diff options
author | Pirama Arumuga Nainar <pirama@google.com> | 2019-07-25 22:10:56 +0000 |
---|---|---|
committer | Pirama Arumuga Nainar <pirama@google.com> | 2019-07-25 22:10:56 +0000 |
commit | 6caa8da072d600c97b10a486a1995a999a3672ea (patch) | |
tree | 82ab5140e250db7d0c7d55f51391c2c9572c81e3 /llvm/lib/CodeGen/LocalStackSlotAllocation.cpp | |
parent | c07c83b16206b256c145c799b871d29e11db1622 (diff) | |
download | llvm-6caa8da072d600c97b10a486a1995a999a3672ea.zip llvm-6caa8da072d600c97b10a486a1995a999a3672ea.tar.gz llvm-6caa8da072d600c97b10a486a1995a999a3672ea.tar.bz2 |
[profile] In Android, do not mkdir() dirs in GCOV_PREFIX
Summary:
In Android, attempting to mkdir() or even stat() top-level directories
like /data causes noisy selinux denials. During whole-system coverage
instrumentation, this causes a deluge of noisy messages that drown out
legitimate selinux denials, that should be audited and fixed.
To avoid this, skip creating any directory in GCOV_PREFIX (thereby
assuming that it exists).
- Android platform ensures that the GCOV_PREFIX used in Android is
created and read/writable by all processes.
- This only affects the Android platform (by checking against
__ANDROID_API_FUTURE__) and for apps built with Clang coverage, the
runtime will still create any non-existent parent directories for the
coverage files.
Reviewers: srhines, davidxl
Subscribers: krytarowski, #sanitizers, danalbert, llvm-commits
Tags: #sanitizers, #llvm
Differential Revision: https://reviews.llvm.org/D65245
llvm-svn: 367064
Diffstat (limited to 'llvm/lib/CodeGen/LocalStackSlotAllocation.cpp')
0 files changed, 0 insertions, 0 deletions