Ben Murdoch | b8a8cc1 | 2014-11-26 15:28:44 +0000 | [diff] [blame^] | 1 | // Copyright 2013 the V8 project authors. All rights reserved. |
| 2 | // Copyright (C) 2005, 2006, 2007, 2008, 2009 Apple Inc. All rights reserved. |
| 3 | // |
| 4 | // Redistribution and use in source and binary forms, with or without |
| 5 | // modification, are permitted provided that the following conditions |
| 6 | // are met: |
| 7 | // 1. Redistributions of source code must retain the above copyright |
| 8 | // notice, this list of conditions and the following disclaimer. |
| 9 | // 2. Redistributions in binary form must reproduce the above copyright |
| 10 | // notice, this list of conditions and the following disclaimer in the |
| 11 | // documentation and/or other materials provided with the distribution. |
| 12 | // |
| 13 | // THIS SOFTWARE IS PROVIDED BY APPLE INC. AND ITS CONTRIBUTORS ``AS IS'' AND ANY |
| 14 | // EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED |
| 15 | // WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE |
| 16 | // DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR ITS CONTRIBUTORS BE LIABLE FOR ANY |
| 17 | // DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES |
| 18 | // (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; |
| 19 | // LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON |
| 20 | // ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
| 21 | // (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS |
| 22 | // SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
| 23 | |
| 24 | description( |
| 25 | "Tests that constant folding an access to an uncaptured variable that is captured later in the same basic block doesn't lead to assertion failures." |
| 26 | ); |
| 27 | |
| 28 | var thingy = 456; |
| 29 | |
| 30 | function bar() { |
| 31 | return thingy; |
| 32 | } |
| 33 | |
| 34 | function baz(a) { |
| 35 | if (a) // Here we have an access to r2. The bug was concerned with our assertions thinking that this access was invalid. |
| 36 | return arguments; // Force r2 (see below) to get captured. |
| 37 | } |
| 38 | |
| 39 | function foo(p, a) { |
| 40 | // The temporary variable corresponding to the 'bar' callee coming out of the ternary expression will be allocated by |
| 41 | // the bytecompiler to some virtual register, say r2. This expression is engineered so that (1) the virtual register |
| 42 | // chosen for the callee here is the same as the one that will be chosen for the first non-this argument below, |
| 43 | // (2) that the callee ends up being constant but requires CFA to prove it, and (3) that we actually load that constant |
| 44 | // using GetLocal (which happens because of the CheckFunction to check the callee). |
| 45 | var x = (a + 1) + (p ? bar : bar)(); |
| 46 | // The temporary variable corresponding to the first non-this argument to baz will be allocated to the same virtual |
| 47 | // register (i.e. r2). |
| 48 | return baz(x); |
| 49 | } |
| 50 | |
| 51 | for (var i = 0; i < 100; ++i) |
| 52 | shouldBe("foo(true, 5)[0]", "462"); |