------- Comment #8 from ebotcazou at gcc dot gnu dot org  2006-01-17 08:47 
-------
> You're assuming hex_to_chararacter is 'entered' normally.  It is NOT.  The
> corrupt stack causes a branch into the middle of that routine, which is why
> the system reports an illegal instruction.

Ah, thanks for the clarification.  Looks pretty nasty indeed.

> Below is a NEXT-by-NEXT trace leading to the failure.

I think a real, native backtrace would be more useful, on SPARC for example.

> This program is too big for me to create a testcase.  I have no idea where
> execution is going, only the final failure, which doesn't even allow 'gdb'
> to know 'where' we are.

Then we are in a dead end because if you, developer/hacker/user of the program,
 cannot pinpoint the source of the ill-execution, we cannot either.  We have
neither the time nor the resources to debug every miscompiled program; you have
to do half of the work, we'll do the other half.  Thanks.


-- 


http://gcc.gnu.org/bugzilla/show_bug.cgi?id=25791

Reply via email to