Revision as of 22:56, 4 October 2006 editDavid.kaplan (talk | contribs)35 editsm typo← Previous edit | Latest revision as of 21:31, 15 March 2018 edit undoChristian75 (talk | contribs)Extended confirmed users, New page reviewers, Pending changes reviewers, Rollbackers114,655 edits {{R to section}} {{Rwh}} | ||
(47 intermediate revisions by 27 users not shown) | |||
Line 1: | Line 1: | ||
#redirect ] | |||
The concept of '''privilege level''' refers to protecting resources on a ]. Different execution threads can have different privilege levels that grant access to resources such as memory regions, I/O ports, and special instructions. On the ] architecture, there are 4 privilege levels ranging from 0 which is the most privileged, to 3 which is least privleged. Most modern operating systems use level 0 for the kernel/executive, and use level 3 for application programs. On ], any resource available to level n is also available to level 0..n, hence it is called a "ring model". Several terms are used in ] including the following: | |||
*Descriptors contain a field called the descriptor privilege level (DPL). This is the numerically highest level that can access the resource. | |||
*Selectors contain a field called the requested privilege level (RPL). This allows a program to request a resource at a lower privilege level than it would otherwise use. | |||
*The Current Privilege Level (CPL) is the level the processor is currently operating at. It is stored in the lowest 2 bits of the ] selector (CS). | |||
{{R to section}} | |||
The processor automatically evaluates the right of a procedure to access another segment by comparing the CPL to the numeric max of the RPL and DPL. If the CPL>MAX(RPL,RPL), then a ] is generated. See ] for more details. | |||
{{Rwh}} | |||
⚫ | ] | ||
It is not necessary to use all four privilege levels. Existing software that was designed to use only one or two levels of privilege can simply | |||
ignore the other levels offered by the 80386. A one-level system should use privilege level zero; a two-level system should use privilege levels zero | |||
and three. | |||
==See also== | |||
*] | |||
*] | |||
==References== | |||
*Intel 80386 Programmer's Reference | |||
⚫ | ] |
Latest revision as of 21:31, 15 March 2018
Redirect to:
- To a section: This is a redirect from a topic that does not have its own page to a section of a page on the subject. For redirects to embedded anchors on a page, use {{R to anchor}} instead.
- With history: This is a redirect from a page containing substantive page history. This page is kept as a redirect to preserve its former content and attributions. Please do not remove the tag that generates this text (unless the need to recreate content on this page has been demonstrated), nor delete this page.
- This template should not be used for redirects having some edit history but no meaningful content in their previous versions, nor for redirects created as a result of a page merge (use {{R from merge}} instead), nor for redirects from a title that forms a historic part of Misplaced Pages (use {{R with old history}} instead).