| Summary: | Fix MacroAssemblerARM64E::validateUntaggedPtr() to account for TBI. | ||||||||
|---|---|---|---|---|---|---|---|---|---|
| Product: | WebKit | Reporter: | Mark Lam <mark.lam> | ||||||
| Component: | JavaScriptCore | Assignee: | Mark Lam <mark.lam> | ||||||
| Status: | RESOLVED FIXED | ||||||||
| Severity: | Normal | CC: | ews-watchlist, fpizlo, keith_miller, msaboff, rmorisset, saam, tzagallo, webkit-bug-importer, ysuzuki | ||||||
| Priority: | P2 | Keywords: | InRadar | ||||||
| Version: | WebKit Nightly Build | ||||||||
| Hardware: | Unspecified | ||||||||
| OS: | Unspecified | ||||||||
| Attachments: |
|
||||||||
|
Description
Mark Lam
2020-12-18 11:30:42 PST
Created attachment 416537 [details]
proposed patch.
Comment on attachment 416537 [details] proposed patch. View in context: https://bugs.webkit.org/attachment.cgi?id=416537&action=review > Source/JavaScriptCore/assembler/MacroAssemblerARM64E.h:-86 > - load8(Address(target), scratch); We should DisallowScratch here, to make sure we're not relying on it. It'd kill your scratch > Source/JavaScriptCore/assembler/MacroAssemblerARM64E.h:87 > + and64(TrustedImm64(0xff000000000000), scratch, scratch); 0x0f000000000000, right? Comment on attachment 416537 [details] proposed patch. View in context: https://bugs.webkit.org/attachment.cgi?id=416537&action=review >> Source/JavaScriptCore/assembler/MacroAssemblerARM64E.h:87 >> + and64(TrustedImm64(0xff000000000000), scratch, scratch); > > 0x0f000000000000, right? ignore this Created attachment 416540 [details]
patch for landing.
Thanks for the review.
Landed in r270988: <http://trac.webkit.org/r270988>. Also landed a build fix in r270993: <http://trac.webkit.org/r270993>. |