On 27 Sep 2002, Ryan Sommers wrote:

> > *** But what does prevent a user-level process from executing
> > wild instructions (RESET, traps, other dangerous instructions
> > and undocumented features) ?
>
> I'm probably less knowledgeable then you are but in protected-mode
> programming isn't the kernel responsible for making sure no programs go
> rogue?

in some ways, but "wild instructions" are the province of the
architecture. You can't execute them in user mode.

ron


To Unsubscribe: send mail to [EMAIL PROTECTED]
with "unsubscribe freebsd-hackers" in the body of the message

Reply via email to