aboutsummaryrefslogtreecommitdiff
path: root/llvm/lib/CodeGen/SafeStackLayout.cpp
diff options
context:
space:
mode:
authorReid Kleckner <rnk@google.com>2016-08-02 20:36:29 +0000
committerReid Kleckner <rnk@google.com>2016-08-02 20:36:29 +0000
commitd6371ea52a99fbca64dbc8d7cfb10a7f14bf3bb0 (patch)
tree5d0aaf9a94be98f7b0bc4a2cfb98580c4b7cc6f5 /llvm/lib/CodeGen/SafeStackLayout.cpp
parent053826f1465475cf353f526f7ece0e85dcb2e924 (diff)
downloadllvm-d6371ea52a99fbca64dbc8d7cfb10a7f14bf3bb0.zip
llvm-d6371ea52a99fbca64dbc8d7cfb10a7f14bf3bb0.tar.gz
llvm-d6371ea52a99fbca64dbc8d7cfb10a7f14bf3bb0.tar.bz2
[asan] Intercept RtlRaiseException instead of kernel32!RaiseException
Summary: On my install of Windows 10, RaiseException is a tail call to kernelbase!RaiseException. Obviously, we fail to intercept that. Instead, try hooking at the ntdll!RtlRaiseException layer. It is unlikely that this layer will contain control flow. Intercepting at this level requires adding a decoding for 'LEA ESP, [ESP + 0xXXXXXXXX]', which is a really obscure way to write 'SUB ESP, 0xXXXXXXXX' that avoids clobbering EFLAGS. Reviewers: etienneb Subscribers: llvm-commits, kubabrecka Differential Revision: https://reviews.llvm.org/D23046 llvm-svn: 277518
Diffstat (limited to 'llvm/lib/CodeGen/SafeStackLayout.cpp')
0 files changed, 0 insertions, 0 deletions