เข้าสู่ระบบ สมัครสมาชิก

privileged instruction การใช้

ประโยคมือถือ
  • Processor Privilege controls the ability to execute privileged instructions and access protected registers and other state.
  • Non-privileged instructions must instead be executed natively ( i . e ., efficiently ).
  • The instructions available in this state were the non-privileged instructions of the IBM System 360.
  • The separated privileged instruction-set permits research in operating system-support, without redesigning compilers.
  • Unlike virtual memory, a system virtual machine entitled the user to write privileged instructions in their code.
  • In supervisor mode, the stack registers point to the system stack and all privileged instructions are available.
  • A new " monitor mode " limits access to input / output and certain privileged instructions.
  • In user mode, the stack registers point to the normal stack and all privileged instructions will generate a fault.
  • The use of rings allows for system software to restrict tasks from accessing data, call gates or executing privileged instructions.
  • VMM may be constructed if the set of sensitive instructions for that computer is a subset of the set of privileged instructions.
  • Resources ( segments, pages, ports, etc . ) and the privileged instructions are tagged with a demanded privilege level.
  • Due to the proliferation of Intel microprocessors, the existence of this open privilege instruction was considered a serious issue at the time.
  • The system architecture and instruction-set were largely compatible with the non-privileged instruction-set of the IBM System / 360.
  • This mechanism was also used to implement privileged instruction, dynamic profiling ( for performance monitoring ) and multiple CPU modes ( e . g.
  • PP = 1 restricts most privileged instructions but does allow reading of the day clocks and reading the contents of some of the privileged registers.
  • VMM may be constructed for any third generation machine in which the set of user sensitive instructions are a subset of the set of privileged instructions:
  • Drivers cannot execute privileged instructions, change the page tables, perform arbitrary input / output ( I / O ), or write to absolute memory.
  • Zheng Yin s close relationship to Ge s family, through Ge Xuan, might have naturally led to Ge Hong s privileged instruction in important esoteric texts.
  • The assembly language ( known as Usercode ) non-privileged instruction set was identical to IBM System 360 Assembly Language; in privileged mode there were a few extras.
  • The privileged instruction set specification explicitly defines " hardware threads, " or " harts . " Multiple hardware threads are a common practice in larger, more powerful computers.
  • ตัวอย่างการใช้เพิ่มเติม:   1  2