forked from OSchip/llvm-project
Remove unnecessary calls to MakeArgString.
llvm-svn: 302590
This commit is contained in:
parent
c936ac7f37
commit
b86ca11b57
|
@ -633,7 +633,7 @@ void SanitizerArgs::addArgs(const ToolChain &TC, const llvm::opt::ArgList &Args,
|
|||
std::make_pair(CoverageNoPrune, "-fsanitize-coverage-no-prune")};
|
||||
for (auto F : CoverageFlags) {
|
||||
if (CoverageFeatures & F.first)
|
||||
CmdArgs.push_back(Args.MakeArgString(F.second));
|
||||
CmdArgs.push_back(F.second);
|
||||
}
|
||||
|
||||
if (TC.getTriple().isOSWindows() && needsUbsanRt()) {
|
||||
|
@ -686,7 +686,7 @@ void SanitizerArgs::addArgs(const ToolChain &TC, const llvm::opt::ArgList &Args,
|
|||
llvm::utostr(MsanTrackOrigins)));
|
||||
|
||||
if (MsanUseAfterDtor)
|
||||
CmdArgs.push_back(Args.MakeArgString("-fsanitize-memory-use-after-dtor"));
|
||||
CmdArgs.push_back("-fsanitize-memory-use-after-dtor");
|
||||
|
||||
// FIXME: Pass these parameters as function attributes, not as -llvm flags.
|
||||
if (!TsanMemoryAccess) {
|
||||
|
@ -705,17 +705,17 @@ void SanitizerArgs::addArgs(const ToolChain &TC, const llvm::opt::ArgList &Args,
|
|||
}
|
||||
|
||||
if (CfiCrossDso)
|
||||
CmdArgs.push_back(Args.MakeArgString("-fsanitize-cfi-cross-dso"));
|
||||
CmdArgs.push_back("-fsanitize-cfi-cross-dso");
|
||||
|
||||
if (Stats)
|
||||
CmdArgs.push_back(Args.MakeArgString("-fsanitize-stats"));
|
||||
CmdArgs.push_back("-fsanitize-stats");
|
||||
|
||||
if (AsanFieldPadding)
|
||||
CmdArgs.push_back(Args.MakeArgString("-fsanitize-address-field-padding=" +
|
||||
llvm::utostr(AsanFieldPadding)));
|
||||
|
||||
if (AsanUseAfterScope)
|
||||
CmdArgs.push_back(Args.MakeArgString("-fsanitize-address-use-after-scope"));
|
||||
CmdArgs.push_back("-fsanitize-address-use-after-scope");
|
||||
|
||||
// MSan: Workaround for PR16386.
|
||||
// ASan: This is mainly to help LSan with cases such as
|
||||
|
@ -723,7 +723,7 @@ void SanitizerArgs::addArgs(const ToolChain &TC, const llvm::opt::ArgList &Args,
|
|||
// We can't make this conditional on -fsanitize=leak, as that flag shouldn't
|
||||
// affect compilation.
|
||||
if (Sanitizers.has(Memory) || Sanitizers.has(Address))
|
||||
CmdArgs.push_back(Args.MakeArgString("-fno-assume-sane-operator-new"));
|
||||
CmdArgs.push_back("-fno-assume-sane-operator-new");
|
||||
|
||||
// Require -fvisibility= flag on non-Windows when compiling if vptr CFI is
|
||||
// enabled.
|
||||
|
|
|
@ -282,18 +282,18 @@ void mips::getMIPSTargetFeatures(const Driver &D, const llvm::Triple &Triple,
|
|||
if (Arg *A = Args.getLastArg(options::OPT_mfp32, options::OPT_mfpxx,
|
||||
options::OPT_mfp64)) {
|
||||
if (A->getOption().matches(options::OPT_mfp32))
|
||||
Features.push_back(Args.MakeArgString("-fp64"));
|
||||
Features.push_back("-fp64");
|
||||
else if (A->getOption().matches(options::OPT_mfpxx)) {
|
||||
Features.push_back(Args.MakeArgString("+fpxx"));
|
||||
Features.push_back(Args.MakeArgString("+nooddspreg"));
|
||||
Features.push_back("+fpxx");
|
||||
Features.push_back("+nooddspreg");
|
||||
} else
|
||||
Features.push_back(Args.MakeArgString("+fp64"));
|
||||
Features.push_back("+fp64");
|
||||
} else if (mips::shouldUseFPXX(Args, Triple, CPUName, ABIName, FloatABI)) {
|
||||
Features.push_back(Args.MakeArgString("+fpxx"));
|
||||
Features.push_back(Args.MakeArgString("+nooddspreg"));
|
||||
Features.push_back("+fpxx");
|
||||
Features.push_back("+nooddspreg");
|
||||
} else if (mips::isFP64ADefault(Triple, CPUName)) {
|
||||
Features.push_back(Args.MakeArgString("+fp64"));
|
||||
Features.push_back(Args.MakeArgString("+nooddspreg"));
|
||||
Features.push_back("+fp64");
|
||||
Features.push_back("+nooddspreg");
|
||||
}
|
||||
|
||||
AddTargetFeature(Args, Features, options::OPT_mno_odd_spreg,
|
||||
|
|
Loading…
Reference in New Issue