aboutsummaryrefslogtreecommitdiff
path: root/gcc/config
diff options
context:
space:
mode:
authorSegher Boessenkool <segher@kernel.crashing.org>2017-01-20 02:22:27 +0100
committerSegher Boessenkool <segher@gcc.gnu.org>2017-01-20 02:22:27 +0100
commit01334be4a08330081eb74181faec5fbb4c30bcda (patch)
treef98a91b994292cfbac91ec3a5421a13088238def /gcc/config
parentd821744c630acda55c7a5ff59e6cfd184132be74 (diff)
downloadgcc-01334be4a08330081eb74181faec5fbb4c30bcda.zip
gcc-01334be4a08330081eb74181faec5fbb4c30bcda.tar.gz
gcc-01334be4a08330081eb74181faec5fbb4c30bcda.tar.bz2
rs6000: Fix the new SSP guard configuration code (PR79140)
I foolishly tested this with r241087 reverted. After that revision default_stack_protect_guard is no longer called if the compiler defaults to using the TLS guard, which of course is the wrong thing to do if there is some other way to enable the global guard. This fixes it. PR target/78875 PR target/79140 * config/rs6000/rs6000.c (TARGET_STACK_PROTECT_GUARD): Unconditionally define to rs6000_init_stack_protect_guard. (rs6000_init_stack_protect_guard): New function. From-SVN: r244677
Diffstat (limited to 'gcc/config')
-rw-r--r--gcc/config/rs6000/rs6000.c15
1 files changed, 12 insertions, 3 deletions
diff --git a/gcc/config/rs6000/rs6000.c b/gcc/config/rs6000/rs6000.c
index 4c6bada..be7e947 100644
--- a/gcc/config/rs6000/rs6000.c
+++ b/gcc/config/rs6000/rs6000.c
@@ -1758,10 +1758,8 @@ static const struct attribute_spec rs6000_attribute_table[] =
#define TARGET_VECTORIZE_BUILTIN_MD_VECTORIZED_FUNCTION \
rs6000_builtin_md_vectorized_function
-#ifdef TARGET_THREAD_SSP_OFFSET
#undef TARGET_STACK_PROTECT_GUARD
-#define TARGET_STACK_PROTECT_GUARD hook_tree_void_null
-#endif
+#define TARGET_STACK_PROTECT_GUARD rs6000_init_stack_protect_guard
#if !TARGET_MACHO
#undef TARGET_STACK_PROTECT_FAIL
@@ -9479,6 +9477,17 @@ rs6000_legitimize_tls_address (rtx addr, enum tls_model model)
return dest;
}
+/* Only create the global variable for the stack protect guard if we are using
+ the global flavor of that guard. */
+static tree
+rs6000_init_stack_protect_guard (void)
+{
+ if (rs6000_stack_protector_guard == SSP_GLOBAL)
+ return default_stack_protect_guard ();
+
+ return NULL_TREE;
+}
+
/* Implement TARGET_CANNOT_FORCE_CONST_MEM. */
static bool