2020-04-24 23:36:52 +00:00
|
|
|
# The Nixpkgs CC is not directly usable, since it doesn't know where
|
|
|
|
# the C library and standard header files are. Therefore the compiler
|
|
|
|
# produced by that package cannot be installed directly in a user
|
|
|
|
# environment and used from the command line. So we use a wrapper
|
|
|
|
# script that sets up the right environment variables so that the
|
|
|
|
# compiler and the linker just "work".
|
|
|
|
|
|
|
|
{ name ? ""
|
2021-02-05 17:12:51 +00:00
|
|
|
, lib
|
2020-04-24 23:36:52 +00:00
|
|
|
, stdenvNoCC
|
2024-04-21 15:54:59 +00:00
|
|
|
, runtimeShell
|
|
|
|
, cc ? null, libc ? null, bintools, coreutils ? null
|
2020-05-29 06:06:01 +00:00
|
|
|
, zlib ? null
|
2020-04-24 23:36:52 +00:00
|
|
|
, nativeTools, noLibc ? false, nativeLibc, nativePrefix ? ""
|
|
|
|
, propagateDoc ? cc != null && cc ? man
|
|
|
|
, extraTools ? [], extraPackages ? [], extraBuildCommands ? ""
|
2022-06-16 17:23:12 +00:00
|
|
|
, nixSupport ? {}
|
2023-04-29 16:46:19 +00:00
|
|
|
, isGNU ? false, isClang ? cc.isClang or false, isCcache ? cc.isCcache or false, gnugrep ? null
|
2024-04-21 15:54:59 +00:00
|
|
|
, expand-response-params
|
2020-04-24 23:36:52 +00:00
|
|
|
, libcxx ? null
|
2023-04-12 12:48:02 +00:00
|
|
|
|
|
|
|
# Whether or not to add `-B` and `-L` to `nix-support/cc-{c,ld}flags`
|
|
|
|
, useCcForLibs ?
|
|
|
|
|
|
|
|
# Always add these flags for Clang, because in order to compile (most
|
|
|
|
# software) it needs libraries that are shipped and compiled with gcc.
|
|
|
|
if isClang then true
|
|
|
|
|
|
|
|
# Never add these flags for a build!=host cross-compiler or a host!=target
|
|
|
|
# ("cross-built-native") compiler; currently nixpkgs has a special build
|
|
|
|
# path for these (`crossStageStatic`). Hopefully at some point that build
|
|
|
|
# path will be merged with this one and this conditional will be removed.
|
|
|
|
else if (with stdenvNoCC; buildPlatform != hostPlatform || hostPlatform != targetPlatform) then false
|
|
|
|
|
|
|
|
# Never add these flags when wrapping the bootstrapFiles' compiler; it has a
|
|
|
|
# /usr/-like layout with everything smashed into a single outpath, so it has
|
|
|
|
# no trouble finding its own libraries.
|
|
|
|
else if (cc.passthru.isFromBootstrapFiles or false) then false
|
|
|
|
|
|
|
|
# Add these flags when wrapping `xgcc` (the first compiler that nixpkgs builds)
|
|
|
|
else if (cc.passthru.isXgcc or false) then true
|
|
|
|
|
|
|
|
# Add these flags when wrapping `stdenv.cc`
|
|
|
|
else if (cc.stdenv.cc.cc.passthru.isXgcc or false) then true
|
|
|
|
|
|
|
|
# Do not add these flags in any other situation. This is `false` mainly to
|
|
|
|
# prevent these flags from being added when wrapping *old* versions of gcc
|
|
|
|
# (e.g. `gcc6Stdenv`), since they will cause the old gcc to get `-B` and
|
|
|
|
# `-L` flags pointing at the new gcc's libstdc++ headers. Example failure:
|
|
|
|
# https://hydra.nixos.org/build/213125495
|
|
|
|
else false
|
|
|
|
|
|
|
|
# the derivation at which the `-B` and `-L` flags added by `useCcForLibs` will point
|
2023-03-15 16:39:30 +00:00
|
|
|
, gccForLibs ? if useCcForLibs then cc else null
|
2023-08-22 20:05:09 +00:00
|
|
|
, fortify-headers ? null
|
|
|
|
, includeFortifyHeaders ? null
|
2020-04-24 23:36:52 +00:00
|
|
|
}:
|
|
|
|
|
|
|
|
assert nativeTools -> !propagateDoc && nativePrefix != "";
|
2024-04-21 15:54:59 +00:00
|
|
|
assert !nativeTools -> cc != null && coreutils != null && gnugrep != null;
|
2020-04-24 23:36:52 +00:00
|
|
|
assert !(nativeLibc && noLibc);
|
|
|
|
assert (noLibc || nativeLibc) == (libc == null);
|
|
|
|
|
|
|
|
let
|
2024-04-21 15:54:59 +00:00
|
|
|
inherit (lib)
|
|
|
|
attrByPath
|
|
|
|
concatMapStrings
|
|
|
|
concatStringsSep
|
|
|
|
escapeShellArg
|
|
|
|
getBin
|
|
|
|
getDev
|
|
|
|
getLib
|
|
|
|
getName
|
|
|
|
getVersion
|
|
|
|
mapAttrsToList
|
|
|
|
optional
|
|
|
|
optionalAttrs
|
|
|
|
optionals
|
|
|
|
optionalString
|
|
|
|
removePrefix
|
|
|
|
replaceStrings
|
|
|
|
toList
|
|
|
|
versionAtLeast
|
|
|
|
;
|
|
|
|
|
|
|
|
inherit (stdenvNoCC) hostPlatform targetPlatform;
|
2020-04-24 23:36:52 +00:00
|
|
|
|
2023-08-22 20:05:09 +00:00
|
|
|
includeFortifyHeaders' = if includeFortifyHeaders != null
|
|
|
|
then includeFortifyHeaders
|
2023-10-09 19:29:22 +00:00
|
|
|
else (targetPlatform.libc == "musl" && isGNU);
|
2023-08-22 20:05:09 +00:00
|
|
|
|
2020-04-24 23:36:52 +00:00
|
|
|
# Prefix for binaries. Customarily ends with a dash separator.
|
|
|
|
#
|
2024-04-21 15:54:59 +00:00
|
|
|
# TODO(@Ericson2314) Make unconditional, or optional but always true by default.
|
|
|
|
targetPrefix = optionalString (targetPlatform != hostPlatform) (targetPlatform.config + "-");
|
2020-04-24 23:36:52 +00:00
|
|
|
|
2024-04-21 15:54:59 +00:00
|
|
|
ccVersion = getVersion cc;
|
|
|
|
ccName = removePrefix targetPrefix (getName cc);
|
2020-04-24 23:36:52 +00:00
|
|
|
|
2023-08-04 22:07:22 +00:00
|
|
|
libc_bin = optionalString (libc != null) (getBin libc);
|
|
|
|
libc_dev = optionalString (libc != null) (getDev libc);
|
|
|
|
libc_lib = optionalString (libc != null) (getLib libc);
|
2020-04-24 23:36:52 +00:00
|
|
|
cc_solib = getLib cc
|
|
|
|
+ optionalString (targetPlatform != hostPlatform) "/${targetPlatform.config}";
|
|
|
|
|
|
|
|
# The wrapper scripts use 'cat' and 'grep', so we may need coreutils.
|
2023-08-04 22:07:22 +00:00
|
|
|
coreutils_bin = optionalString (!nativeTools) (getBin coreutils);
|
2020-04-24 23:36:52 +00:00
|
|
|
|
2020-06-18 07:06:33 +00:00
|
|
|
# The "suffix salt" is a arbitrary string added in the end of env vars
|
2020-04-24 23:36:52 +00:00
|
|
|
# defined by cc-wrapper's hooks so that multiple cc-wrappers can be used
|
|
|
|
# without interfering. For the moment, it is defined as the target triple,
|
|
|
|
# adjusted to be a valid bash identifier. This should be considered an
|
|
|
|
# unstable implementation detail, however.
|
2020-06-18 07:06:33 +00:00
|
|
|
suffixSalt = replaceStrings ["-" "."] ["_" "_"] targetPlatform.config;
|
2020-04-24 23:36:52 +00:00
|
|
|
|
2023-03-15 16:39:30 +00:00
|
|
|
useGccForLibs = useCcForLibs
|
2020-09-25 04:45:31 +00:00
|
|
|
&& libcxx == null
|
2024-04-21 15:54:59 +00:00
|
|
|
&& !targetPlatform.isDarwin
|
|
|
|
&& !(targetPlatform.useLLVM or false)
|
|
|
|
&& !(targetPlatform.useAndroidPrebuilt or false)
|
|
|
|
&& !(targetPlatform.isiOS or false)
|
2020-09-25 04:45:31 +00:00
|
|
|
&& gccForLibs != null;
|
2023-10-09 19:29:22 +00:00
|
|
|
gccForLibs_solib = getLib gccForLibs
|
|
|
|
+ optionalString (targetPlatform != hostPlatform) "/${targetPlatform.config}";
|
2020-09-25 04:45:31 +00:00
|
|
|
|
2024-01-25 14:12:00 +00:00
|
|
|
# Analogously to cc_solib and gccForLibs_solib
|
2024-04-21 15:54:59 +00:00
|
|
|
libcxx_solib = "${getLib libcxx}/lib";
|
2024-01-25 14:12:00 +00:00
|
|
|
|
2023-11-16 04:20:00 +00:00
|
|
|
# The following two functions, `isGccArchSupported` and
|
|
|
|
# `isGccTuneSupported`, only handle those situations where a flag
|
|
|
|
# (`-march` or `-mtune`) is accepted by one compiler but rejected
|
|
|
|
# by another, and both compilers are relevant to nixpkgs. We are
|
|
|
|
# not trying to maintain a complete list of all flags accepted by
|
|
|
|
# all versions of all compilers ever in nixpkgs.
|
|
|
|
#
|
|
|
|
# The two main cases of interest are:
|
|
|
|
#
|
|
|
|
# - One compiler is gcc and the other is clang
|
|
|
|
# - One compiler is pkgs.gcc and the other is bootstrap-files.gcc
|
|
|
|
# -- older compilers (for example bootstrap's GCC 5) fail with
|
|
|
|
# -march=too-modern-cpu
|
|
|
|
|
2020-04-24 23:36:52 +00:00
|
|
|
isGccArchSupported = arch:
|
2023-01-11 07:51:40 +00:00
|
|
|
if targetPlatform.isPower then false else # powerpc does not allow -march=
|
2020-07-18 16:06:22 +00:00
|
|
|
if isGNU then
|
2023-07-15 17:15:38 +00:00
|
|
|
{ # Generic
|
|
|
|
x86-64-v2 = versionAtLeast ccVersion "11.0";
|
|
|
|
x86-64-v3 = versionAtLeast ccVersion "11.0";
|
|
|
|
x86-64-v4 = versionAtLeast ccVersion "11.0";
|
|
|
|
|
|
|
|
# Intel
|
2020-09-25 04:45:31 +00:00
|
|
|
skylake = versionAtLeast ccVersion "6.0";
|
2020-04-24 23:36:52 +00:00
|
|
|
skylake-avx512 = versionAtLeast ccVersion "6.0";
|
|
|
|
cannonlake = versionAtLeast ccVersion "8.0";
|
|
|
|
icelake-client = versionAtLeast ccVersion "8.0";
|
|
|
|
icelake-server = versionAtLeast ccVersion "8.0";
|
2020-12-25 13:55:36 +00:00
|
|
|
cascadelake = versionAtLeast ccVersion "9.0";
|
|
|
|
cooperlake = versionAtLeast ccVersion "10.0";
|
|
|
|
tigerlake = versionAtLeast ccVersion "10.0";
|
2020-04-24 23:36:52 +00:00
|
|
|
knm = versionAtLeast ccVersion "8.0";
|
2023-07-15 17:15:38 +00:00
|
|
|
alderlake = versionAtLeast ccVersion "12.0";
|
|
|
|
|
2020-09-25 04:45:31 +00:00
|
|
|
# AMD
|
|
|
|
znver1 = versionAtLeast ccVersion "6.0";
|
|
|
|
znver2 = versionAtLeast ccVersion "9.0";
|
2020-12-25 13:55:36 +00:00
|
|
|
znver3 = versionAtLeast ccVersion "11.0";
|
2023-07-15 17:15:38 +00:00
|
|
|
znver4 = versionAtLeast ccVersion "13.0";
|
2020-04-24 23:36:52 +00:00
|
|
|
}.${arch} or true
|
2020-07-18 16:06:22 +00:00
|
|
|
else if isClang then
|
2023-07-15 17:15:38 +00:00
|
|
|
{ #Generic
|
|
|
|
x86-64-v2 = versionAtLeast ccVersion "12.0";
|
|
|
|
x86-64-v3 = versionAtLeast ccVersion "12.0";
|
|
|
|
x86-64-v4 = versionAtLeast ccVersion "12.0";
|
|
|
|
|
|
|
|
# Intel
|
2020-09-25 04:45:31 +00:00
|
|
|
cannonlake = versionAtLeast ccVersion "5.0";
|
2020-04-24 23:36:52 +00:00
|
|
|
icelake-client = versionAtLeast ccVersion "7.0";
|
|
|
|
icelake-server = versionAtLeast ccVersion "7.0";
|
|
|
|
knm = versionAtLeast ccVersion "7.0";
|
2023-07-15 17:15:38 +00:00
|
|
|
alderlake = versionAtLeast ccVersion "16.0";
|
|
|
|
|
2020-09-25 04:45:31 +00:00
|
|
|
# AMD
|
|
|
|
znver1 = versionAtLeast ccVersion "4.0";
|
|
|
|
znver2 = versionAtLeast ccVersion "9.0";
|
2023-07-15 17:15:38 +00:00
|
|
|
znver3 = versionAtLeast ccVersion "12.0";
|
|
|
|
znver4 = versionAtLeast ccVersion "16.0";
|
2020-04-24 23:36:52 +00:00
|
|
|
}.${arch} or true
|
|
|
|
else
|
|
|
|
false;
|
|
|
|
|
2023-11-16 04:20:00 +00:00
|
|
|
isGccTuneSupported = tune:
|
|
|
|
# for x86 -mtune= takes the same values as -march, plus two more:
|
|
|
|
if targetPlatform.isx86 then
|
|
|
|
{
|
|
|
|
generic = true;
|
|
|
|
intel = true;
|
|
|
|
}.${tune} or (isGccArchSupported tune)
|
|
|
|
# on arm64, the -mtune= values are specific processors
|
|
|
|
else if targetPlatform.isAarch64 then
|
|
|
|
(if isGNU then
|
|
|
|
{
|
|
|
|
cortex-a53 = versionAtLeast ccVersion "4.8"; # gcc 8c075f
|
|
|
|
cortex-a72 = versionAtLeast ccVersion "5.1"; # gcc d8f70d
|
|
|
|
"cortex-a72.cortex-a53" = versionAtLeast ccVersion "5.1"; # gcc d8f70d
|
|
|
|
}.${tune} or false
|
|
|
|
else if isClang then
|
|
|
|
{
|
|
|
|
cortex-a53 = versionAtLeast ccVersion "3.9"; # llvm dfc5d1
|
|
|
|
}.${tune} or false
|
|
|
|
else false)
|
|
|
|
else if targetPlatform.isPower then
|
|
|
|
# powerpc does not support -march
|
|
|
|
true
|
|
|
|
else if targetPlatform.isMips then
|
|
|
|
# for mips -mtune= takes the same values as -march
|
|
|
|
isGccArchSupported tune
|
|
|
|
else
|
|
|
|
false;
|
|
|
|
|
|
|
|
# Clang does not support as many `-mtune=` values as gcc does;
|
|
|
|
# this function will return the best possible approximation of the
|
|
|
|
# provided `-mtune=` value, or `null` if none exists.
|
|
|
|
#
|
|
|
|
# Note: this function can make use of ccVersion; for example, `if
|
|
|
|
# versionOlder ccVersion "12" then ...`
|
|
|
|
findBestTuneApproximation = tune:
|
|
|
|
let guess = if isClang
|
|
|
|
then {
|
|
|
|
# clang does not tune for big.LITTLE chips
|
|
|
|
"cortex-a72.cortex-a53" = "cortex-a72";
|
|
|
|
}.${tune} or tune
|
|
|
|
else tune;
|
|
|
|
in if isGccTuneSupported guess
|
|
|
|
then guess
|
|
|
|
else null;
|
2021-04-26 19:14:03 +00:00
|
|
|
|
2024-01-13 08:15:51 +00:00
|
|
|
defaultHardeningFlags = bintools.defaultHardeningFlags or [];
|
|
|
|
|
2024-02-29 20:09:43 +00:00
|
|
|
# if cc.hardeningUnsupportedFlagsByTargetPlatform exists, this is
|
|
|
|
# called with the targetPlatform as an argument and
|
|
|
|
# cc.hardeningUnsupportedFlags is completely ignored - the function
|
|
|
|
# is responsible for including the constant hardeningUnsupportedFlags
|
|
|
|
# list however it sees fit.
|
|
|
|
ccHardeningUnsupportedFlags = if cc ? hardeningUnsupportedFlagsByTargetPlatform
|
|
|
|
then cc.hardeningUnsupportedFlagsByTargetPlatform targetPlatform
|
|
|
|
else (cc.hardeningUnsupportedFlags or []);
|
|
|
|
|
2024-04-21 15:54:59 +00:00
|
|
|
darwinPlatformForCC = optionalString targetPlatform.isDarwin (
|
2021-04-26 19:14:03 +00:00
|
|
|
if (targetPlatform.darwinPlatform == "macos" && isGNU) then "macosx"
|
|
|
|
else targetPlatform.darwinPlatform
|
|
|
|
);
|
|
|
|
|
2024-04-21 15:54:59 +00:00
|
|
|
darwinMinVersion = optionalString targetPlatform.isDarwin (
|
|
|
|
targetPlatform.darwinMinVersion
|
2021-04-26 19:14:03 +00:00
|
|
|
);
|
|
|
|
|
2024-04-21 15:54:59 +00:00
|
|
|
darwinMinVersionVariable = optionalString targetPlatform.isDarwin
|
|
|
|
targetPlatform.darwinMinVersionVariable;
|
2020-04-24 23:36:52 +00:00
|
|
|
in
|
|
|
|
|
2023-08-22 20:05:09 +00:00
|
|
|
assert includeFortifyHeaders' -> fortify-headers != null;
|
|
|
|
|
2020-04-24 23:36:52 +00:00
|
|
|
# Ensure bintools matches
|
|
|
|
assert libc_bin == bintools.libc_bin;
|
|
|
|
assert libc_dev == bintools.libc_dev;
|
|
|
|
assert libc_lib == bintools.libc_lib;
|
|
|
|
assert nativeTools == bintools.nativeTools;
|
|
|
|
assert nativeLibc == bintools.nativeLibc;
|
|
|
|
assert nativePrefix == bintools.nativePrefix;
|
|
|
|
|
2024-04-21 15:54:59 +00:00
|
|
|
stdenvNoCC.mkDerivation {
|
2020-04-24 23:36:52 +00:00
|
|
|
pname = targetPrefix
|
|
|
|
+ (if name != "" then name else "${ccName}-wrapper");
|
2023-08-04 22:07:22 +00:00
|
|
|
version = optionalString (cc != null) ccVersion;
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
|
|
preferLocalBuild = true;
|
|
|
|
|
|
|
|
outputs = [ "out" ] ++ optionals propagateDoc [ "man" "info" ];
|
|
|
|
|
|
|
|
passthru = {
|
2023-01-20 10:41:00 +00:00
|
|
|
inherit targetPrefix suffixSalt;
|
2020-04-24 23:36:52 +00:00
|
|
|
# "cc" is the generic name for a C compiler, but there is no one for package
|
|
|
|
# providing the linker and related tools. The two we use now are GNU
|
|
|
|
# Binutils, and Apple's "cctools"; "bintools" as an attempt to find an
|
|
|
|
# unused middle-ground name that evokes both.
|
|
|
|
inherit bintools;
|
2023-08-22 20:05:09 +00:00
|
|
|
inherit cc libc libcxx nativeTools nativeLibc nativePrefix isGNU isClang;
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
|
|
emacsBufferSetup = pkgs: ''
|
|
|
|
; We should handle propagation here too
|
|
|
|
(mapc
|
|
|
|
(lambda (arg)
|
|
|
|
(when (file-directory-p (concat arg "/include"))
|
2020-06-18 07:06:33 +00:00
|
|
|
(setenv "NIX_CFLAGS_COMPILE_${suffixSalt}" (concat (getenv "NIX_CFLAGS_COMPILE_${suffixSalt}") " -isystem " arg "/include"))))
|
2020-04-24 23:36:52 +00:00
|
|
|
'(${concatStringsSep " " (map (pkg: "\"${pkg}\"") pkgs)}))
|
|
|
|
'';
|
2022-06-16 17:23:12 +00:00
|
|
|
|
2024-04-21 15:54:59 +00:00
|
|
|
# Expose expand-response-params we are /actually/ using. In stdenv
|
|
|
|
# bootstrapping, expand-response-params usually comes from an earlier stage,
|
|
|
|
# so it is important to expose this for reference checking.
|
2022-09-09 14:08:57 +00:00
|
|
|
inherit expand-response-params;
|
|
|
|
|
2022-06-16 17:23:12 +00:00
|
|
|
inherit nixSupport;
|
2024-01-13 08:15:51 +00:00
|
|
|
|
|
|
|
inherit defaultHardeningFlags;
|
2020-04-24 23:36:52 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
dontBuild = true;
|
|
|
|
dontConfigure = true;
|
2022-06-16 17:23:12 +00:00
|
|
|
enableParallelBuilding = true;
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
|
|
unpackPhase = ''
|
|
|
|
src=$PWD
|
|
|
|
'';
|
|
|
|
|
|
|
|
wrapper = ./cc-wrapper.sh;
|
|
|
|
|
|
|
|
installPhase =
|
|
|
|
''
|
|
|
|
mkdir -p $out/bin $out/nix-support
|
|
|
|
|
|
|
|
wrap() {
|
|
|
|
local dst="$1"
|
|
|
|
local wrapper="$2"
|
|
|
|
export prog="$3"
|
2023-04-29 16:46:19 +00:00
|
|
|
export use_response_file_by_default=${if isClang && !isCcache then "1" else "0"}
|
2020-04-24 23:36:52 +00:00
|
|
|
substituteAll "$wrapper" "$out/bin/$dst"
|
|
|
|
chmod +x "$out/bin/$dst"
|
|
|
|
}
|
|
|
|
''
|
|
|
|
|
|
|
|
+ (if nativeTools then ''
|
|
|
|
echo ${if targetPlatform.isDarwin then cc else nativePrefix} > $out/nix-support/orig-cc
|
|
|
|
|
|
|
|
ccPath="${if targetPlatform.isDarwin then cc else nativePrefix}/bin"
|
|
|
|
'' else ''
|
|
|
|
echo $cc > $out/nix-support/orig-cc
|
|
|
|
|
|
|
|
ccPath="${cc}/bin"
|
|
|
|
'')
|
|
|
|
|
2020-07-18 16:06:22 +00:00
|
|
|
# Create symlinks to everything in the bintools wrapper.
|
2020-04-24 23:36:52 +00:00
|
|
|
+ ''
|
|
|
|
for bbin in $bintools/bin/*; do
|
|
|
|
mkdir -p "$out/bin"
|
|
|
|
ln -s "$bbin" "$out/bin/$(basename $bbin)"
|
|
|
|
done
|
2020-07-18 16:06:22 +00:00
|
|
|
''
|
2020-04-24 23:36:52 +00:00
|
|
|
|
2020-07-18 16:06:22 +00:00
|
|
|
# We export environment variables pointing to the wrapped nonstandard
|
|
|
|
# cmds, lest some lousy configure script use those to guess compiler
|
|
|
|
# version.
|
|
|
|
+ ''
|
2020-04-24 23:36:52 +00:00
|
|
|
export named_cc=${targetPrefix}cc
|
|
|
|
export named_cxx=${targetPrefix}c++
|
|
|
|
|
|
|
|
if [ -e $ccPath/${targetPrefix}gcc ]; then
|
|
|
|
wrap ${targetPrefix}gcc $wrapper $ccPath/${targetPrefix}gcc
|
|
|
|
ln -s ${targetPrefix}gcc $out/bin/${targetPrefix}cc
|
|
|
|
export named_cc=${targetPrefix}gcc
|
|
|
|
export named_cxx=${targetPrefix}g++
|
|
|
|
elif [ -e $ccPath/clang ]; then
|
|
|
|
wrap ${targetPrefix}clang $wrapper $ccPath/clang
|
|
|
|
ln -s ${targetPrefix}clang $out/bin/${targetPrefix}cc
|
|
|
|
export named_cc=${targetPrefix}clang
|
|
|
|
export named_cxx=${targetPrefix}clang++
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ -e $ccPath/${targetPrefix}g++ ]; then
|
|
|
|
wrap ${targetPrefix}g++ $wrapper $ccPath/${targetPrefix}g++
|
|
|
|
ln -s ${targetPrefix}g++ $out/bin/${targetPrefix}c++
|
|
|
|
elif [ -e $ccPath/clang++ ]; then
|
|
|
|
wrap ${targetPrefix}clang++ $wrapper $ccPath/clang++
|
|
|
|
ln -s ${targetPrefix}clang++ $out/bin/${targetPrefix}c++
|
|
|
|
fi
|
|
|
|
|
2023-04-12 12:48:02 +00:00
|
|
|
if [ -e $ccPath/${targetPrefix}cpp ]; then
|
2023-03-27 19:17:25 +00:00
|
|
|
wrap ${targetPrefix}cpp $wrapper $ccPath/${targetPrefix}cpp
|
2023-04-12 12:48:02 +00:00
|
|
|
elif [ -e $ccPath/cpp ]; then
|
|
|
|
wrap ${targetPrefix}cpp $wrapper $ccPath/cpp
|
2020-04-24 23:36:52 +00:00
|
|
|
fi
|
|
|
|
''
|
|
|
|
|
2023-01-20 10:41:00 +00:00
|
|
|
# No need to wrap gnat, gnatkr, gnatname or gnatprep; we can just symlink them in
|
2020-04-24 23:36:52 +00:00
|
|
|
+ optionalString cc.langAda or false ''
|
2023-01-20 10:41:00 +00:00
|
|
|
for cmd in gnatbind gnatchop gnatclean gnatlink gnatls gnatmake; do
|
|
|
|
wrap ${targetPrefix}$cmd ${./gnat-wrapper.sh} $ccPath/${targetPrefix}$cmd
|
|
|
|
done
|
|
|
|
|
|
|
|
for cmd in gnat gnatkr gnatname gnatprep; do
|
|
|
|
ln -s $ccPath/${targetPrefix}$cmd $out/bin/${targetPrefix}$cmd
|
|
|
|
done
|
2021-08-05 21:33:18 +00:00
|
|
|
|
|
|
|
# this symlink points to the unwrapped gnat's output "out". It is used by
|
|
|
|
# our custom gprconfig compiler description to find GNAT's ada runtime. See
|
2024-02-29 20:09:43 +00:00
|
|
|
# ../../development/ada-modules/gprbuild/{boot.nix, nixpkgs-gnat.xml}
|
2021-08-05 21:33:18 +00:00
|
|
|
ln -sf ${cc} $out/nix-support/gprconfig-gnat-unwrapped
|
2020-04-24 23:36:52 +00:00
|
|
|
''
|
|
|
|
|
2020-05-29 06:06:01 +00:00
|
|
|
+ optionalString cc.langD or false ''
|
|
|
|
wrap ${targetPrefix}gdc $wrapper $ccPath/${targetPrefix}gdc
|
|
|
|
''
|
|
|
|
|
2022-09-30 11:47:45 +00:00
|
|
|
+ optionalString cc.langFortran or false ''
|
2020-04-24 23:36:52 +00:00
|
|
|
wrap ${targetPrefix}gfortran $wrapper $ccPath/${targetPrefix}gfortran
|
|
|
|
ln -sv ${targetPrefix}gfortran $out/bin/${targetPrefix}g77
|
|
|
|
ln -sv ${targetPrefix}gfortran $out/bin/${targetPrefix}f77
|
2020-09-25 04:45:31 +00:00
|
|
|
export named_fc=${targetPrefix}gfortran
|
2020-04-24 23:36:52 +00:00
|
|
|
''
|
|
|
|
|
|
|
|
+ optionalString cc.langJava or false ''
|
|
|
|
wrap ${targetPrefix}gcj $wrapper $ccPath/${targetPrefix}gcj
|
|
|
|
''
|
|
|
|
|
|
|
|
+ optionalString cc.langGo or false ''
|
|
|
|
wrap ${targetPrefix}gccgo $wrapper $ccPath/${targetPrefix}gccgo
|
2023-02-02 18:25:31 +00:00
|
|
|
wrap ${targetPrefix}go ${./go-wrapper.sh} $ccPath/${targetPrefix}go
|
2020-04-24 23:36:52 +00:00
|
|
|
'';
|
|
|
|
|
|
|
|
strictDeps = true;
|
2023-07-15 17:15:38 +00:00
|
|
|
propagatedBuildInputs = [ bintools ] ++ extraTools ++ optionals cc.langD or cc.langJava or false [ zlib ];
|
2020-07-18 16:06:22 +00:00
|
|
|
depsTargetTargetPropagated = optional (libcxx != null) libcxx ++ extraPackages;
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
|
|
setupHooks = [
|
|
|
|
../setup-hooks/role.bash
|
2024-04-21 15:54:59 +00:00
|
|
|
] ++ optional (cc.langC or true) ./setup-hook.sh
|
|
|
|
++ optional (cc.langFortran or false) ./fortran-hook.sh
|
|
|
|
++ optional (targetPlatform.isWindows) (stdenvNoCC.mkDerivation {
|
2023-10-09 19:29:22 +00:00
|
|
|
name = "win-dll-hook.sh";
|
|
|
|
dontUnpack = true;
|
|
|
|
installPhase = ''
|
|
|
|
echo addToSearchPath "LINK_DLL_FOLDERS" "${cc_solib}/lib" > $out
|
|
|
|
echo addToSearchPath "LINK_DLL_FOLDERS" "${cc_solib}/lib64" >> $out
|
|
|
|
echo addToSearchPath "LINK_DLL_FOLDERS" "${cc_solib}/lib32" >> $out
|
|
|
|
'';
|
|
|
|
});
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
|
|
postFixup =
|
2020-07-18 16:06:22 +00:00
|
|
|
# Ensure flags files exists, as some other programs cat them. (That these
|
|
|
|
# are considered an exposed interface is a bit dubious, but fine for now.)
|
|
|
|
''
|
|
|
|
touch "$out/nix-support/cc-cflags"
|
|
|
|
touch "$out/nix-support/cc-ldflags"
|
2020-04-24 23:36:52 +00:00
|
|
|
''
|
2020-07-18 16:06:22 +00:00
|
|
|
|
2023-05-24 13:37:59 +00:00
|
|
|
# Backwards compatibility for packages expecting this file, e.g. with
|
2020-07-18 16:06:22 +00:00
|
|
|
# `$NIX_CC/nix-support/dynamic-linker`.
|
|
|
|
#
|
|
|
|
# TODO(@Ericson2314): Remove this after stable release and force
|
|
|
|
# everyone to refer to bintools-wrapper directly.
|
|
|
|
+ ''
|
2020-04-24 23:36:52 +00:00
|
|
|
if [[ -f "$bintools/nix-support/dynamic-linker" ]]; then
|
|
|
|
ln -s "$bintools/nix-support/dynamic-linker" "$out/nix-support"
|
|
|
|
fi
|
|
|
|
if [[ -f "$bintools/nix-support/dynamic-linker-m32" ]]; then
|
|
|
|
ln -s "$bintools/nix-support/dynamic-linker-m32" "$out/nix-support"
|
|
|
|
fi
|
|
|
|
''
|
|
|
|
|
2020-07-18 16:06:22 +00:00
|
|
|
##
|
|
|
|
## GCC libs for non-GCC support
|
|
|
|
##
|
2023-04-29 16:46:19 +00:00
|
|
|
+ optionalString (useGccForLibs && isClang) ''
|
2020-07-18 16:06:22 +00:00
|
|
|
|
2020-08-20 17:08:02 +00:00
|
|
|
echo "-B${gccForLibs}/lib/gcc/${targetPlatform.config}/${gccForLibs.version}" >> $out/nix-support/cc-cflags
|
2023-04-12 12:48:02 +00:00
|
|
|
''
|
|
|
|
+ optionalString useGccForLibs ''
|
2020-08-20 17:08:02 +00:00
|
|
|
echo "-L${gccForLibs}/lib/gcc/${targetPlatform.config}/${gccForLibs.version}" >> $out/nix-support/cc-ldflags
|
2023-10-09 19:29:22 +00:00
|
|
|
echo "-L${gccForLibs_solib}/lib" >> $out/nix-support/cc-ldflags
|
2020-07-18 16:06:22 +00:00
|
|
|
''
|
|
|
|
|
2021-02-05 17:12:51 +00:00
|
|
|
# TODO We would like to connect this to `useGccForLibs`, but we cannot yet
|
|
|
|
# because `libcxxStdenv` on linux still needs this. Maybe someday we'll
|
|
|
|
# always set `useLLVM` on Darwin, and maybe also break down `useLLVM` into
|
|
|
|
# fine-grained use flags (libgcc vs compiler-rt, ld.lld vs legacy, libc++
|
|
|
|
# vs libstdc++, etc.) since Darwin isn't `useLLVM` on all counts. (See
|
|
|
|
# https://clang.llvm.org/docs/Toolchain.html for all the axes one might
|
|
|
|
# break `useLLVM` into.)
|
2021-04-12 18:23:04 +00:00
|
|
|
+ optionalString (isClang
|
2021-03-09 03:18:52 +00:00
|
|
|
&& targetPlatform.isLinux
|
2024-04-21 15:54:59 +00:00
|
|
|
&& !(targetPlatform.useAndroidPrebuilt or false)
|
|
|
|
&& !(targetPlatform.useLLVM or false)
|
2023-04-12 12:48:02 +00:00
|
|
|
&& gccForLibs != null) (''
|
2021-02-05 17:12:51 +00:00
|
|
|
echo "--gcc-toolchain=${gccForLibs}" >> $out/nix-support/cc-cflags
|
2023-02-02 18:25:31 +00:00
|
|
|
|
|
|
|
# Pull in 'cc.out' target to get 'libstdc++fs.a'. It should be in
|
|
|
|
# 'cc.lib'. But it's a gcc package bug.
|
|
|
|
# TODO(trofi): remove once gcc is fixed to move libraries to .lib output.
|
|
|
|
echo "-L${gccForLibs}/${optionalString (targetPlatform != hostPlatform) "/${targetPlatform.config}"}/lib" >> $out/nix-support/cc-ldflags
|
2021-02-05 17:12:51 +00:00
|
|
|
''
|
2023-04-12 12:48:02 +00:00
|
|
|
# this ensures that when clang passes -lgcc_s to lld (as it does
|
|
|
|
# when building e.g. firefox), lld is able to find libgcc_s.so
|
2023-05-24 13:37:59 +00:00
|
|
|
+ concatMapStrings (libgcc: ''
|
|
|
|
echo "-L${libgcc}/lib" >> $out/nix-support/cc-ldflags
|
2024-04-21 15:54:59 +00:00
|
|
|
'') (toList (gccForLibs.libgcc or [])))
|
2021-02-05 17:12:51 +00:00
|
|
|
|
2020-07-18 16:06:22 +00:00
|
|
|
##
|
|
|
|
## General libc support
|
|
|
|
##
|
|
|
|
|
|
|
|
# The "-B${libc_lib}/lib/" flag is a quick hack to force gcc to link
|
|
|
|
# against the crt1.o from our own glibc, rather than the one in
|
|
|
|
# /usr/lib. (This is only an issue when using an `impure'
|
|
|
|
# compiler/linker, i.e., one that searches /usr/lib and so on.)
|
|
|
|
#
|
|
|
|
# Unfortunately, setting -B appears to override the default search
|
|
|
|
# path. Thus, the gcc-specific "../includes-fixed" directory is
|
|
|
|
# now longer searched and glibc's <limits.h> header fails to
|
|
|
|
# compile, because it uses "#include_next <limits.h>" to find the
|
|
|
|
# limits.h file in ../includes-fixed. To remedy the problem,
|
|
|
|
# another -idirafter is necessary to add that directory again.
|
2020-04-24 23:36:52 +00:00
|
|
|
+ optionalString (libc != null) (''
|
2020-07-18 16:06:22 +00:00
|
|
|
touch "$out/nix-support/libc-cflags"
|
|
|
|
touch "$out/nix-support/libc-ldflags"
|
2020-08-20 17:08:02 +00:00
|
|
|
echo "-B${libc_lib}${libc.libdir or "/lib/"}" >> $out/nix-support/libc-crt1-cflags
|
2020-05-29 06:06:01 +00:00
|
|
|
'' + optionalString (!(cc.langD or false)) ''
|
2020-04-24 23:36:52 +00:00
|
|
|
echo "-idirafter ${libc_dev}${libc.incdir or "/include"}" >> $out/nix-support/libc-cflags
|
2020-05-29 06:06:01 +00:00
|
|
|
'' + optionalString (isGNU && (!(cc.langD or false))) ''
|
2020-04-24 23:36:52 +00:00
|
|
|
for dir in "${cc}"/lib/gcc/*/*/include-fixed; do
|
|
|
|
echo '-idirafter' ''${dir} >> $out/nix-support/libc-cflags
|
|
|
|
done
|
|
|
|
'' + ''
|
|
|
|
|
|
|
|
echo "${libc_lib}" > $out/nix-support/orig-libc
|
|
|
|
echo "${libc_dev}" > $out/nix-support/orig-libc-dev
|
2023-08-22 20:05:09 +00:00
|
|
|
''
|
|
|
|
# fortify-headers is a set of wrapper headers that augment libc
|
|
|
|
# and use #include_next to pass through to libc's true
|
|
|
|
# implementations, so must appear before them in search order.
|
|
|
|
# in theory a correctly placed -idirafter could be used, but in
|
|
|
|
# practice the compiler may have been built with a --with-headers
|
|
|
|
# like option that forces the libc headers before all -idirafter,
|
|
|
|
# hence -isystem here.
|
|
|
|
+ optionalString includeFortifyHeaders' ''
|
|
|
|
echo "-isystem ${fortify-headers}/include" >> $out/nix-support/libc-cflags
|
2020-04-24 23:36:52 +00:00
|
|
|
'')
|
|
|
|
|
2020-07-18 16:06:22 +00:00
|
|
|
##
|
|
|
|
## General libc++ support
|
|
|
|
##
|
|
|
|
|
|
|
|
# We have a libc++ directly, we have one via "smuggled" GCC, or we have one
|
|
|
|
# bundled with the C compiler because it is GCC
|
2020-09-25 04:45:31 +00:00
|
|
|
+ optionalString (libcxx != null || (useGccForLibs && gccForLibs.langCC or false) || (isGNU && cc.langCC or false)) ''
|
2020-07-18 16:06:22 +00:00
|
|
|
touch "$out/nix-support/libcxx-cxxflags"
|
|
|
|
touch "$out/nix-support/libcxx-ldflags"
|
2020-08-20 17:08:02 +00:00
|
|
|
''
|
2023-04-12 12:48:02 +00:00
|
|
|
# Adding -isystem flags should be done only for clang; gcc
|
|
|
|
# already knows how to find its own libstdc++, and adding
|
|
|
|
# additional -isystem flags will confuse gfortran (see
|
|
|
|
# https://github.com/NixOS/nixpkgs/pull/209870#issuecomment-1500550903)
|
2023-04-29 16:46:19 +00:00
|
|
|
+ optionalString (libcxx == null && isClang && (useGccForLibs && gccForLibs.langCC or false)) ''
|
2024-01-25 14:12:00 +00:00
|
|
|
for dir in ${gccForLibs}/include/c++/*; do
|
2020-07-18 16:06:22 +00:00
|
|
|
echo "-isystem $dir" >> $out/nix-support/libcxx-cxxflags
|
|
|
|
done
|
2024-01-25 14:12:00 +00:00
|
|
|
for dir in ${gccForLibs}/include/c++/*/${targetPlatform.config}; do
|
2020-07-18 16:06:22 +00:00
|
|
|
echo "-isystem $dir" >> $out/nix-support/libcxx-cxxflags
|
|
|
|
done
|
|
|
|
''
|
2023-02-02 18:25:31 +00:00
|
|
|
+ optionalString (libcxx.isLLVM or false) ''
|
2024-04-21 15:54:59 +00:00
|
|
|
echo "-isystem ${getDev libcxx}/include/c++/v1" >> $out/nix-support/libcxx-cxxflags
|
2020-07-18 16:06:22 +00:00
|
|
|
echo "-stdlib=libc++" >> $out/nix-support/libcxx-ldflags
|
2023-02-02 18:25:31 +00:00
|
|
|
''
|
2020-07-18 16:06:22 +00:00
|
|
|
|
|
|
|
##
|
|
|
|
## Initial CFLAGS
|
|
|
|
##
|
|
|
|
|
|
|
|
# GCC shows ${cc_solib}/lib in `gcc -print-search-dirs', but not
|
|
|
|
# ${cc_solib}/lib64 (even though it does actually search there...)..
|
|
|
|
# This confuses libtool. So add it to the compiler tool search
|
|
|
|
# path explicitly.
|
2020-04-24 23:36:52 +00:00
|
|
|
+ optionalString (!nativeTools) ''
|
|
|
|
if [ -e "${cc_solib}/lib64" -a ! -L "${cc_solib}/lib64" ]; then
|
|
|
|
ccLDFlags+=" -L${cc_solib}/lib64"
|
|
|
|
ccCFlags+=" -B${cc_solib}/lib64"
|
|
|
|
fi
|
|
|
|
ccLDFlags+=" -L${cc_solib}/lib"
|
|
|
|
ccCFlags+=" -B${cc_solib}/lib"
|
|
|
|
|
|
|
|
'' + optionalString cc.langAda or false ''
|
2020-07-18 16:06:22 +00:00
|
|
|
touch "$out/nix-support/gnat-cflags"
|
|
|
|
touch "$out/nix-support/gnat-ldflags"
|
2020-04-24 23:36:52 +00:00
|
|
|
basePath=$(echo $cc/lib/*/*/*)
|
|
|
|
ccCFlags+=" -B$basePath -I$basePath/adainclude"
|
|
|
|
gnatCFlags="-I$basePath/adainclude -I$basePath/adalib"
|
|
|
|
|
2020-07-18 16:06:22 +00:00
|
|
|
echo "$gnatCFlags" >> $out/nix-support/gnat-cflags
|
2020-04-24 23:36:52 +00:00
|
|
|
'' + ''
|
2020-07-18 16:06:22 +00:00
|
|
|
echo "$ccLDFlags" >> $out/nix-support/cc-ldflags
|
|
|
|
echo "$ccCFlags" >> $out/nix-support/cc-cflags
|
2020-04-24 23:36:52 +00:00
|
|
|
'' + optionalString (targetPlatform.isDarwin && (libcxx != null) && (cc.isClang or false)) ''
|
2024-01-25 14:12:00 +00:00
|
|
|
echo " -L${libcxx_solib}" >> $out/nix-support/cc-ldflags
|
2020-07-18 16:06:22 +00:00
|
|
|
''
|
2020-04-24 23:36:52 +00:00
|
|
|
|
2020-07-18 16:06:22 +00:00
|
|
|
##
|
|
|
|
## Man page and info support
|
|
|
|
##
|
|
|
|
+ optionalString propagateDoc ''
|
2020-04-24 23:36:52 +00:00
|
|
|
ln -s ${cc.man} $man
|
|
|
|
ln -s ${cc.info} $info
|
2023-07-15 17:15:38 +00:00
|
|
|
'' + optionalString (cc.langD or cc.langJava or false) ''
|
2020-05-29 06:06:01 +00:00
|
|
|
echo "-B${zlib}${zlib.libdir or "/lib/"}" >> $out/nix-support/libc-cflags
|
2020-04-24 23:36:52 +00:00
|
|
|
''
|
|
|
|
|
2020-07-18 16:06:22 +00:00
|
|
|
##
|
|
|
|
## Hardening support
|
|
|
|
##
|
2020-04-24 23:36:52 +00:00
|
|
|
+ ''
|
2024-04-21 15:54:59 +00:00
|
|
|
export hardening_unsupported_flags="${concatStringsSep " " ccHardeningUnsupportedFlags}"
|
2020-04-24 23:36:52 +00:00
|
|
|
''
|
|
|
|
|
|
|
|
# Machine flags. These are necessary to support
|
|
|
|
|
|
|
|
# TODO: We should make a way to support miscellaneous machine
|
|
|
|
# flags and other gcc flags as well.
|
|
|
|
|
|
|
|
# Always add -march based on cpu in triple. Sometimes there is a
|
|
|
|
# discrepency (x86_64 vs. x86-64), so we provide an "arch" arg in
|
|
|
|
# that case.
|
2024-04-21 15:54:59 +00:00
|
|
|
#
|
|
|
|
# For clang, this is handled in add-clang-cc-cflags-before.sh
|
|
|
|
|
2021-05-28 09:39:13 +00:00
|
|
|
# TODO: aarch64-darwin has mcpu incompatible with gcc
|
2024-04-21 15:54:59 +00:00
|
|
|
+ optionalString ((targetPlatform ? gcc.arch) && !isClang && !(targetPlatform.isDarwin && targetPlatform.isAarch64) &&
|
2021-02-05 17:12:51 +00:00
|
|
|
isGccArchSupported targetPlatform.gcc.arch) ''
|
|
|
|
echo "-march=${targetPlatform.gcc.arch}" >> $out/nix-support/cc-cflags-before
|
2020-04-24 23:36:52 +00:00
|
|
|
''
|
|
|
|
|
2023-01-11 07:51:40 +00:00
|
|
|
# -mcpu is not very useful, except on PowerPC where it is used
|
|
|
|
# instead of march. On all other platforms you should use mtune
|
|
|
|
# and march instead.
|
2021-05-28 09:39:13 +00:00
|
|
|
# TODO: aarch64-darwin has mcpu incompatible with gcc
|
2024-04-21 15:54:59 +00:00
|
|
|
+ optionalString ((targetPlatform ? gcc.cpu) && (isClang || !(targetPlatform.isDarwin && targetPlatform.isAarch64))) ''
|
2021-02-05 17:12:51 +00:00
|
|
|
echo "-mcpu=${targetPlatform.gcc.cpu}" >> $out/nix-support/cc-cflags-before
|
2020-04-24 23:36:52 +00:00
|
|
|
''
|
|
|
|
|
|
|
|
# -mfloat-abi only matters on arm32 but we set it here
|
|
|
|
# unconditionally just in case. If the abi specifically sets hard
|
|
|
|
# vs. soft floats we use it here.
|
2021-02-05 17:12:51 +00:00
|
|
|
+ optionalString (targetPlatform ? gcc.float-abi) ''
|
|
|
|
echo "-mfloat-abi=${targetPlatform.gcc.float-abi}" >> $out/nix-support/cc-cflags-before
|
2020-04-24 23:36:52 +00:00
|
|
|
''
|
2021-02-05 17:12:51 +00:00
|
|
|
+ optionalString (targetPlatform ? gcc.fpu) ''
|
|
|
|
echo "-mfpu=${targetPlatform.gcc.fpu}" >> $out/nix-support/cc-cflags-before
|
2020-04-24 23:36:52 +00:00
|
|
|
''
|
2021-02-05 17:12:51 +00:00
|
|
|
+ optionalString (targetPlatform ? gcc.mode) ''
|
|
|
|
echo "-mmode=${targetPlatform.gcc.mode}" >> $out/nix-support/cc-cflags-before
|
2020-04-24 23:36:52 +00:00
|
|
|
''
|
2021-09-18 10:52:07 +00:00
|
|
|
+ optionalString (targetPlatform ? gcc.thumb) ''
|
|
|
|
echo "-m${if targetPlatform.gcc.thumb then "thumb" else "arm"}" >> $out/nix-support/cc-cflags-before
|
|
|
|
''
|
2023-11-16 04:20:00 +00:00
|
|
|
+ (let tune = if targetPlatform ? gcc.tune
|
|
|
|
then findBestTuneApproximation targetPlatform.gcc.tune
|
|
|
|
else null;
|
|
|
|
in optionalString (tune != null) ''
|
|
|
|
echo "-mtune=${tune}" >> $out/nix-support/cc-cflags-before
|
|
|
|
'')
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
|
|
# TODO: categorize these and figure out a better place for them
|
2023-05-24 13:37:59 +00:00
|
|
|
+ optionalString targetPlatform.isWindows ''
|
2020-04-24 23:36:52 +00:00
|
|
|
hardening_unsupported_flags+=" pic"
|
|
|
|
'' + optionalString targetPlatform.isMinGW ''
|
2021-08-12 14:41:47 +00:00
|
|
|
hardening_unsupported_flags+=" stackprotector fortify"
|
2020-04-24 23:36:52 +00:00
|
|
|
'' + optionalString targetPlatform.isAvr ''
|
|
|
|
hardening_unsupported_flags+=" stackprotector pic"
|
2022-08-12 12:06:08 +00:00
|
|
|
'' + optionalString (targetPlatform.libc == "newlib" || targetPlatform.libc == "newlib-nano") ''
|
2020-04-24 23:36:52 +00:00
|
|
|
hardening_unsupported_flags+=" stackprotector fortify pie pic"
|
2021-03-09 03:18:52 +00:00
|
|
|
'' + optionalString (targetPlatform.libc == "musl" && targetPlatform.isx86_32) ''
|
|
|
|
hardening_unsupported_flags+=" stackprotector"
|
2020-04-24 23:36:52 +00:00
|
|
|
'' + optionalString targetPlatform.isNetBSD ''
|
|
|
|
hardening_unsupported_flags+=" stackprotector fortify"
|
|
|
|
'' + optionalString cc.langAda or false ''
|
2020-12-25 13:55:36 +00:00
|
|
|
hardening_unsupported_flags+=" format stackprotector strictoverflow"
|
2020-05-29 06:06:01 +00:00
|
|
|
'' + optionalString cc.langD or false ''
|
|
|
|
hardening_unsupported_flags+=" format"
|
2022-06-26 10:26:21 +00:00
|
|
|
'' + optionalString cc.langFortran or false ''
|
|
|
|
hardening_unsupported_flags+=" format"
|
2020-05-29 06:06:01 +00:00
|
|
|
'' + optionalString targetPlatform.isWasm ''
|
2020-04-24 23:36:52 +00:00
|
|
|
hardening_unsupported_flags+=" stackprotector fortify pie pic"
|
2022-09-09 14:08:57 +00:00
|
|
|
'' + optionalString targetPlatform.isMicroBlaze ''
|
|
|
|
hardening_unsupported_flags+=" stackprotector"
|
2020-04-24 23:36:52 +00:00
|
|
|
''
|
|
|
|
|
2024-04-21 15:54:59 +00:00
|
|
|
+ optionalString (libc != null && targetPlatform.isAvr) ''
|
|
|
|
for isa in avr5 avr3 avr4 avr6 avr25 avr31 avr35 avr51 avrxmega2 avrxmega4 avrxmega5 avrxmega6 avrxmega7 tiny-stack; do
|
|
|
|
echo "-B${getLib libc}/avr/lib/$isa" >> $out/nix-support/libc-crt1-cflags
|
|
|
|
done
|
|
|
|
''
|
|
|
|
|
|
|
|
+ optionalString targetPlatform.isDarwin ''
|
2021-04-26 19:14:03 +00:00
|
|
|
echo "-arch ${targetPlatform.darwinArch}" >> $out/nix-support/cc-cflags
|
2021-05-28 09:39:13 +00:00
|
|
|
''
|
|
|
|
|
|
|
|
+ optionalString targetPlatform.isAndroid ''
|
|
|
|
echo "-D__ANDROID_API__=${targetPlatform.sdkVer}" >> $out/nix-support/cc-cflags
|
2021-04-26 19:14:03 +00:00
|
|
|
''
|
|
|
|
|
2020-04-24 23:36:52 +00:00
|
|
|
# There are a few tools (to name one libstdcxx5) which do not work
|
|
|
|
# well with multi line flags, so make the flags single line again
|
|
|
|
+ ''
|
2020-07-18 16:06:22 +00:00
|
|
|
for flags in "$out/nix-support"/*flags*; do
|
|
|
|
substituteInPlace "$flags" --replace $'\n' ' '
|
|
|
|
done
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
|
|
substituteAll ${./add-flags.sh} $out/nix-support/add-flags.sh
|
|
|
|
substituteAll ${./add-hardening.sh} $out/nix-support/add-hardening.sh
|
|
|
|
substituteAll ${../wrapper-common/utils.bash} $out/nix-support/utils.bash
|
|
|
|
''
|
|
|
|
|
2023-01-20 10:41:00 +00:00
|
|
|
+ optionalString cc.langAda or false ''
|
|
|
|
substituteAll ${./add-gnat-extra-flags.sh} $out/nix-support/add-gnat-extra-flags.sh
|
|
|
|
''
|
|
|
|
|
2022-07-14 12:49:19 +00:00
|
|
|
##
|
|
|
|
## General Clang support
|
|
|
|
## Needs to go after ^ because the for loop eats \n and makes this file an invalid script
|
|
|
|
##
|
|
|
|
+ optionalString isClang ''
|
2024-04-21 15:54:59 +00:00
|
|
|
# Escape twice: once for this script, once for the one it gets substituted into.
|
|
|
|
export march=${escapeShellArg
|
|
|
|
(optionalString (targetPlatform ? gcc.arch)
|
|
|
|
(escapeShellArg "-march=${targetPlatform.gcc.arch}"))}
|
2022-07-14 12:49:19 +00:00
|
|
|
export defaultTarget=${targetPlatform.config}
|
|
|
|
substituteAll ${./add-clang-cc-cflags-before.sh} $out/nix-support/add-local-cc-cflags-before.sh
|
|
|
|
''
|
|
|
|
|
2020-07-18 16:06:22 +00:00
|
|
|
##
|
|
|
|
## Extra custom steps
|
|
|
|
##
|
2022-06-16 17:23:12 +00:00
|
|
|
+ extraBuildCommands
|
2024-04-21 15:54:59 +00:00
|
|
|
+ concatStringsSep "; "
|
|
|
|
(mapAttrsToList
|
2022-06-16 17:23:12 +00:00
|
|
|
(name: value: "echo ${toString value} >> $out/nix-support/${name}")
|
|
|
|
nixSupport);
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
|
|
|
2023-01-20 10:41:00 +00:00
|
|
|
env = {
|
2023-08-10 07:59:29 +00:00
|
|
|
inherit isClang;
|
|
|
|
|
2023-01-20 10:41:00 +00:00
|
|
|
# for substitution in utils.bash
|
2024-04-21 15:54:59 +00:00
|
|
|
# TODO(@sternenseemann): invent something cleaner than passing in "" in case of absence
|
2023-01-20 10:41:00 +00:00
|
|
|
expandResponseParams = "${expand-response-params}/bin/expand-response-params";
|
2024-04-21 15:54:59 +00:00
|
|
|
# TODO(@sternenseemann): rename env var via stdenv rebuild
|
|
|
|
shell = getBin runtimeShell + runtimeShell.shellPath or "";
|
2023-08-04 22:07:22 +00:00
|
|
|
gnugrep_bin = optionalString (!nativeTools) gnugrep;
|
2023-04-29 16:46:19 +00:00
|
|
|
# stdenv.cc.cc should not be null and we have nothing better for now.
|
|
|
|
# if the native impure bootstrap is gotten rid of this can become `inherit cc;` again.
|
2023-08-04 22:07:22 +00:00
|
|
|
cc = optionalString (!nativeTools) cc;
|
2023-01-20 10:41:00 +00:00
|
|
|
wrapperName = "CC_WRAPPER";
|
2023-04-29 16:46:19 +00:00
|
|
|
inherit suffixSalt coreutils_bin bintools;
|
2023-01-20 10:41:00 +00:00
|
|
|
inherit libc_bin libc_dev libc_lib;
|
|
|
|
inherit darwinPlatformForCC darwinMinVersion darwinMinVersionVariable;
|
2024-01-13 08:15:51 +00:00
|
|
|
default_hardening_flags_str = builtins.toString defaultHardeningFlags;
|
2023-01-20 10:41:00 +00:00
|
|
|
};
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
|
|
meta =
|
2024-04-21 15:54:59 +00:00
|
|
|
let cc_ = optionalAttrs (cc != null) cc; in
|
|
|
|
(optionalAttrs (cc_ ? meta) (removeAttrs cc.meta ["priority"])) //
|
|
|
|
{ description = attrByPath ["meta" "description"] "System C compiler" cc_ + " (wrapper script)";
|
2020-04-24 23:36:52 +00:00
|
|
|
priority = 10;
|
2023-07-15 17:15:38 +00:00
|
|
|
mainProgram = if name != "" then name else ccName;
|
2020-04-24 23:36:52 +00:00
|
|
|
};
|
|
|
|
}
|