2015-01-09 20:22:12 +01:00
|
|
|
# The Nixpkgs CC is not directly usable, since it doesn't know where
|
2014-10-10 13:49:26 +02:00
|
|
|
# the C library and standard header files are. Therefore the compiler
|
|
|
|
# produced by that package cannot be installed directly in a user
|
|
|
|
# environment and used from the command line. So we use a wrapper
|
|
|
|
# script that sets up the right environment variables so that the
|
|
|
|
# compiler and the linker just "work".
|
2008-06-26 13:07:46 +02:00
|
|
|
|
2018-02-01 01:00:00 +01:00
|
|
|
{ name ? ""
|
2021-01-24 04:02:59 +01:00
|
|
|
, lib
|
2018-09-05 20:33:56 +02:00
|
|
|
, stdenvNoCC
|
2017-08-26 17:43:30 +02:00
|
|
|
, cc ? null, libc ? null, bintools, coreutils ? null, shell ? stdenvNoCC.shell
|
2019-09-20 12:05:57 +02:00
|
|
|
, zlib ? null
|
2018-09-05 20:33:56 +02:00
|
|
|
, nativeTools, noLibc ? false, nativeLibc, nativePrefix ? ""
|
|
|
|
, propagateDoc ? cc != null && cc ? man
|
2020-03-18 16:28:52 +01:00
|
|
|
, extraTools ? [], extraPackages ? [], extraBuildCommands ? ""
|
2022-04-30 04:54:03 +02:00
|
|
|
, nixSupport ? {}
|
2022-06-19 23:18:01 +02:00
|
|
|
, isGNU ? false, isClang ? cc.isClang or false, isCcache ? cc.isCcache or false, gnugrep ? null
|
2017-08-22 00:26:08 +02:00
|
|
|
, buildPackages ? {}
|
2019-01-26 16:17:57 +01:00
|
|
|
, libcxx ? null
|
stdenv: Nix-driven bootstrap of gcc
#### Summary
By default, when you type `make`, GCC will compile itself three
times. This PR inhibits that behavior by configuring GCC with
`--disable-bootstrap`, and reimplements the triple-rebuild using
Nix rather than `make`/`sh`.
#### Immediate Benefits
- Allow `gcc11` and `gcc12` on `aarch64` (without needing new
`bootstrapFiles`)
- Faster stdenv rebuilds: the third compilation of gcc
(i.e. stageCompare) is no longer a `drvInput` of the final stdenv.
This allows Nix to build stageCompare in parallel with the rest of
nixpkgs instead of in series.
- No more copying `libgcc_s` out of the bootstrap-files or other
derivations
- No more Frankenstein compiler: the final gcc and the libraries it
links against (mpfr, mpc, isl, glibc) are all built by the same
compiler (xgcc) instead of a mixture of the bootstrapFiles'
compiler and xgcc.
- No more [static lib{mpfr,mpc,gmp,isl}.a hack]
- Many other small `stdenv` hacks eliminated
- `gcc` and `clang` share the same codepath for more of `cc-wrapper`.
#### Future Benefits
- This should allow using a [foreign] `bootstrap-files` so long as
`hostPlatform.canExecute bootstrapFiles`.
- This should allow each of the libraries that ship with `gcc`
(lib{backtrace, atomic, cc1, decnumber, ffi, gomp, iberty,
offloadatomic, quadmath, sanitizer, ssp, stdc++-v3, vtv}) to be
built in separate (one-liner) derivations which `inherit src;`
from `gcc`, much like https://github.com/NixOS/nixpkgs/pull/132343
#### Incorporates
- https://github.com/NixOS/nixpkgs/pull/210004
- https://github.com/NixOS/nixpkgs/pull/36948 (unreverted)
- https://github.com/NixOS/nixpkgs/pull/210325
- https://github.com/NixOS/nixpkgs/pull/210118
- https://github.com/NixOS/nixpkgs/pull/210132
- https://github.com/NixOS/nixpkgs/pull/210109
- https://github.com/NixOS/nixpkgs/pull/213909
- https://github.com/NixOS/nixpkgs/pull/216136
- https://github.com/NixOS/nixpkgs/pull/216237
- https://github.com/NixOS/nixpkgs/pull/210019
- https://github.com/NixOS/nixpkgs/pull/216232
- https://github.com/NixOS/nixpkgs/pull/216016
- https://github.com/NixOS/nixpkgs/pull/217977
- https://github.com/NixOS/nixpkgs/pull/217995
#### Closes
- Closes #108305
- Closes #108111
- Closes #201254
- Closes #208412
#### Credits
This project was made possible by three important insights, none of
which were mine:
1. @ericson2314 was the first to advocate for this change, and
probably the first to appreciate its advantages. Nix-driven
(external) bootstrap is "cross by default".
2. @trofi has figured out a lot about how to get gcc to not mix up
the copy of `libstdc++` that it depends on with the copy that it
builds, by moving the `bootstrapFiles`' `libstdc++` into a
[versioned directory]. This allows a Nix-driven bootstrap of gcc
without the final gcc would still having references to the
`bootstrapFiles`.
3. Using the undocumented variable [`user-defined-trusted-dirs`]
when building glibc. When glibc `dlopen()`s `libgcc_s.so`, it
uses a completely different and totally special set of rules for
finding `libgcc_s.so`. This trick is the only way we can put
`libgcc_s.so` in its own separate outpath without creating
circular dependencies or dependencies on the bootstrapFiles. I
would never have guessed to use this (or that it existed!) if it
were not for a [comment in guix] which @Mic92 [mentioned].
My own role in this PR was basically: being available to go on a
coding binge at an opportune moment, so we wouldn't waste a
[crisis].
[aarch64-compare-ofborg]: https://github.com/NixOS/nixpkgs/pull/209870/checks?check_run_id=10662822938
[amd64-compare-ofborg]: https://github.com/NixOS/nixpkgs/pull/209870/checks?check_run_id=10662825857
[nonexistent sysroot]: https://github.com/NixOS/nixpkgs/pull/210004
[versioned directory]: https://github.com/NixOS/nixpkgs/pull/209054
[`user-defined-trusted-dirs`]: https://sourceware.org/legacy-ml/libc-help/2013-11/msg00026.html
[comment in guix]: https://github.com/guix-mirror/guix/blob/5e4ec8218142eee8e6e148e787381a5ef891c5b1/gnu/packages/gcc.scm#L253
[mentioned]: https://github.com/NixOS/nixpkgs/pull/210112#issuecomment-1379608483
[crisis]: https://github.com/NixOS/nixpkgs/issues/108305
[foreign]: https://github.com/NixOS/nixpkgs/pull/170857#issuecomment-1170558348
[static lib{mpfr,mpc,gmp,isl}.a hack]: https://github.com/NixOS/nixpkgs/blob/2f1948af9c984ebb82dfd618e67dc949755823e2/pkgs/stdenv/linux/default.nix#L380
2023-02-24 06:32:36 +01:00
|
|
|
|
|
|
|
# Whether or not to add `-B` and `-L` to `nix-support/cc-{c,ld}flags`
|
|
|
|
, useCcForLibs ?
|
|
|
|
|
|
|
|
# Always add these flags for Clang, because in order to compile (most
|
|
|
|
# software) it needs libraries that are shipped and compiled with gcc.
|
|
|
|
if isClang then true
|
|
|
|
|
|
|
|
# Never add these flags for a build!=host cross-compiler or a host!=target
|
|
|
|
# ("cross-built-native") compiler; currently nixpkgs has a special build
|
|
|
|
# path for these (`crossStageStatic`). Hopefully at some point that build
|
|
|
|
# path will be merged with this one and this conditional will be removed.
|
|
|
|
else if (with stdenvNoCC; buildPlatform != hostPlatform || hostPlatform != targetPlatform) then false
|
|
|
|
|
|
|
|
# Never add these flags when wrapping the bootstrapFiles' compiler; it has a
|
|
|
|
# /usr/-like layout with everything smashed into a single outpath, so it has
|
|
|
|
# no trouble finding its own libraries.
|
|
|
|
else if (cc.passthru.isFromBootstrapFiles or false) then false
|
|
|
|
|
|
|
|
# Add these flags when wrapping `xgcc` (the first compiler that nixpkgs builds)
|
|
|
|
else if (cc.passthru.isXgcc or false) then true
|
|
|
|
|
|
|
|
# Add these flags when wrapping `stdenv.cc`
|
|
|
|
else if (cc.stdenv.cc.cc.passthru.isXgcc or false) then true
|
|
|
|
|
|
|
|
# Do not add these flags in any other situation. This is `false` mainly to
|
|
|
|
# prevent these flags from being added when wrapping *old* versions of gcc
|
|
|
|
# (e.g. `gcc6Stdenv`), since they will cause the old gcc to get `-B` and
|
|
|
|
# `-L` flags pointing at the new gcc's libstdc++ headers. Example failure:
|
|
|
|
# https://hydra.nixos.org/build/213125495
|
|
|
|
else false
|
|
|
|
|
|
|
|
# the derivation at which the `-B` and `-L` flags added by `useCcForLibs` will point
|
2023-02-13 22:50:09 +01:00
|
|
|
, gccForLibs ? if useCcForLibs then cc else null
|
2008-06-26 13:07:46 +02:00
|
|
|
}:
|
|
|
|
|
2021-01-24 04:02:59 +01:00
|
|
|
with lib;
|
2014-10-10 13:49:26 +02:00
|
|
|
|
2018-02-01 01:00:00 +01:00
|
|
|
assert nativeTools -> !propagateDoc && nativePrefix != "";
|
2015-12-17 23:02:40 +01:00
|
|
|
assert !nativeTools ->
|
2017-08-26 17:43:30 +02:00
|
|
|
cc != null && coreutils != null && gnugrep != null;
|
2017-05-23 02:59:39 +02:00
|
|
|
assert !(nativeLibc && noLibc);
|
|
|
|
assert (noLibc || nativeLibc) == (libc == null);
|
2008-06-26 13:07:46 +02:00
|
|
|
|
2009-04-09 17:24:33 +02:00
|
|
|
let
|
2017-09-20 17:07:52 +02:00
|
|
|
stdenv = stdenvNoCC;
|
2017-07-06 03:47:48 +02:00
|
|
|
inherit (stdenv) hostPlatform targetPlatform;
|
|
|
|
|
2017-02-14 00:01:04 +01:00
|
|
|
# Prefix for binaries. Customarily ends with a dash separator.
|
|
|
|
#
|
|
|
|
# TODO(@Ericson2314) Make unconditional, or optional but always true by
|
|
|
|
# default.
|
2021-01-24 04:02:59 +01:00
|
|
|
targetPrefix = lib.optionalString (targetPlatform != hostPlatform)
|
2017-11-25 19:43:57 +01:00
|
|
|
(targetPlatform.config + "-");
|
2009-04-09 17:24:33 +02:00
|
|
|
|
2021-01-24 04:02:59 +01:00
|
|
|
ccVersion = lib.getVersion cc;
|
|
|
|
ccName = lib.removePrefix targetPrefix (lib.getName cc);
|
2012-08-03 19:23:51 +02:00
|
|
|
|
2022-12-07 05:16:50 +01:00
|
|
|
libc_bin = if libc == null then "" else getBin libc;
|
|
|
|
libc_dev = if libc == null then "" else getDev libc;
|
|
|
|
libc_lib = if libc == null then "" else getLib libc;
|
2019-08-13 00:59:01 +02:00
|
|
|
cc_solib = getLib cc
|
|
|
|
+ optionalString (targetPlatform != hostPlatform) "/${targetPlatform.config}";
|
|
|
|
|
2016-02-03 16:54:03 +01:00
|
|
|
# The wrapper scripts use 'cat' and 'grep', so we may need coreutils.
|
2016-04-14 18:00:39 +02:00
|
|
|
coreutils_bin = if nativeTools then "" else getBin coreutils;
|
2017-06-08 20:00:40 +02:00
|
|
|
|
2020-04-28 06:08:48 +02:00
|
|
|
# The "suffix salt" is a arbitrary string added in the end of env vars
|
2017-06-26 06:43:06 +02:00
|
|
|
# defined by cc-wrapper's hooks so that multiple cc-wrappers can be used
|
|
|
|
# without interfering. For the moment, it is defined as the target triple,
|
|
|
|
# adjusted to be a valid bash identifier. This should be considered an
|
|
|
|
# unstable implementation detail, however.
|
2020-04-28 06:08:48 +02:00
|
|
|
suffixSalt = replaceStrings ["-" "."] ["_" "_"] targetPlatform.config;
|
2017-06-19 17:10:27 +02:00
|
|
|
|
2017-08-23 22:23:30 +02:00
|
|
|
expand-response-params =
|
2023-02-06 21:49:02 +01:00
|
|
|
lib.optionalString ((buildPackages.stdenv.hasCC or false) && buildPackages.stdenv.cc != "/dev/null") (import ../expand-response-params { inherit (buildPackages) stdenv; });
|
2017-06-29 18:06:55 +02:00
|
|
|
|
2023-02-13 22:50:09 +01:00
|
|
|
useGccForLibs = useCcForLibs
|
2020-09-07 21:08:11 +02:00
|
|
|
&& libcxx == null
|
2021-05-01 05:03:19 +02:00
|
|
|
&& !stdenv.targetPlatform.isDarwin
|
2020-09-07 21:08:11 +02:00
|
|
|
&& !(stdenv.targetPlatform.useLLVM or false)
|
|
|
|
&& !(stdenv.targetPlatform.useAndroidPrebuilt or false)
|
2021-01-20 19:14:46 +01:00
|
|
|
&& !(stdenv.targetPlatform.isiOS or false)
|
2020-09-07 21:08:11 +02:00
|
|
|
&& gccForLibs != null;
|
|
|
|
|
2019-04-21 18:13:37 +02:00
|
|
|
# older compilers (for example bootstrap's GCC 5) fail with -march=too-modern-cpu
|
|
|
|
isGccArchSupported = arch:
|
2022-12-09 04:57:17 +01:00
|
|
|
if targetPlatform.isPower then false else # powerpc does not allow -march=
|
2020-04-14 02:44:43 +02:00
|
|
|
if isGNU then
|
2019-05-06 01:40:20 +02:00
|
|
|
{ # Intel
|
|
|
|
skylake = versionAtLeast ccVersion "6.0";
|
2019-04-21 18:13:37 +02:00
|
|
|
skylake-avx512 = versionAtLeast ccVersion "6.0";
|
|
|
|
cannonlake = versionAtLeast ccVersion "8.0";
|
|
|
|
icelake-client = versionAtLeast ccVersion "8.0";
|
|
|
|
icelake-server = versionAtLeast ccVersion "8.0";
|
2020-12-24 01:02:10 +01:00
|
|
|
cascadelake = versionAtLeast ccVersion "9.0";
|
|
|
|
cooperlake = versionAtLeast ccVersion "10.0";
|
|
|
|
tigerlake = versionAtLeast ccVersion "10.0";
|
2019-04-21 18:13:37 +02:00
|
|
|
knm = versionAtLeast ccVersion "8.0";
|
2019-05-06 01:40:20 +02:00
|
|
|
# AMD
|
|
|
|
znver1 = versionAtLeast ccVersion "6.0";
|
2020-08-05 04:32:41 +02:00
|
|
|
znver2 = versionAtLeast ccVersion "9.0";
|
2020-12-24 01:02:10 +01:00
|
|
|
znver3 = versionAtLeast ccVersion "11.0";
|
2019-04-21 18:13:37 +02:00
|
|
|
}.${arch} or true
|
2020-04-14 02:44:43 +02:00
|
|
|
else if isClang then
|
2019-05-06 01:40:20 +02:00
|
|
|
{ # Intel
|
|
|
|
cannonlake = versionAtLeast ccVersion "5.0";
|
2019-04-21 18:13:37 +02:00
|
|
|
icelake-client = versionAtLeast ccVersion "7.0";
|
|
|
|
icelake-server = versionAtLeast ccVersion "7.0";
|
|
|
|
knm = versionAtLeast ccVersion "7.0";
|
2019-05-06 01:40:20 +02:00
|
|
|
# AMD
|
|
|
|
znver1 = versionAtLeast ccVersion "4.0";
|
2020-08-05 04:32:41 +02:00
|
|
|
znver2 = versionAtLeast ccVersion "9.0";
|
2019-04-21 18:13:37 +02:00
|
|
|
}.${arch} or true
|
|
|
|
else
|
|
|
|
false;
|
|
|
|
|
2021-04-10 06:11:28 +02:00
|
|
|
|
|
|
|
darwinPlatformForCC = optionalString stdenv.targetPlatform.isDarwin (
|
|
|
|
if (targetPlatform.darwinPlatform == "macos" && isGNU) then "macosx"
|
|
|
|
else targetPlatform.darwinPlatform
|
|
|
|
);
|
|
|
|
|
|
|
|
darwinMinVersion = optionalString stdenv.targetPlatform.isDarwin (
|
|
|
|
stdenv.targetPlatform.darwinMinVersion
|
|
|
|
);
|
2021-04-10 11:06:25 +02:00
|
|
|
|
|
|
|
darwinMinVersionVariable = optionalString stdenv.targetPlatform.isDarwin
|
|
|
|
stdenv.targetPlatform.darwinMinVersionVariable;
|
2009-04-09 17:24:33 +02:00
|
|
|
in
|
2009-03-25 18:34:38 +01:00
|
|
|
|
2017-08-28 20:56:08 +02:00
|
|
|
# Ensure bintools matches
|
|
|
|
assert libc_bin == bintools.libc_bin;
|
|
|
|
assert libc_dev == bintools.libc_dev;
|
|
|
|
assert libc_lib == bintools.libc_lib;
|
|
|
|
assert nativeTools == bintools.nativeTools;
|
|
|
|
assert nativeLibc == bintools.nativeLibc;
|
|
|
|
assert nativePrefix == bintools.nativePrefix;
|
|
|
|
|
2012-12-29 15:11:32 +01:00
|
|
|
stdenv.mkDerivation {
|
2019-06-24 02:42:48 +02:00
|
|
|
pname = targetPrefix
|
|
|
|
+ (if name != "" then name else "${ccName}-wrapper");
|
2023-02-18 19:42:55 +01:00
|
|
|
version = if cc == null then "" else ccVersion;
|
2014-02-04 16:58:12 +01:00
|
|
|
|
2014-10-10 13:49:26 +02:00
|
|
|
preferLocalBuild = true;
|
|
|
|
|
2018-02-01 01:00:00 +01:00
|
|
|
outputs = [ "out" ] ++ optionals propagateDoc [ "man" "info" ];
|
2017-06-08 20:00:40 +02:00
|
|
|
|
2016-10-07 16:31:37 +02:00
|
|
|
passthru = {
|
2022-12-06 23:08:33 +01:00
|
|
|
inherit targetPrefix suffixSalt;
|
2017-10-11 01:01:42 +02:00
|
|
|
# "cc" is the generic name for a C compiler, but there is no one for package
|
|
|
|
# providing the linker and related tools. The two we use now are GNU
|
2017-08-28 20:56:08 +02:00
|
|
|
# Binutils, and Apple's "cctools"; "bintools" as an attempt to find an
|
2017-10-11 01:01:42 +02:00
|
|
|
# unused middle-ground name that evokes both.
|
2017-08-28 20:56:08 +02:00
|
|
|
inherit bintools;
|
2022-12-07 05:16:50 +01:00
|
|
|
inherit cc libc nativeTools nativeLibc nativePrefix isGNU isClang;
|
2016-10-07 16:31:37 +02:00
|
|
|
|
|
|
|
emacsBufferSetup = pkgs: ''
|
|
|
|
; We should handle propagation here too
|
2017-08-28 20:56:08 +02:00
|
|
|
(mapc
|
|
|
|
(lambda (arg)
|
|
|
|
(when (file-directory-p (concat arg "/include"))
|
2020-04-28 06:08:48 +02:00
|
|
|
(setenv "NIX_CFLAGS_COMPILE_${suffixSalt}" (concat (getenv "NIX_CFLAGS_COMPILE_${suffixSalt}") " -isystem " arg "/include"))))
|
2017-08-28 20:56:08 +02:00
|
|
|
'(${concatStringsSep " " (map (pkg: "\"${pkg}\"") pkgs)}))
|
2016-10-07 16:31:37 +02:00
|
|
|
'';
|
2022-04-30 04:54:03 +02:00
|
|
|
|
2022-07-31 17:26:35 +02:00
|
|
|
inherit expand-response-params;
|
|
|
|
|
2022-04-30 04:54:03 +02:00
|
|
|
inherit nixSupport;
|
2016-10-07 16:31:37 +02:00
|
|
|
};
|
2014-10-10 13:49:26 +02:00
|
|
|
|
2017-08-23 22:55:55 +02:00
|
|
|
dontBuild = true;
|
|
|
|
dontConfigure = true;
|
2022-05-14 03:13:49 +02:00
|
|
|
enableParallelBuilding = true;
|
2017-08-23 22:55:55 +02:00
|
|
|
|
|
|
|
unpackPhase = ''
|
|
|
|
src=$PWD
|
|
|
|
'';
|
|
|
|
|
2019-11-27 20:15:56 +01:00
|
|
|
wrapper = ./cc-wrapper.sh;
|
|
|
|
|
2017-08-23 22:55:55 +02:00
|
|
|
installPhase =
|
2014-10-10 13:49:26 +02:00
|
|
|
''
|
2018-02-01 01:00:00 +01:00
|
|
|
mkdir -p $out/bin $out/nix-support
|
2014-10-10 13:49:26 +02:00
|
|
|
|
|
|
|
wrap() {
|
|
|
|
local dst="$1"
|
|
|
|
local wrapper="$2"
|
|
|
|
export prog="$3"
|
2022-06-19 23:18:01 +02:00
|
|
|
export use_response_file_by_default=${if isClang && !isCcache then "1" else "0"}
|
2014-10-10 13:49:26 +02:00
|
|
|
substituteAll "$wrapper" "$out/bin/$dst"
|
|
|
|
chmod +x "$out/bin/$dst"
|
|
|
|
}
|
|
|
|
''
|
|
|
|
|
|
|
|
+ (if nativeTools then ''
|
2017-08-23 22:55:55 +02:00
|
|
|
echo ${if targetPlatform.isDarwin then cc else nativePrefix} > $out/nix-support/orig-cc
|
|
|
|
|
2017-05-21 20:51:02 +02:00
|
|
|
ccPath="${if targetPlatform.isDarwin then cc else nativePrefix}/bin"
|
2014-10-10 13:49:26 +02:00
|
|
|
'' else ''
|
2015-01-09 20:22:12 +01:00
|
|
|
echo $cc > $out/nix-support/orig-cc
|
2014-10-10 13:49:26 +02:00
|
|
|
|
2016-01-02 11:14:09 +01:00
|
|
|
ccPath="${cc}/bin"
|
2014-10-10 13:49:26 +02:00
|
|
|
'')
|
|
|
|
|
2020-06-30 17:04:10 +02:00
|
|
|
# Create symlinks to everything in the bintools wrapper.
|
2014-10-10 13:49:26 +02:00
|
|
|
+ ''
|
2017-08-28 20:56:08 +02:00
|
|
|
for bbin in $bintools/bin/*; do
|
|
|
|
mkdir -p "$out/bin"
|
|
|
|
ln -s "$bbin" "$out/bin/$(basename $bbin)"
|
|
|
|
done
|
2020-06-30 17:04:10 +02:00
|
|
|
''
|
2014-10-10 14:01:38 +02:00
|
|
|
|
2020-06-30 17:04:10 +02:00
|
|
|
# We export environment variables pointing to the wrapped nonstandard
|
|
|
|
# cmds, lest some lousy configure script use those to guess compiler
|
|
|
|
# version.
|
|
|
|
+ ''
|
2017-11-25 19:43:57 +01:00
|
|
|
export named_cc=${targetPrefix}cc
|
|
|
|
export named_cxx=${targetPrefix}c++
|
2017-06-26 07:17:09 +02:00
|
|
|
|
2017-11-25 19:43:57 +01:00
|
|
|
if [ -e $ccPath/${targetPrefix}gcc ]; then
|
2019-11-27 20:15:56 +01:00
|
|
|
wrap ${targetPrefix}gcc $wrapper $ccPath/${targetPrefix}gcc
|
2017-11-25 19:43:57 +01:00
|
|
|
ln -s ${targetPrefix}gcc $out/bin/${targetPrefix}cc
|
|
|
|
export named_cc=${targetPrefix}gcc
|
|
|
|
export named_cxx=${targetPrefix}g++
|
2015-01-09 20:22:12 +01:00
|
|
|
elif [ -e $ccPath/clang ]; then
|
2019-11-27 20:15:56 +01:00
|
|
|
wrap ${targetPrefix}clang $wrapper $ccPath/clang
|
2017-11-25 19:43:57 +01:00
|
|
|
ln -s ${targetPrefix}clang $out/bin/${targetPrefix}cc
|
|
|
|
export named_cc=${targetPrefix}clang
|
|
|
|
export named_cxx=${targetPrefix}clang++
|
2014-10-10 13:49:26 +02:00
|
|
|
fi
|
|
|
|
|
2017-11-25 19:43:57 +01:00
|
|
|
if [ -e $ccPath/${targetPrefix}g++ ]; then
|
2019-11-27 20:15:56 +01:00
|
|
|
wrap ${targetPrefix}g++ $wrapper $ccPath/${targetPrefix}g++
|
2017-11-25 19:43:57 +01:00
|
|
|
ln -s ${targetPrefix}g++ $out/bin/${targetPrefix}c++
|
2015-01-09 20:22:12 +01:00
|
|
|
elif [ -e $ccPath/clang++ ]; then
|
2019-11-27 20:15:56 +01:00
|
|
|
wrap ${targetPrefix}clang++ $wrapper $ccPath/clang++
|
2017-11-25 19:43:57 +01:00
|
|
|
ln -s ${targetPrefix}clang++ $out/bin/${targetPrefix}c++
|
2014-10-10 15:48:34 +02:00
|
|
|
fi
|
|
|
|
|
2023-03-17 19:03:33 +01:00
|
|
|
if [ -e $ccPath/${targetPrefix}cpp ]; then
|
2023-03-17 16:03:44 +01:00
|
|
|
wrap ${targetPrefix}cpp $wrapper $ccPath/${targetPrefix}cpp
|
2023-03-17 19:03:33 +01:00
|
|
|
elif [ -e $ccPath/cpp ]; then
|
|
|
|
wrap ${targetPrefix}cpp $wrapper $ccPath/cpp
|
2014-10-10 13:49:26 +02:00
|
|
|
fi
|
|
|
|
''
|
|
|
|
|
2023-01-06 10:32:49 +01:00
|
|
|
# No need to wrap gnat, gnatkr, gnatname or gnatprep; we can just symlink them in
|
2019-05-11 23:16:17 +02:00
|
|
|
+ optionalString cc.langAda or false ''
|
2023-01-06 10:32:49 +01:00
|
|
|
for cmd in gnatbind gnatchop gnatclean gnatlink gnatls gnatmake; do
|
|
|
|
wrap ${targetPrefix}$cmd ${./gnat-wrapper.sh} $ccPath/${targetPrefix}$cmd
|
|
|
|
done
|
|
|
|
|
|
|
|
for cmd in gnat gnatkr gnatname gnatprep; do
|
|
|
|
ln -s $ccPath/${targetPrefix}$cmd $out/bin/${targetPrefix}$cmd
|
|
|
|
done
|
gprbuild, xmlada: init at 21.0.0
GPRbuild is a multi language build system developed by AdaCore which
is mostly used for build Ada-related projects using GNAT.
Since GPRbuild is used to build itself and its dependency library
XML/Ada we first build a bootstrap version of it using the provided
bash build script bootstrap.sh as the gprbuild-boot derivation.
gprbuild-boot is then used to build xmlada and the proper gprbuild
derivation.
GPRbuild has its own search path mechanism via GPR_PROJECT_PATH which
we address via a setupHook. It currently works quite similar to the
pkg-config one: It accumulates all inputs into GPR_PROJECT_PATH,
GPR_PROJECT_PATH_FOR_BUILD etc. However this is quite limited at the
moment as we don't have a gprbuild wrapper yet which understands the
_FOR_BUILD suffix. However, we'll need to address this in the future
as it is currently basically impossible to test since the distinction
only affects cross-compilation, but it is not possible to build a GNAT
cross-compiler in nixpkgs at the moment (I'm working on changing that,
however).
Another issue we had to solve was GPRbuild not finding the right GNAT
via its gprconfig tool: GPRbuild has a knowledge base with compiler
definitions which run some checks and collect info about binaries
which are in PATH. In the end the first compiler in PATH that supports
the desired language is selected.
We want GPRbuild to discover our wrapped GNAT since the unwrapped one
is incapable of producing working binaries since it won't find the
crt*.o objects distributed with libc. GPRbuild however needs to find
the Ada runtime distributed with GNAT which is not part of the wrapper
derivation, so it will skip the wrapper and select the unwrapped GNAT.
Symlinking the unwrapped's lib directory into the wrapper fixes this
problem, but breaks linking in some cases (e. g. when linking against
OMP from gcc, the runtime variant will shadow the problem dynamic lib
from buildInputs). Additionally it uses gnatls as an indicator it has
found GNAT which is not part of the wrapper.
The solution we opted to adopt here is to install a custom compiler
description into gprbuild's knowledge base which properly detects the
nixpkgs GNAT wrapper: It uses gnatmake to detect GNAT instead of
gnatls and discovers the runtime via a symlink we add to
`$out/nix-support`. This additional definition is enough to properly
detect GNAT, since the plain wrapped gcc detection works out of the
box. It may, however, be necessary to add special definitions for
other languages in the future where gprbuild also needs to discover
the runtime.
One future improvement would be to install libgpr into a separate
output or split it into a separate derivation (which would require to
link gprbuild statically always since otherwise we end up with a
cyclical dependency).
2021-07-22 13:52:40 +02:00
|
|
|
|
|
|
|
# this symlink points to the unwrapped gnat's output "out". It is used by
|
|
|
|
# our custom gprconfig compiler description to find GNAT's ada runtime. See
|
|
|
|
# ../../development/tools/build-managers/gprbuild/{boot.nix, nixpkgs-gnat.xml}
|
|
|
|
ln -sf ${cc} $out/nix-support/gprconfig-gnat-unwrapped
|
2019-05-11 23:16:17 +02:00
|
|
|
''
|
|
|
|
|
2019-09-20 12:05:57 +02:00
|
|
|
+ optionalString cc.langD or false ''
|
|
|
|
wrap ${targetPrefix}gdc $wrapper $ccPath/${targetPrefix}gdc
|
|
|
|
''
|
|
|
|
|
2022-08-19 09:08:11 +02:00
|
|
|
+ optionalString cc.langFortran or false ''
|
2019-11-27 20:15:56 +01:00
|
|
|
wrap ${targetPrefix}gfortran $wrapper $ccPath/${targetPrefix}gfortran
|
2017-11-25 19:43:57 +01:00
|
|
|
ln -sv ${targetPrefix}gfortran $out/bin/${targetPrefix}g77
|
|
|
|
ln -sv ${targetPrefix}gfortran $out/bin/${targetPrefix}f77
|
2020-07-06 06:22:19 +02:00
|
|
|
export named_fc=${targetPrefix}gfortran
|
2014-10-10 13:49:26 +02:00
|
|
|
''
|
|
|
|
|
2015-01-09 20:22:12 +01:00
|
|
|
+ optionalString cc.langJava or false ''
|
2019-11-27 20:15:56 +01:00
|
|
|
wrap ${targetPrefix}gcj $wrapper $ccPath/${targetPrefix}gcj
|
2014-10-10 13:49:26 +02:00
|
|
|
''
|
|
|
|
|
2015-01-09 20:22:12 +01:00
|
|
|
+ optionalString cc.langGo or false ''
|
2019-11-27 20:15:56 +01:00
|
|
|
wrap ${targetPrefix}gccgo $wrapper $ccPath/${targetPrefix}gccgo
|
2023-01-20 14:31:54 +01:00
|
|
|
wrap ${targetPrefix}go ${./go-wrapper.sh} $ccPath/${targetPrefix}go
|
2017-08-23 22:55:55 +02:00
|
|
|
'';
|
|
|
|
|
2018-05-13 17:31:24 +02:00
|
|
|
strictDeps = true;
|
2019-09-20 12:05:57 +02:00
|
|
|
propagatedBuildInputs = [ bintools ] ++ extraTools ++ optionals cc.langD or false [ zlib ];
|
2020-04-14 02:44:43 +02:00
|
|
|
depsTargetTargetPropagated = optional (libcxx != null) libcxx ++ extraPackages;
|
2017-08-23 22:55:55 +02:00
|
|
|
|
2018-05-07 19:07:19 +02:00
|
|
|
setupHooks = [
|
|
|
|
../setup-hooks/role.bash
|
2022-10-28 10:28:12 +02:00
|
|
|
] ++ lib.optional (cc.langC or true) ./setup-hook.sh
|
2021-01-24 04:02:59 +01:00
|
|
|
++ lib.optional (cc.langFortran or false) ./fortran-hook.sh;
|
2017-08-23 22:55:55 +02:00
|
|
|
|
|
|
|
postFixup =
|
2020-06-30 20:26:37 +02:00
|
|
|
# Ensure flags files exists, as some other programs cat them. (That these
|
|
|
|
# are considered an exposed interface is a bit dubious, but fine for now.)
|
|
|
|
''
|
|
|
|
touch "$out/nix-support/cc-cflags"
|
|
|
|
touch "$out/nix-support/cc-ldflags"
|
|
|
|
''
|
|
|
|
|
2020-06-30 17:04:10 +02:00
|
|
|
# Backwards compatability for packages expecting this file, e.g. with
|
|
|
|
# `$NIX_CC/nix-support/dynamic-linker`.
|
|
|
|
#
|
|
|
|
# TODO(@Ericson2314): Remove this after stable release and force
|
|
|
|
# everyone to refer to bintools-wrapper directly.
|
2020-06-30 20:26:37 +02:00
|
|
|
+ ''
|
2017-08-28 20:56:08 +02:00
|
|
|
if [[ -f "$bintools/nix-support/dynamic-linker" ]]; then
|
|
|
|
ln -s "$bintools/nix-support/dynamic-linker" "$out/nix-support"
|
|
|
|
fi
|
|
|
|
if [[ -f "$bintools/nix-support/dynamic-linker-m32" ]]; then
|
|
|
|
ln -s "$bintools/nix-support/dynamic-linker-m32" "$out/nix-support"
|
|
|
|
fi
|
2017-08-23 22:55:55 +02:00
|
|
|
''
|
|
|
|
|
2020-06-30 17:04:10 +02:00
|
|
|
##
|
|
|
|
## GCC libs for non-GCC support
|
|
|
|
##
|
2023-04-12 08:49:48 +02:00
|
|
|
+ optionalString (useGccForLibs && isClang) ''
|
2020-04-14 02:44:43 +02:00
|
|
|
|
2020-06-17 22:33:56 +02:00
|
|
|
echo "-B${gccForLibs}/lib/gcc/${targetPlatform.config}/${gccForLibs.version}" >> $out/nix-support/cc-cflags
|
2023-04-12 09:34:40 +02:00
|
|
|
''
|
|
|
|
+ optionalString useGccForLibs ''
|
2020-06-17 22:33:56 +02:00
|
|
|
echo "-L${gccForLibs}/lib/gcc/${targetPlatform.config}/${gccForLibs.version}" >> $out/nix-support/cc-ldflags
|
|
|
|
echo "-L${gccForLibs.lib}/${targetPlatform.config}/lib" >> $out/nix-support/cc-ldflags
|
2020-04-14 02:44:43 +02:00
|
|
|
''
|
|
|
|
|
2021-01-21 00:45:52 +01:00
|
|
|
# TODO We would like to connect this to `useGccForLibs`, but we cannot yet
|
|
|
|
# because `libcxxStdenv` on linux still needs this. Maybe someday we'll
|
|
|
|
# always set `useLLVM` on Darwin, and maybe also break down `useLLVM` into
|
|
|
|
# fine-grained use flags (libgcc vs compiler-rt, ld.lld vs legacy, libc++
|
|
|
|
# vs libstdc++, etc.) since Darwin isn't `useLLVM` on all counts. (See
|
|
|
|
# https://clang.llvm.org/docs/Toolchain.html for all the axes one might
|
|
|
|
# break `useLLVM` into.)
|
2021-04-10 19:39:07 +02:00
|
|
|
+ optionalString (isClang
|
2021-02-10 19:38:17 +01:00
|
|
|
&& targetPlatform.isLinux
|
|
|
|
&& !(stdenv.targetPlatform.useAndroidPrebuilt or false)
|
2021-04-10 19:39:07 +02:00
|
|
|
&& !(stdenv.targetPlatform.useLLVM or false)
|
2023-02-22 07:09:38 +01:00
|
|
|
&& gccForLibs != null) (''
|
2021-01-21 00:45:52 +01:00
|
|
|
echo "--gcc-toolchain=${gccForLibs}" >> $out/nix-support/cc-cflags
|
2023-01-27 22:30:14 +01:00
|
|
|
|
|
|
|
# Pull in 'cc.out' target to get 'libstdc++fs.a'. It should be in
|
|
|
|
# 'cc.lib'. But it's a gcc package bug.
|
|
|
|
# TODO(trofi): remove once gcc is fixed to move libraries to .lib output.
|
|
|
|
echo "-L${gccForLibs}/${optionalString (targetPlatform != hostPlatform) "/${targetPlatform.config}"}/lib" >> $out/nix-support/cc-ldflags
|
2021-01-21 00:45:52 +01:00
|
|
|
''
|
2023-02-22 07:09:38 +01:00
|
|
|
# this ensures that when clang passes -lgcc_s to lld (as it does
|
|
|
|
# when building e.g. firefox), lld is able to find libgcc_s.so
|
|
|
|
+ lib.optionalString (gccForLibs?libgcc) ''
|
|
|
|
echo "-L${gccForLibs.libgcc}/lib" >> $out/nix-support/cc-ldflags
|
|
|
|
'')
|
2021-01-21 00:45:52 +01:00
|
|
|
|
2020-06-30 17:04:10 +02:00
|
|
|
##
|
|
|
|
## General libc support
|
|
|
|
##
|
|
|
|
|
|
|
|
# The "-B${libc_lib}/lib/" flag is a quick hack to force gcc to link
|
|
|
|
# against the crt1.o from our own glibc, rather than the one in
|
|
|
|
# /usr/lib. (This is only an issue when using an `impure'
|
|
|
|
# compiler/linker, i.e., one that searches /usr/lib and so on.)
|
|
|
|
#
|
|
|
|
# Unfortunately, setting -B appears to override the default search
|
|
|
|
# path. Thus, the gcc-specific "../includes-fixed" directory is
|
|
|
|
# now longer searched and glibc's <limits.h> header fails to
|
|
|
|
# compile, because it uses "#include_next <limits.h>" to find the
|
|
|
|
# limits.h file in ../includes-fixed. To remedy the problem,
|
|
|
|
# another -idirafter is necessary to add that directory again.
|
2019-11-26 01:55:16 +01:00
|
|
|
+ optionalString (libc != null) (''
|
2020-06-30 20:26:37 +02:00
|
|
|
touch "$out/nix-support/libc-cflags"
|
|
|
|
touch "$out/nix-support/libc-ldflags"
|
2020-07-01 22:55:06 +02:00
|
|
|
echo "-B${libc_lib}${libc.libdir or "/lib/"}" >> $out/nix-support/libc-crt1-cflags
|
2019-09-20 12:05:57 +02:00
|
|
|
'' + optionalString (!(cc.langD or false)) ''
|
2019-11-26 01:55:16 +01:00
|
|
|
echo "-idirafter ${libc_dev}${libc.incdir or "/include"}" >> $out/nix-support/libc-cflags
|
2019-09-20 12:05:57 +02:00
|
|
|
'' + optionalString (isGNU && (!(cc.langD or false))) ''
|
2019-11-26 01:55:16 +01:00
|
|
|
for dir in "${cc}"/lib/gcc/*/*/include-fixed; do
|
|
|
|
echo '-idirafter' ''${dir} >> $out/nix-support/libc-cflags
|
|
|
|
done
|
|
|
|
'' + ''
|
2017-08-23 22:55:55 +02:00
|
|
|
|
|
|
|
echo "${libc_lib}" > $out/nix-support/orig-libc
|
|
|
|
echo "${libc_dev}" > $out/nix-support/orig-libc-dev
|
2019-11-26 01:55:16 +01:00
|
|
|
'')
|
2017-08-23 22:55:55 +02:00
|
|
|
|
2020-06-30 17:04:10 +02:00
|
|
|
##
|
|
|
|
## General libc++ support
|
|
|
|
##
|
2020-06-30 20:26:37 +02:00
|
|
|
|
|
|
|
# We have a libc++ directly, we have one via "smuggled" GCC, or we have one
|
|
|
|
# bundled with the C compiler because it is GCC
|
2020-09-07 21:08:11 +02:00
|
|
|
+ optionalString (libcxx != null || (useGccForLibs && gccForLibs.langCC or false) || (isGNU && cc.langCC or false)) ''
|
2020-06-30 20:26:37 +02:00
|
|
|
touch "$out/nix-support/libcxx-cxxflags"
|
|
|
|
touch "$out/nix-support/libcxx-ldflags"
|
2020-06-17 22:33:56 +02:00
|
|
|
''
|
2023-04-08 06:44:28 +02:00
|
|
|
# Adding -isystem flags should be done only for clang; gcc
|
|
|
|
# already knows how to find its own libstdc++, and adding
|
|
|
|
# additional -isystem flags will confuse gfortran (see
|
|
|
|
# https://github.com/NixOS/nixpkgs/pull/209870#issuecomment-1500550903)
|
|
|
|
+ optionalString (libcxx == null && isClang && (useGccForLibs && gccForLibs.langCC or false)) ''
|
2022-11-21 13:40:22 +01:00
|
|
|
for dir in ${gccForLibs}${lib.optionalString (hostPlatform != targetPlatform) "/${targetPlatform.config}"}/include/c++/*; do
|
2020-04-14 02:44:43 +02:00
|
|
|
echo "-isystem $dir" >> $out/nix-support/libcxx-cxxflags
|
|
|
|
done
|
2022-11-21 13:40:22 +01:00
|
|
|
for dir in ${gccForLibs}${lib.optionalString (hostPlatform != targetPlatform) "/${targetPlatform.config}"}/include/c++/*/${targetPlatform.config}; do
|
2020-04-14 02:44:43 +02:00
|
|
|
echo "-isystem $dir" >> $out/nix-support/libcxx-cxxflags
|
|
|
|
done
|
|
|
|
''
|
2023-01-13 21:03:29 +01:00
|
|
|
+ optionalString (libcxx.isLLVM or false) ''
|
llvmPackages: Multuple outputs for everythting
Also begin to start work on cross compilation, though that will have to
be finished later.
The patches are based on the first version of
https://reviews.llvm.org/D99484. It's very annoying to do the
back-porting but the review has uncovered nothing super major so I'm
fine sticking with what I've got.
Beyond making the outputs work, I also strove to re-sync the packages,
as they have been drifting pointlessly apart for some time.
----
Other misc notes, highly incomplete
- lvm-config-native and llvm-config are put in `dev` because they are
tools just for build time.
- Clang no longer has an lld dep. That was introduced in
db29857eb391ed002046090851a44c452b80bdbd, but if clang needs help
finding lld when it is used we should just pass it flags / put in the
resource dir. Providing it at build time increases critical path
length for no good reason.
----
A note on `nativeCC`:
`stdenv` takes tools from the previous stage, so:
1. `pkgsBuildBuild`: `(?1, x, x)`
2. `pkgsBuildBuild.stdenv.cc`: `(?0, ?1, x)`
while:
1. `pkgsBuildBuild`: `(?1, x, x)`
2. `pkgsBuildBuild.targetPackages`: `(x, x, ?2)`
3. `pkgsBuildBuild.targetPackages.stdenv.cc`: `(?1, x, x)`
2020-10-15 10:23:57 +02:00
|
|
|
echo "-isystem ${lib.getDev libcxx}/include/c++/v1" >> $out/nix-support/libcxx-cxxflags
|
2020-04-14 02:44:43 +02:00
|
|
|
echo "-stdlib=libc++" >> $out/nix-support/libcxx-ldflags
|
2023-01-13 21:03:29 +01:00
|
|
|
echo "-l${libcxx.cxxabi.libName}" >> $out/nix-support/libcxx-ldflags
|
|
|
|
''
|
2020-04-14 02:44:43 +02:00
|
|
|
|
2020-06-30 17:04:10 +02:00
|
|
|
##
|
|
|
|
## Initial CFLAGS
|
|
|
|
##
|
|
|
|
|
|
|
|
# GCC shows ${cc_solib}/lib in `gcc -print-search-dirs', but not
|
|
|
|
# ${cc_solib}/lib64 (even though it does actually search there...)..
|
|
|
|
# This confuses libtool. So add it to the compiler tool search
|
|
|
|
# path explicitly.
|
2017-08-23 22:55:55 +02:00
|
|
|
+ optionalString (!nativeTools) ''
|
|
|
|
if [ -e "${cc_solib}/lib64" -a ! -L "${cc_solib}/lib64" ]; then
|
|
|
|
ccLDFlags+=" -L${cc_solib}/lib64"
|
|
|
|
ccCFlags+=" -B${cc_solib}/lib64"
|
|
|
|
fi
|
|
|
|
ccLDFlags+=" -L${cc_solib}/lib"
|
|
|
|
ccCFlags+=" -B${cc_solib}/lib"
|
|
|
|
|
2019-05-11 23:16:17 +02:00
|
|
|
'' + optionalString cc.langAda or false ''
|
2020-06-30 20:26:37 +02:00
|
|
|
touch "$out/nix-support/gnat-cflags"
|
|
|
|
touch "$out/nix-support/gnat-ldflags"
|
2019-05-11 23:16:17 +02:00
|
|
|
basePath=$(echo $cc/lib/*/*/*)
|
|
|
|
ccCFlags+=" -B$basePath -I$basePath/adainclude"
|
|
|
|
gnatCFlags="-I$basePath/adainclude -I$basePath/adalib"
|
|
|
|
|
2020-06-30 20:26:37 +02:00
|
|
|
echo "$gnatCFlags" >> $out/nix-support/gnat-cflags
|
2019-05-11 23:16:17 +02:00
|
|
|
'' + ''
|
2020-06-30 20:26:37 +02:00
|
|
|
echo "$ccLDFlags" >> $out/nix-support/cc-ldflags
|
|
|
|
echo "$ccCFlags" >> $out/nix-support/cc-cflags
|
2019-01-26 16:17:57 +01:00
|
|
|
'' + optionalString (targetPlatform.isDarwin && (libcxx != null) && (cc.isClang or false)) ''
|
llvmPackages: Multuple outputs for everythting
Also begin to start work on cross compilation, though that will have to
be finished later.
The patches are based on the first version of
https://reviews.llvm.org/D99484. It's very annoying to do the
back-porting but the review has uncovered nothing super major so I'm
fine sticking with what I've got.
Beyond making the outputs work, I also strove to re-sync the packages,
as they have been drifting pointlessly apart for some time.
----
Other misc notes, highly incomplete
- lvm-config-native and llvm-config are put in `dev` because they are
tools just for build time.
- Clang no longer has an lld dep. That was introduced in
db29857eb391ed002046090851a44c452b80bdbd, but if clang needs help
finding lld when it is used we should just pass it flags / put in the
resource dir. Providing it at build time increases critical path
length for no good reason.
----
A note on `nativeCC`:
`stdenv` takes tools from the previous stage, so:
1. `pkgsBuildBuild`: `(?1, x, x)`
2. `pkgsBuildBuild.stdenv.cc`: `(?0, ?1, x)`
while:
1. `pkgsBuildBuild`: `(?1, x, x)`
2. `pkgsBuildBuild.targetPackages`: `(x, x, ?2)`
3. `pkgsBuildBuild.targetPackages.stdenv.cc`: `(?1, x, x)`
2020-10-15 10:23:57 +02:00
|
|
|
echo " -L${lib.getLib libcxx}/lib" >> $out/nix-support/cc-ldflags
|
2020-06-30 17:04:10 +02:00
|
|
|
''
|
2017-08-23 22:55:55 +02:00
|
|
|
|
2020-06-30 17:04:10 +02:00
|
|
|
##
|
|
|
|
## Man page and info support
|
|
|
|
##
|
|
|
|
+ optionalString propagateDoc ''
|
2018-09-05 20:35:16 +02:00
|
|
|
ln -s ${cc.man} $man
|
|
|
|
ln -s ${cc.info} $info
|
2019-09-20 12:05:57 +02:00
|
|
|
'' + optionalString (cc.langD or false) ''
|
|
|
|
echo "-B${zlib}${zlib.libdir or "/lib/"}" >> $out/nix-support/libc-cflags
|
2014-10-10 13:49:26 +02:00
|
|
|
''
|
|
|
|
|
2020-06-30 17:04:10 +02:00
|
|
|
##
|
|
|
|
## Hardening support
|
|
|
|
##
|
2014-10-10 13:49:26 +02:00
|
|
|
+ ''
|
2017-09-16 23:54:17 +02:00
|
|
|
export hardening_unsupported_flags="${builtins.concatStringsSep " " (cc.hardeningUnsupportedFlags or [])}"
|
2017-06-20 20:04:24 +02:00
|
|
|
''
|
|
|
|
|
2019-04-09 20:21:54 +02:00
|
|
|
# Machine flags. These are necessary to support
|
2016-08-23 18:13:31 +02:00
|
|
|
|
2019-04-09 20:21:54 +02:00
|
|
|
# TODO: We should make a way to support miscellaneous machine
|
|
|
|
# flags and other gcc flags as well.
|
|
|
|
|
|
|
|
# Always add -march based on cpu in triple. Sometimes there is a
|
|
|
|
# discrepency (x86_64 vs. x86-64), so we provide an "arch" arg in
|
|
|
|
# that case.
|
2021-03-06 08:23:35 +01:00
|
|
|
# TODO: aarch64-darwin has mcpu incompatible with gcc
|
|
|
|
+ optionalString ((targetPlatform ? gcc.arch) && (isClang || !(stdenv.isDarwin && stdenv.isAarch64)) &&
|
2021-01-23 02:33:55 +01:00
|
|
|
isGccArchSupported targetPlatform.gcc.arch) ''
|
|
|
|
echo "-march=${targetPlatform.gcc.arch}" >> $out/nix-support/cc-cflags-before
|
2018-06-24 04:05:26 +02:00
|
|
|
''
|
|
|
|
|
2022-12-09 04:57:17 +01:00
|
|
|
# -mcpu is not very useful, except on PowerPC where it is used
|
|
|
|
# instead of march. On all other platforms you should use mtune
|
|
|
|
# and march instead.
|
2021-03-06 08:23:35 +01:00
|
|
|
# TODO: aarch64-darwin has mcpu incompatible with gcc
|
|
|
|
+ optionalString ((targetPlatform ? gcc.cpu) && (isClang || !(stdenv.isDarwin && stdenv.isAarch64))) ''
|
2021-01-23 02:33:55 +01:00
|
|
|
echo "-mcpu=${targetPlatform.gcc.cpu}" >> $out/nix-support/cc-cflags-before
|
2018-10-15 23:11:20 +02:00
|
|
|
''
|
|
|
|
|
2019-04-09 20:21:54 +02:00
|
|
|
# -mfloat-abi only matters on arm32 but we set it here
|
|
|
|
# unconditionally just in case. If the abi specifically sets hard
|
|
|
|
# vs. soft floats we use it here.
|
2021-01-23 02:33:55 +01:00
|
|
|
+ optionalString (targetPlatform ? gcc.float-abi) ''
|
|
|
|
echo "-mfloat-abi=${targetPlatform.gcc.float-abi}" >> $out/nix-support/cc-cflags-before
|
2019-04-09 20:21:54 +02:00
|
|
|
''
|
2021-01-23 02:33:55 +01:00
|
|
|
+ optionalString (targetPlatform ? gcc.fpu) ''
|
|
|
|
echo "-mfpu=${targetPlatform.gcc.fpu}" >> $out/nix-support/cc-cflags-before
|
2019-04-09 20:21:54 +02:00
|
|
|
''
|
2021-01-23 02:33:55 +01:00
|
|
|
+ optionalString (targetPlatform ? gcc.mode) ''
|
|
|
|
echo "-mmode=${targetPlatform.gcc.mode}" >> $out/nix-support/cc-cflags-before
|
2019-04-09 20:21:54 +02:00
|
|
|
''
|
2021-09-17 19:12:54 +02:00
|
|
|
+ optionalString (targetPlatform ? gcc.thumb) ''
|
|
|
|
echo "-m${if targetPlatform.gcc.thumb then "thumb" else "arm"}" >> $out/nix-support/cc-cflags-before
|
|
|
|
''
|
2021-01-23 02:33:55 +01:00
|
|
|
+ optionalString (targetPlatform ? gcc.tune &&
|
|
|
|
isGccArchSupported targetPlatform.gcc.tune) ''
|
|
|
|
echo "-mtune=${targetPlatform.gcc.tune}" >> $out/nix-support/cc-cflags-before
|
2018-07-28 18:29:02 +02:00
|
|
|
''
|
|
|
|
|
2019-04-09 20:21:54 +02:00
|
|
|
# TODO: categorize these and figure out a better place for them
|
|
|
|
+ optionalString hostPlatform.isCygwin ''
|
|
|
|
hardening_unsupported_flags+=" pic"
|
|
|
|
'' + optionalString targetPlatform.isMinGW ''
|
2021-08-11 11:07:42 +02:00
|
|
|
hardening_unsupported_flags+=" stackprotector fortify"
|
2019-04-09 20:21:54 +02:00
|
|
|
'' + optionalString targetPlatform.isAvr ''
|
|
|
|
hardening_unsupported_flags+=" stackprotector pic"
|
2022-07-20 10:38:08 +02:00
|
|
|
'' + optionalString (targetPlatform.libc == "newlib" || targetPlatform.libc == "newlib-nano") ''
|
2018-10-15 23:11:20 +02:00
|
|
|
hardening_unsupported_flags+=" stackprotector fortify pie pic"
|
2019-06-08 00:40:28 +02:00
|
|
|
'' + optionalString (targetPlatform.libc == "musl" && targetPlatform.isx86_32) ''
|
2019-06-07 10:07:18 +02:00
|
|
|
hardening_unsupported_flags+=" stackprotector"
|
2019-06-08 00:40:28 +02:00
|
|
|
'' + optionalString targetPlatform.isNetBSD ''
|
2019-04-09 20:21:54 +02:00
|
|
|
hardening_unsupported_flags+=" stackprotector fortify"
|
2019-05-11 23:16:17 +02:00
|
|
|
'' + optionalString cc.langAda or false ''
|
2020-12-23 01:42:11 +01:00
|
|
|
hardening_unsupported_flags+=" format stackprotector strictoverflow"
|
2019-09-20 12:05:57 +02:00
|
|
|
'' + optionalString cc.langD or false ''
|
|
|
|
hardening_unsupported_flags+=" format"
|
2022-05-26 12:14:43 +02:00
|
|
|
'' + optionalString cc.langFortran or false ''
|
|
|
|
hardening_unsupported_flags+=" format"
|
2019-09-20 12:05:57 +02:00
|
|
|
'' + optionalString targetPlatform.isWasm ''
|
2019-01-30 03:01:24 +01:00
|
|
|
hardening_unsupported_flags+=" stackprotector fortify pie pic"
|
2022-06-20 09:57:03 +02:00
|
|
|
'' + optionalString targetPlatform.isMicroBlaze ''
|
|
|
|
hardening_unsupported_flags+=" stackprotector"
|
2019-01-30 03:01:24 +01:00
|
|
|
''
|
|
|
|
|
2018-10-15 23:11:20 +02:00
|
|
|
+ optionalString (libc != null && targetPlatform.isAvr) ''
|
|
|
|
for isa in avr5 avr3 avr4 avr6 avr25 avr31 avr35 avr51 avrxmega2 avrxmega4 avrxmega5 avrxmega6 avrxmega7 tiny-stack; do
|
2020-07-01 22:55:06 +02:00
|
|
|
echo "-B${getLib libc}/avr/lib/$isa" >> $out/nix-support/libc-crt1-cflags
|
2018-10-15 23:11:20 +02:00
|
|
|
done
|
|
|
|
''
|
|
|
|
|
2021-04-10 06:11:28 +02:00
|
|
|
+ optionalString stdenv.targetPlatform.isDarwin ''
|
|
|
|
echo "-arch ${targetPlatform.darwinArch}" >> $out/nix-support/cc-cflags
|
2021-05-06 06:15:34 +02:00
|
|
|
''
|
|
|
|
|
|
|
|
+ optionalString targetPlatform.isAndroid ''
|
|
|
|
echo "-D__ANDROID_API__=${targetPlatform.sdkVer}" >> $out/nix-support/cc-cflags
|
2021-04-10 06:11:28 +02:00
|
|
|
''
|
|
|
|
|
2020-02-27 16:39:35 +01:00
|
|
|
# There are a few tools (to name one libstdcxx5) which do not work
|
|
|
|
# well with multi line flags, so make the flags single line again
|
2017-06-20 20:04:24 +02:00
|
|
|
+ ''
|
2020-06-30 20:26:37 +02:00
|
|
|
for flags in "$out/nix-support"/*flags*; do
|
2020-04-14 02:44:43 +02:00
|
|
|
substituteInPlace "$flags" --replace $'\n' ' '
|
|
|
|
done
|
2020-02-27 16:39:35 +01:00
|
|
|
|
2017-06-26 06:43:06 +02:00
|
|
|
substituteAll ${./add-flags.sh} $out/nix-support/add-flags.sh
|
|
|
|
substituteAll ${./add-hardening.sh} $out/nix-support/add-hardening.sh
|
2020-09-07 16:31:59 +02:00
|
|
|
substituteAll ${../wrapper-common/utils.bash} $out/nix-support/utils.bash
|
2015-07-20 13:42:30 +02:00
|
|
|
''
|
2018-02-01 01:00:00 +01:00
|
|
|
|
2023-01-06 03:29:46 +01:00
|
|
|
+ optionalString cc.langAda or false ''
|
|
|
|
substituteAll ${./add-gnat-extra-flags.sh} $out/nix-support/add-gnat-extra-flags.sh
|
|
|
|
''
|
|
|
|
|
2022-06-13 20:24:52 +02:00
|
|
|
##
|
|
|
|
## General Clang support
|
|
|
|
## Needs to go after ^ because the for loop eats \n and makes this file an invalid script
|
|
|
|
##
|
|
|
|
+ optionalString isClang ''
|
|
|
|
export defaultTarget=${targetPlatform.config}
|
|
|
|
substituteAll ${./add-clang-cc-cflags-before.sh} $out/nix-support/add-local-cc-cflags-before.sh
|
|
|
|
''
|
|
|
|
|
2020-06-30 17:04:10 +02:00
|
|
|
##
|
|
|
|
## Extra custom steps
|
|
|
|
##
|
2022-04-30 04:54:03 +02:00
|
|
|
+ extraBuildCommands
|
|
|
|
+ lib.strings.concatStringsSep "; "
|
|
|
|
(lib.attrsets.mapAttrsToList
|
|
|
|
(name: value: "echo ${toString value} >> $out/nix-support/${name}")
|
|
|
|
nixSupport);
|
2014-10-10 13:49:26 +02:00
|
|
|
|
2017-07-01 02:27:48 +02:00
|
|
|
|
2022-12-06 23:08:33 +01:00
|
|
|
env = {
|
|
|
|
# for substitution in utils.bash
|
|
|
|
expandResponseParams = "${expand-response-params}/bin/expand-response-params";
|
|
|
|
shell = getBin shell + shell.shellPath or "";
|
|
|
|
gnugrep_bin = if nativeTools then "" else gnugrep;
|
2023-02-18 19:44:44 +01:00
|
|
|
# stdenv.cc.cc should not be null and we have nothing better for now.
|
|
|
|
# if the native impure bootstrap is gotten rid of this can become `inherit cc;` again.
|
|
|
|
cc = if nativeTools then "" else cc;
|
2022-12-07 05:16:50 +01:00
|
|
|
wrapperName = "CC_WRAPPER";
|
2023-02-18 19:44:44 +01:00
|
|
|
inherit suffixSalt coreutils_bin bintools;
|
2022-12-07 05:16:50 +01:00
|
|
|
inherit libc_bin libc_dev libc_lib;
|
|
|
|
inherit darwinPlatformForCC darwinMinVersion darwinMinVersionVariable;
|
2022-12-06 23:08:33 +01:00
|
|
|
};
|
2010-12-04 22:45:37 +01:00
|
|
|
|
2009-03-25 19:34:27 +01:00
|
|
|
meta =
|
2015-01-09 20:22:12 +01:00
|
|
|
let cc_ = if cc != null then cc else {}; in
|
|
|
|
(if cc_ ? meta then removeAttrs cc.meta ["priority"] else {}) //
|
2009-04-19 18:00:46 +02:00
|
|
|
{ description =
|
2021-01-24 04:02:59 +01:00
|
|
|
lib.attrByPath ["meta" "description"] "System C compiler" cc_
|
2009-04-19 18:00:46 +02:00
|
|
|
+ " (wrapper script)";
|
2019-02-01 02:07:55 +01:00
|
|
|
priority = 10;
|
2017-07-18 05:36:17 +02:00
|
|
|
};
|
2008-06-26 13:07:46 +02:00
|
|
|
}
|