This is the mail archive of the
gdb-patches@sourceware.org
mailing list for the GDB project.
Re: [PATCH V8] amd64-mpx: initialize BND register before performing inferior calls.
- From: Eli Zaretskii <eliz at gnu dot org>
- To: Walfred Tedeschi <walfred dot tedeschi at intel dot com>
- Cc: palves at redhat dot com, qiyaoltc at gmail dot com, brobecker at adacore dot com, gdb-patches at sourceware dot org
- Date: Tue, 21 Feb 2017 19:05:58 +0200
- Subject: Re: [PATCH V8] amd64-mpx: initialize BND register before performing inferior calls.
- Authentication-results: sourceware.org; auth=none
- References: <1487695238-15286-1-git-send-email-walfred.tedeschi@intel.com>
- Reply-to: Eli Zaretskii <eliz at gnu dot org>
> From: Walfred Tedeschi <walfred.tedeschi@intel.com>
> Cc: gdb-patches@sourceware.org, Walfred Tedeschi <walfred.tedeschi@intel.com>
> Date: Tue, 21 Feb 2017 17:40:38 +0100
>
> +On the other hand you can also examine the influence of the bound register in
> +the execution of the function, i.e. verify if modifying bounds would cause bound
^^^^
Either "i.e.,", with a comma, or "i.e.@:", so that TeX doesn't decide
this ends a sentence.
> +viaolations and how. You can achieve this by stoppying the execution of the
^^^^^^^^^^^ ^^^^^^^^^
Typos.
> +called function at its prologue and setting the bnd registers continuing then
^^^
Wrong letter-case? a typo?
> +the execution. See the example below:
^^
Two spaces here, please.
> +At this last step the value of bnd0 can be changed for investigation of bound
> +violations caused along the execution of the call. In order to know how to
> +set the bnd registers or bound table for the call consult the ABI.
^^^
"bound"?
Thanks.