/[gentoo-x86]/eclass/flag-o-matic.eclass
Gentoo

Diff of /eclass/flag-o-matic.eclass

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

Revision 1.85 Revision 1.101
1# Copyright 1999-2005 Gentoo Foundation 1# Copyright 1999-2005 Gentoo Foundation
2# Distributed under the terms of the GNU General Public License v2 2# Distributed under the terms of the GNU General Public License v2
3# $Header: /var/cvsroot/gentoo-x86/eclass/flag-o-matic.eclass,v 1.85 2005/04/06 23:29:23 vapier Exp $ 3# $Header: /var/cvsroot/gentoo-x86/eclass/flag-o-matic.eclass,v 1.101 2006/01/01 01:14:59 swegener Exp $
4 4
5ECLASS=flag-o-matic
6INHERITED="$INHERITED $ECLASS"
7
8IUSE="debug"
9 5
10# need access to emktemp() 6# need access to emktemp()
11inherit eutils toolchain-funcs multilib 7inherit eutils toolchain-funcs multilib
12 8
13# 9#
61# -fno-stack-protector to {C,CXX,LD}FLAGS 57# -fno-stack-protector to {C,CXX,LD}FLAGS
62# when a package is filtering -fstack-protector, -fstack-protector-all 58# when a package is filtering -fstack-protector, -fstack-protector-all
63# notice: modern automatic specs files will also suppress -fstack-protector-all 59# notice: modern automatic specs files will also suppress -fstack-protector-all
64# when only -fno-stack-protector is given 60# when only -fno-stack-protector is given
65# 61#
62#### bindnow-flags ####
63# Returns the flags to enable "now" binding in the current selected linker.
64#
65################ DEPRECATED functions ################
66# The following are still present to avoid breaking existing
67# code more than necessary; however they are deprecated. Please
68# use gcc-specs-* from toolchain-funcs.eclass instead, if you
69# need to know which hardened techs are active in the compiler.
70# See bug #100974
71#
72#### has_hardened ####
73# Returns true if the compiler has 'Hardened' in its version string,
74# (note; switched-spec vanilla compilers satisfy this condition) or
75# the specs file name contains 'hardened'.
76#
77#### has_pie ####
78# Returns true if the compiler by default or with current CFLAGS
79# builds position-independent code.
80#
81#### has_pic ####
82# Returns true if the compiler by default or with current CFLAGS
83# builds position-independent code.
84#
85#### has_ssp_all ####
86# Returns true if the compiler by default or with current CFLAGS
87# generates stack smash protections for all functions
88#
89#### has_ssp ####
90# Returns true if the compiler by default or with current CFLAGS
91# generates stack smash protections for most vulnerable functions
92#
66 93
67# C[XX]FLAGS that we allow in strip-flags 94# C[XX]FLAGS that we allow in strip-flags
68setup-allowed-flags() { 95setup-allowed-flags() {
69 if [[ -z ${ALLOWED_FLAGS} ]] ; then 96 if [[ -z ${ALLOWED_FLAGS} ]] ; then
70 export ALLOWED_FLAGS="-pipe" 97 export ALLOWED_FLAGS="-pipe"
71 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -O -O0 -O1 -O2 -mcpu -march -mtune" 98 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -O -O0 -O1 -O2 -mcpu -march -mtune"
72 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fstack-protector -fno-stack-protector" 99 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fstack-protector -fstack-protector-all"
100 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fbounds-checking -fno-bounds-checking"
73 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-pie -fno-unit-at-a-time" 101 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-pie -fno-unit-at-a-time"
74 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -g -g0 -g1 -g2 -g3 -ggdb -ggdb0 -ggdb1 -ggdb2 -ggdb3" 102 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -g -g0 -g1 -g2 -g3 -ggdb -ggdb0 -ggdb1 -ggdb2 -ggdb3"
75 case $(tc-arch) in
76 mips) ALLOWED_FLAGS="${ALLOWED_FLAGS} -mips1 -mips2 -mips3 -mips4 -mips32 -mips64 -mips16 -EL -EB -mabi" ;;
77 amd64) ALLOWED_FLAGS="${ALLOWED_FLAGS} -fPIC -m64" ;;
78 x86) ALLOWED_FLAGS="${ALLOWED_FLAGS} -m32" ;;
79 alpha) ALLOWED_FLAGS="${ALLOWED_FLAGS} -fPIC" ;;
80 ia64) ALLOWED_FLAGS="${ALLOWED_FLAGS} -fPIC" ;;
81 sparc) ALLOWED_FLAGS="${ALLOWED_FLAGS} -m32 -m64" ;;
82 ppc) ALLOWED_FLAGS="${ALLOWED_FLAGS} -mabi" ;;
83 esac
84 fi 103 fi
85 # allow a bunch of flags that negate features / control ABI 104 # allow a bunch of flags that negate features / control ABI
86 ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-stack-protector -fno-stack-protector-all" 105 ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-stack-protector -fno-stack-protector-all"
87 case $(tc-arch) in 106 ALLOWED_FLAGS="${ALLOWED_FLAGS} -mregparm -mno-app-regs -mapp-regs \
88 x86|amd64|ia64) ALLOWED_FLAGS="${ALLOWED_FLAGS} -mno-mmx -mno-sse -mno-sse2 -mno-sse3 -mno-3dnow" ;; 107 -mno-mmx -mno-sse -mno-sse2 -mno-sse3 -mno-3dnow \
89 esac 108 -mips1 -mips2 -mips3 -mips4 -mips32 -mips64 -mips16 \
90 ALLOWED_FLAGS="${ALLOWED_FLAGS} -mregparm -mno-app-regs -mapp-regs -msoft-float -mflat -mno-faster-structs -mfaster-structs -mlittle-endian -mbig-endian -mlive-g0 -mcmodel -mno-stack-bias -mstack-bias" 109 -msoft-float -mno-soft-float -mhard-float -mno-hard-float -mfpu \
110 -mieee -mieee-with-inexact \
111 -mtls-direct-seg-refs -mno-tls-direct-seg-refs \
112 -mflat -mno-flat -mno-faster-structs -mfaster-structs \
113 -m32 -m64 -mabi -mlittle-endian -mbig-endian -EL -EB -fPIC \
114 -mlive-g0 -mcmodel -mstack-bias -mno-stack-bias"
91 115
92 # C[XX]FLAGS that we are think is ok, but needs testing 116 # C[XX]FLAGS that we are think is ok, but needs testing
93 # NOTE: currently -Os have issues with gcc3 and K6* arch's 117 # NOTE: currently -Os have issues with gcc3 and K6* arch's
94 export UNSTABLE_FLAGS="-Os -O3 -freorder-blocks -fprefetch-loop-arrays" 118 export UNSTABLE_FLAGS="-Os -O3 -freorder-blocks -fprefetch-loop-arrays"
95 return 0 119 return 0
125 149
126 return 0 150 return 0
127} 151}
128 152
129filter-lfs-flags() { 153filter-lfs-flags() {
154 [[ -n $@ ]] && die "filter-lfs-flags takes no arguments"
130 filter-flags -D_FILE_OFFSET_BITS=64 -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE 155 filter-flags -D_FILE_OFFSET_BITS=64 -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE
131} 156}
132 157
133append-lfs-flags() { 158append-lfs-flags() {
159 [[ -n $@ ]] && die "append-lfs-flags takes no arguments"
134 append-flags -D_FILE_OFFSET_BITS=64 -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE 160 append-flags -D_FILE_OFFSET_BITS=64 -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE
135} 161}
136 162
137append-flags() { 163append-flags() {
138 [[ -z $* ]] && return 0 164 [[ -z $* ]] && return 0
142 -n "`is-flag -fno-stack-protector-all`" ] && fstack-flags 168 -n "`is-flag -fno-stack-protector-all`" ] && fstack-flags
143 return 0 169 return 0
144} 170}
145 171
146replace-flags() { 172replace-flags() {
173 [[ $# != 2 ]] \
174 && echo && eerror "Usage: replace-flags <old flag> <new flag>" \
175 && die "replace-flags takes 2 arguments, not $#"
176
147 local f fset 177 local f fset
148 declare -a new_CFLAGS new_CXXFLAGS 178 declare -a new_CFLAGS new_CXXFLAGS
149 179
150 for fset in CFLAGS CXXFLAGS; do 180 for fset in CFLAGS CXXFLAGS; do
151 # Looping over the flags instead of using a global 181 # Looping over the flags instead of using a global
223 local NEW_CFLAGS="" 253 local NEW_CFLAGS=""
224 local NEW_CXXFLAGS="" 254 local NEW_CXXFLAGS=""
225 255
226 # Allow unstable C[XX]FLAGS if we are using unstable profile ... 256 # Allow unstable C[XX]FLAGS if we are using unstable profile ...
227 if has ~$(tc-arch) ${ACCEPT_KEYWORDS} ; then 257 if has ~$(tc-arch) ${ACCEPT_KEYWORDS} ; then
228 use debug && einfo "Enabling the use of some unstable flags"
229 ALLOWED_FLAGS="${ALLOWED_FLAGS} ${UNSTABLE_FLAGS}" 258 ALLOWED_FLAGS="${ALLOWED_FLAGS} ${UNSTABLE_FLAGS}"
230 fi 259 fi
231 260
232 set -f # disable pathname expansion 261 set -f # disable pathname expansion
233 262
264 export CFLAGS="${NEW_CFLAGS}" 293 export CFLAGS="${NEW_CFLAGS}"
265 export CXXFLAGS="${NEW_CXXFLAGS}" 294 export CXXFLAGS="${NEW_CXXFLAGS}"
266 return 0 295 return 0
267} 296}
268 297
298test-flag-PROG() {
299 local comp=$1
300 local flags="$2"
301
302 [[ -z ${comp} || -z ${flags} ]] && \
303 return 1
304
305 local PROG=$(tc-get${comp})
306 ${PROG} ${flags} -S -o /dev/null -xc /dev/null \
307 > /dev/null 2>&1
308}
309
310# Returns true if C compiler support given flag
311test-flag-CC() { test-flag-PROG "CC" "$1"; }
312
313# Returns true if C++ compiler support given flag
314test-flag-CXX() { test-flag-PROG "CXX" "$1"; }
315
316test-flags-PROG() {
317 local comp=$1
318 local flags
319 local x
320
321 shift
322
323 [[ -z ${comp} ]] && \
324 return 1
325
326 for x in "$@" ; do
327 test-flag-${comp} "${x}" && flags="${flags} ${x}"
328 done
329
330 echo "${flags}"
331
332 # Just bail if we dont have any flags
333 [[ -n ${flags} ]]
334}
335
336# Returns (echo's) the given flags supported by the C compiler
337test-flags-CC() { test-flags-PROG "CC" "$@"; }
338
339# Returns (echo's) the given flags supported by the C++ compiler
340test-flags-CXX() { test-flags-PROG "CXX" "$@"; }
341
342# Short-hand that should hopefully work for both C and C++ compiler, but
343# its really only present due to the append-flags() abomination.
344test-flags() { test-flags-CC "$@"; }
345
346# Depriciated, use test-flags()
269test_flag() { 347test_flag() {
270 if $(tc-getCC) -S -xc "$@" -o "$(emktemp)" /dev/null &>/dev/null; then 348 addwrite "/dev/stderr"
271 printf "%s\n" "$*" 349 ewarn "test_flag: deprecated, please use test-flags()!" >/dev/stderr
272 return 0 350
273 fi 351 test-flags-CC "$@"
274 return 1
275} 352}
276 353
277test_version_info() { 354test_version_info() {
278 if [[ $($(tc-getCC) --version 2>&1) == *$1* ]]; then 355 if [[ $($(tc-getCC) --version 2>&1) == *$1* ]]; then
279 return 0 356 return 0
281 return 1 358 return 1
282 fi 359 fi
283} 360}
284 361
285strip-unsupported-flags() { 362strip-unsupported-flags() {
286 local NEW_CFLAGS NEW_CXXFLAGS 363 local x NEW_CFLAGS NEW_CXXFLAGS
287 364
288 for x in ${CFLAGS} ; do 365 for x in ${CFLAGS} ; do
289 NEW_CFLAGS="${NEW_CFLAGS} `test_flag ${x}`" 366 NEW_CFLAGS="${NEW_CFLAGS} $(test-flags ${x})"
290 done 367 done
291 for x in ${CXXFLAGS} ; do 368 for x in ${CXXFLAGS} ; do
292 NEW_CXXFLAGS="${NEW_CXXFLAGS} `test_flag ${x}`" 369 NEW_CXXFLAGS="${NEW_CXXFLAGS} $(test-flags ${x})"
293 done 370 done
294 371
295 export CFLAGS="${NEW_CFLAGS}" 372 export CFLAGS=${NEW_CFLAGS}
296 export CXXFLAGS="${NEW_CXXFLAGS}" 373 export CXXFLAGS=${NEW_CXXFLAGS}
297} 374}
298 375
299get-flag() { 376get-flag() {
300 local f findflag="$1" 377 local f findflag="$1"
301 378
311 fi 388 fi
312 done 389 done
313 return 1 390 return 1
314} 391}
315 392
393# DEPRECATED - use gcc-specs-relro or gcc-specs-now from toolchain-funcs
316has_hardened() { 394has_hardened() {
395 addwrite "/dev/stderr"
396 ewarn "has_hardened: deprecated, please use gcc-specs-{relro,now}()!" \
397 >/dev/stderr
398
317 test_version_info Hardened && return 0 399 test_version_info Hardened && return 0
318 # the specs file wont exist unless gcc has GCC_SPECS support 400 # The specs file wont exist unless gcc has GCC_SPECS support
319 [ -f "${GCC_SPECS}" -a "${GCC_SPECS}" != "${GCC_SPECS/hardened/}" ] && \ 401 [[ -f ${GCC_SPECS} && ${GCC_SPECS} != ${GCC_SPECS/hardened/} ]]
320 return 0
321 return 1
322} 402}
323 403
404# DEPRECATED - use gcc-specs-pie from toolchain-funcs
324# indicate whether PIC is set 405# indicate whether PIC is set
325has_pic() { 406has_pic() {
326 [ "${CFLAGS/-fPIC}" != "${CFLAGS}" ] && return 0 407 addwrite "/dev/stderr"
327 [ "${CFLAGS/-fpic}" != "${CFLAGS}" ] && return 0 408 ewarn "has_pic: deprecated, please use gcc-specs-pie()!" >/dev/stderr
409
410 [[ ${CFLAGS/-fPIC} != ${CFLAGS} || \
411 ${CFLAGS/-fpic} != ${CFLAGS} || \
328 [ "$(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIC__)" ] && return 0 412 -n $(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIC__) ]]
329 test_version_info pie && return 0
330 return 1
331} 413}
332 414
415# DEPRECATED - use gcc-specs-pie from toolchain-funcs
333# indicate whether PIE is set 416# indicate whether PIE is set
334has_pie() { 417has_pie() {
335 [ "${CFLAGS/-fPIE}" != "${CFLAGS}" ] && return 0 418 addwrite "/dev/stderr"
336 [ "${CFLAGS/-fpie}" != "${CFLAGS}" ] && return 0 419 ewarn "has_pie: deprecated, please use gcc-specs-pie()!" >/dev/stderr
420
421 [[ ${CFLAGS/-fPIE} != ${CFLAGS} || \
422 ${CFLAGS/-fpie} != ${CFLAGS} || \
423 -n $(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIE__) || \
337 [ "$(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIE__)" ] && return 0 424 -n $(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIC__) ]]
338 # test PIC while waiting for specs to be updated to generate __PIE__ 425 # test PIC while waiting for specs to be updated to generate __PIE__
426}
427
428# DEPRECATED - use gcc-specs-ssp from toolchain-funcs
429# indicate whether code for SSP is being generated for all functions
430has_ssp_all() {
431 addwrite "/dev/stderr"
432 ewarn "has_ssp_all: deprecated, please use gcc-specs-ssp()!" >/dev/stderr
433
434 # note; this matches only -fstack-protector-all
435 [[ ${CFLAGS/-fstack-protector-all} != ${CFLAGS} || \
339 [ "$(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIC__)" ] && return 0 436 -n $(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __SSP_ALL__) ]] || \
340 return 1 437 gcc-specs-ssp
341} 438}
342 439
440# DEPRECATED - use gcc-specs-ssp from toolchain-funcs
343# indicate whether code for SSP is being generated 441# indicate whether code for SSP is being generated
344has_ssp() { 442has_ssp() {
443 addwrite "/dev/stderr"
444 ewarn "has_ssp: deprecated, please use gcc-specs-ssp()!" >/dev/stderr
445
345 # note; this matches both -fstack-protector and -fstack-protector-all 446 # note; this matches both -fstack-protector and -fstack-protector-all
346 [ "${CFLAGS/-fstack-protector}" != "${CFLAGS}" ] && return 0 447 [[ ${CFLAGS/-fstack-protector} != ${CFLAGS} || \
347 [ "$(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __SSP__)" ] && return 0 448 -n $(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __SSP__) ]] || \
348 return 1 449 gcc-specs-ssp
349} 450}
350 451
351has_m64() { 452has_m64() {
352 # this doesnt test if the flag is accepted, it tests if the flag 453 # this doesnt test if the flag is accepted, it tests if the flag
353 # actually -WORKS-. non-multilib gcc will take both -m32 and -m64! 454 # actually -WORKS-. non-multilib gcc will take both -m32 and -m64!
354 # please dont replace this function with test_flag in some future 455 # please dont replace this function with test_flag in some future
355 # clean-up! 456 # clean-up!
457
356 local temp="$(emktemp)" 458 local temp="$(emktemp)"
357 echo "int main() { return(0); }" > ${temp}.c 459 echo "int main() { return(0); }" > "${temp}".c
358 MY_CC=$(tc-getCC) 460 MY_CC=$(tc-getCC)
359 ${MY_CC/ .*/} -m64 -o "$(emktemp)" ${temp}.c > /dev/null 2>&1 461 ${MY_CC/ .*/} -m64 -o "$(emktemp)" "${temp}".c > /dev/null 2>&1
360 local ret=$? 462 local ret=$?
361 rm -f ${temp}.c 463 rm -f "${temp}".c
362 [ "$ret" != "1" ] && return 0 464 [[ ${ret} != 1 ]] && return 0
363 return 1 465 return 1
364} 466}
365 467
366has_m32() { 468has_m32() {
367 # this doesnt test if the flag is accepted, it tests if the flag 469 # this doesnt test if the flag is accepted, it tests if the flag
369 # please dont replace this function with test_flag in some future 471 # please dont replace this function with test_flag in some future
370 # clean-up! 472 # clean-up!
371 473
372 [ "$(tc-arch)" = "amd64" ] && has_multilib_profile && return 0 474 [ "$(tc-arch)" = "amd64" ] && has_multilib_profile && return 0
373 475
374 local temp="$(emktemp)" 476 local temp=$(emktemp)
375 echo "int main() { return(0); }" > ${temp}.c 477 echo "int main() { return(0); }" > "${temp}".c
376 MY_CC=$(tc-getCC) 478 MY_CC=$(tc-getCC)
377 ${MY_CC/ .*/} -m32 -o "$(emktemp)" ${temp}.c > /dev/null 2>&1 479 ${MY_CC/ .*/} -m32 -o "$(emktemp)" "${temp}".c > /dev/null 2>&1
378 local ret=$? 480 local ret=$?
379 rm -f ${temp}.c 481 rm -f "${temp}".c
380 [ "$ret" != "1" ] && return 0 482 [[ ${ret} != 1 ]] && return 0
381 return 1 483 return 1
382} 484}
383 485
384replace-sparc64-flags() { 486replace-sparc64-flags() {
385 local SPARC64_CPUS="ultrasparc v9" 487 local SPARC64_CPUS="ultrasparc3 ultrasparc v9"
386 488
387 if [ "${CFLAGS/mtune}" != "${CFLAGS}" ]; then 489 if [ "${CFLAGS/mtune}" != "${CFLAGS}" ]; then
388 for x in ${SPARC64_CPUS}; do 490 for x in ${SPARC64_CPUS}; do
389 CFLAGS="${CFLAGS/-mcpu=${x}/-mcpu=v8}" 491 CFLAGS="${CFLAGS/-mcpu=${x}/-mcpu=v8}"
390 done 492 done
427 export LDFLAGS 529 export LDFLAGS
428 return 0 530 return 0
429} 531}
430 532
431fstack-flags() { 533fstack-flags() {
432 if has_ssp; then 534 if gcc-specs-ssp; then
433 [ -z "`is-flag -fno-stack-protector`" ] && 535 [ -z "`is-flag -fno-stack-protector`" ] &&
434 export CFLAGS="${CFLAGS} `test_flag -fno-stack-protector`" 536 export CFLAGS="${CFLAGS} `test_flag -fno-stack-protector`"
435 fi 537 fi
436 return 0 538 return 0
437} 539}
455 557
456 replace-cpu-flags ev6{7,8} ev6 558 replace-cpu-flags ev6{7,8} ev6
457 559
458 export CFLAGS CXXFLAGS 560 export CFLAGS CXXFLAGS
459} 561}
562
563# Gets the flags needed for "NOW" binding
564bindnow-flags() {
565 case $($(tc-getLD) -v 2>&1 </dev/null) in
566 *GNU* | *'with BFD'*) # GNU ld
567 echo "-Wl,-z,now" ;;
568 *Apple*) # Darwin ld
569 echo "-bind_at_load" ;;
570 *)
571 # Some linkers just recognize -V instead of -v
572 case $($(tc-getLD) -V 2>&1 </dev/null) in
573 *Solaris*) # Solaris accept almost the same GNU options
574 echo "-Wl,-z,now" ;;
575 esac
576 ;;
577 esac
578}

Legend:
Removed from v.1.85  
changed lines
  Added in v.1.101

  ViewVC Help
Powered by ViewVC 1.1.20