1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
|
// Copyright 2019 The Chromium OS Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
package main
import (
"bufio"
"bytes"
"fmt"
"io"
"os"
"path/filepath"
"strings"
"syscall"
"time"
)
const prebuiltCompilerPathKey = "ANDROID_LLVM_PREBUILT_COMPILER_PATH"
func shouldCompileWithFallback(env env) bool {
value, _ := env.getenv(prebuiltCompilerPathKey)
return value != ""
}
// FIXME: Deduplicate this logic with the logic for FORCE_DISABLE_WERROR
// (the logic here is from Android, the logic for FORCE_DISABLE_WERROR is from ChromeOS)
func compileWithFallback(env env, cfg *config, originalCmd *command, absWrapperPath string) (exitCode int, err error) {
firstCmd := &command{
Path: originalCmd.Path,
Args: originalCmd.Args,
EnvUpdates: originalCmd.EnvUpdates,
}
// We only want to pass extra flags to clang and clang++.
if base := filepath.Base(originalCmd.Path); base == "clang.real" || base == "clang++.real" {
// We may introduce some new warnings after rebasing and we need to
// disable them before we fix those warnings.
extraArgs, _ := env.getenv("ANDROID_LLVM_FALLBACK_DISABLED_WARNINGS")
firstCmd.Args = append(
append(firstCmd.Args, "-fno-color-diagnostics"),
strings.Split(extraArgs, " ")...,
)
}
firstCmdStdinBuffer := &bytes.Buffer{}
firstCmdStderrBuffer := &bytes.Buffer{}
firstCmdExitCode, err := wrapSubprocessErrorWithSourceLoc(firstCmd,
env.run(firstCmd, teeStdinIfNeeded(env, firstCmd, firstCmdStdinBuffer), env.stdout(), io.MultiWriter(env.stderr(), firstCmdStderrBuffer)))
if err != nil {
return 0, err
}
if firstCmdExitCode == 0 {
return 0, nil
}
stderrRedirectPath, _ := env.getenv("ANDROID_LLVM_STDERR_REDIRECT")
f, err := os.OpenFile(stderrRedirectPath, os.O_CREATE|os.O_APPEND|os.O_WRONLY, 0644)
if err != nil {
return 0, wrapErrorwithSourceLocf(err, "error opening stderr file %s", stderrRedirectPath)
}
lockSuccess := false
for i := 0; i < 30; i++ {
err := syscall.Flock(int(f.Fd()), syscall.LOCK_EX|syscall.LOCK_NB)
if err == nil {
lockSuccess = true
break
}
if errno, ok := err.(syscall.Errno); ok {
if errno == syscall.EAGAIN || errno == syscall.EACCES {
time.Sleep(500 * time.Millisecond)
err = nil
}
}
if err != nil {
return 0, wrapErrorwithSourceLocf(err, "error waiting to lock file %s", stderrRedirectPath)
}
}
if !lockSuccess {
return 0, wrapErrorwithSourceLocf(err, "timeout waiting to lock file %s", stderrRedirectPath)
}
w := bufio.NewWriter(f)
w.WriteString("==================COMMAND:====================\n")
fmt.Fprintf(w, "%s %s\n\n", firstCmd.Path, strings.Join(firstCmd.Args, " "))
firstCmdStderrBuffer.WriteTo(w)
w.WriteString("==============================================\n\n")
if err := w.Flush(); err != nil {
return 0, wrapErrorwithSourceLocf(err, "unable to write to file %s", stderrRedirectPath)
}
if err := f.Close(); err != nil {
return 0, wrapErrorwithSourceLocf(err, "error closing file %s", stderrRedirectPath)
}
prebuiltCompilerPath, _ := env.getenv(prebuiltCompilerPathKey)
fallbackCmd := &command{
Path: filepath.Join(prebuiltCompilerPath, filepath.Base(absWrapperPath)),
// Don't use extra args added (from ANDROID_LLVM_FALLBACK_DISABLED_WARNINGS) for clang and
// clang++ above. They may not be recognized by the fallback clang.
Args: originalCmd.Args,
// Delete prebuiltCompilerPathKey so the fallback doesn't keep
// calling itself in case of an error.
EnvUpdates: append(originalCmd.EnvUpdates, prebuiltCompilerPathKey+"="),
}
return wrapSubprocessErrorWithSourceLoc(fallbackCmd,
env.run(fallbackCmd, bytes.NewReader(firstCmdStdinBuffer.Bytes()), env.stdout(), env.stderr()))
}
|