On Jun 20 2017, Eric Botcazou <ebotca...@adacore.com> wrote: > Right, because the Linux kernel for x86/x86-64 is the only OS flavor that > doesn't let you probe the stack ahead of the stack pointer. All other > combinations of OS and architecture we tried (and it's quite a lot) do.
Take a look at do_page_fault in arch/*/mm/fault.c, there are a lot of architectures that place a limit on how far you can probe below USP. Andreas. -- Andreas Schwab, SUSE Labs, sch...@suse.de GPG Key fingerprint = 0196 BAD8 1CE9 1970 F4BE 1748 E4D4 88E3 0EEA B9D7 "And now for something completely different."