s390_irgen_KEB(UChar r1, IRTemp op2addr)
{
return s390_irgen_CxB("keb", r1, op2addr, Ity_F32, Iop_CmpF32);
- return "keb";
}
static const HChar *
default:
goto bad;
}
+ // PJF Coverity may be right but I'd reather keep the unreachable code
+ // "just in case" that conditions above ever change
+ // coverity[UNREACHABLE:FALSE]
goto done;
}
if (nsegments[i].hasW) seg_prot |= VKI_PROT_WRITE;
if (nsegments[i].hasX) seg_prot |= VKI_PROT_EXEC;
+#if defined(VGO_darwin) || defined(VGO_freebsd)
+ // GrP fixme kernel info doesn't have dev/inode
+ cmp_devino = False;
+
+ // GrP fixme V and kernel don't agree on offsets
+ cmp_offsets = False;
+#else
cmp_offsets
= nsegments[i].kind == SkFileC || nsegments[i].kind == SkFileV;
cmp_devino
= nsegments[i].dev != 0 || nsegments[i].ino != 0;
+#endif
/* Consider other reasons to not compare dev/inode */
#if defined(VGO_linux)
if (filename && VG_(strstr)(filename, "/.lib-ro/"))
cmp_devino = False;
#endif
-
-#if defined(VGO_darwin) || defined(VGO_freebsd)
- // GrP fixme kernel info doesn't have dev/inode
- cmp_devino = False;
-
- // GrP fixme V and kernel don't agree on offsets
- cmp_offsets = False;
-#endif
/* If we are doing sloppy execute permission checks then we
allow segment to have X permission when we weren't expecting