1 /* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*-
2 * vim: set ts=8 sts=2 et sw=2 tw=80:
3 * This Source Code Form is subject to the terms of the Mozilla Public
4 * License, v. 2.0. If a copy of the MPL was not distributed with this
5 * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
7 #include "jsfriendapi.h"
9 #include "mozilla/Maybe.h"
10 #include "mozilla/PodOperations.h"
11 #include "mozilla/TimeStamp.h"
15 #include "builtin/BigInt.h"
16 #include "builtin/MapObject.h"
17 #include "builtin/TestingFunctions.h"
18 #include "frontend/FrontendContext.h" // FrontendContext
19 #include "gc/PublicIterators.h"
20 #include "gc/WeakMap.h"
21 #include "js/ColumnNumber.h" // JS::LimitedColumnNumberZeroOrigin
22 #include "js/experimental/CodeCoverage.h"
23 #include "js/experimental/CTypes.h" // JS::AutoCTypesActivityCallback, JS::SetCTypesActivityCallback
24 #include "js/experimental/Intl.h" // JS::AddMoz{DateTimeFormat,DisplayNames}Constructor
25 #include "js/friend/ErrorMessages.h" // js::GetErrorMessage, JSMSG_*
26 #include "js/friend/StackLimits.h" // JS_STACK_GROWTH_DIRECTION
27 #include "js/friend/WindowProxy.h" // js::ToWindowIfWindowProxy
28 #include "js/HashTable.h"
29 #include "js/Object.h" // JS::GetClass
30 #include "js/PropertyAndElement.h" // JS_DefineProperty
32 #include "js/Stack.h" // JS::NativeStackLimitMax
33 #include "js/String.h" // JS::detail::StringToLinearStringSlow
34 #include "js/Wrapper.h"
35 #include "proxy/DeadObjectProxy.h"
36 #include "util/Poison.h"
37 #include "vm/ArgumentsObject.h"
38 #include "vm/BooleanObject.h"
39 #include "vm/DateObject.h"
40 #include "vm/ErrorObject.h"
41 #include "vm/Interpreter.h"
42 #include "vm/JSContext.h"
43 #include "vm/JSObject.h"
44 #include "vm/NumberObject.h"
45 #include "vm/PlainObject.h" // js::PlainObject
46 #include "vm/PromiseObject.h" // js::PromiseObject
48 #include "vm/StringObject.h"
49 #include "vm/WrapperObject.h"
50 #ifdef ENABLE_RECORD_TUPLE
51 # include "vm/RecordType.h"
52 # include "vm/TupleType.h"
55 #include "gc/Marking-inl.h"
56 #include "vm/Compartment-inl.h" // JS::Compartment::wrap
57 #include "vm/JSObject-inl.h"
58 #include "vm/JSScript-inl.h"
59 #include "vm/Realm-inl.h"
63 using mozilla::PodArrayZero
;
65 JS::RootingContext::RootingContext(js::Nursery
* nursery
)
66 : nursery_(nursery
), zone_(nullptr), realm_(nullptr) {
67 for (auto& listHead
: stackRoots_
) {
70 for (auto& listHead
: autoGCRooters_
) {
74 #if JS_STACK_GROWTH_DIRECTION > 0
75 for (int i
= 0; i
< StackKindCount
; i
++) {
76 nativeStackLimit
[i
] = JS::NativeStackLimitMax
;
79 static_assert(JS::NativeStackLimitMax
== 0);
80 PodArrayZero(nativeStackLimit
);
84 JS_PUBLIC_API
void JS_SetGrayGCRootsTracer(JSContext
* cx
,
85 JSGrayRootsTracer traceOp
,
87 cx
->runtime()->gc
.setGrayRootsTracer(traceOp
, data
);
90 JS_PUBLIC_API JSObject
* JS_FindCompilationScope(JSContext
* cx
,
91 HandleObject objArg
) {
94 RootedObject
obj(cx
, objArg
);
97 * We unwrap wrappers here. This is a little weird, but it's what's being
100 if (obj
->is
<WrapperObject
>()) {
101 obj
= UncheckedUnwrap(obj
);
105 * Get the Window if `obj` is a WindowProxy so that we compile in the
106 * correct (global) scope.
108 return ToWindowIfWindowProxy(obj
);
111 JS_PUBLIC_API JSFunction
* JS_GetObjectFunction(JSObject
* obj
) {
112 if (obj
->is
<JSFunction
>()) {
113 return &obj
->as
<JSFunction
>();
118 JS_PUBLIC_API JSObject
* JS_NewObjectWithoutMetadata(
119 JSContext
* cx
, const JSClass
* clasp
, JS::Handle
<JSObject
*> proto
) {
121 AutoSuppressAllocationMetadataBuilder
suppressMetadata(cx
);
122 return JS_NewObjectWithGivenProto(cx
, clasp
, proto
);
125 JS_PUBLIC_API
bool JS::GetIsSecureContext(JS::Realm
* realm
) {
126 return realm
->creationOptions().secureContext();
129 JS_PUBLIC_API JSPrincipals
* JS::GetRealmPrincipals(JS::Realm
* realm
) {
130 return realm
->principals();
133 JS_PUBLIC_API
bool JS::GetDebuggerObservesWasm(JS::Realm
* realm
) {
134 return realm
->debuggerObservesAsmJS();
137 JS_PUBLIC_API
void JS::SetRealmPrincipals(JS::Realm
* realm
,
138 JSPrincipals
* principals
) {
139 // Short circuit if there's no change.
140 if (principals
== realm
->principals()) {
144 // We'd like to assert that our new principals is always same-origin
145 // with the old one, but JSPrincipals doesn't give us a way to do that.
146 // But we can at least assert that we're not switching between system
148 const JSPrincipals
* trusted
=
149 realm
->runtimeFromMainThread()->trustedPrincipals();
150 bool isSystem
= principals
&& principals
== trusted
;
151 MOZ_RELEASE_ASSERT(realm
->isSystem() == isSystem
);
153 // Clear out the old principals, if any.
154 if (realm
->principals()) {
155 JS_DropPrincipals(TlsContext
.get(), realm
->principals());
156 realm
->setPrincipals(nullptr);
159 // Set up the new principals.
161 JS_HoldPrincipals(principals
);
162 realm
->setPrincipals(principals
);
166 JS_PUBLIC_API JSPrincipals
* JS_GetScriptPrincipals(JSScript
* script
) {
167 return script
->principals();
170 JS_PUBLIC_API
bool JS_ScriptHasMutedErrors(JSScript
* script
) {
171 return script
->mutedErrors();
174 JS_PUBLIC_API
bool JS_WrapPropertyDescriptor(
175 JSContext
* cx
, JS::MutableHandle
<JS::PropertyDescriptor
> desc
) {
176 return cx
->compartment()->wrap(cx
, desc
);
179 JS_PUBLIC_API
bool JS_WrapPropertyDescriptor(
181 JS::MutableHandle
<mozilla::Maybe
<JS::PropertyDescriptor
>> desc
) {
182 return cx
->compartment()->wrap(cx
, desc
);
185 JS_PUBLIC_API
void JS_TraceShapeCycleCollectorChildren(JS::CallbackTracer
* trc
,
186 JS::GCCellPtr shape
) {
187 MOZ_ASSERT(shape
.is
<Shape
>());
188 TraceCycleCollectorChildren(trc
, &shape
.as
<Shape
>());
191 static bool DefineHelpProperty(JSContext
* cx
, HandleObject obj
,
192 const char* prop
, const char* value
) {
193 Rooted
<JSAtom
*> atom(cx
, Atomize(cx
, value
, strlen(value
)));
197 return JS_DefineProperty(cx
, obj
, prop
, atom
,
198 JSPROP_READONLY
| JSPROP_PERMANENT
);
201 JS_PUBLIC_API
bool JS_DefineFunctionsWithHelp(
202 JSContext
* cx
, HandleObject obj
, const JSFunctionSpecWithHelp
* fs
) {
203 MOZ_ASSERT(!cx
->zone()->isAtomsZone());
207 for (; fs
->name
; fs
++) {
208 JSAtom
* atom
= Atomize(cx
, fs
->name
, strlen(fs
->name
));
213 Rooted
<jsid
> id(cx
, AtomToId(atom
));
214 RootedFunction
fun(cx
, DefineFunction(cx
, obj
, id
, fs
->call
, fs
->nargs
,
215 fs
->flags
| JSPROP_RESOLVING
));
221 fun
->setJitInfo(fs
->jitInfo
);
225 if (!DefineHelpProperty(cx
, fun
, "usage", fs
->usage
)) {
231 if (!DefineHelpProperty(cx
, fun
, "help", fs
->help
)) {
240 JS_PUBLIC_API
bool JS::GetBuiltinClass(JSContext
* cx
, HandleObject obj
,
242 if (MOZ_UNLIKELY(obj
->is
<ProxyObject
>())) {
243 return Proxy::getBuiltinClass(cx
, obj
, cls
);
246 if (obj
->is
<PlainObject
>()) {
247 *cls
= ESClass::Object
;
248 } else if (obj
->is
<ArrayObject
>()) {
249 *cls
= ESClass::Array
;
250 } else if (obj
->is
<NumberObject
>()) {
251 *cls
= ESClass::Number
;
252 } else if (obj
->is
<StringObject
>()) {
253 *cls
= ESClass::String
;
254 } else if (obj
->is
<BooleanObject
>()) {
255 *cls
= ESClass::Boolean
;
256 } else if (obj
->is
<RegExpObject
>()) {
257 *cls
= ESClass::RegExp
;
258 } else if (obj
->is
<ArrayBufferObject
>()) {
259 *cls
= ESClass::ArrayBuffer
;
260 } else if (obj
->is
<SharedArrayBufferObject
>()) {
261 *cls
= ESClass::SharedArrayBuffer
;
262 } else if (obj
->is
<DateObject
>()) {
263 *cls
= ESClass::Date
;
264 } else if (obj
->is
<SetObject
>()) {
266 } else if (obj
->is
<MapObject
>()) {
268 } else if (obj
->is
<PromiseObject
>()) {
269 *cls
= ESClass::Promise
;
270 } else if (obj
->is
<MapIteratorObject
>()) {
271 *cls
= ESClass::MapIterator
;
272 } else if (obj
->is
<SetIteratorObject
>()) {
273 *cls
= ESClass::SetIterator
;
274 } else if (obj
->is
<ArgumentsObject
>()) {
275 *cls
= ESClass::Arguments
;
276 } else if (obj
->is
<ErrorObject
>()) {
277 *cls
= ESClass::Error
;
278 } else if (obj
->is
<BigIntObject
>()) {
279 *cls
= ESClass::BigInt
;
280 #ifdef ENABLE_RECORD_TUPLE
281 } else if (obj
->is
<RecordType
>()) {
282 *cls
= ESClass::Record
;
283 } else if (obj
->is
<TupleType
>()) {
284 *cls
= ESClass::Tuple
;
286 } else if (obj
->is
<JSFunction
>()) {
287 *cls
= ESClass::Function
;
289 *cls
= ESClass::Other
;
295 JS_PUBLIC_API
bool js::IsArgumentsObject(HandleObject obj
) {
296 return obj
->is
<ArgumentsObject
>();
299 JS_PUBLIC_API
JS::Zone
* js::GetRealmZone(JS::Realm
* realm
) {
300 return realm
->zone();
303 JS_PUBLIC_API
bool js::IsSystemCompartment(JS::Compartment
* comp
) {
304 // Realms in the same compartment must either all be system realms or
305 // non-system realms. We assert this in NewRealm and SetRealmPrincipals,
306 // but do an extra sanity check here.
307 MOZ_ASSERT(comp
->realms()[0]->isSystem() ==
308 comp
->realms().back()->isSystem());
309 return comp
->realms()[0]->isSystem();
312 JS_PUBLIC_API
bool js::IsSystemRealm(JS::Realm
* realm
) {
313 return realm
->isSystem();
316 JS_PUBLIC_API
bool js::IsSystemZone(Zone
* zone
) { return zone
->isSystemZone(); }
318 JS_PUBLIC_API
bool js::IsFunctionObject(JSObject
* obj
) {
319 return obj
->is
<JSFunction
>();
322 JS_PUBLIC_API
bool js::IsSavedFrame(JSObject
* obj
) {
323 return obj
->is
<SavedFrame
>();
326 JS_PUBLIC_API
bool js::UninlinedIsCrossCompartmentWrapper(const JSObject
* obj
) {
327 return js::IsCrossCompartmentWrapper(obj
);
330 JS_PUBLIC_API
void js::AssertSameCompartment(JSContext
* cx
, JSObject
* obj
) {
334 JS_PUBLIC_API
void js::AssertSameCompartment(JSContext
* cx
, JS::HandleValue v
) {
339 JS_PUBLIC_API
void js::AssertSameCompartment(JSObject
* objA
, JSObject
* objB
) {
340 MOZ_ASSERT(objA
->compartment() == objB
->compartment());
344 JS_PUBLIC_API
void js::NotifyAnimationActivity(JSObject
* obj
) {
345 MOZ_ASSERT(obj
->is
<GlobalObject
>());
347 auto timeNow
= mozilla::TimeStamp::Now();
348 obj
->as
<GlobalObject
>().realm()->lastAnimationTime
= timeNow
;
349 obj
->runtimeFromMainThread()->lastAnimationTime
= timeNow
;
352 JS_PUBLIC_API
bool js::IsObjectInContextCompartment(JSObject
* obj
,
353 const JSContext
* cx
) {
354 return obj
->compartment() == cx
->compartment();
357 JS_PUBLIC_API
JS::StackKind
358 js::AutoCheckRecursionLimit::stackKindForCurrentPrincipal(JSContext
* cx
) const {
359 return cx
->stackKindForCurrentPrincipal();
362 JS::NativeStackLimit
AutoCheckRecursionLimit::getStackLimit(
363 FrontendContext
* fc
) const {
364 return fc
->stackLimit();
367 JS_PUBLIC_API JSFunction
* js::DefineFunctionWithReserved(
368 JSContext
* cx
, JSObject
* objArg
, const char* name
, JSNative call
,
369 unsigned nargs
, unsigned attrs
) {
370 RootedObject
obj(cx
, objArg
);
371 MOZ_ASSERT(!cx
->zone()->isAtomsZone());
374 JSAtom
* atom
= Atomize(cx
, name
, strlen(name
));
378 Rooted
<jsid
> id(cx
, AtomToId(atom
));
379 return DefineFunction(cx
, obj
, id
, call
, nargs
, attrs
,
380 gc::AllocKind::FUNCTION_EXTENDED
);
383 JS_PUBLIC_API JSFunction
* js::NewFunctionWithReserved(JSContext
* cx
,
388 MOZ_ASSERT(!cx
->zone()->isAtomsZone());
392 Rooted
<JSAtom
*> atom(cx
);
394 atom
= Atomize(cx
, name
, strlen(name
));
400 return (flags
& JSFUN_CONSTRUCTOR
)
401 ? NewNativeConstructor(cx
, native
, nargs
, atom
,
402 gc::AllocKind::FUNCTION_EXTENDED
)
403 : NewNativeFunction(cx
, native
, nargs
, atom
,
404 gc::AllocKind::FUNCTION_EXTENDED
);
407 JS_PUBLIC_API JSFunction
* js::NewFunctionByIdWithReserved(
408 JSContext
* cx
, JSNative native
, unsigned nargs
, unsigned flags
, jsid id
) {
409 MOZ_ASSERT(id
.isAtom());
410 MOZ_ASSERT(!cx
->zone()->isAtomsZone());
414 Rooted
<JSAtom
*> atom(cx
, id
.toAtom());
415 return (flags
& JSFUN_CONSTRUCTOR
)
416 ? NewNativeConstructor(cx
, native
, nargs
, atom
,
417 gc::AllocKind::FUNCTION_EXTENDED
)
418 : NewNativeFunction(cx
, native
, nargs
, atom
,
419 gc::AllocKind::FUNCTION_EXTENDED
);
422 JS_PUBLIC_API
const Value
& js::GetFunctionNativeReserved(JSObject
* fun
,
424 MOZ_ASSERT(fun
->as
<JSFunction
>().isNativeFun());
425 return fun
->as
<JSFunction
>().getExtendedSlot(which
);
428 JS_PUBLIC_API
void js::SetFunctionNativeReserved(JSObject
* fun
, size_t which
,
430 MOZ_ASSERT(fun
->as
<JSFunction
>().isNativeFun());
431 MOZ_ASSERT_IF(val
.isObject(),
432 val
.toObject().compartment() == fun
->compartment());
433 fun
->as
<JSFunction
>().setExtendedSlot(which
, val
);
436 JS_PUBLIC_API
bool js::FunctionHasNativeReserved(JSObject
* fun
) {
437 MOZ_ASSERT(fun
->as
<JSFunction
>().isNativeFun());
438 return fun
->as
<JSFunction
>().isExtended();
441 bool js::GetObjectProto(JSContext
* cx
, JS::Handle
<JSObject
*> obj
,
442 JS::MutableHandle
<JSObject
*> proto
) {
445 if (obj
->is
<ProxyObject
>()) {
446 return JS_GetPrototype(cx
, obj
, proto
);
449 proto
.set(obj
->staticPrototype());
453 JS_PUBLIC_API JSObject
* js::GetStaticPrototype(JSObject
* obj
) {
454 MOZ_ASSERT(obj
->hasStaticPrototype());
455 return obj
->staticPrototype();
458 JS_PUBLIC_API
bool js::GetRealmOriginalEval(JSContext
* cx
,
459 MutableHandleObject eval
) {
460 eval
.set(&cx
->global()->getEvalFunction());
464 void JS::detail::SetReservedSlotWithBarrier(JSObject
* obj
, size_t slot
,
465 const Value
& value
) {
466 if (obj
->is
<ProxyObject
>()) {
467 obj
->as
<ProxyObject
>().setReservedSlot(slot
, value
);
469 // Note: we don't use setReservedSlot so that this also works on swappable
470 // DOM objects. See NativeObject::getReservedSlotRef comment.
471 obj
->as
<NativeObject
>().setSlot(slot
, value
);
475 void js::SetPreserveWrapperCallbacks(
476 JSContext
* cx
, PreserveWrapperCallback preserveWrapper
,
477 HasReleasedWrapperCallback hasReleasedWrapper
) {
478 cx
->runtime()->preserveWrapperCallback
= preserveWrapper
;
479 cx
->runtime()->hasReleasedWrapperCallback
= hasReleasedWrapper
;
482 JS_PUBLIC_API
unsigned JS_PCToLineNumber(
483 JSScript
* script
, jsbytecode
* pc
,
484 JS::LimitedColumnNumberZeroOrigin
* columnp
) {
485 return PCToLineNumber(script
, pc
, columnp
);
488 JS_PUBLIC_API
bool JS_IsDeadWrapper(JSObject
* obj
) {
489 return IsDeadProxyObject(obj
);
492 JS_PUBLIC_API JSObject
* JS_NewDeadWrapper(JSContext
* cx
, JSObject
* origObj
) {
493 return NewDeadProxyObject(cx
, origObj
);
496 void js::TraceWeakMaps(WeakMapTracer
* trc
) {
497 WeakMapBase::traceAllMappings(trc
);
500 extern JS_PUBLIC_API
bool js::AreGCGrayBitsValid(JSRuntime
* rt
) {
501 return rt
->gc
.areGrayBitsValid();
504 JS_PUBLIC_API
bool js::ZoneGlobalsAreAllGray(JS::Zone
* zone
) {
505 for (RealmsInZoneIter
realm(zone
); !realm
.done(); realm
.next()) {
506 JSObject
* obj
= realm
->unsafeUnbarrieredMaybeGlobal();
507 if (!obj
|| !JS::ObjectIsMarkedGray(obj
)) {
514 JS_PUBLIC_API
bool js::IsCompartmentZoneSweepingOrCompacting(
515 JS::Compartment
* comp
) {
517 return comp
->zone()->isGCSweepingOrCompacting();
520 JS_PUBLIC_API
void js::TraceGrayWrapperTargets(JSTracer
* trc
, Zone
* zone
) {
521 JS::AutoSuppressGCAnalysis nogc
;
523 for (CompartmentsInZoneIter
comp(zone
); !comp
.done(); comp
.next()) {
524 for (Compartment::ObjectWrapperEnum
e(comp
); !e
.empty(); e
.popFront()) {
525 JSObject
* target
= e
.front().key();
526 if (target
->isMarkedGray()) {
527 TraceManuallyBarrieredEdge(trc
, &target
, "gray CCW target");
528 MOZ_ASSERT(target
== e
.front().key());
534 JSLinearString
* JS::detail::StringToLinearStringSlow(JSContext
* cx
,
536 return str
->ensureLinear(cx
);
539 static bool CopyProxyObject(JSContext
* cx
, Handle
<ProxyObject
*> from
,
540 Handle
<ProxyObject
*> to
) {
541 MOZ_ASSERT(from
->getClass() == to
->getClass());
543 if (from
->is
<WrapperObject
>() &&
544 (Wrapper::wrapperHandler(from
)->flags() & Wrapper::CROSS_COMPARTMENT
)) {
545 to
->setCrossCompartmentPrivate(GetProxyPrivate(from
));
547 RootedValue
v(cx
, GetProxyPrivate(from
));
548 if (!cx
->compartment()->wrap(cx
, &v
)) {
551 to
->setSameCompartmentPrivate(v
);
554 MOZ_ASSERT(from
->numReservedSlots() == to
->numReservedSlots());
557 for (size_t n
= 0; n
< from
->numReservedSlots(); n
++) {
558 v
= GetProxyReservedSlot(from
, n
);
559 if (!cx
->compartment()->wrap(cx
, &v
)) {
562 SetProxyReservedSlot(to
, n
, v
);
568 JS_PUBLIC_API JSObject
* JS_CloneObject(JSContext
* cx
, HandleObject obj
,
569 HandleObject proto
) {
570 // |obj| might be in a different compartment.
573 if (!obj
->is
<NativeObject
>() && !obj
->is
<ProxyObject
>()) {
574 JS_ReportErrorNumberASCII(cx
, GetErrorMessage
, nullptr,
575 JSMSG_CANT_CLONE_OBJECT
);
579 RootedObject
clone(cx
);
580 if (obj
->is
<NativeObject
>()) {
581 clone
= NewObjectWithGivenProto(cx
, obj
->getClass(), proto
);
586 if (clone
->is
<JSFunction
>() && obj
->compartment() != clone
->compartment()) {
587 JS_ReportErrorNumberASCII(cx
, GetErrorMessage
, nullptr,
588 JSMSG_CANT_CLONE_OBJECT
);
592 auto* handler
= GetProxyHandler(obj
);
593 clone
= ProxyObject::New(cx
, handler
, JS::NullHandleValue
,
594 AsTaggedProto(proto
), obj
->getClass());
599 if (!CopyProxyObject(cx
, obj
.as
<ProxyObject
>(), clone
.as
<ProxyObject
>())) {
607 extern JS_PUBLIC_API
bool JS::ForceLexicalInitialization(JSContext
* cx
,
613 bool initializedAny
= false;
614 NativeObject
* nobj
= &obj
->as
<NativeObject
>();
616 for (ShapePropertyIter
<NoGC
> iter(nobj
->shape()); !iter
.done(); iter
++) {
617 Value v
= nobj
->getSlot(iter
->slot());
618 if (iter
->isDataProperty() && v
.isMagic() &&
619 v
.whyMagic() == JS_UNINITIALIZED_LEXICAL
) {
620 nobj
->setSlot(iter
->slot(), UndefinedValue());
621 initializedAny
= true;
624 return initializedAny
;
627 extern JS_PUBLIC_API
int JS::IsGCPoisoning() {
628 #ifdef JS_GC_ALLOW_EXTRA_POISONING
629 return js::gExtraPoisoningEnabled
;
635 JS_PUBLIC_API
void JS::NotifyGCRootsRemoved(JSContext
* cx
) {
636 cx
->runtime()->gc
.notifyRootsRemoved();
639 JS_PUBLIC_API
JS::Realm
* js::GetAnyRealmInZone(JS::Zone
* zone
) {
640 if (zone
->isAtomsZone()) {
644 RealmsInZoneIter
realm(zone
);
645 MOZ_ASSERT(!realm
.done());
649 JS_PUBLIC_API
bool js::IsSharableCompartment(JS::Compartment
* comp
) {
650 // If this compartment has nuked outgoing wrappers (because all its globals
651 // got nuked), we won't be able to create any useful CCWs out of it in the
652 // future, and so we shouldn't use it for any new globals.
653 if (comp
->nukedOutgoingWrappers
) {
657 // If this compartment has no live globals, it might be in the middle of being
658 // GCed. Don't create any new Realms inside. There's no point to doing that
659 // anyway, since the idea would be to avoid CCWs from existing Realms in the
660 // compartment to the new Realm, and there are no existing Realms.
661 if (!CompartmentHasLiveGlobal(comp
)) {
669 JS_PUBLIC_API JSObject
* js::GetTestingFunctions(JSContext
* cx
) {
670 RootedObject
obj(cx
, JS_NewPlainObject(cx
));
675 if (!DefineTestingFunctions(cx
, obj
, false, false)) {
682 JS_PUBLIC_API
void js::SetDOMCallbacks(JSContext
* cx
,
683 const DOMCallbacks
* callbacks
) {
684 cx
->runtime()->DOMcallbacks
= callbacks
;
687 JS_PUBLIC_API
const DOMCallbacks
* js::GetDOMCallbacks(JSContext
* cx
) {
688 return cx
->runtime()->DOMcallbacks
;
691 JS_PUBLIC_API
void js::PrepareScriptEnvironmentAndInvoke(
692 JSContext
* cx
, HandleObject global
,
693 ScriptEnvironmentPreparer::Closure
& closure
) {
694 MOZ_ASSERT(!cx
->isExceptionPending());
695 MOZ_ASSERT(global
->is
<GlobalObject
>());
698 cx
->runtime()->scriptEnvironmentPreparer
,
699 "Embedding needs to set a scriptEnvironmentPreparer callback");
701 cx
->runtime()->scriptEnvironmentPreparer
->invoke(global
, closure
);
704 JS_PUBLIC_API
void js::SetScriptEnvironmentPreparer(
705 JSContext
* cx
, ScriptEnvironmentPreparer
* preparer
) {
706 cx
->runtime()->scriptEnvironmentPreparer
= preparer
;
709 JS_PUBLIC_API
void JS::SetCTypesActivityCallback(JSContext
* cx
,
710 CTypesActivityCallback cb
) {
711 cx
->runtime()->ctypesActivityCallback
= cb
;
714 JS::AutoCTypesActivityCallback::AutoCTypesActivityCallback(
715 JSContext
* cx
, CTypesActivityType beginType
, CTypesActivityType endType
)
717 callback(cx
->runtime()->ctypesActivityCallback
),
720 callback(cx
, beginType
);
724 JS_PUBLIC_API
void js::SetAllocationMetadataBuilder(
725 JSContext
* cx
, const AllocationMetadataBuilder
* callback
) {
726 cx
->realm()->setAllocationMetadataBuilder(callback
);
729 JS_PUBLIC_API JSObject
* js::GetAllocationMetadata(JSObject
* obj
) {
730 ObjectWeakMap
* map
= ObjectRealm::get(obj
).objectMetadataTable
.get();
732 return map
->lookup(obj
);
737 JS_PUBLIC_API
bool js::ReportIsNotFunction(JSContext
* cx
, HandleValue v
) {
739 return ReportIsNotFunction(cx
, v
, -1);
743 bool js::HasObjectMovedOp(JSObject
* obj
) {
744 return !!JS::GetClass(obj
)->extObjectMovedOp();
748 JS_PUBLIC_API
bool js::ForwardToNative(JSContext
* cx
, JSNative native
,
749 const CallArgs
& args
) {
750 return native(cx
, args
.length(), args
.base());
753 AutoAssertNoContentJS::AutoAssertNoContentJS(JSContext
* cx
)
754 : context_(cx
), prevAllowContentJS_(cx
->runtime()->allowContentJS_
) {
755 cx
->runtime()->allowContentJS_
= false;
758 AutoAssertNoContentJS::~AutoAssertNoContentJS() {
759 context_
->runtime()->allowContentJS_
= prevAllowContentJS_
;
762 JS_PUBLIC_API
void js::EnableCodeCoverage() { js::coverage::EnableLCov(); }
764 JS_PUBLIC_API
JS::Value
js::MaybeGetScriptPrivate(JSObject
* object
) {
765 if (!object
->is
<ScriptSourceObject
>()) {
766 return UndefinedValue();
769 return object
->as
<ScriptSourceObject
>().getPrivate();
772 JS_PUBLIC_API
uint64_t js::GetMemoryUsageForZone(Zone
* zone
) {
773 // We do not include zone->sharedMemoryUseCounts since that's already included
774 // in zone->mallocHeapSize.
775 return zone
->gcHeapSize
.bytes() + zone
->mallocHeapSize
.bytes() +
776 zone
->jitHeapSize
.bytes();
779 JS_PUBLIC_API
const gc::SharedMemoryMap
& js::GetSharedMemoryUsageForZone(
781 return zone
->sharedMemoryUseCounts
;
784 JS_PUBLIC_API
uint64_t js::GetGCHeapUsage(JSContext
* cx
) {
785 mozilla::CheckedInt
<uint64_t> sum
= 0;
786 using SharedSet
= js::HashSet
<void*, PointerHasher
<void*>, SystemAllocPolicy
>;
787 SharedSet sharedVisited
;
789 for (ZonesIter
zone(cx
->runtime(), WithAtoms
); !zone
.done(); zone
.next()) {
790 sum
+= GetMemoryUsageForZone(zone
);
792 const gc::SharedMemoryMap
& shared
= GetSharedMemoryUsageForZone(zone
);
793 for (auto iter
= shared
.iter(); !iter
.done(); iter
.next()) {
794 void* sharedMem
= iter
.get().key();
795 SharedSet::AddPtr addShared
= sharedVisited
.lookupForAdd(sharedMem
);
797 // We *have* seen this shared memory before.
799 // Because shared memory is already included in
800 // GetMemoryUsageForZone() above, and we've seen it for a
801 // previous zone, we subtract it here so it's not counted more
803 sum
-= iter
.get().value().nbytes
;
804 } else if (!sharedVisited
.add(addShared
, sharedMem
)) {
805 // OOM, abort counting (usually causing an over-estimate).
811 MOZ_ASSERT(sum
.isValid(), "Memory calculation under/over flowed");
816 JS_PUBLIC_API
bool js::RuntimeIsBeingDestroyed() {
817 JSRuntime
* runtime
= TlsContext
.get()->runtime();
818 MOZ_ASSERT(js::CurrentThreadCanAccessRuntime(runtime
));
819 return runtime
->isBeingDestroyed();
823 // No-op implementations of public API that would depend on --with-intl-api
825 #ifndef JS_HAS_INTL_API
827 static bool IntlNotEnabled(JSContext
* cx
) {
828 JS_ReportErrorNumberASCII(cx
, js::GetErrorMessage
, nullptr,
829 JSMSG_SUPPORT_NOT_ENABLED
, "Intl");
833 bool JS::AddMozDateTimeFormatConstructor(JSContext
* cx
, JS::HandleObject intl
) {
834 return IntlNotEnabled(cx
);
837 bool JS::AddMozDisplayNamesConstructor(JSContext
* cx
, JS::HandleObject intl
) {
838 return IntlNotEnabled(cx
);
841 #endif // !JS_HAS_INTL_API
843 JS_PUBLIC_API
JS::Zone
* js::GetObjectZoneFromAnyThread(const JSObject
* obj
) {
844 return MaybeForwarded(obj
)->zoneFromAnyThread();