7010594: Add /SAFESEH to links on windows to verify safe exceptions
Reviewed-by: alanb
--- a/jdk/make/common/Defs-windows.gmk Wed Feb 16 13:29:58 2011 -0800
+++ b/jdk/make/common/Defs-windows.gmk Wed Feb 16 14:33:48 2011 -0800
@@ -359,7 +359,13 @@
# VS2008 has bufferoverflow baked in:
LFLAGS_VS2008 =
- LFLAGS_VS2010 =
+
+ # VS2010, always need safe exception handlers, not needed on 64bit
+ ifeq ($(ARCH_DATA_MODEL), 32)
+ LFLAGS_VS2010 = -SAFESEH
+ else
+ LFLAGS_VS2010 =
+ endif
# LFLAGS are the flags given to $(LINK) and used to build the actual DLL file
BASELFLAGS = -nologo /opt:REF /incremental:no
--- a/jdk/make/common/shared/Defs-windows.gmk Wed Feb 16 13:29:58 2011 -0800
+++ b/jdk/make/common/shared/Defs-windows.gmk Wed Feb 16 14:33:48 2011 -0800
@@ -772,9 +772,20 @@
BANNED_DLLS=msvcp100[.]dll|msvcr100d[.]dll|msvcrtd[.]dll
endif
-# Macro to check it's input file for banned dependencies and verify the
-# binary was built properly. Relies on process exit code.
-define binary_file_verification # binary_file
+# Check for /safeseh (only used on 32bit)
+define binary_file_safeseh_verification # binary_file
+( \
+ $(ECHO) "Checking for /SAFESEH usage in: $1" && \
+ if [ "`$(DUMPBIN) /loadconfig $1 | $(EGREP) -i 'Safe Exception Handler Table'`" = "" ] ; then \
+ $(ECHO) "ERROR: Did not find 'Safe Exception Handler Table' in loadconfig: $1" ; \
+ $(DUMPBIN) /loadconfig $1 ; \
+ exit 6 ; \
+ fi ; \
+)
+endef
+
+# Check for /NXCOMPAT usage
+define binary_file_nxcompat_verification # binary_file
( \
$(ECHO) "Checking for /NXCOMPAT usage in: $1" && \
if [ "`$(DUMPBIN) /headers $1 | $(EGREP) -i 'NX compatible'`" = "" ] ; then \
@@ -782,12 +793,24 @@
$(DUMPBIN) /headers $1 ; \
exit 7 ; \
fi ; \
+)
+endef
+
+# Check for /DYNAMICBASE usage
+define binary_file_dynamicbase_verification # binary_file
+( \
$(ECHO) "Checking for /DYNAMICBASE usage in: $1" && \
if [ "`$(DUMPBIN) /headers $1 | $(EGREP) -i 'Dynamic base'`" = "" ] ; then \
$(ECHO) "ERROR: Did not find 'Dynamic base' in headers: $1" ; \
$(DUMPBIN) /headers $1 ; \
exit 8 ; \
fi ; \
+)
+endef
+
+# Check for banned dll usage
+define binary_file_dll_verification # binary_file
+( \
$(ECHO) "Checking for banned dependencies in: $1" && \
if [ "`$(DUMPBIN) /dependents $1 | $(EGREP) -i '$(BANNED_DLLS)'`" != "" ] ; then \
$(ECHO) "ERROR: Found use of $(BANNED_DLLS)"; \
@@ -797,6 +820,27 @@
)
endef
+# Macro to check it's input file for properly built executables.
+# Relies on process exit code. Different for 32bit vs 64bit.
+ifeq ($(ARCH_DATA_MODEL),32)
+define binary_file_verification # binary_file
+( \
+ $(call binary_file_safeseh_verification,$1); \
+ $(call binary_file_nxcompat_verification,$1); \
+ $(call binary_file_dynamicbase_verification,$1); \
+ $(call binary_file_dll_verification,$1); \
+)
+endef
+else
+define binary_file_verification # binary_file
+( \
+ $(call binary_file_nxcompat_verification,$1); \
+ $(call binary_file_dynamicbase_verification,$1); \
+ $(call binary_file_dll_verification,$1); \
+)
+endef
+endif
+
else
# Macro to check it's input file for banned dependencies and verify the