diff options
| author | Hans Wennborg <hans@hanshq.net> | 2017-12-05 20:22:20 +0000 |
|---|---|---|
| committer | Hans Wennborg <hans@hanshq.net> | 2017-12-05 20:22:20 +0000 |
| commit | 5df9f0878be86ccff734eeaf51b20432787d655b (patch) | |
| tree | 1e31afc511a86357bce8c87df411e96374d5e7f3 /llvm/test/CodeGen/AMDGPU | |
| parent | 9d30c313f1d8d441cdc50e229ceb68d5fdbee38a (diff) | |
| download | bcm5719-llvm-5df9f0878be86ccff734eeaf51b20432787d655b.tar.gz bcm5719-llvm-5df9f0878be86ccff734eeaf51b20432787d655b.zip | |
Re-commit r319490 "XOR the frame pointer with the stack cookie when protecting the stack"
The patch originally broke Chromium (crbug.com/791714) due to its failing to
specify that the new pseudo instructions clobber EFLAGS. This commit fixes
that.
> Summary: This strengthens the guard and matches MSVC.
>
> Reviewers: hans, etienneb
>
> Subscribers: hiraditya, JDevlieghere, vlad.tsyrklevich, llvm-commits
>
> Differential Revision: https://reviews.llvm.org/D40622
llvm-svn: 319824
Diffstat (limited to 'llvm/test/CodeGen/AMDGPU')
0 files changed, 0 insertions, 0 deletions

