From owner-freebsd-hackers Fri Sep 27 14:55:51 2002 Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.FreeBSD.org (mx1.FreeBSD.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 1BDC837B401 for ; Fri, 27 Sep 2002 14:55:50 -0700 (PDT) Received: from mhub-m2.tc.umn.edu (mhub-m2.tc.umn.edu [160.94.23.45]) by mx1.FreeBSD.org (Postfix) with ESMTP id 45B0B43E6A for ; Fri, 27 Sep 2002 14:55:49 -0700 (PDT) (envelope-from ryans@gamersimpact.com) Received: from mhub0.tc.umn.edu (mhub0.tc.umn.edu [128.101.131.40]) by mhub-m2.tc.umn.edu with ESMTP for freebsd-hackers@freebsd.org; Fri, 27 Sep 2002 16:55:48 -0500 (CDT) Received: from [128.101.186.76] by mail.tc.umn.edu with ESMTP; Fri, 27 Sep 2002 16:55:47 -0500 Subject: Re: Runlevels and opcodes From: Ryan Sommers To: porte10@free.fr Cc: freebsd-hackers@freebsd.org In-Reply-To: <1033145248.3d948ba01aeae@imp.free.fr> References: <1033145248.3d948ba01aeae@imp.free.fr> Content-Type: text/plain Content-Transfer-Encoding: 7bit X-Mailer: Ximian Evolution 1.0.8 Date: 27 Sep 2002 16:57:37 -0500 Message-Id: <1033163857.417.3.camel@lobo> Mime-Version: 1.0 X-Umn-Remote-Mta: [N] mhub0.tc.umn.edu #+LO+TR Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk List-ID: List-Archive: (Web Archive) List-Help: (List Instructions) List-Subscribe: List-Unsubscribe: X-Loop: FreeBSD.ORG On Fri, 2002-09-27 at 11:47, porte10@free.fr wrote: > *** But what does prevent a user-level process from executing > wild instructions (RESET, traps, other dangerous instructions > and undocumented features) ? I'm probably less knowledgeable then you are but in protected-mode programming isn't the kernel responsible for making sure no programs go rogue? -- Ryan "leadZERO" Sommers Gamer's Impact President ryans@gamersimpact.com ICQ: 1019590 AIM/MSN: leadZERO -= http://www.gamersimpact.com =- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message