зеркало из https://github.com/mozilla/gecko-dev.git
76ce9d96fa
Under the stronger Control Flow Guard scheme coming in clang 10, when a nop-space hook jumps back to the original API, at `ntdll!Whatever+2`, that address is not a registered jump target, so we crash with a CFG failure. Since this is a deliberate violation of the rules, let's disable CFG for these calls. Based on my testing, this is the only place we need to use this attribute, so I placed its definition close to the use. (Had we needed more of these, I would have put it in mfbt/.) Differential Revision: https://phabricator.services.mozilla.com/D59728 --HG-- extra : moz-landing-system : lando |
||
---|---|---|
.. | ||
decimal | ||
interceptor | ||
AutoProfilerLabel.cpp | ||
AutoProfilerLabel.h | ||
ConditionVariable_posix.cpp | ||
ConditionVariable_windows.cpp | ||
Debug.h | ||
DynamicallyLinkedFunctionPtr.h | ||
ImportDir.h | ||
MutexPlatformData_posix.h | ||
MutexPlatformData_windows.h | ||
Mutex_posix.cpp | ||
Mutex_windows.cpp | ||
NativeNt.h | ||
PlatformConditionVariable.h | ||
PlatformMutex.h | ||
Printf.cpp | ||
Printf.h | ||
StackWalk.cpp | ||
StackWalk.h | ||
StackWalk_windows.h | ||
TimeStamp.cpp | ||
TimeStamp.h | ||
TimeStamp_darwin.cpp | ||
TimeStamp_posix.cpp | ||
TimeStamp_windows.cpp | ||
TimeStamp_windows.h | ||
WinUtils.h | ||
WindowsMapRemoteView.cpp | ||
WindowsMapRemoteView.h | ||
WindowsProcessMitigations.cpp | ||
WindowsProcessMitigations.h | ||
WindowsUnicode.cpp | ||
WindowsUnicode.h | ||
moz.build | ||
nsWindowsDllInterceptor.h |