2021-01-24 01:40:18 +01:00
|
|
|
{ lib, stdenv, glibc }:
|
|
|
|
|
2018-05-31 03:48:42 +02:00
|
|
|
let
|
2018-06-06 09:59:59 +02:00
|
|
|
# Sanitizers are not supported on Darwin.
|
2018-05-31 03:48:42 +02:00
|
|
|
# Sanitizer headers aren't available in older libc++ stdenvs due to a bug
|
2020-12-25 21:52:42 +01:00
|
|
|
sanitizersWorking = !stdenv.hostPlatform.isMusl && (
|
2021-01-24 01:40:18 +01:00
|
|
|
(stdenv.cc.isClang && lib.versionAtLeast (lib.getVersion stdenv.cc.name) "5.0.0")
|
2020-12-25 21:52:42 +01:00
|
|
|
|| (stdenv.cc.isGNU && stdenv.isLinux)
|
|
|
|
);
|
2021-01-24 01:40:18 +01:00
|
|
|
staticLibc = lib.optionalString (stdenv.hostPlatform.libc == "glibc") "-L ${glibc.static}/lib";
|
2018-05-31 03:48:42 +02:00
|
|
|
in stdenv.mkDerivation {
|
2017-09-02 14:00:47 +02:00
|
|
|
name = "cc-wrapper-test";
|
|
|
|
|
|
|
|
buildCommand = ''
|
|
|
|
NIX_DEBUG=1 $CC -v
|
|
|
|
NIX_DEBUG=1 $CXX -v
|
|
|
|
|
|
|
|
printf "checking whether compiler builds valid C binaries... " >&2
|
|
|
|
$CC -o cc-check ${./cc-main.c}
|
|
|
|
./cc-check
|
|
|
|
|
|
|
|
printf "checking whether compiler builds valid C++ binaries... " >&2
|
|
|
|
$CXX -o cxx-check ${./cxx-main.cc}
|
|
|
|
./cxx-check
|
|
|
|
|
2021-01-24 01:40:18 +01:00
|
|
|
${lib.optionalString (stdenv.isDarwin && stdenv.cc.isClang) ''
|
2017-09-02 14:00:47 +02:00
|
|
|
printf "checking whether compiler can build with CoreFoundation.framework... " >&2
|
|
|
|
mkdir -p foo/lib
|
|
|
|
$CC -framework CoreFoundation -o core-foundation-check ${./core-foundation-main.c}
|
|
|
|
./core-foundation-check
|
|
|
|
''}
|
|
|
|
|
2020-12-25 21:52:42 +01:00
|
|
|
|
2021-01-24 01:40:18 +01:00
|
|
|
${lib.optionalString (!stdenv.isDarwin) ''
|
2020-12-25 21:52:42 +01:00
|
|
|
printf "checking whether compiler builds valid static C binaries... " >&2
|
|
|
|
$CC ${staticLibc} -static -o cc-static ${./cc-main.c}
|
|
|
|
./cc-static
|
|
|
|
# our glibc does not have pie enabled yet.
|
2021-01-24 01:40:18 +01:00
|
|
|
${lib.optionalString (stdenv.hostPlatform.isMusl && stdenv.cc.isGNU) ''
|
2020-12-25 21:52:42 +01:00
|
|
|
printf "checking whether compiler builds valid static pie C binaries... " >&2
|
|
|
|
$CC ${staticLibc} -static-pie -o cc-static-pie ${./cc-main.c}
|
|
|
|
./cc-static-pie
|
|
|
|
''}
|
|
|
|
''}
|
|
|
|
|
2017-09-02 14:00:47 +02:00
|
|
|
printf "checking whether compiler uses NIX_CFLAGS_COMPILE... " >&2
|
|
|
|
mkdir -p foo/include
|
|
|
|
cp ${./foo.c} foo/include/foo.h
|
|
|
|
NIX_CFLAGS_COMPILE="-Ifoo/include -DVALUE=42" $CC -o cflags-check ${./cflags-main.c}
|
|
|
|
./cflags-check
|
|
|
|
|
|
|
|
printf "checking whether compiler uses NIX_LDFLAGS... " >&2
|
|
|
|
mkdir -p foo/lib
|
2017-09-12 21:36:41 +02:00
|
|
|
$CC -shared \
|
2021-01-24 01:40:18 +01:00
|
|
|
${lib.optionalString stdenv.isDarwin "-Wl,-install_name,@rpath/libfoo.dylib"} \
|
2017-09-12 21:36:41 +02:00
|
|
|
-DVALUE=42 \
|
|
|
|
-o foo/lib/libfoo${stdenv.hostPlatform.extensions.sharedLibrary} \
|
|
|
|
${./foo.c}
|
|
|
|
|
2017-09-02 14:00:47 +02:00
|
|
|
NIX_LDFLAGS="-L$NIX_BUILD_TOP/foo/lib -rpath $NIX_BUILD_TOP/foo/lib" $CC -lfoo -o ldflags-check ${./ldflags-main.c}
|
|
|
|
./ldflags-check
|
2018-05-07 22:22:50 +02:00
|
|
|
|
2020-07-01 22:55:06 +02:00
|
|
|
printf "Check whether -nostdinc and -nostdinc++ is handled correctly" >&2
|
|
|
|
mkdir -p std-include
|
|
|
|
cp ${./stdio.h} std-include/stdio.h
|
|
|
|
NIX_DEBUG=1 $CC -I std-include -nostdinc -o nostdinc-main ${./nostdinc-main.c}
|
|
|
|
./nostdinc-main
|
|
|
|
$CXX -I std-include -nostdinc++ -o nostdinc-main++ ${./nostdinc-main.c}
|
|
|
|
./nostdinc-main++
|
|
|
|
|
2021-01-24 01:40:18 +01:00
|
|
|
${lib.optionalString sanitizersWorking ''
|
2018-05-31 03:48:42 +02:00
|
|
|
printf "checking whether sanitizers are fully functional... ">&2
|
|
|
|
$CC -o sanitizers -fsanitize=address,undefined ${./sanitizers.c}
|
|
|
|
./sanitizers
|
|
|
|
''}
|
2017-09-02 14:00:47 +02:00
|
|
|
|
|
|
|
touch $out
|
|
|
|
'';
|
|
|
|
|
2021-01-24 01:40:18 +01:00
|
|
|
meta.platforms = lib.platforms.all;
|
2017-09-02 14:00:47 +02:00
|
|
|
}
|