2011-11-05 03:04:35 +08:00
|
|
|
# This CMake module is responsible for interpreting the user defined LLVM_
|
|
|
|
# options and executing the appropriate CMake commands to realize the users'
|
|
|
|
# selections.
|
|
|
|
|
2014-11-15 15:45:31 +08:00
|
|
|
# This is commonly needed so make sure it's defined before we include anything
|
|
|
|
# else.
|
|
|
|
string(TOUPPER "${CMAKE_BUILD_TYPE}" uppercase_CMAKE_BUILD_TYPE)
|
|
|
|
|
2016-03-03 00:42:56 +08:00
|
|
|
include(CheckCompilerVersion)
|
2014-02-05 08:02:37 +08:00
|
|
|
include(HandleLLVMStdlib)
|
2012-11-26 10:02:08 +08:00
|
|
|
include(CheckCCompilerFlag)
|
2013-03-02 09:00:40 +08:00
|
|
|
include(CheckCXXCompilerFlag)
|
2019-02-20 06:02:38 +08:00
|
|
|
include(CheckSymbolExists)
|
2020-05-09 01:45:44 +08:00
|
|
|
include(CMakeDependentOption)
|
[cmake] Don't build with -O3 -fPIC on Solaris/sparcv9
Tests on Solaris/sparcv9 currently show about 250 failures when building
with gcc, most of them like the following:
FAIL: LLVM-Unit :: Support/./SupportTests/TaskQueueTest.UnOrderedFutures (4269 of 67884)
******************** TEST 'LLVM-Unit :: Support/./SupportTests/TaskQueueTest.UnOrderedFutures' FAILED ********************
Note: Google Test filter = TaskQueueTest.UnOrderedFutures
[==========] Running 1 test from 1 test case.
[----------] Global test environment set-up.
[----------] 1 test from TaskQueueTest
[ RUN ] TaskQueueTest.UnOrderedFutures
0 SupportTests 0x0000000100753b20 llvm::sys::PrintStackTrace(llvm::raw_ostream&) + 32
1 SupportTests 0x0000000100752974 llvm::sys::RunSignalHandlers() + 68
2 SupportTests 0x0000000100752b18 SignalHandler(int) + 372
3 libc.so.1 0xffffffff7eedc800 __sighndlr + 12
4 libc.so.1 0xffffffff7eecf23c call_user_handler + 852
5 libc.so.1 0xffffffff7eecf594 sigacthandler + 84
6 SupportTests 0x00000001006f8cb8 std::thread::_State_impl<std::thread::_Invoker<std::tuple<llvm::ThreadPool::ThreadPool(llvm::ThreadPoolStrategy)::'lambda'()> > >::_M_run() + 512
7 libstdc++.so.6.0.28 0xfffffffc628117cc execute_native_thread_routine + 16
8 libc.so.1 0xffffffff7eedc6a0 _lwp_start + 0
Since it's effectively impossible to debug such a `SEGV` in a `Release`
build, I tried a `Debug` build instead, only to find that the failures had
gone away.
Further investigation revealed that most of the issue centers around
`llvm/lib/Support/ThreadPool.cpp`. That file is built with `-O3 -fPIC` in
a `Release` build. The failure vanishes if
- compiling without `-fPIC`
- compiling with `-O -fPIC`
- linking with GNU `ld` instead of Solaris `ld`
It has meanwhile been determined that `gcc` doesn't correctly heed some TLS
code sequences. To make things worse, Solaris `ld` doesn't properly
validate its assumptions against the input, generating wrong code.
`gld` like `gcc` is more liberal here and correctly deals with the code it
gets fed from `gcc`.
There's PR target/96607: GCC feeds SPARC/Solaris linker with unrecognized
TLS sequences <https://gcc.gnu.org/bugzilla/show_bug.cgi?id=96607> now.
An attempt to build with `-DLLVM_ENABLE_PIC=Off` initially failed since
neither `libRemarks.so` (D85626 <https://reviews.llvm.org/D85626>) nor
`LLVMPolly.so` (D85627 <https://reviews.llvm.org/D85627>) heed that option.
Even with that fixed, a few codegen failures remain.
Next I tried to build just `ThreadPool.cpp` with `-O -fPIC`. While that
fixed the vast majority of the failures, 16 `LLVM :: CodeGen/X86` failures
remained.
Given that that solution was both incomplete and fragile, I went for
building the whole tree with `-O -fPIC` for `Release` and `RelWithDebInfo`
builds.
As detailed in Bug 47304, 2-stage builds also show large numbers of
failures when building with `-O3` or `-O2`, which are likewise worked
around by building with `-O` until they are sufficiently analyzed and
fixed.
This way, all failures relative to a `Debug` build go away.
Tested on `sparcv9-sun-solaris2.11`.
Differential Revision: https://reviews.llvm.org/D85630
2020-08-28 17:40:34 +08:00
|
|
|
include(LLVMProcessSources)
|
2011-02-04 04:57:36 +08:00
|
|
|
|
2020-05-25 15:28:17 +08:00
|
|
|
if(CMAKE_LINKER MATCHES "lld-link" OR (MSVC AND (LLVM_USE_LINKER STREQUAL "lld" OR LLVM_ENABLE_LLD)))
|
2017-03-02 03:22:18 +08:00
|
|
|
set(LINKER_IS_LLD_LINK TRUE)
|
|
|
|
else()
|
|
|
|
set(LINKER_IS_LLD_LINK FALSE)
|
|
|
|
endif()
|
|
|
|
|
2017-04-29 04:17:15 +08:00
|
|
|
set(LLVM_ENABLE_LTO OFF CACHE STRING "Build LLVM with LTO. May be specified as Thin or Full to use a particular kind of LTO")
|
|
|
|
string(TOUPPER "${LLVM_ENABLE_LTO}" uppercase_LLVM_ENABLE_LTO)
|
|
|
|
|
2017-02-08 03:06:22 +08:00
|
|
|
# Ninja Job Pool support
|
|
|
|
# The following only works with the Ninja generator in CMake >= 3.0.
|
|
|
|
set(LLVM_PARALLEL_COMPILE_JOBS "" CACHE STRING
|
2018-10-11 05:36:12 +08:00
|
|
|
"Define the maximum number of concurrent compilation jobs (Ninja only).")
|
2017-02-08 03:06:22 +08:00
|
|
|
if(LLVM_PARALLEL_COMPILE_JOBS)
|
2020-07-08 18:42:39 +08:00
|
|
|
if(NOT CMAKE_GENERATOR STREQUAL "Ninja")
|
2017-02-08 03:06:22 +08:00
|
|
|
message(WARNING "Job pooling is only available with Ninja generators.")
|
|
|
|
else()
|
|
|
|
set_property(GLOBAL APPEND PROPERTY JOB_POOLS compile_job_pool=${LLVM_PARALLEL_COMPILE_JOBS})
|
|
|
|
set(CMAKE_JOB_POOL_COMPILE compile_job_pool)
|
|
|
|
endif()
|
|
|
|
endif()
|
|
|
|
|
|
|
|
set(LLVM_PARALLEL_LINK_JOBS "" CACHE STRING
|
2018-10-11 05:36:12 +08:00
|
|
|
"Define the maximum number of concurrent link jobs (Ninja only).")
|
2020-07-08 18:42:39 +08:00
|
|
|
if(CMAKE_GENERATOR STREQUAL "Ninja")
|
2017-04-29 04:17:15 +08:00
|
|
|
if(NOT LLVM_PARALLEL_LINK_JOBS AND uppercase_LLVM_ENABLE_LTO STREQUAL "THIN")
|
|
|
|
message(STATUS "ThinLTO provides its own parallel linking - limiting parallel link jobs to 2.")
|
|
|
|
set(LLVM_PARALLEL_LINK_JOBS "2")
|
|
|
|
endif()
|
|
|
|
if(LLVM_PARALLEL_LINK_JOBS)
|
2017-02-08 03:06:22 +08:00
|
|
|
set_property(GLOBAL APPEND PROPERTY JOB_POOLS link_job_pool=${LLVM_PARALLEL_LINK_JOBS})
|
|
|
|
set(CMAKE_JOB_POOL_LINK link_job_pool)
|
|
|
|
endif()
|
2017-04-29 04:17:15 +08:00
|
|
|
elseif(LLVM_PARALLEL_LINK_JOBS)
|
|
|
|
message(WARNING "Job pooling is only available with Ninja generators.")
|
2017-02-08 03:06:22 +08:00
|
|
|
endif()
|
|
|
|
|
2011-02-04 04:57:36 +08:00
|
|
|
if( LLVM_ENABLE_ASSERTIONS )
|
|
|
|
# MSVC doesn't like _DEBUG on release builds. See PR 4379.
|
|
|
|
if( NOT MSVC )
|
|
|
|
add_definitions( -D_DEBUG )
|
|
|
|
endif()
|
2013-07-17 17:34:51 +08:00
|
|
|
# On non-Debug builds cmake automatically defines NDEBUG, so we
|
2011-02-04 04:57:36 +08:00
|
|
|
# explicitly undefine it:
|
2013-07-17 17:34:51 +08:00
|
|
|
if( NOT uppercase_CMAKE_BUILD_TYPE STREQUAL "DEBUG" )
|
2020-02-03 02:49:03 +08:00
|
|
|
# NOTE: use `add_compile_options` rather than `add_definitions` since
|
|
|
|
# `add_definitions` does not support generator expressions.
|
2020-02-03 08:18:00 +08:00
|
|
|
add_compile_options($<$<OR:$<COMPILE_LANGUAGE:C>,$<COMPILE_LANGUAGE:CXX>>:-UNDEBUG>)
|
2020-02-03 02:49:03 +08:00
|
|
|
|
2013-04-07 09:45:01 +08:00
|
|
|
# Also remove /D NDEBUG to avoid MSVC warnings about conflicting defines.
|
2014-05-20 05:13:41 +08:00
|
|
|
foreach (flags_var_to_scrub
|
|
|
|
CMAKE_CXX_FLAGS_RELEASE
|
|
|
|
CMAKE_CXX_FLAGS_RELWITHDEBINFO
|
|
|
|
CMAKE_CXX_FLAGS_MINSIZEREL
|
|
|
|
CMAKE_C_FLAGS_RELEASE
|
|
|
|
CMAKE_C_FLAGS_RELWITHDEBINFO
|
|
|
|
CMAKE_C_FLAGS_MINSIZEREL)
|
|
|
|
string (REGEX REPLACE "(^| )[/-]D *NDEBUG($| )" " "
|
|
|
|
"${flags_var_to_scrub}" "${${flags_var_to_scrub}}")
|
|
|
|
endforeach()
|
2011-02-04 04:57:36 +08:00
|
|
|
endif()
|
|
|
|
endif()
|
|
|
|
|
2016-04-29 23:22:48 +08:00
|
|
|
if(LLVM_ENABLE_EXPENSIVE_CHECKS)
|
|
|
|
add_definitions(-DEXPENSIVE_CHECKS)
|
2020-02-27 02:47:14 +08:00
|
|
|
|
|
|
|
# In some libstdc++ versions, std::min_element is not constexpr when
|
|
|
|
# _GLIBCXX_DEBUG is enabled.
|
|
|
|
CHECK_CXX_SOURCE_COMPILES("
|
|
|
|
#define _GLIBCXX_DEBUG
|
|
|
|
#include <algorithm>
|
|
|
|
int main(int argc, char** argv) {
|
|
|
|
static constexpr int data[] = {0, 1};
|
|
|
|
constexpr const int* min_elt = std::min_element(&data[0], &data[2]);
|
|
|
|
return 0;
|
|
|
|
}" CXX_SUPPORTS_GLIBCXX_DEBUG)
|
|
|
|
if(CXX_SUPPORTS_GLIBCXX_DEBUG)
|
|
|
|
add_definitions(-D_GLIBCXX_DEBUG)
|
|
|
|
else()
|
|
|
|
add_definitions(-D_GLIBCXX_ASSERTIONS)
|
|
|
|
endif()
|
2016-04-29 23:22:48 +08:00
|
|
|
endif()
|
2020-03-13 17:13:34 +08:00
|
|
|
|
[ValueTypes] Add EVT::isFixedLengthVector
Summary:
Related to D75672, this patch adds EVT::isFixedLengthVector to determine
if the underlying vector type is of fixed length.
An assert is introduced in EVT::getVectorNumElements that triggers for
types that aren't fixed length. This is currently guarded by a flag
added D75297 that is off by default and has been renamed to the more
generic ENABLE_STRICT_FIXED_SIZE_VECTORS.
Ideally we want to get rid of getVectorNumElements but a quick grep
shows there are >350 uses in lib/CodeGen and 75 in lib/Target/AArch64
alone. All of these probably aren't EVT::getVectorNumElements (some may
be the MVT equivalent), but there are many places to fixup and having
the assert on by default would make the SVE upstreaming effort
difficult.
Reviewers: sdesmalen, efriedma, ctetreau, huntergr, rengolin
Reviewed By: efriedma
Subscribers: mgorny, kristof.beyls, hiraditya, danielkiss, llvm-commits
Tags: #llvm
Differential Revision: https://reviews.llvm.org/D76376
2020-03-19 00:51:45 +08:00
|
|
|
if (LLVM_ENABLE_STRICT_FIXED_SIZE_VECTORS)
|
|
|
|
add_definitions(-DSTRICT_FIXED_SIZE_VECTORS)
|
2020-03-13 17:13:34 +08:00
|
|
|
endif()
|
2016-04-29 23:22:48 +08:00
|
|
|
|
2015-03-27 03:25:01 +08:00
|
|
|
string(TOUPPER "${LLVM_ABI_BREAKING_CHECKS}" uppercase_LLVM_ABI_BREAKING_CHECKS)
|
|
|
|
|
|
|
|
if( uppercase_LLVM_ABI_BREAKING_CHECKS STREQUAL "WITH_ASSERTS" )
|
|
|
|
if( LLVM_ENABLE_ASSERTIONS )
|
|
|
|
set( LLVM_ENABLE_ABI_BREAKING_CHECKS 1 )
|
|
|
|
endif()
|
|
|
|
elseif( uppercase_LLVM_ABI_BREAKING_CHECKS STREQUAL "FORCE_ON" )
|
|
|
|
set( LLVM_ENABLE_ABI_BREAKING_CHECKS 1 )
|
|
|
|
elseif( uppercase_LLVM_ABI_BREAKING_CHECKS STREQUAL "FORCE_OFF" )
|
|
|
|
# We don't need to do anything special to turn off ABI breaking checks.
|
2015-05-13 06:49:18 +08:00
|
|
|
elseif( NOT DEFINED LLVM_ABI_BREAKING_CHECKS )
|
|
|
|
# Treat LLVM_ABI_BREAKING_CHECKS like "FORCE_OFF" when it has not been
|
|
|
|
# defined.
|
2015-03-27 03:25:01 +08:00
|
|
|
else()
|
|
|
|
message(FATAL_ERROR "Unknown value for LLVM_ABI_BREAKING_CHECKS: \"${LLVM_ABI_BREAKING_CHECKS}\"!")
|
|
|
|
endif()
|
|
|
|
|
[cmake] Enable reverse iteration by default through build macro
Summary:
Reverse iteration can be turned on, by default, by setting -DLLVM_REVERSE_ITERATION:BOOL=ON during cmake.
With this enabled, we can uncover lots of cases of non-determinism in codegen by simply running our tests (without any other change).
We can then setup a buildbot which will have this turned on by default. Initially, a lot of unit tests will fail in this configuration.
Once we start fixing non-determinism issues, we can gradually make this a blocker for patches.
Reviewers: davide, dblaikie, mehdi_amini, dberlin
Reviewed By: dblaikie
Subscribers: probinson, mgorny, llvm-commits
Differential Revision: https://reviews.llvm.org/D33908
llvm-svn: 304757
2017-06-06 08:36:09 +08:00
|
|
|
if( LLVM_REVERSE_ITERATION )
|
|
|
|
set( LLVM_ENABLE_REVERSE_ITERATION 1 )
|
|
|
|
endif()
|
|
|
|
|
2011-02-04 04:57:36 +08:00
|
|
|
if(WIN32)
|
2013-12-29 07:31:44 +08:00
|
|
|
set(LLVM_HAVE_LINK_VERSION_SCRIPT 0)
|
2011-02-04 04:57:36 +08:00
|
|
|
if(CYGWIN)
|
|
|
|
set(LLVM_ON_WIN32 0)
|
|
|
|
set(LLVM_ON_UNIX 1)
|
|
|
|
else(CYGWIN)
|
|
|
|
set(LLVM_ON_WIN32 1)
|
|
|
|
set(LLVM_ON_UNIX 0)
|
|
|
|
endif(CYGWIN)
|
|
|
|
else(WIN32)
|
2018-05-03 09:38:49 +08:00
|
|
|
if(FUCHSIA OR UNIX)
|
2011-02-04 04:57:36 +08:00
|
|
|
set(LLVM_ON_WIN32 0)
|
|
|
|
set(LLVM_ON_UNIX 1)
|
2016-07-20 06:46:39 +08:00
|
|
|
if(APPLE OR ${CMAKE_SYSTEM_NAME} MATCHES "AIX")
|
2013-12-29 07:31:44 +08:00
|
|
|
set(LLVM_HAVE_LINK_VERSION_SCRIPT 0)
|
2016-07-20 06:46:39 +08:00
|
|
|
else()
|
2013-12-29 07:31:44 +08:00
|
|
|
set(LLVM_HAVE_LINK_VERSION_SCRIPT 1)
|
2016-07-20 06:46:39 +08:00
|
|
|
endif()
|
2018-05-03 09:38:49 +08:00
|
|
|
else(FUCHSIA OR UNIX)
|
2011-02-04 04:57:36 +08:00
|
|
|
MESSAGE(SEND_ERROR "Unable to determine platform")
|
2018-05-03 09:38:49 +08:00
|
|
|
endif(FUCHSIA OR UNIX)
|
2011-02-04 04:57:36 +08:00
|
|
|
endif(WIN32)
|
|
|
|
|
2020-07-09 20:17:33 +08:00
|
|
|
if (CMAKE_SYSTEM_NAME MATCHES "OS390")
|
|
|
|
set(LLVM_HAVE_LINK_VERSION_SCRIPT 0)
|
|
|
|
endif()
|
|
|
|
|
2014-01-08 19:10:24 +08:00
|
|
|
set(EXEEXT ${CMAKE_EXECUTABLE_SUFFIX})
|
|
|
|
set(LTDL_SHLIB_EXT ${CMAKE_SHARED_LIBRARY_SUFFIX})
|
2014-02-13 19:19:00 +08:00
|
|
|
|
|
|
|
# We use *.dylib rather than *.so on darwin.
|
|
|
|
set(LLVM_PLUGIN_EXT ${CMAKE_SHARED_LIBRARY_SUFFIX})
|
2014-01-08 19:10:24 +08:00
|
|
|
|
2014-02-13 19:19:11 +08:00
|
|
|
if(APPLE)
|
2016-11-18 04:22:49 +08:00
|
|
|
if(LLVM_ENABLE_LLD AND LLVM_ENABLE_LTO)
|
|
|
|
message(FATAL_ERROR "lld does not support LTO on Darwin")
|
|
|
|
endif()
|
2014-02-13 19:19:11 +08:00
|
|
|
# Darwin-specific linker flags for loadable modules.
|
|
|
|
set(CMAKE_MODULE_LINKER_FLAGS "${CMAKE_MODULE_LINKER_FLAGS} -Wl,-flat_namespace -Wl,-undefined -Wl,suppress")
|
|
|
|
endif()
|
|
|
|
|
2019-11-22 13:06:33 +08:00
|
|
|
if(${CMAKE_SYSTEM_NAME} MATCHES "Linux")
|
|
|
|
# RHEL7 has ar and ranlib being non-deterministic by default. The D flag forces determinism,
|
2020-02-20 18:22:35 +08:00
|
|
|
# however only GNU version of ar and ranlib (2.27) have this option.
|
2019-11-22 13:06:33 +08:00
|
|
|
# RHEL DTS7 is also affected by this, which uses GNU binutils 2.28
|
|
|
|
execute_process(COMMAND ${CMAKE_AR} rD t.a
|
2020-02-20 18:22:35 +08:00
|
|
|
WORKING_DIRECTORY ${CMAKE_BINARY_DIR}
|
|
|
|
RESULT_VARIABLE AR_RESULT
|
|
|
|
OUTPUT_QUIET
|
|
|
|
ERROR_QUIET
|
|
|
|
)
|
2019-11-22 13:06:33 +08:00
|
|
|
if(${AR_RESULT} EQUAL 0)
|
|
|
|
execute_process(COMMAND ${CMAKE_RANLIB} -D t.a
|
2020-02-20 18:22:35 +08:00
|
|
|
WORKING_DIRECTORY ${CMAKE_BINARY_DIR}
|
|
|
|
RESULT_VARIABLE RANLIB_RESULT
|
|
|
|
OUTPUT_QUIET
|
|
|
|
ERROR_QUIET
|
|
|
|
)
|
2019-11-22 13:06:33 +08:00
|
|
|
if(${RANLIB_RESULT} EQUAL 0)
|
|
|
|
set(CMAKE_C_ARCHIVE_CREATE "<CMAKE_AR> Dqc <TARGET> <LINK_FLAGS> <OBJECTS>")
|
|
|
|
set(CMAKE_C_ARCHIVE_APPEND "<CMAKE_AR> Dq <TARGET> <LINK_FLAGS> <OBJECTS>")
|
|
|
|
set(CMAKE_C_ARCHIVE_FINISH "<CMAKE_RANLIB> -D <TARGET>")
|
|
|
|
|
|
|
|
set(CMAKE_CXX_ARCHIVE_CREATE "<CMAKE_AR> Dqc <TARGET> <LINK_FLAGS> <OBJECTS>")
|
|
|
|
set(CMAKE_CXX_ARCHIVE_APPEND "<CMAKE_AR> Dq <TARGET> <LINK_FLAGS> <OBJECTS>")
|
|
|
|
set(CMAKE_CXX_ARCHIVE_FINISH "<CMAKE_RANLIB> -D <TARGET>")
|
|
|
|
endif()
|
|
|
|
file(REMOVE ${CMAKE_BINARY_DIR}/t.a)
|
|
|
|
endif()
|
|
|
|
endif()
|
|
|
|
|
2019-03-14 05:50:25 +08:00
|
|
|
if(${CMAKE_SYSTEM_NAME} MATCHES "AIX")
|
|
|
|
# -fPIC does not enable the large code model for GCC on AIX but does for XL.
|
|
|
|
if(CMAKE_CXX_COMPILER_ID STREQUAL "GNU")
|
|
|
|
append("-mcmodel=large" CMAKE_CXX_FLAGS CMAKE_C_FLAGS)
|
|
|
|
elseif(CMAKE_CXX_COMPILER_ID MATCHES "XL")
|
|
|
|
# XL generates a small number of relocations not of the large model, -bbigtoc is needed.
|
|
|
|
append("-Wl,-bbigtoc"
|
|
|
|
CMAKE_EXE_LINKER_FLAGS CMAKE_MODULE_LINKER_FLAGS CMAKE_SHARED_LINKER_FLAGS)
|
2020-05-16 05:15:04 +08:00
|
|
|
# The default behaviour on AIX processes dynamic initialization of non-local variables with
|
|
|
|
# static storage duration even for archive members that are otherwise unreferenced.
|
|
|
|
# Since `--whole-archive` is not used by the LLVM build to keep such initializations for Linux,
|
|
|
|
# we can limit the processing for archive members to only those that are otherwise referenced.
|
|
|
|
append("-bcdtors:mbr"
|
|
|
|
CMAKE_EXE_LINKER_FLAGS CMAKE_MODULE_LINKER_FLAGS CMAKE_SHARED_LINKER_FLAGS)
|
2019-03-14 05:50:25 +08:00
|
|
|
endif()
|
|
|
|
endif()
|
|
|
|
|
2015-01-22 22:06:51 +08:00
|
|
|
# Pass -Wl,-z,defs. This makes sure all symbols are defined. Otherwise a DSO
|
|
|
|
# build might work on ELF but fail on MachO/COFF.
|
2020-07-09 20:17:33 +08:00
|
|
|
if(NOT (CMAKE_SYSTEM_NAME MATCHES "Darwin|FreeBSD|OpenBSD|DragonFly|AIX|SunOS|OS390" OR
|
2019-03-14 05:50:25 +08:00
|
|
|
WIN32 OR CYGWIN) AND
|
2015-01-23 04:57:30 +08:00
|
|
|
NOT LLVM_USE_SANITIZER)
|
2015-01-22 22:06:51 +08:00
|
|
|
set(CMAKE_SHARED_LINKER_FLAGS "${CMAKE_SHARED_LINKER_FLAGS} -Wl,-z,defs")
|
|
|
|
endif()
|
|
|
|
|
2017-11-28 06:23:09 +08:00
|
|
|
# Pass -Wl,-z,nodelete. This makes sure our shared libraries are not unloaded
|
|
|
|
# by dlclose(). We need that since the CLI API relies on cross-references
|
|
|
|
# between global objects which became horribly broken when one of the libraries
|
|
|
|
# is unloaded.
|
|
|
|
if(${CMAKE_SYSTEM_NAME} MATCHES "Linux")
|
|
|
|
set(CMAKE_SHARED_LINKER_FLAGS "${CMAKE_SHARED_LINKER_FLAGS} -Wl,-z,nodelete")
|
2018-08-16 23:12:12 +08:00
|
|
|
set(CMAKE_MODULE_LINKER_FLAGS "${CMAKE_MODULE_LINKER_FLAGS} -Wl,-z,nodelete")
|
2017-11-28 06:23:09 +08:00
|
|
|
endif()
|
|
|
|
|
2015-01-22 22:06:51 +08:00
|
|
|
|
2013-03-25 21:25:34 +08:00
|
|
|
function(append value)
|
|
|
|
foreach(variable ${ARGN})
|
2013-03-14 04:50:23 +08:00
|
|
|
set(${variable} "${${variable}} ${value}" PARENT_SCOPE)
|
2013-03-25 21:25:34 +08:00
|
|
|
endforeach(variable)
|
|
|
|
endfunction()
|
|
|
|
|
|
|
|
function(append_if condition value)
|
|
|
|
if (${condition})
|
|
|
|
foreach(variable ${ARGN})
|
|
|
|
set(${variable} "${${variable}} ${value}" PARENT_SCOPE)
|
|
|
|
endforeach(variable)
|
2013-03-14 04:50:23 +08:00
|
|
|
endif()
|
|
|
|
endfunction()
|
|
|
|
|
2014-07-09 11:38:19 +08:00
|
|
|
macro(add_flag_if_supported flag name)
|
|
|
|
check_c_compiler_flag("-Werror ${flag}" "C_SUPPORTS_${name}")
|
|
|
|
append_if("C_SUPPORTS_${name}" "${flag}" CMAKE_C_FLAGS)
|
|
|
|
check_cxx_compiler_flag("-Werror ${flag}" "CXX_SUPPORTS_${name}")
|
|
|
|
append_if("CXX_SUPPORTS_${name}" "${flag}" CMAKE_CXX_FLAGS)
|
2013-03-26 15:49:46 +08:00
|
|
|
endmacro()
|
|
|
|
|
2014-07-09 11:38:19 +08:00
|
|
|
function(add_flag_or_print_warning flag name)
|
|
|
|
check_c_compiler_flag("-Werror ${flag}" "C_SUPPORTS_${name}")
|
|
|
|
check_cxx_compiler_flag("-Werror ${flag}" "CXX_SUPPORTS_${name}")
|
2014-09-27 05:35:48 +08:00
|
|
|
if (C_SUPPORTS_${name} AND CXX_SUPPORTS_${name})
|
2014-07-09 11:38:19 +08:00
|
|
|
message(STATUS "Building with ${flag}")
|
|
|
|
set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} ${flag}" PARENT_SCOPE)
|
|
|
|
set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} ${flag}" PARENT_SCOPE)
|
2015-07-28 22:43:53 +08:00
|
|
|
set(CMAKE_ASM_FLAGS "${CMAKE_ASM_FLAGS} ${flag}" PARENT_SCOPE)
|
2014-07-09 11:38:19 +08:00
|
|
|
else()
|
|
|
|
message(WARNING "${flag} is not supported.")
|
|
|
|
endif()
|
|
|
|
endfunction()
|
|
|
|
|
2017-01-15 11:21:30 +08:00
|
|
|
if( LLVM_ENABLE_LLD )
|
2019-05-08 21:02:32 +08:00
|
|
|
if ( LLVM_USE_LINKER )
|
|
|
|
message(FATAL_ERROR "LLVM_ENABLE_LLD and LLVM_USE_LINKER can't be set at the same time")
|
|
|
|
endif()
|
2020-05-29 19:14:51 +08:00
|
|
|
# In case of MSVC cmake always invokes the linker directly, so the linker
|
|
|
|
# should be specified by CMAKE_LINKER cmake variable instead of by -fuse-ld
|
|
|
|
# compiler option.
|
|
|
|
if ( NOT MSVC )
|
|
|
|
set(LLVM_USE_LINKER "lld")
|
|
|
|
endif()
|
2017-01-15 11:21:30 +08:00
|
|
|
endif()
|
|
|
|
|
|
|
|
if( LLVM_USE_LINKER )
|
2017-10-31 05:19:54 +08:00
|
|
|
set(OLD_CMAKE_REQUIRED_FLAGS ${CMAKE_REQUIRED_FLAGS})
|
|
|
|
set(CMAKE_REQUIRED_FLAGS "${CMAKE_REQUIRED_FLAGS} -fuse-ld=${LLVM_USE_LINKER}")
|
|
|
|
check_cxx_source_compiles("int main() { return 0; }" CXX_SUPPORTS_CUSTOM_LINKER)
|
2017-01-15 11:21:30 +08:00
|
|
|
if ( NOT CXX_SUPPORTS_CUSTOM_LINKER )
|
2019-05-08 21:02:32 +08:00
|
|
|
message(FATAL_ERROR "Host compiler does not support '-fuse-ld=${LLVM_USE_LINKER}'")
|
2017-01-15 11:21:30 +08:00
|
|
|
endif()
|
2017-10-31 05:19:54 +08:00
|
|
|
set(CMAKE_REQUIRED_FLAGS ${OLD_CMAKE_REQUIRED_FLAGS})
|
2017-01-15 11:21:30 +08:00
|
|
|
append("-fuse-ld=${LLVM_USE_LINKER}"
|
2016-07-29 08:46:13 +08:00
|
|
|
CMAKE_EXE_LINKER_FLAGS CMAKE_MODULE_LINKER_FLAGS CMAKE_SHARED_LINKER_FLAGS)
|
|
|
|
endif()
|
|
|
|
|
2011-02-04 04:57:36 +08:00
|
|
|
if( LLVM_ENABLE_PIC )
|
|
|
|
if( XCODE )
|
|
|
|
# Xcode has -mdynamic-no-pic on by default, which overrides -fPIC. I don't
|
|
|
|
# know how to disable this, so just force ENABLE_PIC off for now.
|
|
|
|
message(WARNING "-fPIC not supported with Xcode.")
|
2011-12-16 14:21:08 +08:00
|
|
|
elseif( WIN32 OR CYGWIN)
|
2011-02-04 04:57:36 +08:00
|
|
|
# On Windows all code is PIC. MinGW warns if -fPIC is used.
|
|
|
|
else()
|
2014-07-09 11:38:19 +08:00
|
|
|
add_flag_or_print_warning("-fPIC" FPIC)
|
2011-02-04 04:57:36 +08:00
|
|
|
endif()
|
2019-04-27 17:28:54 +08:00
|
|
|
# GCC for MIPS can miscompile LLVM due to PR37701.
|
|
|
|
if(CMAKE_COMPILER_IS_GNUCXX AND LLVM_NATIVE_ARCH STREQUAL "Mips" AND
|
|
|
|
NOT Uppercase_CMAKE_BUILD_TYPE STREQUAL "DEBUG")
|
|
|
|
add_flag_or_print_warning("-fno-shrink-wrap" FNO_SHRINK_WRAP)
|
|
|
|
endif()
|
[cmake] Don't build with -O3 -fPIC on Solaris/sparcv9
Tests on Solaris/sparcv9 currently show about 250 failures when building
with gcc, most of them like the following:
FAIL: LLVM-Unit :: Support/./SupportTests/TaskQueueTest.UnOrderedFutures (4269 of 67884)
******************** TEST 'LLVM-Unit :: Support/./SupportTests/TaskQueueTest.UnOrderedFutures' FAILED ********************
Note: Google Test filter = TaskQueueTest.UnOrderedFutures
[==========] Running 1 test from 1 test case.
[----------] Global test environment set-up.
[----------] 1 test from TaskQueueTest
[ RUN ] TaskQueueTest.UnOrderedFutures
0 SupportTests 0x0000000100753b20 llvm::sys::PrintStackTrace(llvm::raw_ostream&) + 32
1 SupportTests 0x0000000100752974 llvm::sys::RunSignalHandlers() + 68
2 SupportTests 0x0000000100752b18 SignalHandler(int) + 372
3 libc.so.1 0xffffffff7eedc800 __sighndlr + 12
4 libc.so.1 0xffffffff7eecf23c call_user_handler + 852
5 libc.so.1 0xffffffff7eecf594 sigacthandler + 84
6 SupportTests 0x00000001006f8cb8 std::thread::_State_impl<std::thread::_Invoker<std::tuple<llvm::ThreadPool::ThreadPool(llvm::ThreadPoolStrategy)::'lambda'()> > >::_M_run() + 512
7 libstdc++.so.6.0.28 0xfffffffc628117cc execute_native_thread_routine + 16
8 libc.so.1 0xffffffff7eedc6a0 _lwp_start + 0
Since it's effectively impossible to debug such a `SEGV` in a `Release`
build, I tried a `Debug` build instead, only to find that the failures had
gone away.
Further investigation revealed that most of the issue centers around
`llvm/lib/Support/ThreadPool.cpp`. That file is built with `-O3 -fPIC` in
a `Release` build. The failure vanishes if
- compiling without `-fPIC`
- compiling with `-O -fPIC`
- linking with GNU `ld` instead of Solaris `ld`
It has meanwhile been determined that `gcc` doesn't correctly heed some TLS
code sequences. To make things worse, Solaris `ld` doesn't properly
validate its assumptions against the input, generating wrong code.
`gld` like `gcc` is more liberal here and correctly deals with the code it
gets fed from `gcc`.
There's PR target/96607: GCC feeds SPARC/Solaris linker with unrecognized
TLS sequences <https://gcc.gnu.org/bugzilla/show_bug.cgi?id=96607> now.
An attempt to build with `-DLLVM_ENABLE_PIC=Off` initially failed since
neither `libRemarks.so` (D85626 <https://reviews.llvm.org/D85626>) nor
`LLVMPolly.so` (D85627 <https://reviews.llvm.org/D85627>) heed that option.
Even with that fixed, a few codegen failures remain.
Next I tried to build just `ThreadPool.cpp` with `-O -fPIC`. While that
fixed the vast majority of the failures, 16 `LLVM :: CodeGen/X86` failures
remained.
Given that that solution was both incomplete and fragile, I went for
building the whole tree with `-O -fPIC` for `Release` and `RelWithDebInfo`
builds.
As detailed in Bug 47304, 2-stage builds also show large numbers of
failures when building with `-O3` or `-O2`, which are likewise worked
around by building with `-O` until they are sufficiently analyzed and
fixed.
This way, all failures relative to a `Debug` build go away.
Tested on `sparcv9-sun-solaris2.11`.
Differential Revision: https://reviews.llvm.org/D85630
2020-08-28 17:40:34 +08:00
|
|
|
# gcc with -O3 -fPIC generates TLS sequences that violate the spec on
|
|
|
|
# Solaris/sparcv9, causing executables created with the system linker
|
|
|
|
# to SEGV (GCC PR target/96607).
|
|
|
|
# clang with -O3 -fPIC generates code that SEGVs.
|
|
|
|
# Both can be worked around by compiling with -O instead.
|
|
|
|
if(${CMAKE_SYSTEM_NAME} STREQUAL "SunOS" AND LLVM_NATIVE_ARCH STREQUAL "Sparc")
|
|
|
|
llvm_replace_compiler_option(CMAKE_CXX_FLAGS_RELEASE "-O[23]" "-O")
|
|
|
|
llvm_replace_compiler_option(CMAKE_CXX_FLAGS_RELWITHDEBINFO "-O[23]" "-O")
|
|
|
|
endif()
|
2011-02-04 04:57:36 +08:00
|
|
|
endif()
|
|
|
|
|
2019-03-14 05:50:25 +08:00
|
|
|
if(NOT WIN32 AND NOT CYGWIN AND NOT (${CMAKE_SYSTEM_NAME} MATCHES "AIX" AND CMAKE_CXX_COMPILER_ID STREQUAL "GNU"))
|
2015-11-19 06:49:26 +08:00
|
|
|
# MinGW warns if -fvisibility-inlines-hidden is used.
|
2019-03-14 05:50:25 +08:00
|
|
|
# GCC on AIX warns if -fvisibility-inlines-hidden is used.
|
2015-11-19 06:49:26 +08:00
|
|
|
check_cxx_compiler_flag("-fvisibility-inlines-hidden" SUPPORTS_FVISIBILITY_INLINES_HIDDEN_FLAG)
|
|
|
|
append_if(SUPPORTS_FVISIBILITY_INLINES_HIDDEN_FLAG "-fvisibility-inlines-hidden" CMAKE_CXX_FLAGS)
|
|
|
|
endif()
|
|
|
|
|
2018-10-24 20:22:12 +08:00
|
|
|
if(CMAKE_SIZEOF_VOID_P EQUAL 8 AND MINGW)
|
|
|
|
add_definitions( -D_FILE_OFFSET_BITS=64 )
|
|
|
|
endif()
|
|
|
|
|
2011-02-04 04:57:36 +08:00
|
|
|
if( CMAKE_SIZEOF_VOID_P EQUAL 8 AND NOT WIN32 )
|
|
|
|
# TODO: support other platforms and toolchains.
|
|
|
|
if( LLVM_BUILD_32_BITS )
|
|
|
|
message(STATUS "Building 32 bits executables and libraries.")
|
2016-06-06 13:54:55 +08:00
|
|
|
set(CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS} -m32")
|
|
|
|
set(CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -m32")
|
2012-05-24 02:42:02 +08:00
|
|
|
set(CMAKE_EXE_LINKER_FLAGS "${CMAKE_EXE_LINKER_FLAGS} -m32")
|
|
|
|
set(CMAKE_SHARED_LINKER_FLAGS "${CMAKE_SHARED_LINKER_FLAGS} -m32")
|
2012-06-08 17:41:23 +08:00
|
|
|
set(CMAKE_MODULE_LINKER_FLAGS "${CMAKE_MODULE_LINKER_FLAGS} -m32")
|
2017-11-04 14:03:29 +08:00
|
|
|
|
|
|
|
# FIXME: CMAKE_SIZEOF_VOID_P is still 8
|
|
|
|
add_definitions(-D_LARGEFILE_SOURCE)
|
|
|
|
add_definitions(-D_FILE_OFFSET_BITS=64)
|
2011-02-04 04:57:36 +08:00
|
|
|
endif( LLVM_BUILD_32_BITS )
|
|
|
|
endif( CMAKE_SIZEOF_VOID_P EQUAL 8 AND NOT WIN32 )
|
|
|
|
|
2017-04-24 18:36:46 +08:00
|
|
|
# If building on a GNU specific 32-bit system, make sure off_t is 64 bits
|
2017-09-02 07:12:43 +08:00
|
|
|
# so that off_t can stored offset > 2GB.
|
|
|
|
# Android until version N (API 24) doesn't support it.
|
|
|
|
if (ANDROID AND (ANDROID_NATIVE_API_LEVEL LESS 24))
|
|
|
|
set(LLVM_FORCE_SMALLFILE_FOR_ANDROID TRUE)
|
|
|
|
endif()
|
|
|
|
if( CMAKE_SIZEOF_VOID_P EQUAL 4 AND NOT LLVM_FORCE_SMALLFILE_FOR_ANDROID)
|
2017-11-04 14:03:29 +08:00
|
|
|
# FIXME: It isn't handled in LLVM_BUILD_32_BITS.
|
2017-04-24 18:36:46 +08:00
|
|
|
add_definitions( -D_LARGEFILE_SOURCE )
|
|
|
|
add_definitions( -D_FILE_OFFSET_BITS=64 )
|
|
|
|
endif()
|
|
|
|
|
2014-03-13 14:37:28 +08:00
|
|
|
if( XCODE )
|
|
|
|
# For Xcode enable several build settings that correspond to
|
|
|
|
# many warnings that are on by default in Clang but are
|
|
|
|
# not enabled for historical reasons. For versions of Xcode
|
|
|
|
# that do not support these options they will simply
|
|
|
|
# be ignored.
|
|
|
|
set(CMAKE_XCODE_ATTRIBUTE_GCC_WARN_ABOUT_RETURN_TYPE "YES")
|
|
|
|
set(CMAKE_XCODE_ATTRIBUTE_GCC_WARN_ABOUT_MISSING_NEWLINE "YES")
|
|
|
|
set(CMAKE_XCODE_ATTRIBUTE_GCC_WARN_UNUSED_VALUE "YES")
|
|
|
|
set(CMAKE_XCODE_ATTRIBUTE_GCC_WARN_UNUSED_VARIABLE "YES")
|
|
|
|
set(CMAKE_XCODE_ATTRIBUTE_GCC_WARN_SIGN_COMPARE "YES")
|
|
|
|
set(CMAKE_XCODE_ATTRIBUTE_GCC_WARN_UNUSED_FUNCTION "YES")
|
|
|
|
set(CMAKE_XCODE_ATTRIBUTE_GCC_WARN_INITIALIZER_NOT_FULLY_BRACKETED "YES")
|
|
|
|
set(CMAKE_XCODE_ATTRIBUTE_GCC_WARN_HIDDEN_VIRTUAL_FUNCTIONS "YES")
|
|
|
|
set(CMAKE_XCODE_ATTRIBUTE_GCC_WARN_UNINITIALIZED_AUTOS "YES")
|
|
|
|
set(CMAKE_XCODE_ATTRIBUTE_CLANG_WARN_BOOL_CONVERSION "YES")
|
|
|
|
set(CMAKE_XCODE_ATTRIBUTE_CLANG_WARN_EMPTY_BODY "YES")
|
|
|
|
set(CMAKE_XCODE_ATTRIBUTE_CLANG_WARN_ENUM_CONVERSION "YES")
|
|
|
|
set(CMAKE_XCODE_ATTRIBUTE_CLANG_WARN_INT_CONVERSION "YES")
|
|
|
|
set(CMAKE_XCODE_ATTRIBUTE_CLANG_WARN_CONSTANT_CONVERSION "YES")
|
|
|
|
set(CMAKE_XCODE_ATTRIBUTE_GCC_WARN_NON_VIRTUAL_DESTRUCTOR "YES")
|
|
|
|
endif()
|
|
|
|
|
2012-04-21 22:50:56 +08:00
|
|
|
# On Win32 using MS tools, provide an option to set the number of parallel jobs
|
|
|
|
# to use.
|
2012-04-21 22:51:02 +08:00
|
|
|
if( MSVC_IDE )
|
2011-03-03 01:47:37 +08:00
|
|
|
set(LLVM_COMPILER_JOBS "0" CACHE STRING
|
|
|
|
"Number of parallel compiler jobs. 0 means use all processors. Default is 0.")
|
|
|
|
if( NOT LLVM_COMPILER_JOBS STREQUAL "1" )
|
|
|
|
if( LLVM_COMPILER_JOBS STREQUAL "0" )
|
2017-03-21 12:03:24 +08:00
|
|
|
add_definitions( /MP )
|
2011-03-03 01:47:37 +08:00
|
|
|
else()
|
2014-03-25 17:34:20 +08:00
|
|
|
message(STATUS "Number of parallel compiler jobs set to " ${LLVM_COMPILER_JOBS})
|
2017-03-21 12:03:24 +08:00
|
|
|
add_definitions( /MP${LLVM_COMPILER_JOBS} )
|
2011-03-03 01:47:37 +08:00
|
|
|
endif()
|
|
|
|
else()
|
|
|
|
message(STATUS "Parallel compilation disabled")
|
|
|
|
endif()
|
|
|
|
endif()
|
|
|
|
|
2016-09-01 06:43:23 +08:00
|
|
|
# set stack reserved size to ~10MB
|
|
|
|
if(MSVC)
|
|
|
|
# CMake previously automatically set this value for MSVC builds, but the
|
|
|
|
# behavior was changed in CMake 2.8.11 (Issue 12437) to use the MSVC default
|
|
|
|
# value (1 MB) which is not enough for us in tasks such as parsing recursive
|
|
|
|
# C++ templates in Clang.
|
|
|
|
set(CMAKE_EXE_LINKER_FLAGS "${CMAKE_EXE_LINKER_FLAGS} /STACK:10000000")
|
|
|
|
elseif(MINGW) # FIXME: Also cygwin?
|
|
|
|
set(CMAKE_EXE_LINKER_FLAGS "${CMAKE_EXE_LINKER_FLAGS} -Wl,--stack,16777216")
|
2016-12-23 03:12:14 +08:00
|
|
|
|
|
|
|
# Pass -mbig-obj to mingw gas on Win64. COFF has a 2**16 section limit, and
|
|
|
|
# on Win64, every COMDAT function creates at least 3 sections: .text, .pdata,
|
|
|
|
# and .xdata.
|
|
|
|
if (CMAKE_SIZEOF_VOID_P EQUAL 8)
|
|
|
|
append("-Wa,-mbig-obj" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
|
|
|
endif()
|
2016-09-01 06:43:23 +08:00
|
|
|
endif()
|
|
|
|
|
2011-02-04 04:57:36 +08:00
|
|
|
if( MSVC )
|
|
|
|
include(ChooseMSVCCRT)
|
|
|
|
|
|
|
|
# Add definitions that make MSVC much less annoying.
|
2017-03-21 12:03:24 +08:00
|
|
|
add_definitions(
|
2011-02-04 04:57:36 +08:00
|
|
|
# For some reason MS wants to deprecate a bunch of standard functions...
|
|
|
|
-D_CRT_SECURE_NO_DEPRECATE
|
|
|
|
-D_CRT_SECURE_NO_WARNINGS
|
|
|
|
-D_CRT_NONSTDC_NO_DEPRECATE
|
|
|
|
-D_CRT_NONSTDC_NO_WARNINGS
|
|
|
|
-D_SCL_SECURE_NO_DEPRECATE
|
|
|
|
-D_SCL_SECURE_NO_WARNINGS
|
2015-03-20 00:32:47 +08:00
|
|
|
)
|
2011-02-04 04:57:36 +08:00
|
|
|
|
2016-06-24 03:02:09 +08:00
|
|
|
# Tell MSVC to use the Unicode version of the Win32 APIs instead of ANSI.
|
2017-03-21 12:03:24 +08:00
|
|
|
add_definitions(
|
2016-06-24 03:02:09 +08:00
|
|
|
-DUNICODE
|
|
|
|
-D_UNICODE
|
|
|
|
)
|
|
|
|
|
2011-02-04 04:57:36 +08:00
|
|
|
if (LLVM_ENABLE_WERROR)
|
2017-03-17 01:05:16 +08:00
|
|
|
append("/WX" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
2011-02-04 04:57:36 +08:00
|
|
|
endif (LLVM_ENABLE_WERROR)
|
2015-03-20 00:32:47 +08:00
|
|
|
|
2015-08-13 01:09:25 +08:00
|
|
|
append("/Zc:inline" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
|
|
|
|
2020-07-17 20:58:28 +08:00
|
|
|
# Some projects use the __cplusplus preprocessor macro to check support for
|
|
|
|
# a particular version of the C++ standard. When this option is not specified
|
|
|
|
# explicitly, macro's value is "199711L" that implies C++98 Standard.
|
|
|
|
# https://devblogs.microsoft.com/cppblog/msvc-now-correctly-reports-__cplusplus/
|
|
|
|
append("/Zc:__cplusplus" CMAKE_CXX_FLAGS)
|
|
|
|
|
2018-02-16 05:25:23 +08:00
|
|
|
# Allow users to request PDBs in release mode. CMake offeres the
|
|
|
|
# RelWithDebInfo configuration, but it uses different optimization settings
|
|
|
|
# (/Ob1 vs /Ob2 or -O2 vs -O3). LLVM provides this flag so that users can get
|
|
|
|
# PDBs without changing codegen.
|
|
|
|
option(LLVM_ENABLE_PDB OFF)
|
|
|
|
if (LLVM_ENABLE_PDB AND uppercase_CMAKE_BUILD_TYPE STREQUAL "RELEASE")
|
2018-02-08 03:37:52 +08:00
|
|
|
append("/Zi" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
2018-02-16 05:25:23 +08:00
|
|
|
# /DEBUG disables linker GC and ICF, but we want those in Release mode.
|
|
|
|
append("/DEBUG /OPT:REF /OPT:ICF"
|
|
|
|
CMAKE_EXE_LINKER_FLAGS CMAKE_MODULE_LINKER_FLAGS
|
|
|
|
CMAKE_SHARED_LINKER_FLAGS)
|
|
|
|
endif()
|
2018-02-08 03:37:52 +08:00
|
|
|
|
2019-07-31 06:49:11 +08:00
|
|
|
# Disable string literal const->non-const type conversion.
|
|
|
|
# "When specified, the compiler requires strict const-qualification
|
|
|
|
# conformance for pointers initialized by using string literals."
|
|
|
|
append("/Zc:strictStrings" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
2016-01-25 22:17:39 +08:00
|
|
|
|
|
|
|
# "Generate Intrinsic Functions".
|
|
|
|
append("/Oi" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
|
|
|
|
|
|
|
# "Enforce type conversion rules".
|
|
|
|
append("/Zc:rvalueCast" CMAKE_CXX_FLAGS)
|
|
|
|
|
2017-03-02 03:22:18 +08:00
|
|
|
if (CMAKE_CXX_COMPILER_ID MATCHES "Clang" AND NOT LLVM_ENABLE_LTO)
|
2016-01-07 03:05:19 +08:00
|
|
|
# clang-cl and cl by default produce non-deterministic binaries because
|
|
|
|
# link.exe /incremental requires a timestamp in the .obj file. clang-cl
|
2016-05-06 03:57:03 +08:00
|
|
|
# has the flag /Brepro to force deterministic binaries. We want to pass that
|
2017-03-02 03:22:18 +08:00
|
|
|
# whenever you're building with clang unless you're passing /incremental
|
|
|
|
# or using LTO (/Brepro with LTO would result in a warning about the flag
|
|
|
|
# being unused, because we're not generating object files).
|
2016-01-07 03:05:19 +08:00
|
|
|
# This checks CMAKE_CXX_COMPILER_ID in addition to check_cxx_compiler_flag()
|
|
|
|
# because cl.exe does not emit an error on flags it doesn't understand,
|
|
|
|
# letting check_cxx_compiler_flag() claim it understands all flags.
|
|
|
|
check_cxx_compiler_flag("/Brepro" SUPPORTS_BREPRO)
|
|
|
|
if (SUPPORTS_BREPRO)
|
|
|
|
# Check if /INCREMENTAL is passed to the linker and complain that it
|
|
|
|
# won't work with /Brepro.
|
|
|
|
string(TOUPPER "${CMAKE_EXE_LINKER_FLAGS}" upper_exe_flags)
|
|
|
|
string(TOUPPER "${CMAKE_MODULE_LINKER_FLAGS}" upper_module_flags)
|
|
|
|
string(TOUPPER "${CMAKE_SHARED_LINKER_FLAGS}" upper_shared_flags)
|
|
|
|
|
2016-05-06 03:57:03 +08:00
|
|
|
string(FIND "${upper_exe_flags} ${upper_module_flags} ${upper_shared_flags}"
|
|
|
|
"/INCREMENTAL" linker_flag_idx)
|
2017-09-02 07:12:43 +08:00
|
|
|
|
2016-05-06 03:57:03 +08:00
|
|
|
if (${linker_flag_idx} GREATER -1)
|
|
|
|
message(WARNING "/Brepro not compatible with /INCREMENTAL linking - builds will be non-deterministic")
|
|
|
|
else()
|
|
|
|
append("/Brepro" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
2016-01-07 03:05:19 +08:00
|
|
|
endif()
|
|
|
|
endif()
|
|
|
|
endif()
|
2020-07-29 06:59:33 +08:00
|
|
|
# By default MSVC has a 2^16 limit on the number of sections in an object file,
|
|
|
|
# but in many objects files need more than that. This flag is to increase the
|
|
|
|
# number of sections.
|
|
|
|
append("/bigobj" CMAKE_CXX_FLAGS)
|
2019-08-19 06:02:24 +08:00
|
|
|
endif( MSVC )
|
2016-01-07 03:05:19 +08:00
|
|
|
|
2019-08-19 06:02:24 +08:00
|
|
|
# Warnings-as-errors handling for GCC-compatible compilers:
|
|
|
|
if ( LLVM_COMPILER_IS_GCC_COMPATIBLE )
|
|
|
|
append_if(LLVM_ENABLE_WERROR "-Werror" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
|
|
|
append_if(LLVM_ENABLE_WERROR "-Wno-error" CMAKE_REQUIRED_FLAGS)
|
|
|
|
endif( LLVM_COMPILER_IS_GCC_COMPATIBLE )
|
|
|
|
|
|
|
|
# Specific default warnings-as-errors for compilers accepting GCC-compatible warning flags:
|
|
|
|
if ( LLVM_COMPILER_IS_GCC_COMPATIBLE OR CMAKE_CXX_COMPILER_ID MATCHES "XL" )
|
|
|
|
add_flag_if_supported("-Werror=date-time" WERROR_DATE_TIME)
|
|
|
|
add_flag_if_supported("-Werror=unguarded-availability-new" WERROR_UNGUARDED_AVAILABILITY_NEW)
|
|
|
|
endif( LLVM_COMPILER_IS_GCC_COMPATIBLE OR CMAKE_CXX_COMPILER_ID MATCHES "XL" )
|
|
|
|
|
|
|
|
# Modules enablement for GCC-compatible compilers:
|
|
|
|
if ( LLVM_COMPILER_IS_GCC_COMPATIBLE AND LLVM_ENABLE_MODULES )
|
|
|
|
set(OLD_CMAKE_REQUIRED_FLAGS ${CMAKE_REQUIRED_FLAGS})
|
|
|
|
set(module_flags "-fmodules -fmodules-cache-path=${PROJECT_BINARY_DIR}/module.cache")
|
|
|
|
if (${CMAKE_SYSTEM_NAME} MATCHES "Darwin")
|
|
|
|
# On Darwin -fmodules does not imply -fcxx-modules.
|
|
|
|
set(module_flags "${module_flags} -fcxx-modules")
|
|
|
|
endif()
|
|
|
|
if (LLVM_ENABLE_LOCAL_SUBMODULE_VISIBILITY)
|
|
|
|
set(module_flags "${module_flags} -Xclang -fmodules-local-submodule-visibility")
|
|
|
|
endif()
|
|
|
|
if (LLVM_ENABLE_MODULE_DEBUGGING AND
|
|
|
|
((uppercase_CMAKE_BUILD_TYPE STREQUAL "DEBUG") OR
|
|
|
|
(uppercase_CMAKE_BUILD_TYPE STREQUAL "RELWITHDEBINFO")))
|
|
|
|
set(module_flags "${module_flags} -gmodules")
|
|
|
|
endif()
|
|
|
|
set(CMAKE_REQUIRED_FLAGS "${CMAKE_REQUIRED_FLAGS} ${module_flags}")
|
|
|
|
|
|
|
|
# Check that we can build code with modules enabled, and that repeatedly
|
|
|
|
# including <cassert> still manages to respect NDEBUG properly.
|
|
|
|
CHECK_CXX_SOURCE_COMPILES("#undef NDEBUG
|
|
|
|
#include <cassert>
|
|
|
|
#define NDEBUG
|
|
|
|
#include <cassert>
|
|
|
|
int main() { assert(this code is not compiled); }"
|
|
|
|
CXX_SUPPORTS_MODULES)
|
|
|
|
set(CMAKE_REQUIRED_FLAGS ${OLD_CMAKE_REQUIRED_FLAGS})
|
|
|
|
if (CXX_SUPPORTS_MODULES)
|
|
|
|
append("${module_flags}" CMAKE_CXX_FLAGS)
|
|
|
|
else()
|
|
|
|
message(FATAL_ERROR "LLVM_ENABLE_MODULES is not supported by this compiler")
|
|
|
|
endif()
|
|
|
|
endif( LLVM_COMPILER_IS_GCC_COMPATIBLE AND LLVM_ENABLE_MODULES )
|
2011-02-04 04:57:36 +08:00
|
|
|
|
2017-11-30 02:05:32 +08:00
|
|
|
if (MSVC)
|
|
|
|
if (NOT CLANG_CL)
|
|
|
|
set(msvc_warning_flags
|
|
|
|
# Disabled warnings.
|
|
|
|
-wd4141 # Suppress ''modifier' : used more than once' (because of __forceinline combined with inline)
|
|
|
|
-wd4146 # Suppress 'unary minus operator applied to unsigned type, result still unsigned'
|
|
|
|
-wd4244 # Suppress ''argument' : conversion from 'type1' to 'type2', possible loss of data'
|
|
|
|
-wd4267 # Suppress ''var' : conversion from 'size_t' to 'type', possible loss of data'
|
|
|
|
-wd4291 # Suppress ''declaration' : no matching operator delete found; memory will not be freed if initialization throws an exception'
|
|
|
|
-wd4351 # Suppress 'new behavior: elements of array 'array' will be default initialized'
|
|
|
|
-wd4456 # Suppress 'declaration of 'var' hides local variable'
|
|
|
|
-wd4457 # Suppress 'declaration of 'var' hides function parameter'
|
|
|
|
-wd4458 # Suppress 'declaration of 'var' hides class member'
|
|
|
|
-wd4459 # Suppress 'declaration of 'var' hides global declaration'
|
|
|
|
-wd4503 # Suppress ''identifier' : decorated name length exceeded, name was truncated'
|
|
|
|
-wd4624 # Suppress ''derived class' : destructor could not be generated because a base class destructor is inaccessible'
|
|
|
|
-wd4722 # Suppress 'function' : destructor never returns, potential memory leak
|
|
|
|
-wd4100 # Suppress 'unreferenced formal parameter'
|
|
|
|
-wd4127 # Suppress 'conditional expression is constant'
|
|
|
|
-wd4512 # Suppress 'assignment operator could not be generated'
|
|
|
|
-wd4505 # Suppress 'unreferenced local function has been removed'
|
|
|
|
-wd4610 # Suppress '<class> can never be instantiated'
|
|
|
|
-wd4510 # Suppress 'default constructor could not be generated'
|
|
|
|
-wd4702 # Suppress 'unreachable code'
|
2019-09-04 00:11:37 +08:00
|
|
|
-wd4245 # Suppress ''conversion' : conversion from 'type1' to 'type2', signed/unsigned mismatch'
|
2017-11-30 02:05:32 +08:00
|
|
|
-wd4706 # Suppress 'assignment within conditional expression'
|
|
|
|
-wd4310 # Suppress 'cast truncates constant value'
|
|
|
|
-wd4701 # Suppress 'potentially uninitialized local variable'
|
|
|
|
-wd4703 # Suppress 'potentially uninitialized local pointer variable'
|
|
|
|
-wd4389 # Suppress 'signed/unsigned mismatch'
|
|
|
|
-wd4611 # Suppress 'interaction between '_setjmp' and C++ object destruction is non-portable'
|
|
|
|
-wd4805 # Suppress 'unsafe mix of type <type> and type <type> in operation'
|
|
|
|
-wd4204 # Suppress 'nonstandard extension used : non-constant aggregate initializer'
|
|
|
|
-wd4577 # Suppress 'noexcept used with no exception handling mode specified; termination on exception is not guaranteed'
|
|
|
|
-wd4091 # Suppress 'typedef: ignored on left of '' when no variable is declared'
|
|
|
|
# C4592 is disabled because of false positives in Visual Studio 2015
|
|
|
|
# Update 1. Re-evaluate the usefulness of this diagnostic with Update 2.
|
|
|
|
-wd4592 # Suppress ''var': symbol will be dynamically initialized (implementation limitation)
|
|
|
|
-wd4319 # Suppress ''operator' : zero extending 'type' to 'type' of greater size'
|
2018-11-21 04:50:04 +08:00
|
|
|
# C4709 is disabled because of a bug with Visual Studio 2017 as of
|
|
|
|
# v15.8.8. Re-evaluate the usefulness of this diagnostic when the bug
|
|
|
|
# is fixed.
|
|
|
|
-wd4709 # Suppress comma operator within array index expression
|
2017-11-30 02:05:32 +08:00
|
|
|
|
2019-08-20 19:20:05 +08:00
|
|
|
# Ideally, we'd like this warning to be enabled, but even MSVC 2019 doesn't
|
2019-07-31 19:06:05 +08:00
|
|
|
# support the 'aligned' attribute in the way that clang sources requires (for
|
|
|
|
# any code that uses the LLVM_ALIGNAS macro), so this is must be disabled to
|
|
|
|
# avoid unwanted alignment warnings.
|
|
|
|
-wd4324 # Suppress 'structure was padded due to __declspec(align())'
|
|
|
|
|
2017-11-30 02:05:32 +08:00
|
|
|
# Promoted warnings.
|
|
|
|
-w14062 # Promote 'enumerator in switch of enum is not handled' to level 1 warning.
|
|
|
|
|
|
|
|
# Promoted warnings to errors.
|
|
|
|
-we4238 # Promote 'nonstandard extension used : class rvalue used as lvalue' to error.
|
|
|
|
)
|
|
|
|
endif(NOT CLANG_CL)
|
2017-03-17 01:05:16 +08:00
|
|
|
|
|
|
|
# Enable warnings
|
|
|
|
if (LLVM_ENABLE_WARNINGS)
|
|
|
|
# Put /W4 in front of all the -we flags. cl.exe doesn't care, but for
|
|
|
|
# clang-cl having /W4 after the -we flags will re-enable the warnings
|
|
|
|
# disabled by -we.
|
|
|
|
set(msvc_warning_flags "/W4 ${msvc_warning_flags}")
|
|
|
|
# CMake appends /W3 by default, and having /W3 followed by /W4 will result in
|
|
|
|
# cl : Command line warning D9025 : overriding '/W3' with '/W4'. Since this is
|
|
|
|
# a command line warning and not a compiler warning, it cannot be suppressed except
|
|
|
|
# by fixing the command line.
|
|
|
|
string(REGEX REPLACE " /W[0-4]" "" CMAKE_C_FLAGS "${CMAKE_C_FLAGS}")
|
|
|
|
string(REGEX REPLACE " /W[0-4]" "" CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS}")
|
|
|
|
|
|
|
|
if (LLVM_ENABLE_PEDANTIC)
|
|
|
|
# No MSVC equivalent available
|
|
|
|
endif (LLVM_ENABLE_PEDANTIC)
|
|
|
|
endif (LLVM_ENABLE_WARNINGS)
|
|
|
|
|
|
|
|
foreach(flag ${msvc_warning_flags})
|
|
|
|
append("${flag}" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
|
|
|
endforeach(flag)
|
2017-11-30 02:05:32 +08:00
|
|
|
endif (MSVC)
|
2017-03-17 01:05:16 +08:00
|
|
|
|
|
|
|
if (LLVM_ENABLE_WARNINGS AND (LLVM_COMPILER_IS_GCC_COMPATIBLE OR CLANG_CL))
|
2017-11-30 02:05:32 +08:00
|
|
|
|
|
|
|
# Don't add -Wall for clang-cl, because it maps -Wall to -Weverything for
|
|
|
|
# MSVC compatibility. /W4 is added above instead.
|
|
|
|
if (NOT CLANG_CL)
|
|
|
|
append("-Wall" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
|
|
|
endif()
|
|
|
|
|
2018-05-31 21:41:04 +08:00
|
|
|
append("-Wextra -Wno-unused-parameter -Wwrite-strings" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
2017-03-17 01:05:16 +08:00
|
|
|
append("-Wcast-qual" CMAKE_CXX_FLAGS)
|
|
|
|
|
|
|
|
# Turn off missing field initializer warnings for gcc to avoid noise from
|
|
|
|
# false positives with empty {}. Turn them on otherwise (they're off by
|
|
|
|
# default for clang).
|
|
|
|
check_cxx_compiler_flag("-Wmissing-field-initializers" CXX_SUPPORTS_MISSING_FIELD_INITIALIZERS_FLAG)
|
|
|
|
if (CXX_SUPPORTS_MISSING_FIELD_INITIALIZERS_FLAG)
|
|
|
|
if (CMAKE_COMPILER_IS_GNUCXX)
|
|
|
|
append("-Wno-missing-field-initializers" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
|
|
|
else()
|
|
|
|
append("-Wmissing-field-initializers" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
|
|
|
endif()
|
|
|
|
endif()
|
|
|
|
|
|
|
|
if (LLVM_ENABLE_PEDANTIC AND LLVM_COMPILER_IS_GCC_COMPATIBLE)
|
|
|
|
append("-pedantic" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
|
|
|
append("-Wno-long-long" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
|
|
|
endif()
|
|
|
|
|
2018-11-02 04:31:44 +08:00
|
|
|
add_flag_if_supported("-Wimplicit-fallthrough" IMPLICIT_FALLTHROUGH_FLAG)
|
2017-03-17 01:05:16 +08:00
|
|
|
add_flag_if_supported("-Wcovered-switch-default" COVERED_SWITCH_DEFAULT_FLAG)
|
|
|
|
append_if(USE_NO_UNINITIALIZED "-Wno-uninitialized" CMAKE_CXX_FLAGS)
|
|
|
|
append_if(USE_NO_MAYBE_UNINITIALIZED "-Wno-maybe-uninitialized" CMAKE_CXX_FLAGS)
|
|
|
|
|
2018-07-20 04:14:46 +08:00
|
|
|
# Disable -Wclass-memaccess, a C++-only warning from GCC 8 that fires on
|
|
|
|
# LLVM's ADT classes.
|
|
|
|
check_cxx_compiler_flag("-Wclass-memaccess" CXX_SUPPORTS_CLASS_MEMACCESS_FLAG)
|
|
|
|
append_if(CXX_SUPPORTS_CLASS_MEMACCESS_FLAG "-Wno-class-memaccess" CMAKE_CXX_FLAGS)
|
|
|
|
|
2019-11-29 21:44:28 +08:00
|
|
|
# Disable -Wredundant-move on GCC>=9. GCC wants to remove std::move in code
|
|
|
|
# like "A foo(ConvertibleToA a) { return std::move(a); }", but this code does
|
|
|
|
# not compile (or uses the copy constructor instead) on clang<=3.8. Clang also
|
|
|
|
# has a -Wredundant-move, but it only fires when the types match exactly, so
|
|
|
|
# we can keep it here.
|
|
|
|
if (CMAKE_CXX_COMPILER_ID STREQUAL "GNU")
|
|
|
|
check_cxx_compiler_flag("-Wredundant-move" CXX_SUPPORTS_REDUNDANT_MOVE_FLAG)
|
|
|
|
append_if(CXX_SUPPORTS_REDUNDANT_MOVE_FLAG "-Wno-redundant-move" CMAKE_CXX_FLAGS)
|
|
|
|
endif()
|
|
|
|
|
2018-09-04 20:03:49 +08:00
|
|
|
# The LLVM libraries have no stable C++ API, so -Wnoexcept-type is not useful.
|
|
|
|
check_cxx_compiler_flag("-Wnoexcept-type" CXX_SUPPORTS_NOEXCEPT_TYPE_FLAG)
|
|
|
|
append_if(CXX_SUPPORTS_NOEXCEPT_TYPE_FLAG "-Wno-noexcept-type" CMAKE_CXX_FLAGS)
|
|
|
|
|
2017-03-17 01:05:16 +08:00
|
|
|
# Check if -Wnon-virtual-dtor warns even though the class is marked final.
|
|
|
|
# If it does, don't add it. So it won't be added on clang 3.4 and older.
|
|
|
|
# This also catches cases when -Wnon-virtual-dtor isn't supported by
|
|
|
|
# the compiler at all. This flag is not activated for gcc since it will
|
|
|
|
# incorrectly identify a protected non-virtual base when there is a friend
|
|
|
|
# declaration. Don't activate this in general on Windows as this warning has
|
|
|
|
# too many false positives on COM-style classes, which are destroyed with
|
|
|
|
# Release() (PR32286).
|
|
|
|
if (NOT CMAKE_COMPILER_IS_GNUCXX AND NOT WIN32)
|
|
|
|
set(OLD_CMAKE_REQUIRED_FLAGS ${CMAKE_REQUIRED_FLAGS})
|
|
|
|
set(CMAKE_REQUIRED_FLAGS "${CMAKE_REQUIRED_FLAGS} -std=c++11 -Werror=non-virtual-dtor")
|
|
|
|
CHECK_CXX_SOURCE_COMPILES("class base {public: virtual void anchor();protected: ~base();};
|
|
|
|
class derived final : public base { public: ~derived();};
|
|
|
|
int main() { return 0; }"
|
|
|
|
CXX_WONT_WARN_ON_FINAL_NONVIRTUALDTOR)
|
|
|
|
set(CMAKE_REQUIRED_FLAGS ${OLD_CMAKE_REQUIRED_FLAGS})
|
|
|
|
append_if(CXX_WONT_WARN_ON_FINAL_NONVIRTUALDTOR
|
|
|
|
"-Wnon-virtual-dtor" CMAKE_CXX_FLAGS)
|
|
|
|
endif()
|
|
|
|
|
|
|
|
# Enable -Wdelete-non-virtual-dtor if available.
|
|
|
|
add_flag_if_supported("-Wdelete-non-virtual-dtor" DELETE_NON_VIRTUAL_DTOR_FLAG)
|
|
|
|
|
2020-07-23 08:44:52 +08:00
|
|
|
# Enable -Wsuggest-override if it's available, and only if it doesn't
|
|
|
|
# suggest adding 'override' to functions that are already marked 'final'
|
|
|
|
# (which means it is disabled for GCC < 9.2).
|
|
|
|
check_cxx_compiler_flag("-Wsuggest-override" CXX_SUPPORTS_SUGGEST_OVERRIDE_FLAG)
|
|
|
|
if (CXX_SUPPORTS_SUGGEST_OVERRIDE_FLAG)
|
|
|
|
set(OLD_CMAKE_REQUIRED_FLAGS ${CMAKE_REQUIRED_FLAGS})
|
|
|
|
set(CMAKE_REQUIRED_FLAGS "${CMAKE_REQUIRED_FLAGS} -Werror=suggest-override")
|
|
|
|
CHECK_CXX_SOURCE_COMPILES("class base {public: virtual void anchor();};
|
|
|
|
class derived : base {public: void anchor() final;};
|
|
|
|
int main() { return 0; }"
|
|
|
|
CXX_WSUGGEST_OVERRIDE_ALLOWS_ONLY_FINAL)
|
|
|
|
set(CMAKE_REQUIRED_FLAGS ${OLD_CMAKE_REQUIRED_FLAGS})
|
|
|
|
append_if(CXX_WSUGGEST_OVERRIDE_ALLOWS_ONLY_FINAL "-Wsuggest-override" CMAKE_CXX_FLAGS)
|
|
|
|
endif()
|
|
|
|
|
2017-03-17 01:05:16 +08:00
|
|
|
# Check if -Wcomment is OK with an // comment ending with '\' if the next
|
|
|
|
# line is also a // comment.
|
|
|
|
set(OLD_CMAKE_REQUIRED_FLAGS ${CMAKE_REQUIRED_FLAGS})
|
|
|
|
set(CMAKE_REQUIRED_FLAGS "${CMAKE_REQUIRED_FLAGS} -Werror -Wcomment")
|
|
|
|
CHECK_C_SOURCE_COMPILES("// \\\\\\n//\\nint main() {return 0;}"
|
|
|
|
C_WCOMMENT_ALLOWS_LINE_WRAP)
|
|
|
|
set(CMAKE_REQUIRED_FLAGS ${OLD_CMAKE_REQUIRED_FLAGS})
|
|
|
|
if (NOT C_WCOMMENT_ALLOWS_LINE_WRAP)
|
|
|
|
append("-Wno-comment" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
|
|
|
endif()
|
|
|
|
|
|
|
|
# Enable -Wstring-conversion to catch misuse of string literals.
|
|
|
|
add_flag_if_supported("-Wstring-conversion" STRING_CONVERSION_FLAG)
|
|
|
|
endif (LLVM_ENABLE_WARNINGS AND (LLVM_COMPILER_IS_GCC_COMPATIBLE OR CLANG_CL))
|
|
|
|
|
2017-04-13 04:43:11 +08:00
|
|
|
if (LLVM_COMPILER_IS_GCC_COMPATIBLE AND NOT LLVM_ENABLE_WARNINGS)
|
|
|
|
append("-w" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
|
|
|
endif()
|
|
|
|
|
2013-03-26 15:49:46 +08:00
|
|
|
macro(append_common_sanitizer_flags)
|
2015-08-15 00:48:34 +08:00
|
|
|
if (NOT MSVC)
|
|
|
|
# Append -fno-omit-frame-pointer and turn on debug info to get better
|
|
|
|
# stack traces.
|
|
|
|
add_flag_if_supported("-fno-omit-frame-pointer" FNO_OMIT_FRAME_POINTER)
|
|
|
|
if (NOT uppercase_CMAKE_BUILD_TYPE STREQUAL "DEBUG" AND
|
2015-08-26 00:06:40 +08:00
|
|
|
NOT uppercase_CMAKE_BUILD_TYPE STREQUAL "RELWITHDEBINFO")
|
2015-08-15 00:48:34 +08:00
|
|
|
add_flag_if_supported("-gline-tables-only" GLINE_TABLES_ONLY)
|
|
|
|
endif()
|
|
|
|
# Use -O1 even in debug mode, otherwise sanitizers slowdown is too large.
|
2018-05-18 00:55:29 +08:00
|
|
|
if (uppercase_CMAKE_BUILD_TYPE STREQUAL "DEBUG" AND LLVM_OPTIMIZE_SANITIZED_BUILDS)
|
2015-08-15 00:48:34 +08:00
|
|
|
add_flag_if_supported("-O1" O1)
|
|
|
|
endif()
|
|
|
|
elseif (CLANG_CL)
|
|
|
|
# Keep frame pointers around.
|
|
|
|
append("/Oy-" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
|
|
|
# Always ask the linker to produce symbols with asan.
|
2019-05-21 11:01:01 +08:00
|
|
|
append("/Z7" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
2015-08-15 00:48:34 +08:00
|
|
|
append("-debug" CMAKE_EXE_LINKER_FLAGS CMAKE_MODULE_LINKER_FLAGS CMAKE_SHARED_LINKER_FLAGS)
|
2013-09-02 17:15:01 +08:00
|
|
|
endif()
|
2013-03-26 15:49:46 +08:00
|
|
|
endmacro()
|
|
|
|
|
|
|
|
# Turn on sanitizers if necessary.
|
|
|
|
if(LLVM_USE_SANITIZER)
|
|
|
|
if (LLVM_ON_UNIX)
|
|
|
|
if (LLVM_USE_SANITIZER STREQUAL "Address")
|
|
|
|
append_common_sanitizer_flags()
|
2014-07-09 14:27:05 +08:00
|
|
|
append("-fsanitize=address" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
2019-06-04 17:04:53 +08:00
|
|
|
elseif (LLVM_USE_SANITIZER STREQUAL "HWAddress")
|
|
|
|
append_common_sanitizer_flags()
|
|
|
|
append("-fsanitize=hwaddress" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
2013-03-26 15:49:46 +08:00
|
|
|
elseif (LLVM_USE_SANITIZER MATCHES "Memory(WithOrigins)?")
|
|
|
|
append_common_sanitizer_flags()
|
2014-07-09 14:27:05 +08:00
|
|
|
append("-fsanitize=memory" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
2013-03-26 15:49:46 +08:00
|
|
|
if(LLVM_USE_SANITIZER STREQUAL "MemoryWithOrigins")
|
2014-07-09 14:27:05 +08:00
|
|
|
append("-fsanitize-memory-track-origins" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
2013-03-26 15:49:46 +08:00
|
|
|
endif()
|
2014-08-29 08:50:36 +08:00
|
|
|
elseif (LLVM_USE_SANITIZER STREQUAL "Undefined")
|
|
|
|
append_common_sanitizer_flags()
|
2015-05-14 12:52:57 +08:00
|
|
|
append("-fsanitize=undefined -fno-sanitize=vptr,function -fno-sanitize-recover=all"
|
2014-08-29 08:50:36 +08:00
|
|
|
CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
2014-11-19 05:23:38 +08:00
|
|
|
elseif (LLVM_USE_SANITIZER STREQUAL "Thread")
|
|
|
|
append_common_sanitizer_flags()
|
|
|
|
append("-fsanitize=thread" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
2020-04-18 01:15:58 +08:00
|
|
|
elseif (LLVM_USE_SANITIZER STREQUAL "DataFlow")
|
|
|
|
append("-fsanitize=dataflow" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
2015-02-05 06:33:31 +08:00
|
|
|
elseif (LLVM_USE_SANITIZER STREQUAL "Address;Undefined" OR
|
|
|
|
LLVM_USE_SANITIZER STREQUAL "Undefined;Address")
|
|
|
|
append_common_sanitizer_flags()
|
2015-05-14 12:52:57 +08:00
|
|
|
append("-fsanitize=address,undefined -fno-sanitize=vptr,function -fno-sanitize-recover=all"
|
2015-02-05 06:33:31 +08:00
|
|
|
CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
2017-06-21 04:28:07 +08:00
|
|
|
elseif (LLVM_USE_SANITIZER STREQUAL "Leaks")
|
|
|
|
append_common_sanitizer_flags()
|
|
|
|
append("-fsanitize=leak" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
2013-03-26 15:49:46 +08:00
|
|
|
else()
|
2015-09-01 13:45:07 +08:00
|
|
|
message(FATAL_ERROR "Unsupported value of LLVM_USE_SANITIZER: ${LLVM_USE_SANITIZER}")
|
2013-03-26 15:49:46 +08:00
|
|
|
endif()
|
2015-08-15 00:48:34 +08:00
|
|
|
elseif(MSVC)
|
|
|
|
if (LLVM_USE_SANITIZER STREQUAL "Address")
|
|
|
|
append_common_sanitizer_flags()
|
|
|
|
append("-fsanitize=address" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
|
|
|
else()
|
2015-09-01 13:45:07 +08:00
|
|
|
message(FATAL_ERROR "This sanitizer not yet supported in the MSVC environment: ${LLVM_USE_SANITIZER}")
|
2015-08-15 00:48:34 +08:00
|
|
|
endif()
|
2013-03-26 15:49:46 +08:00
|
|
|
else()
|
2015-09-01 13:45:07 +08:00
|
|
|
message(FATAL_ERROR "LLVM_USE_SANITIZER is not supported on this platform.")
|
2013-03-26 15:49:46 +08:00
|
|
|
endif()
|
2017-01-18 05:04:23 +08:00
|
|
|
if (LLVM_USE_SANITIZER MATCHES "(Undefined;)?Address(;Undefined)?")
|
2017-01-19 03:01:58 +08:00
|
|
|
add_flag_if_supported("-fsanitize-address-use-after-scope"
|
|
|
|
FSANITIZE_USE_AFTER_SCOPE_FLAG)
|
2017-01-18 05:04:23 +08:00
|
|
|
endif()
|
2015-01-28 01:59:28 +08:00
|
|
|
if (LLVM_USE_SANITIZE_COVERAGE)
|
2017-08-23 08:40:58 +08:00
|
|
|
append("-fsanitize=fuzzer-no-link" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
2015-01-28 01:59:28 +08:00
|
|
|
endif()
|
2018-07-20 18:12:31 +08:00
|
|
|
if (LLVM_USE_SANITIZER MATCHES ".*Undefined.*")
|
|
|
|
set(BLACKLIST_FILE "${CMAKE_SOURCE_DIR}/utils/sanitizers/ubsan_blacklist.txt")
|
|
|
|
if (EXISTS "${BLACKLIST_FILE}")
|
|
|
|
append("-fsanitize-blacklist=${BLACKLIST_FILE}"
|
|
|
|
CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
|
|
|
endif()
|
|
|
|
endif()
|
2013-03-26 15:49:46 +08:00
|
|
|
endif()
|
|
|
|
|
2020-02-28 13:01:08 +08:00
|
|
|
# Turn on -gsplit-dwarf if requested in debug builds.
|
|
|
|
if (LLVM_USE_SPLIT_DWARF AND
|
|
|
|
((uppercase_CMAKE_BUILD_TYPE STREQUAL "DEBUG") OR
|
|
|
|
(uppercase_CMAKE_BUILD_TYPE STREQUAL "RELWITHDEBINFO")))
|
|
|
|
# Limit to clang and gcc so far. Add compilers supporting this option.
|
|
|
|
if (CMAKE_CXX_COMPILER_ID MATCHES "Clang" OR
|
|
|
|
CMAKE_CXX_COMPILER_ID STREQUAL "GNU")
|
|
|
|
add_compile_options(-gsplit-dwarf)
|
|
|
|
endif()
|
2013-07-31 05:44:10 +08:00
|
|
|
endif()
|
|
|
|
|
2017-03-21 12:03:24 +08:00
|
|
|
add_definitions( -D__STDC_CONSTANT_MACROS )
|
|
|
|
add_definitions( -D__STDC_FORMAT_MACROS )
|
|
|
|
add_definitions( -D__STDC_LIMIT_MACROS )
|
2013-05-30 04:41:35 +08:00
|
|
|
|
2018-05-19 10:36:27 +08:00
|
|
|
# clang and gcc don't default-print colored diagnostics when invoked from Ninja.
|
2013-06-15 03:41:05 +08:00
|
|
|
if (UNIX AND
|
2018-05-19 10:36:27 +08:00
|
|
|
CMAKE_GENERATOR STREQUAL "Ninja" AND
|
|
|
|
(CMAKE_CXX_COMPILER_ID MATCHES "Clang" OR
|
|
|
|
(CMAKE_CXX_COMPILER_ID STREQUAL "GNU" AND
|
|
|
|
NOT (CMAKE_CXX_COMPILER_VERSION VERSION_LESS 4.9))))
|
|
|
|
append("-fdiagnostics-color" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
2013-05-30 04:41:35 +08:00
|
|
|
endif()
|
2014-01-28 17:43:55 +08:00
|
|
|
|
2017-01-12 06:55:35 +08:00
|
|
|
# lld doesn't print colored diagnostics when invoked from Ninja
|
2018-04-17 05:57:10 +08:00
|
|
|
if (UNIX AND CMAKE_GENERATOR STREQUAL "Ninja")
|
2017-01-12 06:55:35 +08:00
|
|
|
include(CheckLinkerFlag)
|
2017-07-13 05:37:02 +08:00
|
|
|
check_linker_flag("-Wl,--color-diagnostics" LINKER_SUPPORTS_COLOR_DIAGNOSTICS)
|
|
|
|
append_if(LINKER_SUPPORTS_COLOR_DIAGNOSTICS "-Wl,--color-diagnostics"
|
2017-01-12 06:55:35 +08:00
|
|
|
CMAKE_EXE_LINKER_FLAGS CMAKE_MODULE_LINKER_FLAGS CMAKE_SHARED_LINKER_FLAGS)
|
|
|
|
endif()
|
|
|
|
|
2014-01-28 17:43:55 +08:00
|
|
|
# Add flags for add_dead_strip().
|
|
|
|
# FIXME: With MSVS, consider compiling with /Gy and linking with /OPT:REF?
|
|
|
|
# But MinSizeRel seems to add that automatically, so maybe disable these
|
2019-10-31 02:56:20 +08:00
|
|
|
# flags instead if LLVM_NO_DEAD_STRIP is set.
|
2014-01-28 17:43:55 +08:00
|
|
|
if(NOT CYGWIN AND NOT WIN32)
|
2015-04-06 22:34:43 +08:00
|
|
|
if(NOT ${CMAKE_SYSTEM_NAME} MATCHES "Darwin" AND
|
|
|
|
NOT uppercase_CMAKE_BUILD_TYPE STREQUAL "DEBUG")
|
2014-02-04 16:15:46 +08:00
|
|
|
check_c_compiler_flag("-Werror -fno-function-sections" C_SUPPORTS_FNO_FUNCTION_SECTIONS)
|
|
|
|
if (C_SUPPORTS_FNO_FUNCTION_SECTIONS)
|
2020-01-15 23:42:12 +08:00
|
|
|
# Don't add -ffunction-sections if it can't be disabled with -fno-function-sections.
|
2014-02-04 16:15:46 +08:00
|
|
|
# Doing so will break sanitizers.
|
2014-07-09 11:38:19 +08:00
|
|
|
add_flag_if_supported("-ffunction-sections" FFUNCTION_SECTIONS)
|
2020-01-15 23:42:12 +08:00
|
|
|
elseif (CMAKE_CXX_COMPILER_ID MATCHES "XL")
|
|
|
|
append("-qfuncsect" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
2014-02-03 21:57:09 +08:00
|
|
|
endif()
|
2014-07-09 11:38:19 +08:00
|
|
|
add_flag_if_supported("-fdata-sections" FDATA_SECTIONS)
|
2014-01-28 17:43:55 +08:00
|
|
|
endif()
|
[windows] Add /Gw to compiler flags
This is like -fdata-sections, and it's not part of /O2 by default for some reason.
In the cmake build, reduces the size of clang.exe from 70,358,016 bytes to 69,982,720 bytes.
clang-format.exe goes from 3,703,296 bytes to 3,331,072 bytes.
Differential Revision: https://reviews.llvm.org/D74573
2020-02-15 04:15:00 +08:00
|
|
|
elseif(MSVC)
|
|
|
|
if( NOT uppercase_CMAKE_BUILD_TYPE STREQUAL "DEBUG" )
|
|
|
|
append("/Gw" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
|
|
|
endif()
|
2014-01-28 17:43:55 +08:00
|
|
|
endif()
|
2014-01-28 17:44:06 +08:00
|
|
|
|
|
|
|
if(MSVC)
|
|
|
|
# Remove flags here, for exceptions and RTTI.
|
2014-02-01 01:32:36 +08:00
|
|
|
# Each target property or source property should be responsible to control
|
|
|
|
# them.
|
2014-01-28 17:44:06 +08:00
|
|
|
# CL.EXE complains to override flags like "/GR /GR-".
|
|
|
|
string(REGEX REPLACE "(^| ) */EH[-cs]+ *( |$)" "\\1 \\2" CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS}")
|
|
|
|
string(REGEX REPLACE "(^| ) */GR-? *( |$)" "\\1 \\2" CMAKE_CXX_FLAGS "${CMAKE_CXX_FLAGS}")
|
|
|
|
endif()
|
2014-07-04 12:45:40 +08:00
|
|
|
|
2014-07-22 23:41:18 +08:00
|
|
|
# Provide public options to globally control RTTI and EH
|
|
|
|
option(LLVM_ENABLE_EH "Enable Exception handling" OFF)
|
|
|
|
option(LLVM_ENABLE_RTTI "Enable run time type information" OFF)
|
|
|
|
if(LLVM_ENABLE_EH AND NOT LLVM_ENABLE_RTTI)
|
|
|
|
message(FATAL_ERROR "Exception handling requires RTTI. You must set LLVM_ENABLE_RTTI to ON")
|
|
|
|
endif()
|
|
|
|
|
2019-02-09 03:31:03 +08:00
|
|
|
option(LLVM_USE_NEWPM "Build LLVM using the experimental new pass manager" Off)
|
|
|
|
mark_as_advanced(LLVM_USE_NEWPM)
|
|
|
|
if (LLVM_USE_NEWPM)
|
|
|
|
append("-fexperimental-new-pass-manager"
|
|
|
|
CMAKE_CXX_FLAGS
|
|
|
|
CMAKE_C_FLAGS
|
|
|
|
CMAKE_EXE_LINKER_FLAGS
|
|
|
|
CMAKE_SHARED_LINKER_FLAGS)
|
|
|
|
endif()
|
|
|
|
|
2017-11-09 05:26:40 +08:00
|
|
|
option(LLVM_ENABLE_IR_PGO "Build LLVM and tools with IR PGO instrumentation (deprecated)" Off)
|
2017-09-21 01:16:01 +08:00
|
|
|
mark_as_advanced(LLVM_ENABLE_IR_PGO)
|
|
|
|
|
2017-11-09 05:26:40 +08:00
|
|
|
set(LLVM_BUILD_INSTRUMENTED OFF CACHE STRING "Build LLVM and tools with PGO instrumentation. May be specified as IR or Frontend")
|
2015-12-11 05:19:07 +08:00
|
|
|
mark_as_advanced(LLVM_BUILD_INSTRUMENTED)
|
2017-11-09 05:26:40 +08:00
|
|
|
string(TOUPPER "${LLVM_BUILD_INSTRUMENTED}" uppercase_LLVM_BUILD_INSTRUMENTED)
|
2017-09-21 01:16:01 +08:00
|
|
|
|
|
|
|
if (LLVM_BUILD_INSTRUMENTED)
|
2017-11-09 05:26:40 +08:00
|
|
|
if (LLVM_ENABLE_IR_PGO OR uppercase_LLVM_BUILD_INSTRUMENTED STREQUAL "IR")
|
2019-09-18 17:43:13 +08:00
|
|
|
append("-fprofile-generate=\"${LLVM_PROFILE_DATA_DIR}\""
|
2017-09-21 01:16:01 +08:00
|
|
|
CMAKE_CXX_FLAGS
|
2019-09-18 17:43:13 +08:00
|
|
|
CMAKE_C_FLAGS)
|
|
|
|
if(NOT LINKER_IS_LLD_LINK)
|
|
|
|
append("-fprofile-generate=\"${LLVM_PROFILE_DATA_DIR}\""
|
|
|
|
CMAKE_EXE_LINKER_FLAGS
|
|
|
|
CMAKE_SHARED_LINKER_FLAGS)
|
|
|
|
endif()
|
2019-03-07 03:31:37 +08:00
|
|
|
elseif(uppercase_LLVM_BUILD_INSTRUMENTED STREQUAL "CSIR")
|
2019-09-18 17:43:13 +08:00
|
|
|
append("-fcs-profile-generate=\"${LLVM_CSPROFILE_DATA_DIR}\""
|
2019-03-07 03:31:37 +08:00
|
|
|
CMAKE_CXX_FLAGS
|
2019-09-18 17:43:13 +08:00
|
|
|
CMAKE_C_FLAGS)
|
|
|
|
if(NOT LINKER_IS_LLD_LINK)
|
|
|
|
append("-fcs-profile-generate=\"${LLVM_CSPROFILE_DATA_DIR}\""
|
|
|
|
CMAKE_EXE_LINKER_FLAGS
|
|
|
|
CMAKE_SHARED_LINKER_FLAGS)
|
|
|
|
endif()
|
2017-09-21 01:16:01 +08:00
|
|
|
else()
|
2019-09-18 17:43:13 +08:00
|
|
|
append("-fprofile-instr-generate=\"${LLVM_PROFILE_FILE_PATTERN}\""
|
2017-09-21 01:16:01 +08:00
|
|
|
CMAKE_CXX_FLAGS
|
2019-09-18 17:43:13 +08:00
|
|
|
CMAKE_C_FLAGS)
|
|
|
|
if(NOT LINKER_IS_LLD_LINK)
|
|
|
|
append("-fprofile-instr-generate=\"${LLVM_PROFILE_FILE_PATTERN}\""
|
|
|
|
CMAKE_EXE_LINKER_FLAGS
|
|
|
|
CMAKE_SHARED_LINKER_FLAGS)
|
|
|
|
endif()
|
2017-09-21 01:16:01 +08:00
|
|
|
endif()
|
|
|
|
endif()
|
2016-06-14 07:33:48 +08:00
|
|
|
|
[Windows] Autolink with basenames and add libdir to libpath
Prior to this change, for a few compiler-rt libraries such as ubsan and
the profile library, Clang would embed "-defaultlib:path/to/rt-arch.lib"
into the .drective section of every object compiled with
-finstr-profile-generate or -fsanitize=ubsan as appropriate.
These paths assume that the link step will run from the same working
directory as the compile step. There is also evidence that sometimes the
paths become absolute, such as when clang is run from a different drive
letter from the current working directory. This is fragile, and I'd like
to get away from having paths embedded in the object if possible. Long
ago it was suggested that we use this for ASan, and apparently I felt
the same way back then:
https://reviews.llvm.org/D4428#56536
This is also consistent with how all other autolinking usage works for
PS4, Mac, and Windows: they all use basenames, not paths.
To keep things working for people using the standard GCC driver
workflow, the driver now adds the resource directory to the linker
library search path when it calls the linker. This is enough to make
check-ubsan pass, and seems like a generally good thing.
Users that invoke the linker directly (most clang-cl users) will have to
add clang's resource library directory to their linker search path in
their build system. I'm not sure where I can document this. Ideally I'd
also do it in the MSBuild files, but I can't figure out where they go.
I'd like to start with this for now.
Reviewed By: hans
Differential Revision: https://reviews.llvm.org/D65543
2019-08-01 05:52:00 +08:00
|
|
|
# When using clang-cl with an instrumentation-based tool, add clang's library
|
|
|
|
# resource directory to the library search path. Because cmake invokes the
|
|
|
|
# linker directly, it isn't sufficient to pass -fsanitize=* to the linker.
|
|
|
|
if (CLANG_CL AND (LLVM_BUILD_INSTRUMENTED OR LLVM_USE_SANITIZER))
|
|
|
|
execute_process(
|
|
|
|
COMMAND ${CMAKE_CXX_COMPILER} /clang:-print-resource-dir
|
|
|
|
OUTPUT_VARIABLE clang_resource_dir
|
|
|
|
ERROR_VARIABLE clang_cl_stderr
|
|
|
|
OUTPUT_STRIP_TRAILING_WHITESPACE
|
|
|
|
ERROR_STRIP_TRAILING_WHITESPACE
|
|
|
|
RESULT_VARIABLE clang_cl_exit_code)
|
|
|
|
if (NOT "${clang_cl_exit_code}" STREQUAL "0")
|
|
|
|
message(FATAL_ERROR
|
|
|
|
"Unable to invoke clang-cl to find resource dir: ${clang_cl_stderr}")
|
|
|
|
endif()
|
|
|
|
file(TO_CMAKE_PATH "${clang_resource_dir}" clang_resource_dir)
|
|
|
|
append("/libpath:${clang_resource_dir}/lib/windows"
|
|
|
|
CMAKE_EXE_LINKER_FLAGS
|
2020-07-01 22:17:00 +08:00
|
|
|
CMAKE_MODULE_LINKER_FLAGS
|
[Windows] Autolink with basenames and add libdir to libpath
Prior to this change, for a few compiler-rt libraries such as ubsan and
the profile library, Clang would embed "-defaultlib:path/to/rt-arch.lib"
into the .drective section of every object compiled with
-finstr-profile-generate or -fsanitize=ubsan as appropriate.
These paths assume that the link step will run from the same working
directory as the compile step. There is also evidence that sometimes the
paths become absolute, such as when clang is run from a different drive
letter from the current working directory. This is fragile, and I'd like
to get away from having paths embedded in the object if possible. Long
ago it was suggested that we use this for ASan, and apparently I felt
the same way back then:
https://reviews.llvm.org/D4428#56536
This is also consistent with how all other autolinking usage works for
PS4, Mac, and Windows: they all use basenames, not paths.
To keep things working for people using the standard GCC driver
workflow, the driver now adds the resource directory to the linker
library search path when it calls the linker. This is enough to make
check-ubsan pass, and seems like a generally good thing.
Users that invoke the linker directly (most clang-cl users) will have to
add clang's resource library directory to their linker search path in
their build system. I'm not sure where I can document this. Ideally I'd
also do it in the MSBuild files, but I can't figure out where they go.
I'd like to start with this for now.
Reviewed By: hans
Differential Revision: https://reviews.llvm.org/D65543
2019-08-01 05:52:00 +08:00
|
|
|
CMAKE_SHARED_LINKER_FLAGS)
|
|
|
|
endif()
|
|
|
|
|
2019-03-07 03:31:37 +08:00
|
|
|
if(LLVM_PROFDATA_FILE AND EXISTS ${LLVM_PROFDATA_FILE})
|
2019-09-18 17:43:13 +08:00
|
|
|
if ("${CMAKE_CXX_COMPILER_ID}" MATCHES "Clang" )
|
|
|
|
append("-fprofile-instr-use=\"${LLVM_PROFDATA_FILE}\""
|
|
|
|
CMAKE_CXX_FLAGS
|
|
|
|
CMAKE_C_FLAGS)
|
|
|
|
if(NOT LINKER_IS_LLD_LINK)
|
|
|
|
append("-fprofile-instr-use=\"${LLVM_PROFDATA_FILE}\""
|
|
|
|
CMAKE_EXE_LINKER_FLAGS
|
|
|
|
CMAKE_SHARED_LINKER_FLAGS)
|
|
|
|
endif()
|
|
|
|
else()
|
|
|
|
message(FATAL_ERROR "LLVM_PROFDATA_FILE can only be specified when compiling with clang")
|
|
|
|
endif()
|
2019-03-07 03:31:37 +08:00
|
|
|
endif()
|
|
|
|
|
2017-09-21 01:16:00 +08:00
|
|
|
option(LLVM_BUILD_INSTRUMENTED_COVERAGE "Build LLVM and tools with Code Coverage instrumentation" Off)
|
2016-06-14 07:33:48 +08:00
|
|
|
mark_as_advanced(LLVM_BUILD_INSTRUMENTED_COVERAGE)
|
2019-09-25 07:56:22 +08:00
|
|
|
append_if(LLVM_BUILD_INSTRUMENTED_COVERAGE "-fprofile-instr-generate=\"${LLVM_PROFILE_FILE_PATTERN}\" -fcoverage-mapping"
|
2015-12-11 05:19:07 +08:00
|
|
|
CMAKE_CXX_FLAGS
|
|
|
|
CMAKE_C_FLAGS
|
|
|
|
CMAKE_EXE_LINKER_FLAGS
|
|
|
|
CMAKE_SHARED_LINKER_FLAGS)
|
|
|
|
|
2017-11-09 05:26:40 +08:00
|
|
|
if (LLVM_BUILD_INSTRUMENTED AND LLVM_BUILD_INSTRUMENTED_COVERAGE)
|
|
|
|
message(FATAL_ERROR "LLVM_BUILD_INSTRUMENTED and LLVM_BUILD_INSTRUMENTED_COVERAGE cannot both be specified")
|
|
|
|
endif()
|
|
|
|
|
2020-05-25 15:28:17 +08:00
|
|
|
if(LLVM_ENABLE_LTO AND LLVM_ON_WIN32 AND NOT LINKER_IS_LLD_LINK AND NOT MINGW)
|
2017-03-02 03:22:18 +08:00
|
|
|
message(FATAL_ERROR "When compiling for Windows, LLVM_ENABLE_LTO requires using lld as the linker (point CMAKE_LINKER at lld-link.exe)")
|
|
|
|
endif()
|
2016-02-09 05:01:24 +08:00
|
|
|
if(uppercase_LLVM_ENABLE_LTO STREQUAL "THIN")
|
2017-03-02 03:22:18 +08:00
|
|
|
append("-flto=thin" CMAKE_CXX_FLAGS CMAKE_C_FLAGS)
|
|
|
|
if(NOT LINKER_IS_LLD_LINK)
|
|
|
|
append("-flto=thin" CMAKE_EXE_LINKER_FLAGS CMAKE_SHARED_LINKER_FLAGS)
|
|
|
|
endif()
|
2017-03-16 00:28:43 +08:00
|
|
|
# If the linker supports it, enable the lto cache. This improves initial build
|
|
|
|
# time a little since we re-link a lot of the same objects, and significantly
|
|
|
|
# improves incremental build time.
|
|
|
|
# FIXME: We should move all this logic into the clang driver.
|
|
|
|
if(APPLE)
|
|
|
|
append("-Wl,-cache_path_lto,${PROJECT_BINARY_DIR}/lto.cache"
|
|
|
|
CMAKE_EXE_LINKER_FLAGS CMAKE_SHARED_LINKER_FLAGS)
|
2020-05-25 15:28:17 +08:00
|
|
|
elseif((UNIX OR MINGW) AND LLVM_USE_LINKER STREQUAL "lld")
|
2017-03-16 00:28:43 +08:00
|
|
|
append("-Wl,--thinlto-cache-dir=${PROJECT_BINARY_DIR}/lto.cache"
|
|
|
|
CMAKE_EXE_LINKER_FLAGS CMAKE_SHARED_LINKER_FLAGS)
|
|
|
|
elseif(LLVM_USE_LINKER STREQUAL "gold")
|
|
|
|
append("-Wl,--plugin-opt,cache-dir=${PROJECT_BINARY_DIR}/lto.cache"
|
|
|
|
CMAKE_EXE_LINKER_FLAGS CMAKE_SHARED_LINKER_FLAGS)
|
2019-11-08 18:46:24 +08:00
|
|
|
elseif(LINKER_IS_LLD_LINK)
|
|
|
|
append("/lldltocache:${PROJECT_BINARY_DIR}/lto.cache"
|
|
|
|
CMAKE_EXE_LINKER_FLAGS CMAKE_SHARED_LINKER_FLAGS)
|
2017-03-16 00:28:43 +08:00
|
|
|
endif()
|
2016-02-09 05:01:24 +08:00
|
|
|
elseif(uppercase_LLVM_ENABLE_LTO STREQUAL "FULL")
|
2017-03-02 03:22:18 +08:00
|
|
|
append("-flto=full" CMAKE_CXX_FLAGS CMAKE_C_FLAGS)
|
|
|
|
if(NOT LINKER_IS_LLD_LINK)
|
|
|
|
append("-flto=full" CMAKE_EXE_LINKER_FLAGS CMAKE_SHARED_LINKER_FLAGS)
|
|
|
|
endif()
|
2016-02-09 05:01:24 +08:00
|
|
|
elseif(LLVM_ENABLE_LTO)
|
2017-03-02 03:22:18 +08:00
|
|
|
append("-flto" CMAKE_CXX_FLAGS CMAKE_C_FLAGS)
|
|
|
|
if(NOT LINKER_IS_LLD_LINK)
|
|
|
|
append("-flto" CMAKE_EXE_LINKER_FLAGS CMAKE_SHARED_LINKER_FLAGS)
|
|
|
|
endif()
|
2016-02-09 05:01:24 +08:00
|
|
|
endif()
|
2016-02-04 15:28:30 +08:00
|
|
|
|
2020-05-09 01:45:44 +08:00
|
|
|
# Set an AIX default for LLVM_EXPORT_SYMBOLS_FOR_PLUGINS based on whether we are
|
|
|
|
# doing dynamic linking (see below).
|
|
|
|
set(LLVM_EXPORT_SYMBOLS_FOR_PLUGINS_AIX_default OFF)
|
|
|
|
if (NOT (BUILD_SHARED_LIBS OR LLVM_LINK_LLVM_DYLIB))
|
|
|
|
set(LLVM_EXPORT_SYMBOLS_FOR_PLUGINS_AIX_default ON)
|
|
|
|
endif()
|
|
|
|
|
2016-05-26 19:16:43 +08:00
|
|
|
# This option makes utils/extract_symbols.py be used to determine the list of
|
2020-05-09 01:45:44 +08:00
|
|
|
# symbols to export from LLVM tools. This is necessary when on AIX or when using
|
|
|
|
# MSVC if you want to allow plugins. On AIX we don't show this option, and we
|
|
|
|
# enable it by default except when the LLVM libraries are set up for dynamic
|
|
|
|
# linking (due to incompatibility). With MSVC, note that the plugin has to
|
|
|
|
# explicitly link against (exactly one) tool so we can't unilaterally turn on
|
2016-05-26 19:16:43 +08:00
|
|
|
# LLVM_ENABLE_PLUGINS when it's enabled.
|
2020-05-09 01:45:44 +08:00
|
|
|
CMAKE_DEPENDENT_OPTION(LLVM_EXPORT_SYMBOLS_FOR_PLUGINS
|
|
|
|
"Export symbols from LLVM tools so that plugins can import them" OFF
|
|
|
|
"NOT ${CMAKE_SYSTEM_NAME} MATCHES AIX" ${LLVM_EXPORT_SYMBOLS_FOR_PLUGINS_AIX_default})
|
2016-05-26 19:16:43 +08:00
|
|
|
if(BUILD_SHARED_LIBS AND LLVM_EXPORT_SYMBOLS_FOR_PLUGINS)
|
|
|
|
message(FATAL_ERROR "BUILD_SHARED_LIBS not compatible with LLVM_EXPORT_SYMBOLS_FOR_PLUGINS")
|
|
|
|
endif()
|
|
|
|
if(LLVM_LINK_LLVM_DYLIB AND LLVM_EXPORT_SYMBOLS_FOR_PLUGINS)
|
|
|
|
message(FATAL_ERROR "LLVM_LINK_LLVM_DYLIB not compatible with LLVM_EXPORT_SYMBOLS_FOR_PLUGINS")
|
|
|
|
endif()
|
|
|
|
|
2018-10-16 05:14:19 +08:00
|
|
|
# By default we should enable LLVM_ENABLE_IDE only for multi-configuration
|
|
|
|
# generators. This option disables optional build system features that make IDEs
|
|
|
|
# less usable.
|
|
|
|
set(LLVM_ENABLE_IDE_default OFF)
|
|
|
|
if (CMAKE_CONFIGURATION_TYPES)
|
|
|
|
set(LLVM_ENABLE_IDE_default ON)
|
|
|
|
endif()
|
|
|
|
option(LLVM_ENABLE_IDE
|
|
|
|
"Disable optional build system features that cause problems for IDE generators"
|
|
|
|
${LLVM_ENABLE_IDE_default})
|
|
|
|
if (CMAKE_CONFIGURATION_TYPES AND NOT LLVM_ENABLE_IDE)
|
|
|
|
message(WARNING "Disabling LLVM_ENABLE_IDE on multi-configuration generators is not recommended.")
|
|
|
|
endif()
|
2018-01-12 12:01:41 +08:00
|
|
|
|
2017-03-21 12:03:24 +08:00
|
|
|
function(get_compile_definitions)
|
|
|
|
get_directory_property(top_dir_definitions DIRECTORY ${CMAKE_SOURCE_DIR} COMPILE_DEFINITIONS)
|
|
|
|
foreach(definition ${top_dir_definitions})
|
|
|
|
if(DEFINED result)
|
|
|
|
string(APPEND result " -D${definition}")
|
|
|
|
else()
|
|
|
|
set(result "-D${definition}")
|
|
|
|
endif()
|
|
|
|
endforeach()
|
|
|
|
set(LLVM_DEFINITIONS "${result}" PARENT_SCOPE)
|
|
|
|
endfunction()
|
|
|
|
get_compile_definitions()
|
2018-03-06 03:38:16 +08:00
|
|
|
|
2018-03-08 03:32:36 +08:00
|
|
|
option(LLVM_FORCE_ENABLE_STATS "Enable statistics collection for builds that wouldn't normally enable it" OFF)
|
2019-02-20 02:18:31 +08:00
|
|
|
|
2019-02-20 03:45:03 +08:00
|
|
|
check_symbol_exists(os_signpost_interval_begin "os/signpost.h" macos_signposts_available)
|
|
|
|
if(macos_signposts_available)
|
|
|
|
check_cxx_source_compiles(
|
|
|
|
"#include <os/signpost.h>
|
|
|
|
int main() { os_signpost_interval_begin(nullptr, 0, \"\", \"\"); return 0; }"
|
|
|
|
macos_signposts_usable)
|
|
|
|
if(macos_signposts_usable)
|
|
|
|
set(LLVM_ENABLE_SUPPORT_XCODE_SIGNPOSTS "WITH_ASSERTS" CACHE STRING
|
|
|
|
"Enable support for Xcode signposts. Can be WITH_ASSERTS, FORCE_ON, FORCE_OFF")
|
|
|
|
string(TOUPPER "${LLVM_ENABLE_SUPPORT_XCODE_SIGNPOSTS}"
|
|
|
|
uppercase_LLVM_ENABLE_SUPPORT_XCODE_SIGNPOSTS)
|
|
|
|
if( uppercase_LLVM_ENABLE_SUPPORT_XCODE_SIGNPOSTS STREQUAL "WITH_ASSERTS" )
|
|
|
|
if( LLVM_ENABLE_ASSERTIONS )
|
|
|
|
set( LLVM_SUPPORT_XCODE_SIGNPOSTS 1 )
|
|
|
|
endif()
|
|
|
|
elseif( uppercase_LLVM_ENABLE_SUPPORT_XCODE_SIGNPOSTS STREQUAL "FORCE_ON" )
|
2019-02-20 02:18:31 +08:00
|
|
|
set( LLVM_SUPPORT_XCODE_SIGNPOSTS 1 )
|
2019-02-20 03:45:03 +08:00
|
|
|
elseif( uppercase_LLVM_ENABLE_SUPPORT_XCODE_SIGNPOSTS STREQUAL "FORCE_OFF" )
|
|
|
|
# We don't need to do anything special to turn off signposts.
|
|
|
|
elseif( NOT DEFINED LLVM_ENABLE_SUPPORT_XCODE_SIGNPOSTS )
|
|
|
|
# Treat LLVM_ENABLE_SUPPORT_XCODE_SIGNPOSTS like "FORCE_OFF" when it has not been
|
|
|
|
# defined.
|
|
|
|
else()
|
|
|
|
message(FATAL_ERROR "Unknown value for LLVM_ENABLE_SUPPORT_XCODE_SIGNPOSTS:"
|
|
|
|
" \"${LLVM_ENABLE_SUPPORT_XCODE_SIGNPOSTS}\"!")
|
2019-02-20 02:18:31 +08:00
|
|
|
endif()
|
|
|
|
endif()
|
|
|
|
endif()
|
2019-05-31 09:34:51 +08:00
|
|
|
|
2020-03-12 01:59:12 +08:00
|
|
|
set(LLVM_SOURCE_PREFIX "" CACHE STRING "Use prefix for sources")
|
|
|
|
|
2019-05-31 09:34:51 +08:00
|
|
|
option(LLVM_USE_RELATIVE_PATHS_IN_DEBUG_INFO "Use relative paths in debug info" OFF)
|
|
|
|
|
|
|
|
if(LLVM_USE_RELATIVE_PATHS_IN_DEBUG_INFO)
|
|
|
|
check_c_compiler_flag("-fdebug-prefix-map=foo=bar" SUPPORTS_FDEBUG_PREFIX_MAP)
|
|
|
|
if(LLVM_ENABLE_PROJECTS_USED)
|
|
|
|
get_filename_component(source_root "${LLVM_MAIN_SRC_DIR}/.." ABSOLUTE)
|
|
|
|
else()
|
|
|
|
set(source_root "${LLVM_MAIN_SRC_DIR}")
|
|
|
|
endif()
|
|
|
|
file(RELATIVE_PATH relative_root "${source_root}" "${CMAKE_BINARY_DIR}")
|
|
|
|
append_if(SUPPORTS_FDEBUG_PREFIX_MAP "-fdebug-prefix-map=${CMAKE_BINARY_DIR}=${relative_root}" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
|
|
|
append_if(SUPPORTS_FDEBUG_PREFIX_MAP "-fdebug-prefix-map=${source_root}/=${LLVM_SOURCE_PREFIX}" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
|
|
|
add_flag_if_supported("-no-canonical-prefixes" NO_CANONICAL_PREFIXES)
|
|
|
|
endif()
|
2020-03-12 01:59:12 +08:00
|
|
|
|
|
|
|
option(LLVM_USE_RELATIVE_PATHS_IN_FILES "Use relative paths in sources and debug info" OFF)
|
|
|
|
|
|
|
|
if(LLVM_USE_RELATIVE_PATHS_IN_FILES)
|
|
|
|
check_c_compiler_flag("-ffile-prefix-map=foo=bar" SUPPORTS_FFILE_PREFIX_MAP)
|
|
|
|
if(LLVM_ENABLE_PROJECTS_USED)
|
|
|
|
get_filename_component(source_root "${LLVM_MAIN_SRC_DIR}/.." ABSOLUTE)
|
|
|
|
else()
|
|
|
|
set(source_root "${LLVM_MAIN_SRC_DIR}")
|
|
|
|
endif()
|
|
|
|
file(RELATIVE_PATH relative_root "${source_root}" "${CMAKE_BINARY_DIR}")
|
|
|
|
append_if(SUPPORTS_FFILE_PREFIX_MAP "-ffile-prefix-map=${CMAKE_BINARY_DIR}=${relative_root}" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
|
|
|
append_if(SUPPORTS_FFILE_PREFIX_MAP "-ffile-prefix-map=${source_root}/=${LLVM_SOURCE_PREFIX}" CMAKE_C_FLAGS CMAKE_CXX_FLAGS)
|
|
|
|
add_flag_if_supported("-no-canonical-prefixes" NO_CANONICAL_PREFIXES)
|
|
|
|
endif()
|