Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
michael@0 | 1 | try{} catch (x) {} |
michael@0 | 2 | |
michael@0 | 3 | var callStack = []; |
michael@0 | 4 | function currentFunc() { |
michael@0 | 5 | return callStack[0]; |
michael@0 | 6 | } |
michael@0 | 7 | function reportFailure () { |
michael@0 | 8 | var funcName = currentFunc(); |
michael@0 | 9 | // play with the result to cause a SEGV. |
michael@0 | 10 | var prefix = (funcName) ? funcName : ""; |
michael@0 | 11 | // Use OSR to compile the function at the end of the first run. |
michael@0 | 12 | for (var i=0; i < 50; i++) ; |
michael@0 | 13 | } |
michael@0 | 14 | |
michael@0 | 15 | callStack[0] = 'test'; |
michael@0 | 16 | // Run and compile with a string as result of currentFunc. |
michael@0 | 17 | reportFailure(); |
michael@0 | 18 | callStack[0] = undefined; |
michael@0 | 19 | // Use previously compiled code with the string assumption. |
michael@0 | 20 | reportFailure(); |