blob: c0489926561d373cbfce35a355e74faa3e24944d [file] [log] [blame]
Peter Korsgaard85dc57f2011-04-29 13:09:26 +02001/**
Arnout Vandecappellef6ae2432015-10-04 13:28:41 +01002 * Buildroot wrapper for toolchains. This simply executes the real toolchain
3 * with a number of arguments (sysroot/arch/..) hardcoded, to ensure the
4 * toolchain uses the correct configuration.
Arnout Vandecappellebefb9a32012-07-15 01:12:05 +00005 * The hardcoded path arguments are defined relative to the actual location
6 * of the binary.
Peter Korsgaard85dc57f2011-04-29 13:09:26 +02007 *
8 * (C) 2011 Peter Korsgaard <jacmet@sunsite.dk>
Daniel Nyströme8c46b12011-06-21 21:54:27 +02009 * (C) 2011 Daniel Nyström <daniel.nystrom@timeterminal.se>
Arnout Vandecappellebefb9a32012-07-15 01:12:05 +000010 * (C) 2012 Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
Spenser Gillilandaa86b522013-07-19 18:31:58 -050011 * (C) 2013 Spenser Gilliland <spenser@gillilanding.com>
Peter Korsgaard85dc57f2011-04-29 13:09:26 +020012 *
13 * This file is licensed under the terms of the GNU General Public License
14 * version 2. This program is licensed "as is" without any warranty of any
15 * kind, whether express or implied.
16 */
17
Thomas Petazzoni5aa205e2014-12-10 23:53:46 +010018#define _GNU_SOURCE
Peter Korsgaard85dc57f2011-04-29 13:09:26 +020019#include <stdio.h>
20#include <string.h>
21#include <limits.h>
22#include <unistd.h>
Daniel Nyströme8c46b12011-06-21 21:54:27 +020023#include <stdlib.h>
Thomas Petazzoni5aa205e2014-12-10 23:53:46 +010024#include <errno.h>
Peter Korsgaard85dc57f2011-04-29 13:09:26 +020025
Arnout Vandecappelled82f69c2015-10-04 16:23:56 +010026#ifdef BR_CCACHE
27static char ccache_path[PATH_MAX];
28#endif
Arnout Vandecappellebefb9a32012-07-15 01:12:05 +000029static char path[PATH_MAX];
30static char sysroot[PATH_MAX];
Peter Korsgaard85dc57f2011-04-29 13:09:26 +020031
Spenser Gillilandaa86b522013-07-19 18:31:58 -050032/**
33 * GCC errors out with certain combinations of arguments (examples are
Baruch Siach5c768422014-04-10 08:46:25 +030034 * -mfloat-abi={hard|soft} and -m{little|big}-endian), so we have to ensure
Spenser Gillilandaa86b522013-07-19 18:31:58 -050035 * that we only pass the predefined one to the real compiler if the inverse
36 * option isn't in the argument list.
37 * This specifies the worst case number of extra arguments we might pass
Yann E. MORIN2c1dc322014-01-07 23:46:05 +010038 * Currently, we have:
39 * -mfloat-abi=
40 * -march=
Yann E. MORIN2c1dc322014-01-07 23:46:05 +010041 * -mcpu=
Spenser Gillilandaa86b522013-07-19 18:31:58 -050042 */
Yann E. MORIN1c8c0d92017-02-20 18:16:31 +010043#define EXCLUSIVE_ARGS 3
Spenser Gillilandaa86b522013-07-19 18:31:58 -050044
Daniel Nyströme8c46b12011-06-21 21:54:27 +020045static char *predef_args[] = {
Arnout Vandecappelled82f69c2015-10-04 16:23:56 +010046#ifdef BR_CCACHE
47 ccache_path,
48#endif
Peter Korsgaard85dc57f2011-04-29 13:09:26 +020049 path,
Arnout Vandecappellebefb9a32012-07-15 01:12:05 +000050 "--sysroot", sysroot,
Peter Korsgaard85dc57f2011-04-29 13:09:26 +020051#ifdef BR_ABI
52 "-mabi=" BR_ABI,
53#endif
Spenser Gilliland27c93702013-07-19 18:31:57 -050054#ifdef BR_FPU
Thomas Petazzonid7745512013-07-16 10:03:12 +020055 "-mfpu=" BR_FPU,
56#endif
Peter Korsgaard85dc57f2011-04-29 13:09:26 +020057#ifdef BR_SOFTFLOAT
58 "-msoft-float",
59#endif /* BR_SOFTFLOAT */
Thomas Petazzoni85d07692013-07-16 10:03:22 +020060#ifdef BR_MODE
61 "-m" BR_MODE,
62#endif
Arnout Vandecappelle (Essensium/Mind)a22dc0f2012-03-13 23:30:00 +010063#ifdef BR_64
64 "-m64",
65#endif
Ray Kinsella968f5d52015-10-19 11:02:52 +000066#ifdef BR_OMIT_LOCK_PREFIX
67 "-Wa,-momit-lock-prefix=yes",
68#endif
Vicente Olivert Riera240564a2016-11-09 16:16:57 +000069#ifdef BR_NO_FUSED_MADD
70 "-mno-fused-madd",
71#endif
Sonic Zhang57133822013-05-03 00:39:34 +000072#ifdef BR_BINFMT_FLAT
73 "-Wl,-elf2flt",
74#endif
Markos Chandrasf3a2b802013-10-14 10:52:25 +010075#ifdef BR_MIPS_TARGET_LITTLE_ENDIAN
76 "-EL",
77#endif
Alexey Brodkin2b93fe52015-03-10 14:50:24 +030078#if defined(BR_MIPS_TARGET_BIG_ENDIAN) || defined(BR_ARC_TARGET_BIG_ENDIAN)
Markos Chandrasf3a2b802013-10-14 10:52:25 +010079 "-EB",
80#endif
Thomas Petazzonib95e4362011-12-31 12:09:33 +010081#ifdef BR_ADDITIONAL_CFLAGS
82 BR_ADDITIONAL_CFLAGS
83#endif
Peter Korsgaard85dc57f2011-04-29 13:09:26 +020084};
85
Yann E. MORIN31c093e2016-12-04 10:21:55 +010086/* A {string,length} tuple, to avoid computing strlen() on constants.
87 * - str must be a \0-terminated string
88 * - len does not account for the terminating '\0'
89 */
90struct str_len_s {
91 const char *str;
Yann E. MORIN61cb1202016-08-29 17:53:59 +020092 size_t len;
93};
94
Yann E. MORIN31c093e2016-12-04 10:21:55 +010095/* Define a {string,length} tuple. Takes an unquoted constant string as
96 * parameter. sizeof() on a string literal includes the terminating \0,
97 * but we don't want to count it.
98 */
99#define STR_LEN(s) { #s, sizeof(#s)-1 }
100
Yann E. MORIN3eccf762016-12-04 10:21:56 +0100101/* List of paths considered unsafe for cross-compilation.
102 *
103 * An unsafe path is one that points to a directory with libraries or
104 * headers for the build machine, which are not suitable for the target.
105 */
106static const struct str_len_s unsafe_paths[] = {
107 STR_LEN(/lib),
108 STR_LEN(/usr/include),
109 STR_LEN(/usr/lib),
110 STR_LEN(/usr/local/include),
111 STR_LEN(/usr/local/lib),
112 { NULL, 0 },
113};
114
Yann E. MORIN61cb1202016-08-29 17:53:59 +0200115/* Unsafe options are options that specify a potentialy unsafe path,
116 * that will be checked by check_unsafe_path(), below.
Yann E. MORIN61cb1202016-08-29 17:53:59 +0200117 */
Yann E. MORIN31c093e2016-12-04 10:21:55 +0100118static const struct str_len_s unsafe_opts[] = {
119 STR_LEN(-I),
120 STR_LEN(-idirafter),
121 STR_LEN(-iquote),
122 STR_LEN(-isystem),
123 STR_LEN(-L),
Yann E. MORIN61cb1202016-08-29 17:53:59 +0200124 { NULL, 0 },
125};
126
Yann E. MORIN105a8c12016-08-29 17:53:58 +0200127/* Check if path is unsafe for cross-compilation. Unsafe paths are those
128 * pointing to the standard native include or library paths.
129 *
130 * We print the arguments leading to the failure. For some options, gcc
131 * accepts the path to be concatenated to the argument (e.g. -I/foo/bar)
132 * or separated (e.g. -I /foo/bar). In the first case, we need only print
133 * the argument as it already contains the path (arg_has_path), while in
134 * the second case we need to print both (!arg_has_path).
135 *
136 * If paranoid, exit in error instead of just printing a warning.
137 */
138static void check_unsafe_path(const char *arg,
139 const char *path,
140 int paranoid,
141 int arg_has_path)
Thomas Petazzoni5aa205e2014-12-10 23:53:46 +0100142{
Yann E. MORIN3eccf762016-12-04 10:21:56 +0100143 const struct str_len_s *p;
Thomas Petazzoni5aa205e2014-12-10 23:53:46 +0100144
Yann E. MORIN3eccf762016-12-04 10:21:56 +0100145 for (p=unsafe_paths; p->str; p++) {
146 if (strncmp(path, p->str, p->len))
Thomas Petazzoni5aa205e2014-12-10 23:53:46 +0100147 continue;
Yann E. MORIN105a8c12016-08-29 17:53:58 +0200148 fprintf(stderr,
149 "%s: %s: unsafe header/library path used in cross-compilation: '%s%s%s'\n",
150 program_invocation_short_name,
151 paranoid ? "ERROR" : "WARNING",
152 arg,
153 arg_has_path ? "" : "' '", /* close single-quote, space, open single-quote */
154 arg_has_path ? "" : path); /* so that arg and path are properly quoted. */
155 if (paranoid)
156 exit(1);
Thomas Petazzoni5aa205e2014-12-10 23:53:46 +0100157 }
158}
159
Peter Korsgaard85dc57f2011-04-29 13:09:26 +0200160int main(int argc, char **argv)
161{
Arnout Vandecappelle792f1272015-10-04 13:28:56 +0100162 char **args, **cur, **exec_args;
Arnout Vandecappellebefb9a32012-07-15 01:12:05 +0000163 char *relbasedir, *absbasedir;
164 char *progpath = argv[0];
165 char *basename;
Yann E. MORIN60cb2902013-09-21 00:00:30 +0200166 char *env_debug;
Thomas Petazzoni5aa205e2014-12-10 23:53:46 +0100167 char *paranoid_wrapper;
168 int paranoid;
Yann E. MORIN60cb2902013-09-21 00:00:30 +0200169 int ret, i, count = 0, debug;
Arnout Vandecappellebefb9a32012-07-15 01:12:05 +0000170
171 /* Calculate the relative paths */
172 basename = strrchr(progpath, '/');
173 if (basename) {
174 *basename = '\0';
175 basename++;
176 relbasedir = malloc(strlen(progpath) + 7);
177 if (relbasedir == NULL) {
178 perror(__FILE__ ": malloc");
179 return 2;
180 }
Arnout Vandecappelle14151d72017-07-04 16:03:53 +0200181 sprintf(relbasedir, "%s/..", argv[0]);
Arnout Vandecappellebefb9a32012-07-15 01:12:05 +0000182 absbasedir = realpath(relbasedir, NULL);
183 } else {
184 basename = progpath;
Patrick Ziegler74ae7af2013-05-28 23:41:19 +0000185 absbasedir = malloc(PATH_MAX + 1);
186 ret = readlink("/proc/self/exe", absbasedir, PATH_MAX);
187 if (ret < 0) {
188 perror(__FILE__ ": readlink");
189 return 2;
190 }
191 absbasedir[ret] = '\0';
192 for (i = ret; i > 0; i--) {
193 if (absbasedir[i] == '/') {
194 absbasedir[i] = '\0';
Arnout Vandecappelle015d68c2017-07-07 09:43:30 +0200195 if (++count == 2)
Patrick Ziegler74ae7af2013-05-28 23:41:19 +0000196 break;
197 }
198 }
Arnout Vandecappellebefb9a32012-07-15 01:12:05 +0000199 }
200 if (absbasedir == NULL) {
201 perror(__FILE__ ": realpath");
202 return 2;
203 }
204
205 /* Fill in the relative paths */
206#ifdef BR_CROSS_PATH_REL
Arnout Vandecappelle5ce73dc2015-10-14 23:05:55 +0200207 ret = snprintf(path, sizeof(path), "%s/" BR_CROSS_PATH_REL "/%s" BR_CROSS_PATH_SUFFIX, absbasedir, basename);
Peter Korsgaardccdb1792015-10-05 08:25:17 +0200208#elif defined(BR_CROSS_PATH_ABS)
Arnout Vandecappelle5ce73dc2015-10-14 23:05:55 +0200209 ret = snprintf(path, sizeof(path), BR_CROSS_PATH_ABS "/%s" BR_CROSS_PATH_SUFFIX, basename);
210#else
Arnout Vandecappelle2a47bd32017-07-10 01:21:18 +0200211 ret = snprintf(path, sizeof(path), "%s/bin/%s" BR_CROSS_PATH_SUFFIX, absbasedir, basename);
Arnout Vandecappellebefb9a32012-07-15 01:12:05 +0000212#endif
213 if (ret >= sizeof(path)) {
214 perror(__FILE__ ": overflow");
215 return 3;
216 }
Arnout Vandecappelled82f69c2015-10-04 16:23:56 +0100217#ifdef BR_CCACHE
Arnout Vandecappelle2a47bd32017-07-10 01:21:18 +0200218 ret = snprintf(ccache_path, sizeof(ccache_path), "%s/bin/ccache", absbasedir);
Arnout Vandecappelled82f69c2015-10-04 16:23:56 +0100219 if (ret >= sizeof(ccache_path)) {
220 perror(__FILE__ ": overflow");
221 return 3;
222 }
223#endif
Arnout Vandecappellebefb9a32012-07-15 01:12:05 +0000224 ret = snprintf(sysroot, sizeof(sysroot), "%s/" BR_SYSROOT, absbasedir);
225 if (ret >= sizeof(sysroot)) {
226 perror(__FILE__ ": overflow");
227 return 3;
228 }
Peter Korsgaard85dc57f2011-04-29 13:09:26 +0200229
Spenser Gillilandaa86b522013-07-19 18:31:58 -0500230 cur = args = malloc(sizeof(predef_args) +
231 (sizeof(char *) * (argc + EXCLUSIVE_ARGS)));
Daniel Nyströme8c46b12011-06-21 21:54:27 +0200232 if (args == NULL) {
233 perror(__FILE__ ": malloc");
234 return 2;
Peter Korsgaard85dc57f2011-04-29 13:09:26 +0200235 }
236
Daniel Nyströme8c46b12011-06-21 21:54:27 +0200237 /* start with predefined args */
238 memcpy(cur, predef_args, sizeof(predef_args));
239 cur += sizeof(predef_args) / sizeof(predef_args[0]);
240
Spenser Gillilandaa86b522013-07-19 18:31:58 -0500241#ifdef BR_FLOAT_ABI
242 /* add float abi if not overridden in args */
243 for (i = 1; i < argc; i++) {
244 if (!strncmp(argv[i], "-mfloat-abi=", strlen("-mfloat-abi=")) ||
245 !strcmp(argv[i], "-msoft-float") ||
246 !strcmp(argv[i], "-mhard-float"))
247 break;
248 }
249
250 if (i == argc)
251 *cur++ = "-mfloat-abi=" BR_FLOAT_ABI;
252#endif
253
Yann E. MORIN2c1dc322014-01-07 23:46:05 +0100254#if defined(BR_ARCH) || \
Yann E. MORIN2c1dc322014-01-07 23:46:05 +0100255 defined(BR_CPU)
Thomas De Schampheleireb62cb782015-07-26 12:53:07 +0200256 /* Add our -march/cpu flags, but only if none of
257 * -march/mtune/mcpu are already specified on the commandline
Yann E. MORIN2c1dc322014-01-07 23:46:05 +0100258 */
259 for (i = 1; i < argc; i++) {
260 if (!strncmp(argv[i], "-march=", strlen("-march=")) ||
Thomas De Schampheleireb62cb782015-07-26 12:53:07 +0200261 !strncmp(argv[i], "-mtune=", strlen("-mtune=")) ||
Yann E. MORIN2c1dc322014-01-07 23:46:05 +0100262 !strncmp(argv[i], "-mcpu=", strlen("-mcpu=" )))
263 break;
264 }
265 if (i == argc) {
266#ifdef BR_ARCH
267 *cur++ = "-march=" BR_ARCH;
268#endif
Yann E. MORIN2c1dc322014-01-07 23:46:05 +0100269#ifdef BR_CPU
270 *cur++ = "-mcpu=" BR_CPU;
271#endif
272 }
Thomas Petazzoni5715d2d2014-10-21 22:27:16 +0200273#endif /* ARCH || CPU */
Yann E. MORIN2c1dc322014-01-07 23:46:05 +0100274
Thomas Petazzoni5aa205e2014-12-10 23:53:46 +0100275 paranoid_wrapper = getenv("BR_COMPILER_PARANOID_UNSAFE_PATH");
276 if (paranoid_wrapper && strlen(paranoid_wrapper) > 0)
277 paranoid = 1;
278 else
279 paranoid = 0;
280
281 /* Check for unsafe library and header paths */
282 for (i = 1; i < argc; i++) {
Yann E. MORIN31c093e2016-12-04 10:21:55 +0100283 const struct str_len_s *opt;
284 for (opt=unsafe_opts; opt->str; opt++ ) {
Yann E. MORIN61cb1202016-08-29 17:53:59 +0200285 /* Skip any non-unsafe option. */
Yann E. MORIN31c093e2016-12-04 10:21:55 +0100286 if (strncmp(argv[i], opt->str, opt->len))
Thomas Petazzoni5aa205e2014-12-10 23:53:46 +0100287 continue;
Yann E. MORIN61cb1202016-08-29 17:53:59 +0200288
289 /* Handle both cases:
290 * - path is a separate argument,
291 * - path is concatenated with option.
292 */
293 if (argv[i][opt->len] == '\0') {
294 i++;
295 if (i == argc)
296 break;
297 check_unsafe_path(argv[i-1], argv[i], paranoid, 0);
298 } else
299 check_unsafe_path(argv[i], argv[i] + opt->len, paranoid, 1);
Thomas Petazzoni5aa205e2014-12-10 23:53:46 +0100300 }
301 }
302
Daniel Nyströme8c46b12011-06-21 21:54:27 +0200303 /* append forward args */
304 memcpy(cur, &argv[1], sizeof(char *) * (argc - 1));
305 cur += argc - 1;
306
307 /* finish with NULL termination */
308 *cur = NULL;
Peter Korsgaard85dc57f2011-04-29 13:09:26 +0200309
Arnout Vandecappelle792f1272015-10-04 13:28:56 +0100310 exec_args = args;
311#ifdef BR_CCACHE
312 if (getenv("BR_NO_CCACHE"))
313 /* Skip the ccache call */
314 exec_args++;
315#endif
316
Yann E. MORIN60cb2902013-09-21 00:00:30 +0200317 /* Debug the wrapper to see actual arguments passed to
318 * the compiler:
319 * unset, empty, or 0: do not trace
320 * set to 1 : trace all arguments on a single line
321 * set to 2 : trace one argument per line
322 */
Yann E. MORIN35c666e2014-03-03 23:55:05 +0100323 if ((env_debug = getenv("BR2_DEBUG_WRAPPER"))) {
Yann E. MORIN60cb2902013-09-21 00:00:30 +0200324 debug = atoi(env_debug);
325 if (debug > 0) {
326 fprintf(stderr, "Toolchain wrapper executing:");
Arnout Vandecappellef4682cf2015-10-04 16:25:00 +0100327#ifdef BR_CCACHE_HASH
328 fprintf(stderr, "%sCCACHE_COMPILERCHECK='string:" BR_CCACHE_HASH "'",
329 (debug == 2) ? "\n " : " ");
330#endif
Arnout Vandecappelle1e97b272015-10-04 16:25:32 +0100331#ifdef BR_CCACHE_BASEDIR
332 fprintf(stderr, "%sCCACHE_BASEDIR='" BR_CCACHE_BASEDIR "'",
333 (debug == 2) ? "\n " : " ");
334#endif
Arnout Vandecappelle792f1272015-10-04 13:28:56 +0100335 for (i = 0; exec_args[i]; i++)
Yann E. MORIN60cb2902013-09-21 00:00:30 +0200336 fprintf(stderr, "%s'%s'",
Arnout Vandecappelle792f1272015-10-04 13:28:56 +0100337 (debug == 2) ? "\n " : " ", exec_args[i]);
Yann E. MORIN60cb2902013-09-21 00:00:30 +0200338 fprintf(stderr, "\n");
339 }
Yann E. MORINaaa06aa2013-07-18 23:54:50 +0200340 }
341
Arnout Vandecappellef4682cf2015-10-04 16:25:00 +0100342#ifdef BR_CCACHE_HASH
343 /* Allow compilercheck to be overridden through the environment */
344 if (setenv("CCACHE_COMPILERCHECK", "string:" BR_CCACHE_HASH, 0)) {
345 perror(__FILE__ ": Failed to set CCACHE_COMPILERCHECK");
346 return 3;
347 }
348#endif
Arnout Vandecappelle1e97b272015-10-04 16:25:32 +0100349#ifdef BR_CCACHE_BASEDIR
350 /* Allow compilercheck to be overridden through the environment */
351 if (setenv("CCACHE_BASEDIR", BR_CCACHE_BASEDIR, 0)) {
352 perror(__FILE__ ": Failed to set CCACHE_BASEDIR");
353 return 3;
354 }
355#endif
Arnout Vandecappellef4682cf2015-10-04 16:25:00 +0100356
Arnout Vandecappelle792f1272015-10-04 13:28:56 +0100357 if (execv(exec_args[0], exec_args))
Peter Korsgaard85dc57f2011-04-29 13:09:26 +0200358 perror(path);
359
Daniel Nyströme8c46b12011-06-21 21:54:27 +0200360 free(args);
361
Peter Korsgaard85dc57f2011-04-29 13:09:26 +0200362 return 2;
363}