https://bugs.kde.org/show_bug.cgi?id=371966

--- Comment #20 from Tom Hughes <t...@compton.nu> ---
Actually given that the return from the call will unwind the stack again that
means the caller will be accessing values below the stack pointer which is
unsafe if a signal fires as the signal may trash the stack below the stack
pointer (there's a small extra redzone below sp that is safe on x86_64 but not
on x86_32).

-- 
You are receiving this mail because:
You are watching all bug changes.

Reply via email to