期刊文献+

Linux 2.6内存保护机制研究 被引量:3

Analysis of Linux 2.6 Memory Protection Mechanism
下载PDF
导出
摘要 基于Intel i386平台处理器和L inux 2.6内核源代码,从硬件内存保护和虚拟内存保护两个方面分析了最新的L inux内存保护机制,其中硬件内存保护机制包括段式映射阶段的访问控制、页式映射阶段的访问控制以及最新内存保护NX(No eXecute)技术,虚拟内存保护机制包括虚拟区间保护、虚拟区间加锁和Hole技术。最后进一步讨论了增强L inux内存保护的方案。 Based on Intel i386 Processor and Linux 2.6 kemel source code, the latest Linux memory protection mechanism is analyzed from two aspects of hardware memory protection and virtual memory protection. The hardware memory protection mechanism includes access controls in segment stage , access controls in paging mapping stage and a new memory protection technique NX (No eXecute). Virtual memory area protection includes virtual memory area protection, locking and Hole technique. Finally, the scheme of enhanced Linux memory protection is discussed.
出处 《航空计算技术》 2006年第3期56-59,共4页 Aeronautical Computing Technique
关键词 内存保护 地址映射 访问控制 虚拟内存 memory protection address mapping access control virtual memory
  • 相关文献

参考文献5

  • 1王斌,邓鵾,周兴铭.通用微处理器虚存管理子系统设计[J].计算机应用,2003,23(3):33-35. 被引量:2
  • 2Intel Corporation.IA-32 Intel Architecture Optimization Manual:Instruction Set Reference,A-M[K/OL].ftp://download.intel.com/design/Pentium4/manuals/25366613.pdf,2004.
  • 3Intel Corporation.Execute Disable Bit Functionality Blocks Mal-ware Code Execution[EB/OL].http:// www.intel.com,2004.
  • 4毛德操 胡希明.Linux内核源代码情景分析[M].杭州:浙江大学出版社,2001..
  • 5P.ococo.the Inevitability of Failure:The Flawed Assumption of Security in Modern Computing Security Conference[A].Proceedings of the 21st National Information Systems Security Conference[C].1998,pp:303-314.

二级参考文献6

  • 1[1]MIPS R10000 Microprocessor Users Manual[Z]. California: MIPS Technologies, Inc, 1996.
  • 2[2]Patterson DA, Hennessy JL. Computer Architecture:A Quantitative Approach(Second Edition)[M]. Morgan Kaufmann Publishers Inc, 1996.
  • 3[3]Avrossimov V, Rozier M, Shapiro M. Generic virtual memory management for operating system kernels[A]. Proceedings of the Twelfth ACM Sysposium on Operating Systems Principles[C], December 1989.
  • 4[4]http://lxr.Linux.no. Cross-Referencing Linux[EB/OL], 2002.
  • 5[5]Kublatowicx J. CS252 Graduate Computer Architecture[Z], 2001.
  • 6[6]Denning P. Virtual memory[J]. ACM Computing Surveys, 1996,28(1).

共引文献194

同被引文献24

引证文献3

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部