11510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org// Copyright 2013 the V8 project authors. All rights reserved. 21510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org// Copyright (C) 2005, 2006, 2007, 2008, 2009 Apple Inc. All rights reserved. 31510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org// 41510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org// Redistribution and use in source and binary forms, with or without 51510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org// modification, are permitted provided that the following conditions 61510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org// are met: 71510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org// 1. Redistributions of source code must retain the above copyright 81510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org// notice, this list of conditions and the following disclaimer. 91510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org// 2. Redistributions in binary form must reproduce the above copyright 101510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org// notice, this list of conditions and the following disclaimer in the 111510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org// documentation and/or other materials provided with the distribution. 121510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org// 131510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org// THIS SOFTWARE IS PROVIDED BY APPLE INC. AND ITS CONTRIBUTORS ``AS IS'' AND ANY 141510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org// EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED 151510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org// WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE 161510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org// DISCLAIMED. IN NO EVENT SHALL APPLE INC. OR ITS CONTRIBUTORS BE LIABLE FOR ANY 171510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org// DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES 181510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org// (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; 191510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org// LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON 201510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org// ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 211510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org// (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS 221510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org// SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 231510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org 241510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.orgdescription( 251510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org"Tests that constant folding an access to an uncaptured variable that is captured later in the same basic block doesn't lead to assertion failures." 261510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org); 271510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org 281510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.orgvar thingy = 456; 291510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org 301510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.orgfunction bar() { 311510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org return thingy; 321510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org} 331510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org 341510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.orgfunction baz(a) { 351510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org if (a) // Here we have an access to r2. The bug was concerned with our assertions thinking that this access was invalid. 361510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org return arguments; // Force r2 (see below) to get captured. 371510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org} 381510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org 391510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.orgfunction foo(p, a) { 401510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org // The temporary variable corresponding to the 'bar' callee coming out of the ternary expression will be allocated by 411510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org // the bytecompiler to some virtual register, say r2. This expression is engineered so that (1) the virtual register 421510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org // chosen for the callee here is the same as the one that will be chosen for the first non-this argument below, 431510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org // (2) that the callee ends up being constant but requires CFA to prove it, and (3) that we actually load that constant 441510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org // using GetLocal (which happens because of the CheckFunction to check the callee). 451510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org var x = (a + 1) + (p ? bar : bar)(); 461510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org // The temporary variable corresponding to the first non-this argument to baz will be allocated to the same virtual 471510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org // register (i.e. r2). 481510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org return baz(x); 491510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org} 501510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org 511510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.orgfor (var i = 0; i < 100; ++i) 521510d58cbcf57c82a10e7d390bfe21a7ae68ba43mstarzinger@chromium.org shouldBe("foo(true, 5)[0]", "462"); 53