Within the Itanium And PA-RISC Architectures
페이지 정보
작성자 Colette 댓글 0건 조회 21회 작성일 25-12-29 10:12본문
Memory protection is a means to regulate memory access rights on a pc, and is part of most trendy instruction set architectures and working methods. The main objective of memory safety is to forestall a course of from accessing memory that has not been allotted to it. This prevents a bug or malware inside a course of from affecting other processes, or the operating system itself. Protection could encompass all accesses to a specified area of memory, write accesses, or makes an attempt to execute the contents of the area. Memory protection for pc security contains further strategies corresponding to deal with area layout randomization and executable-area safety. Segmentation refers to dividing a pc's memory into segments. A reference to a memory location consists of a price that identifies a section and an offset inside that segment. A segment descriptor could limit access rights, e.g., learn only, only from sure rings. The x86 structure has multiple segmentation options, which are useful for using protected memory on this structure.
On the x86 structure, the worldwide Descriptor Table and local Descriptor Tables can be used to reference segments in the pc's memory. Pointers to memory segments on x86 processors may also be stored within the processor's segment registers. Initially x86 processors had 4 segment registers, CS (code phase), SS (stack section), DS (information segment) and ES (additional section); later one other two phase registers were added - FS and GS. Using digital memory hardware, every page can reside in any location at an appropriate boundary of the pc's physical memory, or be flagged as being protected. Virtual memory makes it possible to have a linear virtual memory address space and to make use of it to access blocks fragmented over physical memory address area. Most laptop architectures which support paging also use pages as the idea for memory protection. A web page table maps virtual memory to physical memory. There could also be a single web page desk, a web page table for each process, a page table for every segment, or a hierarchy of page tables, depending on the structure and the OS.
The web page tables are usually invisible to the process. Page tables make it simpler to allocate additional memory, as each new web page could be allotted from anywhere in physical memory. On some systems a web page table entry may designate a page as learn-solely. Some working techniques arrange a special handle area for each course of, which offers laborious memory protection boundaries. Unallocated pages, and pages allocated to any other software, don't have any addresses from the appliance viewpoint. A web page fault could not essentially indicate an error. Web page faults will not be only used for memory safety. The working system intercepts the web page fault, masses the required memory web page, and the applying continues as if no fault had occurred. This scheme, a sort of digital Memory Wave Audio, permits in-memory knowledge not at present in use to be moved to secondary storage and back in a method which is transparent to functions, to increase general memory capacity.
On some systems, a request for virtual storage could allocate a block of digital addresses for which no web page frames have been assigned, and the system will only assign and initialize page frames when page faults happen. On some systems a guard web page may be used, either for error detection or to automatically grow knowledge buildings. Every course of additionally has a safety key value related to it. On a memory access the hardware checks that the present process's protection key matches the worth associated with the memory block being accessed; if not, an exception happens. This mechanism was launched in the System/360 architecture. It is accessible on immediately's System z mainframes and heavily used by System z working methods and their subsystems. The System/360 protection keys described above are related to physical addresses. That is totally different from the safety key mechanism utilized by architectures such as the Hewlett-Packard/Intel IA-sixty four and Hewlett-Packard PA-RISC, that are associated with digital addresses, and Memory Wave Audio which permit a number of keys per course of.
댓글목록
등록된 댓글이 없습니다.