
length, handle(array_descriptors->GetValue(old), isolate()),
|
|
|
|
array_descriptors->GetDetails(old).attributes());
|
2014-04-11 12:13:53 +00:00
|
|
|
initial_map->AppendDescriptor(&desc);
|
2012-07-19 10:01:52 +00:00
|
|
|
}
|
2010-04-13 09:31:03 +00:00
|
|
|
{
|
2015-01-19 17:49:13 +00:00
|
|
|
DataDescriptor index_field(factory()->index_string(),
|
|
|
|
JSRegExpResult::kIndexIndex, NONE,
|
|
|
|
Representation::Tagged());
|
2014-04-11 12:13:53 +00:00
|
|
|
initial_map->AppendDescriptor(&index_field);
|
2010-04-13 09:31:03 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
{
|
2015-01-19 17:49:13 +00:00
|
|
|
DataDescriptor input_field(factory()->input_string(),
|
|
|
|
JSRegExpResult::kInputIndex, NONE,
|
|
|
|
Representation::Tagged());
|
2014-04-11 12:13:53 +00:00
|
|
|
initial_map->AppendDescriptor(&input_field);
|
2010-04-13 09:31:03 +00:00
|
|
|
}
|
|
|
|
|
2015-08-11 19:36:04 +00:00
|
|
|
initial_map->SetInObjectProperties(2);
|
2010-04-13 09:31:03 +00:00
|
|
|
initial_map->set_unused_property_fields(0);
|
|
|
|
|
2012-08-17 09:03:08 +00:00
|
|
|
native_context()->set_regexp_result_map(*initial_map);
|
2010-04-13 09:31:03 +00:00
|
|
|
}
|
|
|
|
|
2014-08-25 09:12:22 +00:00
|
|
|
// Add @@iterator method to the arguments object maps.
|
|
|
|
{
|
|
|
|
PropertyAttributes attribs = DONT_ENUM;
|
|
|
|
Handle<AccessorInfo> arguments_iterator =
|
|
|
|
Accessors::ArgumentsIteratorInfo(isolate(), attribs);
|
|
|
|
{
|
2015-01-19 17:49:13 +00:00
|
|
|
AccessorConstantDescriptor d(factory()->iterator_symbol(),
|
|
|
|
arguments_iterator, attribs);
|
2014-08-25 09:12:22 +00:00
|
|
|
Handle<Map> map(native_context()->sloppy_arguments_map());
|
|
|
|
Map::EnsureDescriptorSlack(map, 1);
|
|
|
|
map->AppendDescriptor(&d);
|
|
|
|
}
|
|
|
|
{
|
2015-01-19 17:49:13 +00:00
|
|
|
AccessorConstantDescriptor d(factory()->iterator_symbol(),
|
|
|
|
arguments_iterator, attribs);
|
2015-07-02 14:38:37 +00:00
|
|
|
Handle<Map> map(native_context()->fast_aliased_arguments_map());
|
|
|
|
Map::EnsureDescriptorSlack(map, 1);
|
|
|
|
map->AppendDescriptor(&d);
|
|
|
|
}
|
|
|
|
{
|
|
|
|
AccessorConstantDescriptor d(factory()->iterator_symbol(),
|
|
|
|
arguments_iterator, attribs);
|
|
|
|
Handle<Map> map(native_context()->slow_aliased_arguments_map());
|
2014-08-25 09:12:22 +00:00
|
|
|
Map::EnsureDescriptorSlack(map, 1);
|
|
|
|
map->AppendDescriptor(&d);
|
|
|
|
}
|
|
|
|
{
|
2015-01-19 17:49:13 +00:00
|
|
|
AccessorConstantDescriptor d(factory()->iterator_symbol(),
|
|
|
|
arguments_iterator, attribs);
|
2014-08-25 09:12:22 +00:00
|
|
|
Handle<Map> map(native_context()->strict_arguments_map());
|
|
|
|
Map::EnsureDescriptorSlack(map, 1);
|
|
|
|
map->AppendDescriptor(&d);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-03-23 11:40:38 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-04-15 12:31:03 +00:00
|
|
|
bool Genesis::InstallExperimentalNatives() {
|
2014-12-10 08:58:04 +00:00
|
|
|
static const char* harmony_array_includes_natives[] = {
|
2015-04-22 12:35:05 +00:00
|
|
|
"native harmony-array-includes.js", nullptr};
|
|
|
|
static const char* harmony_proxies_natives[] = {"native proxy.js", nullptr};
|
|
|
|
static const char* harmony_modules_natives[] = {nullptr};
|
|
|
|
static const char* harmony_regexps_natives[] = {"native harmony-regexp.js",
|
|
|
|
nullptr};
|
2015-11-02 08:42:43 +00:00
|
|
|
static const char* harmony_tostring_natives[] = {nullptr};
|
2015-04-22 12:35:05 +00:00
|
|
|
static const char* harmony_sloppy_natives[] = {nullptr};
|
2015-08-11 23:59:47 +00:00
|
|
|
static const char* harmony_sloppy_function_natives[] = {nullptr};
|
2015-07-25 00:05:08 +00:00
|
|
|
static const char* harmony_sloppy_let_natives[] = {nullptr};
|
2015-04-22 12:35:05 +00:00
|
|
|
static const char* harmony_unicode_regexps_natives[] = {nullptr};
|
|
|
|
static const char* harmony_rest_parameters_natives[] = {nullptr};
|
2015-08-17 12:01:55 +00:00
|
|
|
static const char* harmony_default_parameters_natives[] = {nullptr};
|
2015-03-19 14:47:18 +00:00
|
|
|
static const char* harmony_reflect_natives[] = {"native harmony-reflect.js",
|
2015-04-22 12:35:05 +00:00
|
|
|
nullptr};
|
|
|
|
static const char* harmony_destructuring_natives[] = {nullptr};
|
2015-08-04 20:52:42 +00:00
|
|
|
static const char* harmony_object_observe_natives[] = {
|
|
|
|
"native harmony-object-observe.js", nullptr};
|
2015-05-22 13:43:38 +00:00
|
|
|
static const char* harmony_sharedarraybuffer_natives[] = {
|
2015-09-01 18:33:51 +00:00
|
|
|
"native harmony-sharedarraybuffer.js", "native harmony-atomics.js", NULL};
|
2015-11-02 08:42:43 +00:00
|
|
|
static const char* harmony_concat_spreadable_natives[] = {nullptr};
|
2015-07-16 19:43:21 +00:00
|
|
|
static const char* harmony_simd_natives[] = {"native harmony-simd.js",
|
|
|
|
nullptr};
|
2015-09-16 18:01:38 +00:00
|
|
|
static const char* harmony_tolength_natives[] = {nullptr};
|
2015-10-08 13:56:49 +00:00
|
|
|
static const char* harmony_completion_natives[] = {nullptr};
|
2015-10-21 02:55:47 +00:00
|
|
|
static const char* harmony_do_expressions_natives[] = {nullptr};
|
2015-11-02 08:42:43 +00:00
|
|
|
static const char* harmony_regexp_subclass_natives[] = {nullptr};
|
2014-10-20 13:33:34 +00:00
|
|
|
|
2011-05-13 10:58:25 +00:00
|
|
|
for (int i = ExperimentalNatives::GetDebuggerCount();
|
2014-10-20 13:33:34 +00:00
|
|
|
i < ExperimentalNatives::GetBuiltinsCount(); i++) {
|
2014-12-02 18:53:27 +00:00
|
|
|
#define INSTALL_EXPERIMENTAL_NATIVES(id, desc) \
|
|
|
|
if (FLAG_##id) { \
|
|
|
|
for (size_t j = 0; id##_natives[j] != NULL; j++) { \
|
|
|
|
Vector<const char> script_name = ExperimentalNatives::GetScriptName(i); \
|
|
|
|
if (strncmp(script_name.start(), id##_natives[j], \
|
|
|
|
script_name.length()) == 0) { \
|
2015-07-13 09:45:43 +00:00
|
|
|
if (!Bootstrapper::CompileExperimentalBuiltin(isolate(), i)) { \
|
|
|
|
return false; \
|
|
|
|
} \
|
2014-12-02 18:53:27 +00:00
|
|
|
} \
|
|
|
|
} \
|
2014-10-20 13:33:34 +00:00
|
|
|
}
|
2014-11-04 16:05:27 +00:00
|
|
|
HARMONY_INPROGRESS(INSTALL_EXPERIMENTAL_NATIVES);
|
|
|
|
HARMONY_STAGED(INSTALL_EXPERIMENTAL_NATIVES);
|
2014-11-28 20:07:11 +00:00
|
|
|
HARMONY_SHIPPING(INSTALL_EXPERIMENTAL_NATIVES);
|
2014-10-20 13:33:34 +00:00
|
|
|
#undef INSTALL_EXPERIMENTAL_NATIVES
|
|
|
|
}
|
|
|
|
|
2015-06-05 15:52:04 +00:00
|
|
|
if (!CallUtilsFunction(isolate(), "PostExperimentals")) return false;
|
2015-05-26 07:24:13 +00:00
|
|
|
|
2015-06-03 17:58:29 +00:00
|
|
|
InstallExperimentalBuiltinFunctionIds();
|
2011-04-15 12:31:03 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-05-08 08:44:47 +00:00
|
|
|
bool Genesis::InstallExtraNatives() {
|
2015-08-14 18:47:46 +00:00
|
|
|
HandleScope scope(isolate());
|
|
|
|
|
|
|
|
Handle<JSObject> extras_binding =
|
|
|
|
factory()->NewJSObject(isolate()->object_function());
|
|
|
|
native_context()->set_extras_binding_object(*extras_binding);
|
|
|
|
|
2015-05-08 08:44:47 +00:00
|
|
|
for (int i = ExtraNatives::GetDebuggerCount();
|
|
|
|
i < ExtraNatives::GetBuiltinsCount(); i++) {
|
2015-07-13 09:45:43 +00:00
|
|
|
if (!Bootstrapper::CompileExtraBuiltin(isolate(), i)) return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-08-20 00:01:07 +00:00
|
|
|
bool Genesis::InstallExperimentalExtraNatives() {
|
|
|
|
for (int i = ExperimentalExtraNatives::GetDebuggerCount();
|
|
|
|
i < ExperimentalExtraNatives::GetBuiltinsCount(); i++) {
|
|
|
|
if (!Bootstrapper::CompileExperimentalExtraBuiltin(isolate(), i))
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-08-12 14:22:07 +00:00
|
|
|
bool Genesis::InstallDebuggerNatives() {
|
|
|
|
for (int i = 0; i < Natives::GetDebuggerCount(); ++i) {
|
|
|
|
if (!Bootstrapper::CompileBuiltin(isolate(), i)) return false;
|
|
|
|
}
|
|
|
|
return CallUtilsFunction(isolate(), "PostDebug");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-07-13 09:45:43 +00:00
|
|
|
bool Bootstrapper::InstallCodeStubNatives(Isolate* isolate) {
|
|
|
|
for (int i = CodeStubNatives::GetDebuggerCount();
|
|
|
|
i < CodeStubNatives::GetBuiltinsCount(); i++) {
|
|
|
|
if (!CompileCodeStubBuiltin(isolate, i)) return false;
|
2015-05-08 08:44:47 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2010-12-14 18:53:48 +00:00
|
|
|
static void InstallBuiltinFunctionId(Handle<JSObject> holder,
|
|
|
|
const char* function_name,
|
|
|
|
BuiltinFunctionId id) {
|
2014-04-16 13:28:11 +00:00
|
|
|
Isolate* isolate = holder->GetIsolate();
|
2014-04-11 12:47:34 +00:00
|
|
|
Handle<Object> function_object =
|
2014-04-16 13:28:11 +00:00
|
|
|
Object::GetProperty(isolate, holder, function_name).ToHandleChecked();
|
2014-04-09 12:21:47 +00:00
|
|
|
Handle<JSFunction> function = Handle<JSFunction>::cast(function_object);
|
2010-05-06 13:21:53 +00:00
|
|
|
function->shared()->set_function_data(Smi::FromInt(id));
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-06-03 17:58:29 +00:00
|
|
|
#define INSTALL_BUILTIN_ID(holder_expr, fun_name, name) \
|
|
|
|
{ #holder_expr, #fun_name, k##name } \
|
|
|
|
,
|
|
|
|
|
|
|
|
|
2010-12-14 18:53:48 +00:00
|
|
|
void Genesis::InstallBuiltinFunctionIds() {
|
2013-02-15 09:27:10 +00:00
|
|
|
HandleScope scope(isolate());
|
2015-02-27 15:21:42 +00:00
|
|
|
struct BuiltinFunctionIds {
|
|
|
|
const char* holder_expr;
|
|
|
|
const char* fun_name;
|
|
|
|
BuiltinFunctionId id;
|
|
|
|
};
|
|
|
|
|
|
|
|
const BuiltinFunctionIds builtins[] = {
|
|
|
|
FUNCTIONS_WITH_ID_LIST(INSTALL_BUILTIN_ID)};
|
|
|
|
|
|
|
|
for (const BuiltinFunctionIds& builtin : builtins) {
|
|
|
|
Handle<JSObject> holder =
|
|
|
|
ResolveBuiltinIdHolder(native_context(), builtin.holder_expr);
|
|
|
|
InstallBuiltinFunctionId(holder, builtin.fun_name, builtin.id);
|
|
|
|
}
|
2010-05-06 13:21:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2015-06-03 17:58:29 +00:00
|
|
|
void Genesis::InstallExperimentalBuiltinFunctionIds() {
|
2015-09-01 18:33:51 +00:00
|
|
|
if (FLAG_harmony_sharedarraybuffer) {
|
2015-06-03 17:58:29 +00:00
|
|
|
struct BuiltinFunctionIds {
|
|
|
|
const char* holder_expr;
|
|
|
|
const char* fun_name;
|
|
|
|
BuiltinFunctionId id;
|
|
|
|
};
|
|
|
|
|
|
|
|
const BuiltinFunctionIds atomic_builtins[] = {
|
|
|
|
ATOMIC_FUNCTIONS_WITH_ID_LIST(INSTALL_BUILTIN_ID)};
|
|
|
|
|
|
|
|
for (const BuiltinFunctionIds& builtin : atomic_builtins) {
|
|
|
|
Handle<JSObject> holder =
|
|
|
|
ResolveBuiltinIdHolder(native_context(), builtin.holder_expr);
|
|
|
|
InstallBuiltinFunctionId(holder, builtin.fun_name, builtin.id);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
#undef INSTALL_BUILTIN_ID
|
|
|
|
|
|
|
|
|
2010-08-25 13:25:54 +00:00
|
|
|
void Genesis::InitializeNormalizedMapCaches() {
|
2014-05-02 13:03:39 +00:00
|
|
|
Handle<NormalizedMapCache> cache = NormalizedMapCache::New(isolate());
|
|
|
|
native_context()->set_normalized_map_cache(*cache);
|
2010-08-25 13:25:54 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-08-17 09:03:08 +00:00
|
|
|
bool Bootstrapper::InstallExtensions(Handle<Context> native_context,
|
2010-03-23 11:40:38 +00:00
|
|
|
v8::ExtensionConfiguration* extensions) {
|
2013-02-15 09:27:10 +00:00
|
|
|
BootstrapperActive active(this);
|
|
|
|
SaveContext saved_context(isolate_);
|
|
|
|
isolate_->set_context(*native_context);
|
2014-01-16 13:18:28 +00:00
|
|
|
return Genesis::InstallExtensions(native_context, extensions) &&
|
|
|
|
Genesis::InstallSpecialObjects(native_context);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-01-16 13:18:28 +00:00
|
|
|
bool Genesis::InstallSpecialObjects(Handle<Context> native_context) {
|
2012-08-17 09:03:08 +00:00
|
|
|
Isolate* isolate = native_context->GetIsolate();
|
2014-07-07 13:27:37 +00:00
|
|
|
// Don't install extensions into the snapshot.
|
|
|
|
if (isolate->serializer_enabled()) return true;
|
|
|
|
|
2012-01-05 17:16:19 +00:00
|
|
|
Factory* factory = isolate->factory();
|
2013-02-15 09:27:10 +00:00
|
|
|
HandleScope scope(isolate);
|
2012-08-17 12:59:00 +00:00
|
|
|
Handle<JSGlobalObject> global(JSGlobalObject::cast(
|
|
|
|
native_context->global_object()));
|
2014-07-07 13:27:37 +00:00
|
|
|
|
|
|
|
Handle<JSObject> Error = Handle<JSObject>::cast(
|
|
|
|
Object::GetProperty(isolate, global, "Error").ToHandleChecked());
|
|
|
|
Handle<String> name =
|
2014-09-10 12:38:12 +00:00
|
|
|
factory->InternalizeOneByteString(STATIC_CHAR_VECTOR("stackTraceLimit"));
|
2014-07-07 13:27:37 +00:00
|
|
|
Handle<Smi> stack_trace_limit(Smi::FromInt(FLAG_stack_trace_limit), isolate);
|
|
|
|
JSObject::AddProperty(Error, name, stack_trace_limit, NONE);
|
|
|
|
|
2008-08-14 13:41:48 +00:00
|
|
|
// Expose the debug global object in global if a name for it is specified.
|
|
|
|
if (FLAG_expose_debug_as != NULL && strlen(FLAG_expose_debug_as) != 0) {
|
|
|
|
// If loading fails we just bail out without installing the
|
|
|
|
// debugger but without tanking the whole context.
|
2014-05-20 08:52:42 +00:00
|
|
|
Debug* debug = isolate->debug();
|
2014-01-16 13:18:28 +00:00
|
|
|
if (!debug->Load()) return true;
|
2014-05-20 08:52:42 +00:00
|
|
|
Handle<Context> debug_context = debug->debug_context();
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
// Set the security token for the debugger context to the same as
|
2012-08-17 09:03:08 +00:00
|
|
|
// the shell native context to allow calling between these (otherwise
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
// exposing debug global object doesn't make much sense).
|
2014-05-20 08:52:42 +00:00
|
|
|
debug_context->set_security_token(native_context->security_token());
|
2008-08-14 13:41:48 +00:00
|
|
|
Handle<String> debug_string =
|
2013-02-28 17:03:34 +00:00
|
|
|
factory->InternalizeUtf8String(FLAG_expose_debug_as);
|
2014-08-20 11:52:22 +00:00
|
|
|
uint32_t index;
|
|
|
|
if (debug_string->AsArrayIndex(&index)) return true;
|
2014-05-20 08:52:42 +00:00
|
|
|
Handle<Object> global_proxy(debug_context->global_proxy(), isolate);
|
2014-07-07 13:27:37 +00:00
|
|
|
JSObject::AddProperty(global, debug_string, global_proxy, DONT_ENUM);
|
2008-08-14 13:41:48 +00:00
|
|
|
}
|
2015-08-27 14:42:36 +00:00
|
|
|
|
|
|
|
#if defined(V8_WASM)
|
|
|
|
WasmJs::Install(isolate, global);
|
|
|
|
#endif
|
|
|
|
|
2014-01-16 13:18:28 +00:00
|
|
|
return true;
|
2008-08-14 13:41:48 +00:00
|
|
|
}
|
|
|
|
|
2013-07-05 09:52:11 +00:00
|
|
|
|
2011-11-15 22:48:55 +00:00
|
|
|
static uint32_t Hash(RegisteredExtension* extension) {
|
|
|
|
return v8::internal::ComputePointerHash(extension);
|
|
|
|
}
|
|
|
|
|
2013-07-05 09:52:11 +00:00
|
|
|
|
2014-04-15 14:48:21 +00:00
|
|
|
Genesis::ExtensionStates::ExtensionStates() : map_(HashMap::PointersMatch, 8) {}
|
2011-11-15 22:48:55 +00:00
|
|
|
|
|
|
|
Genesis::ExtensionTraversalState Genesis::ExtensionStates::get_state(
|
|
|
|
RegisteredExtension* extension) {
|
2015-04-13 19:01:15 +00:00
|
|
|
i::HashMap::Entry* entry = map_.Lookup(extension, Hash(extension));
|
2011-11-15 22:48:55 +00:00
|
|
|
if (entry == NULL) {
|
|
|
|
return UNVISITED;
|
|
|
|
}
|
|
|
|
return static_cast<ExtensionTraversalState>(
|
|
|
|
reinterpret_cast<intptr_t>(entry->value));
|
|
|
|
}
|
|
|
|
|
|
|
|
void Genesis::ExtensionStates::set_state(RegisteredExtension* extension,
|
|
|
|
ExtensionTraversalState state) {
|
2015-04-13 19:01:15 +00:00
|
|
|
map_.LookupOrInsert(extension, Hash(extension))->value =
|
2011-11-15 22:48:55 +00:00
|
|
|
reinterpret_cast<void*>(static_cast<intptr_t>(state));
|
|
|
|
}
|
2008-08-14 13:41:48 +00:00
|
|
|
|
2014-01-16 13:18:28 +00:00
|
|
|
|
2012-08-17 09:03:08 +00:00
|
|
|
bool Genesis::InstallExtensions(Handle<Context> native_context,
|
2010-03-23 11:40:38 +00:00
|
|
|
v8::ExtensionConfiguration* extensions) {
|
2013-02-15 09:27:10 +00:00
|
|
|
Isolate* isolate = native_context->GetIsolate();
|
2011-11-15 23:26:22 +00:00
|
|
|
ExtensionStates extension_states; // All extensions have state UNVISITED.
|
2014-01-16 13:18:28 +00:00
|
|
|
return InstallAutoExtensions(isolate, &extension_states) &&
|
|
|
|
(!FLAG_expose_free_buffer ||
|
|
|
|
InstallExtension(isolate, "v8/free-buffer", &extension_states)) &&
|
|
|
|
(!FLAG_expose_gc ||
|
|
|
|
InstallExtension(isolate, "v8/gc", &extension_states)) &&
|
|
|
|
(!FLAG_expose_externalize_string ||
|
|
|
|
InstallExtension(isolate, "v8/externalize", &extension_states)) &&
|
|
|
|
(!FLAG_track_gc_object_stats ||
|
|
|
|
InstallExtension(isolate, "v8/statistics", &extension_states)) &&
|
|
|
|
(!FLAG_expose_trigger_failure ||
|
|
|
|
InstallExtension(isolate, "v8/trigger-failure", &extension_states)) &&
|
|
|
|
InstallRequestedExtensions(isolate, extensions, &extension_states);
|
|
|
|
}
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2014-01-16 13:18:28 +00:00
|
|
|
|
|
|
|
bool Genesis::InstallAutoExtensions(Isolate* isolate,
|
|
|
|
ExtensionStates* extension_states) {
|
|
|
|
for (v8::RegisteredExtension* it = v8::RegisteredExtension::first_extension();
|
|
|
|
it != NULL;
|
|
|
|
it = it->next()) {
|
|
|
|
if (it->extension()->auto_enable() &&
|
|
|
|
!InstallExtension(isolate, it, extension_states)) {
|
|
|
|
return false;
|
|
|
|
}
|
2013-12-05 17:26:22 +00:00
|
|
|
}
|
2014-01-16 13:18:28 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2014-01-16 13:18:28 +00:00
|
|
|
bool Genesis::InstallRequestedExtensions(Isolate* isolate,
|
|
|
|
v8::ExtensionConfiguration* extensions,
|
|
|
|
ExtensionStates* extension_states) {
|
2014-01-16 08:17:40 +00:00
|
|
|
for (const char** it = extensions->begin(); it != extensions->end(); ++it) {
|
2014-01-16 13:18:28 +00:00
|
|
|
if (!InstallExtension(isolate, *it, extension_states)) return false;
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// Installs a named extension. This methods is unoptimized and does
|
|
|
|
// not scale well if we want to support a large number of extensions.
|
2013-02-15 09:27:10 +00:00
|
|
|
bool Genesis::InstallExtension(Isolate* isolate,
|
|
|
|
const char* name,
|
2011-11-15 22:48:55 +00:00
|
|
|
ExtensionStates* extension_states) {
|
2014-01-16 13:18:28 +00:00
|
|
|
for (v8::RegisteredExtension* it = v8::RegisteredExtension::first_extension();
|
|
|
|
it != NULL;
|
|
|
|
it = it->next()) {
|
|
|
|
if (strcmp(name, it->extension()->name()) == 0) {
|
|
|
|
return InstallExtension(isolate, it, extension_states);
|
|
|
|
}
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
2014-01-16 13:18:28 +00:00
|
|
|
return Utils::ApiCheck(false,
|
|
|
|
"v8::Context::New()",
|
|
|
|
"Cannot find required extension");
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2013-02-15 09:27:10 +00:00
|
|
|
bool Genesis::InstallExtension(Isolate* isolate,
|
|
|
|
v8::RegisteredExtension* current,
|
2011-11-15 22:48:55 +00:00
|
|
|
ExtensionStates* extension_states) {
|
2013-02-15 09:27:10 +00:00
|
|
|
HandleScope scope(isolate);
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2011-11-15 22:48:55 +00:00
|
|
|
if (extension_states->get_state(current) == INSTALLED) return true;
|
2008-07-03 15:10:15 +00:00
|
|
|
// The current node has already been visited so there must be a
|
|
|
|
// cycle in the dependency graph; fail.
|
2014-01-13 09:42:23 +00:00
|
|
|
if (!Utils::ApiCheck(extension_states->get_state(current) != VISITED,
|
|
|
|
"v8::Context::New()",
|
|
|
|
"Circular extension dependency")) {
|
2008-07-03 15:10:15 +00:00
|
|
|
return false;
|
|
|
|
}
|
2014-08-04 11:34:54 +00:00
|
|
|
DCHECK(extension_states->get_state(current) == UNVISITED);
|
2011-11-15 22:48:55 +00:00
|
|
|
extension_states->set_state(current, VISITED);
|
2008-07-03 15:10:15 +00:00
|
|
|
v8::Extension* extension = current->extension();
|
|
|
|
// Install the extension's dependencies
|
|
|
|
for (int i = 0; i < extension->dependency_count(); i++) {
|
2013-02-15 09:27:10 +00:00
|
|
|
if (!InstallExtension(isolate,
|
|
|
|
extension->dependencies()[i],
|
|
|
|
extension_states)) {
|
2011-11-15 22:48:55 +00:00
|
|
|
return false;
|
2013-02-15 09:27:10 +00:00
|
|
|
}
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
2014-03-25 09:09:24 +00:00
|
|
|
// We do not expect this to throw an exception. Change this if it does.
|
2015-05-12 14:00:47 +00:00
|
|
|
bool result = CompileExtension(isolate, extension);
|
2014-08-04 11:34:54 +00:00
|
|
|
DCHECK(isolate->has_pending_exception() != result);
|
2008-07-03 15:10:15 +00:00
|
|
|
if (!result) {
|
2011-10-25 13:43:19 +00:00
|
|
|
// We print out the name of the extension that fail to install.
|
|
|
|
// When an error is thrown during bootstrapping we automatically print
|
|
|
|
// the line number at which this happened to the console in the isolate
|
|
|
|
// error throwing functionality.
|
2014-06-30 13:25:46 +00:00
|
|
|
base::OS::PrintError("Error installing extension '%s'.\n",
|
|
|
|
current->extension()->name());
|
2011-03-28 13:09:37 +00:00
|
|
|
isolate->clear_pending_exception();
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
2011-11-15 22:48:55 +00:00
|
|
|
extension_states->set_state(current, INSTALLED);
|
|
|
|
isolate->NotifyExtensionInstalled();
|
2008-07-03 15:10:15 +00:00
|
|
|
return result;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
bool Genesis::ConfigureGlobalObjects(
|
2015-07-06 07:09:07 +00:00
|
|
|
v8::Local<v8::ObjectTemplate> global_proxy_template) {
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
Handle<JSObject> global_proxy(
|
2012-08-17 09:03:08 +00:00
|
|
|
JSObject::cast(native_context()->global_proxy()));
|
2014-07-01 12:12:34 +00:00
|
|
|
Handle<JSObject> global_object(
|
2012-08-17 12:59:00 +00:00
|
|
|
JSObject::cast(native_context()->global_object()));
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
|
|
|
|
if (!global_proxy_template.IsEmpty()) {
|
2008-10-21 20:08:49 +00:00
|
|
|
// Configure the global proxy object.
|
2014-07-01 12:12:34 +00:00
|
|
|
Handle<ObjectTemplateInfo> global_proxy_data =
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
v8::Utils::OpenHandle(*global_proxy_template);
|
2014-07-01 12:12:34 +00:00
|
|
|
if (!ConfigureApiObject(global_proxy, global_proxy_data)) return false;
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
|
2014-07-01 12:12:34 +00:00
|
|
|
// Configure the global object.
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
Handle<FunctionTemplateInfo> proxy_constructor(
|
2014-07-01 12:12:34 +00:00
|
|
|
FunctionTemplateInfo::cast(global_proxy_data->constructor()));
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
if (!proxy_constructor->prototype_template()->IsUndefined()) {
|
2014-07-01 12:12:34 +00:00
|
|
|
Handle<ObjectTemplateInfo> global_object_data(
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
ObjectTemplateInfo::cast(proxy_constructor->prototype_template()));
|
2014-07-01 12:12:34 +00:00
|
|
|
if (!ConfigureApiObject(global_object, global_object_data)) return false;
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
}
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
|
2014-07-01 12:12:34 +00:00
|
|
|
SetObjectPrototype(global_proxy, global_object);
|
2013-05-13 07:35:26 +00:00
|
|
|
|
|
|
|
native_context()->set_initial_array_prototype(
|
|
|
|
JSArray::cast(native_context()->array_function()->prototype()));
|
2015-06-01 14:22:58 +00:00
|
|
|
native_context()->set_array_buffer_map(
|
|
|
|
native_context()->array_buffer_fun()->initial_map());
|
2015-06-01 23:16:27 +00:00
|
|
|
native_context()->set_js_map_map(
|
|
|
|
native_context()->js_map_fun()->initial_map());
|
|
|
|
native_context()->set_js_set_map(
|
|
|
|
native_context()->js_set_fun()->initial_map());
|
2013-05-13 07:35:26 +00:00
|
|
|
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2008-10-21 20:08:49 +00:00
|
|
|
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
bool Genesis::ConfigureApiObject(Handle<JSObject> object,
|
2014-07-01 12:12:34 +00:00
|
|
|
Handle<ObjectTemplateInfo> object_template) {
|
2014-08-04 11:34:54 +00:00
|
|
|
DCHECK(!object_template.is_null());
|
|
|
|
DCHECK(FunctionTemplateInfo::cast(object_template->constructor())
|
2013-11-19 13:38:15 +00:00
|
|
|
->IsTemplateFor(object->map()));;
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
|
2014-04-11 10:41:09 +00:00
|
|
|
MaybeHandle<JSObject> maybe_obj =
|
2015-02-04 13:01:34 +00:00
|
|
|
ApiNatives::InstantiateObject(object_template);
|
2014-04-11 10:41:09 +00:00
|
|
|
Handle<JSObject> obj;
|
|
|
|
if (!maybe_obj.ToHandle(&obj)) {
|
2014-08-04 11:34:54 +00:00
|
|
|
DCHECK(isolate()->has_pending_exception());
|
2011-04-14 08:01:19 +00:00
|
|
|
isolate()->clear_pending_exception();
|
Split window support from V8.
Here is a description of the background and design of split window in Chrome and V8:
https://docs.google.com/a/google.com/Doc?id=chhjkpg_47fwddxbfr
This change list splits the window object into two parts: 1) an inner window object used as the global object of contexts; 2) an outer window object exposed to JavaScript and accessible by the name 'window'. Firefox did it awhile ago, here are some discussions: https://wiki.mozilla.org/Gecko:SplitWindow. One additional benefit of splitting window in Chrome is that accessing global variables don't need security checks anymore, it can improve applications that use many global variables.
V8 support of split window:
There are a small number of changes on V8 api to support split window:
Security context is removed from V8, so does related API functions;
A global object can be detached from its context and reused by a new context;
Access checks on an object template can be turned on/off by default;
An object can turn on its access checks later;
V8 has a new object type, ApiGlobalObject, which is the outer window object type. The existing JSGlobalObject becomes the inner window object type. Security checks are moved from JSGlobalObject to ApiGlobalObject. ApiGlobalObject is the one exposed to JavaScript, it is accessible through Context::Global(). ApiGlobalObject's prototype is set to JSGlobalObject so that property lookups are forwarded to JSGlobalObject. ApiGlobalObject forwards all other property access requests to JSGlobalObject, such as SetProperty, DeleteProperty, etc.
Security token is moved to a global context, and ApiGlobalObject has a reference to its global context. JSGlobalObject has a reference to its global context as well. When accessing properties on a global object in JavaScript, the domain security check is performed by comparing the security token of the lexical context (Top::global_context()) to the token of global object's context. The check is only needed when the receiver is a window object, such as 'window.document'. Accessing global variables, such as 'var foo = 3; foo' does not need checks because the receiver is the inner window object.
When an outer window is detached from its global context (when a frame navigates away from a page), it is completely detached from the inner window. A new context is created for the new page, and the outer global object is reused. At this point, the access check on the DOMWindow wrapper of the old context is turned on. The code in old context is still able to access DOMWindow properties, but it has to go through domain security checks.
It is debatable on how to implement the outer window object. Currently each property access function has to check if the receiver is ApiGlobalObject type. This approach might be error-prone that one may forget to check the receiver when adding new functions. It is unlikely a performance issue because accessing global variables are more common than 'window.foo' style coding.
I am still working on the ARM port, and I'd like to hear comments and suggestions on the best way to support it in V8.
Review URL: http://codereview.chromium.org/7366
git-svn-id: http://v8.googlecode.com/svn/branches/bleeding_edge@540 ce2b1a6d-e550-0410-aec6-3dcde31c8c00
2008-10-21 19:07:58 +00:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
TransferObject(obj, object);
|
2008-07-03 15:10:15 +00:00
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Genesis::TransferNamedProperties(Handle<JSObject> from,
|
|
|
|
Handle<JSObject> to) {
|
2015-01-14 11:06:38 +00:00
|
|
|
// If JSObject::AddProperty asserts due to already existing property,
|
|
|
|
// it is likely due to both global objects sharing property name(s).
|
|
|
|
// Merging those two global objects is impossible.
|
|
|
|
// The global template must not create properties that already exist
|
|
|
|
// in the snapshotted global object.
|
2008-07-03 15:10:15 +00:00
|
|
|
if (from->HasFastProperties()) {
|
|
|
|
Handle<DescriptorArray> descs =
|
|
|
|
Handle<DescriptorArray>(from->map()->instance_descriptors());
|
2013-05-07 13:09:23 +00:00
|
|
|
for (int i = 0; i < from->map()->NumberOfOwnDescriptors(); i++) {
|
2012-04-17 07:16:19 +00:00
|
|
|
PropertyDetails details = descs->GetDetails(i);
|
2008-07-03 15:10:15 +00:00
|
|
|
switch (details.type()) {
|
2015-01-19 17:49:13 +00:00
|
|
|
case DATA: {
|
2013-02-15 09:27:10 +00:00
|
|
|
HandleScope inner(isolate());
|
2013-03-04 15:00:57 +00:00
|
|
|
Handle<Name> key = Handle<Name>(descs->GetKey(i));
|
2014-06-10 14:01:08 +00:00
|
|
|
FieldIndex index = FieldIndex::ForDescriptor(from->map(), i);
|
2014-08-04 11:34:54 +00:00
|
|
|
DCHECK(!descs->GetDetails(i).representation().IsDouble());
|
2013-05-08 15:02:08 +00:00
|
|
|
Handle<Object> value = Handle<Object>(from->RawFastPropertyAt(index),
|
2013-02-25 14:46:09 +00:00
|
|
|
isolate());
|
2014-06-30 13:48:57 +00:00
|
|
|
JSObject::AddProperty(to, key, value, details.attributes());
|
2008-07-03 15:10:15 +00:00
|
|
|
break;
|
|
|
|
}
|
2015-01-19 17:49:13 +00:00
|
|
|
case DATA_CONSTANT: {
|
2013-02-15 09:27:10 +00:00
|
|
|
HandleScope inner(isolate());
|
2013-03-04 15:00:57 +00:00
|
|
|
Handle<Name> key = Handle<Name>(descs->GetKey(i));
|
2013-07-24 12:34:50 +00:00
|
|
|
Handle<Object> constant(descs->GetConstant(i), isolate());
|
2014-06-30 13:48:57 +00:00
|
|
|
JSObject::AddProperty(to, key, constant, details.attributes());
|
2008-07-03 15:10:15 +00:00
|
|
|
break;
|
|
|
|
}
|
2015-01-19 17:49:13 +00:00
|
|
|
case ACCESSOR:
|
2014-12-16 13:22:23 +00:00
|
|
|
UNREACHABLE();
|
2015-01-19 17:49:13 +00:00
|
|
|
case ACCESSOR_CONSTANT: {
|
2014-08-20 15:08:20 +00:00
|
|
|
Handle<Name> key(descs->GetKey(i));
|
2014-09-03 14:05:55 +00:00
|
|
|
LookupIterator it(to, key, LookupIterator::OWN_SKIP_INTERCEPTOR);
|
|
|
|
CHECK_NE(LookupIterator::ACCESS_CHECK, it.state());
|
2008-07-03 15:10:15 +00:00
|
|
|
// If the property is already there we skip it
|
2014-09-04 12:28:13 +00:00
|
|
|
if (it.IsFound()) continue;
|
2013-02-15 09:27:10 +00:00
|
|
|
HandleScope inner(isolate());
|
2014-08-04 11:34:54 +00:00
|
|
|
DCHECK(!to->HasFastProperties());
|
2010-03-23 11:40:38 +00:00
|
|
|
// Add to dictionary.
|
2013-02-25 14:46:09 +00:00
|
|
|
Handle<Object> callbacks(descs->GetCallbacksObject(i), isolate());
|
2015-03-17 13:27:25 +00:00
|
|
|
PropertyDetails d(details.attributes(), ACCESSOR_CONSTANT, i + 1,
|
|
|
|
PropertyCellType::kMutable);
|
2012-01-05 17:16:19 +00:00
|
|
|
JSObject::SetNormalizedProperty(to, key, callbacks, d);
|
2008-07-03 15:10:15 +00:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2015-11-02 14:57:59 +00:00
|
|
|
} else if (from->IsJSGlobalObject()) {
|
2015-06-01 16:24:59 +00:00
|
|
|
Handle<GlobalDictionary> properties =
|
|
|
|
Handle<GlobalDictionary>(from->global_dictionary());
|
|
|
|
int capacity = properties->Capacity();
|
|
|
|
for (int i = 0; i < capacity; i++) {
|
|
|
|
Object* raw_key(properties->KeyAt(i));
|
|
|
|
if (properties->IsKey(raw_key)) {
|
|
|
|
DCHECK(raw_key->IsName());
|
|
|
|
// If the property is already there we skip it.
|
|
|
|
Handle<Name> key(Name::cast(raw_key));
|
|
|
|
LookupIterator it(to, key, LookupIterator::OWN_SKIP_INTERCEPTOR);
|
|
|
|
CHECK_NE(LookupIterator::ACCESS_CHECK, it.state());
|
|
|
|
if (it.IsFound()) continue;
|
|
|
|
// Set the property.
|
2015-06-02 10:29:12 +00:00
|
|
|
DCHECK(properties->ValueAt(i)->IsPropertyCell());
|
|
|
|
Handle<PropertyCell> cell(PropertyCell::cast(properties->ValueAt(i)));
|
|
|
|
Handle<Object> value(cell->value(), isolate());
|
2015-06-01 16:24:59 +00:00
|
|
|
if (value->IsTheHole()) continue;
|
2015-06-02 10:29:12 +00:00
|
|
|
PropertyDetails details = cell->property_details();
|
2015-06-01 16:24:59 +00:00
|
|
|
DCHECK_EQ(kData, details.kind());
|
|
|
|
JSObject::AddProperty(to, key, value, details.attributes());
|
|
|
|
}
|
|
|
|
}
|
2008-07-03 15:10:15 +00:00
|
|
|
} else {
|
2013-03-04 15:00:57 +00:00
|
|
|
Handle<NameDictionary> properties =
|
|
|
|
Handle<NameDictionary>(from->property_dictionary());
|
2008-07-03 15:10:15 +00:00
|
|
|
int capacity = properties->Capacity();
|
|
|
|
for (int i = 0; i < capacity; i++) {
|
|
|
|
Object* raw_key(properties->KeyAt(i));
|
|
|
|
if (properties->IsKey(raw_key)) {
|
2014-08-04 11:34:54 +00:00
|
|
|
DCHECK(raw_key->IsName());
|
2008-07-03 15:10:15 +00:00
|
|
|
// If the property is already there we skip it.
|
2014-04-29 13:43:17 +00:00
|
|
|
Handle<Name> key(Name::cast(raw_key));
|
2014-09-03 14:05:55 +00:00
|
|
|
LookupIterator it(to, key, LookupIterator::OWN_SKIP_INTERCEPTOR);
|
|
|
|
CHECK_NE(LookupIterator::ACCESS_CHECK, it.state());
|
2014-09-04 12:28:13 +00:00
|
|
|
if (it.IsFound()) continue;
|
2008-07-03 15:10:15 +00:00
|
|
|
// Set the property.
|
2013-02-25 14:46:09 +00:00
|
|
|
Handle<Object> value = Handle<Object>(properties->ValueAt(i),
|
|
|
|
isolate());
|
2014-08-04 11:34:54 +00:00
|
|
|
DCHECK(!value->IsCell());
|
2015-06-01 16:24:59 +00:00
|
|
|
DCHECK(!value->IsTheHole());
|
2008-07-03 15:10:15 +00:00
|
|
|
PropertyDetails details = properties->DetailsAt(i);
|
2015-01-19 17:49:13 +00:00
|
|
|
DCHECK_EQ(kData, details.kind());
|
2014-06-30 13:48:57 +00:00
|
|
|
JSObject::AddProperty(to, key, value, details.attributes());
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Genesis::TransferIndexedProperties(Handle<JSObject> from,
|
|
|
|
Handle<JSObject> to) {
|
|
|
|
// Cloning the elements array is sufficient.
|
|
|
|
Handle<FixedArray> from_elements =
|
|
|
|
Handle<FixedArray>(FixedArray::cast(from->elements()));
|
2013-06-04 10:30:05 +00:00
|
|
|
Handle<FixedArray> to_elements = factory()->CopyFixedArray(from_elements);
|
2008-07-03 15:10:15 +00:00
|
|
|
to->set_elements(*to_elements);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Genesis::TransferObject(Handle<JSObject> from, Handle<JSObject> to) {
|
2013-02-15 09:27:10 +00:00
|
|
|
HandleScope outer(isolate());
|
2008-07-03 15:10:15 +00:00
|
|
|
|
2014-08-04 11:34:54 +00:00
|
|
|
DCHECK(!from->IsJSArray());
|
|
|
|
DCHECK(!to->IsJSArray());
|
2008-07-03 15:10:15 +00:00
|
|
|
|
|
|
|
TransferNamedProperties(from, to);
|
|
|
|
TransferIndexedProperties(from, to);
|
|
|
|
|
|
|
|
// Transfer the prototype (new map is needed).
|
2014-06-24 14:53:48 +00:00
|
|
|
Handle<Object> proto(from->map()->prototype(), isolate());
|
|
|
|
SetObjectPrototype(to, proto);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
void Genesis::MakeFunctionInstancePrototypeWritable() {
|
2011-03-17 20:28:17 +00:00
|
|
|
// The maps with writable prototype are created in CreateEmptyFunction
|
|
|
|
// and CreateStrictModeFunctionMaps respectively. Initially the maps are
|
|
|
|
// created with read-only prototype for JS builtins processing.
|
2014-08-04 11:34:54 +00:00
|
|
|
DCHECK(!sloppy_function_map_writable_prototype_.is_null());
|
|
|
|
DCHECK(!strict_function_map_writable_prototype_.is_null());
|
2011-03-17 20:28:17 +00:00
|
|
|
|
|
|
|
// Replace function instance maps to make prototype writable.
|
2014-03-11 14:41:22 +00:00
|
|
|
native_context()->set_sloppy_function_map(
|
|
|
|
*sloppy_function_map_writable_prototype_);
|
|
|
|
native_context()->set_strict_function_map(
|
|
|
|
*strict_function_map_writable_prototype_);
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-01-29 14:18:55 +00:00
|
|
|
class NoTrackDoubleFieldsForSerializerScope {
|
|
|
|
public:
|
2014-04-25 08:40:23 +00:00
|
|
|
explicit NoTrackDoubleFieldsForSerializerScope(Isolate* isolate)
|
2014-10-08 09:01:43 +00:00
|
|
|
: flag_(FLAG_track_double_fields), enabled_(false) {
|
2014-05-22 09:36:20 +00:00
|
|
|
if (isolate->serializer_enabled()) {
|
2014-01-29 14:18:55 +00:00
|
|
|
// Disable tracking double fields because heap numbers treated as
|
|
|
|
// immutable by the serializer.
|
|
|
|
FLAG_track_double_fields = false;
|
2014-10-08 09:01:43 +00:00
|
|
|
enabled_ = true;
|
2014-01-29 14:18:55 +00:00
|
|
|
}
|
|
|
|
}
|
2014-04-30 09:50:58 +00:00
|
|
|
|
2014-01-29 14:18:55 +00:00
|
|
|
~NoTrackDoubleFieldsForSerializerScope() {
|
2014-10-08 09:01:43 +00:00
|
|
|
if (enabled_) {
|
|
|
|
FLAG_track_double_fields = flag_;
|
|
|
|
}
|
2014-01-29 14:18:55 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
bool flag_;
|
2014-10-08 09:01:43 +00:00
|
|
|
bool enabled_;
|
2014-01-29 14:18:55 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
|
2011-04-14 08:01:19 +00:00
|
|
|
Genesis::Genesis(Isolate* isolate,
|
2014-07-01 12:12:34 +00:00
|
|
|
MaybeHandle<JSGlobalProxy> maybe_global_proxy,
|
2015-07-06 07:09:07 +00:00
|
|
|
v8::Local<v8::ObjectTemplate> global_proxy_template,
|
2015-07-13 09:45:43 +00:00
|
|
|
v8::ExtensionConfiguration* extensions,
|
|
|
|
ContextType context_type)
|
2015-07-06 07:09:07 +00:00
|
|
|
: isolate_(isolate), active_(isolate->bootstrapper()) {
|
2014-04-25 08:40:23 +00:00
|
|
|
NoTrackDoubleFieldsForSerializerScope disable_scope(isolate);
|
2009-07-07 11:41:21 +00:00
|
|
|
result_ = Handle<Context>::null();
|
2008-07-03 15:10:15 +00:00
|
|
|
// Before creating the roots we must save the context and restore it
|
|
|
|
// on all function exits.
|
2011-03-18 20:35:07 +00:00
|
|
|
SaveContext saved_context(isolate);
|
2010-03-23 11:40:38 +00:00
|
|
|
|
2012-04-05 14:01:39 +00:00
|
|
|
// During genesis, the boilerplate for stack overflow won't work until the
|
|
|
|
// environment has been at least partially initialized. Add a stack check
|
|
|
|
// before entering JS code to catch overflow early.
|
2013-02-15 09:27:10 +00:00
|
|
|
StackLimitCheck check(isolate);
|
2015-05-29 11:37:10 +00:00
|
|
|
if (check.HasOverflowed()) {
|
|
|
|
isolate->StackOverflow();
|
|
|
|
return;
|
|
|
|
}
|
2012-04-05 14:01:39 +00:00
|
|
|
|
2015-01-14 16:42:15 +00:00
|
|
|
// The deserializer needs to hook up references to the global proxy.
|
|
|
|
// Create an uninitialized global proxy now if we don't have one
|
|
|
|
// and initialize it later in CreateNewGlobals.
|
|
|
|
Handle<JSGlobalProxy> global_proxy;
|
|
|
|
if (!maybe_global_proxy.ToHandle(&global_proxy)) {
|
|
|
|
global_proxy = isolate->factory()->NewUninitializedJSGlobalProxy();
|
|
|
|
}
|
|
|
|
|
2013-06-28 13:40:41 +00:00
|
|
|
// We can only de-serialize a context if the isolate was initialized from
|
|
|
|
// a snapshot. Otherwise we have to build the context from scratch.
|
2015-05-12 14:00:47 +00:00
|
|
|
// Also create a context from scratch to expose natives, if required by flag.
|
2015-01-13 08:48:00 +00:00
|
|
|
Handle<FixedArray> outdated_contexts;
|
2015-05-12 07:26:05 +00:00
|
|
|
if (!isolate->initialized_from_snapshot() ||
|
2015-01-14 16:42:15 +00:00
|
|
|
!Snapshot::NewContextFromSnapshot(isolate, global_proxy,
|
|
|
|
&outdated_contexts)
|
2015-01-13 08:48:00 +00:00
|
|
|
.ToHandle(&native_context_)) {
|
2013-06-28 13:40:41 +00:00
|
|
|
native_context_ = Handle<Context>();
|
|
|
|
}
|
|
|
|
|
2013-03-18 17:36:47 +00:00
|
|
|
if (!native_context().is_null()) {
|
|
|
|
AddToWeakNativeContextList(*native_context());
|
|
|
|
isolate->set_context(*native_context());
|
2011-03-18 20:35:07 +00:00
|
|
|
isolate->counters()->contexts_created_by_snapshot()->Increment();
|
2014-11-07 16:03:11 +00:00
|
|
|
#if TRACE_MAPS
|
|
|
|
if (FLAG_trace_maps) {
|
|
|
|
Handle<JSFunction> object_fun = isolate->object_function();
|
|
|
|
PrintF("[TraceMap: InitialMap map= %p SFI= %d_Object ]\n",
|
|
|
|
reinterpret_cast<void*>(object_fun->initial_map()),
|
|
|
|
object_fun->shared()->unique_id());
|
|
|
|
Map::TraceAllTransitions(object_fun->initial_map());
|
|
|
|
}
|
|
|
|
#endif
|
2015-11-02 14:57:59 +00:00
|
|
|
Handle<JSGlobalObject> global_object =
|
2015-01-14 16:42:15 +00:00
|
|
|
CreateNewGlobals(global_proxy_template, global_proxy);
|
2014-07-01 12:12:34 +00:00
|
|
|
|
|
|
|
HookUpGlobalProxy(global_object, global_proxy);
|
2015-01-13 08:48:00 +00:00
|
|
|
HookUpGlobalObject(global_object, outdated_contexts);
|
2015-06-12 12:34:10 +00:00
|
|
|
HookUpGlobalThisBinding(outdated_contexts);
|
2010-03-23 11:40:38 +00:00
|
|
|
|
2014-07-01 12:12:34 +00:00
|
|
|
if (!ConfigureGlobalObjects(global_proxy_template)) return;
|
2010-03-23 11:40:38 +00:00
|
|
|
} else {
|
|
|
|
// We get here if there was no context snapshot.
|
|
|
|
CreateRoots();
|
2011-04-14 08:01:19 +00:00
|
|
|
Handle<JSFunction> empty_function = CreateEmptyFunction(isolate);
|
2011-03-17 20:28:17 +00:00
|
|
|
CreateStrictModeFunctionMaps(empty_function);
|
2015-02-25 14:52:36 +00:00
|
|
|
CreateStrongModeFunctionMaps(empty_function);
|
2015-10-16 11:27:14 +00:00
|
|
|
CreateIteratorMaps();
|
2015-11-02 14:57:59 +00:00
|
|
|
Handle<JSGlobalObject> global_object =
|
2015-01-14 16:42:15 +00:00
|
|
|
CreateNewGlobals(global_proxy_template, global_proxy);
|
2014-07-01 12:12:34 +00:00
|
|
|
HookUpGlobalProxy(global_object, global_proxy);
|
2015-07-13 09:45:43 +00:00
|
|
|
InitializeGlobal(global_object, empty_function, context_type);
|
2010-08-25 13:25:54 +00:00
|
|
|
InitializeNormalizedMapCaches();
|
2015-07-13 09:45:43 +00:00
|
|
|
|
|
|
|
if (!InstallNatives(context_type)) return;
|
2010-03-23 11:40:38 +00:00
|
|
|
|
|
|
|
MakeFunctionInstancePrototypeWritable();
|
|
|
|
|
2015-08-12 14:22:07 +00:00
|
|
|
if (context_type != THIN_CONTEXT) {
|
2015-08-14 18:47:46 +00:00
|
|
|
if (!InstallExtraNatives()) return;
|
2015-07-13 09:45:43 +00:00
|
|
|
if (!ConfigureGlobalObjects(global_proxy_template)) return;
|
|
|
|
}
|
2014-02-12 13:27:13 +00:00
|
|
|
isolate->counters()->contexts_created_from_scratch()->Increment();
|
2010-03-23 11:40:38 +00:00
|
|
|
}
|
2008-08-14 13:41:48 +00:00
|
|
|
|
2015-08-14 18:47:46 +00:00
|
|
|
// Install experimental natives. Do not include them into the
|
2015-05-08 08:44:47 +00:00
|
|
|
// snapshot as we should be able to turn them off at runtime. Re-installing
|
|
|
|
// them after they have already been deserialized would also fail.
|
2015-08-13 12:09:30 +00:00
|
|
|
if (context_type == FULL_CONTEXT) {
|
|
|
|
if (!isolate->serializer_enabled()) {
|
|
|
|
InitializeExperimentalGlobal();
|
2015-07-13 09:45:43 +00:00
|
|
|
if (!InstallExperimentalNatives()) return;
|
2015-08-20 00:01:07 +00:00
|
|
|
|
|
|
|
if (FLAG_experimental_extras) {
|
|
|
|
if (!InstallExperimentalExtraNatives()) return;
|
|
|
|
}
|
2015-07-13 09:45:43 +00:00
|
|
|
}
|
2015-08-13 12:09:30 +00:00
|
|
|
// The serializer cannot serialize typed arrays. Reset those typed arrays
|
|
|
|
// for each new context.
|
|
|
|
} else if (context_type == DEBUG_CONTEXT) {
|
|
|
|
DCHECK(!isolate->serializer_enabled());
|
|
|
|
InitializeExperimentalGlobal();
|
|
|
|
if (!InstallDebuggerNatives()) return;
|
2015-07-13 09:45:43 +00:00
|
|
|
}
|
2015-08-13 12:09:30 +00:00
|
|
|
|
2015-10-16 11:27:14 +00:00
|
|
|
ConfigureUtilsObject(context_type);
|
|
|
|
|
2015-08-17 11:00:43 +00:00
|
|
|
// Check that the script context table is empty except for the 'this' binding.
|
|
|
|
// We do not need script contexts for native scripts.
|
2015-09-01 07:06:49 +00:00
|
|
|
if (!FLAG_global_var_shortcuts) {
|
|
|
|
DCHECK_EQ(1, native_context()->script_context_table()->used());
|
|
|
|
}
|
2015-08-17 11:00:43 +00:00
|
|
|
|
2013-03-18 17:36:47 +00:00
|
|
|
result_ = native_context();
|
2008-07-03 15:10:15 +00:00
|
|
|
}
|
|
|
|
|
2009-01-26 18:09:46 +00:00
|
|
|
|
|
|
|
// Support for thread preemption.
|
|
|
|
|
|
|
|
// Reserve space for statics needing saving and restoring.
|
|
|
|
int Bootstrapper::ArchiveSpacePerThread() {
|
2011-03-18 20:35:07 +00:00
|
|
|
return sizeof(NestingCounterType);
|
2009-01-26 18:09:46 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-05-22 15:27:57 +00:00
|
|
|
// Archive statics that are thread-local.
|
2009-01-26 18:09:46 +00:00
|
|
|
char* Bootstrapper::ArchiveState(char* to) {
|
2011-03-18 20:35:07 +00:00
|
|
|
*reinterpret_cast<NestingCounterType*>(to) = nesting_;
|
|
|
|
nesting_ = 0;
|
|
|
|
return to + sizeof(NestingCounterType);
|
2009-01-26 18:09:46 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2014-05-22 15:27:57 +00:00
|
|
|
// Restore statics that are thread-local.
|
2009-01-26 18:09:46 +00:00
|
|
|
char* Bootstrapper::RestoreState(char* from) {
|
2011-03-18 20:35:07 +00:00
|
|
|
nesting_ = *reinterpret_cast<NestingCounterType*>(from);
|
|
|
|
return from + sizeof(NestingCounterType);
|
2009-01-26 18:09:46 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2009-09-28 12:25:21 +00:00
|
|
|
// Called when the top-level V8 mutex is destroyed.
|
|
|
|
void Bootstrapper::FreeThreadResources() {
|
2014-08-04 11:34:54 +00:00
|
|
|
DCHECK(!IsActive());
|
2009-01-26 18:09:46 +00:00
|
|
|
}
|
|
|
|
|
2015-06-01 22:46:54 +00:00
|
|
|
} // namespace internal
|
|
|
|
} // namespace v8
|