forked from OSchip/llvm-project
Add support to clang-cl driver for /GS switch
Summary: This patch is adding command-line support for the MSVC buffer security check. The buffer security check is turned on with the '/GS' compiler switch. https://msdn.microsoft.com/en-us/library/8dbf701c.aspx The MSVC buffer security check in implemented here: http://reviews.llvm.org/D20346 Reviewers: hans, rnk Subscribers: chrisha, cfe-commits, rnk, hans, thakis Differential Revision: http://reviews.llvm.org/D20347 llvm-svn: 272832
This commit is contained in:
parent
389a1e39ea
commit
e28e7f234d
|
@ -77,6 +77,8 @@ def _SLASH_GR : CLFlag<"GR">, HelpText<"Enable emission of RTTI data">;
|
|||
def _SLASH_GR_ : CLFlag<"GR-">, HelpText<"Disable emission of RTTI data">;
|
||||
def _SLASH_GF_ : CLFlag<"GF-">, HelpText<"Disable string pooling">,
|
||||
Alias<fwritable_strings>;
|
||||
def _SLASH_GS : CLFlag<"GS">, HelpText<"Enable buffer security check">;
|
||||
def _SLASH_GS_ : CLFlag<"GS-">, HelpText<"Disable buffer security check">;
|
||||
def _SLASH_Gs : CLJoined<"Gs">, HelpText<"Set stack probe size">,
|
||||
Alias<mstack_probe_size>;
|
||||
def _SLASH_Gy : CLFlag<"Gy">, HelpText<"Put each function in its own section">,
|
||||
|
@ -287,7 +289,6 @@ def _SLASH_Fd : CLIgnoredJoined<"Fd">;
|
|||
def _SLASH_FC : CLIgnoredFlag<"FC">;
|
||||
def _SLASH_FS : CLIgnoredFlag<"FS">, HelpText<"Force synchronous PDB writes">;
|
||||
def _SLASH_GF : CLIgnoredFlag<"GF">;
|
||||
def _SLASH_GS_ : CLIgnoredFlag<"GS-">;
|
||||
def _SLASH_kernel_ : CLIgnoredFlag<"kernel-">;
|
||||
def _SLASH_nologo : CLIgnoredFlag<"nologo">;
|
||||
def _SLASH_Ob1 : CLIgnoredFlag<"Ob1">;
|
||||
|
@ -329,7 +330,6 @@ def _SLASH_GL : CLFlag<"GL">;
|
|||
def _SLASH_GL_ : CLFlag<"GL-">;
|
||||
def _SLASH_Gm : CLFlag<"Gm">;
|
||||
def _SLASH_Gm_ : CLFlag<"Gm-">;
|
||||
def _SLASH_GS : CLFlag<"GS">;
|
||||
def _SLASH_GT : CLFlag<"GT">;
|
||||
def _SLASH_Guard : CLJoined<"guard:">;
|
||||
def _SLASH_GZ : CLFlag<"GZ">;
|
||||
|
|
|
@ -6183,6 +6183,14 @@ void Clang::AddClangCLArgs(const ArgList &Args, types::ID InputType,
|
|||
/*default=*/false))
|
||||
CmdArgs.push_back("-fno-rtti-data");
|
||||
|
||||
// This controls whether or not we emit stack-protector instrumentation.
|
||||
// In MSVC, Buffer Security Check (/GS) is on by default.
|
||||
if (Args.hasFlag(options::OPT__SLASH_GS, options::OPT__SLASH_GS_,
|
||||
/*default=*/true)) {
|
||||
CmdArgs.push_back("-stack-protector");
|
||||
CmdArgs.push_back(Args.MakeArgString(Twine(LangOptions::SSPStrong)));
|
||||
}
|
||||
|
||||
// Emit CodeView if -Z7 is present.
|
||||
*EmitCodeView = Args.hasArg(options::OPT__SLASH_Z7);
|
||||
if (*EmitCodeView)
|
||||
|
@ -10022,6 +10030,11 @@ std::unique_ptr<Command> visualstudio::Compiler::GetCommand(
|
|||
if (Args.hasFlag(options::OPT__SLASH_GR_, options::OPT__SLASH_GR,
|
||||
/*default=*/false))
|
||||
CmdArgs.push_back("/GR-");
|
||||
|
||||
if (Args.hasFlag(options::OPT__SLASH_GS_, options::OPT__SLASH_GS,
|
||||
/*default=*/false))
|
||||
CmdArgs.push_back("/GS-");
|
||||
|
||||
if (Arg *A = Args.getLastArg(options::OPT_ffunction_sections,
|
||||
options::OPT_fno_function_sections))
|
||||
CmdArgs.push_back(A->getOption().getID() == options::OPT_ffunction_sections
|
||||
|
|
|
@ -1,7 +1,7 @@
|
|||
// Note: %s must be preceded by --, otherwise it may be interpreted as a
|
||||
// command-line option, e.g. on Mac where %s is commonly under /Users.
|
||||
|
||||
// RUN: %clang_cl --target=i686-pc-win32 /fallback /Dfoo=bar /Ubaz /Ifoo /O0 /Ox /GR /GR- /Gy /Gy- \
|
||||
// RUN: %clang_cl --target=i686-pc-win32 /fallback /Dfoo=bar /Ubaz /Ifoo /O0 /Ox /GR /GR- /GS /GS- /Gy /Gy- \
|
||||
// RUN: /Gw /Gw- /LD /LDd /EHs /EHs- /Zl /MD /MDd /MTd /MT /FImyheader.h /Zi \
|
||||
// RUN: -garbage -moregarbage \
|
||||
// RUN: -### -- %s 2>&1 \
|
||||
|
@ -22,6 +22,7 @@
|
|||
// CHECK: "/Oy"
|
||||
// CHECK: "/GF"
|
||||
// CHECK: "/GR-"
|
||||
// CHECK: "/GS-"
|
||||
// CHECK: "/Gy-"
|
||||
// CHECK: "/Gw-"
|
||||
// CHECK: "/Z7"
|
||||
|
@ -41,6 +42,10 @@
|
|||
// GR: cl.exe
|
||||
// GR: "/GR-"
|
||||
|
||||
// RUN: %clang_cl /fallback /GS- -### -- %s 2>&1 | FileCheck -check-prefix=GS %s
|
||||
// GS: cl.exe
|
||||
// GS: "/GS-"
|
||||
|
||||
// RUN: %clang_cl /fallback /Od -### -- %s 2>&1 | FileCheck -check-prefix=O0 %s
|
||||
// O0: cl.exe
|
||||
// O0: "/Od"
|
||||
|
|
|
@ -59,6 +59,16 @@
|
|||
// RUN: %clang_cl /GR- -### -- %s 2>&1 | FileCheck -check-prefix=GR_ %s
|
||||
// GR_: -fno-rtti
|
||||
|
||||
// Security Buffer Check is on by default.
|
||||
// RUN: %clang_cl -### -- %s 2>&1 | FileCheck -check-prefix=GS-default %s
|
||||
// GS-default: "-stack-protector" "2"
|
||||
|
||||
// RUN: %clang_cl /GS -### -- %s 2>&1 | FileCheck -check-prefix=GS %s
|
||||
// GS: "-stack-protector" "2"
|
||||
|
||||
// RUN: %clang_cl /GS- -### -- %s 2>&1 | FileCheck -check-prefix=GS_ %s
|
||||
// GS_-NOT: -stack-protector
|
||||
|
||||
// RUN: %clang_cl /Gy -### -- %s 2>&1 | FileCheck -check-prefix=Gy %s
|
||||
// Gy: -ffunction-sections
|
||||
|
||||
|
|
Loading…
Reference in New Issue