All Projects → rust-embedded → Cross

rust-embedded / Cross

Licence: other
“Zero setup” cross compilation and “cross testing” of Rust crates

Programming Languages

shell
77523 projects
rust
11053 projects

Projects that are alternatives of or similar to Cross

cross
“Zero setup” cross compilation and “cross testing” of Rust crates
Stars: ✭ 3,550 (+44.25%)
Mutual labels:  arm, mips, cargo, bsd, x86, sparc, aarch64, powerpc, cross-compilation, s390x, cross-testing
Keystone
Keystone assembler framework: Core (Arm, Arm64, Hexagon, Mips, PowerPC, Sparc, SystemZ & X86) + bindings
Stars: ✭ 1,654 (-32.79%)
Mutual labels:  arm, x86, mips, powerpc, sparc
Capstone
Capstone disassembly/disassembler framework: Core (Arm, Arm64, BPF, EVM, M68K, M680X, MOS65xx, Mips, PPC, RISCV, Sparc, SystemZ, TMS320C64x, Web Assembly, X86, X86_64, XCore) + bindings.
Stars: ✭ 5,374 (+118.37%)
Mutual labels:  arm, x86, mips, powerpc, sparc
Unicorn
Unicorn CPU emulator framework (ARM, AArch64, M68K, Mips, Sparc, PowerPC, RiscV, X86)
Stars: ✭ 4,934 (+100.49%)
Mutual labels:  arm, x86, mips, sparc, powerpc
Steed
[INACTIVE] Rust's standard library, free of C dependencies, for Linux systems
Stars: ✭ 520 (-78.87%)
Mutual labels:  arm, x86, aarch64, mips, powerpc
Easy Linux Pwn
A set of Linux binary exploitation tasks for beginners on various architectures
Stars: ✭ 353 (-85.66%)
Mutual labels:  arm, x86, mips, powerpc
Bap
Binary Analysis Platform
Stars: ✭ 1,385 (-43.72%)
Mutual labels:  arm, x86, mips, powerpc
Unisimd Assembler
SIMD macro assembler unified for ARM, MIPS, PPC and x86
Stars: ✭ 63 (-97.44%)
Mutual labels:  x86, aarch64, mips, powerpc
Cemu
Cheap EMUlator: lightweight multi-architecture assembly playground
Stars: ✭ 666 (-72.94%)
Mutual labels:  arm, aarch64, mips, powerpc
Arm now
arm_now is a qemu powered tool that allows instant setup of virtual machines on arm cpu, mips, powerpc, nios2, x86 and more, for reverse, exploit, fuzzing and programming purpose.
Stars: ✭ 719 (-70.78%)
Mutual labels:  arm, x86, mips, powerpc
Keypatch
Multi-architecture assembler for IDA Pro. Powered by Keystone Engine.
Stars: ✭ 939 (-61.84%)
Mutual labels:  arm, x86, mips, powerpc
Ataraxia
Simple and lightweight source-based multi-platform Linux distribution with musl libc.
Stars: ✭ 226 (-90.82%)
Mutual labels:  arm, x86, mips, powerpc
Plasma
Plasma is an interactive disassembler for x86/ARM/MIPS. It can generates indented pseudo-code with colored syntax.
Stars: ✭ 2,956 (+20.11%)
Mutual labels:  arm, x86, mips
Sse2neon
A translator from Intel SSE intrinsics to Arm/Aarch64 NEON implementation
Stars: ✭ 316 (-87.16%)
Mutual labels:  arm, x86, aarch64
Asmdb
Instructions database and utilities for X86/X64 and ARM (THUMB/A32/A64) architectures.
Stars: ✭ 258 (-89.52%)
Mutual labels:  arm, x86, aarch64
Sleef
SIMD Library for Evaluating Elementary Functions, vectorized libm and DFT
Stars: ✭ 353 (-85.66%)
Mutual labels:  arm, aarch64, powerpc
Gef
GEF (GDB Enhanced Features) - a modern experience for GDB with advanced debugging features for exploit developers & reverse engineers ☢
Stars: ✭ 4,197 (+70.54%)
Mutual labels:  mips, sparc, powerpc
Awesome Cpus
All CPU and MCU documentation in one place
Stars: ✭ 1,602 (-34.9%)
Mutual labels:  arm, powerpc, sparc
Fukuro
Simple microkernel (early stage)
Stars: ✭ 18 (-99.27%)
Mutual labels:  arm, x86, aarch64
interp
Interpreter experiment. Testing dispatch methods: Switching, Direct/Indirect Threaded Code, Tail-Calls and Inlining
Stars: ✭ 32 (-98.7%)
Mutual labels:  arm, mips, aarch64

crates.io crates.io Build Status Docker Pulls

cross

“Zero setup” cross compilation and “cross testing” of Rust crates

This project is developed and maintained by the Tools team.

`cross test`ing a crate for the aarch64-unknown-linux-gnu target
`cross test`ing a crate for the aarch64-unknown-linux-gnu target

Features

  • cross will provide all the ingredients needed for cross compilation without touching your system installation.

  • cross provides an environment, cross toolchain and cross compiled libraries, that produces the most portable binaries.

  • “cross testing”, cross can test crates for architectures other than i686 and x86_64.

  • The stable, beta and nightly channels are supported.

Dependencies

One of these container engines is required. If both are installed, cross will default to docker.

  • Docker. Note that on Linux non-sudo users need to be in the docker group. Read the official post-installation steps. Requires version 1.24 or later.
  • Podman. Requires version 1.6.3 or later.

Installation

$ cargo install cross

Usage

cross has the exact same CLI as Cargo but as it relies on Docker you'll have to start the daemon before you can use it.

# (ONCE PER BOOT)
# Start the Docker daemon, if it's not already running
$ sudo systemctl start docker

# MAGIC! This Just Works
$ cross build --target aarch64-unknown-linux-gnu

# EVEN MORE MAGICAL! This also Just Works
$ cross test --target mips64-unknown-linux-gnuabi64

# Obviously, this also Just Works
$ cross rustc --target powerpc-unknown-linux-gnu --release -- -C lto

Configuration

You can place a Cross.toml file in the root of your Cargo project to tweak cross's behavior:

Custom Docker images

cross provides default Docker images for the targets listed below. However, it can't cover every single use case out there. For other targets, or when the default image is not enough, you can use the target.{{TARGET}}.image field in Cross.toml to use custom Docker image for a specific target:

[target.aarch64-unknown-linux-gnu]
image = "my/image:tag"

In the example above, cross will use a image named my/image:tag instead of the default one. Normal Docker behavior applies, so:

  • Docker will first look for a local image named my/image:tag

  • If it doesn't find a local image, then it will look in Docker Hub.

  • If only image:tag is specified, then Docker won't look in Docker Hub.

  • If only tag is omitted, then Docker will use the latest tag.

It's recommended to base your custom image on the default Docker image that cross uses: rustembedded/cross:{{TARGET}}-{{VERSION}} (where {{VERSION}} is cross's version). This way you won't have to figure out how to install a cross C toolchain in your custom image. Example below:

FROM rustembedded/cross:aarch64-unknown-linux-gnu-0.2.1

RUN dpkg --add-architecture arm64 && \
    apt-get update && \
    apt-get install --assume-yes libfoo:arm64
$ docker build -t my/image:tag path/to/where/the/Dockerfile/resides

Docker in Docker

When running cross from inside a docker container, cross needs access to the hosts docker daemon itself. This is normally achieved by mounting the docker daemons socket /var/run/docker.sock. For example:

$ docker run -v /var/run/docker.sock:/var/run/docker.sock -v .:/project \
  -w /project my/development-image:tag cross build --target mips64-unknown-linux-gnuabi64

The image running cross requires the rust development tools to be installed.

With this setup cross must find and mount the correct host paths into the container used for cross compilation. This includes the original project directory as well as the root path of the parent container to give access to the rust build tools.

To inform cross that it is running inside a container set CROSS_DOCKER_IN_DOCKER=true.

A development or CI container can be created like this:

FROM rust:1

# set CROSS_DOCKER_IN_DOCKER to inform `cross` that it is executed from within a container
ENV CROSS_DOCKER_IN_DOCKER=true

# install `cross`
RUN cargo install cross

...

Limitations: Finding the mount point for the containers root directory is currently only available for the overlayfs2 storage driver. In order to access the parent containers rust setup, the child container mounts the parents overlayfs. The parent must not be stopped before the child container, as the overlayfs can not be unmounted correctly by Docker if the child container still accesses it.

Explicitly choose the container engine

By default, cross tries to use Docker or Podman, in that order. If you want to choose a container engine explicitly, you can set the binary name (or path) using the CROSS_CONTAINER_ENGINE environment variable.

For example in case you want use Podman, you can set CROSS_CONTAINER_ENGINE=podman.

Passing environment variables into the build environment

By default, cross does not pass any environment variables into the build environment from the calling shell. This is chosen as a safe default as most use cases will not want the calling environment leaking into the inner execution environment.

In the instances that you do want to pass through environment variables, this can be done via build.env.passthrough in your Cross.toml:

[build.env]
passthrough = [
    "RUST_BACKTRACE",
    "RUST_LOG",
    "TRAVIS",
]

To pass variables through for one target but not others, you can use this syntax instead:

[target.aarch64-unknown-linux-gnu.env]
passthrough = [
    "RUST_DEBUG",
]

Mounting volumes into the build environment

In addition to passing environment variables, you can also specify environment variables pointing to paths which should be mounted into the container:

[target.aarch64-unknown-linux-gnu.env]
volumes = [
    "BUILD_DIR",
]

Use Xargo instead of Cargo

By default, cross uses xargo to build your Cargo project only for all non-standard targets (i.e. something not reported by rustc/rustup). However, you can use the build.xargo or target.{{TARGET}}.xargo field in Cross.toml to force the use of xargo:

# all the targets will use `xargo`
[build]
xargo = true

Or,

# only this target will use `xargo`
[target.aarch64-unknown-linux-gnu]
xargo = true

xargo = false will work the opposite way (pick cargo always) and is useful when building for custom targets that you know to work with cargo.

Supported targets

A target is considered as “supported” if cross can cross compile a “non-trivial” (binary) crate, usually Cargo, for that target.

Testing support (cross test) is more complicated. It relies on QEMU emulation, so testing may fail due to QEMU bugs rather than bugs in your crate. That said, a target has a ✓ in test column of the table below if it can run the compiler-builtins test suite.

Also, testing is very slow. cross test runs units tests sequentially because QEMU gets upset when you spawn multiple threads. This means that, if one of your unit tests spawns threads, then it's more likely to fail or, worst, never terminate.

Target libc GCC C++ QEMU test
*-apple-ios [1] N/A N/A N/A N/A
aarch64-linux-android [2] N/A 4.9 N/A
aarch64-unknown-linux-gnu 2.19 4.8.2 4.1.0
aarch64-unknown-linux-musl 1.1.20 6.3.0 4.1.0
arm-linux-androideabi [2] N/A 4.9 N/A
arm-unknown-linux-gnueabi 2.19 4.8.2 4.1.0
arm-unknown-linux-gnueabihf 2.27 7.3.0 4.1.0
arm-unknown-linux-musleabi 1.1.20 6.3.0 4.1.0
arm-unknown-linux-musleabihf 1.1.20 6.3.0 4.1.0
armv5te-unknown-linux-gnueabi 2.27 7.5.0 4.2.0
armv5te-unknown-linux-musleabi 1.1.20 6.3.0 4.1.0
armv7-linux-androideabi [2] N/A 4.9 N/A
armv7-unknown-linux-gnueabihf 2.15 4.6.2 4.1.0
armv7-unknown-linux-musleabihf 1.1.20 6.3.0 4.1.0
i586-unknown-linux-gnu 2.23 5.3.1 N/A
i586-unknown-linux-musl 1.1.20 6.3.0 N/A
i686-unknown-freebsd [4] 12.1 6.4.0 N/A
i686-linux-android [2] N/A 4.9 N/A
i686-pc-windows-gnu N/A 7.3.0 N/A
i686-unknown-linux-gnu 2.15 4.6.2 N/A
i686-unknown-linux-musl 1.1.20 6.3.0 N/A
mips-unknown-linux-gnu 2.23 5.3.1 4.1.0
mips-unknown-linux-musl 1.1.20 6.3.0 4.1.0
mips64-unknown-linux-gnuabi64 2.23 5.3.1 4.1.0
mips64el-unknown-linux-gnuabi64 2.23 5.3.1 4.1.0
mipsel-unknown-linux-gnu 2.23 5.3.1 4.1.0
mipsel-unknown-linux-musl 1.1.20 6.3.0 4.1.0
powerpc-unknown-linux-gnu 2.19 4.8.2 3.0.1
powerpc64-unknown-linux-gnu 2.31 10.2.0 3.0.1
powerpc64le-unknown-linux-gnu 2.19 4.8.2 3.0.1
riscv64gc-unknown-linux-gnu 2.27 7.5.0 4.2.0
s390x-unknown-linux-gnu 2.23 5.3.1 4.1.0
sparc64-unknown-linux-gnu 2.31 10.2.0 4.2.0
sparcv9-sun-solaris [4] 2.11 5.3.0 N/A
thumbv6m-none-eabi [5] 2.2.0 5.3.1 N/A
thumbv7em-none-eabi [5] 2.2.0 5.3.1 N/A
thumbv7em-none-eabihf [5] 2.2.0 5.3.1 N/A
thumbv7m-none-eabi [5] 2.2.0 5.3.1 N/A
wasm32-unknown-emscripten [6] 1.1.15 1.37.13 N/A
x86_64-linux-android [2] N/A 4.9 N/A
x86_64-pc-windows-gnu N/A 7.3.0 N/A
x86_64-sun-solaris [4] 2.11 5.3.0 N/A
x86_64-unknown-freebsd [4] 12.1 6.4.0 N/A
x86_64-unknown-dragonfly [4] [3] 4.6.0 5.3.0 N/A
x86_64-unknown-linux-gnu 2.15 4.6.2 N/A
x86_64-unknown-linux-musl 1.1.20 6.3.0 N/A
x86_64-unknown-netbsd [4] 7.0 5.3.0 N/A

[1] iOS cross compilation is supported on macOS hosts.

[2] Only works with native tests, that is, tests that do not depends on the Android Runtime. For i686 some tests may fails with the error assertion failed: signal(libc::SIGPIPE, libc::SIG_IGN) != libc::SIG_ERR, see issue #140 for more information.

[4] For *BSD and Solaris targets, the libc column indicates the OS release version from which libc was extracted.

[3] No std component available as of 2017-01-10

[5] libc = newlib

[6] libc = musl, gcc = emcc; Some projects that use libc may fail due to wrong definitions (will be fixed by https://github.com/rust-lang/libc/pull/610)

Debugging

QEMU_STRACE (v0.1.9+)

You can set the QEMU_STRACE variable when you use cross run to get a backtrace of system calls from “foreign” (non x86_64) binaries.

$ cargo new --bin hello && cd $_

$ QEMU_STRACE=1 cross run --target aarch64-unknown-linux-gnu
9 brk(NULL) = 0x0000004000023000
9 uname(0x4000823128) = 0
(..)
9 write(1,0xa06320,14)Hello, world!
 = 14
9 sigaltstack(0x4000823588,(nil)) = 0
9 munmap(0x0000004000b16000,16384) = 0
9 exit_group(0)

Caveats

  • path dependencies (in Cargo.toml) that point outside the Cargo project won't work because cross use docker containers only mounts the Cargo project so the container doesn't have access to the rest of the filesystem.

Minimum Supported Rust Version (MSRV)

This crate is guaranteed to compile on stable Rust 1.42.0 and up. It might compile with older versions but that may change in any new patch release.

Some cross-compilation targets require a later Rust version, and using Xargo requires a nightly Rust toolchain.

License

Licensed under either of

at your option.

Contribution

Unless you explicitly state otherwise, any contribution intentionally submitted for inclusion in the work by you, as defined in the Apache-2.0 license, shall be dual licensed as above, without any additional terms or conditions.

Code of Conduct

Contribution to this crate is organized under the terms of the Rust Code of Conduct, the maintainer of this crate, the Tools team, promises to intervene to uphold that code of conduct.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].