Wed, 31 Dec 2014 06:09:35 +0100
Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.
michael@0 | 1 | function run_test() { |
michael@0 | 2 | let p = Cc["@mozilla.org/tools/profiler;1"]; |
michael@0 | 3 | // Just skip the test if the profiler component isn't present. |
michael@0 | 4 | if (!p) |
michael@0 | 5 | return; |
michael@0 | 6 | p = p.getService(Ci.nsIProfiler); |
michael@0 | 7 | if (!p) |
michael@0 | 8 | return; |
michael@0 | 9 | |
michael@0 | 10 | do_check_true(!p.IsActive()); |
michael@0 | 11 | |
michael@0 | 12 | // The function is entered with the profiler disabled. |
michael@0 | 13 | (function (){ |
michael@0 | 14 | p.StartProfiler(100, 10, ["js"], 1); |
michael@0 | 15 | let n = 10000; |
michael@0 | 16 | while (--n); // OSR happens here with the profiler enabled. |
michael@0 | 17 | // An assertion will fail when this function returns, if the |
michael@0 | 18 | // SPS stack was misbalanced. |
michael@0 | 19 | })(); |
michael@0 | 20 | p.StopProfiler(); |
michael@0 | 21 | } |