Intel ITANIUM ARCHITECTURE - SOFTWARE DEVELOPERS MANUAL VOLUME 1 REV 2.3 Manual page 307

Hide thumbs Also See for ITANIUM ARCHITECTURE - SOFTWARE DEVELOPERS MANUAL VOLUME 1 REV 2.3:
Table of Contents

Advertisement

Table 4-6.
Field
ps
rid
a. For more details on the usage of this field,
Software must issue an instruction serialization operation to ensure writes into the
region registers are observed by dependent instruction fetches and issue a data
serialization operation for dependent memory data references.
4.1.3
Protection Keys
Protection Keys provide a method to restrict permission by tagging each virtual page
with a unique protection domain identifier. The Protection Key Registers (PKR)
represent a register cache of all protection keys required by a process. The operating
system is responsible for management and replacement polices of the protection key
cache. Before a memory access (including IA-32) is permitted, the processor compares
a translation's key value against all keys contained in the PKRs. If a matching key is not
found, the processor raises a Key Miss fault. If a matching Key is found, access to the
page is qualified by additional read, write and execute protection checks specified by
the matching protection key register. If these checks fail, a Key Permission fault is
raised. Upon receipt of a Key Miss or Key Permission fault, software can implement the
desired security policy for the protection domain.
protection key register format and protection key register fields.
Figure 4-8.
63
Table 4-7.
Field
v
wd
rd
xd
key
rv
Volume 2, Part 1: Addressing and Protection
Region Register Fields (Continued)
Bits
7:2
Preferred page Size – Selects the virtual address bits used in hash functions for
set-associative TLBs or the VHPT. Encoded as 2
significant performance optimizations for the specified preferred page size for the
a
region.
31:8
Region Identifier – During TLB inserts, the region identifier from the select region
register is used to tag translations to a specific address space. During TLB/VHPT
lookups, the region identifier is used to match translations and to distribute hash
indexes among VHPT and TLB sets.
Protection Key Register Format
rv
32
Protection Register Fields
Bits
0
Valid – When 1, the Protection Register entry is valid and is checked by the
processor when performing protection checks. When 0, the entry is ignored.
1
Write Disable – When 1, write permission is denied to translations in the protection
domain.
2
Read Disable – When 1, read permission is denied to translations in the protection
domain.
3
Execute Disable – When 1, execute permission is denied to translations in the
protection domain.
31:8
Protection Key – uniquely tags translation to a given protection domain.
7:4,63:32
reserved
Description
ps
See "VHPT Hashing" on page 2:65.
Figure 4-8
32 31
key
24
Description
bytes. The processor may make
and
Table 4-7
describe the
8
7
4
3
2
rv
xd rd wd v
4
1
1
1
0
1
1
2:59

Advertisement

Table of Contents
loading

This manual is also suitable for:

Itanium architecture 2.3

Table of Contents