Misplaced Pages

Privilege level: Difference between revisions

Article snapshot taken from Wikipedia with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively← Previous editNext edit →Content deleted Content addedVisualWikitext
Revision as of 18:32, 13 June 2017 editWidefox (talk | contribs)Autopatrolled, Extended confirmed users, Page movers, IP block exemptions, New page reviewers, Pending changes reviewers, Rollbackers106,768 edits top: this is overlapping/dupe of that← Previous edit Revision as of 18:33, 13 June 2017 edit undoWidefox (talk | contribs)Autopatrolled, Extended confirmed users, Page movers, IP block exemptions, New page reviewers, Pending changes reviewers, Rollbackers106,768 edits Added {{merge to}} tag to article (TW)Next edit →
Line 1: Line 1:
{{merge to|Protection ring|discuss=Talk:Protection ring#Proposed merge with Privilege level|date=June 2017}}
{{main|Protection ring}} {{main|Protection ring}}
{{refimprove|date=June 2017}} {{refimprove|date=June 2017}}

Revision as of 18:33, 13 June 2017

It has been suggested that this article be merged into Protection ring. (Discuss) Proposed since June 2017.
Main article: Protection ring
This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.
Find sources: "Privilege level" – news · newspapers · books · scholar · JSTOR (June 2017) (Learn how and when to remove this message)
Privilege level order in Intel x86 microprocessors.

A privilege level in the x86 instruction set controls the access of the program currently running on the processor to resources such as memory regions, I/O ports, and special instructions. There are 4 privilege levels ranging from 0 which is the most privileged, to 3 which is least privileged. Most modern operating systems use level 0 for the kernel/executive, and use level 3 for application programs. Any resource available to level n is also available to level 0..n, so the privilege levels are "rings". When a lesser privileged process tries to access a higher privileged process, a General Protection Fault is reported by the OS.

It is not necessary to use all four privilege levels, Because the current Operating Systems like Windows, Linux, etc. mostly are using Paging mechanism and Paging only has one bit to specify the privilege level which is either Supervisor or User (U/S Bit). Windows NT uses the two-level system. The real mode programs in 8086 are executed at level 0 (highest privilege level) whereas virtual mode in 8086 executes all programs at level 3.

See also

References

  1. Russinovich, Mark E.; David A. Solomon (2005). Microsoft Windows Internals (4 ed.). Microsoft Press. pp. 16. ISBN 978-0-7356-1917-3
  2. Sunil Mathur, "Microprocessor 8086: Architecture, Programming and Interfacing" , Eastern Economy Edition, PHI Learning
  • Intel 80386 Programmer's Reference
Categories: