You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
112 lines
3.2 KiB
112 lines
3.2 KiB
# Copyright 2020 The Pigweed Authors
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may not
|
|
# use this file except in compliance with the License. You may obtain a copy of
|
|
# the License at
|
|
#
|
|
# https://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations under
|
|
# the License.
|
|
|
|
import("//build_overrides/pigweed.gni")
|
|
|
|
declare_args() {
|
|
# Sets the sanitizer to pass to clang. Valid values are those for "-fsanitize"
|
|
# listed in https://clang.llvm.org/docs/UsersManual.html#id9.
|
|
pw_toolchain_SANITIZERS = []
|
|
|
|
# Indicates if this build is a part of OSS-Fuzz, which needs to be able to
|
|
# provide its own compiler and flags. This violates the build hermeticisim and
|
|
# should only be used for OSS-Fuzz.
|
|
pw_toolchain_OSS_FUZZ_ENABLED = false
|
|
}
|
|
|
|
# Specifies the tools used by host Clang toolchains.
|
|
_host_clang_toolchain = {
|
|
ar = "llvm-ar"
|
|
|
|
if (pw_toolchain_OSS_FUZZ_ENABLED) {
|
|
cc = getenv("CC")
|
|
cxx = getenv("CXX")
|
|
} else {
|
|
cc = "clang"
|
|
cxx = "clang++"
|
|
}
|
|
|
|
is_host_toolchain = true
|
|
}
|
|
|
|
# Common default scope shared by all host Clang toolchains.
|
|
_defaults = {
|
|
default_configs = [
|
|
"$dir_pw_build:extra_debugging",
|
|
"$dir_pw_toolchain/host_clang:no_system_libcpp",
|
|
"$dir_pw_toolchain/host_clang:xcode_sysroot",
|
|
]
|
|
}
|
|
|
|
pw_toolchain_host_clang = {
|
|
debug = {
|
|
name = "host_clang_debug"
|
|
forward_variables_from(_host_clang_toolchain, "*")
|
|
defaults = {
|
|
forward_variables_from(_defaults, "*")
|
|
default_configs += [ "$dir_pw_build:optimize_debugging" ]
|
|
}
|
|
}
|
|
|
|
speed_optimized = {
|
|
name = "host_clang_speed_optimized"
|
|
forward_variables_from(_host_clang_toolchain, "*")
|
|
defaults = {
|
|
forward_variables_from(_defaults, "*")
|
|
default_configs += [ "$dir_pw_build:optimize_speed" ]
|
|
}
|
|
}
|
|
|
|
size_optimized = {
|
|
name = "host_clang_size_optimized"
|
|
forward_variables_from(_host_clang_toolchain, "*")
|
|
defaults = {
|
|
forward_variables_from(_defaults, "*")
|
|
default_configs += [ "$dir_pw_build:optimize_size" ]
|
|
}
|
|
}
|
|
|
|
fuzz = {
|
|
name = "host_clang_fuzz"
|
|
forward_variables_from(_host_clang_toolchain, "*")
|
|
defaults = {
|
|
forward_variables_from(_defaults, "*")
|
|
|
|
# Fuzz faster.
|
|
default_configs += [ "$dir_pw_build:optimize_speed" ]
|
|
|
|
if (pw_toolchain_SANITIZERS == []) {
|
|
# Default to ASan for fuzzing, which is what we typically care about.
|
|
pw_toolchain_SANITIZERS = [ "address" ]
|
|
}
|
|
foreach(sanitizer, pw_toolchain_SANITIZERS) {
|
|
default_configs +=
|
|
[ "$dir_pw_toolchain/host_clang:sanitize_$sanitizer" ]
|
|
}
|
|
|
|
if (pw_toolchain_OSS_FUZZ_ENABLED) {
|
|
default_configs += [ "$dir_pw_fuzzer:oss_fuzz_extra" ]
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
# Describes host clang toolchains.
|
|
pw_toolchain_host_clang_list = [
|
|
pw_toolchain_host_clang.debug,
|
|
pw_toolchain_host_clang.speed_optimized,
|
|
pw_toolchain_host_clang.size_optimized,
|
|
pw_toolchain_host_clang.fuzz,
|
|
]
|