On 2/15/23 08:24, Eric Botcazou via Gcc-patches wrote:
Hi,

this is the incompatibility of -fstack-clash-protection with Windows SEH.  Now
the Windows ports always enable TARGET_STACK_PROBE, which means that the stack
is always probed (out of line) so -fstack-clash-protection does nothing more.

Tested on x86-64/Windows and Linux, OK for all active branches?


2023-02-15  Eric Botcazou  <ebotca...@adacore.com>

        * config/i386/i386.cc (ix86_compute_frame_layout): Disable the
        effects of -fstack-clash-protection for TARGET_STACK_PROBE.
        (ix86_expand_prologue): Likewise.

OK.  THanks for taking care of this.  I let it languish far too long.

jeff

Reply via email to