Re: Adding fstack-protector prologue to get_pc_thunk for targets with TARGET_PAD_SHORT_FUNCTION

2011-09-06 Thread asharif tools
On Thu, Jun 9, 2011 at 11:17 AM, Ian Lance Taylor wrote: > asharif tools writes: > >> On Wed, Jun 8, 2011 at 10:32 PM, Ian Lance Taylor wrote: >>> asharif tools writes: >>> >>>> function: >>>>       call    __i686.get_pc_thunk.bx >>&

Re: Adding fstack-protector prologue to get_pc_thunk for targets with TARGET_PAD_SHORT_FUNCTION

2011-06-09 Thread asharif tools
On Wed, Jun 8, 2011 at 10:32 PM, Ian Lance Taylor wrote: > asharif tools writes: > >> function: >>       call    __i686.get_pc_thunk.bx >>       addl    $_GLOBAL_OFFSET_TABLE_, %ebx >>       movl    %gs:20, %eax # Stack-guard init >>       movl    %eax, -

Adding fstack-protector prologue to get_pc_thunk for targets with TARGET_PAD_SHORT_FUNCTION

2011-06-08 Thread asharif tools
Let's say I am compiling for a target that has TARGET_PAD_SHORT_FUNCTION (example: i386 Atom) and that the compilation flags are -fPIE -fstack-protector. For certain functions, the starting code sequence will look like the following: function: call__i686.get_pc_thunk.bx addl