clang 17.0.0git
Fuchsia.cpp
Go to the documentation of this file.
1//===--- Fuchsia.cpp - Fuchsia ToolChain Implementations --------*- C++ -*-===//
2//
3// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4// See https://llvm.org/LICENSE.txt for license information.
5// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6//
7//===----------------------------------------------------------------------===//
8
9#include "Fuchsia.h"
10#include "CommonArgs.h"
11#include "clang/Config/config.h"
13#include "clang/Driver/Driver.h"
18#include "llvm/Option/ArgList.h"
19#include "llvm/ProfileData/InstrProf.h"
20#include "llvm/Support/FileSystem.h"
21#include "llvm/Support/Path.h"
22#include "llvm/Support/VirtualFileSystem.h"
23
24using namespace clang::driver;
25using namespace clang::driver::toolchains;
26using namespace clang::driver::tools;
27using namespace clang;
28using namespace llvm::opt;
29
31
33 const InputInfo &Output,
34 const InputInfoList &Inputs,
35 const ArgList &Args,
36 const char *LinkingOutput) const {
38 static_cast<const toolchains::Fuchsia &>(getToolChain());
39 const Driver &D = ToolChain.getDriver();
40
41 const llvm::Triple &Triple = ToolChain.getEffectiveTriple();
42
43 ArgStringList CmdArgs;
44
45 // Silence warning for "clang -g foo.o -o foo"
46 Args.ClaimAllArgs(options::OPT_g_Group);
47 // and "clang -emit-llvm foo.o -o foo"
48 Args.ClaimAllArgs(options::OPT_emit_llvm);
49 // and for "clang -w foo.o -o foo". Other warning options are already
50 // handled somewhere else.
51 Args.ClaimAllArgs(options::OPT_w);
52
53 CmdArgs.push_back("-z");
54 CmdArgs.push_back("max-page-size=4096");
55
56 CmdArgs.push_back("-z");
57 CmdArgs.push_back("now");
58
59 const char *Exec = Args.MakeArgString(ToolChain.GetLinkerPath());
60 if (llvm::sys::path::filename(Exec).equals_insensitive("ld.lld") ||
61 llvm::sys::path::stem(Exec).equals_insensitive("ld.lld")) {
62 CmdArgs.push_back("-z");
63 CmdArgs.push_back("rodynamic");
64 CmdArgs.push_back("-z");
65 CmdArgs.push_back("separate-loadable-segments");
66 CmdArgs.push_back("-z");
67 CmdArgs.push_back("rel");
68 CmdArgs.push_back("--pack-dyn-relocs=relr");
69 }
70
71 if (!D.SysRoot.empty())
72 CmdArgs.push_back(Args.MakeArgString("--sysroot=" + D.SysRoot));
73
74 if (!Args.hasArg(options::OPT_shared) && !Args.hasArg(options::OPT_r))
75 CmdArgs.push_back("-pie");
76
77 if (Args.hasArg(options::OPT_rdynamic))
78 CmdArgs.push_back("-export-dynamic");
79
80 if (Args.hasArg(options::OPT_s))
81 CmdArgs.push_back("-s");
82
83 if (Args.hasArg(options::OPT_r)) {
84 CmdArgs.push_back("-r");
85 } else {
86 CmdArgs.push_back("--build-id");
87 CmdArgs.push_back("--hash-style=gnu");
88 }
89
90 if (ToolChain.getArch() == llvm::Triple::aarch64) {
91 CmdArgs.push_back("--execute-only");
92
93 std::string CPU = getCPUName(D, Args, Triple);
94 if (CPU.empty() || CPU == "generic" || CPU == "cortex-a53")
95 CmdArgs.push_back("--fix-cortex-a53-843419");
96 }
97
98 CmdArgs.push_back("--eh-frame-hdr");
99
100 if (Args.hasArg(options::OPT_static))
101 CmdArgs.push_back("-Bstatic");
102 else if (Args.hasArg(options::OPT_shared))
103 CmdArgs.push_back("-shared");
104
105 const SanitizerArgs &SanArgs = ToolChain.getSanitizerArgs(Args);
106
107 if (!Args.hasArg(options::OPT_shared) && !Args.hasArg(options::OPT_r)) {
108 std::string Dyld = D.DyldPrefix;
109 if (SanArgs.needsAsanRt() && SanArgs.needsSharedRt())
110 Dyld += "asan/";
111 if (SanArgs.needsHwasanRt() && SanArgs.needsSharedRt())
112 Dyld += "hwasan/";
113 if (SanArgs.needsTsanRt() && SanArgs.needsSharedRt())
114 Dyld += "tsan/";
115 Dyld += "ld.so.1";
116 CmdArgs.push_back("-dynamic-linker");
117 CmdArgs.push_back(Args.MakeArgString(Dyld));
118 }
119
120 if (ToolChain.getArch() == llvm::Triple::riscv64)
121 CmdArgs.push_back("-X");
122
123 CmdArgs.push_back("-o");
124 CmdArgs.push_back(Output.getFilename());
125
126 if (!Args.hasArg(options::OPT_nostdlib, options::OPT_nostartfiles,
127 options::OPT_r)) {
128 if (!Args.hasArg(options::OPT_shared)) {
129 CmdArgs.push_back(Args.MakeArgString(ToolChain.GetFilePath("Scrt1.o")));
130 }
131 }
132
133 Args.AddAllArgs(CmdArgs, options::OPT_L);
134 Args.AddAllArgs(CmdArgs, options::OPT_u);
135
136 ToolChain.AddFilePathLibArgs(Args, CmdArgs);
137
138 if (D.isUsingLTO()) {
139 assert(!Inputs.empty() && "Must have at least one input.");
140 addLTOOptions(ToolChain, Args, CmdArgs, Output, Inputs[0],
141 D.getLTOMode() == LTOK_Thin);
142 }
143
145 AddLinkerInputs(ToolChain, Inputs, Args, CmdArgs, JA);
146
147 if (!Args.hasArg(options::OPT_nostdlib, options::OPT_nodefaultlibs,
148 options::OPT_r)) {
149 if (Args.hasArg(options::OPT_static))
150 CmdArgs.push_back("-Bdynamic");
151
152 if (D.CCCIsCXX()) {
153 if (ToolChain.ShouldLinkCXXStdlib(Args)) {
154 bool OnlyLibstdcxxStatic = Args.hasArg(options::OPT_static_libstdcxx) &&
155 !Args.hasArg(options::OPT_static);
156 CmdArgs.push_back("--push-state");
157 CmdArgs.push_back("--as-needed");
158 if (OnlyLibstdcxxStatic)
159 CmdArgs.push_back("-Bstatic");
160 ToolChain.AddCXXStdlibLibArgs(Args, CmdArgs);
161 if (OnlyLibstdcxxStatic)
162 CmdArgs.push_back("-Bdynamic");
163 CmdArgs.push_back("-lm");
164 CmdArgs.push_back("--pop-state");
165 }
166 }
167
168 // Note that Fuchsia never needs to link in sanitizer runtime deps. Any
169 // sanitizer runtimes with system dependencies use the `.deplibs` feature
170 // instead.
171 addSanitizerRuntimes(ToolChain, Args, CmdArgs);
172
173 addXRayRuntime(ToolChain, Args, CmdArgs);
174
175 ToolChain.addProfileRTLibs(Args, CmdArgs);
176
177 AddRunTimeLibs(ToolChain, D, CmdArgs, Args);
178
179 if (Args.hasArg(options::OPT_pthread) ||
180 Args.hasArg(options::OPT_pthreads))
181 CmdArgs.push_back("-lpthread");
182
183 if (Args.hasArg(options::OPT_fsplit_stack))
184 CmdArgs.push_back("--wrap=pthread_create");
185
186 if (!Args.hasArg(options::OPT_nolibc))
187 CmdArgs.push_back("-lc");
188 }
189
190 C.addCommand(std::make_unique<Command>(JA, *this, ResponseFileSupport::None(),
191 Exec, CmdArgs, Inputs, Output));
192}
193
195 const InputInfo &Output,
196 const InputInfoList &Inputs,
197 const ArgList &Args,
198 const char *LinkingOutput) const {
199 const Driver &D = getToolChain().getDriver();
200
201 // Silence warning for "clang -g foo.o -o foo"
202 Args.ClaimAllArgs(options::OPT_g_Group);
203 // and "clang -emit-llvm foo.o -o foo"
204 Args.ClaimAllArgs(options::OPT_emit_llvm);
205 // and for "clang -w foo.o -o foo". Other warning options are already
206 // handled somewhere else.
207 Args.ClaimAllArgs(options::OPT_w);
208 // Silence warnings when linking C code with a C++ '-stdlib' argument.
209 Args.ClaimAllArgs(options::OPT_stdlib_EQ);
210
211 // ar tool command "llvm-ar <options> <output_file> <input_files>".
212 ArgStringList CmdArgs;
213 // Create and insert file members with a deterministic index.
214 CmdArgs.push_back("rcsD");
215 CmdArgs.push_back(Output.getFilename());
216
217 for (const auto &II : Inputs) {
218 if (II.isFilename()) {
219 CmdArgs.push_back(II.getFilename());
220 }
221 }
222
223 // Delete old output archive file if it already exists before generating a new
224 // archive file.
225 const char *OutputFileName = Output.getFilename();
226 if (Output.isFilename() && llvm::sys::fs::exists(OutputFileName)) {
227 if (std::error_code EC = llvm::sys::fs::remove(OutputFileName)) {
228 D.Diag(diag::err_drv_unable_to_remove_file) << EC.message();
229 return;
230 }
231 }
232
233 const char *Exec = Args.MakeArgString(getToolChain().GetStaticLibToolPath());
234 C.addCommand(std::make_unique<Command>(JA, *this,
236 Exec, CmdArgs, Inputs, Output));
237}
238
239/// Fuchsia - Fuchsia tool chain which can call as(1) and ld(1) directly.
240
241Fuchsia::Fuchsia(const Driver &D, const llvm::Triple &Triple,
242 const ArgList &Args)
243 : ToolChain(D, Triple, Args) {
244 getProgramPaths().push_back(getDriver().getInstalledDir());
245 if (getDriver().getInstalledDir() != D.Dir)
246 getProgramPaths().push_back(D.Dir);
247
248 if (!D.SysRoot.empty()) {
250 llvm::sys::path::append(P, "lib");
251 getFilePaths().push_back(std::string(P.str()));
252 }
253
254 auto FilePaths = [&](const Multilib &M) -> std::vector<std::string> {
255 std::vector<std::string> FP;
256 for (const std::string &Path : getStdlibPaths()) {
257 SmallString<128> P(Path);
258 llvm::sys::path::append(P, M.gccSuffix());
259 FP.push_back(std::string(P.str()));
260 }
261 return FP;
262 };
263
265 // Use the noexcept variant with -fno-exceptions to avoid the extra overhead.
266 Multilibs.push_back(MultilibBuilder("noexcept", {}, {}, 1)
267 .flag("-fexceptions")
268 .flag("+fno-exceptions")
269 .makeMultilib());
270 // ASan has higher priority because we always want the instrumentated version.
271 Multilibs.push_back(MultilibBuilder("asan", {}, {}, 2)
272 .flag("+fsanitize=address")
273 .makeMultilib());
274 // Use the asan+noexcept variant with ASan and -fno-exceptions.
275 Multilibs.push_back(MultilibBuilder("asan+noexcept", {}, {}, 3)
276 .flag("+fsanitize=address")
277 .flag("-fexceptions")
278 .flag("+fno-exceptions")
279 .makeMultilib());
280 // HWASan has higher priority because we always want the instrumentated
281 // version.
282 Multilibs.push_back(MultilibBuilder("hwasan", {}, {}, 4)
283 .flag("+fsanitize=hwaddress")
284 .makeMultilib());
285 // Use the hwasan+noexcept variant with HWASan and -fno-exceptions.
286 Multilibs.push_back(MultilibBuilder("hwasan+noexcept", {}, {}, 5)
287 .flag("+fsanitize=hwaddress")
288 .flag("-fexceptions")
289 .flag("+fno-exceptions")
290 .makeMultilib());
291 // Use Itanium C++ ABI for the compat multilib.
292 Multilibs.push_back(MultilibBuilder("compat", {}, {}, 6)
293 .flag("+fc++-abi=itanium")
294 .makeMultilib());
295
296 Multilibs.FilterOut([&](const Multilib &M) {
297 std::vector<std::string> RD = FilePaths(M);
298 return llvm::all_of(RD, [&](std::string P) { return !getVFS().exists(P); });
299 });
300
303 Args.hasFlag(options::OPT_fexceptions, options::OPT_fno_exceptions, true),
304 "fexceptions", Flags);
305 addMultilibFlag(getSanitizerArgs(Args).needsAsanRt(), "fsanitize=address",
306 Flags);
307 addMultilibFlag(getSanitizerArgs(Args).needsHwasanRt(), "fsanitize=hwaddress",
308 Flags);
309
310 addMultilibFlag(Args.getLastArgValue(options::OPT_fcxx_abi_EQ) == "itanium",
311 "fc++-abi=itanium", Flags);
312
314
317 if (const auto &PathsCallback = Multilibs.filePathsCallback())
318 for (const auto &Path : PathsCallback(SelectedMultilib))
319 // Prepend the multilib path to ensure it takes the precedence.
320 getFilePaths().insert(getFilePaths().begin(), Path);
321}
322
323std::string Fuchsia::ComputeEffectiveClangTriple(const ArgList &Args,
324 types::ID InputType) const {
325 llvm::Triple Triple(ComputeLLVMTriple(Args, InputType));
326 return Triple.str();
327}
328
330 return new tools::fuchsia::Linker(*this);
331}
332
334 return new tools::fuchsia::StaticLibTool(*this);
335}
336
338 const ArgList &Args) const {
339 if (Arg *A = Args.getLastArg(clang::driver::options::OPT_rtlib_EQ)) {
340 StringRef Value = A->getValue();
341 if (Value != "compiler-rt")
342 getDriver().Diag(clang::diag::err_drv_invalid_rtlib_name)
343 << A->getAsString(Args);
344 }
345
347}
348
350Fuchsia::GetCXXStdlibType(const ArgList &Args) const {
351 if (Arg *A = Args.getLastArg(options::OPT_stdlib_EQ)) {
352 StringRef Value = A->getValue();
353 if (Value != "libc++")
354 getDriver().Diag(diag::err_drv_invalid_stdlib_name)
355 << A->getAsString(Args);
356 }
357
359}
360
361void Fuchsia::addClangTargetOptions(const ArgList &DriverArgs,
362 ArgStringList &CC1Args,
363 Action::OffloadKind) const {
364 if (!DriverArgs.hasFlag(options::OPT_fuse_init_array,
365 options::OPT_fno_use_init_array, true))
366 CC1Args.push_back("-fno-use-init-array");
367}
368
369void Fuchsia::AddClangSystemIncludeArgs(const ArgList &DriverArgs,
370 ArgStringList &CC1Args) const {
371 const Driver &D = getDriver();
372
373 if (DriverArgs.hasArg(options::OPT_nostdinc))
374 return;
375
376 if (!DriverArgs.hasArg(options::OPT_nobuiltininc)) {
378 llvm::sys::path::append(P, "include");
379 addSystemInclude(DriverArgs, CC1Args, P);
380 }
381
382 if (DriverArgs.hasArg(options::OPT_nostdlibinc))
383 return;
384
385 // Check for configure-time C include directories.
386 StringRef CIncludeDirs(C_INCLUDE_DIRS);
387 if (CIncludeDirs != "") {
389 CIncludeDirs.split(dirs, ":");
390 for (StringRef dir : dirs) {
391 StringRef Prefix =
392 llvm::sys::path::is_absolute(dir) ? "" : StringRef(D.SysRoot);
393 addExternCSystemInclude(DriverArgs, CC1Args, Prefix + dir);
394 }
395 return;
396 }
397
398 if (!D.SysRoot.empty()) {
400 llvm::sys::path::append(P, "include");
401 addExternCSystemInclude(DriverArgs, CC1Args, P.str());
402 }
403}
404
405void Fuchsia::AddClangCXXStdlibIncludeArgs(const ArgList &DriverArgs,
406 ArgStringList &CC1Args) const {
407 if (DriverArgs.hasArg(options::OPT_nostdinc, options::OPT_nostdlibinc,
408 options::OPT_nostdincxx))
409 return;
410
411 const Driver &D = getDriver();
412 std::string Target = getTripleString();
413
414 auto AddCXXIncludePath = [&](StringRef Path) {
415 std::string Version = detectLibcxxVersion(Path);
416 if (Version.empty())
417 return;
418
419 // First add the per-target include path.
420 SmallString<128> TargetDir(Path);
421 llvm::sys::path::append(TargetDir, Target, "c++", Version);
422 if (getVFS().exists(TargetDir))
423 addSystemInclude(DriverArgs, CC1Args, TargetDir);
424
425 // Second add the generic one.
426 SmallString<128> Dir(Path);
427 llvm::sys::path::append(Dir, "c++", Version);
428 addSystemInclude(DriverArgs, CC1Args, Dir);
429 };
430
431 switch (GetCXXStdlibType(DriverArgs)) {
434 llvm::sys::path::append(P, "..", "include");
435 AddCXXIncludePath(P);
436 break;
437 }
438
439 default:
440 llvm_unreachable("invalid stdlib name");
441 }
442}
443
444void Fuchsia::AddCXXStdlibLibArgs(const ArgList &Args,
445 ArgStringList &CmdArgs) const {
446 switch (GetCXXStdlibType(Args)) {
448 CmdArgs.push_back("-lc++");
449 if (Args.hasArg(options::OPT_fexperimental_library))
450 CmdArgs.push_back("-lc++experimental");
451 break;
452
454 llvm_unreachable("invalid stdlib name");
455 }
456}
457
460 Res |= SanitizerKind::Address;
461 Res |= SanitizerKind::HWAddress;
462 Res |= SanitizerKind::PointerCompare;
463 Res |= SanitizerKind::PointerSubtract;
464 Res |= SanitizerKind::Fuzzer;
465 Res |= SanitizerKind::FuzzerNoLink;
466 Res |= SanitizerKind::Leak;
467 Res |= SanitizerKind::SafeStack;
468 Res |= SanitizerKind::Scudo;
469 Res |= SanitizerKind::Thread;
470 return Res;
471}
472
474 SanitizerMask Res;
475 switch (getTriple().getArch()) {
476 case llvm::Triple::aarch64:
477 case llvm::Triple::riscv64:
478 Res |= SanitizerKind::ShadowCallStack;
479 break;
480 case llvm::Triple::x86_64:
481 Res |= SanitizerKind::SafeStack;
482 break;
483 default:
484 break;
485 }
486 return Res;
487}
StringRef P
Compilation - A set of tasks to perform for a single driver invocation.
Definition: Compilation.h:45
Driver - Encapsulate logic for constructing compilation processes from a set of gcc-driver-like comma...
Definition: Driver.h:77
std::string SysRoot
sysroot, if present
Definition: Driver.h:183
std::string DyldPrefix
Dynamic loader prefix, if present.
Definition: Driver.h:186
DiagnosticBuilder Diag(unsigned DiagID) const
Definition: Driver.h:144
LTOKind getLTOMode(bool IsOffload=false) const
Get the specific kind of LTO being performed.
Definition: Driver.h:704
std::string ResourceDir
The path to the compiler resource directory.
Definition: Driver.h:167
bool isUsingLTO(bool IsOffload=false) const
Returns true if we are performing any kind of LTO.
Definition: Driver.h:699
std::string Dir
The path the driver executable was in, as invoked from the command line.
Definition: Driver.h:155
bool CCCIsCXX() const
Whether the driver should follow g++ like behavior.
Definition: Driver.h:216
InputInfo - Wrapper for information about an input source.
Definition: InputInfo.h:22
const char * getFilename() const
Definition: InputInfo.h:83
bool isFilename() const
Definition: InputInfo.h:75
This corresponds to a single GCC multilib, or a segment of one controlled by a command line flag.
MultilibSet & setFilePathsCallback(IncludeDirsFunc F)
Definition: Multilib.h:126
MultilibSet & FilterOut(FilterCallback F)
Filter out some subset of the Multilibs using a user defined callback.
Definition: Multilib.cpp:86
bool select(const Multilib::flags_list &Flags, Multilib &M) const
Pick the best multilib in the set,.
Definition: Multilib.cpp:99
const IncludeDirsFunc & filePathsCallback() const
Definition: Multilib.h:131
void push_back(const Multilib &M)
Add a completed Multilib to the set.
Definition: Multilib.cpp:91
This corresponds to a single GCC Multilib, or a segment of one controlled by a command line flag.
Definition: Multilib.h:30
std::vector< std::string > flags_list
Definition: Multilib.h:32
bool isDefault() const
Check whether the default is selected.
Definition: Multilib.h:74
ToolChain - Access to tools for a single platform.
Definition: ToolChain.h:91
static void addSystemInclude(const llvm::opt::ArgList &DriverArgs, llvm::opt::ArgStringList &CC1Args, const Twine &Path)
Utility function to add a system include directory to CC1 arguments.
Definition: ToolChain.cpp:969
path_list getStdlibPaths() const
Definition: ToolChain.cpp:615
bool ShouldLinkCXXStdlib(const llvm::opt::ArgList &Args) const
Returns if the C++ standard library should be linked in.
Definition: ToolChain.cpp:1071
static void addExternCSystemInclude(const llvm::opt::ArgList &DriverArgs, llvm::opt::ArgStringList &CC1Args, const Twine &Path)
Utility function to add a system include directory with extern "C" semantics to CC1 arguments.
Definition: ToolChain.cpp:984
std::string GetFilePath(const char *Name) const
Definition: ToolChain.cpp:660
path_list & getFilePaths()
Definition: ToolChain.h:278
llvm::Triple::ArchType getArch() const
Definition: ToolChain.h:252
const Driver & getDriver() const
Definition: ToolChain.h:236
virtual std::string detectLibcxxVersion(StringRef IncludePath) const
Definition: ToolChain.cpp:1016
llvm::vfs::FileSystem & getVFS() const
Definition: ToolChain.cpp:127
virtual std::string ComputeLLVMTriple(const llvm::opt::ArgList &Args, types::ID InputType=types::TY_INVALID) const
ComputeLLVMTriple - Return the LLVM target triple to use, after taking command line arguments into ac...
Definition: ToolChain.cpp:802
path_list & getProgramPaths()
Definition: ToolChain.h:281
const llvm::Triple & getEffectiveTriple() const
Get the toolchain's effective clang triple.
Definition: ToolChain.h:266
virtual void AddCXXStdlibLibArgs(const llvm::opt::ArgList &Args, llvm::opt::ArgStringList &CmdArgs) const
AddCXXStdlibLibArgs - Add the system specific linker arguments to use for the given C++ standard libr...
Definition: ToolChain.cpp:1077
const llvm::Triple & getTriple() const
Definition: ToolChain.h:238
virtual void addProfileRTLibs(const llvm::opt::ArgList &Args, llvm::opt::ArgStringList &CmdArgs) const
addProfileRTLibs - When -fprofile-instr-profile is specified, try to pass a suitable profile runtime ...
Definition: ToolChain.cpp:873
std::string GetLinkerPath(bool *LinkerIsLLD=nullptr) const
Returns the linker path, respecting the -fuse-ld= argument to determine the linker suffix or name.
Definition: ToolChain.cpp:668
void AddFilePathLibArgs(const llvm::opt::ArgList &Args, llvm::opt::ArgStringList &CmdArgs) const
AddFilePathLibArgs - Add each thing in getFilePaths() as a "-L" option.
Definition: ToolChain.cpp:1096
std::string getTripleString() const
Definition: ToolChain.h:261
SanitizerArgs getSanitizerArgs(const llvm::opt::ArgList &JobArgs) const
Definition: ToolChain.cpp:174
virtual SanitizerMask getSupportedSanitizers() const
Return sanitizers which are available in this toolchain.
Definition: ToolChain.cpp:1144
Tool - Information on a specific compilation tool.
Definition: Tool.h:32
const ToolChain & getToolChain() const
Definition: Tool.h:52
Tool * buildStaticLibTool() const override
Definition: Fuchsia.cpp:333
SanitizerMask getSupportedSanitizers() const override
Return sanitizers which are available in this toolchain.
Definition: Fuchsia.cpp:458
void AddClangSystemIncludeArgs(const llvm::opt::ArgList &DriverArgs, llvm::opt::ArgStringList &CC1Args) const override
Add the clang cc1 arguments for system include paths.
Definition: Fuchsia.cpp:369
void AddCXXStdlibLibArgs(const llvm::opt::ArgList &Args, llvm::opt::ArgStringList &CmdArgs) const override
AddCXXStdlibLibArgs - Add the system specific linker arguments to use for the given C++ standard libr...
Definition: Fuchsia.cpp:444
RuntimeLibType GetRuntimeLibType(const llvm::opt::ArgList &Args) const override
Definition: Fuchsia.cpp:337
SanitizerMask getDefaultSanitizers() const override
Return sanitizers which are enabled by default.
Definition: Fuchsia.cpp:473
std::string ComputeEffectiveClangTriple(const llvm::opt::ArgList &Args, types::ID InputType) const override
ComputeEffectiveClangTriple - Return the Clang triple to use for this target, which may take into acc...
Definition: Fuchsia.cpp:323
void AddClangCXXStdlibIncludeArgs(const llvm::opt::ArgList &DriverArgs, llvm::opt::ArgStringList &CC1Args) const override
AddClangCXXStdlibIncludeArgs - Add the clang -cc1 level arguments to set the include paths to use for...
Definition: Fuchsia.cpp:405
CXXStdlibType GetCXXStdlibType(const llvm::opt::ArgList &Args) const override
Definition: Fuchsia.cpp:350
Tool * buildLinker() const override
Definition: Fuchsia.cpp:329
void addClangTargetOptions(const llvm::opt::ArgList &DriverArgs, llvm::opt::ArgStringList &CC1Args, Action::OffloadKind DeviceOffloadKind) const override
Add options that need to be passed to cc1 for this target.
Definition: Fuchsia.cpp:361
Fuchsia(const Driver &D, const llvm::Triple &Triple, const llvm::opt::ArgList &Args)
Fuchsia - Fuchsia tool chain which can call as(1) and ld(1) directly.
Definition: Fuchsia.cpp:241
void ConstructJob(Compilation &C, const JobAction &JA, const InputInfo &Output, const InputInfoList &Inputs, const llvm::opt::ArgList &TCArgs, const char *LinkingOutput) const override
ConstructJob - Construct jobs to perform the action JA, writing to Output and with Inputs,...
Definition: Fuchsia.cpp:32
void ConstructJob(Compilation &C, const JobAction &JA, const InputInfo &Output, const InputInfoList &Inputs, const llvm::opt::ArgList &TCArgs, const char *LinkingOutput) const override
ConstructJob - Construct jobs to perform the action JA, writing to Output and with Inputs,...
Definition: Fuchsia.cpp:194
std::string getCPUName(const Driver &D, const llvm::opt::ArgList &Args, const llvm::Triple &T, bool FromAs=false)
void AddRunTimeLibs(const ToolChain &TC, const Driver &D, llvm::opt::ArgStringList &CmdArgs, const llvm::opt::ArgList &Args)
bool addSanitizerRuntimes(const ToolChain &TC, const llvm::opt::ArgList &Args, llvm::opt::ArgStringList &CmdArgs)
bool addXRayRuntime(const ToolChain &TC, const llvm::opt::ArgList &Args, llvm::opt::ArgStringList &CmdArgs)
void addMultilibFlag(bool Enabled, const char *const Flag, Multilib::flags_list &Flags)
Flag must be a flag accepted by the driver with its leading '-' removed,
void addLinkerCompressDebugSectionsOption(const ToolChain &TC, const llvm::opt::ArgList &Args, llvm::opt::ArgStringList &CmdArgs)
Definition: CommonArgs.cpp:289
void addLTOOptions(const ToolChain &ToolChain, const llvm::opt::ArgList &Args, llvm::opt::ArgStringList &CmdArgs, const InputInfo &Output, const InputInfo &Input, bool IsThinLTO)
void AddLinkerInputs(const ToolChain &TC, const InputInfoList &Inputs, const llvm::opt::ArgList &Args, llvm::opt::ArgStringList &CmdArgs, const JobAction &JA)
@ C
Languages that the frontend can parse and compile.
static constexpr ResponseFileSupport None()
Returns a ResponseFileSupport indicating that response files are not supported.
Definition: Job.h:78
static constexpr ResponseFileSupport AtFileCurCP()
Definition: Job.h:92