/[gentoo-x86]/eclass/flag-o-matic.eclass
Gentoo

Diff of /eclass/flag-o-matic.eclass

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

Revision 1.101 Revision 1.107
1# Copyright 1999-2005 Gentoo Foundation 1# Copyright 1999-2005 Gentoo Foundation
2# Distributed under the terms of the GNU General Public License v2 2# Distributed under the terms of the GNU General Public License v2
3# $Header: /var/cvsroot/gentoo-x86/eclass/flag-o-matic.eclass,v 1.101 2006/01/01 01:14:59 swegener Exp $ 3# $Header: /var/cvsroot/gentoo-x86/eclass/flag-o-matic.eclass,v 1.107 2006/04/15 00:44:16 vapier Exp $
4 4
5 5
6# need access to emktemp() 6# need access to emktemp()
7inherit eutils toolchain-funcs multilib 7inherit eutils toolchain-funcs multilib
8 8
19# 19#
20#### replace-cpu-flags <old.cpus> <new.cpu> ### 20#### replace-cpu-flags <old.cpus> <new.cpu> ###
21# Replace march/mcpu flags that specify <old.cpus> 21# Replace march/mcpu flags that specify <old.cpus>
22# with flags that specify <new.cpu> 22# with flags that specify <new.cpu>
23# 23#
24#### is-flag <flag> #### 24#### is-flag[q] <flag> ####
25# Returns "true" if flag is set in C[XX]FLAGS 25# Returns "true" if flag is set in C[XX]FLAGS
26# Matches only complete a flag 26# Matches only complete a flag
27# q version sets return code but doesn't echo
28#
29#### is-ldflag[q] <flag> ####
30# Returns "true" if flag is set in LDFLAGS
31# Matches only complete a flag
32# q version sets return code but doesn't echo
27# 33#
28#### strip-flags #### 34#### strip-flags ####
29# Strip C[XX]FLAGS of everything except known 35# Strip C[XX]FLAGS of everything except known
30# good options. 36# good options.
31# 37#
49# Add extra flags to your current LDFLAGS 55# Add extra flags to your current LDFLAGS
50# 56#
51#### filter-ldflags <flags> #### 57#### filter-ldflags <flags> ####
52# Remove particular flags from LDFLAGS 58# Remove particular flags from LDFLAGS
53# Matches only complete flags 59# Matches only complete flags
54#
55#### fstack-flags ####
56# hooked function for hardened gcc that appends
57# -fno-stack-protector to {C,CXX,LD}FLAGS
58# when a package is filtering -fstack-protector, -fstack-protector-all
59# notice: modern automatic specs files will also suppress -fstack-protector-all
60# when only -fno-stack-protector is given
61# 60#
62#### bindnow-flags #### 61#### bindnow-flags ####
63# Returns the flags to enable "now" binding in the current selected linker. 62# Returns the flags to enable "now" binding in the current selected linker.
64# 63#
65################ DEPRECATED functions ################ 64################ DEPRECATED functions ################
96 if [[ -z ${ALLOWED_FLAGS} ]] ; then 95 if [[ -z ${ALLOWED_FLAGS} ]] ; then
97 export ALLOWED_FLAGS="-pipe" 96 export ALLOWED_FLAGS="-pipe"
98 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -O -O0 -O1 -O2 -mcpu -march -mtune" 97 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -O -O0 -O1 -O2 -mcpu -march -mtune"
99 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fstack-protector -fstack-protector-all" 98 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fstack-protector -fstack-protector-all"
100 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fbounds-checking -fno-bounds-checking" 99 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fbounds-checking -fno-bounds-checking"
101 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-pie -fno-unit-at-a-time" 100 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-PIE -fno-pie -fno-unit-at-a-time"
102 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -g -g0 -g1 -g2 -g3 -ggdb -ggdb0 -ggdb1 -ggdb2 -ggdb3" 101 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -g -g0 -g1 -g2 -g3 -ggdb -ggdb0 -ggdb1 -ggdb2 -ggdb3"
102 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-ident"
103 fi 103 fi
104 # allow a bunch of flags that negate features / control ABI 104 # allow a bunch of flags that negate features / control ABI
105 ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-stack-protector -fno-stack-protector-all" 105 ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-stack-protector -fno-stack-protector-all"
106 ALLOWED_FLAGS="${ALLOWED_FLAGS} -mregparm -mno-app-regs -mapp-regs \ 106 ALLOWED_FLAGS="${ALLOWED_FLAGS} -mregparm -mno-app-regs -mapp-regs \
107 -mno-mmx -mno-sse -mno-sse2 -mno-sse3 -mno-3dnow \ 107 -mno-mmx -mno-sse -mno-sse2 -mno-sse3 -mno-3dnow \
113 -m32 -m64 -mabi -mlittle-endian -mbig-endian -EL -EB -fPIC \ 113 -m32 -m64 -mabi -mlittle-endian -mbig-endian -EL -EB -fPIC \
114 -mlive-g0 -mcmodel -mstack-bias -mno-stack-bias" 114 -mlive-g0 -mcmodel -mstack-bias -mno-stack-bias"
115 115
116 # C[XX]FLAGS that we are think is ok, but needs testing 116 # C[XX]FLAGS that we are think is ok, but needs testing
117 # NOTE: currently -Os have issues with gcc3 and K6* arch's 117 # NOTE: currently -Os have issues with gcc3 and K6* arch's
118 export UNSTABLE_FLAGS="-Os -O3 -freorder-blocks -fprefetch-loop-arrays" 118 export UNSTABLE_FLAGS="-Os -O3 -freorder-blocks"
119 return 0 119 return 0
120}
121
122# inverted filters for hardened compiler. This is trying to unpick
123# the hardened compiler defaults.
124_filter-hardened() {
125 local f
126 for f in "$@" ; do
127 case "${f}" in
128 # Ideally we should only concern ourselves with PIE flags,
129 # not -fPIC or -fpic, but too many places filter -fPIC without
130 # thinking about -fPIE.
131 -fPIC|-fpic|-fPIE|-fpie|-Wl,pie|-pie)
132 gcc-specs-pie || continue
133 is-flagq -nopie || append-flags -nopie;;
134 -fstack-protector)
135 gcc-specs-ssp || continue
136 is-flagq -fno-stack-protector || append-flags -fno-stack-protector;;
137 -fstack-protector-all)
138 gcc-specs-ssp-to-all || continue
139 is-flagq -fno-stack-protector-all || append-flags -fno-stack-protector-all;;
140 esac
141 done
142}
143
144# Remove occurrences of strings from variable given in $1
145# Strings removed are matched as globs, so for example
146# '-O*' would remove -O1, -O2 etc.
147_filter-var() {
148 local f x VAR VAL
149 declare -a new
150
151 VAR=$1
152 shift
153 eval VAL=\${${VAR}}
154 for f in ${VAL}; do
155 for x in "$@"; do
156 # Note this should work with globs like -O*
157 [[ ${f} == ${x} ]] && continue 2
158 done
159 eval new\[\${\#new\[@]}]=\${f}
160 done
161 eval export ${VAR}=\${new\[*]}
120} 162}
121 163
122filter-flags() { 164filter-flags() {
123 local x f fset 165 _filter-hardened "$@"
124 declare -a new_CFLAGS new_CXXFLAGS 166 _filter-var CFLAGS "$@"
125 167 _filter-var CXXFLAGS "$@"
126 for x in "$@" ; do
127 case "${x}" in
128 -fPIC|-fpic|-fPIE|-fpie|-pie)
129 append-flags `test_flag -fno-pie`;;
130 -fstack-protector|-fstack-protector-all)
131 fstack-flags;;
132 esac
133 done
134
135 for fset in CFLAGS CXXFLAGS; do
136 # Looping over the flags instead of using a global
137 # substitution ensures that we're working with flag atoms.
138 # Otherwise globs like -O* have the potential to wipe out the
139 # list of flags.
140 for f in ${!fset}; do
141 for x in "$@"; do
142 # Note this should work with globs like -O*
143 [[ ${f} == ${x} ]] && continue 2
144 done
145 eval new_${fset}\[\${\#new_${fset}\[@]}]=\${f}
146 done
147 eval export ${fset}=\${new_${fset}\[*]}
148 done
149
150 return 0 168 return 0
151} 169}
152 170
153filter-lfs-flags() { 171filter-lfs-flags() {
154 [[ -n $@ ]] && die "filter-lfs-flags takes no arguments" 172 [[ -n $@ ]] && die "filter-lfs-flags takes no arguments"
162 180
163append-flags() { 181append-flags() {
164 [[ -z $* ]] && return 0 182 [[ -z $* ]] && return 0
165 export CFLAGS="${CFLAGS} $*" 183 export CFLAGS="${CFLAGS} $*"
166 export CXXFLAGS="${CXXFLAGS} $*" 184 export CXXFLAGS="${CXXFLAGS} $*"
167 [ -n "`is-flag -fno-stack-protector`" -o \
168 -n "`is-flag -fno-stack-protector-all`" ] && fstack-flags
169 return 0 185 return 0
170} 186}
171 187
172replace-flags() { 188replace-flags() {
173 [[ $# != 2 ]] \ 189 [[ $# != 2 ]] \
204 shift 220 shift
205 done 221 done
206 return 0 222 return 0
207} 223}
208 224
209is-flag() { 225is-flagq() {
210 local x 226 local x
211 227
212 for x in ${CFLAGS} ${CXXFLAGS} ; do 228 for x in ${CFLAGS} ${CXXFLAGS} ; do
213 # Note this should work with globs like -mcpu=ultrasparc* 229 # Note this should work with globs like -mcpu=ultrasparc*
214 if [[ ${x} == ${1} ]]; then 230 if [[ ${x} == ${1} ]]; then
215 echo true
216 return 0 231 return 0
217 fi 232 fi
218 done 233 done
234 return 1
235}
236
237is-flag() {
238 if is-flagq ${1}; then
239 echo true
240 return 0
241 fi
242 return 1
243}
244
245is-ldflagq() {
246 local x
247
248 for x in ${LDFLAGS} ; do
249 # Note this should work with globs like -mcpu=ultrasparc*
250 if [[ ${x} == ${1} ]]; then
251 return 0
252 fi
253 done
254 return 1
255}
256
257is-ldflag() {
258 if is-ldflagq ${1}; then
259 echo true
260 return 0
261 fi
219 return 1 262 return 1
220} 263}
221 264
222filter-mfpmath() { 265filter-mfpmath() {
223 local orig_mfpmath new_math prune_math 266 local orig_mfpmath new_math prune_math
343# its really only present due to the append-flags() abomination. 386# its really only present due to the append-flags() abomination.
344test-flags() { test-flags-CC "$@"; } 387test-flags() { test-flags-CC "$@"; }
345 388
346# Depriciated, use test-flags() 389# Depriciated, use test-flags()
347test_flag() { 390test_flag() {
348 addwrite "/dev/stderr"
349 ewarn "test_flag: deprecated, please use test-flags()!" >/dev/stderr 391 ewarn "test_flag: deprecated, please use test-flags()!" >&2
350 392
351 test-flags-CC "$@" 393 test-flags-CC "$@"
352} 394}
353 395
354test_version_info() { 396test_version_info() {
390 return 1 432 return 1
391} 433}
392 434
393# DEPRECATED - use gcc-specs-relro or gcc-specs-now from toolchain-funcs 435# DEPRECATED - use gcc-specs-relro or gcc-specs-now from toolchain-funcs
394has_hardened() { 436has_hardened() {
395 addwrite "/dev/stderr"
396 ewarn "has_hardened: deprecated, please use gcc-specs-{relro,now}()!" \ 437 ewarn "has_hardened: deprecated, please use gcc-specs-{relro,now}()!" >&2
397 >/dev/stderr
398 438
399 test_version_info Hardened && return 0 439 test_version_info Hardened && return 0
400 # The specs file wont exist unless gcc has GCC_SPECS support 440 # The specs file wont exist unless gcc has GCC_SPECS support
401 [[ -f ${GCC_SPECS} && ${GCC_SPECS} != ${GCC_SPECS/hardened/} ]] 441 [[ -f ${GCC_SPECS} && ${GCC_SPECS} != ${GCC_SPECS/hardened/} ]]
402} 442}
403 443
404# DEPRECATED - use gcc-specs-pie from toolchain-funcs 444# DEPRECATED - use gcc-specs-pie from toolchain-funcs
405# indicate whether PIC is set 445# indicate whether PIC is set
406has_pic() { 446has_pic() {
407 addwrite "/dev/stderr"
408 ewarn "has_pic: deprecated, please use gcc-specs-pie()!" >/dev/stderr 447 ewarn "has_pic: deprecated, please use gcc-specs-pie()!" >&2
409 448
410 [[ ${CFLAGS/-fPIC} != ${CFLAGS} || \ 449 [[ ${CFLAGS/-fPIC} != ${CFLAGS} || \
411 ${CFLAGS/-fpic} != ${CFLAGS} || \ 450 ${CFLAGS/-fpic} != ${CFLAGS} ]] || \
412 -n $(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIC__) ]] 451 gcc-specs-pie
413} 452}
414 453
415# DEPRECATED - use gcc-specs-pie from toolchain-funcs 454# DEPRECATED - use gcc-specs-pie from toolchain-funcs
416# indicate whether PIE is set 455# indicate whether PIE is set
417has_pie() { 456has_pie() {
418 addwrite "/dev/stderr"
419 ewarn "has_pie: deprecated, please use gcc-specs-pie()!" >/dev/stderr 457 ewarn "has_pie: deprecated, please use gcc-specs-pie()!" >&2
420 458
421 [[ ${CFLAGS/-fPIE} != ${CFLAGS} || \ 459 [[ ${CFLAGS/-fPIE} != ${CFLAGS} || \
422 ${CFLAGS/-fpie} != ${CFLAGS} || \ 460 ${CFLAGS/-fpie} != ${CFLAGS} ]] || \
423 -n $(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIE__) || \ 461 gcc-specs-pie
424 -n $(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIC__) ]]
425 # test PIC while waiting for specs to be updated to generate __PIE__
426} 462}
427 463
428# DEPRECATED - use gcc-specs-ssp from toolchain-funcs 464# DEPRECATED - use gcc-specs-ssp from toolchain-funcs
429# indicate whether code for SSP is being generated for all functions 465# indicate whether code for SSP is being generated for all functions
430has_ssp_all() { 466has_ssp_all() {
431 addwrite "/dev/stderr"
432 ewarn "has_ssp_all: deprecated, please use gcc-specs-ssp()!" >/dev/stderr 467 ewarn "has_ssp_all: deprecated, please use gcc-specs-ssp()!" >&2
433 468
434 # note; this matches only -fstack-protector-all 469 # note; this matches only -fstack-protector-all
435 [[ ${CFLAGS/-fstack-protector-all} != ${CFLAGS} || \ 470 [[ ${CFLAGS/-fstack-protector-all} != ${CFLAGS} || \
436 -n $(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __SSP_ALL__) ]] || \ 471 -n $(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __SSP_ALL__) ]] || \
437 gcc-specs-ssp 472 gcc-specs-ssp-all
438} 473}
439 474
440# DEPRECATED - use gcc-specs-ssp from toolchain-funcs 475# DEPRECATED - use gcc-specs-ssp from toolchain-funcs
441# indicate whether code for SSP is being generated 476# indicate whether code for SSP is being generated
442has_ssp() { 477has_ssp() {
443 addwrite "/dev/stderr"
444 ewarn "has_ssp: deprecated, please use gcc-specs-ssp()!" >/dev/stderr 478 ewarn "has_ssp: deprecated, please use gcc-specs-ssp()!" >&2
445 479
446 # note; this matches both -fstack-protector and -fstack-protector-all 480 # note; this matches both -fstack-protector and -fstack-protector-all
447 [[ ${CFLAGS/-fstack-protector} != ${CFLAGS} || \ 481 [[ ${CFLAGS/-fstack-protector} != ${CFLAGS} || \
448 -n $(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __SSP__) ]] || \ 482 -n $(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __SSP__) ]] || \
449 gcc-specs-ssp 483 gcc-specs-ssp
508 542
509 export CFLAGS CXXFLAGS 543 export CFLAGS CXXFLAGS
510} 544}
511 545
512append-ldflags() { 546append-ldflags() {
547 [[ -z $* ]] && return 0
513 export LDFLAGS="${LDFLAGS} $*" 548 export LDFLAGS="${LDFLAGS} $*"
514 return 0 549 return 0
515} 550}
516 551
552# Remove flags from LDFLAGS - it's up to the ebuild to filter
553# CFLAGS and CXXFLAGS via filter-flags if they need to.
517filter-ldflags() { 554filter-ldflags() {
518 local x 555 _filter-var LDFLAGS "$@"
556 return 0
557}
519 558
520 # we do this fancy spacing stuff so as to not filter 559# Turn C style ldflags (-Wl,-foo) into straight ldflags - the results
521 # out part of a flag ... we want flag atoms ! :D 560# are suitable for passing directly to 'ld'; note LDFLAGS is usually passed
522 LDFLAGS=" ${LDFLAGS} " 561# to gcc where it needs the '-Wl,'.
562raw-ldflags() {
563 local x input="$@"
564 [[ -z ${input} ]] && input=${LDFLAGS}
565 set --
523 for x in "$@" ; do 566 for x in ${input} ; do
524 LDFLAGS=${LDFLAGS// ${x} / } 567 x=${x#-Wl,}
568 set -- "$@" ${x//,/ }
525 done 569 done
526 [[ -z ${LDFLAGS// } ]] \ 570 echo "$@"
527 && LDFLAGS="" \
528 || LDFLAGS=${LDFLAGS:1:${#LDFLAGS}-2}
529 export LDFLAGS
530 return 0
531}
532
533fstack-flags() {
534 if gcc-specs-ssp; then
535 [ -z "`is-flag -fno-stack-protector`" ] &&
536 export CFLAGS="${CFLAGS} `test_flag -fno-stack-protector`"
537 fi
538 return 0
539} 571}
540 572
541# This is thanks to great work from Paul de Vrieze <gentoo-user@devrieze.net>, 573# This is thanks to great work from Paul de Vrieze <gentoo-user@devrieze.net>,
542# bug #9016. Also thanks to Jukka Salmi <salmi@gmx.net> (bug #13907) for more 574# bug #9016. Also thanks to Jukka Salmi <salmi@gmx.net> (bug #13907) for more
543# fixes. 575# fixes.

Legend:
Removed from v.1.101  
changed lines
  Added in v.1.107

  ViewVC Help
Powered by ViewVC 1.1.20