Bill Wendling
|
1cf9ab8ab8
Use function attributes to indicate if we don't want to realign the stack.
|
12 years ago |
Bill Wendling
|
cab4a09d69
Replace the "NoFramePointerElimNonLeaf" target option with a function attribute.
|
12 years ago |
Bill Wendling
|
8d230b454f
Use function attributes to pass along the stack protector buffer size instead of making it a target option.
|
12 years ago |
Nick Lewycky
|
fdf137b907
Make -vectorize-... proper cc1 flags instead of abusing -backend-option. Fixes
|
12 years ago |
Nick Lewycky
|
73b8d4bdd6
Fix a leak of TargetMachine in clang. We'll continue to leak it on purpose if
|
12 years ago |
Meador Inge
|
381c9b7b55
CodeGen: Don't set 'PMBuilder.DisableSimplifyLibCalls'
|
12 years ago |
Eric Christopher
|
3105627bd7
Plumb through the -fsplit-stack option using the existing backend
|
12 years ago |
Chad Rosier
|
a03fc6e249
If we're unable to create the TargetMachine, then just quit producing the
|
12 years ago |
Chad Rosier
|
e2359e2132
Fix a crasher by reporting a fatal error if we're unable to create the target
|
12 years ago |
Nick Lewycky
|
83c546afef
The flag "-coverage-function-names-in-data" is actually backwards -- we do
|
12 years ago |
Nick Lewycky
|
f2b5e07072
Make clang emit linkage names in debug info for subprograms when coverage info
|
12 years ago |
Nick Lewycky
|
c3ae583a9a
Update GCOVProfiling pass creation for API change in r177002. No functionality change.
|
12 years ago |
Nick Lewycky
|
9789d0d247
Fix build with clang, this was supposed to be part of r176617.
|
12 years ago |
Nick Lewycky
|
f4086ebb09
Update clang for LLVM API change. No functionality change.
|
12 years ago |
Evgeniy Stepanov
|
a8d3904ffa
[msan] Run more optimizations after MemorySanitizer pass.
|
12 years ago |
Michael Gottesman
|
23d5b090cb
Since ObjCARC has been refactored into its own library with its own declaration header, we need to include the declaration header alongside Scalar.h in BackendUtil.
|
12 years ago |
Alexey Samsonov
|
4bdc60434c
Add top-level Clang flag -f(no-)sanitize-address-zero-base-shadow that makes AddressSanitizer use bottom of the address space for the shadow memory. On Linux it can be used with -fPIE/-pie to improve performance.
|
12 years ago |
Will Dietz
|
4f45bc099f
[ubsan] Add support for -fsanitize-blacklist
|
12 years ago |
Chandler Carruth
|
d938e87458
Switch to asking the target machine to add any relevant analysis passses
|
12 years ago |
Chandler Carruth
|
d826f11d2c
Companion patch to r171621 which changed the interface for creating TTI
|
12 years ago |
Chandler Carruth
|
3b844ba7d5
Rewrite #includes for llvm/Foo.h to llvm/IR/Foo.h as appropriate to
|
12 years ago |
Chandler Carruth
|
b99083e603
Re-sort #include lines using the llvm/utils/sort_includes.py script.
|
12 years ago |
Alexey Samsonov
|
e8c0322701
Add proper support for -fsanitize-blacklist= flag for TSan and MSan. Clang part.
|
12 years ago |
Evgeniy Stepanov
|
34ef11be9d
Support -fsanitize-memory-track-origins.
|
12 years ago |
NAKAMURA Takumi
|
007c44ccbd
BackendUtil.cpp: Add #include "llvm/TargetTransformInfo.h"
|
12 years ago |
Bill Wendling
|
44f4a2d8a9
Specify if `-mno-red-zone' was used when creating the GCOV instrucmentation pass.
|
12 years ago |
Chandler Carruth
|
55fc873017
Sort all of Clang's files under 'lib', and fix up the broken headers
|
12 years ago |
Alexey Samsonov
|
91ecfa6af5
Add Clang flags -fsanitize-blacklist and -fno-sanitize-blacklist. Make this flag usable for ASan. Blacklisting can be used to disable sanitizer checks for particular file/function/object.
|
12 years ago |
Evgeniy Stepanov
|
09ccf39c13
Add -fsanitize=memory.
|
12 years ago |
Alexey Samsonov
|
4d1a6e41e1
This patch exposes to Clang users three more sanitizers are experimental features of ASan:
|
12 years ago |