From: Julian Seward Date: Tue, 16 Jan 2007 21:42:28 +0000 (+0000) Subject: Intercept _intel_fast_memcpy in the main executable. Partial fix for X-Git-Tag: svn/VALGRIND_3_3_0~419 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=648b3b270774a9485b53a3dbe485fa4392b57d14;p=thirdparty%2Fvalgrind.git Intercept _intel_fast_memcpy in the main executable. Partial fix for #139667. git-svn-id: svn://svn.valgrind.org/valgrind/trunk@6526 --- diff --git a/memcheck/mc_replace_strmem.c b/memcheck/mc_replace_strmem.c index bccae755a4..aab3fa0d90 100644 --- a/memcheck/mc_replace_strmem.c +++ b/memcheck/mc_replace_strmem.c @@ -401,6 +401,15 @@ MEMCHR(m_libc_soname, memchr) MEMCPY(m_libc_soname, memcpy) MEMCPY(m_ld_so_1, memcpy) /* ld.so.1 */ +/* icc9 blats these around all over the place. Not only in the main + executable but various .so's. They are highly tuned and read + memory beyond the source boundary (although work correctly and + never go across page boundaries), so give errors when run natively, + at least for misaligned source arg. Just intercepting in the exe + only until we understand more about the problem. See + http://bugs.kde.org/show_bug.cgi?id=139776 + */ +MEMCPY(NONE, _intel_fast_memcpy) #define MEMCMP(soname, fnname) \