To: dtauritz AT wi DOT leidenuniv DOT nl (D.R.Tauritz) Cc: djgpp AT sun DOT soe DOT clarkson DOT edu Subject: Re: Segmentation violations Date: Wed, 12 Oct 94 08:35:12 +0200 From: "Eli Zaretskii" Three questions: 1. Is the traceback you posted the entire message you get? Is that 0x00000001 the only EIP in the traceback? Did you try to use symify to convert the traceback to human-readable line numbers (you have to compile with -g for this to work)? 2. (I'm not sure about this.) In real-mode interrupt routines you start with interrupts disabled, so that disable() in your irq handler would be unnecessary (but harmless) in the real-mode case. Likewise the enable() near the exit--interrupts are automatially enabled when you return from an ISR, because the FLAGS are popped from the stack. I don't know if what you did is necessary and/or harmful in protected- mode interrupt routine. Anybody? 3. Did you try to interpret that ``pointer 0xf000a001 at a00:1'' stuff? If so, what variable does it point to/is address of? Hope this will help. Eli