Zheng Da, le Tue 08 Jun 2010 07:54:40 -0400, a écrit : > On Mon, Jun 7, 2010 at 4:20 AM, Samuel Thibault <samuel.thiba...@gnu.org> > wrote: > > Zheng Da, le Mon 07 Jun 2010 01:40:26 -0400, a écrit : > >> > examine 2f0094 > >> db> examine 0x1973e0 > >> 13f163 > > > > Where does this point to in the source code? > (null):~# addr2line -e /boot/gnumach-nodrv 0x13f163 > /root/gnumach-build1/../gnumach/i386/i386at/interrupt.S:40 > It's exactly where CPU should jump to. So it seems the stack is correct.
Ok. So probably the protection is not for some reason. Could you try to put a nop right after sti, to check whether it's when reading the stack or when reading the instruction? Samuel