[PATCH] D13455: [safestack] Fast access to the unsafe stack pointer on AArch64/Android.
Evgeniy Stepanov via llvm-commits
llvm-commits at lists.llvm.org
Thu Oct 8 15:00:44 PDT 2015
eugenis added inline comments.
================
Comment at: lib/CodeGen/TargetLoweringBase.cpp:1677
@@ +1676,3 @@
+ // thread-local variable with a magic name.
+ const char *kUnsafeStackPtrVar = "__safestack_unsafe_stack_ptr";
+ auto UnsafeStackPtr =
----------------
echristo wrote:
> Naming, and you can just fold it in as well.
It's used in 4 places. Fixed the naming.
================
Comment at: lib/Target/AArch64/AArch64Subtarget.h:126-128
@@ -125,2 +125,5 @@
bool isTargetWindows() const { return TargetTriple.isOSWindows(); }
+ bool isTargetAndroid() const {
+ return TargetTriple.getEnvironment() == Triple::Android;
+ }
----------------
echristo wrote:
> Given how pervasive this is now, it'll probably be worth splitting this out into a separate commit and doing a look for Triple.isAndroid() and updating all of the callers in llvm and clang.
Done and rebased.
Repository:
rL LLVM
http://reviews.llvm.org/D13455
More information about the llvm-commits
mailing list