JSMutationCallback.cpp [plain text]
#include "config.h"
#include "JSMutationCallback.h"
#include "JSDOMGlobalObject.h"
#include "JSMainThreadExecState.h"
#include "JSMutationObserver.h"
#include "JSMutationRecord.h"
#include "ScriptExecutionContext.h"
#include <heap/WeakInlines.h>
#include <runtime/JSLock.h>
using namespace JSC;
namespace WebCore {
JSMutationCallback::JSMutationCallback(JSObject* callback, JSDOMGlobalObject* globalObject)
: ActiveDOMCallback(globalObject->scriptExecutionContext())
, m_callback(PassWeak<JSObject>(callback))
, m_isolatedWorld(globalObject->world())
{
}
JSMutationCallback::~JSMutationCallback()
{
}
void JSMutationCallback::call(const Vector<RefPtr<MutationRecord> >& mutations, MutationObserver* observer)
{
if (!canInvokeCallback())
return;
RefPtr<JSMutationCallback> protect(this);
JSLockHolder lock(m_isolatedWorld->vm());
if (!m_callback)
return;
JSValue callback = m_callback.get();
CallData callData;
CallType callType = getCallData(callback, callData);
if (callType == CallTypeNone) {
ASSERT_NOT_REACHED();
return;
}
ScriptExecutionContext* context = scriptExecutionContext();
if (!context)
return;
ASSERT(context->isDocument());
JSDOMGlobalObject* globalObject = toJSDOMGlobalObject(context, m_isolatedWorld.get());
ExecState* exec = globalObject->globalExec();
JSValue jsObserver = toJS(exec, globalObject, observer);
MarkedArgumentBuffer args;
args.append(jsArray(exec, globalObject, mutations));
args.append(jsObserver);
InspectorInstrumentationCookie cookie = JSMainThreadExecState::instrumentFunctionCall(context, callType, callData);
JSMainThreadExecState::call(exec, callback, callType, callData, jsObserver, args);
InspectorInstrumentation::didCallFunction(cookie);
if (exec->hadException())
reportCurrentException(exec);
}
}