clang 18.0.0git
Fuchsia.cpp
Go to the documentation of this file.
1//===--- Fuchsia.cpp - Fuchsia ToolChain Implementations --------*- C++ -*-===//
2//
3// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4// See https://llvm.org/LICENSE.txt for license information.
5// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6//
7//===----------------------------------------------------------------------===//
8
9#include "Fuchsia.h"
10#include "CommonArgs.h"
11#include "clang/Config/config.h"
13#include "clang/Driver/Driver.h"
18#include "llvm/Option/ArgList.h"
19#include "llvm/ProfileData/InstrProf.h"
20#include "llvm/Support/FileSystem.h"
21#include "llvm/Support/Path.h"
22#include "llvm/Support/VirtualFileSystem.h"
23
24using namespace clang::driver;
25using namespace clang::driver::toolchains;
26using namespace clang::driver::tools;
27using namespace clang;
28using namespace llvm::opt;
29
31
33 const InputInfo &Output,
34 const InputInfoList &Inputs,
35 const ArgList &Args,
36 const char *LinkingOutput) const {
38 static_cast<const toolchains::Fuchsia &>(getToolChain());
39 const Driver &D = ToolChain.getDriver();
40
41 const llvm::Triple &Triple = ToolChain.getEffectiveTriple();
42
43 ArgStringList CmdArgs;
44
45 // Silence warning for "clang -g foo.o -o foo"
46 Args.ClaimAllArgs(options::OPT_g_Group);
47 // and "clang -emit-llvm foo.o -o foo"
48 Args.ClaimAllArgs(options::OPT_emit_llvm);
49 // and for "clang -w foo.o -o foo". Other warning options are already
50 // handled somewhere else.
51 Args.ClaimAllArgs(options::OPT_w);
52
53 CmdArgs.push_back("-z");
54 CmdArgs.push_back("max-page-size=4096");
55
56 CmdArgs.push_back("-z");
57 CmdArgs.push_back("now");
58
59 CmdArgs.push_back("-z");
60 CmdArgs.push_back("start-stop-visibility=hidden");
61
62 const char *Exec = Args.MakeArgString(ToolChain.GetLinkerPath());
63 if (llvm::sys::path::filename(Exec).equals_insensitive("ld.lld") ||
64 llvm::sys::path::stem(Exec).equals_insensitive("ld.lld")) {
65 CmdArgs.push_back("-z");
66 CmdArgs.push_back("rodynamic");
67 CmdArgs.push_back("-z");
68 CmdArgs.push_back("separate-loadable-segments");
69 CmdArgs.push_back("-z");
70 CmdArgs.push_back("rel");
71 CmdArgs.push_back("--pack-dyn-relocs=relr");
72 }
73
74 if (!D.SysRoot.empty())
75 CmdArgs.push_back(Args.MakeArgString("--sysroot=" + D.SysRoot));
76
77 if (!Args.hasArg(options::OPT_shared) && !Args.hasArg(options::OPT_r))
78 CmdArgs.push_back("-pie");
79
80 if (Args.hasArg(options::OPT_rdynamic))
81 CmdArgs.push_back("-export-dynamic");
82
83 if (Args.hasArg(options::OPT_s))
84 CmdArgs.push_back("-s");
85
86 if (Args.hasArg(options::OPT_r)) {
87 CmdArgs.push_back("-r");
88 } else {
89 CmdArgs.push_back("--build-id");
90 CmdArgs.push_back("--hash-style=gnu");
91 }
92
93 if (ToolChain.getArch() == llvm::Triple::aarch64) {
94 CmdArgs.push_back("--execute-only");
95
96 std::string CPU = getCPUName(D, Args, Triple);
97 if (CPU.empty() || CPU == "generic" || CPU == "cortex-a53")
98 CmdArgs.push_back("--fix-cortex-a53-843419");
99 }
100
101 CmdArgs.push_back("--eh-frame-hdr");
102
103 if (Args.hasArg(options::OPT_static))
104 CmdArgs.push_back("-Bstatic");
105 else if (Args.hasArg(options::OPT_shared))
106 CmdArgs.push_back("-shared");
107
108 const SanitizerArgs &SanArgs = ToolChain.getSanitizerArgs(Args);
109
110 if (!Args.hasArg(options::OPT_shared) && !Args.hasArg(options::OPT_r)) {
111 std::string Dyld = D.DyldPrefix;
112 if (SanArgs.needsAsanRt() && SanArgs.needsSharedRt())
113 Dyld += "asan/";
114 if (SanArgs.needsHwasanRt() && SanArgs.needsSharedRt())
115 Dyld += "hwasan/";
116 if (SanArgs.needsTsanRt() && SanArgs.needsSharedRt())
117 Dyld += "tsan/";
118 Dyld += "ld.so.1";
119 CmdArgs.push_back("-dynamic-linker");
120 CmdArgs.push_back(Args.MakeArgString(Dyld));
121 }
122
123 if (ToolChain.getArch() == llvm::Triple::riscv64)
124 CmdArgs.push_back("-X");
125
126 CmdArgs.push_back("-o");
127 CmdArgs.push_back(Output.getFilename());
128
129 if (!Args.hasArg(options::OPT_nostdlib, options::OPT_nostartfiles,
130 options::OPT_r)) {
131 if (!Args.hasArg(options::OPT_shared)) {
132 CmdArgs.push_back(Args.MakeArgString(ToolChain.GetFilePath("Scrt1.o")));
133 }
134 }
135
136 Args.AddAllArgs(CmdArgs, options::OPT_L);
137 Args.AddAllArgs(CmdArgs, options::OPT_u);
138
139 ToolChain.AddFilePathLibArgs(Args, CmdArgs);
140
141 if (D.isUsingLTO()) {
142 assert(!Inputs.empty() && "Must have at least one input.");
143 addLTOOptions(ToolChain, Args, CmdArgs, Output, Inputs[0],
144 D.getLTOMode() == LTOK_Thin);
145 }
146
148 AddLinkerInputs(ToolChain, Inputs, Args, CmdArgs, JA);
149
150 if (!Args.hasArg(options::OPT_nostdlib, options::OPT_nodefaultlibs,
151 options::OPT_r)) {
152 if (Args.hasArg(options::OPT_static))
153 CmdArgs.push_back("-Bdynamic");
154
155 if (D.CCCIsCXX()) {
156 if (ToolChain.ShouldLinkCXXStdlib(Args)) {
157 bool OnlyLibstdcxxStatic = Args.hasArg(options::OPT_static_libstdcxx) &&
158 !Args.hasArg(options::OPT_static);
159 CmdArgs.push_back("--push-state");
160 CmdArgs.push_back("--as-needed");
161 if (OnlyLibstdcxxStatic)
162 CmdArgs.push_back("-Bstatic");
163 ToolChain.AddCXXStdlibLibArgs(Args, CmdArgs);
164 if (OnlyLibstdcxxStatic)
165 CmdArgs.push_back("-Bdynamic");
166 CmdArgs.push_back("-lm");
167 CmdArgs.push_back("--pop-state");
168 }
169 }
170
171 // Note that Fuchsia never needs to link in sanitizer runtime deps. Any
172 // sanitizer runtimes with system dependencies use the `.deplibs` feature
173 // instead.
174 addSanitizerRuntimes(ToolChain, Args, CmdArgs);
175
176 addXRayRuntime(ToolChain, Args, CmdArgs);
177
178 ToolChain.addProfileRTLibs(Args, CmdArgs);
179
180 AddRunTimeLibs(ToolChain, D, CmdArgs, Args);
181
182 if (Args.hasArg(options::OPT_pthread) ||
183 Args.hasArg(options::OPT_pthreads))
184 CmdArgs.push_back("-lpthread");
185
186 if (Args.hasArg(options::OPT_fsplit_stack))
187 CmdArgs.push_back("--wrap=pthread_create");
188
189 if (!Args.hasArg(options::OPT_nolibc))
190 CmdArgs.push_back("-lc");
191 }
192
193 C.addCommand(std::make_unique<Command>(JA, *this,
195 Exec, CmdArgs, Inputs, Output));
196}
197
199 const InputInfo &Output,
200 const InputInfoList &Inputs,
201 const ArgList &Args,
202 const char *LinkingOutput) const {
203 const Driver &D = getToolChain().getDriver();
204
205 // Silence warning for "clang -g foo.o -o foo"
206 Args.ClaimAllArgs(options::OPT_g_Group);
207 // and "clang -emit-llvm foo.o -o foo"
208 Args.ClaimAllArgs(options::OPT_emit_llvm);
209 // and for "clang -w foo.o -o foo". Other warning options are already
210 // handled somewhere else.
211 Args.ClaimAllArgs(options::OPT_w);
212 // Silence warnings when linking C code with a C++ '-stdlib' argument.
213 Args.ClaimAllArgs(options::OPT_stdlib_EQ);
214
215 // ar tool command "llvm-ar <options> <output_file> <input_files>".
216 ArgStringList CmdArgs;
217 // Create and insert file members with a deterministic index.
218 CmdArgs.push_back("rcsD");
219 CmdArgs.push_back(Output.getFilename());
220
221 for (const auto &II : Inputs) {
222 if (II.isFilename()) {
223 CmdArgs.push_back(II.getFilename());
224 }
225 }
226
227 // Delete old output archive file if it already exists before generating a new
228 // archive file.
229 const char *OutputFileName = Output.getFilename();
230 if (Output.isFilename() && llvm::sys::fs::exists(OutputFileName)) {
231 if (std::error_code EC = llvm::sys::fs::remove(OutputFileName)) {
232 D.Diag(diag::err_drv_unable_to_remove_file) << EC.message();
233 return;
234 }
235 }
236
237 const char *Exec = Args.MakeArgString(getToolChain().GetStaticLibToolPath());
238 C.addCommand(std::make_unique<Command>(JA, *this,
240 Exec, CmdArgs, Inputs, Output));
241}
242
243/// Fuchsia - Fuchsia tool chain which can call as(1) and ld(1) directly.
244
245Fuchsia::Fuchsia(const Driver &D, const llvm::Triple &Triple,
246 const ArgList &Args)
247 : ToolChain(D, Triple, Args) {
248 getProgramPaths().push_back(getDriver().getInstalledDir());
249 if (getDriver().getInstalledDir() != D.Dir)
250 getProgramPaths().push_back(D.Dir);
251
252 if (!D.SysRoot.empty()) {
254 llvm::sys::path::append(P, "lib");
255 getFilePaths().push_back(std::string(P.str()));
256 }
257
258 auto FilePaths = [&](const Multilib &M) -> std::vector<std::string> {
259 std::vector<std::string> FP;
260 if (std::optional<std::string> Path = getStdlibPath()) {
261 SmallString<128> P(*Path);
262 llvm::sys::path::append(P, M.gccSuffix());
263 FP.push_back(std::string(P.str()));
264 }
265 return FP;
266 };
267
269 // Use the noexcept variant with -fno-exceptions to avoid the extra overhead.
270 Multilibs.push_back(MultilibBuilder("noexcept", {}, {})
271 .flag("-fexceptions", /*Disallow=*/true)
272 .flag("-fno-exceptions")
273 .makeMultilib());
274 // ASan has higher priority because we always want the instrumentated version.
275 Multilibs.push_back(MultilibBuilder("asan", {}, {})
276 .flag("-fsanitize=address")
277 .makeMultilib());
278 // Use the asan+noexcept variant with ASan and -fno-exceptions.
279 Multilibs.push_back(MultilibBuilder("asan+noexcept", {}, {})
280 .flag("-fsanitize=address")
281 .flag("-fexceptions", /*Disallow=*/true)
282 .flag("-fno-exceptions")
283 .makeMultilib());
284 // HWASan has higher priority because we always want the instrumentated
285 // version.
286 Multilibs.push_back(MultilibBuilder("hwasan", {}, {})
287 .flag("-fsanitize=hwaddress")
288 .makeMultilib());
289 // Use the hwasan+noexcept variant with HWASan and -fno-exceptions.
290 Multilibs.push_back(MultilibBuilder("hwasan+noexcept", {}, {})
291 .flag("-fsanitize=hwaddress")
292 .flag("-fexceptions", /*Disallow=*/true)
293 .flag("-fno-exceptions")
294 .makeMultilib());
295 // Use Itanium C++ ABI for the compat multilib.
296 Multilibs.push_back(MultilibBuilder("compat", {}, {})
297 .flag("-fc++-abi=itanium")
298 .makeMultilib());
299
300 Multilibs.FilterOut([&](const Multilib &M) {
301 std::vector<std::string> RD = FilePaths(M);
302 return llvm::all_of(RD, [&](std::string P) { return !getVFS().exists(P); });
303 });
304
306 bool Exceptions =
307 Args.hasFlag(options::OPT_fexceptions, options::OPT_fno_exceptions, true);
308 addMultilibFlag(Exceptions, "-fexceptions", Flags);
309 addMultilibFlag(!Exceptions, "-fno-exceptions", Flags);
310 addMultilibFlag(getSanitizerArgs(Args).needsAsanRt(), "-fsanitize=address",
311 Flags);
312 addMultilibFlag(getSanitizerArgs(Args).needsHwasanRt(),
313 "-fsanitize=hwaddress", Flags);
314
315 addMultilibFlag(Args.getLastArgValue(options::OPT_fcxx_abi_EQ) == "itanium",
316 "-fc++-abi=itanium", Flags);
317
319
320 if (Multilibs.select(Flags, SelectedMultilibs)) {
321 // Ensure that -print-multi-directory only outputs one multilib directory.
322 Multilib LastSelected = SelectedMultilibs.back();
323 SelectedMultilibs = {LastSelected};
324
325 if (!SelectedMultilibs.back().isDefault())
326 if (const auto &PathsCallback = Multilibs.filePathsCallback())
327 for (const auto &Path : PathsCallback(SelectedMultilibs.back()))
328 // Prepend the multilib path to ensure it takes the precedence.
329 getFilePaths().insert(getFilePaths().begin(), Path);
330 }
331}
332
333std::string Fuchsia::ComputeEffectiveClangTriple(const ArgList &Args,
334 types::ID InputType) const {
335 llvm::Triple Triple(ComputeLLVMTriple(Args, InputType));
336 return Triple.str();
337}
338
340 return new tools::fuchsia::Linker(*this);
341}
342
344 return new tools::fuchsia::StaticLibTool(*this);
345}
346
348 const ArgList &Args) const {
349 if (Arg *A = Args.getLastArg(clang::driver::options::OPT_rtlib_EQ)) {
350 StringRef Value = A->getValue();
351 if (Value != "compiler-rt")
352 getDriver().Diag(clang::diag::err_drv_invalid_rtlib_name)
353 << A->getAsString(Args);
354 }
355
357}
358
360Fuchsia::GetCXXStdlibType(const ArgList &Args) const {
361 if (Arg *A = Args.getLastArg(options::OPT_stdlib_EQ)) {
362 StringRef Value = A->getValue();
363 if (Value != "libc++")
364 getDriver().Diag(diag::err_drv_invalid_stdlib_name)
365 << A->getAsString(Args);
366 }
367
369}
370
371void Fuchsia::addClangTargetOptions(const ArgList &DriverArgs,
372 ArgStringList &CC1Args,
373 Action::OffloadKind) const {
374 if (!DriverArgs.hasFlag(options::OPT_fuse_init_array,
375 options::OPT_fno_use_init_array, true))
376 CC1Args.push_back("-fno-use-init-array");
377}
378
379void Fuchsia::AddClangSystemIncludeArgs(const ArgList &DriverArgs,
380 ArgStringList &CC1Args) const {
381 const Driver &D = getDriver();
382
383 if (DriverArgs.hasArg(options::OPT_nostdinc))
384 return;
385
386 if (!DriverArgs.hasArg(options::OPT_nobuiltininc)) {
388 llvm::sys::path::append(P, "include");
389 addSystemInclude(DriverArgs, CC1Args, P);
390 }
391
392 if (DriverArgs.hasArg(options::OPT_nostdlibinc))
393 return;
394
395 // Check for configure-time C include directories.
396 StringRef CIncludeDirs(C_INCLUDE_DIRS);
397 if (CIncludeDirs != "") {
399 CIncludeDirs.split(dirs, ":");
400 for (StringRef dir : dirs) {
401 StringRef Prefix =
402 llvm::sys::path::is_absolute(dir) ? "" : StringRef(D.SysRoot);
403 addExternCSystemInclude(DriverArgs, CC1Args, Prefix + dir);
404 }
405 return;
406 }
407
408 if (!D.SysRoot.empty()) {
410 llvm::sys::path::append(P, "include");
411 addExternCSystemInclude(DriverArgs, CC1Args, P.str());
412 }
413}
414
415void Fuchsia::AddClangCXXStdlibIncludeArgs(const ArgList &DriverArgs,
416 ArgStringList &CC1Args) const {
417 if (DriverArgs.hasArg(options::OPT_nostdinc, options::OPT_nostdlibinc,
418 options::OPT_nostdincxx))
419 return;
420
421 const Driver &D = getDriver();
422 std::string Target = getTripleString();
423
424 auto AddCXXIncludePath = [&](StringRef Path) {
425 std::string Version = detectLibcxxVersion(Path);
426 if (Version.empty())
427 return;
428
429 // First add the per-target include path.
430 SmallString<128> TargetDir(Path);
431 llvm::sys::path::append(TargetDir, Target, "c++", Version);
432 if (getVFS().exists(TargetDir))
433 addSystemInclude(DriverArgs, CC1Args, TargetDir);
434
435 // Second add the generic one.
436 SmallString<128> Dir(Path);
437 llvm::sys::path::append(Dir, "c++", Version);
438 addSystemInclude(DriverArgs, CC1Args, Dir);
439 };
440
441 switch (GetCXXStdlibType(DriverArgs)) {
444 llvm::sys::path::append(P, "..", "include");
445 AddCXXIncludePath(P);
446 break;
447 }
448
449 default:
450 llvm_unreachable("invalid stdlib name");
451 }
452}
453
454void Fuchsia::AddCXXStdlibLibArgs(const ArgList &Args,
455 ArgStringList &CmdArgs) const {
456 switch (GetCXXStdlibType(Args)) {
458 CmdArgs.push_back("-lc++");
459 if (Args.hasArg(options::OPT_fexperimental_library))
460 CmdArgs.push_back("-lc++experimental");
461 break;
462
464 llvm_unreachable("invalid stdlib name");
465 }
466}
467
470 Res |= SanitizerKind::Address;
471 Res |= SanitizerKind::HWAddress;
472 Res |= SanitizerKind::PointerCompare;
473 Res |= SanitizerKind::PointerSubtract;
474 Res |= SanitizerKind::Fuzzer;
475 Res |= SanitizerKind::FuzzerNoLink;
476 Res |= SanitizerKind::Leak;
477 Res |= SanitizerKind::SafeStack;
478 Res |= SanitizerKind::Scudo;
479 Res |= SanitizerKind::Thread;
480 return Res;
481}
482
484 SanitizerMask Res;
485 switch (getTriple().getArch()) {
486 case llvm::Triple::aarch64:
487 case llvm::Triple::riscv64:
488 Res |= SanitizerKind::ShadowCallStack;
489 break;
490 case llvm::Triple::x86_64:
491 Res |= SanitizerKind::SafeStack;
492 break;
493 default:
494 break;
495 }
496 return Res;
497}
StringRef P
Compilation - A set of tasks to perform for a single driver invocation.
Definition: Compilation.h:45
Driver - Encapsulate logic for constructing compilation processes from a set of gcc-driver-like comma...
Definition: Driver.h:77
std::string SysRoot
sysroot, if present
Definition: Driver.h:183
std::string DyldPrefix
Dynamic loader prefix, if present.
Definition: Driver.h:186
DiagnosticBuilder Diag(unsigned DiagID) const
Definition: Driver.h:144
LTOKind getLTOMode(bool IsOffload=false) const
Get the specific kind of LTO being performed.
Definition: Driver.h:704
std::string ResourceDir
The path to the compiler resource directory.
Definition: Driver.h:167
bool isUsingLTO(bool IsOffload=false) const
Returns true if we are performing any kind of LTO.
Definition: Driver.h:699
std::string Dir
The path the driver executable was in, as invoked from the command line.
Definition: Driver.h:155
bool CCCIsCXX() const
Whether the driver should follow g++ like behavior.
Definition: Driver.h:216
InputInfo - Wrapper for information about an input source.
Definition: InputInfo.h:22
const char * getFilename() const
Definition: InputInfo.h:83
bool isFilename() const
Definition: InputInfo.h:75
This corresponds to a single GCC multilib, or a segment of one controlled by a command line flag.
bool select(const Multilib::flags_list &Flags, llvm::SmallVector< Multilib > &) const
Select compatible variants,.
Definition: Multilib.cpp:96
MultilibSet & setFilePathsCallback(IncludeDirsFunc F)
Definition: Multilib.h:140
MultilibSet & FilterOut(FilterCallback F)
Filter out some subset of the Multilibs using a user defined callback.
Definition: Multilib.cpp:89
const IncludeDirsFunc & filePathsCallback() const
Definition: Multilib.h:145
void push_back(const Multilib &M)
Add a completed Multilib to the set.
Definition: Multilib.cpp:94
This corresponds to a single GCC Multilib, or a segment of one controlled by a command line flag.
Definition: Multilib.h:32
std::vector< std::string > flags_list
Definition: Multilib.h:34
ToolChain - Access to tools for a single platform.
Definition: ToolChain.h:92
static void addSystemInclude(const llvm::opt::ArgList &DriverArgs, llvm::opt::ArgStringList &CC1Args, const Twine &Path)
Utility function to add a system include directory to CC1 arguments.
Definition: ToolChain.cpp:1133
std::optional< std::string > getStdlibPath() const
Definition: ToolChain.cpp:772
bool ShouldLinkCXXStdlib(const llvm::opt::ArgList &Args) const
Returns if the C++ standard library should be linked in.
Definition: ToolChain.cpp:1235
static void addExternCSystemInclude(const llvm::opt::ArgList &DriverArgs, llvm::opt::ArgStringList &CC1Args, const Twine &Path)
Utility function to add a system include directory with extern "C" semantics to CC1 arguments.
Definition: ToolChain.cpp:1148
std::string GetFilePath(const char *Name) const
Definition: ToolChain.cpp:824
path_list & getFilePaths()
Definition: ToolChain.h:287
llvm::Triple::ArchType getArch() const
Definition: ToolChain.h:261
const Driver & getDriver() const
Definition: ToolChain.h:245
virtual std::string detectLibcxxVersion(StringRef IncludePath) const
Definition: ToolChain.cpp:1180
llvm::vfs::FileSystem & getVFS() const
Definition: ToolChain.cpp:132
virtual std::string ComputeLLVMTriple(const llvm::opt::ArgList &Args, types::ID InputType=types::TY_INVALID) const
ComputeLLVMTriple - Return the LLVM target triple to use, after taking command line arguments into ac...
Definition: ToolChain.cpp:966
path_list & getProgramPaths()
Definition: ToolChain.h:290
const llvm::Triple & getEffectiveTriple() const
Get the toolchain's effective clang triple.
Definition: ToolChain.h:275
virtual void AddCXXStdlibLibArgs(const llvm::opt::ArgList &Args, llvm::opt::ArgStringList &CmdArgs) const
AddCXXStdlibLibArgs - Add the system specific linker arguments to use for the given C++ standard libr...
Definition: ToolChain.cpp:1241
const llvm::Triple & getTriple() const
Definition: ToolChain.h:247
virtual void addProfileRTLibs(const llvm::opt::ArgList &Args, llvm::opt::ArgStringList &CmdArgs) const
addProfileRTLibs - When -fprofile-instr-profile is specified, try to pass a suitable profile runtime ...
Definition: ToolChain.cpp:1037
std::string GetLinkerPath(bool *LinkerIsLLD=nullptr) const
Returns the linker path, respecting the -fuse-ld= argument to determine the linker suffix or name.
Definition: ToolChain.cpp:832
void AddFilePathLibArgs(const llvm::opt::ArgList &Args, llvm::opt::ArgStringList &CmdArgs) const
AddFilePathLibArgs - Add each thing in getFilePaths() as a "-L" option.
Definition: ToolChain.cpp:1260
std::string getTripleString() const
Definition: ToolChain.h:270
SanitizerArgs getSanitizerArgs(const llvm::opt::ArgList &JobArgs) const
Definition: ToolChain.cpp:274
llvm::SmallVector< Multilib > SelectedMultilibs
Definition: ToolChain.h:194
virtual SanitizerMask getSupportedSanitizers() const
Return sanitizers which are available in this toolchain.
Definition: ToolChain.cpp:1308
Tool - Information on a specific compilation tool.
Definition: Tool.h:32
const ToolChain & getToolChain() const
Definition: Tool.h:52
Tool * buildStaticLibTool() const override
Definition: Fuchsia.cpp:343
SanitizerMask getSupportedSanitizers() const override
Return sanitizers which are available in this toolchain.
Definition: Fuchsia.cpp:468
void AddClangSystemIncludeArgs(const llvm::opt::ArgList &DriverArgs, llvm::opt::ArgStringList &CC1Args) const override
Add the clang cc1 arguments for system include paths.
Definition: Fuchsia.cpp:379
void AddCXXStdlibLibArgs(const llvm::opt::ArgList &Args, llvm::opt::ArgStringList &CmdArgs) const override
AddCXXStdlibLibArgs - Add the system specific linker arguments to use for the given C++ standard libr...
Definition: Fuchsia.cpp:454
RuntimeLibType GetRuntimeLibType(const llvm::opt::ArgList &Args) const override
Definition: Fuchsia.cpp:347
SanitizerMask getDefaultSanitizers() const override
Return sanitizers which are enabled by default.
Definition: Fuchsia.cpp:483
std::string ComputeEffectiveClangTriple(const llvm::opt::ArgList &Args, types::ID InputType) const override
ComputeEffectiveClangTriple - Return the Clang triple to use for this target, which may take into acc...
Definition: Fuchsia.cpp:333
void AddClangCXXStdlibIncludeArgs(const llvm::opt::ArgList &DriverArgs, llvm::opt::ArgStringList &CC1Args) const override
AddClangCXXStdlibIncludeArgs - Add the clang -cc1 level arguments to set the include paths to use for...
Definition: Fuchsia.cpp:415
CXXStdlibType GetCXXStdlibType(const llvm::opt::ArgList &Args) const override
Definition: Fuchsia.cpp:360
Tool * buildLinker() const override
Definition: Fuchsia.cpp:339
void addClangTargetOptions(const llvm::opt::ArgList &DriverArgs, llvm::opt::ArgStringList &CC1Args, Action::OffloadKind DeviceOffloadKind) const override
Add options that need to be passed to cc1 for this target.
Definition: Fuchsia.cpp:371
Fuchsia(const Driver &D, const llvm::Triple &Triple, const llvm::opt::ArgList &Args)
Fuchsia - Fuchsia tool chain which can call as(1) and ld(1) directly.
Definition: Fuchsia.cpp:245
void ConstructJob(Compilation &C, const JobAction &JA, const InputInfo &Output, const InputInfoList &Inputs, const llvm::opt::ArgList &TCArgs, const char *LinkingOutput) const override
ConstructJob - Construct jobs to perform the action JA, writing to Output and with Inputs,...
Definition: Fuchsia.cpp:32
void ConstructJob(Compilation &C, const JobAction &JA, const InputInfo &Output, const InputInfoList &Inputs, const llvm::opt::ArgList &TCArgs, const char *LinkingOutput) const override
ConstructJob - Construct jobs to perform the action JA, writing to Output and with Inputs,...
Definition: Fuchsia.cpp:198
std::string getCPUName(const Driver &D, const llvm::opt::ArgList &Args, const llvm::Triple &T, bool FromAs=false)
void addMultilibFlag(bool Enabled, const StringRef Flag, Multilib::flags_list &Flags)
Flag must be a flag accepted by the driver.
void AddRunTimeLibs(const ToolChain &TC, const Driver &D, llvm::opt::ArgStringList &CmdArgs, const llvm::opt::ArgList &Args)
bool addSanitizerRuntimes(const ToolChain &TC, const llvm::opt::ArgList &Args, llvm::opt::ArgStringList &CmdArgs)
bool addXRayRuntime(const ToolChain &TC, const llvm::opt::ArgList &Args, llvm::opt::ArgStringList &CmdArgs)
void addLinkerCompressDebugSectionsOption(const ToolChain &TC, const llvm::opt::ArgList &Args, llvm::opt::ArgStringList &CmdArgs)
Definition: CommonArgs.cpp:306
void addLTOOptions(const ToolChain &ToolChain, const llvm::opt::ArgList &Args, llvm::opt::ArgStringList &CmdArgs, const InputInfo &Output, const InputInfo &Input, bool IsThinLTO)
void AddLinkerInputs(const ToolChain &TC, const InputInfoList &Inputs, const llvm::opt::ArgList &Args, llvm::opt::ArgStringList &CmdArgs, const JobAction &JA)
@ C
Languages that the frontend can parse and compile.
static constexpr ResponseFileSupport AtFileCurCP()
Definition: Job.h:92