/[gentoo-x86]/eclass/flag-o-matic.eclass
Gentoo

Diff of /eclass/flag-o-matic.eclass

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

Revision 1.132 Revision 1.151
1# Copyright 1999-2009 Gentoo Foundation 1# Copyright 1999-2009 Gentoo Foundation
2# Distributed under the terms of the GNU General Public License v2 2# Distributed under the terms of the GNU General Public License v2
3# $Header: /var/cvsroot/gentoo-x86/eclass/flag-o-matic.eclass,v 1.132 2009/01/21 00:42:20 gengor Exp $ 3# $Header: /var/cvsroot/gentoo-x86/eclass/flag-o-matic.eclass,v 1.151 2011/07/12 03:58:11 vapier Exp $
4 4
5# @ECLASS: flag-o-matic.eclass 5# @ECLASS: flag-o-matic.eclass
6# @MAINTAINER: 6# @MAINTAINER:
7# toolchain@gentoo.org 7# toolchain@gentoo.org
8# @BLURB: common functions to manipulate and query toolchain flags 8# @BLURB: common functions to manipulate and query toolchain flags
34 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -O -O0 -O1 -O2 -mcpu -march -mtune" 34 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -O -O0 -O1 -O2 -mcpu -march -mtune"
35 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fstack-protector -fstack-protector-all" 35 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fstack-protector -fstack-protector-all"
36 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fbounds-checking -fno-strict-overflow" 36 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fbounds-checking -fno-strict-overflow"
37 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-PIE -fno-pie -fno-unit-at-a-time" 37 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-PIE -fno-pie -fno-unit-at-a-time"
38 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -g -g[0-9] -ggdb -ggdb[0-9] -gstabs -gstabs+" 38 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -g -g[0-9] -ggdb -ggdb[0-9] -gstabs -gstabs+"
39 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-ident" 39 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-ident -fpermissive"
40 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -W* -w" 40 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -W* -w"
41 fi 41 fi
42 # allow a bunch of flags that negate features / control ABI 42 # allow a bunch of flags that negate features / control ABI
43 ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-stack-protector -fno-stack-protector-all \ 43 ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-stack-protector -fno-stack-protector-all \
44 -fno-strict-aliasing -fno-bounds-checking -fstrict-overflow" 44 -fno-strict-aliasing -fno-bounds-checking -fstrict-overflow -fno-omit-frame-pointer"
45 ALLOWED_FLAGS="${ALLOWED_FLAGS} -mregparm -mno-app-regs -mapp-regs \ 45 ALLOWED_FLAGS="${ALLOWED_FLAGS} -mregparm -mno-app-regs -mapp-regs \
46 -mno-mmx -mno-sse -mno-sse2 -mno-sse3 -mno-3dnow \ 46 -mno-mmx -mno-sse -mno-sse2 -mno-sse3 -mno-ssse3 -mno-sse4 -mno-sse4.1 \
47 -mno-sse4.2 -mno-avx -mno-aes -mno-pclmul -mno-sse4a -mno-3dnow \
48 -mno-popcnt -mno-abm \
47 -mips1 -mips2 -mips3 -mips4 -mips32 -mips64 -mips16 \ 49 -mips1 -mips2 -mips3 -mips4 -mips32 -mips64 -mips16 -mplt \
48 -msoft-float -mno-soft-float -mhard-float -mno-hard-float -mfpu \ 50 -msoft-float -mno-soft-float -mhard-float -mno-hard-float -mfpu \
49 -mieee -mieee-with-inexact -mschedule \ 51 -mieee -mieee-with-inexact -mschedule -mfloat-gprs -mspe -mno-spe \
50 -mtls-direct-seg-refs -mno-tls-direct-seg-refs \ 52 -mtls-direct-seg-refs -mno-tls-direct-seg-refs \
51 -mflat -mno-flat -mno-faster-structs -mfaster-structs \ 53 -mflat -mno-flat -mno-faster-structs -mfaster-structs \
52 -m32 -m64 -mabi -mlittle-endian -mbig-endian -EL -EB -fPIC \ 54 -m32 -m64 -mabi -mlittle-endian -mbig-endian -EL -EB -fPIC \
53 -mlive-g0 -mcmodel -mstack-bias -mno-stack-bias \ 55 -mlive-g0 -mcmodel -mstack-bias -mno-stack-bias \
54 -msecure-plt -m*-toc -D* -U*" 56 -msecure-plt -m*-toc -D* -U*"
57
58 # 4.5
59 ALLOWED_FLAGS="${ALLOWED_FLAGS} -mno-fma4 -mno-movbe -mno-xop -mno-lwp"
60 # 4.6
61 ALLOWED_FLAGS="${ALLOWED_FLAGS} -mno-fsgsbase -mno-rdrnd -mno-f16c \
62 -mno-bmi -mno-tbm"
55 63
56 # {C,CXX,F,FC}FLAGS that we are think is ok, but needs testing 64 # {C,CXX,F,FC}FLAGS that we are think is ok, but needs testing
57 # NOTE: currently -Os have issues with gcc3 and K6* arch's 65 # NOTE: currently -Os have issues with gcc3 and K6* arch's
58 export UNSTABLE_FLAGS="-Os -O3 -freorder-blocks" 66 export UNSTABLE_FLAGS="-Os -O3 -freorder-blocks"
59 return 0 67 return 0
134 [[ -z $* ]] && return 0 142 [[ -z $* ]] && return 0
135 export CPPFLAGS="${CPPFLAGS} $*" 143 export CPPFLAGS="${CPPFLAGS} $*"
136 return 0 144 return 0
137} 145}
138 146
147# @FUNCTION: append-cflags
148# @USAGE: <flags>
149# @DESCRIPTION:
150# Add extra <flags> to the current CFLAGS.
151append-cflags() {
152 [[ -z $* ]] && return 0
153 export CFLAGS="${CFLAGS} $*"
154 return 0
155}
156
139# @FUNCTION: append-cxxflags 157# @FUNCTION: append-cxxflags
140# @USAGE: <flags> 158# @USAGE: <flags>
141# @DESCRIPTION: 159# @DESCRIPTION:
142# Add extra <flags> to the current CXXFLAGS. 160# Add extra <flags> to the current CXXFLAGS.
143append-cxxflags() { 161append-cxxflags() {
169# @USAGE: <flags> 187# @USAGE: <flags>
170# @DESCRIPTION: 188# @DESCRIPTION:
171# Add extra <flags> to your current {C,CXX,F,FC}FLAGS. 189# Add extra <flags> to your current {C,CXX,F,FC}FLAGS.
172append-flags() { 190append-flags() {
173 [[ -z $* ]] && return 0 191 [[ -z $* ]] && return 0
174 export CFLAGS="${CFLAGS} $*" 192 append-cflags "$@"
175 export CXXFLAGS="${CXXFLAGS} $*" 193 append-cxxflags "$@"
176 export FFLAGS="${FFLAGS} $*" 194 append-fflags "$@"
177 export FCFLAGS="${FCFLAGS} $*"
178 return 0 195 return 0
179} 196}
180 197
181# @FUNCTION: replace-flags 198# @FUNCTION: replace-flags
182# @USAGE: <old> <new> 199# @USAGE: <old> <new>
312 local NEW_CXXFLAGS="" 329 local NEW_CXXFLAGS=""
313 local NEW_FFLAGS="" 330 local NEW_FFLAGS=""
314 local NEW_FCFLAGS="" 331 local NEW_FCFLAGS=""
315 332
316 # Allow unstable C[XX]FLAGS if we are using unstable profile ... 333 # Allow unstable C[XX]FLAGS if we are using unstable profile ...
317 if has ~$(tc-arch) ${ACCEPT_KEYWORDS} ; then 334 if has "~$(tc-arch)" ${ACCEPT_KEYWORDS} ; then
318 ALLOWED_FLAGS="${ALLOWED_FLAGS} ${UNSTABLE_FLAGS}" 335 ALLOWED_FLAGS="${ALLOWED_FLAGS} ${UNSTABLE_FLAGS}"
319 fi 336 fi
320 337
321 set -f # disable pathname expansion 338 set -f # disable pathname expansion
322 339
467# @USAGE: <flags> 484# @USAGE: <flags>
468# @DESCRIPTION: 485# @DESCRIPTION:
469# Short-hand that should hopefully work for both C and C++ compiler, but 486# Short-hand that should hopefully work for both C and C++ compiler, but
470# its really only present due to the append-flags() abomination. 487# its really only present due to the append-flags() abomination.
471test-flags() { test-flags-CC "$@"; } 488test-flags() { test-flags-CC "$@"; }
472
473# @FUNCTION: test_flag
474# @DESCRIPTION:
475# DEPRICIATED, use test-flags()
476test_flag() {
477 ewarn "test_flag: deprecated, please use test-flags()!" >&2
478
479 test-flags-CC "$@"
480}
481 489
482# @FUNCTION: test_version_info 490# @FUNCTION: test_version_info
483# @USAGE: <version> 491# @USAGE: <version>
484# @DESCRIPTION: 492# @DESCRIPTION:
485# Returns shell true if the current C compiler version matches <version>, else returns shell false. 493# Returns shell true if the current C compiler version matches <version>, else returns shell false.
521 fi 529 fi
522 done 530 done
523 return 1 531 return 1
524} 532}
525 533
526# @FUNCTION: has_hardened 534# DEAD FUNCS. Remove by Dec 2011.
527# @DESCRIPTION: 535test_flag() { die "$0: deprecated, please use test-flags()!" ; }
528# DEPRECATED - use gcc-specs-relro or gcc-specs-now from toolchain-funcs
529has_hardened() {
530 ewarn "has_hardened: deprecated, please use gcc-specs-{relro,now}()!" >&2 536has_hardened() { die "$0: deprecated, please use gcc-specs-{relro,now}()!" ; }
531
532 test_version_info Hardened && return 0
533 # The specs file wont exist unless gcc has GCC_SPECS support
534 [[ -f ${GCC_SPECS} && ${GCC_SPECS} != ${GCC_SPECS/hardened/} ]]
535}
536
537# @FUNCTION: has_pic
538# @DESCRIPTION:
539# DEPRECATED - use gcc-specs-pie from toolchain-funcs
540# indicate whether PIC is set
541has_pic() {
542 ewarn "has_pic: deprecated, please use gcc-specs-pie()!" >&2 537has_pic() { die "$0: deprecated, please use gcc-specs-pie()!" ; }
543
544 [[ ${CFLAGS/-fPIC} != ${CFLAGS} || \
545 ${CFLAGS/-fpic} != ${CFLAGS} ]] || \
546 gcc-specs-pie
547}
548
549# @FUNCTION: has_pie
550# @DESCRIPTION:
551# DEPRECATED - use gcc-specs-pie from toolchain-funcs
552# indicate whether PIE is set
553has_pie() {
554 ewarn "has_pie: deprecated, please use gcc-specs-pie()!" >&2 538has_pie() { die "$0: deprecated, please use gcc-specs-pie()!" ; }
555
556 [[ ${CFLAGS/-fPIE} != ${CFLAGS} || \
557 ${CFLAGS/-fpie} != ${CFLAGS} ]] || \
558 gcc-specs-pie
559}
560
561# @FUNCTION: has_ssp_all
562# @DESCRIPTION:
563# DEPRECATED - use gcc-specs-ssp from toolchain-funcs
564# indicate whether code for SSP is being generated for all functions
565has_ssp_all() {
566 ewarn "has_ssp_all: deprecated, please use gcc-specs-ssp()!" >&2 539has_ssp_all() { die "$0: deprecated, please use gcc-specs-ssp()!" ; }
567
568 # note; this matches only -fstack-protector-all
569 [[ ${CFLAGS/-fstack-protector-all} != ${CFLAGS} || \
570 -n $(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __SSP_ALL__) ]] || \
571 gcc-specs-ssp-to-all
572}
573
574# @FUNCTION: has_ssp
575# @DESCRIPTION:
576# DEPRECATED - use gcc-specs-ssp from toolchain-funcs
577# indicate whether code for SSP is being generated
578has_ssp() {
579 ewarn "has_ssp: deprecated, please use gcc-specs-ssp()!" >&2 540has_ssp() { die "$0: deprecated, please use gcc-specs-ssp()!" ; }
580
581 # note; this matches both -fstack-protector and -fstack-protector-all
582 [[ ${CFLAGS/-fstack-protector} != ${CFLAGS} || \
583 -n $(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __SSP__) ]] || \
584 gcc-specs-ssp
585}
586 541
587# @FUNCTION: has_m64 542# @FUNCTION: has_m64
588# @DESCRIPTION: 543# @DESCRIPTION:
589# This doesn't test if the flag is accepted, it tests if the flag actually 544# This doesn't test if the flag is accepted, it tests if the flag actually
590# WORKS. Non-multilib gcc will take both -m32 and -m64. If the flag works 545# WORKS. Non-multilib gcc will take both -m32 and -m64. If the flag works
653 CXXFLAGS="${CXXFLAGS/-mcpu=${x}/-mcpu=v8 -mtune=${x}}" 608 CXXFLAGS="${CXXFLAGS/-mcpu=${x}/-mcpu=v8 -mtune=${x}}"
654 done 609 done
655 fi 610 fi
656 611
657 export CFLAGS CXXFLAGS 612 export CFLAGS CXXFLAGS
613}
614
615# @FUNCTION: append-libs
616# @USAGE: <libs>
617# @DESCRIPTION:
618# Add extra <libs> to the current LIBS.
619append-libs() {
620 [[ -z $* ]] && return 0
621 local flag
622 for flag in "$@"; do
623 [[ ${flag} == -l* ]] && flag=${flag#-l}
624 export LIBS="${LIBS} -l${flag}"
625 done
626
627 return 0
658} 628}
659 629
660# @FUNCTION: append-ldflags 630# @FUNCTION: append-ldflags
661# @USAGE: <flags> 631# @USAGE: <flags>
662# @DESCRIPTION: 632# @DESCRIPTION:
697 set -- "$@" ${x//,/ } 667 set -- "$@" ${x//,/ }
698 done 668 done
699 echo "$@" 669 echo "$@"
700} 670}
701 671
702# @FUNCTION: bindnow-flags 672# @FUNCTION: no-as-needed
703# @RETURN: Returns the flags to enable "now" binding in the current selected linker. 673# @RETURN: Flag to disable asneeded behavior for use with append-ldflags.
704# @DESCRIPTION: 674no-as-needed() {
705# DEPRECATED - Gets the flags needed for "NOW" binding 675 case $($(tc-getLD) -v 2>&1 </dev/null) in
706bindnow-flags() { 676 *GNU*) # GNU ld
707 ewarn "QA: stop using the bindnow-flags function ... simply drop it from your ebuild" 677 echo "-Wl,--no-as-needed" ;;
678 esac
708} 679}
709
710 680
711# Some tests for when we screw with things and want to make 681# Some tests for when we screw with things and want to make
712# sure we didn't break anything 682# sure we didn't break anything
713#TESTS() { 683#TESTS() {
714# CFLAGS="-a -b -c=1" 684# CFLAGS="-a -b -c=1"

Legend:
Removed from v.1.132  
changed lines
  Added in v.1.151

  ViewVC Help
Powered by ViewVC 1.1.20