Paul Mackerras wrote: > Chris Friesen writes: >>For some background, we're running an emulator that uses a null pointer >>value of 0xffff0000 and we want any accesses to that address to trap.
> Can you fix this in userspace instead by moving the stack down below > 0xffff0000 and then doing munmap(0xffff0000, 0x1000) ? It sounds like it would work. I'm not entirely clear on how to move the starting point of the stack though--could you elaborate or point me to a reference? Chris _______________________________________________ Linuxppc-dev mailing list Linuxppc-dev@ozlabs.org https://ozlabs.org/mailman/listinfo/linuxppc-dev