home *** CD-ROM | disk | FTP | other *** search
- Xref: sparky comp.unix.aix:11643 bit.listserv.aix-l:1737 bit.listserv.power-l:322
- Path: sparky!uunet!stanford.edu!agate!spool.mu.edu!olivea!charnel!rat!usc!news.bbn.com!mips2!rws1!mwarren
- From: mwarren@rws1.ma30.bull.com (Mark Warren)
- Newsgroups: bull.sys.aix,comp.unix.aix,bit.listserv.aix-l,bit.listserv.power-l
- Subject: How to get more info about SIGSEGV
- Message-ID: <1992Nov17.163009.11601@mips2.ma30.bull.com>
- Date: 17 Nov 92 16:30:09 GMT
- Sender: news@mips2.ma30.bull.com (Usenet News Manager)
- Organization: Bull HN Informations Systems Inc.
- Lines: 21
-
-
- We have a program that can (in normal operation) perform a read or
- write access to a non-existent (un-mapped) virtual address, or a write
- to a read-only address. We can tell when it occurs by catching
- SIGSEGV, but it is very to tell within the program whether the fault
- occurred due to a write to a read-only address, or due to a write (or
- read) to an un-mapped address. Also, we have a hard time determining
- the offending address.
-
- Is there any way we can interrogate any kernel service to determine
- this information from within the SIGSEGV handler? Yes, I've read
- TFM, but I can't find anything useful.
-
- I'll take anything, even if it means writing a kernel extension.
-
- Thanks in advance,
- --
-
- == Mark Warren Bull HN Information Systems Inc. ==
- == (508) 294-3171 (FAX 294-2699) 300 Concord Road MA30/MS833A ==
- == M.Warren@bull.com Billerica, MA 01821 ==
-