toolchain-wrapper.c 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548
  1. /**
  2. * Buildroot wrapper for toolchains. This simply executes the real toolchain
  3. * with a number of arguments (sysroot/arch/..) hardcoded, to ensure the
  4. * toolchain uses the correct configuration.
  5. * The hardcoded path arguments are defined relative to the actual location
  6. * of the binary.
  7. *
  8. * (C) 2011 Peter Korsgaard <jacmet@sunsite.dk>
  9. * (C) 2011 Daniel Nyström <daniel.nystrom@timeterminal.se>
  10. * (C) 2012 Arnout Vandecappelle (Essensium/Mind) <arnout@mind.be>
  11. * (C) 2013 Spenser Gilliland <spenser@gillilanding.com>
  12. *
  13. * This file is licensed under the terms of the GNU General Public License
  14. * version 2. This program is licensed "as is" without any warranty of any
  15. * kind, whether express or implied.
  16. */
  17. #define _GNU_SOURCE
  18. #include <stdio.h>
  19. #include <string.h>
  20. #include <limits.h>
  21. #include <unistd.h>
  22. #include <stdlib.h>
  23. #include <errno.h>
  24. #include <time.h>
  25. #include <stdbool.h>
  26. #ifdef BR_CCACHE
  27. static char ccache_path[PATH_MAX];
  28. #endif
  29. static char path[PATH_MAX];
  30. static char sysroot[PATH_MAX];
  31. /* As would be defined by gcc:
  32. * https://gcc.gnu.org/onlinedocs/cpp/Standard-Predefined-Macros.html
  33. * sizeof() on string literals includes the terminating \0. */
  34. static char _time_[sizeof("-D__TIME__=\"HH:MM:SS\"")];
  35. static char _date_[sizeof("-D__DATE__=\"MMM DD YYYY\"")];
  36. /* Maximum amount of arguments to reserve space for by default.
  37. Must be > predef_args */
  38. #define DEFAULT_MAX_ARGS 1024
  39. static char *predef_args[] = {
  40. #ifdef BR_CCACHE
  41. ccache_path,
  42. #endif
  43. path,
  44. "--sysroot", sysroot,
  45. #ifdef BR_ABI
  46. "-mabi=" BR_ABI,
  47. #endif
  48. #ifdef BR_NAN
  49. "-mnan=" BR_NAN,
  50. #endif
  51. #ifdef BR_FPU
  52. "-mfpu=" BR_FPU,
  53. #endif
  54. #ifdef BR_SOFTFLOAT
  55. "-msoft-float",
  56. #endif /* BR_SOFTFLOAT */
  57. #ifdef BR_MODE
  58. "-m" BR_MODE,
  59. #endif
  60. #ifdef BR_64
  61. "-m64",
  62. #endif
  63. #ifdef BR_OMIT_LOCK_PREFIX
  64. "-Wa,-momit-lock-prefix=yes",
  65. #endif
  66. #ifdef BR_NO_FUSED_MADD
  67. "-mno-fused-madd",
  68. #endif
  69. #ifdef BR_FP_CONTRACT_OFF
  70. "-ffp-contract=off",
  71. #endif
  72. #ifdef BR_BINFMT_FLAT
  73. "-Wl,-elf2flt",
  74. #endif
  75. #ifdef BR_MIPS_TARGET_LITTLE_ENDIAN
  76. "-EL",
  77. #endif
  78. #if defined(BR_MIPS_TARGET_BIG_ENDIAN) || defined(BR_ARC_TARGET_BIG_ENDIAN)
  79. "-EB",
  80. #endif
  81. #ifdef BR_ADDITIONAL_CFLAGS
  82. BR_ADDITIONAL_CFLAGS
  83. #endif
  84. };
  85. /* A {string,length} tuple, to avoid computing strlen() on constants.
  86. * - str must be a \0-terminated string
  87. * - len does not account for the terminating '\0'
  88. */
  89. struct str_len_s {
  90. const char *str;
  91. size_t len;
  92. };
  93. /* Define a {string,length} tuple. Takes an unquoted constant string as
  94. * parameter. sizeof() on a string literal includes the terminating \0,
  95. * but we don't want to count it.
  96. */
  97. #define STR_LEN(s) { #s, sizeof(#s)-1 }
  98. /* List of paths considered unsafe for cross-compilation.
  99. *
  100. * An unsafe path is one that points to a directory with libraries or
  101. * headers for the build machine, which are not suitable for the target.
  102. */
  103. static const struct str_len_s unsafe_paths[] = {
  104. STR_LEN(/lib),
  105. STR_LEN(/usr/include),
  106. STR_LEN(/usr/lib),
  107. STR_LEN(/usr/local/include),
  108. STR_LEN(/usr/local/lib),
  109. STR_LEN(/usr/X11R6/include),
  110. STR_LEN(/usr/X11R6/lib),
  111. { NULL, 0 },
  112. };
  113. /* Unsafe options are options that specify a potentially unsafe path,
  114. * that will be checked by check_unsafe_path(), below.
  115. */
  116. static const struct str_len_s unsafe_opts[] = {
  117. STR_LEN(-I),
  118. STR_LEN(-idirafter),
  119. STR_LEN(-iquote),
  120. STR_LEN(-isystem),
  121. STR_LEN(-L),
  122. { NULL, 0 },
  123. };
  124. /* Check if path is unsafe for cross-compilation. Unsafe paths are those
  125. * pointing to the standard native include or library paths.
  126. *
  127. * We print the arguments leading to the failure. For some options, gcc
  128. * accepts the path to be concatenated to the argument (e.g. -I/foo/bar)
  129. * or separated (e.g. -I /foo/bar). In the first case, we need only print
  130. * the argument as it already contains the path (arg_has_path), while in
  131. * the second case we need to print both (!arg_has_path).
  132. */
  133. static void check_unsafe_path(const char *arg,
  134. const char *path,
  135. int arg_has_path)
  136. {
  137. const struct str_len_s *p;
  138. for (p=unsafe_paths; p->str; p++) {
  139. if (strncmp(path, p->str, p->len))
  140. continue;
  141. fprintf(stderr,
  142. "%s: ERROR: unsafe header/library path used in cross-compilation: '%s%s%s'\n",
  143. program_invocation_short_name,
  144. arg,
  145. arg_has_path ? "" : "' '", /* close single-quote, space, open single-quote */
  146. arg_has_path ? "" : path); /* so that arg and path are properly quoted. */
  147. exit(1);
  148. }
  149. }
  150. #ifdef BR_NEED_SOURCE_DATE_EPOCH
  151. /* Returns false if SOURCE_DATE_EPOCH was not defined in the environment.
  152. *
  153. * Returns true if SOURCE_DATE_EPOCH is in the environment and represent
  154. * a valid timestamp, in which case the timestamp is formatted into the
  155. * global variables _date_ and _time_.
  156. *
  157. * Aborts if SOURCE_DATE_EPOCH was set in the environment but did not
  158. * contain a valid timestamp.
  159. *
  160. * Valid values are defined in the spec:
  161. * https://reproducible-builds.org/specs/source-date-epoch/
  162. * but we further restrict them to be positive or null.
  163. */
  164. bool parse_source_date_epoch_from_env(void)
  165. {
  166. char *epoch_env, *endptr;
  167. time_t epoch;
  168. struct tm epoch_tm;
  169. if ((epoch_env = getenv("SOURCE_DATE_EPOCH")) == NULL)
  170. return false;
  171. errno = 0;
  172. epoch = (time_t) strtoll(epoch_env, &endptr, 10);
  173. /* We just need to test if it is incorrect, but we do not
  174. * care why it is incorrect.
  175. */
  176. if ((errno != 0) || !*epoch_env || *endptr || (epoch < 0)) {
  177. fprintf(stderr, "%s: invalid SOURCE_DATE_EPOCH='%s'\n",
  178. program_invocation_short_name,
  179. epoch_env);
  180. exit(1);
  181. }
  182. tzset(); /* For localtime_r(), below. */
  183. if (localtime_r(&epoch, &epoch_tm) == NULL) {
  184. fprintf(stderr, "%s: cannot parse SOURCE_DATE_EPOCH=%s\n",
  185. program_invocation_short_name,
  186. getenv("SOURCE_DATE_EPOCH"));
  187. exit(1);
  188. }
  189. if (!strftime(_time_, sizeof(_time_), "-D__TIME__=\"%T\"", &epoch_tm)) {
  190. fprintf(stderr, "%s: cannot set time from SOURCE_DATE_EPOCH=%s\n",
  191. program_invocation_short_name,
  192. getenv("SOURCE_DATE_EPOCH"));
  193. exit(1);
  194. }
  195. if (!strftime(_date_, sizeof(_date_), "-D__DATE__=\"%b %e %Y\"", &epoch_tm)) {
  196. fprintf(stderr, "%s: cannot set date from SOURCE_DATE_EPOCH=%s\n",
  197. program_invocation_short_name,
  198. getenv("SOURCE_DATE_EPOCH"));
  199. exit(1);
  200. }
  201. return true;
  202. }
  203. #else
  204. bool parse_source_date_epoch_from_env(void)
  205. {
  206. /* The compiler is recent enough to handle SOURCE_DATE_EPOCH itself
  207. * so we do not need to do anything here.
  208. */
  209. return false;
  210. }
  211. #endif
  212. int main(int argc, char **argv)
  213. {
  214. char **args, **cur, **exec_args;
  215. char *relbasedir, *absbasedir;
  216. char *progpath = argv[0];
  217. char *basename;
  218. char *env_debug;
  219. int ret, i, count = 0, debug = 0, found_shared = 0, found_nonoption = 0;
  220. size_t n_args;
  221. /* Debug the wrapper to see arguments it was called with.
  222. * If environment variable BR2_DEBUG_WRAPPER is:
  223. * unset, empty, or 0: do not trace
  224. * set to 1 : trace all arguments on a single line
  225. * set to 2 : trace one argument per line
  226. */
  227. if ((env_debug = getenv("BR2_DEBUG_WRAPPER"))) {
  228. debug = atoi(env_debug);
  229. }
  230. if (debug > 0) {
  231. fprintf(stderr, "Toolchain wrapper was called with:");
  232. for (i = 0; i < argc; i++)
  233. fprintf(stderr, "%s'%s'",
  234. (debug == 2) ? "\n " : " ", argv[i]);
  235. fprintf(stderr, "\n");
  236. }
  237. /* Calculate the relative paths */
  238. basename = strrchr(progpath, '/');
  239. if (basename) {
  240. *basename = '\0';
  241. basename++;
  242. relbasedir = malloc(strlen(progpath) + 7);
  243. if (relbasedir == NULL) {
  244. perror(__FILE__ ": malloc");
  245. return 2;
  246. }
  247. sprintf(relbasedir, "%s/..", argv[0]);
  248. absbasedir = realpath(relbasedir, NULL);
  249. } else {
  250. basename = progpath;
  251. absbasedir = malloc(PATH_MAX + 1);
  252. ret = readlink("/proc/self/exe", absbasedir, PATH_MAX);
  253. if (ret < 0) {
  254. perror(__FILE__ ": readlink");
  255. return 2;
  256. }
  257. absbasedir[ret] = '\0';
  258. for (i = ret; i > 0; i--) {
  259. if (absbasedir[i] == '/') {
  260. absbasedir[i] = '\0';
  261. if (++count == 2)
  262. break;
  263. }
  264. }
  265. }
  266. if (absbasedir == NULL) {
  267. perror(__FILE__ ": realpath");
  268. return 2;
  269. }
  270. /* Fill in the relative paths */
  271. #ifdef BR_CROSS_PATH_REL
  272. ret = snprintf(path, sizeof(path), "%s/" BR_CROSS_PATH_REL "/%s" BR_CROSS_PATH_SUFFIX, absbasedir, basename);
  273. #elif defined(BR_CROSS_PATH_ABS)
  274. ret = snprintf(path, sizeof(path), BR_CROSS_PATH_ABS "/%s" BR_CROSS_PATH_SUFFIX, basename);
  275. #else
  276. ret = snprintf(path, sizeof(path), "%s/bin/%s" BR_CROSS_PATH_SUFFIX, absbasedir, basename);
  277. #endif
  278. if (ret >= sizeof(path)) {
  279. perror(__FILE__ ": overflow");
  280. return 3;
  281. }
  282. /* any non-option (E.G. source / object files) arguments passed? */
  283. for (i = 1; i < argc; i++) {
  284. if (argv[i][0] != '-') {
  285. found_nonoption = 1;
  286. break;
  287. }
  288. }
  289. /* Check for unsafe library and header paths */
  290. for (i = 1; i < argc; i++) {
  291. const struct str_len_s *opt;
  292. for (opt=unsafe_opts; opt->str; opt++ ) {
  293. /* Skip any non-unsafe option. */
  294. if (strncmp(argv[i], opt->str, opt->len))
  295. continue;
  296. /* Handle both cases:
  297. * - path is a separate argument,
  298. * - path is concatenated with option.
  299. */
  300. if (argv[i][opt->len] == '\0') {
  301. i++;
  302. if (i == argc)
  303. break;
  304. check_unsafe_path(argv[i-1], argv[i], 0);
  305. } else
  306. check_unsafe_path(argv[i], argv[i] + opt->len, 1);
  307. }
  308. }
  309. #ifdef BR_CCACHE
  310. ret = snprintf(ccache_path, sizeof(ccache_path), "%s/bin/ccache", absbasedir);
  311. if (ret >= sizeof(ccache_path)) {
  312. perror(__FILE__ ": overflow");
  313. return 3;
  314. }
  315. #endif
  316. ret = snprintf(sysroot, sizeof(sysroot), "%s/" BR_SYSROOT, absbasedir);
  317. if (ret >= sizeof(sysroot)) {
  318. perror(__FILE__ ": overflow");
  319. return 3;
  320. }
  321. cur = args = malloc(DEFAULT_MAX_ARGS * sizeof(char *));
  322. if (args == NULL) {
  323. perror(__FILE__ ": malloc");
  324. return 2;
  325. }
  326. /* start with predefined args */
  327. for (i = 0; i < sizeof(predef_args) / sizeof(predef_args[0]); i++) {
  328. /* skip linker flags when we know we are not linking */
  329. if (found_nonoption || strncmp(predef_args[i], "-Wl,", strlen("-Wl,")))
  330. *cur++ = predef_args[i];
  331. }
  332. #ifdef BR_FLOAT_ABI
  333. /* add float abi if not overridden in args */
  334. for (i = 1; i < argc; i++) {
  335. if (!strncmp(argv[i], "-mfloat-abi=", strlen("-mfloat-abi=")) ||
  336. !strcmp(argv[i], "-msoft-float") ||
  337. !strcmp(argv[i], "-mhard-float"))
  338. break;
  339. }
  340. if (i == argc)
  341. *cur++ = "-mfloat-abi=" BR_FLOAT_ABI;
  342. #endif
  343. #ifdef BR_FP32_MODE
  344. /* add fp32 mode if soft-float is not args or hard-float overrides soft-float */
  345. int add_fp32_mode = 1;
  346. for (i = 1; i < argc; i++) {
  347. if (!strcmp(argv[i], "-msoft-float"))
  348. add_fp32_mode = 0;
  349. else if (!strcmp(argv[i], "-mhard-float"))
  350. add_fp32_mode = 1;
  351. }
  352. if (add_fp32_mode == 1)
  353. *cur++ = "-mfp" BR_FP32_MODE;
  354. #endif
  355. #if defined(BR_ARCH) || \
  356. defined(BR_CPU)
  357. /* Add our -march/cpu flags, but only if none of
  358. * -march/mtune/mcpu are already specified on the commandline
  359. */
  360. for (i = 1; i < argc; i++) {
  361. if (!strncmp(argv[i], "-march=", strlen("-march=")) ||
  362. !strncmp(argv[i], "-mtune=", strlen("-mtune=")) ||
  363. !strncmp(argv[i], "-mcpu=", strlen("-mcpu=" )))
  364. break;
  365. }
  366. if (i == argc) {
  367. #ifdef BR_ARCH
  368. *cur++ = "-march=" BR_ARCH;
  369. #endif
  370. #ifdef BR_CPU
  371. *cur++ = "-mcpu=" BR_CPU;
  372. #endif
  373. }
  374. #endif /* ARCH || CPU */
  375. if (parse_source_date_epoch_from_env()) {
  376. *cur++ = _time_;
  377. *cur++ = _date_;
  378. /* This has existed since gcc-4.4.0. */
  379. *cur++ = "-Wno-builtin-macro-redefined";
  380. }
  381. #ifdef BR2_PIC_PIE
  382. /* Patterned after Fedora/Gentoo hardening approaches.
  383. * https://fedoraproject.org/wiki/Changes/Harden_All_Packages
  384. * https://wiki.gentoo.org/wiki/Hardened/Toolchain#Position_Independent_Executables_.28PIEs.29
  385. *
  386. * A few checks are added to allow disabling of PIE
  387. * 1) -fno-pie and -no-pie are used by other distros to disable PIE in
  388. * cases where the compiler enables it by default. The logic below
  389. * maintains that behavior.
  390. * Ref: https://wiki.ubuntu.com/SecurityTeam/PIE
  391. * 2) A check for -fno-PIE has been used in older Linux Kernel builds
  392. * in a similar way to -fno-pie or -no-pie.
  393. * 3) A check is added for Kernel and U-boot defines
  394. * (-D__KERNEL__ and -D__UBOOT__).
  395. */
  396. for (i = 1; i < argc; i++) {
  397. /* Apply all incompatible link flag and disable checks first */
  398. if (!strcmp(argv[i], "-r") ||
  399. !strcmp(argv[i], "-Wl,-r") ||
  400. !strcmp(argv[i], "-static") ||
  401. !strcmp(argv[i], "-D__KERNEL__") ||
  402. !strcmp(argv[i], "-D__UBOOT__") ||
  403. !strcmp(argv[i], "-fno-pie") ||
  404. !strcmp(argv[i], "-fno-PIE") ||
  405. !strcmp(argv[i], "-no-pie"))
  406. break;
  407. /* Record that shared was present which disables -pie but don't
  408. * break out of loop as a check needs to occur that possibly
  409. * still allows -fPIE to be set
  410. */
  411. if (!strcmp(argv[i], "-shared"))
  412. found_shared = 1;
  413. }
  414. if (i == argc) {
  415. /* Compile and link condition checking have been kept split
  416. * between these two loops, as there maybe already are valid
  417. * compile flags set for position independence. In that case
  418. * the wrapper just adds the -pie for link.
  419. */
  420. for (i = 1; i < argc; i++) {
  421. if (!strcmp(argv[i], "-fpie") ||
  422. !strcmp(argv[i], "-fPIE") ||
  423. !strcmp(argv[i], "-fpic") ||
  424. !strcmp(argv[i], "-fPIC"))
  425. break;
  426. }
  427. /* Both args below can be set at compile/link time
  428. * and are ignored correctly when not used
  429. */
  430. if (i == argc)
  431. *cur++ = "-fPIE";
  432. if (!found_shared)
  433. *cur++ = "-pie";
  434. }
  435. #endif
  436. /* Are we building the Linux Kernel or U-Boot? */
  437. for (i = 1; i < argc; i++) {
  438. if (!strcmp(argv[i], "-D__KERNEL__") ||
  439. !strcmp(argv[i], "-D__UBOOT__"))
  440. break;
  441. }
  442. if (i == argc && found_nonoption) {
  443. /* https://wiki.gentoo.org/wiki/Hardened/Toolchain#Mark_Read-Only_Appropriate_Sections */
  444. #ifdef BR2_RELRO_PARTIAL
  445. *cur++ = "-Wl,-z,relro";
  446. #endif
  447. #ifdef BR2_RELRO_FULL
  448. *cur++ = "-Wl,-z,now";
  449. *cur++ = "-Wl,-z,relro";
  450. #endif
  451. }
  452. n_args = (cur - args);
  453. if ((n_args + argc) > DEFAULT_MAX_ARGS) {
  454. args = realloc(args, (n_args + argc) * sizeof(char *));
  455. if (args == NULL) {
  456. perror(__FILE__ ": realloc");
  457. return 2;
  458. }
  459. }
  460. /* append forward args and terminating NULL */
  461. memcpy(&args[n_args], &argv[1], sizeof(char *) * argc);
  462. exec_args = args;
  463. #ifdef BR_CCACHE
  464. /* If BR2_USE_CCACHE is set and its value is 1, enable ccache
  465. * usage */
  466. char *br_use_ccache = getenv("BR2_USE_CCACHE");
  467. bool ccache_enabled = br_use_ccache && !strncmp(br_use_ccache, "1", strlen("1"));
  468. if (ccache_enabled) {
  469. #ifdef BR_CCACHE_HASH
  470. /* Allow compilercheck to be overridden through the environment */
  471. if (setenv("CCACHE_COMPILERCHECK", "string:" BR_CCACHE_HASH, 0)) {
  472. perror(__FILE__ ": Failed to set CCACHE_COMPILERCHECK");
  473. return 3;
  474. }
  475. #endif
  476. #ifdef BR_CCACHE_BASEDIR
  477. /* Allow basedir to be overridden through the environment */
  478. if (setenv("CCACHE_BASEDIR", BR_CCACHE_BASEDIR, 0)) {
  479. perror(__FILE__ ": Failed to set CCACHE_BASEDIR");
  480. return 3;
  481. }
  482. #endif
  483. } else
  484. /* ccache is disabled, skip it */
  485. exec_args++;
  486. #endif
  487. /* Debug the wrapper to see final arguments passed to the real compiler. */
  488. if (debug > 0) {
  489. fprintf(stderr, "Toolchain wrapper executing:");
  490. #ifdef BR_CCACHE_HASH
  491. if (ccache_enabled)
  492. fprintf(stderr, "%sCCACHE_COMPILERCHECK='string:" BR_CCACHE_HASH "'",
  493. (debug == 2) ? "\n " : " ");
  494. #endif
  495. #ifdef BR_CCACHE_BASEDIR
  496. if (ccache_enabled)
  497. fprintf(stderr, "%sCCACHE_BASEDIR='" BR_CCACHE_BASEDIR "'",
  498. (debug == 2) ? "\n " : " ");
  499. #endif
  500. for (i = 0; exec_args[i]; i++)
  501. fprintf(stderr, "%s'%s'",
  502. (debug == 2) ? "\n " : " ", exec_args[i]);
  503. fprintf(stderr, "\n");
  504. }
  505. if (execv(exec_args[0], exec_args))
  506. perror(path);
  507. free(args);
  508. return 2;
  509. }