4af21ed26f
Native compiler flags are currently applied in approximately: global cflags local cflags local include dirs global include dirs global conlyflags local conlyflags global cppflags local cppflags This means that a flag that is enabled in the global cppflags cannot be disabled in the local cflags, and an Android.bp author must know to disable it in the local cppflags. A better order would be: global cflags global conlyflags global cppflags local cflags local conlyflags local cppflags local include dirs global include dirs We are mixing both the global and local cflags into a single variable, and similar for conlyflags and cppflags, which prevents reordering them. This CL prepares to reorder them by splitting the global and local cflags into separate variables. Bug: 143713277 Test: m native Change-Id: Ic55a8c3516c331dc5f2af9d00e59ceca9d3e6c15
104 lines
3.1 KiB
Go
104 lines
3.1 KiB
Go
// Copyright 2017 Google Inc. All rights reserved.
|
|
//
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
// you may not use this file except in compliance with the License.
|
|
// You may obtain a copy of the License at
|
|
//
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
//
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
// See the License for the specific language governing permissions and
|
|
// limitations under the License.
|
|
|
|
package cc
|
|
|
|
import (
|
|
"strings"
|
|
"sync"
|
|
|
|
"android/soong/android"
|
|
"android/soong/cc/config"
|
|
)
|
|
|
|
var (
|
|
lsdumpPaths []string
|
|
sabiLock sync.Mutex
|
|
)
|
|
|
|
type SAbiProperties struct {
|
|
CreateSAbiDumps bool `blueprint:"mutated"`
|
|
ReexportedIncludes []string `blueprint:"mutated"`
|
|
}
|
|
|
|
type sabi struct {
|
|
Properties SAbiProperties
|
|
}
|
|
|
|
func (sabimod *sabi) props() []interface{} {
|
|
return []interface{}{&sabimod.Properties}
|
|
}
|
|
|
|
func (sabimod *sabi) begin(ctx BaseModuleContext) {}
|
|
|
|
func (sabimod *sabi) deps(ctx BaseModuleContext, deps Deps) Deps {
|
|
return deps
|
|
}
|
|
|
|
func inListWithPrefixSearch(flag string, filter []string) bool {
|
|
// Assuming the filter is small enough.
|
|
// If the suffix of a filter element is *, try matching prefixes as well.
|
|
for _, f := range filter {
|
|
if (f == flag) || (strings.HasSuffix(f, "*") && strings.HasPrefix(flag, strings.TrimSuffix(f, "*"))) {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
func filterOutWithPrefix(list []string, filter []string) (remainder []string) {
|
|
// Go through the filter, matching and optionally doing a prefix search for list elements.
|
|
for _, l := range list {
|
|
if !inListWithPrefixSearch(l, filter) {
|
|
remainder = append(remainder, l)
|
|
}
|
|
}
|
|
return
|
|
}
|
|
|
|
func (sabimod *sabi) flags(ctx ModuleContext, flags Flags) Flags {
|
|
// Assuming that the cflags which clang LibTooling tools cannot
|
|
// understand have not been converted to ninja variables yet.
|
|
flags.Local.ToolingCFlags = filterOutWithPrefix(flags.Local.CFlags, config.ClangLibToolingUnknownCflags)
|
|
flags.Global.ToolingCFlags = filterOutWithPrefix(flags.Global.CFlags, config.ClangLibToolingUnknownCflags)
|
|
flags.Local.ToolingCppFlags = filterOutWithPrefix(flags.Local.CppFlags, config.ClangLibToolingUnknownCflags)
|
|
flags.Global.ToolingCppFlags = filterOutWithPrefix(flags.Global.CppFlags, config.ClangLibToolingUnknownCflags)
|
|
|
|
return flags
|
|
}
|
|
|
|
func sabiDepsMutator(mctx android.TopDownMutatorContext) {
|
|
if c, ok := mctx.Module().(*Module); ok &&
|
|
((c.IsVndk() && c.UseVndk()) || c.isLlndk(mctx.Config()) ||
|
|
(c.sabi != nil && c.sabi.Properties.CreateSAbiDumps)) {
|
|
mctx.VisitDirectDeps(func(m android.Module) {
|
|
tag := mctx.OtherModuleDependencyTag(m)
|
|
switch tag {
|
|
case StaticDepTag, staticExportDepTag, lateStaticDepTag, wholeStaticDepTag:
|
|
|
|
cc, _ := m.(*Module)
|
|
if cc == nil {
|
|
return
|
|
}
|
|
cc.sabi.Properties.CreateSAbiDumps = true
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func addLsdumpPath(lsdumpPath string) {
|
|
sabiLock.Lock()
|
|
lsdumpPaths = append(lsdumpPaths, lsdumpPath)
|
|
sabiLock.Unlock()
|
|
}
|