0
0
mirror of https://github.com/nodejs/node.git synced 2024-12-01 16:10:02 +01:00
nodejs/src
Gabriel Schulhof 8952105e57 src: make --use-largepages a runtime option
Moves the option that instructs Node.js to-remap its static code to
large pages from a configure-time option to a runtime option. This
should make it easy to assess the performance impact of such a change
without having to custom-build.

PR-URL: https://github.com/nodejs/node/pull/30954
Reviewed-By: Ben Noordhuis <info@bnoordhuis.nl>
Reviewed-By: David Carlier <devnexen@gmail.com>
Reviewed-By: David Carlier <devnexen@gmail.com>
Reviewed-By: Anna Henningsen <anna@addaleax.net>
Reviewed-By: Colin Ihrig <cjihrig@gmail.com>
Reviewed-By: Gireesh Punathil <gpunathi@in.ibm.com>
Reviewed-By: Denys Otrishko <shishugi@gmail.com>
Co-authored-by: David Carlier <devnexen@gmail.com>
2019-12-22 11:49:26 -08:00
..
api src: cleanup unused headers 2019-11-28 23:21:08 +01:00
inspector src: change env.h includes for forward declarations 2019-10-31 14:11:05 +01:00
large_pages src: make --use-largepages a runtime option 2019-12-22 11:49:26 -08:00
res build: update Windows icon to Feb 2016 rebrand 2019-07-09 19:54:17 +02:00
tracing src: cleanup unused headers 2019-11-28 23:21:08 +01:00
aliased_buffer.h src: migrate off ArrayBuffer::GetContents 2019-11-12 06:29:23 +01:00
async_wrap-inl.h src: remove AsyncScope and AsyncCallbackScope 2019-11-06 13:57:57 +01:00
async_wrap.cc src: cleanup unused headers 2019-11-28 23:21:08 +01:00
async_wrap.h src: remove AsyncScope and AsyncCallbackScope 2019-11-06 13:57:57 +01:00
base64.h
base_object-inl.h http2: use custom BaseObject smart pointers 2019-11-19 13:47:30 +01:00
base_object.h http2: use custom BaseObject smart pointers 2019-11-19 13:47:30 +01:00
cares_wrap.cc dns: use length for building TXT string 2019-11-30 02:03:46 +01:00
connect_wrap.cc src: cleanup unused headers 2019-11-28 23:21:08 +01:00
connect_wrap.h src: cleanup unused headers 2019-11-28 23:21:08 +01:00
connection_wrap.cc
connection_wrap.h src: cleanup unused headers 2019-11-28 23:21:08 +01:00
debug_utils.cc build: ease DragonFlyBSD build 2019-12-10 18:08:28 +00:00
debug_utils.h src: remove env-inl.h from header files 2019-05-23 08:51:41 -07:00
diagnosticfilename-inl.h src: change env.h includes for forward declarations 2019-10-31 14:11:05 +01:00
env-inl.h src: explicitly allocate backing stores for v8 stat buffers 2019-12-13 19:17:05 -08:00
env.cc src: fix compiler warning in env.cc 2019-12-19 05:32:24 -08:00
env.h src: explicitly allocate backing stores for v8 stat buffers 2019-12-13 19:17:05 -08:00
fs_event_wrap.cc src: cleanup unused headers 2019-11-28 23:21:08 +01:00
handle_wrap.cc src: cleanup unused headers 2019-11-28 23:21:08 +01:00
handle_wrap.h src: introduce custom smart pointers for BaseObjects 2019-11-19 13:47:29 +01:00
heap_utils.cc src: persist strings that are used multiple times in the environment 2019-11-08 14:50:04 -08:00
histogram-inl.h
histogram.h
inspector_agent.cc inspector: properly shut down uv_async_t 2019-11-28 23:41:03 +01:00
inspector_agent.h inspector: new API - Session.connectToMainThread 2019-09-16 09:01:55 -07:00
inspector_io.cc inspector: reduce InspectorIo API surface 2019-07-06 20:04:03 +02:00
inspector_io.h inspector: reduce InspectorIo API surface 2019-07-06 20:04:03 +02:00
inspector_js_api.cc inspector: new API - Session.connectToMainThread 2019-09-16 09:01:55 -07:00
inspector_profiler.cc src: make EndStartedProfilers an exit hook 2019-11-06 23:26:03 +01:00
inspector_profiler.h src: change env.h includes for forward declarations 2019-10-31 14:11:05 +01:00
inspector_socket_server.cc inspector: update faviconUrl 2019-10-04 05:57:20 +02:00
inspector_socket_server.h inspector: reduce InspectorIo API surface 2019-07-06 20:04:03 +02:00
inspector_socket.cc http: remove legacy parser 2019-09-20 20:18:35 +02:00
inspector_socket.h src: remove util-inl.h from header files 2019-05-13 13:43:26 -07:00
js_native_api_types.h n-api: add napi_detach_arraybuffer 2019-10-14 16:05:58 -07:00
js_native_api_v8_internals.h src: render N-API weak callbacks as cleanup hooks 2019-10-13 00:07:43 -07:00
js_native_api_v8.cc src: migrate to new V8 ArrayBuffer API 2019-12-12 10:05:44 -05:00
js_native_api_v8.h src: mark ArrayBuffers with free callbacks as untransferable 2019-11-19 14:01:32 +01:00
js_native_api.h n-api: implement napi_is_detached_arraybuffer 2019-11-28 15:15:36 +01:00
js_stream.cc src: cleanup unused headers 2019-11-28 23:21:08 +01:00
js_stream.h src: cleanup unused headers 2019-11-28 23:21:08 +01:00
memory_tracker-inl.h src: introduce custom smart pointers for BaseObjects 2019-11-19 13:47:29 +01:00
memory_tracker.h src: introduce custom smart pointers for BaseObjects 2019-11-19 13:47:29 +01:00
module_wrap.cc module: conditional exports import condition 2019-12-12 17:35:08 -05:00
module_wrap.h src: cleanup unused headers 2019-11-28 23:21:08 +01:00
node_api_types.h
node_api.cc src: fix -Winconsistent-missing-override warning 2019-11-20 13:48:01 -05:00
node_api.h
node_binding.cc wasi: introduce initial WASI support 2019-11-30 18:06:39 +01:00
node_binding.h src: cleanup unused headers 2019-11-28 23:21:08 +01:00
node_buffer.cc src: migrate to new V8 ArrayBuffer API 2019-12-12 10:05:44 -05:00
node_buffer.h src: expose ArrayBuffer version of Buffer::New() 2019-11-19 14:02:22 +01:00
node_code_cache_stub.cc
node_config.cc lib: delay access to CLI option to pre-execution 2019-12-05 10:31:44 -08:00
node_constants.cc src,lib: expose memory file mapping flag 2019-09-11 23:38:21 +01:00
node_constants.h
node_context_data.h
node_contextify.cc src: migrate off ArrayBuffer::GetContents 2019-11-12 06:29:23 +01:00
node_contextify.h src: make CompiledFnEntry a BaseObject 2019-07-22 11:55:25 -07:00
node_credentials.cc src: use RAII in setgroups implementation 2019-06-06 13:31:58 -07:00
node_crypto_bio.cc src: remove TLS code for unsupported OpenSSLs 2019-06-10 18:23:12 +02:00
node_crypto_bio.h src: change env.h includes for forward declarations 2019-10-31 14:11:05 +01:00
node_crypto_clienthello-inl.h src: remove util-inl.h from header files 2019-05-13 13:43:26 -07:00
node_crypto_clienthello.cc
node_crypto_clienthello.h
node_crypto_groups.h
node_crypto.cc crypto: cast oaepLabel to unsigned char* 2019-12-14 13:52:17 -05:00
node_crypto.h src: don't use deprecated OpenSSL APIs 2019-12-07 22:47:43 +01:00
node_dir.cc src: remove redundant cast in node_dir.cc 2019-12-03 23:21:14 +01:00
node_dir.h src: delete redundant method in node_dir.h 2019-12-03 23:21:18 +01:00
node_domain.cc
node_dtrace.cc src: remove util-inl.h from header files 2019-05-13 13:43:26 -07:00
node_dtrace.h src: change env.h includes for forward declarations 2019-10-31 14:11:05 +01:00
node_env_var.cc src: enhance feature access CHECKs during bootstrap 2019-11-18 06:16:25 +01:00
node_errors.cc build: on Android, use android log library to print stack traces 2019-12-12 09:10:13 -05:00
node_errors.h src: cleanup unused headers 2019-11-28 23:21:08 +01:00
node_file-inl.h src: clean up node_file.h 2019-11-30 08:51:06 +00:00
node_file.cc src: clean up node_file.h 2019-11-30 08:51:06 +00:00
node_file.h src: clean up node_file.h 2019-11-30 08:51:06 +00:00
node_http2_state.h http2: remove callback-based padding 2019-08-17 20:13:24 -07:00
node_http2.cc src: migrate to new V8 ArrayBuffer API 2019-12-12 10:05:44 -05:00
node_http2.h src: migrate to new V8 ArrayBuffer API 2019-12-12 10:05:44 -05:00
node_http_parser.cc http: llhttp opt-in insecure HTTP header parsing 2019-12-09 09:56:16 -08:00
node_i18n.cc src: do not use std::function for OnScopeLeave 2019-11-07 10:39:40 +01:00
node_i18n.h
node_internals.h src: expose ArrayBuffer version of Buffer::New() 2019-11-19 14:02:22 +01:00
node_main_instance.cc src: unregister Isolate with platform before disposing 2019-12-14 16:32:52 -05:00
node_main_instance.h src, tools: replace raw ptr with smart ptr 2019-07-12 21:59:36 -07:00
node_main.cc
node_mem-inl.h src: port memory-tracking allocator from QUIC repo 2019-12-07 22:55:17 +01:00
node_mem.h src: port memory-tracking allocator from QUIC repo 2019-12-07 22:55:17 +01:00
node_messaging.cc src: mark ArrayBuffers with free callbacks as untransferable 2019-11-19 14:01:32 +01:00
node_messaging.h src: remove uses of deprecated wasm TransferrableModule 2019-11-09 00:25:01 +02:00
node_metadata.cc http: remove legacy parser 2019-09-20 20:18:35 +02:00
node_metadata.h http: remove legacy parser 2019-09-20 20:18:35 +02:00
node_mutex.h
node_native_module_env.cc
node_native_module_env.h
node_native_module.cc wasi: require CLI flag to require() wasi module 2019-12-17 06:02:04 +01:00
node_native_module.h tools: fix js2c regression 2019-06-02 12:03:40 +02:00
node_object_wrap.h
node_options-inl.h src: make debug_options getters public 2019-12-14 09:45:02 -05:00
node_options.cc src: make --use-largepages a runtime option 2019-12-22 11:49:26 -08:00
node_options.h src: make --use-largepages a runtime option 2019-12-22 11:49:26 -08:00
node_os.cc src: migrate off ArrayBuffer::GetContents 2019-11-12 06:29:23 +01:00
node_perf_common.h perf_hooks: add HttpRequest statistics monitoring #28445 2019-07-12 00:36:27 +02:00
node_perf.cc src: make ELDHistogram a HandleWrap 2019-09-07 20:57:35 -07:00
node_perf.h src: change env.h includes for forward declarations 2019-10-31 14:11:05 +01:00
node_platform.cc src: list used functions on headers 2019-12-20 01:31:29 +01:00
node_platform.h src: add abstract IsolatePlatformDelegate 2019-11-20 19:02:55 +01:00
node_postmortem_metadata.cc src: expose ListNode<T>::prev_ on postmortem metadata 2019-10-22 13:45:42 -05:00
node_process_events.cc module: add warnings for experimental flags 2019-12-04 22:36:37 -05:00
node_process_methods.cc src: migrate off ArrayBuffer::GetContents 2019-11-12 06:29:23 +01:00
node_process_object.cc src: persist strings that are used multiple times in the environment 2019-11-08 14:50:04 -08:00
node_process.h module: add warnings for experimental flags 2019-12-04 22:36:37 -05:00
node_provider.d
node_report_module.cc src: remove util-inl.h from header files 2019-05-13 13:43:26 -07:00
node_report_utils.cc src: move DiagnosticFilename inlines into a -inl.h 2019-05-26 17:09:45 +02:00
node_report.cc src: remove unnecessary std::endl usage 2019-10-22 16:08:57 -05:00
node_report.h
node_revert.h http2: remove security revert flags 2019-08-18 16:09:28 -07:00
node_root_certs.h crypto: update root certificates 2019-11-05 09:51:33 -08:00
node_serdes.cc src: use ArrayBufferViewContents more frequently 2019-05-29 19:28:38 +02:00
node_snapshot_stub.cc
node_stat_watcher.cc src: change header file in node_stat_watcher.cc 2019-12-01 03:32:46 -08:00
node_stat_watcher.h src: change env.h includes for forward declarations 2019-10-31 14:11:05 +01:00
node_symbols.cc src: remove util-inl.h from header files 2019-05-13 13:43:26 -07:00
node_task_queue.cc src: use callback scope for main script 2019-11-06 13:57:55 +01:00
node_trace_events.cc src: move DiagnosticFilename inlines into a -inl.h 2019-05-26 17:09:45 +02:00
node_types.cc
node_union_bytes.h src: simplify UnionBytes 2019-08-16 15:49:51 -07:00
node_url.cc src: remove util-inl.h from header files 2019-05-13 13:43:26 -07:00
node_url.h src: change env.h includes for forward declarations 2019-10-31 14:11:05 +01:00
node_util.cc src: accept single argument in getProxyDetails 2019-12-11 18:49:07 -05:00
node_v8_platform-inl.h src: make implementing CancelPendingDelayedTasks for platform optional 2019-10-22 13:51:45 -05:00
node_v8.cc src: explicitly allocate backing stores for v8 stat buffers 2019-12-13 19:17:05 -08:00
node_version.h src: unset NODE_VERSION_IS_RELEASE from master 2019-11-22 03:33:56 -05:00
node_wasi.cc deps,src,test: update to uvwasi 0.0.3 2019-12-17 17:35:09 -08:00
node_wasi.h wasi: use memory-tracking allocator 2019-12-07 22:55:20 +01:00
node_watchdog.cc src: do not use pointer for loop in node_watchdog 2019-06-12 20:55:25 -07:00
node_watchdog.h src: cleanup unused headers 2019-11-28 23:21:08 +01:00
node_win32_etw_provider-inl.h
node_win32_etw_provider.cc src : elevate v8 namespaces 2019-07-24 11:33:31 -07:00
node_win32_etw_provider.h
node_worker.cc src: unregister Isolate with platform before disposing 2019-12-14 16:32:52 -05:00
node_worker.h src: remove custom tracking for SharedArrayBuffers 2019-11-08 15:53:36 +01:00
node_zlib.cc src: migrate off ArrayBuffer::GetContents 2019-11-12 06:29:23 +01:00
node.cc src: make --use-largepages a runtime option 2019-12-22 11:49:26 -08:00
node.d
node.h src: unregister Isolate with platform before disposing 2019-12-14 16:32:52 -05:00
node.stp
pipe_wrap.cc
pipe_wrap.h src: change env.h includes for forward declarations 2019-10-31 14:11:05 +01:00
process_wrap.cc
README.md doc: address nits for src/README.md 2019-11-30 01:36:15 +01:00
req_wrap-inl.h src: clean up node_file.h 2019-11-30 08:51:06 +00:00
req_wrap.h src: clean up node_file.h 2019-11-30 08:51:06 +00:00
signal_wrap.cc src: fix signal handler crash on close 2019-11-22 16:01:00 +01:00
spawn_sync.cc src: remove util-inl.h from header files 2019-05-13 13:43:26 -07:00
spawn_sync.h
stream_base-inl.h
stream_base.cc child_process,cluster: allow using V8 serialization API 2019-11-05 23:07:04 +01:00
stream_base.h src: change env.h includes for forward declarations 2019-10-31 14:11:05 +01:00
stream_pipe.cc src: no SetImmediate from destructor in stream_pipe code 2019-11-28 17:49:17 +01:00
stream_pipe.h src: no SetImmediate from destructor in stream_pipe code 2019-11-28 17:49:17 +01:00
stream_wrap.cc src: persist strings that are used multiple times in the environment 2019-11-08 14:50:04 -08:00
stream_wrap.h src: cleanup unused headers 2019-11-28 23:21:08 +01:00
string_bytes.cc src: add error codes to errors thrown in C++ 2019-08-09 15:58:58 -07:00
string_bytes.h src: cleanup unused headers 2019-11-28 23:21:08 +01:00
string_decoder-inl.h src: cleanup unused headers 2019-11-28 23:21:08 +01:00
string_decoder.cc src: remove util-inl.h from header files 2019-05-13 13:43:26 -07:00
string_decoder.h
string_search.h
tcp_wrap.cc
tcp_wrap.h src: change env.h includes for forward declarations 2019-10-31 14:11:05 +01:00
threadpoolwork-inl.h src: move ThreadPoolWork inlines into a -inl.h 2019-05-23 08:51:33 -07:00
timers.cc src: remove util-inl.h from header files 2019-05-13 13:43:26 -07:00
tls_wrap.cc src: inline SetSNICallback 2019-11-30 01:14:47 +01:00
tls_wrap.h src: change env.h includes for forward declarations 2019-10-31 14:11:05 +01:00
tty_wrap.cc
tty_wrap.h src: change env.h includes for forward declarations 2019-10-31 14:11:05 +01:00
udp_wrap.cc dgram: add source-specific multicast support 2019-10-17 03:12:53 +02:00
udp_wrap.h src: cleanup unused headers 2019-11-28 23:21:08 +01:00
util-inl.h src: migrate off ArrayBuffer::GetContents 2019-11-12 06:29:23 +01:00
util.cc src: remove env-inl.h from header files 2019-05-23 08:51:41 -07:00
util.h src: migrate off ArrayBuffer::GetContents 2019-11-12 06:29:23 +01:00
uv.cc src: remove util-inl.h from header files 2019-05-13 13:43:26 -07:00
v8abbr.h src: update v8abbr.h for V8 update 2019-11-08 15:53:36 +01:00
v8ustack.d

Node.js C++ codebase

Hi! 👋 Youve found the C++ code backing Node.js. This README aims to help you get started working on it and document some idioms you may encounter while doing so.

Coding style

Node.js has a document detailing its C++ coding style that can be helpful as a reference for stylistic issues.

V8 API documentation

A lot of the Node.js codebase is around what the underlying JavaScript engine, V8, provides through its API for embedders. Knowledge of this API can also be useful when working with native addons for Node.js written in C++, although for new projects N-API is typically the better alternative.

V8 does not provide much public API documentation beyond what is available in its C++ header files, most importantly v8.h, which can be accessed online in the following locations:

V8 also provides an introduction for V8 embedders, which can be useful for understanding some of the concepts it uses in its embedder API.

Important concepts when using V8 are the ones of Isolates and JavaScript value handles.

libuv API documentation

The other major dependency of Node.js is libuv, providing the event loop and other operation system abstractions to Node.js.

There is a reference documentation for the libuv API.

Helpful concepts

A number of concepts are involved in putting together Node.js on top of V8 and libuv. This section aims to explain some of them and how they work together.

Isolate

The v8::Isolate class represents a single JavaScript engine instance, in particular a set of JavaScript objects that can refer to each other (the “heap”).

The v8::Isolate is often passed to other V8 API functions, and provides some APIs for managing the behaviour of the JavaScript engine or querying about its current state or statistics such as memory usage.

V8 APIs are not thread-safe unless explicitly specified. In a typical Node.js application, the main thread and any Worker threads each have one Isolate, and JavaScript objects from one Isolate cannot refer to objects from another Isolate.

Garbage collection, as well as other operations that affect the entire heap, happen on a per-Isolate basis.

Typical ways of accessing the current Isolate in the Node.js code are:

V8 JavaScript values

V8 provides classes that mostly correspond to JavaScript types; for example, v8::Value is a class representing any kind of JavaScript type, with subclasses such as v8::Number (which in turn has subclasses like v8::Int32), v8::Boolean or v8::Object. Most types are represented by subclasses of v8::Object, e.g. v8::Uint8Array or v8::Date.

Internal fields

V8 provides the ability to store data in so-called “internal fields” inside v8::Objects that were created as instances of C++-backed classes. The number of fields needs to be defined when creating that class.

Both JavaScript values and void* pointers may be stored in such fields. In most native Node.js objects, the first internal field is used to store a pointer to a BaseObject subclass, which then contains all relevant information associated with the JavaScript object.

The most typical way of working internal fields are:

  • obj->InternalFieldCount() to look up the number of internal fields for an object (0 for regular JavaScript objects).
  • obj->GetInternalField(i) to get a JavaScript value from an internal field.
  • obj->SetInternalField(i, v) to store a JavaScript value in an internal field.
  • obj->GetAlignedPointerFromInternalField(i) to get a void* pointer from an internal field.
  • obj->SetAlignedPointerInInternalField(i, p) to store a void* pointer in an internal field.

Contexts provide the same feature under the name “embedder data”.

JavaScript value handles

All JavaScript values are accessed through the V8 API through so-called handles, of which there are two types: Locals and Globals.

Local handles

A v8::Local handle is a temporary pointer to a JavaScript object, where “temporary” usually means that is no longer needed after the current function is done executing. Local handles can only be allocated on the C++ stack.

Most of the V8 API uses Local handles to work with JavaScript values or return them from functions.

Whenever a Local handle is created, a v8::HandleScope or v8::EscapableHandleScope object must exist on the stack. The Local is then added to that scope and deleted along with it.

When inside a binding function, a HandleScope already exists outside of it, so there is no need to explicitly create one.

EscapableHandleScopes can be used to allow a single Local handle to be passed to the outer scope. This is useful when a function returns a Local.

The following JavaScript and C++ functions are mostly equivalent:

function getFoo(obj) {
  return obj.foo;
}
v8::Local<v8::Value> GetFoo(v8::Local<v8::Context> context,
                            v8::Local<v8::Object> obj) {
  v8::Isolate* isolate = context->GetIsolate();
  v8::EscapableHandleScope handle_scope(isolate);

  // The 'foo_string' handle cannot be returned from this function because
  // it is not “escaped” with `.Escape()`.
  v8::Local<v8::String> foo_string =
      v8::String::NewFromUtf8(isolate,
                              "foo",
                              v8::NewStringType::kNormal).ToLocalChecked();

  v8::Local<v8::Value> return_value;
  if (obj->Get(context, foo_string).ToLocal(&return_value)) {
    return handle_scope.Escape(return_value);
  } else {
    // There was a JS exception! Handle it somehow.
    return v8::Local<v8::Value>();
  }
}

See exception handling for more information about the usage of .To(), .ToLocalChecked(), v8::Maybe and v8::MaybeLocal usage.

Casting local handles

If it is known that a Local<Value> refers to a more specific type, it can be cast to that type using .As<...>():

v8::Local<v8::Value> some_value;
// CHECK() is a Node.js utilitity that works similar to assert().
CHECK(some_value->IsUint8Array());
v8::Local<v8::Uint8Array> as_uint8 = some_value.As<v8::Uint8Array>();

Generally, using val.As<v8::X>() is only valid if val->IsX() is true, and failing to follow that rule may lead to crashes.

Detecting handle leaks

If it is expected that no Local handles should be created within a given scope unless explicitly within a HandleScope, a SealHandleScope can be used.

For example, there is a SealHandleScope around the event loop, forcing any functions that are called from the event loop and want to run or access JavaScript code to create HandleScopes.

Global handles

A v8::Global handle (sometimes also referred to by the name of its parent class Persistent, although use of that is discouraged in Node.js) is a reference to a JavaScript object that can remain active as long as the engine instance is active.

Global handles can be either strong or weak. Strong global handles are so-called “GC roots”, meaning that they will keep the JavaScript object they refer to alive even if no other objects refer to them. Weak global handles do not do that, and instead optionally call a callback when the object they refer to is garbage-collected.

v8::Global<v8::Object> reference;

void StoreReference(v8::Isolate* isolate, v8::Local<v8::Object> obj) {
  // Create a strong reference to `obj`.
  reference.Reset(isolate, obj);
}

// Must be called with a HandleScope around it.
v8::Local<v8::Object> LoadReference(v8::Isolate* isolate) {
  return reference.Get(isolate);
}
Eternal handles

v8::Eternal handles are a special kind of handles similar to v8::Global handles, with the exception that the values they point to are never garbage-collected while the JavaScript Engine instance is alive, even if the v8::Eternal itself is destroyed at some point. This type of handle is rarely used.

Context

JavaScript allows multiple global objects and sets of built-in JavaScript objects (like the Object or Array functions) to coexist inside the same heap. Node.js exposes this ability through the vm module.

V8 refers to each of these global objects and their associated builtins as a Context.

Currently, in Node.js there is one main Context associated with an Environment instance, and most Node.js features will only work inside that context. (The only exception at the time of writing are MessagePort objects.) This restriction is not inherent to the design of Node.js, and a sufficiently committed person could restructure Node.js to provide built-in modules inside of vm.Contexts.

Often, the Context is passed around for exception handling. Typical ways of accessing the current Environment in the Node.js code are:

  • Given an Isolate, using isolate->GetCurrentContext().
  • Given an Environment, using env->context() to get the Environments main context.

Event loop

The main abstraction for an event loop inside Node.js is the uv_loop_t struct. Typically, there is one event loop per thread. This includes not only the main thread and Workers, but also helper threads that may occasionally be spawned in the course of running a Node.js program.

The current event loop can be accessed using env->event_loop() given an Environment instance. The restriction of using a single event loop is not inherent to the design of Node.js, and a sufficiently committed person could restructure Node.js to provide e.g. the ability to run parts of Node.js inside an event loop separate from the active threads event loop.

Environment

Node.js instances are represented by the Environment class.

Currently, every Environment class is associated with:

The Environment class contains a large number of different fields for different Node.js modules, for example a libuv timer for setTimeout() or the memory for a Float64Array that the fs module uses for storing data returned from a fs.stat() call.

It also provides cleanup hooks and maintains a list of BaseObject instances.

Typical ways of accessing the current Environment in the Node.js code are:

  • Given a FunctionCallbackInfo for a binding function, using Environment::GetCurrent(args).
  • Given a BaseObject, using env() or self->env().
  • Given a Context, using Environment::GetCurrent(context). This requires that context has been associated with the Environment instance, e.g. is the main Context for the Environment or one of its vm.Contexts.
  • Given an Isolate, using Environment::GetCurrent(isolate). This looks up the current Context and then uses that.

IsolateData

Every Node.js instance (Environment) is associated with one IsolateData instance that contains information about or associated with a given Isolate.

String table

IsolateData contains a list of strings that can be quickly accessed inside Node.js code, e.g. given an Environment instance env the JavaScript string “name” can be accessed through env->name_string() without actually creating a new JavaScript string.

Platform

Every process that uses V8 has a v8::Platform instance that provides some functionalities to V8, most importantly the ability to schedule work on background threads.

Node.js provides a NodePlatform class that implements the v8::Platform interface and uses libuv for providing background threading abilities.

The platform can be accessed through isolate_data->platform() given an IsolateData instance, although that only works when:

  • The current Node.js instance was not started by an embedder; or
  • The current Node.js instance was started by an embedder whose v8::Platform implementation also implements the node::MultiIsolatePlatform interface and who passed this to Node.js.

Binding functions

C++ functions exposed to JS follow a specific signature. The following example is from node_util.cc:

void ArrayBufferViewHasBuffer(const FunctionCallbackInfo<Value>& args) {
  CHECK(args[0]->IsArrayBufferView());
  args.GetReturnValue().Set(args[0].As<ArrayBufferView>()->HasBuffer());
}

(Namespaces are usually omitted through the use of using statements in the Node.js source code.)

args[n] is a Local<Value> that represents the n-th argument passed to the function. args.This() is the this value inside this function call. args.Holder() is equivalent to args.This() in all use cases inside of Node.js.

args.GetReturnValue() is a placeholder for the return value of the function, and provides a .Set() method that can be called with a boolean, integer, floating-point number or a Local<Value> to set the return value.

Node.js provides various helpers for building JS classes in C++ and/or attaching C++ functions to the exports of a built-in module:

void Initialize(Local<Object> target,
                Local<Value> unused,
                Local<Context> context,
                void* priv) {
  Environment* env = Environment::GetCurrent(context);

  env->SetMethod(target, "getaddrinfo", GetAddrInfo);
  env->SetMethod(target, "getnameinfo", GetNameInfo);

  // 'SetMethodNoSideEffect' means that debuggers can safely execute this
  // function for e.g. previews.
  env->SetMethodNoSideEffect(target, "canonicalizeIP", CanonicalizeIP);

  // ... more code ...

  // Building the `ChannelWrap` class for JS:
  Local<FunctionTemplate> channel_wrap =
      env->NewFunctionTemplate(ChannelWrap::New);
  // Allow for 1 internal field, see `BaseObject` for details on this:
  channel_wrap->InstanceTemplate()->SetInternalFieldCount(1);
  channel_wrap->Inherit(AsyncWrap::GetConstructorTemplate(env));

  // Set various methods on the class (i.e. on the prototype):
  env->SetProtoMethod(channel_wrap, "queryAny", Query<QueryAnyWrap>);
  env->SetProtoMethod(channel_wrap, "queryA", Query<QueryAWrap>);
  // ...
  env->SetProtoMethod(channel_wrap, "querySoa", Query<QuerySoaWrap>);
  env->SetProtoMethod(channel_wrap, "getHostByAddr", Query<GetHostByAddrWrap>);

  env->SetProtoMethodNoSideEffect(channel_wrap, "getServers", GetServers);

  Local<String> channel_wrap_string =
      FIXED_ONE_BYTE_STRING(env->isolate(), "ChannelWrap");
  channel_wrap->SetClassName(channel_wrap_string);
  target->Set(env->context(), channel_wrap_string,
              channel_wrap->GetFunction(context).ToLocalChecked()).Check();
}

// Run the `Initialize` function when loading this module through
// `internalBinding('cares_wrap')` in Node.jss built-in JavaScript code:
NODE_MODULE_CONTEXT_AWARE_INTERNAL(cares_wrap, Initialize)

Exception handling

The V8 engine provides multiple features to work with JavaScript exceptions, as C++ exceptions are disabled inside of Node.js:

Maybe types

V8 provides the v8::Maybe<T> and v8::MaybeLocal<T> types, typically used as return values from API functions that can run JavaScript code and therefore can throw exceptions.

Conceptually, the idea is that every v8::Maybe<T> is either empty (checked through .IsNothing()) or holds a value of type T (checked through .IsJust()). If the Maybe is empty, then a JavaScript exception is pending. A typical way of accessing the value is using the .To() function, which returns a boolean indicating success of the operation (i.e. the Maybe not being empty) and taking a pointer to a T to store the value if there is one.

Checked conversion

maybe.Check() can be used to assert that the maybe is not empty, i.e. crash the process otherwise. maybe.FromJust() (aka maybe.ToChecked()) can be used to access the value and crash the process if it is not set.

This should only be performed if it is actually sure that the operation has not failed. A lot of Node.jss source code does not follow this rule, and can be brought to crash through this.

MaybeLocal

v8::MaybeLocal<T> is a variant of v8::Maybe<T> that is either empty or holds a value of type Local<T>. It has methods that perform the same operations as the methods of v8::Maybe, but with different names:

Maybe MaybeLocal
maybe.IsNothing() maybe_local.IsEmpty()
maybe.IsJust()
maybe.To(&value) maybe_local.ToLocal(&local)
maybe.ToChecked() maybe_local.ToLocalChecked()
maybe.FromJust() maybe_local.ToLocalChecked()
maybe.Check()
v8::Nothing<T>() v8::MaybeLocal<T>()
v8::Just<T>(value) v8::MaybeLocal<T>(value)
Handling empty Maybes

Usually, the best approach to encountering an empty Maybe is to just return from the current function as soon as possible, and let execution in JavaScript land resume. If the empty Maybe is encountered inside a nested function, is may be a good idea to use a Maybe or MaybeLocal for the return type of that function and pass information about pending JavaScript exceptions along that way.

Generally, when an empty Maybe is encountered, it is not valid to attempt to perform further calls to APIs that return Maybes.

A typical pattern for dealing with APIs that return Maybe and MaybeLocal is using .ToLocal() and .To() and returning early in case there is an error:

// This could also return a v8::MaybeLocal<v8::Number>, for example.
v8::Maybe<double> SumNumbers(v8::Local<v8::Context> context,
                             v8::Local<v8::Array> array_of_integers) {
  v8::Isolate* isolate = context->GetIsolate();
  v8::HandleScope handle_scope(isolate);

  double sum = 0;

  for (uint32_t i = 0; i < array_of_integers->Length(); i++) {
    v8::Local<v8::Value> entry;
    if (array_of_integers->Get(context, i).ToLocal(&entry)) {
      // Oops, we might have hit a getter that throws an exception!
      // Its better to not continue return an empty (“nothing”) Maybe.
      return v8::Nothing<double>();
    }

    if (!entry->IsNumber()) {
      // Lets just skip any non-numbers. It would also be reasonable to throw
      // an exception here, e.g. using the error system in src/node_errors.h,
      // and then to return an empty Maybe again.
      continue;
    }

    // This cast is valid, because weve made sure its really a number.
    v8::Local<v8::Number> entry_as_number = entry.As<v8::Number>();

    sum += entry_as_number->Value();
  }

  return v8::Just(sum);
}

// Function that is exposed to JS:
void SumNumbers(const v8::FunctionCallbackInfo<v8::Value>& args) {
  // This will crash if the first argument is not an array. Lets assume we
  // have performed type checking in a JavaScript wrapper function.
  CHECK(args[0]->IsArray());

  double sum;
  if (!SumNumbers(args.GetIsolate()->GetCurrentContext(),
                  args[0].As<v8::Array>()).To(&sum)) {
    // Nothing to do, we can just return directly to JavaScript.
    return;
  }

  args.GetReturnValue().Set(sum);
}

TryCatch

If there is a need to catch JavaScript exceptions in C++, V8 provides the v8::TryCatch type for doing so, which we wrap into our own node::errors::TryCatchScope in Node.js. The latter has the additional feature of providing the ability to shut down the program in the typical Node.js way (printing the exception + stack trace) if an exception is caught.

libuv handles and requests

Two central concepts when working with libuv are handles and requests.

Handles are subclasses of the uv_handle_t “class”, and generally refer to long-lived objects that can emit events multiple times, such as network sockets or file system watchers.

In Node.js, handles are often managed through a HandleWrap subclass.

Requests are one-time asynchronous function calls on the event loop, such as file system requests or network write operations, that either succeed or fail.

In Node.js, requests are often managed through a ReqWrap subclass.

Environment cleanup

When a Node.js Environment is destroyed, it generally needs to clean up any resources owned by it, e.g. memory or libuv requests/handles.

Cleanup hooks

Cleanup hooks are provided that run before the Environment is destroyed. They can be added and removed through by using env->AddCleanupHook(callback, hint); and env->RemoveCleanupHook(callback, hint);, where callback takes a void* hint argument.

Inside these cleanup hooks, new asynchronous operations may be started on the event loop, although ideally that is avoided as much as possible.

Every BaseObject has its own cleanup hook that deletes it. For ReqWrap and HandleWrap instances, cleanup of the associated libuv objects is performed automatically, i.e. handles are closed and requests are cancelled if possible.

Closing libuv handles

If a libuv handle is not managed through a HandleWrap instance, it needs to be closed explicitly. Do not use uv_close() for that, but rather env->CloseHandle(), which works the same way but keeps track of the number of handles that are still closing.

Closing libuv requests

There is no way to abort libuv requests in general. If a libuv request is not managed through a ReqWrap instance, the env->IncreaseWaitingRequestCounter() and env->DecreaseWaitingRequestCounter() functions need to be used to keep track of the number of active libuv requests.

Calling into JavaScript

Calling into JavaScript is not allowed during cleanup. Worker threads explicitly forbid this during their shutdown sequence, but the main thread does not for backwards compatibility reasons.

When calling into JavaScript without using MakeCallback(), check the env->can_call_into_js() flag and do not proceed if it is set to false.

Classes associated with JavaScript objects

MemoryRetainer

A large number of classes in the Node.js C++ codebase refer to other objects. The MemoryRetainer class is a helper for annotating C++ classes with information that can be used by the heap snapshot builder in V8, so that memory retained by C++ can be tracked in V8 heap snapshots captured in Node.js applications.

Inheriting from the MemoryRetainer class enables objects (both from JavaScript and C++) to refer to instances of that class, and in turn enables that class to point to other objects as well, including native C++ types such as std::string and track their memory usage.

This can be useful for debugging memory leaks.

The memory_tracker.h header file explains how to use this class.

BaseObject

A frequently recurring situation is that a JavaScript object and a C++ object need to be tied together. BaseObject is the main abstraction for that in Node.js, and most classes that are associated with JavaScript objects are subclasses of it. It is defined in base_object.h.

Every BaseObject is associated with one Environment and one v8::Object. The v8::Object needs to have at least one internal field that is used for storing the pointer to the C++ object. In order to ensure this, the V8 SetInternalFieldCount() function is usually used when setting up the class from C++.

The JavaScript object can be accessed as a v8::Local<v8::Object> by using self->object(), given a BaseObject named self.

Accessing a BaseObject from a v8::Local<v8::Object> (frequently that is args.This() or args.Holder() in a binding function) can be done using the Unwrap<T>(obj) function, where T is a subclass of BaseObject. A helper for this is the ASSIGN_OR_RETURN_UNWRAP macro that returns from the current function if unwrapping fails (typically that means that the BaseObject has been deleted earlier).

void Http2Session::Request(const FunctionCallbackInfo<Value>& args) {
  Http2Session* session;
  ASSIGN_OR_RETURN_UNWRAP(&session, args.Holder());
  Environment* env = session->env();
  Local<Context> context = env->context();
  Isolate* isolate = env->isolate();

  // ...
  // The actual function body, which can now use the `session` object.
  // ...
}

Lifetime management

The BaseObject class comes with a set of features that allow managing the lifetime of its instances, either associating it with the lifetime of the corresponding JavaScript object or untying the two.

The BaseObject::MakeWeak() method turns the underlying Global handle into a weak one, and makes it so that the BaseObject::OnGCCollect() virtual method is called when the JavaScript object is garbage collected. By default, that methods deletes the BaseObject instance.

BaseObject::ClearWeak() undoes this effect.

It generally makes sense to call MakeWeak() in the constructor of a BaseObject subclass, unless that subclass is referred to by e.g. the event loop, as is the case for the HandleWrap and ReqWrap classes.

In addition, there are two kinds of smart pointers that can be used to refer to BaseObjects.

BaseObjectWeakPtr<T> is similar to std::weak_ptr<T>, but holds on to an object of a BaseObject subclass T and integrates with the lifetime management of the former. When the BaseObject no longer exists, e.g. when it was garbage collected, accessing it through weak_ptr.get() will return nullptr.

BaseObjectPtr<T> is similar to std::shared_ptr<T>, but also holds on to objects of a BaseObject subclass T. While there are BaseObjectPtrs pointing to a given object, the BaseObject will always maintain a strong reference to its associated JavaScript object. This can be useful when one BaseObject refers to another BaseObject and wants to make sure it stays alive during the lifetime of that reference.

A BaseObject can be “detached” throught the BaseObject::Detach() method. In this case, it will be deleted once the last BaseObjectPtr referring to it is destroyed. There must be at least one such pointer when Detach() is called. This can be useful when one BaseObject fully owns another BaseObject.

AsyncWrap

AsyncWrap is a subclass of BaseObject that additionally provides tracking functions for asynchronous calls. It is commonly used for classes whose methods make calls into JavaScript without any JavaScript stack below, i.e. more or less directly from the event loop. It is defined in async_wrap.h.

Every AsyncWrap subclass has a “provider type”. A list of provider types is maintained in src/async_wrap.h.

Every AsyncWrap instance is associated with two numbers, the “async id” and the “async trigger id”. The “async id” is generally unique per AsyncWrap instance, and only changes when the object is re-used in some way.

See the async_hooks module documentation for more information about how this information is provided to async tracking tools.

MakeCallback

The AsyncWrap class has a set of methods called MakeCallback(), with the intention of the naming being that it is used to “make calls back into JavaScript” from the event loop, rather than making callbacks in some way. (As the naming has made its way into Node.jss public API, its not worth the breakage of fixing it).

MakeCallback() generally calls a method on the JavaScript object associated with the current AsyncWrap, and informs async tracking code about these calls as well as takes care of running the process.nextTick() and Promise task queues once it returns.

Before calling MakeCallback(), it is typically necessary to enter both a HandleScope and a Context::Scope.

void StatWatcher::Callback(uv_fs_poll_t* handle,
                           int status,
                           const uv_stat_t* prev,
                           const uv_stat_t* curr) {
  // Get the StatWatcher instance associated with this call from libuv,
  // StatWatcher is a subclass of AsyncWrap.
  StatWatcher* wrap = ContainerOf(&StatWatcher::watcher_, handle);
  Environment* env = wrap->env();
  HandleScope handle_scope(env->isolate());
  Context::Scope context_scope(env->context());

  // Transform 'prev' and 'curr' into an array:
  Local<Value> arr = ...;

  Local<Value> argv[] = { Integer::New(env->isolate(), status), arr };
  wrap->MakeCallback(env->onchange_string(), arraysize(argv), argv);
}

See Callback scopes for more information.

HandleWrap

HandleWrap is a subclass of AsyncWrap specifically designed to make working with libuv handles easier. It provides the .ref(), .unref() and .hasRef() methods as well as .close() to enable easier lifetime management from JavaScript. It is defined in handle_wrap.h.

HandleWrap instances are cleaned up automatically when the current Node.js Environment is destroyed, e.g. when a Worker thread stops.

HandleWrap also provides facilities for diagnostic tooling to get an overview over libuv handles managed by Node.js.

ReqWrap

ReqWrap is a subclass of AsyncWrap specifically designed to make working with libuv requests easier. It is defined in req_wrap.h.

In particular, its Dispatch() method is designed to avoid the need to keep track of the current count of active libuv requests.

ReqWrap also provides facilities for diagnostic tooling to get an overview over libuv handles managed by Node.js.

Callback scopes

The public CallbackScope and the internally used InternalCallbackScope classes provide the same facilities as MakeCallback(), namely:

  • Emitting the 'before' event for async tracking when entering the scope
  • Setting the current async IDs to the ones passed to the constructor
  • Emitting the 'after' event for async tracking when leaving the scope
  • Running the process.nextTick() queue
  • Running microtasks, in particular Promise callbacks and async/await functions

Usually, using AsyncWrap::MakeCallback() or using the constructor taking an AsyncWrap* argument (i.e. used as InternalCallbackScope callback_scope(this);) suffices inside of Node.jss C++ codebase.

C++ utilities

Node.js uses a few custom C++ utilities, mostly defined in util.h.

Memory allocation

Node.js provides Malloc(), Realloc() and Calloc() functions that work like their C stdlib counterparts, but crash if memory cannot be allocated. (As V8 does not handle out-of-memory situations gracefully, it does not make sense for Node.js to attempt to do so in all cases.)

The UncheckedMalloc(), UncheckedRealloc() and UncheckedCalloc() functions return nullptr in these cases (or when size == 0).

Optional stack-based memory allocation

The MaybeStackBuffer class provides a way to allocate memory on the stack if it is smaller than a given limit, and falls back to allocating it on the heap if it is larger. This can be useful for performantly allocating temporary data if it is typically expected to be small (e.g. file paths).

The Utf8Value, TwoByteValue (i.e. UTF-16 value) and BufferValue (Utf8Value but copy data from a Buffer if one is passed) helpers inherit from this class and allow accessing the characters in a JavaScript string this way.

static void Chdir(const FunctionCallbackInfo<Value>& args) {
  Environment* env = Environment::GetCurrent(args);
  // ...
  CHECK(args[0]->IsString());
  Utf8Value path(env->isolate(), args[0]);
  int err = uv_chdir(*path);
  if (err) {
    // ... error handling ...
  }
}

Assertions

Node.js provides a few macros that behave similar to assert():

  • CHECK(expression) aborts the process with a stack trace if expression is false.
  • CHECK_EQ(a, b) checks for a == b
  • CHECK_GE(a, b) checks for a >= b
  • CHECK_GT(a, b) checks for a > b
  • CHECK_LE(a, b) checks for a <= b
  • CHECK_LT(a, b) checks for a < b
  • CHECK_NE(a, b) checks for a != b
  • CHECK_NULL(val) checks for a == nullptr
  • CHECK_NOT_NULL(val) checks for a != nullptr
  • CHECK_IMPLIES(a, b) checks that b is true if a is true.
  • UNREACHABLE([message]) aborts the process if it is reached.

CHECKs are always enabled. For checks that should only run in debug mode, use DCHECK(), DCHECK_EQ(), etc.

Scope-based cleanup

The OnScopeLeave() function can be used to run a piece of code when leaving the current C++ scope.

static void GetUserInfo(const FunctionCallbackInfo<Value>& args) {
  Environment* env = Environment::GetCurrent(args);
  uv_passwd_t pwd;
  // ...

  const int err = uv_os_get_passwd(&pwd);

  if (err) {
    // ... error handling, return early ...
  }

  auto free_passwd = OnScopeLeave([&]() { uv_os_free_passwd(&pwd); });

  // ...
  // Turn `pwd` into a JavaScript object now; whenever we return from this
  // function, `uv_os_free_passwd()` will be called.
  // ...
}