mirror of
https://github.com/RPCS3/llvm-mirror.git
synced 2024-10-21 20:12:56 +02:00
c8b423f66c
Add two new ways of accessing the unsafe stack pointer: * At a fixed offset from the thread TLS base. This is very similar to StackProtector cookies, but we plan to extend it to other backends (ARM in particular) soon. Bionic-side implementation here: https://android-review.googlesource.com/170988. * Via a function call, as a fallback for platforms that provide neither a fixed TLS slot, nor a reasonable TLS implementation (i.e. not emutls). This is a re-commit of a change in r248357 that was reverted in r248358. llvm-svn: 248405 |
||
---|---|---|
.. | ||
AArch64 | ||
ARM | ||
X86 | ||
addr-taken.ll | ||
array-aligned.ll | ||
array.ll | ||
call.ll | ||
cast.ll | ||
constant-gep-call.ll | ||
constant-gep.ll | ||
constant-geps.ll | ||
dynamic-alloca.ll | ||
escape-addr-pointer.ll | ||
escape-bitcast-store2.ll | ||
escape-bitcast-store.ll | ||
escape-call.ll | ||
escape-casted-pointer.ll | ||
escape-gep-call.ll | ||
escape-gep-invoke.ll | ||
escape-gep-negative.ll | ||
escape-gep-ptrtoint.ll | ||
escape-gep-store.ll | ||
escape-phi-call.ll | ||
escape-select-call.ll | ||
escape-vector.ll | ||
invoke.ll | ||
no-attr.ll | ||
phi-cycle.ll | ||
setjmp2.ll | ||
setjmp.ll | ||
struct.ll |