Ramon van Handel wrote: > How about PUSHF / POPF ? Most OSes rely on that, > methinks.. Well, I was hoping that examining/modifying stack flag images mostly takes place via INT/IRET, which we *can* emulate correctly with the current 'active code segment' hack in place. If it turns out that PUSHF/POPF *is* used at a critical location, we might simply hack the Linux kernel for now ;-) Bye, Ulrich -- Ulrich Weigand, IMMD 1, Universitaet Erlangen-Nuernberg, Martensstr. 3, D-91058 Erlangen, Phone: +49 9131 85-27688
- PATCH: misc Ramon van Handel
- Re: PATCH: misc Kevin P. Lawton
- Re: PATCH: misc Ulrich Weigand
- Re: PATCH: misc Ramon van Handel
- Re: PATCH: misc Ramon van Handel
- Re: PATCH: misc Ramon van Handel
- Re: PATCH: misc Jens Nerche
- Re: PATCH: misc Wouter Coene
- Re: PATCH: misc Ulrich Weigand
- Re: PATCH: misc Ramon van Handel
- Re: PATCH: misc Ulrich Weigand
- Re: PATCH: misc Ulrich Weigand
- Re: PATCH: misc Ramon van Handel
- Re: PATCH: misc Ulrich Weigand
- Re: PATCH: misc Ramon van Handel
- Re: PATCH: misc Ulrich Weigand
- Re: PATCH: misc Ramon van Handel
- Re: PATCH: misc Ramon van Handel
- Re: PATCH: misc Wouter Coene
- Current projects (Was: Re: PATCH: misc) Julian Hall
- Re: PATCH: misc Ramon van Handel
