From: NIIBE Y. <gn...@ch...> - 2000-11-25 01:36:55
|
Philipp Rumpf wrote: > I think we have four groups of accesses we might emulate or not: > 1. kernel accesses to kernel memory > 2. kernel accesses to user memory > 3. user accesses to user memory, using "standard" instructions > 4. user accesses to user memory, using non-standard instructions Thanks for the summary. My opinion is we only need #1. > We definitely need to emulate 1) - at least unless someone convinces the > network guys to drop that requirement. Is there anyone try to use ISOFS? Takashi Yoshii said there're plenty of code which might cause unaligned access. For #2, #3, and #4, it would be interesting problem to solve, technically, to supports the feature. However, when people (of user space application) rely on such a feature, in the long run, bad quality would remain forever. At least, we should output warning message when handling userspace unaligned access. -- |