toolchain-wrapper.c 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455
  1. /**
  2. * Buildroot wrapper for toolchains. This simply executes the real toolchain
  3. * with a number of arguments (sysroot/arch/..) hardcoded, to ensure the
  4. * toolchain uses the correct configuration.
  5. * The hardcoded path arguments are defined relative to the actual location
  6. * of the binary.
  7. *
  8. * (C) 2011 Peter Korsgaard <jacmet@sunsite.dk>
  9. * (C) 2011 Daniel Nyström <daniel.nystrom@timeterminal.se>
  10. * (C) 2012 Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
  11. * (C) 2013 Spenser Gilliland <spenser@gillilanding.com>
  12. *
  13. * This file is licensed under the terms of the GNU General Public License
  14. * version 2. This program is licensed "as is" without any warranty of any
  15. * kind, whether express or implied.
  16. */
  17. #define _GNU_SOURCE
  18. #include <stdio.h>
  19. #include <string.h>
  20. #include <limits.h>
  21. #include <unistd.h>
  22. #include <stdlib.h>
  23. #include <errno.h>
  24. #include <time.h>
  25. #include <stdbool.h>
  26. #ifdef BR_CCACHE
  27. static char ccache_path[PATH_MAX];
  28. #endif
  29. static char path[PATH_MAX];
  30. static char sysroot[PATH_MAX];
  31. /* As would be defined by gcc:
  32. * https://gcc.gnu.org/onlinedocs/cpp/Standard-Predefined-Macros.html
  33. * sizeof() on string literals includes the terminating \0. */
  34. static char _time_[sizeof("-D__TIME__=\"HH:MM:SS\"")];
  35. static char _date_[sizeof("-D__DATE__=\"MMM DD YYYY\"")];
  36. /**
  37. * GCC errors out with certain combinations of arguments (examples are
  38. * -mfloat-abi={hard|soft} and -m{little|big}-endian), so we have to ensure
  39. * that we only pass the predefined one to the real compiler if the inverse
  40. * option isn't in the argument list.
  41. * This specifies the worst case number of extra arguments we might pass
  42. * Currently, we may have:
  43. * -mfloat-abi=
  44. * -march=
  45. * -mcpu=
  46. * -D__TIME__=
  47. * -D__DATE__=
  48. * -Wno-builtin-macro-redefined
  49. */
  50. #define EXCLUSIVE_ARGS 6
  51. static char *predef_args[] = {
  52. #ifdef BR_CCACHE
  53. ccache_path,
  54. #endif
  55. path,
  56. "--sysroot", sysroot,
  57. #ifdef BR_ABI
  58. "-mabi=" BR_ABI,
  59. #endif
  60. #ifdef BR_NAN
  61. "-mnan=" BR_NAN,
  62. #endif
  63. #ifdef BR_FPU
  64. "-mfpu=" BR_FPU,
  65. #endif
  66. #ifdef BR_SOFTFLOAT
  67. "-msoft-float",
  68. #endif /* BR_SOFTFLOAT */
  69. #ifdef BR_MODE
  70. "-m" BR_MODE,
  71. #endif
  72. #ifdef BR_64
  73. "-m64",
  74. #endif
  75. #ifdef BR_OMIT_LOCK_PREFIX
  76. "-Wa,-momit-lock-prefix=yes",
  77. #endif
  78. #ifdef BR_NO_FUSED_MADD
  79. "-mno-fused-madd",
  80. #endif
  81. #ifdef BR_FP_CONTRACT_OFF
  82. "-ffp-contract=off",
  83. #endif
  84. #ifdef BR_BINFMT_FLAT
  85. "-Wl,-elf2flt",
  86. #endif
  87. #ifdef BR_MIPS_TARGET_LITTLE_ENDIAN
  88. "-EL",
  89. #endif
  90. #if defined(BR_MIPS_TARGET_BIG_ENDIAN) || defined(BR_ARC_TARGET_BIG_ENDIAN)
  91. "-EB",
  92. #endif
  93. #ifdef BR_ADDITIONAL_CFLAGS
  94. BR_ADDITIONAL_CFLAGS
  95. #endif
  96. };
  97. /* A {string,length} tuple, to avoid computing strlen() on constants.
  98. * - str must be a \0-terminated string
  99. * - len does not account for the terminating '\0'
  100. */
  101. struct str_len_s {
  102. const char *str;
  103. size_t len;
  104. };
  105. /* Define a {string,length} tuple. Takes an unquoted constant string as
  106. * parameter. sizeof() on a string literal includes the terminating \0,
  107. * but we don't want to count it.
  108. */
  109. #define STR_LEN(s) { #s, sizeof(#s)-1 }
  110. /* List of paths considered unsafe for cross-compilation.
  111. *
  112. * An unsafe path is one that points to a directory with libraries or
  113. * headers for the build machine, which are not suitable for the target.
  114. */
  115. static const struct str_len_s unsafe_paths[] = {
  116. STR_LEN(/lib),
  117. STR_LEN(/usr/include),
  118. STR_LEN(/usr/lib),
  119. STR_LEN(/usr/local/include),
  120. STR_LEN(/usr/local/lib),
  121. { NULL, 0 },
  122. };
  123. /* Unsafe options are options that specify a potentialy unsafe path,
  124. * that will be checked by check_unsafe_path(), below.
  125. */
  126. static const struct str_len_s unsafe_opts[] = {
  127. STR_LEN(-I),
  128. STR_LEN(-idirafter),
  129. STR_LEN(-iquote),
  130. STR_LEN(-isystem),
  131. STR_LEN(-L),
  132. { NULL, 0 },
  133. };
  134. /* Check if path is unsafe for cross-compilation. Unsafe paths are those
  135. * pointing to the standard native include or library paths.
  136. *
  137. * We print the arguments leading to the failure. For some options, gcc
  138. * accepts the path to be concatenated to the argument (e.g. -I/foo/bar)
  139. * or separated (e.g. -I /foo/bar). In the first case, we need only print
  140. * the argument as it already contains the path (arg_has_path), while in
  141. * the second case we need to print both (!arg_has_path).
  142. *
  143. * If paranoid, exit in error instead of just printing a warning.
  144. */
  145. static void check_unsafe_path(const char *arg,
  146. const char *path,
  147. int paranoid,
  148. int arg_has_path)
  149. {
  150. const struct str_len_s *p;
  151. for (p=unsafe_paths; p->str; p++) {
  152. if (strncmp(path, p->str, p->len))
  153. continue;
  154. fprintf(stderr,
  155. "%s: %s: unsafe header/library path used in cross-compilation: '%s%s%s'\n",
  156. program_invocation_short_name,
  157. paranoid ? "ERROR" : "WARNING",
  158. arg,
  159. arg_has_path ? "" : "' '", /* close single-quote, space, open single-quote */
  160. arg_has_path ? "" : path); /* so that arg and path are properly quoted. */
  161. if (paranoid)
  162. exit(1);
  163. }
  164. }
  165. /* Returns false if SOURCE_DATE_EPOCH was not defined in the environment.
  166. *
  167. * Returns true if SOURCE_DATE_EPOCH is in the environment and represent
  168. * a valid timestamp, in which case the timestamp is formatted into the
  169. * global variables _date_ and _time_.
  170. *
  171. * Aborts if SOURCE_DATE_EPOCH was set in the environment but did not
  172. * contain a valid timestamp.
  173. *
  174. * Valid values are defined in the spec:
  175. * https://reproducible-builds.org/specs/source-date-epoch/
  176. * but we further restrict them to be positive or null.
  177. */
  178. bool parse_source_date_epoch_from_env(void)
  179. {
  180. char *epoch_env, *endptr;
  181. time_t epoch;
  182. struct tm epoch_tm;
  183. if ((epoch_env = getenv("SOURCE_DATE_EPOCH")) == NULL)
  184. return false;
  185. errno = 0;
  186. epoch = (time_t) strtoll(epoch_env, &endptr, 10);
  187. /* We just need to test if it is incorrect, but we do not
  188. * care why it is incorrect.
  189. */
  190. if ((errno != 0) || !*epoch_env || *endptr || (epoch < 0)) {
  191. fprintf(stderr, "%s: invalid SOURCE_DATE_EPOCH='%s'\n",
  192. program_invocation_short_name,
  193. epoch_env);
  194. exit(1);
  195. }
  196. tzset(); /* For localtime_r(), below. */
  197. if (localtime_r(&epoch, &epoch_tm) == NULL) {
  198. fprintf(stderr, "%s: cannot parse SOURCE_DATE_EPOCH=%s\n",
  199. program_invocation_short_name,
  200. getenv("SOURCE_DATE_EPOCH"));
  201. exit(1);
  202. }
  203. if (!strftime(_time_, sizeof(_time_), "-D__TIME__=\"%T\"", &epoch_tm)) {
  204. fprintf(stderr, "%s: cannot set time from SOURCE_DATE_EPOCH=%s\n",
  205. program_invocation_short_name,
  206. getenv("SOURCE_DATE_EPOCH"));
  207. exit(1);
  208. }
  209. if (!strftime(_date_, sizeof(_date_), "-D__DATE__=\"%b %e %Y\"", &epoch_tm)) {
  210. fprintf(stderr, "%s: cannot set date from SOURCE_DATE_EPOCH=%s\n",
  211. program_invocation_short_name,
  212. getenv("SOURCE_DATE_EPOCH"));
  213. exit(1);
  214. }
  215. return true;
  216. }
  217. int main(int argc, char **argv)
  218. {
  219. char **args, **cur, **exec_args;
  220. char *relbasedir, *absbasedir;
  221. char *progpath = argv[0];
  222. char *basename;
  223. char *env_debug;
  224. char *paranoid_wrapper;
  225. int paranoid;
  226. int ret, i, count = 0, debug;
  227. /* Calculate the relative paths */
  228. basename = strrchr(progpath, '/');
  229. if (basename) {
  230. *basename = '\0';
  231. basename++;
  232. relbasedir = malloc(strlen(progpath) + 7);
  233. if (relbasedir == NULL) {
  234. perror(__FILE__ ": malloc");
  235. return 2;
  236. }
  237. sprintf(relbasedir, "%s/..", argv[0]);
  238. absbasedir = realpath(relbasedir, NULL);
  239. } else {
  240. basename = progpath;
  241. absbasedir = malloc(PATH_MAX + 1);
  242. ret = readlink("/proc/self/exe", absbasedir, PATH_MAX);
  243. if (ret < 0) {
  244. perror(__FILE__ ": readlink");
  245. return 2;
  246. }
  247. absbasedir[ret] = '\0';
  248. for (i = ret; i > 0; i--) {
  249. if (absbasedir[i] == '/') {
  250. absbasedir[i] = '\0';
  251. if (++count == 2)
  252. break;
  253. }
  254. }
  255. }
  256. if (absbasedir == NULL) {
  257. perror(__FILE__ ": realpath");
  258. return 2;
  259. }
  260. /* Fill in the relative paths */
  261. #ifdef BR_CROSS_PATH_REL
  262. ret = snprintf(path, sizeof(path), "%s/" BR_CROSS_PATH_REL "/%s" BR_CROSS_PATH_SUFFIX, absbasedir, basename);
  263. #elif defined(BR_CROSS_PATH_ABS)
  264. ret = snprintf(path, sizeof(path), BR_CROSS_PATH_ABS "/%s" BR_CROSS_PATH_SUFFIX, basename);
  265. #else
  266. ret = snprintf(path, sizeof(path), "%s/bin/%s" BR_CROSS_PATH_SUFFIX, absbasedir, basename);
  267. #endif
  268. if (ret >= sizeof(path)) {
  269. perror(__FILE__ ": overflow");
  270. return 3;
  271. }
  272. #ifdef BR_CCACHE
  273. ret = snprintf(ccache_path, sizeof(ccache_path), "%s/bin/ccache", absbasedir);
  274. if (ret >= sizeof(ccache_path)) {
  275. perror(__FILE__ ": overflow");
  276. return 3;
  277. }
  278. #endif
  279. ret = snprintf(sysroot, sizeof(sysroot), "%s/" BR_SYSROOT, absbasedir);
  280. if (ret >= sizeof(sysroot)) {
  281. perror(__FILE__ ": overflow");
  282. return 3;
  283. }
  284. cur = args = malloc(sizeof(predef_args) +
  285. (sizeof(char *) * (argc + EXCLUSIVE_ARGS)));
  286. if (args == NULL) {
  287. perror(__FILE__ ": malloc");
  288. return 2;
  289. }
  290. /* start with predefined args */
  291. memcpy(cur, predef_args, sizeof(predef_args));
  292. cur += sizeof(predef_args) / sizeof(predef_args[0]);
  293. #ifdef BR_FLOAT_ABI
  294. /* add float abi if not overridden in args */
  295. for (i = 1; i < argc; i++) {
  296. if (!strncmp(argv[i], "-mfloat-abi=", strlen("-mfloat-abi=")) ||
  297. !strcmp(argv[i], "-msoft-float") ||
  298. !strcmp(argv[i], "-mhard-float"))
  299. break;
  300. }
  301. if (i == argc)
  302. *cur++ = "-mfloat-abi=" BR_FLOAT_ABI;
  303. #endif
  304. #ifdef BR_FP32_MODE
  305. /* add fp32 mode if soft-float is not args or hard-float overrides soft-float */
  306. int add_fp32_mode = 1;
  307. for (i = 1; i < argc; i++) {
  308. if (!strcmp(argv[i], "-msoft-float"))
  309. add_fp32_mode = 0;
  310. else if (!strcmp(argv[i], "-mhard-float"))
  311. add_fp32_mode = 1;
  312. }
  313. if (add_fp32_mode == 1)
  314. *cur++ = "-mfp" BR_FP32_MODE;
  315. #endif
  316. #if defined(BR_ARCH) || \
  317. defined(BR_CPU)
  318. /* Add our -march/cpu flags, but only if none of
  319. * -march/mtune/mcpu are already specified on the commandline
  320. */
  321. for (i = 1; i < argc; i++) {
  322. if (!strncmp(argv[i], "-march=", strlen("-march=")) ||
  323. !strncmp(argv[i], "-mtune=", strlen("-mtune=")) ||
  324. !strncmp(argv[i], "-mcpu=", strlen("-mcpu=" )))
  325. break;
  326. }
  327. if (i == argc) {
  328. #ifdef BR_ARCH
  329. *cur++ = "-march=" BR_ARCH;
  330. #endif
  331. #ifdef BR_CPU
  332. *cur++ = "-mcpu=" BR_CPU;
  333. #endif
  334. }
  335. #endif /* ARCH || CPU */
  336. if (parse_source_date_epoch_from_env()) {
  337. *cur++ = _time_;
  338. *cur++ = _date_;
  339. /* This has existed since gcc-4.4.0. */
  340. *cur++ = "-Wno-builtin-macro-redefined";
  341. }
  342. paranoid_wrapper = getenv("BR_COMPILER_PARANOID_UNSAFE_PATH");
  343. if (paranoid_wrapper && strlen(paranoid_wrapper) > 0)
  344. paranoid = 1;
  345. else
  346. paranoid = 0;
  347. /* Check for unsafe library and header paths */
  348. for (i = 1; i < argc; i++) {
  349. const struct str_len_s *opt;
  350. for (opt=unsafe_opts; opt->str; opt++ ) {
  351. /* Skip any non-unsafe option. */
  352. if (strncmp(argv[i], opt->str, opt->len))
  353. continue;
  354. /* Handle both cases:
  355. * - path is a separate argument,
  356. * - path is concatenated with option.
  357. */
  358. if (argv[i][opt->len] == '\0') {
  359. i++;
  360. if (i == argc)
  361. break;
  362. check_unsafe_path(argv[i-1], argv[i], paranoid, 0);
  363. } else
  364. check_unsafe_path(argv[i], argv[i] + opt->len, paranoid, 1);
  365. }
  366. }
  367. /* append forward args */
  368. memcpy(cur, &argv[1], sizeof(char *) * (argc - 1));
  369. cur += argc - 1;
  370. /* finish with NULL termination */
  371. *cur = NULL;
  372. exec_args = args;
  373. #ifdef BR_CCACHE
  374. if (getenv("BR_NO_CCACHE"))
  375. /* Skip the ccache call */
  376. exec_args++;
  377. #endif
  378. /* Debug the wrapper to see actual arguments passed to
  379. * the compiler:
  380. * unset, empty, or 0: do not trace
  381. * set to 1 : trace all arguments on a single line
  382. * set to 2 : trace one argument per line
  383. */
  384. if ((env_debug = getenv("BR2_DEBUG_WRAPPER"))) {
  385. debug = atoi(env_debug);
  386. if (debug > 0) {
  387. fprintf(stderr, "Toolchain wrapper executing:");
  388. #ifdef BR_CCACHE_HASH
  389. fprintf(stderr, "%sCCACHE_COMPILERCHECK='string:" BR_CCACHE_HASH "'",
  390. (debug == 2) ? "\n " : " ");
  391. #endif
  392. #ifdef BR_CCACHE_BASEDIR
  393. fprintf(stderr, "%sCCACHE_BASEDIR='" BR_CCACHE_BASEDIR "'",
  394. (debug == 2) ? "\n " : " ");
  395. #endif
  396. for (i = 0; exec_args[i]; i++)
  397. fprintf(stderr, "%s'%s'",
  398. (debug == 2) ? "\n " : " ", exec_args[i]);
  399. fprintf(stderr, "\n");
  400. }
  401. }
  402. #ifdef BR_CCACHE_HASH
  403. /* Allow compilercheck to be overridden through the environment */
  404. if (setenv("CCACHE_COMPILERCHECK", "string:" BR_CCACHE_HASH, 0)) {
  405. perror(__FILE__ ": Failed to set CCACHE_COMPILERCHECK");
  406. return 3;
  407. }
  408. #endif
  409. #ifdef BR_CCACHE_BASEDIR
  410. /* Allow compilercheck to be overridden through the environment */
  411. if (setenv("CCACHE_BASEDIR", BR_CCACHE_BASEDIR, 0)) {
  412. perror(__FILE__ ": Failed to set CCACHE_BASEDIR");
  413. return 3;
  414. }
  415. #endif
  416. if (execv(exec_args[0], exec_args))
  417. perror(path);
  418. free(args);
  419. return 2;
  420. }