[ home / board list / faq / random / create / bans / search / manage / irc ] [ ]

/tech/ - Technology

Catalog

Name
Email
Subject
Comment *
File
* = required field[▶ Show post options & limits]
Confused? See the FAQ.
Flag
Oekaki
Show oekaki applet
(replaces files and can be used instead)
Options
Password (For file and post deletion.)

Allowed file types:jpg, jpeg, gif, png, webm, mp4, pdf
Max filesize is 8 MB.
Max image dimensions are 10000 x 10000.
You may upload 3 per post.


File: 1458289264142.gif (5.7 KB, 330x292, 165:146, 7809.gif)

 No.545568

Can anyone explain the specific details of how protection rings work? I understand the general details, but not the specifics.

How does the processor "know" the protection ring of the currently executing program, and how does it prevent unprivileged code from doing anything disallowed?

How do programs elevate from, say, ring 3 to ring 0, or alternatively how do they reduce their protection from ring 0 to ring 3? Is there any specific instruction/action that does it?

What specifically is unprivileged code not allowed to do? IIRC, ring 3 code cannot:

- write to the memory of ring 2 or lower protection rings

- read the memory of ring 2 or lower protection rings

- execute certain processor instructions

Is this the case? Is there anything else ring 3 programs are not allowed to do?

Feel free to give me a link to a resource explaining this if you don't feel like explaining it yourself.

 No.545575

>>545568

http://duartes.org/gustavo/blog/post/cpu-rings-privilege-and-protection/

I hope that this link will help you answer your questions.




[Return][Go to top][Catalog][Post a Reply]
Delete Post [ ]
[]
[ home / board list / faq / random / create / bans / search / manage / irc ] [ ]