SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Intel Corporation (INTC) -- Ignore unavailable to you. Want to Upgrade?


To: SteveG who wrote (39836)11/10/1997 2:58:00 PM
From: John Chen  Read Replies (1) | Respond to of 186894
 
SteveG/ALL, this maybe a flaw/loophole, but can the OS/Win95/NT/Linux
protect program from crashing the system by putting application
program in certain 'protect environment'?

If the OS cannot do that, then the X86 has a flaw, and that is
a very long time.



To: SteveG who wrote (39836)11/10/1997 3:13:00 PM
From: MichaelW  Respond to of 186894
 
It's hard to believe this kind of bug slipped through.



To: SteveG who wrote (39836)11/10/1997 5:25:00 PM
From: MichaelW  Respond to of 186894
 
What's the memory address being called in your code example. Is that part of the instruction set, bios, or operating system?

(caution - try the following on an **UNUSED** system with filesystems read-only)

char x[5] = { 0xF0, 0x0F, 0xC7, 0xC8, 0 };
main( )
{
void (*f)( ) = x;
f( );
}