e7c71c344d
Teach rustc to generate object files instead of a linked executable for binary and shared library crates. This lets us skip the lengthy Rust compilation phase when only the C++ dependencies of these crates have changed. This works using a Python script that replaces the linker invoked by rustc and converts the linker command line into a rspfile that can be used during the link phase. The script makes certain assumptions about how rustc invokes the linker, but since we control the version of Rust we use, we can update the script if those assumptions ever break. I've asked the Rust developers about adding an official way to do this so hopefully we won't need to rely on this hack in the future. The rustc rule for Kythe has been altered to pass linker=true, somewhat consistent with the main rustc rule, which now doesn't invoke the actual linker either. `m xref_rust` still succeeds, but hopefully we can find someone who knows more about the rest of the Kythe pipeline who can let us know whether it should still work. Otherwise, let's use this CL as an opportunity to find out whether the rest of the pipeline is happy with linker=true, since otherwise we will find it hard to maintain the Kythe rule in the future. Change-Id: Ifb9c8689c1bd78c0afcf6fdfd111140d20377536
114 lines
4.5 KiB
Go
114 lines
4.5 KiB
Go
// Copyright 2020 The Android Open Source Project
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package rust
|
|
|
|
import (
|
|
"strings"
|
|
"testing"
|
|
|
|
"android/soong/android"
|
|
)
|
|
|
|
// Test that coverage flags are being correctly generated.
|
|
func TestCoverageFlags(t *testing.T) {
|
|
ctx := testRustCov(t, `
|
|
rust_library {
|
|
name: "libfoo_cov",
|
|
srcs: ["foo.rs"],
|
|
crate_name: "foo",
|
|
}
|
|
rust_binary {
|
|
name: "fizz_cov",
|
|
srcs: ["foo.rs"],
|
|
}
|
|
rust_binary {
|
|
name: "buzzNoCov",
|
|
srcs: ["foo.rs"],
|
|
native_coverage: false,
|
|
}
|
|
rust_library {
|
|
name: "libbar_nocov",
|
|
srcs: ["foo.rs"],
|
|
crate_name: "bar",
|
|
native_coverage: false,
|
|
}`)
|
|
|
|
// Make sure native_coverage: false isn't creating a coverage variant.
|
|
if android.InList("android_arm64_armv8-a_dylib_cov", ctx.ModuleVariantsForTests("libbar_nocov")) {
|
|
t.Fatalf("coverage variant created for module 'libbar_nocov' with native coverage disabled")
|
|
}
|
|
|
|
// Just test the dylib variants unless the library coverage logic changes to distinguish between the types.
|
|
libfooCov := ctx.ModuleForTests("libfoo_cov", "android_arm64_armv8-a_dylib_cov").Rule("rustc")
|
|
libbarNoCov := ctx.ModuleForTests("libbar_nocov", "android_arm64_armv8-a_dylib").Rule("rustc")
|
|
fizzCov := ctx.ModuleForTests("fizz_cov", "android_arm64_armv8-a_cov").Rule("rustc")
|
|
buzzNoCov := ctx.ModuleForTests("buzzNoCov", "android_arm64_armv8-a").Rule("rustc")
|
|
libfooCovLink := ctx.ModuleForTests("libfoo_cov", "android_arm64_armv8-a_dylib_cov").Rule("rustLink")
|
|
libbarNoCovLink := ctx.ModuleForTests("libbar_nocov", "android_arm64_armv8-a_dylib").Rule("rustLink")
|
|
fizzCovLink := ctx.ModuleForTests("fizz_cov", "android_arm64_armv8-a_cov").Rule("rustLink")
|
|
buzzNoCovLink := ctx.ModuleForTests("buzzNoCov", "android_arm64_armv8-a").Rule("rustLink")
|
|
|
|
rustcCoverageFlags := []string{"-C instrument-coverage", " -g "}
|
|
for _, flag := range rustcCoverageFlags {
|
|
missingErrorStr := "missing rustc flag '%s' for '%s' module with coverage enabled; rustcFlags: %#v"
|
|
containsErrorStr := "contains rustc flag '%s' for '%s' module with coverage disabled; rustcFlags: %#v"
|
|
|
|
if !strings.Contains(fizzCov.Args["rustcFlags"], flag) {
|
|
t.Fatalf(missingErrorStr, flag, "fizz_cov", fizzCov.Args["rustcFlags"])
|
|
}
|
|
if !strings.Contains(libfooCov.Args["rustcFlags"], flag) {
|
|
t.Fatalf(missingErrorStr, flag, "libfoo_cov dylib", libfooCov.Args["rustcFlags"])
|
|
}
|
|
if strings.Contains(buzzNoCov.Args["rustcFlags"], flag) {
|
|
t.Fatalf(containsErrorStr, flag, "buzzNoCov", buzzNoCov.Args["rustcFlags"])
|
|
}
|
|
if strings.Contains(libbarNoCov.Args["rustcFlags"], flag) {
|
|
t.Fatalf(containsErrorStr, flag, "libbar_cov", libbarNoCov.Args["rustcFlags"])
|
|
}
|
|
}
|
|
|
|
linkCoverageFlags := []string{"-fprofile-instr-generate=/data/misc/trace/clang-%p-%m.profraw", " -g "}
|
|
for _, flag := range linkCoverageFlags {
|
|
missingErrorStr := "missing rust linker flag '%s' for '%s' module with coverage enabled; rustcFlags: %#v"
|
|
containsErrorStr := "contains rust linker flag '%s' for '%s' module with coverage disabled; rustcFlags: %#v"
|
|
|
|
if !strings.Contains(fizzCovLink.Args["linkFlags"], flag) {
|
|
t.Fatalf(missingErrorStr, flag, "fizz_cov", fizzCovLink.Args["linkFlags"])
|
|
}
|
|
if !strings.Contains(libfooCovLink.Args["linkFlags"], flag) {
|
|
t.Fatalf(missingErrorStr, flag, "libfoo_cov dylib", libfooCovLink.Args["linkFlags"])
|
|
}
|
|
if strings.Contains(buzzNoCovLink.Args["linkFlags"], flag) {
|
|
t.Fatalf(containsErrorStr, flag, "buzzNoCov", buzzNoCovLink.Args["linkFlags"])
|
|
}
|
|
if strings.Contains(libbarNoCovLink.Args["linkFlags"], flag) {
|
|
t.Fatalf(containsErrorStr, flag, "libbar_cov", libbarNoCovLink.Args["linkFlags"])
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
func TestCoverageDeps(t *testing.T) {
|
|
ctx := testRustCov(t, `
|
|
rust_binary {
|
|
name: "fizz",
|
|
srcs: ["foo.rs"],
|
|
}`)
|
|
|
|
fizz := ctx.ModuleForTests("fizz", "android_arm64_armv8-a_cov").Rule("rustLink")
|
|
if !strings.Contains(fizz.Args["linkFlags"], "libprofile-clang-extras.a") {
|
|
t.Fatalf("missing expected coverage 'libprofile-clang-extras' dependency in linkFlags: %#v", fizz.Args["linkFlags"])
|
|
}
|
|
}
|