aboutsummaryrefslogtreecommitdiff
path: root/llvm/lib/Analysis/ModuleSummaryAnalysis.cpp
diff options
context:
space:
mode:
authorMarcos Pividori <mpividori@google.com>2017-02-02 23:01:34 +0000
committerMarcos Pividori <mpividori@google.com>2017-02-02 23:01:34 +0000
commitf5d265460d9969661ad30e4222a928ecdf3b9868 (patch)
tree76cf701259c0811a15b02b8b7c3db662728e638d /llvm/lib/Analysis/ModuleSummaryAnalysis.cpp
parentbfdfaa11cab0ebb99566b99dea4d5dce99ead5a9 (diff)
downloadllvm-f5d265460d9969661ad30e4222a928ecdf3b9868.zip
llvm-f5d265460d9969661ad30e4222a928ecdf3b9868.tar.gz
llvm-f5d265460d9969661ad30e4222a928ecdf3b9868.tar.bz2
[sanitizer] Intercept weak functions in dll_thunks.
In this diff, I update current implementation of the interception in dll_thunks to consider the special case of weak functions. First we check if the client has redefined the function in the main executable (for example: __sanitizer_cov_trace_pc_guard). It we can't find it, then we look for the default implementation (__sanitizer_cov_trace_pc_guard__dll). The default implementation is always available because the static runtime is linked to the main executable. Differential Revision: https://reviews.llvm.org/D29155 llvm-svn: 293952
Diffstat (limited to 'llvm/lib/Analysis/ModuleSummaryAnalysis.cpp')
0 files changed, 0 insertions, 0 deletions