User's Manual

TABLE OF CONTENTS
Page
Reserved
and
Dedicated Interrupt Vectors ...............................................................
5-5
System Initialization ........................................................................................................
5-7
CHAPTER 6
MEMORY
MANAGEMENT
AND
VIRTUAL
ADDRESSING
Memory Management Overview ....................................................................................
6-1
Virtual Addresses ............. .........
......
.....
....... ....... .................. ........... ............ ....... ............
6-2
Descriptor
Tables
.................................................................................................. .........
6-4
Virtual-to-Physical Address Translation
...
....... .................. ........... ........... ..........
......
......
6-6
Segments
and
Segment Descriptors .............................................................................
6-7
Memory Management Registers .........
.....
........ .......... ........
......
............... ......................
6-9
Segment Address Translation Registers ...................................................................
6-9
System Address Registers ............ ....... .......
......
....
.........
.....
............ ................
.....
......
6-12
CHAPTER 7
PROTECTION
Introduction .....................................................................................................................
7-1
Types of Protection ....................................................................................................
7-1
Protection Implementation .........................................................................................
7-2
Memory Management
and
Protection ...........................................................................
7-4
Separation of Address Spaces ..................................................................................
7-5
LDT
and
GDT
Access Checks ...................................................................................
7-5
Type Validation ...........................................................................................................
7-6
Privilege
Levels
and
Protection ........................................................................ .............
7-8
Example
of
Using
Four Privilege
Levels
....................................................................
7-8
Privilege
Usage
...........................................................................................................
7-9
Segment Descriptor .......................................................................................................
7-10
Data
Accesses ............................................................................................................
7-12
Code
Segment Access ............................................................................................... 7-13
Data
Access Restriction
by
Privilege
Level
...............................................................
7-13
POinter
Privilege Stamping
via
ARPL
.........................................................................
7-14
Control Transfers .................................................... .......................................................
7-15
Gates
........................................................................................................................... 7-16
Call
Gates
................................................................................................................
7-17
Intra-Level Transfers
via
Call
Gate
......................................................................... 7-18
Inter-Level Control Transfer
via
Call
Gates
............................................................
7-19
Stack
Changes
Caused
by
Call
Gates
.............................................. .....................
7-20
Inter-Level Returns .....................................................................................................
7-20
CHAPTERS
TASKS
AND
STATE TRANSITIONS
Introduction
.....................................................................................................................
8-1
Task State Segments
and
Descriptors ..........................................................................
8-1
Task State Segment Descriptors ...............................................................................
8-3
Task Switching ............................................................................................................... 8ยท4
Task Linking ...................................................................................................................
8-7
Task
Gates
.....................................................................................................................
8-8
CHAPTER 9
INTERRUPTS
AND
EXCEPTIONS
Interrupt Descriptor Table ..............................................................................................
9-1
Hardware Initiated Interrupts .........................................................................................
9-2
vii