aboutsummaryrefslogtreecommitdiff
path: root/llvm/lib/CodeGen/LocalStackSlotAllocation.cpp
diff options
context:
space:
mode:
authorPirama Arumuga Nainar <pirama@google.com>2019-07-25 22:10:56 +0000
committerPirama Arumuga Nainar <pirama@google.com>2019-07-25 22:10:56 +0000
commit6caa8da072d600c97b10a486a1995a999a3672ea (patch)
tree82ab5140e250db7d0c7d55f51391c2c9572c81e3 /llvm/lib/CodeGen/LocalStackSlotAllocation.cpp
parentc07c83b16206b256c145c799b871d29e11db1622 (diff)
downloadllvm-6caa8da072d600c97b10a486a1995a999a3672ea.zip
llvm-6caa8da072d600c97b10a486a1995a999a3672ea.tar.gz
llvm-6caa8da072d600c97b10a486a1995a999a3672ea.tar.bz2
[profile] In Android, do not mkdir() dirs in GCOV_PREFIX
Summary: In Android, attempting to mkdir() or even stat() top-level directories like /data causes noisy selinux denials. During whole-system coverage instrumentation, this causes a deluge of noisy messages that drown out legitimate selinux denials, that should be audited and fixed. To avoid this, skip creating any directory in GCOV_PREFIX (thereby assuming that it exists). - Android platform ensures that the GCOV_PREFIX used in Android is created and read/writable by all processes. - This only affects the Android platform (by checking against __ANDROID_API_FUTURE__) and for apps built with Clang coverage, the runtime will still create any non-existent parent directories for the coverage files. Reviewers: srhines, davidxl Subscribers: krytarowski, #sanitizers, danalbert, llvm-commits Tags: #sanitizers, #llvm Differential Revision: https://reviews.llvm.org/D65245 llvm-svn: 367064
Diffstat (limited to 'llvm/lib/CodeGen/LocalStackSlotAllocation.cpp')
0 files changed, 0 insertions, 0 deletions