/[gentoo-x86]/eclass/flag-o-matic.eclass
Gentoo

Diff of /eclass/flag-o-matic.eclass

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

Revision 1.125 Revision 1.132
1# Copyright 1999-2008 Gentoo Foundation 1# Copyright 1999-2009 Gentoo Foundation
2# Distributed under the terms of the GNU General Public License v2 2# Distributed under the terms of the GNU General Public License v2
3# $Header: /var/cvsroot/gentoo-x86/eclass/flag-o-matic.eclass,v 1.125 2008/09/14 19:43:41 dirtyepic Exp $ 3# $Header: /var/cvsroot/gentoo-x86/eclass/flag-o-matic.eclass,v 1.132 2009/01/21 00:42:20 gengor Exp $
4 4
5# @ECLASS: flag-o-matic.eclass 5# @ECLASS: flag-o-matic.eclass
6# @MAINTAINER: 6# @MAINTAINER:
7# toolchain@gentoo.org 7# toolchain@gentoo.org
8# @BLURB: common functions to manipulate and query toolchain flags 8# @BLURB: common functions to manipulate and query toolchain flags
31setup-allowed-flags() { 31setup-allowed-flags() {
32 if [[ -z ${ALLOWED_FLAGS} ]] ; then 32 if [[ -z ${ALLOWED_FLAGS} ]] ; then
33 export ALLOWED_FLAGS="-pipe" 33 export ALLOWED_FLAGS="-pipe"
34 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -O -O0 -O1 -O2 -mcpu -march -mtune" 34 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -O -O0 -O1 -O2 -mcpu -march -mtune"
35 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fstack-protector -fstack-protector-all" 35 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fstack-protector -fstack-protector-all"
36 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fbounds-checking" 36 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fbounds-checking -fno-strict-overflow"
37 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-PIE -fno-pie -fno-unit-at-a-time" 37 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-PIE -fno-pie -fno-unit-at-a-time"
38 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -g -g[0-9] -ggdb -ggdb[0-9] -gstabs -gstabs+" 38 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -g -g[0-9] -ggdb -ggdb[0-9] -gstabs -gstabs+"
39 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-ident" 39 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-ident"
40 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -W* -w" 40 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -W* -w"
41 fi 41 fi
42 # allow a bunch of flags that negate features / control ABI 42 # allow a bunch of flags that negate features / control ABI
43 ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-stack-protector -fno-stack-protector-all \ 43 ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-stack-protector -fno-stack-protector-all \
44 -fno-strict-aliasing -fno-bounds-checking" 44 -fno-strict-aliasing -fno-bounds-checking -fstrict-overflow"
45 ALLOWED_FLAGS="${ALLOWED_FLAGS} -mregparm -mno-app-regs -mapp-regs \ 45 ALLOWED_FLAGS="${ALLOWED_FLAGS} -mregparm -mno-app-regs -mapp-regs \
46 -mno-mmx -mno-sse -mno-sse2 -mno-sse3 -mno-3dnow \ 46 -mno-mmx -mno-sse -mno-sse2 -mno-sse3 -mno-3dnow \
47 -mips1 -mips2 -mips3 -mips4 -mips32 -mips64 -mips16 \ 47 -mips1 -mips2 -mips3 -mips4 -mips32 -mips64 -mips16 \
48 -msoft-float -mno-soft-float -mhard-float -mno-hard-float -mfpu \ 48 -msoft-float -mno-soft-float -mhard-float -mno-hard-float -mfpu \
49 -mieee -mieee-with-inexact -mschedule \ 49 -mieee -mieee-with-inexact -mschedule \
50 -mtls-direct-seg-refs -mno-tls-direct-seg-refs \ 50 -mtls-direct-seg-refs -mno-tls-direct-seg-refs \
51 -mflat -mno-flat -mno-faster-structs -mfaster-structs \ 51 -mflat -mno-flat -mno-faster-structs -mfaster-structs \
52 -m32 -m64 -mabi -mlittle-endian -mbig-endian -EL -EB -fPIC \ 52 -m32 -m64 -mabi -mlittle-endian -mbig-endian -EL -EB -fPIC \
53 -mlive-g0 -mcmodel -mstack-bias -mno-stack-bias \ 53 -mlive-g0 -mcmodel -mstack-bias -mno-stack-bias \
54 -msecure-plt -D*" 54 -msecure-plt -m*-toc -D* -U*"
55 55
56 # {C,CXX,F,FC}FLAGS that we are think is ok, but needs testing 56 # {C,CXX,F,FC}FLAGS that we are think is ok, but needs testing
57 # NOTE: currently -Os have issues with gcc3 and K6* arch's 57 # NOTE: currently -Os have issues with gcc3 and K6* arch's
58 export UNSTABLE_FLAGS="-Os -O3 -freorder-blocks" 58 export UNSTABLE_FLAGS="-Os -O3 -freorder-blocks"
59 return 0 59 return 0
71 -fPIC|-fpic|-fPIE|-fpie|-Wl,pie|-pie) 71 -fPIC|-fpic|-fPIE|-fpie|-Wl,pie|-pie)
72 gcc-specs-pie || continue 72 gcc-specs-pie || continue
73 is-flagq -nopie || append-flags -nopie;; 73 is-flagq -nopie || append-flags -nopie;;
74 -fstack-protector) 74 -fstack-protector)
75 gcc-specs-ssp || continue 75 gcc-specs-ssp || continue
76 is-flagq -fno-stack-protector || append-flags -fno-stack-protector;; 76 is-flagq -fno-stack-protector || append-flags $(test-flags -fno-stack-protector);;
77 -fstack-protector-all) 77 -fstack-protector-all)
78 gcc-specs-ssp-to-all || continue 78 gcc-specs-ssp-to-all || continue
79 is-flagq -fno-stack-protector-all || append-flags -fno-stack-protector-all;; 79 is-flagq -fno-stack-protector-all || append-flags $(test-flags -fno-stack-protector-all);;
80 -fno-strict-overflow)
81 gcc-specs-nostrict || continue
82 is-flagq -fstrict-overflow || append-flags $(test-flags -fstrict-overflow);;
80 esac 83 esac
81 done 84 done
82} 85}
83 86
84# Remove occurrences of strings from variable given in $1 87# Remove occurrences of strings from variable given in $1
128# @DESCRIPTION: 131# @DESCRIPTION:
129# Add extra <flags> to the current CPPFLAGS. 132# Add extra <flags> to the current CPPFLAGS.
130append-cppflags() { 133append-cppflags() {
131 [[ -z $* ]] && return 0 134 [[ -z $* ]] && return 0
132 export CPPFLAGS="${CPPFLAGS} $*" 135 export CPPFLAGS="${CPPFLAGS} $*"
136 return 0
137}
138
139# @FUNCTION: append-cxxflags
140# @USAGE: <flags>
141# @DESCRIPTION:
142# Add extra <flags> to the current CXXFLAGS.
143append-cxxflags() {
144 [[ -z $* ]] && return 0
145 export CXXFLAGS="${CXXFLAGS} $*"
133 return 0 146 return 0
134} 147}
135 148
136# @FUNCTION: append-fflags 149# @FUNCTION: append-fflags
137# @USAGE: <flags> 150# @USAGE: <flags>
553 ewarn "has_ssp_all: deprecated, please use gcc-specs-ssp()!" >&2 566 ewarn "has_ssp_all: deprecated, please use gcc-specs-ssp()!" >&2
554 567
555 # note; this matches only -fstack-protector-all 568 # note; this matches only -fstack-protector-all
556 [[ ${CFLAGS/-fstack-protector-all} != ${CFLAGS} || \ 569 [[ ${CFLAGS/-fstack-protector-all} != ${CFLAGS} || \
557 -n $(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __SSP_ALL__) ]] || \ 570 -n $(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __SSP_ALL__) ]] || \
558 gcc-specs-ssp-all 571 gcc-specs-ssp-to-all
559} 572}
560 573
561# @FUNCTION: has_ssp 574# @FUNCTION: has_ssp
562# @DESCRIPTION: 575# @DESCRIPTION:
563# DEPRECATED - use gcc-specs-ssp from toolchain-funcs 576# DEPRECATED - use gcc-specs-ssp from toolchain-funcs
689# @FUNCTION: bindnow-flags 702# @FUNCTION: bindnow-flags
690# @RETURN: Returns the flags to enable "now" binding in the current selected linker. 703# @RETURN: Returns the flags to enable "now" binding in the current selected linker.
691# @DESCRIPTION: 704# @DESCRIPTION:
692# DEPRECATED - Gets the flags needed for "NOW" binding 705# DEPRECATED - Gets the flags needed for "NOW" binding
693bindnow-flags() { 706bindnow-flags() {
694 ewarn "QA: stop using the bindnow-flags function ... simply drop it from your ebuild" >&2 707 ewarn "QA: stop using the bindnow-flags function ... simply drop it from your ebuild"
695
696 case $($(tc-getLD) -v 2>&1 </dev/null) in
697 *GNU* | *'with BFD'*) # GNU ld
698 echo "-Wl,-z,now" ;;
699 *Apple*) # Darwin ld
700 echo "-bind_at_load" ;;
701 *)
702 # Some linkers just recognize -V instead of -v
703 case $($(tc-getLD) -V 2>&1 </dev/null) in
704 *Solaris*) # Solaris accept almost the same GNU options
705 echo "-Wl,-z,now" ;;
706 esac
707 ;;
708 esac
709} 708}
710 709
711 710
712# Some tests for when we screw with things and want to make 711# Some tests for when we screw with things and want to make
713# sure we didn't break anything 712# sure we didn't break anything

Legend:
Removed from v.1.125  
changed lines
  Added in v.1.132

  ViewVC Help
Powered by ViewVC 1.1.20