xref: /aosp_15_r20/external/llvm/test/CodeGen/AArch64/stack-protector-target.ll (revision 9880d6810fe72a1726cb53787c6711e909410d58)
1*9880d681SAndroid Build Coastguard Worker; Test target-specific stack cookie location.
2*9880d681SAndroid Build Coastguard Worker; RUN: llc -mtriple=aarch64-linux-android < %s -o - | FileCheck --check-prefix=ANDROID-AARCH64 %s
3*9880d681SAndroid Build Coastguard Worker
4*9880d681SAndroid Build Coastguard Workerdefine void @_Z1fv() sspreq {
5*9880d681SAndroid Build Coastguard Workerentry:
6*9880d681SAndroid Build Coastguard Worker  %x = alloca i32, align 4
7*9880d681SAndroid Build Coastguard Worker  %0 = bitcast i32* %x to i8*
8*9880d681SAndroid Build Coastguard Worker  call void @_Z7CapturePi(i32* nonnull %x)
9*9880d681SAndroid Build Coastguard Worker  ret void
10*9880d681SAndroid Build Coastguard Worker}
11*9880d681SAndroid Build Coastguard Worker
12*9880d681SAndroid Build Coastguard Workerdeclare void @_Z7CapturePi(i32*)
13*9880d681SAndroid Build Coastguard Worker
14*9880d681SAndroid Build Coastguard Worker; ANDROID-AARCH64: mrs [[A:.*]], TPIDR_EL0
15*9880d681SAndroid Build Coastguard Worker; ANDROID-AARCH64: ldr [[B:.*]], {{\[}}[[A]], #40]
16*9880d681SAndroid Build Coastguard Worker; ANDROID-AARCH64: str [[B]], [sp,
17*9880d681SAndroid Build Coastguard Worker; ANDROID-AARCH64: ldr [[C:.*]], {{\[}}[[A]], #40]
18*9880d681SAndroid Build Coastguard Worker; ANDROID-AARCH64: ldr [[D:.*]], [sp,
19*9880d681SAndroid Build Coastguard Worker; ANDROID-AARCH64: cmp [[C]], [[D]]
20