js/src/jit-test/tests/gc/bug-961877.js

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

michael@0 1 g = Function("", "for (var i = 0; i < 0; ++i) { eval('this.arg'+0 +'=arg'+0); }");
michael@0 2 Math.abs(undefined);
michael@0 3 gczeal(2,300);
michael@0 4 evaluate("\
michael@0 5 var toFloat32 = (function() {\
michael@0 6 var f32 = new Float32Array(1);\
michael@0 7 function f(x) f32[0] = x;\
michael@0 8 return f;\
michael@0 9 })();\
michael@0 10 for (var i = 0; i < 64; ++i) {\
michael@0 11 var p = Math.pow(2, i) + 1;\
michael@0 12 g(toFloat32(p));\
michael@0 13 toFloat32(-p);\
michael@0 14 }");

mercurial