This is the mail archive of the gdb-prs@sourceware.org mailing list for the GDB project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug c++/21222] A function with VEX encoded SSE instructions and a particular number of arguments corrupts a value calculated on the stack when stepping through the function


https://sourceware.org/bugzilla/show_bug.cgi?id=21222

--- Comment #20 from Adam Stylinski <kungfujesus06 at gmail dot com> ---
Oh also - do you know if your fix could be backported to other releases and
pushed to the distributions?  It's awesome my debugger doesn't corrupt memory
anymore when debugging functions.  I guess I can remember to use the workaround
in the interim - though this makes stepping over a breakpoint impossible,
doesn't it?

-- 
You are receiving this mail because:
You are on the CC list for the bug.

Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]