3053494a9a
LeakSanitizer, ThreadSanitizer, AddressSanitizer and MemorySanitizer support ``` $ cargo new --bin leak && cd $_ $ edit Cargo.toml && tail -n3 $_ ``` ``` toml [profile.dev] opt-level = 1 ``` ``` $ edit src/main.rs && cat $_ ``` ``` rust use std::mem; fn main() { let xs = vec![0, 1, 2, 3]; mem::forget(xs); } ``` ``` $ RUSTFLAGS="-Z sanitizer=leak" cargo run --target x86_64-unknown-linux-gnu; echo $? Finished dev [optimized + debuginfo] target(s) in 0.0 secs Running `target/debug/leak` ================================================================= ==10848==ERROR: LeakSanitizer: detected memory leaks Direct leak of 16 byte(s) in 1 object(s) allocated from: #0 0x557c3488db1f in __interceptor_malloc /shared/rust/checkouts/lsan/src/compiler-rt/lib/lsan/lsan_interceptors.cc:55 #1 0x557c34888aaa in alloc::heap::exchange_malloc::h68f3f8b376a0da42 /shared/rust/checkouts/lsan/src/liballoc/heap.rs:138 #2 0x557c34888afc in leak::main::hc56ab767de6d653a $PWD/src/main.rs:4 #3 0x557c348c0806 in __rust_maybe_catch_panic ($PWD/target/debug/leak+0x3d806) SUMMARY: LeakSanitizer: 16 byte(s) leaked in 1 allocation(s). 23 ``` ``` $ cargo new --bin racy && cd $_ $ edit src/main.rs && cat $_ ``` ``` rust use std::thread; static mut ANSWER: i32 = 0; fn main() { let t1 = thread::spawn(|| unsafe { ANSWER = 42 }); unsafe { ANSWER = 24; } t1.join().ok(); } ``` ``` $ RUSTFLAGS="-Z sanitizer=thread" cargo run --target x86_64-unknown-linux-gnu; echo $? ================== WARNING: ThreadSanitizer: data race (pid=12019) Write of size 4 at 0x562105989bb4 by thread T1: #0 racy::main::_$u7b$$u7b$closure$u7d$$u7d$::hbe13ea9e8ac73f7e $PWD/src/main.rs:6 (racy+0x000000010e3f) #1 _$LT$std..panic..AssertUnwindSafe$LT$F$GT$$u20$as$u20$core..ops..FnOnce$LT$$LP$$RP$$GT$$GT$::call_once::h2e466a92accacc78 /shared/rust/checkouts/lsan/src/libstd/panic.rs:296 (racy+0x000000010cc5) #2 std::panicking::try::do_call::h7f4d2b38069e4042 /shared/rust/checkouts/lsan/src/libstd/panicking.rs:460 (racy+0x00000000c8f2) #3 __rust_maybe_catch_panic <null> (racy+0x0000000b4e56) #4 std::panic::catch_unwind::h31ca45621ad66d5a /shared/rust/checkouts/lsan/src/libstd/panic.rs:361 (racy+0x00000000b517) #5 std:🧵:Builder::spawn::_$u7b$$u7b$closure$u7d$$u7d$::hccfc37175dea0b01 /shared/rust/checkouts/lsan/src/libstd/thread/mod.rs:357 (racy+0x00000000c226) #6 _$LT$F$u20$as$u20$alloc..boxed..FnBox$LT$A$GT$$GT$::call_box::hd880bbf91561e033 /shared/rust/checkouts/lsan/src/liballoc/boxed.rs:605 (racy+0x00000000f27e) #7 std::sys:👿🧵:Thread:🆕:thread_start::hebdfc4b3d17afc85 <null> (racy+0x0000000abd40) Previous write of size 4 at 0x562105989bb4 by main thread: #0 racy::main::h23e6e5ca46d085c3 $PWD/src/main.rs:8 (racy+0x000000010d7c) #1 __rust_maybe_catch_panic <null> (racy+0x0000000b4e56) #2 __libc_start_main <null> (libc.so.6+0x000000020290) Location is global 'racy::ANSWER::h543d2b139f819b19' of size 4 at 0x562105989bb4 (racy+0x0000002f8bb4) Thread T1 (tid=12028, running) created by main thread at: #0 pthread_create /shared/rust/checkouts/lsan/src/compiler-rt/lib/tsan/rtl/tsan_interceptors.cc:902 (racy+0x00000001aedb) #1 std::sys:👿🧵:Thread:🆕:hce44187bf4a36222 <null> (racy+0x0000000ab9ae) #2 std:🧵:spawn::he382608373eb667e /shared/rust/checkouts/lsan/src/libstd/thread/mod.rs:412 (racy+0x00000000b5aa) #3 racy::main::h23e6e5ca46d085c3 $PWD/src/main.rs:6 (racy+0x000000010d5c) #4 __rust_maybe_catch_panic <null> (racy+0x0000000b4e56) #5 __libc_start_main <null> (libc.so.6+0x000000020290) SUMMARY: ThreadSanitizer: data race $PWD/src/main.rs:6 in racy::main::_$u7b$$u7b$closure$u7d$$u7d$::hbe13ea9e8ac73f7e ================== ThreadSanitizer: reported 1 warnings 66 ``` ``` $ cargo new --bin oob && cd $_ $ edit src/main.rs && cat $_ ``` ``` rust fn main() { let xs = [0, 1, 2, 3]; let y = unsafe { *xs.as_ptr().offset(4) }; } ``` ``` $ RUSTFLAGS="-Z sanitizer=address" cargo run --target x86_64-unknown-linux-gnu; echo $? ================================================================= ==13328==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fff29f3ecd0 at pc 0x55802dc6bf7e bp 0x7fff29f3ec90 sp 0x7fff29f3ec88 READ of size 4 at 0x7fff29f3ecd0 thread T0 #0 0x55802dc6bf7d in oob::main::h0adc7b67e5feb2e7 $PWD/src/main.rs:3 #1 0x55802dd60426 in __rust_maybe_catch_panic ($PWD/target/debug/oob+0xfe426) #2 0x55802dd58dd9 in std::rt::lang_start::hb2951fc8a59d62a7 ($PWD/target/debug/oob+0xf6dd9) #3 0x55802dc6c002 in main ($PWD/target/debug/oob+0xa002) #4 0x7fad8c3b3290 in __libc_start_main (/usr/lib/libc.so.6+0x20290) #5 0x55802dc6b719 in _start ($PWD/target/debug/oob+0x9719) Address 0x7fff29f3ecd0 is located in stack of thread T0 at offset 48 in frame #0 0x55802dc6bd5f in oob::main::h0adc7b67e5feb2e7 $PWD/src/main.rs:1 This frame has 1 object(s): [32, 48) 'xs' <== Memory access at offset 48 overflows this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow $PWD/src/main.rs:3 in oob::main::h0adc7b67e5feb2e7 Shadow bytes around the buggy address: 0x1000653dfd40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000653dfd50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000653dfd60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000653dfd70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000653dfd80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x1000653dfd90: 00 00 00 00 f1 f1 f1 f1 00 00[f3]f3 00 00 00 00 0x1000653dfda0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000653dfdb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000653dfdc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000653dfdd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000653dfde0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==13328==ABORTING 1 ``` ``` $ cargo new --bin uninit && cd $_ $ edit src/main.rs && cat $_ ``` ``` rust use std::mem; fn main() { let xs: [u8; 4] = unsafe { mem::uninitialized() }; let y = xs[0] + xs[1]; } ``` ``` $ RUSTFLAGS="-Z sanitizer=memory" cargo run; echo $? ==30198==WARNING: MemorySanitizer: use-of-uninitialized-value #0 0x563f4b6867da in uninit::main::hc2731cd4f2ed48f8 $PWD/src/main.rs:5 #1 0x563f4b7033b6 in __rust_maybe_catch_panic ($PWD/target/debug/uninit+0x873b6) #2 0x563f4b6fbd69 in std::rt::lang_start::hb2951fc8a59d62a7 ($PWD/target/debug/uninit+0x7fd69) #3 0x563f4b6868a9 in main ($PWD/target/debug/uninit+0xa8a9) #4 0x7fe844354290 in __libc_start_main (/usr/lib/libc.so.6+0x20290) #5 0x563f4b6864f9 in _start ($PWD/target/debug/uninit+0xa4f9) SUMMARY: MemorySanitizer: use-of-uninitialized-value $PWD/src/main.rs:5 in uninit::main::hc2731cd4f2ed48f8 Exiting 77 ```
1110 lines
30 KiB
Bash
Executable File
1110 lines
30 KiB
Bash
Executable File
#!/bin/sh
|
|
|
|
# /bin/sh on Solaris is not a POSIX compatible shell, but /usr/bin/bash is.
|
|
if [ `uname -s` = 'SunOS' -a "${POSIX_SHELL}" != "true" ]; then
|
|
POSIX_SHELL="true"
|
|
export POSIX_SHELL
|
|
exec /usr/bin/env bash $0 "$@"
|
|
fi
|
|
unset POSIX_SHELL # clear it so if we invoke other scripts, they run as bash as well
|
|
|
|
msg() {
|
|
echo "configure: $*"
|
|
}
|
|
|
|
step_msg() {
|
|
msg
|
|
msg "$1"
|
|
msg
|
|
}
|
|
|
|
warn() {
|
|
echo "configure: WARNING: $1"
|
|
}
|
|
|
|
err() {
|
|
echo "configure: error: $1"
|
|
exit 1
|
|
}
|
|
|
|
run() {
|
|
msg "$@"
|
|
"$@"
|
|
}
|
|
|
|
need_ok() {
|
|
if [ $? -ne 0 ]
|
|
then
|
|
err "$1"
|
|
fi
|
|
}
|
|
|
|
need_cmd() {
|
|
if command -v $1 >/dev/null 2>&1
|
|
then msg "found program '$1'"
|
|
else err "program '$1' is missing, please install it"
|
|
fi
|
|
}
|
|
|
|
make_dir() {
|
|
if [ ! -d $1 ]
|
|
then
|
|
run mkdir -p $1
|
|
fi
|
|
}
|
|
|
|
copy_if_changed() {
|
|
if cmp -s $1 $2
|
|
then
|
|
msg "leaving $2 unchanged"
|
|
else
|
|
run cp -f $1 $2
|
|
chmod u-w $2 # make copied artifact read-only
|
|
fi
|
|
}
|
|
|
|
move_if_changed() {
|
|
if cmp -s $1 $2
|
|
then
|
|
msg "leaving $2 unchanged"
|
|
else
|
|
run mv -f $1 $2
|
|
chmod u-w $2 # make moved artifact read-only
|
|
fi
|
|
}
|
|
|
|
putvar() {
|
|
local T
|
|
eval T=\$$1
|
|
eval TLEN=\${#$1}
|
|
if [ $TLEN -gt 35 ]
|
|
then
|
|
printf "configure: %-20s := %.35s ...\n" $1 "$T"
|
|
else
|
|
printf "configure: %-20s := %s %s\n" $1 "$T" "$2"
|
|
fi
|
|
printf "%-20s := %s\n" $1 "$T" >>config.tmp
|
|
}
|
|
|
|
putpathvar() {
|
|
local T
|
|
eval T=\$$1
|
|
eval TLEN=\${#$1}
|
|
if [ $TLEN -gt 35 ]
|
|
then
|
|
printf "configure: %-20s := %.35s ...\n" $1 "$T"
|
|
else
|
|
printf "configure: %-20s := %s %s\n" $1 "$T" "$2"
|
|
fi
|
|
if [ -z "$T" ]
|
|
then
|
|
printf "%-20s := \n" $1 >>config.tmp
|
|
else
|
|
printf "%-20s := \"%s\"\n" $1 "$T" >>config.tmp
|
|
fi
|
|
}
|
|
|
|
probe() {
|
|
local V=$1
|
|
shift
|
|
local P
|
|
local T
|
|
for P
|
|
do
|
|
T=$(command -v $P 2>&1)
|
|
if [ $? -eq 0 ]
|
|
then
|
|
VER0=$($P --version 2>/dev/null \
|
|
| grep -o '[vV]\?[0-9][0-9.][a-z0-9.-]*' | head -1 )
|
|
if [ $? -eq 0 -a "x${VER0}" != "x" ]
|
|
then
|
|
VER="($VER0)"
|
|
else
|
|
VER=""
|
|
fi
|
|
break
|
|
else
|
|
VER=""
|
|
T=""
|
|
fi
|
|
done
|
|
eval $V=\$T
|
|
putpathvar $V "$VER"
|
|
}
|
|
|
|
probe_need() {
|
|
probe $*
|
|
local V=$1
|
|
shift
|
|
eval VV=\$$V
|
|
if [ -z "$VV" ]
|
|
then
|
|
err "$V needed, but unable to find any of: $*"
|
|
fi
|
|
}
|
|
|
|
validate_opt () {
|
|
for arg in $CFG_CONFIGURE_ARGS
|
|
do
|
|
isArgValid=0
|
|
for option in $BOOL_OPTIONS
|
|
do
|
|
if test --disable-$option = $arg
|
|
then
|
|
isArgValid=1
|
|
fi
|
|
if test --enable-$option = $arg
|
|
then
|
|
isArgValid=1
|
|
fi
|
|
done
|
|
for option in $VAL_OPTIONS
|
|
do
|
|
if echo "$arg" | grep -q -- "--$option="
|
|
then
|
|
isArgValid=1
|
|
fi
|
|
done
|
|
if [ "$arg" = "--help" ]
|
|
then
|
|
echo
|
|
echo "No more help available for Configure options,"
|
|
echo "check the Wiki or join our IRC channel"
|
|
break
|
|
else
|
|
if test $isArgValid -eq 0
|
|
then
|
|
err "Option '$arg' is not recognized"
|
|
fi
|
|
fi
|
|
done
|
|
}
|
|
|
|
# `valopt OPTION_NAME DEFAULT DOC` extracts a string-valued option
|
|
# from command line, using provided default value for the option if
|
|
# not present, and saves it to the generated config.mk.
|
|
#
|
|
# `valopt_nosave` is much the same, except that it does not save the
|
|
# result to config.mk (instead the script should use `putvar` itself
|
|
# later on to save it). `valopt_core` is the core upon which the
|
|
# other two are built.
|
|
|
|
valopt_core() {
|
|
VAL_OPTIONS="$VAL_OPTIONS $2"
|
|
|
|
local SAVE=$1
|
|
local OP=$2
|
|
local DEFAULT=$3
|
|
shift
|
|
shift
|
|
shift
|
|
local DOC="$*"
|
|
if [ $HELP -eq 0 ]
|
|
then
|
|
local UOP=$(echo $OP | tr '[:lower:]' '[:upper:]' | tr '\-' '\_')
|
|
local V="CFG_${UOP}"
|
|
local V_PROVIDED="${V}_PROVIDED"
|
|
eval $V="$DEFAULT"
|
|
for arg in $CFG_CONFIGURE_ARGS
|
|
do
|
|
if echo "$arg" | grep -q -- "--$OP="
|
|
then
|
|
val=$(echo "$arg" | cut -f2 -d=)
|
|
eval $V=$val
|
|
eval $V_PROVIDED=1
|
|
fi
|
|
done
|
|
if [ "$SAVE" = "save" ]
|
|
then
|
|
putvar $V
|
|
fi
|
|
else
|
|
if [ -z "$DEFAULT" ]
|
|
then
|
|
DEFAULT="<none>"
|
|
fi
|
|
OP="${OP}=[${DEFAULT}]"
|
|
printf " --%-30s %s\n" "$OP" "$DOC"
|
|
fi
|
|
}
|
|
|
|
valopt_nosave() {
|
|
valopt_core nosave "$@"
|
|
}
|
|
|
|
valopt() {
|
|
valopt_core save "$@"
|
|
}
|
|
|
|
# `opt OPTION_NAME DEFAULT DOC` extracts a boolean-valued option from
|
|
# command line, using the provided default value (0/1) for the option
|
|
# if not present, and saves it to the generated config.mk.
|
|
#
|
|
# `opt_nosave` is much the same, except that it does not save the
|
|
# result to config.mk (instead the script should use `putvar` itself
|
|
# later on to save it). `opt_core` is the core upon which the other
|
|
# two are built.
|
|
|
|
opt_core() {
|
|
BOOL_OPTIONS="$BOOL_OPTIONS $2"
|
|
|
|
local SAVE=$1
|
|
local OP=$2
|
|
local DEFAULT=$3
|
|
shift
|
|
shift
|
|
shift
|
|
local DOC="$*"
|
|
local FLAG=""
|
|
|
|
if [ $DEFAULT -eq 0 ]
|
|
then
|
|
FLAG="enable"
|
|
DEFAULT_FLAG="disable"
|
|
else
|
|
FLAG="disable"
|
|
DEFAULT_FLAG="enable"
|
|
DOC="don't $DOC"
|
|
fi
|
|
|
|
if [ $HELP -eq 0 ]
|
|
then
|
|
for arg in $CFG_CONFIGURE_ARGS
|
|
do
|
|
if [ "$arg" = "--${FLAG}-${OP}" ]
|
|
then
|
|
OP=$(echo $OP | tr 'a-z-' 'A-Z_')
|
|
FLAG=$(echo $FLAG | tr 'a-z' 'A-Z')
|
|
local V="CFG_${FLAG}_${OP}"
|
|
local V_PROVIDED="CFG_${FLAG}_${OP}_PROVIDED"
|
|
eval $V=1
|
|
eval $V_PROVIDED=1
|
|
if [ "$SAVE" = "save" ]
|
|
then
|
|
putvar $V
|
|
fi
|
|
elif [ "$arg" = "--${DEFAULT_FLAG}-${OP}" ]
|
|
then
|
|
OP=$(echo $OP | tr 'a-z-' 'A-Z_')
|
|
DEFAULT_FLAG=$(echo $DEFAULT_FLAG | tr 'a-z' 'A-Z')
|
|
local V_PROVIDED="CFG_${DEFAULT_FLAG}_${OP}_PROVIDED"
|
|
eval $V_PROVIDED=1
|
|
fi
|
|
done
|
|
else
|
|
if [ -n "$META" ]
|
|
then
|
|
OP="$OP=<$META>"
|
|
fi
|
|
printf " --%-30s %s\n" "$FLAG-$OP" "$DOC"
|
|
fi
|
|
}
|
|
|
|
opt_nosave() {
|
|
opt_core nosave "$@"
|
|
}
|
|
|
|
opt() {
|
|
opt_core save "$@"
|
|
}
|
|
|
|
envopt() {
|
|
local NAME=$1
|
|
local V="CFG_${NAME}"
|
|
eval VV=\$$V
|
|
|
|
# If configure didn't set a value already, then check environment.
|
|
#
|
|
# (It is recommended that the configure script always check the
|
|
# environment before setting any values to envopt variables; see
|
|
# e.g. how CFG_CC is handled, where it first checks `-z "$CC"`,
|
|
# and issues msg if it ends up employing that provided value.)
|
|
if [ -z "$VV" ]
|
|
then
|
|
eval $V=\$$NAME
|
|
eval VV=\$$V
|
|
fi
|
|
|
|
# If script or environment provided a value, save it.
|
|
if [ -n "$VV" ]
|
|
then
|
|
putvar $V
|
|
fi
|
|
}
|
|
|
|
enable_if_not_disabled() {
|
|
local OP=$1
|
|
local UOP=$(echo $OP | tr '[:lower:]' '[:upper:]' | tr '\-' '\_')
|
|
local ENAB_V="CFG_ENABLE_$UOP"
|
|
local EXPLICITLY_DISABLED="CFG_DISABLE_${UOP}_PROVIDED"
|
|
eval VV=\$$EXPLICITLY_DISABLED
|
|
if [ -z "$VV" ]; then
|
|
eval $ENAB_V=1
|
|
fi
|
|
}
|
|
|
|
to_gnu_triple() {
|
|
case $1 in
|
|
i686-pc-windows-gnu) echo i686-w64-mingw32 ;;
|
|
x86_64-pc-windows-gnu) echo x86_64-w64-mingw32 ;;
|
|
*) echo $1 ;;
|
|
esac
|
|
}
|
|
|
|
# Prints the absolute path of a directory to stdout
|
|
abs_path() {
|
|
local _path="$1"
|
|
# Unset CDPATH because it causes havok: it makes the destination unpredictable
|
|
# and triggers 'cd' to print the path to stdout. Route `cd`'s output to /dev/null
|
|
# for good measure.
|
|
(unset CDPATH && cd "$_path" > /dev/null && pwd)
|
|
}
|
|
|
|
HELP=0
|
|
for arg; do
|
|
case "$arg" in
|
|
--help) HELP=1;;
|
|
esac
|
|
done
|
|
|
|
msg "looking for configure programs"
|
|
need_cmd cmp
|
|
need_cmd mkdir
|
|
need_cmd printf
|
|
need_cmd cut
|
|
need_cmd head
|
|
need_cmd grep
|
|
need_cmd xargs
|
|
need_cmd cp
|
|
need_cmd find
|
|
need_cmd uname
|
|
need_cmd date
|
|
need_cmd tr
|
|
need_cmd sed
|
|
need_cmd file
|
|
need_cmd make
|
|
|
|
msg "inspecting environment"
|
|
|
|
CFG_OSTYPE=$(uname -s)
|
|
CFG_CPUTYPE=$(uname -m)
|
|
|
|
if [ $CFG_OSTYPE = Darwin -a $CFG_CPUTYPE = i386 ]
|
|
then
|
|
# Darwin's `uname -s` lies and always returns i386. We have to use sysctl
|
|
# instead.
|
|
if sysctl hw.optional.x86_64 | grep -q ': 1'
|
|
then
|
|
CFG_CPUTYPE=x86_64
|
|
fi
|
|
fi
|
|
|
|
# The goal here is to come up with the same triple as LLVM would,
|
|
# at least for the subset of platforms we're willing to target.
|
|
|
|
case $CFG_OSTYPE in
|
|
|
|
Linux)
|
|
CFG_OSTYPE=unknown-linux-gnu
|
|
;;
|
|
|
|
FreeBSD)
|
|
CFG_OSTYPE=unknown-freebsd
|
|
;;
|
|
|
|
DragonFly)
|
|
CFG_OSTYPE=unknown-dragonfly
|
|
;;
|
|
|
|
Bitrig)
|
|
CFG_OSTYPE=unknown-bitrig
|
|
;;
|
|
|
|
OpenBSD)
|
|
CFG_OSTYPE=unknown-openbsd
|
|
;;
|
|
|
|
NetBSD)
|
|
CFG_OSTYPE=unknown-netbsd
|
|
;;
|
|
|
|
Darwin)
|
|
CFG_OSTYPE=apple-darwin
|
|
;;
|
|
|
|
SunOS)
|
|
CFG_OSTYPE=sun-solaris
|
|
CFG_CPUTYPE=$(isainfo -n)
|
|
;;
|
|
|
|
Haiku)
|
|
CFG_OSTYPE=unknown-haiku
|
|
;;
|
|
|
|
MINGW*)
|
|
# msys' `uname` does not print gcc configuration, but prints msys
|
|
# configuration. so we cannot believe `uname -m`:
|
|
# msys1 is always i686 and msys2 is always x86_64.
|
|
# instead, msys defines $MSYSTEM which is MINGW32 on i686 and
|
|
# MINGW64 on x86_64.
|
|
CFG_CPUTYPE=i686
|
|
CFG_OSTYPE=pc-windows-gnu
|
|
if [ "$MSYSTEM" = MINGW64 ]
|
|
then
|
|
CFG_CPUTYPE=x86_64
|
|
fi
|
|
;;
|
|
|
|
MSYS*)
|
|
CFG_OSTYPE=pc-windows-gnu
|
|
;;
|
|
|
|
# Thad's Cygwin identifiers below
|
|
|
|
# Vista 32 bit
|
|
CYGWIN_NT-6.0)
|
|
CFG_OSTYPE=pc-windows-gnu
|
|
CFG_CPUTYPE=i686
|
|
;;
|
|
|
|
# Vista 64 bit
|
|
CYGWIN_NT-6.0-WOW64)
|
|
CFG_OSTYPE=pc-windows-gnu
|
|
CFG_CPUTYPE=x86_64
|
|
;;
|
|
|
|
# Win 7 32 bit
|
|
CYGWIN_NT-6.1)
|
|
CFG_OSTYPE=pc-windows-gnu
|
|
CFG_CPUTYPE=i686
|
|
;;
|
|
|
|
# Win 7 64 bit
|
|
CYGWIN_NT-6.1-WOW64)
|
|
CFG_OSTYPE=pc-windows-gnu
|
|
CFG_CPUTYPE=x86_64
|
|
;;
|
|
|
|
# Win 8 # uname -s on 64-bit cygwin does not contain WOW64, so simply use uname -m to detect arch (works in my install)
|
|
CYGWIN_NT-6.3)
|
|
CFG_OSTYPE=pc-windows-gnu
|
|
;;
|
|
# We do not detect other OS such as XP/2003 using 64 bit using uname.
|
|
# If we want to in the future, we will need to use Cygwin - Chuck's csih helper in /usr/lib/csih/winProductName.exe or alternative.
|
|
*)
|
|
err "unknown OS type: $CFG_OSTYPE"
|
|
;;
|
|
esac
|
|
|
|
|
|
case $CFG_CPUTYPE in
|
|
|
|
i386 | i486 | i686 | i786 | x86)
|
|
CFG_CPUTYPE=i686
|
|
;;
|
|
|
|
xscale | arm)
|
|
CFG_CPUTYPE=arm
|
|
;;
|
|
|
|
armv6l)
|
|
CFG_CPUTYPE=arm
|
|
CFG_OSTYPE="${CFG_OSTYPE}eabihf"
|
|
;;
|
|
|
|
armv7l)
|
|
CFG_CPUTYPE=armv7
|
|
CFG_OSTYPE="${CFG_OSTYPE}eabihf"
|
|
;;
|
|
|
|
aarch64 | arm64)
|
|
CFG_CPUTYPE=aarch64
|
|
;;
|
|
|
|
powerpc | ppc)
|
|
CFG_CPUTYPE=powerpc
|
|
;;
|
|
|
|
powerpc64 | ppc64)
|
|
CFG_CPUTYPE=powerpc64
|
|
;;
|
|
|
|
powerpc64le | ppc64le)
|
|
CFG_CPUTYPE=powerpc64le
|
|
;;
|
|
|
|
s390x)
|
|
CFG_CPUTYPE=s390x
|
|
;;
|
|
|
|
x86_64 | x86-64 | x64 | amd64)
|
|
CFG_CPUTYPE=x86_64
|
|
;;
|
|
|
|
mips | mips64)
|
|
if [ "$CFG_CPUTYPE" = "mips64" ]; then
|
|
CFG_OSTYPE="${CFG_OSTYPE}abi64"
|
|
fi
|
|
ENDIAN=$(printf '\1' | od -dAn)
|
|
if [ "$ENDIAN" -eq 1 ]; then
|
|
CFG_CPUTYPE="${CFG_CPUTYPE}el"
|
|
elif [ "$ENDIAN" -ne 256 ]; then
|
|
err "unknown endianness: $ENDIAN (expecting 1 for little or 256 for big)"
|
|
fi
|
|
;;
|
|
|
|
BePC)
|
|
CFG_CPUTYPE=i686
|
|
;;
|
|
|
|
*)
|
|
err "unknown CPU type: $CFG_CPUTYPE"
|
|
esac
|
|
|
|
# Detect 64 bit linux systems with 32 bit userland and force 32 bit compilation
|
|
if [ $CFG_OSTYPE = unknown-linux-gnu -a $CFG_CPUTYPE = x86_64 ]
|
|
then
|
|
# $SHELL does not exist in standard 'sh', so probably only exists
|
|
# if configure is running in an interactive bash shell. /usr/bin/env
|
|
# exists *everywhere*.
|
|
BIN_TO_PROBE="$SHELL"
|
|
if [ ! -r "$BIN_TO_PROBE" ]; then
|
|
if [ -r "/usr/bin/env" ]; then
|
|
BIN_TO_PROBE="/usr/bin/env"
|
|
else
|
|
warn "Cannot check if the userland is i686 or x86_64"
|
|
fi
|
|
fi
|
|
file -L "$BIN_TO_PROBE" | grep -q "x86[_-]64"
|
|
if [ $? != 0 ]; then
|
|
msg "i686 userland on x86_64 Linux kernel"
|
|
CFG_CPUTYPE=i686
|
|
fi
|
|
fi
|
|
|
|
|
|
DEFAULT_BUILD="${CFG_CPUTYPE}-${CFG_OSTYPE}"
|
|
|
|
CFG_SRC_DIR="$(abs_path $(dirname $0))/"
|
|
CFG_SRC_DIR_RELATIVE="$(dirname $0)/"
|
|
CFG_BUILD_DIR="$(pwd)/"
|
|
CFG_SELF="$0"
|
|
CFG_CONFIGURE_ARGS="$@"
|
|
|
|
|
|
case "${CFG_SRC_DIR}" in
|
|
*\ * )
|
|
err "The path to the rust source directory contains spaces, which is not supported"
|
|
;;
|
|
*)
|
|
;;
|
|
esac
|
|
|
|
|
|
OPTIONS=""
|
|
if [ "$HELP" -eq 1 ]
|
|
then
|
|
echo
|
|
echo "Usage: $CFG_SELF [options]"
|
|
echo
|
|
echo "Options:"
|
|
echo
|
|
else
|
|
msg "recreating config.tmp"
|
|
echo '' >config.tmp
|
|
|
|
step_msg "processing $CFG_SELF args"
|
|
fi
|
|
|
|
BOOL_OPTIONS=""
|
|
VAL_OPTIONS=""
|
|
|
|
opt debug 0 "debug mode; disables optimization unless \`--enable-optimize\` given"
|
|
opt valgrind 0 "run tests with valgrind (memcheck by default)"
|
|
opt helgrind 0 "run tests with helgrind instead of memcheck"
|
|
opt valgrind-rpass 1 "run rpass-valgrind tests with valgrind"
|
|
opt docs 1 "build standard library documentation"
|
|
opt compiler-docs 0 "build compiler documentation"
|
|
opt optimize-tests 1 "build tests with optimizations"
|
|
opt debuginfo-tests 0 "build tests with debugger metadata"
|
|
opt quiet-tests 0 "enable quieter output when running tests"
|
|
opt libcpp 1 "build llvm with libc++ instead of libstdc++ when using clang"
|
|
opt llvm-assertions 0 "build LLVM with assertions"
|
|
opt debug-assertions 0 "build with debugging assertions"
|
|
opt fast-make 0 "use .gitmodules as timestamp for submodule deps"
|
|
opt ccache 0 "invoke gcc/clang via ccache to reuse object files between builds"
|
|
opt sccache 0 "invoke gcc/clang via sccache to reuse object files between builds"
|
|
opt local-rust 0 "use an installed rustc rather than downloading a snapshot"
|
|
opt local-rebuild 0 "assume local-rust matches the current version, for rebuilds; implies local-rust, and is implied if local-rust already matches the current version"
|
|
opt llvm-static-stdcpp 0 "statically link to libstdc++ for LLVM"
|
|
opt llvm-link-shared 0 "prefer shared linking to LLVM (llvm-config --link-shared)"
|
|
opt rpath 1 "build rpaths into rustc itself"
|
|
opt stage0-landing-pads 1 "enable landing pads during bootstrap with stage0"
|
|
# This is used by the automation to produce single-target nightlies
|
|
opt dist-host-only 0 "only install bins for the host architecture"
|
|
opt inject-std-version 1 "inject the current compiler version of libstd into programs"
|
|
opt llvm-version-check 1 "check if the LLVM version is supported, build anyway"
|
|
opt rustbuild 1 "use the rust and cargo based build system"
|
|
opt codegen-tests 1 "run the src/test/codegen tests"
|
|
opt option-checking 1 "complain about unrecognized options in this configure script"
|
|
opt ninja 0 "build LLVM using the Ninja generator (for MSVC, requires building in the correct environment)"
|
|
opt vendor 0 "enable usage of vendored Rust crates"
|
|
opt sanitizers 0 "build the sanitizer runtimes (asan, lsan, msan, tsan)"
|
|
|
|
# Optimization and debugging options. These may be overridden by the release channel, etc.
|
|
opt_nosave optimize 1 "build optimized rust code"
|
|
opt_nosave optimize-cxx 1 "build optimized C++ code"
|
|
opt_nosave optimize-llvm 1 "build optimized LLVM"
|
|
opt_nosave llvm-assertions 0 "build LLVM with assertions"
|
|
opt_nosave debug-assertions 0 "build with debugging assertions"
|
|
opt_nosave llvm-release-debuginfo 0 "build LLVM with debugger metadata"
|
|
opt_nosave debuginfo 0 "build with debugger metadata"
|
|
opt_nosave debuginfo-lines 0 "build with line number debugger metadata"
|
|
opt_nosave debuginfo-only-std 0 "build only libstd with debugging information"
|
|
opt_nosave debug-jemalloc 0 "build jemalloc with --enable-debug --enable-fill"
|
|
|
|
valopt localstatedir "/var/lib" "local state directory"
|
|
valopt sysconfdir "/etc" "install system configuration files"
|
|
|
|
valopt datadir "${CFG_PREFIX}/share" "install data"
|
|
valopt infodir "${CFG_PREFIX}/share/info" "install additional info"
|
|
valopt llvm-root "" "set LLVM root"
|
|
valopt python "" "set path to python"
|
|
valopt jemalloc-root "" "set directory where libjemalloc_pic.a is located"
|
|
valopt build "${DEFAULT_BUILD}" "GNUs ./configure syntax LLVM build triple"
|
|
valopt android-cross-path "" "Android NDK standalone path (deprecated)"
|
|
valopt i686-linux-android-ndk "" "i686-linux-android NDK standalone path"
|
|
valopt arm-linux-androideabi-ndk "" "arm-linux-androideabi NDK standalone path"
|
|
valopt armv7-linux-androideabi-ndk "" "armv7-linux-androideabi NDK standalone path"
|
|
valopt aarch64-linux-android-ndk "" "aarch64-linux-android NDK standalone path"
|
|
valopt nacl-cross-path "" "NaCl SDK path (Pepper Canary is recommended). Must be absolute!"
|
|
valopt musl-root "/usr/local" "MUSL root installation directory (deprecated)"
|
|
valopt musl-root-x86_64 "" "x86_64-unknown-linux-musl install directory"
|
|
valopt musl-root-i686 "" "i686-unknown-linux-musl install directory"
|
|
valopt musl-root-arm "" "arm-unknown-linux-musleabi install directory"
|
|
valopt musl-root-armhf "" "arm-unknown-linux-musleabihf install directory"
|
|
valopt musl-root-armv7 "" "armv7-unknown-linux-musleabihf install directory"
|
|
valopt extra-filename "" "Additional data that is hashed and passed to the -C extra-filename flag"
|
|
valopt qemu-armhf-rootfs "" "rootfs in qemu testing, you probably don't want to use this"
|
|
|
|
if [ -e ${CFG_SRC_DIR}.git ]
|
|
then
|
|
valopt release-channel "dev" "the name of the release channel to build"
|
|
else
|
|
# If we have no git directory then we are probably a tarball distribution
|
|
# and should default to stable channel - Issue 28322
|
|
probe CFG_GIT git
|
|
msg "git: no git directory. Changing default release channel to stable"
|
|
valopt release-channel "stable" "the name of the release channel to build"
|
|
fi
|
|
|
|
# Used on systems where "cc" and "ar" are unavailable
|
|
valopt default-linker "cc" "the default linker"
|
|
valopt default-ar "ar" "the default ar"
|
|
|
|
# Many of these are saved below during the "writing configuration" step
|
|
# (others are conditionally saved).
|
|
opt_nosave manage-submodules 1 "let the build manage the git submodules"
|
|
opt_nosave clang 0 "prefer clang to gcc for building the runtime"
|
|
opt_nosave jemalloc 1 "build liballoc with jemalloc"
|
|
opt elf-tls 1 "elf thread local storage on platforms where supported"
|
|
opt full-bootstrap 0 "build three compilers instead of two"
|
|
opt extended 0 "build an extended rust tool set"
|
|
|
|
valopt_nosave prefix "/usr/local" "set installation prefix"
|
|
valopt_nosave local-rust-root "/usr/local" "set prefix for local rust binary"
|
|
valopt_nosave host "${CFG_BUILD}" "GNUs ./configure syntax LLVM host triples"
|
|
valopt_nosave target "${CFG_HOST}" "GNUs ./configure syntax LLVM target triples"
|
|
valopt_nosave mandir "${CFG_PREFIX}/share/man" "install man pages in PATH"
|
|
valopt_nosave docdir "${CFG_PREFIX}/share/doc/rust" "install documentation in PATH"
|
|
|
|
# On Windows this determines root of the subtree for target libraries.
|
|
# Host runtime libs always go to 'bin'.
|
|
valopt libdir "${CFG_PREFIX}/lib" "install libraries"
|
|
|
|
case "$CFG_LIBDIR" in
|
|
"$CFG_PREFIX"/*) CAT_INC=2;;
|
|
"$CFG_PREFIX"*) CAT_INC=1;;
|
|
*)
|
|
err "libdir must begin with the prefix. Use --prefix to set it accordingly.";;
|
|
esac
|
|
|
|
CFG_LIBDIR_RELATIVE=`echo ${CFG_LIBDIR} | cut -c$((${#CFG_PREFIX}+${CAT_INC}))-`
|
|
|
|
if [ $HELP -eq 1 ]
|
|
then
|
|
echo
|
|
exit 0
|
|
fi
|
|
|
|
# Validate Options
|
|
if [ -z "$CFG_DISABLE_OPTION_CHECKING" ]
|
|
then
|
|
step_msg "validating $CFG_SELF args"
|
|
validate_opt
|
|
fi
|
|
|
|
# Validate the release channel, and configure options
|
|
case "$CFG_RELEASE_CHANNEL" in
|
|
nightly )
|
|
msg "overriding settings for $CFG_RELEASE_CHANNEL"
|
|
enable_if_not_disabled llvm-assertions
|
|
# FIXME(stage0) re-enable this on the next stage0 now that #35566 is
|
|
# fixed
|
|
case "$CFG_BUILD" in
|
|
*-pc-windows-gnu)
|
|
;;
|
|
*)
|
|
CFG_ENABLE_DEBUGINFO_LINES=1
|
|
CFG_ENABLE_DEBUGINFO_ONLY_STD=1
|
|
;;
|
|
esac
|
|
|
|
;;
|
|
beta | stable)
|
|
msg "overriding settings for $CFG_RELEASE_CHANNEL"
|
|
case "$CFG_BUILD" in
|
|
*-pc-windows-gnu)
|
|
;;
|
|
*)
|
|
CFG_ENABLE_DEBUGINFO_LINES=1
|
|
CFG_ENABLE_DEBUGINFO_ONLY_STD=1
|
|
;;
|
|
esac
|
|
;;
|
|
dev)
|
|
;;
|
|
*)
|
|
err "release channel must be 'dev', 'nightly', 'beta' or 'stable'"
|
|
;;
|
|
esac
|
|
|
|
# Adjust perf and debug options for debug mode
|
|
if [ -n "$CFG_ENABLE_DEBUG" ]; then
|
|
msg "debug mode enabled, setting performance options"
|
|
if [ -z "$CFG_ENABLE_OPTIMIZE_PROVIDED" ]; then
|
|
msg "optimization not explicitly enabled, disabling optimization"
|
|
CFG_DISABLE_OPTIMIZE=1
|
|
CFG_DISABLE_OPTIMIZE_CXX=1
|
|
fi
|
|
|
|
# Set following variables to 1 unless setting already provided
|
|
enable_if_not_disabled debug-assertions
|
|
enable_if_not_disabled debug-jemalloc
|
|
enable_if_not_disabled debuginfo
|
|
enable_if_not_disabled llvm-assertions
|
|
fi
|
|
|
|
# OK, now write the debugging options
|
|
if [ -n "$CFG_DISABLE_OPTIMIZE" ]; then putvar CFG_DISABLE_OPTIMIZE; fi
|
|
if [ -n "$CFG_DISABLE_OPTIMIZE_CXX" ]; then putvar CFG_DISABLE_OPTIMIZE_CXX; fi
|
|
if [ -n "$CFG_DISABLE_OPTIMIZE_LLVM" ]; then putvar CFG_DISABLE_OPTIMIZE_LLVM; fi
|
|
if [ -n "$CFG_ENABLE_LLVM_ASSERTIONS" ]; then putvar CFG_ENABLE_LLVM_ASSERTIONS; fi
|
|
if [ -n "$CFG_ENABLE_DEBUG_ASSERTIONS" ]; then putvar CFG_ENABLE_DEBUG_ASSERTIONS; fi
|
|
if [ -n "$CFG_ENABLE_LLVM_RELEASE_DEBUGINFO" ]; then putvar CFG_ENABLE_LLVM_RELEASE_DEBUGINFO; fi
|
|
if [ -n "$CFG_ENABLE_DEBUGINFO" ]; then putvar CFG_ENABLE_DEBUGINFO; fi
|
|
if [ -n "$CFG_ENABLE_DEBUGINFO_LINES" ]; then putvar CFG_ENABLE_DEBUGINFO_LINES; fi
|
|
if [ -n "$CFG_ENABLE_DEBUGINFO_ONLY_STD" ]; then putvar CFG_ENABLE_DEBUGINFO_ONLY_STD; fi
|
|
if [ -n "$CFG_ENABLE_DEBUG_JEMALLOC" ]; then putvar CFG_ENABLE_DEBUG_JEMALLOC; fi
|
|
|
|
step_msg "looking for build programs"
|
|
|
|
probe_need CFG_CURL curl
|
|
if [ -z "$CFG_PYTHON_PROVIDED" ]; then
|
|
probe_need CFG_PYTHON python2.7 python2 python
|
|
fi
|
|
|
|
python_version=$($CFG_PYTHON -V 2>&1)
|
|
if [ $(echo $python_version | grep -c '^Python 2\.7') -ne 1 ]; then
|
|
err "Found $python_version, but Python 2.7 is required"
|
|
fi
|
|
|
|
# If we have no git directory then we are probably a tarball distribution
|
|
# and shouldn't attempt to load submodules
|
|
if [ ! -e ${CFG_SRC_DIR}.git ]
|
|
then
|
|
probe CFG_GIT git
|
|
msg "git: no git directory. disabling submodules"
|
|
CFG_DISABLE_MANAGE_SUBMODULES=1
|
|
else
|
|
probe_need CFG_GIT git
|
|
fi
|
|
|
|
# Use `md5sum` on GNU platforms, or `md5 -q` on BSD
|
|
probe CFG_MD5 md5
|
|
probe CFG_MD5SUM md5sum
|
|
if [ -n "$CFG_MD5" ]
|
|
then
|
|
CFG_HASH_COMMAND="$CFG_MD5 -q | cut -c 1-8"
|
|
elif [ -n "$CFG_MD5SUM" ]
|
|
then
|
|
CFG_HASH_COMMAND="$CFG_MD5SUM | cut -c 1-8"
|
|
else
|
|
err 'could not find one of: md5 md5sum'
|
|
fi
|
|
putvar CFG_HASH_COMMAND
|
|
|
|
probe CFG_CLANG clang++
|
|
probe CFG_CCACHE ccache
|
|
probe CFG_GCC gcc
|
|
probe CFG_LD ld
|
|
probe CFG_VALGRIND valgrind
|
|
probe CFG_PERF perf
|
|
probe CFG_ISCC iscc
|
|
probe CFG_ANTLR4 antlr4
|
|
probe CFG_GRUN grun
|
|
probe CFG_FLEX flex
|
|
probe CFG_BISON bison
|
|
probe CFG_GDB gdb
|
|
probe CFG_LLDB lldb
|
|
|
|
if [ -n "$CFG_ENABLE_NINJA" ]
|
|
then
|
|
probe CFG_NINJA ninja
|
|
if [ -z "$CFG_NINJA" ]
|
|
then
|
|
# On Debian and Fedora, the `ninja` binary is an IRC bot, so the build tool was
|
|
# renamed. Handle this case.
|
|
probe CFG_NINJA ninja-build
|
|
fi
|
|
fi
|
|
|
|
# For building LLVM
|
|
if [ -z "$CFG_LLVM_ROOT" ]
|
|
then
|
|
probe_need CFG_CMAKE cmake
|
|
fi
|
|
|
|
# On MacOS X, invoking `javac` pops up a dialog if the JDK is not
|
|
# installed. Since `javac` is only used if `antlr4` is available,
|
|
# probe for it only in this case.
|
|
if [ -n "$CFG_ANTLR4" ]
|
|
then
|
|
CFG_ANTLR4_JAR="\"$(find /usr/ -name antlr-complete.jar 2>/dev/null | head -n 1)\""
|
|
if [ "x" = "x$CFG_ANTLR4_JAR" ]
|
|
then
|
|
CFG_ANTLR4_JAR="\"$(find ~ -name antlr-complete.jar 2>/dev/null | head -n 1)\""
|
|
fi
|
|
putvar CFG_ANTLR4_JAR $CFG_ANTLR4_JAR
|
|
probe CFG_JAVAC javac
|
|
fi
|
|
|
|
# the valgrind rpass tests will fail if you don't have a valgrind, but they're
|
|
# only disabled if you opt out.
|
|
if [ -z "$CFG_VALGRIND" ]
|
|
then
|
|
# If the user has explicitly asked for valgrind tests, then fail
|
|
if [ -n "$CFG_ENABLE_VALGRIND" ] && [ -n "$CFG_ENABLE_VALGRIND_PROVIDED" ]
|
|
then
|
|
err "No valgrind present, but valgrind tests explicitly requested"
|
|
else
|
|
CFG_DISABLE_VALGRIND_RPASS=1
|
|
putvar CFG_DISABLE_VALGRIND_RPASS
|
|
fi
|
|
fi
|
|
|
|
if [ -n "$CFG_LLDB" ]
|
|
then
|
|
# Store LLDB's version
|
|
CFG_LLDB_VERSION=$($CFG_LLDB --version 2>/dev/null | head -1)
|
|
putvar CFG_LLDB_VERSION
|
|
|
|
# If CFG_LLDB_PYTHON_DIR is not already set from the outside and valid, try to read it from
|
|
# LLDB via the -P commandline options.
|
|
if [ -z "$CFG_LLDB_PYTHON_DIR" ] || [ ! -d "$CFG_LLDB_PYTHON_DIR" ]
|
|
then
|
|
CFG_LLDB_PYTHON_DIR=$($CFG_LLDB -P)
|
|
|
|
# If CFG_LLDB_PYTHON_DIR is not a valid directory, set it to something more readable
|
|
if [ ! -d "$CFG_LLDB_PYTHON_DIR" ]
|
|
then
|
|
CFG_LLDB_PYTHON_DIR="LLDB_PYTHON_DIRECTORY_NOT_FOUND"
|
|
fi
|
|
|
|
putvar CFG_LLDB_PYTHON_DIR
|
|
fi
|
|
fi
|
|
|
|
# LLDB tests on OSX require /usr/bin/python, not something like Homebrew's
|
|
# /usr/local/bin/python. We're loading a compiled module for LLDB tests which is
|
|
# only compatible with the system.
|
|
case $CFG_BUILD in
|
|
*-apple-darwin)
|
|
CFG_LLDB_PYTHON=/usr/bin/python
|
|
;;
|
|
*)
|
|
CFG_LLDB_PYTHON=$CFG_PYTHON
|
|
;;
|
|
esac
|
|
putvar CFG_LLDB_PYTHON
|
|
|
|
# Do some sanity checks if running on buildbot
|
|
# (these env vars are set by rust-buildbot)
|
|
if [ -n "$RUST_DIST_SERVER" -a -n "$ALLOW_NONZERO_RLIMIT_CORE" ]; then
|
|
# Frequently the llvm submodule directory is broken by the build
|
|
# being killed
|
|
llvm_lock="${CFG_SRC_DIR}/.git/modules/src/llvm/index.lock"
|
|
if [ -e "$llvm_lock" ]; then
|
|
step_msg "removing $llvm_lock"
|
|
rm -f "$llvm_lock"
|
|
fi
|
|
fi
|
|
|
|
step_msg "looking for target specific programs"
|
|
|
|
probe CFG_ADB adb
|
|
|
|
BIN_SUF=
|
|
if [ "$CFG_OSTYPE" = "pc-windows-gnu" ] || [ "$CFG_OSTYPE" = "pc-windows-msvc" ]
|
|
then
|
|
BIN_SUF=.exe
|
|
fi
|
|
|
|
# --enable-local-rebuild implies --enable-local-rust too
|
|
if [ -n "$CFG_ENABLE_LOCAL_REBUILD" ]
|
|
then
|
|
if [ -z "$CFG_ENABLE_LOCAL_RUST" ]
|
|
then
|
|
CFG_ENABLE_LOCAL_RUST=1
|
|
putvar CFG_ENABLE_LOCAL_RUST
|
|
fi
|
|
fi
|
|
|
|
if [ -n "$CFG_ENABLE_LOCAL_RUST" ]
|
|
then
|
|
system_rustc=$(which rustc)
|
|
if [ -f ${CFG_LOCAL_RUST_ROOT}/bin/rustc${BIN_SUF} ]
|
|
then
|
|
: # everything already configured
|
|
elif [ -n "$system_rustc" ]
|
|
then
|
|
# we assume that rustc is in a /bin directory
|
|
CFG_LOCAL_RUST_ROOT=${system_rustc%/bin/rustc}
|
|
else
|
|
err "no local rust to use"
|
|
fi
|
|
|
|
CMD="${CFG_LOCAL_RUST_ROOT}/bin/rustc${BIN_SUF}"
|
|
LRV=`LD_LIBRARY_PATH=${CFG_LOCAL_RUST_ROOT}/lib $CMD --version`
|
|
if [ $? -ne 0 ]
|
|
then
|
|
step_msg "failure while running $CMD --version"
|
|
exit 1
|
|
fi
|
|
step_msg "using rustc at: ${CFG_LOCAL_RUST_ROOT} with version: $LRV"
|
|
putvar CFG_LOCAL_RUST_ROOT
|
|
fi
|
|
|
|
# Same with jemalloc. save the setting here.
|
|
if [ -n "$CFG_DISABLE_JEMALLOC" ]
|
|
then
|
|
putvar CFG_DISABLE_JEMALLOC
|
|
fi
|
|
|
|
# All safeguards based on $CFG_ENABLE_CLANG should occur before this
|
|
# point in the script; after this point, script logic should inspect
|
|
# $CFG_USING_CLANG rather than $CFG_ENABLE_CLANG.
|
|
|
|
# Set CFG_{CC,CXX,CPP,CFLAGS,CXXFLAGS,LDFLAGS}
|
|
envopt CC
|
|
envopt CXX
|
|
envopt CPP
|
|
envopt CFLAGS
|
|
envopt CXXFLAGS
|
|
envopt LDFLAGS
|
|
|
|
# a little post-processing of various config values
|
|
CFG_PREFIX=${CFG_PREFIX%/}
|
|
CFG_MANDIR=${CFG_MANDIR%/}
|
|
CFG_DOCDIR=${CFG_DOCDIR%/}
|
|
CFG_HOST="$(echo $CFG_HOST | tr ',' ' ')"
|
|
CFG_TARGET="$(echo $CFG_TARGET | tr ',' ' ')"
|
|
CFG_SUPPORTED_TARGET=""
|
|
for target_file in ${CFG_SRC_DIR}mk/cfg/*.mk; do
|
|
CFG_SUPPORTED_TARGET="${CFG_SUPPORTED_TARGET} $(basename "$target_file" .mk)"
|
|
done
|
|
|
|
# copy build-triples to host-triples so that builds are a subset of hosts
|
|
V_TEMP=""
|
|
for i in $CFG_BUILD $CFG_HOST;
|
|
do
|
|
echo "$V_TEMP" | grep -qF $i || V_TEMP="$V_TEMP${V_TEMP:+ }$i"
|
|
done
|
|
CFG_HOST=$V_TEMP
|
|
|
|
# copy host-triples to target-triples so that hosts are a subset of targets
|
|
V_TEMP=""
|
|
for i in $CFG_HOST $CFG_TARGET;
|
|
do
|
|
echo "$V_TEMP" | grep -qF $i || V_TEMP="$V_TEMP${V_TEMP:+ }$i"
|
|
done
|
|
CFG_TARGET=$V_TEMP
|
|
|
|
step_msg "writing configuration"
|
|
|
|
putvar CFG_SRC_DIR
|
|
putvar CFG_SRC_DIR_RELATIVE
|
|
putvar CFG_BUILD_DIR
|
|
putvar CFG_OSTYPE
|
|
putvar CFG_CPUTYPE
|
|
putvar CFG_CONFIGURE_ARGS
|
|
putvar CFG_PREFIX
|
|
putvar CFG_HOST
|
|
putvar CFG_TARGET
|
|
putvar CFG_LIBDIR_RELATIVE
|
|
putvar CFG_DISABLE_MANAGE_SUBMODULES
|
|
putvar CFG_AARCH64_LINUX_ANDROID_NDK
|
|
putvar CFG_ARM_LINUX_ANDROIDEABI_NDK
|
|
putvar CFG_ARMV7_LINUX_ANDROIDEABI_NDK
|
|
putvar CFG_I686_LINUX_ANDROID_NDK
|
|
putvar CFG_NACL_CROSS_PATH
|
|
putvar CFG_MANDIR
|
|
putvar CFG_DOCDIR
|
|
putvar CFG_USING_LIBCPP
|
|
|
|
# Avoid spurious warnings from clang by feeding it original source on
|
|
# ccache-miss rather than preprocessed input.
|
|
if [ -n "$CFG_ENABLE_CCACHE" ] && [ -n "$CFG_USING_CLANG" ]
|
|
then
|
|
CFG_CCACHE_CPP2=1
|
|
putvar CFG_CCACHE_CPP2
|
|
fi
|
|
|
|
if [ -n "$CFG_ENABLE_CCACHE" ]
|
|
then
|
|
CFG_CCACHE_BASEDIR=${CFG_SRC_DIR}
|
|
putvar CFG_CCACHE_BASEDIR
|
|
fi
|
|
|
|
|
|
putvar CFG_LLVM_SRC_DIR
|
|
|
|
for t in $CFG_HOST
|
|
do
|
|
CFG_LLVM_BUILD_DIR=$(echo CFG_LLVM_BUILD_DIR_${t} | tr - _)
|
|
CFG_LLVM_INST_DIR=$(echo CFG_LLVM_INST_DIR_${t} | tr - _)
|
|
putvar $CFG_LLVM_BUILD_DIR
|
|
putvar $CFG_LLVM_INST_DIR
|
|
done
|
|
|
|
msg
|
|
copy_if_changed ${CFG_SRC_DIR}src/bootstrap/mk/Makefile.in ./Makefile
|
|
move_if_changed config.tmp config.mk
|
|
rm -f config.tmp
|
|
touch config.stamp
|
|
|
|
if [ -z "$CFG_ENABLE_DEBUG" ]; then
|
|
step_msg "configured in release mode. for development consider --enable-debug"
|
|
else
|
|
step_msg "complete"
|
|
fi
|
|
|
|
if [ "$CFG_SRC_DIR" = `pwd` ]; then
|
|
X_PY=x.py
|
|
else
|
|
X_PY=${CFG_SRC_DIR_RELATIVE}x.py
|
|
fi
|
|
|
|
msg "run \`python ${X_PY} --help\`"
|
|
msg
|