diff options
author | 2025-01-03 16:00:13 +0000 | |
---|---|---|
committer | 2025-01-07 01:25:17 -0800 | |
commit | ba8f35fc6098821989e5ce6101b5520a7d1794c5 (patch) | |
tree | 1a08f4a80c800376299fc4ee6ecdc7bfd69ac066 /dex2oat | |
parent | 7d019711618186490029b5504ebca0f647a5cb7a (diff) |
verifier: Speed up `ComputeWidthsAndCountOps()`.
And avoid arithmetic overflow for `fill-array-data-payload`.
Test: m test-art-host-gtest
Test: testrunner.py --host --optimizing
Bug: 181943478
Change-Id: I199cb2a43308854bf3c4e8e5a2d65a1a351f4bf9
Diffstat (limited to 'dex2oat')
-rw-r--r-- | dex2oat/dex2oat_test.cc | 9 |
1 files changed, 0 insertions, 9 deletions
diff --git a/dex2oat/dex2oat_test.cc b/dex2oat/dex2oat_test.cc index f81345b345..7013bbce0c 100644 --- a/dex2oat/dex2oat_test.cc +++ b/dex2oat/dex2oat_test.cc @@ -1816,13 +1816,6 @@ TEST_F(Dex2oatTest, AppImageResolveStrings) { const_cast<Instruction&>(last_instruction.Inst()) .SetOpcode(Instruction::CONST_STRING_JUMBO); mutated_successfully = true; - // Test that the safe iterator doesn't go past the end. - SafeDexInstructionIterator it2(instructions.begin(), instructions.end()); - while (!it2.IsErrorState()) { - ++it2; - } - EXPECT_TRUE(it2 == last_instruction); - EXPECT_TRUE(it2 < instructions.end()); methods.push_back(method.GetIndex()); mutated_successfully = true; } else if (method_name == "startUpMethod") { @@ -1890,8 +1883,6 @@ TEST_F(Dex2oatTest, AppImageResolveStrings) { // Classes initializers EXPECT_TRUE(seen.find("Startup init") != seen.end()); EXPECT_TRUE(seen.find("Other class init") == seen.end()); - // Expect the sets match. - EXPECT_GE(seen.size(), seen.size()); // Verify what strings are marked as boot image. std::set<std::string> boot_image_strings; |