Within the Itanium And PA-RISC Architectures > 자유게시판

본문 바로가기

사이트 내 전체검색

자유게시판

Within the Itanium And PA-RISC Architectures

페이지 정보

작성자 Suzanne Jeter 작성일 25-08-16 22:10 조회 2 댓글 0

본문

pexeso-pro-dospele.jpgMemory protection is a approach to manage memory access rights on a computer, and is part of most trendy instruction set architectures and working programs. The main function of memory safety is to stop a process from accessing memory that has not been allocated to it. This prevents a bug or malware inside a course of from affecting different processes, or the working system itself. Safety may encompass all accesses to a specified space of memory, write accesses, or makes an attempt to execute the contents of the realm. Memory protection for computer safety includes further methods corresponding to deal with house structure randomization and executable-space protection. Segmentation refers to dividing a pc's Memory Wave Audio into segments. A reference to a memory location contains a value that identifies a segment and an offset inside that section. A section descriptor could restrict access rights, e.g., learn only, solely from sure rings. The x86 structure has a number of segmentation features, that are helpful for using protected memory on this structure.



On the x86 structure, the global Descriptor Table and local Descriptor Tables can be utilized to reference segments in the computer's memory. Pointers to memory segments on x86 processors may also be saved within the processor's segment registers. Initially x86 processors had four segment registers, CS (code section), SS (stack section), DS (information phase) and ES (extra phase); later another two section registers had been added - FS and GS. Using digital memory hardware, each web page can reside in any location at an appropriate boundary of the pc's bodily memory, or be flagged as being protected. Virtual memory makes it doable to have a linear digital memory address area and to make use of it to entry blocks fragmented over bodily memory tackle area. Most pc architectures which assist paging additionally use pages as the premise for memory protection. A page table maps virtual memory to bodily memory. There may be a single page table, a web page table for every process, a page table for every segment, or a hierarchy of web page tables, depending on the structure and the OS.



The page tables are normally invisible to the method. Page tables make it easier to allocate extra memory, as every new page could be allotted from anyplace in physical memory. On some methods a web page desk entry can also designate a web page as read-solely. Some operating programs arrange a different deal with space for every process, which supplies arduous memory safety boundaries. Unallocated pages, and pages allotted to some other software, wouldn't have any addresses from the applying viewpoint. A web page fault could not necessarily indicate an error. Web page faults aren't solely used for memory safety. The operating system intercepts the page fault, loads the required memory page, and the appliance continues as if no fault had occurred. This scheme, a type of virtual memory, allows in-memory knowledge not at present in use to be moved to secondary storage and again in a manner which is transparent to purposes, to extend general memory capability.



On some programs, a request for virtual storage may allocate a block of digital addresses for which no web page frames have been assigned, and the system will only assign and initialize page frames when page faults happen. On some methods a guard page may be used, both for error detection or to routinely develop data structures. Each process additionally has a protection key value associated with it. On a memory access the hardware checks that the current course of's safety key matches the value related to the memory block being accessed; if not, an exception occurs. This mechanism was introduced in the System/360 structure. It is available on immediately's System z mainframes and closely utilized by System z working systems and their subsystems. The System/360 protection keys described above are associated with bodily addresses. This is totally different from the safety key mechanism utilized by architectures such as the Hewlett-Packard/Intel IA-64 and Hewlett-Packard PA-RISC, which are related to digital addresses, and which permit multiple keys per process.

댓글목록 0

등록된 댓글이 없습니다.

  • 주소 : 부산시 강서구 평강로 295
  • 대표번호 : 1522-0625
  • 이메일 : cctvss1004@naver.com

Copyright © 2024 씨씨티브이세상 All rights reserved.

상담신청

간편상담신청

카톡상담

전화상담
1522-0625

카톡상담
실시간접수