Commit 231baae2 by H.J. Lu Committed by H.J. Lu

x86/CET: Remove the -mcet command-lint option

With revision 259496:

commit b1384095a7c1d06a44b70853372ebe037b2f7867
Author: hjl <hjl@138bc75d-0d04-0410-961f-82ee72b054a4>
Date:   Thu Apr 19 15:15:04 2018 +0000

    x86: Enable -fcf-protection with multi-byte NOPs

-fcf-protection no longer depens on -mcet and with revision 259522:

commit d59cfa9a4064339cf2bd2da828c4c133f13e57f0
Author: hjl <hjl@138bc75d-0d04-0410-961f-82ee72b054a4>
Date:   Fri Apr 20 13:30:13 2018 +0000

    Define __CET__ for -fcf-protection and remove -mibt

-mcet becomes an alias for -mshstk.  Since all usages of -mcet and
-mno-cet have either been removed or replaced, we can remove the -mcet
command-lint option.

	PR target/85485
	* common/config/i386/i386-common.c (ix86_handle_option): Don't
	handle OPT_mcet.
	* config/i386/i386.opt (mcet): Removed.
	* doc/install.texi: Remove -mcet documentation.
	* doc/invoke.texi: Likewise.

From-SVN: r259613
parent d16d033b
2018-04-24 H.J. Lu <hongjiu.lu@intel.com> 2018-04-24 H.J. Lu <hongjiu.lu@intel.com>
PR target/85485 PR target/85485
* common/config/i386/i386-common.c (ix86_handle_option): Don't
handle OPT_mcet.
* config/i386/i386.opt (mcet): Removed.
* doc/install.texi: Remove -mcet documentation.
* doc/invoke.texi: Likewise.
2018-04-24 H.J. Lu <hongjiu.lu@intel.com>
PR target/85485
* doc/install.texi: Remove -mcet from bootstrap-cet. * doc/install.texi: Remove -mcet from bootstrap-cet.
2018-04-24 Jakub Jelinek <jakub@redhat.com> 2018-04-24 Jakub Jelinek <jakub@redhat.com>
......
...@@ -543,7 +543,6 @@ ix86_handle_option (struct gcc_options *opts, ...@@ -543,7 +543,6 @@ ix86_handle_option (struct gcc_options *opts,
} }
return true; return true;
case OPT_mcet:
case OPT_mshstk: case OPT_mshstk:
if (value) if (value)
{ {
......
...@@ -1006,11 +1006,6 @@ mgeneral-regs-only ...@@ -1006,11 +1006,6 @@ mgeneral-regs-only
Target Report RejectNegative Mask(GENERAL_REGS_ONLY) Var(ix86_target_flags) Save Target Report RejectNegative Mask(GENERAL_REGS_ONLY) Var(ix86_target_flags) Save
Generate code which uses only the general registers. Generate code which uses only the general registers.
mcet
Target Report Var(flag_cet) Init(0)
Enable shadow stack built-in functions from Control-flow Enforcement
Technology (CET).
mshstk mshstk
Target Report Mask(ISA_SHSTK) Var(ix86_isa_flags) Save Target Report Mask(ISA_SHSTK) Var(ix86_isa_flags) Save
Enable shadow stack built-in functions from Control-flow Enforcement Enable shadow stack built-in functions from Control-flow Enforcement
......
...@@ -2107,7 +2107,7 @@ The option is disabled by default. When @code{--enable-cet=auto} ...@@ -2107,7 +2107,7 @@ The option is disabled by default. When @code{--enable-cet=auto}
is used, it is enabled on Linux/x86 if target binutils is used, it is enabled on Linux/x86 if target binutils
supports @code{Intel CET} instructions and disabled otherwise. supports @code{Intel CET} instructions and disabled otherwise.
In this case the target libraries are configured to get additional In this case the target libraries are configured to get additional
@option{-fcf-protection} and @option{-mcet} options. @option{-fcf-protection} option.
@end table @end table
@subheading Cross-Compiler-Specific Options @subheading Cross-Compiler-Specific Options
......
...@@ -1261,7 +1261,7 @@ See RS/6000 and PowerPC Options. ...@@ -1261,7 +1261,7 @@ See RS/6000 and PowerPC Options.
-msse4a -m3dnow -m3dnowa -mpopcnt -mabm -mbmi -mtbm -mfma4 -mxop @gol -msse4a -m3dnow -m3dnowa -mpopcnt -mabm -mbmi -mtbm -mfma4 -mxop @gol
-mlzcnt -mbmi2 -mfxsr -mxsave -mxsaveopt -mrtm -mlwp -mmpx @gol -mlzcnt -mbmi2 -mfxsr -mxsave -mxsaveopt -mrtm -mlwp -mmpx @gol
-mmwaitx -mclzero -mpku -mthreads -mgfni -mvaes @gol -mmwaitx -mclzero -mpku -mthreads -mgfni -mvaes @gol
-mcet -mshstk -mforce-indirect-call -mavx512vbmi2 @gol -mshstk -mforce-indirect-call -mavx512vbmi2 @gol
-mvpclmulqdq -mavx512bitalg -mmovdiri -mmovdir64b -mavx512vpopcntdq @gol -mvpclmulqdq -mavx512bitalg -mmovdiri -mmovdir64b -mavx512vpopcntdq @gol
-mms-bitfields -mno-align-stringops -minline-all-stringops @gol -mms-bitfields -mno-align-stringops -minline-all-stringops @gol
-minline-stringops-dynamically -mstringop-strategy=@var{alg} @gol -minline-stringops-dynamically -mstringop-strategy=@var{alg} @gol
...@@ -27300,9 +27300,6 @@ preferred alignment to @option{-mpreferred-stack-boundary=2}. ...@@ -27300,9 +27300,6 @@ preferred alignment to @option{-mpreferred-stack-boundary=2}.
@itemx -mpku @itemx -mpku
@opindex mpku @opindex mpku
@need 200 @need 200
@itemx -mcet
@opindex mcet
@need 200
@itemx -mavx512vbmi2 @itemx -mavx512vbmi2
@opindex mavx512vbmi2 @opindex mavx512vbmi2
@need 200 @need 200
...@@ -27447,12 +27444,9 @@ This option enables use of the @code{movbe} instruction to implement ...@@ -27447,12 +27444,9 @@ This option enables use of the @code{movbe} instruction to implement
@code{__builtin_bswap32} and @code{__builtin_bswap64}. @code{__builtin_bswap32} and @code{__builtin_bswap64}.
@item -mshstk @item -mshstk
@itemx -mcet
@opindex mshstk @opindex mshstk
@opindex mcet
The @option{-mshstk} option enables shadow stack built-in functions The @option{-mshstk} option enables shadow stack built-in functions
from x86 Control-flow Enforcement Technology (CET). The @option{-mcet} from x86 Control-flow Enforcement Technology (CET).
option is an alias for the @option{-mshstk} option.
@item -mcrc32 @item -mcrc32
@opindex mcrc32 @opindex mcrc32
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment