| // Copyright 2012 the V8 project authors. All rights reserved. |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include <errno.h> |
| #include <stdlib.h> |
| #include <string.h> |
| #include <sys/stat.h> |
| |
| #include <algorithm> |
| #include <fstream> |
| #include <iomanip> |
| #include <iterator> |
| #include <string> |
| #include <tuple> |
| #include <type_traits> |
| #include <unordered_map> |
| #include <utility> |
| #include <vector> |
| |
| #ifdef ENABLE_VTUNE_JIT_INTERFACE |
| #include "src/third_party/vtune/v8-vtune.h" |
| #endif |
| |
| #include "include/libplatform/libplatform.h" |
| #include "include/libplatform/v8-tracing.h" |
| #include "include/v8-function.h" |
| #include "include/v8-initialization.h" |
| #include "include/v8-inspector.h" |
| #include "include/v8-json.h" |
| #include "include/v8-locker.h" |
| #include "include/v8-profiler.h" |
| #include "include/v8-wasm.h" |
| #include "src/api/api-inl.h" |
| #include "src/base/cpu.h" |
| #include "src/base/logging.h" |
| #include "src/base/platform/platform.h" |
| #include "src/base/platform/time.h" |
| #include "src/base/platform/wrappers.h" |
| #include "src/base/sanitizer/msan.h" |
| #include "src/base/sys-info.h" |
| #include "src/base/utils/random-number-generator.h" |
| #include "src/d8/d8-console.h" |
| #include "src/d8/d8-platforms.h" |
| #include "src/d8/d8.h" |
| #include "src/debug/debug-interface.h" |
| #include "src/deoptimizer/deoptimizer.h" |
| #include "src/diagnostics/basic-block-profiler.h" |
| #include "src/execution/v8threads.h" |
| #include "src/execution/vm-state-inl.h" |
| #include "src/flags/flags.h" |
| #include "src/handles/maybe-handles.h" |
| #include "src/heap/parked-scope.h" |
| #include "src/init/v8.h" |
| #include "src/interpreter/interpreter.h" |
| #include "src/logging/counters.h" |
| #include "src/logging/log-utils.h" |
| #include "src/objects/managed-inl.h" |
| #include "src/objects/objects-inl.h" |
| #include "src/objects/objects.h" |
| #include "src/parsing/parse-info.h" |
| #include "src/parsing/parsing.h" |
| #include "src/parsing/scanner-character-streams.h" |
| #include "src/profiler/profile-generator.h" |
| #include "src/snapshot/snapshot.h" |
| #include "src/tasks/cancelable-task.h" |
| #include "src/trap-handler/trap-handler.h" |
| #include "src/utils/ostreams.h" |
| #include "src/utils/utils.h" |
| #include "src/web-snapshot/web-snapshot.h" |
| |
| #ifdef V8_FUZZILLI |
| #include "src/d8/cov.h" |
| #endif // V8_FUZZILLI |
| |
| #ifdef V8_USE_PERFETTO |
| #include "perfetto/tracing.h" |
| #endif // V8_USE_PERFETTO |
| |
| #ifdef V8_INTL_SUPPORT |
| #include "unicode/locid.h" |
| #endif // V8_INTL_SUPPORT |
| |
| #ifdef V8_OS_LINUX |
| #include <sys/mman.h> // For MultiMappedAllocator. |
| #endif |
| |
| #if !defined(_WIN32) && !defined(_WIN64) |
| #include <unistd.h> |
| #else |
| #include <windows.h> |
| #endif // !defined(_WIN32) && !defined(_WIN64) |
| |
| #ifndef DCHECK |
| #define DCHECK(condition) assert(condition) |
| #endif |
| |
| #ifndef CHECK |
| #define CHECK(condition) assert(condition) |
| #endif |
| |
| #define TRACE_BS(...) \ |
| do { \ |
| if (i::FLAG_trace_backing_store) PrintF(__VA_ARGS__); \ |
| } while (false) |
| |
| namespace v8 { |
| |
| namespace { |
| |
| const int kMB = 1024 * 1024; |
| |
| #ifdef V8_FUZZILLI |
| // REPRL = read-eval-print-reset-loop |
| // These file descriptors are being opened when Fuzzilli uses fork & execve to |
| // run V8. |
| #define REPRL_CRFD 100 // Control read file decriptor |
| #define REPRL_CWFD 101 // Control write file decriptor |
| #define REPRL_DRFD 102 // Data read file decriptor |
| #define REPRL_DWFD 103 // Data write file decriptor |
| bool fuzzilli_reprl = true; |
| #else |
| bool fuzzilli_reprl = false; |
| #endif // V8_FUZZILLI |
| |
| const int kMaxSerializerMemoryUsage = |
| 1 * kMB; // Arbitrary maximum for testing. |
| |
| // Base class for shell ArrayBuffer allocators. It forwards all opertions to |
| // the default v8 allocator. |
| class ArrayBufferAllocatorBase : public v8::ArrayBuffer::Allocator { |
| public: |
| void* Allocate(size_t length) override { |
| return allocator_->Allocate(length); |
| } |
| |
| void* AllocateUninitialized(size_t length) override { |
| return allocator_->AllocateUninitialized(length); |
| } |
| |
| void Free(void* data, size_t length) override { |
| allocator_->Free(data, length); |
| } |
| |
| private: |
| std::unique_ptr<Allocator> allocator_ = |
| std::unique_ptr<Allocator>(NewDefaultAllocator()); |
| }; |
| |
| // ArrayBuffer allocator that can use virtual memory to improve performance. |
| class ShellArrayBufferAllocator : public ArrayBufferAllocatorBase { |
| public: |
| void* Allocate(size_t length) override { |
| if (length >= kVMThreshold) return AllocateVM(length); |
| return ArrayBufferAllocatorBase::Allocate(length); |
| } |
| |
| void* AllocateUninitialized(size_t length) override { |
| if (length >= kVMThreshold) return AllocateVM(length); |
| return ArrayBufferAllocatorBase::AllocateUninitialized(length); |
| } |
| |
| void Free(void* data, size_t length) override { |
| if (length >= kVMThreshold) { |
| FreeVM(data, length); |
| } else { |
| ArrayBufferAllocatorBase::Free(data, length); |
| } |
| } |
| |
| private: |
| static constexpr size_t kVMThreshold = 65536; |
| |
| void* AllocateVM(size_t length) { |
| DCHECK_LE(kVMThreshold, length); |
| v8::PageAllocator* page_allocator = i::GetArrayBufferPageAllocator(); |
| size_t page_size = page_allocator->AllocatePageSize(); |
| size_t allocated = RoundUp(length, page_size); |
| return i::AllocatePages(page_allocator, nullptr, allocated, page_size, |
| PageAllocator::kReadWrite); |
| } |
| |
| void FreeVM(void* data, size_t length) { |
| v8::PageAllocator* page_allocator = i::GetArrayBufferPageAllocator(); |
| size_t page_size = page_allocator->AllocatePageSize(); |
| size_t allocated = RoundUp(length, page_size); |
| i::FreePages(page_allocator, data, allocated); |
| } |
| }; |
| |
| // ArrayBuffer allocator that never allocates over 10MB. |
| class MockArrayBufferAllocator : public ArrayBufferAllocatorBase { |
| protected: |
| void* Allocate(size_t length) override { |
| return ArrayBufferAllocatorBase::Allocate(Adjust(length)); |
| } |
| |
| void* AllocateUninitialized(size_t length) override { |
| return ArrayBufferAllocatorBase::AllocateUninitialized(Adjust(length)); |
| } |
| |
| void Free(void* data, size_t length) override { |
| return ArrayBufferAllocatorBase::Free(data, Adjust(length)); |
| } |
| |
| private: |
| size_t Adjust(size_t length) { |
| const size_t kAllocationLimit = 10 * kMB; |
| return length > kAllocationLimit ? i::AllocatePageSize() : length; |
| } |
| }; |
| |
| // ArrayBuffer allocator that can be equipped with a limit to simulate system |
| // OOM. |
| class MockArrayBufferAllocatiorWithLimit : public MockArrayBufferAllocator { |
| public: |
| explicit MockArrayBufferAllocatiorWithLimit(size_t allocation_limit) |
| : space_left_(allocation_limit) {} |
| |
| protected: |
| void* Allocate(size_t length) override { |
| if (length > space_left_) { |
| return nullptr; |
| } |
| space_left_ -= length; |
| return MockArrayBufferAllocator::Allocate(length); |
| } |
| |
| void* AllocateUninitialized(size_t length) override { |
| if (length > space_left_) { |
| return nullptr; |
| } |
| space_left_ -= length; |
| return MockArrayBufferAllocator::AllocateUninitialized(length); |
| } |
| |
| void Free(void* data, size_t length) override { |
| space_left_ += length; |
| return MockArrayBufferAllocator::Free(data, length); |
| } |
| |
| private: |
| std::atomic<size_t> space_left_; |
| }; |
| |
| #if MULTI_MAPPED_ALLOCATOR_AVAILABLE |
| |
| // This is a mock allocator variant that provides a huge virtual allocation |
| // backed by a small real allocation that is repeatedly mapped. If you create an |
| // array on memory allocated by this allocator, you will observe that elements |
| // will alias each other as if their indices were modulo-divided by the real |
| // allocation length. |
| // The purpose is to allow stability-testing of huge (typed) arrays without |
| // actually consuming huge amounts of physical memory. |
| // This is currently only available on Linux because it relies on {mremap}. |
| class MultiMappedAllocator : public ArrayBufferAllocatorBase { |
| protected: |
| void* Allocate(size_t length) override { |
| if (length < kChunkSize) { |
| return ArrayBufferAllocatorBase::Allocate(length); |
| } |
| // We use mmap, which initializes pages to zero anyway. |
| return AllocateUninitialized(length); |
| } |
| |
| void* AllocateUninitialized(size_t length) override { |
| if (length < kChunkSize) { |
| return ArrayBufferAllocatorBase::AllocateUninitialized(length); |
| } |
| size_t rounded_length = RoundUp(length, kChunkSize); |
| int prot = PROT_READ | PROT_WRITE; |
| // We have to specify MAP_SHARED to make {mremap} below do what we want. |
| int flags = MAP_SHARED | MAP_ANONYMOUS; |
| void* real_alloc = mmap(nullptr, kChunkSize, prot, flags, -1, 0); |
| if (reinterpret_cast<intptr_t>(real_alloc) == -1) { |
| // If we ran into some limit (physical or virtual memory, or number |
| // of mappings, etc), return {nullptr}, which callers can handle. |
| if (errno == ENOMEM) { |
| return nullptr; |
| } |
| // Other errors may be bugs which we want to learn about. |
| FATAL("mmap (real) failed with error %d: %s", errno, strerror(errno)); |
| } |
| void* virtual_alloc = |
| mmap(nullptr, rounded_length, prot, flags | MAP_NORESERVE, -1, 0); |
| if (reinterpret_cast<intptr_t>(virtual_alloc) == -1) { |
| if (errno == ENOMEM) { |
| // Undo earlier, successful mappings. |
| munmap(real_alloc, kChunkSize); |
| return nullptr; |
| } |
| FATAL("mmap (virtual) failed with error %d: %s", errno, strerror(errno)); |
| } |
| i::Address virtual_base = reinterpret_cast<i::Address>(virtual_alloc); |
| i::Address virtual_end = virtual_base + rounded_length; |
| for (i::Address to_map = virtual_base; to_map < virtual_end; |
| to_map += kChunkSize) { |
| // Specifying 0 as the "old size" causes the existing map entry to not |
| // get deleted, which is important so that we can remap it again in the |
| // next iteration of this loop. |
| void* result = |
| mremap(real_alloc, 0, kChunkSize, MREMAP_MAYMOVE | MREMAP_FIXED, |
| reinterpret_cast<void*>(to_map)); |
| if (reinterpret_cast<intptr_t>(result) == -1) { |
| if (errno == ENOMEM) { |
| // Undo earlier, successful mappings. |
| munmap(real_alloc, kChunkSize); |
| munmap(virtual_alloc, (to_map - virtual_base)); |
| return nullptr; |
| } |
| FATAL("mremap failed with error %d: %s", errno, strerror(errno)); |
| } |
| } |
| base::MutexGuard lock_guard(®ions_mutex_); |
| regions_[virtual_alloc] = real_alloc; |
| return virtual_alloc; |
| } |
| |
| void Free(void* data, size_t length) override { |
| if (length < kChunkSize) { |
| return ArrayBufferAllocatorBase::Free(data, length); |
| } |
| base::MutexGuard lock_guard(®ions_mutex_); |
| void* real_alloc = regions_[data]; |
| munmap(real_alloc, kChunkSize); |
| size_t rounded_length = RoundUp(length, kChunkSize); |
| munmap(data, rounded_length); |
| regions_.erase(data); |
| } |
| |
| private: |
| // Aiming for a "Huge Page" (2M on Linux x64) to go easy on the TLB. |
| static constexpr size_t kChunkSize = 2 * 1024 * 1024; |
| |
| std::unordered_map<void*, void*> regions_; |
| base::Mutex regions_mutex_; |
| }; |
| |
| #endif // MULTI_MAPPED_ALLOCATOR_AVAILABLE |
| |
| v8::Platform* g_default_platform; |
| std::unique_ptr<v8::Platform> g_platform; |
| |
| static MaybeLocal<Value> TryGetValue(v8::Isolate* isolate, |
| Local<Context> context, |
| Local<v8::Object> object, |
| const char* property) { |
| MaybeLocal<String> v8_str = String::NewFromUtf8(isolate, property); |
| if (v8_str.IsEmpty()) return {}; |
| return object->Get(context, v8_str.ToLocalChecked()); |
| } |
| |
| static Local<Value> GetValue(v8::Isolate* isolate, Local<Context> context, |
| Local<v8::Object> object, const char* property) { |
| return TryGetValue(isolate, context, object, property).ToLocalChecked(); |
| } |
| |
| std::shared_ptr<Worker> GetWorkerFromInternalField(Isolate* isolate, |
| Local<Object> object) { |
| if (object->InternalFieldCount() != 1) { |
| isolate->ThrowError("this is not a Worker"); |
| return nullptr; |
| } |
| |
| i::Handle<i::Object> handle = Utils::OpenHandle(*object->GetInternalField(0)); |
| if (handle->IsSmi()) { |
| isolate->ThrowError("Worker is defunct because main thread is terminating"); |
| return nullptr; |
| } |
| auto managed = i::Handle<i::Managed<Worker>>::cast(handle); |
| return managed->get(); |
| } |
| |
| base::Thread::Options GetThreadOptions(const char* name) { |
| // On some systems (OSX 10.6) the stack size default is 0.5Mb or less |
| // which is not enough to parse the big literal expressions used in tests. |
| // The stack size should be at least StackGuard::kLimitSize + some |
| // OS-specific padding for thread startup code. 2Mbytes seems to be enough. |
| return base::Thread::Options(name, 2 * kMB); |
| } |
| |
| } // namespace |
| |
| namespace tracing { |
| |
| namespace { |
| |
| static constexpr char kIncludedCategoriesParam[] = "included_categories"; |
| |
| class TraceConfigParser { |
| public: |
| static void FillTraceConfig(v8::Isolate* isolate, |
| platform::tracing::TraceConfig* trace_config, |
| const char* json_str) { |
| HandleScope outer_scope(isolate); |
| Local<Context> context = Context::New(isolate); |
| Context::Scope context_scope(context); |
| HandleScope inner_scope(isolate); |
| |
| Local<String> source = |
| String::NewFromUtf8(isolate, json_str).ToLocalChecked(); |
| Local<Value> result = JSON::Parse(context, source).ToLocalChecked(); |
| Local<v8::Object> trace_config_object = result.As<v8::Object>(); |
| |
| UpdateIncludedCategoriesList(isolate, context, trace_config_object, |
| trace_config); |
| } |
| |
| private: |
| static int UpdateIncludedCategoriesList( |
| v8::Isolate* isolate, Local<Context> context, Local<v8::Object> object, |
| platform::tracing::TraceConfig* trace_config) { |
| Local<Value> value = |
| GetValue(isolate, context, object, kIncludedCategoriesParam); |
| if (value->IsArray()) { |
| Local<Array> v8_array = value.As<Array>(); |
| for (int i = 0, length = v8_array->Length(); i < length; ++i) { |
| Local<Value> v = v8_array->Get(context, i) |
| .ToLocalChecked() |
| ->ToString(context) |
| .ToLocalChecked(); |
| String::Utf8Value str(isolate, v->ToString(context).ToLocalChecked()); |
| trace_config->AddIncludedCategory(*str); |
| } |
| return v8_array->Length(); |
| } |
| return 0; |
| } |
| }; |
| |
| } // namespace |
| |
| static platform::tracing::TraceConfig* CreateTraceConfigFromJSON( |
| v8::Isolate* isolate, const char* json_str) { |
| platform::tracing::TraceConfig* trace_config = |
| new platform::tracing::TraceConfig(); |
| TraceConfigParser::FillTraceConfig(isolate, trace_config, json_str); |
| return trace_config; |
| } |
| |
| } // namespace tracing |
| |
| class ExternalOwningOneByteStringResource |
| : public String::ExternalOneByteStringResource { |
| public: |
| ExternalOwningOneByteStringResource() = default; |
| ExternalOwningOneByteStringResource( |
| std::unique_ptr<base::OS::MemoryMappedFile> file) |
| : file_(std::move(file)) {} |
| const char* data() const override { |
| return static_cast<char*>(file_->memory()); |
| } |
| size_t length() const override { return file_->size(); } |
| |
| private: |
| std::unique_ptr<base::OS::MemoryMappedFile> file_; |
| }; |
| |
| // static variables: |
| CounterMap* Shell::counter_map_; |
| base::SharedMutex Shell::counter_mutex_; |
| base::OS::MemoryMappedFile* Shell::counters_file_ = nullptr; |
| CounterCollection Shell::local_counters_; |
| CounterCollection* Shell::counters_ = &local_counters_; |
| base::LazyMutex Shell::context_mutex_; |
| const base::TimeTicks Shell::kInitialTicks = base::TimeTicks::Now(); |
| Global<Function> Shell::stringify_function_; |
| base::LazyMutex Shell::workers_mutex_; |
| bool Shell::allow_new_workers_ = true; |
| std::unordered_set<std::shared_ptr<Worker>> Shell::running_workers_; |
| std::atomic<bool> Shell::script_executed_{false}; |
| std::atomic<bool> Shell::valid_fuzz_script_{false}; |
| base::LazyMutex Shell::isolate_status_lock_; |
| std::map<v8::Isolate*, bool> Shell::isolate_status_; |
| std::map<v8::Isolate*, int> Shell::isolate_running_streaming_tasks_; |
| base::LazyMutex Shell::cached_code_mutex_; |
| std::map<std::string, std::unique_ptr<ScriptCompiler::CachedData>> |
| Shell::cached_code_map_; |
| std::atomic<int> Shell::unhandled_promise_rejections_{0}; |
| |
| Global<Context> Shell::evaluation_context_; |
| ArrayBuffer::Allocator* Shell::array_buffer_allocator; |
| Isolate* Shell::shared_isolate = nullptr; |
| bool check_d8_flag_contradictions = true; |
| ShellOptions Shell::options; |
| base::OnceType Shell::quit_once_ = V8_ONCE_INIT; |
| |
| ScriptCompiler::CachedData* Shell::LookupCodeCache(Isolate* isolate, |
| Local<Value> source) { |
| base::MutexGuard lock_guard(cached_code_mutex_.Pointer()); |
| CHECK(source->IsString()); |
| v8::String::Utf8Value key(isolate, source); |
| DCHECK(*key); |
| auto entry = cached_code_map_.find(*key); |
| if (entry != cached_code_map_.end() && entry->second) { |
| int length = entry->second->length; |
| uint8_t* cache = new uint8_t[length]; |
| memcpy(cache, entry->second->data, length); |
| ScriptCompiler::CachedData* cached_data = new ScriptCompiler::CachedData( |
| cache, length, ScriptCompiler::CachedData::BufferOwned); |
| return cached_data; |
| } |
| return nullptr; |
| } |
| |
| void Shell::StoreInCodeCache(Isolate* isolate, Local<Value> source, |
| const ScriptCompiler::CachedData* cache_data) { |
| base::MutexGuard lock_guard(cached_code_mutex_.Pointer()); |
| CHECK(source->IsString()); |
| if (cache_data == nullptr) return; |
| v8::String::Utf8Value key(isolate, source); |
| DCHECK(*key); |
| int length = cache_data->length; |
| uint8_t* cache = new uint8_t[length]; |
| memcpy(cache, cache_data->data, length); |
| cached_code_map_[*key] = std::unique_ptr<ScriptCompiler::CachedData>( |
| new ScriptCompiler::CachedData(cache, length, |
| ScriptCompiler::CachedData::BufferOwned)); |
| } |
| |
| // Dummy external source stream which returns the whole source in one go. |
| // TODO(leszeks): Also test chunking the data. |
| class DummySourceStream : public v8::ScriptCompiler::ExternalSourceStream { |
| public: |
| explicit DummySourceStream(Local<String> source) : done_(false) { |
| source_buffer_ = Utils::OpenHandle(*source)->ToCString( |
| i::ALLOW_NULLS, i::FAST_STRING_TRAVERSAL, &source_length_); |
| } |
| |
| size_t GetMoreData(const uint8_t** src) override { |
| if (done_) { |
| return 0; |
| } |
| *src = reinterpret_cast<uint8_t*>(source_buffer_.release()); |
| done_ = true; |
| |
| return source_length_; |
| } |
| |
| private: |
| int source_length_; |
| std::unique_ptr<char[]> source_buffer_; |
| bool done_; |
| }; |
| |
| class StreamingCompileTask final : public v8::Task { |
| public: |
| StreamingCompileTask(Isolate* isolate, |
| v8::ScriptCompiler::StreamedSource* streamed_source, |
| v8::ScriptType type) |
| : isolate_(isolate), |
| script_streaming_task_(v8::ScriptCompiler::StartStreaming( |
| isolate, streamed_source, type)) { |
| Shell::NotifyStartStreamingTask(isolate_); |
| } |
| |
| void Run() override { |
| script_streaming_task_->Run(); |
| // Signal that the task has finished using the task runner to wake the |
| // message loop. |
| Shell::PostForegroundTask(isolate_, std::make_unique<FinishTask>(isolate_)); |
| } |
| |
| private: |
| class FinishTask final : public v8::Task { |
| public: |
| explicit FinishTask(Isolate* isolate) : isolate_(isolate) {} |
| void Run() final { Shell::NotifyFinishStreamingTask(isolate_); } |
| Isolate* isolate_; |
| }; |
| |
| Isolate* isolate_; |
| std::unique_ptr<v8::ScriptCompiler::ScriptStreamingTask> |
| script_streaming_task_; |
| }; |
| |
| namespace { |
| template <class T> |
| MaybeLocal<T> CompileStreamed(Local<Context> context, |
| ScriptCompiler::StreamedSource* v8_source, |
| Local<String> full_source_string, |
| const ScriptOrigin& origin) {} |
| |
| template <> |
| MaybeLocal<Script> CompileStreamed(Local<Context> context, |
| ScriptCompiler::StreamedSource* v8_source, |
| Local<String> full_source_string, |
| const ScriptOrigin& origin) { |
| return ScriptCompiler::Compile(context, v8_source, full_source_string, |
| origin); |
| } |
| |
| template <> |
| MaybeLocal<Module> CompileStreamed(Local<Context> context, |
| ScriptCompiler::StreamedSource* v8_source, |
| Local<String> full_source_string, |
| const ScriptOrigin& origin) { |
| return ScriptCompiler::CompileModule(context, v8_source, full_source_string, |
| origin); |
| } |
| |
| template <class T> |
| MaybeLocal<T> Compile(Local<Context> context, ScriptCompiler::Source* source, |
| ScriptCompiler::CompileOptions options) {} |
| template <> |
| MaybeLocal<Script> Compile(Local<Context> context, |
| ScriptCompiler::Source* source, |
| ScriptCompiler::CompileOptions options) { |
| return ScriptCompiler::Compile(context, source, options); |
| } |
| |
| template <> |
| MaybeLocal<Module> Compile(Local<Context> context, |
| ScriptCompiler::Source* source, |
| ScriptCompiler::CompileOptions options) { |
| return ScriptCompiler::CompileModule(context->GetIsolate(), source, options); |
| } |
| |
| } // namespace |
| |
| template <class T> |
| MaybeLocal<T> Shell::CompileString(Isolate* isolate, Local<Context> context, |
| Local<String> source, |
| const ScriptOrigin& origin) { |
| if (options.streaming_compile) { |
| v8::ScriptCompiler::StreamedSource streamed_source( |
| std::make_unique<DummySourceStream>(source), |
| v8::ScriptCompiler::StreamedSource::UTF8); |
| PostBlockingBackgroundTask(std::make_unique<StreamingCompileTask>( |
| isolate, &streamed_source, |
| std::is_same<T, Module>::value ? v8::ScriptType::kModule |
| : v8::ScriptType::kClassic)); |
| // Pump the loop until the streaming task completes. |
| Shell::CompleteMessageLoop(isolate); |
| return CompileStreamed<T>(context, &streamed_source, source, origin); |
| } |
| |
| ScriptCompiler::CachedData* cached_code = nullptr; |
| if (options.compile_options == ScriptCompiler::kConsumeCodeCache) { |
| cached_code = LookupCodeCache(isolate, source); |
| } |
| ScriptCompiler::Source script_source(source, origin, cached_code); |
| MaybeLocal<T> result = |
| Compile<T>(context, &script_source, |
| cached_code ? ScriptCompiler::kConsumeCodeCache |
| : ScriptCompiler::kNoCompileOptions); |
| if (cached_code) CHECK(!cached_code->rejected); |
| return result; |
| } |
| |
| namespace { |
| // For testing. |
| const int kHostDefinedOptionsLength = 2; |
| const uint32_t kHostDefinedOptionsMagicConstant = 0xF1F2F3F0; |
| |
| ScriptOrigin CreateScriptOrigin(Isolate* isolate, Local<String> resource_name, |
| v8::ScriptType type) { |
| Local<PrimitiveArray> options = |
| PrimitiveArray::New(isolate, kHostDefinedOptionsLength); |
| options->Set(isolate, 0, |
| v8::Uint32::New(isolate, kHostDefinedOptionsMagicConstant)); |
| options->Set(isolate, 1, resource_name); |
| return ScriptOrigin(isolate, resource_name, 0, 0, false, -1, Local<Value>(), |
| false, false, type == v8::ScriptType::kModule, options); |
| } |
| |
| bool IsValidHostDefinedOptions(Local<Context> context, Local<Data> options, |
| Local<Value> resource_name) { |
| if (!options->IsFixedArray()) return false; |
| Local<FixedArray> array = options.As<FixedArray>(); |
| if (array->Length() != kHostDefinedOptionsLength) return false; |
| uint32_t magic = 0; |
| if (!array->Get(context, 0).As<Value>()->Uint32Value(context).To(&magic)) { |
| return false; |
| } |
| if (magic != kHostDefinedOptionsMagicConstant) return false; |
| return array->Get(context, 1).As<String>()->StrictEquals(resource_name); |
| } |
| } // namespace |
| |
| // Executes a string within the current v8 context. |
| bool Shell::ExecuteString(Isolate* isolate, Local<String> source, |
| Local<String> name, PrintResult print_result, |
| ReportExceptions report_exceptions, |
| ProcessMessageQueue process_message_queue) { |
| i::Isolate* i_isolate = reinterpret_cast<i::Isolate*>(isolate); |
| if (i::FLAG_parse_only) { |
| i::VMState<PARSER> state(i_isolate); |
| i::Handle<i::String> str = Utils::OpenHandle(*(source)); |
| |
| // Set up ParseInfo. |
| i::UnoptimizedCompileState compile_state; |
| i::ReusableUnoptimizedCompileState reusable_state(i_isolate); |
| |
| i::UnoptimizedCompileFlags flags = |
| i::UnoptimizedCompileFlags::ForToplevelCompile( |
| i_isolate, true, i::construct_language_mode(i::FLAG_use_strict), |
| i::REPLMode::kNo, ScriptType::kClassic, i::FLAG_lazy); |
| |
| if (options.compile_options == v8::ScriptCompiler::kEagerCompile) { |
| flags.set_is_eager(true); |
| } |
| |
| i::ParseInfo parse_info(i_isolate, flags, &compile_state, &reusable_state); |
| |
| i::Handle<i::Script> script = parse_info.CreateScript( |
| i_isolate, str, i::kNullMaybeHandle, ScriptOriginOptions()); |
| if (!i::parsing::ParseProgram(&parse_info, script, i_isolate, |
| i::parsing::ReportStatisticsMode::kYes)) { |
| parse_info.pending_error_handler()->PrepareErrors( |
| i_isolate, parse_info.ast_value_factory()); |
| parse_info.pending_error_handler()->ReportErrors(i_isolate, script); |
| |
| fprintf(stderr, "Failed parsing\n"); |
| return false; |
| } |
| return true; |
| } |
| |
| HandleScope handle_scope(isolate); |
| TryCatch try_catch(isolate); |
| try_catch.SetVerbose(report_exceptions == kReportExceptions); |
| |
| // Explicitly check for stack overflows. This method can be called |
| // recursively, and since we consume quite some stack space for the C++ |
| // frames, the stack check in the called frame might be too late. |
| if (i::StackLimitCheck{i_isolate}.HasOverflowed()) { |
| i_isolate->StackOverflow(); |
| i_isolate->OptionalRescheduleException(false); |
| return false; |
| } |
| |
| MaybeLocal<Value> maybe_result; |
| bool success = true; |
| { |
| PerIsolateData* data = PerIsolateData::Get(isolate); |
| Local<Context> realm = |
| Local<Context>::New(isolate, data->realms_[data->realm_current_]); |
| Context::Scope context_scope(realm); |
| Local<Context> context(isolate->GetCurrentContext()); |
| ScriptOrigin origin = |
| CreateScriptOrigin(isolate, name, ScriptType::kClassic); |
| |
| for (int i = 1; i < options.repeat_compile; ++i) { |
| HandleScope handle_scope_for_compiling(isolate); |
| if (CompileString<Script>(isolate, context, source, origin).IsEmpty()) { |
| return false; |
| } |
| } |
| Local<Script> script; |
| if (!CompileString<Script>(isolate, context, source, origin) |
| .ToLocal(&script)) { |
| return false; |
| } |
| |
| if (options.code_cache_options == |
| ShellOptions::CodeCacheOptions::kProduceCache) { |
| // Serialize and store it in memory for the next execution. |
| ScriptCompiler::CachedData* cached_data = |
| ScriptCompiler::CreateCodeCache(script->GetUnboundScript()); |
| StoreInCodeCache(isolate, source, cached_data); |
| delete cached_data; |
| } |
| if (options.compile_only) return true; |
| if (options.compile_options == ScriptCompiler::kConsumeCodeCache) { |
| i::Handle<i::Script> i_script( |
| i::Script::cast(Utils::OpenHandle(*script)->shared().script()), |
| i_isolate); |
| // TODO(cbruni, chromium:1244145): remove once context-allocated. |
| i_script->set_host_defined_options(i::FixedArray::cast( |
| *Utils::OpenHandle(*(origin.GetHostDefinedOptions())))); |
| } |
| maybe_result = script->Run(realm); |
| if (options.code_cache_options == |
| ShellOptions::CodeCacheOptions::kProduceCacheAfterExecute) { |
| // Serialize and store it in memory for the next execution. |
| ScriptCompiler::CachedData* cached_data = |
| ScriptCompiler::CreateCodeCache(script->GetUnboundScript()); |
| StoreInCodeCache(isolate, source, cached_data); |
| delete cached_data; |
| } |
| if (process_message_queue) { |
| if (!EmptyMessageQueues(isolate)) success = false; |
| if (!HandleUnhandledPromiseRejections(isolate)) success = false; |
| } |
| data->realm_current_ = data->realm_switch_; |
| |
| if (options.web_snapshot_config) { |
| const char* web_snapshot_output_file_name = "web.snap"; |
| if (options.web_snapshot_output) { |
| web_snapshot_output_file_name = options.web_snapshot_output; |
| } |
| |
| MaybeLocal<PrimitiveArray> maybe_exports = |
| ReadLines(isolate, options.web_snapshot_config); |
| Local<PrimitiveArray> exports; |
| if (!maybe_exports.ToLocal(&exports)) { |
| isolate->ThrowError("Web snapshots: unable to read config"); |
| CHECK(try_catch.HasCaught()); |
| ReportException(isolate, &try_catch); |
| return false; |
| } |
| |
| i::WebSnapshotSerializer serializer(isolate); |
| i::WebSnapshotData snapshot_data; |
| if (serializer.TakeSnapshot(context, exports, snapshot_data)) { |
| DCHECK_NOT_NULL(snapshot_data.buffer); |
| WriteChars(web_snapshot_output_file_name, snapshot_data.buffer, |
| snapshot_data.buffer_size); |
| } else { |
| CHECK(try_catch.HasCaught()); |
| return false; |
| } |
| } else if (options.web_snapshot_output) { |
| isolate->ThrowError( |
| "Web snapshots: --web-snapshot-config is needed when " |
| "--web-snapshot-output is passed"); |
| } |
| } |
| Local<Value> result; |
| if (!maybe_result.ToLocal(&result)) { |
| DCHECK(try_catch.HasCaught()); |
| return false; |
| } |
| // It's possible that a FinalizationRegistry cleanup task threw an error. |
| if (try_catch.HasCaught()) success = false; |
| if (print_result) { |
| if (options.test_shell) { |
| if (!result->IsUndefined()) { |
| // If all went well and the result wasn't undefined then print |
| // the returned value. |
| v8::String::Utf8Value str(isolate, result); |
| fwrite(*str, sizeof(**str), str.length(), stdout); |
| printf("\n"); |
| } |
| } else { |
| v8::String::Utf8Value str(isolate, Stringify(isolate, result)); |
| fwrite(*str, sizeof(**str), str.length(), stdout); |
| printf("\n"); |
| } |
| } |
| return success; |
| } |
| |
| namespace { |
| |
| std::string ToSTLString(Isolate* isolate, Local<String> v8_str) { |
| String::Utf8Value utf8(isolate, v8_str); |
| // Should not be able to fail since the input is a String. |
| CHECK(*utf8); |
| return *utf8; |
| } |
| |
| bool IsAbsolutePath(const std::string& path) { |
| #if defined(_WIN32) || defined(_WIN64) |
| // This is an incorrect approximation, but should |
| // work for all our test-running cases. |
| return path.find(':') != std::string::npos; |
| #else |
| return path[0] == '/'; |
| #endif |
| } |
| |
| std::string GetWorkingDirectory() { |
| #if defined(_WIN32) || defined(_WIN64) |
| char system_buffer[MAX_PATH]; |
| // Unicode paths are unsupported, which is fine as long as |
| // the test directory doesn't include any such paths. |
| DWORD len = GetCurrentDirectoryA(MAX_PATH, system_buffer); |
| CHECK_GT(len, 0); |
| return system_buffer; |
| #else |
| char curdir[PATH_MAX]; |
| CHECK_NOT_NULL(getcwd(curdir, PATH_MAX)); |
| return curdir; |
| #endif |
| } |
| |
| // Returns the directory part of path, without the trailing '/'. |
| std::string DirName(const std::string& path) { |
| DCHECK(IsAbsolutePath(path)); |
| size_t last_slash = path.find_last_of('/'); |
| DCHECK(last_slash != std::string::npos); |
| return path.substr(0, last_slash); |
| } |
| |
| // Resolves path to an absolute path if necessary, and does some |
| // normalization (eliding references to the current directory |
| // and replacing backslashes with slashes). |
| std::string NormalizePath(const std::string& path, |
| const std::string& dir_name) { |
| std::string absolute_path; |
| if (IsAbsolutePath(path)) { |
| absolute_path = path; |
| } else { |
| absolute_path = dir_name + '/' + path; |
| } |
| std::replace(absolute_path.begin(), absolute_path.end(), '\\', '/'); |
| std::vector<std::string> segments; |
| std::istringstream segment_stream(absolute_path); |
| std::string segment; |
| while (std::getline(segment_stream, segment, '/')) { |
| if (segment == "..") { |
| if (!segments.empty()) segments.pop_back(); |
| } else if (segment != ".") { |
| segments.push_back(segment); |
| } |
| } |
| // Join path segments. |
| std::ostringstream os; |
| if (segments.size() > 1) { |
| std::copy(segments.begin(), segments.end() - 1, |
| std::ostream_iterator<std::string>(os, "/")); |
| os << *segments.rbegin(); |
| } else { |
| os << "/"; |
| if (!segments.empty()) os << segments[0]; |
| } |
| return os.str(); |
| } |
| |
| // Per-context Module data, allowing sharing of module maps |
| // across top-level module loads. |
| class ModuleEmbedderData { |
| private: |
| class ModuleGlobalHash { |
| public: |
| explicit ModuleGlobalHash(Isolate* isolate) : isolate_(isolate) {} |
| size_t operator()(const Global<Module>& module) const { |
| return module.Get(isolate_)->GetIdentityHash(); |
| } |
| |
| private: |
| Isolate* isolate_; |
| }; |
| |
| public: |
| explicit ModuleEmbedderData(Isolate* isolate) |
| : module_to_specifier_map(10, ModuleGlobalHash(isolate)), |
| json_module_to_parsed_json_map(10, ModuleGlobalHash(isolate)) {} |
| |
| static ModuleType ModuleTypeFromImportAssertions( |
| Local<Context> context, Local<FixedArray> import_assertions, |
| bool hasPositions) { |
| Isolate* isolate = context->GetIsolate(); |
| const int kV8AssertionEntrySize = hasPositions ? 3 : 2; |
| for (int i = 0; i < import_assertions->Length(); |
| i += kV8AssertionEntrySize) { |
| Local<String> v8_assertion_key = |
| import_assertions->Get(context, i).As<v8::String>(); |
| std::string assertion_key = ToSTLString(isolate, v8_assertion_key); |
| |
| if (assertion_key == "type") { |
| Local<String> v8_assertion_value = |
| import_assertions->Get(context, i + 1).As<String>(); |
| std::string assertion_value = ToSTLString(isolate, v8_assertion_value); |
| if (assertion_value == "json") { |
| return ModuleType::kJSON; |
| } else { |
| // JSON is currently the only supported non-JS type |
| return ModuleType::kInvalid; |
| } |
| } |
| } |
| |
| // If no type is asserted, default to JS. |
| return ModuleType::kJavaScript; |
| } |
| |
| // Map from (normalized module specifier, module type) pair to Module. |
| std::map<std::pair<std::string, ModuleType>, Global<Module>> module_map; |
| // Map from Module to its URL as defined in the ScriptOrigin |
| std::unordered_map<Global<Module>, std::string, ModuleGlobalHash> |
| module_to_specifier_map; |
| // Map from JSON Module to its parsed content, for use in module |
| // JSONModuleEvaluationSteps |
| std::unordered_map<Global<Module>, Global<Value>, ModuleGlobalHash> |
| json_module_to_parsed_json_map; |
| }; |
| |
| enum { kModuleEmbedderDataIndex, kInspectorClientIndex }; |
| |
| void InitializeModuleEmbedderData(Local<Context> context) { |
| context->SetAlignedPointerInEmbedderData( |
| kModuleEmbedderDataIndex, new ModuleEmbedderData(context->GetIsolate())); |
| } |
| |
| ModuleEmbedderData* GetModuleDataFromContext(Local<Context> context) { |
| return static_cast<ModuleEmbedderData*>( |
| context->GetAlignedPointerFromEmbedderData(kModuleEmbedderDataIndex)); |
| } |
| |
| void DisposeModuleEmbedderData(Local<Context> context) { |
| delete GetModuleDataFromContext(context); |
| context->SetAlignedPointerInEmbedderData(kModuleEmbedderDataIndex, nullptr); |
| } |
| |
| MaybeLocal<Module> ResolveModuleCallback(Local<Context> context, |
| Local<String> specifier, |
| Local<FixedArray> import_assertions, |
| Local<Module> referrer) { |
| Isolate* isolate = context->GetIsolate(); |
| ModuleEmbedderData* d = GetModuleDataFromContext(context); |
| auto specifier_it = |
| d->module_to_specifier_map.find(Global<Module>(isolate, referrer)); |
| CHECK(specifier_it != d->module_to_specifier_map.end()); |
| std::string absolute_path = NormalizePath(ToSTLString(isolate, specifier), |
| DirName(specifier_it->second)); |
| ModuleType module_type = ModuleEmbedderData::ModuleTypeFromImportAssertions( |
| context, import_assertions, true); |
| auto module_it = |
| d->module_map.find(std::make_pair(absolute_path, module_type)); |
| CHECK(module_it != d->module_map.end()); |
| return module_it->second.Get(isolate); |
| } |
| |
| } // anonymous namespace |
| |
| MaybeLocal<Module> Shell::FetchModuleTree(Local<Module> referrer, |
| Local<Context> context, |
| const std::string& file_name, |
| ModuleType module_type) { |
| DCHECK(IsAbsolutePath(file_name)); |
| Isolate* isolate = context->GetIsolate(); |
| Local<String> source_text = ReadFile(isolate, file_name.c_str(), false); |
| if (source_text.IsEmpty() && options.fuzzy_module_file_extensions) { |
| std::string fallback_file_name = file_name + ".js"; |
| source_text = ReadFile(isolate, fallback_file_name.c_str(), false); |
| if (source_text.IsEmpty()) { |
| fallback_file_name = file_name + ".mjs"; |
| source_text = ReadFile(isolate, fallback_file_name.c_str()); |
| } |
| } |
| |
| ModuleEmbedderData* d = GetModuleDataFromContext(context); |
| if (source_text.IsEmpty()) { |
| std::string msg = "d8: Error reading module from " + file_name; |
| if (!referrer.IsEmpty()) { |
| auto specifier_it = |
| d->module_to_specifier_map.find(Global<Module>(isolate, referrer)); |
| CHECK(specifier_it != d->module_to_specifier_map.end()); |
| msg += "\n imported by " + specifier_it->second; |
| } |
| isolate->ThrowError( |
| v8::String::NewFromUtf8(isolate, msg.c_str()).ToLocalChecked()); |
| return MaybeLocal<Module>(); |
| } |
| |
| Local<String> resource_name = |
| String::NewFromUtf8(isolate, file_name.c_str()).ToLocalChecked(); |
| ScriptOrigin origin = |
| CreateScriptOrigin(isolate, resource_name, ScriptType::kModule); |
| |
| Local<Module> module; |
| if (module_type == ModuleType::kJavaScript) { |
| ScriptCompiler::Source source(source_text, origin); |
| if (!CompileString<Module>(isolate, context, source_text, origin) |
| .ToLocal(&module)) { |
| return MaybeLocal<Module>(); |
| } |
| } else if (module_type == ModuleType::kJSON) { |
| Local<Value> parsed_json; |
| if (!v8::JSON::Parse(context, source_text).ToLocal(&parsed_json)) { |
| return MaybeLocal<Module>(); |
| } |
| |
| std::vector<Local<String>> export_names{ |
| String::NewFromUtf8(isolate, "default").ToLocalChecked()}; |
| |
| module = v8::Module::CreateSyntheticModule( |
| isolate, |
| String::NewFromUtf8(isolate, file_name.c_str()).ToLocalChecked(), |
| export_names, Shell::JSONModuleEvaluationSteps); |
| |
| CHECK(d->json_module_to_parsed_json_map |
| .insert(std::make_pair(Global<Module>(isolate, module), |
| Global<Value>(isolate, parsed_json))) |
| .second); |
| } else { |
| UNREACHABLE(); |
| } |
| |
| CHECK(d->module_map |
| .insert(std::make_pair(std::make_pair(file_name, module_type), |
| Global<Module>(isolate, module))) |
| .second); |
| CHECK(d->module_to_specifier_map |
| .insert(std::make_pair(Global<Module>(isolate, module), file_name)) |
| .second); |
| |
| std::string dir_name = DirName(file_name); |
| |
| Local<FixedArray> module_requests = module->GetModuleRequests(); |
| for (int i = 0, length = module_requests->Length(); i < length; ++i) { |
| Local<ModuleRequest> module_request = |
| module_requests->Get(context, i).As<ModuleRequest>(); |
| Local<String> name = module_request->GetSpecifier(); |
| std::string absolute_path = |
| NormalizePath(ToSTLString(isolate, name), dir_name); |
| Local<FixedArray> import_assertions = module_request->GetImportAssertions(); |
| ModuleType request_module_type = |
| ModuleEmbedderData::ModuleTypeFromImportAssertions( |
| context, import_assertions, true); |
| |
| if (request_module_type == ModuleType::kInvalid) { |
| isolate->ThrowError("Invalid module type was asserted"); |
| return MaybeLocal<Module>(); |
| } |
| |
| if (d->module_map.count( |
| std::make_pair(absolute_path, request_module_type))) { |
| continue; |
| } |
| |
| if (FetchModuleTree(module, context, absolute_path, request_module_type) |
| .IsEmpty()) { |
| return MaybeLocal<Module>(); |
| } |
| } |
| |
| return module; |
| } |
| |
| MaybeLocal<Value> Shell::JSONModuleEvaluationSteps(Local<Context> context, |
| Local<Module> module) { |
| Isolate* isolate = context->GetIsolate(); |
| |
| ModuleEmbedderData* d = GetModuleDataFromContext(context); |
| auto json_value_it = |
| d->json_module_to_parsed_json_map.find(Global<Module>(isolate, module)); |
| CHECK(json_value_it != d->json_module_to_parsed_json_map.end()); |
| Local<Value> json_value = json_value_it->second.Get(isolate); |
| |
| TryCatch try_catch(isolate); |
| Maybe<bool> result = module->SetSyntheticModuleExport( |
| isolate, |
| String::NewFromUtf8Literal(isolate, "default", |
| NewStringType::kInternalized), |
| json_value); |
| |
| // Setting the default export should never fail. |
| CHECK(!try_catch.HasCaught()); |
| CHECK(!result.IsNothing() && result.FromJust()); |
| |
| Local<Promise::Resolver> resolver = |
| Promise::Resolver::New(context).ToLocalChecked(); |
| resolver->Resolve(context, Undefined(isolate)).ToChecked(); |
| return resolver->GetPromise(); |
| } |
| |
| struct DynamicImportData { |
| DynamicImportData(Isolate* isolate_, Local<String> referrer_, |
| Local<String> specifier_, |
| Local<FixedArray> import_assertions_, |
| Local<Promise::Resolver> resolver_) |
| : isolate(isolate_) { |
| referrer.Reset(isolate, referrer_); |
| specifier.Reset(isolate, specifier_); |
| import_assertions.Reset(isolate, import_assertions_); |
| resolver.Reset(isolate, resolver_); |
| } |
| |
| Isolate* isolate; |
| Global<String> referrer; |
| Global<String> specifier; |
| Global<FixedArray> import_assertions; |
| Global<Promise::Resolver> resolver; |
| }; |
| |
| namespace { |
| struct ModuleResolutionData { |
| ModuleResolutionData(Isolate* isolate_, Local<Value> module_namespace_, |
| Local<Promise::Resolver> resolver_) |
| : isolate(isolate_) { |
| module_namespace.Reset(isolate, module_namespace_); |
| resolver.Reset(isolate, resolver_); |
| } |
| |
| Isolate* isolate; |
| Global<Value> module_namespace; |
| Global<Promise::Resolver> resolver; |
| }; |
| |
| } // namespace |
| |
| void Shell::ModuleResolutionSuccessCallback( |
| const FunctionCallbackInfo<Value>& info) { |
| std::unique_ptr<ModuleResolutionData> module_resolution_data( |
| static_cast<ModuleResolutionData*>( |
| info.Data().As<v8::External>()->Value())); |
| Isolate* isolate(module_resolution_data->isolate); |
| HandleScope handle_scope(isolate); |
| |
| Local<Promise::Resolver> resolver( |
| module_resolution_data->resolver.Get(isolate)); |
| Local<Value> module_namespace( |
| module_resolution_data->module_namespace.Get(isolate)); |
| |
| PerIsolateData* data = PerIsolateData::Get(isolate); |
| Local<Context> realm = data->realms_[data->realm_current_].Get(isolate); |
| Context::Scope context_scope(realm); |
| |
| resolver->Resolve(realm, module_namespace).ToChecked(); |
| } |
| |
| void Shell::ModuleResolutionFailureCallback( |
| const FunctionCallbackInfo<Value>& info) { |
| std::unique_ptr<ModuleResolutionData> module_resolution_data( |
| static_cast<ModuleResolutionData*>( |
| info.Data().As<v8::External>()->Value())); |
| Isolate* isolate(module_resolution_data->isolate); |
| HandleScope handle_scope(isolate); |
| |
| Local<Promise::Resolver> resolver( |
| module_resolution_data->resolver.Get(isolate)); |
| |
| PerIsolateData* data = PerIsolateData::Get(isolate); |
| Local<Context> realm = data->realms_[data->realm_current_].Get(isolate); |
| Context::Scope context_scope(realm); |
| |
| DCHECK_EQ(info.Length(), 1); |
| resolver->Reject(realm, info[0]).ToChecked(); |
| } |
| |
| MaybeLocal<Promise> Shell::HostImportModuleDynamically( |
| Local<Context> context, Local<Data> host_defined_options, |
| Local<Value> resource_name, Local<String> specifier, |
| Local<FixedArray> import_assertions) { |
| Isolate* isolate = context->GetIsolate(); |
| |
| MaybeLocal<Promise::Resolver> maybe_resolver = |
| Promise::Resolver::New(context); |
| Local<Promise::Resolver> resolver; |
| if (!maybe_resolver.ToLocal(&resolver)) return MaybeLocal<Promise>(); |
| |
| if (!IsValidHostDefinedOptions(context, host_defined_options, |
| resource_name)) { |
| resolver |
| ->Reject(context, v8::Exception::TypeError(String::NewFromUtf8Literal( |
| isolate, "Invalid host defined options"))) |
| .ToChecked(); |
| } else { |
| DynamicImportData* data = |
| new DynamicImportData(isolate, resource_name.As<String>(), specifier, |
| import_assertions, resolver); |
| PerIsolateData::Get(isolate)->AddDynamicImportData(data); |
| isolate->EnqueueMicrotask(Shell::DoHostImportModuleDynamically, data); |
| } |
| return resolver->GetPromise(); |
| } |
| |
| void Shell::HostInitializeImportMetaObject(Local<Context> context, |
| Local<Module> module, |
| Local<Object> meta) { |
| Isolate* isolate = context->GetIsolate(); |
| HandleScope handle_scope(isolate); |
| |
| ModuleEmbedderData* d = GetModuleDataFromContext(context); |
| auto specifier_it = |
| d->module_to_specifier_map.find(Global<Module>(isolate, module)); |
| CHECK(specifier_it != d->module_to_specifier_map.end()); |
| |
| Local<String> url_key = |
| String::NewFromUtf8Literal(isolate, "url", NewStringType::kInternalized); |
| Local<String> url = String::NewFromUtf8(isolate, specifier_it->second.c_str()) |
| .ToLocalChecked(); |
| meta->CreateDataProperty(context, url_key, url).ToChecked(); |
| } |
| |
| MaybeLocal<Context> Shell::HostCreateShadowRealmContext( |
| Local<Context> initiator_context) { |
| return v8::Context::New(initiator_context->GetIsolate()); |
| } |
| |
| void Shell::DoHostImportModuleDynamically(void* import_data) { |
| DynamicImportData* import_data_ = |
| static_cast<DynamicImportData*>(import_data); |
| |
| Isolate* isolate(import_data_->isolate); |
| HandleScope handle_scope(isolate); |
| |
| Local<String> referrer(import_data_->referrer.Get(isolate)); |
| Local<String> specifier(import_data_->specifier.Get(isolate)); |
| Local<FixedArray> import_assertions( |
| import_data_->import_assertions.Get(isolate)); |
| Local<Promise::Resolver> resolver(import_data_->resolver.Get(isolate)); |
| |
| PerIsolateData* data = PerIsolateData::Get(isolate); |
| PerIsolateData::Get(isolate)->DeleteDynamicImportData(import_data_); |
| |
| Local<Context> realm = data->realms_[data->realm_current_].Get(isolate); |
| Context::Scope context_scope(realm); |
| |
| ModuleType module_type = ModuleEmbedderData::ModuleTypeFromImportAssertions( |
| realm, import_assertions, false); |
| |
| TryCatch try_catch(isolate); |
| try_catch.SetVerbose(true); |
| |
| if (module_type == ModuleType::kInvalid) { |
| isolate->ThrowError("Invalid module type was asserted"); |
| CHECK(try_catch.HasCaught()); |
| resolver->Reject(realm, try_catch.Exception()).ToChecked(); |
| return; |
| } |
| |
| std::string source_url = ToSTLString(isolate, referrer); |
| std::string dir_name = |
| DirName(NormalizePath(source_url, GetWorkingDirectory())); |
| std::string file_name = ToSTLString(isolate, specifier); |
| std::string absolute_path = NormalizePath(file_name, dir_name); |
| |
| ModuleEmbedderData* d = GetModuleDataFromContext(realm); |
| Local<Module> root_module; |
| auto module_it = |
| d->module_map.find(std::make_pair(absolute_path, module_type)); |
| if (module_it != d->module_map.end()) { |
| root_module = module_it->second.Get(isolate); |
| } else if (!FetchModuleTree(Local<Module>(), realm, absolute_path, |
| module_type) |
| .ToLocal(&root_module)) { |
| CHECK(try_catch.HasCaught()); |
| resolver->Reject(realm, try_catch.Exception()).ToChecked(); |
| return; |
| } |
| |
| MaybeLocal<Value> maybe_result; |
| if (root_module->InstantiateModule(realm, ResolveModuleCallback) |
| .FromMaybe(false)) { |
| maybe_result = root_module->Evaluate(realm); |
| CHECK(!maybe_result.IsEmpty()); |
| EmptyMessageQueues(isolate); |
| } |
| |
| Local<Value> result; |
| if (!maybe_result.ToLocal(&result)) { |
| DCHECK(try_catch.HasCaught()); |
| resolver->Reject(realm, try_catch.Exception()).ToChecked(); |
| return; |
| } |
| |
| Local<Value> module_namespace = root_module->GetModuleNamespace(); |
| Local<Promise> result_promise(result.As<Promise>()); |
| |
| // Setup callbacks, and then chain them to the result promise. |
| // ModuleResolutionData will be deleted by the callbacks. |
| auto module_resolution_data = |
| new ModuleResolutionData(isolate, module_namespace, resolver); |
| Local<v8::External> edata = External::New(isolate, module_resolution_data); |
| Local<Function> callback_success; |
| CHECK(Function::New(realm, ModuleResolutionSuccessCallback, edata) |
| .ToLocal(&callback_success)); |
| Local<Function> callback_failure; |
| CHECK(Function::New(realm, ModuleResolutionFailureCallback, edata) |
| .ToLocal(&callback_failure)); |
| result_promise->Then(realm, callback_success, callback_failure) |
| .ToLocalChecked(); |
| } |
| |
| bool Shell::ExecuteModule(Isolate* isolate, const char* file_name) { |
| HandleScope handle_scope(isolate); |
| |
| PerIsolateData* data = PerIsolateData::Get(isolate); |
| Local<Context> realm = data->realms_[data->realm_current_].Get(isolate); |
| Context::Scope context_scope(realm); |
| |
| std::string absolute_path = NormalizePath(file_name, GetWorkingDirectory()); |
| |
| // Use a non-verbose TryCatch and report exceptions manually using |
| // Shell::ReportException, because some errors (such as file errors) are |
| // thrown without entering JS and thus do not trigger |
| // isolate->ReportPendingMessages(). |
| TryCatch try_catch(isolate); |
| |
| ModuleEmbedderData* d = GetModuleDataFromContext(realm); |
| Local<Module> root_module; |
| auto module_it = d->module_map.find( |
| std::make_pair(absolute_path, ModuleType::kJavaScript)); |
| if (module_it != d->module_map.end()) { |
| root_module = module_it->second.Get(isolate); |
| } else if (!FetchModuleTree(Local<Module>(), realm, absolute_path, |
| ModuleType::kJavaScript) |
| .ToLocal(&root_module)) { |
| CHECK(try_catch.HasCaught()); |
| ReportException(isolate, &try_catch); |
| return false; |
| } |
| |
| MaybeLocal<Value> maybe_result; |
| if (root_module->InstantiateModule(realm, ResolveModuleCallback) |
| .FromMaybe(false)) { |
| maybe_result = root_module->Evaluate(realm); |
| CHECK(!maybe_result.IsEmpty()); |
| EmptyMessageQueues(isolate); |
| } |
| Local<Value> result; |
| if (!maybe_result.ToLocal(&result)) { |
| DCHECK(try_catch.HasCaught()); |
| ReportException(isolate, &try_catch); |
| return false; |
| } |
| |
| // Loop until module execution finishes |
| Local<Promise> result_promise(result.As<Promise>()); |
| while (result_promise->State() == Promise::kPending) { |
| Shell::CompleteMessageLoop(isolate); |
| } |
| |
| if (result_promise->State() == Promise::kRejected) { |
| // If the exception has been caught by the promise pipeline, we rethrow |
| // here in order to ReportException. |
| // TODO(cbruni): Clean this up after we create a new API for the case |
| // where TLA is enabled. |
| if (!try_catch.HasCaught()) { |
| isolate->ThrowException(result_promise->Result()); |
| } else { |
| DCHECK_EQ(try_catch.Exception(), result_promise->Result()); |
| } |
| ReportException(isolate, &try_catch); |
| return false; |
| } |
| |
| DCHECK(!try_catch.HasCaught()); |
| return true; |
| } |
| |
| bool Shell::ExecuteWebSnapshot(Isolate* isolate, const char* file_name) { |
| HandleScope handle_scope(isolate); |
| |
| PerIsolateData* data = PerIsolateData::Get(isolate); |
| Local<Context> realm = data->realms_[data->realm_current_].Get(isolate); |
| Context::Scope context_scope(realm); |
| TryCatch try_catch(isolate); |
| bool success = false; |
| |
| std::string absolute_path = NormalizePath(file_name, GetWorkingDirectory()); |
| |
| int length = 0; |
| std::unique_ptr<uint8_t[]> snapshot_data( |
| reinterpret_cast<uint8_t*>(ReadChars(absolute_path.c_str(), &length))); |
| if (length == 0) { |
| isolate->ThrowError("Could not read the web snapshot file"); |
| } else { |
| i::WebSnapshotDeserializer deserializer(isolate, snapshot_data.get(), |
| static_cast<size_t>(length)); |
| success = deserializer.Deserialize(); |
| } |
| if (!success) { |
| CHECK(try_catch.HasCaught()); |
| ReportException(isolate, &try_catch); |
| } |
| return success; |
| } |
| |
| // Treat every line as a JSON value and parse it. |
| bool Shell::LoadJSON(Isolate* isolate, const char* file_name) { |
| HandleScope handle_scope(isolate); |
| PerIsolateData* isolate_data = PerIsolateData::Get(isolate); |
| Local<Context> realm = |
| isolate_data->realms_[isolate_data->realm_current_].Get(isolate); |
| Context::Scope context_scope(realm); |
| TryCatch try_catch(isolate); |
| |
| std::string absolute_path = NormalizePath(file_name, GetWorkingDirectory()); |
| int length = 0; |
| std::unique_ptr<char[]> data(ReadChars(absolute_path.c_str(), &length)); |
| if (length == 0) { |
| printf("Error reading '%s'\n", file_name); |
| base::OS::ExitProcess(1); |
| } |
| std::stringstream stream(data.get()); |
| std::string line; |
| while (std::getline(stream, line, '\n')) { |
| Local<String> source = |
| String::NewFromUtf8(isolate, line.c_str()).ToLocalChecked(); |
| MaybeLocal<Value> maybe_value = JSON::Parse(realm, source); |
| Local<Value> value; |
| if (!maybe_value.ToLocal(&value)) { |
| DCHECK(try_catch.HasCaught()); |
| ReportException(isolate, &try_catch); |
| return false; |
| } |
| } |
| return true; |
| } |
| |
| PerIsolateData::PerIsolateData(Isolate* isolate) |
| : isolate_(isolate), realms_(nullptr) { |
| isolate->SetData(0, this); |
| if (i::FLAG_expose_async_hooks) { |
| async_hooks_wrapper_ = new AsyncHooks(isolate); |
| } |
| ignore_unhandled_promises_ = false; |
| // TODO(v8:11525): Use methods on global Snapshot objects with |
| // signature checks. |
| HandleScope scope(isolate); |
| Shell::CreateSnapshotTemplate(isolate); |
| } |
| |
| PerIsolateData::~PerIsolateData() { |
| isolate_->SetData(0, nullptr); // Not really needed, just to be sure... |
| if (i::FLAG_expose_async_hooks) { |
| delete async_hooks_wrapper_; // This uses the isolate |
| } |
| #if defined(LEAK_SANITIZER) |
| for (DynamicImportData* data : import_data_) { |
| delete data; |
| } |
| #endif |
| } |
| |
| void PerIsolateData::SetTimeout(Local<Function> callback, |
| Local<Context> context) { |
| set_timeout_callbacks_.emplace(isolate_, callback); |
| set_timeout_contexts_.emplace(isolate_, context); |
| } |
| |
| MaybeLocal<Function> PerIsolateData::GetTimeoutCallback() { |
| if (set_timeout_callbacks_.empty()) return MaybeLocal<Function>(); |
| Local<Function> result = set_timeout_callbacks_.front().Get(isolate_); |
| set_timeout_callbacks_.pop(); |
| return result; |
| } |
| |
| MaybeLocal<Context> PerIsolateData::GetTimeoutContext() { |
| if (set_timeout_contexts_.empty()) return MaybeLocal<Context>(); |
| Local<Context> result = set_timeout_contexts_.front().Get(isolate_); |
| set_timeout_contexts_.pop(); |
| return result; |
| } |
| |
| void PerIsolateData::RemoveUnhandledPromise(Local<Promise> promise) { |
| if (ignore_unhandled_promises_) return; |
| // Remove handled promises from the list |
| DCHECK_EQ(promise->GetIsolate(), isolate_); |
| for (auto it = unhandled_promises_.begin(); it != unhandled_promises_.end(); |
| ++it) { |
| v8::Local<v8::Promise> unhandled_promise = std::get<0>(*it).Get(isolate_); |
| if (unhandled_promise == promise) { |
| unhandled_promises_.erase(it--); |
| } |
| } |
| } |
| |
| void PerIsolateData::AddUnhandledPromise(Local<Promise> promise, |
| Local<Message> message, |
| Local<Value> exception) { |
| if (ignore_unhandled_promises_) return; |
| DCHECK_EQ(promise->GetIsolate(), isolate_); |
| unhandled_promises_.emplace_back(v8::Global<v8::Promise>(isolate_, promise), |
| v8::Global<v8::Message>(isolate_, message), |
| v8::Global<v8::Value>(isolate_, exception)); |
| } |
| |
| int PerIsolateData::HandleUnhandledPromiseRejections() { |
| // Avoid recursive calls to HandleUnhandledPromiseRejections. |
| if (ignore_unhandled_promises_) return 0; |
| ignore_unhandled_promises_ = true; |
| v8::HandleScope scope(isolate_); |
| // Ignore promises that get added during error reporting. |
| size_t i = 0; |
| for (; i < unhandled_promises_.size(); i++) { |
| const auto& tuple = unhandled_promises_[i]; |
| Local<v8::Message> message = std::get<1>(tuple).Get(isolate_); |
| Local<v8::Value> value = std::get<2>(tuple).Get(isolate_); |
| Shell::ReportException(isolate_, message, value); |
| } |
| unhandled_promises_.clear(); |
| ignore_unhandled_promises_ = false; |
| return static_cast<int>(i); |
| } |
| |
| void PerIsolateData::AddDynamicImportData(DynamicImportData* data) { |
| #if defined(LEAK_SANITIZER) |
| import_data_.insert(data); |
| #endif |
| } |
| void PerIsolateData::DeleteDynamicImportData(DynamicImportData* data) { |
| #if defined(LEAK_SANITIZER) |
| import_data_.erase(data); |
| #endif |
| delete data; |
| } |
| |
| Local<FunctionTemplate> PerIsolateData::GetTestApiObjectCtor() const { |
| return test_api_object_ctor_.Get(isolate_); |
| } |
| |
| void PerIsolateData::SetTestApiObjectCtor(Local<FunctionTemplate> ctor) { |
| test_api_object_ctor_.Reset(isolate_, ctor); |
| } |
| |
| Local<FunctionTemplate> PerIsolateData::GetSnapshotObjectCtor() const { |
| return snapshot_object_ctor_.Get(isolate_); |
| } |
| |
| void PerIsolateData::SetSnapshotObjectCtor(Local<FunctionTemplate> ctor) { |
| snapshot_object_ctor_.Reset(isolate_, ctor); |
| } |
| |
| PerIsolateData::RealmScope::RealmScope(PerIsolateData* data) : data_(data) { |
| data_->realm_count_ = 1; |
| data_->realm_current_ = 0; |
| data_->realm_switch_ = 0; |
| data_->realms_ = new Global<Context>[1]; |
| data_->realms_[0].Reset(data_->isolate_, |
| data_->isolate_->GetEnteredOrMicrotaskContext()); |
| } |
| |
| PerIsolateData::RealmScope::~RealmScope() { |
| // Drop realms to avoid keeping them alive. We don't dispose the |
| // module embedder data for the first realm here, but instead do |
| // it in RunShell or in RunMain, if not running in interactive mode |
| for (int i = 1; i < data_->realm_count_; ++i) { |
| Global<Context>& realm = data_->realms_[i]; |
| if (realm.IsEmpty()) continue; |
| DisposeModuleEmbedderData(realm.Get(data_->isolate_)); |
| } |
| data_->realm_count_ = 0; |
| delete[] data_->realms_; |
| } |
| |
| PerIsolateData::ExplicitRealmScope::ExplicitRealmScope(PerIsolateData* data, |
| int index) |
| : data_(data), index_(index) { |
| realm_ = Local<Context>::New(data->isolate_, data->realms_[index_]); |
| realm_->Enter(); |
| previous_index_ = data->realm_current_; |
| data->realm_current_ = data->realm_switch_ = index_; |
| } |
| |
| PerIsolateData::ExplicitRealmScope::~ExplicitRealmScope() { |
| realm_->Exit(); |
| data_->realm_current_ = data_->realm_switch_ = previous_index_; |
| } |
| |
| Local<Context> PerIsolateData::ExplicitRealmScope::context() const { |
| return realm_; |
| } |
| |
| int PerIsolateData::RealmFind(Local<Context> context) { |
| for (int i = 0; i < realm_count_; ++i) { |
| if (realms_[i] == context) return i; |
| } |
| return -1; |
| } |
| |
| int PerIsolateData::RealmIndexOrThrow( |
| const v8::FunctionCallbackInfo<v8::Value>& args, int arg_offset) { |
| if (args.Length() < arg_offset || !args[arg_offset]->IsNumber()) { |
| args.GetIsolate()->ThrowError("Invalid argument"); |
| return -1; |
| } |
| int index = args[arg_offset] |
| ->Int32Value(args.GetIsolate()->GetCurrentContext()) |
| .FromMaybe(-1); |
| if (index < 0 || index >= realm_count_ || realms_[index].IsEmpty()) { |
| args.GetIsolate()->ThrowError("Invalid realm index"); |
| return -1; |
| } |
| return index; |
| } |
| |
| // performance.now() returns a time stamp as double, measured in milliseconds. |
| // When FLAG_verify_predictable mode is enabled it returns result of |
| // v8::Platform::MonotonicallyIncreasingTime(). |
| void Shell::PerformanceNow(const v8::FunctionCallbackInfo<v8::Value>& args) { |
| if (i::FLAG_verify_predictable) { |
| args.GetReturnValue().Set(g_platform->MonotonicallyIncreasingTime()); |
| } else { |
| base::TimeDelta delta = base::TimeTicks::Now() - kInitialTicks; |
| args.GetReturnValue().Set(delta.InMillisecondsF()); |
| } |
| } |
| |
| // performance.measureMemory() implements JavaScript Memory API proposal. |
| // See https://github.com/ulan/javascript-agent-memory/blob/master/explainer.md. |
| void Shell::PerformanceMeasureMemory( |
| const v8::FunctionCallbackInfo<v8::Value>& args) { |
| v8::MeasureMemoryMode mode = v8::MeasureMemoryMode::kSummary; |
| v8::Isolate* isolate = args.GetIsolate(); |
| Local<Context> context = isolate->GetCurrentContext(); |
| if (args.Length() >= 1 && args[0]->IsObject()) { |
| Local<Object> object = args[0].As<Object>(); |
| Local<Value> value = TryGetValue(isolate, context, object, "detailed") |
| .FromMaybe(Local<Value>()); |
| if (value.IsEmpty()) { |
| // Exception was thrown and scheduled, so return from the callback. |
| return; |
| } |
| if (value->IsBoolean() && value->BooleanValue(isolate)) { |
| mode = v8::MeasureMemoryMode::kDetailed; |
| } |
| } |
| Local<v8::Promise::Resolver> promise_resolver = |
| v8::Promise::Resolver::New(context).ToLocalChecked(); |
| args.GetIsolate()->MeasureMemory( |
| v8::MeasureMemoryDelegate::Default(isolate, context, promise_resolver, |
| mode), |
| v8::MeasureMemoryExecution::kEager); |
| args.GetReturnValue().Set(promise_resolver->GetPromise()); |
| } |
| |
| // Realm.current() returns the index of the currently active realm. |
| void Shell::RealmCurrent(const v8::FunctionCallbackInfo<v8::Value>& args) { |
| Isolate* isolate = args.GetIsolate(); |
| PerIsolateData* data = PerIsolateData::Get(isolate); |
| int index = data->RealmFind(isolate->GetEnteredOrMicrotaskContext()); |
| if (index == -1) return; |
| args.GetReturnValue().Set(index); |
| } |
| |
| // Realm.owner(o) returns the index of the realm that created o. |
| void Shell::RealmOwner(const v8::FunctionCallbackInfo<v8::Value>& args) { |
| Isolate* isolate = args.GetIsolate(); |
| PerIsolateData* data = PerIsolateData::Get(isolate); |
| if (args.Length() < 1 || !args[0]->IsObject()) { |
| args.GetIsolate()->ThrowError("Invalid argument"); |
| return; |
| } |
| Local<Object> object = |
| args[0]->ToObject(isolate->GetCurrentContext()).ToLocalChecked(); |
| i::Handle<i::JSReceiver> i_object = Utils::OpenHandle(*object); |
| if (i_object->IsJSGlobalProxy() && |
| i::Handle<i::JSGlobalProxy>::cast(i_object)->IsDetached()) { |
| return; |
| } |
| Local<Context> creation_context; |
| if (!object->GetCreationContext().ToLocal(&creation_context)) { |
| args.GetIsolate()->ThrowError("object doesn't have creation context"); |
| return; |
| } |
| int index = data->RealmFind(creation_context); |
| if (index == -1) return; |
| args.GetReturnValue().Set(index); |
| } |
| |
| // Realm.global(i) returns the global object of realm i. |
| // (Note that properties of global objects cannot be read/written cross-realm.) |
| void Shell::RealmGlobal(const v8::FunctionCallbackInfo<v8::Value>& args) { |
| PerIsolateData* data = PerIsolateData::Get(args.GetIsolate()); |
| int index = data->RealmIndexOrThrow(args, 0); |
| if (index == -1) return; |
| // TODO(chromium:324812): Ideally Context::Global should never return raw |
| // global objects but return a global proxy. Currently it returns global |
| // object when the global proxy is detached from the global object. The |
| // following is a workaround till we fix Context::Global so we don't leak |
| // global objects. |
| Local<Object> global = |
| Local<Context>::New(args.GetIsolate(), data->realms_[index])->Global(); |
| i::Handle<i::Object> i_global = Utils::OpenHandle(*global); |
| if (i_global->IsJSGlobalObject()) { |
| i::Isolate* i_isolate = reinterpret_cast<i::Isolate*>(args.GetIsolate()); |
| i::Handle<i::JSObject> i_global_proxy = |
| handle(i::Handle<i::JSGlobalObject>::cast(i_global)->global_proxy(), |
| i_isolate); |
| global = Utils::ToLocal(i_global_proxy); |
| } |
| args.GetReturnValue().Set(global); |
| } |
| |
| MaybeLocal<Context> Shell::CreateRealm( |
| const v8::FunctionCallbackInfo<v8::Value>& args, int index, |
| v8::MaybeLocal<Value> global_object) { |
| const char* kGlobalHandleLabel = "d8::realm"; |
| Isolate* isolate = args.GetIsolate(); |
| TryCatch try_catch(isolate); |
| PerIsolateData* data = PerIsolateData::Get(isolate); |
| if (index < 0) { |
| Global<Context>* old_realms = data->realms_; |
| index = data->realm_count_; |
| data->realms_ = new Global<Context>[++data->realm_count_]; |
| for (int i = 0; i < index; ++i) { |
| Global<Context>& realm = data->realms_[i]; |
| realm.Reset(isolate, old_realms[i]); |
| if (!realm.IsEmpty()) { |
| realm.AnnotateStrongRetainer(kGlobalHandleLabel); |
| } |
| old_realms[i].Reset(); |
| } |
| delete[] old_realms; |
| } |
| Local<ObjectTemplate> global_template = CreateGlobalTemplate(isolate); |
| Local<Context> context = |
| Context::New(isolate, nullptr, global_template, global_object); |
| DCHECK(!try_catch.HasCaught()); |
| if (context.IsEmpty()) return MaybeLocal<Context>(); |
| InitializeModuleEmbedderData(context); |
| data->realms_[index].Reset(isolate, context); |
| data->realms_[index].AnnotateStrongRetainer(kGlobalHandleLabel); |
| args.GetReturnValue().Set(index); |
| return context; |
| } |
| |
| void Shell::DisposeRealm(const v8::FunctionCallbackInfo<v8::Value>& args, |
| int index) { |
| Isolate* isolate = args.GetIsolate(); |
| PerIsolateData* data = PerIsolateData::Get(isolate); |
| Local<Context> context = data->realms_[index].Get(isolate); |
| DisposeModuleEmbedderData(context); |
| data->realms_[index].Reset(); |
| // ContextDisposedNotification expects the disposed context to be entered. |
| v8::Context::Scope scope(context); |
| isolate->ContextDisposedNotification(); |
| isolate->IdleNotificationDeadline(g_platform->MonotonicallyIncreasingTime()); |
| } |
| |
| // Realm.create() creates a new realm with a distinct security token |
| // and returns its index. |
| void Shell::RealmCreate(const v8::FunctionCallbackInfo<v8::Value>& args) { |
| CreateRealm(args, -1, v8::MaybeLocal<Value>()); |
| } |
| |
| // Realm.createAllowCrossRealmAccess() creates a new realm with the same |
| // security token as the current realm. |
| void Shell::RealmCreateAllowCrossRealmAccess( |
| const v8::FunctionCallbackInfo<v8::Value>& args) { |
| Local<Context> context; |
| if (CreateRealm(args, -1, v8::MaybeLocal<Value>()).ToLocal(&context)) { |
| context->SetSecurityToken( |
| args.GetIsolate()->GetEnteredOrMicrotaskContext()->GetSecurityToken()); |
| } |
| } |
| |
| // Realm.navigate(i) creates a new realm with a distinct security token |
| // in place of realm i. |
| void Shell::RealmNavigate(const v8::FunctionCallbackInfo<v8::Value>& args) { |
| Isolate* isolate = args.GetIsolate(); |
| PerIsolateData* data = PerIsolateData::Get(isolate); |
| int index = data->RealmIndexOrThrow(args, 0); |
| if (index == -1) return; |
| if (index == 0 || index == data->realm_current_ || |
| index == data->realm_switch_) { |
| args.GetIsolate()->ThrowError("Invalid realm index"); |
| return; |
| } |
| |
| Local<Context> context = Local<Context>::New(isolate, data->realms_[index]); |
| v8::MaybeLocal<Value> global_object = context->Global(); |
| |
| // Context::Global doesn't return JSGlobalProxy if DetachGlobal is called in |
| // advance. |
| if (!global_object.IsEmpty()) { |
| HandleScope scope(isolate); |
| if (!Utils::OpenHandle(*global_object.ToLocalChecked()) |
| ->IsJSGlobalProxy()) { |
| global_object = v8::MaybeLocal<Value>(); |
| } |
| } |
| |
| DisposeRealm(args, index); |
| CreateRealm(args, index, global_object); |
| } |
| |
| // Realm.detachGlobal(i) detaches the global objects of realm i from realm i. |
| void Shell::RealmDetachGlobal(const v8::FunctionCallbackInfo<v8::Value>& args) { |
| Isolate* isolate = args.GetIsolate(); |
| PerIsolateData* data = PerIsolateData::Get(isolate); |
| int index = data->RealmIndexOrThrow(args, 0); |
| if (index == -1) return; |
| if (index == 0 || index == data->realm_current_ || |
| index == data->realm_switch_) { |
| args.GetIsolate()->ThrowError("Invalid realm index"); |
| return; |
| } |
| |
| HandleScope scope(isolate); |
| Local<Context> realm = Local<Context>::New(isolate, data->realms_[index]); |
| realm->DetachGlobal(); |
| } |
| |
| // Realm.dispose(i) disposes the reference to the realm i. |
| void Shell::RealmDispose(const v8::FunctionCallbackInfo<v8::Value>& args) { |
| Isolate* isolate = args.GetIsolate(); |
| PerIsolateData* data = PerIsolateData::Get(isolate); |
| int index = data->RealmIndexOrThrow(args, 0); |
| if (index == -1) return; |
| if (index == 0 || index == data->realm_current_ || |
| index == data->realm_switch_) { |
| args.GetIsolate()->ThrowError("Invalid realm index"); |
| return; |
| } |
| DisposeRealm(args, index); |
| } |
| |
| // Realm.switch(i) switches to the realm i for consecutive interactive inputs. |
| void Shell::RealmSwitch(const v8::FunctionCallbackInfo<v8::Value>& args) { |
| Isolate* isolate = args.GetIsolate(); |
| PerIsolateData* data = PerIsolateData::Get(isolate); |
| int index = data->RealmIndexOrThrow(args, 0); |
| if (index == -1) return; |
| data->realm_switch_ = index; |
| } |
| |
| // Realm.eval(i, s) evaluates s in realm i and returns the result. |
| void Shell::RealmEval(const v8::FunctionCallbackInfo<v8::Value>& args) { |
| Isolate* isolate = args.GetIsolate(); |
| PerIsolateData* data = PerIsolateData::Get(isolate); |
| int index = data->RealmIndexOrThrow(args, 0); |
| if (index == -1) return; |
| if (args.Length() < 2) { |
| isolate->ThrowError("Invalid argument"); |
| return; |
| } |
| |
| Local<String> source; |
| if (!ReadSource(args, 1, CodeType::kString).ToLocal(&source)) { |
| isolate->ThrowError("Invalid argument"); |
| return; |
| } |
| ScriptOrigin origin = |
| CreateScriptOrigin(isolate, String::NewFromUtf8Literal(isolate, "(d8)"), |
| ScriptType::kClassic); |
| |
| ScriptCompiler::Source script_source(source, origin); |
| Local<UnboundScript> script; |
| if (!ScriptCompiler::CompileUnboundScript(isolate, &script_source) |
| .ToLocal(&script)) { |
| return; |
| } |
| Local<Value> result; |
| { |
| PerIsolateData::ExplicitRealmScope realm_scope(data, index); |
| if (!script->BindToCurrentContext() |
| ->Run(realm_scope.context()) |
| .ToLocal(&result)) { |
| return; |
| } |
| } |
| args.GetReturnValue().Set(result); |
| } |
| |
| // Realm.shared is an accessor for a single shared value across realms. |
| void Shell::RealmSharedGet(Local<String> property, |
| const PropertyCallbackInfo<Value>& info) { |
| Isolate* isolate = info.GetIsolate(); |
| PerIsolateData* data = PerIsolateData::Get(isolate); |
| if (data->realm_shared_.IsEmpty()) return; |
| info.GetReturnValue().Set(data->realm_shared_); |
| } |
| |
| void Shell::RealmSharedSet(Local<String> property, Local<Value> value, |
| const PropertyCallbackInfo<void>& info) { |
| Isolate* isolate = info.GetIsolate(); |
| PerIsolateData* data = PerIsolateData::Get(isolate); |
| data->realm_shared_.Reset(isolate, value); |
| } |
| |
| // Realm.takeWebSnapshot(index, exports) takes a snapshot of the list of exports |
| // in the realm with the specified index and returns the result. |
| void Shell::RealmTakeWebSnapshot( |
| const v8::FunctionCallbackInfo<v8::Value>& args) { |
| Isolate* isolate = args.GetIsolate(); |
| if (args.Length() < 2 || !args[1]->IsArray()) { |
| isolate->ThrowError("Invalid argument"); |
| return; |
| } |
| PerIsolateData* data = PerIsolateData::Get(isolate); |
| int index = data->RealmIndexOrThrow(args, 0); |
| if (index == -1) return; |
| // Create a Local<PrimitiveArray> from the exports array. |
| Local<Context> current_context = isolate->GetCurrentContext(); |
| Local<Array> exports_array = args[1].As<Array>(); |
| int length = exports_array->Length(); |
| Local<PrimitiveArray> exports = PrimitiveArray::New(isolate, length); |
| for (int i = 0; i < length; ++i) { |
| Local<Value> value; |
| Local<String> str; |
| if (!exports_array->Get(current_context, i).ToLocal(&value) || |
| !value->ToString(current_context).ToLocal(&str) || str.IsEmpty()) { |
| isolate->ThrowError("Invalid argument"); |
| return; |
| } |
| exports->Set(isolate, i, str); |
| } |
| // Take the snapshot in the specified Realm. |
| auto snapshot_data_shared = std::make_shared<i::WebSnapshotData>(); |
| { |
| TryCatch try_catch(isolate); |
| try_catch.SetVerbose(true); |
| PerIsolateData::ExplicitRealmScope realm_scope(data, index); |
| i::WebSnapshotSerializer serializer(isolate); |
| if (!serializer.TakeSnapshot(realm_scope.context(), exports, |
| *snapshot_data_shared)) { |
| CHECK(try_catch.HasCaught()); |
| args.GetReturnValue().Set(Undefined(isolate)); |
| return; |
| } |
| } |
| // Create a snapshot object and store the WebSnapshotData as an embedder |
| // field. TODO(v8:11525): Use methods on global Snapshot objects with |
| // signature checks. |
| i::Isolate* i_isolate = reinterpret_cast<i::Isolate*>(isolate); |
| i::Handle<i::Object> snapshot_data_managed = |
| i::Managed<i::WebSnapshotData>::FromSharedPtr( |
| i_isolate, snapshot_data_shared->buffer_size, snapshot_data_shared); |
| v8::Local<v8::Value> shapshot_data = Utils::ToLocal(snapshot_data_managed); |
| Local<ObjectTemplate> snapshot_template = |
| data->GetSnapshotObjectCtor()->InstanceTemplate(); |
| Local<Object> snapshot_instance = |
| snapshot_template->NewInstance(isolate->GetCurrentContext()) |
| .ToLocalChecked(); |
| snapshot_instance->SetInternalField(0, shapshot_data); |
| args.GetReturnValue().Set(snapshot_instance); |
| } |
| |
| // Realm.useWebSnapshot(index, snapshot) deserializes the snapshot in the realm |
| // with the specified index. |
| void Shell::RealmUseWebSnapshot( |
| const v8::FunctionCallbackInfo<v8::Value>& args) { |
| Isolate* isolate = args.GetIsolate(); |
| if (args.Length() < 2 || !args[1]->IsObject()) { |
| isolate->ThrowError("Invalid argument"); |
| return; |
| } |
| PerIsolateData* data = PerIsolateData::Get(isolate); |
| int index = data->RealmIndexOrThrow(args, 0); |
| if (index == -1) return; |
| // Restore the snapshot data from the snapshot object. |
| Local<Object> snapshot_instance = args[1].As<Object>(); |
| Local<FunctionTemplate> snapshot_template = data->GetSnapshotObjectCtor(); |
| if (!snapshot_template->HasInstance(snapshot_instance)) { |
| isolate->ThrowError("Invalid argument"); |
| return; |
| } |
| v8::Local<v8::Value> snapshot_data = snapshot_instance->GetInternalField(0); |
| i::Handle<i::Object> snapshot_data_handle = Utils::OpenHandle(*snapshot_data); |
| auto snapshot_data_managed = |
| i::Handle<i::Managed<i::WebSnapshotData>>::cast(snapshot_data_handle); |
| std::shared_ptr<i::WebSnapshotData> snapshot_data_shared = |
| snapshot_data_managed->get(); |
| // Deserialize the snapshot in the specified Realm. |
| { |
| PerIsolateData::ExplicitRealmScope realm_scope(data, index); |
| i::WebSnapshotDeserializer deserializer(isolate, |
| snapshot_data_shared->buffer, |
| snapshot_data_shared->buffer_size); |
| bool success = deserializer.Deserialize(); |
| args.GetReturnValue().Set(success); |
| } |
| } |
| |
| void Shell::LogGetAndStop(const v8::FunctionCallbackInfo<v8::Value>& args) { |
| Isolate* isolate = args.GetIsolate(); |
| i::Isolate* i_isolate = reinterpret_cast<i::Isolate*>(isolate); |
| HandleScope handle_scope(isolate); |
| |
| std::string file_name = i_isolate->logger()->file_name(); |
| if (!i::Log::IsLoggingToTemporaryFile(file_name)) { |
| isolate->ThrowError("Only capturing from temporary files is supported."); |
| return; |
| } |
| if (!i_isolate->logger()->is_logging()) { |
| isolate->ThrowError("Logging not enabled."); |
| return; |
| } |
| |
| std::string raw_log; |
| FILE* log_file = i_isolate->logger()->TearDownAndGetLogFile(); |
| if (!log_file) { |
| isolate->ThrowError("Log file does not exist."); |
| return; |
| } |
| |
| bool exists = false; |
| raw_log = i::ReadFile(log_file, &exists, true); |
| base::Fclose(log_file); |
| |
| if (!exists) { |
| isolate->ThrowError("Unable to read log file."); |
| return; |
| } |
| Local<String> result = |
| String::NewFromUtf8(isolate, raw_log.c_str(), NewStringType::kNormal, |
| static_cast<int>(raw_log.size())) |
| .ToLocalChecked(); |
| |
| args.GetReturnValue().Set(result); |
| } |
| |
| void Shell::TestVerifySourcePositions( |
| const v8::FunctionCallbackInfo<v8::Value>& args) { |
| Isolate* isolate = args.GetIsolate(); |
| // Check if the argument is a valid function. |
| if (args.Length() != 1) { |
| isolate->ThrowError("Expected function as single argument."); |
| return; |
| } |
| auto arg_handle = Utils::OpenHandle(*args[0]); |
| if (!arg_handle->IsHeapObject() || |
| !i::Handle<i::HeapObject>::cast(arg_handle) |
| ->IsJSFunctionOrBoundFunctionOrWrappedFunction()) { |
| isolate->ThrowError("Expected function as single argument."); |
| return; |
| } |
| |
| i::Isolate* i_isolate = reinterpret_cast<i::Isolate*>(isolate); |
| HandleScope handle_scope(isolate); |
| |
| auto callable = |
| i::Handle<i::JSFunctionOrBoundFunctionOrWrappedFunction>::cast( |
| arg_handle); |
| while (callable->IsJSBoundFunction()) { |
| internal::DisallowGarbageCollection no_gc; |
| auto bound_function = i::Handle<i::JSBoundFunction>::cast(callable); |
| auto bound_target = bound_function->bound_target_function(); |
| if (!bound_target.IsJSFunctionOrBoundFunctionOrWrappedFunction()) { |
| internal::AllowGarbageCollection allow_gc; |
| isolate->ThrowError("Expected function as bound target."); |
| return; |
| } |
| callable = handle( |
| i::JSFunctionOrBoundFunctionOrWrappedFunction::cast(bound_target), |
| i_isolate); |
| } |
| |
| i::Handle<i::JSFunction> function = i::Handle<i::JSFunction>::cast(callable); |
| if (!function->shared().HasBytecodeArray()) { |
| isolate->ThrowError("Function has no BytecodeArray attached."); |
| return; |
| } |
| i::Handle<i::BytecodeArray> bytecodes = |
| handle(function->shared().GetBytecodeArray(i_isolate), i_isolate); |
| i::interpreter::BytecodeArrayIterator bytecode_iterator(bytecodes); |
| bool has_baseline = function->shared().HasBaselineCode(); |
| i::Handle<i::ByteArray> bytecode_offsets; |
| std::unique_ptr<i::baseline::BytecodeOffsetIterator> offset_iterator; |
| if (has_baseline) { |
| bytecode_offsets = |
| handle(i::ByteArray::cast( |
| function->shared().GetCode().bytecode_offset_table()), |
| i_isolate); |
| offset_iterator = std::make_unique<i::baseline::BytecodeOffsetIterator>( |
| bytecode_offsets, bytecodes); |
| // A freshly initiated BytecodeOffsetIterator points to the prologue. |
| DCHECK_EQ(offset_iterator->current_pc_start_offset(), 0); |
| DCHECK_EQ(offset_iterator->current_bytecode_offset(), |
| i::kFunctionEntryBytecodeOffset); |
| offset_iterator->Advance(); |
| } |
| while (!bytecode_iterator.done()) { |
| if (has_baseline) { |
| if (offset_iterator->current_bytecode_offset() != |
| bytecode_iterator.current_offset()) { |
| isolate->ThrowError("Baseline bytecode offset mismatch."); |
| return; |
| } |
| // Check that we map every address to this bytecode correctly. |
| // The start address is exclusive and the end address inclusive. |
| for (i::Address pc = offset_iterator->current_pc_start_offset() + 1; |
| pc <= offset_iterator->current_pc_end_offset(); ++pc) { |
| i::baseline::BytecodeOffsetIterator pc_lookup(bytecode_offsets, |
| bytecodes); |
| pc_lookup.AdvanceToPCOffset(pc); |
| if (pc_lookup.current_bytecode_offset() != |
| bytecode_iterator.current_offset()) { |
| isolate->ThrowError( |
| "Baseline bytecode offset mismatch for PC lookup."); |
| return; |
| } |
| } |
| } |
| bytecode_iterator.Advance(); |
| if (has_baseline && !bytecode_iterator.done()) { |
| if (offset_iterator->done()) { |
| isolate->ThrowError("Missing bytecode(s) in baseline offset mapping."); |
| return; |
| } |
| offset_iterator->Advance(); |
| } |
| } |
| if (has_baseline && !offset_iterator->done()) { |
| isolate->ThrowError("Excess offsets in baseline offset mapping."); |
| return; |
| } |
| } |
| |
| // async_hooks.createHook() registers functions to be called for different |
| // lifetime events of each async operation. |
| void Shell::AsyncHooksCreateHook( |
| const v8::FunctionCallbackInfo<v8::Value>& args) { |
| Local<Object> wrap = |
| PerIsolateData::Get(args.GetIsolate())->GetAsyncHooks()->CreateHook(args); |
| args.GetReturnValue().Set(wrap); |
| } |
| |
| // async_hooks.executionAsyncId() returns the asyncId of the current execution |
| // context. |
| void Shell::AsyncHooksExecutionAsyncId( |
| const v8::FunctionCallbackInfo<v8::Value>& args) { |
| Isolate* isolate = args.GetIsolate(); |
| HandleScope handle_scope(isolate); |
| args.GetReturnValue().Set(v8::Number::New( |
| isolate, |
| PerIsolateData::Get(isolate)->GetAsyncHooks()->GetExecutionAsyncId())); |
| } |
| |
| void Shell::AsyncHooksTriggerAsyncId( |
| const v8::FunctionCallbackInfo<v8::Value>& args) { |
| Isolate* isolate = args.GetIsolate(); |
| HandleScope handle_scope(isolate); |
| args.GetReturnValue().Set(v8::Number::New( |
| isolate, |
| PerIsolateData::Get(isolate)->GetAsyncHooks()->GetTriggerAsyncId())); |
| } |
| |
| void Shell::SetPromiseHooks(const v8::FunctionCallbackInfo<v8::Value>& args) { |
| Isolate* isolate = args.GetIsolate(); |
| if (i::FLAG_correctness_fuzzer_suppressions) { |
| // Setting promise hoooks dynamically has unexpected timing side-effects |
| // with certain promise optimizations. We might not get all callbacks for |
| // previously scheduled Promises or optimized code-paths that skip Promise |
| // creation. |
| isolate->ThrowError( |
| "d8.promise.setHooks is disabled with " |
| "--correctness-fuzzer-suppressions"); |
| return; |
| } |
| #ifdef V8_ENABLE_JAVASCRIPT_PROMISE_HOOKS |
| Local<Context> context = isolate->GetCurrentContext(); |
| HandleScope handle_scope(isolate); |
| |
| context->SetPromiseHooks( |
| args[0]->IsFunction() ? args[0].As<Function>() : Local<Function>(), |
| args[1]->IsFunction() ? args[1].As<Function>() : Local<Function>(), |
| args[2]->IsFunction() ? args[2].As<Function>() : Local<Function>(), |
| args[3]->IsFunction() ? args[3].As<Function>() : Local<Function>()); |
| |
| args.GetReturnValue().Set(v8::Undefined(isolate)); |
| #else // V8_ENABLE_JAVASCRIPT_PROMISE_HOOKS |
| isolate->ThrowError( |
| "d8.promise.setHooks is disabled due to missing build flag " |
| "v8_enabale_javascript_in_promise_hooks"); |
| #endif // V8_ENABLE_JAVASCRIPT_PROMISE_HOOKS |
| } |
| |
| void WriteToFile(FILE* file, const v8::FunctionCallbackInfo<v8::Value>& args) { |
| for (int i = 0; i < args.Length(); i++) { |
| HandleScope handle_scope(args.GetIsolate()); |
| if (i != 0) { |
| fprintf(file, " "); |
| } |
| |
| // Explicitly catch potential exceptions in toString(). |
| v8::TryCatch try_catch(args.GetIsolate()); |
| Local<Value> arg = args[i]; |
| Local<String> str_obj; |
| |
| if (arg->IsSymbol()) { |
| arg = arg.As<Symbol>()->Description(args.GetIsolate()); |
| } |
| if (!arg->ToString(args.GetIsolate()->GetCurrentContext()) |
| .ToLocal(&str_obj)) { |
| try_catch.ReThrow(); |
| return; |
| } |
| |
| v8::String::Utf8Value str(args.GetIsolate(), str_obj); |
| int n = static_cast<int>(fwrite(*str, sizeof(**str), str.length(), file)); |
| if (n != str.length()) { |
| printf("Error in fwrite\n"); |
| base::OS::ExitProcess(1); |
| } |
| } |
| } |
| |
| void WriteAndFlush(FILE* file, |
| const v8::FunctionCallbackInfo<v8::Value>& args) { |
| WriteToFile(file, args); |
| fprintf(file, "\n"); |
| fflush(file); |
| } |
| |
| void Shell::Print(const v8::FunctionCallbackInfo<v8::Value>& args) { |
| WriteAndFlush(stdout, args); |
| } |
| |
| void Shell::PrintErr(const v8::FunctionCallbackInfo<v8::Value>& args) { |
| WriteAndFlush(stderr, args); |
| } |
| |
| void Shell::WriteStdout(const v8::FunctionCallbackInfo<v8::Value>& args) { |
| WriteToFile(stdout, args); |
| } |
| |
| void Shell::ReadFile(const v8::FunctionCallbackInfo<v8::Value>& args) { |
| String::Utf8Value file_name(args.GetIsolate(), args[0]); |
| if (*file_name == nullptr) { |
| args.GetIsolate()->ThrowError("Error converting filename to string"); |
| return; |
| } |
| if (args.Length() == 2) { |
| String::Utf8Value format(args.GetIsolate(), args[1]); |
| if (*format && std::strcmp(*format, "binary") == 0) { |
| ReadBuffer(args); |
| return; |
| } |
| } |
| Local<String> source = ReadFile(args.GetIsolate(), *file_name); |
| if (source.IsEmpty()) return; |
| args.GetReturnValue().Set(source); |
| } |
| |
| Local<String> Shell::ReadFromStdin(Isolate* isolate) { |
| static const int kBufferSize = 256; |
| char buffer[kBufferSize]; |
| Local<String> accumulator = String::NewFromUtf8Literal(isolate, ""); |
| int length; |
| while (true) { |
| // Continue reading if the line ends with an escape '\\' or the line has |
| // not been fully read into the buffer yet (does not end with '\n'). |
| // If fgets gets an error, just give up. |
| char* input = nullptr; |
| input = fgets(buffer, kBufferSize, stdin); |
| if (input == nullptr) return Local<String>(); |
| length = static_cast<int>(strlen(buffer)); |
| if (length == 0) { |
| return accumulator; |
| } else if (buffer[length - 1] != '\n') { |
| accumulator = String::Concat( |
| isolate, accumulator, |
| String::NewFromUtf8(isolate, buffer, NewStringType::kNormal, length) |
| .ToLocalChecked()); |
| } else if (length > 1 && buffer[length - 2] == '\\') { |
| buffer[length - 2] = '\n'; |
| accumulator = |
| String::Concat(isolate, accumulator, |
| String::NewFromUtf8(isolate, buffer, |
| NewStringType::kNormal, length - 1) |
| .ToLocalChecked()); |
| } else { |
| return String::Concat( |
| isolate, accumulator, |
| String::NewFromUtf8(isolate, buffer, NewStringType::kNormal, |
| length - 1) |
| .ToLocalChecked()); |
| } |
| } |
| } |
| |
| void Shell::ExecuteFile(const v8::FunctionCallbackInfo<v8::Value>& args) { |
| Isolate* isolate = args.GetIsolate(); |
| for (int i = 0; i < args.Length(); i++) { |
| HandleScope handle_scope(isolate); |
| String::Utf8Value file_name(isolate, args[i]); |
| if (*file_name == nullptr) { |
| std::ostringstream oss; |
| oss << "Cannot convert file[" << i << "] name to string."; |
| isolate->ThrowError( |
| String::NewFromUtf8(isolate, oss.str().c_str()).ToLocalChecked()); |
| return; |
| } |
| Local<String> source = ReadFile(isolate, *file_name); |
| if (source.IsEmpty()) return; |
| if (!ExecuteString( |
| args.GetIsolate(), source, |
| String::NewFromUtf8(isolate, *file_name).ToLocalChecked(), |
| kNoPrintResult, |
| options.quiet_load ? kNoReportExceptions : kReportExceptions, |
| kNoProcessMessageQueue)) { |
| std::ostringstream oss; |
| oss << "Error executing file: \"" << *file_name << '"'; |
| isolate->ThrowError( |
| String::NewFromUtf8(isolate, oss.str().c_str()).ToLocalChecked()); |
| return; |
| } |
| } |
| } |
| |
| void Shell::SetTimeout(const v8::FunctionCallbackInfo<v8::Value>& args) { |
| Isolate* isolate = args.GetIsolate(); |
| args.GetReturnValue().Set(v8::Number::New(isolate, 0)); |
| if (args.Length() == 0 || !args[0]->IsFunction()) return; |
| Local<Function> callback = args[0].As<Function>(); |
| Local<Context> context = isolate->GetCurrentContext(); |
| PerIsolateData::Get(isolate)->SetTimeout(callback, context); |
| } |
| |
| void Shell::ReadCodeTypeAndArguments( |
| const v8::FunctionCallbackInfo<v8::Value>& args, int index, |
| CodeType* code_type, Local<Value>* arguments) { |
| Isolate* isolate = args.GetIsolate(); |
| if (args.Length() > index && args[index]->IsObject()) { |
| Local<Object> object = args[index].As<Object>(); |
| Local<Context> context = isolate->GetCurrentContext(); |
| Local<Value> value; |
| if (!TryGetValue(isolate, context, object, "type").ToLocal(&value)) { |
| *code_type = CodeType::kNone; |
| return; |
| } |
| if (!value->IsString()) { |
| *code_type = CodeType::kInvalid; |
| return; |
| } |
| Local<String> worker_type_string = |
| value->ToString(context).ToLocalChecked(); |
| String::Utf8Value str(isolate, worker_type_string); |
| if (strcmp("classic", *str) == 0) { |
| *code_type = CodeType::kFileName; |
| } else if (strcmp("string", *str) == 0) { |
| *code_type = CodeType::kString; |
| } else if (strcmp("function", *str) == 0) { |
| *code_type = CodeType::kFunction; |
| } else { |
| *code_type = CodeType::kInvalid; |
| } |
| if (arguments != nullptr) { |
| bool got_arguments = |
| TryGetValue(isolate, context, object, "arguments").ToLocal(arguments); |
| USE(got_arguments); |
| } |
| } else { |
| *code_type = CodeType::kNone; |
| } |
| } |
| |
| bool Shell::FunctionAndArgumentsToString(Local<Function> function, |
| Local<Value> arguments, |
| Local<String>* source, |
| Isolate* isolate) { |
| Local<Context> context = isolate->GetCurrentContext(); |
| MaybeLocal<String> maybe_function_string = |
| function->FunctionProtoToString(context); |
| Local<String> function_string; |
| if (!maybe_function_string.ToLocal(&function_string)) { |
| isolate->ThrowError("Failed to convert function to string"); |
| return false; |
| } |
| *source = String::NewFromUtf8Literal(isolate, "("); |
| *source = String::Concat(isolate, *source, function_string); |
| Local<String> middle = String::NewFromUtf8Literal(isolate, ")("); |
| *source = String::Concat(isolate, *source, middle); |
| if (!arguments.IsEmpty() && !arguments->IsUndefined()) { |
| if (!arguments->IsArray()) { |
| isolate->ThrowError("'arguments' must be an array"); |
| return false; |
| } |
| Local<String> comma = String::NewFromUtf8Literal(isolate, ","); |
| Local<Array> array = arguments.As<Array>(); |
| for (uint32_t i = 0; i < array->Length(); ++i) { |
| if (i > 0) { |
| *source = String::Concat(isolate, *source, comma); |
| } |
| MaybeLocal<Value> maybe_argument = array->Get(context, i); |
| Local<Value> argument; |
| if (!maybe_argument.ToLocal(&argument)) { |
| isolate->ThrowError("Failed to get argument"); |
| return false; |
| } |
| Local<String> argument_string; |
| if (!JSON::Stringify(context, argument).ToLocal(&argument_string)) { |
| isolate->ThrowError("Failed to convert argument to string"); |
| return false; |
| } |
| *source = String::Concat(isolate, *source, argument_string); |
| } |
| } |
| Local<String> suffix = String::NewFromUtf8Literal(isolate, ")"); |
| *source = String::Concat(isolate, *source, suffix); |
| return true; |
| } |
| |
| // ReadSource() supports reading source code through `args[index]` as specified |
| // by the `default_type` or an optional options bag provided in `args[index+1]` |
| // (e.g. `options={type: 'code_type', arguments:[...]}`). |
| MaybeLocal<String> Shell::ReadSource( |
| const v8::FunctionCallbackInfo<v8::Value>& args, int index, |
| CodeType default_type) { |
| CodeType code_type; |
| Local<Value> arguments; |
| ReadCodeTypeAndArguments(args, index + 1, &code_type, &arguments); |
| |
| Isolate* isolate = args.GetIsolate(); |
| Local<String> source; |
| if (code_type == CodeType::kNone) { |
| code_type = default_type; |
| } |
| switch (code_type) { |
| case CodeType::kFunction: |
| if (!args[index]->IsFunction()) { |
| return MaybeLocal<String>(); |
| } |
| // Source: ( function_to_string )( params ) |
| if (!FunctionAndArgumentsToString(args[index].As<Function>(), arguments, |
| &source, isolate)) { |
| return MaybeLocal<String>(); |
| } |
| break; |
| case CodeType::kFileName: { |
| if (!args[index]->IsString()) { |
| return MaybeLocal<String>(); |
| } |
| String::Utf8Value filename(isolate, args[index]); |
| source = Shell::ReadFile(isolate, *filename); |
| if (source.IsEmpty()) return MaybeLocal<String>(); |
| break; |
| } |
| case CodeType::kString: |
| if (!args[index]->IsString()) { |
| return MaybeLocal<String>(); |
| } |
| source = args[index].As<String>(); |
| break; |
| case CodeType::kNone: |
| case CodeType::kInvalid: |
| return MaybeLocal<String>(); |
| } |
| return source; |
| } |
| |
| void Shell::WorkerNew(const v8::FunctionCallbackInfo<v8::Value>& args) { |
| Isolate* isolate = args.GetIsolate(); |
| HandleScope handle_scope(isolate); |
| if (args.Length() < 1 || (!args[0]->IsString() && !args[0]->IsFunction())) { |
| isolate->ThrowError("1st argument must be a string or a function"); |
| return; |
| } |
| |
| Local<String> source; |
| if (!ReadSource(args, 0, CodeType::kFileName).ToLocal(&source)) { |
| isolate->ThrowError("Invalid argument"); |
| return; |
| } |
| |
| if (!args.IsConstructCall()) { |
| isolate->ThrowError("Worker must be constructed with new"); |
| return; |
| } |
| |
| // Initialize the embedder field to 0; if we return early without |
| // creating a new Worker (because the main thread is terminating) we can |
| // early-out from the instance calls. |
| args.Holder()->SetInternalField(0, v8::Integer::New(isolate, 0)); |
| |
| { |
| // Don't allow workers to create more workers if the main thread |
| // is waiting for existing running workers to terminate. |
| base::MutexGuard lock_guard(workers_mutex_.Pointer()); |
| if (!allow_new_workers_) return; |
| |
| String::Utf8Value script(isolate, source); |
| if (!*script) { |
| isolate->ThrowError("Can't get worker script"); |
| return; |
| } |
| |
| // The C++ worker object's lifetime is shared between the Managed<Worker> |
| // object on the heap, which the JavaScript object points to, and an |
| // internal std::shared_ptr in the worker thread itself. |
| auto worker = std::make_shared<Worker>(*script); |
| i::Isolate* i_isolate = reinterpret_cast<i::Isolate*>(isolate); |
| const size_t kWorkerSizeEstimate = 4 * 1024 * 1024; // stack + heap. |
| i::Handle<i::Object> managed = i::Managed<Worker>::FromSharedPtr( |
| i_isolate, kWorkerSizeEstimate, worker); |
| args.Holder()->SetInternalField(0, Utils::ToLocal(managed)); |
| if (!Worker::StartWorkerThread(std::move(worker))) { |
| isolate->ThrowError("Can't start thread"); |
| return; |
| } |
| } |
| } |
| |
| void Shell::WorkerPostMessage(const v8::FunctionCallbackInfo<v8::Value>& args) { |
| Isolate* isolate = args.GetIsolate(); |
| HandleScope handle_scope(isolate); |
| |
| if (args.Length() < 1) { |
| isolate->ThrowError("Invalid argument"); |
| return; |
| } |
| |
| std::shared_ptr<Worker> worker = |
| GetWorkerFromInternalField(isolate, args.Holder()); |
| if (!worker.get()) { |
| return; |
| } |
| |
| Local<Value> message = args[0]; |
| Local<Value> transfer = |
| args.Length() >= 2 ? args[1] : Undefined(isolate).As<Value>(); |
| std::unique_ptr<SerializationData> data = |
| Shell::SerializeValue(isolate, message, transfer); |
| if (data) { |
| worker->PostMessage(std::move(data)); |
| } |
| } |
| |
| void Shell::WorkerGetMessage(const v8::FunctionCallbackInfo<v8::Value>& args) { |
| Isolate* isolate = args.GetIsolate(); |
| HandleScope handle_scope(isolate); |
| std::shared_ptr<Worker> worker = |
| GetWorkerFromInternalField(isolate, args.Holder()); |
| if (!worker.get()) { |
| return; |
| } |
| |
| std::unique_ptr<SerializationData> data = worker->GetMessage(); |
| if (data) { |
| Local<Value> value; |
| if (Shell::DeserializeValue(isolate, std::move(data)).ToLocal(&value)) { |
| args.GetReturnValue().Set(value); |
| } |
| } |
| } |
| |
| void Shell::WorkerTerminate(const v8::FunctionCallbackInfo<v8::Value>& args) { |
| Isolate* isolate = args.GetIsolate(); |
| HandleScope handle_scope(isolate); |
| std::shared_ptr<Worker> worker = |
| GetWorkerFromInternalField(isolate, args.Holder()); |
| if (!worker.get()) return; |
| worker->Terminate(); |
| } |
| |
| void Shell::WorkerTerminateAndWait( |
| const v8::FunctionCallbackInfo<v8::Value>& args) { |
| Isolate* isolate = args.GetIsolate(); |
| HandleScope handle_scope(isolate); |
| std::shared_ptr<Worker> worker = |
| GetWorkerFromInternalField(isolate, args.Holder()); |
| if (!worker.get()) { |
| return; |
| } |
| |
| worker->TerminateAndWaitForThread(); |
| } |
| |
| void Shell::QuitOnce(v8::FunctionCallbackInfo<v8::Value>* args) { |
| int exit_code = (*args)[0] |
| ->Int32Value(args->GetIsolate()->GetCurrentContext()) |
| .FromMaybe(0); |
| WaitForRunningWorkers(); |
| Isolate* isolate = args->GetIsolate(); |
| isolate->Exit(); |
| |
| // As we exit the process anyway, we do not dispose the platform and other |
| // global data and manually unlock to quell DCHECKs. Other isolates might |
| // still be running, so disposing here can cause them to crash. |
| i::Isolate* i_isolate = reinterpret_cast<i::Isolate*>(isolate); |
| if (i_isolate->thread_manager()->IsLockedByCurrentThread()) { |
| i_isolate->thread_manager()->Unlock(); |
| } |
| |