Blame SOURCES/buildflags.md

7689d7
This document contains documentation of the individual compiler flags
7689d7
and how to use them.
7689d7
7689d7
[TOC]
7689d7
7689d7
# Using RPM build flags
7689d7
7689d7
For packages which use autoconf to set up the build environment, use
7689d7
the `%configure` macro to obtain the full complement of flags, like
7689d7
this:
7689d7
7689d7
    %configure
7689d7
7689d7
This will invoke the `./configure` with arguments (such as
7689d7
`--prefix=/usr`) to adjust the paths to the packaging defaults.
7689d7
7689d7
As a side effect, this will set the environment variables `CFLAGS`,
7689d7
`CXXFLAGS`, `FFLAGS`, `FCFLAGS`, and `LDFLAGS`, so they can be used by
7689d7
makefiles and other build tools.  (However, existing values for this
7689d7
variables are not overwritten.)
7689d7
7689d7
If your package does not use autoconf, you can still set the same
7689d7
environment variables using
7689d7
7689d7
    %set_build_flags
7689d7
7689d7
early in the `%build` section.  (Again, existing environment variables
7689d7
are not overwritten.)
7689d7
7689d7
Individual build flags are also available through RPM macros:
7689d7
7689d7
* `%{build_cflags}` for the C compiler flags (also known as the
7689d7
  `CFLAGS` variable).  Also historically available as `%{optflags}`.
7689d7
  Furthermore, at the start of the `%build` section, the environment
7689d7
  variable `RPM_OPT_FLAGS` is set to this value.
7689d7
* `%{build_cxxflags}` for the C++ compiler flags (usually assigned to
7689d7
  the `CXXFLAGS` shell variable).
7689d7
* `%{build_fflags} for `FFLAGS` (the Fortran compiler flags, also
7689d7
  known as the `FCFLAGS` variable).
7689d7
* `%{build_ldflags}` for the link editor (ld) flags, usually known as
7689d7
  `LDFLAGS`.  Note that the contents quotes linker arguments using
7689d7
  `-Wl`, so this variable is intended for use with the `gcc` compiler
7689d7
  driver.  At the start of the `%build` section, the environment
7689d7
  variable `RPM_LD_FLAGS` is set to this value.
7689d7
7689d7
These RPM macros do not alter shell environment variables.
7689d7
7689d7
For some other build tools separate mechanisms exist:
7689d7
7689d7
* CMake builds use the the `%cmake` macro from the `cmake-rpm-macros`
7689d7
  package.
7689d7
7689d7
Care must be taking not to compile the current selection of compiler
7689d7
flags into any RPM package besides `redhat-rpm-config`, so that flag
7689d7
changes are picked up automatically once `redhat-rpm-config` is
7689d7
updated.
7689d7
7689d7
# Flag selection for the build type
7689d7
7689d7
The default flags are suitable for building applications.
7689d7
7689d7
For building shared objects, you must compile with `-fPIC` in
7689d7
(`CFLAGS` or `CXXFLAGS`) and link with `-shared` (in `LDFLAGS`).
7689d7
7689d7
For other considerations involving shared objects, see:
7689d7
7689d7
* [Fedora Packaging Guidelines: Shared Libraries](https://fedoraproject.org/wiki/Packaging:Guidelines#Shared_Libraries)
7689d7
7689d7
# Customizing compiler flags
7689d7
7689d7
It is possible to set RPM macros to change some aspects of the
7689d7
compiler flags.  Changing these flags should be used as a last
7689d7
recourse if other workarunds are not available.
7689d7
7689d7
### Lazy binding
7689d7
7689d7
If your package depends on the semantics of lazy binding (e.g., it has
7689d7
plugins which load additional plugins to complete their dependencies,
7689d7
before which some referenced functions are undefined), you should put
7689d7
`-Wl,-z,lazy` at the end of the `LDFLAGS` setting when linking objects
7689d7
which have such requirements.  Under these circumstances, it is
7689d7
unnecessary to disable hardened builds (and thus lose full ASLR for
7689d7
executables), or link everything without `-Wl,z,now` (non-lazy
7689d7
binding).
7689d7
7689d7
### Hardened builds
7689d7
7689d7
By default, the build flags enable fully hardened builds.  To change
7689d7
this, include this in the RPM spec file:
7689d7
7689d7
    %undefine _hardened_build
7689d7
7689d7
This turns off certain hardening features, as described in detail
7689d7
below.  The main difference is that executables will be
7689d7
position-dependent (no full ASLR) and use lazy binding.
7689d7
7689d7
### Annotated builds/watermarking
7689d7
7689d7
By default, the build flags cause a special output section to be
7689d7
included in ELF files which describes certain aspects of the build.
7689d7
To change this for all compiler invocations, include this in the RPM
7689d7
spec file:
7689d7
7689d7
    %undefine _annotated_build
7689d7
7689d7
Be warned that this turns off watermarking, making it impossible to do
7689d7
full hardening coverage analysis for any binaries produced.
7689d7
7689d7
It is possible to disable annotations for individual compiler
7689d7
invocations, using the `-fplugin-arg-annobin-disable` flag.  However,
7689d7
the annobin plugin must still be loaded for this flag to be
7689d7
recognized, so it has to come after the hardening flags on the command
7689d7
line (it has to be added at the end of `CFLAGS`, or specified after
7689d7
the `CFLAGS` variable contents).
7689d7
7689d7
### Strict symbol checks in the link editor (ld)
7689d7
7689d7
Optionally, the link editor will refuse to link shared objects which
7689d7
contain undefined symbols.  Such symbols lack symbol versioning
7689d7
information and can be bound to the wrong (compatibility) symbol
7689d7
version at run time, and not the actual (default) symbol version which
7689d7
would have been used if the symbol definition had been available at
7689d7
static link time.  Furthermore, at run time, the dynamic linker will
7689d7
not have complete dependency information (in the form of DT_NEEDED
7689d7
entries), which can lead to errors (crashes) if IFUNC resolvers are
7689d7
executed before the shared object containing them is fully relocated.
7689d7
7689d7
To switch on these checks, define this macro in the RPM spec file:
7689d7
7689d7
    %define _strict_symbol_defs_build 1
7689d7
7689d7
If this RPM spec option is active, link failures will occur if the
7689d7
linker command line does not list all shared objects which are needed.
7689d7
In this case, you need to add the missing DSOs (with linker arguments
7689d7
such as `-lm`).  As a result, the link editor will also generated the
7689d7
necessary DT_NEEDED entries.
7689d7
7689d7
In some cases (such as when a DSO is loaded as a plugin and is
7689d7
expected to bind to symbols in the main executable), undefined symbols
7689d7
are expected.  In this case, you can add
7689d7
7689d7
    %undefine _strict_symbol_defs_build
7689d7
7689d7
to the RPM spec file to disable these strict checks.  Alternatively,
7689d7
you can pass `-z undefs` to ld (written as `-Wl,-z,undefs` on the gcc
7689d7
command line).  The latter needs binutils 2.29.1-12.fc28 or later.
7689d7
7689d7
# Individual compiler flags
7689d7
7689d7
Compiler flags end up in the environment variables `CFLAGS`,
7689d7
`CXXFLAGS`, `FFLAGS`, and `FCFLAGS`.
7689d7
7689d7
The general (architecture-independent) build flags are:
7689d7
7689d7
* `-O2`: Turn on various GCC optimizations.  See the [GCC manual](https://gcc.gnu.org/onlinedocs/gcc/Optimize-Options.html#index-O2).
7689d7
  Optimization improves performance, the accuracy of warnings, and the
7689d7
  reach of toolchain-based hardening, but it makes debugging harder.
7689d7
* `-g`: Generate debugging information (DWARF).  In Fedora, this data
7689d7
  is separated into `-debuginfo` RPM packages whose installation is
7689d7
  optional, so debuging information does not increase the size of
7689d7
  installed binaries by default.
7689d7
* `-pipe`: Run compiler and assembler in parallel and do not use a
7689d7
  temporary file for the assembler input.  This can improve
7689d7
  compilation performance.  (This does not affect code generation.)
7689d7
* `-Wall`: Turn on various GCC warnings.
7689d7
  See the [GCC manual](https://gcc.gnu.org/onlinedocs/gcc/Warning-Options.html#index-Wall).
7689d7
* `-Werror=format-security`: Turn on format string warnings and treat
7689d7
  them as errors.
7689d7
  See the [GCC manual](https://gcc.gnu.org/onlinedocs/gcc/Warning-Options.html#index-Wformat-security).
7689d7
  This can occasionally result in compilation errors.  In this case,
7689d7
  the best option is to rewrite the source code so that only constant
7689d7
  format strings (string literals) are used.
7689d7
* `-Wp,-D_FORTIFY_SOURCE=2`: Source fortification activates various
7689d7
  hardening features in glibc:
7689d7
    * String functions such as `memcpy` attempt to detect buffer lengths
7689d7
      and terminate the process if a buffer overflow is detected.
7689d7
    * `printf` format strings may only contain the `%n` format specifier
7689d7
      if the format string resides in read-only memory.
7689d7
    * `open` and `openat` flags are checked for consistency with the
7689d7
      presence of a *mode* argument.
7689d7
    * Plus other minor hardening changes.
7689d7
  (These changes can occasionally break valid programs.)
7689d7
* `-fexceptions`: Provide exception unwinding support for C programs.
7689d7
  See the [`-fexceptions` option in the GCC
7689d7
  manual](https://gcc.gnu.org/onlinedocs/gcc/Code-Gen-Options.html#index-fexceptions)
7689d7
  and the [`cleanup` variable
7689d7
  attribute](https://gcc.gnu.org/onlinedocs/gcc/Common-Variable-Attributes.html#index-cleanup-variable-attribute).
7689d7
  This also hardens cancellation handling in C programs because
7689d7
  it is not required to use an on-stack jump buffer to install
7689d7
  a cancellation handler with `pthread_cleanup_push`.  It also makes
7689d7
  it possible to unwind the stack (using C++ `throw` or Rust panics)
7689d7
  from C callback functions if a C library supports non-local exits
7689d7
  from them (e.g., via `longjmp`).
7689d7
* `-Wp,-D_GLIBCXX_ASSERTIONS`: Enable lightweight assertions in the
7689d7
  C++ standard library, such as bounds checking for the subscription
7689d7
  operator on vectors.  (This flag is added to both `CFLAGS` and
7689d7
  `CXXFLAGS`; C compilations will simply ignore it.)
7689d7
* `-fstack-protector-strong`: Instrument functions to detect
7689d7
  stack-based buffer overflows before jumping to the return address on
7689d7
  the stack.  The *strong* variant only performs the instrumentation
7689d7
  for functions whose stack frame contains addressable local
7689d7
  variables.  (If the address of a variable is never taken, it is not
7689d7
  possible that a buffer overflow is caused by incorrect pointer
7689d7
  arithmetic involving a pointer to that variable.)
7689d7
* `-grecord-gcc-switches`: Include select GCC command line switches in
7689d7
  the DWARF debugging information.  This is useful for detecting the
7689d7
  presence of certain build flags and general hardening coverage.
7689d7
7689d7
For hardened builds (which are enabled by default, see above for how
7689d7
to disable them), the flag
7689d7
`-specs=/usr/lib/rpm/redhat/redhat-hardened-cc1` is added to the
7689d7
command line.  It adds the following flag to the command line:
7689d7
7689d7
*   `-fPIE`: Compile for a position-independent executable (PIE),
7689d7
    enabling full address space layout randomization (ASLR).  This is
7689d7
    similar to `-fPIC`, but avoids run-time indirections on certain
7689d7
    architectures, resulting in improved performance and slightly
7689d7
    smaller executables.  However, compared to position-dependent code
7689d7
    (the default generated by GCC), there is still a measurable
7689d7
    performance impact.
7689d7
7689d7
    If the command line also contains `-r` (producing a relocatable
7689d7
    object file), `-fpic` or `-fPIC`, this flag is automatically
7689d7
    dropped.  (`-fPIE` can only be used for code which is linked into
7689d7
    the main program.) Code which goes into static libraries should be
7689d7
    compiled with `-fPIE`, except when this code is expected to be
7689d7
    linked into DSOs, when `-fPIC` must be used.
7689d7
7689d7
    To be effective, `-fPIE` must be used with the `-pie` linker flag
7689d7
    when producing an executable, see below.
7689d7
7689d7
To support [binary watermarks for ELF
7689d7
objects](https://fedoraproject.org/wiki/Toolchain/Watermark) using
7689d7
annobin, the `-specs=/usr/lib/rpm/redhat/redhat-annobin-cc1` flag is
7689d7
added by default.  This can be switched off by undefining the
7689d7
`%_annotated_build` RPM macro (see above).
7689d7
7689d7
### Architecture-specific compiler flags
7689d7
7689d7
These compiler flags are enabled for all builds (hardened/annotated or
7689d7
not), but their selection depends on the architecture:
7689d7
7689d7
*   `-fstack-clash-protection`: Turn on instrumentation to avoid
7689d7
    skipping the guard page in large stack frames.  (Without this flag,
7689d7
    vulnerabilities can result where the stack overlaps with the heap,
7689d7
    or thread stacks spill into other regions of memory.)  This flag is
7689d7
    fully ABI-compatible and has adds very little run-time overhead, but
7689d7
    is only available on certain architectures (currently aarch64, i386,
7689d7
    ppc64, ppc64le, s390x, x86_64).
7689d7
*   `-fcf-protection`: Instrument binaries to guard against
7689d7
    ROP/JOP attacks.  Used on i686 and x86_64.
7689d7
*   `-m64` and `-m32`: Some GCC builds support both 32-bit and 64-bit in
7689d7
    the same compilation.  For such architectures, the RPM build process
7689d7
    explicitly selects the architecture variant by passing this compiler
7689d7
    flag.
7689d7
*   `-fasynchronous-unwind-tables`: Generate full unwind information
7689d7
    covering all program points.  This is required for support of
7689d7
    asynchronous cancellation and proper unwinding from signal
7689d7
    handlers.  It also makes performance and debugging tools more
7689d7
    useful because unwind information is available without having to
7689d7
    install (and load) debugging ienformation.
7689d7
    Asynchronous unwind tables are enabled for aarch64, i686, s390x,
7689d7
    and x86_64.  They are not needed on armhfp, ppc64 and ppc64le due
7689d7
    to architectural differences in stack management.  On these
7689d7
    architectures, `-fexceptions` (see above) still enables regular
7689d7
    unwind tables (or they are enabled by default even without this
7689d7
    option).
7689d7
*   `-funwind-tables`: A subset of the unwind information restricted
7689d7
    to actual call sites.  Used on ppc64, ppc64le.  Also implied by
7689d7
    `-fexceptions`.
7689d7
7689d7
In addition, `redhat-rpm-config` re-selects the built-in default
7689d7
tuning in the `gcc` package.  These settings are:
7689d7
7689d7
*   **armhfp**: `-march=armv7-a -mfpu=vfpv3-d16  -mfloat-abi=hard`
7689d7
    selects an Arm subarchitecture based on the ARMv7-A architecture
7689d7
    with 16 64-bit floating point registers.  `-mtune=cortex-8a` selects
7689d7
    tuning for the Cortex-A8 implementation (while preserving compatibility
7689d7
    with other ARMv7-A implementations).  `-mabi=aapcs-linux` switches to
7689d7
    the AAPCS ABI for GNU/Linux.
7689d7
*   **i686**: `-march=x86-64` is used to select a minimum supported
7689d7
    CPU level matching the baseline for the x86_64 architecture.
7689d7
    `-mtune=generic` activates tuning for a current blend of CPUs.
7689d7
    `-mfpmath=sse` uses the SSE2 unit for floating point math,
7689d7
    instead of the legacy i387 FPU, avoiding issues related to excess
7689d7
    precision.  `-mstackrealign` ensures that the generated code
7689d7
    does not assume 16-byte stack alignment (as required by the current
7689d7
    i386 ABI), but stays compatible with application code compiled
7689d7
    before the introduction of 16-byte stack alignment along with SSE2
7689d7
    support.
7689d7
*   **ppc64le**: `-mcpu=power8 -mtune=power8` selects a minimum supported
7689d7
    CPU level of POWER8 (the first CPU with ppc64le support) and tunes
7689d7
    for POWER8.
7689d7
*   **s390x**: `-march=z13 -mtune=z14` specifies a minimum supported CPU
7689d7
    level of z13, while optimizing for a subsequent CPU generation
7689d7
    (z14).
7689d7
*   **x86_64**: `-mtune=generic` selects tuning which is expected to
7689d7
     beneficial for a broad range of current CPUs.
7689d7
*   **ppc64** and **aarch64** do not have any architecture-specific tuning.
7689d7
7689d7
# Individual linker flags
7689d7
7689d7
Linker flags end up in the environment variable `LDFLAGS`.
7689d7
7689d7
The linker flags listed below are injected.  Note that they are
7689d7
prefixed with `-Wl` because it is expected that these flags are passed
7689d7
to the compiler driver `gcc`, and not directly to the link editor
7689d7
`ld`.
7689d7
7689d7
* `-z relro`: Activate the *read-only after relocation* feature.
7689d7
  Constant data and relocations are placed on separate pages, and the
7689d7
  dynamic linker is instructed to revoke write permissions after
7689d7
  dynamic linking.  Full protection of relocation data requires the
7689d7
  `-z now` flag (see below).
7689d7
* `-z defs`: Refuse to link shared objects (DSOs) with undefined symbols
7689d7
  (optional, see above).
7689d7
7689d7
For hardened builds, the
7689d7
`-specs=/usr/lib/rpm/redhat/redhat-hardened-ld` flag is added to the
7689d7
compiler driver command line.  (This can be disabled by undefining the
7689d7
`%_hardened_build` macro; see above) This activates the following
7689d7
linker flags:
7689d7
7689d7
* `-pie`: Produce a PIE binary.  This is only activated for the main
7689d7
  executable, and only if it is dynamically linked.  This requires
7689d7
  that all objects which are linked in the main executable have been
7689d7
  compiled with `-fPIE` or `-fPIC` (or `-fpie` or `-fpic`; see above).
7689d7
  By itself, `-pie` has only a slight performance impact because it
7689d7
  disables some link editor optimization, however the `-fPIE` compiler
7689d7
  flag has some overhead.
7689d7
* `-z now`: Disable lazy binding and turn on the `BIND_NOW` dynamic
7689d7
  linker feature.  Lazy binding involves an array of function pointers
7689d7
  which is writable at run time (which could be overwritten as part of
7689d7
  security exploits, redirecting execution).  Therefore, it is
7689d7
  preferable to turn of lazy binding, although it increases startup
7689d7
  time.
a0c358
a0c358
# Support for extension builders
a0c358
a0c358
Some packages include extension builders that allow users to build
a0c358
extension modules (which are usually written in C and C++) under the
a0c358
control of a special-purpose build system.  This is a common
a0c358
functionality provided by scripting languages such as Python and Perl.
a0c358
Traditionally, such extension builders captured the Fedora build flags
a0c358
when these extension were built.  However, these compiler flags are
a0c358
adjusted for a specific Fedora release and toolchain version and
a0c358
therefore do not work with a custom toolchain (e.g., different C/C++
a0c358
compilers), and users might want to build their own extension modules
a0c358
with such toolchains.
a0c358
a0c358
The macros `%{extension_cflags}`, `%{extension_cxxflags}`,
a0c358
`%{extension_fflags}`, `%{extension_ldflags}` contain a subset of
a0c358
flags that have been adjusted for compatibility with alternative
a0c358
toolchains, while still preserving some of the compile-time security
a0c358
hardening that the standard Fedora build flags provide.
a0c358
a0c358
The current set of differences are:
a0c358
a0c358
* No GCC plugins (such as annobin) are activated.
a0c358
* No GCC spec files (`-specs=` arguments) are used.
a0c358
a0c358
Additional flags may be removed in the future if they prove to be
a0c358
incompatible with alternative toolchains.
a0c358
a0c358
Extension builders should detect whether they are performing a regular
a0c358
RPM build (e.g., by looking for an `RPM_OPT_FLAGS` variable).  In this
a0c358
case, they should use the *current* set of Fedora build flags (that
a0c358
is, the output from `rpm --eval '%{build_cflags}'` and related
a0c358
commands).  Otherwise, when not performing an RPM build, they can
a0c358
either use hard-coded extension builder flags (thus avoiding a
a0c358
run-time dependency on `redhat-rpm-config`), or use the current
a0c358
extension builder flags (with a run-time dependency on
a0c358
`redhat-rpm-config`).
a0c358
a0c358
As a result, extension modules built for Fedora will use the official
a0c358
Fedora build flags, while users will still be able to build their own
a0c358
extension modules with custom toolchains.