[Sanitizer] Disable getusershell interception for Android
authorDavid Carlier <devnexen@gmail.com>
Fri, 11 Jan 2019 20:09:24 +0000 (20:09 +0000)
committerDavid Carlier <devnexen@gmail.com>
Fri, 11 Jan 2019 20:09:24 +0000 (20:09 +0000)
Reviewers: vitalybuka, pcc, eugenis

Reviewed By: eugenis

Differential Revision: https://reviews.llvm.org/D56583

llvm-svn: 350965

compiler-rt/lib/sanitizer_common/sanitizer_platform_interceptors.h
compiler-rt/test/sanitizer_common/TestCases/Posix/getusershell.cc

index 96fb0b8..bf5f4ae 100644 (file)
 #define SANITIZER_INTERCEPT_GETFSENT (SI_FREEBSD || SI_NETBSD || SI_MAC)
 #define SANITIZER_INTERCEPT_ARC4RANDOM (SI_FREEBSD || SI_NETBSD)
 #define SANITIZER_INTERCEPT_FDEVNAME SI_FREEBSD
-#define SANITIZER_INTERCEPT_GETUSERSHELL SI_POSIX
+#define SANITIZER_INTERCEPT_GETUSERSHELL (SI_POSIX && !SI_POSIX)
 
 #define SANITIZER_INTERCEPT_POPEN SI_POSIX
 #define SANITIZER_INTERCEPT_POPENVE SI_NETBSD
index 5654423..c00d75f 100644 (file)
@@ -1,6 +1,6 @@
 // RUN: %clangxx -O0 -g %s -o %t && %run %t 2>&1 | FileCheck %s
 
-// XFAIL: android
+// UNSUPPORTED: android
 
 #include <assert.h>
 #include <errno.h>