Skip to content

Commit

Permalink
feat(jstz_engine): add support for rooting
Browse files Browse the repository at this point in the history
  • Loading branch information
johnyob committed Nov 27, 2024
1 parent f55488f commit 6146f87
Show file tree
Hide file tree
Showing 9 changed files with 411 additions and 37 deletions.
1 change: 1 addition & 0 deletions Cargo.lock

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

11 changes: 9 additions & 2 deletions Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ members = [
"crates/jstz_sdk",
"crates/jstz_wpt",
"crates/jstzd",
"crates/octez"
"crates/octez",
]

[workspace.package]
Expand Down Expand Up @@ -112,7 +112,14 @@ wasm-bindgen = "0.2.92"
[workspace.dependencies.tezos-smart-rollup]
version = "0.2.2"
default-features = false
features = ["std", "crypto", "panic-hook", "data-encoding", "storage", "proto-alpha"]
features = [
"std",
"crypto",
"panic-hook",
"data-encoding",
"storage",
"proto-alpha",
]

[workspace.dependencies.tezos-smart-rollup-host]
version = "0.2.2"
Expand Down
1 change: 1 addition & 0 deletions crates/jstz_engine/Cargo.toml
Original file line number Diff line number Diff line change
Expand Up @@ -13,4 +13,5 @@ description = "A memory-safe JavaScript engine API in Rust"
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html

[dependencies]
anyhow.workspace = true
mozjs.workspace = true
54 changes: 46 additions & 8 deletions crates/jstz_engine/src/context.rs
Original file line number Diff line number Diff line change
Expand Up @@ -21,15 +21,19 @@
//!
//! For more details, refer to the [ECMAScript Specification on Contexts](https://tc39.es/ecma262/#sec-global-environment-records).

use std::{marker::PhantomData, ptr::NonNull};
use std::{ffi::c_void, marker::PhantomData, pin::Pin, ptr::NonNull};

use mozjs::{
jsapi::{JSContext, JS},
jsapi::{JSContext, JS_AddExtraGCRootsTracer, JS_RemoveExtraGCRootsTracer, JS},
rust::Runtime,
};

use crate::{
compartment::{self, Compartment},
gc::{
root::{unsafe_ffi_trace_context_roots, Root, ShadowStack},
Trace,
},
realm::Realm,
AsRawPtr,
};
Expand All @@ -42,6 +46,7 @@ pub struct Context<S> {
// SAFETY: This is only `Some` if the state `S` is `Entered<'a, C, S>`.
// In this case, the old realm is guaranteed to be alive for at least as long as `'a`.
old_realm: Option<*mut JS::Realm>,
shadow_stack: Pin<Box<ShadowStack>>,
marker: PhantomData<S>,
}

Expand Down Expand Up @@ -72,6 +77,20 @@ impl<'a, C: Compartment, S> CanAccess for Entered<'a, C, S> {}
pub trait InCompartment<C: Compartment> {}
impl<'a, C: Compartment, S> InCompartment<C> for Entered<'a, C, S> {}

fn new_shadow_stack(raw_cx: NonNull<JSContext>) -> Pin<Box<ShadowStack>> {
// Initialize the GC roots for the context.
let shadow_stack = Box::pin(ShadowStack::new());
unsafe {
JS_AddExtraGCRootsTracer(
raw_cx.as_ptr(),
Some(unsafe_ffi_trace_context_roots),
&*shadow_stack as *const ShadowStack as *mut c_void,
);
}

shadow_stack
}

impl Context<Owned> {
pub fn from_runtime(rt: &Runtime) -> Self {
// SAFETY: `rt.cx()` cannot be `NULL`.
Expand All @@ -80,6 +99,7 @@ impl Context<Owned> {
Self {
raw_cx,
old_realm: None,
shadow_stack: new_shadow_stack(raw_cx),
marker: PhantomData,
}
}
Expand All @@ -89,7 +109,7 @@ impl<S> Context<S> {
/// Enter an existing realm
pub fn enter_realm<'a, 'b, C: Compartment>(
&'a mut self,
realm: Realm<'b, C>,
realm: &Realm<'b, C>,
) -> Context<Entered<'a, C, S>>
where
S: CanAlloc + CanAccess,
Expand All @@ -100,6 +120,7 @@ impl<S> Context<S> {
Context {
raw_cx: self.raw_cx,
old_realm: Some(old_realm),
shadow_stack: new_shadow_stack(self.raw_cx),
marker: PhantomData,
}
}
Expand All @@ -111,22 +132,39 @@ impl<S> Context<S> {
{
let realm = Realm::new(self)?;

// TODO(https://linear.app/tezos/issue/JSTZ-196):
// Remove this `unsafe` block once rooting is implemented.
//
// SAFETY: We transmute the lifetime of the realm. This is equivalent to rooting the realm.
// SAFETY:
// We transmute the lifetime of the realm. This is equivalent to rooting the realm.
// This safe because entering the realm immediately roots the realm.
//
// Unfortunately we cannot truly root the realm (using [`letroot!`]) since
// the lifetime of the realm is bound to the lifetime of [`self`]. This is
// a unique case where our approach to static rooting fails.
unsafe {
let rooted_realm: Realm<'_, compartment::Ref<'_>> =
std::mem::transmute(realm);

Some(self.enter_realm(rooted_realm))
Some(self.enter_realm(&rooted_realm))
}
}

/// Creates a new root
pub fn root<T: Trace>(&self) -> Root<T> {
Root::new(self.shadow_stack.as_ref())
}
}

impl<S> Drop for Context<S> {
fn drop(&mut self) {
// Unroot everything in the current realm
unsafe {
JS_RemoveExtraGCRootsTracer(
self.as_raw_ptr(),
Some(unsafe_ffi_trace_context_roots),
&*self.shadow_stack as *const ShadowStack as *mut c_void,
);
}

// Leave the current realm
if let Some(old_realm) = self.old_realm {
unsafe {
JS::LeaveRealm(self.as_raw_ptr(), old_realm);
Expand Down
6 changes: 4 additions & 2 deletions crates/jstz_engine/src/gc/mod.rs
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,9 @@
//!
//! For further details, see the [GC Implementation Guide](https://udn.realityripple.com/docs/Mozilla/Projects/SpiderMonkey/Internals/Garbage_collection).

mod ptr;
mod trace;
pub mod ptr;
pub mod root;
pub mod trace;

pub use root::Prolong;
pub use trace::{Finalize, Trace, Tracer};
1 change: 1 addition & 0 deletions crates/jstz_engine/src/gc/ptr.rs
Original file line number Diff line number Diff line change
Expand Up @@ -48,6 +48,7 @@ pub unsafe trait WriteBarrieredPtr: Copy {
///
/// [`GcPtr<T>`] should only be used by values on the heap. Garbage collected pointers
/// on the stack should be rooted.
#[derive(Debug)]
pub struct GcPtr<T: WriteBarrieredPtr> {
// # Safety
//
Expand Down
Loading

0 comments on commit 6146f87

Please sign in to comment.