1. Manuals
  2. Brands
  3. Computer Equipment
  4. Server
  5. IBM
  6. Computer Equipment
  7. Server

IBM 10 SP1 EAL4 Figure 5-59: Data access privilege checks

1 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 246
Download on canonical page 246 pages, 2.94 Mb
Requestor Privilege Level (RPL):RPL represents the privilege level of the program that created the
segment selector. The RPL is stored in the segment selector used to reference the segment descriptor.
Descriptor Privilege Level (DPL):DPL is the privilege level that is associated with an individual
segment. The system software assigns this DPL, and it is stored in the segment descriptor.
CPL, RPL, and DPL are used to implement access control on data accesses and control transfers as follows.
5.5.2.5.5.1 Access control for data access
When loading a data segment register, the processor checks privilege levels to determine if the load should
succeed. The processor computes the subject’s effective privilege as the higher numerical value, or lower
privilege, between the CPL and the RPL. The effective privilege value is then compared with the object’s
privilege value, the DPL of the segment. Access is granted if the effective privilege value is lower than the
DPL value (higher privilege). Otherwise, a general protection exception occurs, and the segment register is
not loaded. The following diagram from [AMD64] illustrates data-access privilege checks.
5.5.2.5.5.2 Access control for stack segments
When loading a stack segment register, the processor ensures that the CPL and the stack selector RPL are
equal. If they are not equal, a general protection exception occurs. If CPL and RPL are equal, then the
processor compares the CPL with the DPL in the descriptor table entry that the segment selector references.
If the two are equal, then the stack segment register is loaded. Otherwise, a general protection exception
occurs, and the stack segment is not loaded.
5.5.2.5.5.3 Access control for direct control transfer
The processor performs privilege checks when control transfer is attempted between different code segments.
Control transfer occurs with CALL/JMP instructions and SYSCALL/SYSRET instructions. Unlike the x86
architecture, the AMD Opteron provides the SYSCALL and SYSRET specific instructions to perform system
118
Figure 5-59: Data access privilege checks
MENU

Models

Contents