| OLD | NEW |
| 1 // Copyright 2006-2008 the V8 project authors. All rights reserved. | 1 // Copyright 2006-2008 the V8 project authors. All rights reserved. |
| 2 // Redistribution and use in source and binary forms, with or without | 2 // Redistribution and use in source and binary forms, with or without |
| 3 // modification, are permitted provided that the following conditions are | 3 // modification, are permitted provided that the following conditions are |
| 4 // met: | 4 // met: |
| 5 // | 5 // |
| 6 // * Redistributions of source code must retain the above copyright | 6 // * Redistributions of source code must retain the above copyright |
| 7 // notice, this list of conditions and the following disclaimer. | 7 // notice, this list of conditions and the following disclaimer. |
| 8 // * Redistributions in binary form must reproduce the above | 8 // * Redistributions in binary form must reproduce the above |
| 9 // copyright notice, this list of conditions and the following | 9 // copyright notice, this list of conditions and the following |
| 10 // disclaimer in the documentation and/or other materials provided | 10 // disclaimer in the documentation and/or other materials provided |
| (...skipping 575 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 586 Register reg = object_reg; | 586 Register reg = object_reg; |
| 587 int depth = 1; | 587 int depth = 1; |
| 588 | 588 |
| 589 // Check the maps in the prototype chain. | 589 // Check the maps in the prototype chain. |
| 590 // Traverse the prototype chain from the object and do map checks. | 590 // Traverse the prototype chain from the object and do map checks. |
| 591 while (object != holder) { | 591 while (object != holder) { |
| 592 depth++; | 592 depth++; |
| 593 | 593 |
| 594 // Only global objects and objects that do not require access | 594 // Only global objects and objects that do not require access |
| 595 // checks are allowed in stubs. | 595 // checks are allowed in stubs. |
| 596 ASSERT(object->IsJSGlobalObject() || !object->IsAccessCheckNeeded()); | 596 ASSERT(object->IsJSGlobalProxy() || !object->IsAccessCheckNeeded()); |
| 597 | 597 |
| 598 // Get the map of the current object. | 598 // Get the map of the current object. |
| 599 ldr(scratch, FieldMemOperand(reg, HeapObject::kMapOffset)); | 599 ldr(scratch, FieldMemOperand(reg, HeapObject::kMapOffset)); |
| 600 cmp(scratch, Operand(Handle<Map>(object->map()))); | 600 cmp(scratch, Operand(Handle<Map>(object->map()))); |
| 601 | 601 |
| 602 // Branch on the result of the map check. | 602 // Branch on the result of the map check. |
| 603 b(ne, miss); | 603 b(ne, miss); |
| 604 | 604 |
| 605 // Check access rights to the global object. This has to happen | 605 // Check access rights to the global object. This has to happen |
| 606 // after the map check so that we know that the object is | 606 // after the map check so that we know that the object is |
| 607 // actually a global object. | 607 // actually a global object. |
| 608 if (object->IsJSGlobalObject()) { | 608 if (object->IsJSGlobalProxy()) { |
| 609 CheckAccessGlobal(reg, scratch, miss); | 609 CheckAccessGlobalProxy(reg, scratch, miss); |
| 610 // Restore scratch register to be the map of the object. In the | 610 // Restore scratch register to be the map of the object. In the |
| 611 // new space case below, we load the prototype from the map in | 611 // new space case below, we load the prototype from the map in |
| 612 // the scratch register. | 612 // the scratch register. |
| 613 ldr(scratch, FieldMemOperand(reg, HeapObject::kMapOffset)); | 613 ldr(scratch, FieldMemOperand(reg, HeapObject::kMapOffset)); |
| 614 } | 614 } |
| 615 | 615 |
| 616 reg = holder_reg; // from now the object is in holder_reg | 616 reg = holder_reg; // from now the object is in holder_reg |
| 617 JSObject* prototype = JSObject::cast(object->GetPrototype()); | 617 JSObject* prototype = JSObject::cast(object->GetPrototype()); |
| 618 if (Heap::InNewSpace(prototype)) { | 618 if (Heap::InNewSpace(prototype)) { |
| 619 // The prototype is in new space; we cannot store a reference | 619 // The prototype is in new space; we cannot store a reference |
| (...skipping 12 matching lines...) Expand all Loading... |
| 632 ldr(scratch, FieldMemOperand(reg, HeapObject::kMapOffset)); | 632 ldr(scratch, FieldMemOperand(reg, HeapObject::kMapOffset)); |
| 633 cmp(scratch, Operand(Handle<Map>(object->map()))); | 633 cmp(scratch, Operand(Handle<Map>(object->map()))); |
| 634 b(ne, miss); | 634 b(ne, miss); |
| 635 | 635 |
| 636 // Log the check depth. | 636 // Log the check depth. |
| 637 LOG(IntEvent("check-maps-depth", depth)); | 637 LOG(IntEvent("check-maps-depth", depth)); |
| 638 | 638 |
| 639 // Perform security check for access to the global object and return | 639 // Perform security check for access to the global object and return |
| 640 // the holder register. | 640 // the holder register. |
| 641 ASSERT(object == holder); | 641 ASSERT(object == holder); |
| 642 ASSERT(object->IsJSGlobalObject() || !object->IsAccessCheckNeeded()); | 642 ASSERT(object->IsJSGlobalProxy() || !object->IsAccessCheckNeeded()); |
| 643 if (object->IsJSGlobalObject()) { | 643 if (object->IsJSGlobalProxy()) { |
| 644 CheckAccessGlobal(reg, scratch, miss); | 644 CheckAccessGlobalProxy(reg, scratch, miss); |
| 645 } | 645 } |
| 646 return reg; | 646 return reg; |
| 647 } | 647 } |
| 648 | 648 |
| 649 | 649 |
| 650 void MacroAssembler::CheckAccessGlobal(Register holder_reg, | 650 void MacroAssembler::CheckAccessGlobalProxy(Register holder_reg, |
| 651 Register scratch, | 651 Register scratch, |
| 652 Label* miss) { | 652 Label* miss) { |
| 653 Label same_contexts; |
| 654 |
| 653 ASSERT(!holder_reg.is(scratch)); | 655 ASSERT(!holder_reg.is(scratch)); |
| 656 ASSERT(!holder_reg.is(ip)); |
| 657 ASSERT(!scratch.is(ip)); |
| 654 | 658 |
| 655 // Load the security context. | 659 // Load current lexical context from the stack frame. |
| 656 mov(scratch, Operand(Top::security_context_address())); | 660 ldr(scratch, MemOperand(fp, StandardFrameConstants::kContextOffset)); |
| 657 ldr(scratch, MemOperand(scratch)); | 661 // In debug mode, make sure the lexical context is set. |
| 658 // In debug mode, make sure the security context is set. | |
| 659 if (kDebug) { | 662 if (kDebug) { |
| 660 cmp(scratch, Operand(0)); | 663 cmp(scratch, Operand(0)); |
| 661 Check(ne, "we should not have an empty security context"); | 664 Check(ne, "we should not have an empty lexical context"); |
| 662 } | 665 } |
| 663 | 666 |
| 664 // Load the global object of the security context. | 667 // Load the global context of the current context. |
| 665 int offset = Context::kHeaderSize + Context::GLOBAL_INDEX * kPointerSize; | 668 int offset = Context::kHeaderSize + Context::GLOBAL_INDEX * kPointerSize; |
| 666 ldr(scratch, FieldMemOperand(scratch, offset)); | 669 ldr(scratch, FieldMemOperand(scratch, offset)); |
| 670 ldr(scratch, FieldMemOperand(scratch, GlobalObject::kGlobalContextOffset)); |
| 671 |
| 672 // Check the context is a global context. |
| 673 if (FLAG_debug_code) { |
| 674 // Read the first word and compare to the global_context_map. |
| 675 ldr(ip, FieldMemOperand(scratch, HeapObject::kMapOffset)); |
| 676 cmp(ip, Operand(Factory::global_context_map())); |
| 677 Check(eq, "JSGlobalObject::global_context should be a global context."); |
| 678 } |
| 679 |
| 680 // Check if both contexts are the same. |
| 681 ldr(ip, FieldMemOperand(holder_reg, JSGlobalProxy::kContextOffset)); |
| 682 cmp(scratch, Operand(ip)); |
| 683 b(eq, &same_contexts); |
| 684 |
| 685 // Check the context is a global context. |
| 686 if (FLAG_debug_code) { |
| 687 cmp(ip, Operand(Factory::null_value())); |
| 688 Check(ne, "JSGlobalProxy::context() should not be null."); |
| 689 |
| 690 ldr(ip, FieldMemOperand(ip, HeapObject::kMapOffset)); |
| 691 cmp(ip, Operand(Factory::global_context_map())); |
| 692 Check(eq, "JSGlobalObject::global_context should be a global context."); |
| 693 // Restore ip to holder's context. |
| 694 ldr(ip, FieldMemOperand(holder_reg, JSGlobalProxy::kContextOffset)); |
| 695 } |
| 696 |
| 667 // Check that the security token in the calling global object is | 697 // Check that the security token in the calling global object is |
| 668 // compatible with the security token in the receiving global | 698 // compatible with the security token in the receiving global |
| 669 // object. | 699 // object. |
| 670 ldr(scratch, FieldMemOperand(scratch, JSGlobalObject::kSecurityTokenOffset)); | 700 int token_offset = Context::kHeaderSize + |
| 671 ldr(ip, FieldMemOperand(holder_reg, JSGlobalObject::kSecurityTokenOffset)); | 701 Context::SECURITY_TOKEN_INDEX * kPointerSize; |
| 702 |
| 703 ldr(scratch, FieldMemOperand(scratch, token_offset)); |
| 704 ldr(ip, FieldMemOperand(ip, token_offset)); |
| 672 cmp(scratch, Operand(ip)); | 705 cmp(scratch, Operand(ip)); |
| 673 b(ne, miss); | 706 b(ne, miss); |
| 707 |
| 708 bind(&same_contexts); |
| 674 } | 709 } |
| 675 | 710 |
| 676 | 711 |
| 677 void MacroAssembler::CallStub(CodeStub* stub) { | 712 void MacroAssembler::CallStub(CodeStub* stub) { |
| 678 ASSERT(allow_stub_calls()); // stub calls are not allowed in some stubs | 713 ASSERT(allow_stub_calls()); // stub calls are not allowed in some stubs |
| 679 Call(stub->GetCode(), RelocInfo::CODE_TARGET); | 714 Call(stub->GetCode(), RelocInfo::CODE_TARGET); |
| 680 } | 715 } |
| 681 | 716 |
| 682 | 717 |
| 683 void MacroAssembler::StubReturn(int argc) { | 718 void MacroAssembler::StubReturn(int argc) { |
| (...skipping 143 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 827 #endif | 862 #endif |
| 828 mov(r0, Operand(p0)); | 863 mov(r0, Operand(p0)); |
| 829 push(r0); | 864 push(r0); |
| 830 mov(r0, Operand(Smi::FromInt(p1 - p0))); | 865 mov(r0, Operand(Smi::FromInt(p1 - p0))); |
| 831 push(r0); | 866 push(r0); |
| 832 CallRuntime(Runtime::kAbort, 2); | 867 CallRuntime(Runtime::kAbort, 2); |
| 833 // will not return here | 868 // will not return here |
| 834 } | 869 } |
| 835 | 870 |
| 836 } } // namespace v8::internal | 871 } } // namespace v8::internal |
| OLD | NEW |