aboutsummaryrefslogtreecommitdiff
path: root/gcc/doc/install.texi
diff options
context:
space:
mode:
authorSudakshina Das <sudi.das@arm.com>2019-01-09 14:32:06 +0000
committerSudakshina Das <sudi@gcc.gnu.org>2019-01-09 14:32:06 +0000
commitc7ff4f0fe6b9357393c7e44338c4783cf0c19759 (patch)
treedb02073be5558e36dbb273606c294c9de708594f /gcc/doc/install.texi
parentb5f794b47bc09930e3a05b64de0890d315631436 (diff)
downloadgcc-c7ff4f0fe6b9357393c7e44338c4783cf0c19759.zip
gcc-c7ff4f0fe6b9357393c7e44338c4783cf0c19759.tar.gz
gcc-c7ff4f0fe6b9357393c7e44338c4783cf0c19759.tar.bz2
[AArch64, 6/6] Enable BTI: Add configure option.
This patch is part of a series that enables ARMv8.5-A in GCC and adds Branch Target Identification Mechanism. This patch is adding a new configure option for enabling BTI and Return Address Signing by default. *** gcc/ChangeLog *** 2018-01-09 Sudakshina Das <sudi.das@arm.com> * config/aarch64/aarch64.c (aarch64_override_options): Add case to check configure option to set BTI and Return Address Signing. * configure.ac: Add --enable-standard-branch-protection and --disable-standard-branch-protection. * configure: Regenerated. * doc/install.texi: Document the same. *** gcc/testsuite/ChangeLog *** 2018-01-09 Sudakshina Das <sudi.das@arm.com> * gcc.target/aarch64/bti-1.c: Update test to not add command line option when configure with bti. * gcc.target/aarch64/bti-2.c: Likewise. * lib/target-supports.exp (check_effective_target_default_branch_protection): Add configure check for --enable-standard-branch-protection. From-SVN: r267770
Diffstat (limited to 'gcc/doc/install.texi')
-rw-r--r--gcc/doc/install.texi10
1 files changed, 10 insertions, 0 deletions
diff --git a/gcc/doc/install.texi b/gcc/doc/install.texi
index dd01e4c..d5e1edb 100644
--- a/gcc/doc/install.texi
+++ b/gcc/doc/install.texi
@@ -3413,6 +3413,16 @@ The workaround is disabled by default if neither of
@option{--enable-fix-cortex-a53-843419} or
@option{--disable-fix-cortex-a53-843419} is given at configure time.
+To enable Branch Target Identification Mechanism and Return Address Signing by
+default at configure time use the @option{--enable-standard-branch-protection}
+option. This is equivalent to having @option{-mbranch-protection=standard}
+during compilation. This can be explicitly disabled during compilation by
+passing the @option{-mbranch-protection=none} option which turns off all
+types of branch protections. Conversely,
+@option{--disable-standard-branch-protection} will disable both the
+protections by default. This mechanism is turned off by default if neither
+of the options are given at configure time.
+
@html
<hr />
@end html