Chapter 11: Memory Protection and Relocation
Index of Figures
Fig 11.2.1................Several jobs in a multiprogrammed computer system
Fig 11.3.1................CSC-1 program to compute a = a+b-c+d*4
Fig 11.5.1................IBM's key protection of memory
Fig 11.5.2................Base address register for relocation; Field length register for protection
Fig 11.5.3................Translation of logical address and checking for memory protection violation
Fig 11.6.1................Read system call; PUSH #3 stands for 3 parameters;
TRP means to call system call #2 (which is read)