> It is very > hard for me to concieve of a plausible security model where one would > want to treat this operation differently from a raw memory write, eg. a listener which does logging of operations? (i think that having x86-specific code like this in sys/secmodel isn't ideal. but it's another story.) YAMAMOTO Takashi