[TUHS] Unix use of VAX protection modes

Warner Losh via TUHS tuhs at tuhs.org
Wed Jan 21 08:07:21 AEST 2026


On Tue, Jan 20, 2026 at 12:48 PM Paul Winalski via TUHS <tuhs at tuhs.org>
wrote:

> The discussion of the history of virtual addressing in Unix called to my
> mind a related question:
>
> The VAX has four protection modes, from lowest to highest in privilege:
> user, supervisor, executive, kernel.  Access to certain instructions and
> hardware data structures can only be done from kernel mode.  User mode is
> of course intended for use by non-privileged code and data.  The VAX/VMS
> Digital Command Language (DCL) command interpreter ran in supervisor mode.
> Record Management Services (RMS, the primary way to access disk files) ran
> in executive mode.  The kernel, device drivers, hardware interrupt
> handlers, etc. ran in kernel mode.
>
> Obviously Unix user-mode process code and data ran in user mode.  Likewise
> the parts of the kernel that had to access privileged bits of the hardware
> (such as device drivers) must have run in kernel mode.
>
> My question is, did Unix make any use of either supervisor or executive
> mode on the VAX?
>

My 1987 OS class said it only used user and kernel mode.

Looking at the 4.3BSD kernel, it either sets both priv bits, or clears both
the bits.
I don't see where it would be using supervisor or executive mode, but this
was a super
fast grep for PSL manipulation

Warner


More information about the TUHS mailing list