mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-17 07:13:23 +01:00
55e6303d6a
Some packages in the llvm suite (e.g. compiler-rt) cannot be built separate from the build of llvm, and while some others (e.g. clang) can the combined build is much better tested (we've had to work around annoying issues before). So this puts llvm, clang, clang-tools-extra, compiler-rt, lld, lldb, and polly all into one big build (llvmFull). This build includes a static llvm, as dynamic is similarly less tested and has known failures. This also updates libc++ and dragonegg. libc++ now builds against libc++abi as a separate package rather than building it during the libc++ build. The clang purity patch is gone. Instead, we simply set --sysroot to /var/empty for pure builds, as all impure paths are either looked up in the gcc prefix (which we hard-code at compile time) or in the sysroot. This also means that if NIX_ENFORCE_PURITY is 0 then clang will look in the normal Linux paths by default, which is the proper behavior IMO. polly required an updated isl. When stdenv-updates is merged, perhaps we can update the isl used by gcc and avoid having two versions. Since llvm on its own is now separate from the llvm used by clang, I've removed myself as maintainer from llvm and will leave maintenance of that to those who are interested in llvm separate from clang. Signed-off-by: Shea Levy <shea@shealevy.com>
164 lines
4.5 KiB
Bash
164 lines
4.5 KiB
Bash
#! @shell@ -e
|
|
|
|
if test -n "$NIX_LD_WRAPPER_START_HOOK"; then
|
|
source "$NIX_LD_WRAPPER_START_HOOK"
|
|
fi
|
|
|
|
if test -z "$NIX_CLANG_WRAPPER_FLAGS_SET"; then
|
|
source @out@/nix-support/add-flags.sh
|
|
fi
|
|
|
|
source @out@/nix-support/utils.sh
|
|
|
|
|
|
# Optionally filter out paths not refering to the store.
|
|
params=("$@")
|
|
if test "$NIX_ENFORCE_PURITY" = "1" -a -n "$NIX_STORE" \
|
|
-a \( -z "$NIX_IGNORE_LD_THROUGH_CLANG" -o -z "$NIX_LDFLAGS_SET" \); then
|
|
rest=()
|
|
n=0
|
|
while test $n -lt ${#params[*]}; do
|
|
p=${params[n]}
|
|
p2=${params[$((n+1))]}
|
|
if test "${p:0:3}" = "-L/" && badPath "${p:2}"; then
|
|
skip $p
|
|
elif test "$p" = "-L" && badPath "$p2"; then
|
|
n=$((n + 1)); skip $p2
|
|
elif test "$p" = "-rpath" && badPath "$p2"; then
|
|
n=$((n + 1)); skip $p2
|
|
elif test "$p" = "-dynamic-linker" && badPath "$p2"; then
|
|
n=$((n + 1)); skip $p2
|
|
elif test "${p:0:1}" = "/" && badPath "$p"; then
|
|
# We cannot skip this; barf.
|
|
echo "impure path \`$p' used in link" >&2
|
|
exit 1
|
|
elif test "${p:0:9}" = "--sysroot"; then
|
|
# Our ld is not built with sysroot support (Can we fix that?)
|
|
:
|
|
else
|
|
rest=("${rest[@]}" "$p")
|
|
fi
|
|
n=$((n + 1))
|
|
done
|
|
params=("${rest[@]}")
|
|
fi
|
|
|
|
|
|
extra=()
|
|
extraBefore=()
|
|
|
|
if test -z "$NIX_LDFLAGS_SET"; then
|
|
extra=(${extra[@]} $NIX_LDFLAGS)
|
|
extraBefore=(${extraBefore[@]} $NIX_LDFLAGS_BEFORE)
|
|
fi
|
|
|
|
|
|
# Add all used dynamic libraries to the rpath.
|
|
if test "$NIX_DONT_SET_RPATH" != "1"; then
|
|
|
|
libPath=""
|
|
addToLibPath() {
|
|
local path="$1"
|
|
if test "${path:0:1}" != "/"; then return 0; fi
|
|
case "$path" in
|
|
*..*|*./*|*/.*|*//*)
|
|
local path2
|
|
if path2=$(readlink -f "$path"); then
|
|
path="$path2"
|
|
fi
|
|
;;
|
|
esac
|
|
case $libPath in
|
|
*\ $path\ *) return 0 ;;
|
|
esac
|
|
libPath="$libPath $path "
|
|
}
|
|
|
|
addToRPath() {
|
|
# If the path is not in the store, don't add it to the rpath.
|
|
# This typically happens for libraries in /tmp that are later
|
|
# copied to $out/lib. If not, we're screwed.
|
|
if test "${1:0:${#NIX_STORE}}" != "$NIX_STORE"; then return 0; fi
|
|
case $rpath in
|
|
*\ $1\ *) return 0 ;;
|
|
esac
|
|
rpath="$rpath $1 "
|
|
}
|
|
|
|
libs=""
|
|
addToLibs() {
|
|
libs="$libs $1"
|
|
}
|
|
|
|
rpath=""
|
|
|
|
# First, find all -L... switches.
|
|
allParams=("${params[@]}" ${extra[@]})
|
|
n=0
|
|
while test $n -lt ${#allParams[*]}; do
|
|
p=${allParams[n]}
|
|
p2=${allParams[$((n+1))]}
|
|
if test "${p:0:3}" = "-L/"; then
|
|
addToLibPath ${p:2}
|
|
elif test "$p" = "-L"; then
|
|
addToLibPath ${p2}
|
|
n=$((n + 1))
|
|
elif test "$p" = "-l"; then
|
|
addToLibs ${p2}
|
|
n=$((n + 1))
|
|
elif test "${p:0:2}" = "-l"; then
|
|
addToLibs ${p:2}
|
|
elif test "$p" = "-dynamic-linker"; then
|
|
# Ignore the dynamic linker argument, or it
|
|
# will get into the next 'elif'. We don't want
|
|
# the dynamic linker path rpath to go always first.
|
|
n=$((n + 1))
|
|
elif [[ "$p" =~ ^[^-].*\.so($|\.) ]]; then
|
|
# This is a direct reference to a shared library, so add
|
|
# its directory to the rpath.
|
|
path="$(dirname "$p")";
|
|
addToRPath "${path}"
|
|
fi
|
|
n=$((n + 1))
|
|
done
|
|
|
|
# Second, for each directory in the library search path (-L...),
|
|
# see if it contains a dynamic library used by a -l... flag. If
|
|
# so, add the directory to the rpath.
|
|
# It's important to add the rpath in the order of -L..., so
|
|
# the link time chosen objects will be those of runtime linking.
|
|
|
|
for i in $libPath; do
|
|
for j in $libs; do
|
|
if test -f "$i/lib$j.so"; then
|
|
addToRPath $i
|
|
break
|
|
fi
|
|
done
|
|
done
|
|
|
|
|
|
# Finally, add `-rpath' switches.
|
|
for i in $rpath; do
|
|
extra=(${extra[@]} -rpath $i)
|
|
done
|
|
fi
|
|
|
|
|
|
# Optionally print debug info.
|
|
if test "$NIX_DEBUG" = "1"; then
|
|
echo "original flags to @ld@:" >&2
|
|
for i in "${params[@]}"; do
|
|
echo " $i" >&2
|
|
done
|
|
echo "extra flags to @ld@:" >&2
|
|
for i in ${extra[@]}; do
|
|
echo " $i" >&2
|
|
done
|
|
fi
|
|
|
|
if test -n "$NIX_LD_WRAPPER_EXEC_HOOK"; then
|
|
source "$NIX_LD_WRAPPER_EXEC_HOOK"
|
|
fi
|
|
|
|
exec @ld@ ${extraBefore[@]} "${params[@]}" ${extra[@]}
|