diff options
author | Vladimir Marko <vmarko@google.com> | 2018-08-14 13:52:12 +0000 |
---|---|---|
committer | Vladimir Marko <vmarko@google.com> | 2018-08-15 15:50:39 +0100 |
commit | d887ed8228ea2f8dfd3a178a0d0923275402e1fd (patch) | |
tree | 371d9baee8747966818904962fc99d5834a489c6 /compiler/optimizing/graph_visualizer.cc | |
parent | d7a0192ffa9c9015f0980b1aaa694e914a37d57f (diff) |
Revert^2 "ARM: Reimplement the UnsafeCASObject intrinsic."
This reverts commit f28be439b97623ebad540f7a1e3f9f1e3436b001.
The regression test for the revert reason was added in
https://android-review.googlesource.com/731508 .
We fix the problem by introducing a specialized entrypoint
for the UnsafeCASObject intrinsic introspection marking
where we read the destination register from the right bits.
Change-Id: I1838abe05474be009d0fd96125efebd7f6dd9c59
Test: m test-art-host-gtest
Test: Pixel 2 XL boots.
Test: testrunner.py --target --optimizing --32
Test: ART_HEAP_POISONING=true testrunner.py --target --optimizing --32
Bug: 36141117
Diffstat (limited to 'compiler/optimizing/graph_visualizer.cc')
0 files changed, 0 insertions, 0 deletions