Displaying 4 results from an estimated 4 matches for "stackprotectorlevel".
2013 Jan 21
1
[LLVMdev] Testing canaries
Dear LLVMers,
I am trying to measure the performance overhead (if any) of the
canaries that clang inserts in the code. I would like to do this
automatically, using the LLVM test infra-structure. However, I am not sure
if that is possible. Could someone tell me which flags in the
TEST.nightly.Makefile script, (or any other script) I must change to have
this done? Usually I insert canaries with
2013 Jan 28
0
[LLVMdev] Testing canaries
...k-protector-buffer-size' in llc
> --help.
>
> the -fstack-protector option is processed by the clang front-end. If you
> grep
> for stack-protector in the clang source, you will discover that the action
> is
> happening in clang/lib/Driver/Tools.cpp, here:
>
> if (StackProtectorLevel) {
> CmdArgs.push_back("-stack-protector");
> CmdArgs.push_back(Args.MakeArgString(Twine(StackProtectorLevel)));
> }
>
> The argument -stack-protector is for the code generators, and you should
> find
> that llc has the same argument. However if you look...
2015 Jul 22
2
[LLVMdev] (no subject)
Hello,
I have tried a lot fix this error but am not able to can you please
find me a solution am trying to compile the SAFECode in Cygwin Environment
to work for windows.
used make -j4 command to make the files in cygwin i have got this error
make[5]: Leaving directory
'/home/uidr7475/Work/LLVM_OBJ/projects/safecode/tools/clang/include'
/usr/bin/cp: cannot stat
2014 Nov 03
8
[LLVMdev] [PATCH] Protection against stack-based memory corruption errors using SafeStack
...(const ToolChain &TC,
StringRef Sanitizer,
bool Shared) {
@@ -3675,7 +3698,14 @@ void Clang::ConstructJob(Compilation &C, const JobAction &JA,
// -stack-protector=0 is default.
unsigned StackProtectorLevel = 0;
- if (Arg *A = Args.getLastArg(options::OPT_fno_stack_protector,
+ if (Args.hasFlag(options::OPT_fsafe_stack,
+ options::OPT_fno_safe_stack, false)) {
+ StackProtectorLevel = LangOptions::SSPSafeStack;
+ Args.ClaimAllArgs(options::OPT_fno_stack_protector);
+ Args.C...