On Thu, Jun 9, 2011 at 11:17 AM, Ian Lance Taylor wrote:
> asharif tools writes:
>
>> On Wed, Jun 8, 2011 at 10:32 PM, Ian Lance Taylor wrote:
>>> asharif tools writes:
>>>
>>>> function:
>>>> call __i686.get_pc_thunk.bx
>>&
On Wed, Jun 8, 2011 at 10:32 PM, Ian Lance Taylor wrote:
> asharif tools writes:
>
>> function:
>> call __i686.get_pc_thunk.bx
>> addl $_GLOBAL_OFFSET_TABLE_, %ebx
>> movl %gs:20, %eax # Stack-guard init
>> movl %eax, -
Let's say I am compiling for a target that has
TARGET_PAD_SHORT_FUNCTION (example: i386 Atom) and that the
compilation flags are -fPIE -fstack-protector.
For certain functions, the starting code sequence will look like the following:
function:
call__i686.get_pc_thunk.bx
addl