https://bugs.kde.org/show_bug.cgi?id=371966
--- Comment #20 from Tom Hughes <t...@compton.nu> --- Actually given that the return from the call will unwind the stack again that means the caller will be accessing values below the stack pointer which is unsafe if a signal fires as the signal may trash the stack below the stack pointer (there's a small extra redzone below sp that is safe on x86_64 but not on x86_32). -- You are receiving this mail because: You are watching all bug changes.