diff options
author | Hans Wennborg <hans@hanshq.net> | 2018-08-01 12:58:57 +0000 |
---|---|---|
committer | Hans Wennborg <hans@hanshq.net> | 2018-08-01 12:58:57 +0000 |
commit | aade120545b33e6cd4e098677696d677519814f2 (patch) | |
tree | 5a27d92900288fa84e00687d4d3b0580e38a5fb2 /clang/docs | |
parent | 8acb74e01f1095f028bb19d3cd157687ddf173cc (diff) |
UserManual: Update with the latest clang-cl flags
llvm-svn: 338528
Diffstat (limited to 'clang/docs')
-rw-r--r-- | clang/docs/UsersManual.rst | 21 |
1 files changed, 21 insertions, 0 deletions
diff --git a/clang/docs/UsersManual.rst b/clang/docs/UsersManual.rst index 1881d9430a76..363bb4e461a6 100644 --- a/clang/docs/UsersManual.rst +++ b/clang/docs/UsersManual.rst @@ -2778,6 +2778,7 @@ Execute ``clang-cl /?`` to see a list of supported options: /Brepro Emit an object file which can be reproduced over time /C Don't discard comments when preprocessing /c Compile only + /d1PP Retain macro definitions in /E mode /d1reportAllClassLayout Dump record layout information /diagnostics:caret Enable caret and column diagnostics (on by default) /diagnostics:classic Disable column and caret diagnostics @@ -2811,6 +2812,7 @@ Execute ``clang-cl /?`` to see a list of supported options: /GS- Disable buffer security check /GS Enable buffer security check /Gs<value> Set stack probe size + /guard:<value> Enable Control Flow Guard with /guard:cf /Gv Set __vectorcall as a default calling convention /Gw- Don't put each data item in its own section /Gw Put each data item in its own section @@ -2866,6 +2868,7 @@ Execute ``clang-cl /?`` to see a list of supported options: /WX- Do not treat warnings as errors /WX Treat warnings as errors /w Disable all warnings + /X Don't add %INCLUDE% to the include search path /Y- Disable precompiled headers, overrides /Yc and /Yu /Yc<filename> Generate a pch file for all code up to and including <filename> /Yu<filename> Load a pch file and use it instead of all code up to and including <filename> @@ -2889,8 +2892,15 @@ Execute ``clang-cl /?`` to see a list of supported options: OPTIONS: -### Print (but do not run) the commands to run for this compilation --analyze Run the static analyzer + -faddrsig Emit an address-significance table -fansi-escape-codes Use ANSI escape codes for diagnostics + -fblocks Enable the 'blocks' language feature + -fcf-protection=<value> Instrument control-flow architecture protection. Options: return, branch, full, none. + -fcf-protection Enable cf-protection in 'full' mode -fcolor-diagnostics Use colors in diagnostics + -fcomplete-member-pointers + Require member pointer base types to be complete if they would be significant under the Microsoft ABI + -fcoverage-mapping Generate coverage mapping to enable code coverage analysis -fdebug-macro Emit macro debug information -fdelayed-template-parsing Parse templated function definitions at the end of the translation unit @@ -2900,6 +2910,7 @@ Execute ``clang-cl /?`` to see a list of supported options: Print fix-its in machine parseable form -flto=<value> Set LTO mode to either 'full' or 'thin' -flto Enable LTO in 'full' mode + -fmerge-all-constants Allow merging of constants -fms-compatibility-version=<value> Dot-separated value representing the Microsoft compiler version number to report in _MSC_VER (0 = don't define it (default)) @@ -2907,9 +2918,17 @@ Execute ``clang-cl /?`` to see a list of supported options: -fms-extensions Accept some non-standard constructs supported by the Microsoft compiler -fmsc-version=<value> Microsoft compiler version number to report in _MSC_VER (0 = don't define it (default)) + -fno-addrsig Don't emit an address-significance table + -fno-builtin-<value> Disable implicit builtin knowledge of a specific function + -fno-builtin Disable implicit builtin knowledge of functions + -fno-complete-member-pointers + Do not require member pointer base types to be complete if they would be significant under the Microsoft ABI + -fno-coverage-mapping Disable code coverage analysis -fno-debug-macro Do not emit macro debug information -fno-delayed-template-parsing Disable delayed template parsing + -fno-sanitize-address-poison-class-member-array-new-cookie + Disable poisoning array cookies when using class member operator new[] in AddressSanitizer -fno-sanitize-address-use-after-scope Disable use-after-scope detection in AddressSanitizer -fno-sanitize-blacklist Don't use blacklist file for sanitizers @@ -2945,6 +2964,8 @@ Execute ``clang-cl /?`` to see a list of supported options: Level of field padding for AddressSanitizer -fsanitize-address-globals-dead-stripping Enable linker dead stripping of globals in AddressSanitizer + -fsanitize-address-poison-class-member-array-new-cookie + Enable poisoning array cookies when using class member operator new[] in AddressSanitizer -fsanitize-address-use-after-scope Enable use-after-scope detection in AddressSanitizer -fsanitize-blacklist=<value> |