[Webkit-unassigned] [Bug 122472] Win64 JIT broken

bugzilla-daemon at webkit.org bugzilla-daemon at webkit.org
Tue Oct 8 15:33:29 PDT 2013


https://bugs.webkit.org/show_bug.cgi?id=122472





--- Comment #5 from Alex Christensen <alex.christensen at flexsim.com>  2013-10-08 15:32:19 PST ---
The first, second, and third argument registers worked with ecx, edx, and r8.  I've tried changing them with no success.

For those of you who like reading disassembled JIT code, here's what the JIT is generating.  I put a break point in the first line of operationNewRegexp to get this.  I hope this helps:

00000000088400B5  add         byte ptr [rbp-77h],cl  
00000000088400B8  pop         rbp  
00000000088400B9  mov         eax,0ABB49h  
00000000088400BE  add         byte ptr [rax],al  
00000000088400C0  add         byte ptr [rax],al  
00000000088400C2  add         byte ptr [rax],al  
00000000088400C4  mov         qword ptr [r13-50h],r11  
00000000088400C8  mov         r11,0  
00000000088400D2  mov         qword ptr [r13],r11  
00000000088400D6  cmp         qword ptr [r13],0  
00000000088400DB  jne         0000000008840112  
00000000088400E1  mov         rcx,rsp  
00000000088400E4  mov         qword ptr [rsp+0A0h],r13  
00000000088400EC  mov         dword ptr [r13+34h],4  
00000000088400F4  mov         r11,8A72C80h  
00000000088400FE  mov         qword ptr [r11],r13  
0000000008840101  mov         r11,5C0BA10h  
000000000884010B  call        r11  
000000000884010E  mov         qword ptr [r13],rax  
0000000008840112  mov         rax,87EF970h  
000000000884011C  mov         qword ptr [r13-58h],rax  
0000000008840120  mov         rax,qword ptr [0000000008B4C010h]  
000000000884012A  mov         qword ptr [r13-60h],rax  
000000000884012E  test        r15,rax  
0000000008840131  jne         00000000088407EB  
0000000008840137  mov         r11,0D1E7BEEFh  
0000000008840141  cmp         qword ptr [rax],r11  
0000000008840144  jne         00000000088407EB  
000000000884014A  mov         rax,qword ptr [rax+8]  
000000000884014E  mov         rax,qword ptr [rax]  
0000000008840152  mov         qword ptr [r13-58h],rax  
0000000008840156  test        r15,rax  
0000000008840159  jne         0000000008840835  
000000000884015F  mov         r11,0D1E7BEEFh  
0000000008840169  cmp         qword ptr [rax],r11  
000000000884016C  jne         0000000008840835  
0000000008840172  mov         rax,qword ptr [rax+8]  
0000000008840176  mov         rax,qword ptr [rax]  
000000000884017A  mov         qword ptr [r13-58h],rax  
000000000884017E  test        r15,rax  
0000000008840181  jne         000000000884087F  
0000000008840187  mov         r11,0D1E7BEEFh  
0000000008840191  cmp         qword ptr [rax],r11  
0000000008840194  jne         000000000884087F  
000000000884019A  mov         rax,qword ptr [rax+8]  
000000000884019E  mov         rax,qword ptr [rax]  
00000000088401A2  mov         qword ptr [r13-8],rax  
00000000088401A6  mov         rax,87EF970h  
00000000088401B0  mov         qword ptr [r13-58h],rax  
00000000088401B4  mov         rax,qword ptr [0000000008B4C010h]  
00000000088401BE  mov         qword ptr [r13-60h],rax  
00000000088401C2  test        r15,rax  
00000000088401C5  jne         00000000088408C9  
00000000088401CB  mov         r11,0D1E7BEEFh  
00000000088401D5  cmp         qword ptr [rax],r11  
00000000088401D8  jne         00000000088408C9  
00000000088401DE  mov         rax,qword ptr [rax+8]  
00000000088401E2  mov         rax,qword ptr [rax]  
00000000088401E6  mov         qword ptr [r13-10h],rax  
00000000088401EA  mov         rax,qword ptr [r13-10h]  
00000000088401EE  test        r15,rax  
00000000088401F1  jne         0000000008840913  
00000000088401F7  mov         r11,0D1E7BEEFh  
0000000008840201  cmp         qword ptr [rax],r11  
0000000008840204  jne         0000000008840913  
000000000884020A  mov         rax,qword ptr [rax+8]  
000000000884020E  mov         rax,qword ptr [rax]  
0000000008840212  mov         qword ptr [r13-18h],rax  
0000000008840216  mov         rax,qword ptr [r13-18h]  
000000000884021A  mov         qword ptr [r13-70h],rax  
000000000884021E  test        r15,rax  
0000000008840221  jne         000000000884095D  
0000000008840227  mov         r11,0D1E7BEEFh  
0000000008840231  cmp         qword ptr [rax],r11  
0000000008840234  jne         000000000884095D  
000000000884023A  mov         rax,qword ptr [rax+8]  
000000000884023E  mov         rax,qword ptr [rax]  
0000000008840242  mov         qword ptr [r13-58h],rax  
0000000008840246  mov         r11,7D0FB30h  
0000000008840250  mov         qword ptr [r13-68h],r11  
0000000008840254  mov         r11,0FFFF000000000000h  
000000000884025E  mov         qword ptr [r13-60h],r11  
0000000008840262  lea         rdx,[r13-0A8h]  
0000000008840269  mov         dword ptr [rdx+30h],3  
0000000008840270  mov         dword ptr [r13+34h],5Eh  
0000000008840278  mov         qword ptr [rdx+28h],r13  
000000000884027C  mov         qword ptr [rdx+20h],rax  
0000000008840280  mov         r13,rdx  
0000000008840283  mov         r11,0  
000000000884028D  cmp         rax,r11  
0000000008840290  jne         00000000088409A7  
0000000008840296  mov         rdx,qword ptr [rax+20h]  
000000000884029A  mov         qword ptr [r13+18h],rdx  
000000000884029E  call        00000000088402A3  
00000000088402A3  mov         qword ptr [r13-20h],rax  
00000000088402A7  mov         rsi,8E0FE70h  
00000000088402B1  mov         rdi,r13  
00000000088402B4  mov         dword ptr [r13+34h],67h  
00000000088402BC  mov         r11,8A72C80h  
00000000088402C6  mov         qword ptr [r11],r13  
00000000088402C9  mov         r11,5BF4100h  
00000000088402D3  call        r11  
00000000088402D6  mov         r11,8A74778h               <- VISUAL STUDIO SAYS THIS IS THE CURRENT STATEMENT AND 0 IS IN r11
00000000088402E0  mov         r11,qword ptr [r11]  
00000000088402E3  test        r11,r11  
00000000088402E6  jne         0000000008841039  
00000000088402EC  mov         qword ptr [r13-28h],rax  
00000000088402F0  mov         r11,94E6F70h  
00000000088402FA  mov         qword ptr [rsp+28h],r11  
00000000088402FF  mov         rcx,rsp  
0000000008840302  mov         qword ptr [rsp+0A0h],r13  
000000000884030A  mov         dword ptr [r13+34h],6Ah  
0000000008840312  mov         r11,8A72C80h  
000000000884031C  mov         qword ptr [r11],r13  
000000000884031F  mov         r11,5C0E410h  
0000000008840329  call        r11  
000000000884032C  mov         qword ptr [r13-30h],rax  
0000000008840330  mov         rax,qword ptr [r13-10h]  
0000000008840334  test        r15,rax  
0000000008840337  jne         00000000088409B5  
000000000884033D  mov         r11,0D1E7BEEFh  
0000000008840347  cmp         qword ptr [rax],r11  
000000000884034A  jne         00000000088409B5  
0000000008840350  mov         rax,qword ptr [rax+8]  
0000000008840354  mov         rax,qword ptr [rax]  
0000000008840358  mov         qword ptr [r13-38h],rax  
000000000884035C  mov         r11,94E6E70h  
0000000008840366  mov         qword ptr [rsp+28h],r11  
000000000884036B  mov         rcx,rsp  
000000000884036E  mov         qword ptr [rsp+0A0h],r13  
0000000008840376  mov         dword ptr [r13+34h],76h  
000000000884037E  mov         r11,8A72C80h  
0000000008840388  mov         qword ptr [r11],r13  
000000000884038B  mov         r11,5C0E410h  
0000000008840395  call        r11

-- 
Configure bugmail: https://bugs.webkit.org/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.



More information about the webkit-unassigned mailing list