Coverage Report

Created: 2023-08-29 09:09

/Users/buildslave/jenkins/workspace/coverage/llvm-project/clang/lib/Driver/ToolChains/CloudABI.cpp
Line
Count
Source (jump to first uncovered line)
1
//===--- CloudABI.cpp - CloudABI ToolChain Implementations ------*- C++ -*-===//
2
//
3
// Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4
// See https://llvm.org/LICENSE.txt for license information.
5
// SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6
//
7
//===----------------------------------------------------------------------===//
8
9
#include "CloudABI.h"
10
#include "CommonArgs.h"
11
#include "clang/Driver/Compilation.h"
12
#include "clang/Driver/Driver.h"
13
#include "clang/Driver/InputInfo.h"
14
#include "clang/Driver/Options.h"
15
#include "llvm/ADT/SmallString.h"
16
#include "llvm/Option/ArgList.h"
17
#include "llvm/Support/Path.h"
18
19
using namespace clang::driver;
20
using namespace clang::driver::tools;
21
using namespace clang::driver::toolchains;
22
using namespace clang;
23
using namespace llvm::opt;
24
25
void cloudabi::Linker::ConstructJob(Compilation &C, const JobAction &JA,
26
                                    const InputInfo &Output,
27
                                    const InputInfoList &Inputs,
28
                                    const ArgList &Args,
29
8
                                    const char *LinkingOutput) const {
30
8
  const ToolChain &ToolChain = getToolChain();
31
8
  const Driver &D = ToolChain.getDriver();
32
8
  ArgStringList CmdArgs;
33
34
  // Silence warning for "clang -g foo.o -o foo"
35
8
  Args.ClaimAllArgs(options::OPT_g_Group);
36
  // and "clang -emit-llvm foo.o -o foo"
37
8
  Args.ClaimAllArgs(options::OPT_emit_llvm);
38
  // and for "clang -w foo.o -o foo". Other warning options are already
39
  // handled somewhere else.
40
8
  Args.ClaimAllArgs(options::OPT_w);
41
42
8
  if (!D.SysRoot.empty())
43
0
    CmdArgs.push_back(Args.MakeArgString("--sysroot=" + D.SysRoot));
44
45
  // CloudABI only supports static linkage.
46
8
  CmdArgs.push_back("-Bstatic");
47
8
  CmdArgs.push_back("--no-dynamic-linker");
48
49
  // Provide PIE linker flags in case PIE is default for the architecture.
50
8
  if (ToolChain.isPIEDefault(Args)) {
51
6
    CmdArgs.push_back("-pie");
52
6
    CmdArgs.push_back("-zrelro");
53
6
  }
54
55
8
  CmdArgs.push_back("--eh-frame-hdr");
56
8
  CmdArgs.push_back("--gc-sections");
57
58
8
  if (Output.isFilename()) {
59
8
    CmdArgs.push_back("-o");
60
8
    CmdArgs.push_back(Output.getFilename());
61
8
  } else {
62
0
    assert(Output.isNothing() && "Invalid output.");
63
0
  }
64
65
8
  if (!Args.hasArg(options::OPT_nostdlib, options::OPT_nostartfiles)) {
66
8
    CmdArgs.push_back(Args.MakeArgString(ToolChain.GetFilePath("crt0.o")));
67
8
    CmdArgs.push_back(Args.MakeArgString(ToolChain.GetFilePath("crtbegin.o")));
68
8
  }
69
70
8
  Args.AddAllArgs(CmdArgs, options::OPT_L);
71
8
  ToolChain.AddFilePathLibArgs(Args, CmdArgs);
72
8
  Args.AddAllArgs(CmdArgs,
73
8
                  {options::OPT_T_Group, options::OPT_s, options::OPT_t,
74
8
                   options::OPT_Z_Flag, options::OPT_r});
75
76
8
  if (D.isUsingLTO()) {
77
0
    assert(!Inputs.empty() && "Must have at least one input.");
78
0
    addLTOOptions(ToolChain, Args, CmdArgs, Output, Inputs[0],
79
0
                  D.getLTOMode() == LTOK_Thin);
80
0
  }
81
82
8
  AddLinkerInputs(ToolChain, Inputs, Args, CmdArgs, JA);
83
84
8
  if (ToolChain.ShouldLinkCXXStdlib(Args))
85
3
    ToolChain.AddCXXStdlibLibArgs(Args, CmdArgs);
86
8
  if (!Args.hasArg(options::OPT_nostdlib, options::OPT_nodefaultlibs)) {
87
8
    CmdArgs.push_back("-lc");
88
8
    CmdArgs.push_back("-lcompiler_rt");
89
8
  }
90
91
8
  if (!Args.hasArg(options::OPT_nostdlib, options::OPT_nostartfiles))
92
8
    CmdArgs.push_back(Args.MakeArgString(ToolChain.GetFilePath("crtend.o")));
93
94
8
  const char *Exec = Args.MakeArgString(ToolChain.GetLinkerPath());
95
8
  C.addCommand(std::make_unique<Command>(JA, *this,
96
8
                                         ResponseFileSupport::AtFileCurCP(),
97
8
                                         Exec, CmdArgs, Inputs, Output));
98
8
}
99
100
// CloudABI - CloudABI tool chain which can call ld(1) directly.
101
102
CloudABI::CloudABI(const Driver &D, const llvm::Triple &Triple,
103
                   const ArgList &Args)
104
14
    : Generic_ELF(D, Triple, Args) {
105
14
  SmallString<128> P(getDriver().Dir);
106
14
  llvm::sys::path::append(P, "..", getTriple().str(), "lib");
107
14
  getFilePaths().push_back(std::string(P.str()));
108
14
}
109
110
void CloudABI::addLibCxxIncludePaths(const llvm::opt::ArgList &DriverArgs,
111
3
                                     llvm::opt::ArgStringList &CC1Args) const {
112
3
  SmallString<128> P(getDriver().Dir);
113
3
  llvm::sys::path::append(P, "..", getTriple().str(), "include/c++/v1");
114
3
  addSystemInclude(DriverArgs, CC1Args, P.str());
115
3
}
116
117
void CloudABI::AddCXXStdlibLibArgs(const ArgList &Args,
118
3
                                   ArgStringList &CmdArgs) const {
119
3
  CmdArgs.push_back("-lc++");
120
3
  if (Args.hasArg(options::OPT_fexperimental_library))
121
0
    CmdArgs.push_back("-lc++experimental");
122
3
  CmdArgs.push_back("-lc++abi");
123
3
  CmdArgs.push_back("-lunwind");
124
3
}
125
126
8
Tool *CloudABI::buildLinker() const {
127
8
  return new tools::cloudabi::Linker(*this);
128
8
}
129
130
22
bool CloudABI::isPIEDefault(const llvm::opt::ArgList &Args) const {
131
  // Only enable PIE on architectures that support PC-relative
132
  // addressing. PC-relative addressing is required, as the process
133
  // startup code must be able to relocate itself.
134
22
  switch (getTriple().getArch()) {
135
4
  case llvm::Triple::aarch64:
136
16
  case llvm::Triple::x86_64:
137
16
    return true;
138
6
  default:
139
6
    return false;
140
22
  }
141
22
}
142
143
14
SanitizerMask CloudABI::getSupportedSanitizers() const {
144
14
  SanitizerMask Res = ToolChain::getSupportedSanitizers();
145
14
  Res |= SanitizerKind::SafeStack;
146
14
  return Res;
147
14
}
148
149
14
SanitizerMask CloudABI::getDefaultSanitizers() const {
150
14
  return SanitizerKind::SafeStack;
151
14
}