Hi H.J.

  Attached is a potential patch for PR 84145:
  
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=84145

  The problem was that the code to check that the --mibt and/or -mshstk
  options have been correctly enabled for control flow protection did
  not take into account that the wrong option might have been enabled.

  So the patch inverts the test, looking at the value of
  flag_cf_protection first and then checking to see if the needed x86
  specific options have been enabled.  This gives results like this:


   % gcc -c main.c
   % gcc -c main.c -fcf-protection=full
cc1: error: '-fcf-protection=full' requires CET support on this target. Use 
-mcet or both of -mibt and -mshstk options to enable CET
   % gcc -c main.c -fcf-protection=full -mcet
   % gcc -c main.c -fcf-protection=full -mibt
cc1: error: '-fcf-protection=full' requires CET support on this target. Use 
-mcet or both of -mibt and -mshstk options to enable CET
   % gcc -c main.c -fcf-protection=full -mibt -mshstk
   % gcc -c main.c -fcf-protection=branch
cc1: error: '-fcf-protection=branch' requires CET support on this target. Use 
-mcet or -mibt to enable CET
   % gcc -c main.c -fcf-protection=branch -mcet
   % gcc -c main.c -fcf-protection=branch -mibt
   % gcc -c main.c -fcf-protection=branch -mshstk
cc1: error: '-fcf-protection=branch' requires CET support on this target. Use 
-mcet or -mibt to enable CET
   % gcc -c main.c -fcf-protection=return
cc1: error: '-fcf-protection=return' requires CET support on this target. Use 
-mcet or -mshstk to enable CET
   % gcc -c main.c -fcf-protection=return -mcet
   % gcc -c main.c -fcf-protection=return -mibt
cc1: error: '-fcf-protection=return' requires CET support on this target. Use 
-mcet or -mshstk to enable CET
   % gcc -c main.c -fcf-protection=return -mshstk
   %
   
  What do you think ?  Is the patch OK for the mainline ?

Cheers
  Nick

gcc/ChangeLog
2018-02-05  Nick Clifton  <ni...@redhat.com>

        PR 84145
        * config/i386/i386.c (ix86_option_override_internal): Rework
        checks for -fcf-protection and -mibt/-mshstk.

Index: gcc/config/i386/i386.c
===================================================================
--- gcc/config/i386/i386.c      (revision 257389)
+++ gcc/config/i386/i386.c      (working copy)
@@ -4915,30 +4915,43 @@
   /* Do not support control flow instrumentation if CET is not enabled.  */
   if (opts->x_flag_cf_protection != CF_NONE)
     {
-      if (!(TARGET_IBT_P (opts->x_ix86_isa_flags2)
-           || TARGET_SHSTK_P (opts->x_ix86_isa_flags)))
+      switch (flag_cf_protection)
        {
-         if (flag_cf_protection == CF_FULL)
+       case CF_NONE:
+         break;
+       case CF_BRANCH:
+         if (! TARGET_IBT_P (opts->x_ix86_isa_flags2))
            {
-             error ("%<-fcf-protection=full%> requires CET support "
-                    "on this target. Use -mcet or one of -mibt, "
-                    "-mshstk options to enable CET");
+             error ("%<-fcf-protection=branch%> requires CET support "
+                    "on this target. Use -mcet or -mibt to enable CET");
+             flag_cf_protection = CF_NONE;
+             return false;
            }
-         else if (flag_cf_protection == CF_BRANCH)
+         break;
+       case CF_RETURN:
+         if (! TARGET_SHSTK_P (opts->x_ix86_isa_flags))
            {
-             error ("%<-fcf-protection=branch%> requires CET support "
-                    "on this target. Use -mcet or one of -mibt, "
-                    "-mshstk options to enable CET");
+             error ("%<-fcf-protection=return%> requires CET support "
+                    "on this target. Use -mcet or -mshstk to enable CET");
+             flag_cf_protection = CF_NONE;
+             return false;
            }
-         else if (flag_cf_protection == CF_RETURN)
+         break;
+       case CF_FULL:
+         if (   ! TARGET_IBT_P (opts->x_ix86_isa_flags2)
+                || ! TARGET_SHSTK_P (opts->x_ix86_isa_flags))
            {
-             error ("%<-fcf-protection=return%> requires CET support "
-                    "on this target. Use -mcet or one of -mibt, "
+             error ("%<-fcf-protection=full%> requires CET support "
+                    "on this target. Use -mcet or both of -mibt and "
                     "-mshstk options to enable CET");
+             flag_cf_protection = CF_NONE;
+             return false;
            }
-         flag_cf_protection = CF_NONE;
-         return false;
+         break;
+       default:
+         gcc_unreachable ();
        }
+
       opts->x_flag_cf_protection =
        (cf_protection_level) (opts->x_flag_cf_protection | CF_SET);
     }

Reply via email to