⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 s06_04.htm

📁 Programmer s Reference Manual is an improtant book on Intel processor architecture and programming.
💻 HTM
字号:
<!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML 2.0//EN"><HTML><HEAD><TITLE>80386 Programmer's Reference Manual -- Section 6.4</TITLE></HEAD><BODY><B>up:</B> <A HREF="c06.htm">Chapter 6 -- Protection</A><BR><B>prev:</B> <A HREF="s06_03.htm">6.3  Segment-Level Protection</A><BR><B>next:</B> <A HREF="s06_05.htm">6.5  Combining Page and Segment Protection</A><P><HR><P><H1>6.4  Page-Level Protection</H1>Two kinds of protection are related to pages:<OL><LI> Restriction of addressable domain.<LI> Type checking.</OL><H2>6.4.1  Page-Table Entries Hold Protection Parameters</H2><A HREF="#fig6-10">Figure 6-10</A>  highlights the fields of PDEs and PTEs that control access topages.<P><A NAME="fig6-10"><IMG align=center SRC="fig6-10.gif" border=0><H3>6.4.1.1  Restricting Addressable Domain</H3>The concept of privilege for pages is implemented by assigning each page toone of two levels:<OL><LI> Supervisor level (U/S=0) -- for the operating system and other systemssoftware and related data.<LI> User level (U/S=1) -- for applications procedures and data.</OL>The current level (U or S) is related to CPL.  If CPL is 0, 1, or 2, theprocessor is executing at supervisor level. If CPL is 3, the processor isexecuting at user level.<P>When the processor is executing at supervisor level, all pages areaddressable, but, when the processor is executing at user level, only pagesthat belong to the user level are addressable.<H3>6.4.1.2  Type Checking</H3>At the level of page addressing, two types are defined:<OL><LI> Read-only access (R/W=0)<LI> Read/write access (R/W=1)</OL>When the processor is executing at supervisor level, all pages are bothreadable and writable. When the processor is executing at user level, onlypages that belong to user level and are marked for read/write access arewritable; pages that belong to supervisor level are neither readable norwritable from user level.<H2>6.4.2  Combining Protection of Both Levels of Page Tables</H2>For any one page, the protection attributes of its page directory entry maydiffer from those of its page table entry. The 80386 computes the effectiveprotection attributes for a page by examining the protection attributes inboth the directory and the page table.  Table 6-5 shows the effectiveprotection provided by the possible combinations of protection attributes.<H2>6.4.3  Overrides to Page Protection</H2>Certain accesses are checked as if they are privilege-level 0 references,even if CPL = 3:<UL><LI> LDT, GDT, TSS, IDT references.<LI> Access to inner stack during ring-crossing <A HREF="CALL.htm">CALL</A>/<A HREF="INT.htm">INT</A>.</UL><P><HR><P><B>up:</B> <A HREF="c06.htm">Chapter 6 -- Protection</A><BR><B>prev:</B> <A HREF="s06_03.htm">6.3  Segment-Level Protection</A><BR><B>next:</B> <A HREF="s06_05.htm">6.5  Combining Page and Segment Protection</A></BODY>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -