Date: Fri, 27 Sep 2002 16:09:56 -0600 (MDT) From: Ronald G Minnich <rminnich@lanl.gov> To: Ryan Sommers <ryans@gamersimpact.com> Cc: <porte10@free.fr>, <freebsd-hackers@FreeBSD.ORG> Subject: Re: Runlevels and opcodes Message-ID: <Pine.LNX.4.33.0209271609110.24394-100000@xed.acl.lanl.gov> In-Reply-To: <1033163857.417.3.camel@lobo>
next in thread | previous in thread | raw e-mail | index | archive | help
On 27 Sep 2002, Ryan Sommers wrote: > > *** But what does prevent a user-level process from executing > > wild instructions (RESET, traps, other dangerous instructions > > and undocumented features) ? > > I'm probably less knowledgeable then you are but in protected-mode > programming isn't the kernel responsible for making sure no programs go > rogue? in some ways, but "wild instructions" are the province of the architecture. You can't execute them in user mode. ron To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.LNX.4.33.0209271609110.24394-100000>