0
0
Fork 0
mirror of https://github.com/denoland/rusty_v8.git synced 2025-03-10 22:16:48 -04:00
rusty-v8/src/isolate.rs

583 lines
19 KiB
Rust
Raw Normal View History

2020-01-02 13:57:00 -05:00
// Copyright 2019-2020 the Deno authors. All rights reserved. MIT license.
2019-11-20 13:34:32 -08:00
use crate::array_buffer::Allocator;
use crate::external_references::ExternalReferences;
2019-12-19 14:13:33 +01:00
use crate::promise::PromiseRejectMessage;
use crate::support::intptr_t;
2019-11-20 13:34:32 -08:00
use crate::support::Delete;
use crate::support::Opaque;
2020-02-28 18:40:48 -05:00
use crate::support::SharedRef;
2019-11-20 13:34:32 -08:00
use crate::support::UniqueRef;
2019-12-24 16:40:41 -05:00
use crate::Context;
use crate::Function;
use crate::InIsolate;
use crate::Local;
use crate::Message;
2019-12-24 16:40:41 -05:00
use crate::Module;
use crate::Object;
2019-12-26 10:45:55 -05:00
use crate::Promise;
use crate::ScriptOrModule;
use crate::StartupData;
2019-12-26 10:45:55 -05:00
use crate::String;
use crate::Value;
use std::ffi::c_void;
use std::mem::replace;
use std::ops::Deref;
use std::ops::DerefMut;
use std::ptr::null_mut;
use std::ptr::NonNull;
use std::sync::Arc;
use std::sync::Mutex;
2019-12-26 10:45:55 -05:00
pub type MessageCallback = extern "C" fn(Local<Message>, Local<Value>);
2019-12-26 10:45:55 -05:00
pub type PromiseRejectCallback = extern "C" fn(PromiseRejectMessage);
2019-12-19 14:13:33 +01:00
2019-12-26 10:45:55 -05:00
/// HostInitializeImportMetaObjectCallback is called the first time import.meta
/// is accessed for a module. Subsequent access will reuse the same value.
///
/// The method combines two implementation-defined abstract operations into one:
/// HostGetImportMetaProperties and HostFinalizeImportMeta.
///
/// The embedder should use v8::Object::CreateDataProperty to add properties on
/// the meta object.
pub type HostInitializeImportMetaObjectCallback =
2019-12-24 16:40:41 -05:00
extern "C" fn(Local<Context>, Local<Module>, Local<Object>);
2019-12-26 10:45:55 -05:00
/// HostImportModuleDynamicallyCallback is called when we require the
/// embedder to load a module. This is used as part of the dynamic
/// import syntax.
///
/// The referrer contains metadata about the script/module that calls
/// import.
///
/// The specifier is the name of the module that should be imported.
///
/// The embedder must compile, instantiate, evaluate the Module, and
/// obtain it's namespace object.
///
/// The Promise returned from this function is forwarded to userland
/// JavaScript. The embedder must resolve this promise with the module
/// namespace object. In case of an exception, the embedder must reject
/// this promise with the exception. If the promise creation itself
/// fails (e.g. due to stack overflow), the embedder must propagate
/// that exception by returning an empty MaybeLocal.
pub type HostImportModuleDynamicallyCallback = extern "C" fn(
Local<Context>,
Local<ScriptOrModule>,
Local<String>,
) -> *mut Promise;
2020-01-15 15:33:47 -05:00
pub type InterruptCallback =
extern "C" fn(isolate: &mut Isolate, data: *mut c_void);
extern "C" {
fn v8__Isolate__New(params: *mut CreateParams) -> *mut Isolate;
fn v8__Isolate__Dispose(this: *mut Isolate);
fn v8__Isolate__SetData(this: *mut Isolate, slot: u32, data: *mut c_void);
fn v8__Isolate__GetData(this: *const Isolate, slot: u32) -> *mut c_void;
fn v8__Isolate__GetNumberOfDataSlots(this: *const Isolate) -> u32;
fn v8__Isolate__Enter(this: *mut Isolate);
fn v8__Isolate__Exit(this: *mut Isolate);
fn v8__Isolate__SetCaptureStackTraceForUncaughtExceptions(
this: *mut Isolate,
caputre: bool,
frame_limit: i32,
);
fn v8__Isolate__AddMessageListener(
this: &mut Isolate,
callback: MessageCallback,
) -> bool;
2019-12-19 14:13:33 +01:00
fn v8__Isolate__SetPromiseRejectCallback(
isolate: *mut Isolate,
2019-12-19 14:13:33 +01:00
callback: PromiseRejectCallback,
);
2019-12-24 16:40:41 -05:00
fn v8__Isolate__SetHostInitializeImportMetaObjectCallback(
isolate: *mut Isolate,
callback: HostInitializeImportMetaObjectCallback,
);
2019-12-26 10:45:55 -05:00
fn v8__Isolate__SetHostImportModuleDynamicallyCallback(
isolate: *mut Isolate,
callback: HostImportModuleDynamicallyCallback,
);
2020-01-15 15:33:47 -05:00
fn v8__Isolate__RequestInterrupt(
isolate: *const Isolate,
callback: InterruptCallback,
data: *mut c_void,
);
2019-12-23 08:16:01 -05:00
fn v8__Isolate__ThrowException(
isolate: *mut Isolate,
exception: Local<Value>,
2019-12-23 08:16:01 -05:00
) -> *mut Value;
fn v8__Isolate__TerminateExecution(isolate: *const Isolate);
fn v8__Isolate__IsExecutionTerminating(isolate: *const Isolate) -> bool;
fn v8__Isolate__CancelTerminateExecution(isolate: *const Isolate);
fn v8__Isolate__RunMicrotasks(isolate: *mut Isolate);
fn v8__Isolate__EnqueueMicrotask(
isolate: *mut Isolate,
microtask: Local<Function>,
);
2019-11-20 13:34:32 -08:00
fn v8__Isolate__CreateParams__NEW() -> *mut CreateParams;
fn v8__Isolate__CreateParams__DELETE(this: &mut CreateParams);
fn v8__Isolate__CreateParams__SET__array_buffer_allocator(
this: &mut CreateParams,
2020-02-28 18:40:48 -05:00
allocator: &SharedRef<Allocator>,
2019-11-20 13:34:32 -08:00
);
fn v8__Isolate__CreateParams__SET__external_references(
this: &mut CreateParams,
value: *const intptr_t,
);
fn v8__Isolate__CreateParams__SET__snapshot_blob(
this: &mut CreateParams,
snapshot_blob: *mut StartupData,
);
fn v8__HeapProfiler__TakeHeapSnapshot(
isolate: *mut Isolate,
callback: extern "C" fn(*mut c_void, *const u8, usize) -> bool,
arg: *mut c_void,
);
}
#[repr(C)]
/// Isolate represents an isolated instance of the V8 engine. V8 isolates have
/// completely separate states. Objects from one isolate must not be used in
/// other isolates. The embedder can create multiple isolates and use them in
/// parallel in multiple threads. An isolate can be entered by at most one
/// thread at any given time. The Locker/Unlocker API must be used to
/// synchronize.
pub struct Isolate(Opaque);
2019-11-27 07:14:39 -08:00
impl Isolate {
/// Creates a new isolate. Does not change the currently entered
/// isolate.
///
/// When an isolate is no longer used its resources should be freed
/// by calling V8::dispose(). Using the delete operator is not allowed.
///
/// V8::initialize() must have run prior to this.
#[allow(clippy::new_ret_no_self)]
pub fn new(params: UniqueRef<CreateParams>) -> OwnedIsolate {
// TODO: support CreateParams.
2019-11-30 09:16:25 -08:00
crate::V8::assert_initialized();
unsafe { new_owned_isolate(v8__Isolate__New(params.into_raw())) }
}
/// Initial configuration parameters for a new Isolate.
pub fn create_params() -> UniqueRef<CreateParams> {
CreateParams::new()
}
2019-12-09 02:26:58 +01:00
pub fn thread_safe_handle(&mut self) -> IsolateHandle {
IsolateHandle::new(self)
}
2020-02-13 15:03:25 -05:00
unsafe fn set_annex(&mut self, ptr: *mut IsolateAnnex) {
v8__Isolate__SetData(self, 0, ptr as *mut c_void)
2020-02-13 15:03:25 -05:00
}
fn get_annex(&self) -> *mut IsolateAnnex {
unsafe { v8__Isolate__GetData(self, 0) as *mut _ }
2020-02-13 15:03:25 -05:00
}
/// Associate embedder-specific data with the isolate. |slot| has to be
/// between 0 and GetNumberOfDataSlots() - 1.
pub unsafe fn set_data(&mut self, slot: u32, ptr: *mut c_void) {
v8__Isolate__SetData(self, slot + 1, ptr)
}
/// Retrieve embedder-specific data from the isolate.
/// Returns NULL if SetData has never been called for the given |slot|.
pub fn get_data(&self, slot: u32) -> *mut c_void {
unsafe { v8__Isolate__GetData(self, slot + 1) }
}
/// Returns the maximum number of available embedder data slots. Valid slots
/// are in the range of 0 - GetNumberOfDataSlots() - 1.
pub fn get_number_of_data_slots(&self) -> u32 {
unsafe { v8__Isolate__GetNumberOfDataSlots(self) - 1 }
}
2019-12-09 02:26:58 +01:00
/// Sets this isolate as the entered one for the current thread.
/// Saves the previously entered one (if any), so that it can be
/// restored when exiting. Re-entering an isolate is allowed.
pub(crate) fn enter(&mut self) {
unsafe { v8__Isolate__Enter(self) }
2019-12-09 02:26:58 +01:00
}
/// Exits this isolate by restoring the previously entered one in the
/// current thread. The isolate may still stay the same, if it was
/// entered more than once.
///
/// Requires: self == Isolate::GetCurrent().
pub(crate) fn exit(&mut self) {
unsafe { v8__Isolate__Exit(self) }
2019-12-09 02:26:58 +01:00
}
/// Tells V8 to capture current stack trace when uncaught exception occurs
/// and report it to the message listeners. The option is off by default.
pub fn set_capture_stack_trace_for_uncaught_exceptions(
&mut self,
capture: bool,
frame_limit: i32,
) {
unsafe {
v8__Isolate__SetCaptureStackTraceForUncaughtExceptions(
self,
capture,
frame_limit,
)
}
}
2019-12-19 14:13:33 +01:00
/// Adds a message listener (errors only).
///
/// The same message listener can be added more than once and in that
/// case it will be called more than once for each message.
///
/// The exception object will be passed to the callback.
pub fn add_message_listener(&mut self, callback: MessageCallback) -> bool {
unsafe { v8__Isolate__AddMessageListener(self, callback) }
}
2019-12-19 14:13:33 +01:00
/// Set callback to notify about promise reject with no handler, or
/// revocation of such a previous notification once the handler is added.
pub fn set_promise_reject_callback(
&mut self,
callback: PromiseRejectCallback,
) {
unsafe { v8__Isolate__SetPromiseRejectCallback(self, callback) }
}
2019-12-24 16:40:41 -05:00
/// This specifies the callback called by the upcoming importa.meta
/// language feature to retrieve host-defined meta data for a module.
pub fn set_host_initialize_import_meta_object_callback(
&mut self,
callback: HostInitializeImportMetaObjectCallback,
) {
unsafe {
v8__Isolate__SetHostInitializeImportMetaObjectCallback(self, callback)
}
}
2019-12-26 10:45:55 -05:00
/// This specifies the callback called by the upcoming dynamic
/// import() language feature to load modules.
pub fn set_host_import_module_dynamically_callback(
&mut self,
callback: HostImportModuleDynamicallyCallback,
) {
unsafe {
v8__Isolate__SetHostImportModuleDynamicallyCallback(self, callback)
}
}
2019-12-23 08:16:01 -05:00
/// Schedules an exception to be thrown when returning to JavaScript. When an
/// exception has been scheduled it is illegal to invoke any JavaScript
/// operation; the caller must return immediately and only after the exception
/// has been handled does it become legal to invoke JavaScript operations.
pub fn throw_exception<'sc>(
&mut self,
exception: Local<Value>,
2019-12-23 08:16:01 -05:00
) -> Local<'sc, Value> {
unsafe {
let ptr = v8__Isolate__ThrowException(self, exception);
Local::from_raw(ptr).unwrap()
2019-12-23 08:16:01 -05:00
}
}
/// Runs the default MicrotaskQueue until it gets empty.
/// Any exceptions thrown by microtask callbacks are swallowed.
pub fn run_microtasks(&mut self) {
unsafe { v8__Isolate__RunMicrotasks(self) }
}
/// Enqueues the callback to the default MicrotaskQueue
pub fn enqueue_microtask(&mut self, microtask: Local<Function>) {
unsafe { v8__Isolate__EnqueueMicrotask(self, microtask) }
}
/// Disposes the isolate. The isolate must not be entered by any
/// thread to be disposable.
unsafe fn dispose(&mut self) {
IsolateHandle::dispose_isolate(self);
// No test case in rusty_v8 show this, but there have been situations in
// deno where dropping Annex before the states causes a segfault.
v8__Isolate__Dispose(self)
}
/// Take a heap snapshot. The callback is invoked one or more times
/// with byte slices containing the snapshot serialized as JSON.
/// It's the callback's responsibility to reassemble them into
/// a single document, e.g., by writing them to a file.
/// Note that Chrome DevTools refuses to load snapshots without
/// a .heapsnapshot suffix.
pub fn take_heap_snapshot<F>(&mut self, mut callback: F)
where
F: FnMut(&[u8]) -> bool,
{
extern "C" fn trampoline<F>(
arg: *mut c_void,
data: *const u8,
size: usize,
) -> bool
where
F: FnMut(&[u8]) -> bool,
{
let p = arg as *mut F;
let callback = unsafe { &mut *p };
let slice = unsafe { std::slice::from_raw_parts(data, size) };
callback(slice)
}
let arg = &mut callback as *mut F as *mut c_void;
unsafe { v8__HeapProfiler__TakeHeapSnapshot(self, trampoline::<F>, arg) }
}
}
pub(crate) struct IsolateAnnex {
isolate: *mut Isolate,
mutex: Mutex<()>,
}
impl IsolateAnnex {
fn new(isolate: &mut Isolate) -> Self {
Self {
isolate,
mutex: Mutex::new(()),
}
}
}
#[derive(Clone)]
pub struct IsolateHandle(Arc<IsolateAnnex>);
unsafe impl Send for IsolateHandle {}
unsafe impl Sync for IsolateHandle {}
impl IsolateHandle {
// This function is marked unsafe because it must be called only with either
// IsolateAnnex::mutex locked, or from the main thread associated with the V8
// isolate.
pub(crate) unsafe fn get_isolate_ptr(&self) -> *mut Isolate {
self.0.isolate
}
pub(crate) fn new(isolate: &mut Isolate) -> Self {
2020-02-13 15:03:25 -05:00
let annex_ptr = isolate.get_annex();
if annex_ptr.is_null() {
let annex_arc = Arc::new(IsolateAnnex::new(isolate));
let annex_ptr = Arc::into_raw(annex_arc.clone());
unsafe {
2020-02-13 15:03:25 -05:00
isolate.set_annex(annex_ptr as *mut IsolateAnnex);
}
IsolateHandle(annex_arc)
} else {
let annex_arc = unsafe { Arc::from_raw(annex_ptr) };
Arc::into_raw(annex_arc.clone());
IsolateHandle(annex_arc)
}
}
fn dispose_isolate(isolate: &mut Isolate) {
2020-02-13 15:03:25 -05:00
let annex_ptr = isolate.get_annex();
if !annex_ptr.is_null() {
unsafe {
{
let _lock = (*annex_ptr).mutex.lock().unwrap();
isolate.set_data(0, null_mut());
let isolate_ptr = replace(&mut (*annex_ptr).isolate, null_mut());
assert_eq!(isolate as *mut _, isolate_ptr);
}
Arc::from_raw(annex_ptr);
};
}
}
/// Forcefully terminate the current thread of JavaScript execution
/// in the given isolate.
///
/// This method can be used by any thread even if that thread has not
/// acquired the V8 lock with a Locker object.
///
/// Returns false if Isolate was already destroyed.
pub fn terminate_execution(&self) -> bool {
let _lock = self.0.mutex.lock().unwrap();
if self.0.isolate.is_null() {
false
} else {
unsafe { v8__Isolate__TerminateExecution(self.0.isolate) };
true
}
}
/// Resume execution capability in the given isolate, whose execution
/// was previously forcefully terminated using TerminateExecution().
///
/// When execution is forcefully terminated using TerminateExecution(),
/// the isolate can not resume execution until all JavaScript frames
/// have propagated the uncatchable exception which is generated. This
/// method allows the program embedding the engine to handle the
/// termination event and resume execution capability, even if
/// JavaScript frames remain on the stack.
///
/// This method can be used by any thread even if that thread has not
/// acquired the V8 lock with a Locker object.
///
/// Returns false if Isolate was already destroyed.
pub fn cancel_terminate_execution(&self) -> bool {
let _lock = self.0.mutex.lock().unwrap();
if self.0.isolate.is_null() {
false
} else {
unsafe { v8__Isolate__CancelTerminateExecution(self.0.isolate) };
true
}
}
/// Is V8 terminating JavaScript execution.
///
/// Returns true if JavaScript execution is currently terminating
/// because of a call to TerminateExecution. In that case there are
/// still JavaScript frames on the stack and the termination
/// exception is still active.
///
/// Returns false if Isolate was already destroyed.
pub fn is_execution_terminating(&self) -> bool {
let _lock = self.0.mutex.lock().unwrap();
if self.0.isolate.is_null() {
false
} else {
unsafe { v8__Isolate__IsExecutionTerminating(self.0.isolate) }
}
}
2020-01-15 15:33:47 -05:00
/// Request V8 to interrupt long running JavaScript code and invoke
/// the given |callback| passing the given |data| to it. After |callback|
/// returns control will be returned to the JavaScript code.
/// There may be a number of interrupt requests in flight.
/// Can be called from another thread without acquiring a |Locker|.
/// Registered |callback| must not reenter interrupted Isolate.
///
/// Returns false if Isolate was already destroyed.
2020-01-15 15:33:47 -05:00
// Clippy warns that this method is dereferencing a raw pointer, but it is
// not: https://github.com/rust-lang/rust-clippy/issues/3045
#[allow(clippy::not_unsafe_ptr_arg_deref)]
pub fn request_interrupt(
&self,
callback: InterruptCallback,
data: *mut c_void,
) -> bool {
let _lock = self.0.mutex.lock().unwrap();
if self.0.isolate.is_null() {
false
} else {
unsafe { v8__Isolate__RequestInterrupt(self.0.isolate, callback, data) };
true
}
2019-12-19 14:13:33 +01:00
}
}
/// Internal method for constructing an OwnedIsolate.
pub(crate) unsafe fn new_owned_isolate(
isolate_ptr: *mut Isolate,
) -> OwnedIsolate {
OwnedIsolate(NonNull::new(isolate_ptr).unwrap())
}
/// Same as Isolate but gets disposed when it goes out of scope.
pub struct OwnedIsolate(NonNull<Isolate>);
// TODO(ry) unsafe impl Send for OwnedIsolate {}
// TODO(ry) impl !Sync for OwnedIsolate {}
impl InIsolate for OwnedIsolate {
fn isolate(&mut self) -> &mut Isolate {
self.deref_mut()
}
}
impl Drop for OwnedIsolate {
fn drop(&mut self) {
unsafe { self.0.as_mut().dispose() }
}
}
impl Deref for OwnedIsolate {
type Target = Isolate;
fn deref(&self) -> &Self::Target {
unsafe { self.0.as_ref() }
}
}
impl DerefMut for OwnedIsolate {
fn deref_mut(&mut self) -> &mut Self::Target {
unsafe { self.0.as_mut() }
}
}
/// Initial configuration parameters for a new Isolate.
2019-11-20 13:34:32 -08:00
#[repr(C)]
pub struct CreateParams(Opaque);
impl CreateParams {
pub fn new() -> UniqueRef<CreateParams> {
unsafe { UniqueRef::from_raw(v8__Isolate__CreateParams__NEW()) }
}
/// The ArrayBuffer::Allocator to use for allocating and freeing the backing
/// store of ArrayBuffers.
///
2020-02-28 18:40:48 -05:00
/// The Isolate instance and every |BackingStore| allocated using this
/// allocator hold a SharedRef to the allocator, in order to facilitate
/// lifetime management for the allocator instance.
pub fn set_array_buffer_allocator(&mut self, value: SharedRef<Allocator>) {
2019-11-20 13:34:32 -08:00
unsafe {
2020-02-28 18:40:48 -05:00
v8__Isolate__CreateParams__SET__array_buffer_allocator(self, &value)
2019-11-20 13:34:32 -08:00
};
}
/// Specifies an optional nullptr-terminated array of raw addresses in the
/// embedder that V8 can match against during serialization and use for
/// deserialization. This array and its content must stay valid for the
/// entire lifetime of the isolate.
pub fn set_external_references(
&mut self,
external_references: &'static ExternalReferences,
) {
unsafe {
v8__Isolate__CreateParams__SET__external_references(
self,
external_references.as_ptr(),
)
};
}
/// Hand startup data to V8, in case the embedder has chosen to build
/// V8 with external startup data.
///
/// Note:
/// - By default the startup data is linked into the V8 library, in which
/// case this function is not meaningful.
/// - If this needs to be called, it needs to be called before V8
/// tries to make use of its built-ins.
/// - To avoid unnecessary copies of data, V8 will point directly into the
/// given data blob, so pretty please keep it around until V8 exit.
/// - Compression of the startup blob might be useful, but needs to
/// handled entirely on the embedders' side.
/// - The call will abort if the data is invalid.
pub fn set_snapshot_blob(&mut self, snapshot_blob: &StartupData) {
unsafe {
v8__Isolate__CreateParams__SET__snapshot_blob(
self,
snapshot_blob as *const _ as *mut StartupData,
)
};
}
2019-11-20 13:34:32 -08:00
}
impl Delete for CreateParams {
fn delete(&'static mut self) {
unsafe { v8__Isolate__CreateParams__DELETE(self) }
}
}