mirror of
https://github.com/RPCSX/llvm.git
synced 2025-01-05 19:29:01 +00:00
c7b6dc0535
Add two new ways of accessing the unsafe stack pointer: * At a fixed offset from the thread TLS base. This is very similar to StackProtector cookies, but we plan to extend it to other backends (ARM in particular) soon. Bionic-side implementation here: https://android-review.googlesource.com/170988. * Via a function call, as a fallback for platforms that provide neither a fixed TLS slot, nor a reasonable TLS implementation (i.e. not emutls). git-svn-id: https://llvm.org/svn/llvm-project/llvm/trunk@248357 91177308-0d34-0410-b5e6-96231b3b80d8 |
||
---|---|---|
.. | ||
abi.ll | ||
addr-taken.ll | ||
array-aligned.ll | ||
array.ll | ||
call.ll | ||
cast.ll | ||
constant-gep-call.ll | ||
constant-gep.ll | ||
constant-geps.ll | ||
dynamic-alloca.ll | ||
escape-addr-pointer.ll | ||
escape-bitcast-store2.ll | ||
escape-bitcast-store.ll | ||
escape-call.ll | ||
escape-casted-pointer.ll | ||
escape-gep-call.ll | ||
escape-gep-invoke.ll | ||
escape-gep-negative.ll | ||
escape-gep-ptrtoint.ll | ||
escape-gep-store.ll | ||
escape-phi-call.ll | ||
escape-select-call.ll | ||
escape-vector.ll | ||
invoke.ll | ||
no-attr.ll | ||
phi-cycle.ll | ||
setjmp2.ll | ||
setjmp.ll | ||
struct.ll |