Bug ID: 41115
Summary: clang-cl on ARM should generate __security_push_cookie
/ __security_pop_cookie instead of __stack_chk_guard /
Component: LLVM Codegen
CC: email@example.com, neeil...@live.com,
There was one small wrinkle, which was stack protection. On x86, clang’s stack
protection is compatible with Visual Studio’s C library, but when targeting
Arm, I found that clang emitted references to __stack_chk_guard and
__stack_chk_fail, which are part of a stack protection system that’s not the
same as the one VS uses. The VS-compatible stack protection involves functions
called __security_push_cookie and __security_pop_cookie, and clang doesn’t know
how to generate calls to those. So I had to turn off stack protection (/GS-) on
the command line.
We should fix this.
(The docs don't mention __security_push_cookie being arm-specific; maybe it's a
x-arch new thing?)
You are receiving this mail because:
You are on the CC list for the bug.
llvm-bugs mailing list