PATCH [i386 windows targets]: Disallow regparm for functions that probe stack
Christopher Faylor
cgf@redhat.com
Sun Oct 12 23:32:00 GMT 2003
On Mon, Oct 13, 2003 at 07:29:12AM +1000, Danny Smith wrote:
>Hello, this fixes a bug on win32 targets that is related to PR 12209.
>
>The stack probing code (i386/cygwin.asm) that is emitted when a function
>requests allocation of more than CHECK_STACK_LIMIT bytes on the stack
>overwrites EAX register. This causes functions with regparm attribute
>to return nonsense results, without warning. eg:
Hmm. I could have sworn that this was fixed once already in a different
way.
I'll have to do some email archaelogy.
cgf
More information about the Gcc-patches
mailing list