RPM Macros for Build Flags
Summary
Create a corresponding macro for each compiler flag in the redhat-rpm-config macro file and create "extra flag" macros to make it easier for packages to control the set of default flags.
Owner
- Name: Tom Stellard
- Email: <tstellar@redhat.com>
Current status
- Targeted release: Fedora Linux 37
- Last updated: 2022-06-01
- FESCo issue: <will be assigned by the Wrangler>
- Tracker bug: <will be assigned by the Wrangler>
- Release notes tracker: <will be assigned by the Wrangler>
Detailed Description
Detailed Description
The macros file in the redhat-rpm-config package contains a list of default compiler flags for packages to use when compiling C,C++, and Fortran packages. There is currently no standard way to remove or add to the set of default flags. Most packages use a combination of echo and sed to remove unwanted flags or add new ones. Some examples:
ghdl: OPT_FLAGS=echo %{optflags}|sed -e 's/\(-Wp,\)\?-D_FORTIFY_SOURCE=[12]//g'
julia: %global optflags %(echo %{optflags} | sed 's/-Wp,-D_GLIBCXX_ASSERTIONS //')
compiler-rt: global optflags %(echo %{optflags} -D_DEFAULT_SOURCE)
This change will add new macros which will make it easier for packages to add and remove their own compiler flags. This strategy is already used to some extent with feature macros like %{_lto_cflags}, %{_hardening_cflags}, etc, but these new flags will give packagers more fine-grained control over the options.
The proposed new macros macros for adding new flags are:
%_pkg_extra_cflags %{nil} %_pkg_extra_cxxflags %{nil} %_pkg_extra_fflags %{nil} %_pkg_extra_ldflags %{nil}
These will be added to %{build_cflags}, %{build_cxxflags}, %{build_fflags}, and %{build_ldflags} respectively to allow packges to add their own flags to the default list: e.g.
%build_cflags %{optflags} %{_package_extra_cflags}
The proposed new macros to represent existing flags are:
%_flag_fstack_protector_strong -fstack-protector-strong %_flag_z_now -Wl,-z,now %_flag_z_defs -Wl,-z,defs %_flag_flto_auto -flto=auto %_flag_ffat_lto_objects -ffat-lto-objects %_flag_o -O2 %_flag_f_exceptions -fexceptions %_flag_g -g %_flag_grecord_gcc_switches -grecord-gcc-switches %_flag_pipe -pipe %_flag_wall -Wall %_flag_werror_format_security -Werror=format-security %_flag_fortify_source -Wp,-D_FORTIFY_SOURCE=2 %_flag_glibcxx_assertions -Wp,-D_GLIBCXX_ASSERTIONS %_flag_asynchronous_unwind_tables -fasynchronous-unwind-tables %_flag_fstack_clash_protection -fstack-clash-protection %_flag_fcf_protection -fcf-protection %_flag_mbranch_protection_standard -mbranch-protection=standard
In addition to adding these new macros, there would be a policy that requires all new flags to have their own RPM macro.
Feedback
Benefit to Fedora
- It will provide a standard way to disable existing compiler flags or enable new ones that is more simple than the existing echo + grep solution.
- It will make it easier to determine which packages disable or modify which flags by doing a simple grep of the spec files.
- It will make it easier for toolchain developers to experiment with adding new flags to the distribution as this can be done with a simple macro definition instead of patching redhat-rpm-config.
Scope
- Proposal owners:
* Proposal owners will update the redhat-rpm-config package and add the new macros. * Proposal owners will test the changes to ensure that the correct flags are still being used.
- Other developers:
* Other developers may, but are not required to, update their packages to use the new macros.
- Release engineering: #Releng issue number
- Policies and guidelines: N/A (not needed for this Change)
The Fedora packaging policy will be updated to require that new flags added to redhat-rpm-config come with their own RPM macro.
- Trademark approval: N/A (not needed for this Change)
- Alignment with Objectives:
Upgrade/compatibility impact
How To Test
User Experience
Dependencies
Contingency Plan
- Contingency mechanism: (What to do? Who will do it?) N/A (not a System Wide Change)
- Contingency deadline: N/A (not a System Wide Change)
- Blocks release? N/A (not a System Wide Change), Yes/No
Documentation
N/A (not a System Wide Change)