1 /* Definitions for option handling for IA-32.
2 Copyright (C) 1988-2022 Free Software Foundation, Inc.
4 This file is part of GCC.
6 GCC is free software; you can redistribute it and/or modify
7 it under the terms of the GNU General Public License as published by
8 the Free Software Foundation; either version 3, or (at your option)
11 GCC is distributed in the hope that it will be useful,
12 but WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 GNU General Public License for more details.
16 Under Section 7 of GPL version 3, you are granted additional
17 permissions described in the GCC Runtime Library Exception, version
18 3.1, as published by the Free Software Foundation.
20 You should have received a copy of the GNU General Public License and
21 a copy of the GCC Runtime Library Exception along with this program;
22 see the files COPYING3 and COPYING.RUNTIME respectively. If not, see
23 <http://www.gnu.org/licenses/>. */
28 /* Algorithm to expand string function with. */
32 #define DEF_ALG(alg, name) alg,
34 // #include "stringop.def"
40 /* Available call abi. */
61 CM_32
, /* The traditional 32-bit ABI. */
62 CM_SMALL
, /* Assumes all code and data fits in the low 31 bits. */
63 CM_KERNEL
, /* Assumes all code and data fits in the high 31 bits. */
64 CM_MEDIUM
, /* Assumes code fits in the low 31 bits; data unlimited. */
65 CM_LARGE
, /* No assumptions. */
66 CM_SMALL_PIC
, /* Assumes code+data+got/plt fits in a 31 bit region. */
67 CM_MEDIUM_PIC
,/* Assumes code+got/plt fits in a 31 bit region. */
68 CM_LARGE_PIC
/* No assumptions. */
72 PMODE_SI
, /* Pmode == SImode. */
73 PMODE_DI
/* Pmode == DImode. */
76 enum ix86_align_data
{
77 ix86_align_data_type_compat
,
78 ix86_align_data_type_abi
,
79 ix86_align_data_type_cacheline
88 ix86_veclibabi_type_none
,
89 ix86_veclibabi_type_svml
,
90 ix86_veclibabi_type_acml
93 enum stack_protector_guard
{
94 SSP_TLS
, /* per-thread canary in TLS block */
95 SSP_GLOBAL
/* global canary */
98 enum prefer_vector_width
{
105 /* This is used to mitigate variant #2 of the speculative execution
106 vulnerabilities on x86 processors identified by CVE-2017-5715, aka
107 Spectre. They convert indirect branches and function returns to
108 call and return thunks to avoid speculative execution via indirect
109 call, jmp and ret. */
110 enum indirect_branch
{
111 indirect_branch_unset
= 0,
112 indirect_branch_keep
,
113 indirect_branch_thunk
,
114 indirect_branch_thunk_inline
,
115 indirect_branch_thunk_extern
118 enum instrument_return
{
119 instrument_return_none
= 0,
120 instrument_return_call
,
121 instrument_return_nop5
126 harden_sls_return
= 1 << 0,
127 harden_sls_indirect_jmp
= 1 << 1,
128 harden_sls_all
= harden_sls_return
| harden_sls_indirect_jmp