This is the mail archive of the
gdb-prs@sourceware.org
mailing list for the GDB project.
[Bug c++/21222] A function with VEX encoded SSE instructions and a particular number of arguments corrupts a value calculated on the stack when stepping through the function
- From: "kungfujesus06 at gmail dot com" <sourceware-bugzilla at sourceware dot org>
- To: gdb-prs at sourceware dot org
- Date: Thu, 07 Dec 2017 16:57:24 +0000
- Subject: [Bug c++/21222] A function with VEX encoded SSE instructions and a particular number of arguments corrupts a value calculated on the stack when stepping through the function
- Auto-submitted: auto-generated
- References: <bug-21222-4717@http.sourceware.org/bugzilla/>
https://sourceware.org/bugzilla/show_bug.cgi?id=21222
--- Comment #20 from Adam Stylinski <kungfujesus06 at gmail dot com> ---
Oh also - do you know if your fix could be backported to other releases and
pushed to the distributions? It's awesome my debugger doesn't corrupt memory
anymore when debugging functions. I guess I can remember to use the workaround
in the interim - though this makes stepping over a breakpoint impossible,
doesn't it?
--
You are receiving this mail because:
You are on the CC list for the bug.