期刊文献+

通用微处理器虚存管理子系统设计 被引量:2

Design of Virtual Memory Management Subsystem for General Microprocessors
下载PDF
导出
摘要 以设计 32位VLIW处理器原型为目标 ,详细分析了虚存管理中软硬件的分工协作 ,深入研究并解决了虚存管理子系统设计的三个核心问题 :处理器工作模式分类、虚地址空间划分以及控制协处理器设计 。 The paper aims at designing a 32bit VLIW microprocessor prototype. After analyzing the hardware-software dividing line and cooperation in detail, three key issues of virtual memory management subsystem design are discussed: the classification of processor operating mode, the partition of virtual space and the design of Control Coprocessor (CCoP). An VM management subsystem prototype is also presented in the paper.
出处 《计算机应用》 CSCD 北大核心 2003年第3期33-35,39,共4页 journal of Computer Applications
关键词 通用微处理器 虚存管理子系统 设计 控制协处理器 VLIW virtual memory control coprocessor TLB
  • 相关文献

参考文献6

  • 1[1]MIPS R10000 Microprocessor Users Manual[Z]. California: MIPS Technologies, Inc, 1996.
  • 2[2]Patterson DA, Hennessy JL. Computer Architecture:A Quantitative Approach(Second Edition)[M]. Morgan Kaufmann Publishers Inc, 1996.
  • 3[3]Avrossimov V, Rozier M, Shapiro M. Generic virtual memory management for operating system kernels[A]. Proceedings of the Twelfth ACM Sysposium on Operating Systems Principles[C], December 1989.
  • 4[4]http://lxr.Linux.no. Cross-Referencing Linux[EB/OL], 2002.
  • 5[5]Kublatowicx J. CS252 Graduate Computer Architecture[Z], 2001.
  • 6[6]Denning P. Virtual memory[J]. ACM Computing Surveys, 1996,28(1).

同被引文献8

  • 1毛德操 胡希明.Linux内核源代码情景分析[M].杭州:浙江大学出版社,2001..
  • 2Intel Corporation.IA-32 Intel Architecture Optimization Manual:Instruction Set Reference,A-M[K/OL].ftp://download.intel.com/design/Pentium4/manuals/25366613.pdf,2004.
  • 3Intel Corporation.Execute Disable Bit Functionality Blocks Mal-ware Code Execution[EB/OL].http:// www.intel.com,2004.
  • 4P.ococo.the Inevitability of Failure:The Flawed Assumption of Security in Modern Computing Security Conference[A].Proceedings of the 21st National Information Systems Security Conference[C].1998,pp:303-314.
  • 5P.ococo.the Inevitability of Failure:The Flawed Assumption of Security in Modern Computing Security Conference[C].Proceedings of the 21st National Information Systems Security Conference,1998,303-314.
  • 6Department of Defense USA.DOD 5200.28-STD,Trusted Computer System Evaluation Criteria[S].Washington DC,1985.
  • 7Intel Corporation.Execute Disable Bit Functionality Blocks Mal-ware Code Execution[EB/OL].http:// www.intel.com,2004.
  • 8Intel Corporation.IA-32 Intel Architecture Software Developer's Manual Volume 2A:Instruction Set Reference,A-M[EB/OL].ftp:// download.intel.com/design/Pentium4/manuals/25366615.pdf,2004.

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部