Zheng Da, le Tue 08 Jun 2010 07:54:40 -0400, a écrit :
> On Mon, Jun 7, 2010 at 4:20 AM, Samuel Thibault <samuel.thiba...@gnu.org> 
> wrote:
> > Zheng Da, le Mon 07 Jun 2010 01:40:26 -0400, a écrit :
> >> > examine 2f0094
> >> db> examine 0x1973e0
> >>                 13f163
> >
> > Where does this point to in the source code?
> (null):~# addr2line -e /boot/gnumach-nodrv 0x13f163
> /root/gnumach-build1/../gnumach/i386/i386at/interrupt.S:40
> It's exactly where CPU should jump to. So it seems the stack is correct.

Ok. So probably the protection is not for some reason. Could you try to
put a nop right after sti, to check whether it's when reading the stack
or when reading the instruction?

Samuel

Reply via email to