>Ramon van Handel wrote:
>
>> How about PUSHF / POPF ?  Most OSes rely on that,
>> methinks..
>
>Well, I was hoping that examining/modifying stack flag images
>mostly takes place via INT/IRET, which we *can* emulate correctly
>with the current 'active code segment' hack in place.
>
>If it turns out that PUSHF/POPF *is* used at a critical location,
>we might simply hack the Linux kernel for now ;-)

Okay.

Running linux would certainly be a milestone, hacked or not ;)

-- Ramon


Reply via email to