[PATCH] D112768: [ARM] implement support for TLS register based stack protector

Nick Desaulniers via Phabricator via cfe-commits cfe-commits at lists.llvm.org
Wed Nov 3 10:36:59 PDT 2021


nickdesaulniers added inline comments.


================
Comment at: clang/lib/Driver/ToolChains/Clang.cpp:3190-3191
+      }
+      CmdArgs.push_back("-target-feature");
+      CmdArgs.push_back("+read-tp-hard");
+    }
----------------
ardb wrote:
> nickdesaulniers wrote:
> > Isn't this redundant/set elsewhere?
> No, it is not. The alternative is requiring the user to pass -mtp=cp15 when using the TLS stack protector, which is silly because it is implied.
Right. Perhaps we could emit `diag::err_drv_argument_not_allowed_with` if the user specified `-mtp=soft` with `-mstack-protector-guard=tls`.

It looks like a call to clang::driver::tools::arm::getReadTPMode() should being able to tell us whether someone explicitly tried to use soft.


Repository:
  rG LLVM Github Monorepo

CHANGES SINCE LAST ACTION
  https://reviews.llvm.org/D112768/new/

https://reviews.llvm.org/D112768



More information about the cfe-commits mailing list