js/src/jit-test/tests/gc/bug-961877.js

Wed, 31 Dec 2014 06:09:35 +0100

author
Michael Schloh von Bennewitz <michael@schloh.com>
date
Wed, 31 Dec 2014 06:09:35 +0100
changeset 0
6474c204b198
permissions
-rw-r--r--

Cloned upstream origin tor-browser at tor-browser-31.3.0esr-4.5-1-build1
revision ID fc1c9ff7c1b2defdbc039f12214767608f46423f for hacking purpose.

     1 g = Function("", "for (var i = 0; i < 0; ++i) { eval('this.arg'+0 +'=arg'+0); }");
     2 Math.abs(undefined);
     3 gczeal(2,300);
     4 evaluate("\
     5 var toFloat32 = (function() {\
     6     var f32 = new Float32Array(1);\
     7     function f(x) f32[0] = x;\
     8     return f;\
     9 })();\
    10 for (var i = 0; i < 64; ++i) {\
    11     var p = Math.pow(2, i) + 1;\
    12     g(toFloat32(p));\
    13     toFloat32(-p);\
    14 }");

mercurial