WARNING! Access to this system is limited to authorised users only.
Unauthorised users may be subject to prosecution.
Unauthorised access to this system is a criminal offence under Australian law (Federal Crimes Act 1914 Part VIA)
It is a criminal offence to:
(1) Obtain access to data without authority. -Penalty 2 years imprisonment.
(2) Damage, delete, alter or insert data without authority. -Penalty 10 years imprisonment.
User activity is monitored and recorded. Anyone using this system expressly consents to such monitoring and recording.

To protect your data, the CISO officer has suggested users to enable 2FA as soon as possible.
Currently 2.7% of users enabled 2FA.

Commit d35d7dfc authored by Armin Rigo's avatar Armin Rigo
Browse files

Fix for calls to '__x86.get_pc_thunk'

parent af3884e2
......@@ -926,6 +926,13 @@ class FunctionGcRootTracker(object):
assert lineoffset in (1,2)
return [InsnStackAdjust(-4)]
if target.startswith('__x86.get_pc_thunk.'):
# special case, found on x86-32: these static functions
# contain only a simple load of some non-GC pointer to
# a specific register (not necessarily EAX)
reg = '%e' + target.split('.')[-1]
return [InsnSetLocal(reg)]
insns = [InsnCall(target, self.currentlineno),
InsnSetLocal(self.EAX)] # the result is there
if self.format in ('mingw32', 'msvc'):
......
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment