[llvm-bugs] [Bug 35449] Windows stack guard needs to XOR the stack pointer with __stack_cookie

via llvm-bugs llvm-bugs at lists.llvm.org
Thu Dec 14 10:20:00 PST 2017


https://bugs.llvm.org/show_bug.cgi?id=35449

Reid Kleckner <rnk at google.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
         Resolution|---                         |FIXED
             Status|NEW                         |RESOLVED

--- Comment #2 from Reid Kleckner <rnk at google.com> ---
r319490 was not reverted, so this is fixed. Now we get XOR RSP instructions as
expected:

$ clang-cl -O2 -GS t2.c -Fat.s -c && grep -B1 -A2 security t.s
        .seh_endprologue
        movq    __security_cookie(%rip), %rax
        xorq    %rsp, %rax
        movq    %rax, 96(%rsp)
--
        xorq    %rsp, %rcx
        callq   __security_check_cookie
        nop
        addq    $104, %rsp

-- 
You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20171214/cb937dd8/attachment.html>


More information about the llvm-bugs mailing list