>Ramon van Handel wrote: > >> How about PUSHF / POPF ? Most OSes rely on that, >> methinks.. > >Well, I was hoping that examining/modifying stack flag images >mostly takes place via INT/IRET, which we *can* emulate correctly >with the current 'active code segment' hack in place. > >If it turns out that PUSHF/POPF *is* used at a critical location, >we might simply hack the Linux kernel for now ;-) Okay. Running linux would certainly be a milestone, hacked or not ;) -- Ramon
- Re: PATCH: misc Jens Nerche
- Re: PATCH: misc Wouter Coene
- Re: PATCH: misc Ulrich Weigand
- Re: PATCH: misc Ramon van Handel
- Re: PATCH: misc Ulrich Weigand
- Re: PATCH: misc Ulrich Weigand
- Re: PATCH: misc Ramon van Handel
- Re: PATCH: misc Ulrich Weigand
- Re: PATCH: misc Ramon van Handel
- Re: PATCH: misc Ulrich Weigand
- Re: PATCH: misc Ramon van Handel
- Re: PATCH: misc Ramon van Handel
- Re: PATCH: misc Wouter Coene
- Current projects (Was: Re: PATCH: misc) Julian Hall
- Re: PATCH: misc Ramon van Handel
