Intel Intro2 PDF
Intel Intro2 PDF
I A-32 architecture (beginning with the I ntel386 processor family) provides extensive support for operating-system
and system-development software. This support offers multiple modes of operation, which include:
• Real mode, protected mode, virtual 8086 mode, and system management mode. These are sometimes
referred to as legacy modes.
I ntel 64 architecture supports almost all the system programming facilities available in I A-32 architecture and
extends them to a new operating mode (I A-32e mode) that supports a 64-bit programming environment. I A-32e
mode allows software to operate in one of two sub-modes:
• 64-bit mode supports 64-bit OS and 64-bit applications
• Compatibility mode allows most legacy software to run; it co-exists with 64-bit applications under a 64-bit OS.
The I A-32 system-level architecture and includes features to assist in the following operations:
• Memory management
• Protection of software modules
• Multitasking
• Exception and interrupt handling
• Multiprocessing
• Cache management
• Hardware resource and power management
• Debugging and performance monitoring
This chapter provides a description of each part of this architecture. I t also describes the system registers that are
used to set up and control the processor at the system level and gives a brief overview of the processor’s system-
level (operating system) instructions.
Many features of the system-level architectural are used only by system programmers. However, application
programmers may need to read this chapter and the following chapters in order to create a reliable and secure
environment for application programs.
This overview and most subsequent chapters of this book focus on protected-mode operation of the I A-32 architec-
ture. I A-32e mode operation of the I ntel 64 architecture, as it differs from protected mode operation, is also
described.
All I ntel 64 and I A-32 processors enter real-address mode following a power-up or reset (see Chapter 9, “Processor
Management and I nitialization”). Software then initiates the switch from real-address mode to protected mode. I f
I A-32e mode operation is desired, software also initiates a switch from protected mode to I A-32e mode.
Vol. 3A 2-1
SYSTEM ARCHITECTURE OVERVIEW
Linear Addr.
Page Directory Page Table Page
Physical Addr.
Pg. Dir. Entry Pg. Tbl. Entry
2-2 Vol. 3A
SYSTEM ARCHITECTURE OVERVIEW
RFLAGS
Physical Address
Code, Data or Stack
Control Register Linear Address Segment (Base =0)
CR8 Task-State
CR4 Segment Selector Segment (TSS)
CR3
CR2 Register
CR1
CR0 Global Descriptor
Task Register Table (GDT)
Linear Addr.
PML4 Pg. Dir. Ptr. Page Dir. Page Table Page
Physical
PML4. Pg. Dir. Page Tbl Addr.
Entry Entry Entry
Vol. 3A 2-3
SYSTEM ARCHITECTURE OVERVIEW
To access a byte in a segment, a segment selector and an offset must be supplied. The segment selector provides
access to the segment descriptor for the segment (in the GDT or LDT). From the segment descriptor, the processor
obtains the base address of the segment in the linear address space. The offset then provides the location of the
byte relative to the base address. This mechanism can be used to access any valid code, data, or stack segment,
provided the segment is accessible from the current privilege level (CPL) at which the processor is operating. The
CPL is defined as the protection level of the currently executing code segment.
See Figure 2-1. The solid arrows in the figure indicate a linear address, dashed lines indicate a segment selector,
and the dotted arrows indicate a physical address. For simplicity, many of the segment selectors are shown as
direct pointers to a segment. However, the actual path from a segment selector to its associated segment is always
through a GDT or LDT.
The linear address of the base of the GDT is contained in the GDT register (GDTR); the linear address of the LDT is
contained in the LDT register (LDTR).
1. The word procedure is commonly used in this document as a general term for a logical unit or block of code (such as a program, pro-
cedure, function, or routine).
2-4 Vol. 3A
SYSTEM ARCHITECTURE OVERVIEW
Vol. 3A 2-5
SYSTEM ARCHITECTURE OVERVIEW
2-6 Vol. 3A