blob: c73a0cc0792973f5280daa446b0aa7de16ffc767 [file] [log] [blame]
Peter Korsgaard85dc57f2011-04-29 13:09:26 +02001/**
Arnout Vandecappellef6ae2432015-10-04 13:28:41 +01002 * Buildroot wrapper for toolchains. This simply executes the real toolchain
3 * with a number of arguments (sysroot/arch/..) hardcoded, to ensure the
4 * toolchain uses the correct configuration.
Arnout Vandecappellebefb9a32012-07-15 01:12:05 +00005 * The hardcoded path arguments are defined relative to the actual location
6 * of the binary.
Peter Korsgaard85dc57f2011-04-29 13:09:26 +02007 *
8 * (C) 2011 Peter Korsgaard <jacmet@sunsite.dk>
Daniel Nyströme8c46b12011-06-21 21:54:27 +02009 * (C) 2011 Daniel Nyström <daniel.nystrom@timeterminal.se>
Arnout Vandecappellebefb9a32012-07-15 01:12:05 +000010 * (C) 2012 Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
Spenser Gillilandaa86b522013-07-19 18:31:58 -050011 * (C) 2013 Spenser Gilliland <spenser@gillilanding.com>
Peter Korsgaard85dc57f2011-04-29 13:09:26 +020012 *
13 * This file is licensed under the terms of the GNU General Public License
14 * version 2. This program is licensed "as is" without any warranty of any
15 * kind, whether express or implied.
16 */
17
Thomas Petazzoni5aa205e2014-12-10 23:53:46 +010018#define _GNU_SOURCE
Peter Korsgaard85dc57f2011-04-29 13:09:26 +020019#include <stdio.h>
20#include <string.h>
21#include <limits.h>
22#include <unistd.h>
Daniel Nyströme8c46b12011-06-21 21:54:27 +020023#include <stdlib.h>
Thomas Petazzoni5aa205e2014-12-10 23:53:46 +010024#include <errno.h>
Yann E. MORIN6393b692017-10-21 22:31:02 +020025#include <time.h>
26#include <stdbool.h>
Peter Korsgaard85dc57f2011-04-29 13:09:26 +020027
Arnout Vandecappelled82f69c2015-10-04 16:23:56 +010028#ifdef BR_CCACHE
29static char ccache_path[PATH_MAX];
30#endif
Arnout Vandecappellebefb9a32012-07-15 01:12:05 +000031static char path[PATH_MAX];
32static char sysroot[PATH_MAX];
Yann E. MORIN6393b692017-10-21 22:31:02 +020033/* As would be defined by gcc:
34 * https://gcc.gnu.org/onlinedocs/cpp/Standard-Predefined-Macros.html
35 * sizeof() on string literals includes the terminating \0. */
36static char _time_[sizeof("-D__TIME__=\"HH:MM:SS\"")];
37static char _date_[sizeof("-D__DATE__=\"MMM DD YYYY\"")];
Peter Korsgaard85dc57f2011-04-29 13:09:26 +020038
Spenser Gillilandaa86b522013-07-19 18:31:58 -050039/**
40 * GCC errors out with certain combinations of arguments (examples are
Baruch Siach5c768422014-04-10 08:46:25 +030041 * -mfloat-abi={hard|soft} and -m{little|big}-endian), so we have to ensure
Spenser Gillilandaa86b522013-07-19 18:31:58 -050042 * that we only pass the predefined one to the real compiler if the inverse
43 * option isn't in the argument list.
44 * This specifies the worst case number of extra arguments we might pass
Yann E. MORIN6393b692017-10-21 22:31:02 +020045 * Currently, we may have:
Yann E. MORIN2c1dc322014-01-07 23:46:05 +010046 * -mfloat-abi=
47 * -march=
Yann E. MORIN2c1dc322014-01-07 23:46:05 +010048 * -mcpu=
Yann E. MORIN6393b692017-10-21 22:31:02 +020049 * -D__TIME__=
50 * -D__DATE__=
51 * -Wno-builtin-macro-redefined
Matt Weber7484c1c2018-09-17 16:21:49 -050052 * -Wl,-z,now
53 * -Wl,-z,relro
54 * -fPIE
55 * -pie
Spenser Gillilandaa86b522013-07-19 18:31:58 -050056 */
Matt Weber7484c1c2018-09-17 16:21:49 -050057#define EXCLUSIVE_ARGS 10
Spenser Gillilandaa86b522013-07-19 18:31:58 -050058
Daniel Nyströme8c46b12011-06-21 21:54:27 +020059static char *predef_args[] = {
Arnout Vandecappelled82f69c2015-10-04 16:23:56 +010060#ifdef BR_CCACHE
61 ccache_path,
62#endif
Peter Korsgaard85dc57f2011-04-29 13:09:26 +020063 path,
Arnout Vandecappellebefb9a32012-07-15 01:12:05 +000064 "--sysroot", sysroot,
Peter Korsgaard85dc57f2011-04-29 13:09:26 +020065#ifdef BR_ABI
66 "-mabi=" BR_ABI,
67#endif
Vicente Olivert Riera2d8f3fc2017-06-28 16:17:10 +010068#ifdef BR_NAN
69 "-mnan=" BR_NAN,
70#endif
Spenser Gilliland27c93702013-07-19 18:31:57 -050071#ifdef BR_FPU
Thomas Petazzonid7745512013-07-16 10:03:12 +020072 "-mfpu=" BR_FPU,
73#endif
Peter Korsgaard85dc57f2011-04-29 13:09:26 +020074#ifdef BR_SOFTFLOAT
75 "-msoft-float",
76#endif /* BR_SOFTFLOAT */
Thomas Petazzoni85d07692013-07-16 10:03:22 +020077#ifdef BR_MODE
78 "-m" BR_MODE,
79#endif
Arnout Vandecappelle (Essensium/Mind)a22dc0f2012-03-13 23:30:00 +010080#ifdef BR_64
81 "-m64",
82#endif
Ray Kinsella968f5d52015-10-19 11:02:52 +000083#ifdef BR_OMIT_LOCK_PREFIX
84 "-Wa,-momit-lock-prefix=yes",
85#endif
Vicente Olivert Riera240564a2016-11-09 16:16:57 +000086#ifdef BR_NO_FUSED_MADD
87 "-mno-fused-madd",
88#endif
Waldemar Brodkorb5e585092018-03-31 19:54:20 +020089#ifdef BR_FP_CONTRACT_OFF
90 "-ffp-contract=off",
91#endif
Sonic Zhang57133822013-05-03 00:39:34 +000092#ifdef BR_BINFMT_FLAT
93 "-Wl,-elf2flt",
94#endif
Markos Chandrasf3a2b802013-10-14 10:52:25 +010095#ifdef BR_MIPS_TARGET_LITTLE_ENDIAN
96 "-EL",
97#endif
Alexey Brodkin2b93fe52015-03-10 14:50:24 +030098#if defined(BR_MIPS_TARGET_BIG_ENDIAN) || defined(BR_ARC_TARGET_BIG_ENDIAN)
Markos Chandrasf3a2b802013-10-14 10:52:25 +010099 "-EB",
100#endif
Thomas Petazzonib95e4362011-12-31 12:09:33 +0100101#ifdef BR_ADDITIONAL_CFLAGS
102 BR_ADDITIONAL_CFLAGS
103#endif
Peter Korsgaard85dc57f2011-04-29 13:09:26 +0200104};
105
Yann E. MORIN31c093e2016-12-04 10:21:55 +0100106/* A {string,length} tuple, to avoid computing strlen() on constants.
107 * - str must be a \0-terminated string
108 * - len does not account for the terminating '\0'
109 */
110struct str_len_s {
111 const char *str;
Yann E. MORIN61cb1202016-08-29 17:53:59 +0200112 size_t len;
113};
114
Yann E. MORIN31c093e2016-12-04 10:21:55 +0100115/* Define a {string,length} tuple. Takes an unquoted constant string as
116 * parameter. sizeof() on a string literal includes the terminating \0,
117 * but we don't want to count it.
118 */
119#define STR_LEN(s) { #s, sizeof(#s)-1 }
120
Yann E. MORIN3eccf762016-12-04 10:21:56 +0100121/* List of paths considered unsafe for cross-compilation.
122 *
123 * An unsafe path is one that points to a directory with libraries or
124 * headers for the build machine, which are not suitable for the target.
125 */
126static const struct str_len_s unsafe_paths[] = {
127 STR_LEN(/lib),
128 STR_LEN(/usr/include),
129 STR_LEN(/usr/lib),
130 STR_LEN(/usr/local/include),
131 STR_LEN(/usr/local/lib),
132 { NULL, 0 },
133};
134
Yann E. MORIN61cb1202016-08-29 17:53:59 +0200135/* Unsafe options are options that specify a potentialy unsafe path,
136 * that will be checked by check_unsafe_path(), below.
Yann E. MORIN61cb1202016-08-29 17:53:59 +0200137 */
Yann E. MORIN31c093e2016-12-04 10:21:55 +0100138static const struct str_len_s unsafe_opts[] = {
139 STR_LEN(-I),
140 STR_LEN(-idirafter),
141 STR_LEN(-iquote),
142 STR_LEN(-isystem),
143 STR_LEN(-L),
Yann E. MORIN61cb1202016-08-29 17:53:59 +0200144 { NULL, 0 },
145};
146
Yann E. MORIN105a8c12016-08-29 17:53:58 +0200147/* Check if path is unsafe for cross-compilation. Unsafe paths are those
148 * pointing to the standard native include or library paths.
149 *
150 * We print the arguments leading to the failure. For some options, gcc
151 * accepts the path to be concatenated to the argument (e.g. -I/foo/bar)
152 * or separated (e.g. -I /foo/bar). In the first case, we need only print
153 * the argument as it already contains the path (arg_has_path), while in
154 * the second case we need to print both (!arg_has_path).
155 *
156 * If paranoid, exit in error instead of just printing a warning.
157 */
158static void check_unsafe_path(const char *arg,
159 const char *path,
160 int paranoid,
161 int arg_has_path)
Thomas Petazzoni5aa205e2014-12-10 23:53:46 +0100162{
Yann E. MORIN3eccf762016-12-04 10:21:56 +0100163 const struct str_len_s *p;
Thomas Petazzoni5aa205e2014-12-10 23:53:46 +0100164
Yann E. MORIN3eccf762016-12-04 10:21:56 +0100165 for (p=unsafe_paths; p->str; p++) {
166 if (strncmp(path, p->str, p->len))
Thomas Petazzoni5aa205e2014-12-10 23:53:46 +0100167 continue;
Yann E. MORIN105a8c12016-08-29 17:53:58 +0200168 fprintf(stderr,
169 "%s: %s: unsafe header/library path used in cross-compilation: '%s%s%s'\n",
170 program_invocation_short_name,
171 paranoid ? "ERROR" : "WARNING",
172 arg,
173 arg_has_path ? "" : "' '", /* close single-quote, space, open single-quote */
174 arg_has_path ? "" : path); /* so that arg and path are properly quoted. */
175 if (paranoid)
176 exit(1);
Thomas Petazzoni5aa205e2014-12-10 23:53:46 +0100177 }
178}
179
Yann E. MORIN6393b692017-10-21 22:31:02 +0200180/* Returns false if SOURCE_DATE_EPOCH was not defined in the environment.
181 *
182 * Returns true if SOURCE_DATE_EPOCH is in the environment and represent
183 * a valid timestamp, in which case the timestamp is formatted into the
184 * global variables _date_ and _time_.
185 *
186 * Aborts if SOURCE_DATE_EPOCH was set in the environment but did not
187 * contain a valid timestamp.
188 *
189 * Valid values are defined in the spec:
190 * https://reproducible-builds.org/specs/source-date-epoch/
191 * but we further restrict them to be positive or null.
192 */
193bool parse_source_date_epoch_from_env(void)
194{
195 char *epoch_env, *endptr;
196 time_t epoch;
197 struct tm epoch_tm;
198
199 if ((epoch_env = getenv("SOURCE_DATE_EPOCH")) == NULL)
200 return false;
201 errno = 0;
202 epoch = (time_t) strtoll(epoch_env, &endptr, 10);
203 /* We just need to test if it is incorrect, but we do not
204 * care why it is incorrect.
205 */
206 if ((errno != 0) || !*epoch_env || *endptr || (epoch < 0)) {
207 fprintf(stderr, "%s: invalid SOURCE_DATE_EPOCH='%s'\n",
208 program_invocation_short_name,
209 epoch_env);
210 exit(1);
211 }
212 tzset(); /* For localtime_r(), below. */
213 if (localtime_r(&epoch, &epoch_tm) == NULL) {
214 fprintf(stderr, "%s: cannot parse SOURCE_DATE_EPOCH=%s\n",
215 program_invocation_short_name,
216 getenv("SOURCE_DATE_EPOCH"));
217 exit(1);
218 }
219 if (!strftime(_time_, sizeof(_time_), "-D__TIME__=\"%T\"", &epoch_tm)) {
220 fprintf(stderr, "%s: cannot set time from SOURCE_DATE_EPOCH=%s\n",
221 program_invocation_short_name,
222 getenv("SOURCE_DATE_EPOCH"));
223 exit(1);
224 }
225 if (!strftime(_date_, sizeof(_date_), "-D__DATE__=\"%b %e %Y\"", &epoch_tm)) {
226 fprintf(stderr, "%s: cannot set date from SOURCE_DATE_EPOCH=%s\n",
227 program_invocation_short_name,
228 getenv("SOURCE_DATE_EPOCH"));
229 exit(1);
230 }
231 return true;
232}
233
Peter Korsgaard85dc57f2011-04-29 13:09:26 +0200234int main(int argc, char **argv)
235{
Arnout Vandecappelle792f1272015-10-04 13:28:56 +0100236 char **args, **cur, **exec_args;
Arnout Vandecappellebefb9a32012-07-15 01:12:05 +0000237 char *relbasedir, *absbasedir;
238 char *progpath = argv[0];
239 char *basename;
Yann E. MORIN60cb2902013-09-21 00:00:30 +0200240 char *env_debug;
Thomas Petazzoni5aa205e2014-12-10 23:53:46 +0100241 char *paranoid_wrapper;
242 int paranoid;
Matt Weber7484c1c2018-09-17 16:21:49 -0500243 int ret, i, count = 0, debug, found_shared = 0;
Arnout Vandecappellebefb9a32012-07-15 01:12:05 +0000244
245 /* Calculate the relative paths */
246 basename = strrchr(progpath, '/');
247 if (basename) {
248 *basename = '\0';
249 basename++;
250 relbasedir = malloc(strlen(progpath) + 7);
251 if (relbasedir == NULL) {
252 perror(__FILE__ ": malloc");
253 return 2;
254 }
Arnout Vandecappelle14151d72017-07-04 16:03:53 +0200255 sprintf(relbasedir, "%s/..", argv[0]);
Arnout Vandecappellebefb9a32012-07-15 01:12:05 +0000256 absbasedir = realpath(relbasedir, NULL);
257 } else {
258 basename = progpath;
Patrick Ziegler74ae7af2013-05-28 23:41:19 +0000259 absbasedir = malloc(PATH_MAX + 1);
260 ret = readlink("/proc/self/exe", absbasedir, PATH_MAX);
261 if (ret < 0) {
262 perror(__FILE__ ": readlink");
263 return 2;
264 }
265 absbasedir[ret] = '\0';
266 for (i = ret; i > 0; i--) {
267 if (absbasedir[i] == '/') {
268 absbasedir[i] = '\0';
Arnout Vandecappelle015d68c2017-07-07 09:43:30 +0200269 if (++count == 2)
Patrick Ziegler74ae7af2013-05-28 23:41:19 +0000270 break;
271 }
272 }
Arnout Vandecappellebefb9a32012-07-15 01:12:05 +0000273 }
274 if (absbasedir == NULL) {
275 perror(__FILE__ ": realpath");
276 return 2;
277 }
278
279 /* Fill in the relative paths */
280#ifdef BR_CROSS_PATH_REL
Arnout Vandecappelle5ce73dc2015-10-14 23:05:55 +0200281 ret = snprintf(path, sizeof(path), "%s/" BR_CROSS_PATH_REL "/%s" BR_CROSS_PATH_SUFFIX, absbasedir, basename);
Peter Korsgaardccdb1792015-10-05 08:25:17 +0200282#elif defined(BR_CROSS_PATH_ABS)
Arnout Vandecappelle5ce73dc2015-10-14 23:05:55 +0200283 ret = snprintf(path, sizeof(path), BR_CROSS_PATH_ABS "/%s" BR_CROSS_PATH_SUFFIX, basename);
284#else
Arnout Vandecappelle2a47bd32017-07-10 01:21:18 +0200285 ret = snprintf(path, sizeof(path), "%s/bin/%s" BR_CROSS_PATH_SUFFIX, absbasedir, basename);
Arnout Vandecappellebefb9a32012-07-15 01:12:05 +0000286#endif
287 if (ret >= sizeof(path)) {
288 perror(__FILE__ ": overflow");
289 return 3;
290 }
Arnout Vandecappelled82f69c2015-10-04 16:23:56 +0100291#ifdef BR_CCACHE
Arnout Vandecappelle2a47bd32017-07-10 01:21:18 +0200292 ret = snprintf(ccache_path, sizeof(ccache_path), "%s/bin/ccache", absbasedir);
Arnout Vandecappelled82f69c2015-10-04 16:23:56 +0100293 if (ret >= sizeof(ccache_path)) {
294 perror(__FILE__ ": overflow");
295 return 3;
296 }
297#endif
Arnout Vandecappellebefb9a32012-07-15 01:12:05 +0000298 ret = snprintf(sysroot, sizeof(sysroot), "%s/" BR_SYSROOT, absbasedir);
299 if (ret >= sizeof(sysroot)) {
300 perror(__FILE__ ": overflow");
301 return 3;
302 }
Peter Korsgaard85dc57f2011-04-29 13:09:26 +0200303
Spenser Gillilandaa86b522013-07-19 18:31:58 -0500304 cur = args = malloc(sizeof(predef_args) +
305 (sizeof(char *) * (argc + EXCLUSIVE_ARGS)));
Daniel Nyströme8c46b12011-06-21 21:54:27 +0200306 if (args == NULL) {
307 perror(__FILE__ ": malloc");
308 return 2;
Peter Korsgaard85dc57f2011-04-29 13:09:26 +0200309 }
310
Daniel Nyströme8c46b12011-06-21 21:54:27 +0200311 /* start with predefined args */
312 memcpy(cur, predef_args, sizeof(predef_args));
313 cur += sizeof(predef_args) / sizeof(predef_args[0]);
314
Spenser Gillilandaa86b522013-07-19 18:31:58 -0500315#ifdef BR_FLOAT_ABI
316 /* add float abi if not overridden in args */
317 for (i = 1; i < argc; i++) {
318 if (!strncmp(argv[i], "-mfloat-abi=", strlen("-mfloat-abi=")) ||
319 !strcmp(argv[i], "-msoft-float") ||
320 !strcmp(argv[i], "-mhard-float"))
321 break;
322 }
323
324 if (i == argc)
325 *cur++ = "-mfloat-abi=" BR_FLOAT_ABI;
326#endif
327
Vicente Olivert Riera9a0a0a92017-06-28 16:17:11 +0100328#ifdef BR_FP32_MODE
329 /* add fp32 mode if soft-float is not args or hard-float overrides soft-float */
330 int add_fp32_mode = 1;
331 for (i = 1; i < argc; i++) {
332 if (!strcmp(argv[i], "-msoft-float"))
333 add_fp32_mode = 0;
334 else if (!strcmp(argv[i], "-mhard-float"))
335 add_fp32_mode = 1;
336 }
337
338 if (add_fp32_mode == 1)
339 *cur++ = "-mfp" BR_FP32_MODE;
340#endif
341
Yann E. MORIN2c1dc322014-01-07 23:46:05 +0100342#if defined(BR_ARCH) || \
Yann E. MORIN2c1dc322014-01-07 23:46:05 +0100343 defined(BR_CPU)
Thomas De Schampheleireb62cb782015-07-26 12:53:07 +0200344 /* Add our -march/cpu flags, but only if none of
345 * -march/mtune/mcpu are already specified on the commandline
Yann E. MORIN2c1dc322014-01-07 23:46:05 +0100346 */
347 for (i = 1; i < argc; i++) {
348 if (!strncmp(argv[i], "-march=", strlen("-march=")) ||
Thomas De Schampheleireb62cb782015-07-26 12:53:07 +0200349 !strncmp(argv[i], "-mtune=", strlen("-mtune=")) ||
Yann E. MORIN2c1dc322014-01-07 23:46:05 +0100350 !strncmp(argv[i], "-mcpu=", strlen("-mcpu=" )))
351 break;
352 }
353 if (i == argc) {
354#ifdef BR_ARCH
355 *cur++ = "-march=" BR_ARCH;
356#endif
Yann E. MORIN2c1dc322014-01-07 23:46:05 +0100357#ifdef BR_CPU
358 *cur++ = "-mcpu=" BR_CPU;
359#endif
360 }
Thomas Petazzoni5715d2d2014-10-21 22:27:16 +0200361#endif /* ARCH || CPU */
Yann E. MORIN2c1dc322014-01-07 23:46:05 +0100362
Yann E. MORIN6393b692017-10-21 22:31:02 +0200363 if (parse_source_date_epoch_from_env()) {
364 *cur++ = _time_;
365 *cur++ = _date_;
366 /* This has existed since gcc-4.4.0. */
367 *cur++ = "-Wno-builtin-macro-redefined";
368 }
369
Matt Weber7484c1c2018-09-17 16:21:49 -0500370#ifdef BR2_RELRO_FULL
371 /* Patterned after Fedora/Gentoo hardening approaches.
372 * https://fedoraproject.org/wiki/Changes/Harden_All_Packages
373 * https://wiki.gentoo.org/wiki/Hardened/Toolchain#Position_Independent_Executables_.28PIEs.29
374 *
375 * A few checks are added to allow disabling of PIE
376 * 1) -fno-pie and -no-pie are used by other distros to disable PIE in
377 * cases where the compiler enables it by default. The logic below
378 * maintains that behavior.
379 * Ref: https://wiki.ubuntu.com/SecurityTeam/PIE
380 * 2) A check for -fno-PIE has been used in older Linux Kernel builds
381 * in a similar way to -fno-pie or -no-pie.
382 * 3) A check is added for Kernel and U-boot defines
383 * (-D__KERNEL__ and -D__UBOOT__).
384 */
385 for (i = 1; i < argc; i++) {
386 /* Apply all incompatible link flag and disable checks first */
387 if (!strcmp(argv[i], "-r") ||
388 !strcmp(argv[i], "-Wl,-r") ||
389 !strcmp(argv[i], "-static") ||
390 !strcmp(argv[i], "-D__KERNEL__") ||
391 !strcmp(argv[i], "-D__UBOOT__") ||
392 !strcmp(argv[i], "-fno-pie") ||
393 !strcmp(argv[i], "-fno-PIE") ||
394 !strcmp(argv[i], "-no-pie"))
395 break;
396 /* Record that shared was present which disables -pie but don't
397 * break out of loop as a check needs to occur that possibly
398 * still allows -fPIE to be set
399 */
400 if (!strcmp(argv[i], "-shared"))
401 found_shared = 1;
402 }
403
404 if (i == argc) {
405 /* Compile and link condition checking have been kept split
406 * between these two loops, as there maybe already are valid
407 * compile flags set for position independence. In that case
408 * the wrapper just adds the -pie for link.
409 */
410 for (i = 1; i < argc; i++) {
411 if (!strcmp(argv[i], "-fpie") ||
412 !strcmp(argv[i], "-fPIE") ||
413 !strcmp(argv[i], "-fpic") ||
414 !strcmp(argv[i], "-fPIC"))
415 break;
416 }
417 /* Both args below can be set at compile/link time
418 * and are ignored correctly when not used
419 */
420 if(i == argc)
421 *cur++ = "-fPIE";
422
423 if (!found_shared)
424 *cur++ = "-pie";
425 }
426#endif
427 /* Are we building the Linux Kernel or U-Boot? */
428 for (i = 1; i < argc; i++) {
429 if (!strcmp(argv[i], "-D__KERNEL__") ||
430 !strcmp(argv[i], "-D__UBOOT__"))
431 break;
432 }
433 if (i == argc) {
434 /* https://wiki.gentoo.org/wiki/Hardened/Toolchain#Mark_Read-Only_Appropriate_Sections */
435#ifdef BR2_RELRO_PARTIAL
436 *cur++ = "-Wl,-z,relro";
437#endif
438#ifdef BR2_RELRO_FULL
439 *cur++ = "-Wl,-z,now";
440 *cur++ = "-Wl,-z,relro";
441#endif
442 }
443
Thomas Petazzoni5aa205e2014-12-10 23:53:46 +0100444 paranoid_wrapper = getenv("BR_COMPILER_PARANOID_UNSAFE_PATH");
445 if (paranoid_wrapper && strlen(paranoid_wrapper) > 0)
446 paranoid = 1;
447 else
448 paranoid = 0;
449
450 /* Check for unsafe library and header paths */
451 for (i = 1; i < argc; i++) {
Yann E. MORIN31c093e2016-12-04 10:21:55 +0100452 const struct str_len_s *opt;
453 for (opt=unsafe_opts; opt->str; opt++ ) {
Yann E. MORIN61cb1202016-08-29 17:53:59 +0200454 /* Skip any non-unsafe option. */
Yann E. MORIN31c093e2016-12-04 10:21:55 +0100455 if (strncmp(argv[i], opt->str, opt->len))
Thomas Petazzoni5aa205e2014-12-10 23:53:46 +0100456 continue;
Yann E. MORIN61cb1202016-08-29 17:53:59 +0200457
458 /* Handle both cases:
459 * - path is a separate argument,
460 * - path is concatenated with option.
461 */
462 if (argv[i][opt->len] == '\0') {
463 i++;
464 if (i == argc)
465 break;
466 check_unsafe_path(argv[i-1], argv[i], paranoid, 0);
467 } else
468 check_unsafe_path(argv[i], argv[i] + opt->len, paranoid, 1);
Thomas Petazzoni5aa205e2014-12-10 23:53:46 +0100469 }
470 }
471
Daniel Nyströme8c46b12011-06-21 21:54:27 +0200472 /* append forward args */
473 memcpy(cur, &argv[1], sizeof(char *) * (argc - 1));
474 cur += argc - 1;
475
476 /* finish with NULL termination */
477 *cur = NULL;
Peter Korsgaard85dc57f2011-04-29 13:09:26 +0200478
Arnout Vandecappelle792f1272015-10-04 13:28:56 +0100479 exec_args = args;
480#ifdef BR_CCACHE
481 if (getenv("BR_NO_CCACHE"))
482 /* Skip the ccache call */
483 exec_args++;
484#endif
485
Yann E. MORIN60cb2902013-09-21 00:00:30 +0200486 /* Debug the wrapper to see actual arguments passed to
487 * the compiler:
488 * unset, empty, or 0: do not trace
489 * set to 1 : trace all arguments on a single line
490 * set to 2 : trace one argument per line
491 */
Yann E. MORIN35c666e2014-03-03 23:55:05 +0100492 if ((env_debug = getenv("BR2_DEBUG_WRAPPER"))) {
Yann E. MORIN60cb2902013-09-21 00:00:30 +0200493 debug = atoi(env_debug);
494 if (debug > 0) {
495 fprintf(stderr, "Toolchain wrapper executing:");
Arnout Vandecappellef4682cf2015-10-04 16:25:00 +0100496#ifdef BR_CCACHE_HASH
497 fprintf(stderr, "%sCCACHE_COMPILERCHECK='string:" BR_CCACHE_HASH "'",
498 (debug == 2) ? "\n " : " ");
499#endif
Arnout Vandecappelle1e97b272015-10-04 16:25:32 +0100500#ifdef BR_CCACHE_BASEDIR
501 fprintf(stderr, "%sCCACHE_BASEDIR='" BR_CCACHE_BASEDIR "'",
502 (debug == 2) ? "\n " : " ");
503#endif
Arnout Vandecappelle792f1272015-10-04 13:28:56 +0100504 for (i = 0; exec_args[i]; i++)
Yann E. MORIN60cb2902013-09-21 00:00:30 +0200505 fprintf(stderr, "%s'%s'",
Arnout Vandecappelle792f1272015-10-04 13:28:56 +0100506 (debug == 2) ? "\n " : " ", exec_args[i]);
Yann E. MORIN60cb2902013-09-21 00:00:30 +0200507 fprintf(stderr, "\n");
508 }
Yann E. MORINaaa06aa2013-07-18 23:54:50 +0200509 }
510
Arnout Vandecappellef4682cf2015-10-04 16:25:00 +0100511#ifdef BR_CCACHE_HASH
512 /* Allow compilercheck to be overridden through the environment */
513 if (setenv("CCACHE_COMPILERCHECK", "string:" BR_CCACHE_HASH, 0)) {
514 perror(__FILE__ ": Failed to set CCACHE_COMPILERCHECK");
515 return 3;
516 }
517#endif
Arnout Vandecappelle1e97b272015-10-04 16:25:32 +0100518#ifdef BR_CCACHE_BASEDIR
519 /* Allow compilercheck to be overridden through the environment */
520 if (setenv("CCACHE_BASEDIR", BR_CCACHE_BASEDIR, 0)) {
521 perror(__FILE__ ": Failed to set CCACHE_BASEDIR");
522 return 3;
523 }
524#endif
Arnout Vandecappellef4682cf2015-10-04 16:25:00 +0100525
Arnout Vandecappelle792f1272015-10-04 13:28:56 +0100526 if (execv(exec_args[0], exec_args))
Peter Korsgaard85dc57f2011-04-29 13:09:26 +0200527 perror(path);
528
Daniel Nyströme8c46b12011-06-21 21:54:27 +0200529 free(args);
530
Peter Korsgaard85dc57f2011-04-29 13:09:26 +0200531 return 2;
532}