[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[DotGNU]tail call verification

From: C H Gowri Kumar
Subject: [DotGNU]tail call verification
Date: Fri, 22 Nov 2002 22:07:27 +0530 (IST)

In file verify_call.c:1456,
the verification for tail call is coded as:
if (( pc[2] == IL_OP_CALL ||
            pc[2] == IL_OP_CALLI ||
            pc[2] == IL_OP_CALLVIRT
            ) && pc[3 + sizeof(void *)] == IL_OP_RET)

On IA-64 evenodd.exe was not able to verify at the above point. 
A quick look at the "pc" gave the details that pc[ 3 + 4] contained the
required data for test and on modification to 
pc[7] == IL_OP_RET 
the program ran successfully.

Just wanted to know waht is the significance of sizeof(void*) there?(is it
a bug?)

Gowri Kumar

reply via email to

[Prev in Thread] Current Thread [Next in Thread]