[PATCH] D29168: [compiler-rt] Use interception to access to strong functions defined in the main executable.

Marcos Pividori via Phabricator via llvm-commits llvm-commits at lists.llvm.org
Thu Feb 2 15:13:34 PST 2017


This revision was automatically updated to reflect the committed changes.
Closed by commit rL293958: [sanitizer] Use interception to access to strong definitions in the executable. (authored by mpividori).

Changed prior to commit:
  https://reviews.llvm.org/D29168?vs=85863&id=86898#toc

Repository:
  rL LLVM

https://reviews.llvm.org/D29168

Files:
  compiler-rt/trunk/lib/asan/CMakeLists.txt
  compiler-rt/trunk/lib/asan/asan_win_weak_interception.cc
  compiler-rt/trunk/lib/sanitizer_common/CMakeLists.txt
  compiler-rt/trunk/lib/sanitizer_common/sanitizer_coverage_win_weak_interception.cc
  compiler-rt/trunk/lib/sanitizer_common/sanitizer_win_weak_interception.cc
  compiler-rt/trunk/lib/sanitizer_common/sanitizer_win_weak_interception.h
  compiler-rt/trunk/lib/ubsan/CMakeLists.txt
  compiler-rt/trunk/lib/ubsan/ubsan_win_weak_interception.cc

-------------- next part --------------
A non-text attachment was scrubbed...
Name: D29168.86898.patch
Type: text/x-patch
Size: 12836 bytes
Desc: not available
URL: <http://lists.llvm.org/pipermail/llvm-commits/attachments/20170202/81866573/attachment.bin>


More information about the llvm-commits mailing list