https://bugs.kde.org/show_bug.cgi?id=374940
Tom Hughes <[email protected]> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |[email protected] --- Comment #1 from Tom Hughes <[email protected]> --- I think you need to explain exactly what the purpose of the instruction is - if the result isn't being relied on then presumably it is being executed for some sort of side effect? In general accessing below the stack pointer on x86_32 is unsafe even when ignoring questions of definedness because a signal may cause corruption of anything stored there. -- You are receiving this mail because: You are watching all bug changes.
