Hi guys, When a system call is made in the userland, how are the registers filled? I read that EAX stores the system call number, EBX stores the 1st arg, ECX 2nd arg, EDX 3rd arg, ESI 4th arg and EDI 5th arg. If there are more than 5 arguments, they are pushed into the stack. So, my questions are: 1. EAX stores the system call number or does it store the absolute (or relative) address to the actual system call? 2. If there are less than 5 arguments, what are the values in some of the registers like ESI, EDI etc. 3. Can I find the registers values inside the hexdump of the kernel file itself? I want to look at the assembly codes of the portion where the oops occur. Thanks for any advices !! cheers, hz -- Kernelnewbies: Help each other learn about the Linux kernel. Archive: http://mail.nl.linux.org/kernelnewbies/ FAQ: http://kernelnewbies.org/faq/