Jump to content

Talk:Protection ring: Difference between revisions

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia
Content deleted Content added
Proposing to merge Privilege level into Protection ring (TW)
Jrest (talk | contribs)
Line 70: Line 70:


overlapping scope - x86 can/should be a section in main article given current article <span class="vcard"><span class="fn">[[User:Widefox|Widefox]]</span>; [[User talk:Widefox|talk]]</span> 18:33, 13 June 2017 (UTC)
overlapping scope - x86 can/should be a section in main article given current article <span class="vcard"><span class="fn">[[User:Widefox|Widefox]]</span>; [[User talk:Widefox|talk]]</span> 18:33, 13 June 2017 (UTC)

== More generic article about protection rings (not limited to computing) ==

Is there also a more generic article about protection rings that also incorporates the physical domain, such as in medieval castles with rings of walls? I could not find it. If there is, this article should link to that concept. If there isn't, it should probably be created and elements of this article should be moved there. That generic article could also relate to [[defence in depth]].

Revision as of 13:39, 16 February 2018

WikiProject iconComputer Security: Computing B‑class High‑importance
WikiProject iconThis article is within the scope of WikiProject Computer Security, a collaborative effort to improve the coverage of computer security on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.
BThis article has been rated as B-class on Wikipedia's content assessment scale.
HighThis article has been rated as High-importance on the project's importance scale.
Taskforce icon
This article is supported by WikiProject Computing (assessed as High-importance).
Things you can help WikiProject Computer Security with:
Article alerts will be generated shortly by AAlertBot. Please allow some days for processing. More information...
  • Review importance and quality of existing articles
  • Identify categories related to Computer Security
  • Tag related articles
  • Identify articles for creation (see also: Article requests)
  • Identify articles for improvement
  • Create the Project Navigation Box including lists of adopted articles, requested articles, reviewed articles, etc.
  • Find editors who have shown interest in this subject and ask them to take a look here.

define SPS

Is this a reference to NIST Special Publications (SPs)? — Preceding unsigned comment added by 96.252.66.105 (talk) 15:56, 18 June 2012 (UTC)[reply]

"SPS" is not in the article any more, so there's no need to define it now. Guy Harris (talk) 21:55, 13 November 2015 (UTC)[reply]

define user mode

this term is mentioned quite a few times on this page and on the page for microkernels. I have no idea what it means, and it's definition is not clear. The only thing clear is that it is the alternative to privileged/kernel model. —Preceding unsigned comment added by 209.77.137.57 (talk) 00:28, 14 August 2008 (UTC)[reply]

Confusing or unclear

This article would benefit from a clearer explanation about what a protection ring is and does. It assumes the reader knows what "one of two or more hierarchical levels or layers of privilege" means and why "rings were among the more revolutionary and visible concepts ..." The whole lead seems to step around defining what a ring is in simple terms, why it is significant, and how it is used. A very concise paragraph addressing some of the basics would be a great improvement to the lead section. JonHarder 13:57, 25 July 2006 (UTC)[reply]

Maybe a more appropriate name for this subject would be "hierarchical states of privilege". I think that's the way it's called by academics. I think there also should be a comparison between this approach and Capability-based security with MMU support; as I leaned in my computer architecture and parallel computing classes, the first approach (the one described in this article) is an obsolete technology and provides both poor protection and poor performance, compared to the second approach. Unfortunly my reference text book is in italian, but I'm looking for some english ones.--BMF81 18:19, 27 August 2006 (UTC)[reply]

Ring -1?

I haven't found any articles here that even mention Ring -1 (hardware-mode virtualization). Perhaps this should be the place? --Frankie

There's not even a rundown of the ring levels and what they mean. This article would benefit from a table list rings and their properties, etc.

There isn't even any explanation of the general purpose of the 80386 ring 1 or ring 2 that I can find anywhere. This article definitely should include something like that to illustrate what protection rings are good for. Daivox (talk) 16:29, 24 August 2008 (UTC)[reply]
Ring 2 was/is used in OS/2 for specially privileged DLLs. Also VMS uses all 4 rings. Rings can be used to fine tune the os privileges - see VAX#Privilege_Modes. Note that in VMS the file system run in it's own ring - Filesystem in Userspace is not a very new idea.
And I where to create an Os I would use the 4 available ring as follows:
Ring 0
Hypervisor
Ring 1
(Micro)-Kernel
Ring 2
(Privileged) Device Driver
Ring 3
User Applications
But this is only one possible layout - as mentioned: VMS run the shell and the file systems in own rings. --Krischik T 14:24, 21 October 2008 (UTC)[reply]

Why

Why is elegance linked in the "Interoperation between CPU and OS levels of abstraction" section? —Preceding unsigned comment added by 207.96.162.77 (talk) 18:36, 17 December 2007 (UTC)[reply]

Kernel mode driver

What is a kernel mode driver ?. --Mac (talk) 10:35, 25 April 2008 (UTC)[reply]

more hypervisor background please, especially of the non-x86 type

Hypervisor

I'd like to request more in-depth discussion on hypervisors like those running IBM mainframes, perhaps historical perspective with the (again) IBM romp vm layer that ran AIX as a guest, or any of the alternative and/or comparable approaches (sun? hp?) that predate amd's and intel's johnny-come-lately implementation of this idea. 84.82.170.167 (talk) 23:18, 9 February 2009 (UTC)[reply]

System Management Interrupt - Ring -1

For quite some time now x86 processors have implemented a System Management Interrupt. This is a non-maskable interrupt similar to the NMI that causes a transition back to the BIOS (actually whatever lives at 0xA0000 behind the legacy video ram). The OS has no control over this interrupt and is not notified that the interrupt occurred in any way. It is intended to be used by motherboard manufacturers to transparently deal with special features of their boards. See [1] for more info about why this is important. DaBraunBird (talk) 16:59, 8 December 2009 (UTC)[reply]

SMM mode sometimes reffered as "Ring -2" `a5b (talk) 14:46, 10 January 2012 (UTC)[reply]

ITL knows about "Ring -3"

In presentation http://invisiblethingslab.com/resources/bh09usa/Ring%20-3%20Rootkits.pdf "Introducing Ring -3 Rootkits" the "Ring -3" is defined as Intel AMT. `a5b (talk) 14:46, 10 January 2012 (UTC)[reply]

This is merely a single reference to an invented marketing term: A rootkit runs at Ring-0, A rootkit that runs as a hypervisor runs at Ring-1, A rootkit that runs as a hyper-hypervisor, still runs at Ring-1/Hypervisor.

I disagree

"Today, this high degree of interoperation between the OS and the hardware is not often cost-effective, despite the potential advantages for security and stability." Today, a very high degree of interoperation between the OS and the hardware exists, to provide performance video and secondary storage performance, as well as virtualization performance.

"Intel announced that the Clover Trail series of processors will be "Windows only", lacking the disclosed information necessary to support Linux. But Clover Trail is already a dead end for other technical and business reasons."

[ http://perens.com/blog/2012/09/15/1/]

Microkernel performance

The statement that micro-kernels are "sacrificing performance" is too strong, and contradicted by the performance of modern micro-kernels, such as L4. — Preceding unsigned comment added by 121.127.198.152 (talk) 00:36, 8 August 2014 (UTC)[reply]

I'm not sure what microkernel means in a world without ring 1 & ring 2. L4 may well be faster but it is not *because* it is a "microkernel". — Preceding unsigned comment added by MagmaiKH (talkcontribs) 11:49, 29 September 2016 (UTC)[reply]

Proposed merge with Privilege level

overlapping scope - x86 can/should be a section in main article given current article Widefox; talk 18:33, 13 June 2017 (UTC)[reply]

More generic article about protection rings (not limited to computing)

Is there also a more generic article about protection rings that also incorporates the physical domain, such as in medieval castles with rings of walls? I could not find it. If there is, this article should link to that concept. If there isn't, it should probably be created and elements of this article should be moved there. That generic article could also relate to defence in depth.