https://gcc.gnu.org/bugzilla/show_bug.cgi?id=94739

--- Comment #11 from CVS Commits <cvs-commit at gcc dot gnu.org> ---
The master branch has been updated by H.J. Lu <h...@gcc.gnu.org>:

https://gcc.gnu.org/g:eedc73a224df61694fe4802ddec8eb9ad1822f32

commit r10-8010-geedc73a224df61694fe4802ddec8eb9ad1822f32
Author: H.J. Lu <hjl.to...@gmail.com>
Date:   Tue Apr 28 05:42:34 2020 -0700

    Check whether -fcf-protection=none -Wl,-z,ibt,-z,shstk work first

    GCC_CET_HOST_FLAGS uses -Wl,-z,ibt,-z,shstk to check if Linux/x86 host
    has Intel CET enabled by introducing an Intel CET violation on purpose.
    To avoid false positive, check whether -Wl,-z,ibt,-z,shstk works first.
    -fcf-protection=none is added to avoid false negative when -fcf-protection
    is enabled by default.

    config/

            PR bootstrap/94739
            * cet.m4 (GCC_CET_HOST_FLAGS): Add -fcf-protection=none to
            -Wl,-z,ibt,-z,shstk.  Check whether -fcf-protection=none
            -Wl,-z,ibt,-z,shstk works first.

    libiberty/

            PR bootstrap/94739
            * configure: Regenerated.

    lto-plugin/

            PR bootstrap/94739
            * configure: Regenerated.

Reply via email to