[Bug target/85434] Address of stack protector guard spilled to stack on ARM
thopre01 at gcc dot gnu.org
gcc-bugzilla@gcc.gnu.org
Sun May 6 16:28:00 GMT 2018
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=85434
--- Comment #11 from Thomas Preud'homme <thopre01 at gcc dot gnu.org> ---
I've started to work on a new patch according to review feedbacks. I've reached
the stage where I can compile without -fPIC with the stack protect test being
an UNSPEC split after register allocation as suggested.
Next steps are:
1) do the same for the stack protect set (ie setting the canari)
2) add support for PIC access to the guard
3) include the conditional branch in the combined stack protect test to ensure
the register holding the result of the comparison is not spilled before it's
used for the conditional branch
4) clear all registers involved before branching
5) cleanup the patch
More information about the Gcc-bugs
mailing list