diff options
author | Marcos Pividori <mpividori@google.com> | 2017-02-02 23:01:34 +0000 |
---|---|---|
committer | Marcos Pividori <mpividori@google.com> | 2017-02-02 23:01:34 +0000 |
commit | f5d265460d9969661ad30e4222a928ecdf3b9868 (patch) | |
tree | 76cf701259c0811a15b02b8b7c3db662728e638d /llvm/lib/Analysis/ModuleSummaryAnalysis.cpp | |
parent | bfdfaa11cab0ebb99566b99dea4d5dce99ead5a9 (diff) | |
download | llvm-f5d265460d9969661ad30e4222a928ecdf3b9868.zip llvm-f5d265460d9969661ad30e4222a928ecdf3b9868.tar.gz llvm-f5d265460d9969661ad30e4222a928ecdf3b9868.tar.bz2 |
[sanitizer] Intercept weak functions in dll_thunks.
In this diff, I update current implementation of the interception in dll_thunks
to consider the special case of weak functions.
First we check if the client has redefined the function in the main executable
(for example: __sanitizer_cov_trace_pc_guard). It we can't find it, then we look
for the default implementation (__sanitizer_cov_trace_pc_guard__dll). The
default implementation is always available because the static runtime is linked
to the main executable.
Differential Revision: https://reviews.llvm.org/D29155
llvm-svn: 293952
Diffstat (limited to 'llvm/lib/Analysis/ModuleSummaryAnalysis.cpp')
0 files changed, 0 insertions, 0 deletions