2020-04-24 23:36:52 +00:00
|
|
|
#! @shell@
|
|
|
|
set -eu -o pipefail +o posix
|
|
|
|
shopt -s nullglob
|
|
|
|
|
|
|
|
if (( "${NIX_DEBUG:-0}" >= 7 )); then
|
|
|
|
set -x
|
|
|
|
fi
|
|
|
|
|
|
|
|
path_backup="$PATH"
|
|
|
|
|
|
|
|
# That @-vars are substituted separately from bash evaluation makes
|
|
|
|
# shellcheck think this, and others like it, are useless conditionals.
|
|
|
|
# shellcheck disable=SC2157
|
|
|
|
if [[ -n "@coreutils_bin@" && -n "@gnugrep_bin@" ]]; then
|
|
|
|
PATH="@coreutils_bin@/bin:@gnugrep_bin@/bin"
|
|
|
|
fi
|
|
|
|
|
|
|
|
source @out@/nix-support/utils.bash
|
|
|
|
|
|
|
|
|
|
|
|
# Parse command line options and set several variables.
|
|
|
|
# For instance, figure out if linker flags should be passed.
|
|
|
|
# GCC prints annoying warnings when they are not needed.
|
|
|
|
dontLink=0
|
|
|
|
nonFlagArgs=0
|
|
|
|
cc1=0
|
|
|
|
# shellcheck disable=SC2193
|
2021-05-20 23:08:51 +00:00
|
|
|
[[ "@prog@" = *++ ]] && isCxx=1 || isCxx=0
|
|
|
|
cxxInclude=1
|
|
|
|
cxxLibrary=1
|
2020-08-20 17:08:02 +00:00
|
|
|
cInclude=1
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
|
|
expandResponseParams "$@"
|
2022-01-26 04:04:25 +00:00
|
|
|
linkType=$(checkLinkType "${params[@]}")
|
2021-06-28 23:13:55 +00:00
|
|
|
|
2020-04-24 23:36:52 +00:00
|
|
|
declare -i n=0
|
|
|
|
nParams=${#params[@]}
|
|
|
|
while (( "$n" < "$nParams" )); do
|
|
|
|
p=${params[n]}
|
|
|
|
p2=${params[n+1]:-} # handle `p` being last one
|
|
|
|
n+=1
|
2022-07-14 12:49:19 +00:00
|
|
|
|
|
|
|
case "$p" in
|
|
|
|
-[cSEM] | -MM) dontLink=1 ;;
|
|
|
|
-cc1) cc1=1 ;;
|
|
|
|
-nostdinc) cInclude=0 cxxInclude=0 ;;
|
|
|
|
-nostdinc++) cxxInclude=0 ;;
|
|
|
|
-nostdlib) cxxLibrary=0 ;;
|
|
|
|
-x)
|
|
|
|
case "$p2" in
|
|
|
|
*-header) dontLink=1 ;;
|
|
|
|
c++*) isCxx=1 ;;
|
|
|
|
esac
|
|
|
|
;;
|
|
|
|
-?*) ;;
|
|
|
|
*) nonFlagArgs=1 ;; # Includes a solitary dash (`-`) which signifies standard input; it is not a flag
|
|
|
|
esac
|
2020-04-24 23:36:52 +00:00
|
|
|
done
|
|
|
|
|
|
|
|
# If we pass a flag like -Wl, then gcc will call the linker unless it
|
|
|
|
# can figure out that it has to do something else (e.g., because of a
|
|
|
|
# "-c" flag). So if no non-flag arguments are given, don't pass any
|
|
|
|
# linker flags. This catches cases like "gcc" (should just print
|
|
|
|
# "gcc: no input files") and "gcc -v" (should print the version).
|
|
|
|
if [ "$nonFlagArgs" = 0 ]; then
|
|
|
|
dontLink=1
|
|
|
|
fi
|
|
|
|
|
|
|
|
# Optionally filter out paths not refering to the store.
|
|
|
|
if [[ "${NIX_ENFORCE_PURITY:-}" = 1 && -n "$NIX_STORE" ]]; then
|
2022-07-14 12:49:19 +00:00
|
|
|
kept=()
|
2020-04-24 23:36:52 +00:00
|
|
|
nParams=${#params[@]}
|
|
|
|
declare -i n=0
|
|
|
|
while (( "$n" < "$nParams" )); do
|
|
|
|
p=${params[n]}
|
|
|
|
p2=${params[n+1]:-} # handle `p` being last one
|
|
|
|
n+=1
|
2022-07-14 12:49:19 +00:00
|
|
|
|
|
|
|
skipNext=false
|
|
|
|
path=""
|
|
|
|
case "$p" in
|
|
|
|
-[IL]/*) path=${p:2} ;;
|
|
|
|
-[IL] | -isystem) path=$p2 skipNext=true ;;
|
|
|
|
esac
|
|
|
|
|
|
|
|
if [[ -n $path ]] && badPath "$path"; then
|
|
|
|
skip "$path"
|
|
|
|
$skipNext && n+=1
|
|
|
|
continue
|
|
|
|
fi
|
|
|
|
|
|
|
|
kept+=("$p")
|
2020-04-24 23:36:52 +00:00
|
|
|
done
|
|
|
|
# Old bash empty array hack
|
2022-07-14 12:49:19 +00:00
|
|
|
params=(${kept+"${kept[@]}"})
|
2020-04-24 23:36:52 +00:00
|
|
|
fi
|
|
|
|
|
2020-08-20 17:08:02 +00:00
|
|
|
# Flirting with a layer violation here.
|
|
|
|
if [ -z "${NIX_BINTOOLS_WRAPPER_FLAGS_SET_@suffixSalt@:-}" ]; then
|
|
|
|
source @bintools@/nix-support/add-flags.sh
|
|
|
|
fi
|
|
|
|
|
|
|
|
# Put this one second so libc ldflags take priority.
|
|
|
|
if [ -z "${NIX_CC_WRAPPER_FLAGS_SET_@suffixSalt@:-}" ]; then
|
|
|
|
source @out@/nix-support/add-flags.sh
|
|
|
|
fi
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
|
|
# Clear march/mtune=native -- they bring impurity.
|
2020-06-18 07:06:33 +00:00
|
|
|
if [ "$NIX_ENFORCE_NO_NATIVE_@suffixSalt@" = 1 ]; then
|
2022-07-14 12:49:19 +00:00
|
|
|
kept=()
|
2020-04-24 23:36:52 +00:00
|
|
|
# Old bash empty array hack
|
|
|
|
for p in ${params+"${params[@]}"}; do
|
|
|
|
if [[ "$p" = -m*=native ]]; then
|
|
|
|
skip "$p"
|
|
|
|
else
|
2022-07-14 12:49:19 +00:00
|
|
|
kept+=("$p")
|
2020-04-24 23:36:52 +00:00
|
|
|
fi
|
|
|
|
done
|
|
|
|
# Old bash empty array hack
|
2022-07-14 12:49:19 +00:00
|
|
|
params=(${kept+"${kept[@]}"})
|
2020-04-24 23:36:52 +00:00
|
|
|
fi
|
|
|
|
|
2021-05-20 23:08:51 +00:00
|
|
|
if [[ "$isCxx" = 1 ]]; then
|
|
|
|
if [[ "$cxxInclude" = 1 ]]; then
|
2022-10-21 18:38:19 +00:00
|
|
|
#
|
|
|
|
# The motivation for this comment is to explain the reason for appending
|
|
|
|
# the C++ stdlib to NIX_CFLAGS_COMPILE, which I initially thought should
|
|
|
|
# change and later realized it shouldn't in:
|
|
|
|
#
|
|
|
|
# https://github.com/NixOS/nixpkgs/pull/185569#issuecomment-1234959249
|
|
|
|
#
|
|
|
|
# NIX_CFLAGS_COMPILE contains dependencies added using "-isystem", and
|
|
|
|
# NIX_CXXSTDLIB_COMPILE adds the C++ stdlib using "-isystem". Appending
|
|
|
|
# NIX_CXXSTDLIB_COMPILE to NIX_CLAGS_COMPILE emulates this part of the
|
|
|
|
# include lookup order from GCC/Clang:
|
|
|
|
#
|
|
|
|
# > 4. Directories specified with -isystem options are scanned in
|
|
|
|
# > left-to-right order.
|
|
|
|
# > 5. Standard system directories are scanned.
|
|
|
|
# > 6. Directories specified with -idirafter options are scanned
|
|
|
|
# > in left-to-right order.
|
|
|
|
#
|
|
|
|
# NIX_CXX_STDLIB_COMPILE acts as the "standard system directories" that
|
|
|
|
# are otherwise missing from CC in nixpkgs, so should be added last.
|
|
|
|
#
|
|
|
|
# This means that the C standard library should never be present inside
|
|
|
|
# NIX_CFLAGS_COMPILE, because it MUST come after the C++ stdlib. It is
|
|
|
|
# added automatically by cc-wrapper later using "-idirafter".
|
|
|
|
#
|
2021-05-20 23:08:51 +00:00
|
|
|
NIX_CFLAGS_COMPILE_@suffixSalt@+=" $NIX_CXXSTDLIB_COMPILE_@suffixSalt@"
|
|
|
|
fi
|
|
|
|
if [[ "$cxxLibrary" = 1 ]]; then
|
|
|
|
NIX_CFLAGS_LINK_@suffixSalt@+=" $NIX_CXXSTDLIB_LINK_@suffixSalt@"
|
|
|
|
fi
|
2021-04-05 15:23:46 +00:00
|
|
|
fi
|
|
|
|
|
2020-04-24 23:36:52 +00:00
|
|
|
source @out@/nix-support/add-hardening.sh
|
|
|
|
|
|
|
|
# Add the flags for the C compiler proper.
|
2020-06-18 07:06:33 +00:00
|
|
|
extraAfter=($NIX_CFLAGS_COMPILE_@suffixSalt@)
|
|
|
|
extraBefore=(${hardeningCFlags[@]+"${hardeningCFlags[@]}"} $NIX_CFLAGS_COMPILE_BEFORE_@suffixSalt@)
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
|
|
if [ "$dontLink" != 1 ]; then
|
|
|
|
|
|
|
|
# Add the flags that should only be passed to the compiler when
|
|
|
|
# linking.
|
2021-06-28 23:13:55 +00:00
|
|
|
extraAfter+=($(filterRpathFlags "$linkType" $NIX_CFLAGS_LINK_@suffixSalt@))
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
|
|
# Add the flags that should be passed to the linker (and prevent
|
2020-06-18 07:06:33 +00:00
|
|
|
# `ld-wrapper' from adding NIX_LDFLAGS_@suffixSalt@ again).
|
2021-06-28 23:13:55 +00:00
|
|
|
for i in $(filterRpathFlags "$linkType" $NIX_LDFLAGS_BEFORE_@suffixSalt@); do
|
2020-04-24 23:36:52 +00:00
|
|
|
extraBefore+=("-Wl,$i")
|
|
|
|
done
|
2021-06-28 23:13:55 +00:00
|
|
|
if [[ "$linkType" == dynamic && -n "$NIX_DYNAMIC_LINKER_@suffixSalt@" ]]; then
|
2021-01-15 22:18:51 +00:00
|
|
|
extraBefore+=("-Wl,-dynamic-linker=$NIX_DYNAMIC_LINKER_@suffixSalt@")
|
|
|
|
fi
|
2021-06-28 23:13:55 +00:00
|
|
|
for i in $(filterRpathFlags "$linkType" $NIX_LDFLAGS_@suffixSalt@); do
|
2020-04-24 23:36:52 +00:00
|
|
|
if [ "${i:0:3}" = -L/ ]; then
|
|
|
|
extraAfter+=("$i")
|
|
|
|
else
|
|
|
|
extraAfter+=("-Wl,$i")
|
|
|
|
fi
|
|
|
|
done
|
2021-06-28 23:13:55 +00:00
|
|
|
export NIX_LINK_TYPE_@suffixSalt@=$linkType
|
2020-04-24 23:36:52 +00:00
|
|
|
fi
|
|
|
|
|
2022-07-14 12:49:19 +00:00
|
|
|
if [[ -e @out@/nix-support/add-local-cc-cflags-before.sh ]]; then
|
|
|
|
source @out@/nix-support/add-local-cc-cflags-before.sh
|
|
|
|
fi
|
|
|
|
|
2020-04-24 23:36:52 +00:00
|
|
|
# As a very special hack, if the arguments are just `-v', then don't
|
|
|
|
# add anything. This is to prevent `gcc -v' (which normally prints
|
|
|
|
# out the version number and returns exit code 0) from printing out
|
|
|
|
# `No input files specified' and returning exit code 1.
|
|
|
|
if [ "$*" = -v ]; then
|
|
|
|
extraAfter=()
|
|
|
|
extraBefore=()
|
|
|
|
fi
|
|
|
|
|
|
|
|
# clang's -cc1 mode is not compatible with most options
|
|
|
|
# that we would pass. Rather than trying to pass only
|
|
|
|
# options that would work, let's just remove all of them.
|
|
|
|
if [ "$cc1" = 1 ]; then
|
|
|
|
extraAfter=()
|
|
|
|
extraBefore=()
|
|
|
|
fi
|
|
|
|
|
|
|
|
# Optionally print debug info.
|
|
|
|
if (( "${NIX_DEBUG:-0}" >= 1 )); then
|
|
|
|
# Old bash workaround, see ld-wrapper for explanation.
|
|
|
|
echo "extra flags before to @prog@:" >&2
|
|
|
|
printf " %q\n" ${extraBefore+"${extraBefore[@]}"} >&2
|
|
|
|
echo "original flags to @prog@:" >&2
|
|
|
|
printf " %q\n" ${params+"${params[@]}"} >&2
|
|
|
|
echo "extra flags after to @prog@:" >&2
|
|
|
|
printf " %q\n" ${extraAfter+"${extraAfter[@]}"} >&2
|
|
|
|
fi
|
|
|
|
|
|
|
|
PATH="$path_backup"
|
|
|
|
# Old bash workaround, see above.
|
2021-03-19 17:17:44 +00:00
|
|
|
|
2022-11-21 17:40:18 +00:00
|
|
|
# if a cc-wrapper-hook exists, run it.
|
|
|
|
if [[ -e @out@/nix-support/cc-wrapper-hook ]]; then
|
|
|
|
compiler=@prog@
|
|
|
|
source @out@/nix-support/cc-wrapper-hook
|
|
|
|
fi
|
|
|
|
|
2021-03-19 17:17:44 +00:00
|
|
|
if (( "${NIX_CC_USE_RESPONSE_FILE:-@use_response_file_by_default@}" >= 1 )); then
|
|
|
|
exec @prog@ @<(printf "%q\n" \
|
|
|
|
${extraBefore+"${extraBefore[@]}"} \
|
|
|
|
${params+"${params[@]}"} \
|
|
|
|
${extraAfter+"${extraAfter[@]}"})
|
|
|
|
else
|
|
|
|
exec @prog@ \
|
|
|
|
${extraBefore+"${extraBefore[@]}"} \
|
|
|
|
${params+"${params[@]}"} \
|
|
|
|
${extraAfter+"${extraAfter[@]}"}
|
|
|
|
fi
|