2913 lines
116 KiB
Rust
2913 lines
116 KiB
Rust
//! [Flexible target specification.](https://github.com/rust-lang/rfcs/pull/131)
|
|
//!
|
|
//! Rust targets a wide variety of usecases, and in the interest of flexibility,
|
|
//! allows new target triples to be defined in configuration files. Most users
|
|
//! will not need to care about these, but this is invaluable when porting Rust
|
|
//! to a new platform, and allows for an unprecedented level of control over how
|
|
//! the compiler works.
|
|
//!
|
|
//! # Using custom targets
|
|
//!
|
|
//! A target triple, as passed via `rustc --target=TRIPLE`, will first be
|
|
//! compared against the list of built-in targets. This is to ease distributing
|
|
//! rustc (no need for configuration files) and also to hold these built-in
|
|
//! targets as immutable and sacred. If `TRIPLE` is not one of the built-in
|
|
//! targets, rustc will check if a file named `TRIPLE` exists. If it does, it
|
|
//! will be loaded as the target configuration. If the file does not exist,
|
|
//! rustc will search each directory in the environment variable
|
|
//! `RUST_TARGET_PATH` for a file named `TRIPLE.json`. The first one found will
|
|
//! be loaded. If no file is found in any of those directories, a fatal error
|
|
//! will be given.
|
|
//!
|
|
//! Projects defining their own targets should use
|
|
//! `--target=path/to/my-awesome-platform.json` instead of adding to
|
|
//! `RUST_TARGET_PATH`.
|
|
//!
|
|
//! # Defining a new target
|
|
//!
|
|
//! Targets are defined using [JSON](https://json.org/). The `Target` struct in
|
|
//! this module defines the format the JSON file should take, though each
|
|
//! underscore in the field names should be replaced with a hyphen (`-`) in the
|
|
//! JSON file. Some fields are required in every target specification, such as
|
|
//! `llvm-target`, `target-endian`, `target-pointer-width`, `data-layout`,
|
|
//! `arch`, and `os`. In general, options passed to rustc with `-C` override
|
|
//! the target's settings, though `target-feature` and `link-args` will *add*
|
|
//! to the list specified by the target, rather than replace.
|
|
|
|
use crate::abi::Endian;
|
|
use crate::json::{Json, ToJson};
|
|
use crate::spec::abi::{lookup as lookup_abi, Abi};
|
|
use crate::spec::crt_objects::{CrtObjects, LinkSelfContainedDefault};
|
|
use rustc_data_structures::stable_hasher::{HashStable, StableHasher};
|
|
use rustc_serialize::{Decodable, Decoder, Encodable, Encoder};
|
|
use rustc_span::symbol::{sym, Symbol};
|
|
use serde_json::Value;
|
|
use std::borrow::Cow;
|
|
use std::collections::BTreeMap;
|
|
use std::convert::TryFrom;
|
|
use std::hash::{Hash, Hasher};
|
|
use std::iter::FromIterator;
|
|
use std::ops::{Deref, DerefMut};
|
|
use std::path::{Path, PathBuf};
|
|
use std::str::FromStr;
|
|
use std::{fmt, io};
|
|
|
|
use rustc_macros::HashStable_Generic;
|
|
|
|
pub mod abi;
|
|
pub mod crt_objects;
|
|
|
|
mod android_base;
|
|
mod apple_base;
|
|
mod avr_gnu_base;
|
|
mod bpf_base;
|
|
mod dragonfly_base;
|
|
mod freebsd_base;
|
|
mod fuchsia_base;
|
|
mod haiku_base;
|
|
mod hermit_base;
|
|
mod illumos_base;
|
|
mod l4re_base;
|
|
mod linux_base;
|
|
mod linux_gnu_base;
|
|
mod linux_kernel_base;
|
|
mod linux_musl_base;
|
|
mod linux_uclibc_base;
|
|
mod msvc_base;
|
|
mod netbsd_base;
|
|
mod openbsd_base;
|
|
mod redox_base;
|
|
mod solaris_base;
|
|
mod solid_base;
|
|
mod thumb_base;
|
|
mod uefi_msvc_base;
|
|
mod vxworks_base;
|
|
mod wasm_base;
|
|
mod windows_gnu_base;
|
|
mod windows_gnullvm_base;
|
|
mod windows_msvc_base;
|
|
mod windows_uwp_gnu_base;
|
|
mod windows_uwp_msvc_base;
|
|
|
|
/// Linker is called through a C/C++ compiler.
|
|
#[derive(Clone, Copy, Debug, Eq, Ord, PartialEq, PartialOrd)]
|
|
pub enum Cc {
|
|
Yes,
|
|
No,
|
|
}
|
|
|
|
/// Linker is LLD.
|
|
#[derive(Clone, Copy, Debug, Eq, Ord, PartialEq, PartialOrd)]
|
|
pub enum Lld {
|
|
Yes,
|
|
No,
|
|
}
|
|
|
|
/// All linkers have some kinds of command line interfaces and rustc needs to know which commands
|
|
/// to use with each of them. So we cluster all such interfaces into a (somewhat arbitrary) number
|
|
/// of classes that we call "linker flavors".
|
|
///
|
|
/// Technically, it's not even necessary, we can nearly always infer the flavor from linker name
|
|
/// and target properties like `is_like_windows`/`is_like_osx`/etc. However, the PRs originally
|
|
/// introducing `-Clinker-flavor` (#40018 and friends) were aiming to reduce this kind of inference
|
|
/// and provide something certain and explicitly specified instead, and that design goal is still
|
|
/// relevant now.
|
|
///
|
|
/// The second goal is to keep the number of flavors to the minimum if possible.
|
|
/// LLD somewhat forces our hand here because that linker is self-sufficent only if its executable
|
|
/// (`argv[0]`) is named in specific way, otherwise it doesn't work and requires a
|
|
/// `-flavor LLD_FLAVOR` argument to choose which logic to use. Our shipped `rust-lld` in
|
|
/// particular is not named in such specific way, so it needs the flavor option, so we make our
|
|
/// linker flavors sufficiently fine-grained to satisfy LLD without inferring its flavor from other
|
|
/// target properties, in accordance with the first design goal.
|
|
///
|
|
/// The first component of the flavor is tightly coupled with the compilation target,
|
|
/// while the `Cc` and `Lld` flags can vary withing the same target.
|
|
#[derive(Clone, Copy, Debug, Eq, Ord, PartialEq, PartialOrd)]
|
|
pub enum LinkerFlavor {
|
|
/// Unix-like linker with GNU extensions (both naked and compiler-wrapped forms).
|
|
/// Besides similar "default" Linux/BSD linkers this also includes Windows/GNU linker,
|
|
/// which is somewhat different because it doesn't produce ELFs.
|
|
Gnu(Cc, Lld),
|
|
/// Unix-like linker for Apple targets (both naked and compiler-wrapped forms).
|
|
/// Extracted from the "umbrella" `Unix` flavor due to its corresponding LLD flavor.
|
|
Darwin(Cc, Lld),
|
|
/// Unix-like linker for Wasm targets (both naked and compiler-wrapped forms).
|
|
/// Extracted from the "umbrella" `Unix` flavor due to its corresponding LLD flavor.
|
|
/// Non-LLD version does not exist, so the lld flag is currently hardcoded here.
|
|
WasmLld(Cc),
|
|
/// Basic Unix-like linker for "any other Unix" targets (Solaris/illumos, L4Re, MSP430, etc),
|
|
/// possibly with non-GNU extensions (both naked and compiler-wrapped forms).
|
|
/// LLD doesn't support any of these.
|
|
Unix(Cc),
|
|
/// MSVC-style linker for Windows and UEFI, LLD supports it.
|
|
Msvc(Lld),
|
|
/// Emscripten Compiler Frontend, a wrapper around `WasmLld(Cc::Yes)` that has a different
|
|
/// interface and produces some additional JavaScript output.
|
|
EmCc,
|
|
// Below: other linker-like tools with unique interfaces for exotic targets.
|
|
/// Linker tool for BPF.
|
|
Bpf,
|
|
/// Linker tool for Nvidia PTX.
|
|
Ptx,
|
|
}
|
|
|
|
/// Linker flavors available externally through command line (`-Clinker-flavor`)
|
|
/// or json target specifications.
|
|
/// FIXME: This set has accumulated historically, bring it more in line with the internal
|
|
/// linker flavors (`LinkerFlavor`).
|
|
#[derive(Clone, Copy, Debug, Eq, Ord, PartialEq, PartialOrd)]
|
|
pub enum LinkerFlavorCli {
|
|
Gcc,
|
|
Ld,
|
|
Lld(LldFlavor),
|
|
Msvc,
|
|
Em,
|
|
BpfLinker,
|
|
PtxLinker,
|
|
}
|
|
|
|
#[derive(Clone, Copy, Debug, Eq, Ord, PartialEq, PartialOrd)]
|
|
pub enum LldFlavor {
|
|
Wasm,
|
|
Ld64,
|
|
Ld,
|
|
Link,
|
|
}
|
|
|
|
impl LldFlavor {
|
|
pub fn as_str(&self) -> &'static str {
|
|
match self {
|
|
LldFlavor::Wasm => "wasm",
|
|
LldFlavor::Ld64 => "darwin",
|
|
LldFlavor::Ld => "gnu",
|
|
LldFlavor::Link => "link",
|
|
}
|
|
}
|
|
|
|
fn from_str(s: &str) -> Option<Self> {
|
|
Some(match s {
|
|
"darwin" => LldFlavor::Ld64,
|
|
"gnu" => LldFlavor::Ld,
|
|
"link" => LldFlavor::Link,
|
|
"wasm" => LldFlavor::Wasm,
|
|
_ => return None,
|
|
})
|
|
}
|
|
}
|
|
|
|
impl ToJson for LldFlavor {
|
|
fn to_json(&self) -> Json {
|
|
self.as_str().to_json()
|
|
}
|
|
}
|
|
|
|
impl LinkerFlavor {
|
|
pub fn from_cli(cli: LinkerFlavorCli, target: &TargetOptions) -> LinkerFlavor {
|
|
Self::from_cli_impl(cli, target.linker_flavor.lld_flavor(), target.linker_flavor.is_gnu())
|
|
}
|
|
|
|
/// The passed CLI flavor is preferred over other args coming from the default target spec,
|
|
/// so this function can produce a flavor that is incompatible with the current target.
|
|
/// FIXME: Produce errors when `-Clinker-flavor` is set to something incompatible
|
|
/// with the current target.
|
|
fn from_cli_impl(cli: LinkerFlavorCli, lld_flavor: LldFlavor, is_gnu: bool) -> LinkerFlavor {
|
|
match cli {
|
|
LinkerFlavorCli::Gcc => match lld_flavor {
|
|
LldFlavor::Ld if is_gnu => LinkerFlavor::Gnu(Cc::Yes, Lld::No),
|
|
LldFlavor::Ld64 => LinkerFlavor::Darwin(Cc::Yes, Lld::No),
|
|
LldFlavor::Wasm => LinkerFlavor::WasmLld(Cc::Yes),
|
|
LldFlavor::Ld | LldFlavor::Link => LinkerFlavor::Unix(Cc::Yes),
|
|
},
|
|
LinkerFlavorCli::Ld => match lld_flavor {
|
|
LldFlavor::Ld if is_gnu => LinkerFlavor::Gnu(Cc::No, Lld::No),
|
|
LldFlavor::Ld64 => LinkerFlavor::Darwin(Cc::No, Lld::No),
|
|
LldFlavor::Ld | LldFlavor::Wasm | LldFlavor::Link => LinkerFlavor::Unix(Cc::No),
|
|
},
|
|
LinkerFlavorCli::Lld(LldFlavor::Ld) => LinkerFlavor::Gnu(Cc::No, Lld::Yes),
|
|
LinkerFlavorCli::Lld(LldFlavor::Ld64) => LinkerFlavor::Darwin(Cc::No, Lld::Yes),
|
|
LinkerFlavorCli::Lld(LldFlavor::Wasm) => LinkerFlavor::WasmLld(Cc::No),
|
|
LinkerFlavorCli::Lld(LldFlavor::Link) => LinkerFlavor::Msvc(Lld::Yes),
|
|
LinkerFlavorCli::Msvc => LinkerFlavor::Msvc(Lld::No),
|
|
LinkerFlavorCli::Em => LinkerFlavor::EmCc,
|
|
LinkerFlavorCli::BpfLinker => LinkerFlavor::Bpf,
|
|
LinkerFlavorCli::PtxLinker => LinkerFlavor::Ptx,
|
|
}
|
|
}
|
|
|
|
fn to_cli(self) -> LinkerFlavorCli {
|
|
match self {
|
|
LinkerFlavor::Gnu(Cc::Yes, _)
|
|
| LinkerFlavor::Darwin(Cc::Yes, _)
|
|
| LinkerFlavor::WasmLld(Cc::Yes)
|
|
| LinkerFlavor::Unix(Cc::Yes) => LinkerFlavorCli::Gcc,
|
|
LinkerFlavor::Gnu(_, Lld::Yes) => LinkerFlavorCli::Lld(LldFlavor::Ld),
|
|
LinkerFlavor::Darwin(_, Lld::Yes) => LinkerFlavorCli::Lld(LldFlavor::Ld64),
|
|
LinkerFlavor::WasmLld(..) => LinkerFlavorCli::Lld(LldFlavor::Wasm),
|
|
LinkerFlavor::Gnu(..) | LinkerFlavor::Darwin(..) | LinkerFlavor::Unix(..) => {
|
|
LinkerFlavorCli::Ld
|
|
}
|
|
LinkerFlavor::Msvc(Lld::Yes) => LinkerFlavorCli::Lld(LldFlavor::Link),
|
|
LinkerFlavor::Msvc(..) => LinkerFlavorCli::Msvc,
|
|
LinkerFlavor::EmCc => LinkerFlavorCli::Em,
|
|
LinkerFlavor::Bpf => LinkerFlavorCli::BpfLinker,
|
|
LinkerFlavor::Ptx => LinkerFlavorCli::PtxLinker,
|
|
}
|
|
}
|
|
|
|
pub fn lld_flavor(self) -> LldFlavor {
|
|
match self {
|
|
LinkerFlavor::Gnu(..)
|
|
| LinkerFlavor::Unix(..)
|
|
| LinkerFlavor::EmCc
|
|
| LinkerFlavor::Bpf
|
|
| LinkerFlavor::Ptx => LldFlavor::Ld,
|
|
LinkerFlavor::Darwin(..) => LldFlavor::Ld64,
|
|
LinkerFlavor::WasmLld(..) => LldFlavor::Wasm,
|
|
LinkerFlavor::Msvc(..) => LldFlavor::Link,
|
|
}
|
|
}
|
|
|
|
pub fn is_gnu(self) -> bool {
|
|
matches!(self, LinkerFlavor::Gnu(..))
|
|
}
|
|
}
|
|
|
|
macro_rules! linker_flavor_cli_impls {
|
|
($(($($flavor:tt)*) $string:literal)*) => (
|
|
impl LinkerFlavorCli {
|
|
pub const fn one_of() -> &'static str {
|
|
concat!("one of: ", $($string, " ",)*)
|
|
}
|
|
|
|
pub fn from_str(s: &str) -> Option<LinkerFlavorCli> {
|
|
Some(match s {
|
|
$($string => $($flavor)*,)*
|
|
_ => return None,
|
|
})
|
|
}
|
|
|
|
pub fn desc(&self) -> &str {
|
|
match *self {
|
|
$($($flavor)* => $string,)*
|
|
}
|
|
}
|
|
}
|
|
)
|
|
}
|
|
|
|
linker_flavor_cli_impls! {
|
|
(LinkerFlavorCli::Gcc) "gcc"
|
|
(LinkerFlavorCli::Ld) "ld"
|
|
(LinkerFlavorCli::Lld(LldFlavor::Ld)) "ld.lld"
|
|
(LinkerFlavorCli::Lld(LldFlavor::Ld64)) "ld64.lld"
|
|
(LinkerFlavorCli::Lld(LldFlavor::Link)) "lld-link"
|
|
(LinkerFlavorCli::Lld(LldFlavor::Wasm)) "wasm-ld"
|
|
(LinkerFlavorCli::Msvc) "msvc"
|
|
(LinkerFlavorCli::Em) "em"
|
|
(LinkerFlavorCli::BpfLinker) "bpf-linker"
|
|
(LinkerFlavorCli::PtxLinker) "ptx-linker"
|
|
}
|
|
|
|
impl ToJson for LinkerFlavorCli {
|
|
fn to_json(&self) -> Json {
|
|
self.desc().to_json()
|
|
}
|
|
}
|
|
|
|
#[derive(Clone, Copy, Debug, PartialEq, Hash, Encodable, Decodable, HashStable_Generic)]
|
|
pub enum PanicStrategy {
|
|
Unwind,
|
|
Abort,
|
|
}
|
|
|
|
impl PanicStrategy {
|
|
pub fn desc(&self) -> &str {
|
|
match *self {
|
|
PanicStrategy::Unwind => "unwind",
|
|
PanicStrategy::Abort => "abort",
|
|
}
|
|
}
|
|
|
|
pub const fn desc_symbol(&self) -> Symbol {
|
|
match *self {
|
|
PanicStrategy::Unwind => sym::unwind,
|
|
PanicStrategy::Abort => sym::abort,
|
|
}
|
|
}
|
|
|
|
pub const fn all() -> [Symbol; 2] {
|
|
[Self::Abort.desc_symbol(), Self::Unwind.desc_symbol()]
|
|
}
|
|
}
|
|
|
|
impl ToJson for PanicStrategy {
|
|
fn to_json(&self) -> Json {
|
|
match *self {
|
|
PanicStrategy::Abort => "abort".to_json(),
|
|
PanicStrategy::Unwind => "unwind".to_json(),
|
|
}
|
|
}
|
|
}
|
|
|
|
#[derive(Clone, Copy, Debug, PartialEq, Hash)]
|
|
pub enum RelroLevel {
|
|
Full,
|
|
Partial,
|
|
Off,
|
|
None,
|
|
}
|
|
|
|
impl RelroLevel {
|
|
pub fn desc(&self) -> &str {
|
|
match *self {
|
|
RelroLevel::Full => "full",
|
|
RelroLevel::Partial => "partial",
|
|
RelroLevel::Off => "off",
|
|
RelroLevel::None => "none",
|
|
}
|
|
}
|
|
}
|
|
|
|
impl FromStr for RelroLevel {
|
|
type Err = ();
|
|
|
|
fn from_str(s: &str) -> Result<RelroLevel, ()> {
|
|
match s {
|
|
"full" => Ok(RelroLevel::Full),
|
|
"partial" => Ok(RelroLevel::Partial),
|
|
"off" => Ok(RelroLevel::Off),
|
|
"none" => Ok(RelroLevel::None),
|
|
_ => Err(()),
|
|
}
|
|
}
|
|
}
|
|
|
|
impl ToJson for RelroLevel {
|
|
fn to_json(&self) -> Json {
|
|
match *self {
|
|
RelroLevel::Full => "full".to_json(),
|
|
RelroLevel::Partial => "partial".to_json(),
|
|
RelroLevel::Off => "off".to_json(),
|
|
RelroLevel::None => "None".to_json(),
|
|
}
|
|
}
|
|
}
|
|
|
|
#[derive(Clone, Copy, Debug, PartialEq, Hash)]
|
|
pub enum MergeFunctions {
|
|
Disabled,
|
|
Trampolines,
|
|
Aliases,
|
|
}
|
|
|
|
impl MergeFunctions {
|
|
pub fn desc(&self) -> &str {
|
|
match *self {
|
|
MergeFunctions::Disabled => "disabled",
|
|
MergeFunctions::Trampolines => "trampolines",
|
|
MergeFunctions::Aliases => "aliases",
|
|
}
|
|
}
|
|
}
|
|
|
|
impl FromStr for MergeFunctions {
|
|
type Err = ();
|
|
|
|
fn from_str(s: &str) -> Result<MergeFunctions, ()> {
|
|
match s {
|
|
"disabled" => Ok(MergeFunctions::Disabled),
|
|
"trampolines" => Ok(MergeFunctions::Trampolines),
|
|
"aliases" => Ok(MergeFunctions::Aliases),
|
|
_ => Err(()),
|
|
}
|
|
}
|
|
}
|
|
|
|
impl ToJson for MergeFunctions {
|
|
fn to_json(&self) -> Json {
|
|
match *self {
|
|
MergeFunctions::Disabled => "disabled".to_json(),
|
|
MergeFunctions::Trampolines => "trampolines".to_json(),
|
|
MergeFunctions::Aliases => "aliases".to_json(),
|
|
}
|
|
}
|
|
}
|
|
|
|
#[derive(Clone, Copy, PartialEq, Hash, Debug)]
|
|
pub enum RelocModel {
|
|
Static,
|
|
Pic,
|
|
Pie,
|
|
DynamicNoPic,
|
|
Ropi,
|
|
Rwpi,
|
|
RopiRwpi,
|
|
}
|
|
|
|
impl FromStr for RelocModel {
|
|
type Err = ();
|
|
|
|
fn from_str(s: &str) -> Result<RelocModel, ()> {
|
|
Ok(match s {
|
|
"static" => RelocModel::Static,
|
|
"pic" => RelocModel::Pic,
|
|
"pie" => RelocModel::Pie,
|
|
"dynamic-no-pic" => RelocModel::DynamicNoPic,
|
|
"ropi" => RelocModel::Ropi,
|
|
"rwpi" => RelocModel::Rwpi,
|
|
"ropi-rwpi" => RelocModel::RopiRwpi,
|
|
_ => return Err(()),
|
|
})
|
|
}
|
|
}
|
|
|
|
impl ToJson for RelocModel {
|
|
fn to_json(&self) -> Json {
|
|
match *self {
|
|
RelocModel::Static => "static",
|
|
RelocModel::Pic => "pic",
|
|
RelocModel::Pie => "pie",
|
|
RelocModel::DynamicNoPic => "dynamic-no-pic",
|
|
RelocModel::Ropi => "ropi",
|
|
RelocModel::Rwpi => "rwpi",
|
|
RelocModel::RopiRwpi => "ropi-rwpi",
|
|
}
|
|
.to_json()
|
|
}
|
|
}
|
|
|
|
#[derive(Clone, Copy, PartialEq, Hash, Debug)]
|
|
pub enum CodeModel {
|
|
Tiny,
|
|
Small,
|
|
Kernel,
|
|
Medium,
|
|
Large,
|
|
}
|
|
|
|
impl FromStr for CodeModel {
|
|
type Err = ();
|
|
|
|
fn from_str(s: &str) -> Result<CodeModel, ()> {
|
|
Ok(match s {
|
|
"tiny" => CodeModel::Tiny,
|
|
"small" => CodeModel::Small,
|
|
"kernel" => CodeModel::Kernel,
|
|
"medium" => CodeModel::Medium,
|
|
"large" => CodeModel::Large,
|
|
_ => return Err(()),
|
|
})
|
|
}
|
|
}
|
|
|
|
impl ToJson for CodeModel {
|
|
fn to_json(&self) -> Json {
|
|
match *self {
|
|
CodeModel::Tiny => "tiny",
|
|
CodeModel::Small => "small",
|
|
CodeModel::Kernel => "kernel",
|
|
CodeModel::Medium => "medium",
|
|
CodeModel::Large => "large",
|
|
}
|
|
.to_json()
|
|
}
|
|
}
|
|
|
|
#[derive(Clone, Copy, PartialEq, Hash, Debug)]
|
|
pub enum TlsModel {
|
|
GeneralDynamic,
|
|
LocalDynamic,
|
|
InitialExec,
|
|
LocalExec,
|
|
}
|
|
|
|
impl FromStr for TlsModel {
|
|
type Err = ();
|
|
|
|
fn from_str(s: &str) -> Result<TlsModel, ()> {
|
|
Ok(match s {
|
|
// Note the difference "general" vs "global" difference. The model name is "general",
|
|
// but the user-facing option name is "global" for consistency with other compilers.
|
|
"global-dynamic" => TlsModel::GeneralDynamic,
|
|
"local-dynamic" => TlsModel::LocalDynamic,
|
|
"initial-exec" => TlsModel::InitialExec,
|
|
"local-exec" => TlsModel::LocalExec,
|
|
_ => return Err(()),
|
|
})
|
|
}
|
|
}
|
|
|
|
impl ToJson for TlsModel {
|
|
fn to_json(&self) -> Json {
|
|
match *self {
|
|
TlsModel::GeneralDynamic => "global-dynamic",
|
|
TlsModel::LocalDynamic => "local-dynamic",
|
|
TlsModel::InitialExec => "initial-exec",
|
|
TlsModel::LocalExec => "local-exec",
|
|
}
|
|
.to_json()
|
|
}
|
|
}
|
|
|
|
/// Everything is flattened to a single enum to make the json encoding/decoding less annoying.
|
|
#[derive(Clone, Copy, PartialEq, Eq, PartialOrd, Ord, Debug)]
|
|
pub enum LinkOutputKind {
|
|
/// Dynamically linked non position-independent executable.
|
|
DynamicNoPicExe,
|
|
/// Dynamically linked position-independent executable.
|
|
DynamicPicExe,
|
|
/// Statically linked non position-independent executable.
|
|
StaticNoPicExe,
|
|
/// Statically linked position-independent executable.
|
|
StaticPicExe,
|
|
/// Regular dynamic library ("dynamically linked").
|
|
DynamicDylib,
|
|
/// Dynamic library with bundled libc ("statically linked").
|
|
StaticDylib,
|
|
/// WASI module with a lifetime past the _initialize entry point
|
|
WasiReactorExe,
|
|
}
|
|
|
|
impl LinkOutputKind {
|
|
fn as_str(&self) -> &'static str {
|
|
match self {
|
|
LinkOutputKind::DynamicNoPicExe => "dynamic-nopic-exe",
|
|
LinkOutputKind::DynamicPicExe => "dynamic-pic-exe",
|
|
LinkOutputKind::StaticNoPicExe => "static-nopic-exe",
|
|
LinkOutputKind::StaticPicExe => "static-pic-exe",
|
|
LinkOutputKind::DynamicDylib => "dynamic-dylib",
|
|
LinkOutputKind::StaticDylib => "static-dylib",
|
|
LinkOutputKind::WasiReactorExe => "wasi-reactor-exe",
|
|
}
|
|
}
|
|
|
|
pub(super) fn from_str(s: &str) -> Option<LinkOutputKind> {
|
|
Some(match s {
|
|
"dynamic-nopic-exe" => LinkOutputKind::DynamicNoPicExe,
|
|
"dynamic-pic-exe" => LinkOutputKind::DynamicPicExe,
|
|
"static-nopic-exe" => LinkOutputKind::StaticNoPicExe,
|
|
"static-pic-exe" => LinkOutputKind::StaticPicExe,
|
|
"dynamic-dylib" => LinkOutputKind::DynamicDylib,
|
|
"static-dylib" => LinkOutputKind::StaticDylib,
|
|
"wasi-reactor-exe" => LinkOutputKind::WasiReactorExe,
|
|
_ => return None,
|
|
})
|
|
}
|
|
}
|
|
|
|
impl fmt::Display for LinkOutputKind {
|
|
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
|
f.write_str(self.as_str())
|
|
}
|
|
}
|
|
|
|
pub type LinkArgs = BTreeMap<LinkerFlavor, Vec<StaticCow<str>>>;
|
|
pub type LinkArgsCli = BTreeMap<LinkerFlavorCli, Vec<StaticCow<str>>>;
|
|
|
|
/// Which kind of debuginfo does the target use?
|
|
///
|
|
/// Useful in determining whether a target supports Split DWARF (a target with
|
|
/// `DebuginfoKind::Dwarf` and supporting `SplitDebuginfo::Unpacked` for example).
|
|
#[derive(Clone, Copy, Debug, Default, Eq, Hash, PartialEq)]
|
|
pub enum DebuginfoKind {
|
|
/// DWARF debuginfo (such as that used on `x86_64_unknown_linux_gnu`).
|
|
#[default]
|
|
Dwarf,
|
|
/// DWARF debuginfo in dSYM files (such as on Apple platforms).
|
|
DwarfDsym,
|
|
/// Program database files (such as on Windows).
|
|
Pdb,
|
|
}
|
|
|
|
impl DebuginfoKind {
|
|
fn as_str(&self) -> &'static str {
|
|
match self {
|
|
DebuginfoKind::Dwarf => "dwarf",
|
|
DebuginfoKind::DwarfDsym => "dwarf-dsym",
|
|
DebuginfoKind::Pdb => "pdb",
|
|
}
|
|
}
|
|
}
|
|
|
|
impl FromStr for DebuginfoKind {
|
|
type Err = ();
|
|
|
|
fn from_str(s: &str) -> Result<Self, ()> {
|
|
Ok(match s {
|
|
"dwarf" => DebuginfoKind::Dwarf,
|
|
"dwarf-dsym" => DebuginfoKind::DwarfDsym,
|
|
"pdb" => DebuginfoKind::Pdb,
|
|
_ => return Err(()),
|
|
})
|
|
}
|
|
}
|
|
|
|
impl ToJson for DebuginfoKind {
|
|
fn to_json(&self) -> Json {
|
|
self.as_str().to_json()
|
|
}
|
|
}
|
|
|
|
impl fmt::Display for DebuginfoKind {
|
|
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
|
f.write_str(self.as_str())
|
|
}
|
|
}
|
|
|
|
#[derive(Clone, Copy, Debug, Default, Eq, Hash, PartialEq)]
|
|
pub enum SplitDebuginfo {
|
|
/// Split debug-information is disabled, meaning that on supported platforms
|
|
/// you can find all debug information in the executable itself. This is
|
|
/// only supported for ELF effectively.
|
|
///
|
|
/// * Windows - not supported
|
|
/// * macOS - don't run `dsymutil`
|
|
/// * ELF - `.debug_*` sections
|
|
#[default]
|
|
Off,
|
|
|
|
/// Split debug-information can be found in a "packed" location separate
|
|
/// from the final artifact. This is supported on all platforms.
|
|
///
|
|
/// * Windows - `*.pdb`
|
|
/// * macOS - `*.dSYM` (run `dsymutil`)
|
|
/// * ELF - `*.dwp` (run `thorin`)
|
|
Packed,
|
|
|
|
/// Split debug-information can be found in individual object files on the
|
|
/// filesystem. The main executable may point to the object files.
|
|
///
|
|
/// * Windows - not supported
|
|
/// * macOS - supported, scattered object files
|
|
/// * ELF - supported, scattered `*.dwo` or `*.o` files (see `SplitDwarfKind`)
|
|
Unpacked,
|
|
}
|
|
|
|
impl SplitDebuginfo {
|
|
fn as_str(&self) -> &'static str {
|
|
match self {
|
|
SplitDebuginfo::Off => "off",
|
|
SplitDebuginfo::Packed => "packed",
|
|
SplitDebuginfo::Unpacked => "unpacked",
|
|
}
|
|
}
|
|
}
|
|
|
|
impl FromStr for SplitDebuginfo {
|
|
type Err = ();
|
|
|
|
fn from_str(s: &str) -> Result<Self, ()> {
|
|
Ok(match s {
|
|
"off" => SplitDebuginfo::Off,
|
|
"unpacked" => SplitDebuginfo::Unpacked,
|
|
"packed" => SplitDebuginfo::Packed,
|
|
_ => return Err(()),
|
|
})
|
|
}
|
|
}
|
|
|
|
impl ToJson for SplitDebuginfo {
|
|
fn to_json(&self) -> Json {
|
|
self.as_str().to_json()
|
|
}
|
|
}
|
|
|
|
impl fmt::Display for SplitDebuginfo {
|
|
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
|
f.write_str(self.as_str())
|
|
}
|
|
}
|
|
|
|
#[derive(Clone, Debug, PartialEq, Eq)]
|
|
pub enum StackProbeType {
|
|
/// Don't emit any stack probes.
|
|
None,
|
|
/// It is harmless to use this option even on targets that do not have backend support for
|
|
/// stack probes as the failure mode is the same as if no stack-probe option was specified in
|
|
/// the first place.
|
|
Inline,
|
|
/// Call `__rust_probestack` whenever stack needs to be probed.
|
|
Call,
|
|
/// Use inline option for LLVM versions later than specified in `min_llvm_version_for_inline`
|
|
/// and call `__rust_probestack` otherwise.
|
|
InlineOrCall { min_llvm_version_for_inline: (u32, u32, u32) },
|
|
}
|
|
|
|
impl StackProbeType {
|
|
// LLVM X86 targets (ix86 and x86_64) can use inline-asm stack probes starting with LLVM 16.
|
|
// Notable past issues were rust#83139 (fixed in 14) and rust#84667 (fixed in 16).
|
|
const X86: Self = Self::InlineOrCall { min_llvm_version_for_inline: (16, 0, 0) };
|
|
|
|
fn from_json(json: &Json) -> Result<Self, String> {
|
|
let object = json.as_object().ok_or_else(|| "expected a JSON object")?;
|
|
let kind = object
|
|
.get("kind")
|
|
.and_then(|o| o.as_str())
|
|
.ok_or_else(|| "expected `kind` to be a string")?;
|
|
match kind {
|
|
"none" => Ok(StackProbeType::None),
|
|
"inline" => Ok(StackProbeType::Inline),
|
|
"call" => Ok(StackProbeType::Call),
|
|
"inline-or-call" => {
|
|
let min_version = object
|
|
.get("min-llvm-version-for-inline")
|
|
.and_then(|o| o.as_array())
|
|
.ok_or_else(|| "expected `min-llvm-version-for-inline` to be an array")?;
|
|
let mut iter = min_version.into_iter().map(|v| {
|
|
let int = v.as_u64().ok_or_else(
|
|
|| "expected `min-llvm-version-for-inline` values to be integers",
|
|
)?;
|
|
u32::try_from(int)
|
|
.map_err(|_| "`min-llvm-version-for-inline` values don't convert to u32")
|
|
});
|
|
let min_llvm_version_for_inline = (
|
|
iter.next().unwrap_or(Ok(11))?,
|
|
iter.next().unwrap_or(Ok(0))?,
|
|
iter.next().unwrap_or(Ok(0))?,
|
|
);
|
|
Ok(StackProbeType::InlineOrCall { min_llvm_version_for_inline })
|
|
}
|
|
_ => Err(String::from(
|
|
"`kind` expected to be one of `none`, `inline`, `call` or `inline-or-call`",
|
|
)),
|
|
}
|
|
}
|
|
}
|
|
|
|
impl ToJson for StackProbeType {
|
|
fn to_json(&self) -> Json {
|
|
Json::Object(match self {
|
|
StackProbeType::None => {
|
|
[(String::from("kind"), "none".to_json())].into_iter().collect()
|
|
}
|
|
StackProbeType::Inline => {
|
|
[(String::from("kind"), "inline".to_json())].into_iter().collect()
|
|
}
|
|
StackProbeType::Call => {
|
|
[(String::from("kind"), "call".to_json())].into_iter().collect()
|
|
}
|
|
StackProbeType::InlineOrCall { min_llvm_version_for_inline: (maj, min, patch) } => [
|
|
(String::from("kind"), "inline-or-call".to_json()),
|
|
(
|
|
String::from("min-llvm-version-for-inline"),
|
|
Json::Array(vec![maj.to_json(), min.to_json(), patch.to_json()]),
|
|
),
|
|
]
|
|
.into_iter()
|
|
.collect(),
|
|
})
|
|
}
|
|
}
|
|
|
|
bitflags::bitflags! {
|
|
#[derive(Default, Encodable, Decodable)]
|
|
pub struct SanitizerSet: u8 {
|
|
const ADDRESS = 1 << 0;
|
|
const LEAK = 1 << 1;
|
|
const MEMORY = 1 << 2;
|
|
const THREAD = 1 << 3;
|
|
const HWADDRESS = 1 << 4;
|
|
const CFI = 1 << 5;
|
|
const MEMTAG = 1 << 6;
|
|
const SHADOWCALLSTACK = 1 << 7;
|
|
}
|
|
}
|
|
|
|
impl SanitizerSet {
|
|
/// Return sanitizer's name
|
|
///
|
|
/// Returns none if the flags is a set of sanitizers numbering not exactly one.
|
|
pub fn as_str(self) -> Option<&'static str> {
|
|
Some(match self {
|
|
SanitizerSet::ADDRESS => "address",
|
|
SanitizerSet::CFI => "cfi",
|
|
SanitizerSet::LEAK => "leak",
|
|
SanitizerSet::MEMORY => "memory",
|
|
SanitizerSet::MEMTAG => "memtag",
|
|
SanitizerSet::SHADOWCALLSTACK => "shadow-call-stack",
|
|
SanitizerSet::THREAD => "thread",
|
|
SanitizerSet::HWADDRESS => "hwaddress",
|
|
_ => return None,
|
|
})
|
|
}
|
|
}
|
|
|
|
/// Formats a sanitizer set as a comma separated list of sanitizers' names.
|
|
impl fmt::Display for SanitizerSet {
|
|
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
|
let mut first = true;
|
|
for s in *self {
|
|
let name = s.as_str().unwrap_or_else(|| panic!("unrecognized sanitizer {:?}", s));
|
|
if !first {
|
|
f.write_str(", ")?;
|
|
}
|
|
f.write_str(name)?;
|
|
first = false;
|
|
}
|
|
Ok(())
|
|
}
|
|
}
|
|
|
|
impl IntoIterator for SanitizerSet {
|
|
type Item = SanitizerSet;
|
|
type IntoIter = std::vec::IntoIter<SanitizerSet>;
|
|
|
|
fn into_iter(self) -> Self::IntoIter {
|
|
[
|
|
SanitizerSet::ADDRESS,
|
|
SanitizerSet::CFI,
|
|
SanitizerSet::LEAK,
|
|
SanitizerSet::MEMORY,
|
|
SanitizerSet::MEMTAG,
|
|
SanitizerSet::SHADOWCALLSTACK,
|
|
SanitizerSet::THREAD,
|
|
SanitizerSet::HWADDRESS,
|
|
]
|
|
.iter()
|
|
.copied()
|
|
.filter(|&s| self.contains(s))
|
|
.collect::<Vec<_>>()
|
|
.into_iter()
|
|
}
|
|
}
|
|
|
|
impl<CTX> HashStable<CTX> for SanitizerSet {
|
|
fn hash_stable(&self, ctx: &mut CTX, hasher: &mut StableHasher) {
|
|
self.bits().hash_stable(ctx, hasher);
|
|
}
|
|
}
|
|
|
|
impl ToJson for SanitizerSet {
|
|
fn to_json(&self) -> Json {
|
|
self.into_iter()
|
|
.map(|v| Some(v.as_str()?.to_json()))
|
|
.collect::<Option<Vec<_>>>()
|
|
.unwrap_or_default()
|
|
.to_json()
|
|
}
|
|
}
|
|
|
|
#[derive(Clone, Copy, PartialEq, Hash, Debug)]
|
|
pub enum FramePointer {
|
|
/// Forces the machine code generator to always preserve the frame pointers.
|
|
Always,
|
|
/// Forces the machine code generator to preserve the frame pointers except for the leaf
|
|
/// functions (i.e. those that don't call other functions).
|
|
NonLeaf,
|
|
/// Allows the machine code generator to omit the frame pointers.
|
|
///
|
|
/// This option does not guarantee that the frame pointers will be omitted.
|
|
MayOmit,
|
|
}
|
|
|
|
impl FromStr for FramePointer {
|
|
type Err = ();
|
|
fn from_str(s: &str) -> Result<Self, ()> {
|
|
Ok(match s {
|
|
"always" => Self::Always,
|
|
"non-leaf" => Self::NonLeaf,
|
|
"may-omit" => Self::MayOmit,
|
|
_ => return Err(()),
|
|
})
|
|
}
|
|
}
|
|
|
|
impl ToJson for FramePointer {
|
|
fn to_json(&self) -> Json {
|
|
match *self {
|
|
Self::Always => "always",
|
|
Self::NonLeaf => "non-leaf",
|
|
Self::MayOmit => "may-omit",
|
|
}
|
|
.to_json()
|
|
}
|
|
}
|
|
|
|
/// Controls use of stack canaries.
|
|
#[derive(Clone, Copy, Debug, PartialEq, Hash, Eq)]
|
|
pub enum StackProtector {
|
|
/// Disable stack canary generation.
|
|
None,
|
|
|
|
/// On LLVM, mark all generated LLVM functions with the `ssp` attribute (see
|
|
/// llvm/docs/LangRef.rst). This triggers stack canary generation in
|
|
/// functions which contain an array of a byte-sized type with more than
|
|
/// eight elements.
|
|
Basic,
|
|
|
|
/// On LLVM, mark all generated LLVM functions with the `sspstrong`
|
|
/// attribute (see llvm/docs/LangRef.rst). This triggers stack canary
|
|
/// generation in functions which either contain an array, or which take
|
|
/// the address of a local variable.
|
|
Strong,
|
|
|
|
/// Generate stack canaries in all functions.
|
|
All,
|
|
}
|
|
|
|
impl StackProtector {
|
|
fn as_str(&self) -> &'static str {
|
|
match self {
|
|
StackProtector::None => "none",
|
|
StackProtector::Basic => "basic",
|
|
StackProtector::Strong => "strong",
|
|
StackProtector::All => "all",
|
|
}
|
|
}
|
|
}
|
|
|
|
impl FromStr for StackProtector {
|
|
type Err = ();
|
|
|
|
fn from_str(s: &str) -> Result<StackProtector, ()> {
|
|
Ok(match s {
|
|
"none" => StackProtector::None,
|
|
"basic" => StackProtector::Basic,
|
|
"strong" => StackProtector::Strong,
|
|
"all" => StackProtector::All,
|
|
_ => return Err(()),
|
|
})
|
|
}
|
|
}
|
|
|
|
impl fmt::Display for StackProtector {
|
|
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
|
f.write_str(self.as_str())
|
|
}
|
|
}
|
|
|
|
macro_rules! supported_targets {
|
|
( $(($triple:literal, $module:ident ),)+ ) => {
|
|
$(mod $module;)+
|
|
|
|
/// List of supported targets
|
|
pub const TARGETS: &[&str] = &[$($triple),+];
|
|
|
|
fn load_builtin(target: &str) -> Option<Target> {
|
|
let mut t = match target {
|
|
$( $triple => $module::target(), )+
|
|
_ => return None,
|
|
};
|
|
t.is_builtin = true;
|
|
debug!("got builtin target: {:?}", t);
|
|
Some(t)
|
|
}
|
|
|
|
#[cfg(test)]
|
|
mod tests {
|
|
mod tests_impl;
|
|
|
|
// Cannot put this into a separate file without duplication, make an exception.
|
|
$(
|
|
#[test] // `#[test]`
|
|
fn $module() {
|
|
tests_impl::test_target(super::$module::target(), $triple);
|
|
}
|
|
)+
|
|
}
|
|
};
|
|
}
|
|
|
|
supported_targets! {
|
|
("x86_64-unknown-linux-gnu", x86_64_unknown_linux_gnu),
|
|
("x86_64-unknown-linux-gnux32", x86_64_unknown_linux_gnux32),
|
|
("i686-unknown-linux-gnu", i686_unknown_linux_gnu),
|
|
("i586-unknown-linux-gnu", i586_unknown_linux_gnu),
|
|
("m68k-unknown-linux-gnu", m68k_unknown_linux_gnu),
|
|
("mips-unknown-linux-gnu", mips_unknown_linux_gnu),
|
|
("mips64-unknown-linux-gnuabi64", mips64_unknown_linux_gnuabi64),
|
|
("mips64el-unknown-linux-gnuabi64", mips64el_unknown_linux_gnuabi64),
|
|
("mipsisa32r6-unknown-linux-gnu", mipsisa32r6_unknown_linux_gnu),
|
|
("mipsisa32r6el-unknown-linux-gnu", mipsisa32r6el_unknown_linux_gnu),
|
|
("mipsisa64r6-unknown-linux-gnuabi64", mipsisa64r6_unknown_linux_gnuabi64),
|
|
("mipsisa64r6el-unknown-linux-gnuabi64", mipsisa64r6el_unknown_linux_gnuabi64),
|
|
("mipsel-unknown-linux-gnu", mipsel_unknown_linux_gnu),
|
|
("powerpc-unknown-linux-gnu", powerpc_unknown_linux_gnu),
|
|
("powerpc-unknown-linux-gnuspe", powerpc_unknown_linux_gnuspe),
|
|
("powerpc-unknown-linux-musl", powerpc_unknown_linux_musl),
|
|
("powerpc64-unknown-linux-gnu", powerpc64_unknown_linux_gnu),
|
|
("powerpc64-unknown-linux-musl", powerpc64_unknown_linux_musl),
|
|
("powerpc64le-unknown-linux-gnu", powerpc64le_unknown_linux_gnu),
|
|
("powerpc64le-unknown-linux-musl", powerpc64le_unknown_linux_musl),
|
|
("s390x-unknown-linux-gnu", s390x_unknown_linux_gnu),
|
|
("s390x-unknown-linux-musl", s390x_unknown_linux_musl),
|
|
("sparc-unknown-linux-gnu", sparc_unknown_linux_gnu),
|
|
("sparc64-unknown-linux-gnu", sparc64_unknown_linux_gnu),
|
|
("arm-unknown-linux-gnueabi", arm_unknown_linux_gnueabi),
|
|
("arm-unknown-linux-gnueabihf", arm_unknown_linux_gnueabihf),
|
|
("armeb-unknown-linux-gnueabi", armeb_unknown_linux_gnueabi),
|
|
("arm-unknown-linux-musleabi", arm_unknown_linux_musleabi),
|
|
("arm-unknown-linux-musleabihf", arm_unknown_linux_musleabihf),
|
|
("armv4t-unknown-linux-gnueabi", armv4t_unknown_linux_gnueabi),
|
|
("armv5te-unknown-linux-gnueabi", armv5te_unknown_linux_gnueabi),
|
|
("armv5te-unknown-linux-musleabi", armv5te_unknown_linux_musleabi),
|
|
("armv5te-unknown-linux-uclibceabi", armv5te_unknown_linux_uclibceabi),
|
|
("armv7-unknown-linux-gnueabi", armv7_unknown_linux_gnueabi),
|
|
("armv7-unknown-linux-gnueabihf", armv7_unknown_linux_gnueabihf),
|
|
("thumbv7neon-unknown-linux-gnueabihf", thumbv7neon_unknown_linux_gnueabihf),
|
|
("thumbv7neon-unknown-linux-musleabihf", thumbv7neon_unknown_linux_musleabihf),
|
|
("armv7-unknown-linux-musleabi", armv7_unknown_linux_musleabi),
|
|
("armv7-unknown-linux-musleabihf", armv7_unknown_linux_musleabihf),
|
|
("aarch64-unknown-linux-gnu", aarch64_unknown_linux_gnu),
|
|
("aarch64-unknown-linux-musl", aarch64_unknown_linux_musl),
|
|
("x86_64-unknown-linux-musl", x86_64_unknown_linux_musl),
|
|
("i686-unknown-linux-musl", i686_unknown_linux_musl),
|
|
("i586-unknown-linux-musl", i586_unknown_linux_musl),
|
|
("mips-unknown-linux-musl", mips_unknown_linux_musl),
|
|
("mipsel-unknown-linux-musl", mipsel_unknown_linux_musl),
|
|
("mips64-unknown-linux-muslabi64", mips64_unknown_linux_muslabi64),
|
|
("mips64el-unknown-linux-muslabi64", mips64el_unknown_linux_muslabi64),
|
|
("hexagon-unknown-linux-musl", hexagon_unknown_linux_musl),
|
|
|
|
("mips-unknown-linux-uclibc", mips_unknown_linux_uclibc),
|
|
("mipsel-unknown-linux-uclibc", mipsel_unknown_linux_uclibc),
|
|
|
|
("i686-linux-android", i686_linux_android),
|
|
("x86_64-linux-android", x86_64_linux_android),
|
|
("arm-linux-androideabi", arm_linux_androideabi),
|
|
("armv7-linux-androideabi", armv7_linux_androideabi),
|
|
("thumbv7neon-linux-androideabi", thumbv7neon_linux_androideabi),
|
|
("aarch64-linux-android", aarch64_linux_android),
|
|
|
|
("x86_64-unknown-none-linuxkernel", x86_64_unknown_none_linuxkernel),
|
|
|
|
("aarch64-unknown-freebsd", aarch64_unknown_freebsd),
|
|
("armv6-unknown-freebsd", armv6_unknown_freebsd),
|
|
("armv7-unknown-freebsd", armv7_unknown_freebsd),
|
|
("i686-unknown-freebsd", i686_unknown_freebsd),
|
|
("powerpc-unknown-freebsd", powerpc_unknown_freebsd),
|
|
("powerpc64-unknown-freebsd", powerpc64_unknown_freebsd),
|
|
("powerpc64le-unknown-freebsd", powerpc64le_unknown_freebsd),
|
|
("riscv64gc-unknown-freebsd", riscv64gc_unknown_freebsd),
|
|
("x86_64-unknown-freebsd", x86_64_unknown_freebsd),
|
|
|
|
("x86_64-unknown-dragonfly", x86_64_unknown_dragonfly),
|
|
|
|
("aarch64-unknown-openbsd", aarch64_unknown_openbsd),
|
|
("i686-unknown-openbsd", i686_unknown_openbsd),
|
|
("powerpc-unknown-openbsd", powerpc_unknown_openbsd),
|
|
("powerpc64-unknown-openbsd", powerpc64_unknown_openbsd),
|
|
("riscv64gc-unknown-openbsd", riscv64gc_unknown_openbsd),
|
|
("sparc64-unknown-openbsd", sparc64_unknown_openbsd),
|
|
("x86_64-unknown-openbsd", x86_64_unknown_openbsd),
|
|
|
|
("aarch64-unknown-netbsd", aarch64_unknown_netbsd),
|
|
("armv6-unknown-netbsd-eabihf", armv6_unknown_netbsd_eabihf),
|
|
("armv7-unknown-netbsd-eabihf", armv7_unknown_netbsd_eabihf),
|
|
("i686-unknown-netbsd", i686_unknown_netbsd),
|
|
("powerpc-unknown-netbsd", powerpc_unknown_netbsd),
|
|
("sparc64-unknown-netbsd", sparc64_unknown_netbsd),
|
|
("x86_64-unknown-netbsd", x86_64_unknown_netbsd),
|
|
|
|
("i686-unknown-haiku", i686_unknown_haiku),
|
|
("x86_64-unknown-haiku", x86_64_unknown_haiku),
|
|
|
|
("aarch64-apple-darwin", aarch64_apple_darwin),
|
|
("x86_64-apple-darwin", x86_64_apple_darwin),
|
|
("i686-apple-darwin", i686_apple_darwin),
|
|
|
|
("aarch64-fuchsia", aarch64_fuchsia),
|
|
("x86_64-fuchsia", x86_64_fuchsia),
|
|
|
|
("avr-unknown-gnu-atmega328", avr_unknown_gnu_atmega328),
|
|
|
|
("x86_64-unknown-l4re-uclibc", x86_64_unknown_l4re_uclibc),
|
|
|
|
("aarch64-unknown-redox", aarch64_unknown_redox),
|
|
("x86_64-unknown-redox", x86_64_unknown_redox),
|
|
|
|
("i386-apple-ios", i386_apple_ios),
|
|
("x86_64-apple-ios", x86_64_apple_ios),
|
|
("aarch64-apple-ios", aarch64_apple_ios),
|
|
("armv7-apple-ios", armv7_apple_ios),
|
|
("armv7s-apple-ios", armv7s_apple_ios),
|
|
("x86_64-apple-ios-macabi", x86_64_apple_ios_macabi),
|
|
("aarch64-apple-ios-macabi", aarch64_apple_ios_macabi),
|
|
("aarch64-apple-ios-sim", aarch64_apple_ios_sim),
|
|
("aarch64-apple-tvos", aarch64_apple_tvos),
|
|
("x86_64-apple-tvos", x86_64_apple_tvos),
|
|
|
|
("armv7k-apple-watchos", armv7k_apple_watchos),
|
|
("arm64_32-apple-watchos", arm64_32_apple_watchos),
|
|
("x86_64-apple-watchos-sim", x86_64_apple_watchos_sim),
|
|
("aarch64-apple-watchos-sim", aarch64_apple_watchos_sim),
|
|
|
|
("armebv7r-none-eabi", armebv7r_none_eabi),
|
|
("armebv7r-none-eabihf", armebv7r_none_eabihf),
|
|
("armv7r-none-eabi", armv7r_none_eabi),
|
|
("armv7r-none-eabihf", armv7r_none_eabihf),
|
|
|
|
("x86_64-pc-solaris", x86_64_pc_solaris),
|
|
("x86_64-sun-solaris", x86_64_sun_solaris),
|
|
("sparcv9-sun-solaris", sparcv9_sun_solaris),
|
|
|
|
("x86_64-unknown-illumos", x86_64_unknown_illumos),
|
|
|
|
("x86_64-pc-windows-gnu", x86_64_pc_windows_gnu),
|
|
("i686-pc-windows-gnu", i686_pc_windows_gnu),
|
|
("i686-uwp-windows-gnu", i686_uwp_windows_gnu),
|
|
("x86_64-uwp-windows-gnu", x86_64_uwp_windows_gnu),
|
|
|
|
("aarch64-pc-windows-gnullvm", aarch64_pc_windows_gnullvm),
|
|
("x86_64-pc-windows-gnullvm", x86_64_pc_windows_gnullvm),
|
|
|
|
("aarch64-pc-windows-msvc", aarch64_pc_windows_msvc),
|
|
("aarch64-uwp-windows-msvc", aarch64_uwp_windows_msvc),
|
|
("x86_64-pc-windows-msvc", x86_64_pc_windows_msvc),
|
|
("x86_64-uwp-windows-msvc", x86_64_uwp_windows_msvc),
|
|
("i686-pc-windows-msvc", i686_pc_windows_msvc),
|
|
("i686-uwp-windows-msvc", i686_uwp_windows_msvc),
|
|
("i586-pc-windows-msvc", i586_pc_windows_msvc),
|
|
("thumbv7a-pc-windows-msvc", thumbv7a_pc_windows_msvc),
|
|
("thumbv7a-uwp-windows-msvc", thumbv7a_uwp_windows_msvc),
|
|
|
|
("asmjs-unknown-emscripten", asmjs_unknown_emscripten),
|
|
("wasm32-unknown-emscripten", wasm32_unknown_emscripten),
|
|
("wasm32-unknown-unknown", wasm32_unknown_unknown),
|
|
("wasm32-wasi", wasm32_wasi),
|
|
("wasm64-unknown-unknown", wasm64_unknown_unknown),
|
|
|
|
("thumbv6m-none-eabi", thumbv6m_none_eabi),
|
|
("thumbv7m-none-eabi", thumbv7m_none_eabi),
|
|
("thumbv7em-none-eabi", thumbv7em_none_eabi),
|
|
("thumbv7em-none-eabihf", thumbv7em_none_eabihf),
|
|
("thumbv8m.base-none-eabi", thumbv8m_base_none_eabi),
|
|
("thumbv8m.main-none-eabi", thumbv8m_main_none_eabi),
|
|
("thumbv8m.main-none-eabihf", thumbv8m_main_none_eabihf),
|
|
|
|
("armv7a-none-eabi", armv7a_none_eabi),
|
|
("armv7a-none-eabihf", armv7a_none_eabihf),
|
|
|
|
("msp430-none-elf", msp430_none_elf),
|
|
|
|
("aarch64-unknown-hermit", aarch64_unknown_hermit),
|
|
("x86_64-unknown-hermit", x86_64_unknown_hermit),
|
|
|
|
("riscv32i-unknown-none-elf", riscv32i_unknown_none_elf),
|
|
("riscv32im-unknown-none-elf", riscv32im_unknown_none_elf),
|
|
("riscv32imc-unknown-none-elf", riscv32imc_unknown_none_elf),
|
|
("riscv32imc-esp-espidf", riscv32imc_esp_espidf),
|
|
("riscv32imac-unknown-none-elf", riscv32imac_unknown_none_elf),
|
|
("riscv32imac-unknown-xous-elf", riscv32imac_unknown_xous_elf),
|
|
("riscv32gc-unknown-linux-gnu", riscv32gc_unknown_linux_gnu),
|
|
("riscv32gc-unknown-linux-musl", riscv32gc_unknown_linux_musl),
|
|
("riscv64imac-unknown-none-elf", riscv64imac_unknown_none_elf),
|
|
("riscv64gc-unknown-none-elf", riscv64gc_unknown_none_elf),
|
|
("riscv64gc-unknown-linux-gnu", riscv64gc_unknown_linux_gnu),
|
|
("riscv64gc-unknown-linux-musl", riscv64gc_unknown_linux_musl),
|
|
|
|
("aarch64-unknown-none", aarch64_unknown_none),
|
|
("aarch64-unknown-none-softfloat", aarch64_unknown_none_softfloat),
|
|
|
|
("x86_64-fortanix-unknown-sgx", x86_64_fortanix_unknown_sgx),
|
|
|
|
("x86_64-unknown-uefi", x86_64_unknown_uefi),
|
|
("i686-unknown-uefi", i686_unknown_uefi),
|
|
("aarch64-unknown-uefi", aarch64_unknown_uefi),
|
|
|
|
("nvptx64-nvidia-cuda", nvptx64_nvidia_cuda),
|
|
|
|
("i686-wrs-vxworks", i686_wrs_vxworks),
|
|
("x86_64-wrs-vxworks", x86_64_wrs_vxworks),
|
|
("armv7-wrs-vxworks-eabihf", armv7_wrs_vxworks_eabihf),
|
|
("aarch64-wrs-vxworks", aarch64_wrs_vxworks),
|
|
("powerpc-wrs-vxworks", powerpc_wrs_vxworks),
|
|
("powerpc-wrs-vxworks-spe", powerpc_wrs_vxworks_spe),
|
|
("powerpc64-wrs-vxworks", powerpc64_wrs_vxworks),
|
|
|
|
("aarch64-kmc-solid_asp3", aarch64_kmc_solid_asp3),
|
|
("armv7a-kmc-solid_asp3-eabi", armv7a_kmc_solid_asp3_eabi),
|
|
("armv7a-kmc-solid_asp3-eabihf", armv7a_kmc_solid_asp3_eabihf),
|
|
|
|
("mipsel-sony-psp", mipsel_sony_psp),
|
|
("mipsel-sony-psx", mipsel_sony_psx),
|
|
("mipsel-unknown-none", mipsel_unknown_none),
|
|
("thumbv4t-none-eabi", thumbv4t_none_eabi),
|
|
("armv4t-none-eabi", armv4t_none_eabi),
|
|
("thumbv5te-none-eabi", thumbv5te_none_eabi),
|
|
("armv5te-none-eabi", armv5te_none_eabi),
|
|
|
|
("aarch64_be-unknown-linux-gnu", aarch64_be_unknown_linux_gnu),
|
|
("aarch64-unknown-linux-gnu_ilp32", aarch64_unknown_linux_gnu_ilp32),
|
|
("aarch64_be-unknown-linux-gnu_ilp32", aarch64_be_unknown_linux_gnu_ilp32),
|
|
|
|
("bpfeb-unknown-none", bpfeb_unknown_none),
|
|
("bpfel-unknown-none", bpfel_unknown_none),
|
|
|
|
("armv6k-nintendo-3ds", armv6k_nintendo_3ds),
|
|
|
|
("aarch64-nintendo-switch-freestanding", aarch64_nintendo_switch_freestanding),
|
|
|
|
("armv7-unknown-linux-uclibceabi", armv7_unknown_linux_uclibceabi),
|
|
("armv7-unknown-linux-uclibceabihf", armv7_unknown_linux_uclibceabihf),
|
|
|
|
("x86_64-unknown-none", x86_64_unknown_none),
|
|
|
|
("mips64-openwrt-linux-musl", mips64_openwrt_linux_musl),
|
|
}
|
|
|
|
/// Cow-Vec-Str: Cow<'static, [Cow<'static, str>]>
|
|
macro_rules! cvs {
|
|
() => {
|
|
::std::borrow::Cow::Borrowed(&[])
|
|
};
|
|
($($x:expr),+ $(,)?) => {
|
|
::std::borrow::Cow::Borrowed(&[
|
|
$(
|
|
::std::borrow::Cow::Borrowed($x),
|
|
)*
|
|
])
|
|
};
|
|
}
|
|
|
|
pub(crate) use cvs;
|
|
|
|
/// Warnings encountered when parsing the target `json`.
|
|
///
|
|
/// Includes fields that weren't recognized and fields that don't have the expected type.
|
|
#[derive(Debug, PartialEq)]
|
|
pub struct TargetWarnings {
|
|
unused_fields: Vec<String>,
|
|
incorrect_type: Vec<String>,
|
|
}
|
|
|
|
impl TargetWarnings {
|
|
pub fn empty() -> Self {
|
|
Self { unused_fields: Vec::new(), incorrect_type: Vec::new() }
|
|
}
|
|
|
|
pub fn warning_messages(&self) -> Vec<String> {
|
|
let mut warnings = vec![];
|
|
if !self.unused_fields.is_empty() {
|
|
warnings.push(format!(
|
|
"target json file contains unused fields: {}",
|
|
self.unused_fields.join(", ")
|
|
));
|
|
}
|
|
if !self.incorrect_type.is_empty() {
|
|
warnings.push(format!(
|
|
"target json file contains fields whose value doesn't have the correct json type: {}",
|
|
self.incorrect_type.join(", ")
|
|
));
|
|
}
|
|
warnings
|
|
}
|
|
}
|
|
|
|
/// Everything `rustc` knows about how to compile for a specific target.
|
|
///
|
|
/// Every field here must be specified, and has no default value.
|
|
#[derive(PartialEq, Clone, Debug)]
|
|
pub struct Target {
|
|
/// Target triple to pass to LLVM.
|
|
pub llvm_target: StaticCow<str>,
|
|
/// Number of bits in a pointer. Influences the `target_pointer_width` `cfg` variable.
|
|
pub pointer_width: u32,
|
|
/// Architecture to use for ABI considerations. Valid options include: "x86",
|
|
/// "x86_64", "arm", "aarch64", "mips", "powerpc", "powerpc64", and others.
|
|
pub arch: StaticCow<str>,
|
|
/// [Data layout](https://llvm.org/docs/LangRef.html#data-layout) to pass to LLVM.
|
|
pub data_layout: StaticCow<str>,
|
|
/// Optional settings with defaults.
|
|
pub options: TargetOptions,
|
|
}
|
|
|
|
pub trait HasTargetSpec {
|
|
fn target_spec(&self) -> &Target;
|
|
}
|
|
|
|
impl HasTargetSpec for Target {
|
|
#[inline]
|
|
fn target_spec(&self) -> &Target {
|
|
self
|
|
}
|
|
}
|
|
|
|
type StaticCow<T> = Cow<'static, T>;
|
|
|
|
/// Optional aspects of a target specification.
|
|
///
|
|
/// This has an implementation of `Default`, see each field for what the default is. In general,
|
|
/// these try to take "minimal defaults" that don't assume anything about the runtime they run in.
|
|
///
|
|
/// `TargetOptions` as a separate structure is mostly an implementation detail of `Target`
|
|
/// construction, all its fields logically belong to `Target` and available from `Target`
|
|
/// through `Deref` impls.
|
|
#[derive(PartialEq, Clone, Debug)]
|
|
pub struct TargetOptions {
|
|
/// Whether the target is built-in or loaded from a custom target specification.
|
|
pub is_builtin: bool,
|
|
|
|
/// Used as the `target_endian` `cfg` variable. Defaults to little endian.
|
|
pub endian: Endian,
|
|
/// Width of c_int type. Defaults to "32".
|
|
pub c_int_width: StaticCow<str>,
|
|
/// OS name to use for conditional compilation (`target_os`). Defaults to "none".
|
|
/// "none" implies a bare metal target without `std` library.
|
|
/// A couple of targets having `std` also use "unknown" as an `os` value,
|
|
/// but they are exceptions.
|
|
pub os: StaticCow<str>,
|
|
/// Environment name to use for conditional compilation (`target_env`). Defaults to "".
|
|
pub env: StaticCow<str>,
|
|
/// ABI name to distinguish multiple ABIs on the same OS and architecture. For instance, `"eabi"`
|
|
/// or `"eabihf"`. Defaults to "".
|
|
pub abi: StaticCow<str>,
|
|
/// Vendor name to use for conditional compilation (`target_vendor`). Defaults to "unknown".
|
|
pub vendor: StaticCow<str>,
|
|
|
|
/// Linker to invoke
|
|
pub linker: Option<StaticCow<str>>,
|
|
/// Default linker flavor used if `-C linker-flavor` or `-C linker` are not passed
|
|
/// on the command line. Defaults to `LinkerFlavor::Gnu(Cc::Yes, Lld::No)`.
|
|
pub linker_flavor: LinkerFlavor,
|
|
linker_flavor_json: LinkerFlavorCli,
|
|
lld_flavor_json: LldFlavor,
|
|
linker_is_gnu_json: bool,
|
|
|
|
/// Objects to link before and after all other object code.
|
|
pub pre_link_objects: CrtObjects,
|
|
pub post_link_objects: CrtObjects,
|
|
/// Same as `(pre|post)_link_objects`, but when self-contained linking mode is enabled.
|
|
pub pre_link_objects_self_contained: CrtObjects,
|
|
pub post_link_objects_self_contained: CrtObjects,
|
|
pub link_self_contained: LinkSelfContainedDefault,
|
|
|
|
/// Linker arguments that are passed *before* any user-defined libraries.
|
|
pub pre_link_args: LinkArgs,
|
|
pre_link_args_json: LinkArgsCli,
|
|
/// Linker arguments that are unconditionally passed after any
|
|
/// user-defined but before post-link objects. Standard platform
|
|
/// libraries that should be always be linked to, usually go here.
|
|
pub late_link_args: LinkArgs,
|
|
late_link_args_json: LinkArgsCli,
|
|
/// Linker arguments used in addition to `late_link_args` if at least one
|
|
/// Rust dependency is dynamically linked.
|
|
pub late_link_args_dynamic: LinkArgs,
|
|
late_link_args_dynamic_json: LinkArgsCli,
|
|
/// Linker arguments used in addition to `late_link_args` if all Rust
|
|
/// dependencies are statically linked.
|
|
pub late_link_args_static: LinkArgs,
|
|
late_link_args_static_json: LinkArgsCli,
|
|
/// Linker arguments that are unconditionally passed *after* any
|
|
/// user-defined libraries.
|
|
pub post_link_args: LinkArgs,
|
|
post_link_args_json: LinkArgsCli,
|
|
|
|
/// Optional link script applied to `dylib` and `executable` crate types.
|
|
/// This is a string containing the script, not a path. Can only be applied
|
|
/// to linkers where linker flavor matches `LinkerFlavor::Gnu(..)`.
|
|
pub link_script: Option<StaticCow<str>>,
|
|
/// Environment variables to be set for the linker invocation.
|
|
pub link_env: StaticCow<[(StaticCow<str>, StaticCow<str>)]>,
|
|
/// Environment variables to be removed for the linker invocation.
|
|
pub link_env_remove: StaticCow<[StaticCow<str>]>,
|
|
|
|
/// Extra arguments to pass to the external assembler (when used)
|
|
pub asm_args: StaticCow<[StaticCow<str>]>,
|
|
|
|
/// Default CPU to pass to LLVM. Corresponds to `llc -mcpu=$cpu`. Defaults
|
|
/// to "generic".
|
|
pub cpu: StaticCow<str>,
|
|
/// Default target features to pass to LLVM. These features will *always* be
|
|
/// passed, and cannot be disabled even via `-C`. Corresponds to `llc
|
|
/// -mattr=$features`.
|
|
pub features: StaticCow<str>,
|
|
/// Whether dynamic linking is available on this target. Defaults to false.
|
|
pub dynamic_linking: bool,
|
|
/// If dynamic linking is available, whether only cdylibs are supported.
|
|
pub only_cdylib: bool,
|
|
/// Whether executables are available on this target. Defaults to true.
|
|
pub executables: bool,
|
|
/// Relocation model to use in object file. Corresponds to `llc
|
|
/// -relocation-model=$relocation_model`. Defaults to `Pic`.
|
|
pub relocation_model: RelocModel,
|
|
/// Code model to use. Corresponds to `llc -code-model=$code_model`.
|
|
/// Defaults to `None` which means "inherited from the base LLVM target".
|
|
pub code_model: Option<CodeModel>,
|
|
/// TLS model to use. Options are "global-dynamic" (default), "local-dynamic", "initial-exec"
|
|
/// and "local-exec". This is similar to the -ftls-model option in GCC/Clang.
|
|
pub tls_model: TlsModel,
|
|
/// Do not emit code that uses the "red zone", if the ABI has one. Defaults to false.
|
|
pub disable_redzone: bool,
|
|
/// Frame pointer mode for this target. Defaults to `MayOmit`.
|
|
pub frame_pointer: FramePointer,
|
|
/// Emit each function in its own section. Defaults to true.
|
|
pub function_sections: bool,
|
|
/// String to prepend to the name of every dynamic library. Defaults to "lib".
|
|
pub dll_prefix: StaticCow<str>,
|
|
/// String to append to the name of every dynamic library. Defaults to ".so".
|
|
pub dll_suffix: StaticCow<str>,
|
|
/// String to append to the name of every executable.
|
|
pub exe_suffix: StaticCow<str>,
|
|
/// String to prepend to the name of every static library. Defaults to "lib".
|
|
pub staticlib_prefix: StaticCow<str>,
|
|
/// String to append to the name of every static library. Defaults to ".a".
|
|
pub staticlib_suffix: StaticCow<str>,
|
|
/// Values of the `target_family` cfg set for this target.
|
|
///
|
|
/// Common options are: "unix", "windows". Defaults to no families.
|
|
///
|
|
/// See <https://doc.rust-lang.org/reference/conditional-compilation.html#target_family>.
|
|
pub families: StaticCow<[StaticCow<str>]>,
|
|
/// Whether the target toolchain's ABI supports returning small structs as an integer.
|
|
pub abi_return_struct_as_int: bool,
|
|
/// Whether the target toolchain is like macOS's. Only useful for compiling against iOS/macOS,
|
|
/// in particular running dsymutil and some other stuff like `-dead_strip`. Defaults to false.
|
|
/// Also indiates whether to use Apple-specific ABI changes, such as extending function
|
|
/// parameters to 32-bits.
|
|
pub is_like_osx: bool,
|
|
/// Whether the target toolchain is like Solaris's.
|
|
/// Only useful for compiling against Illumos/Solaris,
|
|
/// as they have a different set of linker flags. Defaults to false.
|
|
pub is_like_solaris: bool,
|
|
/// Whether the target is like Windows.
|
|
/// This is a combination of several more specific properties represented as a single flag:
|
|
/// - The target uses a Windows ABI,
|
|
/// - uses PE/COFF as a format for object code,
|
|
/// - uses Windows-style dllexport/dllimport for shared libraries,
|
|
/// - uses import libraries and .def files for symbol exports,
|
|
/// - executables support setting a subsystem.
|
|
pub is_like_windows: bool,
|
|
/// Whether the target is like MSVC.
|
|
/// This is a combination of several more specific properties represented as a single flag:
|
|
/// - The target has all the properties from `is_like_windows`
|
|
/// (for in-tree targets "is_like_msvc ⇒ is_like_windows" is ensured by a unit test),
|
|
/// - has some MSVC-specific Windows ABI properties,
|
|
/// - uses a link.exe-like linker,
|
|
/// - uses CodeView/PDB for debuginfo and natvis for its visualization,
|
|
/// - uses SEH-based unwinding,
|
|
/// - supports control flow guard mechanism.
|
|
pub is_like_msvc: bool,
|
|
/// Whether a target toolchain is like WASM.
|
|
pub is_like_wasm: bool,
|
|
/// Whether a target toolchain is like Android, implying a Linux kernel and a Bionic libc
|
|
pub is_like_android: bool,
|
|
/// Default supported version of DWARF on this platform.
|
|
/// Useful because some platforms (osx, bsd) only want up to DWARF2.
|
|
pub default_dwarf_version: u32,
|
|
/// The MinGW toolchain has a known issue that prevents it from correctly
|
|
/// handling COFF object files with more than 2<sup>15</sup> sections. Since each weak
|
|
/// symbol needs its own COMDAT section, weak linkage implies a large
|
|
/// number sections that easily exceeds the given limit for larger
|
|
/// codebases. Consequently we want a way to disallow weak linkage on some
|
|
/// platforms.
|
|
pub allows_weak_linkage: bool,
|
|
/// Whether the linker support rpaths or not. Defaults to false.
|
|
pub has_rpath: bool,
|
|
/// Whether to disable linking to the default libraries, typically corresponds
|
|
/// to `-nodefaultlibs`. Defaults to true.
|
|
pub no_default_libraries: bool,
|
|
/// Dynamically linked executables can be compiled as position independent
|
|
/// if the default relocation model of position independent code is not
|
|
/// changed. This is a requirement to take advantage of ASLR, as otherwise
|
|
/// the functions in the executable are not randomized and can be used
|
|
/// during an exploit of a vulnerability in any code.
|
|
pub position_independent_executables: bool,
|
|
/// Executables that are both statically linked and position-independent are supported.
|
|
pub static_position_independent_executables: bool,
|
|
/// Determines if the target always requires using the PLT for indirect
|
|
/// library calls or not. This controls the default value of the `-Z plt` flag.
|
|
pub needs_plt: bool,
|
|
/// Either partial, full, or off. Full RELRO makes the dynamic linker
|
|
/// resolve all symbols at startup and marks the GOT read-only before
|
|
/// starting the program, preventing overwriting the GOT.
|
|
pub relro_level: RelroLevel,
|
|
/// Format that archives should be emitted in. This affects whether we use
|
|
/// LLVM to assemble an archive or fall back to the system linker, and
|
|
/// currently only "gnu" is used to fall into LLVM. Unknown strings cause
|
|
/// the system linker to be used.
|
|
pub archive_format: StaticCow<str>,
|
|
/// Is asm!() allowed? Defaults to true.
|
|
pub allow_asm: bool,
|
|
/// Whether the runtime startup code requires the `main` function be passed
|
|
/// `argc` and `argv` values.
|
|
pub main_needs_argc_argv: bool,
|
|
|
|
/// Flag indicating whether #[thread_local] is available for this target.
|
|
pub has_thread_local: bool,
|
|
// This is mainly for easy compatibility with emscripten.
|
|
// If we give emcc .o files that are actually .bc files it
|
|
// will 'just work'.
|
|
pub obj_is_bitcode: bool,
|
|
/// Whether the target requires that emitted object code includes bitcode.
|
|
pub forces_embed_bitcode: bool,
|
|
/// Content of the LLVM cmdline section associated with embedded bitcode.
|
|
pub bitcode_llvm_cmdline: StaticCow<str>,
|
|
|
|
/// Don't use this field; instead use the `.min_atomic_width()` method.
|
|
pub min_atomic_width: Option<u64>,
|
|
|
|
/// Don't use this field; instead use the `.max_atomic_width()` method.
|
|
pub max_atomic_width: Option<u64>,
|
|
|
|
/// Whether the target supports atomic CAS operations natively
|
|
pub atomic_cas: bool,
|
|
|
|
/// Panic strategy: "unwind" or "abort"
|
|
pub panic_strategy: PanicStrategy,
|
|
|
|
/// Whether or not linking dylibs to a static CRT is allowed.
|
|
pub crt_static_allows_dylibs: bool,
|
|
/// Whether or not the CRT is statically linked by default.
|
|
pub crt_static_default: bool,
|
|
/// Whether or not crt-static is respected by the compiler (or is a no-op).
|
|
pub crt_static_respected: bool,
|
|
|
|
/// The implementation of stack probes to use.
|
|
pub stack_probes: StackProbeType,
|
|
|
|
/// The minimum alignment for global symbols.
|
|
pub min_global_align: Option<u64>,
|
|
|
|
/// Default number of codegen units to use in debug mode
|
|
pub default_codegen_units: Option<u64>,
|
|
|
|
/// Whether to generate trap instructions in places where optimization would
|
|
/// otherwise produce control flow that falls through into unrelated memory.
|
|
pub trap_unreachable: bool,
|
|
|
|
/// This target requires everything to be compiled with LTO to emit a final
|
|
/// executable, aka there is no native linker for this target.
|
|
pub requires_lto: bool,
|
|
|
|
/// This target has no support for threads.
|
|
pub singlethread: bool,
|
|
|
|
/// Whether library functions call lowering/optimization is disabled in LLVM
|
|
/// for this target unconditionally.
|
|
pub no_builtins: bool,
|
|
|
|
/// The default visibility for symbols in this target should be "hidden"
|
|
/// rather than "default"
|
|
pub default_hidden_visibility: bool,
|
|
|
|
/// Whether a .debug_gdb_scripts section will be added to the output object file
|
|
pub emit_debug_gdb_scripts: bool,
|
|
|
|
/// Whether or not to unconditionally `uwtable` attributes on functions,
|
|
/// typically because the platform needs to unwind for things like stack
|
|
/// unwinders.
|
|
pub requires_uwtable: bool,
|
|
|
|
/// Whether or not to emit `uwtable` attributes on functions if `-C force-unwind-tables`
|
|
/// is not specified and `uwtable` is not required on this target.
|
|
pub default_uwtable: bool,
|
|
|
|
/// Whether or not SIMD types are passed by reference in the Rust ABI,
|
|
/// typically required if a target can be compiled with a mixed set of
|
|
/// target features. This is `true` by default, and `false` for targets like
|
|
/// wasm32 where the whole program either has simd or not.
|
|
pub simd_types_indirect: bool,
|
|
|
|
/// Pass a list of symbol which should be exported in the dylib to the linker.
|
|
pub limit_rdylib_exports: bool,
|
|
|
|
/// If set, have the linker export exactly these symbols, instead of using
|
|
/// the usual logic to figure this out from the crate itself.
|
|
pub override_export_symbols: Option<StaticCow<[StaticCow<str>]>>,
|
|
|
|
/// Determines how or whether the MergeFunctions LLVM pass should run for
|
|
/// this target. Either "disabled", "trampolines", or "aliases".
|
|
/// The MergeFunctions pass is generally useful, but some targets may need
|
|
/// to opt out. The default is "aliases".
|
|
///
|
|
/// Workaround for: <https://github.com/rust-lang/rust/issues/57356>
|
|
pub merge_functions: MergeFunctions,
|
|
|
|
/// Use platform dependent mcount function
|
|
pub mcount: StaticCow<str>,
|
|
|
|
/// LLVM ABI name, corresponds to the '-mabi' parameter available in multilib C compilers
|
|
pub llvm_abiname: StaticCow<str>,
|
|
|
|
/// Whether or not RelaxElfRelocation flag will be passed to the linker
|
|
pub relax_elf_relocations: bool,
|
|
|
|
/// Additional arguments to pass to LLVM, similar to the `-C llvm-args` codegen option.
|
|
pub llvm_args: StaticCow<[StaticCow<str>]>,
|
|
|
|
/// Whether to use legacy .ctors initialization hooks rather than .init_array. Defaults
|
|
/// to false (uses .init_array).
|
|
pub use_ctors_section: bool,
|
|
|
|
/// Whether the linker is instructed to add a `GNU_EH_FRAME` ELF header
|
|
/// used to locate unwinding information is passed
|
|
/// (only has effect if the linker is `ld`-like).
|
|
pub eh_frame_header: bool,
|
|
|
|
/// Is true if the target is an ARM architecture using thumb v1 which allows for
|
|
/// thumb and arm interworking.
|
|
pub has_thumb_interworking: bool,
|
|
|
|
/// Which kind of debuginfo is used by this target?
|
|
pub debuginfo_kind: DebuginfoKind,
|
|
/// How to handle split debug information, if at all. Specifying `None` has
|
|
/// target-specific meaning.
|
|
pub split_debuginfo: SplitDebuginfo,
|
|
/// Which kinds of split debuginfo are supported by the target?
|
|
pub supported_split_debuginfo: StaticCow<[SplitDebuginfo]>,
|
|
|
|
/// The sanitizers supported by this target
|
|
///
|
|
/// Note that the support here is at a codegen level. If the machine code with sanitizer
|
|
/// enabled can generated on this target, but the necessary supporting libraries are not
|
|
/// distributed with the target, the sanitizer should still appear in this list for the target.
|
|
pub supported_sanitizers: SanitizerSet,
|
|
|
|
/// If present it's a default value to use for adjusting the C ABI.
|
|
pub default_adjusted_cabi: Option<Abi>,
|
|
|
|
/// Minimum number of bits in #[repr(C)] enum. Defaults to 32.
|
|
pub c_enum_min_bits: u64,
|
|
|
|
/// Whether or not the DWARF `.debug_aranges` section should be generated.
|
|
pub generate_arange_section: bool,
|
|
|
|
/// Whether the target supports stack canary checks. `true` by default,
|
|
/// since this is most common among tier 1 and tier 2 targets.
|
|
pub supports_stack_protector: bool,
|
|
}
|
|
|
|
/// Add arguments for the given flavor and also for its "twin" flavors
|
|
/// that have a compatible command line interface.
|
|
fn add_link_args_iter(
|
|
link_args: &mut LinkArgs,
|
|
flavor: LinkerFlavor,
|
|
args: impl Iterator<Item = StaticCow<str>> + Clone,
|
|
) {
|
|
let mut insert = |flavor| link_args.entry(flavor).or_default().extend(args.clone());
|
|
insert(flavor);
|
|
match flavor {
|
|
LinkerFlavor::Gnu(cc, lld) => {
|
|
assert_eq!(lld, Lld::No);
|
|
insert(LinkerFlavor::Gnu(cc, Lld::Yes));
|
|
}
|
|
LinkerFlavor::Darwin(cc, lld) => {
|
|
assert_eq!(lld, Lld::No);
|
|
insert(LinkerFlavor::Darwin(cc, Lld::Yes));
|
|
}
|
|
LinkerFlavor::Msvc(lld) => {
|
|
assert_eq!(lld, Lld::No);
|
|
insert(LinkerFlavor::Msvc(Lld::Yes));
|
|
}
|
|
LinkerFlavor::WasmLld(..)
|
|
| LinkerFlavor::Unix(..)
|
|
| LinkerFlavor::EmCc
|
|
| LinkerFlavor::Bpf
|
|
| LinkerFlavor::Ptx => {}
|
|
}
|
|
}
|
|
|
|
fn add_link_args(link_args: &mut LinkArgs, flavor: LinkerFlavor, args: &[&'static str]) {
|
|
add_link_args_iter(link_args, flavor, args.iter().copied().map(Cow::Borrowed))
|
|
}
|
|
|
|
impl TargetOptions {
|
|
fn link_args(flavor: LinkerFlavor, args: &[&'static str]) -> LinkArgs {
|
|
let mut link_args = LinkArgs::new();
|
|
add_link_args(&mut link_args, flavor, args);
|
|
link_args
|
|
}
|
|
|
|
fn add_pre_link_args(&mut self, flavor: LinkerFlavor, args: &[&'static str]) {
|
|
add_link_args(&mut self.pre_link_args, flavor, args);
|
|
}
|
|
|
|
fn add_post_link_args(&mut self, flavor: LinkerFlavor, args: &[&'static str]) {
|
|
add_link_args(&mut self.post_link_args, flavor, args);
|
|
}
|
|
|
|
fn update_from_cli(&mut self) {
|
|
self.linker_flavor = LinkerFlavor::from_cli_impl(
|
|
self.linker_flavor_json,
|
|
self.lld_flavor_json,
|
|
self.linker_is_gnu_json,
|
|
);
|
|
for (args, args_json) in [
|
|
(&mut self.pre_link_args, &self.pre_link_args_json),
|
|
(&mut self.late_link_args, &self.late_link_args_json),
|
|
(&mut self.late_link_args_dynamic, &self.late_link_args_dynamic_json),
|
|
(&mut self.late_link_args_static, &self.late_link_args_static_json),
|
|
(&mut self.post_link_args, &self.post_link_args_json),
|
|
] {
|
|
args.clear();
|
|
for (flavor, args_json) in args_json {
|
|
// Cannot use `from_cli` due to borrow checker.
|
|
let linker_flavor = LinkerFlavor::from_cli_impl(
|
|
*flavor,
|
|
self.lld_flavor_json,
|
|
self.linker_is_gnu_json,
|
|
);
|
|
// Normalize to no lld to avoid asserts.
|
|
let linker_flavor = match linker_flavor {
|
|
LinkerFlavor::Gnu(cc, _) => LinkerFlavor::Gnu(cc, Lld::No),
|
|
LinkerFlavor::Darwin(cc, _) => LinkerFlavor::Darwin(cc, Lld::No),
|
|
LinkerFlavor::Msvc(_) => LinkerFlavor::Msvc(Lld::No),
|
|
_ => linker_flavor,
|
|
};
|
|
if !args.contains_key(&linker_flavor) {
|
|
add_link_args_iter(args, linker_flavor, args_json.iter().cloned());
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
fn update_to_cli(&mut self) {
|
|
self.linker_flavor_json = self.linker_flavor.to_cli();
|
|
self.lld_flavor_json = self.linker_flavor.lld_flavor();
|
|
self.linker_is_gnu_json = self.linker_flavor.is_gnu();
|
|
for (args, args_json) in [
|
|
(&self.pre_link_args, &mut self.pre_link_args_json),
|
|
(&self.late_link_args, &mut self.late_link_args_json),
|
|
(&self.late_link_args_dynamic, &mut self.late_link_args_dynamic_json),
|
|
(&self.late_link_args_static, &mut self.late_link_args_static_json),
|
|
(&self.post_link_args, &mut self.post_link_args_json),
|
|
] {
|
|
*args_json =
|
|
args.iter().map(|(flavor, args)| (flavor.to_cli(), args.clone())).collect();
|
|
}
|
|
}
|
|
}
|
|
|
|
impl Default for TargetOptions {
|
|
/// Creates a set of "sane defaults" for any target. This is still
|
|
/// incomplete, and if used for compilation, will certainly not work.
|
|
fn default() -> TargetOptions {
|
|
TargetOptions {
|
|
is_builtin: false,
|
|
endian: Endian::Little,
|
|
c_int_width: "32".into(),
|
|
os: "none".into(),
|
|
env: "".into(),
|
|
abi: "".into(),
|
|
vendor: "unknown".into(),
|
|
linker: option_env!("CFG_DEFAULT_LINKER").map(|s| s.into()),
|
|
linker_flavor: LinkerFlavor::Gnu(Cc::Yes, Lld::No),
|
|
linker_flavor_json: LinkerFlavorCli::Gcc,
|
|
lld_flavor_json: LldFlavor::Ld,
|
|
linker_is_gnu_json: true,
|
|
link_script: None,
|
|
asm_args: cvs![],
|
|
cpu: "generic".into(),
|
|
features: "".into(),
|
|
dynamic_linking: false,
|
|
only_cdylib: false,
|
|
executables: true,
|
|
relocation_model: RelocModel::Pic,
|
|
code_model: None,
|
|
tls_model: TlsModel::GeneralDynamic,
|
|
disable_redzone: false,
|
|
frame_pointer: FramePointer::MayOmit,
|
|
function_sections: true,
|
|
dll_prefix: "lib".into(),
|
|
dll_suffix: ".so".into(),
|
|
exe_suffix: "".into(),
|
|
staticlib_prefix: "lib".into(),
|
|
staticlib_suffix: ".a".into(),
|
|
families: cvs![],
|
|
abi_return_struct_as_int: false,
|
|
is_like_osx: false,
|
|
is_like_solaris: false,
|
|
is_like_windows: false,
|
|
is_like_msvc: false,
|
|
is_like_wasm: false,
|
|
is_like_android: false,
|
|
default_dwarf_version: 4,
|
|
allows_weak_linkage: true,
|
|
has_rpath: false,
|
|
no_default_libraries: true,
|
|
position_independent_executables: false,
|
|
static_position_independent_executables: false,
|
|
needs_plt: false,
|
|
relro_level: RelroLevel::None,
|
|
pre_link_objects: Default::default(),
|
|
post_link_objects: Default::default(),
|
|
pre_link_objects_self_contained: Default::default(),
|
|
post_link_objects_self_contained: Default::default(),
|
|
link_self_contained: LinkSelfContainedDefault::False,
|
|
pre_link_args: LinkArgs::new(),
|
|
pre_link_args_json: LinkArgsCli::new(),
|
|
late_link_args: LinkArgs::new(),
|
|
late_link_args_json: LinkArgsCli::new(),
|
|
late_link_args_dynamic: LinkArgs::new(),
|
|
late_link_args_dynamic_json: LinkArgsCli::new(),
|
|
late_link_args_static: LinkArgs::new(),
|
|
late_link_args_static_json: LinkArgsCli::new(),
|
|
post_link_args: LinkArgs::new(),
|
|
post_link_args_json: LinkArgsCli::new(),
|
|
link_env: cvs![],
|
|
link_env_remove: cvs![],
|
|
archive_format: "gnu".into(),
|
|
main_needs_argc_argv: true,
|
|
allow_asm: true,
|
|
has_thread_local: false,
|
|
obj_is_bitcode: false,
|
|
forces_embed_bitcode: false,
|
|
bitcode_llvm_cmdline: "".into(),
|
|
min_atomic_width: None,
|
|
max_atomic_width: None,
|
|
atomic_cas: true,
|
|
panic_strategy: PanicStrategy::Unwind,
|
|
crt_static_allows_dylibs: false,
|
|
crt_static_default: false,
|
|
crt_static_respected: false,
|
|
stack_probes: StackProbeType::None,
|
|
min_global_align: None,
|
|
default_codegen_units: None,
|
|
trap_unreachable: true,
|
|
requires_lto: false,
|
|
singlethread: false,
|
|
no_builtins: false,
|
|
default_hidden_visibility: false,
|
|
emit_debug_gdb_scripts: true,
|
|
requires_uwtable: false,
|
|
default_uwtable: false,
|
|
simd_types_indirect: true,
|
|
limit_rdylib_exports: true,
|
|
override_export_symbols: None,
|
|
merge_functions: MergeFunctions::Aliases,
|
|
mcount: "mcount".into(),
|
|
llvm_abiname: "".into(),
|
|
relax_elf_relocations: false,
|
|
llvm_args: cvs![],
|
|
use_ctors_section: false,
|
|
eh_frame_header: true,
|
|
has_thumb_interworking: false,
|
|
debuginfo_kind: Default::default(),
|
|
split_debuginfo: Default::default(),
|
|
// `Off` is supported by default, but targets can remove this manually, e.g. Windows.
|
|
supported_split_debuginfo: Cow::Borrowed(&[SplitDebuginfo::Off]),
|
|
supported_sanitizers: SanitizerSet::empty(),
|
|
default_adjusted_cabi: None,
|
|
c_enum_min_bits: 32,
|
|
generate_arange_section: true,
|
|
supports_stack_protector: true,
|
|
}
|
|
}
|
|
}
|
|
|
|
/// `TargetOptions` being a separate type is basically an implementation detail of `Target` that is
|
|
/// used for providing defaults. Perhaps there's a way to merge `TargetOptions` into `Target` so
|
|
/// this `Deref` implementation is no longer necessary.
|
|
impl Deref for Target {
|
|
type Target = TargetOptions;
|
|
|
|
#[inline]
|
|
fn deref(&self) -> &Self::Target {
|
|
&self.options
|
|
}
|
|
}
|
|
impl DerefMut for Target {
|
|
#[inline]
|
|
fn deref_mut(&mut self) -> &mut Self::Target {
|
|
&mut self.options
|
|
}
|
|
}
|
|
|
|
impl Target {
|
|
/// Given a function ABI, turn it into the correct ABI for this target.
|
|
pub fn adjust_abi(&self, abi: Abi) -> Abi {
|
|
match abi {
|
|
Abi::C { .. } => self.default_adjusted_cabi.unwrap_or(abi),
|
|
Abi::System { unwind } if self.is_like_windows && self.arch == "x86" => {
|
|
Abi::Stdcall { unwind }
|
|
}
|
|
Abi::System { unwind } => Abi::C { unwind },
|
|
Abi::EfiApi if self.arch == "x86_64" => Abi::Win64 { unwind: false },
|
|
Abi::EfiApi => Abi::C { unwind: false },
|
|
|
|
// See commentary in `is_abi_supported`.
|
|
Abi::Stdcall { .. } | Abi::Thiscall { .. } if self.arch == "x86" => abi,
|
|
Abi::Stdcall { unwind } | Abi::Thiscall { unwind } => Abi::C { unwind },
|
|
Abi::Fastcall { .. } if self.arch == "x86" => abi,
|
|
Abi::Vectorcall { .. } if ["x86", "x86_64"].contains(&&self.arch[..]) => abi,
|
|
Abi::Fastcall { unwind } | Abi::Vectorcall { unwind } => Abi::C { unwind },
|
|
|
|
abi => abi,
|
|
}
|
|
}
|
|
|
|
/// Returns a None if the UNSUPPORTED_CALLING_CONVENTIONS lint should be emitted
|
|
pub fn is_abi_supported(&self, abi: Abi) -> Option<bool> {
|
|
use Abi::*;
|
|
Some(match abi {
|
|
Rust
|
|
| C { .. }
|
|
| System { .. }
|
|
| RustIntrinsic
|
|
| RustCall
|
|
| PlatformIntrinsic
|
|
| Unadjusted
|
|
| Cdecl { .. }
|
|
| EfiApi
|
|
| RustCold => true,
|
|
X86Interrupt => ["x86", "x86_64"].contains(&&self.arch[..]),
|
|
Aapcs { .. } => "arm" == self.arch,
|
|
CCmseNonSecureCall => ["arm", "aarch64"].contains(&&self.arch[..]),
|
|
Win64 { .. } | SysV64 { .. } => self.arch == "x86_64",
|
|
PtxKernel => self.arch == "nvptx64",
|
|
Msp430Interrupt => self.arch == "msp430",
|
|
AmdGpuKernel => self.arch == "amdgcn",
|
|
AvrInterrupt | AvrNonBlockingInterrupt => self.arch == "avr",
|
|
Wasm => ["wasm32", "wasm64"].contains(&&self.arch[..]),
|
|
Thiscall { .. } => self.arch == "x86",
|
|
// On windows these fall-back to platform native calling convention (C) when the
|
|
// architecture is not supported.
|
|
//
|
|
// This is I believe a historical accident that has occurred as part of Microsoft
|
|
// striving to allow most of the code to "just" compile when support for 64-bit x86
|
|
// was added and then later again, when support for ARM architectures was added.
|
|
//
|
|
// This is well documented across MSDN. Support for this in Rust has been added in
|
|
// #54576. This makes much more sense in context of Microsoft's C++ than it does in
|
|
// Rust, but there isn't much leeway remaining here to change it back at the time this
|
|
// comment has been written.
|
|
//
|
|
// Following are the relevant excerpts from the MSDN documentation.
|
|
//
|
|
// > The __vectorcall calling convention is only supported in native code on x86 and
|
|
// x64 processors that include Streaming SIMD Extensions 2 (SSE2) and above.
|
|
// > ...
|
|
// > On ARM machines, __vectorcall is accepted and ignored by the compiler.
|
|
//
|
|
// -- https://docs.microsoft.com/en-us/cpp/cpp/vectorcall?view=msvc-160
|
|
//
|
|
// > On ARM and x64 processors, __stdcall is accepted and ignored by the compiler;
|
|
//
|
|
// -- https://docs.microsoft.com/en-us/cpp/cpp/stdcall?view=msvc-160
|
|
//
|
|
// > In most cases, keywords or compiler switches that specify an unsupported
|
|
// > convention on a particular platform are ignored, and the platform default
|
|
// > convention is used.
|
|
//
|
|
// -- https://docs.microsoft.com/en-us/cpp/cpp/argument-passing-and-naming-conventions
|
|
Stdcall { .. } | Fastcall { .. } | Vectorcall { .. } if self.is_like_windows => true,
|
|
// Outside of Windows we want to only support these calling conventions for the
|
|
// architectures for which these calling conventions are actually well defined.
|
|
Stdcall { .. } | Fastcall { .. } if self.arch == "x86" => true,
|
|
Vectorcall { .. } if ["x86", "x86_64"].contains(&&self.arch[..]) => true,
|
|
// Return a `None` for other cases so that we know to emit a future compat lint.
|
|
Stdcall { .. } | Fastcall { .. } | Vectorcall { .. } => return None,
|
|
})
|
|
}
|
|
|
|
/// Minimum integer size in bits that this target can perform atomic
|
|
/// operations on.
|
|
pub fn min_atomic_width(&self) -> u64 {
|
|
self.min_atomic_width.unwrap_or(8)
|
|
}
|
|
|
|
/// Maximum integer size in bits that this target can perform atomic
|
|
/// operations on.
|
|
pub fn max_atomic_width(&self) -> u64 {
|
|
self.max_atomic_width.unwrap_or_else(|| self.pointer_width.into())
|
|
}
|
|
|
|
/// Loads a target descriptor from a JSON object.
|
|
pub fn from_json(obj: Json) -> Result<(Target, TargetWarnings), String> {
|
|
// While ugly, this code must remain this way to retain
|
|
// compatibility with existing JSON fields and the internal
|
|
// expected naming of the Target and TargetOptions structs.
|
|
// To ensure compatibility is retained, the built-in targets
|
|
// are round-tripped through this code to catch cases where
|
|
// the JSON parser is not updated to match the structs.
|
|
|
|
let mut obj = match obj {
|
|
Value::Object(obj) => obj,
|
|
_ => return Err("Expected JSON object for target")?,
|
|
};
|
|
|
|
let mut get_req_field = |name: &str| {
|
|
obj.remove(name)
|
|
.and_then(|j| j.as_str().map(str::to_string))
|
|
.ok_or_else(|| format!("Field {} in target specification is required", name))
|
|
};
|
|
|
|
let mut base = Target {
|
|
llvm_target: get_req_field("llvm-target")?.into(),
|
|
pointer_width: get_req_field("target-pointer-width")?
|
|
.parse::<u32>()
|
|
.map_err(|_| "target-pointer-width must be an integer".to_string())?,
|
|
data_layout: get_req_field("data-layout")?.into(),
|
|
arch: get_req_field("arch")?.into(),
|
|
options: Default::default(),
|
|
};
|
|
|
|
let mut incorrect_type = vec![];
|
|
|
|
macro_rules! key {
|
|
($key_name:ident) => ( {
|
|
let name = (stringify!($key_name)).replace("_", "-");
|
|
if let Some(s) = obj.remove(&name).and_then(|s| s.as_str().map(str::to_string).map(Cow::from)) {
|
|
base.$key_name = s;
|
|
}
|
|
} );
|
|
($key_name:ident = $json_name:expr) => ( {
|
|
let name = $json_name;
|
|
if let Some(s) = obj.remove(name).and_then(|s| s.as_str().map(str::to_string).map(Cow::from)) {
|
|
base.$key_name = s;
|
|
}
|
|
} );
|
|
($key_name:ident, bool) => ( {
|
|
let name = (stringify!($key_name)).replace("_", "-");
|
|
if let Some(s) = obj.remove(&name).and_then(|b| b.as_bool()) {
|
|
base.$key_name = s;
|
|
}
|
|
} );
|
|
($key_name:ident = $json_name:expr, bool) => ( {
|
|
let name = $json_name;
|
|
if let Some(s) = obj.remove(name).and_then(|b| b.as_bool()) {
|
|
base.$key_name = s;
|
|
}
|
|
} );
|
|
($key_name:ident, u64) => ( {
|
|
let name = (stringify!($key_name)).replace("_", "-");
|
|
if let Some(s) = obj.remove(&name).and_then(|j| Json::as_u64(&j)) {
|
|
base.$key_name = s;
|
|
}
|
|
} );
|
|
($key_name:ident, u32) => ( {
|
|
let name = (stringify!($key_name)).replace("_", "-");
|
|
if let Some(s) = obj.remove(&name).and_then(|b| b.as_u64()) {
|
|
if s < 1 || s > 5 {
|
|
return Err("Not a valid DWARF version number".into());
|
|
}
|
|
base.$key_name = s as u32;
|
|
}
|
|
} );
|
|
($key_name:ident, Option<u64>) => ( {
|
|
let name = (stringify!($key_name)).replace("_", "-");
|
|
if let Some(s) = obj.remove(&name).and_then(|b| b.as_u64()) {
|
|
base.$key_name = Some(s);
|
|
}
|
|
} );
|
|
($key_name:ident, MergeFunctions) => ( {
|
|
let name = (stringify!($key_name)).replace("_", "-");
|
|
obj.remove(&name).and_then(|o| o.as_str().and_then(|s| {
|
|
match s.parse::<MergeFunctions>() {
|
|
Ok(mergefunc) => base.$key_name = mergefunc,
|
|
_ => return Some(Err(format!("'{}' is not a valid value for \
|
|
merge-functions. Use 'disabled', \
|
|
'trampolines', or 'aliases'.",
|
|
s))),
|
|
}
|
|
Some(Ok(()))
|
|
})).unwrap_or(Ok(()))
|
|
} );
|
|
($key_name:ident, RelocModel) => ( {
|
|
let name = (stringify!($key_name)).replace("_", "-");
|
|
obj.remove(&name).and_then(|o| o.as_str().and_then(|s| {
|
|
match s.parse::<RelocModel>() {
|
|
Ok(relocation_model) => base.$key_name = relocation_model,
|
|
_ => return Some(Err(format!("'{}' is not a valid relocation model. \
|
|
Run `rustc --print relocation-models` to \
|
|
see the list of supported values.", s))),
|
|
}
|
|
Some(Ok(()))
|
|
})).unwrap_or(Ok(()))
|
|
} );
|
|
($key_name:ident, CodeModel) => ( {
|
|
let name = (stringify!($key_name)).replace("_", "-");
|
|
obj.remove(&name).and_then(|o| o.as_str().and_then(|s| {
|
|
match s.parse::<CodeModel>() {
|
|
Ok(code_model) => base.$key_name = Some(code_model),
|
|
_ => return Some(Err(format!("'{}' is not a valid code model. \
|
|
Run `rustc --print code-models` to \
|
|
see the list of supported values.", s))),
|
|
}
|
|
Some(Ok(()))
|
|
})).unwrap_or(Ok(()))
|
|
} );
|
|
($key_name:ident, TlsModel) => ( {
|
|
let name = (stringify!($key_name)).replace("_", "-");
|
|
obj.remove(&name).and_then(|o| o.as_str().and_then(|s| {
|
|
match s.parse::<TlsModel>() {
|
|
Ok(tls_model) => base.$key_name = tls_model,
|
|
_ => return Some(Err(format!("'{}' is not a valid TLS model. \
|
|
Run `rustc --print tls-models` to \
|
|
see the list of supported values.", s))),
|
|
}
|
|
Some(Ok(()))
|
|
})).unwrap_or(Ok(()))
|
|
} );
|
|
($key_name:ident, PanicStrategy) => ( {
|
|
let name = (stringify!($key_name)).replace("_", "-");
|
|
obj.remove(&name).and_then(|o| o.as_str().and_then(|s| {
|
|
match s {
|
|
"unwind" => base.$key_name = PanicStrategy::Unwind,
|
|
"abort" => base.$key_name = PanicStrategy::Abort,
|
|
_ => return Some(Err(format!("'{}' is not a valid value for \
|
|
panic-strategy. Use 'unwind' or 'abort'.",
|
|
s))),
|
|
}
|
|
Some(Ok(()))
|
|
})).unwrap_or(Ok(()))
|
|
} );
|
|
($key_name:ident, RelroLevel) => ( {
|
|
let name = (stringify!($key_name)).replace("_", "-");
|
|
obj.remove(&name).and_then(|o| o.as_str().and_then(|s| {
|
|
match s.parse::<RelroLevel>() {
|
|
Ok(level) => base.$key_name = level,
|
|
_ => return Some(Err(format!("'{}' is not a valid value for \
|
|
relro-level. Use 'full', 'partial, or 'off'.",
|
|
s))),
|
|
}
|
|
Some(Ok(()))
|
|
})).unwrap_or(Ok(()))
|
|
} );
|
|
($key_name:ident, DebuginfoKind) => ( {
|
|
let name = (stringify!($key_name)).replace("_", "-");
|
|
obj.remove(&name).and_then(|o| o.as_str().and_then(|s| {
|
|
match s.parse::<DebuginfoKind>() {
|
|
Ok(level) => base.$key_name = level,
|
|
_ => return Some(Err(
|
|
format!("'{s}' is not a valid value for debuginfo-kind. Use 'dwarf', \
|
|
'dwarf-dsym' or 'pdb'.")
|
|
)),
|
|
}
|
|
Some(Ok(()))
|
|
})).unwrap_or(Ok(()))
|
|
} );
|
|
($key_name:ident, SplitDebuginfo) => ( {
|
|
let name = (stringify!($key_name)).replace("_", "-");
|
|
obj.remove(&name).and_then(|o| o.as_str().and_then(|s| {
|
|
match s.parse::<SplitDebuginfo>() {
|
|
Ok(level) => base.$key_name = level,
|
|
_ => return Some(Err(format!("'{}' is not a valid value for \
|
|
split-debuginfo. Use 'off' or 'dsymutil'.",
|
|
s))),
|
|
}
|
|
Some(Ok(()))
|
|
})).unwrap_or(Ok(()))
|
|
} );
|
|
($key_name:ident, list) => ( {
|
|
let name = (stringify!($key_name)).replace("_", "-");
|
|
if let Some(j) = obj.remove(&name) {
|
|
if let Some(v) = j.as_array() {
|
|
base.$key_name = v.iter()
|
|
.map(|a| a.as_str().unwrap().to_string().into())
|
|
.collect();
|
|
} else {
|
|
incorrect_type.push(name)
|
|
}
|
|
}
|
|
} );
|
|
($key_name:ident, opt_list) => ( {
|
|
let name = (stringify!($key_name)).replace("_", "-");
|
|
if let Some(j) = obj.remove(&name) {
|
|
if let Some(v) = j.as_array() {
|
|
base.$key_name = Some(v.iter()
|
|
.map(|a| a.as_str().unwrap().to_string().into())
|
|
.collect());
|
|
} else {
|
|
incorrect_type.push(name)
|
|
}
|
|
}
|
|
} );
|
|
($key_name:ident, falliable_list) => ( {
|
|
let name = (stringify!($key_name)).replace("_", "-");
|
|
obj.remove(&name).and_then(|j| {
|
|
if let Some(v) = j.as_array() {
|
|
match v.iter().map(|a| FromStr::from_str(a.as_str().unwrap())).collect() {
|
|
Ok(l) => { base.$key_name = l },
|
|
// FIXME: `falliable_list` can't re-use the `key!` macro for list
|
|
// elements and the error messages from that macro, so it has a bad
|
|
// generic message instead
|
|
Err(_) => return Some(Err(
|
|
format!("`{:?}` is not a valid value for `{}`", j, name)
|
|
)),
|
|
}
|
|
} else {
|
|
incorrect_type.push(name)
|
|
}
|
|
Some(Ok(()))
|
|
}).unwrap_or(Ok(()))
|
|
} );
|
|
($key_name:ident, optional) => ( {
|
|
let name = (stringify!($key_name)).replace("_", "-");
|
|
if let Some(o) = obj.remove(&name) {
|
|
base.$key_name = o
|
|
.as_str()
|
|
.map(|s| s.to_string().into());
|
|
}
|
|
} );
|
|
($key_name:ident = $json_name:expr, LldFlavor) => ( {
|
|
let name = $json_name;
|
|
obj.remove(name).and_then(|o| o.as_str().and_then(|s| {
|
|
if let Some(flavor) = LldFlavor::from_str(&s) {
|
|
base.$key_name = flavor;
|
|
} else {
|
|
return Some(Err(format!(
|
|
"'{}' is not a valid value for lld-flavor. \
|
|
Use 'darwin', 'gnu', 'link' or 'wasm.",
|
|
s)))
|
|
}
|
|
Some(Ok(()))
|
|
})).unwrap_or(Ok(()))
|
|
} );
|
|
($key_name:ident = $json_name:expr, LinkerFlavor) => ( {
|
|
let name = $json_name;
|
|
obj.remove(name).and_then(|o| o.as_str().and_then(|s| {
|
|
match LinkerFlavorCli::from_str(s) {
|
|
Some(linker_flavor) => base.$key_name = linker_flavor,
|
|
_ => return Some(Err(format!("'{}' is not a valid value for linker-flavor. \
|
|
Use {}", s, LinkerFlavorCli::one_of()))),
|
|
}
|
|
Some(Ok(()))
|
|
})).unwrap_or(Ok(()))
|
|
} );
|
|
($key_name:ident, StackProbeType) => ( {
|
|
let name = (stringify!($key_name)).replace("_", "-");
|
|
obj.remove(&name).and_then(|o| match StackProbeType::from_json(&o) {
|
|
Ok(v) => {
|
|
base.$key_name = v;
|
|
Some(Ok(()))
|
|
},
|
|
Err(s) => Some(Err(
|
|
format!("`{:?}` is not a valid value for `{}`: {}", o, name, s)
|
|
)),
|
|
}).unwrap_or(Ok(()))
|
|
} );
|
|
($key_name:ident, SanitizerSet) => ( {
|
|
let name = (stringify!($key_name)).replace("_", "-");
|
|
if let Some(o) = obj.remove(&name) {
|
|
if let Some(a) = o.as_array() {
|
|
for s in a {
|
|
base.$key_name |= match s.as_str() {
|
|
Some("address") => SanitizerSet::ADDRESS,
|
|
Some("cfi") => SanitizerSet::CFI,
|
|
Some("leak") => SanitizerSet::LEAK,
|
|
Some("memory") => SanitizerSet::MEMORY,
|
|
Some("memtag") => SanitizerSet::MEMTAG,
|
|
Some("shadow-call-stack") => SanitizerSet::SHADOWCALLSTACK,
|
|
Some("thread") => SanitizerSet::THREAD,
|
|
Some("hwaddress") => SanitizerSet::HWADDRESS,
|
|
Some(s) => return Err(format!("unknown sanitizer {}", s)),
|
|
_ => return Err(format!("not a string: {:?}", s)),
|
|
};
|
|
}
|
|
} else {
|
|
incorrect_type.push(name)
|
|
}
|
|
}
|
|
Ok::<(), String>(())
|
|
} );
|
|
|
|
($key_name:ident = $json_name:expr, link_self_contained) => ( {
|
|
let name = $json_name;
|
|
obj.remove(name).and_then(|o| o.as_str().and_then(|s| {
|
|
match s.parse::<LinkSelfContainedDefault>() {
|
|
Ok(lsc_default) => base.$key_name = lsc_default,
|
|
_ => return Some(Err(format!("'{}' is not a valid `-Clink-self-contained` default. \
|
|
Use 'false', 'true', 'musl' or 'mingw'", s))),
|
|
}
|
|
Some(Ok(()))
|
|
})).unwrap_or(Ok(()))
|
|
} );
|
|
($key_name:ident = $json_name:expr, link_objects) => ( {
|
|
let name = $json_name;
|
|
if let Some(val) = obj.remove(name) {
|
|
let obj = val.as_object().ok_or_else(|| format!("{}: expected a \
|
|
JSON object with fields per CRT object kind.", name))?;
|
|
let mut args = CrtObjects::new();
|
|
for (k, v) in obj {
|
|
let kind = LinkOutputKind::from_str(&k).ok_or_else(|| {
|
|
format!("{}: '{}' is not a valid value for CRT object kind. \
|
|
Use '(dynamic,static)-(nopic,pic)-exe' or \
|
|
'(dynamic,static)-dylib' or 'wasi-reactor-exe'", name, k)
|
|
})?;
|
|
|
|
let v = v.as_array().ok_or_else(||
|
|
format!("{}.{}: expected a JSON array", name, k)
|
|
)?.iter().enumerate()
|
|
.map(|(i,s)| {
|
|
let s = s.as_str().ok_or_else(||
|
|
format!("{}.{}[{}]: expected a JSON string", name, k, i))?;
|
|
Ok(s.to_string().into())
|
|
})
|
|
.collect::<Result<Vec<_>, String>>()?;
|
|
|
|
args.insert(kind, v);
|
|
}
|
|
base.$key_name = args;
|
|
}
|
|
} );
|
|
($key_name:ident = $json_name:expr, link_args) => ( {
|
|
let name = $json_name;
|
|
if let Some(val) = obj.remove(name) {
|
|
let obj = val.as_object().ok_or_else(|| format!("{}: expected a \
|
|
JSON object with fields per linker-flavor.", name))?;
|
|
let mut args = LinkArgsCli::new();
|
|
for (k, v) in obj {
|
|
let flavor = LinkerFlavorCli::from_str(&k).ok_or_else(|| {
|
|
format!("{}: '{}' is not a valid value for linker-flavor. \
|
|
Use 'em', 'gcc', 'ld' or 'msvc'", name, k)
|
|
})?;
|
|
|
|
let v = v.as_array().ok_or_else(||
|
|
format!("{}.{}: expected a JSON array", name, k)
|
|
)?.iter().enumerate()
|
|
.map(|(i,s)| {
|
|
let s = s.as_str().ok_or_else(||
|
|
format!("{}.{}[{}]: expected a JSON string", name, k, i))?;
|
|
Ok(s.to_string().into())
|
|
})
|
|
.collect::<Result<Vec<_>, String>>()?;
|
|
|
|
args.insert(flavor, v);
|
|
}
|
|
base.$key_name = args;
|
|
}
|
|
} );
|
|
($key_name:ident, env) => ( {
|
|
let name = (stringify!($key_name)).replace("_", "-");
|
|
if let Some(o) = obj.remove(&name) {
|
|
if let Some(a) = o.as_array() {
|
|
for o in a {
|
|
if let Some(s) = o.as_str() {
|
|
let p = s.split('=').collect::<Vec<_>>();
|
|
if p.len() == 2 {
|
|
let k = p[0].to_string();
|
|
let v = p[1].to_string();
|
|
base.$key_name.to_mut().push((k.into(), v.into()));
|
|
}
|
|
}
|
|
}
|
|
} else {
|
|
incorrect_type.push(name)
|
|
}
|
|
}
|
|
} );
|
|
($key_name:ident, Option<Abi>) => ( {
|
|
let name = (stringify!($key_name)).replace("_", "-");
|
|
obj.remove(&name).and_then(|o| o.as_str().and_then(|s| {
|
|
match lookup_abi(s) {
|
|
Some(abi) => base.$key_name = Some(abi),
|
|
_ => return Some(Err(format!("'{}' is not a valid value for abi", s))),
|
|
}
|
|
Some(Ok(()))
|
|
})).unwrap_or(Ok(()))
|
|
} );
|
|
($key_name:ident, TargetFamilies) => ( {
|
|
if let Some(value) = obj.remove("target-family") {
|
|
if let Some(v) = value.as_array() {
|
|
base.$key_name = v.iter()
|
|
.map(|a| a.as_str().unwrap().to_string().into())
|
|
.collect();
|
|
} else if let Some(v) = value.as_str() {
|
|
base.$key_name = vec![v.to_string().into()].into();
|
|
}
|
|
}
|
|
} );
|
|
}
|
|
|
|
if let Some(j) = obj.remove("target-endian") {
|
|
if let Some(s) = j.as_str() {
|
|
base.endian = s.parse()?;
|
|
} else {
|
|
incorrect_type.push("target-endian".into())
|
|
}
|
|
}
|
|
|
|
if let Some(fp) = obj.remove("frame-pointer") {
|
|
if let Some(s) = fp.as_str() {
|
|
base.frame_pointer = s
|
|
.parse()
|
|
.map_err(|()| format!("'{}' is not a valid value for frame-pointer", s))?;
|
|
} else {
|
|
incorrect_type.push("frame-pointer".into())
|
|
}
|
|
}
|
|
|
|
key!(is_builtin, bool);
|
|
key!(c_int_width = "target-c-int-width");
|
|
key!(os);
|
|
key!(env);
|
|
key!(abi);
|
|
key!(vendor);
|
|
key!(linker, optional);
|
|
key!(linker_flavor_json = "linker-flavor", LinkerFlavor)?;
|
|
key!(lld_flavor_json = "lld-flavor", LldFlavor)?;
|
|
key!(linker_is_gnu_json = "linker-is-gnu", bool);
|
|
key!(pre_link_objects = "pre-link-objects", link_objects);
|
|
key!(post_link_objects = "post-link-objects", link_objects);
|
|
key!(pre_link_objects_self_contained = "pre-link-objects-fallback", link_objects);
|
|
key!(post_link_objects_self_contained = "post-link-objects-fallback", link_objects);
|
|
key!(link_self_contained = "crt-objects-fallback", link_self_contained)?;
|
|
key!(pre_link_args_json = "pre-link-args", link_args);
|
|
key!(late_link_args_json = "late-link-args", link_args);
|
|
key!(late_link_args_dynamic_json = "late-link-args-dynamic", link_args);
|
|
key!(late_link_args_static_json = "late-link-args-static", link_args);
|
|
key!(post_link_args_json = "post-link-args", link_args);
|
|
key!(link_script, optional);
|
|
key!(link_env, env);
|
|
key!(link_env_remove, list);
|
|
key!(asm_args, list);
|
|
key!(cpu);
|
|
key!(features);
|
|
key!(dynamic_linking, bool);
|
|
key!(only_cdylib, bool);
|
|
key!(executables, bool);
|
|
key!(relocation_model, RelocModel)?;
|
|
key!(code_model, CodeModel)?;
|
|
key!(tls_model, TlsModel)?;
|
|
key!(disable_redzone, bool);
|
|
key!(function_sections, bool);
|
|
key!(dll_prefix);
|
|
key!(dll_suffix);
|
|
key!(exe_suffix);
|
|
key!(staticlib_prefix);
|
|
key!(staticlib_suffix);
|
|
key!(families, TargetFamilies);
|
|
key!(abi_return_struct_as_int, bool);
|
|
key!(is_like_osx, bool);
|
|
key!(is_like_solaris, bool);
|
|
key!(is_like_windows, bool);
|
|
key!(is_like_msvc, bool);
|
|
key!(is_like_wasm, bool);
|
|
key!(is_like_android, bool);
|
|
key!(default_dwarf_version, u32);
|
|
key!(allows_weak_linkage, bool);
|
|
key!(has_rpath, bool);
|
|
key!(no_default_libraries, bool);
|
|
key!(position_independent_executables, bool);
|
|
key!(static_position_independent_executables, bool);
|
|
key!(needs_plt, bool);
|
|
key!(relro_level, RelroLevel)?;
|
|
key!(archive_format);
|
|
key!(allow_asm, bool);
|
|
key!(main_needs_argc_argv, bool);
|
|
key!(has_thread_local, bool);
|
|
key!(obj_is_bitcode, bool);
|
|
key!(forces_embed_bitcode, bool);
|
|
key!(bitcode_llvm_cmdline);
|
|
key!(max_atomic_width, Option<u64>);
|
|
key!(min_atomic_width, Option<u64>);
|
|
key!(atomic_cas, bool);
|
|
key!(panic_strategy, PanicStrategy)?;
|
|
key!(crt_static_allows_dylibs, bool);
|
|
key!(crt_static_default, bool);
|
|
key!(crt_static_respected, bool);
|
|
key!(stack_probes, StackProbeType)?;
|
|
key!(min_global_align, Option<u64>);
|
|
key!(default_codegen_units, Option<u64>);
|
|
key!(trap_unreachable, bool);
|
|
key!(requires_lto, bool);
|
|
key!(singlethread, bool);
|
|
key!(no_builtins, bool);
|
|
key!(default_hidden_visibility, bool);
|
|
key!(emit_debug_gdb_scripts, bool);
|
|
key!(requires_uwtable, bool);
|
|
key!(default_uwtable, bool);
|
|
key!(simd_types_indirect, bool);
|
|
key!(limit_rdylib_exports, bool);
|
|
key!(override_export_symbols, opt_list);
|
|
key!(merge_functions, MergeFunctions)?;
|
|
key!(mcount = "target-mcount");
|
|
key!(llvm_abiname);
|
|
key!(relax_elf_relocations, bool);
|
|
key!(llvm_args, list);
|
|
key!(use_ctors_section, bool);
|
|
key!(eh_frame_header, bool);
|
|
key!(has_thumb_interworking, bool);
|
|
key!(debuginfo_kind, DebuginfoKind)?;
|
|
key!(split_debuginfo, SplitDebuginfo)?;
|
|
key!(supported_split_debuginfo, falliable_list)?;
|
|
key!(supported_sanitizers, SanitizerSet)?;
|
|
key!(default_adjusted_cabi, Option<Abi>)?;
|
|
key!(c_enum_min_bits, u64);
|
|
key!(generate_arange_section, bool);
|
|
key!(supports_stack_protector, bool);
|
|
|
|
if base.is_builtin {
|
|
// This can cause unfortunate ICEs later down the line.
|
|
return Err("may not set is_builtin for targets not built-in".into());
|
|
}
|
|
base.update_from_cli();
|
|
|
|
// Each field should have been read using `Json::remove` so any keys remaining are unused.
|
|
let remaining_keys = obj.keys();
|
|
Ok((
|
|
base,
|
|
TargetWarnings { unused_fields: remaining_keys.cloned().collect(), incorrect_type },
|
|
))
|
|
}
|
|
|
|
/// Load a built-in target
|
|
pub fn expect_builtin(target_triple: &TargetTriple) -> Target {
|
|
match *target_triple {
|
|
TargetTriple::TargetTriple(ref target_triple) => {
|
|
load_builtin(target_triple).expect("built-in target")
|
|
}
|
|
TargetTriple::TargetJson { .. } => {
|
|
panic!("built-in targets doesn't support target-paths")
|
|
}
|
|
}
|
|
}
|
|
|
|
/// Search for a JSON file specifying the given target triple.
|
|
///
|
|
/// If none is found in `$RUST_TARGET_PATH`, look for a file called `target.json` inside the
|
|
/// sysroot under the target-triple's `rustlib` directory. Note that it could also just be a
|
|
/// bare filename already, so also check for that. If one of the hardcoded targets we know
|
|
/// about, just return it directly.
|
|
///
|
|
/// The error string could come from any of the APIs called, including filesystem access and
|
|
/// JSON decoding.
|
|
pub fn search(
|
|
target_triple: &TargetTriple,
|
|
sysroot: &Path,
|
|
) -> Result<(Target, TargetWarnings), String> {
|
|
use std::env;
|
|
use std::fs;
|
|
|
|
fn load_file(path: &Path) -> Result<(Target, TargetWarnings), String> {
|
|
let contents = fs::read_to_string(path).map_err(|e| e.to_string())?;
|
|
let obj = serde_json::from_str(&contents).map_err(|e| e.to_string())?;
|
|
Target::from_json(obj)
|
|
}
|
|
|
|
match *target_triple {
|
|
TargetTriple::TargetTriple(ref target_triple) => {
|
|
// check if triple is in list of built-in targets
|
|
if let Some(t) = load_builtin(target_triple) {
|
|
return Ok((t, TargetWarnings::empty()));
|
|
}
|
|
|
|
// search for a file named `target_triple`.json in RUST_TARGET_PATH
|
|
let path = {
|
|
let mut target = target_triple.to_string();
|
|
target.push_str(".json");
|
|
PathBuf::from(target)
|
|
};
|
|
|
|
let target_path = env::var_os("RUST_TARGET_PATH").unwrap_or_default();
|
|
|
|
for dir in env::split_paths(&target_path) {
|
|
let p = dir.join(&path);
|
|
if p.is_file() {
|
|
return load_file(&p);
|
|
}
|
|
}
|
|
|
|
// Additionally look in the sysroot under `lib/rustlib/<triple>/target.json`
|
|
// as a fallback.
|
|
let rustlib_path = crate::target_rustlib_path(&sysroot, &target_triple);
|
|
let p = PathBuf::from_iter([
|
|
Path::new(sysroot),
|
|
Path::new(&rustlib_path),
|
|
Path::new("target.json"),
|
|
]);
|
|
if p.is_file() {
|
|
return load_file(&p);
|
|
}
|
|
|
|
Err(format!("Could not find specification for target {:?}", target_triple))
|
|
}
|
|
TargetTriple::TargetJson { ref contents, .. } => {
|
|
let obj = serde_json::from_str(contents).map_err(|e| e.to_string())?;
|
|
Target::from_json(obj)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
impl ToJson for Target {
|
|
fn to_json(&self) -> Json {
|
|
let mut d = serde_json::Map::new();
|
|
let default: TargetOptions = Default::default();
|
|
let mut target = self.clone();
|
|
target.update_to_cli();
|
|
|
|
macro_rules! target_val {
|
|
($attr:ident) => {{
|
|
let name = (stringify!($attr)).replace("_", "-");
|
|
d.insert(name, target.$attr.to_json());
|
|
}};
|
|
}
|
|
|
|
macro_rules! target_option_val {
|
|
($attr:ident) => {{
|
|
let name = (stringify!($attr)).replace("_", "-");
|
|
if default.$attr != target.$attr {
|
|
d.insert(name, target.$attr.to_json());
|
|
}
|
|
}};
|
|
($attr:ident, $json_name:expr) => {{
|
|
let name = $json_name;
|
|
if default.$attr != target.$attr {
|
|
d.insert(name.into(), target.$attr.to_json());
|
|
}
|
|
}};
|
|
(link_args - $attr:ident, $json_name:expr) => {{
|
|
let name = $json_name;
|
|
if default.$attr != target.$attr {
|
|
let obj = target
|
|
.$attr
|
|
.iter()
|
|
.map(|(k, v)| (k.desc().to_string(), v.clone()))
|
|
.collect::<BTreeMap<_, _>>();
|
|
d.insert(name.to_string(), obj.to_json());
|
|
}
|
|
}};
|
|
(env - $attr:ident) => {{
|
|
let name = (stringify!($attr)).replace("_", "-");
|
|
if default.$attr != target.$attr {
|
|
let obj = target
|
|
.$attr
|
|
.iter()
|
|
.map(|&(ref k, ref v)| format!("{k}={v}"))
|
|
.collect::<Vec<_>>();
|
|
d.insert(name, obj.to_json());
|
|
}
|
|
}};
|
|
}
|
|
|
|
target_val!(llvm_target);
|
|
d.insert("target-pointer-width".to_string(), self.pointer_width.to_string().to_json());
|
|
target_val!(arch);
|
|
target_val!(data_layout);
|
|
|
|
target_option_val!(is_builtin);
|
|
target_option_val!(endian, "target-endian");
|
|
target_option_val!(c_int_width, "target-c-int-width");
|
|
target_option_val!(os);
|
|
target_option_val!(env);
|
|
target_option_val!(abi);
|
|
target_option_val!(vendor);
|
|
target_option_val!(linker);
|
|
target_option_val!(linker_flavor_json, "linker-flavor");
|
|
target_option_val!(lld_flavor_json, "lld-flavor");
|
|
target_option_val!(linker_is_gnu_json, "linker-is-gnu");
|
|
target_option_val!(pre_link_objects);
|
|
target_option_val!(post_link_objects);
|
|
target_option_val!(pre_link_objects_self_contained, "pre-link-objects-fallback");
|
|
target_option_val!(post_link_objects_self_contained, "post-link-objects-fallback");
|
|
target_option_val!(link_self_contained, "crt-objects-fallback");
|
|
target_option_val!(link_args - pre_link_args_json, "pre-link-args");
|
|
target_option_val!(link_args - late_link_args_json, "late-link-args");
|
|
target_option_val!(link_args - late_link_args_dynamic_json, "late-link-args-dynamic");
|
|
target_option_val!(link_args - late_link_args_static_json, "late-link-args-static");
|
|
target_option_val!(link_args - post_link_args_json, "post-link-args");
|
|
target_option_val!(link_script);
|
|
target_option_val!(env - link_env);
|
|
target_option_val!(link_env_remove);
|
|
target_option_val!(asm_args);
|
|
target_option_val!(cpu);
|
|
target_option_val!(features);
|
|
target_option_val!(dynamic_linking);
|
|
target_option_val!(only_cdylib);
|
|
target_option_val!(executables);
|
|
target_option_val!(relocation_model);
|
|
target_option_val!(code_model);
|
|
target_option_val!(tls_model);
|
|
target_option_val!(disable_redzone);
|
|
target_option_val!(frame_pointer);
|
|
target_option_val!(function_sections);
|
|
target_option_val!(dll_prefix);
|
|
target_option_val!(dll_suffix);
|
|
target_option_val!(exe_suffix);
|
|
target_option_val!(staticlib_prefix);
|
|
target_option_val!(staticlib_suffix);
|
|
target_option_val!(families, "target-family");
|
|
target_option_val!(abi_return_struct_as_int);
|
|
target_option_val!(is_like_osx);
|
|
target_option_val!(is_like_solaris);
|
|
target_option_val!(is_like_windows);
|
|
target_option_val!(is_like_msvc);
|
|
target_option_val!(is_like_wasm);
|
|
target_option_val!(is_like_android);
|
|
target_option_val!(default_dwarf_version);
|
|
target_option_val!(allows_weak_linkage);
|
|
target_option_val!(has_rpath);
|
|
target_option_val!(no_default_libraries);
|
|
target_option_val!(position_independent_executables);
|
|
target_option_val!(static_position_independent_executables);
|
|
target_option_val!(needs_plt);
|
|
target_option_val!(relro_level);
|
|
target_option_val!(archive_format);
|
|
target_option_val!(allow_asm);
|
|
target_option_val!(main_needs_argc_argv);
|
|
target_option_val!(has_thread_local);
|
|
target_option_val!(obj_is_bitcode);
|
|
target_option_val!(forces_embed_bitcode);
|
|
target_option_val!(bitcode_llvm_cmdline);
|
|
target_option_val!(min_atomic_width);
|
|
target_option_val!(max_atomic_width);
|
|
target_option_val!(atomic_cas);
|
|
target_option_val!(panic_strategy);
|
|
target_option_val!(crt_static_allows_dylibs);
|
|
target_option_val!(crt_static_default);
|
|
target_option_val!(crt_static_respected);
|
|
target_option_val!(stack_probes);
|
|
target_option_val!(min_global_align);
|
|
target_option_val!(default_codegen_units);
|
|
target_option_val!(trap_unreachable);
|
|
target_option_val!(requires_lto);
|
|
target_option_val!(singlethread);
|
|
target_option_val!(no_builtins);
|
|
target_option_val!(default_hidden_visibility);
|
|
target_option_val!(emit_debug_gdb_scripts);
|
|
target_option_val!(requires_uwtable);
|
|
target_option_val!(default_uwtable);
|
|
target_option_val!(simd_types_indirect);
|
|
target_option_val!(limit_rdylib_exports);
|
|
target_option_val!(override_export_symbols);
|
|
target_option_val!(merge_functions);
|
|
target_option_val!(mcount, "target-mcount");
|
|
target_option_val!(llvm_abiname);
|
|
target_option_val!(relax_elf_relocations);
|
|
target_option_val!(llvm_args);
|
|
target_option_val!(use_ctors_section);
|
|
target_option_val!(eh_frame_header);
|
|
target_option_val!(has_thumb_interworking);
|
|
target_option_val!(debuginfo_kind);
|
|
target_option_val!(split_debuginfo);
|
|
target_option_val!(supported_split_debuginfo);
|
|
target_option_val!(supported_sanitizers);
|
|
target_option_val!(c_enum_min_bits);
|
|
target_option_val!(generate_arange_section);
|
|
target_option_val!(supports_stack_protector);
|
|
|
|
if let Some(abi) = self.default_adjusted_cabi {
|
|
d.insert("default-adjusted-cabi".into(), Abi::name(abi).to_json());
|
|
}
|
|
|
|
Json::Object(d)
|
|
}
|
|
}
|
|
|
|
/// Either a target triple string or a path to a JSON file.
|
|
#[derive(Clone, Debug)]
|
|
pub enum TargetTriple {
|
|
TargetTriple(String),
|
|
TargetJson {
|
|
/// Warning: This field may only be used by rustdoc. Using it anywhere else will lead to
|
|
/// inconsistencies as it is discarded during serialization.
|
|
path_for_rustdoc: PathBuf,
|
|
triple: String,
|
|
contents: String,
|
|
},
|
|
}
|
|
|
|
// Use a manual implementation to ignore the path field
|
|
impl PartialEq for TargetTriple {
|
|
fn eq(&self, other: &Self) -> bool {
|
|
match (self, other) {
|
|
(Self::TargetTriple(l0), Self::TargetTriple(r0)) => l0 == r0,
|
|
(
|
|
Self::TargetJson { path_for_rustdoc: _, triple: l_triple, contents: l_contents },
|
|
Self::TargetJson { path_for_rustdoc: _, triple: r_triple, contents: r_contents },
|
|
) => l_triple == r_triple && l_contents == r_contents,
|
|
_ => false,
|
|
}
|
|
}
|
|
}
|
|
|
|
// Use a manual implementation to ignore the path field
|
|
impl Hash for TargetTriple {
|
|
fn hash<H: Hasher>(&self, state: &mut H) -> () {
|
|
match self {
|
|
TargetTriple::TargetTriple(triple) => {
|
|
0u8.hash(state);
|
|
triple.hash(state)
|
|
}
|
|
TargetTriple::TargetJson { path_for_rustdoc: _, triple, contents } => {
|
|
1u8.hash(state);
|
|
triple.hash(state);
|
|
contents.hash(state)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// Use a manual implementation to prevent encoding the target json file path in the crate metadata
|
|
impl<S: Encoder> Encodable<S> for TargetTriple {
|
|
fn encode(&self, s: &mut S) {
|
|
match self {
|
|
TargetTriple::TargetTriple(triple) => s.emit_enum_variant(0, |s| s.emit_str(triple)),
|
|
TargetTriple::TargetJson { path_for_rustdoc: _, triple, contents } => s
|
|
.emit_enum_variant(1, |s| {
|
|
s.emit_str(triple);
|
|
s.emit_str(contents)
|
|
}),
|
|
}
|
|
}
|
|
}
|
|
|
|
impl<D: Decoder> Decodable<D> for TargetTriple {
|
|
fn decode(d: &mut D) -> Self {
|
|
match d.read_usize() {
|
|
0 => TargetTriple::TargetTriple(d.read_str().to_owned()),
|
|
1 => TargetTriple::TargetJson {
|
|
path_for_rustdoc: PathBuf::new(),
|
|
triple: d.read_str().to_owned(),
|
|
contents: d.read_str().to_owned(),
|
|
},
|
|
_ => {
|
|
panic!("invalid enum variant tag while decoding `TargetTriple`, expected 0..2");
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
impl TargetTriple {
|
|
/// Creates a target triple from the passed target triple string.
|
|
pub fn from_triple(triple: &str) -> Self {
|
|
TargetTriple::TargetTriple(triple.into())
|
|
}
|
|
|
|
/// Creates a target triple from the passed target path.
|
|
pub fn from_path(path: &Path) -> Result<Self, io::Error> {
|
|
let canonicalized_path = path.canonicalize()?;
|
|
let contents = std::fs::read_to_string(&canonicalized_path).map_err(|err| {
|
|
io::Error::new(
|
|
io::ErrorKind::InvalidInput,
|
|
format!("target path {:?} is not a valid file: {}", canonicalized_path, err),
|
|
)
|
|
})?;
|
|
let triple = canonicalized_path
|
|
.file_stem()
|
|
.expect("target path must not be empty")
|
|
.to_str()
|
|
.expect("target path must be valid unicode")
|
|
.to_owned();
|
|
Ok(TargetTriple::TargetJson { path_for_rustdoc: canonicalized_path, triple, contents })
|
|
}
|
|
|
|
/// Returns a string triple for this target.
|
|
///
|
|
/// If this target is a path, the file name (without extension) is returned.
|
|
pub fn triple(&self) -> &str {
|
|
match *self {
|
|
TargetTriple::TargetTriple(ref triple)
|
|
| TargetTriple::TargetJson { ref triple, .. } => triple,
|
|
}
|
|
}
|
|
|
|
/// Returns an extended string triple for this target.
|
|
///
|
|
/// If this target is a path, a hash of the path is appended to the triple returned
|
|
/// by `triple()`.
|
|
pub fn debug_triple(&self) -> String {
|
|
use std::collections::hash_map::DefaultHasher;
|
|
|
|
match self {
|
|
TargetTriple::TargetTriple(triple) => triple.to_owned(),
|
|
TargetTriple::TargetJson { path_for_rustdoc: _, triple, contents: content } => {
|
|
let mut hasher = DefaultHasher::new();
|
|
content.hash(&mut hasher);
|
|
let hash = hasher.finish();
|
|
format!("{}-{}", triple, hash)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
impl fmt::Display for TargetTriple {
|
|
fn fmt(&self, f: &mut fmt::Formatter<'_>) -> fmt::Result {
|
|
write!(f, "{}", self.debug_triple())
|
|
}
|
|
}
|