Mercurial > hg > CbC > CbC_gcc
comparison gcc/config/i386/i386-opts.h @ 131:84e7813d76e9
gcc-8.2
author | mir3636 |
---|---|
date | Thu, 25 Oct 2018 07:37:49 +0900 |
parents | 04ced10e8804 |
children | 1830386684a0 |
comparison
equal
deleted
inserted
replaced
111:04ced10e8804 | 131:84e7813d76e9 |
---|---|
1 /* Definitions for option handling for IA-32. | 1 /* Definitions for option handling for IA-32. |
2 Copyright (C) 1988-2017 Free Software Foundation, Inc. | 2 Copyright (C) 1988-2018 Free Software Foundation, Inc. |
3 | 3 |
4 This file is part of GCC. | 4 This file is part of GCC. |
5 | 5 |
6 GCC is free software; you can redistribute it and/or modify | 6 GCC is free software; you can redistribute it and/or modify |
7 it under the terms of the GNU General Public License as published by | 7 it under the terms of the GNU General Public License as published by |
97 enum stack_protector_guard { | 97 enum stack_protector_guard { |
98 SSP_TLS, /* per-thread canary in TLS block */ | 98 SSP_TLS, /* per-thread canary in TLS block */ |
99 SSP_GLOBAL /* global canary */ | 99 SSP_GLOBAL /* global canary */ |
100 }; | 100 }; |
101 | 101 |
102 enum prefer_vector_width { | |
103 PVW_NONE, | |
104 PVW_AVX128, | |
105 PVW_AVX256, | |
106 PVW_AVX512 | |
107 }; | |
108 | |
109 /* This is used to mitigate variant #2 of the speculative execution | |
110 vulnerabilities on x86 processors identified by CVE-2017-5715, aka | |
111 Spectre. They convert indirect branches and function returns to | |
112 call and return thunks to avoid speculative execution via indirect | |
113 call, jmp and ret. */ | |
114 enum indirect_branch { | |
115 indirect_branch_unset = 0, | |
116 indirect_branch_keep, | |
117 indirect_branch_thunk, | |
118 indirect_branch_thunk_inline, | |
119 indirect_branch_thunk_extern | |
120 }; | |
121 | |
102 #endif | 122 #endif |