xref: /freebsd/contrib/llvm-project/clang/lib/Driver/ToolChains/Fuchsia.cpp (revision 0fca6ea1d4eea4c934cfff25ac9ee8ad6fe95583)
1 //===--- Fuchsia.cpp - Fuchsia ToolChain Implementations --------*- C++ -*-===//
2 //
3 // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4 // See https://llvm.org/LICENSE.txt for license information.
5 // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6 //
7 //===----------------------------------------------------------------------===//
8 
9 #include "Fuchsia.h"
10 #include "CommonArgs.h"
11 #include "clang/Config/config.h"
12 #include "clang/Driver/Compilation.h"
13 #include "clang/Driver/Driver.h"
14 #include "clang/Driver/DriverDiagnostic.h"
15 #include "clang/Driver/MultilibBuilder.h"
16 #include "clang/Driver/Options.h"
17 #include "clang/Driver/SanitizerArgs.h"
18 #include "llvm/Option/ArgList.h"
19 #include "llvm/ProfileData/InstrProf.h"
20 #include "llvm/Support/FileSystem.h"
21 #include "llvm/Support/Path.h"
22 #include "llvm/Support/VirtualFileSystem.h"
23 
24 using namespace clang::driver;
25 using namespace clang::driver::toolchains;
26 using namespace clang::driver::tools;
27 using namespace clang;
28 using namespace llvm::opt;
29 
30 using tools::addMultilibFlag;
31 
ConstructJob(Compilation & C,const JobAction & JA,const InputInfo & Output,const InputInfoList & Inputs,const ArgList & Args,const char * LinkingOutput) const32 void fuchsia::Linker::ConstructJob(Compilation &C, const JobAction &JA,
33                                    const InputInfo &Output,
34                                    const InputInfoList &Inputs,
35                                    const ArgList &Args,
36                                    const char *LinkingOutput) const {
37   const auto &ToolChain = static_cast<const Fuchsia &>(getToolChain());
38   const Driver &D = ToolChain.getDriver();
39 
40   const llvm::Triple &Triple = ToolChain.getEffectiveTriple();
41 
42   ArgStringList CmdArgs;
43 
44   // Silence warning for "clang -g foo.o -o foo"
45   Args.ClaimAllArgs(options::OPT_g_Group);
46   // and "clang -emit-llvm foo.o -o foo"
47   Args.ClaimAllArgs(options::OPT_emit_llvm);
48   // and for "clang -w foo.o -o foo". Other warning options are already
49   // handled somewhere else.
50   Args.ClaimAllArgs(options::OPT_w);
51 
52   CmdArgs.push_back("-z");
53   CmdArgs.push_back("max-page-size=4096");
54 
55   CmdArgs.push_back("-z");
56   CmdArgs.push_back("now");
57 
58   CmdArgs.push_back("-z");
59   CmdArgs.push_back("start-stop-visibility=hidden");
60 
61   const char *Exec = Args.MakeArgString(ToolChain.GetLinkerPath());
62   if (llvm::sys::path::filename(Exec).equals_insensitive("ld.lld") ||
63       llvm::sys::path::stem(Exec).equals_insensitive("ld.lld")) {
64     CmdArgs.push_back("-z");
65     CmdArgs.push_back("rodynamic");
66     CmdArgs.push_back("-z");
67     CmdArgs.push_back("separate-loadable-segments");
68     CmdArgs.push_back("-z");
69     CmdArgs.push_back("rel");
70     CmdArgs.push_back("--pack-dyn-relocs=relr");
71   }
72 
73   if (!D.SysRoot.empty())
74     CmdArgs.push_back(Args.MakeArgString("--sysroot=" + D.SysRoot));
75 
76   if (!Args.hasArg(options::OPT_shared) && !Args.hasArg(options::OPT_r))
77     CmdArgs.push_back("-pie");
78 
79   if (Args.hasArg(options::OPT_rdynamic))
80     CmdArgs.push_back("-export-dynamic");
81 
82   if (Args.hasArg(options::OPT_s))
83     CmdArgs.push_back("-s");
84 
85   if (Args.hasArg(options::OPT_r)) {
86     CmdArgs.push_back("-r");
87   } else {
88     CmdArgs.push_back("--build-id");
89     CmdArgs.push_back("--hash-style=gnu");
90   }
91 
92   if (ToolChain.getArch() == llvm::Triple::aarch64) {
93     CmdArgs.push_back("--execute-only");
94 
95     std::string CPU = getCPUName(D, Args, Triple);
96     if (CPU.empty() || CPU == "generic" || CPU == "cortex-a53")
97       CmdArgs.push_back("--fix-cortex-a53-843419");
98   }
99 
100   CmdArgs.push_back("--eh-frame-hdr");
101 
102   if (Args.hasArg(options::OPT_static))
103     CmdArgs.push_back("-Bstatic");
104   else if (Args.hasArg(options::OPT_shared))
105     CmdArgs.push_back("-shared");
106 
107   const SanitizerArgs &SanArgs = ToolChain.getSanitizerArgs(Args);
108 
109   if (!Args.hasArg(options::OPT_shared) && !Args.hasArg(options::OPT_r)) {
110     std::string Dyld = D.DyldPrefix;
111     if (SanArgs.needsAsanRt() && SanArgs.needsSharedRt())
112       Dyld += "asan/";
113     if (SanArgs.needsHwasanRt() && SanArgs.needsSharedRt())
114       Dyld += "hwasan/";
115     if (SanArgs.needsTsanRt() && SanArgs.needsSharedRt())
116       Dyld += "tsan/";
117     Dyld += "ld.so.1";
118     CmdArgs.push_back("-dynamic-linker");
119     CmdArgs.push_back(Args.MakeArgString(Dyld));
120   }
121 
122   if (Triple.isRISCV64()) {
123     CmdArgs.push_back("-X");
124     if (Args.hasArg(options::OPT_mno_relax))
125       CmdArgs.push_back("--no-relax");
126   }
127 
128   CmdArgs.push_back("-o");
129   CmdArgs.push_back(Output.getFilename());
130 
131   if (!Args.hasArg(options::OPT_nostdlib, options::OPT_nostartfiles,
132                    options::OPT_r)) {
133     if (!Args.hasArg(options::OPT_shared)) {
134       CmdArgs.push_back(Args.MakeArgString(ToolChain.GetFilePath("Scrt1.o")));
135     }
136   }
137 
138   Args.addAllArgs(CmdArgs, {options::OPT_L, options::OPT_u});
139 
140   ToolChain.AddFilePathLibArgs(Args, CmdArgs);
141 
142   if (D.isUsingLTO()) {
143     assert(!Inputs.empty() && "Must have at least one input.");
144     // Find the first filename InputInfo object.
145     auto Input = llvm::find_if(
146         Inputs, [](const InputInfo &II) -> bool { return II.isFilename(); });
147     if (Input == Inputs.end())
148       // For a very rare case, all of the inputs to the linker are
149       // InputArg. If that happens, just use the first InputInfo.
150       Input = Inputs.begin();
151 
152     addLTOOptions(ToolChain, Args, CmdArgs, Output, *Input,
153                   D.getLTOMode() == LTOK_Thin);
154   }
155 
156   addLinkerCompressDebugSectionsOption(ToolChain, Args, CmdArgs);
157   AddLinkerInputs(ToolChain, Inputs, Args, CmdArgs, JA);
158 
159   if (!Args.hasArg(options::OPT_nostdlib, options::OPT_nodefaultlibs,
160                    options::OPT_r)) {
161     if (Args.hasArg(options::OPT_static))
162       CmdArgs.push_back("-Bdynamic");
163 
164     if (D.CCCIsCXX()) {
165       if (ToolChain.ShouldLinkCXXStdlib(Args)) {
166         bool OnlyLibstdcxxStatic = Args.hasArg(options::OPT_static_libstdcxx) &&
167                                    !Args.hasArg(options::OPT_static);
168         CmdArgs.push_back("--push-state");
169         CmdArgs.push_back("--as-needed");
170         if (OnlyLibstdcxxStatic)
171           CmdArgs.push_back("-Bstatic");
172         ToolChain.AddCXXStdlibLibArgs(Args, CmdArgs);
173         if (OnlyLibstdcxxStatic)
174           CmdArgs.push_back("-Bdynamic");
175         CmdArgs.push_back("-lm");
176         CmdArgs.push_back("--pop-state");
177       }
178     }
179 
180     // Note that Fuchsia never needs to link in sanitizer runtime deps.  Any
181     // sanitizer runtimes with system dependencies use the `.deplibs` feature
182     // instead.
183     addSanitizerRuntimes(ToolChain, Args, CmdArgs);
184 
185     addXRayRuntime(ToolChain, Args, CmdArgs);
186 
187     ToolChain.addProfileRTLibs(Args, CmdArgs);
188 
189     AddRunTimeLibs(ToolChain, D, CmdArgs, Args);
190 
191     if (Args.hasArg(options::OPT_pthread) ||
192         Args.hasArg(options::OPT_pthreads))
193       CmdArgs.push_back("-lpthread");
194 
195     if (Args.hasArg(options::OPT_fsplit_stack))
196       CmdArgs.push_back("--wrap=pthread_create");
197 
198     if (!Args.hasArg(options::OPT_nolibc))
199       CmdArgs.push_back("-lc");
200   }
201 
202   C.addCommand(std::make_unique<Command>(JA, *this,
203                                          ResponseFileSupport::AtFileCurCP(),
204                                          Exec, CmdArgs, Inputs, Output));
205 }
206 
ConstructJob(Compilation & C,const JobAction & JA,const InputInfo & Output,const InputInfoList & Inputs,const ArgList & Args,const char * LinkingOutput) const207 void fuchsia::StaticLibTool::ConstructJob(Compilation &C, const JobAction &JA,
208                                           const InputInfo &Output,
209                                           const InputInfoList &Inputs,
210                                           const ArgList &Args,
211                                           const char *LinkingOutput) const {
212   const Driver &D = getToolChain().getDriver();
213 
214   // Silence warning for "clang -g foo.o -o foo"
215   Args.ClaimAllArgs(options::OPT_g_Group);
216   // and "clang -emit-llvm foo.o -o foo"
217   Args.ClaimAllArgs(options::OPT_emit_llvm);
218   // and for "clang -w foo.o -o foo". Other warning options are already
219   // handled somewhere else.
220   Args.ClaimAllArgs(options::OPT_w);
221   // Silence warnings when linking C code with a C++ '-stdlib' argument.
222   Args.ClaimAllArgs(options::OPT_stdlib_EQ);
223 
224   // ar tool command "llvm-ar <options> <output_file> <input_files>".
225   ArgStringList CmdArgs;
226   // Create and insert file members with a deterministic index.
227   CmdArgs.push_back("rcsD");
228   CmdArgs.push_back(Output.getFilename());
229 
230   for (const auto &II : Inputs) {
231     if (II.isFilename()) {
232        CmdArgs.push_back(II.getFilename());
233     }
234   }
235 
236   // Delete old output archive file if it already exists before generating a new
237   // archive file.
238   const char *OutputFileName = Output.getFilename();
239   if (Output.isFilename() && llvm::sys::fs::exists(OutputFileName)) {
240     if (std::error_code EC = llvm::sys::fs::remove(OutputFileName)) {
241       D.Diag(diag::err_drv_unable_to_remove_file) << EC.message();
242       return;
243     }
244   }
245 
246   const char *Exec = Args.MakeArgString(getToolChain().GetStaticLibToolPath());
247   C.addCommand(std::make_unique<Command>(JA, *this,
248                                          ResponseFileSupport::AtFileCurCP(),
249                                          Exec, CmdArgs, Inputs, Output));
250 }
251 
252 /// Fuchsia - Fuchsia tool chain which can call as(1) and ld(1) directly.
253 
Fuchsia(const Driver & D,const llvm::Triple & Triple,const ArgList & Args)254 Fuchsia::Fuchsia(const Driver &D, const llvm::Triple &Triple,
255                  const ArgList &Args)
256     : ToolChain(D, Triple, Args) {
257   getProgramPaths().push_back(getDriver().Dir);
258 
259   if (!D.SysRoot.empty()) {
260     SmallString<128> P(D.SysRoot);
261     llvm::sys::path::append(P, "lib");
262     getFilePaths().push_back(std::string(P));
263   }
264 
265   auto FilePaths = [&](const Multilib &M) -> std::vector<std::string> {
266     std::vector<std::string> FP;
267     if (std::optional<std::string> Path = getStdlibPath()) {
268       SmallString<128> P(*Path);
269       llvm::sys::path::append(P, M.gccSuffix());
270       FP.push_back(std::string(P));
271     }
272     return FP;
273   };
274 
275   Multilibs.push_back(Multilib());
276   // Use the noexcept variant with -fno-exceptions to avoid the extra overhead.
277   Multilibs.push_back(MultilibBuilder("noexcept", {}, {})
278                           .flag("-fexceptions", /*Disallow=*/true)
279                           .flag("-fno-exceptions")
280                           .makeMultilib());
281   // ASan has higher priority because we always want the instrumentated version.
282   Multilibs.push_back(MultilibBuilder("asan", {}, {})
283                           .flag("-fsanitize=address")
284                           .makeMultilib());
285   // Use the asan+noexcept variant with ASan and -fno-exceptions.
286   Multilibs.push_back(MultilibBuilder("asan+noexcept", {}, {})
287                           .flag("-fsanitize=address")
288                           .flag("-fexceptions", /*Disallow=*/true)
289                           .flag("-fno-exceptions")
290                           .makeMultilib());
291   // HWASan has higher priority because we always want the instrumentated
292   // version.
293   Multilibs.push_back(MultilibBuilder("hwasan", {}, {})
294                           .flag("-fsanitize=hwaddress")
295                           .makeMultilib());
296   // Use the hwasan+noexcept variant with HWASan and -fno-exceptions.
297   Multilibs.push_back(MultilibBuilder("hwasan+noexcept", {}, {})
298                           .flag("-fsanitize=hwaddress")
299                           .flag("-fexceptions", /*Disallow=*/true)
300                           .flag("-fno-exceptions")
301                           .makeMultilib());
302   // Use Itanium C++ ABI for the compat multilib.
303   Multilibs.push_back(MultilibBuilder("compat", {}, {})
304                           .flag("-fc++-abi=itanium")
305                           .makeMultilib());
306 
307   Multilibs.FilterOut([&](const Multilib &M) {
308     std::vector<std::string> RD = FilePaths(M);
309     return llvm::all_of(RD, [&](std::string P) { return !getVFS().exists(P); });
310   });
311 
312   Multilib::flags_list Flags;
313   bool Exceptions =
314       Args.hasFlag(options::OPT_fexceptions, options::OPT_fno_exceptions, true);
315   addMultilibFlag(Exceptions, "-fexceptions", Flags);
316   addMultilibFlag(!Exceptions, "-fno-exceptions", Flags);
317   addMultilibFlag(getSanitizerArgs(Args).needsAsanRt(), "-fsanitize=address",
318                   Flags);
319   addMultilibFlag(getSanitizerArgs(Args).needsHwasanRt(),
320                   "-fsanitize=hwaddress", Flags);
321 
322   addMultilibFlag(Args.getLastArgValue(options::OPT_fcxx_abi_EQ) == "itanium",
323                   "-fc++-abi=itanium", Flags);
324 
325   Multilibs.setFilePathsCallback(FilePaths);
326 
327   if (Multilibs.select(Flags, SelectedMultilibs)) {
328     // Ensure that -print-multi-directory only outputs one multilib directory.
329     Multilib LastSelected = SelectedMultilibs.back();
330     SelectedMultilibs = {LastSelected};
331 
332     if (!SelectedMultilibs.back().isDefault())
333       if (const auto &PathsCallback = Multilibs.filePathsCallback())
334         for (const auto &Path : PathsCallback(SelectedMultilibs.back()))
335           // Prepend the multilib path to ensure it takes the precedence.
336           getFilePaths().insert(getFilePaths().begin(), Path);
337   }
338 }
339 
ComputeEffectiveClangTriple(const ArgList & Args,types::ID InputType) const340 std::string Fuchsia::ComputeEffectiveClangTriple(const ArgList &Args,
341                                                  types::ID InputType) const {
342   llvm::Triple Triple(ComputeLLVMTriple(Args, InputType));
343   return Triple.str();
344 }
345 
buildLinker() const346 Tool *Fuchsia::buildLinker() const {
347   return new tools::fuchsia::Linker(*this);
348 }
349 
buildStaticLibTool() const350 Tool *Fuchsia::buildStaticLibTool() const {
351   return new tools::fuchsia::StaticLibTool(*this);
352 }
353 
GetRuntimeLibType(const ArgList & Args) const354 ToolChain::RuntimeLibType Fuchsia::GetRuntimeLibType(
355     const ArgList &Args) const {
356   if (Arg *A = Args.getLastArg(clang::driver::options::OPT_rtlib_EQ)) {
357     StringRef Value = A->getValue();
358     if (Value != "compiler-rt")
359       getDriver().Diag(clang::diag::err_drv_invalid_rtlib_name)
360           << A->getAsString(Args);
361   }
362 
363   return ToolChain::RLT_CompilerRT;
364 }
365 
366 ToolChain::CXXStdlibType
GetCXXStdlibType(const ArgList & Args) const367 Fuchsia::GetCXXStdlibType(const ArgList &Args) const {
368   if (Arg *A = Args.getLastArg(options::OPT_stdlib_EQ)) {
369     StringRef Value = A->getValue();
370     if (Value != "libc++")
371       getDriver().Diag(diag::err_drv_invalid_stdlib_name)
372         << A->getAsString(Args);
373   }
374 
375   return ToolChain::CST_Libcxx;
376 }
377 
addClangTargetOptions(const ArgList & DriverArgs,ArgStringList & CC1Args,Action::OffloadKind) const378 void Fuchsia::addClangTargetOptions(const ArgList &DriverArgs,
379                                     ArgStringList &CC1Args,
380                                     Action::OffloadKind) const {
381   if (!DriverArgs.hasFlag(options::OPT_fuse_init_array,
382                           options::OPT_fno_use_init_array, true))
383     CC1Args.push_back("-fno-use-init-array");
384 }
385 
AddClangSystemIncludeArgs(const ArgList & DriverArgs,ArgStringList & CC1Args) const386 void Fuchsia::AddClangSystemIncludeArgs(const ArgList &DriverArgs,
387                                         ArgStringList &CC1Args) const {
388   const Driver &D = getDriver();
389 
390   if (DriverArgs.hasArg(options::OPT_nostdinc))
391     return;
392 
393   if (!DriverArgs.hasArg(options::OPT_nobuiltininc)) {
394     SmallString<128> P(D.ResourceDir);
395     llvm::sys::path::append(P, "include");
396     addSystemInclude(DriverArgs, CC1Args, P);
397   }
398 
399   if (DriverArgs.hasArg(options::OPT_nostdlibinc))
400     return;
401 
402   // Check for configure-time C include directories.
403   StringRef CIncludeDirs(C_INCLUDE_DIRS);
404   if (CIncludeDirs != "") {
405     SmallVector<StringRef, 5> dirs;
406     CIncludeDirs.split(dirs, ":");
407     for (StringRef dir : dirs) {
408       StringRef Prefix =
409           llvm::sys::path::is_absolute(dir) ? "" : StringRef(D.SysRoot);
410       addExternCSystemInclude(DriverArgs, CC1Args, Prefix + dir);
411     }
412     return;
413   }
414 
415   if (!D.SysRoot.empty()) {
416     SmallString<128> P(D.SysRoot);
417     llvm::sys::path::append(P, "include");
418     addExternCSystemInclude(DriverArgs, CC1Args, P.str());
419   }
420 }
421 
AddClangCXXStdlibIncludeArgs(const ArgList & DriverArgs,ArgStringList & CC1Args) const422 void Fuchsia::AddClangCXXStdlibIncludeArgs(const ArgList &DriverArgs,
423                                            ArgStringList &CC1Args) const {
424   if (DriverArgs.hasArg(options::OPT_nostdinc, options::OPT_nostdlibinc,
425                         options::OPT_nostdincxx))
426     return;
427 
428   const Driver &D = getDriver();
429   std::string Target = getTripleString();
430 
431   auto AddCXXIncludePath = [&](StringRef Path) {
432     std::string Version = detectLibcxxVersion(Path);
433     if (Version.empty())
434       return;
435 
436     // First add the per-target multilib include dir.
437     if (!SelectedMultilibs.empty() && !SelectedMultilibs.back().isDefault()) {
438       const Multilib &M = SelectedMultilibs.back();
439       SmallString<128> TargetDir(Path);
440       llvm::sys::path::append(TargetDir, Target, M.gccSuffix(), "c++", Version);
441       if (getVFS().exists(TargetDir)) {
442         addSystemInclude(DriverArgs, CC1Args, TargetDir);
443       }
444     }
445 
446     // Second add the per-target include dir.
447     SmallString<128> TargetDir(Path);
448     llvm::sys::path::append(TargetDir, Target, "c++", Version);
449     if (getVFS().exists(TargetDir))
450       addSystemInclude(DriverArgs, CC1Args, TargetDir);
451 
452     // Third the generic one.
453     SmallString<128> Dir(Path);
454     llvm::sys::path::append(Dir, "c++", Version);
455     addSystemInclude(DriverArgs, CC1Args, Dir);
456   };
457 
458   switch (GetCXXStdlibType(DriverArgs)) {
459   case ToolChain::CST_Libcxx: {
460     SmallString<128> P(D.Dir);
461     llvm::sys::path::append(P, "..", "include");
462     AddCXXIncludePath(P);
463     break;
464   }
465 
466   default:
467     llvm_unreachable("invalid stdlib name");
468   }
469 }
470 
AddCXXStdlibLibArgs(const ArgList & Args,ArgStringList & CmdArgs) const471 void Fuchsia::AddCXXStdlibLibArgs(const ArgList &Args,
472                                   ArgStringList &CmdArgs) const {
473   switch (GetCXXStdlibType(Args)) {
474   case ToolChain::CST_Libcxx:
475     CmdArgs.push_back("-lc++");
476     if (Args.hasArg(options::OPT_fexperimental_library))
477       CmdArgs.push_back("-lc++experimental");
478     break;
479 
480   case ToolChain::CST_Libstdcxx:
481     llvm_unreachable("invalid stdlib name");
482   }
483 }
484 
getSupportedSanitizers() const485 SanitizerMask Fuchsia::getSupportedSanitizers() const {
486   SanitizerMask Res = ToolChain::getSupportedSanitizers();
487   Res |= SanitizerKind::Address;
488   Res |= SanitizerKind::HWAddress;
489   Res |= SanitizerKind::PointerCompare;
490   Res |= SanitizerKind::PointerSubtract;
491   Res |= SanitizerKind::Fuzzer;
492   Res |= SanitizerKind::FuzzerNoLink;
493   Res |= SanitizerKind::Leak;
494   Res |= SanitizerKind::SafeStack;
495   Res |= SanitizerKind::Scudo;
496   Res |= SanitizerKind::Thread;
497   return Res;
498 }
499 
getDefaultSanitizers() const500 SanitizerMask Fuchsia::getDefaultSanitizers() const {
501   SanitizerMask Res;
502   switch (getTriple().getArch()) {
503   case llvm::Triple::aarch64:
504   case llvm::Triple::riscv64:
505     Res |= SanitizerKind::ShadowCallStack;
506     break;
507   case llvm::Triple::x86_64:
508     Res |= SanitizerKind::SafeStack;
509     break;
510   default:
511     break;
512   }
513   return Res;
514 }
515