Re: T13 SPEC and how to READ IT......

From: Khimenko Victor (khim@sch57.msk.ru)
Date: Wed Jul 26 2000 - 05:23:40 EST


In <20000725201630.E437@gnu.org> Adam Sampson (azz@gnu.org) wrote:
> On Mon, Jul 24, 2000 at 02:17:42PM +0200, Matthias Andree wrote:
>> So, there will still be ways to bypass Win98 or MacOS or whatever. When
>> there is no 100% safe way that the OS can prevent
>> RESERVED/ILLEGAL/whatever commands, why try to have the OS do it WHILE IT
>> CANNOT 100% SUCCEED?

> But there _is_ a 100% safe way: block raw access through other methods.

Yeah ?

> (Imagine an OS which ran everything under an emulated processor---it would
> be easy to trap hardware accesses and validate them.)

Trap - may be. Validate - hardly. Malicious IDE code is small enough to
fit in boot sector. No how you'll distinguish good LiLo try to change
boot sector from bad cracker ?

> Linux is getting there; it's just not terribly convenient.

-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/



This archive was generated by hypermail 2b29 : Mon Jul 31 2000 - 21:00:21 EST