From: Stefan Schulze Frielinghaus <[email protected]>
Add documentation for options -mstack-protector-guard= and
-mstack-protector-guard-record which were added in commit
r16-5192-g0cd1f03939d and regenerate .opt.urls.
gcc/ChangeLog:
* config/i386/i386.opt.urls: Regenerate.
* config/s390/s390.opt.urls: Ditto.
* doc/invoke.texi: Add documentation for
-mstack-protector-guard= and -mstack-protector-guard-record.
---
gcc/config/i386/i386.opt.urls | 2 +-
gcc/config/s390/s390.opt.urls | 6 ++++++
gcc/doc/invoke.texi | 14 ++++++++++++++
3 files changed, 21 insertions(+), 1 deletion(-)
diff --git a/gcc/config/i386/i386.opt.urls b/gcc/config/i386/i386.opt.urls
index a9bbac0ef9b..a89329b4844 100644
--- a/gcc/config/i386/i386.opt.urls
+++ b/gcc/config/i386/i386.opt.urls
@@ -438,7 +438,7 @@ mpku
UrlSuffix(gcc/x86-Options.html#index-mpku)
mstack-protector-guard=
-UrlSuffix(gcc/x86-Options.html#index-mstack-protector-guard-4)
+UrlSuffix(gcc/x86-Options.html#index-mstack-protector-guard-5)
mstack-protector-guard-reg=
UrlSuffix(gcc/x86-Options.html#index-mstack-protector-guard-reg-3)
diff --git a/gcc/config/s390/s390.opt.urls b/gcc/config/s390/s390.opt.urls
index bb53fc9f987..be0904ce1ce 100644
--- a/gcc/config/s390/s390.opt.urls
+++ b/gcc/config/s390/s390.opt.urls
@@ -51,6 +51,12 @@
UrlSuffix(gcc/S_002f390-and-zSeries-Options.html#index-msoft-float-12)
mstack-guard=
UrlSuffix(gcc/S_002f390-and-zSeries-Options.html#index-mstack-guard)
+mstack-protector-guard=
+UrlSuffix(gcc/S_002f390-and-zSeries-Options.html#index-mstack-protector-guard-4)
+
+mstack-protector-guard-record
+UrlSuffix(gcc/S_002f390-and-zSeries-Options.html#index-mstack-protector-guard-record)
+
mstack-size=
UrlSuffix(gcc/S_002f390-and-zSeries-Options.html#index-mstack-size-2)
diff --git a/gcc/doc/invoke.texi b/gcc/doc/invoke.texi
index 8dacd080c5a..aea6cb562e2 100644
--- a/gcc/doc/invoke.texi
+++ b/gcc/doc/invoke.texi
@@ -33857,6 +33857,20 @@ If both arguments are zero, hotpatching is disabled.
This option can be overridden for individual functions with the
@code{hotpatch} attribute.
+
+@opindex mstack-protector-guard
+@opindex mstack-protector-guard-record
+@item -mstack-protector-guard=@var{guard}
+@itemx -mstack-protector-guard-record
+Generate stack protection code using canary at @var{guard}. Supported
+locations are @var{global} for a global canary or @var{tls} for a per-thread
+canary in the TLS block (the default).
+
+Option @option{-mstack-protector-guard-record} results in the generation of
+section @code{__stack_protector_loc} containing pointers to all instructions
+which load the address of the global guard. Thus, this option has only an
+effect in conjunction with @option{-mstack-protector-guard=global}. The
+intended use is for the Linux kernel.
@end table
@node SH Options
--
2.49.0