PATCH [i386 windows targets]: Disallow regparm for functions that probe stack

Christopher Faylor cgf@redhat.com
Sun Oct 12 23:32:00 GMT 2003


On Mon, Oct 13, 2003 at 07:29:12AM +1000, Danny Smith wrote:
>Hello, this fixes a bug on win32 targets that is related to PR 12209.
>
>The stack probing code (i386/cygwin.asm) that is emitted when a function
>requests allocation of more than CHECK_STACK_LIMIT bytes on the stack
>overwrites EAX register.  This causes functions with regparm attribute
>to return nonsense results, without warning.  eg:

Hmm.  I could have sworn that this was fixed once already in a different
way.

I'll have to do some email archaelogy.

cgf



More information about the Gcc-patches mailing list