1 | # Copyright 1999-2007 Gentoo Foundation |
1 | # Copyright 1999-2007 Gentoo Foundation |
2 | # Distributed under the terms of the GNU General Public License v2 |
2 | # Distributed under the terms of the GNU General Public License v2 |
3 | # $Header: /var/cvsroot/gentoo-x86/eclass/toolchain-funcs.eclass,v 1.80 2009/01/02 22:14:18 gengor Exp $ |
3 | # $Header: /var/cvsroot/gentoo-x86/eclass/toolchain-funcs.eclass,v 1.90 2009/04/05 07:50:08 grobian Exp $ |
4 | |
4 | |
5 | # @ECLASS: toolchain-funcs.eclass |
5 | # @ECLASS: toolchain-funcs.eclass |
6 | # @MAINTAINER: |
6 | # @MAINTAINER: |
7 | # Toolchain Ninjas <toolchain@gentoo.org> |
7 | # Toolchain Ninjas <toolchain@gentoo.org> |
8 | # @BLURB: functions to query common info about the toolchain |
8 | # @BLURB: functions to query common info about the toolchain |
… | |
… | |
70 | tc-getNM() { tc-getPROG NM nm "$@"; } |
70 | tc-getNM() { tc-getPROG NM nm "$@"; } |
71 | # @FUNCTION: tc-getRANLIB |
71 | # @FUNCTION: tc-getRANLIB |
72 | # @USAGE: [toolchain prefix] |
72 | # @USAGE: [toolchain prefix] |
73 | # @RETURN: name of the archiver indexer |
73 | # @RETURN: name of the archiver indexer |
74 | tc-getRANLIB() { tc-getPROG RANLIB ranlib "$@"; } |
74 | tc-getRANLIB() { tc-getPROG RANLIB ranlib "$@"; } |
|
|
75 | # @FUNCTION: tc-getOBJCOPY |
|
|
76 | # @USAGE: [toolchain prefix] |
|
|
77 | # @RETURN: name of the object copier |
|
|
78 | tc-getOBJCOPY() { tc-getPROG OBJCOPY objcopy "$@"; } |
75 | # @FUNCTION: tc-getF77 |
79 | # @FUNCTION: tc-getF77 |
76 | # @USAGE: [toolchain prefix] |
80 | # @USAGE: [toolchain prefix] |
77 | # @RETURN: name of the Fortran 77 compiler |
81 | # @RETURN: name of the Fortran 77 compiler |
78 | tc-getF77() { tc-getPROG F77 f77 "$@"; } |
82 | tc-getF77() { tc-getPROG F77 f77 "$@"; } |
79 | # @FUNCTION: tc-getFC |
83 | # @FUNCTION: tc-getFC |
… | |
… | |
347 | |
351 | |
348 | # Returns true if gcc sets relro |
352 | # Returns true if gcc sets relro |
349 | gcc-specs-relro() { |
353 | gcc-specs-relro() { |
350 | local directive |
354 | local directive |
351 | directive=$(gcc-specs-directive link_command) |
355 | directive=$(gcc-specs-directive link_command) |
352 | return $([[ ${directive/\{!norelro:} != ${directive} ]]) |
356 | return $([[ "${directive/\{!norelro:}" != "${directive}" ]]) |
353 | } |
357 | } |
354 | # Returns true if gcc sets now |
358 | # Returns true if gcc sets now |
355 | gcc-specs-now() { |
359 | gcc-specs-now() { |
356 | local directive |
360 | local directive |
357 | directive=$(gcc-specs-directive link_command) |
361 | directive=$(gcc-specs-directive link_command) |
358 | return $([[ ${directive/\{!nonow:} != ${directive} ]]) |
362 | return $([[ "${directive/\{!nonow:}" != "${directive}" ]]) |
359 | } |
363 | } |
360 | # Returns true if gcc builds PIEs |
364 | # Returns true if gcc builds PIEs |
361 | gcc-specs-pie() { |
365 | gcc-specs-pie() { |
362 | local directive |
366 | local directive |
363 | directive=$(gcc-specs-directive cc1) |
367 | directive=$(gcc-specs-directive cc1) |
364 | return $([[ ${directive/\{!nopie:} != ${directive} ]]) |
368 | return $([[ "${directive/\{!nopie:}" != "${directive}" ]]) |
365 | } |
369 | } |
366 | # Returns true if gcc builds with the stack protector |
370 | # Returns true if gcc builds with the stack protector |
367 | gcc-specs-ssp() { |
371 | gcc-specs-ssp() { |
368 | local directive |
372 | local directive |
369 | directive=$(gcc-specs-directive cc1) |
373 | directive=$(gcc-specs-directive cc1) |
370 | return $([[ ${directive/\{!fno-stack-protector:} != ${directive} ]]) |
374 | return $([[ "${directive/\{!fno-stack-protector:}" != "${directive}" ]]) |
371 | } |
375 | } |
372 | # Returns true if gcc upgrades fstack-protector to fstack-protector-all |
376 | # Returns true if gcc upgrades fstack-protector to fstack-protector-all |
373 | gcc-specs-ssp-to-all() { |
377 | gcc-specs-ssp-to-all() { |
374 | local directive |
378 | local directive |
375 | directive=$(gcc-specs-directive cc1) |
379 | directive=$(gcc-specs-directive cc1) |
376 | return $([[ ${directive/\{!fno-stack-protector-all:} != ${directive} ]]) |
380 | return $([[ "${directive/\{!fno-stack-protector-all:}" != "${directive}" ]]) |
377 | } |
381 | } |
378 | # Returns true if gcc builds with fno-strict-overflow |
382 | # Returns true if gcc builds with fno-strict-overflow |
379 | gcc-specs-nostrict() { |
383 | gcc-specs-nostrict() { |
380 | local directive |
384 | local directive |
381 | directive=$(gcc-specs-directive cc1) |
385 | directive=$(gcc-specs-directive cc1) |
382 | return $([[ ${directive/\{!fstrict-overflow:} != ${directive} ]]) |
386 | return $([[ "${directive/\{!fstrict-overflow:}" != "${directive}" ]]) |
383 | } |
387 | } |
384 | |
388 | |
385 | |
389 | |
386 | # @FUNCTION: gen_usr_ldscript |
390 | # @FUNCTION: gen_usr_ldscript |
387 | # @USAGE: <list of libs to create linker scripts for> |
391 | # @USAGE: [-a] <list of libs to create linker scripts for> |
388 | # @DESCRIPTION: |
392 | # @DESCRIPTION: |
389 | # This function generate linker scripts in /usr/lib for dynamic |
393 | # This function generate linker scripts in /usr/lib for dynamic |
390 | # libs in /lib. This is to fix linking problems when you have |
394 | # libs in /lib. This is to fix linking problems when you have |
391 | # the .so in /lib, and the .a in /usr/lib. What happens is that |
395 | # the .so in /lib, and the .a in /usr/lib. What happens is that |
392 | # in some cases when linking dynamic, the .a in /usr/lib is used |
396 | # in some cases when linking dynamic, the .a in /usr/lib is used |
… | |
… | |
396 | # |
400 | # |
397 | # Note that you should in general use the unversioned name of |
401 | # Note that you should in general use the unversioned name of |
398 | # the library (libfoo.so), as ldconfig should usually update it |
402 | # the library (libfoo.so), as ldconfig should usually update it |
399 | # correctly to point to the latest version of the library present. |
403 | # correctly to point to the latest version of the library present. |
400 | gen_usr_ldscript() { |
404 | gen_usr_ldscript() { |
401 | local lib libdir=$(get_libdir) output_format="" |
405 | local lib libdir=$(get_libdir) output_format="" auto=false suffix=$(get_libname) |
402 | # Just make sure it exists |
406 | # Just make sure it exists |
403 | dodir /usr/${libdir} |
407 | dodir /usr/${libdir} |
|
|
408 | |
|
|
409 | if [[ $1 == "-a" ]] ; then |
|
|
410 | auto=true |
|
|
411 | shift |
|
|
412 | dodir /${libdir} |
|
|
413 | fi |
404 | |
414 | |
405 | # OUTPUT_FORMAT gives hints to the linker as to what binary format |
415 | # OUTPUT_FORMAT gives hints to the linker as to what binary format |
406 | # is referenced ... makes multilib saner |
416 | # is referenced ... makes multilib saner |
407 | output_format=$($(tc-getCC) ${CFLAGS} ${LDFLAGS} -Wl,--verbose 2>&1 | sed -n 's/^OUTPUT_FORMAT("\([^"]*\)",.*/\1/p') |
417 | output_format=$($(tc-getCC) ${CFLAGS} ${LDFLAGS} -Wl,--verbose 2>&1 | sed -n 's/^OUTPUT_FORMAT("\([^"]*\)",.*/\1/p') |
408 | [[ -n ${output_format} ]] && output_format="OUTPUT_FORMAT ( ${output_format} )" |
418 | [[ -n ${output_format} ]] && output_format="OUTPUT_FORMAT ( ${output_format} )" |
… | |
… | |
411 | if [[ ${USERLAND} == "Darwin" ]] ; then |
421 | if [[ ${USERLAND} == "Darwin" ]] ; then |
412 | ewarn "Not creating fake dynamic library for $lib on Darwin;" |
422 | ewarn "Not creating fake dynamic library for $lib on Darwin;" |
413 | ewarn "making a symlink instead." |
423 | ewarn "making a symlink instead." |
414 | dosym "/${libdir}/${lib}" "/usr/${libdir}/${lib}" |
424 | dosym "/${libdir}/${lib}" "/usr/${libdir}/${lib}" |
415 | else |
425 | else |
|
|
426 | local tlib |
|
|
427 | if ${auto} ; then |
|
|
428 | lib="lib${lib}${suffix}" |
|
|
429 | tlib=$(scanelf -qF'%S#F' "${D}"/usr/${libdir}/${lib}) |
|
|
430 | mv "${D}"/usr/${libdir}/${lib}* "${D}"/${libdir}/ || die |
|
|
431 | # some SONAMEs are funky: they encode a version before the .so |
|
|
432 | if [[ ${tlib} != ${lib}* ]] ; then |
|
|
433 | mv "${D}"/usr/${libdir}/${tlib}* "${D}"/${libdir}/ || die |
|
|
434 | fi |
|
|
435 | [[ -z ${tlib} ]] && die "unable to read SONAME from ${lib}" |
|
|
436 | rm -f "${D}"/${libdir}/${lib} |
|
|
437 | else |
|
|
438 | tlib=${lib} |
|
|
439 | fi |
416 | cat > "${D}/usr/${libdir}/${lib}" <<-END_LDSCRIPT |
440 | cat > "${D}/usr/${libdir}/${lib}" <<-END_LDSCRIPT |
417 | /* GNU ld script |
441 | /* GNU ld script |
418 | Since Gentoo has critical dynamic libraries |
442 | Since Gentoo has critical dynamic libraries in /lib, and the static versions |
419 | in /lib, and the static versions in /usr/lib, |
443 | in /usr/lib, we need to have a "fake" dynamic lib in /usr/lib, otherwise we |
420 | we need to have a "fake" dynamic lib in /usr/lib, |
444 | run into linking problems. This "fake" dynamic lib is a linker script that |
421 | otherwise we run into linking problems. |
445 | redirects the linker to the real lib. And yes, this works in the cross- |
|
|
446 | compiling scenario as the sysroot-ed linker will prepend the real path. |
422 | |
447 | |
423 | See bug http://bugs.gentoo.org/4411 for more info. |
448 | See bug http://bugs.gentoo.org/4411 for more info. |
424 | */ |
449 | */ |
425 | ${output_format} |
450 | ${output_format} |
426 | GROUP ( /${libdir}/${lib} ) |
451 | GROUP ( /${libdir}/${tlib} ) |
427 | END_LDSCRIPT |
452 | END_LDSCRIPT |
|
|
453 | fperms a+x "/usr/${libdir}/${lib}" || die "could not change perms on ${lib}" |
428 | fi |
454 | fi |
429 | fperms a+x "/usr/${libdir}/${lib}" || die "could not change perms on ${lib}" |
|
|
430 | done |
455 | done |
431 | } |
456 | } |