/[gentoo-x86]/eclass/flag-o-matic.eclass
Gentoo

Diff of /eclass/flag-o-matic.eclass

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

Revision 1.77 Revision 1.88
1# Copyright 1999-2004 Gentoo Foundation 1# Copyright 1999-2005 Gentoo Foundation
2# Distributed under the terms of the GNU General Public License v2 2# Distributed under the terms of the GNU General Public License v2
3# $Header: /var/cvsroot/gentoo-x86/eclass/flag-o-matic.eclass,v 1.77 2004/11/13 07:07:08 solar Exp $ 3# $Header: /var/cvsroot/gentoo-x86/eclass/flag-o-matic.eclass,v 1.88 2005/07/06 20:20:03 agriffis Exp $
4#
5# Author Bart Verwilst <verwilst@gentoo.org>
6 4
7ECLASS=flag-o-matic
8INHERITED="$INHERITED $ECLASS" 5INHERITED="$INHERITED $ECLASS"
9 6
10IUSE="debug"
11
12# need access to emktemp() 7# need access to emktemp()
13inherit eutils toolchain-funcs 8inherit eutils toolchain-funcs multilib
14 9
15# 10#
16#### filter-flags <flags> #### 11#### filter-flags <flags> ####
17# Remove particular flags from C[XX]FLAGS 12# Remove particular flags from C[XX]FLAGS
18# Matches only complete flags 13# Matches only complete flags
55# Add extra flags to your current LDFLAGS 50# Add extra flags to your current LDFLAGS
56# 51#
57#### filter-ldflags <flags> #### 52#### filter-ldflags <flags> ####
58# Remove particular flags from LDFLAGS 53# Remove particular flags from LDFLAGS
59# Matches only complete flags 54# Matches only complete flags
60#
61#### etexec-flags ####
62# hooked function for hardened gcc that appends
63# -fno-pic to {C,CXX,LD}FLAGS
64# when a package is filtering -fpic, -fPIC, -fpie, -fPIE
65# 55#
66#### fstack-flags #### 56#### fstack-flags ####
67# hooked function for hardened gcc that appends 57# hooked function for hardened gcc that appends
68# -fno-stack-protector to {C,CXX,LD}FLAGS 58# -fno-stack-protector to {C,CXX,LD}FLAGS
69# when a package is filtering -fstack-protector, -fstack-protector-all 59# when a package is filtering -fstack-protector, -fstack-protector-all
70# notice: modern automatic specs files will also suppress -fstack-protector-all 60# notice: modern automatic specs files will also suppress -fstack-protector-all
71# when only -fno-stack-protector is given 61# when only -fno-stack-protector is given
72# 62#
63#### has_pic ####
64# Returns true if the compiler by default or with current CFLAGS
65# builds position-independent code.
66#
67#### has_ssp_all ####
68# Returns true if the compiler by default or with current CFLAGS
69# generates stack smash protections for all functions
70#
71#### has_ssp ####
72# Returns true if the compiler by default or with current CFLAGS
73# generates stack smash protections for most vulnerable functions
74#
73 75
74# C[XX]FLAGS that we allow in strip-flags 76# C[XX]FLAGS that we allow in strip-flags
75setup-allowed-flags() { 77setup-allowed-flags() {
76 if [ -z "${ALLOWED_FLAGS}" ] ; then 78 if [[ -z ${ALLOWED_FLAGS} ]] ; then
77 export ALLOWED_FLAGS="-pipe" 79 export ALLOWED_FLAGS="-pipe"
78 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -O -O0 -O1 -O2 -mcpu -march -mtune" 80 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -O -O0 -O1 -O2 -mcpu -march -mtune"
79 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fstack-protector -fno-stack-protector" 81 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fstack-protector -fstack-protector-all"
82 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fbounds-checking -fno-bounds-checking"
80 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-pie -fno-unit-at-a-time" 83 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-pie -fno-unit-at-a-time"
81 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -g -g0 -g1 -g2 -g3 -ggdb -ggdb0 -ggdb1 -ggdb2 -ggdb3" 84 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -g -g0 -g1 -g2 -g3 -ggdb -ggdb0 -ggdb1 -ggdb2 -ggdb3"
82 case "${ARCH}" in
83 mips) ALLOWED_FLAGS="${ALLOWED_FLAGS} -mips1 -mips2 -mips3 -mips4 -mips32 -mips64 -mips16 -EL -EB -mabi" ;;
84 amd64) ALLOWED_FLAGS="${ALLOWED_FLAGS} -fPIC -m64" ;;
85 x86) ALLOWED_FLAGS="${ALLOWED_FLAGS} -m32" ;;
86 alpha) ALLOWED_FLAGS="${ALLOWED_FLAGS} -fPIC" ;;
87 ia64) ALLOWED_FLAGS="${ALLOWED_FLAGS} -fPIC" ;;
88 esac
89 fi 85 fi
90 # allow a bunch of flags that negate features / control ABI 86 # allow a bunch of flags that negate features / control ABI
91 ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-stack-protector -fno-stack-protector-all" 87 ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-stack-protector -fno-stack-protector-all"
92 case "${ARCH}" in 88 ALLOWED_FLAGS="${ALLOWED_FLAGS} -mregparm -mno-app-regs -mapp-regs \
93 x86|amd64|ia64) ALLOWED_FLAGS="${ALLOWED_FLAGS} -mno-mmx -mno-sse -mno-sse2 -mno-sse3 -mno-3dnow" ;; 89 -mno-mmx -mno-sse -mno-sse2 -mno-sse3 -mno-3dnow \
94 esac 90 -mips1 -mips2 -mips3 -mips4 -mips32 -mips64 -mips16 \
95 ALLOWED_FLAGS="${ALLOWED_FLAGS} -mregparm -mno-app-regs -mapp-regs -msoft-float -mflat -mno-faster-structs -mfaster-structs -mlittle-endian -mbig-endian -mlive-g0 -mcmodel -mno-stack-bias -mstack-bias" 91 -msoft-float -mno-soft-float -mhard-float -mno-hard-float -mfpu \
92 -mflat -mno-flat -mno-faster-structs -mfaster-structs \
93 -m32 -m64 -mabi -mlittle-endian -mbig-endian -EL -EB -fPIC \
94 -mlive-g0 -mcmodel -mstack-bias -mno-stack-bias"
96 95
97 # C[XX]FLAGS that we are think is ok, but needs testing 96 # C[XX]FLAGS that we are think is ok, but needs testing
98 # NOTE: currently -Os have issues with gcc3 and K6* arch's 97 # NOTE: currently -Os have issues with gcc3 and K6* arch's
99 export UNSTABLE_FLAGS="-Os -O3 -freorder-blocks -fprefetch-loop-arrays" 98 export UNSTABLE_FLAGS="-Os -O3 -freorder-blocks -fprefetch-loop-arrays"
100 return 0 99 return 0
101} 100}
102 101
103filter-flags() { 102filter-flags() {
104 local x f fset 103 local x f fset
105 declare -a new_CFLAGS new_CXXFLAGS 104 declare -a new_CFLAGS new_CXXFLAGS
106 105
107 for x in "$@" ; do 106 for x in "$@" ; do
108 case "${x}" in 107 case "${x}" in
109 -fPIC|-fpic|-fPIE|-fpie|-pie) etexec-flags;; 108 -fPIC|-fpic|-fPIE|-fpie|-pie)
109 append-flags `test_flag -fno-pie`;;
110 -fstack-protector|-fstack-protector-all) fstack-flags;; 110 -fstack-protector|-fstack-protector-all)
111 fstack-flags;;
111 esac 112 esac
112 done 113 done
113 114
114 for fset in CFLAGS CXXFLAGS; do 115 for fset in CFLAGS CXXFLAGS; do
115 # Looping over the flags instead of using a global 116 # Looping over the flags instead of using a global
136append-lfs-flags() { 137append-lfs-flags() {
137 append-flags -D_FILE_OFFSET_BITS=64 -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE 138 append-flags -D_FILE_OFFSET_BITS=64 -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE
138} 139}
139 140
140append-flags() { 141append-flags() {
142 [[ -z $* ]] && return 0
141 export CFLAGS="${CFLAGS} $*" 143 export CFLAGS="${CFLAGS} $*"
142 export CXXFLAGS="${CXXFLAGS} $*" 144 export CXXFLAGS="${CXXFLAGS} $*"
143 [ -n "`is-flag -fno-stack-protector`" -o \ 145 [ -n "`is-flag -fno-stack-protector`" -o \
144 -n "`is-flag -fno-stack-protector-all`" ] && fstack-flags 146 -n "`is-flag -fno-stack-protector-all`" ] && fstack-flags
145 return 0 147 return 0
146} 148}
147 149
148replace-flags() { 150replace-flags() {
149 local f fset 151 local f fset
150 declare -a new_CFLAGS new_CXXFLAGS 152 declare -a new_CFLAGS new_CXXFLAGS
151 153
152 for fset in CFLAGS CXXFLAGS; do 154 for fset in CFLAGS CXXFLAGS; do
153 # Looping over the flags instead of using a global 155 # Looping over the flags instead of using a global
154 # substitution ensures that we're working with flag atoms. 156 # substitution ensures that we're working with flag atoms.
224 226
225 local NEW_CFLAGS="" 227 local NEW_CFLAGS=""
226 local NEW_CXXFLAGS="" 228 local NEW_CXXFLAGS=""
227 229
228 # Allow unstable C[XX]FLAGS if we are using unstable profile ... 230 # Allow unstable C[XX]FLAGS if we are using unstable profile ...
229 if has ~${ARCH} ${ACCEPT_KEYWORDS} ; then 231 if has ~$(tc-arch) ${ACCEPT_KEYWORDS} ; then
230 use debug && einfo "Enabling the use of some unstable flags"
231 ALLOWED_FLAGS="${ALLOWED_FLAGS} ${UNSTABLE_FLAGS}" 232 ALLOWED_FLAGS="${ALLOWED_FLAGS} ${UNSTABLE_FLAGS}"
232 fi 233 fi
233 234
234 set -f # disable pathname expansion 235 set -f # disable pathname expansion
235 236
321 [ -f "${GCC_SPECS}" -a "${GCC_SPECS}" != "${GCC_SPECS/hardened/}" ] && \ 322 [ -f "${GCC_SPECS}" -a "${GCC_SPECS}" != "${GCC_SPECS/hardened/}" ] && \
322 return 0 323 return 0
323 return 1 324 return 1
324} 325}
325 326
327# indicate whether PIC is set
326has_pic() { 328has_pic() {
327 [ "${CFLAGS/-fPIC}" != "${CFLAGS}" ] && return 0 329 [ "${CFLAGS/-fPIC}" != "${CFLAGS}" ] && return 0
328 [ "${CFLAGS/-fpic}" != "${CFLAGS}" ] && return 0 330 [ "${CFLAGS/-fpic}" != "${CFLAGS}" ] && return 0
329 test_version_info pie && return 0 331 [ "$(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIC__)" ] && return 0
330 return 1 332 return 1
331} 333}
332 334
335# indicate whether PIE is set
333has_pie() { 336has_pie() {
334 [ "${CFLAGS/-fPIE}" != "${CFLAGS}" ] && return 0 337 [ "${CFLAGS/-fPIE}" != "${CFLAGS}" ] && return 0
335 [ "${CFLAGS/-fpie}" != "${CFLAGS}" ] && return 0 338 [ "${CFLAGS/-fpie}" != "${CFLAGS}" ] && return 0
336 test_version_info pie && return 0 339 [ "$(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIE__)" ] && return 0
340 # test PIC while waiting for specs to be updated to generate __PIE__
341 [ "$(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIC__)" ] && return 0
337 return 1 342 return 1
338} 343}
339 344
345# indicate whether code for SSP is being generated for all functions
346has_ssp_all() {
347 # note; this matches only -fstack-protector-all
348 [ "${CFLAGS/-fstack-protector-all}" != "${CFLAGS}" ] && return 0
349 [ "$(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __SSP_ALL__)" ] && return 0
350 return 1
351}
352
353# indicate whether code for SSP is being generated
340has_ssp() { 354has_ssp() {
355 # note; this matches both -fstack-protector and -fstack-protector-all
341 [ "${CFLAGS/-fstack-protector}" != "${CFLAGS}" ] && return 0 356 [ "${CFLAGS/-fstack-protector}" != "${CFLAGS}" ] && return 0
342 test_version_info ssp && return 0 357 [ "$(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __SSP__)" ] && return 0
343 return 1 358 return 1
344} 359}
345 360
346has_m64() { 361has_m64() {
347 # this doesnt test if the flag is accepted, it tests if the flag 362 # this doesnt test if the flag is accepted, it tests if the flag
361has_m32() { 376has_m32() {
362 # this doesnt test if the flag is accepted, it tests if the flag 377 # this doesnt test if the flag is accepted, it tests if the flag
363 # actually -WORKS-. non-multilib gcc will take both -m32 and -m64! 378 # actually -WORKS-. non-multilib gcc will take both -m32 and -m64!
364 # please dont replace this function with test_flag in some future 379 # please dont replace this function with test_flag in some future
365 # clean-up! 380 # clean-up!
381
382 [ "$(tc-arch)" = "amd64" ] && has_multilib_profile && return 0
383
366 local temp="$(emktemp)" 384 local temp="$(emktemp)"
367 echo "int main() { return(0); }" > ${temp}.c 385 echo "int main() { return(0); }" > ${temp}.c
368 MY_CC=$(tc-getCC) 386 MY_CC=$(tc-getCC)
369 ${MY_CC/ .*/} -m32 -o "$(emktemp)" ${temp}.c > /dev/null 2>&1 387 ${MY_CC/ .*/} -m32 -o "$(emktemp)" ${temp}.c > /dev/null 2>&1
370 local ret=$? 388 local ret=$?
374} 392}
375 393
376replace-sparc64-flags() { 394replace-sparc64-flags() {
377 local SPARC64_CPUS="ultrasparc v9" 395 local SPARC64_CPUS="ultrasparc v9"
378 396
379 if [ "${CFLAGS/mtune}" != "${CFLAGS}" ]; then 397 if [ "${CFLAGS/mtune}" != "${CFLAGS}" ]; then
380 for x in ${SPARC64_CPUS}; do 398 for x in ${SPARC64_CPUS}; do
381 CFLAGS="${CFLAGS/-mcpu=${x}/-mcpu=v8}" 399 CFLAGS="${CFLAGS/-mcpu=${x}/-mcpu=v8}"
382 done 400 done
383 else 401 else
384 for x in ${SPARC64_CPUS}; do 402 for x in ${SPARC64_CPUS}; do
385 CFLAGS="${CFLAGS/-mcpu=${x}/-mcpu=v8 -mtune=${x}}" 403 CFLAGS="${CFLAGS/-mcpu=${x}/-mcpu=v8 -mtune=${x}}"
386 done 404 done
387 fi 405 fi
388 406
389 if [ "${CXXFLAGS/mtune}" != "${CXXFLAGS}" ]; then 407 if [ "${CXXFLAGS/mtune}" != "${CXXFLAGS}" ]; then
390 for x in ${SPARC64_CPUS}; do 408 for x in ${SPARC64_CPUS}; do
391 CXXFLAGS="${CXXFLAGS/-mcpu=${x}/-mcpu=v8}" 409 CXXFLAGS="${CXXFLAGS/-mcpu=${x}/-mcpu=v8}"
392 done 410 done
393 else 411 else
394 for x in ${SPARC64_CPUS}; do 412 for x in ${SPARC64_CPUS}; do
409 427
410 # we do this fancy spacing stuff so as to not filter 428 # we do this fancy spacing stuff so as to not filter
411 # out part of a flag ... we want flag atoms ! :D 429 # out part of a flag ... we want flag atoms ! :D
412 LDFLAGS=" ${LDFLAGS} " 430 LDFLAGS=" ${LDFLAGS} "
413 for x in "$@" ; do 431 for x in "$@" ; do
414 LDFLAGS="${LDFLAGS// ${x} / }" 432 LDFLAGS=${LDFLAGS// ${x} / }
415 done 433 done
434 [[ -z ${LDFLAGS// } ]] \
435 && LDFLAGS="" \
416 LDFLAGS="${LDFLAGS:1:${#LDFLAGS}-2}" 436 || LDFLAGS=${LDFLAGS:1:${#LDFLAGS}-2}
417 export LDFLAGS 437 export LDFLAGS
418 return 0
419}
420
421etexec-flags() {
422 # if you're not using a hardened compiler you wont need this
423 # PIC/no-pic kludge in the first place.
424 has_hardened || return 0
425 use amd64 && return 0
426 use mips && return 0
427
428 if has_pie || has_pic; then
429 [ -z "`is-flag -fno-pic`" ] &&
430 export CFLAGS="${CFLAGS} `test_flag -fno-pic`"
431 [ -z "`is-flag -nopie`" ] &&
432 export CFLAGS="${CFLAGS} `test_flag -nopie`"
433 fi
434 return 0 438 return 0
435} 439}
436 440
437fstack-flags() { 441fstack-flags() {
438 if has_ssp; then 442 if has_ssp; then
439 [ -z "`is-flag -fno-stack-protector`" ] && 443 [ -z "`is-flag -fno-stack-protector`" ] &&
440 export CFLAGS="${CFLAGS} `test_flag -fno-stack-protector`" 444 export CFLAGS="${CFLAGS} `test_flag -fno-stack-protector`"
441 fi 445 fi
442 return 0 446 return 0
443} 447}
444 448
446# bug #9016. Also thanks to Jukka Salmi <salmi@gmx.net> (bug #13907) for more 450# bug #9016. Also thanks to Jukka Salmi <salmi@gmx.net> (bug #13907) for more
447# fixes. 451# fixes.
448# 452#
449# Export CFLAGS and CXXFLAGS that are compadible with gcc-2.95.3 453# Export CFLAGS and CXXFLAGS that are compadible with gcc-2.95.3
450gcc2-flags() { 454gcc2-flags() {
451 CFLAGS=${CFLAGS//pentium-mmx/i586} 455 if [[ $(tc-arch) == "x86" || $(tc-arch) == "amd64" ]] ; then
452 CFLAGS=${CFLAGS//pentium[234]/i686} 456 CFLAGS=${CFLAGS//-mtune=/-mcpu=}
453 CFLAGS=${CFLAGS//k6-[23]/k6} 457 CXXFLAGS=${CXXFLAGS//-mtune=/-mcpu=}
454 CFLAGS=${CFLAGS//athlon-tbird/i686}
455 CFLAGS=${CFLAGS//athlon-4/i686}
456 CFLAGS=${CFLAGS//athlon-[xm]p/i686}
457 CFLAGS=${CFLAGS//athlon/i686}
458
459 CXXFLAGS=${CXXFLAGS//pentium-mmx/i586}
460 CXXFLAGS=${CXXFLAGS//pentium[234]/i686}
461 CXXFLAGS=${CXXFLAGS//k6-[23]/k6}
462 CXXFLAGS=${CXXFLAGS//athlon-tbird/i686}
463 CXXFLAGS=${CXXFLAGS//athlon-4/i686}
464 CXXFLAGS=${CXXFLAGS//athlon-[xm]p/i686}
465 CXXFLAGS=${CXXFLAGS//athlon/i686}
466
467 if [ "$ARCH" = alpha ]; then
468 CHOST=${CHOST/#alphaev6[78]/alphaev6}
469 CFLAGS=${CFLAGS//ev6[78]/ev6}
470 CXXFLAGS=${CXXFLAGS//ev6[78]/ev6}
471 fi 458 fi
459
460 replace-cpu-flags k6-{2,3} k6
461 replace-cpu-flags athlon{,-{tbird,4,xp,mp}} i686
462
463 replace-cpu-flags pentium-mmx i586
464 replace-cpu-flags pentium{2,3,4} i686
465
466 replace-cpu-flags ev6{7,8} ev6
472 467
473 export CFLAGS CXXFLAGS 468 export CFLAGS CXXFLAGS
474} 469}

Legend:
Removed from v.1.77  
changed lines
  Added in v.1.88

  ViewVC Help
Powered by ViewVC 1.1.20