/[gentoo-x86]/eclass/flag-o-matic.eclass
Gentoo

Diff of /eclass/flag-o-matic.eclass

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

Revision 1.1.1.1 Revision 1.79
1# Copyright 1999-2005 Gentoo Foundation 1# Copyright 1999-2004 Gentoo Foundation
2# Distributed under the terms of the GNU General Public License v2 2# Distributed under the terms of the GNU General Public License v2
3# $Header: /var/cvsroot/gentoo-x86/eclass/flag-o-matic.eclass,v 1.1.1.1 2005/11/30 09:59:19 chriswhite Exp $ 3# $Header: /var/cvsroot/gentoo-x86/eclass/flag-o-matic.eclass,v 1.79 2004/12/25 18:45:56 chriswhite Exp $
4#
5# Author Bart Verwilst <verwilst@gentoo.org>
4 6
7ECLASS=flag-o-matic
8INHERITED="$INHERITED $ECLASS"
9
10IUSE="debug"
5 11
6# need access to emktemp() 12# need access to emktemp()
7inherit eutils toolchain-funcs multilib 13inherit eutils toolchain-funcs
8 14
9# 15#
10#### filter-flags <flags> #### 16#### filter-flags <flags> ####
11# Remove particular flags from C[XX]FLAGS 17# Remove particular flags from C[XX]FLAGS
12# Matches only complete flags 18# Matches only complete flags
49# Add extra flags to your current LDFLAGS 55# Add extra flags to your current LDFLAGS
50# 56#
51#### filter-ldflags <flags> #### 57#### filter-ldflags <flags> ####
52# Remove particular flags from LDFLAGS 58# Remove particular flags from LDFLAGS
53# Matches only complete flags 59# Matches only complete flags
60#
61#### etexec-flags ####
62# hooked function for hardened gcc that appends
63# -fno-pic to {C,CXX,LD}FLAGS
64# when a package is filtering -fpic, -fPIC, -fpie, -fPIE
54# 65#
55#### fstack-flags #### 66#### fstack-flags ####
56# hooked function for hardened gcc that appends 67# hooked function for hardened gcc that appends
57# -fno-stack-protector to {C,CXX,LD}FLAGS 68# -fno-stack-protector to {C,CXX,LD}FLAGS
58# when a package is filtering -fstack-protector, -fstack-protector-all 69# when a package is filtering -fstack-protector, -fstack-protector-all
59# notice: modern automatic specs files will also suppress -fstack-protector-all 70# notice: modern automatic specs files will also suppress -fstack-protector-all
60# when only -fno-stack-protector is given 71# when only -fno-stack-protector is given
61# 72#
62#### bindnow-flags ####
63# Returns the flags to enable "now" binding in the current selected linker.
64#
65################ DEPRECATED functions ################
66# The following are still present to avoid breaking existing
67# code more than necessary; however they are deprecated. Please
68# use gcc-specs-* from toolchain-funcs.eclass instead, if you
69# need to know which hardened techs are active in the compiler.
70# See bug #100974
71#
72#### has_hardened ####
73# Returns true if the compiler has 'Hardened' in its version string,
74# (note; switched-spec vanilla compilers satisfy this condition) or
75# the specs file name contains 'hardened'.
76#
77#### has_pie ####
78# Returns true if the compiler by default or with current CFLAGS
79# builds position-independent code.
80#
81#### has_pic ####
82# Returns true if the compiler by default or with current CFLAGS
83# builds position-independent code.
84#
85#### has_ssp_all ####
86# Returns true if the compiler by default or with current CFLAGS
87# generates stack smash protections for all functions
88#
89#### has_ssp ####
90# Returns true if the compiler by default or with current CFLAGS
91# generates stack smash protections for most vulnerable functions
92#
93 73
94# C[XX]FLAGS that we allow in strip-flags 74# C[XX]FLAGS that we allow in strip-flags
95setup-allowed-flags() { 75setup-allowed-flags() {
96 if [[ -z ${ALLOWED_FLAGS} ]] ; then 76 if [ -z "${ALLOWED_FLAGS}" ] ; then
97 export ALLOWED_FLAGS="-pipe" 77 export ALLOWED_FLAGS="-pipe"
98 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -O -O0 -O1 -O2 -mcpu -march -mtune" 78 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -O -O0 -O1 -O2 -mcpu -march -mtune"
99 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fstack-protector -fstack-protector-all" 79 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fstack-protector -fno-stack-protector"
100 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fbounds-checking -fno-bounds-checking"
101 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-pie -fno-unit-at-a-time" 80 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-pie -fno-unit-at-a-time"
102 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -g -g0 -g1 -g2 -g3 -ggdb -ggdb0 -ggdb1 -ggdb2 -ggdb3" 81 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -g -g0 -g1 -g2 -g3 -ggdb -ggdb0 -ggdb1 -ggdb2 -ggdb3"
82 case "${ARCH}" in
83 mips) ALLOWED_FLAGS="${ALLOWED_FLAGS} -mips1 -mips2 -mips3 -mips4 -mips32 -mips64 -mips16 -EL -EB -mabi" ;;
84 amd64) ALLOWED_FLAGS="${ALLOWED_FLAGS} -fPIC -m64" ;;
85 x86) ALLOWED_FLAGS="${ALLOWED_FLAGS} -m32" ;;
86 alpha) ALLOWED_FLAGS="${ALLOWED_FLAGS} -fPIC" ;;
87 ia64) ALLOWED_FLAGS="${ALLOWED_FLAGS} -fPIC" ;;
88 sparc) ALLOWED_FLAGS="${ALLOWED_FLAGS} -m32 -m64" ;;
89 ppc) ALLOWED_FLAGS="${ALLOWED_FLAGS} -mabi" ;;
90 esac
103 fi 91 fi
104 # allow a bunch of flags that negate features / control ABI 92 # allow a bunch of flags that negate features / control ABI
105 ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-stack-protector -fno-stack-protector-all" 93 ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-stack-protector -fno-stack-protector-all"
106 ALLOWED_FLAGS="${ALLOWED_FLAGS} -mregparm -mno-app-regs -mapp-regs \ 94 case "${ARCH}" in
107 -mno-mmx -mno-sse -mno-sse2 -mno-sse3 -mno-3dnow \ 95 x86|amd64|ia64) ALLOWED_FLAGS="${ALLOWED_FLAGS} -mno-mmx -mno-sse -mno-sse2 -mno-sse3 -mno-3dnow" ;;
108 -mips1 -mips2 -mips3 -mips4 -mips32 -mips64 -mips16 \ 96 esac
109 -msoft-float -mno-soft-float -mhard-float -mno-hard-float -mfpu \ 97 ALLOWED_FLAGS="${ALLOWED_FLAGS} -mregparm -mno-app-regs -mapp-regs -msoft-float -mflat -mno-faster-structs -mfaster-structs -mlittle-endian -mbig-endian -mlive-g0 -mcmodel -mno-stack-bias -mstack-bias"
110 -mieee -mieee-with-inexact \
111 -mtls-direct-seg-refs -mno-tls-direct-seg-refs \
112 -mflat -mno-flat -mno-faster-structs -mfaster-structs \
113 -m32 -m64 -mabi -mlittle-endian -mbig-endian -EL -EB -fPIC \
114 -mlive-g0 -mcmodel -mstack-bias -mno-stack-bias"
115 98
116 # C[XX]FLAGS that we are think is ok, but needs testing 99 # C[XX]FLAGS that we are think is ok, but needs testing
117 # NOTE: currently -Os have issues with gcc3 and K6* arch's 100 # NOTE: currently -Os have issues with gcc3 and K6* arch's
118 export UNSTABLE_FLAGS="-Os -O3 -freorder-blocks -fprefetch-loop-arrays" 101 export UNSTABLE_FLAGS="-Os -O3 -freorder-blocks -fprefetch-loop-arrays"
119 return 0 102 return 0
120} 103}
121 104
122filter-flags() { 105filter-flags() {
123 local x f fset 106 local x f fset
124 declare -a new_CFLAGS new_CXXFLAGS 107 declare -a new_CFLAGS new_CXXFLAGS
125 108
126 for x in "$@" ; do 109 for x in "$@" ; do
127 case "${x}" in 110 case "${x}" in
128 -fPIC|-fpic|-fPIE|-fpie|-pie) 111 -fPIC|-fpic|-fPIE|-fpie|-pie) etexec-flags;;
129 append-flags `test_flag -fno-pie`;;
130 -fstack-protector|-fstack-protector-all) 112 -fstack-protector|-fstack-protector-all) fstack-flags;;
131 fstack-flags;;
132 esac 113 esac
133 done 114 done
134 115
135 for fset in CFLAGS CXXFLAGS; do 116 for fset in CFLAGS CXXFLAGS; do
136 # Looping over the flags instead of using a global 117 # Looping over the flags instead of using a global
149 130
150 return 0 131 return 0
151} 132}
152 133
153filter-lfs-flags() { 134filter-lfs-flags() {
154 [[ -n $@ ]] && die "filter-lfs-flags takes no arguments"
155 filter-flags -D_FILE_OFFSET_BITS=64 -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE 135 filter-flags -D_FILE_OFFSET_BITS=64 -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE
156} 136}
157 137
158append-lfs-flags() { 138append-lfs-flags() {
159 [[ -n $@ ]] && die "append-lfs-flags takes no arguments"
160 append-flags -D_FILE_OFFSET_BITS=64 -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE 139 append-flags -D_FILE_OFFSET_BITS=64 -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE
161} 140}
162 141
163append-flags() { 142append-flags() {
164 [[ -z $* ]] && return 0
165 export CFLAGS="${CFLAGS} $*" 143 export CFLAGS="${CFLAGS} $*"
166 export CXXFLAGS="${CXXFLAGS} $*" 144 export CXXFLAGS="${CXXFLAGS} $*"
167 [ -n "`is-flag -fno-stack-protector`" -o \ 145 [ -n "`is-flag -fno-stack-protector`" -o \
168 -n "`is-flag -fno-stack-protector-all`" ] && fstack-flags 146 -n "`is-flag -fno-stack-protector-all`" ] && fstack-flags
169 return 0 147 return 0
170} 148}
171 149
172replace-flags() { 150replace-flags() {
173 [[ $# != 2 ]] \
174 && echo && eerror "Usage: replace-flags <old flag> <new flag>" \
175 && die "replace-flags takes 2 arguments, not $#"
176
177 local f fset 151 local f fset
178 declare -a new_CFLAGS new_CXXFLAGS 152 declare -a new_CFLAGS new_CXXFLAGS
179 153
180 for fset in CFLAGS CXXFLAGS; do 154 for fset in CFLAGS CXXFLAGS; do
181 # Looping over the flags instead of using a global 155 # Looping over the flags instead of using a global
182 # substitution ensures that we're working with flag atoms. 156 # substitution ensures that we're working with flag atoms.
252 226
253 local NEW_CFLAGS="" 227 local NEW_CFLAGS=""
254 local NEW_CXXFLAGS="" 228 local NEW_CXXFLAGS=""
255 229
256 # Allow unstable C[XX]FLAGS if we are using unstable profile ... 230 # Allow unstable C[XX]FLAGS if we are using unstable profile ...
257 if has ~$(tc-arch) ${ACCEPT_KEYWORDS} ; then 231 if has ~${ARCH} ${ACCEPT_KEYWORDS} ; then
232 use debug && einfo "Enabling the use of some unstable flags"
258 ALLOWED_FLAGS="${ALLOWED_FLAGS} ${UNSTABLE_FLAGS}" 233 ALLOWED_FLAGS="${ALLOWED_FLAGS} ${UNSTABLE_FLAGS}"
259 fi 234 fi
260 235
261 set -f # disable pathname expansion 236 set -f # disable pathname expansion
262 237
310 return 1 285 return 1
311 fi 286 fi
312} 287}
313 288
314strip-unsupported-flags() { 289strip-unsupported-flags() {
315 local x NEW_CFLAGS NEW_CXXFLAGS 290 local NEW_CFLAGS NEW_CXXFLAGS
316 291
317 for x in ${CFLAGS} ; do 292 for x in ${CFLAGS} ; do
318 NEW_CFLAGS="${NEW_CFLAGS} $(test_flag ${x})" 293 NEW_CFLAGS="${NEW_CFLAGS} `test_flag ${x}`"
319 done 294 done
320 for x in ${CXXFLAGS} ; do 295 for x in ${CXXFLAGS} ; do
321 NEW_CXXFLAGS="${NEW_CXXFLAGS} $(test_flag ${x})" 296 NEW_CXXFLAGS="${NEW_CXXFLAGS} `test_flag ${x}`"
322 done 297 done
323 298
324 export CFLAGS=${NEW_CFLAGS} 299 export CFLAGS="${NEW_CFLAGS}"
325 export CXXFLAGS=${NEW_CXXFLAGS} 300 export CXXFLAGS="${NEW_CXXFLAGS}"
326} 301}
327 302
328get-flag() { 303get-flag() {
329 local f findflag="$1" 304 local f findflag="$1"
330 305
340 fi 315 fi
341 done 316 done
342 return 1 317 return 1
343} 318}
344 319
345# DEPRECATED - use gcc-specs-relro or gcc-specs-now from toolchain-funcs
346has_hardened() { 320has_hardened() {
347 test_version_info Hardened && return 0 321 test_version_info Hardened && return 0
348 # the specs file wont exist unless gcc has GCC_SPECS support 322 # the specs file wont exist unless gcc has GCC_SPECS support
349 [ -f "${GCC_SPECS}" -a "${GCC_SPECS}" != "${GCC_SPECS/hardened/}" ] && \ 323 [ -f "${GCC_SPECS}" -a "${GCC_SPECS}" != "${GCC_SPECS/hardened/}" ] && \
350 return 0 324 return 0
351 return 1 325 return 1
352} 326}
353 327
354# DEPRECATED - use gcc-specs-pie from toolchain-funcs
355# indicate whether PIC is set
356has_pic() { 328has_pic() {
357 [ "${CFLAGS/-fPIC}" != "${CFLAGS}" ] && return 0 329 [ "${CFLAGS/-fPIC}" != "${CFLAGS}" ] && return 0
358 [ "${CFLAGS/-fpic}" != "${CFLAGS}" ] && return 0 330 [ "${CFLAGS/-fpic}" != "${CFLAGS}" ] && return 0
359 [ "$(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIC__)" ] && return 0 331 test_version_info pie && return 0
360 return 1 332 return 1
361} 333}
362 334
363# DEPRECATED - use gcc-specs-pie from toolchain-funcs
364# indicate whether PIE is set
365has_pie() { 335has_pie() {
366 [ "${CFLAGS/-fPIE}" != "${CFLAGS}" ] && return 0 336 [ "${CFLAGS/-fPIE}" != "${CFLAGS}" ] && return 0
367 [ "${CFLAGS/-fpie}" != "${CFLAGS}" ] && return 0 337 [ "${CFLAGS/-fpie}" != "${CFLAGS}" ] && return 0
368 [ "$(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIE__)" ] && return 0 338 test_version_info pie && return 0
369 # test PIC while waiting for specs to be updated to generate __PIE__
370 [ "$(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIC__)" ] && return 0
371 return 1 339 return 1
372} 340}
373 341
374# DEPRECATED - use gcc-specs-ssp from toolchain-funcs
375# indicate whether code for SSP is being generated for all functions
376has_ssp_all() {
377 # note; this matches only -fstack-protector-all
378 [ "${CFLAGS/-fstack-protector-all}" != "${CFLAGS}" ] && return 0
379 [ "$(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __SSP_ALL__)" ] && return 0
380 gcc-specs-ssp && return 0
381 return 1
382}
383
384# DEPRECATED - use gcc-specs-ssp from toolchain-funcs
385# indicate whether code for SSP is being generated
386has_ssp() { 342has_ssp() {
387 # note; this matches both -fstack-protector and -fstack-protector-all
388 [ "${CFLAGS/-fstack-protector}" != "${CFLAGS}" ] && return 0 343 [ "${CFLAGS/-fstack-protector}" != "${CFLAGS}" ] && return 0
389 [ "$(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __SSP__)" ] && return 0 344 test_version_info ssp && return 0
390 gcc-specs-ssp && return 0
391 return 1 345 return 1
392} 346}
393 347
394has_m64() { 348has_m64() {
395 # this doesnt test if the flag is accepted, it tests if the flag 349 # this doesnt test if the flag is accepted, it tests if the flag
409has_m32() { 363has_m32() {
410 # this doesnt test if the flag is accepted, it tests if the flag 364 # this doesnt test if the flag is accepted, it tests if the flag
411 # actually -WORKS-. non-multilib gcc will take both -m32 and -m64! 365 # actually -WORKS-. non-multilib gcc will take both -m32 and -m64!
412 # please dont replace this function with test_flag in some future 366 # please dont replace this function with test_flag in some future
413 # clean-up! 367 # clean-up!
414
415 [ "$(tc-arch)" = "amd64" ] && has_multilib_profile && return 0
416
417 local temp=$(emktemp) 368 local temp="$(emktemp)"
418 echo "int main() { return(0); }" > "${temp}".c 369 echo "int main() { return(0); }" > ${temp}.c
419 MY_CC=$(tc-getCC) 370 MY_CC=$(tc-getCC)
420 ${MY_CC/ .*/} -m32 -o "$(emktemp)" "${temp}".c > /dev/null 2>&1 371 ${MY_CC/ .*/} -m32 -o "$(emktemp)" ${temp}.c > /dev/null 2>&1
421 local ret=$? 372 local ret=$?
422 rm -f "${temp}".c 373 rm -f ${temp}.c
423 [ "$ret" != "1" ] && return 0 374 [ "$ret" != "1" ] && return 0
424 return 1 375 return 1
425} 376}
426 377
427replace-sparc64-flags() { 378replace-sparc64-flags() {
428 local SPARC64_CPUS="ultrasparc v9" 379 local SPARC64_CPUS="ultrasparc v9"
429 380
430 if [ "${CFLAGS/mtune}" != "${CFLAGS}" ]; then 381 if [ "${CFLAGS/mtune}" != "${CFLAGS}" ]; then
431 for x in ${SPARC64_CPUS}; do 382 for x in ${SPARC64_CPUS}; do
432 CFLAGS="${CFLAGS/-mcpu=${x}/-mcpu=v8}" 383 CFLAGS="${CFLAGS/-mcpu=${x}/-mcpu=v8}"
433 done 384 done
434 else 385 else
435 for x in ${SPARC64_CPUS}; do 386 for x in ${SPARC64_CPUS}; do
436 CFLAGS="${CFLAGS/-mcpu=${x}/-mcpu=v8 -mtune=${x}}" 387 CFLAGS="${CFLAGS/-mcpu=${x}/-mcpu=v8 -mtune=${x}}"
437 done 388 done
438 fi 389 fi
439 390
440 if [ "${CXXFLAGS/mtune}" != "${CXXFLAGS}" ]; then 391 if [ "${CXXFLAGS/mtune}" != "${CXXFLAGS}" ]; then
441 for x in ${SPARC64_CPUS}; do 392 for x in ${SPARC64_CPUS}; do
442 CXXFLAGS="${CXXFLAGS/-mcpu=${x}/-mcpu=v8}" 393 CXXFLAGS="${CXXFLAGS/-mcpu=${x}/-mcpu=v8}"
443 done 394 done
444 else 395 else
445 for x in ${SPARC64_CPUS}; do 396 for x in ${SPARC64_CPUS}; do
460 411
461 # we do this fancy spacing stuff so as to not filter 412 # we do this fancy spacing stuff so as to not filter
462 # out part of a flag ... we want flag atoms ! :D 413 # out part of a flag ... we want flag atoms ! :D
463 LDFLAGS=" ${LDFLAGS} " 414 LDFLAGS=" ${LDFLAGS} "
464 for x in "$@" ; do 415 for x in "$@" ; do
465 LDFLAGS=${LDFLAGS// ${x} / } 416 LDFLAGS="${LDFLAGS// ${x} / }"
466 done 417 done
467 [[ -z ${LDFLAGS// } ]] \
468 && LDFLAGS="" \
469 || LDFLAGS=${LDFLAGS:1:${#LDFLAGS}-2} 418 LDFLAGS="${LDFLAGS:1:${#LDFLAGS}-2}"
470 export LDFLAGS 419 export LDFLAGS
471 return 0 420 return 0
472} 421}
473 422
423etexec-flags() {
424 # if you're not using a hardened compiler you wont need this
425 # PIC/no-pic kludge in the first place.
426 has_hardened || return 0
427 use amd64 && return 0
428 use mips && return 0
429
430 if has_pie || has_pic; then
431 [ -z "`is-flag -fno-pic`" ] &&
432 export CFLAGS="${CFLAGS} `test_flag -fno-pic`"
433 [ -z "`is-flag -nopie`" ] &&
434 export CFLAGS="${CFLAGS} `test_flag -nopie`"
435 fi
436 return 0
437}
438
474fstack-flags() { 439fstack-flags() {
475 if gcc-specs-ssp; then 440 if has_ssp; then
476 [ -z "`is-flag -fno-stack-protector`" ] && 441 [ -z "`is-flag -fno-stack-protector`" ] &&
477 export CFLAGS="${CFLAGS} `test_flag -fno-stack-protector`" 442 export CFLAGS="${CFLAGS} `test_flag -fno-stack-protector`"
478 fi 443 fi
479 return 0 444 return 0
480} 445}
481 446
483# bug #9016. Also thanks to Jukka Salmi <salmi@gmx.net> (bug #13907) for more 448# bug #9016. Also thanks to Jukka Salmi <salmi@gmx.net> (bug #13907) for more
484# fixes. 449# fixes.
485# 450#
486# Export CFLAGS and CXXFLAGS that are compadible with gcc-2.95.3 451# Export CFLAGS and CXXFLAGS that are compadible with gcc-2.95.3
487gcc2-flags() { 452gcc2-flags() {
488 if [[ $(tc-arch) == "x86" || $(tc-arch) == "amd64" ]] ; then 453 CFLAGS=${CFLAGS//pentium-mmx/i586}
489 CFLAGS=${CFLAGS//-mtune=/-mcpu=} 454 CFLAGS=${CFLAGS//pentium[234]/i686}
490 CXXFLAGS=${CXXFLAGS//-mtune=/-mcpu=} 455 CFLAGS=${CFLAGS//k6-[23]/k6}
491 fi 456 CFLAGS=${CFLAGS//athlon-tbird/i686}
457 CFLAGS=${CFLAGS//athlon-4/i686}
458 CFLAGS=${CFLAGS//athlon-[xm]p/i686}
459 CFLAGS=${CFLAGS//athlon/i686}
492 460
493 replace-cpu-flags k6-{2,3} k6 461 CXXFLAGS=${CXXFLAGS//pentium-mmx/i586}
494 replace-cpu-flags athlon{,-{tbird,4,xp,mp}} i686 462 CXXFLAGS=${CXXFLAGS//pentium[234]/i686}
463 CXXFLAGS=${CXXFLAGS//k6-[23]/k6}
464 CXXFLAGS=${CXXFLAGS//athlon-tbird/i686}
465 CXXFLAGS=${CXXFLAGS//athlon-4/i686}
466 CXXFLAGS=${CXXFLAGS//athlon-[xm]p/i686}
467 CXXFLAGS=${CXXFLAGS//athlon/i686}
495 468
496 replace-cpu-flags pentium-mmx i586 469 if [ "$ARCH" = alpha ]; then
497 replace-cpu-flags pentium{2,3,4} i686 470 CHOST=${CHOST/#alphaev6[78]/alphaev6}
498 471 CFLAGS=${CFLAGS//ev6[78]/ev6}
499 replace-cpu-flags ev6{7,8} ev6 472 CXXFLAGS=${CXXFLAGS//ev6[78]/ev6}
473 fi
500 474
501 export CFLAGS CXXFLAGS 475 export CFLAGS CXXFLAGS
502} 476}
503
504# Gets the flags needed for "NOW" binding
505bindnow-flags() {
506 case $($(tc-getLD) -v 2>&1 </dev/null) in
507 *GNU* | *'with BFD'*) # GNU ld
508 echo "-Wl,-z,now" ;;
509 *Apple*) # Darwin ld
510 echo "-bind_at_load" ;;
511 *)
512 # Some linkers just recognize -V instead of -v
513 case $($(tc-getLD) -V 2>&1 </dev/null) in
514 *Solaris*) # Solaris accept almost the same GNU options
515 echo "-Wl,-z,now" ;;
516 esac
517 ;;
518 esac
519}

Legend:
Removed from v.1.1.1.1  
changed lines
  Added in v.1.79

  ViewVC Help
Powered by ViewVC 1.1.20