On 27 Sep 2002, Ryan Sommers wrote: > > *** But what does prevent a user-level process from executing > > wild instructions (RESET, traps, other dangerous instructions > > and undocumented features) ? > > I'm probably less knowledgeable then you are but in protected-mode > programming isn't the kernel responsible for making sure no programs go > rogue?
in some ways, but "wild instructions" are the province of the architecture. You can't execute them in user mode. ron To Unsubscribe: send mail to [EMAIL PROTECTED] with "unsubscribe freebsd-hackers" in the body of the message