1 | # Copyright 1999-2005 Gentoo Foundation |
1 | # Copyright 1999-2005 Gentoo Foundation |
2 | # Distributed under the terms of the GNU General Public License v2 |
2 | # Distributed under the terms of the GNU General Public License v2 |
3 | # $Header: /var/cvsroot/gentoo-x86/eclass/flag-o-matic.eclass,v 1.85 2005/04/06 23:29:23 vapier Exp $ |
3 | # $Header: /var/cvsroot/gentoo-x86/eclass/flag-o-matic.eclass,v 1.104 2006/01/14 10:52:12 kevquinn Exp $ |
4 | |
4 | |
5 | ECLASS=flag-o-matic |
|
|
6 | INHERITED="$INHERITED $ECLASS" |
|
|
7 | |
|
|
8 | IUSE="debug" |
|
|
9 | |
5 | |
10 | # need access to emktemp() |
6 | # need access to emktemp() |
11 | inherit eutils toolchain-funcs multilib |
7 | inherit eutils toolchain-funcs multilib |
12 | |
8 | |
13 | # |
9 | # |
… | |
… | |
61 | # -fno-stack-protector to {C,CXX,LD}FLAGS |
57 | # -fno-stack-protector to {C,CXX,LD}FLAGS |
62 | # when a package is filtering -fstack-protector, -fstack-protector-all |
58 | # when a package is filtering -fstack-protector, -fstack-protector-all |
63 | # notice: modern automatic specs files will also suppress -fstack-protector-all |
59 | # notice: modern automatic specs files will also suppress -fstack-protector-all |
64 | # when only -fno-stack-protector is given |
60 | # when only -fno-stack-protector is given |
65 | # |
61 | # |
|
|
62 | #### bindnow-flags #### |
|
|
63 | # Returns the flags to enable "now" binding in the current selected linker. |
|
|
64 | # |
|
|
65 | ################ DEPRECATED functions ################ |
|
|
66 | # The following are still present to avoid breaking existing |
|
|
67 | # code more than necessary; however they are deprecated. Please |
|
|
68 | # use gcc-specs-* from toolchain-funcs.eclass instead, if you |
|
|
69 | # need to know which hardened techs are active in the compiler. |
|
|
70 | # See bug #100974 |
|
|
71 | # |
|
|
72 | #### has_hardened #### |
|
|
73 | # Returns true if the compiler has 'Hardened' in its version string, |
|
|
74 | # (note; switched-spec vanilla compilers satisfy this condition) or |
|
|
75 | # the specs file name contains 'hardened'. |
|
|
76 | # |
|
|
77 | #### has_pie #### |
|
|
78 | # Returns true if the compiler by default or with current CFLAGS |
|
|
79 | # builds position-independent code. |
|
|
80 | # |
|
|
81 | #### has_pic #### |
|
|
82 | # Returns true if the compiler by default or with current CFLAGS |
|
|
83 | # builds position-independent code. |
|
|
84 | # |
|
|
85 | #### has_ssp_all #### |
|
|
86 | # Returns true if the compiler by default or with current CFLAGS |
|
|
87 | # generates stack smash protections for all functions |
|
|
88 | # |
|
|
89 | #### has_ssp #### |
|
|
90 | # Returns true if the compiler by default or with current CFLAGS |
|
|
91 | # generates stack smash protections for most vulnerable functions |
|
|
92 | # |
66 | |
93 | |
67 | # C[XX]FLAGS that we allow in strip-flags |
94 | # C[XX]FLAGS that we allow in strip-flags |
68 | setup-allowed-flags() { |
95 | setup-allowed-flags() { |
69 | if [[ -z ${ALLOWED_FLAGS} ]] ; then |
96 | if [[ -z ${ALLOWED_FLAGS} ]] ; then |
70 | export ALLOWED_FLAGS="-pipe" |
97 | export ALLOWED_FLAGS="-pipe" |
71 | export ALLOWED_FLAGS="${ALLOWED_FLAGS} -O -O0 -O1 -O2 -mcpu -march -mtune" |
98 | export ALLOWED_FLAGS="${ALLOWED_FLAGS} -O -O0 -O1 -O2 -mcpu -march -mtune" |
72 | export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fstack-protector -fno-stack-protector" |
99 | export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fstack-protector -fstack-protector-all" |
|
|
100 | export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fbounds-checking -fno-bounds-checking" |
73 | export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-pie -fno-unit-at-a-time" |
101 | export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-pie -fno-unit-at-a-time" |
74 | export ALLOWED_FLAGS="${ALLOWED_FLAGS} -g -g0 -g1 -g2 -g3 -ggdb -ggdb0 -ggdb1 -ggdb2 -ggdb3" |
102 | export ALLOWED_FLAGS="${ALLOWED_FLAGS} -g -g0 -g1 -g2 -g3 -ggdb -ggdb0 -ggdb1 -ggdb2 -ggdb3" |
75 | case $(tc-arch) in |
|
|
76 | mips) ALLOWED_FLAGS="${ALLOWED_FLAGS} -mips1 -mips2 -mips3 -mips4 -mips32 -mips64 -mips16 -EL -EB -mabi" ;; |
|
|
77 | amd64) ALLOWED_FLAGS="${ALLOWED_FLAGS} -fPIC -m64" ;; |
|
|
78 | x86) ALLOWED_FLAGS="${ALLOWED_FLAGS} -m32" ;; |
|
|
79 | alpha) ALLOWED_FLAGS="${ALLOWED_FLAGS} -fPIC" ;; |
|
|
80 | ia64) ALLOWED_FLAGS="${ALLOWED_FLAGS} -fPIC" ;; |
|
|
81 | sparc) ALLOWED_FLAGS="${ALLOWED_FLAGS} -m32 -m64" ;; |
|
|
82 | ppc) ALLOWED_FLAGS="${ALLOWED_FLAGS} -mabi" ;; |
|
|
83 | esac |
|
|
84 | fi |
103 | fi |
85 | # allow a bunch of flags that negate features / control ABI |
104 | # allow a bunch of flags that negate features / control ABI |
86 | ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-stack-protector -fno-stack-protector-all" |
105 | ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-stack-protector -fno-stack-protector-all" |
87 | case $(tc-arch) in |
106 | ALLOWED_FLAGS="${ALLOWED_FLAGS} -mregparm -mno-app-regs -mapp-regs \ |
88 | x86|amd64|ia64) ALLOWED_FLAGS="${ALLOWED_FLAGS} -mno-mmx -mno-sse -mno-sse2 -mno-sse3 -mno-3dnow" ;; |
107 | -mno-mmx -mno-sse -mno-sse2 -mno-sse3 -mno-3dnow \ |
89 | esac |
108 | -mips1 -mips2 -mips3 -mips4 -mips32 -mips64 -mips16 \ |
90 | ALLOWED_FLAGS="${ALLOWED_FLAGS} -mregparm -mno-app-regs -mapp-regs -msoft-float -mflat -mno-faster-structs -mfaster-structs -mlittle-endian -mbig-endian -mlive-g0 -mcmodel -mno-stack-bias -mstack-bias" |
109 | -msoft-float -mno-soft-float -mhard-float -mno-hard-float -mfpu \ |
|
|
110 | -mieee -mieee-with-inexact \ |
|
|
111 | -mtls-direct-seg-refs -mno-tls-direct-seg-refs \ |
|
|
112 | -mflat -mno-flat -mno-faster-structs -mfaster-structs \ |
|
|
113 | -m32 -m64 -mabi -mlittle-endian -mbig-endian -EL -EB -fPIC \ |
|
|
114 | -mlive-g0 -mcmodel -mstack-bias -mno-stack-bias" |
91 | |
115 | |
92 | # C[XX]FLAGS that we are think is ok, but needs testing |
116 | # C[XX]FLAGS that we are think is ok, but needs testing |
93 | # NOTE: currently -Os have issues with gcc3 and K6* arch's |
117 | # NOTE: currently -Os have issues with gcc3 and K6* arch's |
94 | export UNSTABLE_FLAGS="-Os -O3 -freorder-blocks -fprefetch-loop-arrays" |
118 | export UNSTABLE_FLAGS="-Os -O3 -freorder-blocks -fprefetch-loop-arrays" |
95 | return 0 |
119 | return 0 |
… | |
… | |
125 | |
149 | |
126 | return 0 |
150 | return 0 |
127 | } |
151 | } |
128 | |
152 | |
129 | filter-lfs-flags() { |
153 | filter-lfs-flags() { |
|
|
154 | [[ -n $@ ]] && die "filter-lfs-flags takes no arguments" |
130 | filter-flags -D_FILE_OFFSET_BITS=64 -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE |
155 | filter-flags -D_FILE_OFFSET_BITS=64 -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE |
131 | } |
156 | } |
132 | |
157 | |
133 | append-lfs-flags() { |
158 | append-lfs-flags() { |
|
|
159 | [[ -n $@ ]] && die "append-lfs-flags takes no arguments" |
134 | append-flags -D_FILE_OFFSET_BITS=64 -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE |
160 | append-flags -D_FILE_OFFSET_BITS=64 -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE |
135 | } |
161 | } |
136 | |
162 | |
137 | append-flags() { |
163 | append-flags() { |
138 | [[ -z $* ]] && return 0 |
164 | [[ -z $* ]] && return 0 |
… | |
… | |
142 | -n "`is-flag -fno-stack-protector-all`" ] && fstack-flags |
168 | -n "`is-flag -fno-stack-protector-all`" ] && fstack-flags |
143 | return 0 |
169 | return 0 |
144 | } |
170 | } |
145 | |
171 | |
146 | replace-flags() { |
172 | replace-flags() { |
|
|
173 | [[ $# != 2 ]] \ |
|
|
174 | && echo && eerror "Usage: replace-flags <old flag> <new flag>" \ |
|
|
175 | && die "replace-flags takes 2 arguments, not $#" |
|
|
176 | |
147 | local f fset |
177 | local f fset |
148 | declare -a new_CFLAGS new_CXXFLAGS |
178 | declare -a new_CFLAGS new_CXXFLAGS |
149 | |
179 | |
150 | for fset in CFLAGS CXXFLAGS; do |
180 | for fset in CFLAGS CXXFLAGS; do |
151 | # Looping over the flags instead of using a global |
181 | # Looping over the flags instead of using a global |
… | |
… | |
223 | local NEW_CFLAGS="" |
253 | local NEW_CFLAGS="" |
224 | local NEW_CXXFLAGS="" |
254 | local NEW_CXXFLAGS="" |
225 | |
255 | |
226 | # Allow unstable C[XX]FLAGS if we are using unstable profile ... |
256 | # Allow unstable C[XX]FLAGS if we are using unstable profile ... |
227 | if has ~$(tc-arch) ${ACCEPT_KEYWORDS} ; then |
257 | if has ~$(tc-arch) ${ACCEPT_KEYWORDS} ; then |
228 | use debug && einfo "Enabling the use of some unstable flags" |
|
|
229 | ALLOWED_FLAGS="${ALLOWED_FLAGS} ${UNSTABLE_FLAGS}" |
258 | ALLOWED_FLAGS="${ALLOWED_FLAGS} ${UNSTABLE_FLAGS}" |
230 | fi |
259 | fi |
231 | |
260 | |
232 | set -f # disable pathname expansion |
261 | set -f # disable pathname expansion |
233 | |
262 | |
… | |
… | |
264 | export CFLAGS="${NEW_CFLAGS}" |
293 | export CFLAGS="${NEW_CFLAGS}" |
265 | export CXXFLAGS="${NEW_CXXFLAGS}" |
294 | export CXXFLAGS="${NEW_CXXFLAGS}" |
266 | return 0 |
295 | return 0 |
267 | } |
296 | } |
268 | |
297 | |
|
|
298 | test-flag-PROG() { |
|
|
299 | local comp=$1 |
|
|
300 | local flags="$2" |
|
|
301 | |
|
|
302 | [[ -z ${comp} || -z ${flags} ]] && \ |
|
|
303 | return 1 |
|
|
304 | |
|
|
305 | local PROG=$(tc-get${comp}) |
|
|
306 | ${PROG} ${flags} -S -o /dev/null -xc /dev/null \ |
|
|
307 | > /dev/null 2>&1 |
|
|
308 | } |
|
|
309 | |
|
|
310 | # Returns true if C compiler support given flag |
|
|
311 | test-flag-CC() { test-flag-PROG "CC" "$1"; } |
|
|
312 | |
|
|
313 | # Returns true if C++ compiler support given flag |
|
|
314 | test-flag-CXX() { test-flag-PROG "CXX" "$1"; } |
|
|
315 | |
|
|
316 | test-flags-PROG() { |
|
|
317 | local comp=$1 |
|
|
318 | local flags |
|
|
319 | local x |
|
|
320 | |
|
|
321 | shift |
|
|
322 | |
|
|
323 | [[ -z ${comp} ]] && \ |
|
|
324 | return 1 |
|
|
325 | |
|
|
326 | for x in "$@" ; do |
|
|
327 | test-flag-${comp} "${x}" && flags="${flags} ${x}" |
|
|
328 | done |
|
|
329 | |
|
|
330 | echo "${flags}" |
|
|
331 | |
|
|
332 | # Just bail if we dont have any flags |
|
|
333 | [[ -n ${flags} ]] |
|
|
334 | } |
|
|
335 | |
|
|
336 | # Returns (echo's) the given flags supported by the C compiler |
|
|
337 | test-flags-CC() { test-flags-PROG "CC" "$@"; } |
|
|
338 | |
|
|
339 | # Returns (echo's) the given flags supported by the C++ compiler |
|
|
340 | test-flags-CXX() { test-flags-PROG "CXX" "$@"; } |
|
|
341 | |
|
|
342 | # Short-hand that should hopefully work for both C and C++ compiler, but |
|
|
343 | # its really only present due to the append-flags() abomination. |
|
|
344 | test-flags() { test-flags-CC "$@"; } |
|
|
345 | |
|
|
346 | # Deprecated, use test-flags() |
269 | test_flag() { |
347 | test_flag() { |
270 | if $(tc-getCC) -S -xc "$@" -o "$(emktemp)" /dev/null &>/dev/null; then |
348 | ewarn "test_flag: deprecated, please use test-flags()!" >&2 |
271 | printf "%s\n" "$*" |
349 | |
272 | return 0 |
350 | test-flags-CC "$@" |
273 | fi |
|
|
274 | return 1 |
|
|
275 | } |
351 | } |
276 | |
352 | |
277 | test_version_info() { |
353 | test_version_info() { |
278 | if [[ $($(tc-getCC) --version 2>&1) == *$1* ]]; then |
354 | if [[ $($(tc-getCC) --version 2>&1) == *$1* ]]; then |
279 | return 0 |
355 | return 0 |
… | |
… | |
281 | return 1 |
357 | return 1 |
282 | fi |
358 | fi |
283 | } |
359 | } |
284 | |
360 | |
285 | strip-unsupported-flags() { |
361 | strip-unsupported-flags() { |
286 | local NEW_CFLAGS NEW_CXXFLAGS |
362 | local x NEW_CFLAGS NEW_CXXFLAGS |
287 | |
363 | |
288 | for x in ${CFLAGS} ; do |
364 | for x in ${CFLAGS} ; do |
289 | NEW_CFLAGS="${NEW_CFLAGS} `test_flag ${x}`" |
365 | NEW_CFLAGS="${NEW_CFLAGS} $(test-flags ${x})" |
290 | done |
366 | done |
291 | for x in ${CXXFLAGS} ; do |
367 | for x in ${CXXFLAGS} ; do |
292 | NEW_CXXFLAGS="${NEW_CXXFLAGS} `test_flag ${x}`" |
368 | NEW_CXXFLAGS="${NEW_CXXFLAGS} $(test-flags ${x})" |
293 | done |
369 | done |
294 | |
370 | |
295 | export CFLAGS="${NEW_CFLAGS}" |
371 | export CFLAGS=${NEW_CFLAGS} |
296 | export CXXFLAGS="${NEW_CXXFLAGS}" |
372 | export CXXFLAGS=${NEW_CXXFLAGS} |
297 | } |
373 | } |
298 | |
374 | |
299 | get-flag() { |
375 | get-flag() { |
300 | local f findflag="$1" |
376 | local f findflag="$1" |
301 | |
377 | |
… | |
… | |
311 | fi |
387 | fi |
312 | done |
388 | done |
313 | return 1 |
389 | return 1 |
314 | } |
390 | } |
315 | |
391 | |
|
|
392 | # DEPRECATED - use gcc-specs-relro or gcc-specs-now from toolchain-funcs |
316 | has_hardened() { |
393 | has_hardened() { |
|
|
394 | ewarn "has_hardened: deprecated, please use gcc-specs-{relro,now}()!" >&2 |
|
|
395 | |
317 | test_version_info Hardened && return 0 |
396 | test_version_info Hardened && return 0 |
318 | # the specs file wont exist unless gcc has GCC_SPECS support |
397 | # The specs file wont exist unless gcc has GCC_SPECS support |
319 | [ -f "${GCC_SPECS}" -a "${GCC_SPECS}" != "${GCC_SPECS/hardened/}" ] && \ |
398 | [[ -f ${GCC_SPECS} && ${GCC_SPECS} != ${GCC_SPECS/hardened/} ]] |
320 | return 0 |
|
|
321 | return 1 |
|
|
322 | } |
399 | } |
323 | |
400 | |
|
|
401 | # DEPRECATED - use gcc-specs-pie from toolchain-funcs |
324 | # indicate whether PIC is set |
402 | # indicate whether PIC is set |
325 | has_pic() { |
403 | has_pic() { |
326 | [ "${CFLAGS/-fPIC}" != "${CFLAGS}" ] && return 0 |
404 | ewarn "has_pic: deprecated, please use gcc-specs-pie()!" >&2 |
327 | [ "${CFLAGS/-fpic}" != "${CFLAGS}" ] && return 0 |
405 | |
|
|
406 | [[ ${CFLAGS/-fPIC} != ${CFLAGS} || \ |
|
|
407 | ${CFLAGS/-fpic} != ${CFLAGS} || \ |
328 | [ "$(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIC__)" ] && return 0 |
408 | -n $(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIC__) ]] |
329 | test_version_info pie && return 0 |
|
|
330 | return 1 |
|
|
331 | } |
409 | } |
332 | |
410 | |
|
|
411 | # DEPRECATED - use gcc-specs-pie from toolchain-funcs |
333 | # indicate whether PIE is set |
412 | # indicate whether PIE is set |
334 | has_pie() { |
413 | has_pie() { |
335 | [ "${CFLAGS/-fPIE}" != "${CFLAGS}" ] && return 0 |
414 | ewarn "has_pie: deprecated, please use gcc-specs-pie()!" >&2 |
336 | [ "${CFLAGS/-fpie}" != "${CFLAGS}" ] && return 0 |
415 | |
|
|
416 | [[ ${CFLAGS/-fPIE} != ${CFLAGS} || \ |
|
|
417 | ${CFLAGS/-fpie} != ${CFLAGS} || \ |
|
|
418 | -n $(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIE__) || \ |
337 | [ "$(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIE__)" ] && return 0 |
419 | -n $(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIC__) ]] |
338 | # test PIC while waiting for specs to be updated to generate __PIE__ |
420 | # test PIC while waiting for specs to be updated to generate __PIE__ |
|
|
421 | } |
|
|
422 | |
|
|
423 | # DEPRECATED - use gcc-specs-ssp from toolchain-funcs |
|
|
424 | # indicate whether code for SSP is being generated for all functions |
|
|
425 | has_ssp_all() { |
|
|
426 | ewarn "has_ssp_all: deprecated, please use gcc-specs-ssp()!" >&2 |
|
|
427 | |
|
|
428 | # note; this matches only -fstack-protector-all |
|
|
429 | [[ ${CFLAGS/-fstack-protector-all} != ${CFLAGS} || \ |
339 | [ "$(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIC__)" ] && return 0 |
430 | -n $(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __SSP_ALL__) ]] || \ |
340 | return 1 |
431 | gcc-specs-ssp |
341 | } |
432 | } |
342 | |
433 | |
|
|
434 | # DEPRECATED - use gcc-specs-ssp from toolchain-funcs |
343 | # indicate whether code for SSP is being generated |
435 | # indicate whether code for SSP is being generated |
344 | has_ssp() { |
436 | has_ssp() { |
|
|
437 | ewarn "has_ssp: deprecated, please use gcc-specs-ssp()!" >&2 |
|
|
438 | |
345 | # note; this matches both -fstack-protector and -fstack-protector-all |
439 | # note; this matches both -fstack-protector and -fstack-protector-all |
346 | [ "${CFLAGS/-fstack-protector}" != "${CFLAGS}" ] && return 0 |
440 | [[ ${CFLAGS/-fstack-protector} != ${CFLAGS} || \ |
347 | [ "$(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __SSP__)" ] && return 0 |
441 | -n $(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __SSP__) ]] || \ |
348 | return 1 |
442 | gcc-specs-ssp |
349 | } |
443 | } |
350 | |
444 | |
351 | has_m64() { |
445 | has_m64() { |
352 | # this doesnt test if the flag is accepted, it tests if the flag |
446 | # this doesnt test if the flag is accepted, it tests if the flag |
353 | # actually -WORKS-. non-multilib gcc will take both -m32 and -m64! |
447 | # actually -WORKS-. non-multilib gcc will take both -m32 and -m64! |
354 | # please dont replace this function with test_flag in some future |
448 | # please dont replace this function with test_flag in some future |
355 | # clean-up! |
449 | # clean-up! |
|
|
450 | |
356 | local temp="$(emktemp)" |
451 | local temp="$(emktemp)" |
357 | echo "int main() { return(0); }" > ${temp}.c |
452 | echo "int main() { return(0); }" > "${temp}".c |
358 | MY_CC=$(tc-getCC) |
453 | MY_CC=$(tc-getCC) |
359 | ${MY_CC/ .*/} -m64 -o "$(emktemp)" ${temp}.c > /dev/null 2>&1 |
454 | ${MY_CC/ .*/} -m64 -o "$(emktemp)" "${temp}".c > /dev/null 2>&1 |
360 | local ret=$? |
455 | local ret=$? |
361 | rm -f ${temp}.c |
456 | rm -f "${temp}".c |
362 | [ "$ret" != "1" ] && return 0 |
457 | [[ ${ret} != 1 ]] && return 0 |
363 | return 1 |
458 | return 1 |
364 | } |
459 | } |
365 | |
460 | |
366 | has_m32() { |
461 | has_m32() { |
367 | # this doesnt test if the flag is accepted, it tests if the flag |
462 | # this doesnt test if the flag is accepted, it tests if the flag |
… | |
… | |
369 | # please dont replace this function with test_flag in some future |
464 | # please dont replace this function with test_flag in some future |
370 | # clean-up! |
465 | # clean-up! |
371 | |
466 | |
372 | [ "$(tc-arch)" = "amd64" ] && has_multilib_profile && return 0 |
467 | [ "$(tc-arch)" = "amd64" ] && has_multilib_profile && return 0 |
373 | |
468 | |
374 | local temp="$(emktemp)" |
469 | local temp=$(emktemp) |
375 | echo "int main() { return(0); }" > ${temp}.c |
470 | echo "int main() { return(0); }" > "${temp}".c |
376 | MY_CC=$(tc-getCC) |
471 | MY_CC=$(tc-getCC) |
377 | ${MY_CC/ .*/} -m32 -o "$(emktemp)" ${temp}.c > /dev/null 2>&1 |
472 | ${MY_CC/ .*/} -m32 -o "$(emktemp)" "${temp}".c > /dev/null 2>&1 |
378 | local ret=$? |
473 | local ret=$? |
379 | rm -f ${temp}.c |
474 | rm -f "${temp}".c |
380 | [ "$ret" != "1" ] && return 0 |
475 | [[ ${ret} != 1 ]] && return 0 |
381 | return 1 |
476 | return 1 |
382 | } |
477 | } |
383 | |
478 | |
384 | replace-sparc64-flags() { |
479 | replace-sparc64-flags() { |
385 | local SPARC64_CPUS="ultrasparc v9" |
480 | local SPARC64_CPUS="ultrasparc3 ultrasparc v9" |
386 | |
481 | |
387 | if [ "${CFLAGS/mtune}" != "${CFLAGS}" ]; then |
482 | if [ "${CFLAGS/mtune}" != "${CFLAGS}" ]; then |
388 | for x in ${SPARC64_CPUS}; do |
483 | for x in ${SPARC64_CPUS}; do |
389 | CFLAGS="${CFLAGS/-mcpu=${x}/-mcpu=v8}" |
484 | CFLAGS="${CFLAGS/-mcpu=${x}/-mcpu=v8}" |
390 | done |
485 | done |
… | |
… | |
426 | || LDFLAGS=${LDFLAGS:1:${#LDFLAGS}-2} |
521 | || LDFLAGS=${LDFLAGS:1:${#LDFLAGS}-2} |
427 | export LDFLAGS |
522 | export LDFLAGS |
428 | return 0 |
523 | return 0 |
429 | } |
524 | } |
430 | |
525 | |
|
|
526 | # Turn C style ldflags (-Wl,-foo) into straight ldflags |
|
|
527 | raw-ldflags() { |
|
|
528 | local x input="$@" |
|
|
529 | [[ -z ${input} ]] && input=${LDFLAGS} |
|
|
530 | set -- |
|
|
531 | for x in ${input} ; do |
|
|
532 | x=${x#-Wl,} |
|
|
533 | set -- "$@" ${x//,/ } |
|
|
534 | done |
|
|
535 | echo "$@" |
|
|
536 | } |
|
|
537 | |
431 | fstack-flags() { |
538 | fstack-flags() { |
432 | if has_ssp; then |
539 | if gcc-specs-ssp; then |
433 | [ -z "`is-flag -fno-stack-protector`" ] && |
540 | [ -z "`is-flag -fno-stack-protector`" ] && |
434 | export CFLAGS="${CFLAGS} `test_flag -fno-stack-protector`" |
541 | export CFLAGS="${CFLAGS} `test_flag -fno-stack-protector`" |
435 | fi |
542 | fi |
436 | return 0 |
543 | return 0 |
437 | } |
544 | } |
… | |
… | |
455 | |
562 | |
456 | replace-cpu-flags ev6{7,8} ev6 |
563 | replace-cpu-flags ev6{7,8} ev6 |
457 | |
564 | |
458 | export CFLAGS CXXFLAGS |
565 | export CFLAGS CXXFLAGS |
459 | } |
566 | } |
|
|
567 | |
|
|
568 | # Gets the flags needed for "NOW" binding |
|
|
569 | bindnow-flags() { |
|
|
570 | case $($(tc-getLD) -v 2>&1 </dev/null) in |
|
|
571 | *GNU* | *'with BFD'*) # GNU ld |
|
|
572 | echo "-Wl,-z,now" ;; |
|
|
573 | *Apple*) # Darwin ld |
|
|
574 | echo "-bind_at_load" ;; |
|
|
575 | *) |
|
|
576 | # Some linkers just recognize -V instead of -v |
|
|
577 | case $($(tc-getLD) -V 2>&1 </dev/null) in |
|
|
578 | *Solaris*) # Solaris accept almost the same GNU options |
|
|
579 | echo "-Wl,-z,now" ;; |
|
|
580 | esac |
|
|
581 | ;; |
|
|
582 | esac |
|
|
583 | } |