It's not quite that simple.
*** useless blabbering snipped ***
Of course it is not.
However, either you emulate the CPU/FPU fully or live with the problems that arise from the missing EAs.
m68k supervisor mode can't be emulated anyway, since ColdFire (even V4e) is totally different beast in there. So m68k MMU can never be supported.
So we're left with m68k CPU and FPU emulation on user level.
Either we live with the fact that some addressing modes crash the app (I take your word here that these exception can't be emulated. Personally I consider it possible though with some magic. Remember how tricky 68060 exception restart is? Yet it can be done), or we do JIT translation in the first place, where we handle these missing addressing modes by generating native ColdFire code for them.
A Coldfire aware program still can't tell which optimized c2p routine or math functions would be best to use without detecting the CPU itself which defeats the purpose of the AttnFlags in the first place.
Sigh. AttnFlags is just for the app to know which CPU and FPU are *EMULATED* so it doesn't crash outright.
If there is some control wanted for special ColdFire aware applications, new Query API need to be added. I suggested identify.library. It can be whatever the system designer sees feasible. Anyhow, this stuff is trivial compared to the actual m68k emulation.
Naturally unless if the application is specially crafted for Coldfire, it doesn't need to know about this API since it can't make any reasonable judgement anyway. If the app is ColdFire aware, it knows the API and can query the ColdFire CPU type and pick proper routines.
So there is no problem here. Also similar stuff has been successfully implemented for MorphOS years ago.
MorphOS always identifies 68060 + 6888x/68060FPU in the AttnFlags. There are further APIs to identify the host PPC type (ppc.library emulation, powerpc.library emulation, and native NewGetSystemAttrs call).