Probably has to do with virtualization where a page could be logically paged in (by the second level system) but physically paged out (by VM).
On Mon, 26 Oct 2015 15:33:39 -0400 "Farley, Peter x23353" <peter.far...@broadridge.com> wrote: :>I happened to be browsing PoOPS for another reason and noticed that TPROT is a privileged instruction. Reading the instruction details I couldn't really see any particular security exposure that could result from TPROT being usable in a non-privileged mode by unauthorized programs. :> :>Reading about TPROT led me of course to IVSK, which is needed to extract the access and fetch bits for the block of storage to be tested with TPROT. Same question there, why is it privileged? It would seem that it is privileged because it is subject to the extraction-authority control, bit 36 of control register 0, which can obviously only be set by a privileged program like the operating system code. :> :>But why protect IVSK so closely (and probably by implication TPROT)? It would seem to me to be an obvious boon to careful programmers willing to code tests of their input argument addresses to verify that those addresses can be fetched from, and possibly also for some argument addresses whether they can be stored into. :> :>I really can't see the security exposure here. Can anyone explain the privilege requirement to me? :> :>TIA for helping to cure my ignorance. -- Binyamin Dissen <bdis...@dissensoftware.com> http://www.dissensoftware.com Director, Dissen Software, Bar & Grill - Israel Should you use the mailblocks package and expect a response from me, you should preauthorize the dissensoftware.com domain. I very rarely bother responding to challenge/response systems, especially those from irresponsible companies.