On 2/15/23 08:24, Eric Botcazou via Gcc-patches wrote:
Hi, this is the incompatibility of -fstack-clash-protection with Windows SEH. Now the Windows ports always enable TARGET_STACK_PROBE, which means that the stack is always probed (out of line) so -fstack-clash-protection does nothing more. Tested on x86-64/Windows and Linux, OK for all active branches? 2023-02-15 Eric Botcazou <ebotca...@adacore.com> * config/i386/i386.cc (ix86_compute_frame_layout): Disable the effects of -fstack-clash-protection for TARGET_STACK_PROBE. (ix86_expand_prologue): Likewise.
OK. THanks for taking care of this. I let it languish far too long. jeff