2017-02-09 05:45:53 +08:00
|
|
|
// Copyright 2017 Google Inc. All rights reserved.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
|
|
|
// http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
|
|
|
|
package cc
|
|
|
|
|
|
|
|
import (
|
2017-06-16 05:45:18 +08:00
|
|
|
"strings"
|
2018-02-24 08:43:23 +08:00
|
|
|
"sync"
|
2017-06-16 05:45:18 +08:00
|
|
|
|
2017-06-24 06:06:31 +08:00
|
|
|
"android/soong/android"
|
2017-02-09 05:45:53 +08:00
|
|
|
"android/soong/cc/config"
|
|
|
|
)
|
|
|
|
|
2018-02-24 08:43:23 +08:00
|
|
|
var (
|
|
|
|
lsdumpPaths []string
|
|
|
|
sabiLock sync.Mutex
|
|
|
|
)
|
|
|
|
|
2017-02-09 05:45:53 +08:00
|
|
|
type SAbiProperties struct {
|
2019-06-03 18:10:47 +08:00
|
|
|
CreateSAbiDumps bool `blueprint:"mutated"`
|
|
|
|
ReexportedIncludes []string `blueprint:"mutated"`
|
2017-02-09 05:45:53 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
type sabi struct {
|
|
|
|
Properties SAbiProperties
|
|
|
|
}
|
|
|
|
|
|
|
|
func (sabimod *sabi) props() []interface{} {
|
|
|
|
return []interface{}{&sabimod.Properties}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (sabimod *sabi) begin(ctx BaseModuleContext) {}
|
|
|
|
|
|
|
|
func (sabimod *sabi) deps(ctx BaseModuleContext, deps Deps) Deps {
|
|
|
|
return deps
|
|
|
|
}
|
|
|
|
|
2017-06-16 05:45:18 +08:00
|
|
|
func inListWithPrefixSearch(flag string, filter []string) bool {
|
|
|
|
// Assuming the filter is small enough.
|
|
|
|
// If the suffix of a filter element is *, try matching prefixes as well.
|
|
|
|
for _, f := range filter {
|
|
|
|
if (f == flag) || (strings.HasSuffix(f, "*") && strings.HasPrefix(flag, strings.TrimSuffix(f, "*"))) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
func filterOutWithPrefix(list []string, filter []string) (remainder []string) {
|
|
|
|
// Go through the filter, matching and optionally doing a prefix search for list elements.
|
|
|
|
for _, l := range list {
|
|
|
|
if !inListWithPrefixSearch(l, filter) {
|
|
|
|
remainder = append(remainder, l)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2017-02-09 05:45:53 +08:00
|
|
|
func (sabimod *sabi) flags(ctx ModuleContext, flags Flags) Flags {
|
2017-06-16 05:45:18 +08:00
|
|
|
// Assuming that the cflags which clang LibTooling tools cannot
|
|
|
|
// understand have not been converted to ninja variables yet.
|
|
|
|
flags.ToolingCFlags = filterOutWithPrefix(flags.CFlags, config.ClangLibToolingUnknownCflags)
|
2018-08-23 05:18:04 +08:00
|
|
|
flags.ToolingCppFlags = filterOutWithPrefix(flags.CppFlags, config.ClangLibToolingUnknownCflags)
|
2017-07-20 12:29:24 +08:00
|
|
|
|
2017-02-09 05:45:53 +08:00
|
|
|
return flags
|
|
|
|
}
|
|
|
|
|
|
|
|
func sabiDepsMutator(mctx android.TopDownMutatorContext) {
|
|
|
|
if c, ok := mctx.Module().(*Module); ok &&
|
2019-05-09 09:56:13 +08:00
|
|
|
((c.isVndk() && c.useVndk()) || inList(c.Name(), *llndkLibraries(mctx.Config())) ||
|
2017-02-09 05:45:53 +08:00
|
|
|
(c.sabi != nil && c.sabi.Properties.CreateSAbiDumps)) {
|
2017-10-24 08:59:01 +08:00
|
|
|
mctx.VisitDirectDeps(func(m android.Module) {
|
2017-02-09 05:45:53 +08:00
|
|
|
tag := mctx.OtherModuleDependencyTag(m)
|
|
|
|
switch tag {
|
|
|
|
case staticDepTag, staticExportDepTag, lateStaticDepTag, wholeStaticDepTag:
|
|
|
|
|
|
|
|
cc, _ := m.(*Module)
|
|
|
|
if cc == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
cc.sabi.Properties.CreateSAbiDumps = true
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
2019-07-31 17:10:45 +08:00
|
|
|
|
|
|
|
func addLsdumpPath(lsdumpPath string) {
|
|
|
|
sabiLock.Lock()
|
|
|
|
lsdumpPaths = append(lsdumpPaths, lsdumpPath)
|
|
|
|
sabiLock.Unlock()
|
|
|
|
}
|