diff options
author | Jan Vorlicek <janvorli@microsoft.com> | 2018-09-25 01:51:44 +0200 |
---|---|---|
committer | Woongsuk Cho <ws77.cho@samsung.com> | 2019-03-07 15:27:38 +0900 |
commit | b123f4f2eb22ec1d34c657a08e1309a7b19b2c12 (patch) | |
tree | fb054b9bff2f50a504dc00ba36e26f533e45952b /src/ilasm | |
parent | 76d2d2dd465ab9beb50786793876608279983885 (diff) | |
download | coreclr-b123f4f2eb22ec1d34c657a08e1309a7b19b2c12.tar.gz coreclr-b123f4f2eb22ec1d34c657a08e1309a7b19b2c12.tar.bz2 coreclr-b123f4f2eb22ec1d34c657a08e1309a7b19b2c12.zip |
Fix hijacking for ARM/ARM64/x86 on Unix (#20042)
* Fix hijacking for ARM/ARM64/x86 on Unix
We were not checking the case when we have interrupted a thread inside
of a function epilog for other architectures than amd64. When such an
interruption happens, GS cookie check in a stack walking has failed,
since we are unable to decode GS cookie location when the IP is in
epilog.
This fix implements IsIPInEpilog for all architectures and makes the
check unconditional.
Change-Id: I9adafe6df13ecaff90fc2bf32d8a8db5f40bdcda
Diffstat (limited to 'src/ilasm')
0 files changed, 0 insertions, 0 deletions