Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 27 Sep 2002 16:09:56 -0600 (MDT)
From:      Ronald G Minnich <rminnich@lanl.gov>
To:        Ryan Sommers <ryans@gamersimpact.com>
Cc:        <porte10@free.fr>, <freebsd-hackers@FreeBSD.ORG>
Subject:   Re: Runlevels and opcodes
Message-ID:  <Pine.LNX.4.33.0209271609110.24394-100000@xed.acl.lanl.gov>
In-Reply-To: <1033163857.417.3.camel@lobo>

next in thread | previous in thread | raw e-mail | index | archive | help
On 27 Sep 2002, Ryan Sommers wrote:

> > *** But what does prevent a user-level process from executing
> > wild instructions (RESET, traps, other dangerous instructions
> > and undocumented features) ?
>
> I'm probably less knowledgeable then you are but in protected-mode
> programming isn't the kernel responsible for making sure no programs go
> rogue?

in some ways, but "wild instructions" are the province of the
architecture. You can't execute them in user mode.

ron


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.LNX.4.33.0209271609110.24394-100000>