SlideShare a Scribd company logo
1Submitted by-
Deepak – 101116
Sunil – 101117
Submitted to-
Prof. Rahul Mehta
Prof. Harekrishna Parmar
2
 Three modes of software operation in 80386:
 Real-address mode,
 Protected-address mode and
 Virtual-address mode
 80386 microprocessor comes up in Real Mode
whenever it is RESET.
 PE bit of CR0 is used to switch 80386 into Protected
Mode.
 In this mode 80386 provides an advanced software
architecture supporting memory management, virtual
addressing, paging, protection and multi-tasking.
 Disadvantages:
 More difficult to program
 Much harder to debug, no source-level debugging
 GDTR : global descriptor table
 LDTR : local descriptor table
 IDTR : interrupt descriptor table
 TR : task register
 EIP : 32 bits in length
 EFLAGS
 CR0, CR1, CR2, CR3
 DR0-DR7(Debug registers)
 TR6-TR7(Test registers)
3
EIP
CS
DS
SS
ES
FS
GS
AX
BX
CX
DX
SP
BP
SI
DI
EFLAGS
GDTR
IDTR
LDTR
CR0
CR1
CR2
CR3
TR
Limit
LimitBase
Base
0151647
MSW
DR0
DR1
DR2
DR3
DR4
DR5
DR6
DR7
TR6
TR7
31 16 15 0
 Global Descriptor Table
 GDT provides a mechanism for defining the
characteristics of the 80386’s global memory address
space. Global memory is a general system resource that
is shared by many or all software tasks.
 Contains system segment descriptors
4
BASE LIMIT
047 16 15
0
8191
1
Global
Descriptor
Table
(GDT)
Global Descriptor Table Register(GDTR) MAX: 64k bytes
8K entries
 These descriptors identify the characteristics of the
segments of global memory.
 One descriptor exists for each segment of memory in
virtual address space.
 8 bytes long and contains three kinds of information
 Limit
 Base
 Access Rights
5
 Interrupt Descriptor Table (IDT)
 Contains interrupt descriptors, not segment descriptors
 IDT can also be up to 64KB; But 80386 only supports
up to 256 interrupts and exceptions(2KB)
6
BASE LIMIT
047 16 15
0
255
1
Interrupt
Descriptor
Table
(IDT)
Interrupt Descriptor Table Register(IDTR)
MAX: 2k bytes
256 entries
 Local Descriptor Table(LDT)
 Each task can have
access to own private
descriptor table(LDT) in
addition to GDT.
 Contains descriptors that
provide access to code
and data in segments of
memory that are
reserved for the current
task.
7
GDT
LDT0
LDTn
LIMIT
BASE
LIMIT
BASE
selector
0
015
15
31
31
LDTR
LDTR
cache
program invisible
LDT0
LDTn
GDTR
15 0
0112331 10
CR0
CR3
CR2
CR1RESERVED
RESERVED
Page Fault Linear Address
Page Directory Base Register
P
G
M
P
T
S
P
E
 MSW (machine status word) : CR0
 the lower 5 bits of CR0 are system-control flags
 PE: protected-mode enable bit
 At reset, PE is cleared.(real mode)
 Set PE to 1 to enter protected mode
 Once in protected mode, 80386 cannot be switched
back to real mode under SW control
8
PE: protection enable
MP: math present
EM: emulate
ET: extension type
(coprocessor)
TS: task switched
RESERVED
E
M
E
T
 Paging mechanism
 MSB of CR0, CR2, CR3
 Task Register
 Task switching mechanism
 TSS descriptor
 TSS : task state segment; information needed to
initiate the task, such as initial values for the user-
accessible registers
9
Physical Memory
GDT
TSS
TSS descriptorTR
BASE LIMIT
0151647
015
Cache
 Example: The value of selector load to CS: 1007H, GDT
base 00100000H, LDT base 00120000H
 (CS) = 0001 0000 0000 0111 : RPL = 3, TI =1, Index =
0001 0000 0000 0
 Offset=0001 0000 0000 0 *8=512 *8=4096d=1000h
 Address of the segment descriptor
Descriptor address = 00120000H + 1000H =
00121000H
10
RPLINDEX
SEGMENT SELECTOR REGISTER
1-0
2
15-3
Requested
Privilege
Level (RPL)
Indicates selector privilege
level desired
Table
Indicator
(TI)
TI=0 use global descriptor table (GDT)
TI=1 use local descriptor table (LDT)
Index select descriptor entry in table
T
I
Bits Name Function
 VM : virtual 8086 Mode - system flag
 set only in Protected Mode by IRET instruction and by
task switches
 unaffected by POPF
 RF : resume flag - system flag
 in conjunction with the debug register breakpoints
 NT: nested task flag - system flag
 indicates that the execution of this task is nested
within another task
 IOPL : input/output privilege flag - system flag
 indicates the numerically maximum CPL(current)
value permitted to execute I/O instructions 11
0 0 0 0 0 0 0 0 0 0 0 0 0 0 V R 0 N IO O D I T S Z 0 A 0 P 1 C
M F T PL F F F F F F F F F
071531
 Virtual Address and Virtual Address Space
 virtual address : selector(16-bit): offset(32-bit)
-214(16,384 = 16K) unique segments of memory, each of
which has a maximum size of 4G bytes
 Total virtual address space = 246 , 64 TB
 T1 for global or local descriptor table to define Virtual
Address space 12
47 32 31 0
T
I
selector offset
47 32 31 0
RPLINDEX
 Segment Partitioning of the Virtual Address Space
13
Local segment 8191
Local segment 1
Local segment 0
Global segment 8191
Global segment 1
Global segment 0
Local address space
32 Terabytes
Global address space
32 Terabytes
Virtual Address Space
64 Terabytes
 Application Program : a collection of tasks
 task: a group of program routines that together
perform a specific function
 A task can activate both global and local segments of
memory
14
Task 1
Local Address
Space
Global
Address
Space
Task 3
Local Address
Space
Task 2
Local Address
Space
Task 1 Virtual Address Space
Task 2 Virtual Address SpaceTask 3 Virtual Address Space
15
SELECTOR OFFSET
SEGMENT
TRANSLATION
PG?
DIR PAGE OFFSET
31 0
PAGE
TRANSLATION
PHYSICAL ADDRESS
PAGING DISABLED
PAGING ENABLED
LOGICAL ADDRESS
LINEAR ADDRESS
16
SELECTOR OFFSET
SEGMENT
TRANSLATION
PG?
DIR PAGE OFFSET
31 0
PAGE
TRANSLATION
PHYSICAL ADDRESS
PAGING DISABLED
PAGING ENABLED
LOGICAL ADDRESS
LINEAR ADDRESS
Data Segment
Descriptor
Cache Register
Selector Offset(EBX)
(DS)
Data
Segment
LDT
Operand
Segment
Descriptor
17
CS
DS
SS
ES
FS
GS
Programmer
accessible
Selectors
Transparently Loaded by MPU
Access Rights Base Address Limit
01920515263
64-bit Segment
Descriptor
Cache Registers
Ref. :
Walter A. Triebel and Avtar Singh,
The 8088 and 886 Microprocessor.

More Related Content

What's hot

Question paper with solution the 8051 microcontroller based embedded systems...
Question paper with solution  the 8051 microcontroller based embedded systems...Question paper with solution  the 8051 microcontroller based embedded systems...
Question paper with solution the 8051 microcontroller based embedded systems...
manishpatel_79
 
Pipeline hazards in computer Architecture ppt
Pipeline hazards in computer Architecture pptPipeline hazards in computer Architecture ppt
Pipeline hazards in computer Architecture ppt
mali yogesh kumar
 
Stack organization
Stack organizationStack organization
Stack organization
chauhankapil
 
8086 microprocessor-architecture
8086 microprocessor-architecture8086 microprocessor-architecture
8086 microprocessor-architecture
prasadpawaskar
 
Instruction Set Architecture
Instruction Set ArchitectureInstruction Set Architecture
Instruction Set Architecture
Dilum Bandara
 
8259 a
8259 a8259 a
Instruction formats-in-8086
Instruction formats-in-8086Instruction formats-in-8086
Instruction formats-in-8086
MNM Jain Engineering College
 
Introduction to 80386 microprocessor
Introduction to 80386 microprocessorIntroduction to 80386 microprocessor
Introduction to 80386 microprocessor
Shehrevar Davierwala
 
CISC & RISC Architecture
CISC & RISC Architecture CISC & RISC Architecture
CISC & RISC Architecture
Suvendu Kumar Dash
 
Pentium processor
Pentium processorPentium processor
Pentium processor
Pranjali Deshmukh
 
Pipelining & All Hazards Solution
Pipelining  & All Hazards SolutionPipelining  & All Hazards Solution
Pipelining & All Hazards Solution
.AIR UNIVERSITY ISLAMABAD
 
Special of 80386 registers
Special of 80386 registersSpecial of 80386 registers
Special of 80386 registers
Tanmoy Mazumder
 
Addressing modes
Addressing modesAddressing modes
Addressing modes
RAMESHBABUA3
 
INSTRUCTION LEVEL PARALLALISM
INSTRUCTION LEVEL PARALLALISMINSTRUCTION LEVEL PARALLALISM
INSTRUCTION LEVEL PARALLALISMKamran Ashraf
 
Input & Output
Input & OutputInput & Output
Input & Output
Dilum Bandara
 
Data Hazard and Solution for Data Hazard
Data Hazard and Solution for Data HazardData Hazard and Solution for Data Hazard
Data Hazard and Solution for Data Hazard
COMSATS Institute of Information Technology
 
Architecture of 8086 Microprocessor
Architecture of 8086 Microprocessor  Architecture of 8086 Microprocessor
Architecture of 8086 Microprocessor Mustapha Fatty
 
mano.ppt
mano.pptmano.ppt
mano.ppt
prathamgunj
 
Pipeline and data hazard
Pipeline and data hazardPipeline and data hazard
Pipeline and data hazardWaed Shagareen
 

What's hot (20)

Question paper with solution the 8051 microcontroller based embedded systems...
Question paper with solution  the 8051 microcontroller based embedded systems...Question paper with solution  the 8051 microcontroller based embedded systems...
Question paper with solution the 8051 microcontroller based embedded systems...
 
Pipeline hazards in computer Architecture ppt
Pipeline hazards in computer Architecture pptPipeline hazards in computer Architecture ppt
Pipeline hazards in computer Architecture ppt
 
DMA and DMA controller
DMA and DMA controllerDMA and DMA controller
DMA and DMA controller
 
Stack organization
Stack organizationStack organization
Stack organization
 
8086 microprocessor-architecture
8086 microprocessor-architecture8086 microprocessor-architecture
8086 microprocessor-architecture
 
Instruction Set Architecture
Instruction Set ArchitectureInstruction Set Architecture
Instruction Set Architecture
 
8259 a
8259 a8259 a
8259 a
 
Instruction formats-in-8086
Instruction formats-in-8086Instruction formats-in-8086
Instruction formats-in-8086
 
Introduction to 80386 microprocessor
Introduction to 80386 microprocessorIntroduction to 80386 microprocessor
Introduction to 80386 microprocessor
 
CISC & RISC Architecture
CISC & RISC Architecture CISC & RISC Architecture
CISC & RISC Architecture
 
Pentium processor
Pentium processorPentium processor
Pentium processor
 
Pipelining & All Hazards Solution
Pipelining  & All Hazards SolutionPipelining  & All Hazards Solution
Pipelining & All Hazards Solution
 
Special of 80386 registers
Special of 80386 registersSpecial of 80386 registers
Special of 80386 registers
 
Addressing modes
Addressing modesAddressing modes
Addressing modes
 
INSTRUCTION LEVEL PARALLALISM
INSTRUCTION LEVEL PARALLALISMINSTRUCTION LEVEL PARALLALISM
INSTRUCTION LEVEL PARALLALISM
 
Input & Output
Input & OutputInput & Output
Input & Output
 
Data Hazard and Solution for Data Hazard
Data Hazard and Solution for Data HazardData Hazard and Solution for Data Hazard
Data Hazard and Solution for Data Hazard
 
Architecture of 8086 Microprocessor
Architecture of 8086 Microprocessor  Architecture of 8086 Microprocessor
Architecture of 8086 Microprocessor
 
mano.ppt
mano.pptmano.ppt
mano.ppt
 
Pipeline and data hazard
Pipeline and data hazardPipeline and data hazard
Pipeline and data hazard
 

Viewers also liked

Protection 80386
Protection 80386Protection 80386
Protection 80386
Akshay Nagpurkar
 
Protected mode memory addressing 8086
Protected mode memory addressing 8086Protected mode memory addressing 8086
Protected mode memory addressing 8086
University of Gujrat, Pakistan
 
Microprocessor Protected Mode Memory addressing By DHEERAJ KATARIA
Microprocessor Protected Mode Memory addressing By DHEERAJ KATARIAMicroprocessor Protected Mode Memory addressing By DHEERAJ KATARIA
Microprocessor Protected Mode Memory addressing By DHEERAJ KATARIA
Dheeraj Kataria
 
Memory mgmt 80386
Memory mgmt 80386Memory mgmt 80386
Memory mgmt 80386
Akshay Nagpurkar
 
INTEL 80386 MICROPROCESSOR
INTEL  80386  MICROPROCESSORINTEL  80386  MICROPROCESSOR
INTEL 80386 MICROPROCESSOR
Annies Minu
 
Salient featurs of 80386
Salient featurs of 80386Salient featurs of 80386
Salient featurs of 80386aviban
 
Addressing modes of 80386
Addressing modes of 80386Addressing modes of 80386
Addressing modes of 80386
PDFSHARE
 
Architecture of 80286 microprocessor
Architecture of 80286 microprocessorArchitecture of 80286 microprocessor
Architecture of 80286 microprocessor
Syed Ahmed Zaki
 
Privilege levels 80386
Privilege levels 80386Privilege levels 80386
Privilege levels 80386
Akshay Nagpurkar
 
Memory segmentation-of-8086
Memory segmentation-of-8086Memory segmentation-of-8086
Memory segmentation-of-8086
mudulin
 
Comparison of pentium processor with 80386 and 80486
Comparison of pentium processor with  80386 and 80486Comparison of pentium processor with  80386 and 80486
Comparison of pentium processor with 80386 and 80486Tech_MX
 
sistem mikroprosessor 2
sistem mikroprosessor 2sistem mikroprosessor 2
sistem mikroprosessor 2
yasir_cesc
 
Instruction set-of-8086
Instruction set-of-8086Instruction set-of-8086
Instruction set-of-8086
mudulin
 
ARM server, The Cy7 Introduction by Aaron Joue, Ambedded Technology
ARM server, The Cy7 Introduction by Aaron Joue, Ambedded TechnologyARM server, The Cy7 Introduction by Aaron Joue, Ambedded Technology
ARM server, The Cy7 Introduction by Aaron Joue, Ambedded Technology
Aaron Joue
 
Modes of 80386
Modes of 80386Modes of 80386
Modes of 80386aviban
 
Why the Address Translation Scheme Matters?
Why the Address Translation Scheme Matters?Why the Address Translation Scheme Matters?
Why the Address Translation Scheme Matters?Jiaqing Du
 
80386 microprocessor
80386 microprocessor80386 microprocessor
80386 microprocessor
Jerin Sebastian
 

Viewers also liked (20)

Protection 80386
Protection 80386Protection 80386
Protection 80386
 
Protected mode memory addressing 8086
Protected mode memory addressing 8086Protected mode memory addressing 8086
Protected mode memory addressing 8086
 
Microprocessor Protected Mode Memory addressing By DHEERAJ KATARIA
Microprocessor Protected Mode Memory addressing By DHEERAJ KATARIAMicroprocessor Protected Mode Memory addressing By DHEERAJ KATARIA
Microprocessor Protected Mode Memory addressing By DHEERAJ KATARIA
 
The 80386 80486
The 80386 80486The 80386 80486
The 80386 80486
 
Memory mgmt 80386
Memory mgmt 80386Memory mgmt 80386
Memory mgmt 80386
 
INTEL 80386 MICROPROCESSOR
INTEL  80386  MICROPROCESSORINTEL  80386  MICROPROCESSOR
INTEL 80386 MICROPROCESSOR
 
Salient featurs of 80386
Salient featurs of 80386Salient featurs of 80386
Salient featurs of 80386
 
Addressing modes of 80386
Addressing modes of 80386Addressing modes of 80386
Addressing modes of 80386
 
Architecture of 80286 microprocessor
Architecture of 80286 microprocessorArchitecture of 80286 microprocessor
Architecture of 80286 microprocessor
 
Privilege levels 80386
Privilege levels 80386Privilege levels 80386
Privilege levels 80386
 
Memory segmentation-of-8086
Memory segmentation-of-8086Memory segmentation-of-8086
Memory segmentation-of-8086
 
Comparison of pentium processor with 80386 and 80486
Comparison of pentium processor with  80386 and 80486Comparison of pentium processor with  80386 and 80486
Comparison of pentium processor with 80386 and 80486
 
sistem mikroprosessor 2
sistem mikroprosessor 2sistem mikroprosessor 2
sistem mikroprosessor 2
 
Instruction set-of-8086
Instruction set-of-8086Instruction set-of-8086
Instruction set-of-8086
 
ARM server, The Cy7 Introduction by Aaron Joue, Ambedded Technology
ARM server, The Cy7 Introduction by Aaron Joue, Ambedded TechnologyARM server, The Cy7 Introduction by Aaron Joue, Ambedded Technology
ARM server, The Cy7 Introduction by Aaron Joue, Ambedded Technology
 
Modes of 80386
Modes of 80386Modes of 80386
Modes of 80386
 
DAT Education
DAT EducationDAT Education
DAT Education
 
Why the Address Translation Scheme Matters?
Why the Address Translation Scheme Matters?Why the Address Translation Scheme Matters?
Why the Address Translation Scheme Matters?
 
Intel80286
Intel80286Intel80286
Intel80286
 
80386 microprocessor
80386 microprocessor80386 microprocessor
80386 microprocessor
 

Similar to Protection mode

Intel x86 Architecture
Intel x86 ArchitectureIntel x86 Architecture
Intel x86 ArchitectureChangWoo Min
 
x86_1.ppt
x86_1.pptx86_1.ppt
x86_1.ppt
jeronimored
 
Pentium protected mode.ppt
Pentium protected mode.pptPentium protected mode.ppt
Pentium protected mode.ppt
PramodBorole2
 
Unit II Arm 7 Introduction
Unit II Arm 7 IntroductionUnit II Arm 7 Introduction
Unit II Arm 7 Introduction
Dr. Pankaj Zope
 
assignment 1-MC.pdf
assignment 1-MC.pdfassignment 1-MC.pdf
assignment 1-MC.pdf
SANTHAKUMARP5
 
Advanced Microprocessors
Advanced MicroprocessorsAdvanced Microprocessors
Advanced Microprocessors
BuddiesSairamit
 
COA Lecture 01(Introduction).pptx
COA Lecture 01(Introduction).pptxCOA Lecture 01(Introduction).pptx
COA Lecture 01(Introduction).pptx
syed rafi
 
Internal microprocessor architecture
Internal microprocessor architectureInternal microprocessor architecture
Internal microprocessor architecture
University of Gujrat, Pakistan
 
Embedded system classes in mumbai
Embedded system classes in mumbaiEmbedded system classes in mumbai
Embedded system classes in mumbai
Vibrant Technologies & Computers
 
Assembly programming
Assembly programmingAssembly programming
Assembly programming
Omar Sanchez
 
Features of tms_320_2nd_generation_dsp
Features of tms_320_2nd_generation_dspFeatures of tms_320_2nd_generation_dsp
Features of tms_320_2nd_generation_dsp
Smriti Tikoo
 
Protected addressing mode and Paging
Protected addressing mode and PagingProtected addressing mode and Paging
Protected addressing mode and Paging
marada0033
 
8051 memory
8051 memory8051 memory
8051 memory
Mayank Garg
 
An Overview of Arm-9 32-bit MCU TMPA910 Series
An Overview of Arm-9 32-bit MCU TMPA910 Series An Overview of Arm-9 32-bit MCU TMPA910 Series
An Overview of Arm-9 32-bit MCU TMPA910 Series
Premier Farnell
 
Microprocessor 8086
Microprocessor 8086Microprocessor 8086
Microprocessor 8086
Waleed Khan
 
8086 module 1 & 2 work
8086 module 1 & 2   work8086 module 1 & 2   work
8086 module 1 & 2 work
Suhail Km
 
Intel+80286
Intel+80286Intel+80286
Intel+80286
Dhanwantari Sali
 

Similar to Protection mode (20)

Intel x86 Architecture
Intel x86 ArchitectureIntel x86 Architecture
Intel x86 Architecture
 
x86_1.ppt
x86_1.pptx86_1.ppt
x86_1.ppt
 
Lecture9
Lecture9Lecture9
Lecture9
 
Pentium protected mode.ppt
Pentium protected mode.pptPentium protected mode.ppt
Pentium protected mode.ppt
 
Unit II Arm 7 Introduction
Unit II Arm 7 IntroductionUnit II Arm 7 Introduction
Unit II Arm 7 Introduction
 
assignment 1-MC.pdf
assignment 1-MC.pdfassignment 1-MC.pdf
assignment 1-MC.pdf
 
Advanced Microprocessors
Advanced MicroprocessorsAdvanced Microprocessors
Advanced Microprocessors
 
COA Lecture 01(Introduction).pptx
COA Lecture 01(Introduction).pptxCOA Lecture 01(Introduction).pptx
COA Lecture 01(Introduction).pptx
 
Internal microprocessor architecture
Internal microprocessor architectureInternal microprocessor architecture
Internal microprocessor architecture
 
Embedded system classes in mumbai
Embedded system classes in mumbaiEmbedded system classes in mumbai
Embedded system classes in mumbai
 
Assembly programming
Assembly programmingAssembly programming
Assembly programming
 
A0220105
A0220105A0220105
A0220105
 
Features of tms_320_2nd_generation_dsp
Features of tms_320_2nd_generation_dspFeatures of tms_320_2nd_generation_dsp
Features of tms_320_2nd_generation_dsp
 
Protected addressing mode and Paging
Protected addressing mode and PagingProtected addressing mode and Paging
Protected addressing mode and Paging
 
8051 memory
8051 memory8051 memory
8051 memory
 
An Overview of Arm-9 32-bit MCU TMPA910 Series
An Overview of Arm-9 32-bit MCU TMPA910 Series An Overview of Arm-9 32-bit MCU TMPA910 Series
An Overview of Arm-9 32-bit MCU TMPA910 Series
 
89s52 2
89s52 289s52 2
89s52 2
 
Microprocessor 8086
Microprocessor 8086Microprocessor 8086
Microprocessor 8086
 
8086 module 1 & 2 work
8086 module 1 & 2   work8086 module 1 & 2   work
8086 module 1 & 2 work
 
Intel+80286
Intel+80286Intel+80286
Intel+80286
 

Recently uploaded

The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 

Recently uploaded (20)

The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 

Protection mode

  • 1. 1Submitted by- Deepak – 101116 Sunil – 101117 Submitted to- Prof. Rahul Mehta Prof. Harekrishna Parmar
  • 2. 2  Three modes of software operation in 80386:  Real-address mode,  Protected-address mode and  Virtual-address mode  80386 microprocessor comes up in Real Mode whenever it is RESET.  PE bit of CR0 is used to switch 80386 into Protected Mode.  In this mode 80386 provides an advanced software architecture supporting memory management, virtual addressing, paging, protection and multi-tasking.  Disadvantages:  More difficult to program  Much harder to debug, no source-level debugging
  • 3.  GDTR : global descriptor table  LDTR : local descriptor table  IDTR : interrupt descriptor table  TR : task register  EIP : 32 bits in length  EFLAGS  CR0, CR1, CR2, CR3  DR0-DR7(Debug registers)  TR6-TR7(Test registers) 3 EIP CS DS SS ES FS GS AX BX CX DX SP BP SI DI EFLAGS GDTR IDTR LDTR CR0 CR1 CR2 CR3 TR Limit LimitBase Base 0151647 MSW DR0 DR1 DR2 DR3 DR4 DR5 DR6 DR7 TR6 TR7 31 16 15 0
  • 4.  Global Descriptor Table  GDT provides a mechanism for defining the characteristics of the 80386’s global memory address space. Global memory is a general system resource that is shared by many or all software tasks.  Contains system segment descriptors 4 BASE LIMIT 047 16 15 0 8191 1 Global Descriptor Table (GDT) Global Descriptor Table Register(GDTR) MAX: 64k bytes 8K entries
  • 5.  These descriptors identify the characteristics of the segments of global memory.  One descriptor exists for each segment of memory in virtual address space.  8 bytes long and contains three kinds of information  Limit  Base  Access Rights 5
  • 6.  Interrupt Descriptor Table (IDT)  Contains interrupt descriptors, not segment descriptors  IDT can also be up to 64KB; But 80386 only supports up to 256 interrupts and exceptions(2KB) 6 BASE LIMIT 047 16 15 0 255 1 Interrupt Descriptor Table (IDT) Interrupt Descriptor Table Register(IDTR) MAX: 2k bytes 256 entries
  • 7.  Local Descriptor Table(LDT)  Each task can have access to own private descriptor table(LDT) in addition to GDT.  Contains descriptors that provide access to code and data in segments of memory that are reserved for the current task. 7 GDT LDT0 LDTn LIMIT BASE LIMIT BASE selector 0 015 15 31 31 LDTR LDTR cache program invisible LDT0 LDTn GDTR 15 0
  • 8. 0112331 10 CR0 CR3 CR2 CR1RESERVED RESERVED Page Fault Linear Address Page Directory Base Register P G M P T S P E  MSW (machine status word) : CR0  the lower 5 bits of CR0 are system-control flags  PE: protected-mode enable bit  At reset, PE is cleared.(real mode)  Set PE to 1 to enter protected mode  Once in protected mode, 80386 cannot be switched back to real mode under SW control 8 PE: protection enable MP: math present EM: emulate ET: extension type (coprocessor) TS: task switched RESERVED E M E T
  • 9.  Paging mechanism  MSB of CR0, CR2, CR3  Task Register  Task switching mechanism  TSS descriptor  TSS : task state segment; information needed to initiate the task, such as initial values for the user- accessible registers 9 Physical Memory GDT TSS TSS descriptorTR BASE LIMIT 0151647 015 Cache
  • 10.  Example: The value of selector load to CS: 1007H, GDT base 00100000H, LDT base 00120000H  (CS) = 0001 0000 0000 0111 : RPL = 3, TI =1, Index = 0001 0000 0000 0  Offset=0001 0000 0000 0 *8=512 *8=4096d=1000h  Address of the segment descriptor Descriptor address = 00120000H + 1000H = 00121000H 10 RPLINDEX SEGMENT SELECTOR REGISTER 1-0 2 15-3 Requested Privilege Level (RPL) Indicates selector privilege level desired Table Indicator (TI) TI=0 use global descriptor table (GDT) TI=1 use local descriptor table (LDT) Index select descriptor entry in table T I Bits Name Function
  • 11.  VM : virtual 8086 Mode - system flag  set only in Protected Mode by IRET instruction and by task switches  unaffected by POPF  RF : resume flag - system flag  in conjunction with the debug register breakpoints  NT: nested task flag - system flag  indicates that the execution of this task is nested within another task  IOPL : input/output privilege flag - system flag  indicates the numerically maximum CPL(current) value permitted to execute I/O instructions 11 0 0 0 0 0 0 0 0 0 0 0 0 0 0 V R 0 N IO O D I T S Z 0 A 0 P 1 C M F T PL F F F F F F F F F 071531
  • 12.  Virtual Address and Virtual Address Space  virtual address : selector(16-bit): offset(32-bit) -214(16,384 = 16K) unique segments of memory, each of which has a maximum size of 4G bytes  Total virtual address space = 246 , 64 TB  T1 for global or local descriptor table to define Virtual Address space 12 47 32 31 0 T I selector offset 47 32 31 0 RPLINDEX
  • 13.  Segment Partitioning of the Virtual Address Space 13 Local segment 8191 Local segment 1 Local segment 0 Global segment 8191 Global segment 1 Global segment 0 Local address space 32 Terabytes Global address space 32 Terabytes Virtual Address Space 64 Terabytes
  • 14.  Application Program : a collection of tasks  task: a group of program routines that together perform a specific function  A task can activate both global and local segments of memory 14 Task 1 Local Address Space Global Address Space Task 3 Local Address Space Task 2 Local Address Space Task 1 Virtual Address Space Task 2 Virtual Address SpaceTask 3 Virtual Address Space
  • 15. 15 SELECTOR OFFSET SEGMENT TRANSLATION PG? DIR PAGE OFFSET 31 0 PAGE TRANSLATION PHYSICAL ADDRESS PAGING DISABLED PAGING ENABLED LOGICAL ADDRESS LINEAR ADDRESS
  • 16. 16 SELECTOR OFFSET SEGMENT TRANSLATION PG? DIR PAGE OFFSET 31 0 PAGE TRANSLATION PHYSICAL ADDRESS PAGING DISABLED PAGING ENABLED LOGICAL ADDRESS LINEAR ADDRESS Data Segment Descriptor Cache Register Selector Offset(EBX) (DS) Data Segment LDT Operand Segment Descriptor
  • 17. 17 CS DS SS ES FS GS Programmer accessible Selectors Transparently Loaded by MPU Access Rights Base Address Limit 01920515263 64-bit Segment Descriptor Cache Registers
  • 18. Ref. : Walter A. Triebel and Avtar Singh, The 8088 and 886 Microprocessor.