/[gentoo-x86]/eclass/flag-o-matic.eclass
Gentoo

Diff of /eclass/flag-o-matic.eclass

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

Revision 1.124 Revision 1.133
1# Copyright 1999-2008 Gentoo Foundation 1# Copyright 1999-2009 Gentoo Foundation
2# Distributed under the terms of the GNU General Public License v2 2# Distributed under the terms of the GNU General Public License v2
3# $Header: /var/cvsroot/gentoo-x86/eclass/flag-o-matic.eclass,v 1.124 2008/07/03 05:30:54 dberkholz Exp $ 3# $Header: /var/cvsroot/gentoo-x86/eclass/flag-o-matic.eclass,v 1.133 2009/04/04 17:57:54 grobian Exp $
4 4
5# @ECLASS: flag-o-matic.eclass 5# @ECLASS: flag-o-matic.eclass
6# @MAINTAINER: 6# @MAINTAINER:
7# toolchain@gentoo.org 7# toolchain@gentoo.org
8# @BLURB: common functions to manipulate and query toolchain flags 8# @BLURB: common functions to manipulate and query toolchain flags
31setup-allowed-flags() { 31setup-allowed-flags() {
32 if [[ -z ${ALLOWED_FLAGS} ]] ; then 32 if [[ -z ${ALLOWED_FLAGS} ]] ; then
33 export ALLOWED_FLAGS="-pipe" 33 export ALLOWED_FLAGS="-pipe"
34 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -O -O0 -O1 -O2 -mcpu -march -mtune" 34 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -O -O0 -O1 -O2 -mcpu -march -mtune"
35 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fstack-protector -fstack-protector-all" 35 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fstack-protector -fstack-protector-all"
36 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fbounds-checking" 36 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fbounds-checking -fno-strict-overflow"
37 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-PIE -fno-pie -fno-unit-at-a-time" 37 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-PIE -fno-pie -fno-unit-at-a-time"
38 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -g -g[0-9] -ggdb -ggdb[0-9] -gstabs -gstabs+" 38 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -g -g[0-9] -ggdb -ggdb[0-9] -gstabs -gstabs+"
39 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-ident" 39 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-ident"
40 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -W* -w" 40 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -W* -w"
41 fi 41 fi
42 # allow a bunch of flags that negate features / control ABI 42 # allow a bunch of flags that negate features / control ABI
43 ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-stack-protector -fno-stack-protector-all \ 43 ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-stack-protector -fno-stack-protector-all \
44 -fno-strict-aliasing -fno-bounds-checking" 44 -fno-strict-aliasing -fno-bounds-checking -fstrict-overflow"
45 ALLOWED_FLAGS="${ALLOWED_FLAGS} -mregparm -mno-app-regs -mapp-regs \ 45 ALLOWED_FLAGS="${ALLOWED_FLAGS} -mregparm -mno-app-regs -mapp-regs \
46 -mno-mmx -mno-sse -mno-sse2 -mno-sse3 -mno-3dnow \ 46 -mno-mmx -mno-sse -mno-sse2 -mno-sse3 -mno-3dnow \
47 -mips1 -mips2 -mips3 -mips4 -mips32 -mips64 -mips16 \ 47 -mips1 -mips2 -mips3 -mips4 -mips32 -mips64 -mips16 \
48 -msoft-float -mno-soft-float -mhard-float -mno-hard-float -mfpu \ 48 -msoft-float -mno-soft-float -mhard-float -mno-hard-float -mfpu \
49 -mieee -mieee-with-inexact -mschedule \ 49 -mieee -mieee-with-inexact -mschedule \
50 -mtls-direct-seg-refs -mno-tls-direct-seg-refs \ 50 -mtls-direct-seg-refs -mno-tls-direct-seg-refs \
51 -mflat -mno-flat -mno-faster-structs -mfaster-structs \ 51 -mflat -mno-flat -mno-faster-structs -mfaster-structs \
52 -m32 -m64 -mabi -mlittle-endian -mbig-endian -EL -EB -fPIC \ 52 -m32 -m64 -mabi -mlittle-endian -mbig-endian -EL -EB -fPIC \
53 -mlive-g0 -mcmodel -mstack-bias -mno-stack-bias \ 53 -mlive-g0 -mcmodel -mstack-bias -mno-stack-bias \
54 -msecure-plt -D*" 54 -msecure-plt -m*-toc -D* -U*"
55
56 # killing these two on OSX/Intel will disable SSE, resulting in failing
57 # compilations, as the headers expect SSE to be enabled (Apple knows what
58 # hardware they run on afterall, don't they?)
59 [[ ${CHOST} == i?86-apple-darwin* ]] \
60 && ALLOWED_FLAGS="${ALLOWED_FLAGS} -march=prescott -march=nocona"
55 61
56 # {C,CXX,F,FC}FLAGS that we are think is ok, but needs testing 62 # {C,CXX,F,FC}FLAGS that we are think is ok, but needs testing
57 # NOTE: currently -Os have issues with gcc3 and K6* arch's 63 # NOTE: currently -Os have issues with gcc3 and K6* arch's
58 export UNSTABLE_FLAGS="-Os -O3 -freorder-blocks" 64 export UNSTABLE_FLAGS="-Os -O3 -freorder-blocks"
59 return 0 65 return 0
71 -fPIC|-fpic|-fPIE|-fpie|-Wl,pie|-pie) 77 -fPIC|-fpic|-fPIE|-fpie|-Wl,pie|-pie)
72 gcc-specs-pie || continue 78 gcc-specs-pie || continue
73 is-flagq -nopie || append-flags -nopie;; 79 is-flagq -nopie || append-flags -nopie;;
74 -fstack-protector) 80 -fstack-protector)
75 gcc-specs-ssp || continue 81 gcc-specs-ssp || continue
76 is-flagq -fno-stack-protector || append-flags -fno-stack-protector;; 82 is-flagq -fno-stack-protector || append-flags $(test-flags -fno-stack-protector);;
77 -fstack-protector-all) 83 -fstack-protector-all)
78 gcc-specs-ssp-to-all || continue 84 gcc-specs-ssp-to-all || continue
79 is-flagq -fno-stack-protector-all || append-flags -fno-stack-protector-all;; 85 is-flagq -fno-stack-protector-all || append-flags $(test-flags -fno-stack-protector-all);;
86 -fno-strict-overflow)
87 gcc-specs-nostrict || continue
88 is-flagq -fstrict-overflow || append-flags $(test-flags -fstrict-overflow);;
80 esac 89 esac
81 done 90 done
82} 91}
83 92
84# Remove occurrences of strings from variable given in $1 93# Remove occurrences of strings from variable given in $1
131 [[ -z $* ]] && return 0 140 [[ -z $* ]] && return 0
132 export CPPFLAGS="${CPPFLAGS} $*" 141 export CPPFLAGS="${CPPFLAGS} $*"
133 return 0 142 return 0
134} 143}
135 144
145# @FUNCTION: append-cxxflags
146# @USAGE: <flags>
147# @DESCRIPTION:
148# Add extra <flags> to the current CXXFLAGS.
149append-cxxflags() {
150 [[ -z $* ]] && return 0
151 export CXXFLAGS="${CXXFLAGS} $*"
152 return 0
153}
154
136# @FUNCTION: append-fflags 155# @FUNCTION: append-fflags
137# @USAGE: <flags> 156# @USAGE: <flags>
138# @DESCRIPTION: 157# @DESCRIPTION:
139# Add extra <flags> to the current {F,FC}FLAGS. 158# Add extra <flags> to the current {F,FC}FLAGS.
140append-fflags() { 159append-fflags() {
173 [[ $# != 2 ]] \ 192 [[ $# != 2 ]] \
174 && echo && eerror "Usage: replace-flags <old flag> <new flag>" \ 193 && echo && eerror "Usage: replace-flags <old flag> <new flag>" \
175 && die "replace-flags takes 2 arguments, not $#" 194 && die "replace-flags takes 2 arguments, not $#"
176 195
177 local f fset 196 local f fset
178 declare -a new_CFLAGS new_CXXFLAGS 197 declare -a new_CFLAGS new_CXXFLAGS new_FFLAGS new_FCFLAGS
179 198
180 for fset in CFLAGS CXXFLAGS FFLAGS FCFLAGS; do 199 for fset in CFLAGS CXXFLAGS FFLAGS FCFLAGS; do
181 # Looping over the flags instead of using a global 200 # Looping over the flags instead of using a global
182 # substitution ensures that we're working with flag atoms. 201 # substitution ensures that we're working with flag atoms.
183 # Otherwise globs like -O* have the potential to wipe out the 202 # Otherwise globs like -O* have the potential to wipe out the
553 ewarn "has_ssp_all: deprecated, please use gcc-specs-ssp()!" >&2 572 ewarn "has_ssp_all: deprecated, please use gcc-specs-ssp()!" >&2
554 573
555 # note; this matches only -fstack-protector-all 574 # note; this matches only -fstack-protector-all
556 [[ ${CFLAGS/-fstack-protector-all} != ${CFLAGS} || \ 575 [[ ${CFLAGS/-fstack-protector-all} != ${CFLAGS} || \
557 -n $(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __SSP_ALL__) ]] || \ 576 -n $(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __SSP_ALL__) ]] || \
558 gcc-specs-ssp-all 577 gcc-specs-ssp-to-all
559} 578}
560 579
561# @FUNCTION: has_ssp 580# @FUNCTION: has_ssp
562# @DESCRIPTION: 581# @DESCRIPTION:
563# DEPRECATED - use gcc-specs-ssp from toolchain-funcs 582# DEPRECATED - use gcc-specs-ssp from toolchain-funcs
689# @FUNCTION: bindnow-flags 708# @FUNCTION: bindnow-flags
690# @RETURN: Returns the flags to enable "now" binding in the current selected linker. 709# @RETURN: Returns the flags to enable "now" binding in the current selected linker.
691# @DESCRIPTION: 710# @DESCRIPTION:
692# DEPRECATED - Gets the flags needed for "NOW" binding 711# DEPRECATED - Gets the flags needed for "NOW" binding
693bindnow-flags() { 712bindnow-flags() {
694 ewarn "QA: stop using the bindnow-flags function ... simply drop it from your ebuild" >&2 713 ewarn "QA: stop using the bindnow-flags function ... simply drop it from your ebuild"
695
696 case $($(tc-getLD) -v 2>&1 </dev/null) in
697 *GNU* | *'with BFD'*) # GNU ld
698 echo "-Wl,-z,now" ;;
699 *Apple*) # Darwin ld
700 echo "-bind_at_load" ;;
701 *)
702 # Some linkers just recognize -V instead of -v
703 case $($(tc-getLD) -V 2>&1 </dev/null) in
704 *Solaris*) # Solaris accept almost the same GNU options
705 echo "-Wl,-z,now" ;;
706 esac
707 ;;
708 esac
709} 714}
710 715
711 716
712# Some tests for when we screw with things and want to make 717# Some tests for when we screw with things and want to make
713# sure we didn't break anything 718# sure we didn't break anything

Legend:
Removed from v.1.124  
changed lines
  Added in v.1.133

  ViewVC Help
Powered by ViewVC 1.1.20