xref: /openbsd/gnu/llvm/compiler-rt/CMakeLists.txt (revision 810390e3)
13cab2bb3Spatrick# CMake build for CompilerRT.
23cab2bb3Spatrick#
33cab2bb3Spatrick# An important constraint of the build is that it only produces libraries
43cab2bb3Spatrick# based on the ability of the host toolchain to target various platforms.
53cab2bb3Spatrick
6d89ec533Spatrickcmake_minimum_required(VERSION 3.13.4)
73cab2bb3Spatrick
83cab2bb3Spatrick# Check if compiler-rt is built as a standalone project.
93cab2bb3Spatrickif (CMAKE_SOURCE_DIR STREQUAL CMAKE_CURRENT_SOURCE_DIR OR COMPILER_RT_STANDALONE_BUILD)
103cab2bb3Spatrick  project(CompilerRT C CXX ASM)
113cab2bb3Spatrick  set(COMPILER_RT_STANDALONE_BUILD TRUE)
123cab2bb3Spatrick  set_property(GLOBAL PROPERTY USE_FOLDERS ON)
13*810390e3Srobert  if ("${CMAKE_VERSION}" VERSION_LESS "3.20.0")
14*810390e3Srobert    message(WARNING
15*810390e3Srobert      "Your CMake version is ${CMAKE_VERSION}. Starting with LLVM 17.0.0, the "
16*810390e3Srobert      "minimum version of CMake required to build LLVM will become 3.20.0, and "
17*810390e3Srobert      "using an older CMake will become an error. Please upgrade your CMake to "
18*810390e3Srobert      "at least 3.20.0 now to avoid issues in the future!")
193cab2bb3Spatrick  endif()
20*810390e3Srobertendif()
21*810390e3Srobert
22*810390e3Srobertset(LLVM_COMMON_CMAKE_UTILS "${CMAKE_CURRENT_SOURCE_DIR}/../cmake")
233cab2bb3Spatrick
243cab2bb3Spatrick# Add path for custom compiler-rt modules.
253cab2bb3Spatricklist(INSERT CMAKE_MODULE_PATH 0
263cab2bb3Spatrick  "${CMAKE_CURRENT_SOURCE_DIR}/cmake"
273cab2bb3Spatrick  "${CMAKE_CURRENT_SOURCE_DIR}/cmake/Modules"
28*810390e3Srobert  "${LLVM_COMMON_CMAKE_UTILS}"
29*810390e3Srobert  "${LLVM_COMMON_CMAKE_UTILS}/Modules"
303cab2bb3Spatrick  )
313cab2bb3Spatrick
323cab2bb3Spatrickif(CMAKE_CONFIGURATION_TYPES)
333cab2bb3Spatrick  set(CMAKE_CFG_RESOLVED_INTDIR "${CMAKE_CFG_INTDIR}/")
343cab2bb3Spatrickelse()
353cab2bb3Spatrick  set(CMAKE_CFG_RESOLVED_INTDIR "")
363cab2bb3Spatrickendif()
373cab2bb3Spatrick
38*810390e3Srobertinclude(SetPlatformToolchainTools)
393cab2bb3Spatrickinclude(base-config-ix)
403cab2bb3Spatrickinclude(CompilerRTUtils)
41*810390e3Srobertinclude(CMakeDependentOption)
423cab2bb3Spatrick
433cab2bb3Spatrickoption(COMPILER_RT_BUILD_BUILTINS "Build builtins" ON)
443cab2bb3Spatrickmark_as_advanced(COMPILER_RT_BUILD_BUILTINS)
45*810390e3Srobertoption(COMPILER_RT_DISABLE_AARCH64_FMV "Disable AArch64 Function Multi Versioning support" OFF)
46*810390e3Srobertmark_as_advanced(COMPILER_RT_DISABLE_AARCH64_FMV)
473cab2bb3Spatrickoption(COMPILER_RT_BUILD_CRT "Build crtbegin.o/crtend.o" ON)
483cab2bb3Spatrickmark_as_advanced(COMPILER_RT_BUILD_CRT)
493cab2bb3Spatrickoption(COMPILER_RT_CRT_USE_EH_FRAME_REGISTRY "Use eh_frame in crtbegin.o/crtend.o" ON)
503cab2bb3Spatrickmark_as_advanced(COMPILER_RT_CRT_USE_EH_FRAME_REGISTRY)
513cab2bb3Spatrickoption(COMPILER_RT_BUILD_SANITIZERS "Build sanitizers" ON)
523cab2bb3Spatrickmark_as_advanced(COMPILER_RT_BUILD_SANITIZERS)
533cab2bb3Spatrickoption(COMPILER_RT_BUILD_XRAY "Build xray" ON)
543cab2bb3Spatrickmark_as_advanced(COMPILER_RT_BUILD_XRAY)
553cab2bb3Spatrickoption(COMPILER_RT_BUILD_LIBFUZZER "Build libFuzzer" ON)
563cab2bb3Spatrickmark_as_advanced(COMPILER_RT_BUILD_LIBFUZZER)
573cab2bb3Spatrickoption(COMPILER_RT_BUILD_PROFILE "Build profile runtime" ON)
583cab2bb3Spatrickmark_as_advanced(COMPILER_RT_BUILD_PROFILE)
59d89ec533Spatrickoption(COMPILER_RT_BUILD_MEMPROF "Build memory profiling runtime" ON)
60d89ec533Spatrickmark_as_advanced(COMPILER_RT_BUILD_MEMPROF)
613cab2bb3Spatrickoption(COMPILER_RT_BUILD_XRAY_NO_PREINIT "Build xray with no preinit patching" OFF)
623cab2bb3Spatrickmark_as_advanced(COMPILER_RT_BUILD_XRAY_NO_PREINIT)
63d89ec533Spatrickoption(COMPILER_RT_BUILD_ORC "Build ORC runtime" ON)
64d89ec533Spatrickmark_as_advanced(COMPILER_RT_BUILD_ORC)
65*810390e3Srobertoption(COMPILER_RT_BUILD_GWP_ASAN "Build GWP-ASan, and link it into SCUDO" ON)
66*810390e3Srobertmark_as_advanced(COMPILER_RT_BUILD_GWP_ASAN)
67*810390e3Srobertoption(COMPILER_RT_ENABLE_CET "Build Compiler RT with CET enabled" OFF)
683cab2bb3Spatrick
69*810390e3Srobertoption(COMPILER_RT_SCUDO_STANDALONE_SYSROOT_PATH "Set custom sysroot for building SCUDO standalone" OFF)
70*810390e3Srobertmark_as_advanced(COMPILER_RT_SCUDO_STANDALONE_SYSROOT_PATH)
71*810390e3Srobertoption(COMPILER_RT_SCUDO_STANDALONE_BUILD_SHARED "Build SCUDO standalone for shared libraries" ON)
72*810390e3Srobertmark_as_advanced(COMPILER_RT_SCUDO_STANDALONE_BUILD_SHARED)
73*810390e3Srobertoption(COMPILER_RT_BUILD_SCUDO_STANDALONE_WITH_LLVM_LIBC "Build SCUDO standalone with LLVM's libc headers" OFF)
74*810390e3Srobertmark_as_advanced(COMPILER_RT_BUILD_SCUDO_STANDALONE_WITH_LLVM_LIBC)
753cab2bb3Spatrick
76d89ec533Spatrickif(FUCHSIA)
77d89ec533Spatrick  set(COMPILER_RT_HWASAN_WITH_INTERCEPTORS_DEFAULT OFF)
78d89ec533Spatrickelse()
79d89ec533Spatrick  set(COMPILER_RT_HWASAN_WITH_INTERCEPTORS_DEFAULT ON)
80d89ec533Spatrickendif()
81d89ec533Spatrickset(COMPILER_RT_HWASAN_WITH_INTERCEPTORS ${COMPILER_RT_HWASAN_WITH_INTERCEPTORS_DEFAULT} CACHE BOOL "Enable libc interceptors in HWASan (testing mode)")
823cab2bb3Spatrick
833cab2bb3Spatrickset(COMPILER_RT_BAREMETAL_BUILD OFF CACHE BOOL
843cab2bb3Spatrick  "Build for a bare-metal target.")
853cab2bb3Spatrick
863cab2bb3Spatrickif (COMPILER_RT_STANDALONE_BUILD)
87*810390e3Srobert  set(CMAKE_CXX_STANDARD 17 CACHE STRING "C++ standard to conform to")
88*810390e3Srobert  set(CMAKE_CXX_STANDARD_REQUIRED YES)
89*810390e3Srobert  set(CMAKE_CXX_EXTENSIONS NO)
90*810390e3Srobert
91*810390e3Srobert  if (NOT LLVM_RUNTIMES_BUILD)
923cab2bb3Spatrick    load_llvm_config()
93*810390e3Srobert  endif()
943cab2bb3Spatrick  if (TARGET intrinsics_gen)
953cab2bb3Spatrick    # Loading the llvm config causes this target to be imported so place it
963cab2bb3Spatrick    # under the appropriate folder in an IDE.
973cab2bb3Spatrick    set_target_properties(intrinsics_gen PROPERTIES FOLDER "Compiler-RT Misc")
983cab2bb3Spatrick  endif()
993cab2bb3Spatrick
1001f9cb04fSpatrick  find_package(Python3 COMPONENTS Interpreter)
1011f9cb04fSpatrick  if(NOT Python3_Interpreter_FOUND)
1021f9cb04fSpatrick    message(WARNING "Python3 not found, using python2 as a fallback")
1031f9cb04fSpatrick    find_package(Python2 COMPONENTS Interpreter REQUIRED)
1041f9cb04fSpatrick    if(Python2_VERSION VERSION_LESS 2.7)
1051f9cb04fSpatrick      message(SEND_ERROR "Python 2.7 or newer is required")
1061f9cb04fSpatrick    endif()
1071f9cb04fSpatrick
1081f9cb04fSpatrick    # Treat python2 as python3
1091f9cb04fSpatrick    add_executable(Python3::Interpreter IMPORTED)
1101f9cb04fSpatrick    set_target_properties(Python3::Interpreter PROPERTIES
1111f9cb04fSpatrick      IMPORTED_LOCATION ${Python2_EXECUTABLE})
1121f9cb04fSpatrick    set(Python3_EXECUTABLE ${Python2_EXECUTABLE})
1131f9cb04fSpatrick  endif()
1141f9cb04fSpatrick
1153cab2bb3Spatrick  # Ensure that fat libraries are built correctly on Darwin
116d89ec533Spatrick  if(APPLE)
1173cab2bb3Spatrick    include(UseLibtool)
1183cab2bb3Spatrick  endif()
1193cab2bb3Spatrick
1203cab2bb3Spatrick  # Define default arguments to lit.
1213cab2bb3Spatrick  set(LIT_ARGS_DEFAULT "-sv")
1223cab2bb3Spatrick  if (MSVC OR XCODE)
1233cab2bb3Spatrick    set(LIT_ARGS_DEFAULT "${LIT_ARGS_DEFAULT} --no-progress-bar")
1243cab2bb3Spatrick  endif()
1253cab2bb3Spatrick  set(LLVM_LIT_ARGS "${LIT_ARGS_DEFAULT}" CACHE STRING "Default options for lit")
1263cab2bb3Spatrick  set(LLVM_LIT_OUTPUT_DIR "${COMPILER_RT_EXEC_OUTPUT_DIR}")
1273cab2bb3Spatrickendif()
1283cab2bb3Spatrick
1293cab2bb3Spatrickconstruct_compiler_rt_default_triple()
1303cab2bb3Spatrickif ("${COMPILER_RT_DEFAULT_TARGET_TRIPLE}" MATCHES ".*hf$")
1313cab2bb3Spatrick  if (${COMPILER_RT_DEFAULT_TARGET_ARCH} MATCHES "^arm")
1323cab2bb3Spatrick    set(COMPILER_RT_DEFAULT_TARGET_ARCH "armhf")
133d89ec533Spatrick    CHECK_SYMBOL_EXISTS (__thumb__ "" COMPILER_RT_ARM_THUMB)
1343cab2bb3Spatrick  endif()
1353cab2bb3Spatrickendif()
136*810390e3Srobertif (${COMPILER_RT_DEFAULT_TARGET_ARCH} MATCHES "^mips")
137*810390e3Srobert  CHECK_SYMBOL_EXISTS (_MIPS_ARCH_MIPS32R6 "" COMPILER_RT_MIPS32R6)
138*810390e3Srobert  CHECK_SYMBOL_EXISTS (_MIPS_ARCH_MIPS64R6 "" COMPILER_RT_MIPS64R6)
139*810390e3Srobert  CHECK_SYMBOL_EXISTS (__mips64 "" COMPILER_RT_MIPS_64)
140*810390e3Srobert  CHECK_SYMBOL_EXISTS (__MIPSEL__ "" COMPILER_RT_MIPS_EL)
141*810390e3Srobert  if ("${COMPILER_RT_MIPS_64}")
142*810390e3Srobert    set(COMPILER_RT_DEFAULT_TARGET_ARCH "mips64")
143*810390e3Srobert  else()
144*810390e3Srobert    set(COMPILER_RT_DEFAULT_TARGET_ARCH "mips")
145*810390e3Srobert  endif()
146*810390e3Srobert  if ("${COMPILER_RT_MIPS_EL}")
147*810390e3Srobert    set(COMPILER_RT_DEFAULT_TARGET_ARCH "${COMPILER_RT_DEFAULT_TARGET_ARCH}el")
148*810390e3Srobert  endif()
149*810390e3Srobertendif()
1503cab2bb3Spatrickif ("${COMPILER_RT_DEFAULT_TARGET_TRIPLE}" MATCHES ".*android.*")
1513cab2bb3Spatrick  set(ANDROID 1)
152d89ec533Spatrick  string(REGEX MATCH "-target(=| +)[^ ]+android[a-z]*([0-9]+)" ANDROID_API_LEVEL "${CMAKE_C_FLAGS}")
153d89ec533Spatrick  set(ANDROID_API_LEVEL ${CMAKE_MATCH_2})
1543cab2bb3Spatrickendif()
1553cab2bb3Spatrickpythonize_bool(ANDROID)
1563cab2bb3Spatrick
1573cab2bb3Spatrickset(COMPILER_RT_SOURCE_DIR ${CMAKE_CURRENT_SOURCE_DIR})
1583cab2bb3Spatrickset(COMPILER_RT_BINARY_DIR ${CMAKE_CURRENT_BINARY_DIR})
1593cab2bb3Spatrick
1603cab2bb3Spatrickpythonize_bool(LLVM_ENABLE_PER_TARGET_RUNTIME_DIR)
1613cab2bb3Spatrick
162*810390e3Srobert# We support running instrumented tests when we're not cross-compiling
1633cab2bb3Spatrick# and target a UNIX-like system or Windows.
1643cab2bb3Spatrick# We can run tests on Android even when we are cross-compiling.
165*810390e3Srobertif(("${CMAKE_HOST_SYSTEM_NAME}" STREQUAL "${CMAKE_SYSTEM_NAME}" AND (UNIX OR WIN32))
166*810390e3Srobert   OR ANDROID OR COMPILER_RT_EMULATOR)
1673cab2bb3Spatrick  option(COMPILER_RT_CAN_EXECUTE_TESTS "Can we execute instrumented tests" ON)
1683cab2bb3Spatrickelse()
1693cab2bb3Spatrick  option(COMPILER_RT_CAN_EXECUTE_TESTS "Can we execute instrumented tests" OFF)
1703cab2bb3Spatrickendif()
1713cab2bb3Spatrick
1723cab2bb3Spatrickoption(COMPILER_RT_DEBUG "Build runtimes with full debug info" OFF)
1733cab2bb3Spatrickoption(COMPILER_RT_EXTERNALIZE_DEBUGINFO
1743cab2bb3Spatrick  "Generate dSYM files and strip executables and libraries (Darwin Only)" OFF)
1753cab2bb3Spatrick# COMPILER_RT_DEBUG_PYBOOL is used by lit.common.configured.in.
1763cab2bb3Spatrickpythonize_bool(COMPILER_RT_DEBUG)
1773cab2bb3Spatrick
1783cab2bb3Spatrickoption(COMPILER_RT_INTERCEPT_LIBDISPATCH
1793cab2bb3Spatrick  "Support interception of libdispatch (GCD). Requires '-fblocks'" OFF)
1803cab2bb3Spatrickoption(COMPILER_RT_LIBDISPATCH_INSTALL_PATH
1813cab2bb3Spatrick  "Specify if libdispatch is installed in a custom location" "")
1823cab2bb3Spatrickif (COMPILER_RT_INTERCEPT_LIBDISPATCH AND NOT APPLE)
1833cab2bb3Spatrick  set(COMPILER_RT_LIBDISPATCH_CFLAGS -fblocks)
1843cab2bb3Spatrick  set(COMPILER_RT_TEST_LIBDISPATCH_CFLAGS)
1853cab2bb3Spatrick  if (COMPILER_RT_LIBDISPATCH_INSTALL_PATH)
1863cab2bb3Spatrick    list(APPEND COMPILER_RT_TEST_LIBDISPATCH_CFLAGS
1873cab2bb3Spatrick        -I${COMPILER_RT_LIBDISPATCH_INSTALL_PATH}/include
1883cab2bb3Spatrick        -L${COMPILER_RT_LIBDISPATCH_INSTALL_PATH}/lib
1893cab2bb3Spatrick        -Wl,-rpath=${COMPILER_RT_LIBDISPATCH_INSTALL_PATH}/lib)
1903cab2bb3Spatrick  endif()
1913cab2bb3Spatrick  list(APPEND COMPILER_RT_TEST_LIBDISPATCH_CFLAGS -lBlocksRuntime -ldispatch)
1923cab2bb3Spatrickendif()
1933cab2bb3Spatrickif (APPLE) # Always enable on Apple platforms.
1943cab2bb3Spatrick  set(COMPILER_RT_INTERCEPT_LIBDISPATCH ON)
1953cab2bb3Spatrickendif()
1963cab2bb3Spatrickpythonize_bool(COMPILER_RT_INTERCEPT_LIBDISPATCH)
1973cab2bb3Spatrick
1983cab2bb3Spatrickif(APPLE AND SANITIZER_MIN_OSX_VERSION AND SANITIZER_MIN_OSX_VERSION VERSION_LESS "10.9")
1993cab2bb3Spatrick  # Mac OS X prior to 10.9 had problems with exporting symbols from
2003cab2bb3Spatrick  # libc++/libc++abi.
2013cab2bb3Spatrick  set(cxxabi_supported OFF)
2023cab2bb3Spatrickelse()
2033cab2bb3Spatrick  set(cxxabi_supported ON)
2043cab2bb3Spatrickendif()
2053cab2bb3Spatrick
2063cab2bb3Spatrickoption(SANITIZER_ALLOW_CXXABI "Allow use of C++ ABI details in ubsan" ON)
2073cab2bb3Spatrick
208d89ec533Spatrickset(SANITIZER_CAN_USE_CXXABI OFF)
2093cab2bb3Spatrickif (cxxabi_supported AND SANITIZER_ALLOW_CXXABI)
2103cab2bb3Spatrick  set(SANITIZER_CAN_USE_CXXABI ON)
2113cab2bb3Spatrickendif()
2123cab2bb3Spatrickpythonize_bool(SANITIZER_CAN_USE_CXXABI)
2133cab2bb3Spatrick
2143cab2bb3Spatrickmacro(handle_default_cxx_lib var)
215d89ec533Spatrick  # Specifying -stdlib= in CMAKE_CXX_FLAGS overrides the defaults.
216d89ec533Spatrick  if (CMAKE_CXX_FLAGS MATCHES "-stdlib=([a-zA-Z+]*)")
217d89ec533Spatrick    set(${var}_LIBNAME "${CMAKE_MATCH_1}")
218d89ec533Spatrick    set(${var}_SYSTEM 1)
219d89ec533Spatrick  elseif (${var} STREQUAL "default")
2203cab2bb3Spatrick    if (APPLE OR CMAKE_SYSTEM_NAME MATCHES "FreeBSD")
2213cab2bb3Spatrick      set(${var}_LIBNAME "libc++")
2223cab2bb3Spatrick      set(${var}_SYSTEM 1)
2233cab2bb3Spatrick    elseif (FUCHSIA)
2243cab2bb3Spatrick      set(${var}_LIBNAME "libc++")
2253cab2bb3Spatrick      set(${var}_INTREE 1)
2263cab2bb3Spatrick    else()
2273cab2bb3Spatrick      set(${var}_LIBNAME "libstdc++")
2283cab2bb3Spatrick      set(${var}_SYSTEM 1)
2293cab2bb3Spatrick    endif()
2303cab2bb3Spatrick  else()
2313cab2bb3Spatrick    set(${var}_LIBNAME "${${var}}")
2323cab2bb3Spatrick    set(${var}_SYSTEM 1)
2333cab2bb3Spatrick  endif()
2343cab2bb3Spatrickendmacro()
2353cab2bb3Spatrick
2363cab2bb3Spatrick# This is either directly the C++ ABI library or the full C++ library
2373cab2bb3Spatrick# which pulls in the ABI transitively.
238*810390e3Srobert# TODO: Mark this as internal flag, most users should use COMPILER_RT_CXX_LIBRARY.
2393cab2bb3Spatrickset(SANITIZER_CXX_ABI "default" CACHE STRING
2403cab2bb3Spatrick    "Specify C++ ABI library to use.")
2413cab2bb3Spatrickset(CXXABIS none default libstdc++ libc++ libcxxabi)
2423cab2bb3Spatrickset_property(CACHE SANITIZER_CXX_ABI PROPERTY STRINGS ;${CXXABIS})
2433cab2bb3Spatrickhandle_default_cxx_lib(SANITIZER_CXX_ABI)
2443cab2bb3Spatrick
2453cab2bb3Spatrick# This needs to be a full C++ library for linking gtest and unit tests.
246*810390e3Srobert# TODO: Mark this as internal flag, most users should use COMPILER_RT_CXX_LIBRARY.
2473cab2bb3Spatrickset(SANITIZER_TEST_CXX "default" CACHE STRING
2483cab2bb3Spatrick    "Specify C++ library to use for tests.")
2493cab2bb3Spatrickset(CXXLIBS none default libstdc++ libc++)
2503cab2bb3Spatrickset_property(CACHE SANITIZER_TEST_CXX PROPERTY STRINGS ;${CXXLIBS})
2513cab2bb3Spatrickhandle_default_cxx_lib(SANITIZER_TEST_CXX)
2523cab2bb3Spatrick
253*810390e3Srobertoption(COMPILER_RT_USE_LLVM_UNWINDER "Use the LLVM unwinder." OFF)
254*810390e3Srobertcmake_dependent_option(COMPILER_RT_ENABLE_STATIC_UNWINDER
255*810390e3Srobert  "Statically link the LLVM unwinder." OFF
256*810390e3Srobert  "COMPILER_RT_USE_LLVM_UNWINDER" OFF)
257*810390e3Srobert
2583cab2bb3Spatrickset(DEFAULT_SANITIZER_USE_STATIC_LLVM_UNWINDER OFF)
2593cab2bb3Spatrickif (FUCHSIA)
2603cab2bb3Spatrick  set(DEFAULT_SANITIZER_USE_STATIC_LLVM_UNWINDER ON)
2613cab2bb3Spatrickelseif (DEFINED LIBUNWIND_ENABLE_SHARED AND NOT LIBUNWIND_ENABLE_SHARED)
2623cab2bb3Spatrick  set(DEFAULT_SANITIZER_USE_STATIC_LLVM_UNWINDER ON)
2633cab2bb3Spatrickendif()
2643cab2bb3Spatrick
2653cab2bb3Spatrickoption(SANITIZER_USE_STATIC_LLVM_UNWINDER
2663cab2bb3Spatrick  "Use static LLVM unwinder." ${DEFAULT_SANITIZER_USE_STATIC_LLVM_UNWINDER})
267*810390e3Srobertpythonize_bool(SANITIZER_USE_STATIC_LLVM_UNWINDER)
2683cab2bb3Spatrick
2693cab2bb3Spatrickset(DEFAULT_SANITIZER_USE_STATIC_CXX_ABI OFF)
2703cab2bb3Spatrickif (DEFINED LIBCXXABI_ENABLE_SHARED AND NOT LIBCXXABI_ENABLE_SHARED)
2713cab2bb3Spatrick  set(DEFAULT_SANITIZER_USE_STATIC_CXX_ABI ON)
2723cab2bb3Spatrickendif()
2733cab2bb3Spatrick
2743cab2bb3Spatrickoption(SANITIZER_USE_STATIC_CXX_ABI
2753cab2bb3Spatrick  "Use static libc++abi." ${DEFAULT_SANITIZER_USE_STATIC_CXX_ABI})
276*810390e3Srobertpythonize_bool(SANITIZER_USE_STATIC_CXX_ABI)
277*810390e3Srobert
278*810390e3Srobertset(DEFAULT_SANITIZER_USE_STATIC_TEST_CXX OFF)
279*810390e3Srobertif (DEFINED LIBCXX_ENABLE_SHARED AND NOT LIBCXX_ENABLE_SHARED)
280*810390e3Srobert  set(DEFAULT_SANITIZER_USE_STATIC_TEST_CXX ON)
281*810390e3Srobertendif()
282*810390e3Srobert
283*810390e3Srobertoption(SANITIZER_USE_STATIC_TEST_CXX
284*810390e3Srobert  "Use static libc++ for tests." ${DEFAULT_SANITIZER_USE_STATIC_TEST_CXX})
285*810390e3Srobertpythonize_bool(SANITIZER_USE_STATIC_TEST_CXX)
286*810390e3Srobert
287*810390e3Srobertset(COMPILER_RT_SUPPORTED_CXX_LIBRARIES none default libcxx)
288*810390e3Srobertset(COMPILER_RT_CXX_LIBRARY "default" CACHE STRING "Specify C++ library to use. Supported values are ${COMPILER_RT_SUPPORTED_CXX_LIBRARIES}.")
289*810390e3Srobertif (NOT "${COMPILER_RT_CXX_LIBRARY}" IN_LIST COMPILER_RT_SUPPORTED_CXX_LIBRARIES)
290*810390e3Srobert  message(FATAL_ERROR "Unsupported C++ library: '${COMPILER_RT_CXX_LIBRARY}'. Supported values are ${COMPILER_RT_SUPPORTED_CXX_LIBRARIES}.")
291*810390e3Srobertendif()
292*810390e3Srobertcmake_dependent_option(COMPILER_RT_STATIC_CXX_LIBRARY
293*810390e3Srobert  "Statically link the C++ library." OFF
294*810390e3Srobert  "COMPILER_RT_CXX_LIBRARY" OFF)
2953cab2bb3Spatrick
2963cab2bb3Spatrickset(DEFAULT_COMPILER_RT_USE_BUILTINS_LIBRARY OFF)
2973cab2bb3Spatrickif (FUCHSIA)
2983cab2bb3Spatrick  set(DEFAULT_COMPILER_RT_USE_BUILTINS_LIBRARY ON)
2993cab2bb3Spatrickendif()
3003cab2bb3Spatrick
3013cab2bb3Spatrickoption(COMPILER_RT_USE_BUILTINS_LIBRARY
3023cab2bb3Spatrick  "Use compiler-rt builtins instead of libgcc" ${DEFAULT_COMPILER_RT_USE_BUILTINS_LIBRARY})
3033cab2bb3Spatrick
3043cab2bb3Spatrickinclude(config-ix)
3053cab2bb3Spatrick
3063cab2bb3Spatrick#================================
3073cab2bb3Spatrick# Setup Compiler Flags
3083cab2bb3Spatrick#================================
3093cab2bb3Spatrick
310*810390e3Srobert# fcf-protection is a gcc/clang option for CET support on Linux platforms.
311*810390e3Srobert# We need to handle MSVC CET option on Windows platforms.
312*810390e3Srobertif (NOT MSVC)
313*810390e3Srobert  if (COMPILER_RT_ENABLE_CET AND NOT COMPILER_RT_HAS_FCF_PROTECTION_FLAG)
314*810390e3Srobert    message(FATAL_ERROR "Compiler used to build compiler-rt doesn't support CET!")
315*810390e3Srobert  endif()
316*810390e3Srobertendif()
317*810390e3Srobert
3183cab2bb3Spatrickif(MSVC)
3193cab2bb3Spatrick  # Override any existing /W flags with /W4. This is what LLVM does.  Failing to
3203cab2bb3Spatrick  # remove other /W[0-4] flags will result in a warning about overriding a
3213cab2bb3Spatrick  # previous flag.
3223cab2bb3Spatrick  if (COMPILER_RT_HAS_W4_FLAG)
3233cab2bb3Spatrick    string(REGEX REPLACE " /W[0-4]" "" CMAKE_C_FLAGS "${CMAKE_C_FLAGS}")
3243cab2bb3Spatrick    string(REGEX REPLACE " /W[0-4]" "" CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS}")
3253cab2bb3Spatrick    append_string_if(COMPILER_RT_HAS_W4_FLAG /W4 CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
3263cab2bb3Spatrick  endif()
3273cab2bb3Spatrickelse()
3283cab2bb3Spatrick  append_string_if(COMPILER_RT_HAS_WALL_FLAG -Wall CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
3293cab2bb3Spatrickendif()
3303cab2bb3Spatrickif(COMPILER_RT_ENABLE_WERROR)
3313cab2bb3Spatrick  append_string_if(COMPILER_RT_HAS_WERROR_FLAG -Werror CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
3323cab2bb3Spatrick  append_string_if(COMPILER_RT_HAS_WX_FLAG /WX CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
3333cab2bb3Spatrickendif()
3343cab2bb3Spatrick
3353cab2bb3Spatrick# Emulate C99 and C++11's __func__ for MSVC prior to 2013 CTP.
3363cab2bb3Spatrickif(NOT COMPILER_RT_HAS_FUNC_SYMBOL)
3373cab2bb3Spatrick  add_definitions(-D__func__=__FUNCTION__)
3383cab2bb3Spatrickendif()
3393cab2bb3Spatrick
340d89ec533Spatrick# Provide some common commandline flags for Sanitizer runtimes.
341d89ec533Spatrickif("${ANDROID_API_LEVEL}" GREATER_EQUAL 29)
342d89ec533Spatrick  list(APPEND SANITIZER_COMMON_CFLAGS -fno-emulated-tls)
343d89ec533Spatrick  string(APPEND COMPILER_RT_TEST_COMPILER_CFLAGS " -fno-emulated-tls")
344d89ec533Spatrickendif()
3453cab2bb3Spatrickif(NOT WIN32)
3463cab2bb3Spatrick  append_list_if(COMPILER_RT_HAS_FPIC_FLAG -fPIC SANITIZER_COMMON_CFLAGS)
3473cab2bb3Spatrickendif()
3483cab2bb3Spatrickappend_list_if(COMPILER_RT_HAS_FNO_BUILTIN_FLAG -fno-builtin SANITIZER_COMMON_CFLAGS)
3493cab2bb3Spatrickappend_list_if(COMPILER_RT_HAS_FNO_EXCEPTIONS_FLAG -fno-exceptions SANITIZER_COMMON_CFLAGS)
3503cab2bb3Spatrickif(NOT COMPILER_RT_DEBUG AND NOT APPLE)
3513cab2bb3Spatrick  append_list_if(COMPILER_RT_HAS_FOMIT_FRAME_POINTER_FLAG -fomit-frame-pointer SANITIZER_COMMON_CFLAGS)
3523cab2bb3Spatrickendif()
3533cab2bb3Spatrickappend_list_if(COMPILER_RT_HAS_FUNWIND_TABLES_FLAG -funwind-tables SANITIZER_COMMON_CFLAGS)
3543cab2bb3Spatrickappend_list_if(COMPILER_RT_HAS_FNO_STACK_PROTECTOR_FLAG -fno-stack-protector SANITIZER_COMMON_CFLAGS)
3553cab2bb3Spatrickappend_list_if(COMPILER_RT_HAS_FNO_SANITIZE_SAFE_STACK_FLAG -fno-sanitize=safe-stack SANITIZER_COMMON_CFLAGS)
3563cab2bb3Spatrickappend_list_if(COMPILER_RT_HAS_FVISIBILITY_HIDDEN_FLAG -fvisibility=hidden SANITIZER_COMMON_CFLAGS)
3573cab2bb3Spatrickif(NOT COMPILER_RT_HAS_FVISIBILITY_HIDDEN_FLAG)
3583cab2bb3Spatrick  append_list_if(COMPILER_RT_HAS_FVISIBILITY_INLINES_HIDDEN_FLAG -fvisibility-inlines-hidden SANITIZER_COMMON_CFLAGS)
3593cab2bb3Spatrickendif()
3603cab2bb3Spatrickappend_list_if(COMPILER_RT_HAS_FNO_LTO_FLAG -fno-lto SANITIZER_COMMON_CFLAGS)
3613cab2bb3Spatrick
3621f9cb04fSpatrick# By default do not instrument or use profdata for compiler-rt.
3631f9cb04fSpatrickif(NOT COMPILER_RT_ENABLE_PGO)
3641f9cb04fSpatrick  if(LLVM_PROFDATA_FILE AND COMPILER_RT_HAS_FNO_PROFILE_INSTR_USE_FLAG)
3651f9cb04fSpatrick    list(APPEND SANITIZER_COMMON_CFLAGS "-fno-profile-instr-use")
3661f9cb04fSpatrick  endif()
3671f9cb04fSpatrick  if(LLVM_BUILD_INSTRUMENTED MATCHES IR AND COMPILER_RT_HAS_FNO_PROFILE_GENERATE_FLAG)
3681f9cb04fSpatrick    list(APPEND SANITIZER_COMMON_CFLAGS "-fno-profile-generate")
369*810390e3Srobert  elseif((LLVM_BUILD_INSTRUMENTED OR LLVM_BUILD_INSTRUMENTED_COVERAGE) AND COMPILER_RT_HAS_FNO_PROFILE_INSTR_GENERATE_FLAG)
3701f9cb04fSpatrick    list(APPEND SANITIZER_COMMON_CFLAGS "-fno-profile-instr-generate")
371*810390e3Srobert    if(LLVM_BUILD_INSTRUMENTED_COVERAGE AND COMPILER_RT_HAS_FNO_COVERAGE_MAPPING_FLAG)
372*810390e3Srobert      list(APPEND SANITIZER_COMMON_CFLAGS "-fno-coverage-mapping")
373*810390e3Srobert    endif()
3741f9cb04fSpatrick  endif()
3751f9cb04fSpatrickendif()
3761f9cb04fSpatrick
3773cab2bb3Spatrick# The following is a workaround for powerpc64le. This is the only architecture
3783cab2bb3Spatrick# that requires -fno-function-sections to work properly. If lacking, the ASan
3793cab2bb3Spatrick# Linux test function-sections-are-bad.cpp fails with the following error:
3803cab2bb3Spatrick# 'undefined symbol: __sanitizer_unaligned_load32'.
3813cab2bb3Spatrickif(DEFINED TARGET_powerpc64le_CFLAGS)
3821f9cb04fSpatrick  if(CMAKE_CXX_COMPILER_ID MATCHES "XL")
3831f9cb04fSpatrick    append("-qnofuncsect" TARGET_powerpc64le_CFLAGS)
3841f9cb04fSpatrick  else()
3853cab2bb3Spatrick    append_list_if(COMPILER_RT_HAS_FNO_FUNCTION_SECTIONS_FLAG -fno-function-sections TARGET_powerpc64le_CFLAGS)
3863cab2bb3Spatrick  endif()
3871f9cb04fSpatrickendif()
3883cab2bb3Spatrick
3893cab2bb3Spatrick# The following is a workaround for s390x.  This avoids creation of "partial
3903cab2bb3Spatrick# inline" function fragments when building the asan libraries with certain
3913cab2bb3Spatrick# GCC versions.  The presence of those fragments, in particular for the
3923cab2bb3Spatrick# interceptors, changes backtraces seen in asan error cases, which causes
3933cab2bb3Spatrick# testsuite failures.
3943cab2bb3Spatrickif("${COMPILER_RT_DEFAULT_TARGET_ARCH}" MATCHES "s390x")
3953cab2bb3Spatrick  append_list_if(COMPILER_RT_HAS_FNO_PARTIAL_INLINING_FLAG -fno-partial-inlining SANITIZER_COMMON_CFLAGS)
3963cab2bb3Spatrickendif()
3973cab2bb3Spatrick
3983cab2bb3Spatrickif(MSVC)
3993cab2bb3Spatrick  # Replace the /M[DT][d] flags with /MT, and strip any definitions of _DEBUG,
4003cab2bb3Spatrick  # which cause definition mismatches at link time.
4013cab2bb3Spatrick  # FIXME: In fact, sanitizers should support both /MT and /MD, see PR20214.
4023cab2bb3Spatrick  if(COMPILER_RT_HAS_MT_FLAG)
4033cab2bb3Spatrick    foreach(flag_var
4043cab2bb3Spatrick      CMAKE_C_FLAGS CMAKE_C_FLAGS_DEBUG CMAKE_C_FLAGS_RELEASE
4053cab2bb3Spatrick      CMAKE_C_FLAGS_MINSIZEREL CMAKE_C_FLAGS_RELWITHDEBINFO
4063cab2bb3Spatrick      CMAKE_CXX_FLAGS CMAKE_CXX_FLAGS_DEBUG CMAKE_CXX_FLAGS_RELEASE
4073cab2bb3Spatrick      CMAKE_CXX_FLAGS_MINSIZEREL CMAKE_CXX_FLAGS_RELWITHDEBINFO)
4083cab2bb3Spatrick      string(REGEX REPLACE "/M[DT]d" "/MT" ${flag_var} "${${flag_var}}")
4093cab2bb3Spatrick      string(REGEX REPLACE "/MD" "/MT" ${flag_var} "${${flag_var}}")
4103cab2bb3Spatrick      string(REGEX REPLACE "/D_DEBUG" "" ${flag_var} "${${flag_var}}")
4113cab2bb3Spatrick    endforeach()
4123cab2bb3Spatrick  endif()
4133cab2bb3Spatrick  append_list_if(COMPILER_RT_HAS_Oy_FLAG /Oy- SANITIZER_COMMON_CFLAGS)
4143cab2bb3Spatrick  append_list_if(COMPILER_RT_HAS_GS_FLAG /GS- SANITIZER_COMMON_CFLAGS)
4153cab2bb3Spatrick
4163cab2bb3Spatrick  # Disable thread safe initialization for static locals. ASan shouldn't need
4173cab2bb3Spatrick  # it. Thread safe initialization assumes that the CRT has already been
4183cab2bb3Spatrick  # initialized, but ASan initializes before the CRT.
4193cab2bb3Spatrick  list(APPEND SANITIZER_COMMON_CFLAGS /Zc:threadSafeInit-)
4203cab2bb3Spatrickendif()
4213cab2bb3Spatrick
4223cab2bb3Spatrickappend_list_if(COMPILER_RT_DEBUG -DSANITIZER_DEBUG=1 SANITIZER_COMMON_CFLAGS)
4233cab2bb3Spatrick
424*810390e3Srobertappend_list_if(COMPILER_RT_HAS_WTHREAD_SAFETY_FLAG -Wthread-safety THREAD_SAFETY_FLAGS)
425*810390e3Srobertappend_list_if(COMPILER_RT_HAS_WTHREAD_SAFETY_REFERENCE_FLAG -Wthread-safety-reference THREAD_SAFETY_FLAGS)
426*810390e3Srobertappend_list_if(COMPILER_RT_HAS_WTHREAD_SAFETY_BETA_FLAG -Wthread-safety-beta THREAD_SAFETY_FLAGS)
427d89ec533Spatricklist(APPEND SANITIZER_COMMON_CFLAGS ${THREAD_SAFETY_FLAGS})
428d89ec533Spatrickstring(REPLACE ";" " " thread_safety_flags_space_sep "${THREAD_SAFETY_FLAGS}")
429d89ec533Spatrickstring(APPEND COMPILER_RT_TEST_COMPILER_CFLAGS " ${thread_safety_flags_space_sep}")
430d89ec533Spatrick
4313cab2bb3Spatrick# If we're using MSVC,
4323cab2bb3Spatrick# always respect the optimization flags set by CMAKE_BUILD_TYPE instead.
4333cab2bb3Spatrickif (NOT MSVC)
4343cab2bb3Spatrick
4353cab2bb3Spatrick  # Build with optimization, unless we're in debug mode.
4363cab2bb3Spatrick  if(COMPILER_RT_DEBUG)
437*810390e3Srobert    list(APPEND SANITIZER_COMMON_CFLAGS -O1)
4383cab2bb3Spatrick  else()
4393cab2bb3Spatrick    list(APPEND SANITIZER_COMMON_CFLAGS -O3)
4403cab2bb3Spatrick  endif()
4413cab2bb3Spatrickendif()
4423cab2bb3Spatrick
4433cab2bb3Spatrick# Determine if we should restrict stack frame sizes.
4443cab2bb3Spatrick# Stack frames on PowerPC, Mips, SystemZ and in debug build can be much larger than
4453cab2bb3Spatrick# anticipated.
4463cab2bb3Spatrick# FIXME: Fix all sanitizers and add -Wframe-larger-than to
4473cab2bb3Spatrick# SANITIZER_COMMON_FLAGS
4483cab2bb3Spatrickif(COMPILER_RT_HAS_WFRAME_LARGER_THAN_FLAG AND NOT COMPILER_RT_DEBUG
4493cab2bb3Spatrick   AND NOT ${COMPILER_RT_DEFAULT_TARGET_ARCH} MATCHES "powerpc|mips|s390x")
4503cab2bb3Spatrick  set(SANITIZER_LIMIT_FRAME_SIZE TRUE)
4513cab2bb3Spatrickelse()
4523cab2bb3Spatrick  set(SANITIZER_LIMIT_FRAME_SIZE FALSE)
4533cab2bb3Spatrickendif()
4543cab2bb3Spatrick
4553cab2bb3Spatrickif(FUCHSIA OR UNIX)
4563cab2bb3Spatrick  set(SANITIZER_USE_SYMBOLS TRUE)
4573cab2bb3Spatrickelse()
4583cab2bb3Spatrick  set(SANITIZER_USE_SYMBOLS FALSE)
4593cab2bb3Spatrickendif()
4603cab2bb3Spatrick
4613cab2bb3Spatrick# Build sanitizer runtimes with debug info.
4623cab2bb3Spatrickif(MSVC)
4633cab2bb3Spatrick  # Use /Z7 instead of /Zi for the asan runtime. This avoids the LNK4099
4643cab2bb3Spatrick  # warning from the MS linker complaining that it can't find the 'vc140.pdb'
4653cab2bb3Spatrick  # file used by our object library compilations.
4663cab2bb3Spatrick  list(APPEND SANITIZER_COMMON_CFLAGS /Z7)
4673cab2bb3Spatrick  foreach(var_to_update
4683cab2bb3Spatrick    CMAKE_CXX_FLAGS
4693cab2bb3Spatrick    CMAKE_CXX_FLAGS_DEBUG
4703cab2bb3Spatrick    CMAKE_CXX_FLAGS_RELWITHDEBINFO)
4713cab2bb3Spatrick    string(REGEX REPLACE "(^| )/Z[i7I]($| )" " /Z7 "
4723cab2bb3Spatrick           "${var_to_update}" "${${var_to_update}}")
4733cab2bb3Spatrick  endforeach()
474*810390e3Srobertelseif(APPLE)
475*810390e3Srobert  # On Apple platforms use full debug info (i.e. not `-gline-tables-only`)
476*810390e3Srobert  # for all build types so that the runtime can be debugged.
477*810390e3Srobert  if(NOT COMPILER_RT_HAS_G_FLAG)
478*810390e3Srobert    message(FATAL_ERROR "-g is not supported by host compiler")
479*810390e3Srobert  endif()
480*810390e3Srobert  list(APPEND SANITIZER_COMMON_CFLAGS -g)
4813cab2bb3Spatrickelseif(COMPILER_RT_HAS_GLINE_TABLES_ONLY_FLAG AND NOT COMPILER_RT_DEBUG)
4823cab2bb3Spatrick  list(APPEND SANITIZER_COMMON_CFLAGS -gline-tables-only)
4833cab2bb3Spatrickelseif(COMPILER_RT_HAS_G_FLAG)
4843cab2bb3Spatrick  list(APPEND SANITIZER_COMMON_CFLAGS -g)
4853cab2bb3Spatrickendif()
4863cab2bb3Spatrick
4873cab2bb3Spatrickif(LLVM_ENABLE_MODULES)
4883cab2bb3Spatrick  # Sanitizers cannot be built with -fmodules. The interceptors intentionally
4893cab2bb3Spatrick  # don't include system headers, which is incompatible with modules.
4903cab2bb3Spatrick  list(APPEND SANITIZER_COMMON_CFLAGS -fno-modules)
4913cab2bb3Spatrickendif()
4923cab2bb3Spatrick
4933cab2bb3Spatrick# Turn off several warnings.
4943cab2bb3Spatrickappend_list_if(COMPILER_RT_HAS_WGNU_FLAG -Wno-gnu SANITIZER_COMMON_CFLAGS)
4953cab2bb3Spatrickappend_list_if(COMPILER_RT_HAS_WVARIADIC_MACROS_FLAG -Wno-variadic-macros SANITIZER_COMMON_CFLAGS)
4963cab2bb3Spatrickappend_list_if(COMPILER_RT_HAS_WC99_EXTENSIONS_FLAG -Wno-c99-extensions SANITIZER_COMMON_CFLAGS)
497*810390e3Srobert# format-pedantic warns about passing T* for %p, which is not useful.
4983cab2bb3Spatrickappend_list_if(COMPILER_RT_HAS_WD4146_FLAG /wd4146 SANITIZER_COMMON_CFLAGS)
4993cab2bb3Spatrickappend_list_if(COMPILER_RT_HAS_WD4291_FLAG /wd4291 SANITIZER_COMMON_CFLAGS)
5003cab2bb3Spatrickappend_list_if(COMPILER_RT_HAS_WD4391_FLAG /wd4391 SANITIZER_COMMON_CFLAGS)
5013cab2bb3Spatrickappend_list_if(COMPILER_RT_HAS_WD4722_FLAG /wd4722 SANITIZER_COMMON_CFLAGS)
5023cab2bb3Spatrickappend_list_if(COMPILER_RT_HAS_WD4800_FLAG /wd4800 SANITIZER_COMMON_CFLAGS)
5033cab2bb3Spatrick
5043cab2bb3Spatrickappend_list_if(MINGW -fms-extensions SANITIZER_COMMON_CFLAGS)
5053cab2bb3Spatrick
506*810390e3Srobert# When lsan scans the stack for detecting reachable pointers, it's possible for
507*810390e3Srobert# a leaked pointer, which was pushed to the stack on an earlier function call,
508*810390e3Srobert# to still exist on the stack when doing a leak check if that part of the stack
509*810390e3Srobert# was not overwritten. In particular, if there's any uninitialized data in the
510*810390e3Srobert# lsan runtime, and the SP we start from is sufficiently deep into the runtime,
511*810390e3Srobert# then a leaked pointer could be marked as reachable. Such instances could be
512*810390e3Srobert# mitigated by clobbering any uninitialized data. Note that this won't cover
513*810390e3Srobert# all possible uninitialized stack contents, such as those used for register
514*810390e3Srobert# spill slots, unused portions for alignment, or even local variables not
515*810390e3Srobert# yet in scope at a certain point in the function.
516*810390e3Srobert#
517*810390e3Srobert# Note that this type of issue was discovered with lsan, but can apply to other
518*810390e3Srobert# sanitizers.
519*810390e3Srobertappend_list_if(COMPILER_RT_HAS_TRIVIAL_AUTO_INIT -ftrivial-auto-var-init=pattern SANITIZER_COMMON_CFLAGS)
520*810390e3Srobert
5213cab2bb3Spatrick# Set common link flags.
522*810390e3Srobert# TODO: We should consider using the same model as libc++, that is use either
523*810390e3Srobert# -nostdlib++ and --unwindlib=none if supported, or -nodefaultlibs otherwise.
524*810390e3Srobertappend_list_if(C_SUPPORTS_NODEFAULTLIBS_FLAG -nodefaultlibs SANITIZER_COMMON_LINK_FLAGS)
5253cab2bb3Spatrickappend_list_if(COMPILER_RT_HAS_Z_TEXT -Wl,-z,text SANITIZER_COMMON_LINK_FLAGS)
5263cab2bb3Spatrick
527*810390e3Srobert# Only necessary for 32-bit SPARC.  Solaris 11.2+ ld uses -z ignore/-z record
528*810390e3Srobert# natively, but supports --as-needed/--no-as-needed for GNU ld compatibility.
529*810390e3Srobertif("${COMPILER_RT_DEFAULT_TARGET_ARCH}" MATCHES "sparc")
530*810390e3Srobert  list(APPEND SANITIZER_COMMON_LINK_LIBS -Wl,--as-needed atomic -Wl,--no-as-needed)
531*810390e3Srobertendif()
532*810390e3Srobert
5333cab2bb3Spatrickif (COMPILER_RT_USE_BUILTINS_LIBRARY)
5343cab2bb3Spatrick  string(REPLACE "-Wl,-z,defs" "" CMAKE_SHARED_LINKER_FLAGS "${CMAKE_SHARED_LINKER_FLAGS}")
5353cab2bb3Spatrickelse()
5363cab2bb3Spatrick  if (ANDROID)
5373cab2bb3Spatrick    append_list_if(COMPILER_RT_HAS_GCC_LIB gcc SANITIZER_COMMON_LINK_LIBS)
5383cab2bb3Spatrick  else()
5393cab2bb3Spatrick    append_list_if(COMPILER_RT_HAS_GCC_S_LIB gcc_s SANITIZER_COMMON_LINK_LIBS)
5403cab2bb3Spatrick  endif()
5413cab2bb3Spatrickendif()
5423cab2bb3Spatrick
5433cab2bb3Spatrickappend_list_if(COMPILER_RT_HAS_LIBC c SANITIZER_COMMON_LINK_LIBS)
5443cab2bb3Spatrickif("${CMAKE_SYSTEM_NAME}" STREQUAL "Fuchsia")
5453cab2bb3Spatrick  list(APPEND SANITIZER_COMMON_LINK_LIBS zircon)
5463cab2bb3Spatrickendif()
5473cab2bb3Spatrick
548d89ec533Spatrickif("${CMAKE_SYSTEM_NAME}" STREQUAL "Fuchsia")
549d89ec533Spatrick  set(SANITIZER_NO_UNDEFINED_SYMBOLS_DEFAULT ON)
550d89ec533Spatrickelse()
551d89ec533Spatrick  set(SANITIZER_NO_UNDEFINED_SYMBOLS_DEFAULT OFF)
552d89ec533Spatrickendif()
553d89ec533Spatrickoption(SANITIZER_NO_UNDEFINED_SYMBOLS "Report error on unresolved symbol references" ${SANITIZER_NO_UNDEFINED_SYMBOLS_DEFAULT})
554d89ec533Spatrickif (SANITIZER_NO_UNDEFINED_SYMBOLS)
555d89ec533Spatrick  list(APPEND SANITIZER_COMMON_LINK_FLAGS -Wl,-z,defs)
556d89ec533Spatrickendif()
557d89ec533Spatrick
558d89ec533Spatrick# TODO: COMPILER_RT_COMMON_CFLAGS and COMPILER_RT_COMMON_LINK_FLAGS are
559d89ec533Spatrick# intended for use in non-sanitizer runtimes such as libFuzzer, profile or XRay,
560d89ec533Spatrick# move these higher to include common flags, then derive SANITIZER_COMMON_CFLAGS
561d89ec533Spatrick# and SANITIZER_COMMON_LINK_FLAGS from those and append sanitizer-specific flags.
562d89ec533Spatrickset(COMPILER_RT_COMMON_CFLAGS ${SANITIZER_COMMON_CFLAGS})
563d89ec533Spatrickset(COMPILER_RT_COMMON_LINK_FLAGS ${SANITIZER_COMMON_LINK_FLAGS})
564d89ec533Spatrick
565d89ec533Spatrick# We don't use the C++ standard library, so avoid including it by mistake.
566d89ec533Spatrickappend_list_if(COMPILER_RT_HAS_NOSTDINCXX_FLAG -nostdinc++ SANITIZER_COMMON_CFLAGS)
567d89ec533Spatrickappend_list_if(COMPILER_RT_HAS_NOSTDLIBXX_FLAG -nostdlib++ SANITIZER_COMMON_LINK_FLAGS)
568d89ec533Spatrick
569d89ec533Spatrick# Remove -stdlib= which is unused when passing -nostdinc++...
570d89ec533Spatrickstring(REGEX MATCHALL "-stdlib=[a-zA-Z+]*" stdlib_flag "${CMAKE_CXX_FLAGS}")
571d89ec533Spatrickstring(REGEX REPLACE "-stdlib=[a-zA-Z+]*" "" CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS}")
572d89ec533Spatrick
573d89ec533Spatrick# ...we need it to build some runtimes and tests so readd it where appropriate.
574d89ec533Spatricklist(APPEND COMPILER_RT_COMMON_CFLAGS ${stdlib_flag})
575d89ec533Spatricklist(APPEND COMPILER_RT_COMMON_LINK_FLAGS ${stdlib_flag})
576d89ec533Spatrick
577d89ec533Spatrick# TODO: There's a lot of duplication across lib/*/tests/CMakeLists.txt files,
578d89ec533Spatrick# move some of the common flags to COMPILER_RT_UNITTEST_CFLAGS.
579d89ec533Spatrick
580d89ec533Spatrick# Unittests need access to C++ standard library.
581d89ec533Spatrickstring(APPEND COMPILER_RT_TEST_COMPILER_CFLAGS " ${stdlib_flag}")
582d89ec533Spatrick
583d89ec533Spatrick# When cross-compiling, COMPILER_RT_TEST_COMPILER_CFLAGS help in compilation
584d89ec533Spatrick# and linking of unittests.
585d89ec533Spatrickstring(REPLACE " " ";" COMPILER_RT_UNITTEST_CFLAGS "${COMPILER_RT_TEST_COMPILER_CFLAGS}")
586d89ec533Spatrickset(COMPILER_RT_UNITTEST_LINK_FLAGS ${COMPILER_RT_UNITTEST_CFLAGS})
587d89ec533Spatrick
588*810390e3Srobertif(COMPILER_RT_USE_LLVM_UNWINDER)
589*810390e3Srobert  # We're linking directly against the libunwind that we're building so don't
590*810390e3Srobert  # try to link in the toolchain's default libunwind which may be missing.
591*810390e3Srobert  append_list_if(CXX_SUPPORTS_UNWINDLIB_NONE_FLAG --unwindlib=none COMPILER_RT_COMMON_LINK_FLAGS)
592*810390e3Srobert  append_list_if(CXX_SUPPORTS_UNWINDLIB_NONE_FLAG --unwindlib=none COMPILER_RT_UNITTEST_LINK_FLAGS)
593*810390e3Srobert  if (COMPILER_RT_ENABLE_STATIC_UNWINDER)
594*810390e3Srobert    list(APPEND COMPILER_RT_UNWINDER_LINK_LIBS "$<TARGET_LINKER_FILE:unwind_static>")
595*810390e3Srobert  else()
596*810390e3Srobert    list(APPEND COMPILER_RT_UNWINDER_LINK_LIBS "$<TARGET_LINKER_FILE:$<IF:$<TARGET_EXISTS:unwind_shared>,unwind_shared,unwind_static>>")
597*810390e3Srobert  endif()
598*810390e3Srobertendif()
599*810390e3Srobert
600*810390e3Srobertif (COMPILER_RT_CXX_LIBRARY STREQUAL "libcxx")
601*810390e3Srobert  # We are using the in-tree libc++ so avoid including the default one.
602*810390e3Srobert  append_list_if(COMPILER_RT_HAS_NOSTDINCXX_FLAG -nostdinc++ COMPILER_RT_COMMON_CFLAGS)
603*810390e3Srobert  append_list_if(COMPILER_RT_HAS_NOSTDLIBXX_FLAG -nostdlib++ COMPILER_RT_COMMON_LINK_FLAGS)
604*810390e3Srobert  # Use the in-tree libc++ through explicit include and library paths.
605*810390e3Srobert  set(COMPILER_RT_CXX_CFLAGS "$<$<TARGET_EXISTS:cxx-headers>:$<IF:$<BOOL:${MSVC}>,/imsvc,-isystem>$<JOIN:$<TARGET_PROPERTY:cxx-headers,INTERFACE_INCLUDE_DIRECTORIES>,$<SEMICOLON>$<IF:$<BOOL:${MSVC}>,/imsvc,-isystem>>>")
606*810390e3Srobert  if (COMPILER_RT_STATIC_CXX_LIBRARY)
607*810390e3Srobert    set(COMPILER_RT_CXX_LINK_LIBS "$<TARGET_LINKER_FILE:cxx_static>")
608*810390e3Srobert  else()
609*810390e3Srobert    set(COMPILER_RT_CXX_LINK_LIBS "$<TARGET_LINKER_FILE:$<IF:$<TARGET_EXISTS:cxx_shared>,cxx_shared,cxx_static>>")
610*810390e3Srobert  endif()
611*810390e3Srobertelseif (COMPILER_RT_CXX_LIBRARY STREQUAL "none")
612*810390e3Srobert  # We aren't using any C++ standard library so avoid including the default one.
613*810390e3Srobert  append_list_if(COMPILER_RT_HAS_NOSTDINCXX_FLAG -nostdinc++ COMPILER_RT_COMMON_CFLAGS)
614*810390e3Srobert  append_list_if(COMPILER_RT_HAS_NOSTDLIBXX_FLAG -nostdlib++ COMPILER_RT_COMMON_LINK_FLAGS)
615*810390e3Srobertelse()
616*810390e3Srobert  # Nothing to be done for `default`.
617*810390e3Srobertendif()
618*810390e3Srobert
619*810390e3Srobertif (SANITIZER_CXX_ABI_LIBNAME STREQUAL "libc++")
620*810390e3Srobert  if (SANITIZER_CXX_ABI_INTREE)
621*810390e3Srobert    # TODO: We don't need to add --unwindlib=none to SANITIZER_COMMON_LINK_FLAGS
622*810390e3Srobert    # because we added -nodefaultlibs there earlier, and adding would result in
623*810390e3Srobert    # a warning, but if we switch to -nostdlib++, we would need to add it here.
624*810390e3Srobert    # append_list_if(CXX_SUPPORTS_UNWINDLIB_NONE_FLAG --unwindlib=none SANITIZER_COMMON_LINK_FLAGS)
625*810390e3Srobert    if(SANITIZER_USE_STATIC_CXX_ABI)
626*810390e3Srobert      if(TARGET libcxx-abi-static)
627*810390e3Srobert        set(SANITIZER_CXX_ABI_LIBRARIES libcxx-abi-static)
628*810390e3Srobert      endif()
629*810390e3Srobert    else()
630*810390e3Srobert      if(TARGET libcxx-abi-shared)
631*810390e3Srobert        set(SANITIZER_CXX_ABI_LIBRARIES libcxx-abi-shared)
632*810390e3Srobert      elseif(TARGET libcxx-abi-static)
633*810390e3Srobert        set(SANITIZER_CXX_ABI_LIBRARIES libcxx-abi-static)
634*810390e3Srobert      endif()
635*810390e3Srobert    endif()
636*810390e3Srobert  else()
637*810390e3Srobert    append_list_if(COMPILER_RT_HAS_LIBCXX c++ SANITIZER_CXX_ABI_LIBRARIES)
638*810390e3Srobert  endif()
639*810390e3Srobertelseif (SANITIZER_CXX_ABI_LIBNAME STREQUAL "libcxxabi")
640*810390e3Srobert  list(APPEND SANITIZER_CXX_ABI_LIBRARIES "c++abi")
641*810390e3Srobertelseif (SANITIZER_CXX_ABI_LIBNAME STREQUAL "libstdc++")
642*810390e3Srobert  append_list_if(COMPILER_RT_HAS_LIBSTDCXX stdc++ SANITIZER_CXX_ABI_LIBRARIES)
643*810390e3Srobertendif()
644*810390e3Srobert
645*810390e3Srobertif (SANITIZER_TEST_CXX_LIBNAME STREQUAL "libc++")
646*810390e3Srobert  if (SANITIZER_TEST_CXX_INTREE)
647*810390e3Srobert    list(APPEND SANITIZER_TEST_CXX_CFLAGS "$<$<TARGET_EXISTS:cxx-headers>:$<IF:$<BOOL:${MSVC}>,/imsvc,-isystem>$<JOIN:$<TARGET_PROPERTY:cxx-headers,INTERFACE_INCLUDE_DIRECTORIES>,$<SEMICOLON>$<IF:$<BOOL:${MSVC}>,/imsvc,-isystem>>>")
648*810390e3Srobert    if (SANITIZER_USE_STATIC_TEST_CXX)
649*810390e3Srobert      list(APPEND SANITIZER_TEST_CXX_LIBRARIES "$<TARGET_LINKER_FILE:cxx_static>")
650*810390e3Srobert    else()
651*810390e3Srobert      list(APPEND SANITIZER_TEST_CXX_LIBRARIES "$<TARGET_LINKER_FILE:$<IF:$<TARGET_EXISTS:cxx_shared>,cxx_shared,cxx_static>>")
652*810390e3Srobert    endif()
653*810390e3Srobert    # We are using the in tree libc++ so avoid including the default one.
654*810390e3Srobert    append_list_if(COMPILER_RT_HAS_NOSTDINCXX_FLAG -nostdinc++ COMPILER_RT_UNITTEST_CFLAGS)
655*810390e3Srobert    append_list_if(COMPILER_RT_HAS_NOSTDLIBXX_FLAG -nostdlib++ COMPILER_RT_UNITTEST_LINK_FLAGS)
656*810390e3Srobert  else()
657*810390e3Srobert    append_list_if(COMPILER_RT_HAS_LIBCXX -lc++ SANITIZER_TEST_CXX_LIBRARIES)
658*810390e3Srobert  endif()
659*810390e3Srobertelseif (SANITIZER_TEST_CXX_LIBNAME STREQUAL "libstdc++")
660*810390e3Srobert  append_list_if(COMPILER_RT_HAS_LIBSTDCXX -lstdc++ SANITIZER_TEST_CXX_LIBRARIES)
661*810390e3Srobertendif()
662*810390e3Srobert
663d89ec533Spatrick# Unittests support.
664*810390e3Srobert# FIXME: When compiler-rt is build using -DLLVM_BUILD_EXTERNAL_COMPILER_RT=ON, then
665*810390e3Srobert# The LLVM_THIRD_PARTY_DIR variable is not set.
666*810390e3Srobertif (NOT LLVM_THIRD_PARTY_DIR)
667*810390e3Srobert  set(LLVM_THIRD_PARTY_DIR "${CMAKE_CURRENT_SOURCE_DIR}/../third-party")
668*810390e3Srobertendif()
669*810390e3Srobert
670*810390e3Srobertset(COMPILER_RT_GTEST_PATH ${LLVM_THIRD_PARTY_DIR}/unittest/googletest)
671d89ec533Spatrickset(COMPILER_RT_GTEST_SOURCE ${COMPILER_RT_GTEST_PATH}/src/gtest-all.cc)
672d89ec533Spatrickset(COMPILER_RT_GTEST_CFLAGS
673d89ec533Spatrick  -DGTEST_NO_LLVM_SUPPORT=1
674d89ec533Spatrick  -DGTEST_HAS_RTTI=0
675d89ec533Spatrick  -I${COMPILER_RT_GTEST_PATH}/include
676d89ec533Spatrick  -I${COMPILER_RT_GTEST_PATH}
677d89ec533Spatrick)
678d89ec533Spatrick
679d89ec533Spatrick# Mocking support.
680*810390e3Srobertset(COMPILER_RT_GMOCK_PATH ${LLVM_THIRD_PARTY_DIR}/unittest/googlemock)
681d89ec533Spatrickset(COMPILER_RT_GMOCK_SOURCE ${COMPILER_RT_GMOCK_PATH}/src/gmock-all.cc)
682d89ec533Spatrickset(COMPILER_RT_GMOCK_CFLAGS
683d89ec533Spatrick  -DGTEST_NO_LLVM_SUPPORT=1
684d89ec533Spatrick  -DGTEST_HAS_RTTI=0
685d89ec533Spatrick  -I${COMPILER_RT_GMOCK_PATH}/include
686d89ec533Spatrick  -I${COMPILER_RT_GMOCK_PATH}
687d89ec533Spatrick)
688d89ec533Spatrick
689*810390e3Srobertif(COMPILER_RT_HAS_G_FLAG)
690*810390e3Srobert  list(APPEND COMPILER_RT_UNITTEST_CFLAGS -g)
691*810390e3Srobertendif()
692d89ec533Spatrickappend_list_if(COMPILER_RT_DEBUG -DSANITIZER_DEBUG=1 COMPILER_RT_UNITTEST_CFLAGS)
693d89ec533Spatrickappend_list_if(COMPILER_RT_HAS_WCOVERED_SWITCH_DEFAULT_FLAG -Wno-covered-switch-default COMPILER_RT_UNITTEST_CFLAGS)
694d89ec533Spatrickappend_list_if(COMPILER_RT_HAS_WSUGGEST_OVERRIDE_FLAG -Wno-suggest-override COMPILER_RT_UNITTEST_CFLAGS)
695d89ec533Spatrick
696d89ec533Spatrickif(MSVC)
697d89ec533Spatrick  # gtest use a lot of stuff marked as deprecated on Windows.
698d89ec533Spatrick  list(APPEND COMPILER_RT_GTEST_CFLAGS -Wno-deprecated-declarations)
699d89ec533Spatrickendif()
700d89ec533Spatrick
7013cab2bb3Spatrick# Warnings to turn off for all libraries, not just sanitizers.
7023cab2bb3Spatrickappend_string_if(COMPILER_RT_HAS_WUNUSED_PARAMETER_FLAG -Wno-unused-parameter CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
7033cab2bb3Spatrick
7043cab2bb3Spatrickif (CMAKE_LINKER MATCHES "link.exe$")
7053cab2bb3Spatrick  # Silence MSVC linker warnings caused by empty object files. The
7063cab2bb3Spatrick  # sanitizer libraries intentionally use ifdefs that result in empty
7073cab2bb3Spatrick  # files, rather than skipping these files in the build system.
7083cab2bb3Spatrick  # Ideally, we would pass this flag only for the libraries that need
7093cab2bb3Spatrick  # it, but CMake doesn't seem to have a way to set linker flags for
7103cab2bb3Spatrick  # individual static libraries, so we enable the suppression flag for
7113cab2bb3Spatrick  # the whole compiler-rt project.
7123cab2bb3Spatrick  set(CMAKE_STATIC_LINKER_FLAGS "${CMAKE_STATIC_LINKER_FLAGS} /IGNORE:4221")
7133cab2bb3Spatrickendif()
7143cab2bb3Spatrick
7153cab2bb3Spatrickadd_subdirectory(include)
7163cab2bb3Spatrick
7173cab2bb3Spatrickoption(COMPILER_RT_USE_LIBCXX
7183cab2bb3Spatrick  "Enable compiler-rt to use libc++ from the source tree" ON)
7193cab2bb3Spatrickif(COMPILER_RT_USE_LIBCXX)
7203cab2bb3Spatrick  if(LLVM_ENABLE_PROJECTS_USED)
7213cab2bb3Spatrick    # Don't use libcxx if LLVM_ENABLE_PROJECTS does not enable it.
7223cab2bb3Spatrick    set(COMPILER_RT_LIBCXX_PATH ${LLVM_EXTERNAL_LIBCXX_SOURCE_DIR})
7233cab2bb3Spatrick    set(COMPILER_RT_LIBCXXABI_PATH ${LLVM_EXTERNAL_LIBCXXABI_SOURCE_DIR})
7243cab2bb3Spatrick  else()
7253cab2bb3Spatrick    foreach(path IN ITEMS ${LLVM_MAIN_SRC_DIR}/projects/libcxx
7263cab2bb3Spatrick                          ${LLVM_MAIN_SRC_DIR}/runtimes/libcxx
7273cab2bb3Spatrick                          ${LLVM_MAIN_SRC_DIR}/../libcxx
7283cab2bb3Spatrick                          ${LLVM_EXTERNAL_LIBCXX_SOURCE_DIR})
7293cab2bb3Spatrick      if(IS_DIRECTORY ${path})
7303cab2bb3Spatrick        set(COMPILER_RT_LIBCXX_PATH ${path})
7313cab2bb3Spatrick        break()
7323cab2bb3Spatrick      endif()
7333cab2bb3Spatrick    endforeach()
7343cab2bb3Spatrick    foreach(path IN ITEMS ${LLVM_MAIN_SRC_DIR}/projects/libcxxabi
7353cab2bb3Spatrick                          ${LLVM_MAIN_SRC_DIR}/runtimes/libcxxabi
7363cab2bb3Spatrick                          ${LLVM_MAIN_SRC_DIR}/../libcxxabi
7373cab2bb3Spatrick                          ${LLVM_EXTERNAL_LIBCXXABI_SOURCE_DIR})
7383cab2bb3Spatrick      if(IS_DIRECTORY ${path})
7393cab2bb3Spatrick        set(COMPILER_RT_LIBCXXABI_PATH ${path})
7403cab2bb3Spatrick        break()
7413cab2bb3Spatrick      endif()
7423cab2bb3Spatrick    endforeach()
7433cab2bb3Spatrick  endif()
7443cab2bb3Spatrickendif()
7453cab2bb3Spatrick
7463cab2bb3Spatrickset(COMPILER_RT_LLD_PATH ${LLVM_MAIN_SRC_DIR}/tools/lld)
7473cab2bb3Spatrickif(EXISTS ${COMPILER_RT_LLD_PATH}/ AND LLVM_TOOL_LLD_BUILD)
7483cab2bb3Spatrick  set(COMPILER_RT_HAS_LLD TRUE)
7493cab2bb3Spatrickelse()
7503cab2bb3Spatrick  set(COMPILER_RT_LLD_PATH ${LLVM_MAIN_SRC_DIR}/../lld)
7513cab2bb3Spatrick  if(EXISTS ${COMPILER_RT_LLD_PATH}/ AND LLVM_TOOL_LLD_BUILD)
7523cab2bb3Spatrick    set(COMPILER_RT_HAS_LLD TRUE)
7533cab2bb3Spatrick  endif()
7543cab2bb3Spatrickendif()
755d89ec533Spatrick
756d89ec533Spatrickif(ANDROID)
757d89ec533Spatrick  set(COMPILER_RT_HAS_LLD TRUE)
758d89ec533Spatrick  set(COMPILER_RT_TEST_USE_LLD TRUE)
759d89ec533Spatrick  append_list_if(COMPILER_RT_HAS_FUSE_LD_LLD_FLAG -fuse-ld=lld SANITIZER_COMMON_LINK_FLAGS)
760d89ec533Spatrick  append_list_if(COMPILER_RT_HAS_LLD -fuse-ld=lld COMPILER_RT_UNITTEST_LINK_FLAGS)
761d89ec533Spatrickendif()
7623cab2bb3Spatrickpythonize_bool(COMPILER_RT_HAS_LLD)
763d89ec533Spatrickpythonize_bool(COMPILER_RT_TEST_USE_LLD)
7643cab2bb3Spatrick
7653cab2bb3Spatrickadd_subdirectory(lib)
7663cab2bb3Spatrick
7673cab2bb3Spatrickif(COMPILER_RT_INCLUDE_TESTS)
7683cab2bb3Spatrick  add_subdirectory(unittests)
7693cab2bb3Spatrick  add_subdirectory(test)
770d89ec533Spatrick  # Don't build llvm-lit for runtimes-build, it will clean up map_config.
771d89ec533Spatrick  if (COMPILER_RT_STANDALONE_BUILD AND NOT LLVM_RUNTIMES_BUILD)
7723cab2bb3Spatrick    # If we have a valid source tree, generate llvm-lit into the bin directory.
7733cab2bb3Spatrick    # The user can still choose to have the check targets *use* a different lit
7743cab2bb3Spatrick    # by specifying -DLLVM_EXTERNAL_LIT, but we generate it regardless.
7753cab2bb3Spatrick    if (EXISTS ${LLVM_MAIN_SRC_DIR}/utils/llvm-lit)
7761f9cb04fSpatrick      # Needed for lit support in standalone builds.
7771f9cb04fSpatrick      include(AddLLVM)
7783cab2bb3Spatrick      add_subdirectory(${LLVM_MAIN_SRC_DIR}/utils/llvm-lit ${CMAKE_CURRENT_BINARY_DIR}/llvm-lit)
7793cab2bb3Spatrick    elseif(NOT EXISTS ${LLVM_EXTERNAL_LIT})
7803cab2bb3Spatrick      message(WARNING "Could not find LLVM source directory and LLVM_EXTERNAL_LIT does not"
7813cab2bb3Spatrick                       "point to a valid file.  You will not be able to run tests.")
7823cab2bb3Spatrick    endif()
7833cab2bb3Spatrick  endif()
7843cab2bb3Spatrickendif()
7853cab2bb3Spatrick
7863cab2bb3Spatrickadd_subdirectory(tools)
787