Ramon van Handel wrote:

> How about PUSHF / POPF ?  Most OSes rely on that,
> methinks..

Well, I was hoping that examining/modifying stack flag images 
mostly takes place via INT/IRET, which we *can* emulate correctly
with the current 'active code segment' hack in place.

If it turns out that PUSHF/POPF *is* used at a critical location,
we might simply hack the Linux kernel for now ;-)

Bye,
Ulrich

-- 
  Ulrich Weigand,
  IMMD 1, Universitaet Erlangen-Nuernberg,
  Martensstr. 3, D-91058 Erlangen, Phone: +49 9131 85-27688

Reply via email to