diff options
Diffstat (limited to 'llvm/lib/Target/X86/X86ISelLowering.cpp')
| -rw-r--r-- | llvm/lib/Target/X86/X86ISelLowering.cpp | 17 |
1 files changed, 15 insertions, 2 deletions
diff --git a/llvm/lib/Target/X86/X86ISelLowering.cpp b/llvm/lib/Target/X86/X86ISelLowering.cpp index 4c2e54f8102..1931c7f4263 100644 --- a/llvm/lib/Target/X86/X86ISelLowering.cpp +++ b/llvm/lib/Target/X86/X86ISelLowering.cpp @@ -2193,9 +2193,9 @@ unsigned X86TargetLowering::getAddressSpace() const { return 256; } -Value *X86TargetLowering::getStackCookieLocation(IRBuilder<> &IRB) const { +Value *X86TargetLowering::getIRStackGuard(IRBuilder<> &IRB) const { if (!Subtarget.isTargetLinux()) - return TargetLowering::getStackCookieLocation(IRB); + return TargetLowering::getIRStackGuard(IRB); // %fs:0x28, unless we're using a Kernel code model, in which case it's %gs: // %gs:0x14 on i386 @@ -2206,6 +2206,19 @@ Value *X86TargetLowering::getStackCookieLocation(IRBuilder<> &IRB) const { Type::getInt8PtrTy(IRB.getContext())->getPointerTo(AddressSpace)); } +void X86TargetLowering::insertSSPDeclarations(Module &M) const { + if (!Subtarget.isTargetLinux()) + TargetLowering::insertSSPDeclarations(M); + else + llvm_unreachable("X86 Linux supports customized IR stack guard load"); +} + +Value *X86TargetLowering::getSDStackGuard(const Module &M) const { + if (!Subtarget.isTargetLinux()) + return TargetLowering::getSDStackGuard(M); + llvm_unreachable("X86 Linux supports customized IR stack guard load"); +} + Value *X86TargetLowering::getSafeStackPointerLocation(IRBuilder<> &IRB) const { if (!Subtarget.isTargetAndroid()) return TargetLowering::getSafeStackPointerLocation(IRB); |

