diff options
author | wittman <wittman@chromium.org> | 2015-10-15 15:07:35 -0700 |
---|---|---|
committer | Commit bot <commit-bot@chromium.org> | 2015-10-15 22:08:30 +0000 |
commit | 4c7da618ef084822c587c62a77bfce0bbbe25608 (patch) | |
tree | 4352804294731c1e351646f63383519304fc789f /tools/vim/ninja_output.py | |
parent | dbde4d0b8dffa1f06ab264f36dda051386772b0b (diff) | |
download | chromium_src-4c7da618ef084822c587c62a77bfce0bbbe25608.zip chromium_src-4c7da618ef084822c587c62a77bfce0bbbe25608.tar.gz chromium_src-4c7da618ef084822c587c62a77bfce0bbbe25608.tar.bz2 |
Stack sampling profiler: work around invalid BoringSSL assembly
BoringSSL's custom x86_64 assembly code doesn't follow the Microsoft x64
calling convention, but still has unwind information. This gives wrong
results unwinding the stack in some cases, generating instruction
pointers that don't point within known modules.
This change works around this case in the profiler code until the
BoringSSL code can be fixed.
BUG=542919
Review URL: https://codereview.chromium.org/1404403002
Cr-Commit-Position: refs/heads/master@{#354375}
Diffstat (limited to 'tools/vim/ninja_output.py')
0 files changed, 0 insertions, 0 deletions