/[gentoo-x86]/eclass/flag-o-matic.eclass
Gentoo

Diff of /eclass/flag-o-matic.eclass

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

Revision 1.79 Revision 1.93
1# Copyright 1999-2004 Gentoo Foundation 1# Copyright 1999-2005 Gentoo Foundation
2# Distributed under the terms of the GNU General Public License v2 2# Distributed under the terms of the GNU General Public License v2
3# $Header: /var/cvsroot/gentoo-x86/eclass/flag-o-matic.eclass,v 1.79 2004/12/25 18:45:56 chriswhite Exp $ 3# $Header: /var/cvsroot/gentoo-x86/eclass/flag-o-matic.eclass,v 1.93 2005/09/27 01:06:47 vapier Exp $
4#
5# Author Bart Verwilst <verwilst@gentoo.org>
6 4
7ECLASS=flag-o-matic
8INHERITED="$INHERITED $ECLASS"
9
10IUSE="debug"
11 5
12# need access to emktemp() 6# need access to emktemp()
13inherit eutils toolchain-funcs 7inherit eutils toolchain-funcs multilib
14 8
15# 9#
16#### filter-flags <flags> #### 10#### filter-flags <flags> ####
17# Remove particular flags from C[XX]FLAGS 11# Remove particular flags from C[XX]FLAGS
18# Matches only complete flags 12# Matches only complete flags
55# Add extra flags to your current LDFLAGS 49# Add extra flags to your current LDFLAGS
56# 50#
57#### filter-ldflags <flags> #### 51#### filter-ldflags <flags> ####
58# Remove particular flags from LDFLAGS 52# Remove particular flags from LDFLAGS
59# Matches only complete flags 53# Matches only complete flags
60#
61#### etexec-flags ####
62# hooked function for hardened gcc that appends
63# -fno-pic to {C,CXX,LD}FLAGS
64# when a package is filtering -fpic, -fPIC, -fpie, -fPIE
65# 54#
66#### fstack-flags #### 55#### fstack-flags ####
67# hooked function for hardened gcc that appends 56# hooked function for hardened gcc that appends
68# -fno-stack-protector to {C,CXX,LD}FLAGS 57# -fno-stack-protector to {C,CXX,LD}FLAGS
69# when a package is filtering -fstack-protector, -fstack-protector-all 58# when a package is filtering -fstack-protector, -fstack-protector-all
70# notice: modern automatic specs files will also suppress -fstack-protector-all 59# notice: modern automatic specs files will also suppress -fstack-protector-all
71# when only -fno-stack-protector is given 60# when only -fno-stack-protector is given
72# 61#
62#
63################ DEPRECATED functions ################
64# The following are still present to avoid breaking existing
65# code more than necessary; however they are deprecated. Please
66# use gcc-specs-* from toolchain-funcs.eclass instead, if you
67# need to know which hardened techs are active in the compiler.
68# See bug #100974
69#
70#### has_hardened ####
71# Returns true if the compiler has 'Hardened' in its version string,
72# (note; switched-spec vanilla compilers satisfy this condition) or
73# the specs file name contains 'hardened'.
74#
75#### has_pie ####
76# Returns true if the compiler by default or with current CFLAGS
77# builds position-independent code.
78#
79#### has_pic ####
80# Returns true if the compiler by default or with current CFLAGS
81# builds position-independent code.
82#
83#### has_ssp_all ####
84# Returns true if the compiler by default or with current CFLAGS
85# generates stack smash protections for all functions
86#
87#### has_ssp ####
88# Returns true if the compiler by default or with current CFLAGS
89# generates stack smash protections for most vulnerable functions
90#
73 91
74# C[XX]FLAGS that we allow in strip-flags 92# C[XX]FLAGS that we allow in strip-flags
75setup-allowed-flags() { 93setup-allowed-flags() {
76 if [ -z "${ALLOWED_FLAGS}" ] ; then 94 if [[ -z ${ALLOWED_FLAGS} ]] ; then
77 export ALLOWED_FLAGS="-pipe" 95 export ALLOWED_FLAGS="-pipe"
78 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -O -O0 -O1 -O2 -mcpu -march -mtune" 96 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -O -O0 -O1 -O2 -mcpu -march -mtune"
79 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fstack-protector -fno-stack-protector" 97 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fstack-protector -fstack-protector-all"
98 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fbounds-checking -fno-bounds-checking"
80 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-pie -fno-unit-at-a-time" 99 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-pie -fno-unit-at-a-time"
81 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -g -g0 -g1 -g2 -g3 -ggdb -ggdb0 -ggdb1 -ggdb2 -ggdb3" 100 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -g -g0 -g1 -g2 -g3 -ggdb -ggdb0 -ggdb1 -ggdb2 -ggdb3"
82 case "${ARCH}" in
83 mips) ALLOWED_FLAGS="${ALLOWED_FLAGS} -mips1 -mips2 -mips3 -mips4 -mips32 -mips64 -mips16 -EL -EB -mabi" ;;
84 amd64) ALLOWED_FLAGS="${ALLOWED_FLAGS} -fPIC -m64" ;;
85 x86) ALLOWED_FLAGS="${ALLOWED_FLAGS} -m32" ;;
86 alpha) ALLOWED_FLAGS="${ALLOWED_FLAGS} -fPIC" ;;
87 ia64) ALLOWED_FLAGS="${ALLOWED_FLAGS} -fPIC" ;;
88 sparc) ALLOWED_FLAGS="${ALLOWED_FLAGS} -m32 -m64" ;;
89 ppc) ALLOWED_FLAGS="${ALLOWED_FLAGS} -mabi" ;;
90 esac
91 fi 101 fi
92 # allow a bunch of flags that negate features / control ABI 102 # allow a bunch of flags that negate features / control ABI
93 ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-stack-protector -fno-stack-protector-all" 103 ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-stack-protector -fno-stack-protector-all"
94 case "${ARCH}" in 104 ALLOWED_FLAGS="${ALLOWED_FLAGS} -mregparm -mno-app-regs -mapp-regs \
95 x86|amd64|ia64) ALLOWED_FLAGS="${ALLOWED_FLAGS} -mno-mmx -mno-sse -mno-sse2 -mno-sse3 -mno-3dnow" ;; 105 -mno-mmx -mno-sse -mno-sse2 -mno-sse3 -mno-3dnow \
96 esac 106 -mips1 -mips2 -mips3 -mips4 -mips32 -mips64 -mips16 \
97 ALLOWED_FLAGS="${ALLOWED_FLAGS} -mregparm -mno-app-regs -mapp-regs -msoft-float -mflat -mno-faster-structs -mfaster-structs -mlittle-endian -mbig-endian -mlive-g0 -mcmodel -mno-stack-bias -mstack-bias" 107 -msoft-float -mno-soft-float -mhard-float -mno-hard-float -mfpu \
108 -mieee -mieee-with-inexact \
109 -mtls-direct-seg-refs -mno-tls-direct-seg-refs \
110 -mflat -mno-flat -mno-faster-structs -mfaster-structs \
111 -m32 -m64 -mabi -mlittle-endian -mbig-endian -EL -EB -fPIC \
112 -mlive-g0 -mcmodel -mstack-bias -mno-stack-bias"
98 113
99 # C[XX]FLAGS that we are think is ok, but needs testing 114 # C[XX]FLAGS that we are think is ok, but needs testing
100 # NOTE: currently -Os have issues with gcc3 and K6* arch's 115 # NOTE: currently -Os have issues with gcc3 and K6* arch's
101 export UNSTABLE_FLAGS="-Os -O3 -freorder-blocks -fprefetch-loop-arrays" 116 export UNSTABLE_FLAGS="-Os -O3 -freorder-blocks -fprefetch-loop-arrays"
102 return 0 117 return 0
103} 118}
104 119
105filter-flags() { 120filter-flags() {
106 local x f fset 121 local x f fset
107 declare -a new_CFLAGS new_CXXFLAGS 122 declare -a new_CFLAGS new_CXXFLAGS
108 123
109 for x in "$@" ; do 124 for x in "$@" ; do
110 case "${x}" in 125 case "${x}" in
111 -fPIC|-fpic|-fPIE|-fpie|-pie) etexec-flags;; 126 -fPIC|-fpic|-fPIE|-fpie|-pie)
127 append-flags `test_flag -fno-pie`;;
112 -fstack-protector|-fstack-protector-all) fstack-flags;; 128 -fstack-protector|-fstack-protector-all)
129 fstack-flags;;
113 esac 130 esac
114 done 131 done
115 132
116 for fset in CFLAGS CXXFLAGS; do 133 for fset in CFLAGS CXXFLAGS; do
117 # Looping over the flags instead of using a global 134 # Looping over the flags instead of using a global
130 147
131 return 0 148 return 0
132} 149}
133 150
134filter-lfs-flags() { 151filter-lfs-flags() {
152 [[ -n $@ ]] && die "filter-lfs-flags takes no arguments"
135 filter-flags -D_FILE_OFFSET_BITS=64 -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE 153 filter-flags -D_FILE_OFFSET_BITS=64 -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE
136} 154}
137 155
138append-lfs-flags() { 156append-lfs-flags() {
157 [[ -n $@ ]] && die "append-lfs-flags takes no arguments"
139 append-flags -D_FILE_OFFSET_BITS=64 -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE 158 append-flags -D_FILE_OFFSET_BITS=64 -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE
140} 159}
141 160
142append-flags() { 161append-flags() {
162 [[ -z $* ]] && return 0
143 export CFLAGS="${CFLAGS} $*" 163 export CFLAGS="${CFLAGS} $*"
144 export CXXFLAGS="${CXXFLAGS} $*" 164 export CXXFLAGS="${CXXFLAGS} $*"
145 [ -n "`is-flag -fno-stack-protector`" -o \ 165 [ -n "`is-flag -fno-stack-protector`" -o \
146 -n "`is-flag -fno-stack-protector-all`" ] && fstack-flags 166 -n "`is-flag -fno-stack-protector-all`" ] && fstack-flags
147 return 0 167 return 0
148} 168}
149 169
150replace-flags() { 170replace-flags() {
171 [[ $# != 2 ]] \
172 && echo && eerror "Usage: replace-flags <old flag> <new flag>" \
173 && die "replace-flags takes 2 arguments, not $#"
174
151 local f fset 175 local f fset
152 declare -a new_CFLAGS new_CXXFLAGS 176 declare -a new_CFLAGS new_CXXFLAGS
153 177
154 for fset in CFLAGS CXXFLAGS; do 178 for fset in CFLAGS CXXFLAGS; do
155 # Looping over the flags instead of using a global 179 # Looping over the flags instead of using a global
156 # substitution ensures that we're working with flag atoms. 180 # substitution ensures that we're working with flag atoms.
226 250
227 local NEW_CFLAGS="" 251 local NEW_CFLAGS=""
228 local NEW_CXXFLAGS="" 252 local NEW_CXXFLAGS=""
229 253
230 # Allow unstable C[XX]FLAGS if we are using unstable profile ... 254 # Allow unstable C[XX]FLAGS if we are using unstable profile ...
231 if has ~${ARCH} ${ACCEPT_KEYWORDS} ; then 255 if has ~$(tc-arch) ${ACCEPT_KEYWORDS} ; then
232 use debug && einfo "Enabling the use of some unstable flags"
233 ALLOWED_FLAGS="${ALLOWED_FLAGS} ${UNSTABLE_FLAGS}" 256 ALLOWED_FLAGS="${ALLOWED_FLAGS} ${UNSTABLE_FLAGS}"
234 fi 257 fi
235 258
236 set -f # disable pathname expansion 259 set -f # disable pathname expansion
237 260
315 fi 338 fi
316 done 339 done
317 return 1 340 return 1
318} 341}
319 342
343# DEPRECATED - use gcc-specs-relro or gcc-specs-now from toolchain-funcs
320has_hardened() { 344has_hardened() {
321 test_version_info Hardened && return 0 345 test_version_info Hardened && return 0
322 # the specs file wont exist unless gcc has GCC_SPECS support 346 # the specs file wont exist unless gcc has GCC_SPECS support
323 [ -f "${GCC_SPECS}" -a "${GCC_SPECS}" != "${GCC_SPECS/hardened/}" ] && \ 347 [ -f "${GCC_SPECS}" -a "${GCC_SPECS}" != "${GCC_SPECS/hardened/}" ] && \
324 return 0 348 return 0
325 return 1 349 return 1
326} 350}
327 351
352# DEPRECATED - use gcc-specs-pie from toolchain-funcs
353# indicate whether PIC is set
328has_pic() { 354has_pic() {
329 [ "${CFLAGS/-fPIC}" != "${CFLAGS}" ] && return 0 355 [ "${CFLAGS/-fPIC}" != "${CFLAGS}" ] && return 0
330 [ "${CFLAGS/-fpic}" != "${CFLAGS}" ] && return 0 356 [ "${CFLAGS/-fpic}" != "${CFLAGS}" ] && return 0
331 test_version_info pie && return 0 357 [ "$(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIC__)" ] && return 0
332 return 1 358 return 1
333} 359}
334 360
361# DEPRECATED - use gcc-specs-pie from toolchain-funcs
362# indicate whether PIE is set
335has_pie() { 363has_pie() {
336 [ "${CFLAGS/-fPIE}" != "${CFLAGS}" ] && return 0 364 [ "${CFLAGS/-fPIE}" != "${CFLAGS}" ] && return 0
337 [ "${CFLAGS/-fpie}" != "${CFLAGS}" ] && return 0 365 [ "${CFLAGS/-fpie}" != "${CFLAGS}" ] && return 0
338 test_version_info pie && return 0 366 [ "$(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIE__)" ] && return 0
367 # test PIC while waiting for specs to be updated to generate __PIE__
368 [ "$(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIC__)" ] && return 0
339 return 1 369 return 1
340} 370}
341 371
372# DEPRECATED - use gcc-specs-ssp from toolchain-funcs
373# indicate whether code for SSP is being generated for all functions
374has_ssp_all() {
375 # note; this matches only -fstack-protector-all
376 [ "${CFLAGS/-fstack-protector-all}" != "${CFLAGS}" ] && return 0
377 [ "$(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __SSP_ALL__)" ] && return 0
378 gcc-specs-ssp && return 0
379 return 1
380}
381
382# DEPRECATED - use gcc-specs-ssp from toolchain-funcs
383# indicate whether code for SSP is being generated
342has_ssp() { 384has_ssp() {
385 # note; this matches both -fstack-protector and -fstack-protector-all
343 [ "${CFLAGS/-fstack-protector}" != "${CFLAGS}" ] && return 0 386 [ "${CFLAGS/-fstack-protector}" != "${CFLAGS}" ] && return 0
344 test_version_info ssp && return 0 387 [ "$(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __SSP__)" ] && return 0
388 gcc-specs-ssp && return 0
345 return 1 389 return 1
346} 390}
347 391
348has_m64() { 392has_m64() {
349 # this doesnt test if the flag is accepted, it tests if the flag 393 # this doesnt test if the flag is accepted, it tests if the flag
363has_m32() { 407has_m32() {
364 # this doesnt test if the flag is accepted, it tests if the flag 408 # this doesnt test if the flag is accepted, it tests if the flag
365 # actually -WORKS-. non-multilib gcc will take both -m32 and -m64! 409 # actually -WORKS-. non-multilib gcc will take both -m32 and -m64!
366 # please dont replace this function with test_flag in some future 410 # please dont replace this function with test_flag in some future
367 # clean-up! 411 # clean-up!
412
413 [ "$(tc-arch)" = "amd64" ] && has_multilib_profile && return 0
414
368 local temp="$(emktemp)" 415 local temp="$(emktemp)"
369 echo "int main() { return(0); }" > ${temp}.c 416 echo "int main() { return(0); }" > ${temp}.c
370 MY_CC=$(tc-getCC) 417 MY_CC=$(tc-getCC)
371 ${MY_CC/ .*/} -m32 -o "$(emktemp)" ${temp}.c > /dev/null 2>&1 418 ${MY_CC/ .*/} -m32 -o "$(emktemp)" ${temp}.c > /dev/null 2>&1
372 local ret=$? 419 local ret=$?
376} 423}
377 424
378replace-sparc64-flags() { 425replace-sparc64-flags() {
379 local SPARC64_CPUS="ultrasparc v9" 426 local SPARC64_CPUS="ultrasparc v9"
380 427
381 if [ "${CFLAGS/mtune}" != "${CFLAGS}" ]; then 428 if [ "${CFLAGS/mtune}" != "${CFLAGS}" ]; then
382 for x in ${SPARC64_CPUS}; do 429 for x in ${SPARC64_CPUS}; do
383 CFLAGS="${CFLAGS/-mcpu=${x}/-mcpu=v8}" 430 CFLAGS="${CFLAGS/-mcpu=${x}/-mcpu=v8}"
384 done 431 done
385 else 432 else
386 for x in ${SPARC64_CPUS}; do 433 for x in ${SPARC64_CPUS}; do
387 CFLAGS="${CFLAGS/-mcpu=${x}/-mcpu=v8 -mtune=${x}}" 434 CFLAGS="${CFLAGS/-mcpu=${x}/-mcpu=v8 -mtune=${x}}"
388 done 435 done
389 fi 436 fi
390 437
391 if [ "${CXXFLAGS/mtune}" != "${CXXFLAGS}" ]; then 438 if [ "${CXXFLAGS/mtune}" != "${CXXFLAGS}" ]; then
392 for x in ${SPARC64_CPUS}; do 439 for x in ${SPARC64_CPUS}; do
393 CXXFLAGS="${CXXFLAGS/-mcpu=${x}/-mcpu=v8}" 440 CXXFLAGS="${CXXFLAGS/-mcpu=${x}/-mcpu=v8}"
394 done 441 done
395 else 442 else
396 for x in ${SPARC64_CPUS}; do 443 for x in ${SPARC64_CPUS}; do
411 458
412 # we do this fancy spacing stuff so as to not filter 459 # we do this fancy spacing stuff so as to not filter
413 # out part of a flag ... we want flag atoms ! :D 460 # out part of a flag ... we want flag atoms ! :D
414 LDFLAGS=" ${LDFLAGS} " 461 LDFLAGS=" ${LDFLAGS} "
415 for x in "$@" ; do 462 for x in "$@" ; do
416 LDFLAGS="${LDFLAGS// ${x} / }" 463 LDFLAGS=${LDFLAGS// ${x} / }
417 done 464 done
465 [[ -z ${LDFLAGS// } ]] \
466 && LDFLAGS="" \
418 LDFLAGS="${LDFLAGS:1:${#LDFLAGS}-2}" 467 || LDFLAGS=${LDFLAGS:1:${#LDFLAGS}-2}
419 export LDFLAGS 468 export LDFLAGS
420 return 0 469 return 0
421} 470}
422 471
423etexec-flags() {
424 # if you're not using a hardened compiler you wont need this
425 # PIC/no-pic kludge in the first place.
426 has_hardened || return 0
427 use amd64 && return 0
428 use mips && return 0
429
430 if has_pie || has_pic; then
431 [ -z "`is-flag -fno-pic`" ] &&
432 export CFLAGS="${CFLAGS} `test_flag -fno-pic`"
433 [ -z "`is-flag -nopie`" ] &&
434 export CFLAGS="${CFLAGS} `test_flag -nopie`"
435 fi
436 return 0
437}
438
439fstack-flags() { 472fstack-flags() {
440 if has_ssp; then 473 if gcc-specs-ssp; then
441 [ -z "`is-flag -fno-stack-protector`" ] && 474 [ -z "`is-flag -fno-stack-protector`" ] &&
442 export CFLAGS="${CFLAGS} `test_flag -fno-stack-protector`" 475 export CFLAGS="${CFLAGS} `test_flag -fno-stack-protector`"
443 fi 476 fi
444 return 0 477 return 0
445} 478}
446 479
448# bug #9016. Also thanks to Jukka Salmi <salmi@gmx.net> (bug #13907) for more 481# bug #9016. Also thanks to Jukka Salmi <salmi@gmx.net> (bug #13907) for more
449# fixes. 482# fixes.
450# 483#
451# Export CFLAGS and CXXFLAGS that are compadible with gcc-2.95.3 484# Export CFLAGS and CXXFLAGS that are compadible with gcc-2.95.3
452gcc2-flags() { 485gcc2-flags() {
453 CFLAGS=${CFLAGS//pentium-mmx/i586} 486 if [[ $(tc-arch) == "x86" || $(tc-arch) == "amd64" ]] ; then
454 CFLAGS=${CFLAGS//pentium[234]/i686} 487 CFLAGS=${CFLAGS//-mtune=/-mcpu=}
455 CFLAGS=${CFLAGS//k6-[23]/k6} 488 CXXFLAGS=${CXXFLAGS//-mtune=/-mcpu=}
456 CFLAGS=${CFLAGS//athlon-tbird/i686}
457 CFLAGS=${CFLAGS//athlon-4/i686}
458 CFLAGS=${CFLAGS//athlon-[xm]p/i686}
459 CFLAGS=${CFLAGS//athlon/i686}
460
461 CXXFLAGS=${CXXFLAGS//pentium-mmx/i586}
462 CXXFLAGS=${CXXFLAGS//pentium[234]/i686}
463 CXXFLAGS=${CXXFLAGS//k6-[23]/k6}
464 CXXFLAGS=${CXXFLAGS//athlon-tbird/i686}
465 CXXFLAGS=${CXXFLAGS//athlon-4/i686}
466 CXXFLAGS=${CXXFLAGS//athlon-[xm]p/i686}
467 CXXFLAGS=${CXXFLAGS//athlon/i686}
468
469 if [ "$ARCH" = alpha ]; then
470 CHOST=${CHOST/#alphaev6[78]/alphaev6}
471 CFLAGS=${CFLAGS//ev6[78]/ev6}
472 CXXFLAGS=${CXXFLAGS//ev6[78]/ev6}
473 fi 489 fi
490
491 replace-cpu-flags k6-{2,3} k6
492 replace-cpu-flags athlon{,-{tbird,4,xp,mp}} i686
493
494 replace-cpu-flags pentium-mmx i586
495 replace-cpu-flags pentium{2,3,4} i686
496
497 replace-cpu-flags ev6{7,8} ev6
474 498
475 export CFLAGS CXXFLAGS 499 export CFLAGS CXXFLAGS
476} 500}

Legend:
Removed from v.1.79  
changed lines
  Added in v.1.93

  ViewVC Help
Powered by ViewVC 1.1.20