diff options
author | Etienne Bergeron <etienneb@google.com> | 2016-09-30 14:31:39 +0000 |
---|---|---|
committer | Etienne Bergeron <etienneb@google.com> | 2016-09-30 14:31:39 +0000 |
commit | cde78361d9051934128a8d265048829b1a5b5f19 (patch) | |
tree | add763ef8e5fcde9674272d02d00baefdefc9d3c /llvm/lib/Transforms/Vectorize/LoopVectorize.cpp | |
parent | 04a9eb4c0fc4236ef2607dc84b723fd19e2f589e (diff) | |
download | bcm5719-llvm-cde78361d9051934128a8d265048829b1a5b5f19.tar.gz bcm5719-llvm-cde78361d9051934128a8d265048829b1a5b5f19.zip |
[compiler-rt][asan] Disable a broken test on windows 64-bits
Summary:
This test is broken on wndows 64-bit.
The interception library is not able to hook on the memchr functions.
Snippet of the function that is not hookable:
```
--- No source file -------------------------------------------------------------
000007FEFA1A18CD CC int 3
000007FEFA1A18CE CC int 3
000007FEFA1A18CF CC int 3
--- f:\dd\vctools\crt\vcruntime\src\string\amd64_arm_arm64\memchr.c ------------
while ( cnt && (*(unsigned char *)buf != (unsigned char)chr) ) {
000007FEFA1A18D0 4D 85 C0 test r8,r8
000007FEFA1A18D3 74 0D je memchr+12h (07FEFA1A18E2h)
000007FEFA1A18D5 38 11 cmp byte ptr [rcx],dl
000007FEFA1A18D7 74 09 je memchr+12h (07FEFA1A18E2h)
buf = (unsigned char *)buf + 1;
000007FEFA1A18D9 48 FF C1 inc rcx
cnt--;
000007FEFA1A18DC 49 83 E8 01 sub r8,1
000007FEFA1A18E0 75 F3 jne memchr+5h (07FEFA1A18D5h)
}
```
Reviewers: rnk
Subscribers: kubabrecka, dberris, llvm-commits, chrisha
Differential Revision: https://reviews.llvm.org/D25037
llvm-svn: 282860
Diffstat (limited to 'llvm/lib/Transforms/Vectorize/LoopVectorize.cpp')
0 files changed, 0 insertions, 0 deletions