[llvm-bugs] [Bug 35449] Windows stack guard needs to XOR the stack pointer with __stack_cookie
via llvm-bugs
llvm-bugs at lists.llvm.org
Thu Dec 14 10:20:00 PST 2017
https://bugs.llvm.org/show_bug.cgi?id=35449
Reid Kleckner <rnk at google.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Resolution|--- |FIXED
Status|NEW |RESOLVED
--- Comment #2 from Reid Kleckner <rnk at google.com> ---
r319490 was not reverted, so this is fixed. Now we get XOR RSP instructions as
expected:
$ clang-cl -O2 -GS t2.c -Fat.s -c && grep -B1 -A2 security t.s
.seh_endprologue
movq __security_cookie(%rip), %rax
xorq %rsp, %rax
movq %rax, 96(%rsp)
--
xorq %rsp, %rcx
callq __security_check_cookie
nop
addq $104, %rsp
--
You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20171214/cb937dd8/attachment.html>
More information about the llvm-bugs
mailing list