https://gcc.gnu.org/bugzilla/show_bug.cgi?id=94739
--- Comment #11 from CVS Commits <cvs-commit at gcc dot gnu.org> --- The master branch has been updated by H.J. Lu <h...@gcc.gnu.org>: https://gcc.gnu.org/g:eedc73a224df61694fe4802ddec8eb9ad1822f32 commit r10-8010-geedc73a224df61694fe4802ddec8eb9ad1822f32 Author: H.J. Lu <hjl.to...@gmail.com> Date: Tue Apr 28 05:42:34 2020 -0700 Check whether -fcf-protection=none -Wl,-z,ibt,-z,shstk work first GCC_CET_HOST_FLAGS uses -Wl,-z,ibt,-z,shstk to check if Linux/x86 host has Intel CET enabled by introducing an Intel CET violation on purpose. To avoid false positive, check whether -Wl,-z,ibt,-z,shstk works first. -fcf-protection=none is added to avoid false negative when -fcf-protection is enabled by default. config/ PR bootstrap/94739 * cet.m4 (GCC_CET_HOST_FLAGS): Add -fcf-protection=none to -Wl,-z,ibt,-z,shstk. Check whether -fcf-protection=none -Wl,-z,ibt,-z,shstk works first. libiberty/ PR bootstrap/94739 * configure: Regenerated. lto-plugin/ PR bootstrap/94739 * configure: Regenerated.