Skip site navigation (1)Skip section navigation (2)
Date:      27 Sep 2002 16:57:37 -0500
From:      Ryan Sommers <ryans@gamersimpact.com>
To:        porte10@free.fr
Cc:        freebsd-hackers@freebsd.org
Subject:   Re: Runlevels and opcodes
Message-ID:  <1033163857.417.3.camel@lobo>
In-Reply-To: <1033145248.3d948ba01aeae@imp.free.fr>
References:  <1033145248.3d948ba01aeae@imp.free.fr>

next in thread | previous in thread | raw e-mail | index | archive | help


On Fri, 2002-09-27 at 11:47, porte10@free.fr wrote:
> *** But what does prevent a user-level process from executing
> wild instructions (RESET, traps, other dangerous instructions
> and undocumented features) ?

I'm probably less knowledgeable then you are but in protected-mode
programming isn't the kernel responsible for making sure no programs go
rogue?

-- 
Ryan "leadZERO" Sommers
Gamer's Impact President
ryans@gamersimpact.com
ICQ: 1019590
AIM/MSN: leadZERO

-= http://www.gamersimpact.com =-


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-hackers" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1033163857.417.3.camel>