summaryrefslogtreecommitdiffstats
path: root/js/src/vm/ArrayBufferObject.cpp
diff options
context:
space:
mode:
Diffstat (limited to 'js/src/vm/ArrayBufferObject.cpp')
-rw-r--r--js/src/vm/ArrayBufferObject.cpp3305
1 files changed, 3305 insertions, 0 deletions
diff --git a/js/src/vm/ArrayBufferObject.cpp b/js/src/vm/ArrayBufferObject.cpp
new file mode 100644
index 0000000000..72c9ebeb18
--- /dev/null
+++ b/js/src/vm/ArrayBufferObject.cpp
@@ -0,0 +1,3305 @@
+/* -*- Mode: C++; tab-width: 8; indent-tabs-mode: nil; c-basic-offset: 2 -*-
+ * vim: set ts=8 sts=2 et sw=2 tw=80:
+ * This Source Code Form is subject to the terms of the Mozilla Public
+ * License, v. 2.0. If a copy of the MPL was not distributed with this
+ * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
+
+#include "vm/ArrayBufferObject-inl.h"
+#include "vm/ArrayBufferObject.h"
+
+#include "mozilla/Assertions.h"
+#include "mozilla/Attributes.h"
+#include "mozilla/DebugOnly.h"
+#include "mozilla/Likely.h"
+#include "mozilla/Maybe.h"
+#include "mozilla/ScopeExit.h"
+#include "mozilla/TaggedAnonymousMemory.h"
+
+#include <algorithm> // std::max, std::min
+#include <memory> // std::uninitialized_copy_n
+#include <string.h>
+#if !defined(XP_WIN) && !defined(__wasi__)
+# include <sys/mman.h>
+#endif
+#include <tuple> // std::tuple
+#include <type_traits>
+#ifdef MOZ_VALGRIND
+# include <valgrind/memcheck.h>
+#endif
+
+#include "jsnum.h"
+#include "jstypes.h"
+
+#include "gc/Barrier.h"
+#include "gc/Memory.h"
+#include "js/ArrayBuffer.h"
+#include "js/Conversions.h"
+#include "js/experimental/TypedData.h" // JS_IsArrayBufferViewObject
+#include "js/friend/ErrorMessages.h" // js::GetErrorMessage, JSMSG_*
+#include "js/MemoryMetrics.h"
+#include "js/Prefs.h"
+#include "js/PropertySpec.h"
+#include "js/SharedArrayBuffer.h"
+#include "js/Wrapper.h"
+#include "util/WindowsWrapper.h"
+#include "vm/GlobalObject.h"
+#include "vm/JSContext.h"
+#include "vm/JSObject.h"
+#include "vm/SharedArrayObject.h"
+#include "vm/Warnings.h" // js::WarnNumberASCII
+#include "wasm/WasmConstants.h"
+#include "wasm/WasmLog.h"
+#include "wasm/WasmMemory.h"
+#include "wasm/WasmModuleTypes.h"
+#include "wasm/WasmProcess.h"
+
+#include "gc/GCContext-inl.h"
+#include "gc/Marking-inl.h"
+#include "vm/NativeObject-inl.h"
+#include "vm/Realm-inl.h" // js::AutoRealm
+
+using JS::ToInt32;
+
+using js::wasm::IndexType;
+using js::wasm::Pages;
+using mozilla::Atomic;
+using mozilla::CheckedInt;
+using mozilla::DebugOnly;
+using mozilla::Maybe;
+using mozilla::Nothing;
+using mozilla::Some;
+
+using namespace js;
+
+// Wasm allows large amounts of memory to be reserved at a time. On 64-bit
+// platforms (with "huge memories") we reserve around 4GB of virtual address
+// space for every wasm memory; on 32-bit platforms we usually do not, but users
+// often initialize memories in the hundreds of megabytes.
+//
+// If too many wasm memories remain live, we run up against system resource
+// exhaustion (address space or number of memory map descriptors) - see bug
+// 1068684, bug 1073934, bug 1517412, bug 1502733 for details. The limiting case
+// seems to be Android on ARM64, where the per-process address space is limited
+// to 4TB (39 bits) by the organization of the page tables. An earlier problem
+// was Windows Vista Home 64-bit, where the per-process address space is limited
+// to 8TB (40 bits). And 32-bit platforms only have 4GB of address space anyway.
+//
+// Thus we track the amount of memory reserved for wasm, and set a limit per
+// process. We trigger GC work when we approach the limit and we throw an OOM
+// error if the per-process limit is exceeded. The limit (WasmReservedBytesMax)
+// is specific to architecture, OS, and OS configuration.
+//
+// Since the WasmReservedBytesMax limit is not generally accounted for by
+// any existing GC-trigger heuristics, we need an extra heuristic for triggering
+// GCs when the caller is allocating memories rapidly without other garbage
+// (e.g. bug 1773225). Thus, once the reserved memory crosses the threshold
+// WasmReservedBytesStartTriggering, we start triggering GCs every
+// WasmReservedBytesPerTrigger bytes. Once we reach
+// WasmReservedBytesStartSyncFullGC bytes reserved, we perform expensive
+// non-incremental full GCs as a last-ditch effort to avoid unnecessary failure.
+// Once we reach WasmReservedBytesMax, we perform further full GCs before giving
+// up.
+//
+// (History: The original implementation only tracked the number of "huge
+// memories" allocated by WASM, but this was found to be insufficient because
+// 32-bit platforms have similar resource exhaustion issues. We now track
+// reserved bytes directly.)
+//
+// (We also used to reserve significantly more than 4GB for huge memories, but
+// this was reduced in bug 1442544.)
+
+// ASAN and TSAN use a ton of vmem for bookkeeping leaving a lot less for the
+// program so use a lower limit.
+#if defined(MOZ_TSAN) || defined(MOZ_ASAN)
+static const uint64_t WasmMemAsanOverhead = 2;
+#else
+static const uint64_t WasmMemAsanOverhead = 1;
+#endif
+
+// WasmReservedStartTriggering + WasmReservedPerTrigger must be well below
+// WasmReservedStartSyncFullGC in order to provide enough time for incremental
+// GC to do its job.
+
+#if defined(JS_CODEGEN_ARM64) && defined(ANDROID)
+
+static const uint64_t WasmReservedBytesMax =
+ 75 * wasm::HugeMappedSize / WasmMemAsanOverhead;
+static const uint64_t WasmReservedBytesStartTriggering =
+ 15 * wasm::HugeMappedSize;
+static const uint64_t WasmReservedBytesStartSyncFullGC =
+ WasmReservedBytesMax - 15 * wasm::HugeMappedSize;
+static const uint64_t WasmReservedBytesPerTrigger = 15 * wasm::HugeMappedSize;
+
+#elif defined(WASM_SUPPORTS_HUGE_MEMORY)
+
+static const uint64_t WasmReservedBytesMax =
+ 1000 * wasm::HugeMappedSize / WasmMemAsanOverhead;
+static const uint64_t WasmReservedBytesStartTriggering =
+ 100 * wasm::HugeMappedSize;
+static const uint64_t WasmReservedBytesStartSyncFullGC =
+ WasmReservedBytesMax - 100 * wasm::HugeMappedSize;
+static const uint64_t WasmReservedBytesPerTrigger = 100 * wasm::HugeMappedSize;
+
+#else // 32-bit (and weird 64-bit platforms without huge memory)
+
+static const uint64_t GiB = 1024 * 1024 * 1024;
+
+static const uint64_t WasmReservedBytesMax =
+ (4 * GiB) / 2 / WasmMemAsanOverhead;
+static const uint64_t WasmReservedBytesStartTriggering = (4 * GiB) / 8;
+static const uint64_t WasmReservedBytesStartSyncFullGC =
+ WasmReservedBytesMax - (4 * GiB) / 8;
+static const uint64_t WasmReservedBytesPerTrigger = (4 * GiB) / 8;
+
+#endif
+
+// The total number of bytes reserved for wasm memories.
+static Atomic<uint64_t, mozilla::ReleaseAcquire> wasmReservedBytes(0);
+// The number of bytes of wasm memory reserved since the last GC trigger.
+static Atomic<uint64_t, mozilla::ReleaseAcquire> wasmReservedBytesSinceLast(0);
+
+uint64_t js::WasmReservedBytes() { return wasmReservedBytes; }
+
+[[nodiscard]] static bool CheckArrayBufferTooLarge(JSContext* cx,
+ uint64_t nbytes) {
+ // Refuse to allocate too large buffers.
+ if (MOZ_UNLIKELY(nbytes > ArrayBufferObject::ByteLengthLimit)) {
+ JS_ReportErrorNumberASCII(cx, GetErrorMessage, nullptr,
+ JSMSG_BAD_ARRAY_LENGTH);
+ return false;
+ }
+
+ return true;
+}
+
+void* js::MapBufferMemory(wasm::IndexType t, size_t mappedSize,
+ size_t initialCommittedSize) {
+ MOZ_ASSERT(mappedSize % gc::SystemPageSize() == 0);
+ MOZ_ASSERT(initialCommittedSize % gc::SystemPageSize() == 0);
+ MOZ_ASSERT(initialCommittedSize <= mappedSize);
+
+ auto failed = mozilla::MakeScopeExit(
+ [&] { wasmReservedBytes -= uint64_t(mappedSize); });
+ wasmReservedBytes += uint64_t(mappedSize);
+
+ // Test >= to guard against the case where multiple extant runtimes
+ // race to allocate.
+ if (wasmReservedBytes >= WasmReservedBytesMax) {
+ if (OnLargeAllocationFailure) {
+ OnLargeAllocationFailure();
+ }
+ if (wasmReservedBytes >= WasmReservedBytesMax) {
+ return nullptr;
+ }
+ }
+
+#ifdef XP_WIN
+ void* data = VirtualAlloc(nullptr, mappedSize, MEM_RESERVE, PAGE_NOACCESS);
+ if (!data) {
+ return nullptr;
+ }
+
+ if (!VirtualAlloc(data, initialCommittedSize, MEM_COMMIT, PAGE_READWRITE)) {
+ VirtualFree(data, 0, MEM_RELEASE);
+ return nullptr;
+ }
+#elif defined(__wasi__)
+ void* data = nullptr;
+ if (int err = posix_memalign(&data, gc::SystemPageSize(), mappedSize)) {
+ MOZ_ASSERT(err == ENOMEM);
+ return nullptr;
+ }
+ MOZ_ASSERT(data);
+ memset(data, 0, mappedSize);
+#else // !XP_WIN && !__wasi__
+ void* data =
+ MozTaggedAnonymousMmap(nullptr, mappedSize, PROT_NONE,
+ MAP_PRIVATE | MAP_ANON, -1, 0, "wasm-reserved");
+ if (data == MAP_FAILED) {
+ return nullptr;
+ }
+
+ // Note we will waste a page on zero-sized memories here
+ if (mprotect(data, initialCommittedSize, PROT_READ | PROT_WRITE)) {
+ munmap(data, mappedSize);
+ return nullptr;
+ }
+#endif // !XP_WIN && !__wasi__
+
+#if defined(MOZ_VALGRIND) && \
+ defined(VALGRIND_DISABLE_ADDR_ERROR_REPORTING_IN_RANGE)
+ VALGRIND_DISABLE_ADDR_ERROR_REPORTING_IN_RANGE(
+ (unsigned char*)data + initialCommittedSize,
+ mappedSize - initialCommittedSize);
+#endif
+
+ failed.release();
+ return data;
+}
+
+bool js::CommitBufferMemory(void* dataEnd, size_t delta) {
+ MOZ_ASSERT(delta);
+ MOZ_ASSERT(delta % gc::SystemPageSize() == 0);
+
+#ifdef XP_WIN
+ if (!VirtualAlloc(dataEnd, delta, MEM_COMMIT, PAGE_READWRITE)) {
+ return false;
+ }
+#elif defined(__wasi__)
+ // posix_memalign'd memory is already committed
+ return true;
+#else
+ if (mprotect(dataEnd, delta, PROT_READ | PROT_WRITE)) {
+ return false;
+ }
+#endif // XP_WIN
+
+#if defined(MOZ_VALGRIND) && \
+ defined(VALGRIND_DISABLE_ADDR_ERROR_REPORTING_IN_RANGE)
+ VALGRIND_ENABLE_ADDR_ERROR_REPORTING_IN_RANGE((unsigned char*)dataEnd, delta);
+#endif
+
+ return true;
+}
+
+bool js::ExtendBufferMapping(void* dataPointer, size_t mappedSize,
+ size_t newMappedSize) {
+ MOZ_ASSERT(mappedSize % gc::SystemPageSize() == 0);
+ MOZ_ASSERT(newMappedSize % gc::SystemPageSize() == 0);
+ MOZ_ASSERT(newMappedSize >= mappedSize);
+
+#ifdef XP_WIN
+ void* mappedEnd = (char*)dataPointer + mappedSize;
+ uint32_t delta = newMappedSize - mappedSize;
+ if (!VirtualAlloc(mappedEnd, delta, MEM_RESERVE, PAGE_NOACCESS)) {
+ return false;
+ }
+ return true;
+#elif defined(__wasi__)
+ return false;
+#elif defined(XP_LINUX)
+ // Note this will not move memory (no MREMAP_MAYMOVE specified)
+ if (MAP_FAILED == mremap(dataPointer, mappedSize, newMappedSize, 0)) {
+ return false;
+ }
+ return true;
+#else
+ // No mechanism for remapping on MacOS and other Unices. Luckily
+ // shouldn't need it here as most of these are 64-bit.
+ return false;
+#endif
+}
+
+void js::UnmapBufferMemory(wasm::IndexType t, void* base, size_t mappedSize) {
+ MOZ_ASSERT(mappedSize % gc::SystemPageSize() == 0);
+
+#ifdef XP_WIN
+ VirtualFree(base, 0, MEM_RELEASE);
+#elif defined(__wasi__)
+ free(base);
+#else
+ munmap(base, mappedSize);
+#endif // XP_WIN
+
+#if defined(MOZ_VALGRIND) && \
+ defined(VALGRIND_ENABLE_ADDR_ERROR_REPORTING_IN_RANGE)
+ VALGRIND_ENABLE_ADDR_ERROR_REPORTING_IN_RANGE((unsigned char*)base,
+ mappedSize);
+#endif
+
+ // Untrack reserved memory *after* releasing memory -- otherwise, a race
+ // condition could enable the creation of unlimited buffers.
+ wasmReservedBytes -= uint64_t(mappedSize);
+}
+
+/*
+ * ArrayBufferObject
+ *
+ * This class holds the underlying raw buffer that the TypedArrayObject classes
+ * access. It can be created explicitly and passed to a TypedArrayObject, or
+ * can be created implicitly by constructing a TypedArrayObject with a size.
+ */
+
+/*
+ * ArrayBufferObject (base)
+ */
+
+static const JSClassOps ArrayBufferObjectClassOps = {
+ nullptr, // addProperty
+ nullptr, // delProperty
+ nullptr, // enumerate
+ nullptr, // newEnumerate
+ nullptr, // resolve
+ nullptr, // mayResolve
+ ArrayBufferObject::finalize, // finalize
+ nullptr, // call
+ nullptr, // construct
+ nullptr, // trace
+};
+
+static const JSFunctionSpec arraybuffer_functions[] = {
+ JS_FN("isView", ArrayBufferObject::fun_isView, 1, 0),
+ JS_FS_END,
+};
+
+static const JSPropertySpec arraybuffer_properties[] = {
+ JS_SELF_HOSTED_SYM_GET(species, "$ArrayBufferSpecies", 0),
+ JS_PS_END,
+};
+
+static const JSFunctionSpec arraybuffer_proto_functions[] = {
+ JS_SELF_HOSTED_FN("slice", "ArrayBufferSlice", 2, 0),
+#ifdef NIGHTLY_BUILD
+ JS_FN("resize", ArrayBufferObject::resize, 1, 0),
+#endif
+ JS_FN("transfer", ArrayBufferObject::transfer, 0, 0),
+ JS_FN("transferToFixedLength", ArrayBufferObject::transferToFixedLength, 0,
+ 0),
+ JS_FS_END,
+};
+
+static const JSPropertySpec arraybuffer_proto_properties[] = {
+ JS_PSG("byteLength", ArrayBufferObject::byteLengthGetter, 0),
+#ifdef NIGHTLY_BUILD
+ JS_PSG("maxByteLength", ArrayBufferObject::maxByteLengthGetter, 0),
+ JS_PSG("resizable", ArrayBufferObject::resizableGetter, 0),
+#endif
+ JS_PSG("detached", ArrayBufferObject::detachedGetter, 0),
+ JS_STRING_SYM_PS(toStringTag, "ArrayBuffer", JSPROP_READONLY),
+ JS_PS_END,
+};
+
+static JSObject* CreateArrayBufferPrototype(JSContext* cx, JSProtoKey key) {
+ return GlobalObject::createBlankPrototype(cx, cx->global(),
+ &ArrayBufferObject::protoClass_);
+}
+
+static const ClassSpec ArrayBufferObjectClassSpec = {
+ GenericCreateConstructor<ArrayBufferObject::class_constructor, 1,
+ gc::AllocKind::FUNCTION>,
+ CreateArrayBufferPrototype,
+ arraybuffer_functions,
+ arraybuffer_properties,
+ arraybuffer_proto_functions,
+ arraybuffer_proto_properties,
+};
+
+static const ClassExtension FixedLengthArrayBufferObjectClassExtension = {
+ ArrayBufferObject::objectMoved<
+ FixedLengthArrayBufferObject>, // objectMovedOp
+};
+
+static const ClassExtension ResizableArrayBufferObjectClassExtension = {
+ ArrayBufferObject::objectMoved<
+ ResizableArrayBufferObject>, // objectMovedOp
+};
+
+const JSClass ArrayBufferObject::protoClass_ = {
+ "ArrayBuffer.prototype",
+ JSCLASS_HAS_CACHED_PROTO(JSProto_ArrayBuffer),
+ JS_NULL_CLASS_OPS,
+ &ArrayBufferObjectClassSpec,
+};
+
+const JSClass FixedLengthArrayBufferObject::class_ = {
+ "ArrayBuffer",
+ JSCLASS_DELAY_METADATA_BUILDER |
+ JSCLASS_HAS_RESERVED_SLOTS(RESERVED_SLOTS) |
+ JSCLASS_HAS_CACHED_PROTO(JSProto_ArrayBuffer) |
+ JSCLASS_BACKGROUND_FINALIZE,
+ &ArrayBufferObjectClassOps,
+ &ArrayBufferObjectClassSpec,
+ &FixedLengthArrayBufferObjectClassExtension,
+};
+
+const JSClass ResizableArrayBufferObject::class_ = {
+ "ArrayBuffer",
+ JSCLASS_DELAY_METADATA_BUILDER |
+ JSCLASS_HAS_RESERVED_SLOTS(RESERVED_SLOTS) |
+ JSCLASS_HAS_CACHED_PROTO(JSProto_ArrayBuffer) |
+ JSCLASS_BACKGROUND_FINALIZE,
+ &ArrayBufferObjectClassOps,
+ &ArrayBufferObjectClassSpec,
+ &ResizableArrayBufferObjectClassExtension,
+};
+
+static bool IsArrayBuffer(HandleValue v) {
+ return v.isObject() && v.toObject().is<ArrayBufferObject>();
+}
+
+#ifdef NIGHTLY_BUILD
+static bool IsResizableArrayBuffer(HandleValue v) {
+ return v.isObject() && v.toObject().is<ResizableArrayBufferObject>();
+}
+#endif
+
+MOZ_ALWAYS_INLINE bool ArrayBufferObject::byteLengthGetterImpl(
+ JSContext* cx, const CallArgs& args) {
+ MOZ_ASSERT(IsArrayBuffer(args.thisv()));
+ auto* buffer = &args.thisv().toObject().as<ArrayBufferObject>();
+ args.rval().setNumber(buffer->byteLength());
+ return true;
+}
+
+bool ArrayBufferObject::byteLengthGetter(JSContext* cx, unsigned argc,
+ Value* vp) {
+ CallArgs args = CallArgsFromVp(argc, vp);
+ return CallNonGenericMethod<IsArrayBuffer, byteLengthGetterImpl>(cx, args);
+}
+
+enum class PreserveResizability : bool { No, Yes };
+
+/**
+ * ArrayBufferCopyAndDetach ( arrayBuffer, newLength, preserveResizability )
+ *
+ * https://tc39.es/proposal-arraybuffer-transfer/#sec-arraybuffercopyanddetach
+ */
+static ArrayBufferObject* ArrayBufferCopyAndDetach(
+ JSContext* cx, Handle<ArrayBufferObject*> arrayBuffer,
+ Handle<Value> newLength, PreserveResizability preserveResizability) {
+ // Steps 1-2. (Not applicable in our implementation.)
+
+ // Steps 3-4.
+ uint64_t newByteLength;
+ if (newLength.isUndefined()) {
+ // Step 3.a.
+ newByteLength = arrayBuffer->byteLength();
+ } else {
+ // Step 4.a.
+ if (!ToIndex(cx, newLength, &newByteLength)) {
+ return nullptr;
+ }
+ }
+
+ // Step 5.
+ if (arrayBuffer->isDetached()) {
+ JS_ReportErrorNumberASCII(cx, GetErrorMessage, nullptr,
+ JSMSG_TYPED_ARRAY_DETACHED);
+ return nullptr;
+ }
+ if (arrayBuffer->isLengthPinned()) {
+ JS_ReportErrorNumberASCII(cx, GetErrorMessage, nullptr,
+ JSMSG_ARRAYBUFFER_LENGTH_PINNED);
+ return nullptr;
+ }
+
+ // Steps 6-7.
+ mozilla::Maybe<size_t> maxByteLength;
+ if (preserveResizability == PreserveResizability::Yes &&
+ arrayBuffer->isResizable()) {
+ auto* resizableBuffer = &arrayBuffer->as<ResizableArrayBufferObject>();
+ maxByteLength = mozilla::Some(resizableBuffer->maxByteLength());
+ }
+
+ // Step 8.
+ if (arrayBuffer->hasDefinedDetachKey()) {
+ JS_ReportErrorNumberASCII(cx, GetErrorMessage, nullptr,
+ JSMSG_WASM_NO_TRANSFER);
+ return nullptr;
+ }
+
+ // Steps 9-16.
+ //
+ // 25.1.2.1 AllocateArrayBuffer, step 2.
+ // 6.2.9.1 CreateByteDataBlock, step 2.
+ if (!CheckArrayBufferTooLarge(cx, newByteLength)) {
+ return nullptr;
+ }
+
+ if (maxByteLength) {
+ if (size_t(newByteLength) > *maxByteLength) {
+ JS_ReportErrorNumberASCII(cx, GetErrorMessage, nullptr,
+ JSMSG_ARRAYBUFFER_LENGTH_LARGER_THAN_MAXIMUM);
+ return nullptr;
+ }
+
+ Rooted<ResizableArrayBufferObject*> resizableBuffer(
+ cx, &arrayBuffer->as<ResizableArrayBufferObject>());
+ return ResizableArrayBufferObject::copyAndDetach(cx, size_t(newByteLength),
+ resizableBuffer);
+ }
+
+ return ArrayBufferObject::copyAndDetach(cx, size_t(newByteLength),
+ arrayBuffer);
+}
+
+#ifdef NIGHTLY_BUILD
+/**
+ * get ArrayBuffer.prototype.maxByteLength
+ *
+ * https://tc39.es/ecma262/#sec-get-arraybuffer.prototype.maxbytelength
+ */
+bool ArrayBufferObject::maxByteLengthGetterImpl(JSContext* cx,
+ const CallArgs& args) {
+ MOZ_ASSERT(IsArrayBuffer(args.thisv()));
+
+ auto* buffer = &args.thisv().toObject().as<ArrayBufferObject>();
+
+ // Steps 4-6.
+ size_t maxByteLength;
+ if (buffer->isResizable()) {
+ maxByteLength = buffer->as<ResizableArrayBufferObject>().maxByteLength();
+ } else {
+ maxByteLength = buffer->byteLength();
+ }
+ MOZ_ASSERT_IF(buffer->isDetached(), maxByteLength == 0);
+
+ // Step 7.
+ args.rval().setNumber(maxByteLength);
+ return true;
+}
+
+/**
+ * get ArrayBuffer.prototype.maxByteLength
+ *
+ * https://tc39.es/ecma262/#sec-get-arraybuffer.prototype.maxbytelength
+ */
+bool ArrayBufferObject::maxByteLengthGetter(JSContext* cx, unsigned argc,
+ Value* vp) {
+ // Steps 1-3.
+ CallArgs args = CallArgsFromVp(argc, vp);
+ return CallNonGenericMethod<IsArrayBuffer, maxByteLengthGetterImpl>(cx, args);
+}
+
+/**
+ * get ArrayBuffer.prototype.resizable
+ *
+ * https://tc39.es/ecma262/#sec-get-arraybuffer.prototype.resizable
+ */
+bool ArrayBufferObject::resizableGetterImpl(JSContext* cx,
+ const CallArgs& args) {
+ MOZ_ASSERT(IsArrayBuffer(args.thisv()));
+
+ // Step 4.
+ auto* buffer = &args.thisv().toObject().as<ArrayBufferObject>();
+ args.rval().setBoolean(buffer->isResizable());
+ return true;
+}
+
+/**
+ * get ArrayBuffer.prototype.resizable
+ *
+ * https://tc39.es/ecma262/#sec-get-arraybuffer.prototype.resizable
+ */
+bool ArrayBufferObject::resizableGetter(JSContext* cx, unsigned argc,
+ Value* vp) {
+ // Steps 1-3.
+ CallArgs args = CallArgsFromVp(argc, vp);
+ return CallNonGenericMethod<IsArrayBuffer, resizableGetterImpl>(cx, args);
+}
+#endif
+
+/**
+ * get ArrayBuffer.prototype.detached
+ *
+ * https://tc39.es/proposal-arraybuffer-transfer/#sec-get-arraybuffer.prototype.detached
+ */
+bool ArrayBufferObject::detachedGetterImpl(JSContext* cx,
+ const CallArgs& args) {
+ MOZ_ASSERT(IsArrayBuffer(args.thisv()));
+
+ // Step 4.
+ auto* buffer = &args.thisv().toObject().as<ArrayBufferObject>();
+ args.rval().setBoolean(buffer->isDetached());
+ return true;
+}
+
+/**
+ * get ArrayBuffer.prototype.detached
+ *
+ * https://tc39.es/proposal-arraybuffer-transfer/#sec-get-arraybuffer.prototype.detached
+ */
+bool ArrayBufferObject::detachedGetter(JSContext* cx, unsigned argc,
+ Value* vp) {
+ // Steps 1-3.
+ CallArgs args = CallArgsFromVp(argc, vp);
+ return CallNonGenericMethod<IsArrayBuffer, detachedGetterImpl>(cx, args);
+}
+
+/**
+ * ArrayBuffer.prototype.transfer ( [ newLength ] )
+ *
+ * https://tc39.es/proposal-arraybuffer-transfer/#sec-arraybuffer.prototype.transfer
+ */
+bool ArrayBufferObject::transferImpl(JSContext* cx, const CallArgs& args) {
+ MOZ_ASSERT(IsArrayBuffer(args.thisv()));
+
+ // Steps 1-2.
+ Rooted<ArrayBufferObject*> buffer(
+ cx, &args.thisv().toObject().as<ArrayBufferObject>());
+ auto* newBuffer = ArrayBufferCopyAndDetach(cx, buffer, args.get(0),
+ PreserveResizability::Yes);
+ if (!newBuffer) {
+ return false;
+ }
+
+ args.rval().setObject(*newBuffer);
+ return true;
+}
+
+/**
+ * ArrayBuffer.prototype.transfer ( [ newLength ] )
+ *
+ * https://tc39.es/proposal-arraybuffer-transfer/#sec-arraybuffer.prototype.transfer
+ */
+bool ArrayBufferObject::transfer(JSContext* cx, unsigned argc, Value* vp) {
+ CallArgs args = CallArgsFromVp(argc, vp);
+ return CallNonGenericMethod<IsArrayBuffer, transferImpl>(cx, args);
+}
+
+/**
+ * ArrayBuffer.prototype.transferToFixedLength ( [ newLength ] )
+ *
+ * https://tc39.es/proposal-arraybuffer-transfer/#sec-arraybuffer.prototype.transfertofixedlength
+ */
+bool ArrayBufferObject::transferToFixedLengthImpl(JSContext* cx,
+ const CallArgs& args) {
+ MOZ_ASSERT(IsArrayBuffer(args.thisv()));
+
+ // Steps 1-2.
+ Rooted<ArrayBufferObject*> buffer(
+ cx, &args.thisv().toObject().as<ArrayBufferObject>());
+ auto* newBuffer = ArrayBufferCopyAndDetach(cx, buffer, args.get(0),
+ PreserveResizability::No);
+ if (!newBuffer) {
+ return false;
+ }
+
+ args.rval().setObject(*newBuffer);
+ return true;
+}
+
+/**
+ * ArrayBuffer.prototype.transferToFixedLength ( [ newLength ] )
+ *
+ * https://tc39.es/proposal-arraybuffer-transfer/#sec-arraybuffer.prototype.transfertofixedlength
+ */
+bool ArrayBufferObject::transferToFixedLength(JSContext* cx, unsigned argc,
+ Value* vp) {
+ CallArgs args = CallArgsFromVp(argc, vp);
+ return CallNonGenericMethod<IsArrayBuffer, transferToFixedLengthImpl>(cx,
+ args);
+}
+
+#ifdef NIGHTLY_BUILD
+/**
+ * ArrayBuffer.prototype.resize ( newLength )
+ *
+ * https://tc39.es/ecma262/#sec-arraybuffer.prototype.resize
+ */
+bool ArrayBufferObject::resizeImpl(JSContext* cx, const CallArgs& args) {
+ MOZ_ASSERT(IsResizableArrayBuffer(args.thisv()));
+
+ Rooted<ResizableArrayBufferObject*> obj(
+ cx, &args.thisv().toObject().as<ResizableArrayBufferObject>());
+
+ // Step 4.
+ uint64_t newByteLength;
+ if (!ToIndex(cx, args.get(0), &newByteLength)) {
+ return false;
+ }
+
+ // Step 5.
+ if (obj->isDetached()) {
+ JS_ReportErrorNumberASCII(cx, GetErrorMessage, nullptr,
+ JSMSG_TYPED_ARRAY_DETACHED);
+ return false;
+ }
+ if (obj->isLengthPinned()) {
+ JS_ReportErrorNumberASCII(cx, GetErrorMessage, nullptr,
+ JSMSG_ARRAYBUFFER_LENGTH_PINNED);
+ return false;
+ }
+
+ // Step 6.
+ if (newByteLength > obj->maxByteLength()) {
+ JS_ReportErrorNumberASCII(cx, GetErrorMessage, nullptr,
+ JSMSG_ARRAYBUFFER_LENGTH_LARGER_THAN_MAXIMUM);
+ return false;
+ }
+
+ // Steps 7-15.
+ obj->resize(size_t(newByteLength));
+
+ // Step 16.
+ args.rval().setUndefined();
+ return true;
+}
+
+/**
+ * ArrayBuffer.prototype.resize ( newLength )
+ *
+ * https://tc39.es/ecma262/#sec-arraybuffer.prototype.resize
+ */
+bool ArrayBufferObject::resize(JSContext* cx, unsigned argc, Value* vp) {
+ // Steps 1-3.
+ CallArgs args = CallArgsFromVp(argc, vp);
+ return CallNonGenericMethod<IsResizableArrayBuffer, resizeImpl>(cx, args);
+}
+#endif
+
+/*
+ * ArrayBuffer.isView(obj); ES6 (Dec 2013 draft) 24.1.3.1
+ */
+bool ArrayBufferObject::fun_isView(JSContext* cx, unsigned argc, Value* vp) {
+ CallArgs args = CallArgsFromVp(argc, vp);
+ args.rval().setBoolean(args.get(0).isObject() &&
+ JS_IsArrayBufferViewObject(&args.get(0).toObject()));
+ return true;
+}
+
+// ES2024 draft rev 3a773fc9fae58be023228b13dbbd402ac18eeb6b
+// 25.1.4.1 ArrayBuffer ( length [ , options ] )
+bool ArrayBufferObject::class_constructor(JSContext* cx, unsigned argc,
+ Value* vp) {
+ CallArgs args = CallArgsFromVp(argc, vp);
+
+ // Step 1.
+ if (!ThrowIfNotConstructing(cx, args, "ArrayBuffer")) {
+ return false;
+ }
+
+ // Step 2.
+ uint64_t byteLength;
+ if (!ToIndex(cx, args.get(0), &byteLength)) {
+ return false;
+ }
+
+ // Step 3.
+ mozilla::Maybe<uint64_t> maxByteLength;
+#ifdef NIGHTLY_BUILD
+ if (JS::Prefs::experimental_arraybuffer_resizable()) {
+ // Inline call to GetArrayBufferMaxByteLengthOption.
+ if (args.get(1).isObject()) {
+ Rooted<JSObject*> options(cx, &args[1].toObject());
+
+ Rooted<Value> val(cx);
+ if (!GetProperty(cx, options, options, cx->names().maxByteLength, &val)) {
+ return false;
+ }
+ if (!val.isUndefined()) {
+ uint64_t maxByteLengthInt;
+ if (!ToIndex(cx, val, &maxByteLengthInt)) {
+ return false;
+ }
+
+ // 25.1.3.1 AllocateArrayBuffer, step 3.a.
+ if (byteLength > maxByteLengthInt) {
+ JS_ReportErrorNumberASCII(
+ cx, GetErrorMessage, nullptr,
+ JSMSG_ARRAYBUFFER_LENGTH_LARGER_THAN_MAXIMUM);
+ return false;
+ }
+ maxByteLength = mozilla::Some(maxByteLengthInt);
+ }
+ }
+ }
+#endif
+
+ // Step 4 (Inlined 25.1.3.1 AllocateArrayBuffer).
+ // 25.1.3.1, step 4 (Inlined 10.1.13 OrdinaryCreateFromConstructor, step 2).
+ RootedObject proto(cx);
+ if (!GetPrototypeFromBuiltinConstructor(cx, args, JSProto_ArrayBuffer,
+ &proto)) {
+ return false;
+ }
+
+ // 25.1.3.1, step 5 (Inlined 6.2.9.1 CreateByteDataBlock, step 2).
+ if (!CheckArrayBufferTooLarge(cx, byteLength)) {
+ return false;
+ }
+
+ if (maxByteLength) {
+ // 25.1.3.1, step 8.a.
+ if (!CheckArrayBufferTooLarge(cx, *maxByteLength)) {
+ return false;
+ }
+
+ // 25.1.3.1, remaining steps.
+ auto* bufobj = ResizableArrayBufferObject::createZeroed(
+ cx, byteLength, *maxByteLength, proto);
+ if (!bufobj) {
+ return false;
+ }
+ args.rval().setObject(*bufobj);
+ return true;
+ }
+
+ // 25.1.3.1, remaining steps.
+ JSObject* bufobj = createZeroed(cx, byteLength, proto);
+ if (!bufobj) {
+ return false;
+ }
+ args.rval().setObject(*bufobj);
+ return true;
+}
+
+using ArrayBufferContents = UniquePtr<uint8_t[], JS::FreePolicy>;
+
+static ArrayBufferContents AllocateUninitializedArrayBufferContents(
+ JSContext* cx, size_t nbytes) {
+ // First attempt a normal allocation.
+ uint8_t* p =
+ cx->maybe_pod_arena_malloc<uint8_t>(js::ArrayBufferContentsArena, nbytes);
+ if (MOZ_UNLIKELY(!p)) {
+ // Otherwise attempt a large allocation, calling the
+ // large-allocation-failure callback if necessary.
+ p = static_cast<uint8_t*>(cx->runtime()->onOutOfMemoryCanGC(
+ js::AllocFunction::Malloc, js::ArrayBufferContentsArena, nbytes));
+ if (!p) {
+ ReportOutOfMemory(cx);
+ }
+ }
+
+ return ArrayBufferContents(p);
+}
+
+static ArrayBufferContents AllocateArrayBufferContents(JSContext* cx,
+ size_t nbytes) {
+ // First attempt a normal allocation.
+ uint8_t* p =
+ cx->maybe_pod_arena_calloc<uint8_t>(js::ArrayBufferContentsArena, nbytes);
+ if (MOZ_UNLIKELY(!p)) {
+ // Otherwise attempt a large allocation, calling the
+ // large-allocation-failure callback if necessary.
+ p = static_cast<uint8_t*>(cx->runtime()->onOutOfMemoryCanGC(
+ js::AllocFunction::Calloc, js::ArrayBufferContentsArena, nbytes));
+ if (!p) {
+ ReportOutOfMemory(cx);
+ }
+ }
+
+ return ArrayBufferContents(p);
+}
+
+static ArrayBufferContents ReallocateArrayBufferContents(JSContext* cx,
+ uint8_t* old,
+ size_t oldSize,
+ size_t newSize) {
+ // First attempt a normal reallocation.
+ uint8_t* p = cx->maybe_pod_arena_realloc<uint8_t>(
+ js::ArrayBufferContentsArena, old, oldSize, newSize);
+ if (MOZ_UNLIKELY(!p)) {
+ // Otherwise attempt a large allocation, calling the
+ // large-allocation-failure callback if necessary.
+ p = static_cast<uint8_t*>(cx->runtime()->onOutOfMemoryCanGC(
+ js::AllocFunction::Realloc, js::ArrayBufferContentsArena, newSize,
+ old));
+ if (!p) {
+ ReportOutOfMemory(cx);
+ }
+ }
+
+ return ArrayBufferContents(p);
+}
+
+static ArrayBufferContents NewCopiedBufferContents(
+ JSContext* cx, Handle<ArrayBufferObject*> buffer) {
+ ArrayBufferContents dataCopy =
+ AllocateUninitializedArrayBufferContents(cx, buffer->byteLength());
+ if (dataCopy) {
+ if (auto count = buffer->byteLength()) {
+ memcpy(dataCopy.get(), buffer->dataPointer(), count);
+ }
+ }
+ return dataCopy;
+}
+
+/* static */
+void ArrayBufferObject::detach(JSContext* cx,
+ Handle<ArrayBufferObject*> buffer) {
+ cx->check(buffer);
+ MOZ_ASSERT(!buffer->isPreparedForAsmJS());
+ MOZ_ASSERT(!buffer->isLengthPinned());
+
+ // Update all views of the buffer to account for the buffer having been
+ // detached, and clear the buffer's data and list of views.
+ //
+ // Typed object buffers are not exposed and cannot be detached.
+
+ auto& innerViews = ObjectRealm::get(buffer).innerViews.get();
+ if (InnerViewTable::ViewVector* views =
+ innerViews.maybeViewsUnbarriered(buffer)) {
+ for (size_t i = 0; i < views->length(); i++) {
+ JSObject* view = (*views)[i];
+ view->as<ArrayBufferViewObject>().notifyBufferDetached();
+ }
+ innerViews.removeViews(buffer);
+ }
+ if (JSObject* view = buffer->firstView()) {
+ view->as<ArrayBufferViewObject>().notifyBufferDetached();
+ buffer->setFirstView(nullptr);
+ }
+
+ if (buffer->dataPointer()) {
+ buffer->releaseData(cx->gcContext());
+ buffer->setDataPointer(BufferContents::createNoData());
+ }
+
+ buffer->setByteLength(0);
+ buffer->setIsDetached();
+ if (buffer->isResizable()) {
+ buffer->as<ResizableArrayBufferObject>().setMaxByteLength(0);
+ }
+}
+
+void ResizableArrayBufferObject::resize(size_t newByteLength) {
+ MOZ_ASSERT(!isPreparedForAsmJS());
+ MOZ_ASSERT(!isWasm());
+ MOZ_ASSERT(!isDetached());
+ MOZ_ASSERT(!isLengthPinned());
+ MOZ_ASSERT(isResizable());
+ MOZ_ASSERT(newByteLength <= maxByteLength());
+
+ // Clear the bytes between `data[newByteLength..oldByteLength]` when
+ // shrinking the buffer. We don't need to clear any bytes when growing the
+ // buffer, because the new space was either initialized to zero when creating
+ // the buffer, or a prior shrink zeroed it out here.
+ size_t oldByteLength = byteLength();
+ if (newByteLength < oldByteLength) {
+ size_t nbytes = oldByteLength - newByteLength;
+ memset(dataPointer() + newByteLength, 0, nbytes);
+ }
+
+ setByteLength(newByteLength);
+}
+
+/* clang-format off */
+/*
+ * [SMDOC] WASM Linear Memory structure
+ *
+ * Wasm Raw Buf Linear Memory Structure
+ *
+ * The linear heap in Wasm is an mmaped array buffer. Several constants manage
+ * its lifetime:
+ *
+ * - byteLength - the wasm-visible current length of the buffer in
+ * bytes. Accesses in the range [0, byteLength] succeed. May only increase.
+ *
+ * - boundsCheckLimit - the size against which we perform bounds checks. The
+ * value of this depends on the bounds checking strategy chosen for the array
+ * buffer and the specific bounds checking semantics. For asm.js code and
+ * for wasm code running with explicit bounds checking, it is the always the
+ * same as the byteLength. For wasm code using the huge-memory trick, it is
+ * always wasm::GuardSize smaller than mappedSize.
+ *
+ * See also "Linear memory addresses and bounds checking" in
+ * wasm/WasmMemory.cpp.
+ *
+ * See also WasmMemoryObject::boundsCheckLimit().
+ *
+ * - sourceMaxSize - the optional declared limit on how far byteLength can grow
+ * in pages. This is the unmodified maximum size from the source module or
+ * JS-API invocation. This may not be representable in byte lengths, nor
+ * feasible for a module to actually grow to due to implementation limits.
+ * It is used for correct linking checks and js-types reflection.
+ *
+ * - clampedMaxSize - the maximum size on how far the byteLength can grow in
+ * pages. This value respects implementation limits and is always
+ * representable as a byte length. Every memory has a clampedMaxSize, even if
+ * no maximum was specified in source. When a memory has no sourceMaxSize,
+ * the clampedMaxSize will be the maximum amount of memory that can be grown
+ * to while still respecting implementation limits.
+ *
+ * - mappedSize - the actual mmapped size. Access in the range [0, mappedSize]
+ * will either succeed, or be handled by the wasm signal handlers. If
+ * sourceMaxSize is present at initialization, then we attempt to map the
+ * whole clampedMaxSize. Otherwise we only map the region needed for the
+ * initial size.
+ *
+ * The below diagram shows the layout of the wasm heap. The wasm-visible portion
+ * of the heap starts at 0. There is one extra page prior to the start of the
+ * wasm heap which contains the WasmArrayRawBuffer struct at its end (i.e. right
+ * before the start of the WASM heap).
+ *
+ * WasmArrayRawBuffer
+ * \ ArrayBufferObject::dataPointer()
+ * \ /
+ * \ |
+ * ______|_|______________________________________________________
+ * |______|_|______________|___________________|___________________|
+ * 0 byteLength clampedMaxSize mappedSize
+ *
+ * \_______________________/
+ * COMMITED
+ * \_____________________________________/
+ * SLOP
+ * \______________________________________________________________/
+ * MAPPED
+ *
+ * Invariants on byteLength, clampedMaxSize, and mappedSize:
+ * - byteLength only increases
+ * - 0 <= byteLength <= clampedMaxSize <= mappedSize
+ * - if sourceMaxSize is not specified, mappedSize may grow.
+ * It is otherwise constant.
+ * - initialLength <= clampedMaxSize <= sourceMaxSize (if present)
+ * - clampedMaxSize <= wasm::MaxMemoryPages()
+ *
+ * Invariants on boundsCheckLimit:
+ * - for wasm code with the huge-memory trick,
+ * clampedMaxSize <= boundsCheckLimit <= mappedSize
+ * - for asm.js code or wasm with explicit bounds checking,
+ * byteLength == boundsCheckLimit <= clampedMaxSize
+ * - on ARM, boundsCheckLimit must be a valid ARM immediate.
+ * - if sourceMaxSize is not specified, boundsCheckLimit may grow as
+ * mappedSize grows. They are otherwise constant.
+
+ * NOTE: For asm.js on 32-bit platforms and on all platforms when running with
+ * explicit bounds checking, we guarantee that
+ *
+ * byteLength == maxSize == boundsCheckLimit == mappedSize
+ *
+ * That is, signal handlers will not be invoked.
+ *
+ * The region between byteLength and mappedSize is the SLOP - an area where we use
+ * signal handlers to catch things that slip by bounds checks. Logically it has
+ * two parts:
+ *
+ * - from byteLength to boundsCheckLimit - this part of the SLOP serves to catch
+ * accesses to memory we have reserved but not yet grown into. This allows us
+ * to grow memory up to max (when present) without having to patch/update the
+ * bounds checks.
+ *
+ * - from boundsCheckLimit to mappedSize - this part of the SLOP allows us to
+ * bounds check against base pointers and fold some constant offsets inside
+ * loads. This enables better Bounds Check Elimination. See "Linear memory
+ * addresses and bounds checking" in wasm/WasmMemory.cpp.
+ *
+ */
+/* clang-format on */
+
+[[nodiscard]] bool WasmArrayRawBuffer::growToPagesInPlace(Pages newPages) {
+ size_t newSize = newPages.byteLength();
+ size_t oldSize = byteLength();
+
+ MOZ_ASSERT(newSize >= oldSize);
+ MOZ_ASSERT(newPages <= clampedMaxPages());
+ MOZ_ASSERT(newSize <= mappedSize());
+
+ size_t delta = newSize - oldSize;
+ MOZ_ASSERT(delta % wasm::PageSize == 0);
+
+ uint8_t* dataEnd = dataPointer() + oldSize;
+ MOZ_ASSERT(uintptr_t(dataEnd) % gc::SystemPageSize() == 0);
+
+ if (delta && !CommitBufferMemory(dataEnd, delta)) {
+ return false;
+ }
+
+ length_ = newSize;
+
+ return true;
+}
+
+bool WasmArrayRawBuffer::extendMappedSize(Pages maxPages) {
+ size_t newMappedSize = wasm::ComputeMappedSize(maxPages);
+ MOZ_ASSERT(mappedSize_ <= newMappedSize);
+ if (mappedSize_ == newMappedSize) {
+ return true;
+ }
+
+ if (!ExtendBufferMapping(dataPointer(), mappedSize_, newMappedSize)) {
+ return false;
+ }
+
+ mappedSize_ = newMappedSize;
+ return true;
+}
+
+void WasmArrayRawBuffer::tryGrowMaxPagesInPlace(Pages deltaMaxPages) {
+ Pages newMaxPages = clampedMaxPages_;
+
+ DebugOnly<bool> valid = newMaxPages.checkedIncrement(deltaMaxPages);
+ // Caller must ensure increment does not overflow or increase over the
+ // specified maximum pages.
+ MOZ_ASSERT(valid);
+ MOZ_ASSERT_IF(sourceMaxPages_.isSome(), newMaxPages <= *sourceMaxPages_);
+
+ if (!extendMappedSize(newMaxPages)) {
+ return;
+ }
+ clampedMaxPages_ = newMaxPages;
+}
+
+void WasmArrayRawBuffer::discard(size_t byteOffset, size_t byteLen) {
+ uint8_t* memBase = dataPointer();
+
+ // The caller is responsible for ensuring these conditions are met; see this
+ // function's comment in ArrayBufferObject.h.
+ MOZ_ASSERT(byteOffset % wasm::PageSize == 0);
+ MOZ_ASSERT(byteLen % wasm::PageSize == 0);
+ MOZ_ASSERT(wasm::MemoryBoundsCheck(uint64_t(byteOffset), uint64_t(byteLen),
+ byteLength()));
+
+ // Discarding zero bytes "succeeds" with no effect.
+ if (byteLen == 0) {
+ return;
+ }
+
+ void* addr = memBase + uintptr_t(byteOffset);
+
+ // On POSIX-ish platforms, we discard memory by overwriting previously-mapped
+ // pages with freshly-mapped pages (which are all zeroed). The operating
+ // system recognizes this and decreases the process RSS, and eventually
+ // collects the abandoned physical pages.
+ //
+ // On Windows, committing over previously-committed pages has no effect, and
+ // the memory must be explicitly decommitted first. This is not the same as an
+ // munmap; the address space is still reserved.
+
+#ifdef XP_WIN
+ if (!VirtualFree(addr, byteLen, MEM_DECOMMIT)) {
+ MOZ_CRASH("wasm discard: failed to decommit memory");
+ }
+ if (!VirtualAlloc(addr, byteLen, MEM_COMMIT, PAGE_READWRITE)) {
+ MOZ_CRASH("wasm discard: decommitted memory but failed to recommit");
+ };
+#elif defined(__wasi__)
+ memset(addr, 0, byteLen);
+#else // !XP_WIN
+ void* data = MozTaggedAnonymousMmap(addr, byteLen, PROT_READ | PROT_WRITE,
+ MAP_PRIVATE | MAP_ANON | MAP_FIXED, -1, 0,
+ "wasm-reserved");
+ if (data == MAP_FAILED) {
+ MOZ_CRASH("failed to discard wasm memory; memory mappings may be broken");
+ }
+#endif
+}
+
+/* static */
+WasmArrayRawBuffer* WasmArrayRawBuffer::AllocateWasm(
+ IndexType indexType, Pages initialPages, Pages clampedMaxPages,
+ const Maybe<Pages>& sourceMaxPages, const Maybe<size_t>& mapped) {
+ // Prior code has asserted that initial pages is within our implementation
+ // limits (wasm::MaxMemoryPages) and we can assume it is a valid size_t.
+ MOZ_ASSERT(initialPages.hasByteLength());
+ size_t numBytes = initialPages.byteLength();
+
+ // If there is a specified maximum, attempt to map the whole range for
+ // clampedMaxPages. Or else map only what's required for initialPages.
+ Pages initialMappedPages =
+ sourceMaxPages.isSome() ? clampedMaxPages : initialPages;
+
+ // Use an override mapped size, or else compute the mapped size from
+ // initialMappedPages.
+ size_t mappedSize =
+ mapped.isSome() ? *mapped : wasm::ComputeMappedSize(initialMappedPages);
+
+ MOZ_RELEASE_ASSERT(mappedSize <= SIZE_MAX - gc::SystemPageSize());
+ MOZ_RELEASE_ASSERT(numBytes <= SIZE_MAX - gc::SystemPageSize());
+ MOZ_RELEASE_ASSERT(initialPages <= clampedMaxPages);
+ MOZ_ASSERT(numBytes % gc::SystemPageSize() == 0);
+ MOZ_ASSERT(mappedSize % gc::SystemPageSize() == 0);
+
+ uint64_t mappedSizeWithHeader = mappedSize + gc::SystemPageSize();
+ uint64_t numBytesWithHeader = numBytes + gc::SystemPageSize();
+
+ void* data = MapBufferMemory(indexType, (size_t)mappedSizeWithHeader,
+ (size_t)numBytesWithHeader);
+ if (!data) {
+ return nullptr;
+ }
+
+ uint8_t* base = reinterpret_cast<uint8_t*>(data) + gc::SystemPageSize();
+ uint8_t* header = base - sizeof(WasmArrayRawBuffer);
+
+ auto rawBuf = new (header) WasmArrayRawBuffer(
+ indexType, base, clampedMaxPages, sourceMaxPages, mappedSize, numBytes);
+ return rawBuf;
+}
+
+/* static */
+void WasmArrayRawBuffer::Release(void* mem) {
+ WasmArrayRawBuffer* header =
+ (WasmArrayRawBuffer*)((uint8_t*)mem - sizeof(WasmArrayRawBuffer));
+
+ MOZ_RELEASE_ASSERT(header->mappedSize() <= SIZE_MAX - gc::SystemPageSize());
+ size_t mappedSizeWithHeader = header->mappedSize() + gc::SystemPageSize();
+
+ static_assert(std::is_trivially_destructible_v<WasmArrayRawBuffer>,
+ "no need to call the destructor");
+
+ UnmapBufferMemory(header->indexType(), header->basePointer(),
+ mappedSizeWithHeader);
+}
+
+WasmArrayRawBuffer* ArrayBufferObject::BufferContents::wasmBuffer() const {
+ MOZ_RELEASE_ASSERT(kind_ == WASM);
+ return (WasmArrayRawBuffer*)(data_ - sizeof(WasmArrayRawBuffer));
+}
+
+template <typename ObjT, typename RawbufT>
+static ArrayBufferObjectMaybeShared* CreateSpecificWasmBuffer(
+ JSContext* cx, const wasm::MemoryDesc& memory) {
+ bool useHugeMemory = wasm::IsHugeMemoryEnabled(memory.indexType());
+ Pages initialPages = memory.initialPages();
+ Maybe<Pages> sourceMaxPages = memory.maximumPages();
+ Pages clampedMaxPages = wasm::ClampedMaxPages(
+ memory.indexType(), initialPages, sourceMaxPages, useHugeMemory);
+
+ Maybe<size_t> mappedSize;
+#ifdef WASM_SUPPORTS_HUGE_MEMORY
+ // Override the mapped size if we are using huge memory. If we are not, then
+ // it will be calculated by the raw buffer we are using.
+ if (useHugeMemory) {
+ mappedSize = Some(wasm::HugeMappedSize);
+ }
+#endif
+
+ RawbufT* buffer =
+ RawbufT::AllocateWasm(memory.limits.indexType, initialPages,
+ clampedMaxPages, sourceMaxPages, mappedSize);
+ if (!buffer) {
+ if (useHugeMemory) {
+ WarnNumberASCII(cx, JSMSG_WASM_HUGE_MEMORY_FAILED);
+ if (cx->isExceptionPending()) {
+ cx->clearPendingException();
+ }
+
+ ReportOutOfMemory(cx);
+ return nullptr;
+ }
+
+ // If we fail, and have a sourceMaxPages, try to reserve the biggest
+ // chunk in the range [initialPages, clampedMaxPages) using log backoff.
+ if (!sourceMaxPages) {
+ wasm::Log(cx, "new Memory({initial=%" PRIu64 " pages}) failed",
+ initialPages.value());
+ ReportOutOfMemory(cx);
+ return nullptr;
+ }
+
+ uint64_t cur = clampedMaxPages.value() / 2;
+ for (; Pages(cur) > initialPages; cur /= 2) {
+ buffer = RawbufT::AllocateWasm(memory.limits.indexType, initialPages,
+ Pages(cur), sourceMaxPages, mappedSize);
+ if (buffer) {
+ break;
+ }
+ }
+
+ if (!buffer) {
+ wasm::Log(cx, "new Memory({initial=%" PRIu64 " pages}) failed",
+ initialPages.value());
+ ReportOutOfMemory(cx);
+ return nullptr;
+ }
+
+ // Try to grow our chunk as much as possible.
+ for (size_t d = cur / 2; d >= 1; d /= 2) {
+ buffer->tryGrowMaxPagesInPlace(Pages(d));
+ }
+ }
+
+ // ObjT::createFromNewRawBuffer assumes ownership of |buffer| even in case
+ // of failure.
+ Rooted<ArrayBufferObjectMaybeShared*> object(
+ cx, ObjT::createFromNewRawBuffer(cx, buffer, initialPages.byteLength()));
+ if (!object) {
+ return nullptr;
+ }
+
+ // See MaximumLiveMappedBuffers comment above.
+ if (wasmReservedBytes > WasmReservedBytesStartSyncFullGC) {
+ JS::PrepareForFullGC(cx);
+ JS::NonIncrementalGC(cx, JS::GCOptions::Normal,
+ JS::GCReason::TOO_MUCH_WASM_MEMORY);
+ wasmReservedBytesSinceLast = 0;
+ } else if (wasmReservedBytes > WasmReservedBytesStartTriggering) {
+ wasmReservedBytesSinceLast += uint64_t(buffer->mappedSize());
+ if (wasmReservedBytesSinceLast > WasmReservedBytesPerTrigger) {
+ (void)cx->runtime()->gc.triggerGC(JS::GCReason::TOO_MUCH_WASM_MEMORY);
+ wasmReservedBytesSinceLast = 0;
+ }
+ } else {
+ wasmReservedBytesSinceLast = 0;
+ }
+
+ // Log the result with details on the memory allocation
+ if (sourceMaxPages) {
+ if (useHugeMemory) {
+ wasm::Log(cx,
+ "new Memory({initial:%" PRIu64 " pages, maximum:%" PRIu64
+ " pages}) succeeded",
+ initialPages.value(), sourceMaxPages->value());
+ } else {
+ wasm::Log(cx,
+ "new Memory({initial:%" PRIu64 " pages, maximum:%" PRIu64
+ " pages}) succeeded "
+ "with internal maximum of %" PRIu64 " pages",
+ initialPages.value(), sourceMaxPages->value(),
+ object->wasmClampedMaxPages().value());
+ }
+ } else {
+ wasm::Log(cx, "new Memory({initial:%" PRIu64 " pages}) succeeded",
+ initialPages.value());
+ }
+
+ return object;
+}
+
+ArrayBufferObjectMaybeShared* js::CreateWasmBuffer(
+ JSContext* cx, const wasm::MemoryDesc& memory) {
+ MOZ_RELEASE_ASSERT(memory.initialPages() <=
+ wasm::MaxMemoryPages(memory.indexType()));
+ MOZ_RELEASE_ASSERT(cx->wasm().haveSignalHandlers);
+
+ if (memory.isShared()) {
+ if (!cx->realm()->creationOptions().getSharedMemoryAndAtomicsEnabled()) {
+ JS_ReportErrorNumberASCII(cx, GetErrorMessage, nullptr,
+ JSMSG_WASM_NO_SHMEM_LINK);
+ return nullptr;
+ }
+ return CreateSpecificWasmBuffer<SharedArrayBufferObject,
+ WasmSharedArrayRawBuffer>(cx, memory);
+ }
+ return CreateSpecificWasmBuffer<ArrayBufferObject, WasmArrayRawBuffer>(
+ cx, memory);
+}
+
+bool ArrayBufferObject::prepareForAsmJS() {
+ MOZ_ASSERT(byteLength() % wasm::PageSize == 0,
+ "prior size checking should have guaranteed page-size multiple");
+ MOZ_ASSERT(byteLength() > 0,
+ "prior size checking should have excluded empty buffers");
+ MOZ_ASSERT(!isResizable(),
+ "prior checks should have excluded resizable buffers");
+
+ switch (bufferKind()) {
+ case MALLOCED_ARRAYBUFFER_CONTENTS_ARENA:
+ case MALLOCED_UNKNOWN_ARENA:
+ case MAPPED:
+ case EXTERNAL:
+ // It's okay if this uselessly sets the flag a second time.
+ setIsPreparedForAsmJS();
+ return true;
+
+ case INLINE_DATA:
+ static_assert(
+ wasm::PageSize > FixedLengthArrayBufferObject::MaxInlineBytes,
+ "inline data must be too small to be a page size multiple");
+ MOZ_ASSERT_UNREACHABLE(
+ "inline-data buffers should be implicitly excluded by size checks");
+ return false;
+
+ case NO_DATA:
+ MOZ_ASSERT_UNREACHABLE(
+ "size checking should have excluded detached or empty buffers");
+ return false;
+
+ // asm.js code and associated buffers are potentially long-lived. Yet a
+ // buffer of user-owned data *must* be detached by the user before the
+ // user-owned data is disposed. No caller wants to use a user-owned
+ // ArrayBuffer with asm.js, so just don't support this and avoid a mess of
+ // complexity.
+ case USER_OWNED:
+ // wasm buffers can be detached at any time.
+ case WASM:
+ MOZ_ASSERT(!isPreparedForAsmJS());
+ return false;
+ }
+
+ MOZ_ASSERT_UNREACHABLE("non-exhaustive kind-handling switch?");
+ return false;
+}
+
+ArrayBufferObject::BufferContents ArrayBufferObject::createMappedContents(
+ int fd, size_t offset, size_t length) {
+ void* data =
+ gc::AllocateMappedContent(fd, offset, length, ARRAY_BUFFER_ALIGNMENT);
+ return BufferContents::createMapped(data);
+}
+
+uint8_t* FixedLengthArrayBufferObject::inlineDataPointer() const {
+ return static_cast<uint8_t*>(fixedData(JSCLASS_RESERVED_SLOTS(&class_)));
+}
+
+uint8_t* ResizableArrayBufferObject::inlineDataPointer() const {
+ return static_cast<uint8_t*>(fixedData(JSCLASS_RESERVED_SLOTS(&class_)));
+}
+
+uint8_t* ArrayBufferObject::dataPointer() const {
+ return static_cast<uint8_t*>(getFixedSlot(DATA_SLOT).toPrivate());
+}
+
+SharedMem<uint8_t*> ArrayBufferObject::dataPointerShared() const {
+ return SharedMem<uint8_t*>::unshared(getFixedSlot(DATA_SLOT).toPrivate());
+}
+
+ArrayBufferObject::FreeInfo* ArrayBufferObject::freeInfo() const {
+ MOZ_ASSERT(isExternal());
+ MOZ_ASSERT(!isResizable());
+ auto* data = as<FixedLengthArrayBufferObject>().inlineDataPointer();
+ return reinterpret_cast<FreeInfo*>(data);
+}
+
+void ArrayBufferObject::releaseData(JS::GCContext* gcx) {
+ switch (bufferKind()) {
+ case INLINE_DATA:
+ // Inline data doesn't require releasing.
+ break;
+ case MALLOCED_ARRAYBUFFER_CONTENTS_ARENA:
+ case MALLOCED_UNKNOWN_ARENA:
+ gcx->free_(this, dataPointer(), associatedBytes(),
+ MemoryUse::ArrayBufferContents);
+ break;
+ case NO_DATA:
+ // There's nothing to release if there's no data.
+ MOZ_ASSERT(dataPointer() == nullptr);
+ break;
+ case USER_OWNED:
+ // User-owned data is released by, well, the user.
+ break;
+ case MAPPED:
+ gc::DeallocateMappedContent(dataPointer(), byteLength());
+ gcx->removeCellMemory(this, associatedBytes(),
+ MemoryUse::ArrayBufferContents);
+ break;
+ case WASM:
+ WasmArrayRawBuffer::Release(dataPointer());
+ gcx->removeCellMemory(this, byteLength(), MemoryUse::ArrayBufferContents);
+ break;
+ case EXTERNAL:
+ MOZ_ASSERT(freeInfo()->freeFunc);
+ {
+ // The analyzer can't know for sure whether the embedder-supplied
+ // free function will GC. We give the analyzer a hint here.
+ // (Doing a GC in the free function is considered a programmer
+ // error.)
+ JS::AutoSuppressGCAnalysis nogc;
+ freeInfo()->freeFunc(dataPointer(), freeInfo()->freeUserData);
+ }
+ break;
+ }
+}
+
+void ArrayBufferObject::setDataPointer(BufferContents contents) {
+ setFixedSlot(DATA_SLOT, PrivateValue(contents.data()));
+ setFlags((flags() & ~KIND_MASK) | contents.kind());
+
+ if (isExternal()) {
+ auto info = freeInfo();
+ info->freeFunc = contents.freeFunc();
+ info->freeUserData = contents.freeUserData();
+ }
+}
+
+size_t ArrayBufferObject::byteLength() const {
+ return size_t(getFixedSlot(BYTE_LENGTH_SLOT).toPrivate());
+}
+
+inline size_t ArrayBufferObject::associatedBytes() const {
+ if (isMalloced()) {
+ if (isResizable()) {
+ return as<ResizableArrayBufferObject>().maxByteLength();
+ }
+ return byteLength();
+ }
+ if (isMapped()) {
+ return RoundUp(byteLength(), js::gc::SystemPageSize());
+ }
+ MOZ_CRASH("Unexpected buffer kind");
+}
+
+void ArrayBufferObject::setByteLength(size_t length) {
+ MOZ_ASSERT(length <= ArrayBufferObject::ByteLengthLimit);
+ setFixedSlot(BYTE_LENGTH_SLOT, PrivateValue(length));
+}
+
+size_t ArrayBufferObject::wasmMappedSize() const {
+ if (isWasm()) {
+ return contents().wasmBuffer()->mappedSize();
+ }
+ return byteLength();
+}
+
+IndexType ArrayBufferObject::wasmIndexType() const {
+ if (isWasm()) {
+ return contents().wasmBuffer()->indexType();
+ }
+ MOZ_ASSERT(isPreparedForAsmJS());
+ return wasm::IndexType::I32;
+}
+
+Pages ArrayBufferObject::wasmPages() const {
+ if (isWasm()) {
+ return contents().wasmBuffer()->pages();
+ }
+ MOZ_ASSERT(isPreparedForAsmJS());
+ return Pages::fromByteLengthExact(byteLength());
+}
+
+Pages ArrayBufferObject::wasmClampedMaxPages() const {
+ if (isWasm()) {
+ return contents().wasmBuffer()->clampedMaxPages();
+ }
+ MOZ_ASSERT(isPreparedForAsmJS());
+ return Pages::fromByteLengthExact(byteLength());
+}
+
+Maybe<Pages> ArrayBufferObject::wasmSourceMaxPages() const {
+ if (isWasm()) {
+ return contents().wasmBuffer()->sourceMaxPages();
+ }
+ MOZ_ASSERT(isPreparedForAsmJS());
+ return Some<Pages>(Pages::fromByteLengthExact(byteLength()));
+}
+
+size_t js::WasmArrayBufferMappedSize(const ArrayBufferObjectMaybeShared* buf) {
+ if (buf->is<ArrayBufferObject>()) {
+ return buf->as<ArrayBufferObject>().wasmMappedSize();
+ }
+ return buf->as<SharedArrayBufferObject>().wasmMappedSize();
+}
+
+IndexType js::WasmArrayBufferIndexType(
+ const ArrayBufferObjectMaybeShared* buf) {
+ if (buf->is<ArrayBufferObject>()) {
+ return buf->as<ArrayBufferObject>().wasmIndexType();
+ }
+ return buf->as<SharedArrayBufferObject>().wasmIndexType();
+}
+Pages js::WasmArrayBufferPages(const ArrayBufferObjectMaybeShared* buf) {
+ if (buf->is<ArrayBufferObject>()) {
+ return buf->as<ArrayBufferObject>().wasmPages();
+ }
+ return buf->as<SharedArrayBufferObject>().volatileWasmPages();
+}
+Pages js::WasmArrayBufferClampedMaxPages(
+ const ArrayBufferObjectMaybeShared* buf) {
+ if (buf->is<ArrayBufferObject>()) {
+ return buf->as<ArrayBufferObject>().wasmClampedMaxPages();
+ }
+ return buf->as<SharedArrayBufferObject>().wasmClampedMaxPages();
+}
+Maybe<Pages> js::WasmArrayBufferSourceMaxPages(
+ const ArrayBufferObjectMaybeShared* buf) {
+ if (buf->is<ArrayBufferObject>()) {
+ return buf->as<ArrayBufferObject>().wasmSourceMaxPages();
+ }
+ return Some(buf->as<SharedArrayBufferObject>().wasmSourceMaxPages());
+}
+
+static void CheckStealPreconditions(Handle<ArrayBufferObject*> buffer,
+ JSContext* cx) {
+ cx->check(buffer);
+
+ MOZ_ASSERT(!buffer->isDetached(), "can't steal from a detached buffer");
+ MOZ_ASSERT(!buffer->isLengthPinned(),
+ "can't steal from a buffer with a pinned length");
+ MOZ_ASSERT(!buffer->isPreparedForAsmJS(),
+ "asm.js-prepared buffers don't have detachable/stealable data");
+}
+
+/* static */
+ArrayBufferObject* ArrayBufferObject::wasmGrowToPagesInPlace(
+ wasm::IndexType t, Pages newPages, Handle<ArrayBufferObject*> oldBuf,
+ JSContext* cx) {
+ if (oldBuf->isLengthPinned()) {
+ return nullptr;
+ }
+
+ CheckStealPreconditions(oldBuf, cx);
+
+ MOZ_ASSERT(oldBuf->isWasm());
+
+ // Check that the new pages is within our allowable range. This will
+ // simultaneously check against the maximum specified in source and our
+ // implementation limits.
+ if (newPages > oldBuf->wasmClampedMaxPages()) {
+ return nullptr;
+ }
+ MOZ_ASSERT(newPages <= wasm::MaxMemoryPages(t) &&
+ newPages.byteLength() <= ArrayBufferObject::ByteLengthLimit);
+
+ // We have checked against the clamped maximum and so we know we can convert
+ // to byte lengths now.
+ size_t newSize = newPages.byteLength();
+
+ // On failure, do not throw and ensure that the original buffer is
+ // unmodified and valid. After WasmArrayRawBuffer::growToPagesInPlace(), the
+ // wasm-visible length of the buffer has been increased so it must be the
+ // last fallible operation.
+
+ auto* newBuf = ArrayBufferObject::createEmpty(cx);
+ if (!newBuf) {
+ cx->clearPendingException();
+ return nullptr;
+ }
+
+ MOZ_ASSERT(newBuf->isNoData());
+
+ if (!oldBuf->contents().wasmBuffer()->growToPagesInPlace(newPages)) {
+ return nullptr;
+ }
+
+ // Extract the grown contents from |oldBuf|.
+ BufferContents oldContents = oldBuf->contents();
+
+ // Overwrite |oldBuf|'s data pointer *without* releasing old data.
+ oldBuf->setDataPointer(BufferContents::createNoData());
+
+ // Detach |oldBuf| now that doing so won't release |oldContents|.
+ RemoveCellMemory(oldBuf, oldBuf->byteLength(),
+ MemoryUse::ArrayBufferContents);
+ ArrayBufferObject::detach(cx, oldBuf);
+
+ // Set |newBuf|'s contents to |oldBuf|'s original contents.
+ newBuf->initialize(newSize, oldContents);
+ AddCellMemory(newBuf, newSize, MemoryUse::ArrayBufferContents);
+
+ return newBuf;
+}
+
+/* static */
+ArrayBufferObject* ArrayBufferObject::wasmMovingGrowToPages(
+ IndexType t, Pages newPages, Handle<ArrayBufferObject*> oldBuf,
+ JSContext* cx) {
+ // On failure, do not throw and ensure that the original buffer is
+ // unmodified and valid.
+ if (oldBuf->isLengthPinned()) {
+ return nullptr;
+ }
+
+ // Check that the new pages is within our allowable range. This will
+ // simultaneously check against the maximum specified in source and our
+ // implementation limits.
+ if (newPages > oldBuf->wasmClampedMaxPages()) {
+ return nullptr;
+ }
+ MOZ_ASSERT(newPages <= wasm::MaxMemoryPages(t) &&
+ newPages.byteLength() < ArrayBufferObject::ByteLengthLimit);
+
+ // We have checked against the clamped maximum and so we know we can convert
+ // to byte lengths now.
+ size_t newSize = newPages.byteLength();
+
+ if (wasm::ComputeMappedSize(newPages) <= oldBuf->wasmMappedSize() ||
+ oldBuf->contents().wasmBuffer()->extendMappedSize(newPages)) {
+ return wasmGrowToPagesInPlace(t, newPages, oldBuf, cx);
+ }
+
+ Rooted<ArrayBufferObject*> newBuf(cx, ArrayBufferObject::createEmpty(cx));
+ if (!newBuf) {
+ cx->clearPendingException();
+ return nullptr;
+ }
+
+ Pages clampedMaxPages =
+ wasm::ClampedMaxPages(t, newPages, Nothing(), /* hugeMemory */ false);
+ WasmArrayRawBuffer* newRawBuf = WasmArrayRawBuffer::AllocateWasm(
+ oldBuf->wasmIndexType(), newPages, clampedMaxPages, Nothing(), Nothing());
+ if (!newRawBuf) {
+ return nullptr;
+ }
+
+ AddCellMemory(newBuf, newSize, MemoryUse::ArrayBufferContents);
+
+ BufferContents contents =
+ BufferContents::createWasm(newRawBuf->dataPointer());
+ newBuf->initialize(newSize, contents);
+
+ memcpy(newBuf->dataPointer(), oldBuf->dataPointer(), oldBuf->byteLength());
+ ArrayBufferObject::detach(cx, oldBuf);
+
+ return newBuf;
+}
+
+/* static */
+void ArrayBufferObject::wasmDiscard(Handle<ArrayBufferObject*> buf,
+ uint64_t byteOffset, uint64_t byteLen) {
+ MOZ_ASSERT(buf->isWasm());
+ buf->contents().wasmBuffer()->discard(byteOffset, byteLen);
+}
+
+uint32_t ArrayBufferObject::flags() const {
+ return uint32_t(getFixedSlot(FLAGS_SLOT).toInt32());
+}
+
+void ArrayBufferObject::setFlags(uint32_t flags) {
+ setFixedSlot(FLAGS_SLOT, Int32Value(flags));
+}
+
+static constexpr js::gc::AllocKind GetArrayBufferGCObjectKind(size_t numSlots) {
+ if (numSlots <= 4) {
+ return js::gc::AllocKind::ARRAYBUFFER4;
+ }
+ if (numSlots <= 8) {
+ return js::gc::AllocKind::ARRAYBUFFER8;
+ }
+ if (numSlots <= 12) {
+ return js::gc::AllocKind::ARRAYBUFFER12;
+ }
+ return js::gc::AllocKind::ARRAYBUFFER16;
+}
+
+template <class ArrayBufferType>
+static ArrayBufferType* NewArrayBufferObject(JSContext* cx, HandleObject proto_,
+ gc::AllocKind allocKind) {
+ MOZ_ASSERT(allocKind == gc::AllocKind::ARRAYBUFFER4 ||
+ allocKind == gc::AllocKind::ARRAYBUFFER8 ||
+ allocKind == gc::AllocKind::ARRAYBUFFER12 ||
+ allocKind == gc::AllocKind::ARRAYBUFFER16);
+
+ static_assert(std::is_same_v<ArrayBufferType, FixedLengthArrayBufferObject> ||
+ std::is_same_v<ArrayBufferType, ResizableArrayBufferObject>);
+
+ RootedObject proto(cx, proto_);
+ if (!proto) {
+ proto = GlobalObject::getOrCreatePrototype(cx, JSProto_ArrayBuffer);
+ if (!proto) {
+ return nullptr;
+ }
+ }
+
+ const JSClass* clasp = &ArrayBufferType::class_;
+
+ // Array buffers can store data inline so we only use fixed slots to cover the
+ // reserved slots, ignoring the AllocKind.
+ MOZ_ASSERT(ClassCanHaveFixedData(clasp));
+ constexpr size_t nfixed = ArrayBufferType::RESERVED_SLOTS;
+ static_assert(nfixed <= NativeObject::MAX_FIXED_SLOTS);
+
+ Rooted<SharedShape*> shape(
+ cx,
+ SharedShape::getInitialShape(cx, clasp, cx->realm(), AsTaggedProto(proto),
+ nfixed, ObjectFlags()));
+ if (!shape) {
+ return nullptr;
+ }
+
+ // Array buffers can't be nursery allocated but can be background-finalized.
+ MOZ_ASSERT(IsBackgroundFinalized(allocKind));
+ MOZ_ASSERT(!CanNurseryAllocateFinalizedClass(clasp));
+ constexpr gc::Heap heap = gc::Heap::Tenured;
+
+ return NativeObject::create<ArrayBufferType>(cx, allocKind, heap, shape);
+}
+
+// Creates a new ArrayBufferObject with %ArrayBuffer.prototype% as proto and no
+// space for inline data.
+static ArrayBufferObject* NewArrayBufferObject(JSContext* cx) {
+ constexpr auto allocKind =
+ GetArrayBufferGCObjectKind(FixedLengthArrayBufferObject::RESERVED_SLOTS);
+ return NewArrayBufferObject<FixedLengthArrayBufferObject>(cx, nullptr,
+ allocKind);
+}
+static ResizableArrayBufferObject* NewResizableArrayBufferObject(
+ JSContext* cx) {
+ constexpr auto allocKind =
+ GetArrayBufferGCObjectKind(ResizableArrayBufferObject::RESERVED_SLOTS);
+ return NewArrayBufferObject<ResizableArrayBufferObject>(cx, nullptr,
+ allocKind);
+}
+
+ArrayBufferObject* ArrayBufferObject::createForContents(
+ JSContext* cx, size_t nbytes, BufferContents contents) {
+ MOZ_ASSERT(contents);
+ MOZ_ASSERT(contents.kind() != INLINE_DATA);
+ MOZ_ASSERT(contents.kind() != NO_DATA);
+ MOZ_ASSERT(contents.kind() != WASM);
+
+ // 24.1.1.1, step 3 (Inlined 6.2.6.1 CreateByteDataBlock, step 2).
+ if (!CheckArrayBufferTooLarge(cx, nbytes)) {
+ return nullptr;
+ }
+
+ // Some |contents| kinds need to store extra data in the ArrayBuffer beyond a
+ // data pointer. If needed for the particular kind, add extra fixed slots to
+ // the ArrayBuffer for use as raw storage to store such information.
+ constexpr size_t reservedSlots = FixedLengthArrayBufferObject::RESERVED_SLOTS;
+
+ size_t nAllocated = 0;
+ size_t nslots = reservedSlots;
+ if (contents.kind() == USER_OWNED) {
+ // No accounting to do in this case.
+ } else if (contents.kind() == EXTERNAL) {
+ // Store the FreeInfo in the inline data slots so that we
+ // don't use up slots for it in non-refcounted array buffers.
+ constexpr size_t freeInfoSlots = HowMany(sizeof(FreeInfo), sizeof(Value));
+ static_assert(
+ reservedSlots + freeInfoSlots <= NativeObject::MAX_FIXED_SLOTS,
+ "FreeInfo must fit in inline slots");
+ nslots += freeInfoSlots;
+ } else {
+ // The ABO is taking ownership, so account the bytes against the zone.
+ nAllocated = nbytes;
+ if (contents.kind() == MAPPED) {
+ nAllocated = RoundUp(nbytes, js::gc::SystemPageSize());
+ } else {
+ MOZ_ASSERT(contents.kind() == MALLOCED_ARRAYBUFFER_CONTENTS_ARENA ||
+ contents.kind() == MALLOCED_UNKNOWN_ARENA,
+ "should have handled all possible callers' kinds");
+ }
+ }
+
+ gc::AllocKind allocKind = GetArrayBufferGCObjectKind(nslots);
+
+ AutoSetNewObjectMetadata metadata(cx);
+ Rooted<ArrayBufferObject*> buffer(
+ cx, NewArrayBufferObject<FixedLengthArrayBufferObject>(cx, nullptr,
+ allocKind));
+ if (!buffer) {
+ return nullptr;
+ }
+
+ MOZ_ASSERT(!gc::IsInsideNursery(buffer),
+ "ArrayBufferObject has a finalizer that must be called to not "
+ "leak in some cases, so it can't be nursery-allocated");
+
+ buffer->initialize(nbytes, contents);
+
+ if (contents.kind() == MAPPED ||
+ contents.kind() == MALLOCED_ARRAYBUFFER_CONTENTS_ARENA ||
+ contents.kind() == MALLOCED_UNKNOWN_ARENA) {
+ AddCellMemory(buffer, nAllocated, MemoryUse::ArrayBufferContents);
+ }
+
+ return buffer;
+}
+
+template <class ArrayBufferType, ArrayBufferObject::FillContents FillType>
+/* static */ std::tuple<ArrayBufferType*, uint8_t*>
+ArrayBufferObject::createUninitializedBufferAndData(
+ JSContext* cx, size_t nbytes, AutoSetNewObjectMetadata&,
+ JS::Handle<JSObject*> proto) {
+ MOZ_ASSERT(nbytes <= ArrayBufferObject::ByteLengthLimit,
+ "caller must validate the byte count it passes");
+
+ static_assert(std::is_same_v<ArrayBufferType, FixedLengthArrayBufferObject> ||
+ std::is_same_v<ArrayBufferType, ResizableArrayBufferObject>);
+
+ // Try fitting the data inline with the object by repurposing fixed-slot
+ // storage. Add extra fixed slots if necessary to accomplish this, but don't
+ // exceed the maximum number of fixed slots!
+ size_t nslots = ArrayBufferType::RESERVED_SLOTS;
+ ArrayBufferContents data;
+ if (nbytes <= ArrayBufferType::MaxInlineBytes) {
+ int newSlots = HowMany(nbytes, sizeof(Value));
+ MOZ_ASSERT(int(nbytes) <= newSlots * int(sizeof(Value)));
+
+ nslots += newSlots;
+ } else {
+ data = FillType == FillContents::Uninitialized
+ ? AllocateUninitializedArrayBufferContents(cx, nbytes)
+ : AllocateArrayBufferContents(cx, nbytes);
+ if (!data) {
+ return {nullptr, nullptr};
+ }
+ }
+
+ gc::AllocKind allocKind = GetArrayBufferGCObjectKind(nslots);
+
+ auto* buffer = NewArrayBufferObject<ArrayBufferType>(cx, proto, allocKind);
+ if (!buffer) {
+ return {nullptr, nullptr};
+ }
+
+ MOZ_ASSERT(!gc::IsInsideNursery(buffer),
+ "ArrayBufferObject has a finalizer that must be called to not "
+ "leak in some cases, so it can't be nursery-allocated");
+
+ if (data) {
+ return {buffer, data.release()};
+ }
+
+ if constexpr (FillType == FillContents::Zero) {
+ memset(buffer->inlineDataPointer(), 0, nbytes);
+ }
+ return {buffer, nullptr};
+}
+
+template <ArrayBufferObject::FillContents FillType>
+/* static */ std::tuple<ArrayBufferObject*, uint8_t*>
+ArrayBufferObject::createBufferAndData(
+ JSContext* cx, size_t nbytes, AutoSetNewObjectMetadata& metadata,
+ JS::Handle<JSObject*> proto /* = nullptr */) {
+ MOZ_ASSERT(nbytes <= ArrayBufferObject::ByteLengthLimit,
+ "caller must validate the byte count it passes");
+
+ auto [buffer, data] =
+ createUninitializedBufferAndData<FixedLengthArrayBufferObject, FillType>(
+ cx, nbytes, metadata, proto);
+ if (!buffer) {
+ return {nullptr, nullptr};
+ }
+
+ if (data) {
+ buffer->initialize(
+ nbytes, BufferContents::createMallocedArrayBufferContentsArena(data));
+ AddCellMemory(buffer, nbytes, MemoryUse::ArrayBufferContents);
+ } else {
+ data = buffer->inlineDataPointer();
+ buffer->initialize(nbytes, BufferContents::createInlineData(data));
+ }
+ return {buffer, data};
+}
+
+template <ArrayBufferObject::FillContents FillType>
+/* static */ std::tuple<ResizableArrayBufferObject*, uint8_t*>
+ResizableArrayBufferObject::createBufferAndData(
+ JSContext* cx, size_t byteLength, size_t maxByteLength,
+ AutoSetNewObjectMetadata& metadata, Handle<JSObject*> proto) {
+ MOZ_ASSERT(byteLength <= maxByteLength);
+ MOZ_ASSERT(maxByteLength <= ArrayBufferObject::ByteLengthLimit,
+ "caller must validate the byte count it passes");
+
+ // NOTE: The spec proposal for resizable ArrayBuffers suggests to use a
+ // virtual memory based approach to avoid eagerly allocating the maximum byte
+ // length. We don't yet support this and instead are allocating the maximum
+ // byte length direct from the start.
+ size_t nbytes = maxByteLength;
+
+ auto [buffer, data] =
+ createUninitializedBufferAndData<ResizableArrayBufferObject, FillType>(
+ cx, nbytes, metadata, proto);
+ if (!buffer) {
+ return {nullptr, nullptr};
+ }
+
+ if (data) {
+ buffer->initialize(
+ byteLength, maxByteLength,
+ BufferContents::createMallocedArrayBufferContentsArena(data));
+ AddCellMemory(buffer, nbytes, MemoryUse::ArrayBufferContents);
+ } else {
+ data = buffer->inlineDataPointer();
+ buffer->initialize(byteLength, maxByteLength,
+ BufferContents::createInlineData(data));
+ }
+ return {buffer, data};
+}
+
+/* static */ ArrayBufferObject* ArrayBufferObject::copy(
+ JSContext* cx, size_t newByteLength,
+ JS::Handle<ArrayBufferObject*> source) {
+ MOZ_ASSERT(!source->isDetached());
+ MOZ_ASSERT(newByteLength <= ArrayBufferObject::ByteLengthLimit,
+ "caller must validate the byte count it passes");
+
+ size_t sourceByteLength = source->byteLength();
+
+ if (newByteLength > sourceByteLength) {
+ // Copy into a larger buffer.
+ AutoSetNewObjectMetadata metadata(cx);
+ auto [buffer, toFill] = createBufferAndData<FillContents::Zero>(
+ cx, newByteLength, metadata, nullptr);
+ if (!buffer) {
+ return nullptr;
+ }
+
+ std::copy_n(source->dataPointer(), sourceByteLength, toFill);
+
+ return buffer;
+ }
+
+ // Copy into a smaller or same size buffer.
+ AutoSetNewObjectMetadata metadata(cx);
+ auto [buffer, toFill] = createBufferAndData<FillContents::Uninitialized>(
+ cx, newByteLength, metadata, nullptr);
+ if (!buffer) {
+ return nullptr;
+ }
+
+ std::uninitialized_copy_n(source->dataPointer(), newByteLength, toFill);
+
+ return buffer;
+}
+
+/* static */ ResizableArrayBufferObject* ResizableArrayBufferObject::copy(
+ JSContext* cx, size_t newByteLength,
+ JS::Handle<ResizableArrayBufferObject*> source) {
+ MOZ_ASSERT(!source->isDetached());
+ MOZ_ASSERT(newByteLength <= source->maxByteLength());
+
+ size_t sourceByteLength = source->byteLength();
+ size_t newMaxByteLength = source->maxByteLength();
+
+ if (newByteLength > sourceByteLength) {
+ // Copy into a larger buffer.
+ AutoSetNewObjectMetadata metadata(cx);
+ auto [buffer, toFill] = createBufferAndData<FillContents::Zero>(
+ cx, newByteLength, newMaxByteLength, metadata, nullptr);
+ if (!buffer) {
+ return nullptr;
+ }
+
+ // The `createBufferAndData()` call first zero-initializes the complete
+ // buffer and then we copy over |sourceByteLength| bytes from |source|. It
+ // seems prudent to only zero-initialize the trailing bytes of |toFill|
+ // to avoid writing twice to `toFill[0..newByteLength]`. We don't yet
+ // implement this optimization, because this method is only called for
+ // small, inline buffers, so any write optimizations probably won't make
+ // much of a difference.
+ std::copy_n(source->dataPointer(), sourceByteLength, toFill);
+
+ return buffer;
+ }
+
+ // Copy into a smaller or same size buffer.
+ AutoSetNewObjectMetadata metadata(cx);
+ auto [buffer, toFill] = createBufferAndData<FillContents::Uninitialized>(
+ cx, newByteLength, newMaxByteLength, metadata, nullptr);
+ if (!buffer) {
+ return nullptr;
+ }
+
+ std::uninitialized_copy_n(source->dataPointer(), newByteLength, toFill);
+
+ return buffer;
+}
+
+/* static */ ArrayBufferObject* ArrayBufferObject::copyAndDetach(
+ JSContext* cx, size_t newByteLength,
+ JS::Handle<ArrayBufferObject*> source) {
+ MOZ_ASSERT(!source->isDetached());
+ MOZ_ASSERT(!source->isLengthPinned());
+ MOZ_ASSERT(newByteLength <= ArrayBufferObject::ByteLengthLimit,
+ "caller must validate the byte count it passes");
+
+ if (newByteLength > FixedLengthArrayBufferObject::MaxInlineBytes &&
+ source->isMalloced()) {
+ if (newByteLength == source->associatedBytes()) {
+ return copyAndDetachSteal(cx, source);
+ }
+ if (source->bufferKind() ==
+ ArrayBufferObject::MALLOCED_ARRAYBUFFER_CONTENTS_ARENA) {
+ return copyAndDetachRealloc(cx, newByteLength, source);
+ }
+ }
+
+ auto* newBuffer = ArrayBufferObject::copy(cx, newByteLength, source);
+ if (!newBuffer) {
+ return nullptr;
+ }
+ ArrayBufferObject::detach(cx, source);
+
+ return newBuffer;
+}
+
+/* static */ ArrayBufferObject* ArrayBufferObject::copyAndDetachSteal(
+ JSContext* cx, JS::Handle<ArrayBufferObject*> source) {
+ MOZ_ASSERT(!source->isDetached());
+ MOZ_ASSERT(!source->isLengthPinned());
+ MOZ_ASSERT(source->isMalloced());
+
+ size_t newByteLength = source->associatedBytes();
+ MOZ_ASSERT(newByteLength > FixedLengthArrayBufferObject::MaxInlineBytes,
+ "prefer copying small buffers");
+ MOZ_ASSERT(source->byteLength() <= newByteLength,
+ "source length is less-or-equal to |newByteLength|");
+
+ auto* newBuffer = ArrayBufferObject::createEmpty(cx);
+ if (!newBuffer) {
+ return nullptr;
+ }
+
+ // Extract the contents from |source|.
+ BufferContents contents = source->contents();
+ MOZ_ASSERT(contents);
+ MOZ_ASSERT(contents.kind() == MALLOCED_ARRAYBUFFER_CONTENTS_ARENA ||
+ contents.kind() == MALLOCED_UNKNOWN_ARENA);
+
+ // Overwrite |source|'s data pointer *without* releasing the data.
+ source->setDataPointer(BufferContents::createNoData());
+
+ // Detach |source| now that doing so won't release |contents|.
+ RemoveCellMemory(source, newByteLength, MemoryUse::ArrayBufferContents);
+ ArrayBufferObject::detach(cx, source);
+
+ // Set |newBuffer|'s contents to |source|'s original contents.
+ newBuffer->initialize(newByteLength, contents);
+ AddCellMemory(newBuffer, newByteLength, MemoryUse::ArrayBufferContents);
+
+ return newBuffer;
+}
+
+/* static */ ArrayBufferObject* ArrayBufferObject::copyAndDetachRealloc(
+ JSContext* cx, size_t newByteLength,
+ JS::Handle<ArrayBufferObject*> source) {
+ MOZ_ASSERT(!source->isDetached());
+ MOZ_ASSERT(!source->isLengthPinned());
+ MOZ_ASSERT(source->bufferKind() == MALLOCED_ARRAYBUFFER_CONTENTS_ARENA);
+ MOZ_ASSERT(newByteLength > FixedLengthArrayBufferObject::MaxInlineBytes,
+ "prefer copying small buffers");
+ MOZ_ASSERT(newByteLength <= ArrayBufferObject::ByteLengthLimit,
+ "caller must validate the byte count it passes");
+
+ size_t oldByteLength = source->associatedBytes();
+ MOZ_ASSERT(oldByteLength != newByteLength,
+ "steal instead of realloc same size buffers");
+ MOZ_ASSERT(source->byteLength() <= oldByteLength,
+ "source length is less-or-equal to |oldByteLength|");
+
+ Rooted<ArrayBufferObject*> newBuffer(cx, ArrayBufferObject::createEmpty(cx));
+ if (!newBuffer) {
+ return nullptr;
+ }
+
+ // Extract the contents from |source|.
+ BufferContents contents = source->contents();
+ MOZ_ASSERT(contents);
+ MOZ_ASSERT(contents.kind() == MALLOCED_ARRAYBUFFER_CONTENTS_ARENA);
+
+ // Reallocate the data pointer.
+ auto newData = ReallocateArrayBufferContents(cx, contents.data(),
+ oldByteLength, newByteLength);
+ if (!newData) {
+ // If reallocation failed, the old pointer is still valid, so just return.
+ return nullptr;
+ }
+ auto newContents =
+ BufferContents::createMallocedArrayBufferContentsArena(newData.release());
+
+ // Overwrite |source|'s data pointer *without* releasing the data.
+ source->setDataPointer(BufferContents::createNoData());
+
+ // Detach |source| now that doing so won't release |contents|.
+ RemoveCellMemory(source, oldByteLength, MemoryUse::ArrayBufferContents);
+ ArrayBufferObject::detach(cx, source);
+
+ // Set |newBuffer|'s contents to |newContents|.
+ newBuffer->initialize(newByteLength, newContents);
+ AddCellMemory(newBuffer, newByteLength, MemoryUse::ArrayBufferContents);
+
+ // Zero initialize the newly allocated memory, if necessary.
+ if (newByteLength > oldByteLength) {
+ size_t count = newByteLength - oldByteLength;
+ std::uninitialized_fill_n(newContents.data() + oldByteLength, count, 0);
+ }
+
+ return newBuffer;
+}
+
+/* static */ ResizableArrayBufferObject*
+ResizableArrayBufferObject::copyAndDetach(
+ JSContext* cx, size_t newByteLength,
+ JS::Handle<ResizableArrayBufferObject*> source) {
+ MOZ_ASSERT(!source->isDetached());
+ MOZ_ASSERT(!source->isLengthPinned());
+ MOZ_ASSERT(newByteLength <= source->maxByteLength());
+
+ if (source->maxByteLength() > ResizableArrayBufferObject::MaxInlineBytes &&
+ source->isMalloced()) {
+ return copyAndDetachSteal(cx, newByteLength, source);
+ }
+
+ auto* newBuffer = ResizableArrayBufferObject::copy(cx, newByteLength, source);
+ if (!newBuffer) {
+ return nullptr;
+ }
+ ArrayBufferObject::detach(cx, source);
+
+ return newBuffer;
+}
+
+/* static */ ResizableArrayBufferObject*
+ResizableArrayBufferObject::copyAndDetachSteal(
+ JSContext* cx, size_t newByteLength,
+ JS::Handle<ResizableArrayBufferObject*> source) {
+ MOZ_ASSERT(!source->isDetached());
+ MOZ_ASSERT(!source->isLengthPinned());
+ MOZ_ASSERT(newByteLength <= source->maxByteLength());
+ MOZ_ASSERT(source->isMalloced());
+
+ size_t sourceByteLength = source->byteLength();
+ size_t maxByteLength = source->maxByteLength();
+ MOZ_ASSERT(maxByteLength > ResizableArrayBufferObject::MaxInlineBytes,
+ "prefer copying small buffers");
+
+ auto* newBuffer = ResizableArrayBufferObject::createEmpty(cx);
+ if (!newBuffer) {
+ return nullptr;
+ }
+
+ // Extract the contents from |source|.
+ BufferContents contents = source->contents();
+ MOZ_ASSERT(contents);
+ MOZ_ASSERT(contents.kind() == MALLOCED_ARRAYBUFFER_CONTENTS_ARENA ||
+ contents.kind() == MALLOCED_UNKNOWN_ARENA);
+
+ // Overwrite |source|'s data pointer *without* releasing the data.
+ source->setDataPointer(BufferContents::createNoData());
+
+ // Detach |source| now that doing so won't release |contents|.
+ RemoveCellMemory(source, maxByteLength, MemoryUse::ArrayBufferContents);
+ ArrayBufferObject::detach(cx, source);
+
+ // Set |newBuffer|'s contents to |source|'s original contents.
+ newBuffer->initialize(newByteLength, maxByteLength, contents);
+ AddCellMemory(newBuffer, maxByteLength, MemoryUse::ArrayBufferContents);
+
+ // Clear the bytes between `data[newByteLength..sourceByteLength]`.
+ if (newByteLength < sourceByteLength) {
+ size_t nbytes = sourceByteLength - newByteLength;
+ memset(newBuffer->dataPointer() + newByteLength, 0, nbytes);
+ }
+
+ return newBuffer;
+}
+
+ArrayBufferObject* ArrayBufferObject::createZeroed(
+ JSContext* cx, size_t nbytes, HandleObject proto /* = nullptr */) {
+ // 24.1.1.1, step 3 (Inlined 6.2.6.1 CreateByteDataBlock, step 2).
+ if (!CheckArrayBufferTooLarge(cx, nbytes)) {
+ return nullptr;
+ }
+
+ AutoSetNewObjectMetadata metadata(cx);
+ auto [buffer, toFill] =
+ createBufferAndData<FillContents::Zero>(cx, nbytes, metadata, proto);
+ (void)toFill;
+ return buffer;
+}
+
+ResizableArrayBufferObject* ResizableArrayBufferObject::createZeroed(
+ JSContext* cx, size_t byteLength, size_t maxByteLength,
+ HandleObject proto /* = nullptr */) {
+ // 24.1.1.1, step 3 (Inlined 6.2.6.1 CreateByteDataBlock, step 2).
+ if (!CheckArrayBufferTooLarge(cx, byteLength) ||
+ !CheckArrayBufferTooLarge(cx, maxByteLength)) {
+ return nullptr;
+ }
+ if (byteLength > maxByteLength) {
+ JS_ReportErrorNumberASCII(cx, GetErrorMessage, nullptr,
+ JSMSG_ARRAYBUFFER_LENGTH_LARGER_THAN_MAXIMUM);
+ return nullptr;
+ }
+
+ AutoSetNewObjectMetadata metadata(cx);
+ auto [buffer, toFill] = createBufferAndData<FillContents::Zero>(
+ cx, byteLength, maxByteLength, metadata, proto);
+ (void)toFill;
+ return buffer;
+}
+
+ArrayBufferObject* ArrayBufferObject::createEmpty(JSContext* cx) {
+ AutoSetNewObjectMetadata metadata(cx);
+ ArrayBufferObject* obj = NewArrayBufferObject(cx);
+ if (!obj) {
+ return nullptr;
+ }
+
+ obj->initialize(0, BufferContents::createNoData());
+ return obj;
+}
+
+ResizableArrayBufferObject* ResizableArrayBufferObject::createEmpty(
+ JSContext* cx) {
+ AutoSetNewObjectMetadata metadata(cx);
+ auto* obj = NewResizableArrayBufferObject(cx);
+ if (!obj) {
+ return nullptr;
+ }
+
+ obj->initialize(0, 0, BufferContents::createNoData());
+ return obj;
+}
+
+ArrayBufferObject* ArrayBufferObject::createFromNewRawBuffer(
+ JSContext* cx, WasmArrayRawBuffer* rawBuffer, size_t initialSize) {
+ AutoSetNewObjectMetadata metadata(cx);
+ ArrayBufferObject* buffer = NewArrayBufferObject(cx);
+ if (!buffer) {
+ WasmArrayRawBuffer::Release(rawBuffer->dataPointer());
+ return nullptr;
+ }
+
+ MOZ_ASSERT(initialSize == rawBuffer->byteLength());
+
+ auto contents = BufferContents::createWasm(rawBuffer->dataPointer());
+ buffer->initialize(initialSize, contents);
+
+ AddCellMemory(buffer, initialSize, MemoryUse::ArrayBufferContents);
+
+ return buffer;
+}
+
+/* static */ uint8_t* ArrayBufferObject::stealMallocedContents(
+ JSContext* cx, Handle<ArrayBufferObject*> buffer) {
+ CheckStealPreconditions(buffer, cx);
+
+ switch (buffer->bufferKind()) {
+ case MALLOCED_ARRAYBUFFER_CONTENTS_ARENA:
+ case MALLOCED_UNKNOWN_ARENA: {
+ uint8_t* stolenData = buffer->dataPointer();
+ MOZ_ASSERT(stolenData);
+
+ // Resizable buffers are initially allocated with their maximum
+ // byte-length. When stealing the buffer contents shrink the allocated
+ // memory to the actually used byte-length.
+ if (buffer->isResizable()) {
+ auto* resizableBuffer = &buffer->as<ResizableArrayBufferObject>();
+ size_t byteLength = resizableBuffer->byteLength();
+ size_t maxByteLength = resizableBuffer->maxByteLength();
+ MOZ_ASSERT(byteLength <= maxByteLength);
+
+ if (byteLength < maxByteLength) {
+ auto newData = ReallocateArrayBufferContents(
+ cx, stolenData, maxByteLength, byteLength);
+ if (!newData) {
+ // If reallocation failed, the old pointer is still valid. The
+ // ArrayBuffer isn't detached and still owns the malloc'ed memory.
+ return nullptr;
+ }
+
+ // The following code must be infallible, because the data pointer of
+ // |buffer| is possibly no longer valid after the above realloc.
+
+ stolenData = newData.release();
+ }
+ }
+
+ RemoveCellMemory(buffer, buffer->associatedBytes(),
+ MemoryUse::ArrayBufferContents);
+
+ // Overwrite the old data pointer *without* releasing the contents
+ // being stolen.
+ buffer->setDataPointer(BufferContents::createNoData());
+
+ // Detach |buffer| now that doing so won't free |stolenData|.
+ ArrayBufferObject::detach(cx, buffer);
+ return stolenData;
+ }
+
+ case INLINE_DATA:
+ case NO_DATA:
+ case USER_OWNED:
+ case MAPPED:
+ case EXTERNAL: {
+ // We can't use these data types directly. Make a copy to return.
+ ArrayBufferContents copiedData = NewCopiedBufferContents(cx, buffer);
+ if (!copiedData) {
+ return nullptr;
+ }
+
+ // Detach |buffer|. This immediately releases the currently owned
+ // contents, freeing or unmapping data in the MAPPED and EXTERNAL cases.
+ ArrayBufferObject::detach(cx, buffer);
+ return copiedData.release();
+ }
+
+ case WASM:
+ MOZ_ASSERT_UNREACHABLE(
+ "wasm buffers aren't stealable except by a "
+ "memory.grow operation that shouldn't call this "
+ "function");
+ return nullptr;
+ }
+
+ MOZ_ASSERT_UNREACHABLE("garbage kind computed");
+ return nullptr;
+}
+
+/* static */ ArrayBufferObject::BufferContents
+ArrayBufferObject::extractStructuredCloneContents(
+ JSContext* cx, Handle<ArrayBufferObject*> buffer) {
+ if (buffer->isLengthPinned()) {
+ JS_ReportErrorNumberASCII(cx, GetErrorMessage, nullptr,
+ JSMSG_ARRAYBUFFER_LENGTH_PINNED);
+ return BufferContents::createFailed();
+ }
+
+ CheckStealPreconditions(buffer, cx);
+
+ // We don't yet support extracting the contents of resizable buffers.
+ MOZ_ASSERT(!buffer->isResizable(),
+ "extracting the contents of resizable buffers not supported");
+
+ BufferContents contents = buffer->contents();
+
+ switch (contents.kind()) {
+ case INLINE_DATA:
+ case NO_DATA:
+ case USER_OWNED: {
+ ArrayBufferContents copiedData = NewCopiedBufferContents(cx, buffer);
+ if (!copiedData) {
+ return BufferContents::createFailed();
+ }
+
+ ArrayBufferObject::detach(cx, buffer);
+ return BufferContents::createMallocedArrayBufferContentsArena(
+ copiedData.release());
+ }
+
+ case MALLOCED_ARRAYBUFFER_CONTENTS_ARENA:
+ case MALLOCED_UNKNOWN_ARENA:
+ case MAPPED: {
+ MOZ_ASSERT(contents);
+
+ RemoveCellMemory(buffer, buffer->associatedBytes(),
+ MemoryUse::ArrayBufferContents);
+
+ // Overwrite the old data pointer *without* releasing old data.
+ buffer->setDataPointer(BufferContents::createNoData());
+
+ // Detach |buffer| now that doing so won't release |oldContents|.
+ ArrayBufferObject::detach(cx, buffer);
+ return contents;
+ }
+
+ case WASM:
+ JS_ReportErrorNumberASCII(cx, GetErrorMessage, nullptr,
+ JSMSG_WASM_NO_TRANSFER);
+ return BufferContents::createFailed();
+
+ case EXTERNAL:
+ MOZ_ASSERT_UNREACHABLE(
+ "external ArrayBuffer shouldn't have passed the "
+ "structured-clone preflighting");
+ break;
+ }
+
+ MOZ_ASSERT_UNREACHABLE("garbage kind computed");
+ return BufferContents::createFailed();
+}
+
+/* static */
+bool ArrayBufferObject::ensureNonInline(JSContext* cx,
+ Handle<ArrayBufferObject*> buffer) {
+ if (buffer->isDetached() || buffer->isPreparedForAsmJS()) {
+ return true;
+ }
+
+ if (buffer->isLengthPinned()) {
+ JS_ReportErrorNumberASCII(cx, GetErrorMessage, nullptr,
+ JSMSG_ARRAYBUFFER_LENGTH_PINNED);
+ return false;
+ }
+
+ BufferContents inlineContents = buffer->contents();
+ if (inlineContents.kind() != INLINE_DATA) {
+ return true;
+ }
+
+ size_t nbytes = buffer->byteLength();
+ ArrayBufferContents copy = NewCopiedBufferContents(cx, buffer);
+ if (!copy) {
+ return false;
+ }
+ BufferContents outOfLineContents =
+ BufferContents::createMallocedArrayBufferContentsArena(copy.release());
+ buffer->setDataPointer(outOfLineContents);
+ AddCellMemory(buffer, nbytes, MemoryUse::ArrayBufferContents);
+
+ if (!buffer->firstView()) {
+ return true; // No views! Easy!
+ }
+
+ buffer->firstView()->as<ArrayBufferViewObject>().notifyBufferMoved(
+ inlineContents.data(), outOfLineContents.data());
+
+ auto& innerViews = ObjectRealm::get(buffer).innerViews.get();
+ if (InnerViewTable::ViewVector* views =
+ innerViews.maybeViewsUnbarriered(buffer)) {
+ for (JSObject* view : *views) {
+ view->as<ArrayBufferViewObject>().notifyBufferMoved(
+ inlineContents.data(), outOfLineContents.data());
+ }
+ }
+
+ return true;
+}
+
+/* static */
+void ArrayBufferObject::addSizeOfExcludingThis(
+ JSObject* obj, mozilla::MallocSizeOf mallocSizeOf, JS::ClassInfo* info,
+ JS::RuntimeSizes* runtimeSizes) {
+ auto& buffer = obj->as<ArrayBufferObject>();
+ switch (buffer.bufferKind()) {
+ case INLINE_DATA:
+ // Inline data's size should be reported by this object's size-class
+ // reporting.
+ break;
+ case MALLOCED_ARRAYBUFFER_CONTENTS_ARENA:
+ case MALLOCED_UNKNOWN_ARENA:
+ if (buffer.isPreparedForAsmJS()) {
+ info->objectsMallocHeapElementsAsmJS +=
+ mallocSizeOf(buffer.dataPointer());
+ } else {
+ info->objectsMallocHeapElementsNormal +=
+ mallocSizeOf(buffer.dataPointer());
+ }
+ break;
+ case NO_DATA:
+ // No data is no memory.
+ MOZ_ASSERT(buffer.dataPointer() == nullptr);
+ break;
+ case USER_OWNED:
+ // User-owned data should be accounted for by the user.
+ break;
+ case EXTERNAL:
+ // External data will be accounted for by the owner of the buffer,
+ // not this view.
+ break;
+ case MAPPED:
+ info->objectsNonHeapElementsNormal += buffer.byteLength();
+ break;
+ case WASM:
+ if (!buffer.isDetached()) {
+ info->objectsNonHeapElementsWasm += buffer.byteLength();
+ if (runtimeSizes) {
+ MOZ_ASSERT(buffer.wasmMappedSize() >= buffer.byteLength());
+ runtimeSizes->wasmGuardPages +=
+ buffer.wasmMappedSize() - buffer.byteLength();
+ }
+ }
+ break;
+ }
+}
+
+/* static */
+void ArrayBufferObject::finalize(JS::GCContext* gcx, JSObject* obj) {
+ obj->as<ArrayBufferObject>().releaseData(gcx);
+}
+
+/* static */
+void ArrayBufferObject::copyData(ArrayBufferObject* toBuffer, size_t toIndex,
+ ArrayBufferObject* fromBuffer,
+ size_t fromIndex, size_t count) {
+ MOZ_ASSERT(!toBuffer->isDetached());
+ MOZ_ASSERT(toBuffer->byteLength() >= count);
+ MOZ_ASSERT(toBuffer->byteLength() >= toIndex + count);
+ MOZ_ASSERT(!fromBuffer->isDetached());
+ MOZ_ASSERT(fromBuffer->byteLength() >= fromIndex);
+ MOZ_ASSERT(fromBuffer->byteLength() >= fromIndex + count);
+
+ memcpy(toBuffer->dataPointer() + toIndex,
+ fromBuffer->dataPointer() + fromIndex, count);
+}
+
+template <class ArrayBufferType>
+/* static */
+size_t ArrayBufferObject::objectMoved(JSObject* obj, JSObject* old) {
+ auto& dst = obj->as<ArrayBufferType>();
+ const auto& src = old->as<ArrayBufferType>();
+
+ MOZ_ASSERT(
+ !obj->runtimeFromMainThread()->gc.nursery().isInside(src.dataPointer()));
+
+ // Fix up possible inline data pointer.
+ if (src.hasInlineData()) {
+ dst.setFixedSlot(DATA_SLOT, PrivateValue(dst.inlineDataPointer()));
+ }
+
+ return 0;
+}
+
+JSObject* ArrayBufferObject::firstView() {
+ return getFixedSlot(FIRST_VIEW_SLOT).isObject()
+ ? &getFixedSlot(FIRST_VIEW_SLOT).toObject()
+ : nullptr;
+}
+
+void ArrayBufferObject::setFirstView(ArrayBufferViewObject* view) {
+ setFixedSlot(FIRST_VIEW_SLOT, ObjectOrNullValue(view));
+}
+
+bool ArrayBufferObject::addView(JSContext* cx, ArrayBufferViewObject* view) {
+ if (!firstView()) {
+ setFirstView(view);
+ return true;
+ }
+
+ return ObjectRealm::get(this).innerViews.get().addView(cx, this, view);
+}
+
+#if defined(DEBUG) || defined(JS_JITSPEW)
+
+template <typename KnownF, typename UnknownF>
+void BufferKindToString(ArrayBufferObject::BufferKind kind, KnownF known,
+ UnknownF unknown) {
+ switch (kind) {
+ case ArrayBufferObject::BufferKind::INLINE_DATA:
+ known("INLINE_DATA");
+ break;
+ case ArrayBufferObject::BufferKind::MALLOCED_ARRAYBUFFER_CONTENTS_ARENA:
+ known("MALLOCED_ARRAYBUFFER_CONTENTS_ARENA");
+ break;
+ case ArrayBufferObject::BufferKind::NO_DATA:
+ known("NO_DATA");
+ break;
+ case ArrayBufferObject::BufferKind::USER_OWNED:
+ known("USER_OWNED");
+ break;
+ case ArrayBufferObject::BufferKind::WASM:
+ known("WASM");
+ break;
+ case ArrayBufferObject::BufferKind::MAPPED:
+ known("MAPPED");
+ break;
+ case ArrayBufferObject::BufferKind::EXTERNAL:
+ known("EXTERNAL");
+ break;
+ case ArrayBufferObject::BufferKind::MALLOCED_UNKNOWN_ARENA:
+ known("MALLOCED_UNKNOWN_ARENA");
+ break;
+ default:
+ unknown(uint8_t(kind));
+ break;
+ }
+}
+
+template <typename KnownF, typename UnknownF>
+void ForEachArrayBufferFlag(uint32_t flags, KnownF known, UnknownF unknown) {
+ for (uint32_t i = ArrayBufferObject::ArrayBufferFlags::BUFFER_KIND_MASK + 1;
+ i; i = i << 1) {
+ if (!(flags & i)) {
+ continue;
+ }
+ switch (ArrayBufferObject::ArrayBufferFlags(flags & i)) {
+ case ArrayBufferObject::ArrayBufferFlags::DETACHED:
+ known("DETACHED");
+ break;
+ case ArrayBufferObject::ArrayBufferFlags::FOR_ASMJS:
+ known("FOR_ASMJS");
+ break;
+ default:
+ unknown(i);
+ break;
+ }
+ }
+}
+
+void ArrayBufferObject::dumpOwnFields(js::JSONPrinter& json) const {
+ json.formatProperty("byteLength", "%zu",
+ size_t(getFixedSlot(BYTE_LENGTH_SLOT).toPrivate()));
+
+ BufferKindToString(
+ bufferKind(),
+ [&](const char* name) { json.property("bufferKind", name); },
+ [&](uint8_t value) {
+ json.formatProperty("bufferKind", "Unknown(%02x)", value);
+ });
+
+ json.beginInlineListProperty("flags");
+ ForEachArrayBufferFlag(
+ flags(), [&](const char* name) { json.value("%s", name); },
+ [&](uint32_t value) { json.value("Unknown(%08x)", value); });
+ json.endInlineList();
+
+ void* data = dataPointer();
+ if (data) {
+ json.formatProperty("data", "0x%p", data);
+ } else {
+ json.nullProperty("data");
+ }
+}
+
+void ArrayBufferObject::dumpOwnStringContent(js::GenericPrinter& out) const {
+ out.printf("byteLength=%zu, ",
+ size_t(getFixedSlot(BYTE_LENGTH_SLOT).toPrivate()));
+
+ BufferKindToString(
+ bufferKind(),
+ [&](const char* name) { out.printf("bufferKind=%s, ", name); },
+ [&](uint8_t value) { out.printf("bufferKind=Unknown(%02x), ", value); });
+
+ out.printf("flags=[");
+ bool first = true;
+ ForEachArrayBufferFlag(
+ flags(),
+ [&](const char* name) {
+ if (!first) {
+ out.put(",");
+ }
+ first = false;
+ out.put(name);
+ },
+ [&](uint32_t value) {
+ if (!first) {
+ out.put(",");
+ }
+ first = false;
+ out.printf("Unknown(%08x)", value);
+ });
+ out.put("], ");
+
+ void* data = dataPointer();
+ if (data) {
+ out.printf("data=0x%p", data);
+ } else {
+ out.put("data=null");
+ }
+}
+#endif
+
+/*
+ * InnerViewTable
+ */
+
+inline bool InnerViewTable::Views::empty() { return views.empty(); }
+
+inline bool InnerViewTable::Views::hasNurseryViews() {
+ return firstNurseryView < views.length();
+}
+
+bool InnerViewTable::Views::addView(ArrayBufferViewObject* view) {
+ // Add the view to the list, ensuring that all nursery views are at end.
+
+ if (!views.append(view)) {
+ return false;
+ }
+
+ if (!gc::IsInsideNursery(view)) {
+ // Move tenured views before |firstNurseryView|.
+ if (firstNurseryView != views.length() - 1) {
+ std::swap(views[firstNurseryView], views.back());
+ }
+ firstNurseryView++;
+ }
+
+ check();
+
+ return true;
+}
+
+bool InnerViewTable::Views::sweepAfterMinorGC(JSTracer* trc) {
+ return traceWeak(trc, firstNurseryView);
+}
+
+bool InnerViewTable::Views::traceWeak(JSTracer* trc, size_t startIndex) {
+ // Use |trc| to trace the view vector from |startIndex| to the end, removing
+ // dead views and updating |firstNurseryView|.
+
+ size_t index = startIndex;
+ bool sawNurseryView = false;
+ views.mutableEraseIf(
+ [&](auto& view) {
+ if (!JS::GCPolicy<ViewVector::ElementType>::traceWeak(trc, &view)) {
+ return true;
+ }
+
+ if (!sawNurseryView && gc::IsInsideNursery(view)) {
+ sawNurseryView = true;
+ firstNurseryView = index;
+ }
+
+ index++;
+ return false;
+ },
+ startIndex);
+
+ if (!sawNurseryView) {
+ firstNurseryView = views.length();
+ }
+
+ check();
+
+ return !views.empty();
+}
+
+inline void InnerViewTable::Views::check() {
+#ifdef DEBUG
+ MOZ_ASSERT(firstNurseryView <= views.length());
+ if (views.length() < 100) {
+ for (size_t i = 0; i < views.length(); i++) {
+ MOZ_ASSERT(gc::IsInsideNursery(views[i]) == (i >= firstNurseryView));
+ }
+ }
+#endif
+}
+
+bool InnerViewTable::addView(JSContext* cx, ArrayBufferObject* buffer,
+ ArrayBufferViewObject* view) {
+ // ArrayBufferObject entries are only added when there are multiple views.
+ MOZ_ASSERT(buffer->firstView());
+ MOZ_ASSERT(!gc::IsInsideNursery(buffer));
+
+ // Ensure the buffer is present in the map, getting the list of views.
+ auto ptr = map.lookupForAdd(buffer);
+ if (!ptr && !map.add(ptr, buffer, Views(cx->zone()))) {
+ ReportOutOfMemory(cx);
+ return false;
+ }
+ Views& views = ptr->value();
+
+ bool isNurseryView = gc::IsInsideNursery(view);
+ bool hadNurseryViews = views.hasNurseryViews();
+ if (!views.addView(view)) {
+ ReportOutOfMemory(cx);
+ return false;
+ }
+
+ // If we added the first nursery view, add the buffer to the list of buffers
+ // which have nursery views.
+ if (isNurseryView && !hadNurseryViews && nurseryKeysValid) {
+#ifdef DEBUG
+ if (nurseryKeys.length() < 100) {
+ for (auto* key : nurseryKeys) {
+ MOZ_ASSERT(key != buffer);
+ }
+ }
+#endif
+ if (!nurseryKeys.append(buffer)) {
+ nurseryKeysValid = false;
+ }
+ }
+
+ return true;
+}
+
+InnerViewTable::ViewVector* InnerViewTable::maybeViewsUnbarriered(
+ ArrayBufferObject* buffer) {
+ auto ptr = map.lookup(buffer);
+ if (ptr) {
+ return &ptr->value().views;
+ }
+ return nullptr;
+}
+
+void InnerViewTable::removeViews(ArrayBufferObject* buffer) {
+ auto ptr = map.lookup(buffer);
+ MOZ_ASSERT(ptr);
+
+ map.remove(ptr);
+}
+
+bool InnerViewTable::traceWeak(JSTracer* trc) { return map.traceWeak(trc); }
+
+void InnerViewTable::sweepAfterMinorGC(JSTracer* trc) {
+ MOZ_ASSERT(needsSweepAfterMinorGC());
+
+ if (nurseryKeysValid) {
+ for (size_t i = 0; i < nurseryKeys.length(); i++) {
+ ArrayBufferObject* buffer = nurseryKeys[i];
+ MOZ_ASSERT(!gc::IsInsideNursery(buffer));
+ auto ptr = map.lookup(buffer);
+ if (ptr && !ptr->value().sweepAfterMinorGC(trc)) {
+ map.remove(ptr);
+ }
+ }
+ } else {
+ for (ArrayBufferViewMap::Enum e(map); !e.empty(); e.popFront()) {
+ MOZ_ASSERT(!gc::IsInsideNursery(e.front().key()));
+ if (!e.front().value().sweepAfterMinorGC(trc)) {
+ e.removeFront();
+ }
+ }
+ }
+
+ nurseryKeys.clear();
+ nurseryKeysValid = true;
+}
+
+size_t InnerViewTable::sizeOfExcludingThis(mozilla::MallocSizeOf mallocSizeOf) {
+ size_t vectorSize = 0;
+ for (auto r = map.all(); !r.empty(); r.popFront()) {
+ vectorSize += r.front().value().views.sizeOfExcludingThis(mallocSizeOf);
+ }
+
+ return vectorSize + map.shallowSizeOfExcludingThis(mallocSizeOf) +
+ nurseryKeys.sizeOfExcludingThis(mallocSizeOf);
+}
+
+template <>
+bool JSObject::is<js::ArrayBufferObjectMaybeShared>() const {
+ return is<ArrayBufferObject>() || is<SharedArrayBufferObject>();
+}
+
+JS_PUBLIC_API size_t JS::GetArrayBufferByteLength(JSObject* obj) {
+ ArrayBufferObject* aobj = obj->maybeUnwrapAs<ArrayBufferObject>();
+ return aobj ? aobj->byteLength() : 0;
+}
+
+JS_PUBLIC_API uint8_t* JS::GetArrayBufferData(JSObject* obj,
+ bool* isSharedMemory,
+ const JS::AutoRequireNoGC&) {
+ ArrayBufferObject* aobj = obj->maybeUnwrapIf<ArrayBufferObject>();
+ if (!aobj) {
+ return nullptr;
+ }
+ *isSharedMemory = false;
+ return aobj->dataPointer();
+}
+
+static ArrayBufferObject* UnwrapOrReportArrayBuffer(
+ JSContext* cx, JS::Handle<JSObject*> maybeArrayBuffer) {
+ JSObject* obj = CheckedUnwrapStatic(maybeArrayBuffer);
+ if (!obj) {
+ ReportAccessDenied(cx);
+ return nullptr;
+ }
+
+ if (!obj->is<ArrayBufferObject>()) {
+ JS_ReportErrorNumberASCII(cx, GetErrorMessage, nullptr,
+ JSMSG_ARRAYBUFFER_REQUIRED);
+ return nullptr;
+ }
+
+ return &obj->as<ArrayBufferObject>();
+}
+
+JS_PUBLIC_API bool JS::DetachArrayBuffer(JSContext* cx, HandleObject obj) {
+ AssertHeapIsIdle();
+ CHECK_THREAD(cx);
+ cx->check(obj);
+
+ Rooted<ArrayBufferObject*> unwrappedBuffer(
+ cx, UnwrapOrReportArrayBuffer(cx, obj));
+ if (!unwrappedBuffer) {
+ return false;
+ }
+
+ if (unwrappedBuffer->hasDefinedDetachKey()) {
+ JS_ReportErrorNumberASCII(cx, GetErrorMessage, nullptr,
+ JSMSG_WASM_NO_TRANSFER);
+ return false;
+ }
+ if (unwrappedBuffer->isLengthPinned()) {
+ JS_ReportErrorNumberASCII(cx, GetErrorMessage, nullptr,
+ JSMSG_ARRAYBUFFER_LENGTH_PINNED);
+ return false;
+ }
+
+ AutoRealm ar(cx, unwrappedBuffer);
+ ArrayBufferObject::detach(cx, unwrappedBuffer);
+ return true;
+}
+
+JS_PUBLIC_API bool JS::HasDefinedArrayBufferDetachKey(JSContext* cx,
+ HandleObject obj,
+ bool* isDefined) {
+ Rooted<ArrayBufferObject*> unwrappedBuffer(
+ cx, UnwrapOrReportArrayBuffer(cx, obj));
+ if (!unwrappedBuffer) {
+ return false;
+ }
+
+ *isDefined = unwrappedBuffer->hasDefinedDetachKey();
+ return true;
+}
+
+JS_PUBLIC_API bool JS::IsDetachedArrayBufferObject(JSObject* obj) {
+ ArrayBufferObject* aobj = obj->maybeUnwrapIf<ArrayBufferObject>();
+ if (!aobj) {
+ return false;
+ }
+
+ return aobj->isDetached();
+}
+
+JS_PUBLIC_API JSObject* JS::NewArrayBuffer(JSContext* cx, size_t nbytes) {
+ AssertHeapIsIdle();
+ CHECK_THREAD(cx);
+
+ return ArrayBufferObject::createZeroed(cx, nbytes);
+}
+
+JS_PUBLIC_API JSObject* JS::NewArrayBufferWithContents(
+ JSContext* cx, size_t nbytes,
+ mozilla::UniquePtr<void, JS::FreePolicy> contents) {
+ auto* result = NewArrayBufferWithContents(
+ cx, nbytes, contents.get(),
+ JS::NewArrayBufferOutOfMemory::CallerMustFreeMemory);
+ if (result) {
+ // If and only if an ArrayBuffer is successfully created, ownership of
+ // |contents| is transferred to the new ArrayBuffer.
+ (void)contents.release();
+ }
+ return result;
+}
+
+JS_PUBLIC_API JSObject* JS::NewArrayBufferWithContents(
+ JSContext* cx, size_t nbytes, void* data, NewArrayBufferOutOfMemory) {
+ AssertHeapIsIdle();
+ CHECK_THREAD(cx);
+ MOZ_ASSERT_IF(!data, nbytes == 0);
+
+ if (!data) {
+ // Don't pass nulled contents to |createForContents|.
+ return ArrayBufferObject::createZeroed(cx, 0);
+ }
+
+ using BufferContents = ArrayBufferObject::BufferContents;
+
+ BufferContents contents = BufferContents::createMallocedUnknownArena(data);
+ return ArrayBufferObject::createForContents(cx, nbytes, contents);
+}
+
+JS_PUBLIC_API JSObject* JS::CopyArrayBuffer(JSContext* cx,
+ Handle<JSObject*> arrayBuffer) {
+ AssertHeapIsIdle();
+ CHECK_THREAD(cx);
+
+ MOZ_ASSERT(arrayBuffer != nullptr);
+
+ Rooted<ArrayBufferObject*> unwrappedSource(
+ cx, UnwrapOrReportArrayBuffer(cx, arrayBuffer));
+ if (!unwrappedSource) {
+ return nullptr;
+ }
+
+ if (unwrappedSource->isDetached()) {
+ JS_ReportErrorNumberASCII(cx, GetErrorMessage, nullptr,
+ JSMSG_TYPED_ARRAY_DETACHED);
+ return nullptr;
+ }
+
+ return ArrayBufferObject::copy(cx, unwrappedSource->byteLength(),
+ unwrappedSource);
+}
+
+JS_PUBLIC_API JSObject* JS::NewExternalArrayBuffer(
+ JSContext* cx, size_t nbytes,
+ mozilla::UniquePtr<void, JS::BufferContentsDeleter> contents) {
+ AssertHeapIsIdle();
+ CHECK_THREAD(cx);
+
+ MOZ_ASSERT(contents);
+
+ using BufferContents = ArrayBufferObject::BufferContents;
+
+ BufferContents bufferContents = BufferContents::createExternal(
+ contents.get(), contents.get_deleter().freeFunc(),
+ contents.get_deleter().userData());
+ auto* result =
+ ArrayBufferObject::createForContents(cx, nbytes, bufferContents);
+ if (result) {
+ // If and only if an ArrayBuffer is successfully created, ownership of
+ // |contents| is transferred to the new ArrayBuffer.
+ (void)contents.release();
+ }
+ return result;
+}
+
+JS_PUBLIC_API JSObject* JS::NewArrayBufferWithUserOwnedContents(JSContext* cx,
+ size_t nbytes,
+ void* data) {
+ AssertHeapIsIdle();
+ CHECK_THREAD(cx);
+
+ MOZ_ASSERT(data);
+
+ using BufferContents = ArrayBufferObject::BufferContents;
+
+ BufferContents contents = BufferContents::createUserOwned(data);
+ return ArrayBufferObject::createForContents(cx, nbytes, contents);
+}
+
+JS_PUBLIC_API bool JS::IsArrayBufferObject(JSObject* obj) {
+ return obj->canUnwrapAs<ArrayBufferObject>();
+}
+
+JS_PUBLIC_API bool JS::ArrayBufferHasData(JSObject* obj) {
+ return !obj->unwrapAs<ArrayBufferObject>().isDetached();
+}
+
+JS_PUBLIC_API JSObject* JS::UnwrapArrayBuffer(JSObject* obj) {
+ return obj->maybeUnwrapIf<ArrayBufferObject>();
+}
+
+JS_PUBLIC_API JSObject* JS::UnwrapSharedArrayBuffer(JSObject* obj) {
+ return obj->maybeUnwrapIf<SharedArrayBufferObject>();
+}
+
+JS_PUBLIC_API void* JS::StealArrayBufferContents(JSContext* cx,
+ HandleObject obj) {
+ AssertHeapIsIdle();
+ CHECK_THREAD(cx);
+ cx->check(obj);
+
+ Rooted<ArrayBufferObject*> unwrappedBuffer(
+ cx, UnwrapOrReportArrayBuffer(cx, obj));
+ if (!unwrappedBuffer) {
+ return nullptr;
+ }
+
+ if (unwrappedBuffer->isDetached()) {
+ JS_ReportErrorNumberASCII(cx, GetErrorMessage, nullptr,
+ JSMSG_TYPED_ARRAY_DETACHED);
+ return nullptr;
+ }
+ if (unwrappedBuffer->isLengthPinned()) {
+ JS_ReportErrorNumberASCII(cx, GetErrorMessage, nullptr,
+ JSMSG_ARRAYBUFFER_LENGTH_PINNED);
+ return nullptr;
+ }
+
+ if (unwrappedBuffer->hasDefinedDetachKey()) {
+ JS_ReportErrorNumberASCII(cx, GetErrorMessage, nullptr,
+ JSMSG_WASM_NO_TRANSFER);
+ return nullptr;
+ }
+
+ AutoRealm ar(cx, unwrappedBuffer);
+ return ArrayBufferObject::stealMallocedContents(cx, unwrappedBuffer);
+}
+
+JS_PUBLIC_API JSObject* JS::NewMappedArrayBufferWithContents(JSContext* cx,
+ size_t nbytes,
+ void* data) {
+ AssertHeapIsIdle();
+ CHECK_THREAD(cx);
+
+ MOZ_ASSERT(data);
+
+ using BufferContents = ArrayBufferObject::BufferContents;
+
+ BufferContents contents = BufferContents::createMapped(data);
+ return ArrayBufferObject::createForContents(cx, nbytes, contents);
+}
+
+JS_PUBLIC_API void* JS::CreateMappedArrayBufferContents(int fd, size_t offset,
+ size_t length) {
+ return ArrayBufferObject::createMappedContents(fd, offset, length).data();
+}
+
+JS_PUBLIC_API void JS::ReleaseMappedArrayBufferContents(void* contents,
+ size_t length) {
+ gc::DeallocateMappedContent(contents, length);
+}
+
+JS_PUBLIC_API bool JS::IsMappedArrayBufferObject(JSObject* obj) {
+ ArrayBufferObject* aobj = obj->maybeUnwrapIf<ArrayBufferObject>();
+ if (!aobj) {
+ return false;
+ }
+
+ return aobj->isMapped();
+}
+
+JS_PUBLIC_API JSObject* JS::GetObjectAsArrayBuffer(JSObject* obj,
+ size_t* length,
+ uint8_t** data) {
+ ArrayBufferObject* aobj = obj->maybeUnwrapIf<ArrayBufferObject>();
+ if (!aobj) {
+ return nullptr;
+ }
+
+ *length = aobj->byteLength();
+ *data = aobj->dataPointer();
+
+ return aobj;
+}
+
+JS_PUBLIC_API void JS::GetArrayBufferLengthAndData(JSObject* obj,
+ size_t* length,
+ bool* isSharedMemory,
+ uint8_t** data) {
+ auto& aobj = obj->as<ArrayBufferObject>();
+ *length = aobj.byteLength();
+ *data = aobj.dataPointer();
+ *isSharedMemory = false;
+}
+
+const JSClass* const JS::ArrayBuffer::FixedLengthUnsharedClass =
+ &FixedLengthArrayBufferObject::class_;
+const JSClass* const JS::ArrayBuffer::ResizableUnsharedClass =
+ &ResizableArrayBufferObject::class_;
+const JSClass* const JS::ArrayBuffer::FixedLengthSharedClass =
+ &FixedLengthSharedArrayBufferObject::class_;
+const JSClass* const JS::ArrayBuffer::GrowableSharedClass =
+ &GrowableSharedArrayBufferObject::class_;
+
+/* static */ JS::ArrayBuffer JS::ArrayBuffer::create(JSContext* cx,
+ size_t nbytes) {
+ AssertHeapIsIdle();
+ CHECK_THREAD(cx);
+ return JS::ArrayBuffer(ArrayBufferObject::createZeroed(cx, nbytes));
+}
+
+mozilla::Span<uint8_t> JS::ArrayBuffer::getData(
+ bool* isSharedMemory, const JS::AutoRequireNoGC& nogc) {
+ auto* buffer = obj->maybeUnwrapAs<ArrayBufferObjectMaybeShared>();
+ if (!buffer) {
+ return nullptr;
+ }
+ size_t length = buffer->byteLength();
+ if (buffer->is<SharedArrayBufferObject>()) {
+ *isSharedMemory = true;
+ return {buffer->dataPointerEither().unwrap(), length};
+ }
+ *isSharedMemory = false;
+ return {buffer->as<ArrayBufferObject>().dataPointer(), length};
+};
+
+JS::ArrayBuffer JS::ArrayBuffer::unwrap(JSObject* maybeWrapped) {
+ if (!maybeWrapped) {
+ return JS::ArrayBuffer(nullptr);
+ }
+ auto* ab = maybeWrapped->maybeUnwrapIf<ArrayBufferObjectMaybeShared>();
+ return fromObject(ab);
+}
+
+bool JS::ArrayBufferCopyData(JSContext* cx, Handle<JSObject*> toBlock,
+ size_t toIndex, Handle<JSObject*> fromBlock,
+ size_t fromIndex, size_t count) {
+ Rooted<ArrayBufferObjectMaybeShared*> unwrappedToBlock(
+ cx, toBlock->maybeUnwrapIf<ArrayBufferObjectMaybeShared>());
+ if (!unwrappedToBlock) {
+ ReportAccessDenied(cx);
+ return false;
+ }
+
+ Rooted<ArrayBufferObjectMaybeShared*> unwrappedFromBlock(
+ cx, fromBlock->maybeUnwrapIf<ArrayBufferObjectMaybeShared>());
+ if (!unwrappedFromBlock) {
+ ReportAccessDenied(cx);
+ return false;
+ }
+
+ // Verify that lengths still make sense and throw otherwise.
+ if (toIndex + count < toIndex || // size_t overflow
+ fromIndex + count < fromIndex || // size_t overflow
+ toIndex + count > unwrappedToBlock->byteLength() ||
+ fromIndex + count > unwrappedFromBlock->byteLength()) {
+ JS_ReportErrorNumberASCII(cx, GetErrorMessage, nullptr,
+ JSMSG_ARRAYBUFFER_COPY_RANGE);
+ return false;
+ }
+
+ // If both are array buffers, can use ArrayBufferCopyData
+ if (unwrappedToBlock->is<ArrayBufferObject>() &&
+ unwrappedFromBlock->is<ArrayBufferObject>()) {
+ Rooted<ArrayBufferObject*> toArray(
+ cx, &unwrappedToBlock->as<ArrayBufferObject>());
+ Rooted<ArrayBufferObject*> fromArray(
+ cx, &unwrappedFromBlock->as<ArrayBufferObject>());
+ ArrayBufferObject::copyData(toArray, toIndex, fromArray, fromIndex, count);
+ return true;
+ }
+
+ Rooted<ArrayBufferObjectMaybeShared*> toArray(
+ cx, &unwrappedToBlock->as<ArrayBufferObjectMaybeShared>());
+ Rooted<ArrayBufferObjectMaybeShared*> fromArray(
+ cx, &unwrappedFromBlock->as<ArrayBufferObjectMaybeShared>());
+ SharedArrayBufferObject::copyData(toArray, toIndex, fromArray, fromIndex,
+ count);
+
+ return true;
+}
+
+// https://tc39.es/ecma262/#sec-clonearraybuffer
+// We only support the case where cloneConstructor is %ArrayBuffer%. Note,
+// this means that cloning a SharedArrayBuffer will produce an ArrayBuffer
+JSObject* JS::ArrayBufferClone(JSContext* cx, Handle<JSObject*> srcBuffer,
+ size_t srcByteOffset, size_t srcLength) {
+ MOZ_ASSERT(srcBuffer->is<ArrayBufferObjectMaybeShared>());
+
+ // 2. (reordered) If IsDetachedBuffer(srcBuffer) is true, throw a TypeError
+ // exception.
+ if (IsDetachedArrayBufferObject(srcBuffer)) {
+ JS_ReportErrorNumberASCII(cx, GetErrorMessage, nullptr,
+ JSMSG_TYPED_ARRAY_DETACHED);
+ return nullptr;
+ }
+
+ // 1. Let targetBuffer be ? AllocateArrayBuffer(cloneConstructor, srcLength).
+ JS::RootedObject targetBuffer(cx, JS::NewArrayBuffer(cx, srcLength));
+ if (!targetBuffer) {
+ return nullptr;
+ }
+
+ // 3. Let srcBlock be srcBuffer.[[ArrayBufferData]].
+ // 4. Let targetBlock be targetBuffer.[[ArrayBufferData]].
+ // 5. Perform CopyDataBlockBytes(targetBlock, 0, srcBlock, srcByteOffset,
+ // srcLength).
+ if (!ArrayBufferCopyData(cx, targetBuffer, 0, srcBuffer, srcByteOffset,
+ srcLength)) {
+ return nullptr;
+ }
+
+ // 6. Return targetBuffer.
+ return targetBuffer;
+}