blob: 1a2755f0639f4cdb3cd34086bcfeb5a4872479e7 [file] [log] [blame]
// Copyright 2014 the V8 project authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include <memory>
#include "src/api/api-inl.h"
#include "src/api/api.h"
#include "src/builtins/builtins.h"
#include "src/common/message-template.h"
#include "src/execution/arguments-inl.h"
#include "src/execution/isolate-inl.h"
#include "src/execution/messages.h"
#include "src/execution/tiering-manager.h"
#include "src/handles/maybe-handles.h"
#include "src/logging/counters.h"
#include "src/numbers/conversions.h"
#include "src/objects/template-objects-inl.h"
#include "src/utils/ostreams.h"
#if V8_ENABLE_WEBASSEMBLY
// TODO(chromium:1236668): Drop this when the "SaveAndClearThreadInWasmFlag"
// approach is no longer needed.
#include "src/trap-handler/trap-handler.h"
#endif // V8_ENABLE_WEBASSEMBLY
namespace v8 {
namespace internal {
RUNTIME_FUNCTION(Runtime_AccessCheck) {
HandleScope scope(isolate);
DCHECK_EQ(1, args.length());
Handle<JSObject> object = args.at<JSObject>(0);
if (!isolate->MayAccess(isolate->native_context(), object)) {
RETURN_FAILURE_ON_EXCEPTION(isolate,
isolate->ReportFailedAccessCheck(object));
UNREACHABLE();
}
return ReadOnlyRoots(isolate).undefined_value();
}
RUNTIME_FUNCTION(Runtime_FatalProcessOutOfMemoryInAllocateRaw) {
HandleScope scope(isolate);
DCHECK_EQ(0, args.length());
isolate->heap()->FatalProcessOutOfMemory("CodeStubAssembler::AllocateRaw");
UNREACHABLE();
}
RUNTIME_FUNCTION(Runtime_FatalProcessOutOfMemoryInvalidArrayLength) {
HandleScope scope(isolate);
DCHECK_EQ(0, args.length());
isolate->heap()->FatalProcessOutOfMemory("invalid array length");
UNREACHABLE();
}
RUNTIME_FUNCTION(Runtime_FatalInvalidSize) {
HandleScope scope(isolate);
DCHECK_EQ(0, args.length());
FATAL("Invalid size");
UNREACHABLE();
}
RUNTIME_FUNCTION(Runtime_Throw) {
HandleScope scope(isolate);
DCHECK_EQ(1, args.length());
return isolate->Throw(args[0]);
}
RUNTIME_FUNCTION(Runtime_ReThrow) {
HandleScope scope(isolate);
DCHECK_EQ(1, args.length());
return isolate->ReThrow(args[0]);
}
RUNTIME_FUNCTION(Runtime_ReThrowWithMessage) {
HandleScope scope(isolate);
DCHECK_EQ(2, args.length());
return isolate->ReThrow(args[0], args[1]);
}
RUNTIME_FUNCTION(Runtime_ThrowStackOverflow) {
SealHandleScope shs(isolate);
DCHECK_LE(0, args.length());
return isolate->StackOverflow();
}
RUNTIME_FUNCTION(Runtime_ThrowSymbolAsyncIteratorInvalid) {
HandleScope scope(isolate);
DCHECK_EQ(0, args.length());
THROW_NEW_ERROR_RETURN_FAILURE(
isolate, NewTypeError(MessageTemplate::kSymbolAsyncIteratorInvalid));
}
RUNTIME_FUNCTION(Runtime_TerminateExecution) {
HandleScope scope(isolate);
DCHECK_EQ(0, args.length());
return isolate->TerminateExecution();
}
namespace {
Tagged<Object> NewError(Isolate* isolate, RuntimeArguments args,
Handle<JSFunction> (Isolate::*constructor_fn)()) {
HandleScope scope(isolate);
DCHECK_LE(1, args.length());
int message_id_smi = args.smi_value_at(0);
constexpr int kMaxMessageArgs = 3;
DirectHandle<Object> message_args[kMaxMessageArgs];
int num_message_args = 0;
while (num_message_args < kMaxMessageArgs &&
args.length() > num_message_args + 1) {
message_args[num_message_args] = args.at(num_message_args + 1);
++num_message_args;
}
MessageTemplate message_id = MessageTemplateFromInt(message_id_smi);
return *isolate->factory()->NewError(
(isolate->*constructor_fn)(), message_id,
base::VectorOf(message_args, num_message_args));
}
Tagged<Object> ThrowError(Isolate* isolate, RuntimeArguments args,
Handle<JSFunction> (Isolate::*constructor_fn)()) {
return isolate->Throw(NewError(isolate, args, constructor_fn));
}
} // namespace
RUNTIME_FUNCTION(Runtime_ThrowRangeError) {
if (v8_flags.correctness_fuzzer_suppressions) {
DCHECK_LE(1, args.length());
int message_id_smi = args.smi_value_at(0);
// If the result of a BigInt computation is truncated to 64 bit, Turbofan
// can sometimes truncate intermediate results already, which can prevent
// those from exceeding the maximum length, effectively preventing a
// RangeError from being thrown. As this is a performance optimization, this
// behavior is accepted. To prevent the correctness fuzzer from detecting
// this difference, we crash the program.
if (MessageTemplateFromInt(message_id_smi) ==
MessageTemplate::kBigIntTooBig) {
FATAL("Aborting on invalid BigInt length");
}
}
return ThrowError(isolate, args, &Isolate::range_error_function);
}
RUNTIME_FUNCTION(Runtime_ThrowTypeError) {
return ThrowError(isolate, args, &Isolate::type_error_function);
}
RUNTIME_FUNCTION(Runtime_ThrowTypeErrorIfStrict) {
if (GetShouldThrow(isolate, Nothing<ShouldThrow>()) ==
ShouldThrow::kDontThrow) {
return ReadOnlyRoots(isolate).undefined_value();
}
return ThrowError(isolate, args, &Isolate::type_error_function);
}
namespace {
const char* ElementsKindToType(ElementsKind fixed_elements_kind) {
switch (fixed_elements_kind) {
#define ELEMENTS_KIND_CASE(Type, type, TYPE, ctype) \
case TYPE##_ELEMENTS: \
return #Type "Array";
TYPED_ARRAYS(ELEMENTS_KIND_CASE)
RAB_GSAB_TYPED_ARRAYS_WITH_TYPED_ARRAY_TYPE(ELEMENTS_KIND_CASE)
#undef ELEMENTS_KIND_CASE
default:
UNREACHABLE();
}
}
} // namespace
RUNTIME_FUNCTION(Runtime_ThrowInvalidTypedArrayAlignment) {
HandleScope scope(isolate);
DCHECK_EQ(2, args.length());
Handle<Map> map = args.at<Map>(0);
Handle<String> problem_string = args.at<String>(1);
ElementsKind kind = map->elements_kind();
Handle<String> type =
isolate->factory()->NewStringFromAsciiChecked(ElementsKindToType(kind));
ExternalArrayType external_type;
size_t size;
Factory::TypeAndSizeForElementsKind(kind, &external_type, &size);
Handle<Object> element_size =
handle(Smi::FromInt(static_cast<int>(size)), isolate);
THROW_NEW_ERROR_RETURN_FAILURE(
isolate, NewRangeError(MessageTemplate::kInvalidTypedArrayAlignment,
problem_string, type, element_size));
}
RUNTIME_FUNCTION(Runtime_UnwindAndFindExceptionHandler) {
SealHandleScope shs(isolate);
DCHECK_EQ(0, args.length());
return isolate->UnwindAndFindHandler();
}
RUNTIME_FUNCTION(Runtime_PropagateException) {
SealHandleScope shs(isolate);
DCHECK_EQ(0, args.length());
DCHECK(isolate->has_exception());
return ReadOnlyRoots(isolate).exception();
}
RUNTIME_FUNCTION(Runtime_ThrowReferenceError) {
HandleScope scope(isolate);
DCHECK_EQ(1, args.length());
Handle<Object> name = args.at(0);
THROW_NEW_ERROR_RETURN_FAILURE(
isolate, NewReferenceError(MessageTemplate::kNotDefined, name));
}
RUNTIME_FUNCTION(Runtime_ThrowAccessedUninitializedVariable) {
HandleScope scope(isolate);
DCHECK_EQ(1, args.length());
Handle<Object> name = args.at(0);
THROW_NEW_ERROR_RETURN_FAILURE(
isolate,
NewReferenceError(MessageTemplate::kAccessedUninitializedVariable, name));
}
RUNTIME_FUNCTION(Runtime_NewError) {
HandleScope scope(isolate);
DCHECK_EQ(2, args.length());
int template_index = args.smi_value_at(0);
Handle<Object> arg0 = args.at(1);
MessageTemplate message_template = MessageTemplateFromInt(template_index);
return *isolate->factory()->NewError(message_template, arg0);
}
RUNTIME_FUNCTION(Runtime_NewTypeError) {
return NewError(isolate, args, &Isolate::type_error_function);
}
RUNTIME_FUNCTION(Runtime_NewReferenceError) {
HandleScope scope(isolate);
DCHECK_EQ(2, args.length());
int template_index = args.smi_value_at(0);
Handle<Object> arg0 = args.at(1);
MessageTemplate message_template = MessageTemplateFromInt(template_index);
return *isolate->factory()->NewReferenceError(message_template, arg0);
}
RUNTIME_FUNCTION(Runtime_ThrowInvalidStringLength) {
HandleScope scope(isolate);
THROW_NEW_ERROR_RETURN_FAILURE(isolate, NewInvalidStringLengthError());
}
RUNTIME_FUNCTION(Runtime_ThrowIteratorResultNotAnObject) {
HandleScope scope(isolate);
DCHECK_EQ(1, args.length());
Handle<Object> value = args.at(0);
THROW_NEW_ERROR_RETURN_FAILURE(
isolate,
NewTypeError(MessageTemplate::kIteratorResultNotAnObject, value));
}
RUNTIME_FUNCTION(Runtime_ThrowThrowMethodMissing) {
HandleScope scope(isolate);
DCHECK_EQ(0, args.length());
THROW_NEW_ERROR_RETURN_FAILURE(
isolate, NewTypeError(MessageTemplate::kThrowMethodMissing));
}
RUNTIME_FUNCTION(Runtime_ThrowSymbolIteratorInvalid) {
HandleScope scope(isolate);
DCHECK_EQ(0, args.length());
THROW_NEW_ERROR_RETURN_FAILURE(
isolate, NewTypeError(MessageTemplate::kSymbolIteratorInvalid));
}
RUNTIME_FUNCTION(Runtime_ThrowNoAccess) {
HandleScope scope(isolate);
DCHECK_EQ(0, args.length());
// TODO(verwaest): We would like to throw using the calling context instead
// of the entered context but we don't currently have access to that.
HandleScopeImplementer* impl = isolate->handle_scope_implementer();
SaveAndSwitchContext save(isolate,
impl->LastEnteredContext()->native_context());
THROW_NEW_ERROR_RETURN_FAILURE(isolate,
NewTypeError(MessageTemplate::kNoAccess));
}
RUNTIME_FUNCTION(Runtime_ThrowNotConstructor) {
HandleScope scope(isolate);
DCHECK_EQ(1, args.length());
Handle<Object> object = args.at(0);
THROW_NEW_ERROR_RETURN_FAILURE(
isolate, NewTypeError(MessageTemplate::kNotConstructor, object));
}
RUNTIME_FUNCTION(Runtime_ThrowApplyNonFunction) {
HandleScope scope(isolate);
DCHECK_EQ(1, args.length());
Handle<Object> object = args.at(0);
Handle<String> type = Object::TypeOf(isolate, object);
Handle<String> msg;
if (IsNull(*object)) {
// "which is null"
msg = isolate->factory()->NewStringFromAsciiChecked("null");
} else if (isolate->factory()->object_string()->Equals(*type)) {
// "which is an object"
msg = isolate->factory()->NewStringFromAsciiChecked("an object");
} else {
// "which is a typeof arg"
msg = isolate->factory()
->NewConsString(
isolate->factory()->NewStringFromAsciiChecked("a "), type)
.ToHandleChecked();
}
THROW_NEW_ERROR_RETURN_FAILURE(
isolate, NewTypeError(MessageTemplate::kApplyNonFunction, object, msg));
}
RUNTIME_FUNCTION(Runtime_StackGuard) {
SealHandleScope shs(isolate);
DCHECK_EQ(0, args.length());
TRACE_EVENT0("v8.execute", "V8.StackGuard");
// First check if this is a real stack overflow.
StackLimitCheck check(isolate);
if (check.JsHasOverflowed()) {
return isolate->StackOverflow();
}
return isolate->stack_guard()->HandleInterrupts(
StackGuard::InterruptLevel::kAnyEffect);
}
RUNTIME_FUNCTION(Runtime_HandleNoHeapWritesInterrupts) {
SealHandleScope shs(isolate);
DCHECK_EQ(0, args.length());
TRACE_EVENT0("v8.execute", "V8.StackGuard");
// First check if this is a real stack overflow.
StackLimitCheck check(isolate);
if (check.JsHasOverflowed()) {
return isolate->StackOverflow();
}
return isolate->stack_guard()->HandleInterrupts(
StackGuard::InterruptLevel::kNoHeapWrites);
}
RUNTIME_FUNCTION(Runtime_StackGuardWithGap) {
SealHandleScope shs(isolate);
DCHECK_EQ(args.length(), 1);
uint32_t gap = args.positive_smi_value_at(0);
TRACE_EVENT0("v8.execute", "V8.StackGuard");
// First check if this is a real stack overflow.
StackLimitCheck check(isolate);
if (check.JsHasOverflowed(gap)) {
return isolate->StackOverflow();
}
return isolate->stack_guard()->HandleInterrupts(
StackGuard::InterruptLevel::kAnyEffect);
}
namespace {
Tagged<Object> BytecodeBudgetInterruptWithStackCheck(Isolate* isolate,
RuntimeArguments& args,
CodeKind code_kind) {
HandleScope scope(isolate);
DCHECK_EQ(1, args.length());
Handle<JSFunction> function = args.at<JSFunction>(0);
TRACE_EVENT0("v8.execute", "V8.BytecodeBudgetInterruptWithStackCheck");
// Check for stack interrupts here so that we can fold the interrupt check
// into bytecode budget interrupts.
StackLimitCheck check(isolate);
if (check.JsHasOverflowed()) {
// We ideally wouldn't actually get StackOverflows here, since we stack
// check on bytecode entry, but it's possible that this check fires due to
// the runtime function call being what overflows the stack.
return isolate->StackOverflow();
} else if (check.InterruptRequested()) {
Tagged<Object> return_value = isolate->stack_guard()->HandleInterrupts();
if (!IsUndefined(return_value, isolate)) {
return return_value;
}
}
isolate->tiering_manager()->OnInterruptTick(function, code_kind);
return ReadOnlyRoots(isolate).undefined_value();
}
Tagged<Object> BytecodeBudgetInterrupt(Isolate* isolate, RuntimeArguments& args,
CodeKind code_kind) {
HandleScope scope(isolate);
DCHECK_EQ(1, args.length());
Handle<JSFunction> function = args.at<JSFunction>(0);
TRACE_EVENT0("v8.execute", "V8.BytecodeBudgetInterrupt");
isolate->tiering_manager()->OnInterruptTick(function, code_kind);
return ReadOnlyRoots(isolate).undefined_value();
}
} // namespace
RUNTIME_FUNCTION(Runtime_BytecodeBudgetInterruptWithStackCheck_Ignition) {
return BytecodeBudgetInterruptWithStackCheck(isolate, args,
CodeKind::INTERPRETED_FUNCTION);
}
RUNTIME_FUNCTION(Runtime_BytecodeBudgetInterrupt_Ignition) {
return BytecodeBudgetInterrupt(isolate, args, CodeKind::INTERPRETED_FUNCTION);
}
RUNTIME_FUNCTION(Runtime_BytecodeBudgetInterruptWithStackCheck_Sparkplug) {
return BytecodeBudgetInterruptWithStackCheck(isolate, args,
CodeKind::BASELINE);
}
RUNTIME_FUNCTION(Runtime_BytecodeBudgetInterrupt_Sparkplug) {
return BytecodeBudgetInterrupt(isolate, args, CodeKind::BASELINE);
}
RUNTIME_FUNCTION(Runtime_BytecodeBudgetInterrupt_Maglev) {
return BytecodeBudgetInterrupt(isolate, args, CodeKind::MAGLEV);
}
RUNTIME_FUNCTION(Runtime_BytecodeBudgetInterruptWithStackCheck_Maglev) {
return BytecodeBudgetInterruptWithStackCheck(isolate, args, CodeKind::MAGLEV);
}
namespace {
#if V8_ENABLE_WEBASSEMBLY
class V8_NODISCARD SaveAndClearThreadInWasmFlag {
public:
SaveAndClearThreadInWasmFlag() {
if (trap_handler::IsTrapHandlerEnabled()) {
if (trap_handler::IsThreadInWasm()) {
thread_was_in_wasm_ = true;
trap_handler::ClearThreadInWasm();
}
}
}
~SaveAndClearThreadInWasmFlag() {
if (thread_was_in_wasm_) {
trap_handler::SetThreadInWasm();
}
}
private:
bool thread_was_in_wasm_{false};
};
#else
class SaveAndClearThreadInWasmFlag {};
#endif // V8_ENABLE_WEBASSEMBLY
} // namespace
RUNTIME_FUNCTION(Runtime_AllocateInYoungGeneration) {
HandleScope scope(isolate);
DCHECK(isolate->IsOnCentralStack());
DCHECK_EQ(2, args.length());
// TODO(v8:13070): Align allocations in the builtins that call this.
int size = ALIGN_TO_ALLOCATION_ALIGNMENT(args.smi_value_at(0));
int flags = args.smi_value_at(1);
AllocationAlignment alignment =
AllocateDoubleAlignFlag::decode(flags) ? kDoubleAligned : kTaggedAligned;
CHECK(IsAligned(size, kTaggedSize));
CHECK_GT(size, 0);
#if V8_ENABLE_WEBASSEMBLY
// When this is called from WasmGC code, clear the "thread in wasm" flag,
// which is important in case any GC needs to happen.
// TODO(chromium:1236668): Find a better fix, likely by replacing the global
// flag.
SaveAndClearThreadInWasmFlag clear_wasm_flag;
#endif // V8_ENABLE_WEBASSEMBLY
// TODO(v8:9472): Until double-aligned allocation is fixed for new-space
// allocations, don't request it.
alignment = kTaggedAligned;
return *isolate->factory()->NewFillerObject(size, alignment,
AllocationType::kYoung,
AllocationOrigin::kGeneratedCode);
}
RUNTIME_FUNCTION(Runtime_AllocateInOldGeneration) {
HandleScope scope(isolate);
DCHECK_EQ(2, args.length());
// TODO(v8:13070): Align allocations in the builtins that call this.
int size = ALIGN_TO_ALLOCATION_ALIGNMENT(args.smi_value_at(0));
int flags = args.smi_value_at(1);
AllocationAlignment alignment =
AllocateDoubleAlignFlag::decode(flags) ? kDoubleAligned : kTaggedAligned;
CHECK(IsAligned(size, kTaggedSize));
CHECK_GT(size, 0);
return *isolate->factory()->NewFillerObject(
size, alignment, AllocationType::kOld, AllocationOrigin::kGeneratedCode);
}
RUNTIME_FUNCTION(Runtime_AllocateByteArray) {
HandleScope scope(isolate);
DCHECK_EQ(1, args.length());
int length = args.smi_value_at(0);
DCHECK_LT(0, length);
return *isolate->factory()->NewByteArray(length);
}
RUNTIME_FUNCTION(Runtime_ThrowIteratorError) {
HandleScope scope(isolate);
DCHECK_EQ(1, args.length());
Handle<Object> object = args.at(0);
return isolate->Throw(*ErrorUtils::NewIteratorError(isolate, object));
}
RUNTIME_FUNCTION(Runtime_ThrowSpreadArgError) {
HandleScope scope(isolate);
DCHECK_EQ(2, args.length());
int message_id_smi = args.smi_value_at(0);
MessageTemplate message_id = MessageTemplateFromInt(message_id_smi);
Handle<Object> object = args.at(1);
return ErrorUtils::ThrowSpreadArgError(isolate, message_id, object);
}
RUNTIME_FUNCTION(Runtime_ThrowCalledNonCallable) {
HandleScope scope(isolate);
DCHECK_EQ(1, args.length());
Handle<Object> object = args.at(0);
return isolate->Throw(
*ErrorUtils::NewCalledNonCallableError(isolate, object));
}
RUNTIME_FUNCTION(Runtime_ThrowConstructedNonConstructable) {
HandleScope scope(isolate);
DCHECK_EQ(1, args.length());
Handle<Object> object = args.at(0);
return isolate->Throw(
*ErrorUtils::NewConstructedNonConstructable(isolate, object));
}
RUNTIME_FUNCTION(Runtime_ThrowPatternAssignmentNonCoercible) {
HandleScope scope(isolate);
DCHECK_EQ(1, args.length());
Handle<Object> object = args.at(0);
return ErrorUtils::ThrowLoadFromNullOrUndefined(isolate, object,
MaybeHandle<Object>());
}
RUNTIME_FUNCTION(Runtime_ThrowConstructorReturnedNonObject) {
HandleScope scope(isolate);
DCHECK_EQ(0, args.length());
THROW_NEW_ERROR_RETURN_FAILURE(
isolate,
NewTypeError(MessageTemplate::kDerivedConstructorReturnedNonObject));
}
// ES6 section 7.3.17 CreateListFromArrayLike (obj)
RUNTIME_FUNCTION(Runtime_CreateListFromArrayLike) {
HandleScope scope(isolate);
DCHECK_EQ(1, args.length());
Handle<Object> object = args.at(0);
RETURN_RESULT_OR_FAILURE(isolate, Object::CreateListFromArrayLike(
isolate, object, ElementTypes::kAll));
}
RUNTIME_FUNCTION(Runtime_IncrementUseCounter) {
HandleScope scope(isolate);
DCHECK_EQ(1, args.length());
int counter = args.smi_value_at(0);
isolate->CountUsage(static_cast<v8::Isolate::UseCounterFeature>(counter));
return ReadOnlyRoots(isolate).undefined_value();
}
RUNTIME_FUNCTION(Runtime_GetAndResetTurboProfilingData) {
HandleScope scope(isolate);
DCHECK_LE(args.length(), 2);
if (!BasicBlockProfiler::Get()->HasData(isolate)) {
THROW_NEW_ERROR_RETURN_FAILURE(
isolate,
NewTypeError(
MessageTemplate::kInvalid,
isolate->factory()->NewStringFromAsciiChecked("Runtime Call"),
isolate->factory()->NewStringFromAsciiChecked(
"V8 was not built with v8_enable_builtins_profiling=true")));
}
std::stringstream stats_stream;
BasicBlockProfiler::Get()->Log(isolate, stats_stream);
Handle<String> result =
isolate->factory()->NewStringFromAsciiChecked(stats_stream.str().c_str());
BasicBlockProfiler::Get()->ResetCounts(isolate);
return *result;
}
RUNTIME_FUNCTION(Runtime_GetAndResetRuntimeCallStats) {
HandleScope scope(isolate);
DCHECK_LE(args.length(), 2);
#ifdef V8_RUNTIME_CALL_STATS
if (!v8_flags.runtime_call_stats) {
THROW_NEW_ERROR_RETURN_FAILURE(
isolate, NewTypeError(MessageTemplate::kInvalid,
isolate->factory()->NewStringFromAsciiChecked(
"Runtime Call"),
isolate->factory()->NewStringFromAsciiChecked(
"--runtime-call-stats is not set")));
}
// Append any worker thread runtime call stats to the main table before
// printing.
isolate->counters()->worker_thread_runtime_call_stats()->AddToMainTable(
isolate->counters()->runtime_call_stats());
if (args.length() == 0) {
// Without arguments, the result is returned as a string.
std::stringstream stats_stream;
isolate->counters()->runtime_call_stats()->Print(stats_stream);
Handle<String> result = isolate->factory()->NewStringFromAsciiChecked(
stats_stream.str().c_str());
isolate->counters()->runtime_call_stats()->Reset();
return *result;
}
std::FILE* f;
if (IsString(args[0])) {
// With a string argument, the results are appended to that file.
Handle<String> filename = args.at<String>(0);
f = std::fopen(filename->ToCString().get(), "a");
DCHECK_NOT_NULL(f);
} else {
// With an integer argument, the results are written to stdout/stderr.
int fd = args.smi_value_at(0);
DCHECK(fd == 1 || fd == 2);
f = fd == 1 ? stdout : stderr;
}
// The second argument (if any) is a message header to be printed.
if (args.length() >= 2) {
Handle<String> message = args.at<String>(1);
message->PrintOn(f);
std::fputc('\n', f);
std::fflush(f);
}
OFStream stats_stream(f);
isolate->counters()->runtime_call_stats()->Print(stats_stream);
isolate->counters()->runtime_call_stats()->Reset();
if (IsString(args[0])) {
std::fclose(f);
} else {
std::fflush(f);
}
return ReadOnlyRoots(isolate).undefined_value();
#else // V8_RUNTIME_CALL_STATS
THROW_NEW_ERROR_RETURN_FAILURE(
isolate, NewTypeError(MessageTemplate::kInvalid,
isolate->factory()->NewStringFromAsciiChecked(
"Runtime Call"),
isolate->factory()->NewStringFromAsciiChecked(
"RCS was disabled at compile-time")));
#endif // V8_RUNTIME_CALL_STATS
}
RUNTIME_FUNCTION(Runtime_OrdinaryHasInstance) {
HandleScope scope(isolate);
DCHECK_EQ(2, args.length());
Handle<Object> callable = args.at(0);
Handle<Object> object = args.at(1);
RETURN_RESULT_OR_FAILURE(
isolate, Object::OrdinaryHasInstance(isolate, callable, object));
}
RUNTIME_FUNCTION(Runtime_Typeof) {
HandleScope scope(isolate);
DCHECK_EQ(1, args.length());
Handle<Object> object = args.at(0);
return *Object::TypeOf(isolate, object);
}
RUNTIME_FUNCTION(Runtime_AllowDynamicFunction) {
HandleScope scope(isolate);
DCHECK_EQ(1, args.length());
Handle<JSFunction> target = args.at<JSFunction>(0);
Handle<JSObject> global_proxy(target->global_proxy(), isolate);
return *isolate->factory()->ToBoolean(
Builtins::AllowDynamicFunction(isolate, target, global_proxy));
}
RUNTIME_FUNCTION(Runtime_CreateAsyncFromSyncIterator) {
HandleScope scope(isolate);
DCHECK_EQ(1, args.length());
Handle<Object> sync_iterator = args.at(0);
if (!IsJSReceiver(*sync_iterator)) {
THROW_NEW_ERROR_RETURN_FAILURE(
isolate, NewTypeError(MessageTemplate::kSymbolIteratorInvalid));
}
Handle<Object> next;
ASSIGN_RETURN_FAILURE_ON_EXCEPTION(
isolate, next,
Object::GetProperty(isolate, sync_iterator,
isolate->factory()->next_string()));
return *isolate->factory()->NewJSAsyncFromSyncIterator(
Handle<JSReceiver>::cast(sync_iterator), next);
}
RUNTIME_FUNCTION(Runtime_GetTemplateObject) {
HandleScope scope(isolate);
DCHECK_EQ(3, args.length());
Handle<TemplateObjectDescription> description =
args.at<TemplateObjectDescription>(0);
Handle<SharedFunctionInfo> shared_info = args.at<SharedFunctionInfo>(1);
int slot_id = args.smi_value_at(2);
Handle<NativeContext> native_context(isolate->context()->native_context(),
isolate);
return *TemplateObjectDescription::GetTemplateObject(
isolate, native_context, description, shared_info, slot_id);
}
RUNTIME_FUNCTION(Runtime_ReportMessageFromMicrotask) {
// Helper to report messages and continue JS execution. This is intended to
// behave similarly to reporting exceptions which reach the top-level, but
// allow the JS code to continue.
HandleScope scope(isolate);
DCHECK_EQ(1, args.length());
Handle<Object> exception = args.at(0);
DCHECK(!isolate->has_exception());
isolate->set_exception(*exception);
MessageLocation* no_location = nullptr;
Handle<JSMessageObject> message =
isolate->CreateMessageOrAbort(exception, no_location);
MessageHandler::ReportMessage(isolate, no_location, message);
isolate->clear_exception();
return ReadOnlyRoots(isolate).undefined_value();
}
RUNTIME_FUNCTION(Runtime_GetInitializerFunction) {
HandleScope scope(isolate);
DCHECK_EQ(1, args.length());
Handle<JSReceiver> constructor = args.at<JSReceiver>(0);
Handle<Symbol> key = isolate->factory()->class_fields_symbol();
Handle<Object> initializer =
JSReceiver::GetDataProperty(isolate, constructor, key);
return *initializer;
}
RUNTIME_FUNCTION(Runtime_DoubleToStringWithRadix) {
HandleScope scope(isolate);
DCHECK_EQ(2, args.length());
double number = args.number_value_at(0);
int32_t radix = 0;
CHECK(Object::ToInt32(args[1], &radix));
char* const str = DoubleToRadixCString(number, radix);
Handle<String> result = isolate->factory()->NewStringFromAsciiChecked(str);
DeleteArray(str);
return *result;
}
RUNTIME_FUNCTION(Runtime_SharedValueBarrierSlow) {
HandleScope scope(isolate);
DCHECK_EQ(1, args.length());
Handle<HeapObject> value = args.at<HeapObject>(0);
Handle<Object> shared_value;
ASSIGN_RETURN_FAILURE_ON_EXCEPTION(
isolate, shared_value, Object::ShareSlow(isolate, value, kThrowOnError));
return *shared_value;
}
RUNTIME_FUNCTION(Runtime_InvalidateDependentCodeForConstTrackingLet) {
HandleScope scope(isolate);
DCHECK_EQ(1, args.length());
Handle<ConstTrackingLetCell> const_tracking_let_cell =
Handle<ConstTrackingLetCell>::cast(args.at<HeapObject>(0));
DependentCode::DeoptimizeDependencyGroups(
isolate, *const_tracking_let_cell,
DependentCode::kConstTrackingLetChangedGroup);
return ReadOnlyRoots(isolate).undefined_value();
}
} // namespace internal
} // namespace v8