❦ 21 novembre 2014 17:34 -0200, Henrique de Moraes Holschuh <hmh@debian.org> : >> I thought there was a flag bit you could set on x86 that causes >> unaligned access to trap there too. > > 1. CR0.AM must be set. > > 2. Ask For The Pain! > > i386: > __asm__("pushf\norl $0x40000,(%esp)\npopf"); > > x86-64: > __asm__("pushf\norl $0x40000,(%rsp)\npopf"); That's pretty interesting for unittests. Is one of those flags restored during context switch so that it could affect only a selected process? -- # Okay, what on Earth is this one supposed to be used for? 2.4.0 linux/drivers/char/cp437.uni
Attachment:
signature.asc
Description: PGP signature