HACKING: List areas where we may rely on impdef C behaviour