| OLD | NEW |
| 1 // Copyright 2013 the V8 project authors. All rights reserved. | 1 // Copyright 2013 the V8 project authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
| 4 | 4 |
| 5 #include "src/v8.h" | 5 #include "src/v8.h" |
| 6 | 6 |
| 7 #if V8_TARGET_ARCH_ARM64 | 7 #if V8_TARGET_ARCH_ARM64 |
| 8 | 8 |
| 9 #include "src/cpu-profiler.h" | 9 #include "src/cpu-profiler.h" |
| 10 #include "src/unicode.h" | 10 #include "src/unicode.h" |
| (...skipping 1271 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1282 } | 1282 } |
| 1283 | 1283 |
| 1284 | 1284 |
| 1285 int RegExpMacroAssemblerARM64::CheckStackGuardState(Address* return_address, | 1285 int RegExpMacroAssemblerARM64::CheckStackGuardState(Address* return_address, |
| 1286 Code* re_code, | 1286 Code* re_code, |
| 1287 Address re_frame, | 1287 Address re_frame, |
| 1288 int start_offset, | 1288 int start_offset, |
| 1289 const byte** input_start, | 1289 const byte** input_start, |
| 1290 const byte** input_end) { | 1290 const byte** input_end) { |
| 1291 Isolate* isolate = frame_entry<Isolate*>(re_frame, kIsolate); | 1291 Isolate* isolate = frame_entry<Isolate*>(re_frame, kIsolate); |
| 1292 if (isolate->stack_guard()->IsStackOverflow()) { | 1292 StackLimitCheck check(isolate); |
| 1293 if (check.JsHasOverflowed()) { |
| 1293 isolate->StackOverflow(); | 1294 isolate->StackOverflow(); |
| 1294 return EXCEPTION; | 1295 return EXCEPTION; |
| 1295 } | 1296 } |
| 1296 | 1297 |
| 1297 // If not real stack overflow the stack guard was used to interrupt | 1298 // If not real stack overflow the stack guard was used to interrupt |
| 1298 // execution for another purpose. | 1299 // execution for another purpose. |
| 1299 | 1300 |
| 1300 // If this is a direct call from JavaScript retry the RegExp forcing the call | 1301 // If this is a direct call from JavaScript retry the RegExp forcing the call |
| 1301 // through the runtime system. Currently the direct call cannot handle a GC. | 1302 // through the runtime system. Currently the direct call cannot handle a GC. |
| 1302 if (frame_entry<int>(re_frame, kDirectCall) == 1) { | 1303 if (frame_entry<int>(re_frame, kDirectCall) == 1) { |
| (...skipping 394 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
| 1697 __ Ldrh(current_character(), MemOperand(input_end(), offset, SXTW)); | 1698 __ Ldrh(current_character(), MemOperand(input_end(), offset, SXTW)); |
| 1698 } | 1699 } |
| 1699 } | 1700 } |
| 1700 } | 1701 } |
| 1701 | 1702 |
| 1702 #endif // V8_INTERPRETED_REGEXP | 1703 #endif // V8_INTERPRETED_REGEXP |
| 1703 | 1704 |
| 1704 }} // namespace v8::internal | 1705 }} // namespace v8::internal |
| 1705 | 1706 |
| 1706 #endif // V8_TARGET_ARCH_ARM64 | 1707 #endif // V8_TARGET_ARCH_ARM64 |
| OLD | NEW |