Implementing protection with virtual memory, Computer Engineering

Implementing Protection with Virtual Memory - computer architecture:

To enable the operating system to implement protection in the VM system, the HW have to:

I. Support at least 2 modes that denoted whether the running process is a user process (executive process) or an operating system process (kernel/supervisor process).

II. Provide a part ion of the CPU state that a user process may read but not write (includes supervisor mode bit).

  • Provide mechanism where the CPU may go from user mode to supervisor mode (accomplished by a system call exception) and vice versa (return from exception instruction).

o   Only operating system process may change page tables. Page tables are held in operating system address space thereby preventing a user procedure from changing them. 

o   When processes desire to share information in a restricted way, the OS have to assist them.

o   The write access bit (in both the TLB and the page table) can be used to limit the sharing to only read sharing.

 

Posted Date: 10/13/2012 6:00:07 AM | Location : United States







Related Discussions:- Implementing protection with virtual memory, Assignment Help, Ask Question on Implementing protection with virtual memory, Get Answer, Expert's Help, Implementing protection with virtual memory Discussions

Write discussion on Implementing protection with virtual memory
Your posts are moderated
Related Questions
What are the registers generally contained in the processor? MAR-memory address register MDR-memory data register IR-Instruction Register RO-Rn-General purpose registe

What is reification and behaviour? Reification is the promotion of something that is not an object into an object. Behavior usually requires this description. It isn't usually

What happens if only one of the commands SET SCREEN and LEAVE SCREEN is used without using the other? If we use SET SCREEN without LEAVE SCREEN, the program ends processing for

Eliminating hazards of pipeline -  computer architecture: We can delegate the work of eliminating data dependencies to the compiler, which can fill up in suitable number of NO


The constructed datatype of C is known as Structure is a constructed datatype of C.

Texture Texture is how artists show what an object would feel like to touch. This can have a dramatic effect on how an image is perceived. Imagine for instance an image that h

In critical computer applications the correctness of a delivered output and the continuity of the required service beside the speed of the used CPU are the most important measures

Q. Illustrate LCD Technology? The technology behind LCD is known as Nematic Technology since the molecules of liquid crystals used are nematic which implies that rod-shaped. Th

Q. What do you mean by Information System? An information system is an planned combination of hardware, people, communication networks, software and data resources that transfo