Date: 27 Sep 2002 16:57:37 -0500 From: Ryan Sommers <ryans@gamersimpact.com> To: porte10@free.fr Cc: freebsd-hackers@freebsd.org Subject: Re: Runlevels and opcodes Message-ID: <1033163857.417.3.camel@lobo> In-Reply-To: <1033145248.3d948ba01aeae@imp.free.fr> References: <1033145248.3d948ba01aeae@imp.free.fr>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 2002-09-27 at 11:47, porte10@free.fr wrote: > *** But what does prevent a user-level process from executing > wild instructions (RESET, traps, other dangerous instructions > and undocumented features) ? I'm probably less knowledgeable then you are but in protected-mode programming isn't the kernel responsible for making sure no programs go rogue? -- Ryan "leadZERO" Sommers Gamer's Impact President ryans@gamersimpact.com ICQ: 1019590 AIM/MSN: leadZERO -= http://www.gamersimpact.com =- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?1033163857.417.3.camel>