| Index: src/arm/builtins-arm.cc
|
| diff --git a/src/arm/builtins-arm.cc b/src/arm/builtins-arm.cc
|
| index 40531caf4587d2de86c04805a084994246a1334a..e14570c542dd365787062d8c98a2bbbc7a183e9d 100644
|
| --- a/src/arm/builtins-arm.cc
|
| +++ b/src/arm/builtins-arm.cc
|
| @@ -830,6 +830,39 @@ void Builtins::Generate_JSConstructStubForDerived(MacroAssembler* masm) {
|
| }
|
|
|
|
|
| +enum IsTagged { kArgcIsSmiTagged, kArgcIsUntaggedInt };
|
| +
|
| +
|
| +// Clobbers r2; preserves all other registers.
|
| +static void Generate_CheckStackOverflow(MacroAssembler* masm,
|
| + const int calleeOffset, Register argc,
|
| + IsTagged argc_is_tagged) {
|
| + // Check the stack for overflow. We are not trying to catch
|
| + // interruptions (e.g. debug break and preemption) here, so the "real stack
|
| + // limit" is checked.
|
| + Label okay;
|
| + __ LoadRoot(r2, Heap::kRealStackLimitRootIndex);
|
| + // Make r2 the space we have left. The stack might already be overflowed
|
| + // here which will cause r2 to become negative.
|
| + __ sub(r2, sp, r2);
|
| + // Check if the arguments will overflow the stack.
|
| + if (argc_is_tagged == kArgcIsSmiTagged) {
|
| + __ cmp(r2, Operand::PointerOffsetFromSmiKey(argc));
|
| + } else {
|
| + DCHECK(argc_is_tagged == kArgcIsUntaggedInt);
|
| + __ cmp(r2, Operand(argc, LSL, kPointerSizeLog2));
|
| + }
|
| + __ b(gt, &okay); // Signed comparison.
|
| +
|
| + // Out of stack space.
|
| + __ ldr(r1, MemOperand(fp, calleeOffset));
|
| + __ Push(r1, argc);
|
| + __ InvokeBuiltin(Builtins::STACK_OVERFLOW, CALL_FUNCTION);
|
| +
|
| + __ bind(&okay);
|
| +}
|
| +
|
| +
|
| static void Generate_JSEntryTrampolineHelper(MacroAssembler* masm,
|
| bool is_construct) {
|
| // Called from Generate_JS_Entry
|
| @@ -857,6 +890,14 @@ static void Generate_JSEntryTrampolineHelper(MacroAssembler* masm,
|
| __ push(r1);
|
| __ push(r2);
|
|
|
| + // Check if we have enough stack space to push all arguments.
|
| + // The function is the first thing that was pushed above after entering
|
| + // the internal frame.
|
| + const int kFunctionOffset =
|
| + InternalFrameConstants::kCodeOffset - kPointerSize;
|
| + // Clobbers r2.
|
| + Generate_CheckStackOverflow(masm, kFunctionOffset, r3, kArgcIsUntaggedInt);
|
| +
|
| // Copy arguments to the stack in a loop.
|
| // r1: function
|
| // r3: argc
|
| @@ -1336,29 +1377,6 @@ void Builtins::Generate_FunctionCall(MacroAssembler* masm) {
|
| }
|
|
|
|
|
| -static void Generate_CheckStackOverflow(MacroAssembler* masm,
|
| - const int calleeOffset) {
|
| - // Check the stack for overflow. We are not trying to catch
|
| - // interruptions (e.g. debug break and preemption) here, so the "real stack
|
| - // limit" is checked.
|
| - Label okay;
|
| - __ LoadRoot(r2, Heap::kRealStackLimitRootIndex);
|
| - // Make r2 the space we have left. The stack might already be overflowed
|
| - // here which will cause r2 to become negative.
|
| - __ sub(r2, sp, r2);
|
| - // Check if the arguments will overflow the stack.
|
| - __ cmp(r2, Operand::PointerOffsetFromSmiKey(r0));
|
| - __ b(gt, &okay); // Signed comparison.
|
| -
|
| - // Out of stack space.
|
| - __ ldr(r1, MemOperand(fp, calleeOffset));
|
| - __ Push(r1, r0);
|
| - __ InvokeBuiltin(Builtins::STACK_OVERFLOW, CALL_FUNCTION);
|
| -
|
| - __ bind(&okay);
|
| -}
|
| -
|
| -
|
| static void Generate_PushAppliedArguments(MacroAssembler* masm,
|
| const int argumentsOffset,
|
| const int indexOffset,
|
| @@ -1416,7 +1434,7 @@ static void Generate_ApplyHelper(MacroAssembler* masm, bool targetIsArgument) {
|
| __ InvokeBuiltin(Builtins::APPLY_PREPARE, CALL_FUNCTION);
|
| }
|
|
|
| - Generate_CheckStackOverflow(masm, kFunctionOffset);
|
| + Generate_CheckStackOverflow(masm, kFunctionOffset, r0, kArgcIsSmiTagged);
|
|
|
| // Push current limit and index.
|
| const int kIndexOffset =
|
| @@ -1544,7 +1562,7 @@ static void Generate_ConstructHelper(MacroAssembler* masm) {
|
| __ push(r0);
|
| __ InvokeBuiltin(Builtins::REFLECT_CONSTRUCT_PREPARE, CALL_FUNCTION);
|
|
|
| - Generate_CheckStackOverflow(masm, kFunctionOffset);
|
| + Generate_CheckStackOverflow(masm, kFunctionOffset, r0, kArgcIsSmiTagged);
|
|
|
| // Push current limit and index.
|
| const int kIndexOffset =
|
|
|