How many and possibly what security checks are made at the user level / kernel
level boundary on a typical system call?
Regards,
Chris
-----
Chris Freeze Email: cfreeze@cs.clemson.edu
Computer Science Dept. Office: Jordan G-06
Clemson University Phone: (864) 656-2636
http://www.cs.clemson.edu/~cfreeze
-----
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@vger.rutgers.edu
Please read the FAQ at http://www.tux.org/lkml/
This archive was generated by hypermail 2b29 : Sun Jul 23 2000 - 21:00:09 EST