❦ 21 novembre 2014 17:34 -0200, Henrique de Moraes Holschuh <hmh@debian.org> :
>> I thought there was a flag bit you could set on x86 that causes
>> unaligned access to trap there too.
>
> 1. CR0.AM must be set.
>
> 2. Ask For The Pain!
>
> i386:
> __asm__("pushf\norl $0x40000,(%esp)\npopf");
>
> x86-64:
> __asm__("pushf\norl $0x40000,(%rsp)\npopf");
That's pretty interesting for unittests. Is one of those flags restored
during context switch so that it could affect only a selected process?
--
# Okay, what on Earth is this one supposed to be used for?
2.4.0 linux/drivers/char/cp437.uni
Attachment:
signature.asc
Description: PGP signature