A hardware architecture for implementing protection rings

  • Authors:
  • Michael D. Schroeder;Jerome H. Saltzer

  • Affiliations:
  • -;-

  • Venue:
  • SOSP '71 Proceedings of the third ACM symposium on Operating systems principles
  • Year:
  • 1971

Quantified Score

Hi-index 0.03

Visualization

Abstract

This paper appears in the March, 1972, issue of the Communications of the ACM. Its abstract is reproduced below. Protection of computations and information is an important aspect of a computer utility. In a system which uses segmentation as a memory addressing scheme, protection can be achieved in part by associating concentric rings of decreasing access privilege with a computation. The mechanisms allow cross-ring calls and subsequent returns to occur without trapping to the supervisor. Automatic hardware validation of references across ring boundaries is also performed. Thus, a call by a user procedure to a protected subsystem (including the supervisor) is identical to a call to a companion user procedure. The mechanisms of passing and referencing arguments are the same in both cases as well.