diff options
author | Thomas Preud'homme <thopre01@gcc.gnu.org> | 2018-08-02 11:16:05 +0000 |
---|---|---|
committer | Thomas Preud'homme <thopre01@gcc.gnu.org> | 2018-08-02 11:16:05 +0000 |
commit | a8b2130aee62d3ac499938be26c9ae23c89d25c9 (patch) | |
tree | f414f7dc5d5b2e80a986c376001491121f278e28 /gcc/cfgexpand.c | |
parent | 0016d8d91cb2880e69be74efb44367b282577977 (diff) |
Revert "[ARM] Fix PR85434: spilling of stack protector guard's address on ARM"
This reverts commit r263245.
From-SVN: r263252
Diffstat (limited to 'gcc/cfgexpand.c')
-rw-r--r-- | gcc/cfgexpand.c | 10 |
1 files changed, 0 insertions, 10 deletions
diff --git a/gcc/cfgexpand.c b/gcc/cfgexpand.c index 0a73ac754cf..7353d5dce12 100644 --- a/gcc/cfgexpand.c +++ b/gcc/cfgexpand.c @@ -6105,18 +6105,8 @@ stack_protect_prologue (void) { tree guard_decl = targetm.stack_protect_guard (); rtx x, y; - struct expand_operand ops[2]; x = expand_normal (crtl->stack_protect_guard); - create_fixed_operand (&ops[0], x); - create_fixed_operand (&ops[1], DECL_RTL (guard_decl)); - /* Allow the target to compute address of Y and copy it to X without - leaking Y into a register. This combined address + copy pattern allows - the target to prevent spilling of any intermediate results by splitting - it after register allocator. */ - if (maybe_expand_insn (targetm.code_for_stack_protect_combined_set, 2, ops)) - return; - if (guard_decl) y = expand_normal (guard_decl); else |