Initial rough hack to spot the stack segment at startup by looking
   for a rwx mapping which contains the startup %esp.

Might be better to look for just rw-.  Stack might not be executable
if there's a noexec patch, and x86-64 actually enforces the x bit
distinctly from r.

--> Look for just rw-.


git-svn-id: svn://svn.valgrind.org/valgrind/trunk@1431 a5019735-40e9-0310-863c-91ae7b9d1cf9
1 file changed