|  | # CMake build for CompilerRT. | 
|  | # | 
|  | # An important constraint of the build is that it only produces libraries | 
|  | # based on the ability of the host toolchain to target various platforms. | 
|  |  | 
|  | cmake_minimum_required(VERSION 3.20.0) | 
|  | set(LLVM_SUBPROJECT_TITLE "Compiler-RT") | 
|  |  | 
|  | if(NOT DEFINED LLVM_COMMON_CMAKE_UTILS) | 
|  | set(LLVM_COMMON_CMAKE_UTILS ${CMAKE_CURRENT_SOURCE_DIR}/../cmake) | 
|  | endif() | 
|  | include(${LLVM_COMMON_CMAKE_UTILS}/Modules/CMakePolicy.cmake | 
|  | NO_POLICY_SCOPE) | 
|  |  | 
|  | # Check if compiler-rt is built as a standalone project. | 
|  | if (CMAKE_SOURCE_DIR STREQUAL CMAKE_CURRENT_SOURCE_DIR OR COMPILER_RT_STANDALONE_BUILD) | 
|  | project(CompilerRT C CXX ASM) | 
|  | set(COMPILER_RT_STANDALONE_BUILD TRUE) | 
|  | set_property(GLOBAL PROPERTY USE_FOLDERS ON) | 
|  | endif() | 
|  |  | 
|  | # Add path for custom compiler-rt modules. | 
|  | list(INSERT CMAKE_MODULE_PATH 0 | 
|  | "${CMAKE_CURRENT_SOURCE_DIR}/cmake" | 
|  | "${CMAKE_CURRENT_SOURCE_DIR}/cmake/Modules" | 
|  | "${LLVM_COMMON_CMAKE_UTILS}" | 
|  | "${LLVM_COMMON_CMAKE_UTILS}/Modules" | 
|  | ) | 
|  |  | 
|  | if(CMAKE_CONFIGURATION_TYPES) | 
|  | set(CMAKE_CFG_RESOLVED_INTDIR "${CMAKE_CFG_INTDIR}/") | 
|  | else() | 
|  | set(CMAKE_CFG_RESOLVED_INTDIR "") | 
|  | endif() | 
|  |  | 
|  | include(SetPlatformToolchainTools) | 
|  | include(base-config-ix) | 
|  | include(CompilerRTUtils) | 
|  | include(CMakeDependentOption) | 
|  | include(GetDarwinLinkerVersion) | 
|  |  | 
|  | option(COMPILER_RT_BUILD_BUILTINS "Build builtins" ON) | 
|  | mark_as_advanced(COMPILER_RT_BUILD_BUILTINS) | 
|  | option(COMPILER_RT_DISABLE_AARCH64_FMV "Disable AArch64 Function Multi Versioning support" OFF) | 
|  | mark_as_advanced(COMPILER_RT_DISABLE_AARCH64_FMV) | 
|  | option(COMPILER_RT_BUILD_SANITIZERS "Build sanitizers" ON) | 
|  | mark_as_advanced(COMPILER_RT_BUILD_SANITIZERS) | 
|  | option(COMPILER_RT_BUILD_XRAY "Build xray" ON) | 
|  | mark_as_advanced(COMPILER_RT_BUILD_XRAY) | 
|  | option(COMPILER_RT_BUILD_LIBFUZZER "Build libFuzzer" ON) | 
|  | mark_as_advanced(COMPILER_RT_BUILD_LIBFUZZER) | 
|  | option(COMPILER_RT_BUILD_PROFILE "Build profile runtime" ON) | 
|  | mark_as_advanced(COMPILER_RT_BUILD_PROFILE) | 
|  | option(COMPILER_RT_BUILD_CTX_PROFILE "Build ctx profile runtime" ON) | 
|  | mark_as_advanced(COMPILER_RT_BUILD_CTX_PROFILE) | 
|  | option(COMPILER_RT_BUILD_MEMPROF "Build memory profiling runtime" ON) | 
|  | mark_as_advanced(COMPILER_RT_BUILD_MEMPROF) | 
|  | option(COMPILER_RT_BUILD_XRAY_NO_PREINIT "Build xray with no preinit patching" OFF) | 
|  | mark_as_advanced(COMPILER_RT_BUILD_XRAY_NO_PREINIT) | 
|  | option(COMPILER_RT_BUILD_ORC "Build ORC runtime" ON) | 
|  | mark_as_advanced(COMPILER_RT_BUILD_ORC) | 
|  | option(COMPILER_RT_BUILD_GWP_ASAN "Build GWP-ASan, and link it into SCUDO" ON) | 
|  | mark_as_advanced(COMPILER_RT_BUILD_GWP_ASAN) | 
|  | option(COMPILER_RT_ENABLE_CET "Build Compiler RT with CET enabled" OFF) | 
|  |  | 
|  | option(COMPILER_RT_SCUDO_STANDALONE_SYSROOT_PATH "Set custom sysroot for building SCUDO standalone" OFF) | 
|  | mark_as_advanced(COMPILER_RT_SCUDO_STANDALONE_SYSROOT_PATH) | 
|  | option(COMPILER_RT_SCUDO_STANDALONE_BUILD_SHARED "Build SCUDO standalone for shared libraries" ON) | 
|  | mark_as_advanced(COMPILER_RT_SCUDO_STANDALONE_BUILD_SHARED) | 
|  | option(COMPILER_RT_BUILD_SCUDO_STANDALONE_WITH_LLVM_LIBC "Build SCUDO standalone with LLVM's libc headers" OFF) | 
|  | mark_as_advanced(COMPILER_RT_BUILD_SCUDO_STANDALONE_WITH_LLVM_LIBC) | 
|  |  | 
|  | if(FUCHSIA) | 
|  | set(COMPILER_RT_HWASAN_WITH_INTERCEPTORS_DEFAULT OFF) | 
|  | else() | 
|  | set(COMPILER_RT_HWASAN_WITH_INTERCEPTORS_DEFAULT ON) | 
|  | endif() | 
|  | set(COMPILER_RT_HWASAN_WITH_INTERCEPTORS ${COMPILER_RT_HWASAN_WITH_INTERCEPTORS_DEFAULT} CACHE BOOL "Enable libc interceptors in HWASan (testing mode)") | 
|  |  | 
|  | set(COMPILER_RT_BAREMETAL_BUILD OFF CACHE BOOL | 
|  | "Build for a bare-metal target.") | 
|  |  | 
|  | if (COMPILER_RT_STANDALONE_BUILD) | 
|  | set(CMAKE_CXX_STANDARD 17 CACHE STRING "C++ standard to conform to") | 
|  | set(CMAKE_CXX_STANDARD_REQUIRED YES) | 
|  | set(CMAKE_CXX_EXTENSIONS NO) | 
|  |  | 
|  | if (NOT LLVM_RUNTIMES_BUILD) | 
|  | load_llvm_config() | 
|  | endif() | 
|  | if (TARGET intrinsics_gen) | 
|  | # Loading the llvm config causes this target to be imported so place it | 
|  | # under the appropriate folder in an IDE. | 
|  | set_target_properties(intrinsics_gen PROPERTIES FOLDER "LLVM/Tablegenning") | 
|  | endif() | 
|  |  | 
|  | find_package(Python3 COMPONENTS Interpreter) | 
|  | if(NOT Python3_Interpreter_FOUND) | 
|  | message(WARNING "Python3 not found, using python2 as a fallback") | 
|  | find_package(Python2 COMPONENTS Interpreter REQUIRED) | 
|  | if(Python2_VERSION VERSION_LESS 2.7) | 
|  | message(SEND_ERROR "Python 2.7 or newer is required") | 
|  | endif() | 
|  |  | 
|  | # Treat python2 as python3 | 
|  | add_executable(Python3::Interpreter IMPORTED) | 
|  | set_target_properties(Python3::Interpreter PROPERTIES | 
|  | IMPORTED_LOCATION ${Python2_EXECUTABLE}) | 
|  | set(Python3_EXECUTABLE ${Python2_EXECUTABLE}) | 
|  | endif() | 
|  |  | 
|  | # Ensure that fat libraries are built correctly on Darwin | 
|  | if(APPLE) | 
|  | include(UseLibtool) | 
|  | endif() | 
|  |  | 
|  | # Define default arguments to lit. | 
|  | set(LIT_ARGS_DEFAULT "-sv") | 
|  | if (MSVC OR XCODE) | 
|  | set(LIT_ARGS_DEFAULT "${LIT_ARGS_DEFAULT} --no-progress-bar") | 
|  | endif() | 
|  | set(LLVM_LIT_ARGS "${LIT_ARGS_DEFAULT}" CACHE STRING "Default options for lit") | 
|  | set(LLVM_LIT_OUTPUT_DIR "${COMPILER_RT_EXEC_OUTPUT_DIR}") | 
|  | endif() | 
|  |  | 
|  | construct_compiler_rt_default_triple() | 
|  | if ("${COMPILER_RT_DEFAULT_TARGET_TRIPLE}" MATCHES ".*hf$") | 
|  | if (${COMPILER_RT_DEFAULT_TARGET_ARCH} MATCHES "^arm") | 
|  | set(COMPILER_RT_DEFAULT_TARGET_ARCH "armhf") | 
|  | CHECK_SYMBOL_EXISTS (__thumb__ "" COMPILER_RT_ARM_THUMB) | 
|  | endif() | 
|  | endif() | 
|  | if ("${COMPILER_RT_DEFAULT_TARGET_TRIPLE}" MATCHES ".*android.*") | 
|  | set(ANDROID 1) | 
|  | string(REGEX MATCH "-target(=| +)[^ ]+android[a-z]*([0-9]+)" ANDROID_API_LEVEL "${CMAKE_C_FLAGS}") | 
|  | set(ANDROID_API_LEVEL ${CMAKE_MATCH_2}) | 
|  | endif() | 
|  | pythonize_bool(ANDROID) | 
|  |  | 
|  | set(COMPILER_RT_SOURCE_DIR ${CMAKE_CURRENT_SOURCE_DIR}) | 
|  | set(COMPILER_RT_BINARY_DIR ${CMAKE_CURRENT_BINARY_DIR}) | 
|  |  | 
|  | pythonize_bool(LLVM_ENABLE_PER_TARGET_RUNTIME_DIR) | 
|  |  | 
|  | # We support running instrumented tests when we're not cross-compiling | 
|  | # and target a UNIX-like system or Windows. | 
|  | # We can run tests on Android even when we are cross-compiling. | 
|  | if((NOT "${CMAKE_CROSSCOMPILING}" AND (UNIX OR WIN32)) | 
|  | OR ANDROID OR COMPILER_RT_EMULATOR) | 
|  | option(COMPILER_RT_CAN_EXECUTE_TESTS "Can we execute instrumented tests" ON) | 
|  | else() | 
|  | option(COMPILER_RT_CAN_EXECUTE_TESTS "Can we execute instrumented tests" OFF) | 
|  | endif() | 
|  |  | 
|  | option(COMPILER_RT_DEBUG "Build runtimes with full debug info" OFF) | 
|  | option(COMPILER_RT_EXTERNALIZE_DEBUGINFO | 
|  | "Generate dSYM files and strip executables and libraries (Darwin Only)" OFF) | 
|  | # COMPILER_RT_DEBUG_PYBOOL is used by lit.common.configured.in. | 
|  | pythonize_bool(COMPILER_RT_DEBUG) | 
|  |  | 
|  | option(COMPILER_RT_INTERCEPT_LIBDISPATCH | 
|  | "Support interception of libdispatch (GCD). Requires '-fblocks'" OFF) | 
|  | option(COMPILER_RT_LIBDISPATCH_INSTALL_PATH | 
|  | "Specify if libdispatch is installed in a custom location" "") | 
|  | if (COMPILER_RT_INTERCEPT_LIBDISPATCH AND NOT APPLE) | 
|  | set(COMPILER_RT_LIBDISPATCH_CFLAGS -fblocks) | 
|  | set(COMPILER_RT_TEST_LIBDISPATCH_CFLAGS) | 
|  | if (COMPILER_RT_LIBDISPATCH_INSTALL_PATH) | 
|  | list(APPEND COMPILER_RT_TEST_LIBDISPATCH_CFLAGS | 
|  | -I${COMPILER_RT_LIBDISPATCH_INSTALL_PATH}/include | 
|  | -L${COMPILER_RT_LIBDISPATCH_INSTALL_PATH}/lib | 
|  | -Wl,-rpath=${COMPILER_RT_LIBDISPATCH_INSTALL_PATH}/lib) | 
|  | endif() | 
|  | list(APPEND COMPILER_RT_TEST_LIBDISPATCH_CFLAGS -lBlocksRuntime -ldispatch) | 
|  | endif() | 
|  | if (APPLE) # Always enable on Apple platforms. | 
|  | set(COMPILER_RT_INTERCEPT_LIBDISPATCH ON) | 
|  | endif() | 
|  | pythonize_bool(COMPILER_RT_INTERCEPT_LIBDISPATCH) | 
|  |  | 
|  | if(APPLE AND SANITIZER_MIN_OSX_VERSION AND SANITIZER_MIN_OSX_VERSION VERSION_LESS "10.9") | 
|  | # Mac OS X prior to 10.9 had problems with exporting symbols from | 
|  | # libc++/libc++abi. | 
|  | set(cxxabi_supported OFF) | 
|  | else() | 
|  | set(cxxabi_supported ON) | 
|  | endif() | 
|  |  | 
|  | option(SANITIZER_ALLOW_CXXABI "Allow use of C++ ABI details in ubsan" ON) | 
|  |  | 
|  | set(SANITIZER_CAN_USE_CXXABI OFF) | 
|  | if (cxxabi_supported AND SANITIZER_ALLOW_CXXABI) | 
|  | set(SANITIZER_CAN_USE_CXXABI ON) | 
|  | endif() | 
|  | pythonize_bool(SANITIZER_CAN_USE_CXXABI) | 
|  |  | 
|  | macro(handle_default_cxx_lib var) | 
|  | # Specifying -stdlib= in CMAKE_CXX_FLAGS overrides the defaults. | 
|  | if (CMAKE_CXX_FLAGS MATCHES "-stdlib=([a-zA-Z+]*)") | 
|  | set(${var}_LIBNAME "${CMAKE_MATCH_1}") | 
|  | set(${var}_SYSTEM 1) | 
|  | elseif (${var} STREQUAL "default") | 
|  | if (APPLE OR CMAKE_SYSTEM_NAME MATCHES "FreeBSD") | 
|  | set(${var}_LIBNAME "libc++") | 
|  | set(${var}_SYSTEM 1) | 
|  | elseif (FUCHSIA) | 
|  | set(${var}_LIBNAME "libc++") | 
|  | set(${var}_INTREE 1) | 
|  | else() | 
|  | set(${var}_LIBNAME "libstdc++") | 
|  | set(${var}_SYSTEM 1) | 
|  | endif() | 
|  | else() | 
|  | set(${var}_LIBNAME "${${var}}") | 
|  | set(${var}_SYSTEM 1) | 
|  | endif() | 
|  | endmacro() | 
|  |  | 
|  | # This is either directly the C++ ABI library or the full C++ library | 
|  | # which pulls in the ABI transitively. | 
|  | # TODO: Mark this as internal flag, most users should use COMPILER_RT_CXX_LIBRARY. | 
|  | set(SANITIZER_CXX_ABI "default" CACHE STRING | 
|  | "Specify C++ ABI library to use.") | 
|  | set(CXXABIS none default libstdc++ libc++ libcxxabi) | 
|  | set_property(CACHE SANITIZER_CXX_ABI PROPERTY STRINGS ;${CXXABIS}) | 
|  | handle_default_cxx_lib(SANITIZER_CXX_ABI) | 
|  |  | 
|  | # This needs to be a full C++ library for linking gtest and unit tests. | 
|  | # TODO: Mark this as internal flag, most users should use COMPILER_RT_CXX_LIBRARY. | 
|  | set(SANITIZER_TEST_CXX "default" CACHE STRING | 
|  | "Specify C++ library to use for tests.") | 
|  | set(CXXLIBS none default libstdc++ libc++) | 
|  | set_property(CACHE SANITIZER_TEST_CXX PROPERTY STRINGS ;${CXXLIBS}) | 
|  | handle_default_cxx_lib(SANITIZER_TEST_CXX) | 
|  |  | 
|  | option(COMPILER_RT_USE_LLVM_UNWINDER "Use the LLVM unwinder." OFF) | 
|  | cmake_dependent_option(COMPILER_RT_ENABLE_STATIC_UNWINDER | 
|  | "Statically link the LLVM unwinder." OFF | 
|  | "COMPILER_RT_USE_LLVM_UNWINDER" OFF) | 
|  |  | 
|  | set(DEFAULT_SANITIZER_USE_STATIC_LLVM_UNWINDER OFF) | 
|  | if (FUCHSIA) | 
|  | set(DEFAULT_SANITIZER_USE_STATIC_LLVM_UNWINDER ON) | 
|  | elseif (DEFINED LIBUNWIND_ENABLE_SHARED AND NOT LIBUNWIND_ENABLE_SHARED) | 
|  | set(DEFAULT_SANITIZER_USE_STATIC_LLVM_UNWINDER ON) | 
|  | endif() | 
|  |  | 
|  | option(SANITIZER_USE_STATIC_LLVM_UNWINDER | 
|  | "Use static LLVM unwinder." ${DEFAULT_SANITIZER_USE_STATIC_LLVM_UNWINDER}) | 
|  | pythonize_bool(SANITIZER_USE_STATIC_LLVM_UNWINDER) | 
|  |  | 
|  | set(DEFAULT_SANITIZER_USE_STATIC_CXX_ABI OFF) | 
|  | if (DEFINED LIBCXXABI_ENABLE_SHARED AND NOT LIBCXXABI_ENABLE_SHARED) | 
|  | set(DEFAULT_SANITIZER_USE_STATIC_CXX_ABI ON) | 
|  | endif() | 
|  |  | 
|  | option(SANITIZER_USE_STATIC_CXX_ABI | 
|  | "Use static libc++abi." ${DEFAULT_SANITIZER_USE_STATIC_CXX_ABI}) | 
|  | pythonize_bool(SANITIZER_USE_STATIC_CXX_ABI) | 
|  |  | 
|  | set(DEFAULT_SANITIZER_USE_STATIC_TEST_CXX OFF) | 
|  | if (DEFINED LIBCXX_ENABLE_SHARED AND NOT LIBCXX_ENABLE_SHARED) | 
|  | set(DEFAULT_SANITIZER_USE_STATIC_TEST_CXX ON) | 
|  | endif() | 
|  |  | 
|  | option(SANITIZER_USE_STATIC_TEST_CXX | 
|  | "Use static libc++ for tests." ${DEFAULT_SANITIZER_USE_STATIC_TEST_CXX}) | 
|  | pythonize_bool(SANITIZER_USE_STATIC_TEST_CXX) | 
|  |  | 
|  | set(COMPILER_RT_SUPPORTED_CXX_LIBRARIES none default libcxx) | 
|  | set(COMPILER_RT_CXX_LIBRARY "default" CACHE STRING "Specify C++ library to use. Supported values are ${COMPILER_RT_SUPPORTED_CXX_LIBRARIES}.") | 
|  | if (NOT "${COMPILER_RT_CXX_LIBRARY}" IN_LIST COMPILER_RT_SUPPORTED_CXX_LIBRARIES) | 
|  | message(FATAL_ERROR "Unsupported C++ library: '${COMPILER_RT_CXX_LIBRARY}'. Supported values are ${COMPILER_RT_SUPPORTED_CXX_LIBRARIES}.") | 
|  | endif() | 
|  | cmake_dependent_option(COMPILER_RT_STATIC_CXX_LIBRARY | 
|  | "Statically link the C++ library." OFF | 
|  | "COMPILER_RT_CXX_LIBRARY" OFF) | 
|  |  | 
|  | set(DEFAULT_COMPILER_RT_USE_BUILTINS_LIBRARY OFF) | 
|  | if (FUCHSIA) | 
|  | set(DEFAULT_COMPILER_RT_USE_BUILTINS_LIBRARY ON) | 
|  | endif() | 
|  |  | 
|  | option(COMPILER_RT_USE_BUILTINS_LIBRARY | 
|  | "Use compiler-rt builtins instead of libgcc" ${DEFAULT_COMPILER_RT_USE_BUILTINS_LIBRARY}) | 
|  |  | 
|  | include(config-ix) | 
|  |  | 
|  | #================================ | 
|  | # Setup Compiler Flags | 
|  | #================================ | 
|  |  | 
|  | # fcf-protection is a gcc/clang option for CET support on Linux platforms. | 
|  | # We need to handle MSVC CET option on Windows platforms. | 
|  | if (NOT MSVC) | 
|  | if (COMPILER_RT_ENABLE_CET AND NOT COMPILER_RT_HAS_FCF_PROTECTION_FLAG) | 
|  | message(FATAL_ERROR "Compiler used to build compiler-rt doesn't support CET!") | 
|  | endif() | 
|  | endif() | 
|  |  | 
|  | if(MSVC) | 
|  | # Override any existing /W flags with /W4. This is what LLVM does.  Failing to | 
|  | # remove other /W[0-4] flags will result in a warning about overriding a | 
|  | # previous flag. | 
|  | if (COMPILER_RT_HAS_W4_FLAG) | 
|  | string(REGEX REPLACE " /W[0-4]" "" CMAKE_C_FLAGS "${CMAKE_C_FLAGS}") | 
|  | string(REGEX REPLACE " /W[0-4]" "" CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS}") | 
|  | append_string_if(COMPILER_RT_HAS_W4_FLAG /W4 CMAKE_C_FLAGS CMAKE_CXX_FLAGS) | 
|  | endif() | 
|  | else() | 
|  | append_string_if(COMPILER_RT_HAS_WALL_FLAG -Wall CMAKE_C_FLAGS CMAKE_CXX_FLAGS) | 
|  | endif() | 
|  | if(COMPILER_RT_ENABLE_WERROR) | 
|  | append_string_if(COMPILER_RT_HAS_WERROR_FLAG -Werror CMAKE_C_FLAGS CMAKE_CXX_FLAGS) | 
|  | append_string_if(COMPILER_RT_HAS_WX_FLAG /WX CMAKE_C_FLAGS CMAKE_CXX_FLAGS) | 
|  | endif() | 
|  |  | 
|  | # Emulate C99 and C++11's __func__ for MSVC prior to 2013 CTP. | 
|  | if(NOT COMPILER_RT_HAS_FUNC_SYMBOL) | 
|  | add_definitions(-D__func__=__FUNCTION__) | 
|  | endif() | 
|  |  | 
|  | # Provide some common commandline flags for Sanitizer runtimes. | 
|  | if("${ANDROID_API_LEVEL}" GREATER_EQUAL 29) | 
|  | list(APPEND SANITIZER_COMMON_CFLAGS -fno-emulated-tls) | 
|  | string(APPEND COMPILER_RT_TEST_COMPILER_CFLAGS " -fno-emulated-tls") | 
|  | endif() | 
|  | if(NOT WIN32) | 
|  | append_list_if(COMPILER_RT_HAS_FPIC_FLAG -fPIC SANITIZER_COMMON_CFLAGS) | 
|  | endif() | 
|  | append_list_if(COMPILER_RT_HAS_FNO_BUILTIN_FLAG -fno-builtin SANITIZER_COMMON_CFLAGS) | 
|  | append_list_if(COMPILER_RT_HAS_FNO_EXCEPTIONS_FLAG -fno-exceptions SANITIZER_COMMON_CFLAGS) | 
|  | if(NOT COMPILER_RT_DEBUG AND NOT APPLE) | 
|  | append_list_if(COMPILER_RT_HAS_FOMIT_FRAME_POINTER_FLAG -fomit-frame-pointer SANITIZER_COMMON_CFLAGS) | 
|  | endif() | 
|  | append_list_if(COMPILER_RT_HAS_FUNWIND_TABLES_FLAG -funwind-tables SANITIZER_COMMON_CFLAGS) | 
|  | append_list_if(COMPILER_RT_HAS_FNO_STACK_PROTECTOR_FLAG -fno-stack-protector SANITIZER_COMMON_CFLAGS) | 
|  | append_list_if(COMPILER_RT_HAS_FNO_SANITIZE_SAFE_STACK_FLAG -fno-sanitize=safe-stack SANITIZER_COMMON_CFLAGS) | 
|  | append_list_if(COMPILER_RT_HAS_FVISIBILITY_HIDDEN_FLAG -fvisibility=hidden SANITIZER_COMMON_CFLAGS) | 
|  | if(NOT COMPILER_RT_HAS_FVISIBILITY_HIDDEN_FLAG) | 
|  | append_list_if(COMPILER_RT_HAS_FVISIBILITY_INLINES_HIDDEN_FLAG -fvisibility-inlines-hidden SANITIZER_COMMON_CFLAGS) | 
|  | endif() | 
|  | append_list_if(COMPILER_RT_HAS_FNO_LTO_FLAG -fno-lto SANITIZER_COMMON_CFLAGS) | 
|  |  | 
|  | # By default do not instrument or use profdata for compiler-rt. | 
|  | if(NOT COMPILER_RT_ENABLE_PGO) | 
|  | if(LLVM_PROFDATA_FILE AND COMPILER_RT_HAS_FNO_PROFILE_INSTR_USE_FLAG) | 
|  | list(APPEND SANITIZER_COMMON_CFLAGS "-fno-profile-instr-use") | 
|  | endif() | 
|  | if(LLVM_BUILD_INSTRUMENTED MATCHES IR AND COMPILER_RT_HAS_FNO_PROFILE_GENERATE_FLAG) | 
|  | list(APPEND SANITIZER_COMMON_CFLAGS "-fno-profile-generate") | 
|  | elseif((LLVM_BUILD_INSTRUMENTED OR LLVM_BUILD_INSTRUMENTED_COVERAGE) AND COMPILER_RT_HAS_FNO_PROFILE_INSTR_GENERATE_FLAG) | 
|  | list(APPEND SANITIZER_COMMON_CFLAGS "-fno-profile-instr-generate") | 
|  | if(LLVM_BUILD_INSTRUMENTED_COVERAGE AND COMPILER_RT_HAS_FNO_COVERAGE_MAPPING_FLAG) | 
|  | list(APPEND SANITIZER_COMMON_CFLAGS "-fno-coverage-mapping") | 
|  | endif() | 
|  | endif() | 
|  | endif() | 
|  |  | 
|  | # The following is a workaround for powerpc64le. This is the only architecture | 
|  | # that requires -fno-function-sections to work properly. If lacking, the ASan | 
|  | # Linux test function-sections-are-bad.cpp fails with the following error: | 
|  | # 'undefined symbol: __sanitizer_unaligned_load32'. | 
|  | if(DEFINED TARGET_powerpc64le_CFLAGS) | 
|  | if(CMAKE_CXX_COMPILER_ID MATCHES "XL") | 
|  | append("-qnofuncsect" TARGET_powerpc64le_CFLAGS) | 
|  | else() | 
|  | append_list_if(COMPILER_RT_HAS_FNO_FUNCTION_SECTIONS_FLAG -fno-function-sections TARGET_powerpc64le_CFLAGS) | 
|  | endif() | 
|  | endif() | 
|  |  | 
|  | # The following is a workaround for s390x.  This avoids creation of "partial | 
|  | # inline" function fragments when building the asan libraries with certain | 
|  | # GCC versions.  The presence of those fragments, in particular for the | 
|  | # interceptors, changes backtraces seen in asan error cases, which causes | 
|  | # testsuite failures. | 
|  | if("${COMPILER_RT_DEFAULT_TARGET_ARCH}" MATCHES "s390x") | 
|  | append_list_if(COMPILER_RT_HAS_FNO_PARTIAL_INLINING_FLAG -fno-partial-inlining SANITIZER_COMMON_CFLAGS) | 
|  | endif() | 
|  |  | 
|  | if(MSVC) | 
|  | # FIXME: In fact, sanitizers should support both /MT and /MD, see PR20214. | 
|  | set(CMAKE_MSVC_RUNTIME_LIBRARY MultiThreaded) | 
|  |  | 
|  | # Remove any /M[DT][d] flags, and strip any definitions of _DEBUG. | 
|  | # Since we're using CMAKE_MSVC_RUNTIME_LIBRARY (CMP0091 set to NEW), | 
|  | # these options shouldn't be included in these flags variables. However, | 
|  | # package managers that don't know which mechanism is used for passing | 
|  | # CRT choice flags might be passing them both ways - which leads to | 
|  | # duplicate CRT choice options. Thus make sure to strip out these flags | 
|  | # from these variables, when we're forcing a CRT choice other than what | 
|  | # the user requested here. | 
|  | foreach(flag_var | 
|  | CMAKE_C_FLAGS CMAKE_C_FLAGS_DEBUG CMAKE_C_FLAGS_RELEASE | 
|  | CMAKE_C_FLAGS_MINSIZEREL CMAKE_C_FLAGS_RELWITHDEBINFO | 
|  | CMAKE_CXX_FLAGS CMAKE_CXX_FLAGS_DEBUG CMAKE_CXX_FLAGS_RELEASE | 
|  | CMAKE_CXX_FLAGS_MINSIZEREL CMAKE_CXX_FLAGS_RELWITHDEBINFO) | 
|  | string(REGEX REPLACE "[/-]M[DT]d" "" ${flag_var} "${${flag_var}}") | 
|  | string(REGEX REPLACE "[/-]MD" "" ${flag_var} "${${flag_var}}") | 
|  | string(REGEX REPLACE "[/-]D_DEBUG" "" ${flag_var} "${${flag_var}}") | 
|  | endforeach() | 
|  |  | 
|  | append_list_if(COMPILER_RT_HAS_Oy_FLAG /Oy- SANITIZER_COMMON_CFLAGS) | 
|  | append_list_if(COMPILER_RT_HAS_GS_FLAG /GS- SANITIZER_COMMON_CFLAGS) | 
|  |  | 
|  | # Disable thread safe initialization for static locals. ASan shouldn't need | 
|  | # it. Thread safe initialization assumes that the CRT has already been | 
|  | # initialized, but ASan initializes before the CRT. | 
|  | list(APPEND SANITIZER_COMMON_CFLAGS /Zc:threadSafeInit-) | 
|  | endif() | 
|  |  | 
|  | append_list_if(COMPILER_RT_DEBUG -DSANITIZER_DEBUG=1 SANITIZER_COMMON_CFLAGS) | 
|  |  | 
|  | append_list_if(COMPILER_RT_HAS_WTHREAD_SAFETY_FLAG -Wthread-safety THREAD_SAFETY_FLAGS) | 
|  | append_list_if(COMPILER_RT_HAS_WTHREAD_SAFETY_REFERENCE_FLAG -Wthread-safety-reference THREAD_SAFETY_FLAGS) | 
|  | append_list_if(COMPILER_RT_HAS_WTHREAD_SAFETY_BETA_FLAG -Wthread-safety-beta THREAD_SAFETY_FLAGS) | 
|  | list(APPEND SANITIZER_COMMON_CFLAGS ${THREAD_SAFETY_FLAGS}) | 
|  | string(REPLACE ";" " " thread_safety_flags_space_sep "${THREAD_SAFETY_FLAGS}") | 
|  | string(APPEND COMPILER_RT_TEST_COMPILER_CFLAGS " ${thread_safety_flags_space_sep}") | 
|  |  | 
|  | # If we're using MSVC, | 
|  | # always respect the optimization flags set by CMAKE_BUILD_TYPE instead. | 
|  | if (NOT MSVC) | 
|  |  | 
|  | # Build with optimization, unless we're in debug mode. | 
|  | if(COMPILER_RT_DEBUG) | 
|  | list(APPEND SANITIZER_COMMON_CFLAGS -O1) | 
|  | else() | 
|  | list(APPEND SANITIZER_COMMON_CFLAGS -O3) | 
|  | endif() | 
|  | endif() | 
|  |  | 
|  | # Determine if we should restrict stack frame sizes. | 
|  | # Stack frames on PowerPC, Mips, SystemZ and in debug build can be much larger than | 
|  | # anticipated. | 
|  | # FIXME: Fix all sanitizers and add -Wframe-larger-than to | 
|  | # SANITIZER_COMMON_FLAGS | 
|  | if(COMPILER_RT_HAS_WFRAME_LARGER_THAN_FLAG AND NOT COMPILER_RT_DEBUG | 
|  | AND NOT ${COMPILER_RT_DEFAULT_TARGET_ARCH} MATCHES "powerpc|mips|s390x") | 
|  | set(SANITIZER_LIMIT_FRAME_SIZE TRUE) | 
|  | else() | 
|  | set(SANITIZER_LIMIT_FRAME_SIZE FALSE) | 
|  | endif() | 
|  |  | 
|  | if(FUCHSIA OR UNIX) | 
|  | set(SANITIZER_USE_SYMBOLS TRUE) | 
|  | else() | 
|  | set(SANITIZER_USE_SYMBOLS FALSE) | 
|  | endif() | 
|  |  | 
|  | # Get the linker version while configuring compiler-rt and explicitly pass it | 
|  | # in cflags during testing. This fixes the compiler/linker version mismatch | 
|  | # issue when running a clang built with a newer Xcode in an older Xcode | 
|  | set(COMPILER_RT_DARWIN_LINKER_VERSION) | 
|  | if (APPLE AND NOT CMAKE_LINKER MATCHES ".*lld.*") | 
|  | get_darwin_linker_version(COMPILER_RT_DARWIN_LINKER_VERSION) | 
|  | message(STATUS "Host linker version: ${COMPILER_RT_DARWIN_LINKER_VERSION}") | 
|  | endif() | 
|  |  | 
|  | # Build sanitizer runtimes with debug info. | 
|  | if(MSVC) | 
|  | # Use /Z7 instead of /Zi for the asan runtime. This avoids the LNK4099 | 
|  | # warning from the MS linker complaining that it can't find the 'vc140.pdb' | 
|  | # file used by our object library compilations. | 
|  | list(APPEND SANITIZER_COMMON_CFLAGS /Z7) | 
|  | foreach(var_to_update | 
|  | CMAKE_CXX_FLAGS | 
|  | CMAKE_CXX_FLAGS_DEBUG | 
|  | CMAKE_CXX_FLAGS_RELWITHDEBINFO) | 
|  | string(REGEX REPLACE "(^| )/Z[i7I]($| )" " /Z7 " | 
|  | "${var_to_update}" "${${var_to_update}}") | 
|  | endforeach() | 
|  | elseif(APPLE) | 
|  | # On Apple platforms use full debug info (i.e. not `-gline-tables-only`) | 
|  | # for all build types so that the runtime can be debugged. | 
|  | if(NOT COMPILER_RT_HAS_G_FLAG) | 
|  | message(FATAL_ERROR "-g is not supported by host compiler") | 
|  | endif() | 
|  | list(APPEND SANITIZER_COMMON_CFLAGS -g) | 
|  | elseif(COMPILER_RT_HAS_GLINE_TABLES_ONLY_FLAG AND NOT COMPILER_RT_DEBUG) | 
|  | list(APPEND SANITIZER_COMMON_CFLAGS -gline-tables-only) | 
|  | elseif(COMPILER_RT_HAS_G_FLAG) | 
|  | list(APPEND SANITIZER_COMMON_CFLAGS -g) | 
|  | endif() | 
|  |  | 
|  | if(LLVM_ENABLE_MODULES) | 
|  | # Sanitizers cannot be built with -fmodules. The interceptors intentionally | 
|  | # don't include system headers, which is incompatible with modules. | 
|  | list(APPEND SANITIZER_COMMON_CFLAGS -fno-modules) | 
|  | endif() | 
|  |  | 
|  | # Turn off several warnings. | 
|  | append_list_if(COMPILER_RT_HAS_WGNU_FLAG -Wno-gnu SANITIZER_COMMON_CFLAGS) | 
|  | append_list_if(COMPILER_RT_HAS_WVARIADIC_MACROS_FLAG -Wno-variadic-macros SANITIZER_COMMON_CFLAGS) | 
|  | append_list_if(COMPILER_RT_HAS_WC99_EXTENSIONS_FLAG -Wno-c99-extensions SANITIZER_COMMON_CFLAGS) | 
|  | # format-pedantic warns about passing T* for %p, which is not useful. | 
|  | append_list_if(COMPILER_RT_HAS_WD4146_FLAG /wd4146 SANITIZER_COMMON_CFLAGS) | 
|  | append_list_if(COMPILER_RT_HAS_WD4291_FLAG /wd4291 SANITIZER_COMMON_CFLAGS) | 
|  | append_list_if(COMPILER_RT_HAS_WD4391_FLAG /wd4391 SANITIZER_COMMON_CFLAGS) | 
|  | append_list_if(COMPILER_RT_HAS_WD4722_FLAG /wd4722 SANITIZER_COMMON_CFLAGS) | 
|  | append_list_if(COMPILER_RT_HAS_WD4800_FLAG /wd4800 SANITIZER_COMMON_CFLAGS) | 
|  |  | 
|  | append_list_if(MINGW -fms-extensions SANITIZER_COMMON_CFLAGS) | 
|  |  | 
|  | # When lsan scans the stack for detecting reachable pointers, it's possible for | 
|  | # a leaked pointer, which was pushed to the stack on an earlier function call, | 
|  | # to still exist on the stack when doing a leak check if that part of the stack | 
|  | # was not overwritten. In particular, if there's any uninitialized data in the | 
|  | # lsan runtime, and the SP we start from is sufficiently deep into the runtime, | 
|  | # then a leaked pointer could be marked as reachable. Such instances could be | 
|  | # mitigated by clobbering any uninitialized data. Note that this won't cover | 
|  | # all possible uninitialized stack contents, such as those used for register | 
|  | # spill slots, unused portions for alignment, or even local variables not | 
|  | # yet in scope at a certain point in the function. | 
|  | # | 
|  | # Note that this type of issue was discovered with lsan, but can apply to other | 
|  | # sanitizers. | 
|  | # Disable PowerPC because of https://github.com/llvm/llvm-project/issues/84654. | 
|  | if(NOT "${COMPILER_RT_DEFAULT_TARGET_ARCH}" MATCHES "powerpc") | 
|  | append_list_if(COMPILER_RT_HAS_TRIVIAL_AUTO_INIT -ftrivial-auto-var-init=pattern SANITIZER_COMMON_CFLAGS) | 
|  | endif() | 
|  |  | 
|  | # Set common link flags. | 
|  | # TODO: We should consider using the same model as libc++, that is use either | 
|  | # -nostdlib++ and --unwindlib=none if supported, or -nodefaultlibs otherwise. | 
|  | append_list_if(C_SUPPORTS_NODEFAULTLIBS_FLAG -nodefaultlibs SANITIZER_COMMON_LINK_FLAGS) | 
|  | append_list_if(COMPILER_RT_HAS_Z_TEXT -Wl,-z,text SANITIZER_COMMON_LINK_FLAGS) | 
|  |  | 
|  | # Only necessary for 32-bit SPARC.  Solaris 11.2+ ld uses -z ignore/-z record | 
|  | # natively, but supports --as-needed/--no-as-needed for GNU ld compatibility. | 
|  | if("${COMPILER_RT_DEFAULT_TARGET_ARCH}" MATCHES "sparc") | 
|  | list(APPEND SANITIZER_COMMON_LINK_LIBS -Wl,--as-needed atomic -Wl,--no-as-needed) | 
|  | endif() | 
|  |  | 
|  | if (COMPILER_RT_USE_BUILTINS_LIBRARY) | 
|  | string(REPLACE "-Wl,-z,defs" "" CMAKE_SHARED_LINKER_FLAGS "${CMAKE_SHARED_LINKER_FLAGS}") | 
|  | else() | 
|  | if (ANDROID) | 
|  | append_list_if(COMPILER_RT_HAS_GCC_LIB gcc SANITIZER_COMMON_LINK_LIBS) | 
|  | else() | 
|  | append_list_if(COMPILER_RT_HAS_GCC_S_LIB gcc_s SANITIZER_COMMON_LINK_LIBS) | 
|  | endif() | 
|  | endif() | 
|  |  | 
|  | append_list_if(COMPILER_RT_HAS_LIBC c SANITIZER_COMMON_LINK_LIBS) | 
|  | if("${CMAKE_SYSTEM_NAME}" STREQUAL "Fuchsia") | 
|  | list(APPEND SANITIZER_COMMON_LINK_LIBS zircon) | 
|  | endif() | 
|  |  | 
|  | if("${CMAKE_SYSTEM_NAME}" STREQUAL "Fuchsia") | 
|  | set(SANITIZER_NO_UNDEFINED_SYMBOLS_DEFAULT ON) | 
|  | else() | 
|  | set(SANITIZER_NO_UNDEFINED_SYMBOLS_DEFAULT OFF) | 
|  | endif() | 
|  | option(SANITIZER_NO_UNDEFINED_SYMBOLS "Report error on unresolved symbol references" ${SANITIZER_NO_UNDEFINED_SYMBOLS_DEFAULT}) | 
|  | if (SANITIZER_NO_UNDEFINED_SYMBOLS) | 
|  | list(APPEND SANITIZER_COMMON_LINK_FLAGS -Wl,-z,defs) | 
|  | endif() | 
|  |  | 
|  | # TODO: COMPILER_RT_COMMON_CFLAGS and COMPILER_RT_COMMON_LINK_FLAGS are | 
|  | # intended for use in non-sanitizer runtimes such as libFuzzer, profile or XRay, | 
|  | # move these higher to include common flags, then derive SANITIZER_COMMON_CFLAGS | 
|  | # and SANITIZER_COMMON_LINK_FLAGS from those and append sanitizer-specific flags. | 
|  | set(COMPILER_RT_COMMON_CFLAGS ${SANITIZER_COMMON_CFLAGS}) | 
|  | set(COMPILER_RT_COMMON_LINK_FLAGS ${SANITIZER_COMMON_LINK_FLAGS}) | 
|  |  | 
|  | # We don't use the C++ standard library, so avoid including it by mistake. | 
|  | append_list_if(COMPILER_RT_HAS_NOSTDINCXX_FLAG -nostdinc++ SANITIZER_COMMON_CFLAGS) | 
|  | append_list_if(COMPILER_RT_HAS_NOSTDLIBXX_FLAG -nostdlib++ SANITIZER_COMMON_LINK_FLAGS) | 
|  |  | 
|  | # Remove -stdlib= which is unused when passing -nostdinc++... | 
|  | string(REGEX MATCHALL "-stdlib=[a-zA-Z+]*" stdlib_flag "${CMAKE_CXX_FLAGS}") | 
|  | string(REGEX REPLACE "-stdlib=[a-zA-Z+]*" "" CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS}") | 
|  |  | 
|  | # ...we need it to build some runtimes and tests so readd it where appropriate. | 
|  | list(APPEND COMPILER_RT_COMMON_CFLAGS ${stdlib_flag}) | 
|  | list(APPEND COMPILER_RT_COMMON_LINK_FLAGS ${stdlib_flag}) | 
|  |  | 
|  | # TODO: There's a lot of duplication across lib/*/tests/CMakeLists.txt files, | 
|  | # move some of the common flags to COMPILER_RT_UNITTEST_CFLAGS. | 
|  |  | 
|  | # Unittests need access to C++ standard library. | 
|  | string(APPEND COMPILER_RT_TEST_COMPILER_CFLAGS " ${stdlib_flag}") | 
|  |  | 
|  | # When cross-compiling, COMPILER_RT_TEST_COMPILER_CFLAGS help in compilation | 
|  | # and linking of unittests. | 
|  | string(REPLACE " " ";" COMPILER_RT_UNITTEST_CFLAGS "${COMPILER_RT_TEST_COMPILER_CFLAGS}") | 
|  | set(COMPILER_RT_UNITTEST_LINK_FLAGS ${COMPILER_RT_UNITTEST_CFLAGS}) | 
|  |  | 
|  | option(COMPILER_RT_TEST_STANDALONE_BUILD_LIBS | 
|  | "When set to ON and testing in a standalone build, test the runtime \ | 
|  | libraries built by this standalone build rather than the runtime libraries \ | 
|  | shipped with the compiler (used for testing). When set to OFF and testing \ | 
|  | in a standalone build, test the runtime libraries shipped with the compiler \ | 
|  | (used for testing). This option has no effect if the compiler and this \ | 
|  | build are configured to use the same runtime library path." | 
|  | ON) | 
|  | if (COMPILER_RT_TEST_STANDALONE_BUILD_LIBS) | 
|  | # Ensure that the unit tests can find the sanitizer headers prior to installation. | 
|  | list(APPEND COMPILER_RT_UNITTEST_CFLAGS "-I${CMAKE_CURRENT_LIST_DIR}/include") | 
|  | # Ensure that unit tests link against the just-built runtime libraries instead | 
|  | # of the ones bundled with the compiler by overriding the resource directory. | 
|  | # | 
|  | if ("${COMPILER_RT_TEST_COMPILER_ID}" MATCHES "Clang") | 
|  | list(APPEND COMPILER_RT_UNITTEST_LINK_FLAGS "-resource-dir=${COMPILER_RT_OUTPUT_DIR}") | 
|  | endif() | 
|  | endif() | 
|  |  | 
|  | if(COMPILER_RT_USE_LLVM_UNWINDER) | 
|  | # We're linking directly against the libunwind that we're building so don't | 
|  | # try to link in the toolchain's default libunwind which may be missing. | 
|  | append_list_if(CXX_SUPPORTS_UNWINDLIB_NONE_FLAG --unwindlib=none COMPILER_RT_COMMON_LINK_FLAGS) | 
|  | append_list_if(CXX_SUPPORTS_UNWINDLIB_NONE_FLAG --unwindlib=none COMPILER_RT_UNITTEST_LINK_FLAGS) | 
|  | if (COMPILER_RT_ENABLE_STATIC_UNWINDER) | 
|  | list(APPEND COMPILER_RT_UNWINDER_LINK_LIBS "$<TARGET_LINKER_FILE:unwind_static>") | 
|  | else() | 
|  | list(APPEND COMPILER_RT_UNWINDER_LINK_LIBS "$<TARGET_LINKER_FILE:$<IF:$<TARGET_EXISTS:unwind_shared>,unwind_shared,unwind_static>>") | 
|  | endif() | 
|  | endif() | 
|  |  | 
|  | if (COMPILER_RT_CXX_LIBRARY STREQUAL "libcxx") | 
|  | # We are using the in-tree libc++ so avoid including the default one. | 
|  | append_list_if(COMPILER_RT_HAS_NOSTDINCXX_FLAG -nostdinc++ COMPILER_RT_COMMON_CFLAGS) | 
|  | append_list_if(COMPILER_RT_HAS_NOSTDLIBXX_FLAG -nostdlib++ COMPILER_RT_COMMON_LINK_FLAGS) | 
|  | # Use the in-tree libc++ through explicit include and library paths. | 
|  | set(COMPILER_RT_CXX_CFLAGS "$<$<TARGET_EXISTS:cxx-headers>:$<IF:$<BOOL:${MSVC}>,/imsvc,-isystem>$<JOIN:$<TARGET_PROPERTY:cxx-headers,INTERFACE_INCLUDE_DIRECTORIES>,$<SEMICOLON>$<IF:$<BOOL:${MSVC}>,/imsvc,-isystem>>>") | 
|  | if (COMPILER_RT_STATIC_CXX_LIBRARY) | 
|  | set(COMPILER_RT_CXX_LINK_LIBS "$<TARGET_LINKER_FILE:cxx_static>") | 
|  | else() | 
|  | set(COMPILER_RT_CXX_LINK_LIBS "$<TARGET_LINKER_FILE:$<IF:$<TARGET_EXISTS:cxx_shared>,cxx_shared,cxx_static>>") | 
|  | endif() | 
|  | elseif (COMPILER_RT_CXX_LIBRARY STREQUAL "none") | 
|  | # We aren't using any C++ standard library so avoid including the default one. | 
|  | append_list_if(COMPILER_RT_HAS_NOSTDINCXX_FLAG -nostdinc++ COMPILER_RT_COMMON_CFLAGS) | 
|  | append_list_if(COMPILER_RT_HAS_NOSTDLIBXX_FLAG -nostdlib++ COMPILER_RT_COMMON_LINK_FLAGS) | 
|  | else() | 
|  | # Nothing to be done for `default`. | 
|  | endif() | 
|  |  | 
|  | if (SANITIZER_CXX_ABI_LIBNAME STREQUAL "libc++") | 
|  | if (SANITIZER_CXX_ABI_INTREE) | 
|  | # TODO: We don't need to add --unwindlib=none to SANITIZER_COMMON_LINK_FLAGS | 
|  | # because we added -nodefaultlibs there earlier, and adding would result in | 
|  | # a warning, but if we switch to -nostdlib++, we would need to add it here. | 
|  | # append_list_if(CXX_SUPPORTS_UNWINDLIB_NONE_FLAG --unwindlib=none SANITIZER_COMMON_LINK_FLAGS) | 
|  | if(SANITIZER_USE_STATIC_CXX_ABI) | 
|  | if(TARGET libcxx-abi-static) | 
|  | set(SANITIZER_CXX_ABI_LIBRARIES libcxx-abi-static) | 
|  | endif() | 
|  | else() | 
|  | if(TARGET libcxx-abi-shared) | 
|  | set(SANITIZER_CXX_ABI_LIBRARIES libcxx-abi-shared) | 
|  | elseif(TARGET libcxx-abi-static) | 
|  | set(SANITIZER_CXX_ABI_LIBRARIES libcxx-abi-static) | 
|  | endif() | 
|  | endif() | 
|  | else() | 
|  | append_list_if(COMPILER_RT_HAS_LIBCXX c++ SANITIZER_CXX_ABI_LIBRARIES) | 
|  | endif() | 
|  | elseif (SANITIZER_CXX_ABI_LIBNAME STREQUAL "libcxxabi") | 
|  | list(APPEND SANITIZER_CXX_ABI_LIBRARIES "c++abi") | 
|  | elseif (SANITIZER_CXX_ABI_LIBNAME STREQUAL "libstdc++") | 
|  | append_list_if(COMPILER_RT_HAS_LIBSTDCXX stdc++ SANITIZER_CXX_ABI_LIBRARIES) | 
|  | endif() | 
|  |  | 
|  | if (SANITIZER_TEST_CXX_LIBNAME STREQUAL "libc++") | 
|  | if (SANITIZER_TEST_CXX_INTREE) | 
|  | list(APPEND SANITIZER_TEST_CXX_CFLAGS "$<$<TARGET_EXISTS:cxx-headers>:$<IF:$<BOOL:${MSVC}>,/imsvc,-isystem>$<JOIN:$<TARGET_PROPERTY:cxx-headers,INTERFACE_INCLUDE_DIRECTORIES>,$<SEMICOLON>$<IF:$<BOOL:${MSVC}>,/imsvc,-isystem>>>") | 
|  | if (SANITIZER_USE_STATIC_TEST_CXX) | 
|  | list(APPEND SANITIZER_TEST_CXX_LIBRARIES "$<TARGET_LINKER_FILE:cxx_static>") | 
|  | else() | 
|  | list(APPEND SANITIZER_TEST_CXX_LIBRARIES "$<TARGET_LINKER_FILE:$<IF:$<TARGET_EXISTS:cxx_shared>,cxx_shared,cxx_static>>") | 
|  | endif() | 
|  | # We are using the in tree libc++ so avoid including the default one. | 
|  | append_list_if(COMPILER_RT_HAS_NOSTDINCXX_FLAG -nostdinc++ COMPILER_RT_UNITTEST_CFLAGS) | 
|  | append_list_if(COMPILER_RT_HAS_NOSTDLIBXX_FLAG -nostdlib++ COMPILER_RT_UNITTEST_LINK_FLAGS) | 
|  | else() | 
|  | append_list_if(COMPILER_RT_HAS_LIBCXX -lc++ SANITIZER_TEST_CXX_LIBRARIES) | 
|  | endif() | 
|  | elseif (SANITIZER_TEST_CXX_LIBNAME STREQUAL "libstdc++") | 
|  | append_list_if(COMPILER_RT_HAS_LIBSTDCXX -lstdc++ SANITIZER_TEST_CXX_LIBRARIES) | 
|  | endif() | 
|  |  | 
|  | # Unittests support. | 
|  | # FIXME: When compiler-rt is build using -DLLVM_BUILD_EXTERNAL_COMPILER_RT=ON, then | 
|  | # The LLVM_THIRD_PARTY_DIR variable is not set. | 
|  | if (NOT LLVM_THIRD_PARTY_DIR) | 
|  | set(LLVM_THIRD_PARTY_DIR "${CMAKE_CURRENT_SOURCE_DIR}/../third-party") | 
|  | endif() | 
|  |  | 
|  | set(COMPILER_RT_GTEST_PATH ${LLVM_THIRD_PARTY_DIR}/unittest/googletest) | 
|  | set(COMPILER_RT_GTEST_SOURCE ${COMPILER_RT_GTEST_PATH}/src/gtest-all.cc) | 
|  | set(COMPILER_RT_GTEST_CFLAGS | 
|  | -DGTEST_NO_LLVM_SUPPORT=1 | 
|  | -DGTEST_HAS_RTTI=0 | 
|  | -I${COMPILER_RT_GTEST_PATH}/include | 
|  | -I${COMPILER_RT_GTEST_PATH} | 
|  | ) | 
|  |  | 
|  | # Mocking support. | 
|  | set(COMPILER_RT_GMOCK_PATH ${LLVM_THIRD_PARTY_DIR}/unittest/googlemock) | 
|  | set(COMPILER_RT_GMOCK_SOURCE ${COMPILER_RT_GMOCK_PATH}/src/gmock-all.cc) | 
|  | set(COMPILER_RT_GMOCK_CFLAGS | 
|  | -DGTEST_NO_LLVM_SUPPORT=1 | 
|  | -DGTEST_HAS_RTTI=0 | 
|  | -I${COMPILER_RT_GMOCK_PATH}/include | 
|  | -I${COMPILER_RT_GMOCK_PATH} | 
|  | ) | 
|  |  | 
|  | if(COMPILER_RT_HAS_G_FLAG) | 
|  | list(APPEND COMPILER_RT_UNITTEST_CFLAGS -g) | 
|  | endif() | 
|  | append_list_if(COMPILER_RT_DEBUG -DSANITIZER_DEBUG=1 COMPILER_RT_UNITTEST_CFLAGS) | 
|  | append_list_if(COMPILER_RT_HAS_WCOVERED_SWITCH_DEFAULT_FLAG -Wno-covered-switch-default COMPILER_RT_UNITTEST_CFLAGS) | 
|  | append_list_if(COMPILER_RT_HAS_WSUGGEST_OVERRIDE_FLAG -Wno-suggest-override COMPILER_RT_UNITTEST_CFLAGS) | 
|  | # Detect if the compiler toolchain includes gcc-toolset-12. | 
|  | if ("${CMAKE_CXX_COMPILER_ID}" MATCHES "Clang" OR | 
|  | "${CMAKE_CXX_COMPILER_ID}" MATCHES "GNU") | 
|  | execute_process(COMMAND ${CMAKE_CXX_COMPILER} -v | 
|  | RESULT_VARIABLE compiler_info_rc | 
|  | OUTPUT_VARIABLE compiler_info | 
|  | ERROR_VARIABLE compiler_info) | 
|  | if(compiler_info MATCHES ".*gcc-toolset-12.*") | 
|  | set(USING_GCC_TOOLSET_12 TRUE) | 
|  | endif() | 
|  | endif() | 
|  | if(MSVC OR (LINUX AND DEFINED USING_GCC_TOOLSET_12 AND | 
|  | CMAKE_CXX_STANDARD EQUAL 17)) | 
|  | # gtest use a lot of stuff marked as deprecated on Windows or if using | 
|  | # gcc-toolset-12 in the compiler toolchain on Linux; all of the | 
|  | # deprecated declarations in gcc-toolset-12 used in Google Tests have been | 
|  | # observed to be _GLIBCXX17_DEPRECATED and should go away once | 
|  | # CMAKE_CXX_STANDARD is greater than 17. | 
|  | list(APPEND COMPILER_RT_GTEST_CFLAGS -Wno-deprecated-declarations) | 
|  | endif() | 
|  |  | 
|  | # Warnings to turn off for all libraries, not just sanitizers. | 
|  | append_string_if(COMPILER_RT_HAS_WUNUSED_PARAMETER_FLAG -Wno-unused-parameter CMAKE_C_FLAGS CMAKE_CXX_FLAGS) | 
|  |  | 
|  | if (CMAKE_LINKER MATCHES "link.exe$") | 
|  | # Silence MSVC linker warnings caused by empty object files. The | 
|  | # sanitizer libraries intentionally use ifdefs that result in empty | 
|  | # files, rather than skipping these files in the build system. | 
|  | # Ideally, we would pass this flag only for the libraries that need | 
|  | # it, but CMake doesn't seem to have a way to set linker flags for | 
|  | # individual static libraries, so we enable the suppression flag for | 
|  | # the whole compiler-rt project. | 
|  | set(CMAKE_STATIC_LINKER_FLAGS "${CMAKE_STATIC_LINKER_FLAGS} /IGNORE:4221") | 
|  | endif() | 
|  |  | 
|  | add_subdirectory(include) | 
|  |  | 
|  | option(COMPILER_RT_USE_LIBCXX | 
|  | "Enable compiler-rt to use libc++ from the source tree" ON) | 
|  | if(COMPILER_RT_USE_LIBCXX) | 
|  | if(LLVM_ENABLE_PROJECTS_USED) | 
|  | # Don't use libcxx if LLVM_ENABLE_PROJECTS does not enable it. | 
|  | set(COMPILER_RT_LIBCXX_PATH ${LLVM_EXTERNAL_LIBCXX_SOURCE_DIR}) | 
|  | set(COMPILER_RT_LIBCXXABI_PATH ${LLVM_EXTERNAL_LIBCXXABI_SOURCE_DIR}) | 
|  | else() | 
|  | foreach(path IN ITEMS ${LLVM_MAIN_SRC_DIR}/projects/libcxx | 
|  | ${LLVM_MAIN_SRC_DIR}/runtimes/libcxx | 
|  | ${LLVM_MAIN_SRC_DIR}/../libcxx | 
|  | ${LLVM_EXTERNAL_LIBCXX_SOURCE_DIR}) | 
|  | if(IS_DIRECTORY ${path}) | 
|  | set(COMPILER_RT_LIBCXX_PATH ${path}) | 
|  | break() | 
|  | endif() | 
|  | endforeach() | 
|  | foreach(path IN ITEMS ${LLVM_MAIN_SRC_DIR}/projects/libcxxabi | 
|  | ${LLVM_MAIN_SRC_DIR}/runtimes/libcxxabi | 
|  | ${LLVM_MAIN_SRC_DIR}/../libcxxabi | 
|  | ${LLVM_EXTERNAL_LIBCXXABI_SOURCE_DIR}) | 
|  | if(IS_DIRECTORY ${path}) | 
|  | set(COMPILER_RT_LIBCXXABI_PATH ${path}) | 
|  | break() | 
|  | endif() | 
|  | endforeach() | 
|  | endif() | 
|  | endif() | 
|  |  | 
|  | if (LINKER_IS_LLD OR LLVM_TOOL_LLD_BUILD) | 
|  | set(COMPILER_RT_LLD_PATH ${LLVM_MAIN_SRC_DIR}/tools/lld) | 
|  | if(EXISTS ${COMPILER_RT_LLD_PATH}/) | 
|  | set(COMPILER_RT_HAS_LLD TRUE) | 
|  | else() | 
|  | set(COMPILER_RT_LLD_PATH ${LLVM_MAIN_SRC_DIR}/../lld) | 
|  | if(EXISTS ${COMPILER_RT_LLD_PATH}/) | 
|  | set(COMPILER_RT_HAS_LLD TRUE) | 
|  | endif() | 
|  | endif() | 
|  | endif() | 
|  |  | 
|  | if(ANDROID) | 
|  | set(COMPILER_RT_HAS_LLD TRUE) | 
|  | set(COMPILER_RT_TEST_USE_LLD TRUE) | 
|  | append_list_if(COMPILER_RT_HAS_FUSE_LD_LLD_FLAG -fuse-ld=lld SANITIZER_COMMON_LINK_FLAGS) | 
|  | append_list_if(COMPILER_RT_HAS_LLD -fuse-ld=lld COMPILER_RT_UNITTEST_LINK_FLAGS) | 
|  | endif() | 
|  | if(${COMPILER_RT_DEFAULT_TARGET_ARCH} MATCHES sparc) | 
|  | # lld has several bugs/limitations on SPARC, so disable (Issue #100320). | 
|  | set(COMPILER_RT_HAS_LLD FALSE) | 
|  | endif() | 
|  | pythonize_bool(COMPILER_RT_HAS_LLD) | 
|  | pythonize_bool(COMPILER_RT_TEST_USE_LLD) | 
|  |  | 
|  | option(COMPILER_RT_ENABLE_INTERNAL_SYMBOLIZER "Build Compiler RT linked with in LLVM symbolizer" OFF) | 
|  | mark_as_advanced(COMPILER_RT_ENABLE_INTERNAL_SYMBOLIZER) | 
|  |  | 
|  | add_subdirectory(lib) | 
|  |  | 
|  | if(COMPILER_RT_INCLUDE_TESTS) | 
|  | # Don't build llvm-lit for runtimes-build, it will clean up map_config. | 
|  | if (COMPILER_RT_STANDALONE_BUILD AND NOT LLVM_RUNTIMES_BUILD) | 
|  | # If we have a valid source tree, generate llvm-lit into the bin directory. | 
|  | # The user can still choose to have the check targets *use* a different lit | 
|  | # by specifying -DLLVM_EXTERNAL_LIT, but we generate it regardless. | 
|  | if (EXISTS ${LLVM_MAIN_SRC_DIR}/utils/llvm-lit) | 
|  | # Needed for lit support in standalone builds. | 
|  | include(AddLLVM) | 
|  | add_subdirectory(${LLVM_MAIN_SRC_DIR}/utils/llvm-lit ${CMAKE_CURRENT_BINARY_DIR}/llvm-lit) | 
|  | # Ensure that the testsuite uses the local lit rather than | 
|  | # LLVM_INSTALL_DIR/bin/llvm-lit (which probably does not exist). | 
|  | get_llvm_lit_path(_base_dir _file_name) | 
|  | set(LLVM_EXTERNAL_LIT "${_base_dir}/${_file_name}" CACHE STRING "Command used to spawn lit" FORCE) | 
|  | elseif(NOT EXISTS ${LLVM_EXTERNAL_LIT}) | 
|  | message(WARNING "Could not find LLVM source directory and LLVM_EXTERNAL_LIT does not" | 
|  | "point to a valid file.  You will not be able to run tests.") | 
|  | endif() | 
|  | endif() | 
|  | add_subdirectory(unittests) | 
|  | add_subdirectory(test) | 
|  | endif() | 
|  |  | 
|  | add_subdirectory(tools) |