/[gentoo-x86]/eclass/flag-o-matic.eclass
Gentoo

Diff of /eclass/flag-o-matic.eclass

Parent Directory Parent Directory | Revision Log Revision Log | View Patch Patch

Revision 1.85 Revision 1.96
1# Copyright 1999-2005 Gentoo Foundation 1# Copyright 1999-2005 Gentoo Foundation
2# Distributed under the terms of the GNU General Public License v2 2# Distributed under the terms of the GNU General Public License v2
3# $Header: /var/cvsroot/gentoo-x86/eclass/flag-o-matic.eclass,v 1.85 2005/04/06 23:29:23 vapier Exp $ 3# $Header: /var/cvsroot/gentoo-x86/eclass/flag-o-matic.eclass,v 1.96 2005/12/08 12:16:12 azarah Exp $
4 4
5ECLASS=flag-o-matic
6INHERITED="$INHERITED $ECLASS"
7
8IUSE="debug"
9 5
10# need access to emktemp() 6# need access to emktemp()
11inherit eutils toolchain-funcs multilib 7inherit eutils toolchain-funcs multilib
12 8
13# 9#
61# -fno-stack-protector to {C,CXX,LD}FLAGS 57# -fno-stack-protector to {C,CXX,LD}FLAGS
62# when a package is filtering -fstack-protector, -fstack-protector-all 58# when a package is filtering -fstack-protector, -fstack-protector-all
63# notice: modern automatic specs files will also suppress -fstack-protector-all 59# notice: modern automatic specs files will also suppress -fstack-protector-all
64# when only -fno-stack-protector is given 60# when only -fno-stack-protector is given
65# 61#
62#### bindnow-flags ####
63# Returns the flags to enable "now" binding in the current selected linker.
64#
65################ DEPRECATED functions ################
66# The following are still present to avoid breaking existing
67# code more than necessary; however they are deprecated. Please
68# use gcc-specs-* from toolchain-funcs.eclass instead, if you
69# need to know which hardened techs are active in the compiler.
70# See bug #100974
71#
72#### has_hardened ####
73# Returns true if the compiler has 'Hardened' in its version string,
74# (note; switched-spec vanilla compilers satisfy this condition) or
75# the specs file name contains 'hardened'.
76#
77#### has_pie ####
78# Returns true if the compiler by default or with current CFLAGS
79# builds position-independent code.
80#
81#### has_pic ####
82# Returns true if the compiler by default or with current CFLAGS
83# builds position-independent code.
84#
85#### has_ssp_all ####
86# Returns true if the compiler by default or with current CFLAGS
87# generates stack smash protections for all functions
88#
89#### has_ssp ####
90# Returns true if the compiler by default or with current CFLAGS
91# generates stack smash protections for most vulnerable functions
92#
66 93
67# C[XX]FLAGS that we allow in strip-flags 94# C[XX]FLAGS that we allow in strip-flags
68setup-allowed-flags() { 95setup-allowed-flags() {
69 if [[ -z ${ALLOWED_FLAGS} ]] ; then 96 if [[ -z ${ALLOWED_FLAGS} ]] ; then
70 export ALLOWED_FLAGS="-pipe" 97 export ALLOWED_FLAGS="-pipe"
71 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -O -O0 -O1 -O2 -mcpu -march -mtune" 98 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -O -O0 -O1 -O2 -mcpu -march -mtune"
72 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fstack-protector -fno-stack-protector" 99 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fstack-protector -fstack-protector-all"
100 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fbounds-checking -fno-bounds-checking"
73 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-pie -fno-unit-at-a-time" 101 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-pie -fno-unit-at-a-time"
74 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -g -g0 -g1 -g2 -g3 -ggdb -ggdb0 -ggdb1 -ggdb2 -ggdb3" 102 export ALLOWED_FLAGS="${ALLOWED_FLAGS} -g -g0 -g1 -g2 -g3 -ggdb -ggdb0 -ggdb1 -ggdb2 -ggdb3"
75 case $(tc-arch) in
76 mips) ALLOWED_FLAGS="${ALLOWED_FLAGS} -mips1 -mips2 -mips3 -mips4 -mips32 -mips64 -mips16 -EL -EB -mabi" ;;
77 amd64) ALLOWED_FLAGS="${ALLOWED_FLAGS} -fPIC -m64" ;;
78 x86) ALLOWED_FLAGS="${ALLOWED_FLAGS} -m32" ;;
79 alpha) ALLOWED_FLAGS="${ALLOWED_FLAGS} -fPIC" ;;
80 ia64) ALLOWED_FLAGS="${ALLOWED_FLAGS} -fPIC" ;;
81 sparc) ALLOWED_FLAGS="${ALLOWED_FLAGS} -m32 -m64" ;;
82 ppc) ALLOWED_FLAGS="${ALLOWED_FLAGS} -mabi" ;;
83 esac
84 fi 103 fi
85 # allow a bunch of flags that negate features / control ABI 104 # allow a bunch of flags that negate features / control ABI
86 ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-stack-protector -fno-stack-protector-all" 105 ALLOWED_FLAGS="${ALLOWED_FLAGS} -fno-stack-protector -fno-stack-protector-all"
87 case $(tc-arch) in 106 ALLOWED_FLAGS="${ALLOWED_FLAGS} -mregparm -mno-app-regs -mapp-regs \
88 x86|amd64|ia64) ALLOWED_FLAGS="${ALLOWED_FLAGS} -mno-mmx -mno-sse -mno-sse2 -mno-sse3 -mno-3dnow" ;; 107 -mno-mmx -mno-sse -mno-sse2 -mno-sse3 -mno-3dnow \
89 esac 108 -mips1 -mips2 -mips3 -mips4 -mips32 -mips64 -mips16 \
90 ALLOWED_FLAGS="${ALLOWED_FLAGS} -mregparm -mno-app-regs -mapp-regs -msoft-float -mflat -mno-faster-structs -mfaster-structs -mlittle-endian -mbig-endian -mlive-g0 -mcmodel -mno-stack-bias -mstack-bias" 109 -msoft-float -mno-soft-float -mhard-float -mno-hard-float -mfpu \
110 -mieee -mieee-with-inexact \
111 -mtls-direct-seg-refs -mno-tls-direct-seg-refs \
112 -mflat -mno-flat -mno-faster-structs -mfaster-structs \
113 -m32 -m64 -mabi -mlittle-endian -mbig-endian -EL -EB -fPIC \
114 -mlive-g0 -mcmodel -mstack-bias -mno-stack-bias"
91 115
92 # C[XX]FLAGS that we are think is ok, but needs testing 116 # C[XX]FLAGS that we are think is ok, but needs testing
93 # NOTE: currently -Os have issues with gcc3 and K6* arch's 117 # NOTE: currently -Os have issues with gcc3 and K6* arch's
94 export UNSTABLE_FLAGS="-Os -O3 -freorder-blocks -fprefetch-loop-arrays" 118 export UNSTABLE_FLAGS="-Os -O3 -freorder-blocks -fprefetch-loop-arrays"
95 return 0 119 return 0
125 149
126 return 0 150 return 0
127} 151}
128 152
129filter-lfs-flags() { 153filter-lfs-flags() {
154 [[ -n $@ ]] && die "filter-lfs-flags takes no arguments"
130 filter-flags -D_FILE_OFFSET_BITS=64 -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE 155 filter-flags -D_FILE_OFFSET_BITS=64 -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE
131} 156}
132 157
133append-lfs-flags() { 158append-lfs-flags() {
159 [[ -n $@ ]] && die "append-lfs-flags takes no arguments"
134 append-flags -D_FILE_OFFSET_BITS=64 -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE 160 append-flags -D_FILE_OFFSET_BITS=64 -D_LARGEFILE_SOURCE -D_LARGEFILE64_SOURCE
135} 161}
136 162
137append-flags() { 163append-flags() {
138 [[ -z $* ]] && return 0 164 [[ -z $* ]] && return 0
142 -n "`is-flag -fno-stack-protector-all`" ] && fstack-flags 168 -n "`is-flag -fno-stack-protector-all`" ] && fstack-flags
143 return 0 169 return 0
144} 170}
145 171
146replace-flags() { 172replace-flags() {
173 [[ $# != 2 ]] \
174 && echo && eerror "Usage: replace-flags <old flag> <new flag>" \
175 && die "replace-flags takes 2 arguments, not $#"
176
147 local f fset 177 local f fset
148 declare -a new_CFLAGS new_CXXFLAGS 178 declare -a new_CFLAGS new_CXXFLAGS
149 179
150 for fset in CFLAGS CXXFLAGS; do 180 for fset in CFLAGS CXXFLAGS; do
151 # Looping over the flags instead of using a global 181 # Looping over the flags instead of using a global
223 local NEW_CFLAGS="" 253 local NEW_CFLAGS=""
224 local NEW_CXXFLAGS="" 254 local NEW_CXXFLAGS=""
225 255
226 # Allow unstable C[XX]FLAGS if we are using unstable profile ... 256 # Allow unstable C[XX]FLAGS if we are using unstable profile ...
227 if has ~$(tc-arch) ${ACCEPT_KEYWORDS} ; then 257 if has ~$(tc-arch) ${ACCEPT_KEYWORDS} ; then
228 use debug && einfo "Enabling the use of some unstable flags"
229 ALLOWED_FLAGS="${ALLOWED_FLAGS} ${UNSTABLE_FLAGS}" 258 ALLOWED_FLAGS="${ALLOWED_FLAGS} ${UNSTABLE_FLAGS}"
230 fi 259 fi
231 260
232 set -f # disable pathname expansion 261 set -f # disable pathname expansion
233 262
264 export CFLAGS="${NEW_CFLAGS}" 293 export CFLAGS="${NEW_CFLAGS}"
265 export CXXFLAGS="${NEW_CXXFLAGS}" 294 export CXXFLAGS="${NEW_CXXFLAGS}"
266 return 0 295 return 0
267} 296}
268 297
298test-flag-PROG() {
299 local comp=$1
300 local flags="$2"
301
302 [[ -z ${comp} || -z ${flags} ]] && \
303 return 1
304
305 local PROG=$(tc-get${comp})
306 ${PROG} ${flags} -S -o /dev/null -xc /dev/null \
307 > /dev/null 2>&1
308}
309
310# Returns true if C compiler support given flag
311test-flag-CC() { test-flag-PROG "CC" "$1"; }
312
313# Returns true if C++ compiler support given flag
314test-flag-CXX() { test-flag-PROG "CXX" "$1"; }
315
316test-flags() {
317 local x
318
319 for x in "$@" ; do
320 test-flag-CC "${x}" || return 1
321 done
322
323 echo "$@"
324
325 return 0
326}
327
328# Depriciated, use test-flags()
269test_flag() { 329test_flag() {
270 if $(tc-getCC) -S -xc "$@" -o "$(emktemp)" /dev/null &>/dev/null; then 330 ewarn "test_flag: deprecated, please use test-flags()!" >/dev/stderr
271 printf "%s\n" "$*" 331
272 return 0 332 test-flags "$@"
273 fi
274 return 1
275} 333}
276 334
277test_version_info() { 335test_version_info() {
278 if [[ $($(tc-getCC) --version 2>&1) == *$1* ]]; then 336 if [[ $($(tc-getCC) --version 2>&1) == *$1* ]]; then
279 return 0 337 return 0
281 return 1 339 return 1
282 fi 340 fi
283} 341}
284 342
285strip-unsupported-flags() { 343strip-unsupported-flags() {
286 local NEW_CFLAGS NEW_CXXFLAGS 344 local x NEW_CFLAGS NEW_CXXFLAGS
287 345
288 for x in ${CFLAGS} ; do 346 for x in ${CFLAGS} ; do
289 NEW_CFLAGS="${NEW_CFLAGS} `test_flag ${x}`" 347 NEW_CFLAGS="${NEW_CFLAGS} $(test-flags ${x})"
290 done 348 done
291 for x in ${CXXFLAGS} ; do 349 for x in ${CXXFLAGS} ; do
292 NEW_CXXFLAGS="${NEW_CXXFLAGS} `test_flag ${x}`" 350 NEW_CXXFLAGS="${NEW_CXXFLAGS} $(test-flags ${x})"
293 done 351 done
294 352
295 export CFLAGS="${NEW_CFLAGS}" 353 export CFLAGS=${NEW_CFLAGS}
296 export CXXFLAGS="${NEW_CXXFLAGS}" 354 export CXXFLAGS=${NEW_CXXFLAGS}
297} 355}
298 356
299get-flag() { 357get-flag() {
300 local f findflag="$1" 358 local f findflag="$1"
301 359
311 fi 369 fi
312 done 370 done
313 return 1 371 return 1
314} 372}
315 373
374# DEPRECATED - use gcc-specs-relro or gcc-specs-now from toolchain-funcs
316has_hardened() { 375has_hardened() {
376 ewarn "has_hardened: deprecated, please use gcc-specs-{relro,now}()!" \
377 >/dev/stderr
378
317 test_version_info Hardened && return 0 379 test_version_info Hardened && return 0
318 # the specs file wont exist unless gcc has GCC_SPECS support 380 # The specs file wont exist unless gcc has GCC_SPECS support
319 [ -f "${GCC_SPECS}" -a "${GCC_SPECS}" != "${GCC_SPECS/hardened/}" ] && \ 381 [[ -f ${GCC_SPECS} && ${GCC_SPECS} != ${GCC_SPECS/hardened/} ]]
320 return 0
321 return 1
322} 382}
323 383
384# DEPRECATED - use gcc-specs-pie from toolchain-funcs
324# indicate whether PIC is set 385# indicate whether PIC is set
325has_pic() { 386has_pic() {
326 [ "${CFLAGS/-fPIC}" != "${CFLAGS}" ] && return 0 387 ewarn "has_pic: deprecated, please use gcc-specs-pie()!" >/dev/stderr
327 [ "${CFLAGS/-fpic}" != "${CFLAGS}" ] && return 0 388
389 [[ ${CFLAGS/-fPIC} != ${CFLAGS} || \
390 ${CFLAGS/-fpic} != ${CFLAGS} || \
328 [ "$(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIC__)" ] && return 0 391 -n $(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIC__) ]]
329 test_version_info pie && return 0
330 return 1
331} 392}
332 393
394# DEPRECATED - use gcc-specs-pie from toolchain-funcs
333# indicate whether PIE is set 395# indicate whether PIE is set
334has_pie() { 396has_pie() {
335 [ "${CFLAGS/-fPIE}" != "${CFLAGS}" ] && return 0 397 ewarn "has_pie: deprecated, please use gcc-specs-pie()!" >/dev/stderr
336 [ "${CFLAGS/-fpie}" != "${CFLAGS}" ] && return 0 398
399 [[ ${CFLAGS/-fPIE} != ${CFLAGS} || \
400 ${CFLAGS/-fpie} != ${CFLAGS} || \
401 -n $(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIE__) || \
337 [ "$(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIE__)" ] && return 0 402 -n $(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIC__) ]]
338 # test PIC while waiting for specs to be updated to generate __PIE__ 403 # test PIC while waiting for specs to be updated to generate __PIE__
404}
405
406# DEPRECATED - use gcc-specs-ssp from toolchain-funcs
407# indicate whether code for SSP is being generated for all functions
408has_ssp_all() {
409 ewarn "has_ssp_all: deprecated, please use gcc-specs-ssp()!" >/dev/stderr
410
411 # note; this matches only -fstack-protector-all
412 [[ ${CFLAGS/-fstack-protector-all} != ${CFLAGS} || \
339 [ "$(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __PIC__)" ] && return 0 413 -n $(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __SSP_ALL__) ]] || \
340 return 1 414 gcc-specs-ssp
341} 415}
342 416
417# DEPRECATED - use gcc-specs-ssp from toolchain-funcs
343# indicate whether code for SSP is being generated 418# indicate whether code for SSP is being generated
344has_ssp() { 419has_ssp() {
420 ewarn "has_ssp: deprecated, please use gcc-specs-ssp()!" >/dev/stderr
421
345 # note; this matches both -fstack-protector and -fstack-protector-all 422 # note; this matches both -fstack-protector and -fstack-protector-all
346 [ "${CFLAGS/-fstack-protector}" != "${CFLAGS}" ] && return 0 423 [[ ${CFLAGS/-fstack-protector} != ${CFLAGS} || \
347 [ "$(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __SSP__)" ] && return 0 424 -n $(echo | $(tc-getCC) ${CFLAGS} -E -dM - | grep __SSP__) ]] || \
348 return 1 425 gcc-specs-ssp
349} 426}
350 427
351has_m64() { 428has_m64() {
352 # this doesnt test if the flag is accepted, it tests if the flag 429 # this doesnt test if the flag is accepted, it tests if the flag
353 # actually -WORKS-. non-multilib gcc will take both -m32 and -m64! 430 # actually -WORKS-. non-multilib gcc will take both -m32 and -m64!
354 # please dont replace this function with test_flag in some future 431 # please dont replace this function with test_flag in some future
355 # clean-up! 432 # clean-up!
433
356 local temp="$(emktemp)" 434 local temp="$(emktemp)"
357 echo "int main() { return(0); }" > ${temp}.c 435 echo "int main() { return(0); }" > "${temp}".c
358 MY_CC=$(tc-getCC) 436 MY_CC=$(tc-getCC)
359 ${MY_CC/ .*/} -m64 -o "$(emktemp)" ${temp}.c > /dev/null 2>&1 437 ${MY_CC/ .*/} -m64 -o "$(emktemp)" "${temp}".c > /dev/null 2>&1
360 local ret=$? 438 local ret=$?
361 rm -f ${temp}.c 439 rm -f "${temp}".c
362 [ "$ret" != "1" ] && return 0 440 [[ ${ret} != 1 ]] && return 0
363 return 1 441 return 1
364} 442}
365 443
366has_m32() { 444has_m32() {
367 # this doesnt test if the flag is accepted, it tests if the flag 445 # this doesnt test if the flag is accepted, it tests if the flag
369 # please dont replace this function with test_flag in some future 447 # please dont replace this function with test_flag in some future
370 # clean-up! 448 # clean-up!
371 449
372 [ "$(tc-arch)" = "amd64" ] && has_multilib_profile && return 0 450 [ "$(tc-arch)" = "amd64" ] && has_multilib_profile && return 0
373 451
374 local temp="$(emktemp)" 452 local temp=$(emktemp)
375 echo "int main() { return(0); }" > ${temp}.c 453 echo "int main() { return(0); }" > "${temp}".c
376 MY_CC=$(tc-getCC) 454 MY_CC=$(tc-getCC)
377 ${MY_CC/ .*/} -m32 -o "$(emktemp)" ${temp}.c > /dev/null 2>&1 455 ${MY_CC/ .*/} -m32 -o "$(emktemp)" "${temp}".c > /dev/null 2>&1
378 local ret=$? 456 local ret=$?
379 rm -f ${temp}.c 457 rm -f "${temp}".c
380 [ "$ret" != "1" ] && return 0 458 [[ ${ret} != 1 ]] && return 0
381 return 1 459 return 1
382} 460}
383 461
384replace-sparc64-flags() { 462replace-sparc64-flags() {
385 local SPARC64_CPUS="ultrasparc v9" 463 local SPARC64_CPUS="ultrasparc v9"
427 export LDFLAGS 505 export LDFLAGS
428 return 0 506 return 0
429} 507}
430 508
431fstack-flags() { 509fstack-flags() {
432 if has_ssp; then 510 if gcc-specs-ssp; then
433 [ -z "`is-flag -fno-stack-protector`" ] && 511 [ -z "`is-flag -fno-stack-protector`" ] &&
434 export CFLAGS="${CFLAGS} `test_flag -fno-stack-protector`" 512 export CFLAGS="${CFLAGS} `test_flag -fno-stack-protector`"
435 fi 513 fi
436 return 0 514 return 0
437} 515}
455 533
456 replace-cpu-flags ev6{7,8} ev6 534 replace-cpu-flags ev6{7,8} ev6
457 535
458 export CFLAGS CXXFLAGS 536 export CFLAGS CXXFLAGS
459} 537}
538
539# Gets the flags needed for "NOW" binding
540bindnow-flags() {
541 case $($(tc-getLD) -v 2>&1 </dev/null) in
542 *GNU* | *'with BFD'*) # GNU ld
543 echo "-Wl,-z,now" ;;
544 *Apple*) # Darwin ld
545 echo "-bind_at_load" ;;
546 *)
547 # Some linkers just recognize -V instead of -v
548 case $($(tc-getLD) -V 2>&1 </dev/null) in
549 *Solaris*) # Solaris accept almost the same GNU options
550 echo "-Wl,-z,now" ;;
551 esac
552 ;;
553 esac
554}

Legend:
Removed from v.1.85  
changed lines
  Added in v.1.96

  ViewVC Help
Powered by ViewVC 1.1.20