- not be seen by the
calling code. Here are the
relevant instructions: The
PUSHF and POPF
instructions transfer the 16-bit
FLAGS register. PUSHFD/POPFD (introduced...
- x86 */ __asm__("
pushf\norl $0x40000,(%esp)\npopf"); # elif defined(__x86_64__) /*
Enable Alignment Checking on x86_64 */ __asm__("
pushf\norl $0x40000,(%rsp)\npopf");...
- is not set. The flag may be also read
directly with
instructions such as
PUSHF,
which pushes the
flags register on the stack. One
common reason to test...
- the
handlers to
disable interrupts and
either POPF (after a
corresponding PUSHF) or IRET (which
restores the
flags from the
stack as part of its effects)...
- a #GP
exception if
executed in
virtual 8086 mode if IOPL is not 3. The
PUSHF, POPF, IRET and
IRETD instructions will
cause a #GP
exception if executed...
- In
virtual 8086 mode, the
basic idea is that when IOPL is less than 3,
PUSHF/POPF/STI/CLI/INT/IRET
instructions will
treat the
value of VIF in the real...
- such as a
clock register or
interrupt registers: SGDT, SIDT, SLDT SMSW
PUSHF, POPF
Protection system instructions:
reference the
storage protection system...
-
register back off the stack. The
instructions to set the trap flag are:
pushf ; Push
flags on
stack mov bp, sp ; Copy SP to BP for use as
index or word...
- movs
movsx movw
movzb mul neg nop not or out outs pop popa popf push
pusha pushf rcl rcr rep
repnz repz ret rol ror sahf sal sar sbb scas
setcc sgdt shl...
-
programs compressed with
SpaceMaker - and
therefore starting with 9Ch 55h (
PUSHF/PUSH BP) -
above the 64K mark to
avoid the
EXEPACK wrap
around bug. It does...