[PATCH] D49663: [x86/SLH] Teach the x86 speculative load hardening pass to harden against v1.2 BCBS attacks directly.
Chandler Carruth via Phabricator via llvm-commits
llvm-commits at lists.llvm.org
Mon Jul 23 20:40:20 PDT 2018
chandlerc added inline comments.
================
Comment at: llvm/lib/Target/X86/X86SpeculativeLoadHardening.cpp:843
+static const TargetRegisterClass *
+getRegClassForUnfoldedLoad(MachineFunction &MF, const X86InstrInfo &TII,
+ unsigned Opcode) {
----------------
craig.topper wrote:
> Why not use getOpcodeAfterMemoryUnfold?
Because that doesn't (trivially) give me the register class...
But I can use that here to nuke a few of these lines.
If I'm missing a way to write this more simply let me know. The tricky part is passing in the register to the unfold API.
Repository:
rL LLVM
https://reviews.llvm.org/D49663
More information about the llvm-commits
mailing list