3742 lines
145 KiB
Rust
3742 lines
145 KiB
Rust
//! [Flexible target specification.](https://github.com/rust-lang/rfcs/pull/131)
|
|
//!
|
|
//! Rust targets a wide variety of usecases, and in the interest of flexibility,
|
|
//! allows new target tuples to be defined in configuration files. Most users
|
|
//! will not need to care about these, but this is invaluable when porting Rust
|
|
//! to a new platform, and allows for an unprecedented level of control over how
|
|
//! the compiler works.
|
|
//!
|
|
//! # Using custom targets
|
|
//!
|
|
//! A target tuple, as passed via `rustc --target=TUPLE`, will first be
|
|
//! compared against the list of built-in targets. This is to ease distributing
|
|
//! rustc (no need for configuration files) and also to hold these built-in
|
|
//! targets as immutable and sacred. If `TUPLE` is not one of the built-in
|
|
//! targets, rustc will check if a file named `TUPLE` exists. If it does, it
|
|
//! will be loaded as the target configuration. If the file does not exist,
|
|
//! rustc will search each directory in the environment variable
|
|
//! `RUST_TARGET_PATH` for a file named `TUPLE.json`. The first one found will
|
|
//! be loaded. If no file is found in any of those directories, a fatal error
|
|
//! will be given.
|
|
//!
|
|
//! Projects defining their own targets should use
|
|
//! `--target=path/to/my-awesome-platform.json` instead of adding to
|
|
//! `RUST_TARGET_PATH`.
|
|
//!
|
|
//! # Defining a new target
|
|
//!
|
|
//! Targets are defined using [JSON](https://json.org/). The `Target` struct in
|
|
//! this module defines the format the JSON file should take, though each
|
|
//! underscore in the field names should be replaced with a hyphen (`-`) in the
|
|
//! JSON file. Some fields are required in every target specification, such as
|
|
//! `llvm-target`, `target-endian`, `target-pointer-width`, `data-layout`,
|
|
//! `arch`, and `os`. In general, options passed to rustc with `-C` override
|
|
//! the target's settings, though `target-feature` and `link-args` will *add*
|
|
//! to the list specified by the target, rather than replace.
|
|
|
|
use std::borrow::Cow;
|
|
use std::collections::BTreeMap;
|
|
use std::hash::{Hash, Hasher};
|
|
use std::ops::{Deref, DerefMut};
|
|
use std::path::{Path, PathBuf};
|
|
use std::str::FromStr;
|
|
use std::{fmt, io};
|
|
|
|
use rustc_abi::{Endian, ExternAbi, Integer, Size, TargetDataLayout, TargetDataLayoutErrors};
|
|
use rustc_data_structures::fx::{FxHashSet, FxIndexSet};
|
|
use rustc_fs_util::try_canonicalize;
|
|
use rustc_macros::{Decodable, Encodable, HashStable_Generic};
|
|
use rustc_serialize::{Decodable, Decoder, Encodable, Encoder};
|
|
use rustc_span::{Symbol, kw, sym};
|
|
use serde_json::Value;
|
|
use tracing::debug;
|
|
|
|
use crate::callconv::Conv;
|
|
use crate::json::{Json, ToJson};
|
|
use crate::spec::crt_objects::CrtObjects;
|
|
|
|
pub mod crt_objects;
|
|
|
|
mod base;
|
|
mod json;
|
|
|
|
pub use base::avr::ef_avr_arch;
|
|
|
|
/// Linker is called through a C/C++ compiler.
|
|
#[derive(Clone, Copy, Debug, Eq, Ord, PartialEq, PartialOrd)]
|
|
pub enum Cc {
|
|
Yes,
|
|
No,
|
|
}
|
|
|
|
/// Linker is LLD.
|
|
#[derive(Clone, Copy, Debug, Eq, Ord, PartialEq, PartialOrd)]
|
|
pub enum Lld {
|
|
Yes,
|
|
No,
|
|
}
|
|
|
|
/// All linkers have some kinds of command line interfaces and rustc needs to know which commands
|
|
/// to use with each of them. So we cluster all such interfaces into a (somewhat arbitrary) number
|
|
/// of classes that we call "linker flavors".
|
|
///
|
|
/// Technically, it's not even necessary, we can nearly always infer the flavor from linker name
|
|
/// and target properties like `is_like_windows`/`is_like_osx`/etc. However, the PRs originally
|
|
/// introducing `-Clinker-flavor` (#40018 and friends) were aiming to reduce this kind of inference
|
|
/// and provide something certain and explicitly specified instead, and that design goal is still
|
|
/// relevant now.
|
|
///
|
|
/// The second goal is to keep the number of flavors to the minimum if possible.
|
|
/// LLD somewhat forces our hand here because that linker is self-sufficient only if its executable
|
|
/// (`argv[0]`) is named in specific way, otherwise it doesn't work and requires a
|
|
/// `-flavor LLD_FLAVOR` argument to choose which logic to use. Our shipped `rust-lld` in
|
|
/// particular is not named in such specific way, so it needs the flavor option, so we make our
|
|
/// linker flavors sufficiently fine-grained to satisfy LLD without inferring its flavor from other
|
|
/// target properties, in accordance with the first design goal.
|
|
///
|
|
/// The first component of the flavor is tightly coupled with the compilation target,
|
|
/// while the `Cc` and `Lld` flags can vary within the same target.
|
|
#[derive(Clone, Copy, Debug, Eq, Ord, PartialEq, PartialOrd)]
|
|
pub enum LinkerFlavor {
|
|
/// Unix-like linker with GNU extensions (both naked and compiler-wrapped forms).
|
|
/// Besides similar "default" Linux/BSD linkers this also includes Windows/GNU linker,
|
|
/// which is somewhat different because it doesn't produce ELFs.
|
|
Gnu(Cc, Lld),
|
|
/// Unix-like linker for Apple targets (both naked and compiler-wrapped forms).
|
|
/// Extracted from the "umbrella" `Unix` flavor due to its corresponding LLD flavor.
|
|
Darwin(Cc, Lld),
|
|
/// Unix-like linker for Wasm targets (both naked and compiler-wrapped forms).
|
|
/// Extracted from the "umbrella" `Unix` flavor due to its corresponding LLD flavor.
|
|
/// Non-LLD version does not exist, so the lld flag is currently hardcoded here.
|
|
WasmLld(Cc),
|
|
/// Basic Unix-like linker for "any other Unix" targets (Solaris/illumos, L4Re, MSP430, etc),
|
|
/// possibly with non-GNU extensions (both naked and compiler-wrapped forms).
|
|
/// LLD doesn't support any of these.
|
|
Unix(Cc),
|
|
/// MSVC-style linker for Windows and UEFI, LLD supports it.
|
|
Msvc(Lld),
|
|
/// Emscripten Compiler Frontend, a wrapper around `WasmLld(Cc::Yes)` that has a different
|
|
/// interface and produces some additional JavaScript output.
|
|
EmCc,
|
|
// Below: other linker-like tools with unique interfaces for exotic targets.
|
|
/// Linker tool for BPF.
|
|
Bpf,
|
|
/// Linker tool for Nvidia PTX.
|
|
Ptx,
|
|
/// LLVM bitcode linker that can be used as a `self-contained` linker
|
|
Llbc,
|
|
}
|
|
|
|
/// Linker flavors available externally through command line (`-Clinker-flavor`)
|
|
/// or json target specifications.
|
|
/// This set has accumulated historically, and contains both (stable and unstable) legacy values, as
|
|
/// well as modern ones matching the internal linker flavors (`LinkerFlavor`).
|
|
#[derive(Clone, Copy, Debug, Eq, Ord, PartialEq, PartialOrd)]
|
|
pub enum LinkerFlavorCli {
|
|
// Modern (unstable) flavors, with direct counterparts in `LinkerFlavor`.
|
|
Gnu(Cc, Lld),
|
|
Darwin(Cc, Lld),
|
|
WasmLld(Cc),
|
|
Unix(Cc),
|
|
// Note: `Msvc(Lld::No)` is also a stable value.
|
|
Msvc(Lld),
|
|
EmCc,
|
|
Bpf,
|
|
Ptx,
|
|
Llbc,
|
|
|
|
// Legacy stable values
|
|
Gcc,
|
|
Ld,
|
|
Lld(LldFlavor),
|
|
Em,
|
|
}
|
|
|
|
impl LinkerFlavorCli {
|
|
/// Returns whether this `-C linker-flavor` option is one of the unstable values.
|
|
pub fn is_unstable(&self) -> bool {
|
|
match self {
|
|
LinkerFlavorCli::Gnu(..)
|
|
| LinkerFlavorCli::Darwin(..)
|
|
| LinkerFlavorCli::WasmLld(..)
|
|
| LinkerFlavorCli::Unix(..)
|
|
| LinkerFlavorCli::Msvc(Lld::Yes)
|
|
| LinkerFlavorCli::EmCc
|
|
| LinkerFlavorCli::Bpf
|
|
| LinkerFlavorCli::Llbc
|
|
| LinkerFlavorCli::Ptx => true,
|
|
LinkerFlavorCli::Gcc
|
|
| LinkerFlavorCli::Ld
|
|
| LinkerFlavorCli::Lld(..)
|
|
| LinkerFlavorCli::Msvc(Lld::No)
|
|
| LinkerFlavorCli::Em => false,
|
|
}
|
|
}
|
|
}
|
|
|
|
#[derive(Clone, Copy, Debug, Eq, Ord, PartialEq, PartialOrd)]
|
|
pub enum LldFlavor {
|
|
Wasm,
|
|
Ld64,
|
|
Ld,
|
|
Link,
|
|
}
|
|
|
|
impl LldFlavor {
|
|
pub fn as_str(&self) -> &'static str {
|
|
match self {
|
|
LldFlavor::Wasm => "wasm",
|
|
LldFlavor::Ld64 => "darwin",
|
|
LldFlavor::Ld => "gnu",
|
|
LldFlavor::Link => "link",
|
|
}
|
|
}
|
|
|
|
fn from_str(s: &str) -> Option<Self> {
|
|
Some(match s {
|
|
"darwin" => LldFlavor::Ld64,
|
|
"gnu" => LldFlavor::Ld,
|
|
"link" => LldFlavor::Link,
|
|
"wasm" => LldFlavor::Wasm,
|
|
_ => return None,
|
|
})
|
|
}
|
|
}
|
|
|
|
impl ToJson for LldFlavor {
|
|
fn to_json(&self) -> Json {
|
|
self.as_str().to_json()
|
|
}
|
|
}
|
|
|
|
impl LinkerFlavor {
|
|
/// At this point the target's reference linker flavor doesn't yet exist and we need to infer
|
|
/// it. The inference always succeeds and gives some result, and we don't report any flavor
|
|
/// incompatibility errors for json target specs. The CLI flavor is used as the main source
|
|
/// of truth, other flags are used in case of ambiguities.
|
|
fn from_cli_json(cli: LinkerFlavorCli, lld_flavor: LldFlavor, is_gnu: bool) -> LinkerFlavor {
|
|
match cli {
|
|
LinkerFlavorCli::Gnu(cc, lld) => LinkerFlavor::Gnu(cc, lld),
|
|
LinkerFlavorCli::Darwin(cc, lld) => LinkerFlavor::Darwin(cc, lld),
|
|
LinkerFlavorCli::WasmLld(cc) => LinkerFlavor::WasmLld(cc),
|
|
LinkerFlavorCli::Unix(cc) => LinkerFlavor::Unix(cc),
|
|
LinkerFlavorCli::Msvc(lld) => LinkerFlavor::Msvc(lld),
|
|
LinkerFlavorCli::EmCc => LinkerFlavor::EmCc,
|
|
LinkerFlavorCli::Bpf => LinkerFlavor::Bpf,
|
|
LinkerFlavorCli::Llbc => LinkerFlavor::Llbc,
|
|
LinkerFlavorCli::Ptx => LinkerFlavor::Ptx,
|
|
|
|
// Below: legacy stable values
|
|
LinkerFlavorCli::Gcc => match lld_flavor {
|
|
LldFlavor::Ld if is_gnu => LinkerFlavor::Gnu(Cc::Yes, Lld::No),
|
|
LldFlavor::Ld64 => LinkerFlavor::Darwin(Cc::Yes, Lld::No),
|
|
LldFlavor::Wasm => LinkerFlavor::WasmLld(Cc::Yes),
|
|
LldFlavor::Ld | LldFlavor::Link => LinkerFlavor::Unix(Cc::Yes),
|
|
},
|
|
LinkerFlavorCli::Ld => match lld_flavor {
|
|
LldFlavor::Ld if is_gnu => LinkerFlavor::Gnu(Cc::No, Lld::No),
|
|
LldFlavor::Ld64 => LinkerFlavor::Darwin(Cc::No, Lld::No),
|
|
LldFlavor::Ld | LldFlavor::Wasm | LldFlavor::Link => LinkerFlavor::Unix(Cc::No),
|
|
},
|
|
LinkerFlavorCli::Lld(LldFlavor::Ld) => LinkerFlavor::Gnu(Cc::No, Lld::Yes),
|
|
LinkerFlavorCli::Lld(LldFlavor::Ld64) => LinkerFlavor::Darwin(Cc::No, Lld::Yes),
|
|
LinkerFlavorCli::Lld(LldFlavor::Wasm) => LinkerFlavor::WasmLld(Cc::No),
|
|
LinkerFlavorCli::Lld(LldFlavor::Link) => LinkerFlavor::Msvc(Lld::Yes),
|
|
LinkerFlavorCli::Em => LinkerFlavor::EmCc,
|
|
}
|
|
}
|
|
|
|
/// Returns the corresponding backwards-compatible CLI flavor.
|
|
fn to_cli(self) -> LinkerFlavorCli {
|
|
match self {
|
|
LinkerFlavor::Gnu(Cc::Yes, _)
|
|
| LinkerFlavor::Darwin(Cc::Yes, _)
|
|
| LinkerFlavor::WasmLld(Cc::Yes)
|
|
| LinkerFlavor::Unix(Cc::Yes) => LinkerFlavorCli::Gcc,
|
|
LinkerFlavor::Gnu(_, Lld::Yes) => LinkerFlavorCli::Lld(LldFlavor::Ld),
|
|
LinkerFlavor::Darwin(_, Lld::Yes) => LinkerFlavorCli::Lld(LldFlavor::Ld64),
|
|
LinkerFlavor::WasmLld(..) => LinkerFlavorCli::Lld(LldFlavor::Wasm),
|
|
LinkerFlavor::Gnu(..) | LinkerFlavor::Darwin(..) | LinkerFlavor::Unix(..) => {
|
|
LinkerFlavorCli::Ld
|
|
}
|
|
LinkerFlavor::Msvc(Lld::Yes) => LinkerFlavorCli::Lld(LldFlavor::Link),
|
|
LinkerFlavor::Msvc(..) => LinkerFlavorCli::Msvc(Lld::No),
|
|
LinkerFlavor::EmCc => LinkerFlavorCli::Em,
|
|
LinkerFlavor::Bpf => LinkerFlavorCli::Bpf,
|
|
LinkerFlavor::Llbc => LinkerFlavorCli::Llbc,
|
|
LinkerFlavor::Ptx => LinkerFlavorCli::Ptx,
|
|
}
|
|
}
|
|
|
|
/// Returns the modern CLI flavor that is the counterpart of this flavor.
|
|
fn to_cli_counterpart(self) -> LinkerFlavorCli {
|
|
match self {
|
|
LinkerFlavor::Gnu(cc, lld) => LinkerFlavorCli::Gnu(cc, lld),
|
|
LinkerFlavor::Darwin(cc, lld) => LinkerFlavorCli::Darwin(cc, lld),
|
|
LinkerFlavor::WasmLld(cc) => LinkerFlavorCli::WasmLld(cc),
|
|
LinkerFlavor::Unix(cc) => LinkerFlavorCli::Unix(cc),
|
|
LinkerFlavor::Msvc(lld) => LinkerFlavorCli::Msvc(lld),
|
|
LinkerFlavor::EmCc => LinkerFlavorCli::EmCc,
|
|
LinkerFlavor::Bpf => LinkerFlavorCli::Bpf,
|
|
LinkerFlavor::Llbc => LinkerFlavorCli::Llbc,
|
|
LinkerFlavor::Ptx => LinkerFlavorCli::Ptx,
|
|
}
|
|
}
|
|
|
|
fn infer_cli_hints(cli: LinkerFlavorCli) -> (Option<Cc>, Option<Lld>) {
|
|
match cli {
|
|
LinkerFlavorCli::Gnu(cc, lld) | LinkerFlavorCli::Darwin(cc, lld) => {
|
|
(Some(cc), Some(lld))
|
|
}
|
|
LinkerFlavorCli::WasmLld(cc) => (Some(cc), Some(Lld::Yes)),
|
|
LinkerFlavorCli::Unix(cc) => (Some(cc), None),
|
|
LinkerFlavorCli::Msvc(lld) => (Some(Cc::No), Some(lld)),
|
|
LinkerFlavorCli::EmCc => (Some(Cc::Yes), Some(Lld::Yes)),
|
|
LinkerFlavorCli::Bpf | LinkerFlavorCli::Ptx => (None, None),
|
|
LinkerFlavorCli::Llbc => (None, None),
|
|
|
|
// Below: legacy stable values
|
|
LinkerFlavorCli::Gcc => (Some(Cc::Yes), None),
|
|
LinkerFlavorCli::Ld => (Some(Cc::No), Some(Lld::No)),
|
|
LinkerFlavorCli::Lld(_) => (Some(Cc::No), Some(Lld::Yes)),
|
|
LinkerFlavorCli::Em => (Some(Cc::Yes), Some(Lld::Yes)),
|
|
}
|
|
}
|
|
|
|
fn infer_linker_hints(linker_stem: &str) -> Result<Self, (Option<Cc>, Option<Lld>)> {
|
|
// Remove any version postfix.
|
|
let stem = linker_stem
|
|
.rsplit_once('-')
|
|
.and_then(|(lhs, rhs)| rhs.chars().all(char::is_numeric).then_some(lhs))
|
|
.unwrap_or(linker_stem);
|
|
|
|
if stem == "llvm-bitcode-linker" {
|
|
Ok(Self::Llbc)
|
|
} else if stem == "emcc" // GCC/Clang can have an optional target prefix.
|
|
|| stem == "gcc"
|
|
|| stem.ends_with("-gcc")
|
|
|| stem == "g++"
|
|
|| stem.ends_with("-g++")
|
|
|| stem == "clang"
|
|
|| stem.ends_with("-clang")
|
|
|| stem == "clang++"
|
|
|| stem.ends_with("-clang++")
|
|
{
|
|
Err((Some(Cc::Yes), Some(Lld::No)))
|
|
} else if stem == "wasm-ld"
|
|
|| stem.ends_with("-wasm-ld")
|
|
|| stem == "ld.lld"
|
|
|| stem == "lld"
|
|
|| stem == "rust-lld"
|
|
|| stem == "lld-link"
|
|
{
|
|
Err((Some(Cc::No), Some(Lld::Yes)))
|
|
} else if stem == "ld" || stem.ends_with("-ld") || stem == "link" {
|
|
Err((Some(Cc::No), Some(Lld::No)))
|
|
} else {
|
|
Err((None, None))
|
|
}
|
|
}
|
|
|
|
fn with_hints(self, (cc_hint, lld_hint): (Option<Cc>, Option<Lld>)) -> LinkerFlavor {
|
|
match self {
|
|
LinkerFlavor::Gnu(cc, lld) => {
|
|
LinkerFlavor::Gnu(cc_hint.unwrap_or(cc), lld_hint.unwrap_or(lld))
|
|
}
|
|
LinkerFlavor::Darwin(cc, lld) => {
|
|
LinkerFlavor::Darwin(cc_hint.unwrap_or(cc), lld_hint.unwrap_or(lld))
|
|
}
|
|
LinkerFlavor::WasmLld(cc) => LinkerFlavor::WasmLld(cc_hint.unwrap_or(cc)),
|
|
LinkerFlavor::Unix(cc) => LinkerFlavor::Unix(cc_hint.unwrap_or(cc)),
|
|
LinkerFlavor::Msvc(lld) => LinkerFlavor::Msvc(lld_hint.unwrap_or(lld)),
|
|
LinkerFlavor::EmCc | LinkerFlavor::Bpf | LinkerFlavor::Llbc | LinkerFlavor::Ptx => self,
|
|
}
|
|
}
|
|
|
|
pub fn with_cli_hints(self, cli: LinkerFlavorCli) -> LinkerFlavor {
|
|
self.with_hints(LinkerFlavor::infer_cli_hints(cli))
|
|
}
|
|
|
|
pub fn with_linker_hints(self, linker_stem: &str) -> LinkerFlavor {
|
|
match LinkerFlavor::infer_linker_hints(linker_stem) {
|
|
Ok(linker_flavor) => linker_flavor,
|
|
Err(hints) => self.with_hints(hints),
|
|
}
|
|
}
|
|
|
|
pub fn check_compatibility(self, cli: LinkerFlavorCli) -> Option<String> {
|
|
let compatible = |cli| {
|
|
// The CLI flavor should be compatible with the target if:
|
|
match (self, cli) {
|
|
// 1. they are counterparts: they have the same principal flavor.
|
|
(LinkerFlavor::Gnu(..), LinkerFlavorCli::Gnu(..))
|
|
| (LinkerFlavor::Darwin(..), LinkerFlavorCli::Darwin(..))
|
|
| (LinkerFlavor::WasmLld(..), LinkerFlavorCli::WasmLld(..))
|
|
| (LinkerFlavor::Unix(..), LinkerFlavorCli::Unix(..))
|
|
| (LinkerFlavor::Msvc(..), LinkerFlavorCli::Msvc(..))
|
|
| (LinkerFlavor::EmCc, LinkerFlavorCli::EmCc)
|
|
| (LinkerFlavor::Bpf, LinkerFlavorCli::Bpf)
|
|
| (LinkerFlavor::Llbc, LinkerFlavorCli::Llbc)
|
|
| (LinkerFlavor::Ptx, LinkerFlavorCli::Ptx) => return true,
|
|
// 2. The linker flavor is independent of target and compatible
|
|
(LinkerFlavor::Ptx, LinkerFlavorCli::Llbc) => return true,
|
|
_ => {}
|
|
}
|
|
|
|
// 3. or, the flavor is legacy and survives this roundtrip.
|
|
cli == self.with_cli_hints(cli).to_cli()
|
|
};
|
|
(!compatible(cli)).then(|| {
|
|
LinkerFlavorCli::all()
|
|
.iter()
|
|
.filter(|cli| compatible(**cli))
|
|
.map(|cli| cli.desc())
|
|
.intersperse(", ")
|
|
.collect()
|
|
})
|
|
}
|
|
|
|
pub fn lld_flavor(self) -> LldFlavor {
|
|
match self {
|
|
LinkerFlavor::Gnu(..)
|
|
| LinkerFlavor::Unix(..)
|
|
| LinkerFlavor::EmCc
|
|
| LinkerFlavor::Bpf
|
|
| LinkerFlavor::Llbc
|
|
| LinkerFlavor::Ptx => LldFlavor::Ld,
|
|
LinkerFlavor::Darwin(..) => LldFlavor::Ld64,
|
|
LinkerFlavor::WasmLld(..) => LldFlavor::Wasm,
|
|
LinkerFlavor::Msvc(..) => LldFlavor::Link,
|
|
}
|
|
}
|
|
|
|
pub fn is_gnu(self) -> bool {
|
|
matches!(self, LinkerFlavor::Gnu(..))
|
|
}
|
|
|
|
/// Returns whether the flavor uses the `lld` linker.
|
|
pub fn uses_lld(self) -> bool {
|
|
// Exhaustive match in case new flavors are added in the future.
|
|
match self {
|
|
LinkerFlavor::Gnu(_, Lld::Yes)
|
|
| LinkerFlavor::Darwin(_, Lld::Yes)
|
|
| LinkerFlavor::WasmLld(..)
|
|
| LinkerFlavor::EmCc
|
|
| LinkerFlavor::Msvc(Lld::Yes) => true,
|
|
LinkerFlavor::Gnu(..)
|
|
| LinkerFlavor::Darwin(..)
|
|
| LinkerFlavor::Msvc(_)
|
|
| LinkerFlavor::Unix(_)
|
|
| LinkerFlavor::Bpf
|
|
| LinkerFlavor::Llbc
|
|
| LinkerFlavor::Ptx => false,
|
|
}
|
|
}
|
|
|
|
/// Returns whether the flavor calls the linker via a C/C++ compiler.
|
|
pub fn uses_cc(self) -> bool {
|
|
// Exhaustive match in case new flavors are added in the future.
|
|
match self {
|
|
LinkerFlavor::Gnu(Cc::Yes, _)
|
|
| LinkerFlavor::Darwin(Cc::Yes, _)
|
|
| LinkerFlavor::WasmLld(Cc::Yes)
|
|
| LinkerFlavor::Unix(Cc::Yes)
|
|
| LinkerFlavor::EmCc => true,
|
|
LinkerFlavor::Gnu(..)
|
|
| LinkerFlavor::Darwin(..)
|
|
| LinkerFlavor::WasmLld(_)
|
|
| LinkerFlavor::Msvc(_)
|
|
| LinkerFlavor::Unix(_)
|
|
| LinkerFlavor::Bpf
|
|
| LinkerFlavor::Llbc
|
|
| LinkerFlavor::Ptx => false,
|
|
}
|
|
}
|
|
|
|
/// For flavors with an `Lld` component, ensure it's enabled. Otherwise, returns the given
|
|
/// flavor unmodified.
|
|
pub fn with_lld_enabled(self) -> LinkerFlavor {
|
|
match self {
|
|
LinkerFlavor::Gnu(cc, Lld::No) => LinkerFlavor::Gnu(cc, Lld::Yes),
|
|
LinkerFlavor::Darwin(cc, Lld::No) => LinkerFlavor::Darwin(cc, Lld::Yes),
|
|
LinkerFlavor::Msvc(Lld::No) => LinkerFlavor::Msvc(Lld::Yes),
|
|
_ => self,
|
|
}
|
|
}
|
|
|
|
/// For flavors with an `Lld` component, ensure it's disabled. Otherwise, returns the given
|
|
/// flavor unmodified.
|
|
pub fn with_lld_disabled(self) -> LinkerFlavor {
|
|
match self {
|
|
LinkerFlavor::Gnu(cc, Lld::Yes) => LinkerFlavor::Gnu(cc, Lld::No),
|
|
LinkerFlavor::Darwin(cc, Lld::Yes) => LinkerFlavor::Darwin(cc, Lld::No),
|
|
LinkerFlavor::Msvc(Lld::Yes) => LinkerFlavor::Msvc(Lld::No),
|
|
_ => self,
|
|
}
|
|
}
|
|
}
|
|
|
|
macro_rules! linker_flavor_cli_impls {
|
|
($(($($flavor:tt)*) $string:literal)*) => (
|
|
impl LinkerFlavorCli {
|
|
const fn all() -> &'static [LinkerFlavorCli] {
|
|
&[$($($flavor)*,)*]
|
|
}
|
|
|
|
pub const fn one_of() -> &'static str {
|
|
concat!("one of: ", $($string, " ",)*)
|
|
}
|
|
|
|
pub fn from_str(s: &str) -> Option<LinkerFlavorCli> {
|
|
Some(match s {
|
|
$($string => $($flavor)*,)*
|
|
_ => return None,
|
|
})
|
|
}
|
|
|
|
pub fn desc(self) -> &'static str {
|
|
match self {
|
|
$($($flavor)* => $string,)*
|
|
}
|
|
}
|
|
}
|
|
)
|
|
}
|
|
|
|
linker_flavor_cli_impls! {
|
|
(LinkerFlavorCli::Gnu(Cc::No, Lld::No)) "gnu"
|
|
(LinkerFlavorCli::Gnu(Cc::No, Lld::Yes)) "gnu-lld"
|
|
(LinkerFlavorCli::Gnu(Cc::Yes, Lld::No)) "gnu-cc"
|
|
(LinkerFlavorCli::Gnu(Cc::Yes, Lld::Yes)) "gnu-lld-cc"
|
|
(LinkerFlavorCli::Darwin(Cc::No, Lld::No)) "darwin"
|
|
(LinkerFlavorCli::Darwin(Cc::No, Lld::Yes)) "darwin-lld"
|
|
(LinkerFlavorCli::Darwin(Cc::Yes, Lld::No)) "darwin-cc"
|
|
(LinkerFlavorCli::Darwin(Cc::Yes, Lld::Yes)) "darwin-lld-cc"
|
|
(LinkerFlavorCli::WasmLld(Cc::No)) "wasm-lld"
|
|
(LinkerFlavorCli::WasmLld(Cc::Yes)) "wasm-lld-cc"
|
|
(LinkerFlavorCli::Unix(Cc::No)) "unix"
|
|
(LinkerFlavorCli::Unix(Cc::Yes)) "unix-cc"
|
|
(LinkerFlavorCli::Msvc(Lld::Yes)) "msvc-lld"
|
|
(LinkerFlavorCli::Msvc(Lld::No)) "msvc"
|
|
(LinkerFlavorCli::EmCc) "em-cc"
|
|
(LinkerFlavorCli::Bpf) "bpf"
|
|
(LinkerFlavorCli::Llbc) "llbc"
|
|
(LinkerFlavorCli::Ptx) "ptx"
|
|
|
|
// Legacy stable flavors
|
|
(LinkerFlavorCli::Gcc) "gcc"
|
|
(LinkerFlavorCli::Ld) "ld"
|
|
(LinkerFlavorCli::Lld(LldFlavor::Ld)) "ld.lld"
|
|
(LinkerFlavorCli::Lld(LldFlavor::Ld64)) "ld64.lld"
|
|
(LinkerFlavorCli::Lld(LldFlavor::Link)) "lld-link"
|
|
(LinkerFlavorCli::Lld(LldFlavor::Wasm)) "wasm-ld"
|
|
(LinkerFlavorCli::Em) "em"
|
|
}
|
|
|
|
impl ToJson for LinkerFlavorCli {
|
|
fn to_json(&self) -> Json {
|
|
self.desc().to_json()
|
|
}
|
|
}
|
|
|
|
/// The different `-Clink-self-contained` options that can be specified in a target spec:
|
|
/// - enabling or disabling in bulk
|
|
/// - some target-specific pieces of inference to determine whether to use self-contained linking
|
|
/// if `-Clink-self-contained` is not specified explicitly (e.g. on musl/mingw)
|
|
/// - explicitly enabling some of the self-contained linking components, e.g. the linker component
|
|
/// to use `rust-lld`
|
|
#[derive(Clone, Copy, PartialEq, Debug)]
|
|
pub enum LinkSelfContainedDefault {
|
|
/// The target spec explicitly enables self-contained linking.
|
|
True,
|
|
|
|
/// The target spec explicitly disables self-contained linking.
|
|
False,
|
|
|
|
/// The target spec requests that the self-contained mode is inferred, in the context of musl.
|
|
InferredForMusl,
|
|
|
|
/// The target spec requests that the self-contained mode is inferred, in the context of mingw.
|
|
InferredForMingw,
|
|
|
|
/// The target spec explicitly enables a list of self-contained linking components: e.g. for
|
|
/// targets opting into a subset of components like the CLI's `-C link-self-contained=+linker`.
|
|
WithComponents(LinkSelfContainedComponents),
|
|
}
|
|
|
|
/// Parses a backwards-compatible `-Clink-self-contained` option string, without components.
|
|
impl FromStr for LinkSelfContainedDefault {
|
|
type Err = ();
|
|
|
|
fn from_str(s: &str) -> Result<LinkSelfContainedDefault, ()> {
|
|
Ok(match s {
|
|
"false" => LinkSelfContainedDefault::False,
|
|
"true" | "wasm" => LinkSelfContainedDefault::True,
|
|
"musl" => LinkSelfContainedDefault::InferredForMusl,
|
|
"mingw" => LinkSelfContainedDefault::InferredForMingw,
|
|
_ => return Err(()),
|
|
})
|
|
}
|
|
}
|
|
|
|
impl ToJson for LinkSelfContainedDefault {
|
|
fn to_json(&self) -> Json {
|
|
match *self {
|
|
LinkSelfContainedDefault::WithComponents(components) => {
|
|
// Serialize the components in a json object's `components` field, to prepare for a
|
|
// future where `crt-objects-fallback` is removed from the json specs and
|
|
// incorporated as a field here.
|
|
let mut map = BTreeMap::new();
|
|
map.insert("components", components);
|
|
map.to_json()
|
|
}
|
|
|
|
// Stable backwards-compatible values
|
|
LinkSelfContainedDefault::True => "true".to_json(),
|
|
LinkSelfContainedDefault::False => "false".to_json(),
|
|
LinkSelfContainedDefault::InferredForMusl => "musl".to_json(),
|
|
LinkSelfContainedDefault::InferredForMingw => "mingw".to_json(),
|
|
}
|
|
}
|
|
}
|
|
|
|
impl LinkSelfContainedDefault {
|
|
/// Returns whether the target spec has self-contained linking explicitly disabled. Used to emit
|
|
/// errors if the user then enables it on the CLI.
|
|
pub fn is_disabled(self) -> bool {
|
|
self == LinkSelfContainedDefault::False
|
|
}
|
|
|
|
/// Returns the key to use when serializing the setting to json:
|
|
/// - individual components in a `link-self-contained` object value
|
|
/// - the other variants as a backwards-compatible `crt-objects-fallback` string
|
|
fn json_key(self) -> &'static str {
|
|
match self {
|
|
LinkSelfContainedDefault::WithComponents(_) => "link-self-contained",
|
|
_ => "crt-objects-fallback",
|
|
}
|
|
}
|
|
|
|
/// Creates a `LinkSelfContainedDefault` enabling the self-contained linker for target specs
|
|
/// (the equivalent of `-Clink-self-contained=+linker` on the CLI).
|
|
pub fn with_linker() -> LinkSelfContainedDefault {
|
|
LinkSelfContainedDefault::WithComponents(LinkSelfContainedComponents::LINKER)
|
|
}
|
|
}
|
|
|
|
bitflags::bitflags! {
|
|
#[derive(Clone, Copy, PartialEq, Eq, Default)]
|
|
/// The `-C link-self-contained` components that can individually be enabled or disabled.
|
|
pub struct LinkSelfContainedComponents: u8 {
|
|
/// CRT objects (e.g. on `windows-gnu`, `musl`, `wasi` targets)
|
|
const CRT_OBJECTS = 1 << 0;
|
|
/// libc static library (e.g. on `musl`, `wasi` targets)
|
|
const LIBC = 1 << 1;
|
|
/// libgcc/libunwind (e.g. on `windows-gnu`, `fuchsia`, `fortanix`, `gnullvm` targets)
|
|
const UNWIND = 1 << 2;
|
|
/// Linker, dlltool, and their necessary libraries (e.g. on `windows-gnu` and for `rust-lld`)
|
|
const LINKER = 1 << 3;
|
|
/// Sanitizer runtime libraries
|
|
const SANITIZERS = 1 << 4;
|
|
/// Other MinGW libs and Windows import libs
|
|
const MINGW = 1 << 5;
|
|
}
|
|
}
|
|
rustc_data_structures::external_bitflags_debug! { LinkSelfContainedComponents }
|
|
|
|
impl LinkSelfContainedComponents {
|
|
/// Parses a single `-Clink-self-contained` well-known component, not a set of flags.
|
|
pub fn from_str(s: &str) -> Option<LinkSelfContainedComponents> {
|
|
Some(match s {
|
|
"crto" => LinkSelfContainedComponents::CRT_OBJECTS,
|
|
"libc" => LinkSelfContainedComponents::LIBC,
|
|
"unwind" => LinkSelfContainedComponents::UNWIND,
|
|
"linker" => LinkSelfContainedComponents::LINKER,
|
|
"sanitizers" => LinkSelfContainedComponents::SANITIZERS,
|
|
"mingw" => LinkSelfContainedComponents::MINGW,
|
|
_ => return None,
|
|
})
|
|
}
|
|
|
|
/// Return the component's name.
|
|
///
|
|
/// Returns `None` if the bitflags aren't a singular component (but a mix of multiple flags).
|
|
pub fn as_str(self) -> Option<&'static str> {
|
|
Some(match self {
|
|
LinkSelfContainedComponents::CRT_OBJECTS => "crto",
|
|
LinkSelfContainedComponents::LIBC => "libc",
|
|
LinkSelfContainedComponents::UNWIND => "unwind",
|
|
LinkSelfContainedComponents::LINKER => "linker",
|
|
LinkSelfContainedComponents::SANITIZERS => "sanitizers",
|
|
LinkSelfContainedComponents::MINGW => "mingw",
|
|
_ => return None,
|
|
})
|
|
}
|
|
|
|
/// Returns an array of all the components.
|
|
fn all_components() -> [LinkSelfContainedComponents; 6] {
|
|
[
|
|
LinkSelfContainedComponents::CRT_OBJECTS,
|
|
LinkSelfContainedComponents::LIBC,
|
|
LinkSelfContainedComponents::UNWIND,
|
|
LinkSelfContainedComponents::LINKER,
|
|
LinkSelfContainedComponents::SANITIZERS,
|
|
LinkSelfContainedComponents::MINGW,
|
|
]
|
|
}
|
|
|
|
/// Returns whether at least a component is enabled.
|
|
pub fn are_any_components_enabled(self) -> bool {
|
|
!self.is_empty()
|
|
}
|
|
|
|
/// Returns whether `LinkSelfContainedComponents::LINKER` is enabled.
|
|
pub fn is_linker_enabled(self) -> bool {
|
|
self.contains(LinkSelfContainedComponents::LINKER)
|
|
}
|
|
|
|
/// Returns whether `LinkSelfContainedComponents::CRT_OBJECTS` is enabled.
|
|
pub fn is_crt_objects_enabled(self) -> bool {
|
|
self.contains(LinkSelfContainedComponents::CRT_OBJECTS)
|
|
}
|
|
}
|
|
|
|
impl ToJson for LinkSelfContainedComponents {
|
|
fn to_json(&self) -> Json {
|
|
let components: Vec<_> = Self::all_components()
|
|
.into_iter()
|
|
.filter(|c| self.contains(*c))
|
|
.map(|c| {
|
|
// We can unwrap because we're iterating over all the known singular components,
|
|
// not an actual set of flags where `as_str` can fail.
|
|
c.as_str().unwrap().to_owned()
|
|
})
|
|
.collect();
|
|
|
|
components.to_json()
|
|
}
|
|
}
|
|
|
|
bitflags::bitflags! {
|
|
/// The `-Z linker-features` components that can individually be enabled or disabled.
|
|
///
|
|
/// They are feature flags intended to be a more flexible mechanism than linker flavors, and
|
|
/// also to prevent a combinatorial explosion of flavors whenever a new linker feature is
|
|
/// required. These flags are "generic", in the sense that they can work on multiple targets on
|
|
/// the CLI. Otherwise, one would have to select different linkers flavors for each target.
|
|
///
|
|
/// Here are some examples of the advantages they offer:
|
|
/// - default feature sets for principal flavors, or for specific targets.
|
|
/// - flavor-specific features: for example, clang offers automatic cross-linking with
|
|
/// `--target`, which gcc-style compilers don't support. The *flavor* is still a C/C++
|
|
/// compiler, and we don't need to multiply the number of flavors for this use-case. Instead,
|
|
/// we can have a single `+target` feature.
|
|
/// - umbrella features: for example if clang accumulates more features in the future than just
|
|
/// the `+target` above. That could be modeled as `+clang`.
|
|
/// - niche features for resolving specific issues: for example, on Apple targets the linker
|
|
/// flag implementing the `as-needed` native link modifier (#99424) is only possible on
|
|
/// sufficiently recent linker versions.
|
|
/// - still allows for discovery and automation, for example via feature detection. This can be
|
|
/// useful in exotic environments/build systems.
|
|
#[derive(Clone, Copy, PartialEq, Eq, Default)]
|
|
pub struct LinkerFeatures: u8 {
|
|
/// Invoke the linker via a C/C++ compiler (e.g. on most unix targets).
|
|
const CC = 1 << 0;
|
|
/// Use the lld linker, either the system lld or the self-contained linker `rust-lld`.
|
|
const LLD = 1 << 1;
|
|
}
|
|
}
|
|
rustc_data_structures::external_bitflags_debug! { LinkerFeatures }
|
|
|
|
impl LinkerFeatures {
|
|
/// Parses a single `-Z linker-features` well-known feature, not a set of flags.
|
|
pub fn from_str(s: &str) -> Option<LinkerFeatures> {
|
|
Some(match s {
|
|
"cc" => LinkerFeatures::CC,
|
|
"lld" => LinkerFeatures::LLD,
|
|
_ => return None,
|
|
})
|
|
}
|
|
|
|
/// Returns whether the `lld` linker feature is enabled.
|
|
pub fn is_lld_enabled(self) -> bool {
|
|
self.contains(LinkerFeatures::LLD)
|
|
}
|
|
|
|
/// Returns whether the `cc` linker feature is enabled.
|
|
pub fn is_cc_enabled(self) -> bool {
|
|
self.contains(LinkerFeatures::CC)
|
|
}
|
|
}
|
|
|
|
#[derive(Clone, Copy, Debug, PartialEq, Hash, Encodable, Decodable, HashStable_Generic)]
|
|
pub enum PanicStrategy {
|
|
Unwind,
|
|
Abort,
|
|
}
|
|
|
|
#[derive(Clone, Copy, Debug, PartialEq, Hash, Encodable, Decodable, HashStable_Generic)]
|
|
pub enum OnBrokenPipe {
|
|
Default,
|
|
Kill,
|
|
Error,
|
|
Inherit,
|
|
}
|
|
|
|
impl PanicStrategy {
|
|
pub fn desc(&self) -> &str {
|
|
match *self {
|
|
PanicStrategy::Unwind => "unwind",
|
|
PanicStrategy::Abort => "abort",
|
|
}
|
|
}
|
|
|
|
pub const fn desc_symbol(&self) -> Symbol {
|
|
match *self {
|
|
PanicStrategy::Unwind => sym::unwind,
|
|
PanicStrategy::Abort => sym::abort,
|
|
}
|
|
}
|
|
|
|
pub const fn all() -> [Symbol; 2] {
|
|
[Self::Abort.desc_symbol(), Self::Unwind.desc_symbol()]
|
|
}
|
|
}
|
|
|
|
impl ToJson for PanicStrategy {
|
|
fn to_json(&self) -> Json {
|
|
match *self {
|
|
PanicStrategy::Abort => "abort".to_json(),
|
|
PanicStrategy::Unwind => "unwind".to_json(),
|
|
}
|
|
}
|
|
}
|
|
|
|
#[derive(Clone, Copy, Debug, PartialEq, Hash)]
|
|
pub enum RelroLevel {
|
|
Full,
|
|
Partial,
|
|
Off,
|
|
None,
|
|
}
|
|
|
|
impl RelroLevel {
|
|
pub fn desc(&self) -> &str {
|
|
match *self {
|
|
RelroLevel::Full => "full",
|
|
RelroLevel::Partial => "partial",
|
|
RelroLevel::Off => "off",
|
|
RelroLevel::None => "none",
|
|
}
|
|
}
|
|
}
|
|
|
|
#[derive(Clone, Copy, Debug, PartialEq, Hash)]
|
|
pub enum SymbolVisibility {
|
|
Hidden,
|
|
Protected,
|
|
Interposable,
|
|
}
|
|
|
|
impl SymbolVisibility {
|
|
pub fn desc(&self) -> &str {
|
|
match *self {
|
|
SymbolVisibility::Hidden => "hidden",
|
|
SymbolVisibility::Protected => "protected",
|
|
SymbolVisibility::Interposable => "interposable",
|
|
}
|
|
}
|
|
}
|
|
|
|
impl FromStr for SymbolVisibility {
|
|
type Err = ();
|
|
|
|
fn from_str(s: &str) -> Result<SymbolVisibility, ()> {
|
|
match s {
|
|
"hidden" => Ok(SymbolVisibility::Hidden),
|
|
"protected" => Ok(SymbolVisibility::Protected),
|
|
"interposable" => Ok(SymbolVisibility::Interposable),
|
|
_ => Err(()),
|
|
}
|
|
}
|
|
}
|
|
|
|
impl ToJson for SymbolVisibility {
|
|
fn to_json(&self) -> Json {
|
|
match *self {
|
|
SymbolVisibility::Hidden => "hidden".to_json(),
|
|
SymbolVisibility::Protected => "protected".to_json(),
|
|
SymbolVisibility::Interposable => "interposable".to_json(),
|
|
}
|
|
}
|
|
}
|
|
|
|
impl FromStr for RelroLevel {
|
|
type Err = ();
|
|
|
|
fn from_str(s: &str) -> Result<RelroLevel, ()> {
|
|
match s {
|
|
"full" => Ok(RelroLevel::Full),
|
|
"partial" => Ok(RelroLevel::Partial),
|
|
"off" => Ok(RelroLevel::Off),
|
|
"none" => Ok(RelroLevel::None),
|
|
_ => Err(()),
|
|
}
|
|
}
|
|
}
|
|
|
|
impl ToJson for RelroLevel {
|
|
fn to_json(&self) -> Json {
|
|
match *self {
|
|
RelroLevel::Full => "full".to_json(),
|
|
RelroLevel::Partial => "partial".to_json(),
|
|
RelroLevel::Off => "off".to_json(),
|
|
RelroLevel::None => "None".to_json(),
|
|
}
|
|
}
|
|
}
|
|
|
|
#[derive(Clone, Debug, PartialEq, Hash)]
|
|
pub enum SmallDataThresholdSupport {
|
|
None,
|
|
DefaultForArch,
|
|
LlvmModuleFlag(StaticCow<str>),
|
|
LlvmArg(StaticCow<str>),
|
|
}
|
|
|
|
impl FromStr for SmallDataThresholdSupport {
|
|
type Err = ();
|
|
|
|
fn from_str(s: &str) -> Result<Self, Self::Err> {
|
|
if s == "none" {
|
|
Ok(Self::None)
|
|
} else if s == "default-for-arch" {
|
|
Ok(Self::DefaultForArch)
|
|
} else if let Some(flag) = s.strip_prefix("llvm-module-flag=") {
|
|
Ok(Self::LlvmModuleFlag(flag.to_string().into()))
|
|
} else if let Some(arg) = s.strip_prefix("llvm-arg=") {
|
|
Ok(Self::LlvmArg(arg.to_string().into()))
|
|
} else {
|
|
Err(())
|
|
}
|
|
}
|
|
}
|
|
|
|
impl ToJson for SmallDataThresholdSupport {
|
|
fn to_json(&self) -> Value {
|
|
match self {
|
|
Self::None => "none".to_json(),
|
|
Self::DefaultForArch => "default-for-arch".to_json(),
|
|
Self::LlvmModuleFlag(flag) => format!("llvm-module-flag={flag}").to_json(),
|
|
Self::LlvmArg(arg) => format!("llvm-arg={arg}").to_json(),
|
|
}
|
|
}
|
|
}
|
|
|
|
#[derive(Clone, Copy, Debug, PartialEq, Hash)]
|
|
pub enum MergeFunctions {
|
|
Disabled,
|
|
Trampolines,
|
|
Aliases,
|
|
}
|
|
|
|
impl MergeFunctions {
|
|
pub fn desc(&self) -> &str {
|
|
match *self {
|
|
MergeFunctions::Disabled => "disabled",
|
|
MergeFunctions::Trampolines => "trampolines",
|
|
MergeFunctions::Aliases => "aliases",
|
|
}
|
|
}
|
|
}
|
|
|
|
impl FromStr for MergeFunctions {
|
|
type Err = ();
|
|
|
|
fn from_str(s: &str) -> Result<MergeFunctions, ()> {
|
|
match s {
|
|
"disabled" => Ok(MergeFunctions::Disabled),
|
|
"trampolines" => Ok(MergeFunctions::Trampolines),
|
|
"aliases" => Ok(MergeFunctions::Aliases),
|
|
_ => Err(()),
|
|
}
|
|
}
|
|
}
|
|
|
|
impl ToJson for MergeFunctions {
|
|
fn to_json(&self) -> Json {
|
|
match *self {
|
|
MergeFunctions::Disabled => "disabled".to_json(),
|
|
MergeFunctions::Trampolines => "trampolines".to_json(),
|
|
MergeFunctions::Aliases => "aliases".to_json(),
|
|
}
|
|
}
|
|
}
|
|
|
|
#[derive(Clone, Copy, PartialEq, Hash, Debug)]
|
|
pub enum RelocModel {
|
|
Static,
|
|
Pic,
|
|
Pie,
|
|
DynamicNoPic,
|
|
Ropi,
|
|
Rwpi,
|
|
RopiRwpi,
|
|
}
|
|
|
|
impl RelocModel {
|
|
pub fn desc(&self) -> &str {
|
|
match *self {
|
|
RelocModel::Static => "static",
|
|
RelocModel::Pic => "pic",
|
|
RelocModel::Pie => "pie",
|
|
RelocModel::DynamicNoPic => "dynamic-no-pic",
|
|
RelocModel::Ropi => "ropi",
|
|
RelocModel::Rwpi => "rwpi",
|
|
RelocModel::RopiRwpi => "ropi-rwpi",
|
|
}
|
|
}
|
|
pub const fn desc_symbol(&self) -> Symbol {
|
|
match *self {
|
|
RelocModel::Static => kw::Static,
|
|
RelocModel::Pic => sym::pic,
|
|
RelocModel::Pie => sym::pie,
|
|
RelocModel::DynamicNoPic => sym::dynamic_no_pic,
|
|
RelocModel::Ropi => sym::ropi,
|
|
RelocModel::Rwpi => sym::rwpi,
|
|
RelocModel::RopiRwpi => sym::ropi_rwpi,
|
|
}
|
|
}
|
|
|
|
pub const fn all() -> [Symbol; 7] {
|
|
[
|
|
RelocModel::Static.desc_symbol(),
|
|
RelocModel::Pic.desc_symbol(),
|
|
RelocModel::Pie.desc_symbol(),
|
|
RelocModel::DynamicNoPic.desc_symbol(),
|
|
RelocModel::Ropi.desc_symbol(),
|
|
RelocModel::Rwpi.desc_symbol(),
|
|
RelocModel::RopiRwpi.desc_symbol(),
|
|
]
|
|
}
|
|
}
|
|
|
|
impl FromStr for RelocModel {
|
|
type Err = ();
|
|
|
|
fn from_str(s: &str) -> Result<RelocModel, ()> {
|
|
Ok(match s {
|
|
"static" => RelocModel::Static,
|
|
"pic" => RelocModel::Pic,
|
|
"pie" => RelocModel::Pie,
|
|
"dynamic-no-pic" => RelocModel::DynamicNoPic,
|
|
"ropi" => RelocModel::Ropi,
|
|
"rwpi" => RelocModel::Rwpi,
|
|
"ropi-rwpi" => RelocModel::RopiRwpi,
|
|
_ => return Err(()),
|
|
})
|
|
}
|
|
}
|
|
|
|
impl ToJson for RelocModel {
|
|
fn to_json(&self) -> Json {
|
|
self.desc().to_json()
|
|
}
|
|
}
|
|
|
|
#[derive(Clone, Copy, PartialEq, Hash, Debug)]
|
|
pub enum CodeModel {
|
|
Tiny,
|
|
Small,
|
|
Kernel,
|
|
Medium,
|
|
Large,
|
|
}
|
|
|
|
impl FromStr for CodeModel {
|
|
type Err = ();
|
|
|
|
fn from_str(s: &str) -> Result<CodeModel, ()> {
|
|
Ok(match s {
|
|
"tiny" => CodeModel::Tiny,
|
|
"small" => CodeModel::Small,
|
|
"kernel" => CodeModel::Kernel,
|
|
"medium" => CodeModel::Medium,
|
|
"large" => CodeModel::Large,
|
|
_ => return Err(()),
|
|
})
|
|
}
|
|
}
|
|
|
|
impl ToJson for CodeModel {
|
|
fn to_json(&self) -> Json {
|
|
match *self {
|
|
CodeModel::Tiny => "tiny",
|
|
CodeModel::Small => "small",
|
|
CodeModel::Kernel => "kernel",
|
|
CodeModel::Medium => "medium",
|
|
CodeModel::Large => "large",
|
|
}
|
|
.to_json()
|
|
}
|
|
}
|
|
|
|
/// The float ABI setting to be configured in the LLVM target machine.
|
|
#[derive(Clone, Copy, PartialEq, Hash, Debug)]
|
|
pub enum FloatAbi {
|
|
Soft,
|
|
Hard,
|
|
}
|
|
|
|
impl FromStr for FloatAbi {
|
|
type Err = ();
|
|
|
|
fn from_str(s: &str) -> Result<FloatAbi, ()> {
|
|
Ok(match s {
|
|
"soft" => FloatAbi::Soft,
|
|
"hard" => FloatAbi::Hard,
|
|
_ => return Err(()),
|
|
})
|
|
}
|
|
}
|
|
|
|
impl ToJson for FloatAbi {
|
|
fn to_json(&self) -> Json {
|
|
match *self {
|
|
FloatAbi::Soft => "soft",
|
|
FloatAbi::Hard => "hard",
|
|
}
|
|
.to_json()
|
|
}
|
|
}
|
|
|
|
/// The Rustc-specific variant of the ABI used for this target.
|
|
#[derive(Clone, Copy, PartialEq, Hash, Debug)]
|
|
pub enum RustcAbi {
|
|
/// On x86-32 only: make use of SSE and SSE2 for ABI purposes.
|
|
X86Sse2,
|
|
/// On x86-32/64 only: do not use any FPU or SIMD registers for the ABI.
|
|
X86Softfloat,
|
|
}
|
|
|
|
impl FromStr for RustcAbi {
|
|
type Err = ();
|
|
|
|
fn from_str(s: &str) -> Result<RustcAbi, ()> {
|
|
Ok(match s {
|
|
"x86-sse2" => RustcAbi::X86Sse2,
|
|
"x86-softfloat" => RustcAbi::X86Softfloat,
|
|
_ => return Err(()),
|
|
})
|
|
}
|
|
}
|
|
|
|
impl ToJson for RustcAbi {
|
|
fn to_json(&self) -> Json {
|
|
match *self {
|
|
RustcAbi::X86Sse2 => "x86-sse2",
|
|
RustcAbi::X86Softfloat => "x86-softfloat",
|
|
}
|
|
.to_json()
|
|
}
|
|
}
|
|
|
|
#[derive(Clone, Copy, PartialEq, Hash, Debug)]
|
|
pub enum TlsModel {
|
|
GeneralDynamic,
|
|
LocalDynamic,
|
|
InitialExec,
|
|
LocalExec,
|
|
Emulated,
|
|
}
|
|
|
|
impl FromStr for TlsModel {
|
|
type Err = ();
|
|
|
|
fn from_str(s: &str) -> Result<TlsModel, ()> {
|
|
Ok(match s {
|
|
// Note the difference "general" vs "global" difference. The model name is "general",
|
|
// but the user-facing option name is "global" for consistency with other compilers.
|
|
"global-dynamic" => TlsModel::GeneralDynamic,
|
|
"local-dynamic" => TlsModel::LocalDynamic,
|
|
"initial-exec" => TlsModel::InitialExec,
|
|
"local-exec" => TlsModel::LocalExec,
|
|
"emulated" => TlsModel::Emulated,
|
|
_ => return Err(()),
|
|
})
|
|
}
|
|
}
|
|
|
|
impl ToJson for TlsModel {
|
|
fn to_json(&self) -> Json {
|
|
match *self {
|
|
TlsModel::GeneralDynamic => "global-dynamic",
|
|
TlsModel::LocalDynamic => "local-dynamic",
|
|
TlsModel::InitialExec => "initial-exec",
|
|
TlsModel::LocalExec => "local-exec",
|
|
TlsModel::Emulated => "emulated",
|
|
}
|
|
.to_json()
|
|
}
|
|
}
|
|
|
|
/// Everything is flattened to a single enum to make the json encoding/decoding less annoying.
|
|
#[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Debug)]
|
|
pub enum LinkOutputKind {
|
|
/// Dynamically linked non position-independent executable.
|
|
DynamicNoPicExe,
|
|
/// Dynamically linked position-independent executable.
|
|
DynamicPicExe,
|
|
/// Statically linked non position-independent executable.
|
|
StaticNoPicExe,
|
|
/// Statically linked position-independent executable.
|
|
StaticPicExe,
|
|
/// Regular dynamic library ("dynamically linked").
|
|
DynamicDylib,
|
|
/// Dynamic library with bundled libc ("statically linked").
|
|
StaticDylib,
|
|
/// WASI module with a lifetime past the _initialize entry point
|
|
WasiReactorExe,
|
|
}
|
|
|
|
impl LinkOutputKind {
|
|
fn as_str(&self) -> &'static str {
|
|
match self {
|
|
LinkOutputKind::DynamicNoPicExe => "dynamic-nopic-exe",
|
|
LinkOutputKind::DynamicPicExe => "dynamic-pic-exe",
|
|
LinkOutputKind::StaticNoPicExe => "static-nopic-exe",
|
|
LinkOutputKind::StaticPicExe => "static-pic-exe",
|
|
LinkOutputKind::DynamicDylib => "dynamic-dylib",
|
|
LinkOutputKind::StaticDylib => "static-dylib",
|
|
LinkOutputKind::WasiReactorExe => "wasi-reactor-exe",
|
|
}
|
|
}
|
|
|
|
pub(super) fn from_str(s: &str) -> Option<LinkOutputKind> {
|
|
Some(match s {
|
|
"dynamic-nopic-exe" => LinkOutputKind::DynamicNoPicExe,
|
|
"dynamic-pic-exe" => LinkOutputKind::DynamicPicExe,
|
|
"static-nopic-exe" => LinkOutputKind::StaticNoPicExe,
|
|
"static-pic-exe" => LinkOutputKind::StaticPicExe,
|
|
"dynamic-dylib" => LinkOutputKind::DynamicDylib,
|
|
"static-dylib" => LinkOutputKind::StaticDylib,
|
|
"wasi-reactor-exe" => LinkOutputKind::WasiReactorExe,
|
|
_ => return None,
|
|
})
|
|
}
|
|
|
|
pub fn can_link_dylib(self) -> bool {
|
|
match self {
|
|
LinkOutputKind::StaticNoPicExe | LinkOutputKind::StaticPicExe => false,
|
|
LinkOutputKind::DynamicNoPicExe
|
|
| LinkOutputKind::DynamicPicExe
|
|
| LinkOutputKind::DynamicDylib
|
|
| LinkOutputKind::StaticDylib
|
|
| LinkOutputKind::WasiReactorExe => true,
|
|
}
|
|
}
|
|
}
|
|
|
|
impl fmt::Display for LinkOutputKind {
|
|
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
|
f.write_str(self.as_str())
|
|
}
|
|
}
|
|
|
|
pub type LinkArgs = BTreeMap<LinkerFlavor, Vec<StaticCow<str>>>;
|
|
pub type LinkArgsCli = BTreeMap<LinkerFlavorCli, Vec<StaticCow<str>>>;
|
|
|
|
/// Which kind of debuginfo does the target use?
|
|
///
|
|
/// Useful in determining whether a target supports Split DWARF (a target with
|
|
/// `DebuginfoKind::Dwarf` and supporting `SplitDebuginfo::Unpacked` for example).
|
|
#[derive(Clone, Copy, Debug, Default, Eq, Hash, PartialEq)]
|
|
pub enum DebuginfoKind {
|
|
/// DWARF debuginfo (such as that used on `x86_64_unknown_linux_gnu`).
|
|
#[default]
|
|
Dwarf,
|
|
/// DWARF debuginfo in dSYM files (such as on Apple platforms).
|
|
DwarfDsym,
|
|
/// Program database files (such as on Windows).
|
|
Pdb,
|
|
}
|
|
|
|
impl DebuginfoKind {
|
|
fn as_str(&self) -> &'static str {
|
|
match self {
|
|
DebuginfoKind::Dwarf => "dwarf",
|
|
DebuginfoKind::DwarfDsym => "dwarf-dsym",
|
|
DebuginfoKind::Pdb => "pdb",
|
|
}
|
|
}
|
|
}
|
|
|
|
impl FromStr for DebuginfoKind {
|
|
type Err = ();
|
|
|
|
fn from_str(s: &str) -> Result<Self, ()> {
|
|
Ok(match s {
|
|
"dwarf" => DebuginfoKind::Dwarf,
|
|
"dwarf-dsym" => DebuginfoKind::DwarfDsym,
|
|
"pdb" => DebuginfoKind::Pdb,
|
|
_ => return Err(()),
|
|
})
|
|
}
|
|
}
|
|
|
|
impl ToJson for DebuginfoKind {
|
|
fn to_json(&self) -> Json {
|
|
self.as_str().to_json()
|
|
}
|
|
}
|
|
|
|
impl fmt::Display for DebuginfoKind {
|
|
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
|
f.write_str(self.as_str())
|
|
}
|
|
}
|
|
|
|
#[derive(Clone, Copy, Debug, Default, Eq, Hash, PartialEq)]
|
|
pub enum SplitDebuginfo {
|
|
/// Split debug-information is disabled, meaning that on supported platforms
|
|
/// you can find all debug information in the executable itself. This is
|
|
/// only supported for ELF effectively.
|
|
///
|
|
/// * Windows - not supported
|
|
/// * macOS - don't run `dsymutil`
|
|
/// * ELF - `.debug_*` sections
|
|
#[default]
|
|
Off,
|
|
|
|
/// Split debug-information can be found in a "packed" location separate
|
|
/// from the final artifact. This is supported on all platforms.
|
|
///
|
|
/// * Windows - `*.pdb`
|
|
/// * macOS - `*.dSYM` (run `dsymutil`)
|
|
/// * ELF - `*.dwp` (run `thorin`)
|
|
Packed,
|
|
|
|
/// Split debug-information can be found in individual object files on the
|
|
/// filesystem. The main executable may point to the object files.
|
|
///
|
|
/// * Windows - not supported
|
|
/// * macOS - supported, scattered object files
|
|
/// * ELF - supported, scattered `*.dwo` or `*.o` files (see `SplitDwarfKind`)
|
|
Unpacked,
|
|
}
|
|
|
|
impl SplitDebuginfo {
|
|
fn as_str(&self) -> &'static str {
|
|
match self {
|
|
SplitDebuginfo::Off => "off",
|
|
SplitDebuginfo::Packed => "packed",
|
|
SplitDebuginfo::Unpacked => "unpacked",
|
|
}
|
|
}
|
|
}
|
|
|
|
impl FromStr for SplitDebuginfo {
|
|
type Err = ();
|
|
|
|
fn from_str(s: &str) -> Result<Self, ()> {
|
|
Ok(match s {
|
|
"off" => SplitDebuginfo::Off,
|
|
"unpacked" => SplitDebuginfo::Unpacked,
|
|
"packed" => SplitDebuginfo::Packed,
|
|
_ => return Err(()),
|
|
})
|
|
}
|
|
}
|
|
|
|
impl ToJson for SplitDebuginfo {
|
|
fn to_json(&self) -> Json {
|
|
self.as_str().to_json()
|
|
}
|
|
}
|
|
|
|
impl fmt::Display for SplitDebuginfo {
|
|
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
|
f.write_str(self.as_str())
|
|
}
|
|
}
|
|
|
|
#[derive(Clone, Debug, PartialEq, Eq)]
|
|
pub enum StackProbeType {
|
|
/// Don't emit any stack probes.
|
|
None,
|
|
/// It is harmless to use this option even on targets that do not have backend support for
|
|
/// stack probes as the failure mode is the same as if no stack-probe option was specified in
|
|
/// the first place.
|
|
Inline,
|
|
/// Call `__rust_probestack` whenever stack needs to be probed.
|
|
Call,
|
|
/// Use inline option for LLVM versions later than specified in `min_llvm_version_for_inline`
|
|
/// and call `__rust_probestack` otherwise.
|
|
InlineOrCall { min_llvm_version_for_inline: (u32, u32, u32) },
|
|
}
|
|
|
|
impl StackProbeType {
|
|
fn from_json(json: &Json) -> Result<Self, String> {
|
|
let object = json.as_object().ok_or_else(|| "expected a JSON object")?;
|
|
let kind = object
|
|
.get("kind")
|
|
.and_then(|o| o.as_str())
|
|
.ok_or_else(|| "expected `kind` to be a string")?;
|
|
match kind {
|
|
"none" => Ok(StackProbeType::None),
|
|
"inline" => Ok(StackProbeType::Inline),
|
|
"call" => Ok(StackProbeType::Call),
|
|
"inline-or-call" => {
|
|
let min_version = object
|
|
.get("min-llvm-version-for-inline")
|
|
.and_then(|o| o.as_array())
|
|
.ok_or_else(|| "expected `min-llvm-version-for-inline` to be an array")?;
|
|
let mut iter = min_version.into_iter().map(|v| {
|
|
let int = v.as_u64().ok_or_else(
|
|
|| "expected `min-llvm-version-for-inline` values to be integers",
|
|
)?;
|
|
u32::try_from(int)
|
|
.map_err(|_| "`min-llvm-version-for-inline` values don't convert to u32")
|
|
});
|
|
let min_llvm_version_for_inline = (
|
|
iter.next().unwrap_or(Ok(11))?,
|
|
iter.next().unwrap_or(Ok(0))?,
|
|
iter.next().unwrap_or(Ok(0))?,
|
|
);
|
|
Ok(StackProbeType::InlineOrCall { min_llvm_version_for_inline })
|
|
}
|
|
_ => Err(String::from(
|
|
"`kind` expected to be one of `none`, `inline`, `call` or `inline-or-call`",
|
|
)),
|
|
}
|
|
}
|
|
}
|
|
|
|
impl ToJson for StackProbeType {
|
|
fn to_json(&self) -> Json {
|
|
Json::Object(match self {
|
|
StackProbeType::None => {
|
|
[(String::from("kind"), "none".to_json())].into_iter().collect()
|
|
}
|
|
StackProbeType::Inline => {
|
|
[(String::from("kind"), "inline".to_json())].into_iter().collect()
|
|
}
|
|
StackProbeType::Call => {
|
|
[(String::from("kind"), "call".to_json())].into_iter().collect()
|
|
}
|
|
StackProbeType::InlineOrCall { min_llvm_version_for_inline: (maj, min, patch) } => [
|
|
(String::from("kind"), "inline-or-call".to_json()),
|
|
(
|
|
String::from("min-llvm-version-for-inline"),
|
|
Json::Array(vec![maj.to_json(), min.to_json(), patch.to_json()]),
|
|
),
|
|
]
|
|
.into_iter()
|
|
.collect(),
|
|
})
|
|
}
|
|
}
|
|
|
|
#[derive(Default, Clone, Copy, PartialEq, Eq, Hash, Encodable, Decodable, HashStable_Generic)]
|
|
pub struct SanitizerSet(u16);
|
|
bitflags::bitflags! {
|
|
impl SanitizerSet: u16 {
|
|
const ADDRESS = 1 << 0;
|
|
const LEAK = 1 << 1;
|
|
const MEMORY = 1 << 2;
|
|
const THREAD = 1 << 3;
|
|
const HWADDRESS = 1 << 4;
|
|
const CFI = 1 << 5;
|
|
const MEMTAG = 1 << 6;
|
|
const SHADOWCALLSTACK = 1 << 7;
|
|
const KCFI = 1 << 8;
|
|
const KERNELADDRESS = 1 << 9;
|
|
const SAFESTACK = 1 << 10;
|
|
const DATAFLOW = 1 << 11;
|
|
}
|
|
}
|
|
rustc_data_structures::external_bitflags_debug! { SanitizerSet }
|
|
|
|
impl SanitizerSet {
|
|
// Taken from LLVM's sanitizer compatibility logic:
|
|
// https://github.com/llvm/llvm-project/blob/release/18.x/clang/lib/Driver/SanitizerArgs.cpp#L512
|
|
const MUTUALLY_EXCLUSIVE: &'static [(SanitizerSet, SanitizerSet)] = &[
|
|
(SanitizerSet::ADDRESS, SanitizerSet::MEMORY),
|
|
(SanitizerSet::ADDRESS, SanitizerSet::THREAD),
|
|
(SanitizerSet::ADDRESS, SanitizerSet::HWADDRESS),
|
|
(SanitizerSet::ADDRESS, SanitizerSet::MEMTAG),
|
|
(SanitizerSet::ADDRESS, SanitizerSet::KERNELADDRESS),
|
|
(SanitizerSet::ADDRESS, SanitizerSet::SAFESTACK),
|
|
(SanitizerSet::LEAK, SanitizerSet::MEMORY),
|
|
(SanitizerSet::LEAK, SanitizerSet::THREAD),
|
|
(SanitizerSet::LEAK, SanitizerSet::KERNELADDRESS),
|
|
(SanitizerSet::LEAK, SanitizerSet::SAFESTACK),
|
|
(SanitizerSet::MEMORY, SanitizerSet::THREAD),
|
|
(SanitizerSet::MEMORY, SanitizerSet::HWADDRESS),
|
|
(SanitizerSet::MEMORY, SanitizerSet::KERNELADDRESS),
|
|
(SanitizerSet::MEMORY, SanitizerSet::SAFESTACK),
|
|
(SanitizerSet::THREAD, SanitizerSet::HWADDRESS),
|
|
(SanitizerSet::THREAD, SanitizerSet::KERNELADDRESS),
|
|
(SanitizerSet::THREAD, SanitizerSet::SAFESTACK),
|
|
(SanitizerSet::HWADDRESS, SanitizerSet::MEMTAG),
|
|
(SanitizerSet::HWADDRESS, SanitizerSet::KERNELADDRESS),
|
|
(SanitizerSet::HWADDRESS, SanitizerSet::SAFESTACK),
|
|
(SanitizerSet::CFI, SanitizerSet::KCFI),
|
|
(SanitizerSet::MEMTAG, SanitizerSet::KERNELADDRESS),
|
|
(SanitizerSet::KERNELADDRESS, SanitizerSet::SAFESTACK),
|
|
];
|
|
|
|
/// Return sanitizer's name
|
|
///
|
|
/// Returns none if the flags is a set of sanitizers numbering not exactly one.
|
|
pub fn as_str(self) -> Option<&'static str> {
|
|
Some(match self {
|
|
SanitizerSet::ADDRESS => "address",
|
|
SanitizerSet::CFI => "cfi",
|
|
SanitizerSet::DATAFLOW => "dataflow",
|
|
SanitizerSet::KCFI => "kcfi",
|
|
SanitizerSet::KERNELADDRESS => "kernel-address",
|
|
SanitizerSet::LEAK => "leak",
|
|
SanitizerSet::MEMORY => "memory",
|
|
SanitizerSet::MEMTAG => "memtag",
|
|
SanitizerSet::SAFESTACK => "safestack",
|
|
SanitizerSet::SHADOWCALLSTACK => "shadow-call-stack",
|
|
SanitizerSet::THREAD => "thread",
|
|
SanitizerSet::HWADDRESS => "hwaddress",
|
|
_ => return None,
|
|
})
|
|
}
|
|
|
|
pub fn mutually_exclusive(self) -> Option<(SanitizerSet, SanitizerSet)> {
|
|
Self::MUTUALLY_EXCLUSIVE
|
|
.into_iter()
|
|
.find(|&(a, b)| self.contains(*a) && self.contains(*b))
|
|
.copied()
|
|
}
|
|
}
|
|
|
|
/// Formats a sanitizer set as a comma separated list of sanitizers' names.
|
|
impl fmt::Display for SanitizerSet {
|
|
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
|
let mut first = true;
|
|
for s in *self {
|
|
let name = s.as_str().unwrap_or_else(|| panic!("unrecognized sanitizer {s:?}"));
|
|
if !first {
|
|
f.write_str(", ")?;
|
|
}
|
|
f.write_str(name)?;
|
|
first = false;
|
|
}
|
|
Ok(())
|
|
}
|
|
}
|
|
|
|
impl ToJson for SanitizerSet {
|
|
fn to_json(&self) -> Json {
|
|
self.into_iter()
|
|
.map(|v| Some(v.as_str()?.to_json()))
|
|
.collect::<Option<Vec<_>>>()
|
|
.unwrap_or_default()
|
|
.to_json()
|
|
}
|
|
}
|
|
|
|
#[derive(Clone, Copy, PartialEq, Hash, Debug)]
|
|
pub enum FramePointer {
|
|
/// Forces the machine code generator to always preserve the frame pointers.
|
|
Always,
|
|
/// Forces the machine code generator to preserve the frame pointers except for the leaf
|
|
/// functions (i.e. those that don't call other functions).
|
|
NonLeaf,
|
|
/// Allows the machine code generator to omit the frame pointers.
|
|
///
|
|
/// This option does not guarantee that the frame pointers will be omitted.
|
|
MayOmit,
|
|
}
|
|
|
|
impl FramePointer {
|
|
/// It is intended that the "force frame pointer" transition is "one way"
|
|
/// so this convenience assures such if used
|
|
#[inline]
|
|
pub fn ratchet(&mut self, rhs: FramePointer) -> FramePointer {
|
|
*self = match (*self, rhs) {
|
|
(FramePointer::Always, _) | (_, FramePointer::Always) => FramePointer::Always,
|
|
(FramePointer::NonLeaf, _) | (_, FramePointer::NonLeaf) => FramePointer::NonLeaf,
|
|
_ => FramePointer::MayOmit,
|
|
};
|
|
*self
|
|
}
|
|
}
|
|
|
|
impl FromStr for FramePointer {
|
|
type Err = ();
|
|
fn from_str(s: &str) -> Result<Self, ()> {
|
|
Ok(match s {
|
|
"always" => Self::Always,
|
|
"non-leaf" => Self::NonLeaf,
|
|
"may-omit" => Self::MayOmit,
|
|
_ => return Err(()),
|
|
})
|
|
}
|
|
}
|
|
|
|
impl ToJson for FramePointer {
|
|
fn to_json(&self) -> Json {
|
|
match *self {
|
|
Self::Always => "always",
|
|
Self::NonLeaf => "non-leaf",
|
|
Self::MayOmit => "may-omit",
|
|
}
|
|
.to_json()
|
|
}
|
|
}
|
|
|
|
/// Controls use of stack canaries.
|
|
#[derive(Clone, Copy, Debug, PartialEq, Hash, Eq)]
|
|
pub enum StackProtector {
|
|
/// Disable stack canary generation.
|
|
None,
|
|
|
|
/// On LLVM, mark all generated LLVM functions with the `ssp` attribute (see
|
|
/// llvm/docs/LangRef.rst). This triggers stack canary generation in
|
|
/// functions which contain an array of a byte-sized type with more than
|
|
/// eight elements.
|
|
Basic,
|
|
|
|
/// On LLVM, mark all generated LLVM functions with the `sspstrong`
|
|
/// attribute (see llvm/docs/LangRef.rst). This triggers stack canary
|
|
/// generation in functions which either contain an array, or which take
|
|
/// the address of a local variable.
|
|
Strong,
|
|
|
|
/// Generate stack canaries in all functions.
|
|
All,
|
|
}
|
|
|
|
impl StackProtector {
|
|
fn as_str(&self) -> &'static str {
|
|
match self {
|
|
StackProtector::None => "none",
|
|
StackProtector::Basic => "basic",
|
|
StackProtector::Strong => "strong",
|
|
StackProtector::All => "all",
|
|
}
|
|
}
|
|
}
|
|
|
|
impl FromStr for StackProtector {
|
|
type Err = ();
|
|
|
|
fn from_str(s: &str) -> Result<StackProtector, ()> {
|
|
Ok(match s {
|
|
"none" => StackProtector::None,
|
|
"basic" => StackProtector::Basic,
|
|
"strong" => StackProtector::Strong,
|
|
"all" => StackProtector::All,
|
|
_ => return Err(()),
|
|
})
|
|
}
|
|
}
|
|
|
|
impl fmt::Display for StackProtector {
|
|
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
|
f.write_str(self.as_str())
|
|
}
|
|
}
|
|
|
|
#[derive(PartialEq, Clone, Debug)]
|
|
pub enum BinaryFormat {
|
|
Coff,
|
|
Elf,
|
|
MachO,
|
|
Wasm,
|
|
Xcoff,
|
|
}
|
|
|
|
impl BinaryFormat {
|
|
/// Returns [`object::BinaryFormat`] for given `BinaryFormat`
|
|
pub fn to_object(&self) -> object::BinaryFormat {
|
|
match self {
|
|
Self::Coff => object::BinaryFormat::Coff,
|
|
Self::Elf => object::BinaryFormat::Elf,
|
|
Self::MachO => object::BinaryFormat::MachO,
|
|
Self::Wasm => object::BinaryFormat::Wasm,
|
|
Self::Xcoff => object::BinaryFormat::Xcoff,
|
|
}
|
|
}
|
|
}
|
|
|
|
impl FromStr for BinaryFormat {
|
|
type Err = ();
|
|
fn from_str(s: &str) -> Result<Self, Self::Err> {
|
|
match s {
|
|
"coff" => Ok(Self::Coff),
|
|
"elf" => Ok(Self::Elf),
|
|
"mach-o" => Ok(Self::MachO),
|
|
"wasm" => Ok(Self::Wasm),
|
|
"xcoff" => Ok(Self::Xcoff),
|
|
_ => Err(()),
|
|
}
|
|
}
|
|
}
|
|
|
|
impl ToJson for BinaryFormat {
|
|
fn to_json(&self) -> Json {
|
|
match self {
|
|
Self::Coff => "coff",
|
|
Self::Elf => "elf",
|
|
Self::MachO => "mach-o",
|
|
Self::Wasm => "wasm",
|
|
Self::Xcoff => "xcoff",
|
|
}
|
|
.to_json()
|
|
}
|
|
}
|
|
|
|
macro_rules! supported_targets {
|
|
( $(($tuple:literal, $module:ident),)+ ) => {
|
|
mod targets {
|
|
$(pub(crate) mod $module;)+
|
|
}
|
|
|
|
/// List of supported targets
|
|
pub static TARGETS: &[&str] = &[$($tuple),+];
|
|
|
|
fn load_builtin(target: &str) -> Option<Target> {
|
|
let t = match target {
|
|
$( $tuple => targets::$module::target(), )+
|
|
_ => return None,
|
|
};
|
|
debug!("got builtin target: {:?}", t);
|
|
Some(t)
|
|
}
|
|
|
|
fn load_all_builtins() -> impl Iterator<Item = Target> {
|
|
[
|
|
$( targets::$module::target, )+
|
|
]
|
|
.into_iter()
|
|
.map(|f| f())
|
|
}
|
|
|
|
#[cfg(test)]
|
|
mod tests {
|
|
// Cannot put this into a separate file without duplication, make an exception.
|
|
$(
|
|
#[test] // `#[test]`
|
|
fn $module() {
|
|
crate::spec::targets::$module::target().test_target()
|
|
}
|
|
)+
|
|
}
|
|
};
|
|
}
|
|
|
|
supported_targets! {
|
|
("x86_64-unknown-linux-gnu", x86_64_unknown_linux_gnu),
|
|
("x86_64-unknown-linux-gnux32", x86_64_unknown_linux_gnux32),
|
|
("i686-unknown-linux-gnu", i686_unknown_linux_gnu),
|
|
("i586-unknown-linux-gnu", i586_unknown_linux_gnu),
|
|
("loongarch64-unknown-linux-gnu", loongarch64_unknown_linux_gnu),
|
|
("loongarch64-unknown-linux-musl", loongarch64_unknown_linux_musl),
|
|
("m68k-unknown-linux-gnu", m68k_unknown_linux_gnu),
|
|
("m68k-unknown-none-elf", m68k_unknown_none_elf),
|
|
("csky-unknown-linux-gnuabiv2", csky_unknown_linux_gnuabiv2),
|
|
("csky-unknown-linux-gnuabiv2hf", csky_unknown_linux_gnuabiv2hf),
|
|
("mips-unknown-linux-gnu", mips_unknown_linux_gnu),
|
|
("mips64-unknown-linux-gnuabi64", mips64_unknown_linux_gnuabi64),
|
|
("mips64el-unknown-linux-gnuabi64", mips64el_unknown_linux_gnuabi64),
|
|
("mipsisa32r6-unknown-linux-gnu", mipsisa32r6_unknown_linux_gnu),
|
|
("mipsisa32r6el-unknown-linux-gnu", mipsisa32r6el_unknown_linux_gnu),
|
|
("mipsisa64r6-unknown-linux-gnuabi64", mipsisa64r6_unknown_linux_gnuabi64),
|
|
("mipsisa64r6el-unknown-linux-gnuabi64", mipsisa64r6el_unknown_linux_gnuabi64),
|
|
("mipsel-unknown-linux-gnu", mipsel_unknown_linux_gnu),
|
|
("powerpc-unknown-linux-gnu", powerpc_unknown_linux_gnu),
|
|
("powerpc-unknown-linux-gnuspe", powerpc_unknown_linux_gnuspe),
|
|
("powerpc-unknown-linux-musl", powerpc_unknown_linux_musl),
|
|
("powerpc-unknown-linux-muslspe", powerpc_unknown_linux_muslspe),
|
|
("powerpc64-ibm-aix", powerpc64_ibm_aix),
|
|
("powerpc64-unknown-linux-gnu", powerpc64_unknown_linux_gnu),
|
|
("powerpc64-unknown-linux-musl", powerpc64_unknown_linux_musl),
|
|
("powerpc64le-unknown-linux-gnu", powerpc64le_unknown_linux_gnu),
|
|
("powerpc64le-unknown-linux-musl", powerpc64le_unknown_linux_musl),
|
|
("s390x-unknown-linux-gnu", s390x_unknown_linux_gnu),
|
|
("s390x-unknown-linux-musl", s390x_unknown_linux_musl),
|
|
("sparc-unknown-linux-gnu", sparc_unknown_linux_gnu),
|
|
("sparc64-unknown-linux-gnu", sparc64_unknown_linux_gnu),
|
|
("arm-unknown-linux-gnueabi", arm_unknown_linux_gnueabi),
|
|
("arm-unknown-linux-gnueabihf", arm_unknown_linux_gnueabihf),
|
|
("armeb-unknown-linux-gnueabi", armeb_unknown_linux_gnueabi),
|
|
("arm-unknown-linux-musleabi", arm_unknown_linux_musleabi),
|
|
("arm-unknown-linux-musleabihf", arm_unknown_linux_musleabihf),
|
|
("armv4t-unknown-linux-gnueabi", armv4t_unknown_linux_gnueabi),
|
|
("armv5te-unknown-linux-gnueabi", armv5te_unknown_linux_gnueabi),
|
|
("armv5te-unknown-linux-musleabi", armv5te_unknown_linux_musleabi),
|
|
("armv5te-unknown-linux-uclibceabi", armv5te_unknown_linux_uclibceabi),
|
|
("armv7-unknown-linux-gnueabi", armv7_unknown_linux_gnueabi),
|
|
("armv7-unknown-linux-gnueabihf", armv7_unknown_linux_gnueabihf),
|
|
("thumbv7neon-unknown-linux-gnueabihf", thumbv7neon_unknown_linux_gnueabihf),
|
|
("thumbv7neon-unknown-linux-musleabihf", thumbv7neon_unknown_linux_musleabihf),
|
|
("armv7-unknown-linux-musleabi", armv7_unknown_linux_musleabi),
|
|
("armv7-unknown-linux-musleabihf", armv7_unknown_linux_musleabihf),
|
|
("aarch64-unknown-linux-gnu", aarch64_unknown_linux_gnu),
|
|
("aarch64-unknown-linux-musl", aarch64_unknown_linux_musl),
|
|
("x86_64-unknown-linux-musl", x86_64_unknown_linux_musl),
|
|
("i686-unknown-linux-musl", i686_unknown_linux_musl),
|
|
("i586-unknown-linux-musl", i586_unknown_linux_musl),
|
|
("mips-unknown-linux-musl", mips_unknown_linux_musl),
|
|
("mipsel-unknown-linux-musl", mipsel_unknown_linux_musl),
|
|
("mips64-unknown-linux-muslabi64", mips64_unknown_linux_muslabi64),
|
|
("mips64el-unknown-linux-muslabi64", mips64el_unknown_linux_muslabi64),
|
|
("hexagon-unknown-linux-musl", hexagon_unknown_linux_musl),
|
|
("hexagon-unknown-none-elf", hexagon_unknown_none_elf),
|
|
|
|
("mips-unknown-linux-uclibc", mips_unknown_linux_uclibc),
|
|
("mipsel-unknown-linux-uclibc", mipsel_unknown_linux_uclibc),
|
|
|
|
("i686-linux-android", i686_linux_android),
|
|
("x86_64-linux-android", x86_64_linux_android),
|
|
("arm-linux-androideabi", arm_linux_androideabi),
|
|
("armv7-linux-androideabi", armv7_linux_androideabi),
|
|
("thumbv7neon-linux-androideabi", thumbv7neon_linux_androideabi),
|
|
("aarch64-linux-android", aarch64_linux_android),
|
|
("riscv64-linux-android", riscv64_linux_android),
|
|
|
|
("aarch64-unknown-freebsd", aarch64_unknown_freebsd),
|
|
("armv6-unknown-freebsd", armv6_unknown_freebsd),
|
|
("armv7-unknown-freebsd", armv7_unknown_freebsd),
|
|
("i686-unknown-freebsd", i686_unknown_freebsd),
|
|
("powerpc-unknown-freebsd", powerpc_unknown_freebsd),
|
|
("powerpc64-unknown-freebsd", powerpc64_unknown_freebsd),
|
|
("powerpc64le-unknown-freebsd", powerpc64le_unknown_freebsd),
|
|
("riscv64gc-unknown-freebsd", riscv64gc_unknown_freebsd),
|
|
("x86_64-unknown-freebsd", x86_64_unknown_freebsd),
|
|
|
|
("x86_64-unknown-dragonfly", x86_64_unknown_dragonfly),
|
|
|
|
("aarch64-unknown-openbsd", aarch64_unknown_openbsd),
|
|
("i686-unknown-openbsd", i686_unknown_openbsd),
|
|
("powerpc-unknown-openbsd", powerpc_unknown_openbsd),
|
|
("powerpc64-unknown-openbsd", powerpc64_unknown_openbsd),
|
|
("riscv64gc-unknown-openbsd", riscv64gc_unknown_openbsd),
|
|
("sparc64-unknown-openbsd", sparc64_unknown_openbsd),
|
|
("x86_64-unknown-openbsd", x86_64_unknown_openbsd),
|
|
|
|
("aarch64-unknown-netbsd", aarch64_unknown_netbsd),
|
|
("aarch64_be-unknown-netbsd", aarch64_be_unknown_netbsd),
|
|
("armv6-unknown-netbsd-eabihf", armv6_unknown_netbsd_eabihf),
|
|
("armv7-unknown-netbsd-eabihf", armv7_unknown_netbsd_eabihf),
|
|
("i586-unknown-netbsd", i586_unknown_netbsd),
|
|
("i686-unknown-netbsd", i686_unknown_netbsd),
|
|
("mipsel-unknown-netbsd", mipsel_unknown_netbsd),
|
|
("powerpc-unknown-netbsd", powerpc_unknown_netbsd),
|
|
("riscv64gc-unknown-netbsd", riscv64gc_unknown_netbsd),
|
|
("sparc64-unknown-netbsd", sparc64_unknown_netbsd),
|
|
("x86_64-unknown-netbsd", x86_64_unknown_netbsd),
|
|
|
|
("i686-unknown-haiku", i686_unknown_haiku),
|
|
("x86_64-unknown-haiku", x86_64_unknown_haiku),
|
|
|
|
("i686-unknown-hurd-gnu", i686_unknown_hurd_gnu),
|
|
("x86_64-unknown-hurd-gnu", x86_64_unknown_hurd_gnu),
|
|
|
|
("aarch64-apple-darwin", aarch64_apple_darwin),
|
|
("arm64e-apple-darwin", arm64e_apple_darwin),
|
|
("x86_64-apple-darwin", x86_64_apple_darwin),
|
|
("x86_64h-apple-darwin", x86_64h_apple_darwin),
|
|
("i686-apple-darwin", i686_apple_darwin),
|
|
|
|
("aarch64-unknown-fuchsia", aarch64_unknown_fuchsia),
|
|
("riscv64gc-unknown-fuchsia", riscv64gc_unknown_fuchsia),
|
|
("x86_64-unknown-fuchsia", x86_64_unknown_fuchsia),
|
|
|
|
("avr-none", avr_none),
|
|
|
|
("x86_64-unknown-l4re-uclibc", x86_64_unknown_l4re_uclibc),
|
|
|
|
("aarch64-unknown-redox", aarch64_unknown_redox),
|
|
("i586-unknown-redox", i586_unknown_redox),
|
|
("x86_64-unknown-redox", x86_64_unknown_redox),
|
|
|
|
("i386-apple-ios", i386_apple_ios),
|
|
("x86_64-apple-ios", x86_64_apple_ios),
|
|
("aarch64-apple-ios", aarch64_apple_ios),
|
|
("arm64e-apple-ios", arm64e_apple_ios),
|
|
("armv7s-apple-ios", armv7s_apple_ios),
|
|
("x86_64-apple-ios-macabi", x86_64_apple_ios_macabi),
|
|
("aarch64-apple-ios-macabi", aarch64_apple_ios_macabi),
|
|
("aarch64-apple-ios-sim", aarch64_apple_ios_sim),
|
|
|
|
("aarch64-apple-tvos", aarch64_apple_tvos),
|
|
("aarch64-apple-tvos-sim", aarch64_apple_tvos_sim),
|
|
("arm64e-apple-tvos", arm64e_apple_tvos),
|
|
("x86_64-apple-tvos", x86_64_apple_tvos),
|
|
|
|
("armv7k-apple-watchos", armv7k_apple_watchos),
|
|
("arm64_32-apple-watchos", arm64_32_apple_watchos),
|
|
("x86_64-apple-watchos-sim", x86_64_apple_watchos_sim),
|
|
("aarch64-apple-watchos", aarch64_apple_watchos),
|
|
("aarch64-apple-watchos-sim", aarch64_apple_watchos_sim),
|
|
|
|
("aarch64-apple-visionos", aarch64_apple_visionos),
|
|
("aarch64-apple-visionos-sim", aarch64_apple_visionos_sim),
|
|
|
|
("armebv7r-none-eabi", armebv7r_none_eabi),
|
|
("armebv7r-none-eabihf", armebv7r_none_eabihf),
|
|
("armv7r-none-eabi", armv7r_none_eabi),
|
|
("armv7r-none-eabihf", armv7r_none_eabihf),
|
|
("armv8r-none-eabihf", armv8r_none_eabihf),
|
|
|
|
("armv7-rtems-eabihf", armv7_rtems_eabihf),
|
|
|
|
("x86_64-pc-solaris", x86_64_pc_solaris),
|
|
("sparcv9-sun-solaris", sparcv9_sun_solaris),
|
|
|
|
("x86_64-unknown-illumos", x86_64_unknown_illumos),
|
|
("aarch64-unknown-illumos", aarch64_unknown_illumos),
|
|
|
|
("x86_64-pc-windows-gnu", x86_64_pc_windows_gnu),
|
|
("x86_64-uwp-windows-gnu", x86_64_uwp_windows_gnu),
|
|
("x86_64-win7-windows-gnu", x86_64_win7_windows_gnu),
|
|
("i686-pc-windows-gnu", i686_pc_windows_gnu),
|
|
("i686-uwp-windows-gnu", i686_uwp_windows_gnu),
|
|
("i686-win7-windows-gnu", i686_win7_windows_gnu),
|
|
|
|
("aarch64-pc-windows-gnullvm", aarch64_pc_windows_gnullvm),
|
|
("i686-pc-windows-gnullvm", i686_pc_windows_gnullvm),
|
|
("x86_64-pc-windows-gnullvm", x86_64_pc_windows_gnullvm),
|
|
|
|
("aarch64-pc-windows-msvc", aarch64_pc_windows_msvc),
|
|
("aarch64-uwp-windows-msvc", aarch64_uwp_windows_msvc),
|
|
("arm64ec-pc-windows-msvc", arm64ec_pc_windows_msvc),
|
|
("x86_64-pc-windows-msvc", x86_64_pc_windows_msvc),
|
|
("x86_64-uwp-windows-msvc", x86_64_uwp_windows_msvc),
|
|
("x86_64-win7-windows-msvc", x86_64_win7_windows_msvc),
|
|
("i686-pc-windows-msvc", i686_pc_windows_msvc),
|
|
("i686-uwp-windows-msvc", i686_uwp_windows_msvc),
|
|
("i686-win7-windows-msvc", i686_win7_windows_msvc),
|
|
("thumbv7a-pc-windows-msvc", thumbv7a_pc_windows_msvc),
|
|
("thumbv7a-uwp-windows-msvc", thumbv7a_uwp_windows_msvc),
|
|
|
|
("wasm32-unknown-emscripten", wasm32_unknown_emscripten),
|
|
("wasm32-unknown-unknown", wasm32_unknown_unknown),
|
|
("wasm32v1-none", wasm32v1_none),
|
|
("wasm32-wasip1", wasm32_wasip1),
|
|
("wasm32-wasip2", wasm32_wasip2),
|
|
("wasm32-wasip1-threads", wasm32_wasip1_threads),
|
|
("wasm32-wali-linux-musl", wasm32_wali_linux_musl),
|
|
("wasm64-unknown-unknown", wasm64_unknown_unknown),
|
|
|
|
("thumbv6m-none-eabi", thumbv6m_none_eabi),
|
|
("thumbv7m-none-eabi", thumbv7m_none_eabi),
|
|
("thumbv7em-none-eabi", thumbv7em_none_eabi),
|
|
("thumbv7em-none-eabihf", thumbv7em_none_eabihf),
|
|
("thumbv8m.base-none-eabi", thumbv8m_base_none_eabi),
|
|
("thumbv8m.main-none-eabi", thumbv8m_main_none_eabi),
|
|
("thumbv8m.main-none-eabihf", thumbv8m_main_none_eabihf),
|
|
|
|
("armv7a-none-eabi", armv7a_none_eabi),
|
|
("armv7a-none-eabihf", armv7a_none_eabihf),
|
|
("armv7a-nuttx-eabi", armv7a_nuttx_eabi),
|
|
("armv7a-nuttx-eabihf", armv7a_nuttx_eabihf),
|
|
|
|
("msp430-none-elf", msp430_none_elf),
|
|
|
|
("aarch64-unknown-hermit", aarch64_unknown_hermit),
|
|
("riscv64gc-unknown-hermit", riscv64gc_unknown_hermit),
|
|
("x86_64-unknown-hermit", x86_64_unknown_hermit),
|
|
|
|
("x86_64-unikraft-linux-musl", x86_64_unikraft_linux_musl),
|
|
|
|
("armv7-unknown-trusty", armv7_unknown_trusty),
|
|
("aarch64-unknown-trusty", aarch64_unknown_trusty),
|
|
("x86_64-unknown-trusty", x86_64_unknown_trusty),
|
|
|
|
("riscv32i-unknown-none-elf", riscv32i_unknown_none_elf),
|
|
("riscv32im-risc0-zkvm-elf", riscv32im_risc0_zkvm_elf),
|
|
("riscv32im-unknown-none-elf", riscv32im_unknown_none_elf),
|
|
("riscv32ima-unknown-none-elf", riscv32ima_unknown_none_elf),
|
|
("riscv32imc-unknown-none-elf", riscv32imc_unknown_none_elf),
|
|
("riscv32imc-esp-espidf", riscv32imc_esp_espidf),
|
|
("riscv32imac-esp-espidf", riscv32imac_esp_espidf),
|
|
("riscv32imafc-esp-espidf", riscv32imafc_esp_espidf),
|
|
|
|
("riscv32e-unknown-none-elf", riscv32e_unknown_none_elf),
|
|
("riscv32em-unknown-none-elf", riscv32em_unknown_none_elf),
|
|
("riscv32emc-unknown-none-elf", riscv32emc_unknown_none_elf),
|
|
|
|
("riscv32imac-unknown-none-elf", riscv32imac_unknown_none_elf),
|
|
("riscv32imafc-unknown-none-elf", riscv32imafc_unknown_none_elf),
|
|
("riscv32imac-unknown-xous-elf", riscv32imac_unknown_xous_elf),
|
|
("riscv32gc-unknown-linux-gnu", riscv32gc_unknown_linux_gnu),
|
|
("riscv32gc-unknown-linux-musl", riscv32gc_unknown_linux_musl),
|
|
("riscv64imac-unknown-none-elf", riscv64imac_unknown_none_elf),
|
|
("riscv64gc-unknown-none-elf", riscv64gc_unknown_none_elf),
|
|
("riscv64gc-unknown-linux-gnu", riscv64gc_unknown_linux_gnu),
|
|
("riscv64gc-unknown-linux-musl", riscv64gc_unknown_linux_musl),
|
|
|
|
("sparc-unknown-none-elf", sparc_unknown_none_elf),
|
|
|
|
("loongarch64-unknown-none", loongarch64_unknown_none),
|
|
("loongarch64-unknown-none-softfloat", loongarch64_unknown_none_softfloat),
|
|
|
|
("aarch64-unknown-none", aarch64_unknown_none),
|
|
("aarch64-unknown-none-softfloat", aarch64_unknown_none_softfloat),
|
|
("aarch64-unknown-nuttx", aarch64_unknown_nuttx),
|
|
|
|
("x86_64-fortanix-unknown-sgx", x86_64_fortanix_unknown_sgx),
|
|
|
|
("x86_64-unknown-uefi", x86_64_unknown_uefi),
|
|
("i686-unknown-uefi", i686_unknown_uefi),
|
|
("aarch64-unknown-uefi", aarch64_unknown_uefi),
|
|
|
|
("nvptx64-nvidia-cuda", nvptx64_nvidia_cuda),
|
|
|
|
("amdgcn-amd-amdhsa", amdgcn_amd_amdhsa),
|
|
|
|
("xtensa-esp32-none-elf", xtensa_esp32_none_elf),
|
|
("xtensa-esp32-espidf", xtensa_esp32_espidf),
|
|
("xtensa-esp32s2-none-elf", xtensa_esp32s2_none_elf),
|
|
("xtensa-esp32s2-espidf", xtensa_esp32s2_espidf),
|
|
("xtensa-esp32s3-none-elf", xtensa_esp32s3_none_elf),
|
|
("xtensa-esp32s3-espidf", xtensa_esp32s3_espidf),
|
|
|
|
("i686-wrs-vxworks", i686_wrs_vxworks),
|
|
("x86_64-wrs-vxworks", x86_64_wrs_vxworks),
|
|
("armv7-wrs-vxworks-eabihf", armv7_wrs_vxworks_eabihf),
|
|
("aarch64-wrs-vxworks", aarch64_wrs_vxworks),
|
|
("powerpc-wrs-vxworks", powerpc_wrs_vxworks),
|
|
("powerpc-wrs-vxworks-spe", powerpc_wrs_vxworks_spe),
|
|
("powerpc64-wrs-vxworks", powerpc64_wrs_vxworks),
|
|
("riscv32-wrs-vxworks", riscv32_wrs_vxworks),
|
|
("riscv64-wrs-vxworks", riscv64_wrs_vxworks),
|
|
|
|
("aarch64-kmc-solid_asp3", aarch64_kmc_solid_asp3),
|
|
("armv7a-kmc-solid_asp3-eabi", armv7a_kmc_solid_asp3_eabi),
|
|
("armv7a-kmc-solid_asp3-eabihf", armv7a_kmc_solid_asp3_eabihf),
|
|
|
|
("mipsel-sony-psp", mipsel_sony_psp),
|
|
("mipsel-sony-psx", mipsel_sony_psx),
|
|
("mipsel-unknown-none", mipsel_unknown_none),
|
|
("mips-mti-none-elf", mips_mti_none_elf),
|
|
("mipsel-mti-none-elf", mipsel_mti_none_elf),
|
|
("thumbv4t-none-eabi", thumbv4t_none_eabi),
|
|
("armv4t-none-eabi", armv4t_none_eabi),
|
|
("thumbv5te-none-eabi", thumbv5te_none_eabi),
|
|
("armv5te-none-eabi", armv5te_none_eabi),
|
|
|
|
("aarch64_be-unknown-linux-gnu", aarch64_be_unknown_linux_gnu),
|
|
("aarch64-unknown-linux-gnu_ilp32", aarch64_unknown_linux_gnu_ilp32),
|
|
("aarch64_be-unknown-linux-gnu_ilp32", aarch64_be_unknown_linux_gnu_ilp32),
|
|
|
|
("bpfeb-unknown-none", bpfeb_unknown_none),
|
|
("bpfel-unknown-none", bpfel_unknown_none),
|
|
|
|
("armv6k-nintendo-3ds", armv6k_nintendo_3ds),
|
|
|
|
("aarch64-nintendo-switch-freestanding", aarch64_nintendo_switch_freestanding),
|
|
|
|
("armv7-sony-vita-newlibeabihf", armv7_sony_vita_newlibeabihf),
|
|
|
|
("armv7-unknown-linux-uclibceabi", armv7_unknown_linux_uclibceabi),
|
|
("armv7-unknown-linux-uclibceabihf", armv7_unknown_linux_uclibceabihf),
|
|
|
|
("x86_64-unknown-none", x86_64_unknown_none),
|
|
|
|
("aarch64-unknown-teeos", aarch64_unknown_teeos),
|
|
|
|
("mips64-openwrt-linux-musl", mips64_openwrt_linux_musl),
|
|
|
|
("aarch64-unknown-nto-qnx700", aarch64_unknown_nto_qnx700),
|
|
("aarch64-unknown-nto-qnx710", aarch64_unknown_nto_qnx710),
|
|
("aarch64-unknown-nto-qnx710_iosock", aarch64_unknown_nto_qnx710_iosock),
|
|
("aarch64-unknown-nto-qnx800", aarch64_unknown_nto_qnx800),
|
|
("x86_64-pc-nto-qnx710", x86_64_pc_nto_qnx710),
|
|
("x86_64-pc-nto-qnx710_iosock", x86_64_pc_nto_qnx710_iosock),
|
|
("x86_64-pc-nto-qnx800", x86_64_pc_nto_qnx800),
|
|
("i686-pc-nto-qnx700", i686_pc_nto_qnx700),
|
|
|
|
("aarch64-unknown-linux-ohos", aarch64_unknown_linux_ohos),
|
|
("armv7-unknown-linux-ohos", armv7_unknown_linux_ohos),
|
|
("loongarch64-unknown-linux-ohos", loongarch64_unknown_linux_ohos),
|
|
("x86_64-unknown-linux-ohos", x86_64_unknown_linux_ohos),
|
|
|
|
("x86_64-unknown-linux-none", x86_64_unknown_linux_none),
|
|
|
|
("thumbv6m-nuttx-eabi", thumbv6m_nuttx_eabi),
|
|
("thumbv7a-nuttx-eabi", thumbv7a_nuttx_eabi),
|
|
("thumbv7a-nuttx-eabihf", thumbv7a_nuttx_eabihf),
|
|
("thumbv7m-nuttx-eabi", thumbv7m_nuttx_eabi),
|
|
("thumbv7em-nuttx-eabi", thumbv7em_nuttx_eabi),
|
|
("thumbv7em-nuttx-eabihf", thumbv7em_nuttx_eabihf),
|
|
("thumbv8m.base-nuttx-eabi", thumbv8m_base_nuttx_eabi),
|
|
("thumbv8m.main-nuttx-eabi", thumbv8m_main_nuttx_eabi),
|
|
("thumbv8m.main-nuttx-eabihf", thumbv8m_main_nuttx_eabihf),
|
|
("riscv32imc-unknown-nuttx-elf", riscv32imc_unknown_nuttx_elf),
|
|
("riscv32imac-unknown-nuttx-elf", riscv32imac_unknown_nuttx_elf),
|
|
("riscv32imafc-unknown-nuttx-elf", riscv32imafc_unknown_nuttx_elf),
|
|
("riscv64imac-unknown-nuttx-elf", riscv64imac_unknown_nuttx_elf),
|
|
("riscv64gc-unknown-nuttx-elf", riscv64gc_unknown_nuttx_elf),
|
|
|
|
("x86_64-pc-cygwin", x86_64_pc_cygwin),
|
|
}
|
|
|
|
/// Cow-Vec-Str: Cow<'static, [Cow<'static, str>]>
|
|
macro_rules! cvs {
|
|
() => {
|
|
::std::borrow::Cow::Borrowed(&[])
|
|
};
|
|
($($x:expr),+ $(,)?) => {
|
|
::std::borrow::Cow::Borrowed(&[
|
|
$(
|
|
::std::borrow::Cow::Borrowed($x),
|
|
)*
|
|
])
|
|
};
|
|
}
|
|
|
|
pub(crate) use cvs;
|
|
|
|
/// Warnings encountered when parsing the target `json`.
|
|
///
|
|
/// Includes fields that weren't recognized and fields that don't have the expected type.
|
|
#[derive(Debug, PartialEq)]
|
|
pub struct TargetWarnings {
|
|
unused_fields: Vec<String>,
|
|
incorrect_type: Vec<String>,
|
|
}
|
|
|
|
impl TargetWarnings {
|
|
pub fn empty() -> Self {
|
|
Self { unused_fields: Vec::new(), incorrect_type: Vec::new() }
|
|
}
|
|
|
|
pub fn warning_messages(&self) -> Vec<String> {
|
|
let mut warnings = vec![];
|
|
if !self.unused_fields.is_empty() {
|
|
warnings.push(format!(
|
|
"target json file contains unused fields: {}",
|
|
self.unused_fields.join(", ")
|
|
));
|
|
}
|
|
if !self.incorrect_type.is_empty() {
|
|
warnings.push(format!(
|
|
"target json file contains fields whose value doesn't have the correct json type: {}",
|
|
self.incorrect_type.join(", ")
|
|
));
|
|
}
|
|
warnings
|
|
}
|
|
}
|
|
|
|
/// For the [`Target::check_consistency`] function, determines whether the given target is a builtin or a JSON
|
|
/// target.
|
|
#[derive(Copy, Clone, Debug, PartialEq)]
|
|
enum TargetKind {
|
|
Json,
|
|
Builtin,
|
|
}
|
|
|
|
/// Everything `rustc` knows about how to compile for a specific target.
|
|
///
|
|
/// Every field here must be specified, and has no default value.
|
|
#[derive(PartialEq, Clone, Debug)]
|
|
pub struct Target {
|
|
/// Unversioned target tuple to pass to LLVM.
|
|
///
|
|
/// Target tuples can optionally contain an OS version (notably Apple targets), which rustc
|
|
/// cannot know without querying the environment.
|
|
///
|
|
/// Use `rustc_codegen_ssa::back::versioned_llvm_target` if you need the full LLVM target.
|
|
pub llvm_target: StaticCow<str>,
|
|
/// Metadata about a target, for example the description or tier.
|
|
/// Used for generating target documentation.
|
|
pub metadata: TargetMetadata,
|
|
/// Number of bits in a pointer. Influences the `target_pointer_width` `cfg` variable.
|
|
pub pointer_width: u32,
|
|
/// Architecture to use for ABI considerations. Valid options include: "x86",
|
|
/// "x86_64", "arm", "aarch64", "mips", "powerpc", "powerpc64", and others.
|
|
pub arch: StaticCow<str>,
|
|
/// [Data layout](https://llvm.org/docs/LangRef.html#data-layout) to pass to LLVM.
|
|
pub data_layout: StaticCow<str>,
|
|
/// Optional settings with defaults.
|
|
pub options: TargetOptions,
|
|
}
|
|
|
|
/// Metadata about a target like the description or tier.
|
|
/// Part of #120745.
|
|
/// All fields are optional for now, but intended to be required in the future.
|
|
#[derive(Default, PartialEq, Clone, Debug)]
|
|
pub struct TargetMetadata {
|
|
/// A short description of the target including platform requirements,
|
|
/// for example "64-bit Linux (kernel 3.2+, glibc 2.17+)".
|
|
pub description: Option<StaticCow<str>>,
|
|
/// The tier of the target. 1, 2 or 3.
|
|
pub tier: Option<u64>,
|
|
/// Whether the Rust project ships host tools for a target.
|
|
pub host_tools: Option<bool>,
|
|
/// Whether a target has the `std` library. This is usually true for targets running
|
|
/// on an operating system.
|
|
pub std: Option<bool>,
|
|
}
|
|
|
|
impl Target {
|
|
pub fn parse_data_layout(&self) -> Result<TargetDataLayout, TargetDataLayoutErrors<'_>> {
|
|
let mut dl = TargetDataLayout::parse_from_llvm_datalayout_string(&self.data_layout)?;
|
|
|
|
// Perform consistency checks against the Target information.
|
|
if dl.endian != self.endian {
|
|
return Err(TargetDataLayoutErrors::InconsistentTargetArchitecture {
|
|
dl: dl.endian.as_str(),
|
|
target: self.endian.as_str(),
|
|
});
|
|
}
|
|
|
|
let target_pointer_width: u64 = self.pointer_width.into();
|
|
if dl.pointer_size.bits() != target_pointer_width {
|
|
return Err(TargetDataLayoutErrors::InconsistentTargetPointerWidth {
|
|
pointer_size: dl.pointer_size.bits(),
|
|
target: self.pointer_width,
|
|
});
|
|
}
|
|
|
|
dl.c_enum_min_size = self
|
|
.c_enum_min_bits
|
|
.map_or_else(
|
|
|| {
|
|
self.c_int_width
|
|
.parse()
|
|
.map_err(|_| String::from("failed to parse c_int_width"))
|
|
},
|
|
Ok,
|
|
)
|
|
.and_then(|i| Integer::from_size(Size::from_bits(i)))
|
|
.map_err(|err| TargetDataLayoutErrors::InvalidBitsSize { err })?;
|
|
|
|
Ok(dl)
|
|
}
|
|
}
|
|
|
|
pub trait HasTargetSpec {
|
|
fn target_spec(&self) -> &Target;
|
|
}
|
|
|
|
impl HasTargetSpec for Target {
|
|
#[inline]
|
|
fn target_spec(&self) -> &Target {
|
|
self
|
|
}
|
|
}
|
|
|
|
/// Which C ABI to use for `wasm32-unknown-unknown`.
|
|
#[derive(Debug, Copy, Clone, Hash, PartialEq, Eq)]
|
|
pub enum WasmCAbi {
|
|
/// Spec-compliant C ABI.
|
|
Spec,
|
|
/// Legacy ABI. Which is non-spec-compliant.
|
|
Legacy {
|
|
/// Indicates whether the `wasm_c_abi` lint should be emitted.
|
|
with_lint: bool,
|
|
},
|
|
}
|
|
|
|
pub trait HasWasmCAbiOpt {
|
|
fn wasm_c_abi_opt(&self) -> WasmCAbi;
|
|
}
|
|
|
|
/// x86 (32-bit) abi options.
|
|
#[derive(Debug, Copy, Clone, Hash, PartialEq, Eq)]
|
|
pub struct X86Abi {
|
|
/// On x86-32 targets, the regparm N causes the compiler to pass arguments
|
|
/// in registers EAX, EDX, and ECX instead of on the stack.
|
|
pub regparm: Option<u32>,
|
|
/// Override the default ABI to return small structs in registers
|
|
pub reg_struct_return: bool,
|
|
}
|
|
|
|
pub trait HasX86AbiOpt {
|
|
fn x86_abi_opt(&self) -> X86Abi;
|
|
}
|
|
|
|
type StaticCow<T> = Cow<'static, T>;
|
|
|
|
/// Optional aspects of a target specification.
|
|
///
|
|
/// This has an implementation of `Default`, see each field for what the default is. In general,
|
|
/// these try to take "minimal defaults" that don't assume anything about the runtime they run in.
|
|
///
|
|
/// `TargetOptions` as a separate structure is mostly an implementation detail of `Target`
|
|
/// construction, all its fields logically belong to `Target` and available from `Target`
|
|
/// through `Deref` impls.
|
|
#[derive(PartialEq, Clone, Debug)]
|
|
pub struct TargetOptions {
|
|
/// Used as the `target_endian` `cfg` variable. Defaults to little endian.
|
|
pub endian: Endian,
|
|
/// Width of c_int type. Defaults to "32".
|
|
pub c_int_width: StaticCow<str>,
|
|
/// OS name to use for conditional compilation (`target_os`). Defaults to "none".
|
|
/// "none" implies a bare metal target without `std` library.
|
|
/// A couple of targets having `std` also use "unknown" as an `os` value,
|
|
/// but they are exceptions.
|
|
pub os: StaticCow<str>,
|
|
/// Environment name to use for conditional compilation (`target_env`). Defaults to "".
|
|
pub env: StaticCow<str>,
|
|
/// ABI name to distinguish multiple ABIs on the same OS and architecture. For instance, `"eabi"`
|
|
/// or `"eabihf"`. Defaults to "".
|
|
/// This field is *not* forwarded directly to LLVM; its primary purpose is `cfg(target_abi)`.
|
|
/// However, parts of the backend do check this field for specific values to enable special behavior.
|
|
pub abi: StaticCow<str>,
|
|
/// Vendor name to use for conditional compilation (`target_vendor`). Defaults to "unknown".
|
|
pub vendor: StaticCow<str>,
|
|
|
|
/// Linker to invoke
|
|
pub linker: Option<StaticCow<str>>,
|
|
/// Default linker flavor used if `-C linker-flavor` or `-C linker` are not passed
|
|
/// on the command line. Defaults to `LinkerFlavor::Gnu(Cc::Yes, Lld::No)`.
|
|
pub linker_flavor: LinkerFlavor,
|
|
linker_flavor_json: LinkerFlavorCli,
|
|
lld_flavor_json: LldFlavor,
|
|
linker_is_gnu_json: bool,
|
|
|
|
/// Objects to link before and after all other object code.
|
|
pub pre_link_objects: CrtObjects,
|
|
pub post_link_objects: CrtObjects,
|
|
/// Same as `(pre|post)_link_objects`, but when self-contained linking mode is enabled.
|
|
pub pre_link_objects_self_contained: CrtObjects,
|
|
pub post_link_objects_self_contained: CrtObjects,
|
|
/// Behavior for the self-contained linking mode: inferred for some targets, or explicitly
|
|
/// enabled (in bulk, or with individual components).
|
|
pub link_self_contained: LinkSelfContainedDefault,
|
|
|
|
/// Linker arguments that are passed *before* any user-defined libraries.
|
|
pub pre_link_args: LinkArgs,
|
|
pre_link_args_json: LinkArgsCli,
|
|
/// Linker arguments that are unconditionally passed after any
|
|
/// user-defined but before post-link objects. Standard platform
|
|
/// libraries that should be always be linked to, usually go here.
|
|
pub late_link_args: LinkArgs,
|
|
late_link_args_json: LinkArgsCli,
|
|
/// Linker arguments used in addition to `late_link_args` if at least one
|
|
/// Rust dependency is dynamically linked.
|
|
pub late_link_args_dynamic: LinkArgs,
|
|
late_link_args_dynamic_json: LinkArgsCli,
|
|
/// Linker arguments used in addition to `late_link_args` if all Rust
|
|
/// dependencies are statically linked.
|
|
pub late_link_args_static: LinkArgs,
|
|
late_link_args_static_json: LinkArgsCli,
|
|
/// Linker arguments that are unconditionally passed *after* any
|
|
/// user-defined libraries.
|
|
pub post_link_args: LinkArgs,
|
|
post_link_args_json: LinkArgsCli,
|
|
|
|
/// Optional link script applied to `dylib` and `executable` crate types.
|
|
/// This is a string containing the script, not a path. Can only be applied
|
|
/// to linkers where linker flavor matches `LinkerFlavor::Gnu(..)`.
|
|
pub link_script: Option<StaticCow<str>>,
|
|
/// Environment variables to be set for the linker invocation.
|
|
pub link_env: StaticCow<[(StaticCow<str>, StaticCow<str>)]>,
|
|
/// Environment variables to be removed for the linker invocation.
|
|
pub link_env_remove: StaticCow<[StaticCow<str>]>,
|
|
|
|
/// Extra arguments to pass to the external assembler (when used)
|
|
pub asm_args: StaticCow<[StaticCow<str>]>,
|
|
|
|
/// Default CPU to pass to LLVM. Corresponds to `llc -mcpu=$cpu`. Defaults
|
|
/// to "generic".
|
|
pub cpu: StaticCow<str>,
|
|
/// Whether a cpu needs to be explicitly set.
|
|
/// Set to true if there is no default cpu. Defaults to false.
|
|
pub need_explicit_cpu: bool,
|
|
/// Default target features to pass to LLVM. These features overwrite
|
|
/// `-Ctarget-cpu` but can be overwritten with `-Ctarget-features`.
|
|
/// Corresponds to `llc -mattr=$features`.
|
|
/// Note that these are LLVM feature names, not Rust feature names!
|
|
///
|
|
/// Generally it is a bad idea to use negative target features because they often interact very
|
|
/// poorly with how `-Ctarget-cpu` works. Instead, try to use a lower "base CPU" and enable the
|
|
/// features you want to use.
|
|
pub features: StaticCow<str>,
|
|
/// Direct or use GOT indirect to reference external data symbols
|
|
pub direct_access_external_data: Option<bool>,
|
|
/// Whether dynamic linking is available on this target. Defaults to false.
|
|
pub dynamic_linking: bool,
|
|
/// Whether dynamic linking can export TLS globals. Defaults to true.
|
|
pub dll_tls_export: bool,
|
|
/// If dynamic linking is available, whether only cdylibs are supported.
|
|
pub only_cdylib: bool,
|
|
/// Whether executables are available on this target. Defaults to true.
|
|
pub executables: bool,
|
|
/// Relocation model to use in object file. Corresponds to `llc
|
|
/// -relocation-model=$relocation_model`. Defaults to `Pic`.
|
|
pub relocation_model: RelocModel,
|
|
/// Code model to use. Corresponds to `llc -code-model=$code_model`.
|
|
/// Defaults to `None` which means "inherited from the base LLVM target".
|
|
pub code_model: Option<CodeModel>,
|
|
/// TLS model to use. Options are "global-dynamic" (default), "local-dynamic", "initial-exec"
|
|
/// and "local-exec". This is similar to the -ftls-model option in GCC/Clang.
|
|
pub tls_model: TlsModel,
|
|
/// Do not emit code that uses the "red zone", if the ABI has one. Defaults to false.
|
|
pub disable_redzone: bool,
|
|
/// Frame pointer mode for this target. Defaults to `MayOmit`.
|
|
pub frame_pointer: FramePointer,
|
|
/// Emit each function in its own section. Defaults to true.
|
|
pub function_sections: bool,
|
|
/// String to prepend to the name of every dynamic library. Defaults to "lib".
|
|
pub dll_prefix: StaticCow<str>,
|
|
/// String to append to the name of every dynamic library. Defaults to ".so".
|
|
pub dll_suffix: StaticCow<str>,
|
|
/// String to append to the name of every executable.
|
|
pub exe_suffix: StaticCow<str>,
|
|
/// String to prepend to the name of every static library. Defaults to "lib".
|
|
pub staticlib_prefix: StaticCow<str>,
|
|
/// String to append to the name of every static library. Defaults to ".a".
|
|
pub staticlib_suffix: StaticCow<str>,
|
|
/// Values of the `target_family` cfg set for this target.
|
|
///
|
|
/// Common options are: "unix", "windows". Defaults to no families.
|
|
///
|
|
/// See <https://doc.rust-lang.org/reference/conditional-compilation.html#target_family>.
|
|
pub families: StaticCow<[StaticCow<str>]>,
|
|
/// Whether the target toolchain's ABI supports returning small structs as an integer.
|
|
pub abi_return_struct_as_int: bool,
|
|
/// Whether the target toolchain is like AIX's. Linker options on AIX are special and it uses
|
|
/// XCOFF as binary format. Defaults to false.
|
|
pub is_like_aix: bool,
|
|
/// Whether the target toolchain is like macOS's. Only useful for compiling against iOS/macOS,
|
|
/// in particular running dsymutil and some other stuff like `-dead_strip`. Defaults to false.
|
|
/// Also indicates whether to use Apple-specific ABI changes, such as extending function
|
|
/// parameters to 32-bits.
|
|
pub is_like_osx: bool,
|
|
/// Whether the target toolchain is like Solaris's.
|
|
/// Only useful for compiling against Illumos/Solaris,
|
|
/// as they have a different set of linker flags. Defaults to false.
|
|
pub is_like_solaris: bool,
|
|
/// Whether the target is like Windows.
|
|
/// This is a combination of several more specific properties represented as a single flag:
|
|
/// - The target uses a Windows ABI,
|
|
/// - uses PE/COFF as a format for object code,
|
|
/// - uses Windows-style dllexport/dllimport for shared libraries,
|
|
/// - uses import libraries and .def files for symbol exports,
|
|
/// - executables support setting a subsystem.
|
|
pub is_like_windows: bool,
|
|
/// Whether the target is like MSVC.
|
|
/// This is a combination of several more specific properties represented as a single flag:
|
|
/// - The target has all the properties from `is_like_windows`
|
|
/// (for in-tree targets "is_like_msvc ⇒ is_like_windows" is ensured by a unit test),
|
|
/// - has some MSVC-specific Windows ABI properties,
|
|
/// - uses a link.exe-like linker,
|
|
/// - uses CodeView/PDB for debuginfo and natvis for its visualization,
|
|
/// - uses SEH-based unwinding,
|
|
/// - supports control flow guard mechanism.
|
|
pub is_like_msvc: bool,
|
|
/// Whether a target toolchain is like WASM.
|
|
pub is_like_wasm: bool,
|
|
/// Whether a target toolchain is like Android, implying a Linux kernel and a Bionic libc
|
|
pub is_like_android: bool,
|
|
/// Target's binary file format. Defaults to BinaryFormat::Elf
|
|
pub binary_format: BinaryFormat,
|
|
/// Default supported version of DWARF on this platform.
|
|
/// Useful because some platforms (osx, bsd) only want up to DWARF2.
|
|
pub default_dwarf_version: u32,
|
|
/// The MinGW toolchain has a known issue that prevents it from correctly
|
|
/// handling COFF object files with more than 2<sup>15</sup> sections. Since each weak
|
|
/// symbol needs its own COMDAT section, weak linkage implies a large
|
|
/// number sections that easily exceeds the given limit for larger
|
|
/// codebases. Consequently we want a way to disallow weak linkage on some
|
|
/// platforms.
|
|
pub allows_weak_linkage: bool,
|
|
/// Whether the linker support rpaths or not. Defaults to false.
|
|
pub has_rpath: bool,
|
|
/// Whether to disable linking to the default libraries, typically corresponds
|
|
/// to `-nodefaultlibs`. Defaults to true.
|
|
pub no_default_libraries: bool,
|
|
/// Dynamically linked executables can be compiled as position independent
|
|
/// if the default relocation model of position independent code is not
|
|
/// changed. This is a requirement to take advantage of ASLR, as otherwise
|
|
/// the functions in the executable are not randomized and can be used
|
|
/// during an exploit of a vulnerability in any code.
|
|
pub position_independent_executables: bool,
|
|
/// Executables that are both statically linked and position-independent are supported.
|
|
pub static_position_independent_executables: bool,
|
|
/// Determines if the target always requires using the PLT for indirect
|
|
/// library calls or not. This controls the default value of the `-Z plt` flag.
|
|
pub plt_by_default: bool,
|
|
/// Either partial, full, or off. Full RELRO makes the dynamic linker
|
|
/// resolve all symbols at startup and marks the GOT read-only before
|
|
/// starting the program, preventing overwriting the GOT.
|
|
pub relro_level: RelroLevel,
|
|
/// Format that archives should be emitted in. This affects whether we use
|
|
/// LLVM to assemble an archive or fall back to the system linker, and
|
|
/// currently only "gnu" is used to fall into LLVM. Unknown strings cause
|
|
/// the system linker to be used.
|
|
pub archive_format: StaticCow<str>,
|
|
/// Is asm!() allowed? Defaults to true.
|
|
pub allow_asm: bool,
|
|
/// Whether the runtime startup code requires the `main` function be passed
|
|
/// `argc` and `argv` values.
|
|
pub main_needs_argc_argv: bool,
|
|
|
|
/// Flag indicating whether #[thread_local] is available for this target.
|
|
pub has_thread_local: bool,
|
|
/// This is mainly for easy compatibility with emscripten.
|
|
/// If we give emcc .o files that are actually .bc files it
|
|
/// will 'just work'.
|
|
pub obj_is_bitcode: bool,
|
|
/// Content of the LLVM cmdline section associated with embedded bitcode.
|
|
pub bitcode_llvm_cmdline: StaticCow<str>,
|
|
|
|
/// Don't use this field; instead use the `.min_atomic_width()` method.
|
|
pub min_atomic_width: Option<u64>,
|
|
|
|
/// Don't use this field; instead use the `.max_atomic_width()` method.
|
|
pub max_atomic_width: Option<u64>,
|
|
|
|
/// Whether the target supports atomic CAS operations natively
|
|
pub atomic_cas: bool,
|
|
|
|
/// Panic strategy: "unwind" or "abort"
|
|
pub panic_strategy: PanicStrategy,
|
|
|
|
/// Whether or not linking dylibs to a static CRT is allowed.
|
|
pub crt_static_allows_dylibs: bool,
|
|
/// Whether or not the CRT is statically linked by default.
|
|
pub crt_static_default: bool,
|
|
/// Whether or not crt-static is respected by the compiler (or is a no-op).
|
|
pub crt_static_respected: bool,
|
|
|
|
/// The implementation of stack probes to use.
|
|
pub stack_probes: StackProbeType,
|
|
|
|
/// The minimum alignment for global symbols.
|
|
pub min_global_align: Option<u64>,
|
|
|
|
/// Default number of codegen units to use in debug mode
|
|
pub default_codegen_units: Option<u64>,
|
|
|
|
/// Default codegen backend used for this target. Defaults to `None`.
|
|
///
|
|
/// If `None`, then `CFG_DEFAULT_CODEGEN_BACKEND` environmental variable captured when
|
|
/// compiling `rustc` will be used instead (or llvm if it is not set).
|
|
///
|
|
/// N.B. when *using* the compiler, backend can always be overridden with `-Zcodegen-backend`.
|
|
///
|
|
/// This was added by WaffleLapkin in #116793. The motivation is a rustc fork that requires a
|
|
/// custom codegen backend for a particular target.
|
|
pub default_codegen_backend: Option<StaticCow<str>>,
|
|
|
|
/// Whether to generate trap instructions in places where optimization would
|
|
/// otherwise produce control flow that falls through into unrelated memory.
|
|
pub trap_unreachable: bool,
|
|
|
|
/// This target requires everything to be compiled with LTO to emit a final
|
|
/// executable, aka there is no native linker for this target.
|
|
pub requires_lto: bool,
|
|
|
|
/// This target has no support for threads.
|
|
pub singlethread: bool,
|
|
|
|
/// Whether library functions call lowering/optimization is disabled in LLVM
|
|
/// for this target unconditionally.
|
|
pub no_builtins: bool,
|
|
|
|
/// The default visibility for symbols in this target.
|
|
///
|
|
/// This value typically shouldn't be accessed directly, but through the
|
|
/// `rustc_session::Session::default_visibility` method, which allows `rustc` users to override
|
|
/// this setting using cmdline flags.
|
|
pub default_visibility: Option<SymbolVisibility>,
|
|
|
|
/// Whether a .debug_gdb_scripts section will be added to the output object file
|
|
pub emit_debug_gdb_scripts: bool,
|
|
|
|
/// Whether or not to unconditionally `uwtable` attributes on functions,
|
|
/// typically because the platform needs to unwind for things like stack
|
|
/// unwinders.
|
|
pub requires_uwtable: bool,
|
|
|
|
/// Whether or not to emit `uwtable` attributes on functions if `-C force-unwind-tables`
|
|
/// is not specified and `uwtable` is not required on this target.
|
|
pub default_uwtable: bool,
|
|
|
|
/// Whether or not SIMD types are passed by reference in the Rust ABI,
|
|
/// typically required if a target can be compiled with a mixed set of
|
|
/// target features. This is `true` by default, and `false` for targets like
|
|
/// wasm32 where the whole program either has simd or not.
|
|
pub simd_types_indirect: bool,
|
|
|
|
/// Pass a list of symbol which should be exported in the dylib to the linker.
|
|
pub limit_rdylib_exports: bool,
|
|
|
|
/// If set, have the linker export exactly these symbols, instead of using
|
|
/// the usual logic to figure this out from the crate itself.
|
|
pub override_export_symbols: Option<StaticCow<[StaticCow<str>]>>,
|
|
|
|
/// Determines how or whether the MergeFunctions LLVM pass should run for
|
|
/// this target. Either "disabled", "trampolines", or "aliases".
|
|
/// The MergeFunctions pass is generally useful, but some targets may need
|
|
/// to opt out. The default is "aliases".
|
|
///
|
|
/// Workaround for: <https://github.com/rust-lang/rust/issues/57356>
|
|
pub merge_functions: MergeFunctions,
|
|
|
|
/// Use platform dependent mcount function
|
|
pub mcount: StaticCow<str>,
|
|
|
|
/// Use LLVM intrinsic for mcount function name
|
|
pub llvm_mcount_intrinsic: Option<StaticCow<str>>,
|
|
|
|
/// LLVM ABI name, corresponds to the '-mabi' parameter available in multilib C compilers
|
|
/// and the `-target-abi` flag in llc. In the LLVM API this is `MCOptions.ABIName`.
|
|
pub llvm_abiname: StaticCow<str>,
|
|
|
|
/// Control the float ABI to use, for architectures that support it. The only architecture we
|
|
/// currently use this for is ARM. Corresponds to the `-float-abi` flag in llc. In the LLVM API
|
|
/// this is `FloatABIType`. (clang's `-mfloat-abi` is similar but more complicated since it
|
|
/// can also affect the `soft-float` target feature.)
|
|
///
|
|
/// If not provided, LLVM will infer the float ABI from the target triple (`llvm_target`).
|
|
pub llvm_floatabi: Option<FloatAbi>,
|
|
|
|
/// Picks a specific ABI for this target. This is *not* just for "Rust" ABI functions,
|
|
/// it can also affect "C" ABI functions; the point is that this flag is interpreted by
|
|
/// rustc and not forwarded to LLVM.
|
|
/// So far, this is only used on x86.
|
|
pub rustc_abi: Option<RustcAbi>,
|
|
|
|
/// Whether or not RelaxElfRelocation flag will be passed to the linker
|
|
pub relax_elf_relocations: bool,
|
|
|
|
/// Additional arguments to pass to LLVM, similar to the `-C llvm-args` codegen option.
|
|
pub llvm_args: StaticCow<[StaticCow<str>]>,
|
|
|
|
/// Whether to use legacy .ctors initialization hooks rather than .init_array. Defaults
|
|
/// to false (uses .init_array).
|
|
pub use_ctors_section: bool,
|
|
|
|
/// Whether the linker is instructed to add a `GNU_EH_FRAME` ELF header
|
|
/// used to locate unwinding information is passed
|
|
/// (only has effect if the linker is `ld`-like).
|
|
pub eh_frame_header: bool,
|
|
|
|
/// Is true if the target is an ARM architecture using thumb v1 which allows for
|
|
/// thumb and arm interworking.
|
|
pub has_thumb_interworking: bool,
|
|
|
|
/// Which kind of debuginfo is used by this target?
|
|
pub debuginfo_kind: DebuginfoKind,
|
|
/// How to handle split debug information, if at all. Specifying `None` has
|
|
/// target-specific meaning.
|
|
pub split_debuginfo: SplitDebuginfo,
|
|
/// Which kinds of split debuginfo are supported by the target?
|
|
pub supported_split_debuginfo: StaticCow<[SplitDebuginfo]>,
|
|
|
|
/// The sanitizers supported by this target
|
|
///
|
|
/// Note that the support here is at a codegen level. If the machine code with sanitizer
|
|
/// enabled can generated on this target, but the necessary supporting libraries are not
|
|
/// distributed with the target, the sanitizer should still appear in this list for the target.
|
|
pub supported_sanitizers: SanitizerSet,
|
|
|
|
/// Minimum number of bits in #[repr(C)] enum. Defaults to the size of c_int
|
|
pub c_enum_min_bits: Option<u64>,
|
|
|
|
/// Whether or not the DWARF `.debug_aranges` section should be generated.
|
|
pub generate_arange_section: bool,
|
|
|
|
/// Whether the target supports stack canary checks. `true` by default,
|
|
/// since this is most common among tier 1 and tier 2 targets.
|
|
pub supports_stack_protector: bool,
|
|
|
|
/// The name of entry function.
|
|
/// Default value is "main"
|
|
pub entry_name: StaticCow<str>,
|
|
|
|
/// The ABI of entry function.
|
|
/// Default value is `Conv::C`, i.e. C call convention
|
|
pub entry_abi: Conv,
|
|
|
|
/// Whether the target supports XRay instrumentation.
|
|
pub supports_xray: bool,
|
|
|
|
/// Whether the targets supports -Z small-data-threshold
|
|
small_data_threshold_support: SmallDataThresholdSupport,
|
|
}
|
|
|
|
/// Add arguments for the given flavor and also for its "twin" flavors
|
|
/// that have a compatible command line interface.
|
|
fn add_link_args_iter(
|
|
link_args: &mut LinkArgs,
|
|
flavor: LinkerFlavor,
|
|
args: impl Iterator<Item = StaticCow<str>> + Clone,
|
|
) {
|
|
let mut insert = |flavor| link_args.entry(flavor).or_default().extend(args.clone());
|
|
insert(flavor);
|
|
match flavor {
|
|
LinkerFlavor::Gnu(cc, lld) => {
|
|
assert_eq!(lld, Lld::No);
|
|
insert(LinkerFlavor::Gnu(cc, Lld::Yes));
|
|
}
|
|
LinkerFlavor::Darwin(cc, lld) => {
|
|
assert_eq!(lld, Lld::No);
|
|
insert(LinkerFlavor::Darwin(cc, Lld::Yes));
|
|
}
|
|
LinkerFlavor::Msvc(lld) => {
|
|
assert_eq!(lld, Lld::No);
|
|
insert(LinkerFlavor::Msvc(Lld::Yes));
|
|
}
|
|
LinkerFlavor::WasmLld(..)
|
|
| LinkerFlavor::Unix(..)
|
|
| LinkerFlavor::EmCc
|
|
| LinkerFlavor::Bpf
|
|
| LinkerFlavor::Llbc
|
|
| LinkerFlavor::Ptx => {}
|
|
}
|
|
}
|
|
|
|
fn add_link_args(link_args: &mut LinkArgs, flavor: LinkerFlavor, args: &[&'static str]) {
|
|
add_link_args_iter(link_args, flavor, args.iter().copied().map(Cow::Borrowed))
|
|
}
|
|
|
|
impl TargetOptions {
|
|
pub fn supports_comdat(&self) -> bool {
|
|
// XCOFF and MachO don't support COMDAT.
|
|
!self.is_like_aix && !self.is_like_osx
|
|
}
|
|
}
|
|
|
|
impl TargetOptions {
|
|
fn link_args(flavor: LinkerFlavor, args: &[&'static str]) -> LinkArgs {
|
|
let mut link_args = LinkArgs::new();
|
|
add_link_args(&mut link_args, flavor, args);
|
|
link_args
|
|
}
|
|
|
|
fn add_pre_link_args(&mut self, flavor: LinkerFlavor, args: &[&'static str]) {
|
|
add_link_args(&mut self.pre_link_args, flavor, args);
|
|
}
|
|
|
|
fn update_from_cli(&mut self) {
|
|
self.linker_flavor = LinkerFlavor::from_cli_json(
|
|
self.linker_flavor_json,
|
|
self.lld_flavor_json,
|
|
self.linker_is_gnu_json,
|
|
);
|
|
for (args, args_json) in [
|
|
(&mut self.pre_link_args, &self.pre_link_args_json),
|
|
(&mut self.late_link_args, &self.late_link_args_json),
|
|
(&mut self.late_link_args_dynamic, &self.late_link_args_dynamic_json),
|
|
(&mut self.late_link_args_static, &self.late_link_args_static_json),
|
|
(&mut self.post_link_args, &self.post_link_args_json),
|
|
] {
|
|
args.clear();
|
|
for (flavor, args_json) in args_json {
|
|
let linker_flavor = self.linker_flavor.with_cli_hints(*flavor);
|
|
// Normalize to no lld to avoid asserts.
|
|
let linker_flavor = match linker_flavor {
|
|
LinkerFlavor::Gnu(cc, _) => LinkerFlavor::Gnu(cc, Lld::No),
|
|
LinkerFlavor::Darwin(cc, _) => LinkerFlavor::Darwin(cc, Lld::No),
|
|
LinkerFlavor::Msvc(_) => LinkerFlavor::Msvc(Lld::No),
|
|
_ => linker_flavor,
|
|
};
|
|
if !args.contains_key(&linker_flavor) {
|
|
add_link_args_iter(args, linker_flavor, args_json.iter().cloned());
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
fn update_to_cli(&mut self) {
|
|
self.linker_flavor_json = self.linker_flavor.to_cli_counterpart();
|
|
self.lld_flavor_json = self.linker_flavor.lld_flavor();
|
|
self.linker_is_gnu_json = self.linker_flavor.is_gnu();
|
|
for (args, args_json) in [
|
|
(&self.pre_link_args, &mut self.pre_link_args_json),
|
|
(&self.late_link_args, &mut self.late_link_args_json),
|
|
(&self.late_link_args_dynamic, &mut self.late_link_args_dynamic_json),
|
|
(&self.late_link_args_static, &mut self.late_link_args_static_json),
|
|
(&self.post_link_args, &mut self.post_link_args_json),
|
|
] {
|
|
*args_json = args
|
|
.iter()
|
|
.map(|(flavor, args)| (flavor.to_cli_counterpart(), args.clone()))
|
|
.collect();
|
|
}
|
|
}
|
|
}
|
|
|
|
impl Default for TargetOptions {
|
|
/// Creates a set of "sane defaults" for any target. This is still
|
|
/// incomplete, and if used for compilation, will certainly not work.
|
|
fn default() -> TargetOptions {
|
|
TargetOptions {
|
|
endian: Endian::Little,
|
|
c_int_width: "32".into(),
|
|
os: "none".into(),
|
|
env: "".into(),
|
|
abi: "".into(),
|
|
vendor: "unknown".into(),
|
|
linker: option_env!("CFG_DEFAULT_LINKER").map(|s| s.into()),
|
|
linker_flavor: LinkerFlavor::Gnu(Cc::Yes, Lld::No),
|
|
linker_flavor_json: LinkerFlavorCli::Gcc,
|
|
lld_flavor_json: LldFlavor::Ld,
|
|
linker_is_gnu_json: true,
|
|
link_script: None,
|
|
asm_args: cvs![],
|
|
cpu: "generic".into(),
|
|
need_explicit_cpu: false,
|
|
features: "".into(),
|
|
direct_access_external_data: None,
|
|
dynamic_linking: false,
|
|
dll_tls_export: true,
|
|
only_cdylib: false,
|
|
executables: true,
|
|
relocation_model: RelocModel::Pic,
|
|
code_model: None,
|
|
tls_model: TlsModel::GeneralDynamic,
|
|
disable_redzone: false,
|
|
frame_pointer: FramePointer::MayOmit,
|
|
function_sections: true,
|
|
dll_prefix: "lib".into(),
|
|
dll_suffix: ".so".into(),
|
|
exe_suffix: "".into(),
|
|
staticlib_prefix: "lib".into(),
|
|
staticlib_suffix: ".a".into(),
|
|
families: cvs![],
|
|
abi_return_struct_as_int: false,
|
|
is_like_aix: false,
|
|
is_like_osx: false,
|
|
is_like_solaris: false,
|
|
is_like_windows: false,
|
|
is_like_msvc: false,
|
|
is_like_wasm: false,
|
|
is_like_android: false,
|
|
binary_format: BinaryFormat::Elf,
|
|
default_dwarf_version: 4,
|
|
allows_weak_linkage: true,
|
|
has_rpath: false,
|
|
no_default_libraries: true,
|
|
position_independent_executables: false,
|
|
static_position_independent_executables: false,
|
|
plt_by_default: true,
|
|
relro_level: RelroLevel::None,
|
|
pre_link_objects: Default::default(),
|
|
post_link_objects: Default::default(),
|
|
pre_link_objects_self_contained: Default::default(),
|
|
post_link_objects_self_contained: Default::default(),
|
|
link_self_contained: LinkSelfContainedDefault::False,
|
|
pre_link_args: LinkArgs::new(),
|
|
pre_link_args_json: LinkArgsCli::new(),
|
|
late_link_args: LinkArgs::new(),
|
|
late_link_args_json: LinkArgsCli::new(),
|
|
late_link_args_dynamic: LinkArgs::new(),
|
|
late_link_args_dynamic_json: LinkArgsCli::new(),
|
|
late_link_args_static: LinkArgs::new(),
|
|
late_link_args_static_json: LinkArgsCli::new(),
|
|
post_link_args: LinkArgs::new(),
|
|
post_link_args_json: LinkArgsCli::new(),
|
|
link_env: cvs![],
|
|
link_env_remove: cvs![],
|
|
archive_format: "gnu".into(),
|
|
main_needs_argc_argv: true,
|
|
allow_asm: true,
|
|
has_thread_local: false,
|
|
obj_is_bitcode: false,
|
|
bitcode_llvm_cmdline: "".into(),
|
|
min_atomic_width: None,
|
|
max_atomic_width: None,
|
|
atomic_cas: true,
|
|
panic_strategy: PanicStrategy::Unwind,
|
|
crt_static_allows_dylibs: false,
|
|
crt_static_default: false,
|
|
crt_static_respected: false,
|
|
stack_probes: StackProbeType::None,
|
|
min_global_align: None,
|
|
default_codegen_units: None,
|
|
default_codegen_backend: None,
|
|
trap_unreachable: true,
|
|
requires_lto: false,
|
|
singlethread: false,
|
|
no_builtins: false,
|
|
default_visibility: None,
|
|
emit_debug_gdb_scripts: true,
|
|
requires_uwtable: false,
|
|
default_uwtable: false,
|
|
simd_types_indirect: true,
|
|
limit_rdylib_exports: true,
|
|
override_export_symbols: None,
|
|
merge_functions: MergeFunctions::Aliases,
|
|
mcount: "mcount".into(),
|
|
llvm_mcount_intrinsic: None,
|
|
llvm_abiname: "".into(),
|
|
llvm_floatabi: None,
|
|
rustc_abi: None,
|
|
relax_elf_relocations: false,
|
|
llvm_args: cvs![],
|
|
use_ctors_section: false,
|
|
eh_frame_header: true,
|
|
has_thumb_interworking: false,
|
|
debuginfo_kind: Default::default(),
|
|
split_debuginfo: Default::default(),
|
|
// `Off` is supported by default, but targets can remove this manually, e.g. Windows.
|
|
supported_split_debuginfo: Cow::Borrowed(&[SplitDebuginfo::Off]),
|
|
supported_sanitizers: SanitizerSet::empty(),
|
|
c_enum_min_bits: None,
|
|
generate_arange_section: true,
|
|
supports_stack_protector: true,
|
|
entry_name: "main".into(),
|
|
entry_abi: Conv::C,
|
|
supports_xray: false,
|
|
small_data_threshold_support: SmallDataThresholdSupport::DefaultForArch,
|
|
}
|
|
}
|
|
}
|
|
|
|
/// `TargetOptions` being a separate type is basically an implementation detail of `Target` that is
|
|
/// used for providing defaults. Perhaps there's a way to merge `TargetOptions` into `Target` so
|
|
/// this `Deref` implementation is no longer necessary.
|
|
impl Deref for Target {
|
|
type Target = TargetOptions;
|
|
|
|
#[inline]
|
|
fn deref(&self) -> &Self::Target {
|
|
&self.options
|
|
}
|
|
}
|
|
impl DerefMut for Target {
|
|
#[inline]
|
|
fn deref_mut(&mut self) -> &mut Self::Target {
|
|
&mut self.options
|
|
}
|
|
}
|
|
|
|
impl Target {
|
|
/// Given a function ABI, turn it into the correct ABI for this target.
|
|
pub fn adjust_abi(&self, abi: ExternAbi, c_variadic: bool) -> ExternAbi {
|
|
use ExternAbi::*;
|
|
match abi {
|
|
// On Windows, `extern "system"` behaves like msvc's `__stdcall`.
|
|
// `__stdcall` only applies on x86 and on non-variadic functions:
|
|
// https://learn.microsoft.com/en-us/cpp/cpp/stdcall?view=msvc-170
|
|
System { unwind } => {
|
|
if self.is_like_windows && self.arch == "x86" && !c_variadic {
|
|
Stdcall { unwind }
|
|
} else {
|
|
C { unwind }
|
|
}
|
|
}
|
|
|
|
EfiApi => {
|
|
if self.arch == "arm" {
|
|
Aapcs { unwind: false }
|
|
} else if self.arch == "x86_64" {
|
|
Win64 { unwind: false }
|
|
} else {
|
|
C { unwind: false }
|
|
}
|
|
}
|
|
|
|
// See commentary in `is_abi_supported`.
|
|
Stdcall { unwind } | Thiscall { unwind } | Fastcall { unwind } => {
|
|
if self.arch == "x86" { abi } else { C { unwind } }
|
|
}
|
|
Vectorcall { unwind } => {
|
|
if ["x86", "x86_64"].contains(&&*self.arch) {
|
|
abi
|
|
} else {
|
|
C { unwind }
|
|
}
|
|
}
|
|
|
|
// The Windows x64 calling convention we use for `extern "Rust"`
|
|
// <https://learn.microsoft.com/en-us/cpp/build/x64-software-conventions#register-volatility-and-preservation>
|
|
// expects the callee to save `xmm6` through `xmm15`, but `PreserveMost`
|
|
// (that we use by default for `extern "rust-cold"`) doesn't save any of those.
|
|
// So to avoid bloating callers, just use the Rust convention here.
|
|
RustCold if self.is_like_windows && self.arch == "x86_64" => Rust,
|
|
|
|
abi => abi,
|
|
}
|
|
}
|
|
|
|
pub fn is_abi_supported(&self, abi: ExternAbi) -> bool {
|
|
use ExternAbi::*;
|
|
match abi {
|
|
Rust
|
|
| C { .. }
|
|
| System { .. }
|
|
| RustIntrinsic
|
|
| RustCall
|
|
| Unadjusted
|
|
| Cdecl { .. }
|
|
| RustCold => true,
|
|
EfiApi => {
|
|
["arm", "aarch64", "riscv32", "riscv64", "x86", "x86_64"].contains(&&self.arch[..])
|
|
}
|
|
X86Interrupt => ["x86", "x86_64"].contains(&&self.arch[..]),
|
|
Aapcs { .. } => "arm" == self.arch,
|
|
CCmseNonSecureCall | CCmseNonSecureEntry => {
|
|
["thumbv8m.main-none-eabi", "thumbv8m.main-none-eabihf", "thumbv8m.base-none-eabi"]
|
|
.contains(&&self.llvm_target[..])
|
|
}
|
|
Win64 { .. } | SysV64 { .. } => self.arch == "x86_64",
|
|
PtxKernel => self.arch == "nvptx64",
|
|
GpuKernel => ["amdgpu", "nvptx64"].contains(&&self.arch[..]),
|
|
Msp430Interrupt => self.arch == "msp430",
|
|
RiscvInterruptM | RiscvInterruptS => ["riscv32", "riscv64"].contains(&&self.arch[..]),
|
|
AvrInterrupt | AvrNonBlockingInterrupt => self.arch == "avr",
|
|
Thiscall { .. } => self.arch == "x86",
|
|
// On windows these fall-back to platform native calling convention (C) when the
|
|
// architecture is not supported.
|
|
//
|
|
// This is I believe a historical accident that has occurred as part of Microsoft
|
|
// striving to allow most of the code to "just" compile when support for 64-bit x86
|
|
// was added and then later again, when support for ARM architectures was added.
|
|
//
|
|
// This is well documented across MSDN. Support for this in Rust has been added in
|
|
// #54576. This makes much more sense in context of Microsoft's C++ than it does in
|
|
// Rust, but there isn't much leeway remaining here to change it back at the time this
|
|
// comment has been written.
|
|
//
|
|
// Following are the relevant excerpts from the MSDN documentation.
|
|
//
|
|
// > The __vectorcall calling convention is only supported in native code on x86 and
|
|
// x64 processors that include Streaming SIMD Extensions 2 (SSE2) and above.
|
|
// > ...
|
|
// > On ARM machines, __vectorcall is accepted and ignored by the compiler.
|
|
//
|
|
// -- https://docs.microsoft.com/en-us/cpp/cpp/vectorcall?view=msvc-160
|
|
//
|
|
// > On ARM and x64 processors, __stdcall is accepted and ignored by the compiler;
|
|
//
|
|
// -- https://docs.microsoft.com/en-us/cpp/cpp/stdcall?view=msvc-160
|
|
//
|
|
// > In most cases, keywords or compiler switches that specify an unsupported
|
|
// > convention on a particular platform are ignored, and the platform default
|
|
// > convention is used.
|
|
//
|
|
// -- https://docs.microsoft.com/en-us/cpp/cpp/argument-passing-and-naming-conventions
|
|
Stdcall { .. } | Fastcall { .. } | Vectorcall { .. } if self.is_like_windows => true,
|
|
// Outside of Windows we want to only support these calling conventions for the
|
|
// architectures for which these calling conventions are actually well defined.
|
|
Stdcall { .. } | Fastcall { .. } if self.arch == "x86" => true,
|
|
Vectorcall { .. } if ["x86", "x86_64"].contains(&&self.arch[..]) => true,
|
|
// Reject these calling conventions everywhere else.
|
|
Stdcall { .. } | Fastcall { .. } | Vectorcall { .. } => false,
|
|
}
|
|
}
|
|
|
|
/// Minimum integer size in bits that this target can perform atomic
|
|
/// operations on.
|
|
pub fn min_atomic_width(&self) -> u64 {
|
|
self.min_atomic_width.unwrap_or(8)
|
|
}
|
|
|
|
/// Maximum integer size in bits that this target can perform atomic
|
|
/// operations on.
|
|
pub fn max_atomic_width(&self) -> u64 {
|
|
self.max_atomic_width.unwrap_or_else(|| self.pointer_width.into())
|
|
}
|
|
|
|
/// Check some basic consistency of the current target. For JSON targets we are less strict;
|
|
/// some of these checks are more guidelines than strict rules.
|
|
fn check_consistency(&self, kind: TargetKind) -> Result<(), String> {
|
|
macro_rules! check {
|
|
($b:expr, $($msg:tt)*) => {
|
|
if !$b {
|
|
return Err(format!($($msg)*));
|
|
}
|
|
}
|
|
}
|
|
macro_rules! check_eq {
|
|
($left:expr, $right:expr, $($msg:tt)*) => {
|
|
if ($left) != ($right) {
|
|
return Err(format!($($msg)*));
|
|
}
|
|
}
|
|
}
|
|
macro_rules! check_ne {
|
|
($left:expr, $right:expr, $($msg:tt)*) => {
|
|
if ($left) == ($right) {
|
|
return Err(format!($($msg)*));
|
|
}
|
|
}
|
|
}
|
|
macro_rules! check_matches {
|
|
($left:expr, $right:pat, $($msg:tt)*) => {
|
|
if !matches!($left, $right) {
|
|
return Err(format!($($msg)*));
|
|
}
|
|
}
|
|
}
|
|
|
|
check_eq!(
|
|
self.is_like_osx,
|
|
self.vendor == "apple",
|
|
"`is_like_osx` must be set if and only if `vendor` is `apple`"
|
|
);
|
|
check_eq!(
|
|
self.is_like_solaris,
|
|
self.os == "solaris" || self.os == "illumos",
|
|
"`is_like_solaris` must be set if and only if `os` is `solaris` or `illumos`"
|
|
);
|
|
check_eq!(
|
|
self.is_like_windows,
|
|
self.os == "windows" || self.os == "uefi" || self.os == "cygwin",
|
|
"`is_like_windows` must be set if and only if `os` is `windows`, `uefi` or `cygwin`"
|
|
);
|
|
check_eq!(
|
|
self.is_like_wasm,
|
|
self.arch == "wasm32" || self.arch == "wasm64",
|
|
"`is_like_wasm` must be set if and only if `arch` is `wasm32` or `wasm64`"
|
|
);
|
|
if self.is_like_msvc {
|
|
check!(self.is_like_windows, "if `is_like_msvc` is set, `is_like_windows` must be set");
|
|
}
|
|
if self.os == "emscripten" {
|
|
check!(self.is_like_wasm, "the `emcscripten` os only makes sense on wasm-like targets");
|
|
}
|
|
|
|
// Check that default linker flavor is compatible with some other key properties.
|
|
check_eq!(
|
|
self.is_like_osx,
|
|
matches!(self.linker_flavor, LinkerFlavor::Darwin(..)),
|
|
"`linker_flavor` must be `darwin` if and only if `is_like_osx` is set"
|
|
);
|
|
check_eq!(
|
|
self.is_like_msvc,
|
|
matches!(self.linker_flavor, LinkerFlavor::Msvc(..)),
|
|
"`linker_flavor` must be `msvc` if and only if `is_like_msvc` is set"
|
|
);
|
|
check_eq!(
|
|
self.is_like_wasm && self.os != "emscripten",
|
|
matches!(self.linker_flavor, LinkerFlavor::WasmLld(..)),
|
|
"`linker_flavor` must be `wasm-lld` if and only if `is_like_wasm` is set and the `os` is not `emscripten`",
|
|
);
|
|
check_eq!(
|
|
self.os == "emscripten",
|
|
matches!(self.linker_flavor, LinkerFlavor::EmCc),
|
|
"`linker_flavor` must be `em-cc` if and only if `os` is `emscripten`"
|
|
);
|
|
check_eq!(
|
|
self.arch == "bpf",
|
|
matches!(self.linker_flavor, LinkerFlavor::Bpf),
|
|
"`linker_flavor` must be `bpf` if and only if `arch` is `bpf`"
|
|
);
|
|
check_eq!(
|
|
self.arch == "nvptx64",
|
|
matches!(self.linker_flavor, LinkerFlavor::Ptx),
|
|
"`linker_flavor` must be `ptc` if and only if `arch` is `nvptx64`"
|
|
);
|
|
|
|
for args in [
|
|
&self.pre_link_args,
|
|
&self.late_link_args,
|
|
&self.late_link_args_dynamic,
|
|
&self.late_link_args_static,
|
|
&self.post_link_args,
|
|
] {
|
|
for (&flavor, flavor_args) in args {
|
|
check!(
|
|
!flavor_args.is_empty() || self.arch == "avr",
|
|
"linker flavor args must not be empty"
|
|
);
|
|
// Check that flavors mentioned in link args are compatible with the default flavor.
|
|
match self.linker_flavor {
|
|
LinkerFlavor::Gnu(..) => {
|
|
check_matches!(
|
|
flavor,
|
|
LinkerFlavor::Gnu(..),
|
|
"mixing GNU and non-GNU linker flavors"
|
|
);
|
|
}
|
|
LinkerFlavor::Darwin(..) => {
|
|
check_matches!(
|
|
flavor,
|
|
LinkerFlavor::Darwin(..),
|
|
"mixing Darwin and non-Darwin linker flavors"
|
|
)
|
|
}
|
|
LinkerFlavor::WasmLld(..) => {
|
|
check_matches!(
|
|
flavor,
|
|
LinkerFlavor::WasmLld(..),
|
|
"mixing wasm and non-wasm linker flavors"
|
|
)
|
|
}
|
|
LinkerFlavor::Unix(..) => {
|
|
check_matches!(
|
|
flavor,
|
|
LinkerFlavor::Unix(..),
|
|
"mixing unix and non-unix linker flavors"
|
|
);
|
|
}
|
|
LinkerFlavor::Msvc(..) => {
|
|
check_matches!(
|
|
flavor,
|
|
LinkerFlavor::Msvc(..),
|
|
"mixing MSVC and non-MSVC linker flavors"
|
|
);
|
|
}
|
|
LinkerFlavor::EmCc
|
|
| LinkerFlavor::Bpf
|
|
| LinkerFlavor::Ptx
|
|
| LinkerFlavor::Llbc => {
|
|
check_eq!(flavor, self.linker_flavor, "mixing different linker flavors")
|
|
}
|
|
}
|
|
|
|
// Check that link args for cc and non-cc versions of flavors are consistent.
|
|
let check_noncc = |noncc_flavor| -> Result<(), String> {
|
|
if let Some(noncc_args) = args.get(&noncc_flavor) {
|
|
for arg in flavor_args {
|
|
if let Some(suffix) = arg.strip_prefix("-Wl,") {
|
|
check!(
|
|
noncc_args.iter().any(|a| a == suffix),
|
|
" link args for cc and non-cc versions of flavors are not consistent"
|
|
);
|
|
}
|
|
}
|
|
}
|
|
Ok(())
|
|
};
|
|
|
|
match self.linker_flavor {
|
|
LinkerFlavor::Gnu(Cc::Yes, lld) => check_noncc(LinkerFlavor::Gnu(Cc::No, lld))?,
|
|
LinkerFlavor::WasmLld(Cc::Yes) => check_noncc(LinkerFlavor::WasmLld(Cc::No))?,
|
|
LinkerFlavor::Unix(Cc::Yes) => check_noncc(LinkerFlavor::Unix(Cc::No))?,
|
|
_ => {}
|
|
}
|
|
}
|
|
|
|
// Check that link args for lld and non-lld versions of flavors are consistent.
|
|
for cc in [Cc::No, Cc::Yes] {
|
|
check_eq!(
|
|
args.get(&LinkerFlavor::Gnu(cc, Lld::No)),
|
|
args.get(&LinkerFlavor::Gnu(cc, Lld::Yes)),
|
|
"link args for lld and non-lld versions of flavors are not consistent",
|
|
);
|
|
check_eq!(
|
|
args.get(&LinkerFlavor::Darwin(cc, Lld::No)),
|
|
args.get(&LinkerFlavor::Darwin(cc, Lld::Yes)),
|
|
"link args for lld and non-lld versions of flavors are not consistent",
|
|
);
|
|
}
|
|
check_eq!(
|
|
args.get(&LinkerFlavor::Msvc(Lld::No)),
|
|
args.get(&LinkerFlavor::Msvc(Lld::Yes)),
|
|
"link args for lld and non-lld versions of flavors are not consistent",
|
|
);
|
|
}
|
|
|
|
if self.link_self_contained.is_disabled() {
|
|
check!(
|
|
self.pre_link_objects_self_contained.is_empty()
|
|
&& self.post_link_objects_self_contained.is_empty(),
|
|
"if `link_self_contained` is disabled, then `pre_link_objects_self_contained` and `post_link_objects_self_contained` must be empty",
|
|
);
|
|
}
|
|
|
|
// If your target really needs to deviate from the rules below,
|
|
// except it and document the reasons.
|
|
// Keep the default "unknown" vendor instead.
|
|
check_ne!(self.vendor, "", "`vendor` cannot be empty");
|
|
check_ne!(self.os, "", "`os` cannot be empty");
|
|
if !self.can_use_os_unknown() {
|
|
// Keep the default "none" for bare metal targets instead.
|
|
check_ne!(
|
|
self.os,
|
|
"unknown",
|
|
"`unknown` os can only be used on particular targets; use `none` for bare-metal targets"
|
|
);
|
|
}
|
|
|
|
// Check dynamic linking stuff.
|
|
// We skip this for JSON targets since otherwise, our default values would fail this test.
|
|
// These checks are not critical for correctness, but more like default guidelines.
|
|
// FIXME (https://github.com/rust-lang/rust/issues/133459): do we want to change the JSON
|
|
// target defaults so that they pass these checks?
|
|
if kind == TargetKind::Builtin {
|
|
// BPF: when targeting user space vms (like rbpf), those can load dynamic libraries.
|
|
// hexagon: when targeting QuRT, that OS can load dynamic libraries.
|
|
// wasm{32,64}: dynamic linking is inherent in the definition of the VM.
|
|
if self.os == "none"
|
|
&& (self.arch != "bpf"
|
|
&& self.arch != "hexagon"
|
|
&& self.arch != "wasm32"
|
|
&& self.arch != "wasm64")
|
|
{
|
|
check!(
|
|
!self.dynamic_linking,
|
|
"dynamic linking is not supported on this OS/architecture"
|
|
);
|
|
}
|
|
if self.only_cdylib
|
|
|| self.crt_static_allows_dylibs
|
|
|| !self.late_link_args_dynamic.is_empty()
|
|
{
|
|
check!(
|
|
self.dynamic_linking,
|
|
"dynamic linking must be allowed when `only_cdylib` or `crt_static_allows_dylibs` or `late_link_args_dynamic` are set"
|
|
);
|
|
}
|
|
// Apparently PIC was slow on wasm at some point, see comments in wasm_base.rs
|
|
if self.dynamic_linking && !self.is_like_wasm {
|
|
check_eq!(
|
|
self.relocation_model,
|
|
RelocModel::Pic,
|
|
"targets that support dynamic linking must use the `pic` relocation model"
|
|
);
|
|
}
|
|
if self.position_independent_executables {
|
|
check_eq!(
|
|
self.relocation_model,
|
|
RelocModel::Pic,
|
|
"targets that support position-independent executables must use the `pic` relocation model"
|
|
);
|
|
}
|
|
// The UEFI targets do not support dynamic linking but still require PIC (#101377).
|
|
if self.relocation_model == RelocModel::Pic && (self.os != "uefi") {
|
|
check!(
|
|
self.dynamic_linking || self.position_independent_executables,
|
|
"when the relocation model is `pic`, the target must support dynamic linking or use position-independent executables. \
|
|
Set the relocation model to `static` to avoid this requirement"
|
|
);
|
|
}
|
|
if self.static_position_independent_executables {
|
|
check!(
|
|
self.position_independent_executables,
|
|
"if `static_position_independent_executables` is set, then `position_independent_executables` must be set"
|
|
);
|
|
}
|
|
if self.position_independent_executables {
|
|
check!(
|
|
self.executables,
|
|
"if `position_independent_executables` is set then `executables` must be set"
|
|
);
|
|
}
|
|
}
|
|
|
|
// Check crt static stuff
|
|
if self.crt_static_default || self.crt_static_allows_dylibs {
|
|
check!(
|
|
self.crt_static_respected,
|
|
"static CRT can be enabled but `crt_static_respected` is not set"
|
|
);
|
|
}
|
|
|
|
// Check that RISC-V targets always specify which ABI they use,
|
|
// and that ARM targets specify their float ABI.
|
|
match &*self.arch {
|
|
"riscv32" => {
|
|
check_matches!(
|
|
&*self.llvm_abiname,
|
|
"ilp32" | "ilp32f" | "ilp32d" | "ilp32e",
|
|
"invalid RISC-V ABI name: {}",
|
|
self.llvm_abiname,
|
|
);
|
|
}
|
|
"riscv64" => {
|
|
// Note that the `lp64e` is still unstable as it's not (yet) part of the ELF psABI.
|
|
check_matches!(
|
|
&*self.llvm_abiname,
|
|
"lp64" | "lp64f" | "lp64d" | "lp64e",
|
|
"invalid RISC-V ABI name: {}",
|
|
self.llvm_abiname,
|
|
);
|
|
}
|
|
"arm" => {
|
|
check!(
|
|
self.llvm_floatabi.is_some(),
|
|
"ARM targets must set `llvm-floatabi` to `hard` or `soft`",
|
|
)
|
|
}
|
|
_ => {}
|
|
}
|
|
|
|
// Check consistency of Rust ABI declaration.
|
|
if let Some(rust_abi) = self.rustc_abi {
|
|
match rust_abi {
|
|
RustcAbi::X86Sse2 => check_matches!(
|
|
&*self.arch,
|
|
"x86",
|
|
"`x86-sse2` ABI is only valid for x86-32 targets"
|
|
),
|
|
RustcAbi::X86Softfloat => check_matches!(
|
|
&*self.arch,
|
|
"x86" | "x86_64",
|
|
"`x86-softfloat` ABI is only valid for x86 targets"
|
|
),
|
|
}
|
|
}
|
|
|
|
// Check that the given target-features string makes some basic sense.
|
|
if !self.features.is_empty() {
|
|
let mut features_enabled = FxHashSet::default();
|
|
let mut features_disabled = FxHashSet::default();
|
|
for feat in self.features.split(',') {
|
|
if let Some(feat) = feat.strip_prefix("+") {
|
|
features_enabled.insert(feat);
|
|
if features_disabled.contains(feat) {
|
|
return Err(format!(
|
|
"target feature `{feat}` is both enabled and disabled"
|
|
));
|
|
}
|
|
} else if let Some(feat) = feat.strip_prefix("-") {
|
|
features_disabled.insert(feat);
|
|
if features_enabled.contains(feat) {
|
|
return Err(format!(
|
|
"target feature `{feat}` is both enabled and disabled"
|
|
));
|
|
}
|
|
} else {
|
|
return Err(format!(
|
|
"target feature `{feat}` is invalid, must start with `+` or `-`"
|
|
));
|
|
}
|
|
}
|
|
// Check that we don't mis-set any of the ABI-relevant features.
|
|
let abi_feature_constraints = self.abi_required_features();
|
|
for feat in abi_feature_constraints.required {
|
|
// The feature might be enabled by default so we can't *require* it to show up.
|
|
// But it must not be *disabled*.
|
|
if features_disabled.contains(feat) {
|
|
return Err(format!(
|
|
"target feature `{feat}` is required by the ABI but gets disabled in target spec"
|
|
));
|
|
}
|
|
}
|
|
for feat in abi_feature_constraints.incompatible {
|
|
// The feature might be disabled by default so we can't *require* it to show up.
|
|
// But it must not be *enabled*.
|
|
if features_enabled.contains(feat) {
|
|
return Err(format!(
|
|
"target feature `{feat}` is incompatible with the ABI but gets enabled in target spec"
|
|
));
|
|
}
|
|
}
|
|
}
|
|
|
|
Ok(())
|
|
}
|
|
|
|
/// Test target self-consistency and JSON encoding/decoding roundtrip.
|
|
#[cfg(test)]
|
|
fn test_target(mut self) {
|
|
let recycled_target = Target::from_json(self.to_json()).map(|(j, _)| j);
|
|
self.update_to_cli();
|
|
self.check_consistency(TargetKind::Builtin).unwrap();
|
|
assert_eq!(recycled_target, Ok(self));
|
|
}
|
|
|
|
// Add your target to the whitelist if it has `std` library
|
|
// and you certainly want "unknown" for the OS name.
|
|
fn can_use_os_unknown(&self) -> bool {
|
|
self.llvm_target == "wasm32-unknown-unknown"
|
|
|| self.llvm_target == "wasm64-unknown-unknown"
|
|
|| (self.env == "sgx" && self.vendor == "fortanix")
|
|
}
|
|
|
|
/// Load a built-in target
|
|
pub fn expect_builtin(target_tuple: &TargetTuple) -> Target {
|
|
match *target_tuple {
|
|
TargetTuple::TargetTuple(ref target_tuple) => {
|
|
load_builtin(target_tuple).expect("built-in target")
|
|
}
|
|
TargetTuple::TargetJson { .. } => {
|
|
panic!("built-in targets doesn't support target-paths")
|
|
}
|
|
}
|
|
}
|
|
|
|
/// Load all built-in targets
|
|
pub fn builtins() -> impl Iterator<Item = Target> {
|
|
load_all_builtins()
|
|
}
|
|
|
|
/// Search for a JSON file specifying the given target tuple.
|
|
///
|
|
/// If none is found in `$RUST_TARGET_PATH`, look for a file called `target.json` inside the
|
|
/// sysroot under the target-tuple's `rustlib` directory. Note that it could also just be a
|
|
/// bare filename already, so also check for that. If one of the hardcoded targets we know
|
|
/// about, just return it directly.
|
|
///
|
|
/// The error string could come from any of the APIs called, including filesystem access and
|
|
/// JSON decoding.
|
|
pub fn search(
|
|
target_tuple: &TargetTuple,
|
|
sysroot: &Path,
|
|
) -> Result<(Target, TargetWarnings), String> {
|
|
use std::{env, fs};
|
|
|
|
fn load_file(path: &Path) -> Result<(Target, TargetWarnings), String> {
|
|
let contents = fs::read_to_string(path).map_err(|e| e.to_string())?;
|
|
let obj = serde_json::from_str(&contents).map_err(|e| e.to_string())?;
|
|
Target::from_json(obj)
|
|
}
|
|
|
|
match *target_tuple {
|
|
TargetTuple::TargetTuple(ref target_tuple) => {
|
|
// check if tuple is in list of built-in targets
|
|
if let Some(t) = load_builtin(target_tuple) {
|
|
return Ok((t, TargetWarnings::empty()));
|
|
}
|
|
|
|
// search for a file named `target_tuple`.json in RUST_TARGET_PATH
|
|
let path = {
|
|
let mut target = target_tuple.to_string();
|
|
target.push_str(".json");
|
|
PathBuf::from(target)
|
|
};
|
|
|
|
let target_path = env::var_os("RUST_TARGET_PATH").unwrap_or_default();
|
|
|
|
for dir in env::split_paths(&target_path) {
|
|
let p = dir.join(&path);
|
|
if p.is_file() {
|
|
return load_file(&p);
|
|
}
|
|
}
|
|
|
|
// Additionally look in the sysroot under `lib/rustlib/<tuple>/target.json`
|
|
// as a fallback.
|
|
let rustlib_path = crate::relative_target_rustlib_path(sysroot, target_tuple);
|
|
let p = PathBuf::from_iter([
|
|
Path::new(sysroot),
|
|
Path::new(&rustlib_path),
|
|
Path::new("target.json"),
|
|
]);
|
|
if p.is_file() {
|
|
return load_file(&p);
|
|
}
|
|
|
|
// Leave in a specialized error message for the removed target.
|
|
// FIXME: If you see this and it's been a few months after this has been released,
|
|
// you can probably remove it.
|
|
if target_tuple == "i586-pc-windows-msvc" {
|
|
Err("the `i586-pc-windows-msvc` target has been removed. Use the `i686-pc-windows-msvc` target instead.\n\
|
|
Windows 10 (the minimum required OS version) requires a CPU baseline of at least i686 so you can safely switch".into())
|
|
} else {
|
|
Err(format!("could not find specification for target {target_tuple:?}"))
|
|
}
|
|
}
|
|
TargetTuple::TargetJson { ref contents, .. } => {
|
|
let obj = serde_json::from_str(contents).map_err(|e| e.to_string())?;
|
|
Target::from_json(obj)
|
|
}
|
|
}
|
|
}
|
|
|
|
/// Return the target's small data threshold support, converting
|
|
/// `DefaultForArch` into a concrete value.
|
|
pub fn small_data_threshold_support(&self) -> SmallDataThresholdSupport {
|
|
match &self.options.small_data_threshold_support {
|
|
// Avoid having to duplicate the small data support in every
|
|
// target file by supporting a default value for each
|
|
// architecture.
|
|
SmallDataThresholdSupport::DefaultForArch => match self.arch.as_ref() {
|
|
"mips" | "mips64" | "mips32r6" => {
|
|
SmallDataThresholdSupport::LlvmArg("mips-ssection-threshold".into())
|
|
}
|
|
"hexagon" => {
|
|
SmallDataThresholdSupport::LlvmArg("hexagon-small-data-threshold".into())
|
|
}
|
|
"m68k" => SmallDataThresholdSupport::LlvmArg("m68k-ssection-threshold".into()),
|
|
"riscv32" | "riscv64" => {
|
|
SmallDataThresholdSupport::LlvmModuleFlag("SmallDataLimit".into())
|
|
}
|
|
_ => SmallDataThresholdSupport::None,
|
|
},
|
|
s => s.clone(),
|
|
}
|
|
}
|
|
|
|
pub fn object_architecture(
|
|
&self,
|
|
unstable_target_features: &FxIndexSet<Symbol>,
|
|
) -> Option<(object::Architecture, Option<object::SubArchitecture>)> {
|
|
use object::Architecture;
|
|
Some(match self.arch.as_ref() {
|
|
"arm" => (Architecture::Arm, None),
|
|
"aarch64" => (
|
|
if self.pointer_width == 32 {
|
|
Architecture::Aarch64_Ilp32
|
|
} else {
|
|
Architecture::Aarch64
|
|
},
|
|
None,
|
|
),
|
|
"x86" => (Architecture::I386, None),
|
|
"s390x" => (Architecture::S390x, None),
|
|
"mips" | "mips32r6" => (Architecture::Mips, None),
|
|
"mips64" | "mips64r6" => (Architecture::Mips64, None),
|
|
"x86_64" => (
|
|
if self.pointer_width == 32 {
|
|
Architecture::X86_64_X32
|
|
} else {
|
|
Architecture::X86_64
|
|
},
|
|
None,
|
|
),
|
|
"powerpc" => (Architecture::PowerPc, None),
|
|
"powerpc64" => (Architecture::PowerPc64, None),
|
|
"riscv32" => (Architecture::Riscv32, None),
|
|
"riscv64" => (Architecture::Riscv64, None),
|
|
"sparc" => {
|
|
if unstable_target_features.contains(&sym::v8plus) {
|
|
// Target uses V8+, aka EM_SPARC32PLUS, aka 64-bit V9 but in 32-bit mode
|
|
(Architecture::Sparc32Plus, None)
|
|
} else {
|
|
// Target uses V7 or V8, aka EM_SPARC
|
|
(Architecture::Sparc, None)
|
|
}
|
|
}
|
|
"sparc64" => (Architecture::Sparc64, None),
|
|
"avr" => (Architecture::Avr, None),
|
|
"msp430" => (Architecture::Msp430, None),
|
|
"hexagon" => (Architecture::Hexagon, None),
|
|
"bpf" => (Architecture::Bpf, None),
|
|
"loongarch64" => (Architecture::LoongArch64, None),
|
|
"csky" => (Architecture::Csky, None),
|
|
"arm64ec" => (Architecture::Aarch64, Some(object::SubArchitecture::Arm64EC)),
|
|
// Unsupported architecture.
|
|
_ => return None,
|
|
})
|
|
}
|
|
}
|
|
|
|
/// Either a target tuple string or a path to a JSON file.
|
|
#[derive(Clone, Debug)]
|
|
pub enum TargetTuple {
|
|
TargetTuple(String),
|
|
TargetJson {
|
|
/// Warning: This field may only be used by rustdoc. Using it anywhere else will lead to
|
|
/// inconsistencies as it is discarded during serialization.
|
|
path_for_rustdoc: PathBuf,
|
|
tuple: String,
|
|
contents: String,
|
|
},
|
|
}
|
|
|
|
// Use a manual implementation to ignore the path field
|
|
impl PartialEq for TargetTuple {
|
|
fn eq(&self, other: &Self) -> bool {
|
|
match (self, other) {
|
|
(Self::TargetTuple(l0), Self::TargetTuple(r0)) => l0 == r0,
|
|
(
|
|
Self::TargetJson { path_for_rustdoc: _, tuple: l_tuple, contents: l_contents },
|
|
Self::TargetJson { path_for_rustdoc: _, tuple: r_tuple, contents: r_contents },
|
|
) => l_tuple == r_tuple && l_contents == r_contents,
|
|
_ => false,
|
|
}
|
|
}
|
|
}
|
|
|
|
// Use a manual implementation to ignore the path field
|
|
impl Hash for TargetTuple {
|
|
fn hash<H: Hasher>(&self, state: &mut H) -> () {
|
|
match self {
|
|
TargetTuple::TargetTuple(tuple) => {
|
|
0u8.hash(state);
|
|
tuple.hash(state)
|
|
}
|
|
TargetTuple::TargetJson { path_for_rustdoc: _, tuple, contents } => {
|
|
1u8.hash(state);
|
|
tuple.hash(state);
|
|
contents.hash(state)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// Use a manual implementation to prevent encoding the target json file path in the crate metadata
|
|
impl<S: Encoder> Encodable<S> for TargetTuple {
|
|
fn encode(&self, s: &mut S) {
|
|
match self {
|
|
TargetTuple::TargetTuple(tuple) => {
|
|
s.emit_u8(0);
|
|
s.emit_str(tuple);
|
|
}
|
|
TargetTuple::TargetJson { path_for_rustdoc: _, tuple, contents } => {
|
|
s.emit_u8(1);
|
|
s.emit_str(tuple);
|
|
s.emit_str(contents);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
impl<D: Decoder> Decodable<D> for TargetTuple {
|
|
fn decode(d: &mut D) -> Self {
|
|
match d.read_u8() {
|
|
0 => TargetTuple::TargetTuple(d.read_str().to_owned()),
|
|
1 => TargetTuple::TargetJson {
|
|
path_for_rustdoc: PathBuf::new(),
|
|
tuple: d.read_str().to_owned(),
|
|
contents: d.read_str().to_owned(),
|
|
},
|
|
_ => {
|
|
panic!("invalid enum variant tag while decoding `TargetTuple`, expected 0..2");
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
impl TargetTuple {
|
|
/// Creates a target tuple from the passed target tuple string.
|
|
pub fn from_tuple(tuple: &str) -> Self {
|
|
TargetTuple::TargetTuple(tuple.into())
|
|
}
|
|
|
|
/// Creates a target tuple from the passed target path.
|
|
pub fn from_path(path: &Path) -> Result<Self, io::Error> {
|
|
let canonicalized_path = try_canonicalize(path)?;
|
|
let contents = std::fs::read_to_string(&canonicalized_path).map_err(|err| {
|
|
io::Error::new(
|
|
io::ErrorKind::InvalidInput,
|
|
format!("target path {canonicalized_path:?} is not a valid file: {err}"),
|
|
)
|
|
})?;
|
|
let tuple = canonicalized_path
|
|
.file_stem()
|
|
.expect("target path must not be empty")
|
|
.to_str()
|
|
.expect("target path must be valid unicode")
|
|
.to_owned();
|
|
Ok(TargetTuple::TargetJson { path_for_rustdoc: canonicalized_path, tuple, contents })
|
|
}
|
|
|
|
/// Returns a string tuple for this target.
|
|
///
|
|
/// If this target is a path, the file name (without extension) is returned.
|
|
pub fn tuple(&self) -> &str {
|
|
match *self {
|
|
TargetTuple::TargetTuple(ref tuple) | TargetTuple::TargetJson { ref tuple, .. } => {
|
|
tuple
|
|
}
|
|
}
|
|
}
|
|
|
|
/// Returns an extended string tuple for this target.
|
|
///
|
|
/// If this target is a path, a hash of the path is appended to the tuple returned
|
|
/// by `tuple()`.
|
|
pub fn debug_tuple(&self) -> String {
|
|
use std::hash::DefaultHasher;
|
|
|
|
match self {
|
|
TargetTuple::TargetTuple(tuple) => tuple.to_owned(),
|
|
TargetTuple::TargetJson { path_for_rustdoc: _, tuple, contents: content } => {
|
|
let mut hasher = DefaultHasher::new();
|
|
content.hash(&mut hasher);
|
|
let hash = hasher.finish();
|
|
format!("{tuple}-{hash}")
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
impl fmt::Display for TargetTuple {
|
|
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
|
write!(f, "{}", self.debug_tuple())
|
|
}
|
|
}
|