1 |
commit: a140a33f18fc4fa685d864b3c8301641321f05e7 |
2 |
Author: Aric Belsito <lluixhi <AT> gmail <DOT> com> |
3 |
AuthorDate: Thu Jun 28 16:51:12 2018 +0000 |
4 |
Commit: Aric Belsito <lluixhi <AT> gmail <DOT> com> |
5 |
CommitDate: Thu Jun 28 16:51:12 2018 +0000 |
6 |
URL: https://gitweb.gentoo.org/proj/musl.git/commit/?id=a140a33f |
7 |
|
8 |
sys-devel/clang: version bump to 6.0.1 |
9 |
|
10 |
sys-devel/clang/Manifest | 4 + |
11 |
sys-devel/clang/clang-6.0.1.ebuild | 334 +++++++++++++++++++++ |
12 |
...oss-DSO-CFI-Android-sanitizer-test-for-rt.patch | 30 ++ |
13 |
3 files changed, 368 insertions(+) |
14 |
|
15 |
diff --git a/sys-devel/clang/Manifest b/sys-devel/clang/Manifest |
16 |
index 96917f0..abed5a7 100644 |
17 |
--- a/sys-devel/clang/Manifest |
18 |
+++ b/sys-devel/clang/Manifest |
19 |
@@ -2,10 +2,12 @@ DIST cfe-4.0.1.src.tar.xz 10933628 BLAKE2B bc1bb8875e83ccecd446a48cfa41f5c98a09d |
20 |
DIST cfe-5.0.1.src.tar.xz 11483036 BLAKE2B c4eb54cd8271b62cf7a2219db0b599b68c00b6e574d1946220efbd1633e841796e6717d6eeb35e84a6db32a731a3285b59cedeb3b1a8f3c3c502b799fdd0a720 SHA512 6619177a2ff9934fe8b15d6aa229abb8e34d0b1a75228d9efba9393daf71d6419a7256de57b31e2f9f829f71f842118556f996e86ee076f1e0a7cd394dfd31a2 |
21 |
DIST cfe-5.0.2.src.tar.xz 11459216 BLAKE2B 80d9b2ab70b00c0dfd5c5386a44e0c15d8252e6175c9da55a0519c4f9b8192e32e215110d7d3808225786e2c7f906f2dfbe11dd09bdf21574e99709ae237ed0b SHA512 9931afceb5569ad6caec85d506180c810f7fea94af8c997143b0a37cbf413fcea0d92520478610627eeee1efb65fde684066ace0dfcbbf7b61ecd709d22dd0b1 |
22 |
DIST cfe-6.0.0.src.tar.xz 11959224 BLAKE2B 257edbaedf72bd941b67b4aa2f152a96a37bbea72d21d22d4445152685efe40d75b9a7a39955545643e841ad6693ef12e52b207b9119098774f39e858b64bc09 SHA512 e886dd27448503bbfc7fd4f68eb089c19b2f2be4f0e5b26d3df253833f60b91d70b472a6b530063386e2252075b110ce9f5942800feddf6c34b94a75cf7bd5c6 |
23 |
+DIST cfe-6.0.1.src.tar.xz 11905772 BLAKE2B abb60e9f9827d1d8a24f0aaf8a1d1e32979293cc401258d230f93290e633645747fd0344af189ac7081b06be2cada503364e1e432b37110ade4b3578e40c7605 SHA512 f64ba9290059f6e36fee41c8f32bf483609d31c291fcd2f77d41fecfdf3c8233a5e23b93a1c73fed03683823bd6e72757ed993dd32527de3d5f2b7a64bb031b9 |
24 |
DIST clang-tools-extra-4.0.1.src.tar.xz 581788 BLAKE2B 52ca89eda6fe1e0fbbdc46e17f4067f03a9a9440dcdcc98811651087d0c9ab24dfe3eefb0b80a32ec41abe0766cb3e47031de61c4cff02b7d0e08c8fd03e3faa SHA512 ea26d926f428e62e76cf8a073e63ffe05645f6592e05d7717d5c257908870ae9217727d3e1578227b14eda5937085872463f1a8e99970256179c68b8a92e69e0 |
25 |
DIST clang-tools-extra-5.0.1.src.tar.xz 646328 BLAKE2B 472eb1e73a17564790919ec392dddcd91f131c1cbf2a5f3cab09a9f7126d4d18ec6785ffcb3c3230eec6edc90acbe2bf859367c37f62ba77d7542f4c18b925f3 SHA512 2e6a811cccd22281f7567f5626ff0484ed1fefee4a9244a717e3ccb9516dce9e7ff315044fb10e505e91c3f1c6d2774558debb9559915d053886599bcb153d7b |
26 |
DIST clang-tools-extra-5.0.2.src.tar.xz 646272 BLAKE2B 8a15a0c3ed9e8c31706d744017aa8be52616037790075c2314c3a613c9e1aa86b0b980c4e3bd9a775b234440f17436392196b41f1691ab25a33b432a25affb68 SHA512 241d85652e7c3ad5d77754ad9a694bddab3c14098067da4119223007c5a4a765d1cd7e7c7dba91666ccd5506f8703c82c9ee487f28249a00c2c4edbd0d1f2640 |
27 |
DIST clang-tools-extra-6.0.0.src.tar.xz 757680 BLAKE2B 708e21055a702c41a94f6b8673bab405f8b1339a75ec66f14c31565ef802245900bafc25e636c6e82f01e74060a6429a19442317f948011cae59af6825808343 SHA512 9c5720b8694c235ca988ef45da1d564ac06e31c0a40600b32c0b9df399693e4eba296ca43b077ed97adba085362ddb0fb94e0d28232afc3e7351820b1285061f |
28 |
+DIST clang-tools-extra-6.0.1.src.tar.xz 757256 BLAKE2B 1d91d7459a34e7251007af91db1803ee6d04f1ef3e0fcf134a7e0d1d3456b094a80339ee60db3f0bdd12961f3a05caee7edfc5c6b9c48d49cd55a5dc3c102c3a SHA512 cf29d117b6dabcb7a8e5f6dab5016ce5a5c8f475679001a43fd5c935f2c368f37cdef50aae2080a1e4524f647f6d83458d4a5dec5b45d03fb374f463caf7c3f5 |
29 |
DIST llvm-4.0.1.src.tar.xz 21065652 BLAKE2B 6327eed2d1feb108440f22d2581d1ff86c10a10c29793538d8d899c7e2dc83d3f7b147d3fd4bcce2bd2bf57c071b08c624aeafe40a3e7a3914506e7751727e6c SHA512 16adc39b34ddb628f81b171119a8e2a0e9138b25011e803ef0b688e2fbea116fc4953d3a1b61b90a98a75e33619f81566b7cb06a9a2ea4d04ac5e0eb303a2d1d |
30 |
DIST llvm-5.0.1-manpages.tar.bz2 94004 BLAKE2B 34eb29361ad7aa881e64d1dd2992fd89ce44adafd2521284c27b6ffe7082bc7e70458204e6f34d582b704bf7c5dad93c6a6dc41fc7abc41862aab8f5ec53ed07 SHA512 3444cc8e06009f5dd2669b92af662a1049d9294c8ca0dcf45486e1dc1aaf10160860b7856d30ad70bbe5864b21d1539316e89f5237549f5653954e23baf64334 |
31 |
DIST llvm-5.0.1.src.tar.xz 23428720 BLAKE2B 3db4d33df21018d17eef0042c0d8d82a8412bd5daa99cfb5405a6ec83c5774178fa76b220e8731c2a9a64dabf898aa90fe29c685327bd63a4f078e8e94a9a77e SHA512 bee1d45fca15ce725b1f2b1339b13eb6f750a3a321cfd099075477ec25835a8ca55b5366172c4aad46592dfd8afe372349ecf264f581463d017f9cee2d63c1cb |
32 |
@@ -13,4 +15,6 @@ DIST llvm-5.0.2-manpages.tar.bz2 93977 BLAKE2B 8c5e8899e0df9d6037fb7d5c373de6492 |
33 |
DIST llvm-5.0.2.src.tar.xz 23451868 BLAKE2B b7082be2e4ad557b29b9f6869811f262adcf5c73d552faf91b339bede75cf5eab58afefa12fa779a38be71fe2b8f4ea297c3213ee4e8370cc01972c59249d91c SHA512 3588be5ed969c3f7f6f16f56a12a6af2814d3d3c960d4a36ffebb0446cc75f19220bccee7fc605f9b01f5d5c188a905a046193cc12dec42dd5922048b5c27fe1 |
34 |
DIST llvm-6.0.0-manpages.tar.bz2 102668 BLAKE2B f458cbfcfdd6600f90f9bbe8cd9681de3dc11c62dbfcaa5ba7a281ad30d6367c33bebd5090c255e85a10b00b7bcb9c988d340b67f1db51982f55956acba109e9 SHA512 a7ed3e246e6488254f19dbb8484c079be39bc52f9b2fab3f736dd013683b7f46e8e036ee571dec5066c86ee7c25713608a2426555e8ad04b81891912314ee48e |
35 |
DIST llvm-6.0.0.src.tar.xz 25296048 BLAKE2B 7ea90bb63d6f26cfbc1c1ed2f243b0fcd8ad2ceb7963cf768d262cd55e9a0c71a9cfdea0333fb220faacf4540d924d2512532774dcfb52b52490ad74e38c09e0 SHA512 a71fdd5ddc46f01327ad891cfcc198febdbe10769c57f14d8a4fb7d514621ee4080e1a641200d3353c16a16731d390270499ec6cd3dc98fadc570f3eb6b52b8c |
36 |
+DIST llvm-6.0.1-manpages.tar.bz2 102656 BLAKE2B 9088ca0bdda69f63354e61b7495df54505d5db2504bc61860a7260343722ec8cdd5e937d0843263a5bf5077b9cf386c337fa127039b996bab10d2ca5c2caeb59 SHA512 c468e97a2d5610aee9e72cb795e4e65375a079d733550f05380230fb44ba0ed67d407ad06e2340b66f13d19c06583b657e8d01fcdca2146ae43964cea309e0b3 |
37 |
+DIST llvm-6.0.1.src.tar.xz 25306628 BLAKE2B 60232d4d22f8096b565cc8d81fea0639f24f14e8fc4f66ade69fa15479181f07f655f26dff3fa24bf105762b495da316c5c9352db234bd0af6b9c3fff6d4d881 SHA512 cbbb00eb99cfeb4aff623ee1a5ba075e7b5a76fc00c5f9f539ff28c108598f5708a0369d5bd92683def5a20c2fe60cab7827b42d628dbfcc79b57e0e91b84dd9 |
38 |
DIST llvm-manpages-4.0.1.tar.bz2 87981 BLAKE2B 79ffd254ee5c6e09159c954913ef820f74107d4fcea5e3ed82592dc36af8fdfbf1e850547ba8bfc20aa9a5ecdd26c50329e6a6d558ae3aa5475a930789ce3e01 SHA512 d5b3213567c25db58ef364d272314a79c311a80fc21d98c09a5540af45a8190a38f489228663fe9a9b63bf0f2b952c460c4196a8fc8d6f221619f6e7ed2fc415 |
39 |
|
40 |
diff --git a/sys-devel/clang/clang-6.0.1.ebuild b/sys-devel/clang/clang-6.0.1.ebuild |
41 |
new file mode 100644 |
42 |
index 0000000..db1615a |
43 |
--- /dev/null |
44 |
+++ b/sys-devel/clang/clang-6.0.1.ebuild |
45 |
@@ -0,0 +1,334 @@ |
46 |
+# Copyright 1999-2018 Gentoo Foundation |
47 |
+# Distributed under the terms of the GNU General Public License v2 |
48 |
+ |
49 |
+EAPI=6 |
50 |
+ |
51 |
+: ${CMAKE_MAKEFILE_GENERATOR:=ninja} |
52 |
+# (needed due to CMAKE_BUILD_TYPE != Gentoo) |
53 |
+CMAKE_MIN_VERSION=3.7.0-r1 |
54 |
+PYTHON_COMPAT=( python2_7 ) |
55 |
+ |
56 |
+inherit cmake-utils eapi7-ver flag-o-matic llvm \ |
57 |
+ multilib-minimal multiprocessing pax-utils prefix python-single-r1 \ |
58 |
+ toolchain-funcs |
59 |
+ |
60 |
+MY_P=cfe-${PV/_/}.src |
61 |
+EXTRA_P=clang-tools-extra-${PV/_/}.src |
62 |
+LLVM_P=llvm-${PV/_/}.src |
63 |
+ |
64 |
+DESCRIPTION="C language family frontend for LLVM" |
65 |
+HOMEPAGE="https://llvm.org/" |
66 |
+SRC_URI="https://releases.llvm.org/${PV/_//}/${MY_P}.tar.xz |
67 |
+ https://releases.llvm.org/${PV/_//}/${EXTRA_P}.tar.xz |
68 |
+ test? ( https://releases.llvm.org/${PV/_//}/${LLVM_P}.tar.xz ) |
69 |
+ !doc? ( https://dev.gentoo.org/~mgorny/dist/llvm/llvm-${PV}-manpages.tar.bz2 )" |
70 |
+ |
71 |
+# Keep in sync with sys-devel/llvm |
72 |
+ALL_LLVM_TARGETS=( AArch64 AMDGPU ARM BPF Hexagon Lanai Mips MSP430 |
73 |
+ NVPTX PowerPC Sparc SystemZ X86 XCore ) |
74 |
+ALL_LLVM_TARGETS=( "${ALL_LLVM_TARGETS[@]/#/llvm_targets_}" ) |
75 |
+LLVM_TARGET_USEDEPS=${ALL_LLVM_TARGETS[@]/%/?} |
76 |
+ |
77 |
+LICENSE="UoI-NCSA" |
78 |
+SLOT="$(ver_cut 1)" |
79 |
+KEYWORDS="~amd64 ~arm64 ~ppc64 ~x86 ~amd64-fbsd ~amd64-linux ~ppc-macos ~x64-macos ~x86-macos" |
80 |
+IUSE="debug default-compiler-rt default-libcxx doc hardened +static-analyzer |
81 |
+ test xml z3 kernel_FreeBSD ${ALL_LLVM_TARGETS[*]}" |
82 |
+RESTRICT="!test? ( test )" |
83 |
+ |
84 |
+RDEPEND=" |
85 |
+ ~sys-devel/llvm-${PV}:${SLOT}=[debug=,${LLVM_TARGET_USEDEPS// /,},${MULTILIB_USEDEP}] |
86 |
+ static-analyzer? ( |
87 |
+ dev-lang/perl:* |
88 |
+ z3? ( sci-mathematics/z3:0= ) |
89 |
+ ) |
90 |
+ xml? ( dev-libs/libxml2:2=[${MULTILIB_USEDEP}] ) |
91 |
+ ${PYTHON_DEPS}" |
92 |
+# configparser-3.2 breaks the build (3.3 or none at all are fine) |
93 |
+DEPEND="${RDEPEND} |
94 |
+ doc? ( dev-python/sphinx ) |
95 |
+ xml? ( virtual/pkgconfig ) |
96 |
+ !!<dev-python/configparser-3.3.0.2 |
97 |
+ ${PYTHON_DEPS}" |
98 |
+RDEPEND="${RDEPEND} |
99 |
+ !<sys-devel/llvm-4.0.0_rc:0 |
100 |
+ !sys-devel/clang:0" |
101 |
+PDEPEND=" |
102 |
+ sys-devel/clang-common |
103 |
+ ~sys-devel/clang-runtime-${PV} |
104 |
+ default-compiler-rt? ( =sys-libs/compiler-rt-${PV%_*}* ) |
105 |
+ default-libcxx? ( >=sys-libs/libcxx-${PV} )" |
106 |
+ |
107 |
+REQUIRED_USE="${PYTHON_REQUIRED_USE} |
108 |
+ || ( ${ALL_LLVM_TARGETS[*]} )" |
109 |
+ |
110 |
+# We need extra level of indirection for CLANG_RESOURCE_DIR |
111 |
+S=${WORKDIR}/x/y/${MY_P} |
112 |
+ |
113 |
+# least intrusive of all |
114 |
+CMAKE_BUILD_TYPE=RelWithDebInfo |
115 |
+ |
116 |
+PATCHES=( |
117 |
+ # add Prefix include paths for Darwin |
118 |
+ "${FILESDIR}"/5.0.1/darwin_prefix-include-paths.patch |
119 |
+ |
120 |
+ # fix test failure with default-compiler-rt |
121 |
+ # https://bugs.gentoo.org/650316 |
122 |
+ "${FILESDIR}"/6.0.1/0002-test-Fix-Cross-DSO-CFI-Android-sanitizer-test-for-rt.patch |
123 |
+ |
124 |
+ # IsGentooLinux() is only used in hardened patches at the moment |
125 |
+ "${FILESDIR}"/6.0.0/0003-Add-Gentoo-Linux-distro.patch |
126 |
+) |
127 |
+HARDENED_PATCHES=( |
128 |
+ "${FILESDIR}"/6.0.0/hardened/0001-Use-z-relro-on-Gentoo.patch |
129 |
+ "${FILESDIR}"/6.0.0/hardened/0002-Enable-Stack-Protector-by-default.patch |
130 |
+ "${FILESDIR}"/6.0.0/hardened/0003-Enable-PIE-by-default.patch |
131 |
+ "${FILESDIR}"/6.0.0/hardened/0004-Enable-FORTIFY_SOURCE-macro-by-default.patch |
132 |
+ "${FILESDIR}"/6.0.0/hardened/0005-Link-with-z-now-by-default-for-Gentoo.patch |
133 |
+) |
134 |
+ |
135 |
+# Multilib notes: |
136 |
+# 1. ABI_* flags control ABIs libclang* is built for only. |
137 |
+# 2. clang is always capable of compiling code for all ABIs for enabled |
138 |
+# target. However, you will need appropriate crt* files (installed |
139 |
+# e.g. by sys-devel/gcc and sys-libs/glibc). |
140 |
+# 3. ${CHOST}-clang wrappers are always installed for all ABIs included |
141 |
+# in the current profile (i.e. alike supported by sys-devel/gcc). |
142 |
+# |
143 |
+# Therefore: use sys-devel/clang[${MULTILIB_USEDEP}] only if you need |
144 |
+# multilib clang* libraries (not runtime, not wrappers). |
145 |
+ |
146 |
+pkg_setup() { |
147 |
+ LLVM_MAX_SLOT=${SLOT} llvm_pkg_setup |
148 |
+ python-single-r1_pkg_setup |
149 |
+} |
150 |
+ |
151 |
+src_unpack() { |
152 |
+ # create extra parent dir for CLANG_RESOURCE_DIR |
153 |
+ mkdir -p x/y || die |
154 |
+ cd x/y || die |
155 |
+ |
156 |
+ einfo "Unpacking ${MY_P}.tar.xz ..." |
157 |
+ tar -xf "${DISTDIR}/${MY_P}.tar.xz" || die |
158 |
+ einfo "Unpacking ${EXTRA_P}.tar.xz ..." |
159 |
+ tar -xf "${DISTDIR}/${EXTRA_P}.tar.xz" || die |
160 |
+ |
161 |
+ mv "${EXTRA_P}" "${S}"/tools/extra || die |
162 |
+ if use test; then |
163 |
+ einfo "Unpacking parts of ${LLVM_P}.tar.xz ..." |
164 |
+ tar -xf "${DISTDIR}/${LLVM_P}.tar.xz" \ |
165 |
+ "${LLVM_P}"/utils/{lit,llvm-lit,unittest} || die |
166 |
+ mv "${LLVM_P}" "${WORKDIR}"/llvm || die |
167 |
+ fi |
168 |
+ |
169 |
+ if ! use doc; then |
170 |
+ einfo "Unpacking llvm-${PV}-manpages.tar.bz2 ..." |
171 |
+ tar -xf "${DISTDIR}/llvm-${PV}-manpages.tar.bz2" || die |
172 |
+ fi |
173 |
+} |
174 |
+ |
175 |
+src_prepare() { |
176 |
+ use hardened && eapply "${HARDENED_PATCHES[@]}" |
177 |
+ |
178 |
+ cmake-utils_src_prepare |
179 |
+ eprefixify lib/Frontend/InitHeaderSearch.cpp |
180 |
+} |
181 |
+ |
182 |
+multilib_src_configure() { |
183 |
+ local llvm_version=$(llvm-config --version) || die |
184 |
+ local clang_version=$(ver_cut 1-3 "${llvm_version}") |
185 |
+ |
186 |
+ local mycmakeargs=( |
187 |
+ # ensure that the correct llvm-config is used |
188 |
+ -DLLVM_CONFIG="$(type -P "${CHOST}-llvm-config")" |
189 |
+ -DCMAKE_INSTALL_PREFIX="${EPREFIX}/usr/lib/llvm/${SLOT}" |
190 |
+ -DCMAKE_INSTALL_MANDIR="${EPREFIX}/usr/lib/llvm/${SLOT}/share/man" |
191 |
+ # relative to bindir |
192 |
+ -DCLANG_RESOURCE_DIR="../../../../lib/clang/${clang_version}" |
193 |
+ |
194 |
+ -DBUILD_SHARED_LIBS=ON |
195 |
+ -DLLVM_TARGETS_TO_BUILD="${LLVM_TARGETS// /;}" |
196 |
+ -DLLVM_BUILD_TESTS=$(usex test) |
197 |
+ |
198 |
+ # these are not propagated reliably, so redefine them |
199 |
+ -DLLVM_ENABLE_EH=ON |
200 |
+ -DLLVM_ENABLE_RTTI=ON |
201 |
+ |
202 |
+ -DCMAKE_DISABLE_FIND_PACKAGE_LibXml2=$(usex !xml) |
203 |
+ # libgomp support fails to find headers without explicit -I |
204 |
+ # furthermore, it provides only syntax checking |
205 |
+ -DCLANG_DEFAULT_OPENMP_RUNTIME=libomp |
206 |
+ |
207 |
+ # override default stdlib and rtlib |
208 |
+ -DCLANG_DEFAULT_CXX_STDLIB=$(usex default-libcxx libc++ "") |
209 |
+ -DCLANG_DEFAULT_RTLIB=$(usex default-compiler-rt compiler-rt "") |
210 |
+ |
211 |
+ -DCLANG_ENABLE_ARCMT=$(usex static-analyzer) |
212 |
+ -DCLANG_ENABLE_STATIC_ANALYZER=$(usex static-analyzer) |
213 |
+ # z3 is not multilib-friendly |
214 |
+ -DCLANG_ANALYZER_BUILD_Z3=$(multilib_native_usex z3) |
215 |
+ ) |
216 |
+ use test && mycmakeargs+=( |
217 |
+ -DLLVM_MAIN_SRC_DIR="${WORKDIR}/llvm" |
218 |
+ -DLLVM_LIT_ARGS="-vv;-j;${LIT_JOBS:-$(makeopts_jobs "${MAKEOPTS}" "$(get_nproc)")}" |
219 |
+ ) |
220 |
+ |
221 |
+ if multilib_is_native_abi; then |
222 |
+ mycmakeargs+=( |
223 |
+ # normally copied from LLVM_INCLUDE_DOCS but the latter |
224 |
+ # is lacking value in stand-alone builds |
225 |
+ -DCLANG_INCLUDE_DOCS=$(usex doc) |
226 |
+ -DCLANG_TOOLS_EXTRA_INCLUDE_DOCS=$(usex doc) |
227 |
+ ) |
228 |
+ use doc && mycmakeargs+=( |
229 |
+ -DLLVM_BUILD_DOCS=ON |
230 |
+ -DLLVM_ENABLE_SPHINX=ON |
231 |
+ -DCLANG_INSTALL_SPHINX_HTML_DIR="${EPREFIX}/usr/share/doc/${PF}/html" |
232 |
+ -DCLANG-TOOLS_INSTALL_SPHINX_HTML_DIR="${EPREFIX}/usr/share/doc/${PF}/tools-extra" |
233 |
+ -DSPHINX_WARNINGS_AS_ERRORS=OFF |
234 |
+ ) |
235 |
+ use z3 && mycmakeargs+=( |
236 |
+ -DZ3_INCLUDE_DIR="${EPREFIX}/usr/include/z3" |
237 |
+ ) |
238 |
+ else |
239 |
+ mycmakeargs+=( |
240 |
+ -DLLVM_TOOL_CLANG_TOOLS_EXTRA_BUILD=OFF |
241 |
+ ) |
242 |
+ fi |
243 |
+ |
244 |
+ if [[ -n ${EPREFIX} ]]; then |
245 |
+ mycmakeargs+=( |
246 |
+ -DGCC_INSTALL_PREFIX="${EPREFIX}/usr" |
247 |
+ ) |
248 |
+ fi |
249 |
+ |
250 |
+ if tc-is-cross-compiler; then |
251 |
+ [[ -x "/usr/bin/clang-tblgen" ]] \ |
252 |
+ || die "/usr/bin/clang-tblgen not found or usable" |
253 |
+ mycmakeargs+=( |
254 |
+ -DCMAKE_CROSSCOMPILING=ON |
255 |
+ -DCLANG_TABLEGEN=/usr/bin/clang-tblgen |
256 |
+ ) |
257 |
+ fi |
258 |
+ |
259 |
+ # LLVM_ENABLE_ASSERTIONS=NO does not guarantee this for us, #614844 |
260 |
+ use debug || local -x CPPFLAGS="${CPPFLAGS} -DNDEBUG" |
261 |
+ cmake-utils_src_configure |
262 |
+} |
263 |
+ |
264 |
+multilib_src_compile() { |
265 |
+ cmake-utils_src_compile |
266 |
+ |
267 |
+ # provide a symlink for tests |
268 |
+ if [[ ! -L ${WORKDIR}/lib/clang ]]; then |
269 |
+ mkdir -p "${WORKDIR}"/lib || die |
270 |
+ ln -s "${BUILD_DIR}/$(get_libdir)/clang" "${WORKDIR}"/lib/clang || die |
271 |
+ fi |
272 |
+} |
273 |
+ |
274 |
+multilib_src_test() { |
275 |
+ # respect TMPDIR! |
276 |
+ local -x LIT_PRESERVES_TMP=1 |
277 |
+ cmake-utils_src_make check-clang |
278 |
+ multilib_is_native_abi && cmake-utils_src_make check-clang-tools |
279 |
+} |
280 |
+ |
281 |
+src_install() { |
282 |
+ MULTILIB_WRAPPED_HEADERS=( |
283 |
+ /usr/include/clang/Config/config.h |
284 |
+ ) |
285 |
+ |
286 |
+ multilib-minimal_src_install |
287 |
+ |
288 |
+ # Move runtime headers to /usr/lib/clang, where they belong |
289 |
+ mv "${ED%/}"/usr/include/clangrt "${ED%/}"/usr/lib/clang || die |
290 |
+ # move (remaining) wrapped headers back |
291 |
+ mv "${ED%/}"/usr/include "${ED%/}"/usr/lib/llvm/${SLOT}/include || die |
292 |
+ |
293 |
+ # Apply CHOST and version suffix to clang tools |
294 |
+ # note: we use two version components here (vs 3 in runtime path) |
295 |
+ local llvm_version=$(llvm-config --version) || die |
296 |
+ local clang_version=$(ver_cut 1-2 "${llvm_version}") |
297 |
+ local clang_full_version=$(ver_cut 1-3 "${llvm_version}") |
298 |
+ local clang_tools=( clang clang++ clang-cl clang-cpp ) |
299 |
+ local abi i |
300 |
+ |
301 |
+ # cmake gives us: |
302 |
+ # - clang-X.Y |
303 |
+ # - clang -> clang-X.Y |
304 |
+ # - clang++, clang-cl, clang-cpp -> clang |
305 |
+ # we want to have: |
306 |
+ # - clang-X.Y |
307 |
+ # - clang++-X.Y, clang-cl-X.Y, clang-cpp-X.Y -> clang-X.Y |
308 |
+ # - clang, clang++, clang-cl, clang-cpp -> clang*-X.Y |
309 |
+ # also in CHOST variant |
310 |
+ for i in "${clang_tools[@]:1}"; do |
311 |
+ rm "${ED%/}/usr/lib/llvm/${SLOT}/bin/${i}" || die |
312 |
+ dosym "clang-${clang_version}" "/usr/lib/llvm/${SLOT}/bin/${i}-${clang_version}" |
313 |
+ dosym "${i}-${clang_version}" "/usr/lib/llvm/${SLOT}/bin/${i}" |
314 |
+ done |
315 |
+ |
316 |
+ # now create target symlinks for all supported ABIs |
317 |
+ for abi in $(get_all_abis); do |
318 |
+ local abi_chost=$(get_abi_CHOST "${abi}") |
319 |
+ for i in "${clang_tools[@]}"; do |
320 |
+ dosym "${i}-${clang_version}" \ |
321 |
+ "/usr/lib/llvm/${SLOT}/bin/${abi_chost}-${i}-${clang_version}" |
322 |
+ dosym "${abi_chost}-${i}-${clang_version}" \ |
323 |
+ "/usr/lib/llvm/${SLOT}/bin/${abi_chost}-${i}" |
324 |
+ done |
325 |
+ done |
326 |
+ |
327 |
+ # Remove unnecessary headers on FreeBSD, bug #417171 |
328 |
+ if use kernel_FreeBSD; then |
329 |
+ rm "${ED}"usr/lib/clang/${clang_full_version}/include/{std,float,iso,limits,tgmath,varargs}*.h || die |
330 |
+ fi |
331 |
+} |
332 |
+ |
333 |
+multilib_src_install() { |
334 |
+ cmake-utils_src_install |
335 |
+ |
336 |
+ # move headers to /usr/include for wrapping & ABI mismatch checks |
337 |
+ # (also drop the version suffix from runtime headers) |
338 |
+ rm -rf "${ED%/}"/usr/include || die |
339 |
+ mv "${ED%/}"/usr/lib/llvm/${SLOT}/include "${ED%/}"/usr/include || die |
340 |
+ mv "${ED%/}"/usr/lib/llvm/${SLOT}/$(get_libdir)/clang "${ED%/}"/usr/include/clangrt || die |
341 |
+} |
342 |
+ |
343 |
+multilib_src_install_all() { |
344 |
+ python_fix_shebang "${ED}" |
345 |
+ if use static-analyzer; then |
346 |
+ python_optimize "${ED}"usr/lib/llvm/${SLOT}/share/scan-view |
347 |
+ fi |
348 |
+ |
349 |
+ # install pre-generated manpages |
350 |
+ if ! use doc; then |
351 |
+ insinto "/usr/lib/llvm/${SLOT}/share/man/man1" |
352 |
+ doins "${WORKDIR}/x/y/llvm-${PV}-manpages/clang"/*.1 |
353 |
+ fi |
354 |
+ |
355 |
+ docompress "/usr/lib/llvm/${SLOT}/share/man" |
356 |
+ # match 'html' non-compression |
357 |
+ use doc && docompress -x "/usr/share/doc/${PF}/tools-extra" |
358 |
+ # +x for some reason; TODO: investigate |
359 |
+ use static-analyzer && fperms a-x "/usr/lib/llvm/${SLOT}/share/man/man1/scan-build.1" |
360 |
+} |
361 |
+ |
362 |
+pkg_postinst() { |
363 |
+ if [[ ${ROOT} == / && -f ${EPREFIX}/usr/share/eselect/modules/compiler-shadow.eselect ]] ; then |
364 |
+ eselect compiler-shadow update all |
365 |
+ fi |
366 |
+ |
367 |
+ elog "You can find additional utility scripts in:" |
368 |
+ elog " ${EROOT}/usr/lib/llvm/${SLOT}/share/clang" |
369 |
+ elog "To use these scripts, you will need Python 2.7. Some of them are vim" |
370 |
+ elog "integration scripts (with instructions inside). The run-clang-tidy.py" |
371 |
+ elog "scripts requires the following additional package:" |
372 |
+ elog " dev-python/pyyaml" |
373 |
+} |
374 |
+ |
375 |
+pkg_postrm() { |
376 |
+ if [[ ${ROOT} == / && -f ${EPREFIX}/usr/share/eselect/modules/compiler-shadow.eselect ]] ; then |
377 |
+ eselect compiler-shadow clean all |
378 |
+ fi |
379 |
+} |
380 |
|
381 |
diff --git a/sys-devel/clang/files/6.0.1/0002-test-Fix-Cross-DSO-CFI-Android-sanitizer-test-for-rt.patch b/sys-devel/clang/files/6.0.1/0002-test-Fix-Cross-DSO-CFI-Android-sanitizer-test-for-rt.patch |
382 |
new file mode 100644 |
383 |
index 0000000..0c66448 |
384 |
--- /dev/null |
385 |
+++ b/sys-devel/clang/files/6.0.1/0002-test-Fix-Cross-DSO-CFI-Android-sanitizer-test-for-rt.patch |
386 |
@@ -0,0 +1,30 @@ |
387 |
+From f81bc3f2d174ac21e576cdddb736524531258fbe Mon Sep 17 00:00:00 2001 |
388 |
+From: =?UTF-8?q?Micha=C5=82=20G=C3=B3rny?= <mgorny@g.o> |
389 |
+Date: Mon, 19 Mar 2018 20:55:47 +0100 |
390 |
+Subject: [PATCH 2/2] [test] Fix Cross-DSO CFI Android sanitizer test for |
391 |
+ -rtlib=compiler-rt |
392 |
+ |
393 |
+Fix the CHECK-CFI-CROSS-DSO-ANDROID test to be more precise and match |
394 |
+specifically 'clang_rt.cfi' rather than any compiler-rt library. This |
395 |
+fixes the failure when the linker command-line contains |
396 |
+clang_rt.builtins library due to CLANG_DEFAULT_RTLIB=compiler-rt. |
397 |
+--- |
398 |
+ test/Driver/sanitizer-ld.c | 2 +- |
399 |
+ 1 file changed, 1 insertion(+), 1 deletion(-) |
400 |
+ |
401 |
+diff --git a/test/Driver/sanitizer-ld.c b/test/Driver/sanitizer-ld.c |
402 |
+index 0da4255f69..9309450186 100644 |
403 |
+--- a/test/Driver/sanitizer-ld.c |
404 |
++++ b/test/Driver/sanitizer-ld.c |
405 |
+@@ -514,7 +514,7 @@ |
406 |
+ // RUN: --sysroot=%S/Inputs/basic_android_tree \ |
407 |
+ // RUN: | FileCheck --check-prefix=CHECK-CFI-CROSS-DSO-ANDROID %s |
408 |
+ // CHECK-CFI-CROSS-DSO-ANDROID: "{{.*}}ld{{(.exe)?}}" |
409 |
+-// CHECK-CFI-CROSS-DSO-ANDROID-NOT: libclang_rt. |
410 |
++// CHECK-CFI-CROSS-DSO-ANDROID-NOT: libclang_rt.cfi |
411 |
+ |
412 |
+ // Cross-DSO CFI with diagnostics on Android links just the UBSAN runtime. |
413 |
+ // RUN: %clang -fsanitize=cfi -fsanitize-cfi-cross-dso %s -### -o %t.o 2>&1 \ |
414 |
+-- |
415 |
+2.16.2 |
416 |
+ |