| Commit message (Collapse) | Author | Age | Files | Lines |
... | |
| |
|
| |
|
| |
|
|
|
|
|
|
| |
This reverts commit 9ff482dd8d5b1b252e77712e9418b5b253f4bbf8.
Importing fix from upstream instead.
|
| |
|
| |
|
| |
|
|
|
|
|
|
| |
This reverts commit b7367506fa05e9396e69b1db7277e011722af6b0.
Importing upstream patch instead.
|
| |
|
|
|
|
|
|
| |
Use a separate list for tracking potential can_destroy targets.
This lets us skip unnecessarily calling can_destroy for non-platform
objects, and gets rid of exponential complexity in the loop.
|
|
|
|
|
| |
We want to check if d is larger than INT64_MAX, but the conversion
rounds it up, so we actually need to use greater-equals.
|
|
|
|
|
|
|
| |
* Expose js_create_from_ctor from QuickJS and directly use that (instead
of badly recreating it)
* Do not call defineUnforgeable twice (it is inevitably called in toJSP0,
so jsctor does not need it)
|
|
|
|
|
| |
We now expose some functions from QuickJS to interact with JavaScript
strings without re-encoding them into UTF-8.
|
|
|
|
|
| |
See https://github.com/bellard/quickjs/issues/192. (Thanks to @dchest
for the proposed fix.)
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
isArray and proxy isArray can call each other indefinitely in a mutually
recursive loop.
Add a stack overflow check in the js_proxy_isArray function before calling
JS_isArray(ctx, s->target).
With ASAN the the poc.js from issue 178:
```
./qjs ./poc.js
InternalError: stack overflow
at isArray (native)
at <eval> (./poc.js:4)
```
Fix: https://github.com/bellard/quickjs/issues/178
|
| |
|
|
|
|
| |
Add a JS_GetClassID function to QJS instead.
|
|
|
|
| |
I believe this works correctly. Hopefully I'm not wrong.
|
|
Taken from txiki.js, so it includes zamofex's top-level await patch.
|