[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[DotGNU]tail call verification
From: |
C H Gowri Kumar |
Subject: |
[DotGNU]tail call verification |
Date: |
Fri, 22 Nov 2002 22:07:27 +0530 (IST) |
Hi,
In file verify_call.c:1456,
the verification for tail call is coded as:
if (( pc[2] == IL_OP_CALL ||
pc[2] == IL_OP_CALLI ||
pc[2] == IL_OP_CALLVIRT
) && pc[3 + sizeof(void *)] == IL_OP_RET)
On IA-64 evenodd.exe was not able to verify at the above point.
A quick look at the "pc" gave the details that pc[ 3 + 4] contained the
required data for test and on modification to
pc[7] == IL_OP_RET
the program ran successfully.
Just wanted to know waht is the significance of sizeof(void*) there?(is it
a bug?)
Regards,
Gowri Kumar
- [DotGNU]tail call verification,
C H Gowri Kumar <=