1 | /* |
2 | * Copyright (C) 2013-2015 Apple Inc. All rights reserved. |
3 | * Copyright (C) 2011 Google Inc. All rights reserved. |
4 | * |
5 | * Redistribution and use in source and binary forms, with or without |
6 | * modification, are permitted provided that the following conditions are |
7 | * met: |
8 | * |
9 | * * Redistributions of source code must retain the above copyright |
10 | * notice, this list of conditions and the following disclaimer. |
11 | * * Redistributions in binary form must reproduce the above |
12 | * copyright notice, this list of conditions and the following disclaimer |
13 | * in the documentation and/or other materials provided with the |
14 | * distribution. |
15 | * * Neither the name of Google Inc. nor the names of its |
16 | * contributors may be used to endorse or promote products derived from |
17 | * this software without specific prior written permission. |
18 | * |
19 | * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
20 | * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
21 | * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR |
22 | * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT |
23 | * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, |
24 | * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT |
25 | * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
26 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
27 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
28 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE |
29 | * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
30 | */ |
31 | |
32 | #include "config.h" |
33 | #include "InspectorRuntimeAgent.h" |
34 | |
35 | #include "Completion.h" |
36 | #include "DFGWorklist.h" |
37 | #include "HeapIterationScope.h" |
38 | #include "InjectedScript.h" |
39 | #include "InjectedScriptManager.h" |
40 | #include "InspectorFrontendRouter.h" |
41 | #include "JSLock.h" |
42 | #include "ParserError.h" |
43 | #include "ScriptDebugServer.h" |
44 | #include "SourceCode.h" |
45 | #include "TypeProfiler.h" |
46 | #include "TypeProfilerLog.h" |
47 | #include <wtf/JSONValues.h> |
48 | |
49 | namespace Inspector { |
50 | |
51 | using namespace JSC; |
52 | |
53 | static bool asBool(const bool* b) |
54 | { |
55 | return b && *b; |
56 | } |
57 | |
58 | InspectorRuntimeAgent::InspectorRuntimeAgent(AgentContext& context) |
59 | : InspectorAgentBase("Runtime"_s ) |
60 | , m_injectedScriptManager(context.injectedScriptManager) |
61 | , m_scriptDebugServer(context.environment.scriptDebugServer()) |
62 | , m_vm(context.environment.vm()) |
63 | { |
64 | } |
65 | |
66 | InspectorRuntimeAgent::~InspectorRuntimeAgent() |
67 | { |
68 | } |
69 | |
70 | static ScriptDebugServer::PauseOnExceptionsState setPauseOnExceptionsState(ScriptDebugServer& scriptDebugServer, ScriptDebugServer::PauseOnExceptionsState newState) |
71 | { |
72 | auto presentState = scriptDebugServer.pauseOnExceptionsState(); |
73 | if (presentState != newState) |
74 | scriptDebugServer.setPauseOnExceptionsState(newState); |
75 | return presentState; |
76 | } |
77 | |
78 | static Ref<Protocol::Runtime::ErrorRange> buildErrorRangeObject(const JSTokenLocation& tokenLocation) |
79 | { |
80 | return Protocol::Runtime::ErrorRange::create() |
81 | .setStartOffset(tokenLocation.startOffset) |
82 | .setEndOffset(tokenLocation.endOffset) |
83 | .release(); |
84 | } |
85 | |
86 | void InspectorRuntimeAgent::parse(ErrorString&, const String& expression, Protocol::Runtime::SyntaxErrorType* result, Optional<String>& message, RefPtr<Protocol::Runtime::ErrorRange>& range) |
87 | { |
88 | JSLockHolder lock(m_vm); |
89 | |
90 | ParserError error; |
91 | checkSyntax(m_vm, JSC::makeSource(expression, { }), error); |
92 | |
93 | switch (error.syntaxErrorType()) { |
94 | case ParserError::SyntaxErrorNone: |
95 | *result = Protocol::Runtime::SyntaxErrorType::None; |
96 | break; |
97 | case ParserError::SyntaxErrorIrrecoverable: |
98 | *result = Protocol::Runtime::SyntaxErrorType::Irrecoverable; |
99 | break; |
100 | case ParserError::SyntaxErrorUnterminatedLiteral: |
101 | *result = Protocol::Runtime::SyntaxErrorType::UnterminatedLiteral; |
102 | break; |
103 | case ParserError::SyntaxErrorRecoverable: |
104 | *result = Protocol::Runtime::SyntaxErrorType::Recoverable; |
105 | break; |
106 | } |
107 | |
108 | if (error.syntaxErrorType() != ParserError::SyntaxErrorNone) { |
109 | message = error.message(); |
110 | range = buildErrorRangeObject(error.token().m_location); |
111 | } |
112 | } |
113 | |
114 | void InspectorRuntimeAgent::evaluate(ErrorString& errorString, const String& expression, const String* objectGroup, const bool* includeCommandLineAPI, const bool* doNotPauseOnExceptionsAndMuteConsole, const int* executionContextId, const bool* returnByValue, const bool* generatePreview, const bool* saveResult, const bool* /* emulateUserGesture */, RefPtr<Protocol::Runtime::RemoteObject>& result, Optional<bool>& wasThrown, Optional<int>& savedResultIndex) |
115 | { |
116 | InjectedScript injectedScript = injectedScriptForEval(errorString, executionContextId); |
117 | if (injectedScript.hasNoValue()) |
118 | return; |
119 | |
120 | ScriptDebugServer::PauseOnExceptionsState previousPauseOnExceptionsState = ScriptDebugServer::DontPauseOnExceptions; |
121 | if (asBool(doNotPauseOnExceptionsAndMuteConsole)) |
122 | previousPauseOnExceptionsState = setPauseOnExceptionsState(m_scriptDebugServer, ScriptDebugServer::DontPauseOnExceptions); |
123 | if (asBool(doNotPauseOnExceptionsAndMuteConsole)) |
124 | muteConsole(); |
125 | |
126 | injectedScript.evaluate(errorString, expression, objectGroup ? *objectGroup : String(), asBool(includeCommandLineAPI), asBool(returnByValue), asBool(generatePreview), asBool(saveResult), result, wasThrown, savedResultIndex); |
127 | |
128 | if (asBool(doNotPauseOnExceptionsAndMuteConsole)) { |
129 | unmuteConsole(); |
130 | setPauseOnExceptionsState(m_scriptDebugServer, previousPauseOnExceptionsState); |
131 | } |
132 | } |
133 | |
134 | void InspectorRuntimeAgent::awaitPromise(const String& promiseObjectId, const bool* returnByValue, const bool* generatePreview, const bool* saveResult, Ref<AwaitPromiseCallback>&& callback) |
135 | { |
136 | InjectedScript injectedScript = m_injectedScriptManager.injectedScriptForObjectId(promiseObjectId); |
137 | if (injectedScript.hasNoValue()) { |
138 | callback->sendFailure("Could not find InjectedScript for promiseObjectId"_s ); |
139 | return; |
140 | } |
141 | |
142 | injectedScript.awaitPromise(promiseObjectId, asBool(returnByValue), asBool(generatePreview), asBool(saveResult), [callback = WTFMove(callback)] (ErrorString& errorString, RefPtr<Protocol::Runtime::RemoteObject>&& result, Optional<bool>& wasThrown, Optional<int>& savedResultIndex) { |
143 | if (!errorString.isEmpty()) |
144 | callback->sendFailure(errorString); |
145 | else |
146 | callback->sendSuccess(WTFMove(result), wasThrown, savedResultIndex); |
147 | }); |
148 | } |
149 | |
150 | void InspectorRuntimeAgent::callFunctionOn(ErrorString& errorString, const String& objectId, const String& expression, const JSON::Array* optionalArguments, const bool* doNotPauseOnExceptionsAndMuteConsole, const bool* returnByValue, const bool* generatePreview, RefPtr<Protocol::Runtime::RemoteObject>& result, Optional<bool>& wasThrown) |
151 | { |
152 | InjectedScript injectedScript = m_injectedScriptManager.injectedScriptForObjectId(objectId); |
153 | if (injectedScript.hasNoValue()) { |
154 | errorString = "Could not find InjectedScript for objectId"_s ; |
155 | return; |
156 | } |
157 | |
158 | String arguments; |
159 | if (optionalArguments) |
160 | arguments = optionalArguments->toJSONString(); |
161 | |
162 | ScriptDebugServer::PauseOnExceptionsState previousPauseOnExceptionsState = ScriptDebugServer::DontPauseOnExceptions; |
163 | if (asBool(doNotPauseOnExceptionsAndMuteConsole)) |
164 | previousPauseOnExceptionsState = setPauseOnExceptionsState(m_scriptDebugServer, ScriptDebugServer::DontPauseOnExceptions); |
165 | if (asBool(doNotPauseOnExceptionsAndMuteConsole)) |
166 | muteConsole(); |
167 | |
168 | injectedScript.callFunctionOn(errorString, objectId, expression, arguments, asBool(returnByValue), asBool(generatePreview), result, wasThrown); |
169 | |
170 | if (asBool(doNotPauseOnExceptionsAndMuteConsole)) { |
171 | unmuteConsole(); |
172 | setPauseOnExceptionsState(m_scriptDebugServer, previousPauseOnExceptionsState); |
173 | } |
174 | } |
175 | |
176 | void InspectorRuntimeAgent::getPreview(ErrorString& errorString, const String& objectId, RefPtr<Protocol::Runtime::ObjectPreview>& preview) |
177 | { |
178 | InjectedScript injectedScript = m_injectedScriptManager.injectedScriptForObjectId(objectId); |
179 | if (injectedScript.hasNoValue()) { |
180 | errorString = "Could not find InjectedScript for objectId"_s ; |
181 | return; |
182 | } |
183 | |
184 | ScriptDebugServer::PauseOnExceptionsState previousPauseOnExceptionsState = setPauseOnExceptionsState(m_scriptDebugServer, ScriptDebugServer::DontPauseOnExceptions); |
185 | muteConsole(); |
186 | |
187 | injectedScript.getPreview(errorString, objectId, preview); |
188 | |
189 | unmuteConsole(); |
190 | setPauseOnExceptionsState(m_scriptDebugServer, previousPauseOnExceptionsState); |
191 | } |
192 | |
193 | void InspectorRuntimeAgent::getProperties(ErrorString& errorString, const String& objectId, const bool* ownProperties, const bool* generatePreview, RefPtr<JSON::ArrayOf<Protocol::Runtime::PropertyDescriptor>>& result, RefPtr<JSON::ArrayOf<Protocol::Runtime::InternalPropertyDescriptor>>& internalProperties) |
194 | { |
195 | InjectedScript injectedScript = m_injectedScriptManager.injectedScriptForObjectId(objectId); |
196 | if (injectedScript.hasNoValue()) { |
197 | errorString = "Could not find InjectedScript for objectId"_s ; |
198 | return; |
199 | } |
200 | |
201 | ScriptDebugServer::PauseOnExceptionsState previousPauseOnExceptionsState = setPauseOnExceptionsState(m_scriptDebugServer, ScriptDebugServer::DontPauseOnExceptions); |
202 | muteConsole(); |
203 | |
204 | injectedScript.getProperties(errorString, objectId, asBool(ownProperties), asBool(generatePreview), result); |
205 | injectedScript.getInternalProperties(errorString, objectId, asBool(generatePreview), internalProperties); |
206 | |
207 | unmuteConsole(); |
208 | setPauseOnExceptionsState(m_scriptDebugServer, previousPauseOnExceptionsState); |
209 | } |
210 | |
211 | void InspectorRuntimeAgent::getDisplayableProperties(ErrorString& errorString, const String& objectId, const bool* generatePreview, RefPtr<JSON::ArrayOf<Protocol::Runtime::PropertyDescriptor>>& result, RefPtr<JSON::ArrayOf<Protocol::Runtime::InternalPropertyDescriptor>>& internalProperties) |
212 | { |
213 | InjectedScript injectedScript = m_injectedScriptManager.injectedScriptForObjectId(objectId); |
214 | if (injectedScript.hasNoValue()) { |
215 | errorString = "Could not find InjectedScript for objectId"_s ; |
216 | return; |
217 | } |
218 | |
219 | ScriptDebugServer::PauseOnExceptionsState previousPauseOnExceptionsState = setPauseOnExceptionsState(m_scriptDebugServer, ScriptDebugServer::DontPauseOnExceptions); |
220 | muteConsole(); |
221 | |
222 | injectedScript.getDisplayableProperties(errorString, objectId, asBool(generatePreview), result); |
223 | injectedScript.getInternalProperties(errorString, objectId, asBool(generatePreview), internalProperties); |
224 | |
225 | unmuteConsole(); |
226 | setPauseOnExceptionsState(m_scriptDebugServer, previousPauseOnExceptionsState); |
227 | } |
228 | |
229 | void InspectorRuntimeAgent::getCollectionEntries(ErrorString& errorString, const String& objectId, const String* objectGroup, const int* startIndex, const int* numberToFetch, RefPtr<JSON::ArrayOf<Protocol::Runtime::CollectionEntry>>& entries) |
230 | { |
231 | InjectedScript injectedScript = m_injectedScriptManager.injectedScriptForObjectId(objectId); |
232 | if (injectedScript.hasNoValue()) { |
233 | errorString = "Could not find InjectedScript for objectId"_s ; |
234 | return; |
235 | } |
236 | |
237 | int start = startIndex && *startIndex >= 0 ? *startIndex : 0; |
238 | int fetch = numberToFetch && *numberToFetch >= 0 ? *numberToFetch : 0; |
239 | |
240 | injectedScript.getCollectionEntries(errorString, objectId, objectGroup ? *objectGroup : String(), start, fetch, entries); |
241 | } |
242 | |
243 | void InspectorRuntimeAgent::saveResult(ErrorString& errorString, const JSON::Object& callArgument, const int* executionContextId, Optional<int>& savedResultIndex) |
244 | { |
245 | InjectedScript injectedScript; |
246 | |
247 | String objectId; |
248 | if (callArgument.getString("objectId"_s , objectId)) { |
249 | injectedScript = m_injectedScriptManager.injectedScriptForObjectId(objectId); |
250 | if (injectedScript.hasNoValue()) { |
251 | errorString = "Could not find InjectedScript for objectId"_s ; |
252 | return; |
253 | } |
254 | } else { |
255 | injectedScript = injectedScriptForEval(errorString, executionContextId); |
256 | if (injectedScript.hasNoValue()) |
257 | return; |
258 | } |
259 | |
260 | injectedScript.saveResult(errorString, callArgument.toJSONString(), savedResultIndex); |
261 | } |
262 | |
263 | void InspectorRuntimeAgent::releaseObject(ErrorString&, const String& objectId) |
264 | { |
265 | InjectedScript injectedScript = m_injectedScriptManager.injectedScriptForObjectId(objectId); |
266 | if (!injectedScript.hasNoValue()) |
267 | injectedScript.releaseObject(objectId); |
268 | } |
269 | |
270 | void InspectorRuntimeAgent::releaseObjectGroup(ErrorString&, const String& objectGroup) |
271 | { |
272 | m_injectedScriptManager.releaseObjectGroup(objectGroup); |
273 | } |
274 | |
275 | void InspectorRuntimeAgent::getRuntimeTypesForVariablesAtOffsets(ErrorString& errorString, const JSON::Array& locations, RefPtr<JSON::ArrayOf<Protocol::Runtime::TypeDescription>>& typeDescriptions) |
276 | { |
277 | static const bool verbose = false; |
278 | |
279 | typeDescriptions = JSON::ArrayOf<Protocol::Runtime::TypeDescription>::create(); |
280 | if (!m_vm.typeProfiler()) { |
281 | errorString = "The VM does not currently have Type Information."_s ; |
282 | return; |
283 | } |
284 | |
285 | MonotonicTime start = MonotonicTime::now(); |
286 | m_vm.typeProfilerLog()->processLogEntries(m_vm, "User Query"_s ); |
287 | |
288 | for (size_t i = 0; i < locations.length(); i++) { |
289 | RefPtr<JSON::Value> value = locations.get(i); |
290 | RefPtr<JSON::Object> location; |
291 | if (!value->asObject(location)) { |
292 | errorString = "Array of TypeLocation objects has an object that does not have type of TypeLocation."_s ; |
293 | return; |
294 | } |
295 | |
296 | int descriptor; |
297 | String sourceIDAsString; |
298 | int divot; |
299 | location->getInteger("typeInformationDescriptor"_s , descriptor); |
300 | location->getString("sourceID"_s , sourceIDAsString); |
301 | location->getInteger("divot"_s , divot); |
302 | |
303 | bool okay; |
304 | TypeLocation* typeLocation = m_vm.typeProfiler()->findLocation(divot, sourceIDAsString.toIntPtrStrict(&okay), static_cast<TypeProfilerSearchDescriptor>(descriptor), m_vm); |
305 | ASSERT(okay); |
306 | |
307 | RefPtr<TypeSet> typeSet; |
308 | if (typeLocation) { |
309 | if (typeLocation->m_globalTypeSet && typeLocation->m_globalVariableID != TypeProfilerNoGlobalIDExists) |
310 | typeSet = typeLocation->m_globalTypeSet; |
311 | else |
312 | typeSet = typeLocation->m_instructionTypeSet; |
313 | } |
314 | |
315 | bool isValid = typeLocation && typeSet && !typeSet->isEmpty(); |
316 | auto description = Protocol::Runtime::TypeDescription::create() |
317 | .setIsValid(isValid) |
318 | .release(); |
319 | |
320 | if (isValid) { |
321 | description->setLeastCommonAncestor(typeSet->leastCommonAncestor()); |
322 | description->setStructures(typeSet->allStructureRepresentations()); |
323 | description->setTypeSet(typeSet->inspectorTypeSet()); |
324 | description->setIsTruncated(typeSet->isOverflown()); |
325 | } |
326 | |
327 | typeDescriptions->addItem(WTFMove(description)); |
328 | } |
329 | |
330 | MonotonicTime end = MonotonicTime::now(); |
331 | if (verbose) |
332 | dataLogF("Inspector::getRuntimeTypesForVariablesAtOffsets took %lfms\n" , (end - start).milliseconds()); |
333 | } |
334 | |
335 | void InspectorRuntimeAgent::didCreateFrontendAndBackend(Inspector::FrontendRouter*, Inspector::BackendDispatcher*) |
336 | { |
337 | } |
338 | |
339 | void InspectorRuntimeAgent::willDestroyFrontendAndBackend(DisconnectReason reason) |
340 | { |
341 | if (reason != DisconnectReason::InspectedTargetDestroyed && m_isTypeProfilingEnabled) |
342 | setTypeProfilerEnabledState(false); |
343 | |
344 | String unused; |
345 | disable(unused); |
346 | } |
347 | |
348 | void InspectorRuntimeAgent::enableTypeProfiler(ErrorString&) |
349 | { |
350 | setTypeProfilerEnabledState(true); |
351 | } |
352 | |
353 | void InspectorRuntimeAgent::disableTypeProfiler(ErrorString&) |
354 | { |
355 | setTypeProfilerEnabledState(false); |
356 | } |
357 | |
358 | void InspectorRuntimeAgent::enableControlFlowProfiler(ErrorString&) |
359 | { |
360 | setControlFlowProfilerEnabledState(true); |
361 | } |
362 | |
363 | void InspectorRuntimeAgent::disableControlFlowProfiler(ErrorString&) |
364 | { |
365 | setControlFlowProfilerEnabledState(false); |
366 | } |
367 | |
368 | void InspectorRuntimeAgent::setTypeProfilerEnabledState(bool isTypeProfilingEnabled) |
369 | { |
370 | if (m_isTypeProfilingEnabled == isTypeProfilingEnabled) |
371 | return; |
372 | m_isTypeProfilingEnabled = isTypeProfilingEnabled; |
373 | |
374 | VM& vm = m_vm; |
375 | vm.whenIdle([&vm, isTypeProfilingEnabled] () { |
376 | bool shouldRecompileFromTypeProfiler = (isTypeProfilingEnabled ? vm.enableTypeProfiler() : vm.disableTypeProfiler()); |
377 | if (shouldRecompileFromTypeProfiler) |
378 | vm.deleteAllCode(PreventCollectionAndDeleteAllCode); |
379 | }); |
380 | } |
381 | |
382 | void InspectorRuntimeAgent::setControlFlowProfilerEnabledState(bool isControlFlowProfilingEnabled) |
383 | { |
384 | if (m_isControlFlowProfilingEnabled == isControlFlowProfilingEnabled) |
385 | return; |
386 | m_isControlFlowProfilingEnabled = isControlFlowProfilingEnabled; |
387 | |
388 | VM& vm = m_vm; |
389 | vm.whenIdle([&vm, isControlFlowProfilingEnabled] () { |
390 | bool shouldRecompileFromControlFlowProfiler = (isControlFlowProfilingEnabled ? vm.enableControlFlowProfiler() : vm.disableControlFlowProfiler()); |
391 | |
392 | if (shouldRecompileFromControlFlowProfiler) |
393 | vm.deleteAllCode(PreventCollectionAndDeleteAllCode); |
394 | }); |
395 | } |
396 | |
397 | void InspectorRuntimeAgent::getBasicBlocks(ErrorString& errorString, const String& sourceIDAsString, RefPtr<JSON::ArrayOf<Protocol::Runtime::BasicBlock>>& basicBlocks) |
398 | { |
399 | if (!m_vm.controlFlowProfiler()) { |
400 | errorString = "The VM does not currently have a Control Flow Profiler."_s ; |
401 | return; |
402 | } |
403 | |
404 | bool okay; |
405 | intptr_t sourceID = sourceIDAsString.toIntPtrStrict(&okay); |
406 | ASSERT(okay); |
407 | const Vector<BasicBlockRange>& basicBlockRanges = m_vm.controlFlowProfiler()->getBasicBlocksForSourceID(sourceID, m_vm); |
408 | basicBlocks = JSON::ArrayOf<Protocol::Runtime::BasicBlock>::create(); |
409 | for (const BasicBlockRange& block : basicBlockRanges) { |
410 | auto location = Protocol::Runtime::BasicBlock::create() |
411 | .setStartOffset(block.m_startOffset) |
412 | .setEndOffset(block.m_endOffset) |
413 | .setHasExecuted(block.m_hasExecuted) |
414 | .setExecutionCount(block.m_executionCount) |
415 | .release(); |
416 | basicBlocks->addItem(WTFMove(location)); |
417 | } |
418 | } |
419 | |
420 | } // namespace Inspector |
421 | |