Gentoo Archives: gentoo-commits

From: "Michał Górny" <mgorny@g.o>
To: gentoo-commits@l.g.o
Subject: [gentoo-commits] repo/gentoo:master commit in: sys-libs/compiler-rt-sanitizers/
Date: Tue, 30 Nov 2021 10:01:39
Message-Id: 1638266480.8bebe30663e024c248e12a2fcfec899586511873.mgorny@gentoo
1 commit: 8bebe30663e024c248e12a2fcfec899586511873
2 Author: Michał Górny <mgorny <AT> gentoo <DOT> org>
3 AuthorDate: Tue Nov 30 09:44:46 2021 +0000
4 Commit: Michał Górny <mgorny <AT> gentoo <DOT> org>
5 CommitDate: Tue Nov 30 10:01:20 2021 +0000
6 URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=8bebe306
7
8 sys-libs/compiler-rt-sanitizers: Bump to 13.0.1_rc1
9
10 Signed-off-by: Michał Górny <mgorny <AT> gentoo.org>
11
12 sys-libs/compiler-rt-sanitizers/Manifest | 2 +
13 .../compiler-rt-sanitizers-13.0.1_rc1.ebuild | 205 +++++++++++++++++++++
14 2 files changed, 207 insertions(+)
15
16 diff --git a/sys-libs/compiler-rt-sanitizers/Manifest b/sys-libs/compiler-rt-sanitizers/Manifest
17 index 7e77b1dabc73..d366da9434ba 100644
18 --- a/sys-libs/compiler-rt-sanitizers/Manifest
19 +++ b/sys-libs/compiler-rt-sanitizers/Manifest
20 @@ -1,7 +1,9 @@
21 DIST llvm-gentoo-patchset-11.1.0-3.tar.xz 5984 BLAKE2B 89056fb8e82c7a29ae76c643ac631876d51391ffb579324aaf13c7f79e03f6fd8bbcb27d46e57e0f04a702602ebf51c116e82cb092452a1dbc97fb0eb7518f11 SHA512 08aabe8836b62ecfde4e264d567169ba495d5b5915b56aba35ae86992387e534bba6d512fde94056e641abe909b478e47edcbdaa3ee0b94182ecd68c98201441
22 DIST llvm-gentoo-patchset-12.0.1.tar.xz 5280 BLAKE2B 963d005bc7b636570be90eb841ac5bcaeb927538cc7de27683167111a17d6496677c7517de2ecfaf14b5d8ac22bad357be490b8a2ed9aba502fd5f447ecc99e9 SHA512 fc7c38e671555751650299c3a8bee44d5c7f26e11b68d5538c507fb7fe9ff2d349bdcd43bce90a448a747f082d523b3849d6bcda5e3ae2e998edcb926d6aa249
23 DIST llvm-gentoo-patchset-13.0.0.tar.xz 5012 BLAKE2B 6760c78c086aaf6629143fd920b0a2c68cad9278628fbea8164dfeb59db95984a5b5d6b3505b510c697e8c95bf8d2be782c6b73c01622d52f2da9b07ecff39e0 SHA512 7764d49343b795b6bebae64f646ba27e3e6cc2a20b8a1aee645ce0d8474633c34acfbb73c08546fee415755dd4ea5a98c1d84db5e394cf5f4fc802eb61148ab6
24 +DIST llvm-gentoo-patchset-13.0.1-rc1.tar.xz 5988 BLAKE2B 8f1d295d4b6937518d9e0cc00cc2ba9e12ff9773b35261f0985b2d2a4ed1e3363a7f961cb385728b5ae552d0e129d99d11e63958d32c3353b0a79a88ba5cc0d5 SHA512 8272c423a5e0e99d412bb449794ba2e8134aca69d09e90e93555dbd3b7549d6ce4d68617ca11074af0a35a6f6830bf0330cbc672c5a56054cfd824e3ac1900ea
25 DIST llvm-gentoo-patchset-9999-1.tar.xz 4032 BLAKE2B b9413484dafed8ae0c68c2c164b45fd07bb8d5d0898f03abe118fd2120ffcb1fb6c949de9649a97c2e8105f24b9d131a725c67c0a502ca4d4d192c1a0d65f49d SHA512 e64449eeaf756c5bd945109937b84ba4bd8a015222bd792d39cf3947871e87571a4ca57814790e51544cb05ad4c2d1f044e818e4caaac7c2e2a02cb1aa290fcc
26 DIST llvmorg-11.1.0.tar.gz 122776532 BLAKE2B ca842ff4afff8f44c82b5e7383962a9c45ca1c93b64fa4c6ebcd70a1d3849dbad2b8e4e24fba02d144c6266d7fab3607ebc6999b28c229cb35256cf40f26a985 SHA512 9a8ce022a935eed42fa71a224f2a207122aadcbef58ee855fdb4825f879e7d028e4dcff22c19b9d336db1c8bf63fb84372d44981acf84615f757e54306c92b81
27 DIST llvmorg-12.0.1.tar.gz 134259748 BLAKE2B f41de787bc73ff2edfda1b22cc8602be6f65f37dd9e4c8888533cfa8c3ccdcf4f108aaab9de23ab0ab987966eb160f2a553a0bdff99461e71ddd5bfcd086090d SHA512 6eb0dc18e2c25935fabfdfc48b0114be0939158dfdef7b85b395fe2e71042672446af0e68750aae003c9847d10d1f63316fe95d3df738d18f249174292b1b9e1
28 DIST llvmorg-13.0.0.tar.gz 147270176 BLAKE2B 628f316b580e1edf3a58d4825b724df759e6ed2a4116802470c04562caefc392fa325c91f388036365a2e45a9595cca6d3557fab12984fc8bcfef29c9116d822 SHA512 8004c05d32b9720fb3391783621690c1df9bd1e97e72cbff9192ed88a84b0acd303b61432145fa917b5b5e548c8cee29b24ef8547dcc8677adf4816e7a8a0eb2
29 +DIST llvmorg-13.0.1-rc1.tar.gz 147284646 BLAKE2B 3a1d8d382de633b7f8fc998f8ad1e03c24b733aefc591615cbd34115d1d6d74962ae33bbf2224527b521a76930ffee425527225563a558a04173e9aa9487c781 SHA512 d487bfc9b898ad0046e0c94338d7757d8a05a1a84d683abfbc9ed4994c6d12caf88fd18575225e284070fc67b3ac0970ca6639e61b1a7cc2948b216a5364a22d
30
31 diff --git a/sys-libs/compiler-rt-sanitizers/compiler-rt-sanitizers-13.0.1_rc1.ebuild b/sys-libs/compiler-rt-sanitizers/compiler-rt-sanitizers-13.0.1_rc1.ebuild
32 new file mode 100644
33 index 000000000000..8c47c346f451
34 --- /dev/null
35 +++ b/sys-libs/compiler-rt-sanitizers/compiler-rt-sanitizers-13.0.1_rc1.ebuild
36 @@ -0,0 +1,205 @@
37 +# Copyright 1999-2021 Gentoo Authors
38 +# Distributed under the terms of the GNU General Public License v2
39 +
40 +EAPI=7
41 +
42 +PYTHON_COMPAT=( python3_{8..10} )
43 +inherit check-reqs cmake flag-o-matic llvm llvm.org python-any-r1
44 +
45 +DESCRIPTION="Compiler runtime libraries for clang (sanitizers & xray)"
46 +HOMEPAGE="https://llvm.org/"
47 +
48 +LICENSE="Apache-2.0-with-LLVM-exceptions || ( UoI-NCSA MIT )"
49 +SLOT="$(ver_cut 1-3)"
50 +KEYWORDS=""
51 +IUSE="+clang debug test elibc_glibc"
52 +# base targets
53 +IUSE+=" +libfuzzer +memprof +orc +profile +xray"
54 +# sanitizer targets, keep in sync with config-ix.cmake
55 +# NB: ubsan, scudo deliberately match two entries
56 +SANITIZER_FLAGS=(
57 + asan dfsan lsan msan hwasan tsan ubsan safestack cfi scudo
58 + shadowcallstack gwp-asan
59 +)
60 +IUSE+=" ${SANITIZER_FLAGS[@]/#/+}"
61 +REQUIRED_USE="
62 + || ( ${SANITIZER_FLAGS[*]} libfuzzer orc profile xray )
63 + test? (
64 + cfi? ( ubsan )
65 + gwp-asan? ( scudo )
66 + )"
67 +RESTRICT="!test? ( test ) !clang? ( test )"
68 +
69 +CLANG_SLOT=${SLOT%%.*}
70 +# llvm-6 for new lit options
71 +DEPEND="
72 + >=sys-devel/llvm-6
73 + virtual/libcrypt"
74 +BDEPEND="
75 + >=dev-util/cmake-3.16
76 + clang? ( sys-devel/clang )
77 + elibc_glibc? ( net-libs/libtirpc )
78 + test? (
79 + !<sys-apps/sandbox-2.13
80 + $(python_gen_any_dep ">=dev-python/lit-5[\${PYTHON_USEDEP}]")
81 + =sys-devel/clang-${PV%_*}*:${CLANG_SLOT}
82 + sys-libs/compiler-rt:${SLOT}
83 + )
84 + ${PYTHON_DEPS}"
85 +
86 +LLVM_COMPONENTS=( compiler-rt )
87 +LLVM_TEST_COMPONENTS=( llvm/lib/Testing/Support llvm/utils/unittest )
88 +LLVM_PATCHSET=${PV/_/-}
89 +llvm.org_set_globals
90 +
91 +python_check_deps() {
92 + use test || return 0
93 + has_version "dev-python/lit[${PYTHON_USEDEP}]"
94 +}
95 +
96 +check_space() {
97 + if use test; then
98 + local CHECKREQS_DISK_BUILD=11G
99 + check-reqs_pkg_pretend
100 + fi
101 +}
102 +
103 +pkg_pretend() {
104 + check_space
105 +}
106 +
107 +pkg_setup() {
108 + check_space
109 + llvm_pkg_setup
110 + python-any-r1_pkg_setup
111 +}
112 +
113 +src_prepare() {
114 + sed -i -e 's:-Werror::' lib/tsan/go/buildgo.sh || die
115 +
116 + local flag
117 + for flag in "${SANITIZER_FLAGS[@]}"; do
118 + if ! use "${flag}"; then
119 + local cmake_flag=${flag/-/_}
120 + sed -i -e "/COMPILER_RT_HAS_${cmake_flag^^}/s:TRUE:FALSE:" \
121 + cmake/config-ix.cmake || die
122 + fi
123 + done
124 +
125 + # TODO: fix these tests to be skipped upstream
126 + if use asan && ! use profile; then
127 + rm test/asan/TestCases/asan_and_llvm_coverage_test.cpp || die
128 + fi
129 + if use ubsan && ! use cfi; then
130 + > test/cfi/CMakeLists.txt || die
131 + fi
132 +
133 + llvm.org_src_prepare
134 +}
135 +
136 +src_configure() {
137 + # LLVM_ENABLE_ASSERTIONS=NO does not guarantee this for us, #614844
138 + use debug || local -x CPPFLAGS="${CPPFLAGS} -DNDEBUG"
139 +
140 + # pre-set since we need to pass it to cmake
141 + BUILD_DIR=${WORKDIR}/compiler-rt_build
142 +
143 + if use clang; then
144 + local -x CC=${CHOST}-clang
145 + local -x CXX=${CHOST}-clang++
146 + strip-unsupported-flags
147 + fi
148 +
149 + local flag want_sanitizer=OFF
150 + for flag in "${SANITIZER_FLAGS[@]}"; do
151 + if use "${flag}"; then
152 + want_sanitizer=ON
153 + break
154 + fi
155 + done
156 +
157 + local mycmakeargs=(
158 + -DCOMPILER_RT_INSTALL_PATH="${EPREFIX}/usr/lib/clang/${SLOT}"
159 + # use a build dir structure consistent with install
160 + # this makes it possible to easily deploy test-friendly clang
161 + -DCOMPILER_RT_OUTPUT_DIR="${BUILD_DIR}/lib/clang/${SLOT}"
162 +
163 + -DCOMPILER_RT_INCLUDE_TESTS=$(usex test)
164 + # builtins & crt installed by sys-libs/compiler-rt
165 + -DCOMPILER_RT_BUILD_BUILTINS=OFF
166 + -DCOMPILER_RT_BUILD_CRT=OFF
167 + -DCOMPILER_RT_BUILD_LIBFUZZER=$(usex libfuzzer)
168 + -DCOMPILER_RT_BUILD_MEMPROF=$(usex memprof)
169 + -DCOMPILER_RT_BUILD_ORC=$(usex orc)
170 + -DCOMPILER_RT_BUILD_PROFILE=$(usex profile)
171 + -DCOMPILER_RT_BUILD_SANITIZERS="${want_sanitizer}"
172 + -DCOMPILER_RT_BUILD_XRAY=$(usex xray)
173 +
174 + -DPython3_EXECUTABLE="${PYTHON}"
175 + )
176 + if use test; then
177 + mycmakeargs+=(
178 + -DLLVM_MAIN_SRC_DIR="${WORKDIR}/llvm"
179 + -DLLVM_EXTERNAL_LIT="${EPREFIX}/usr/bin/lit"
180 + -DLLVM_LIT_ARGS="$(get_lit_flags)"
181 +
182 + # they are created during src_test()
183 + -DCOMPILER_RT_TEST_COMPILER="${BUILD_DIR}/lib/llvm/${CLANG_SLOT}/bin/clang"
184 + -DCOMPILER_RT_TEST_CXX_COMPILER="${BUILD_DIR}/lib/llvm/${CLANG_SLOT}/bin/clang++"
185 + )
186 +
187 + # same flags are passed for build & tests, so we need to strip
188 + # them down to a subset supported by clang
189 + CC=${EPREFIX}/usr/lib/llvm/${CLANG_SLOT}/bin/clang \
190 + CXX=${EPREFIX}/usr/lib/llvm/${CLANG_SLOT}/bin/clang++ \
191 + strip-unsupported-flags
192 + fi
193 +
194 + if use prefix && [[ "${CHOST}" == *-darwin* ]] ; then
195 + mycmakeargs+=(
196 + # setting -isysroot is disabled with compiler-rt-prefix-paths.patch
197 + # this allows adding arm64 support using SDK in EPREFIX
198 + -DDARWIN_macosx_CACHED_SYSROOT="${EPREFIX}/MacOSX.sdk"
199 + # Set version based on the SDK in EPREFIX
200 + # This disables i386 for SDK >= 10.15
201 + # Will error if has_use tsan and SDK < 10.12
202 + -DDARWIN_macosx_OVERRIDE_SDK_VERSION="$(realpath ${EPREFIX}/MacOSX.sdk | sed -e 's/.*MacOSX\(.*\)\.sdk/\1/')"
203 + # Use our libtool instead of looking it up with xcrun
204 + -DCMAKE_LIBTOOL="${EPREFIX}/usr/bin/${CHOST}-libtool"
205 + )
206 + fi
207 +
208 + cmake_src_configure
209 +
210 + if use test; then
211 + local sys_dir=( "${EPREFIX}"/usr/lib/clang/${SLOT}/lib/* )
212 + [[ -e ${sys_dir} ]] || die "Unable to find ${sys_dir}"
213 + [[ ${#sys_dir[@]} -eq 1 ]] || die "Non-deterministic compiler-rt install: ${sys_dir[*]}"
214 +
215 + # copy clang over since resource_dir is located relatively to binary
216 + # therefore, we can put our new libraries in it
217 + mkdir -p "${BUILD_DIR}"/lib/{llvm/${CLANG_SLOT}/{bin,$(get_libdir)},clang/${SLOT}/include} || die
218 + cp "${EPREFIX}"/usr/lib/llvm/${CLANG_SLOT}/bin/clang{,++} \
219 + "${BUILD_DIR}"/lib/llvm/${CLANG_SLOT}/bin/ || die
220 + cp "${EPREFIX}"/usr/lib/clang/${SLOT}/include/*.h \
221 + "${BUILD_DIR}"/lib/clang/${SLOT}/include/ || die
222 + cp "${sys_dir}"/*builtins*.a \
223 + "${BUILD_DIR}/lib/clang/${SLOT}/lib/${sys_dir##*/}/" || die
224 + # we also need LLVMgold.so for gold-based tests
225 + if [[ -f ${EPREFIX}/usr/lib/llvm/${CLANG_SLOT}/$(get_libdir)/LLVMgold.so ]]; then
226 + ln -s "${EPREFIX}"/usr/lib/llvm/${CLANG_SLOT}/$(get_libdir)/LLVMgold.so \
227 + "${BUILD_DIR}"/lib/llvm/${CLANG_SLOT}/$(get_libdir)/ || die
228 + fi
229 + fi
230 +}
231 +
232 +src_test() {
233 + # respect TMPDIR!
234 + local -x LIT_PRESERVES_TMP=1
235 + # disable sandbox to have it stop clobbering LD_PRELOAD
236 + local -x SANDBOX_ON=0
237 + # wipe LD_PRELOAD to make ASAN happy
238 + local -x LD_PRELOAD=
239 +
240 + cmake_build check-all
241 +}