GLOSSARYvirtual address: an address that consists of a selector and an offset value. The selector chooses adescriptor for a segment; the offset provides an index into the selected segment.virtual address space: The set of all possible virtual addresses that a 'task can access, as defined by theGDT and the task's LDT. The maximum possible virtual address space for one task is one gigabyte.virtual memory: a style of memory management that permits the virtual address space to exceed thephysical address space of RAM. With the help of processor features, the operating system simulatesthe virtual address space by using secondary storage to hold the overflow from RAM.word count: a field of a gate descriptor that specifies the number of words of parameters to be copiedfrom the calling procedure's stack to the stack of the called procedure.writable segment: a data segment that can be written to. A writable segment is identified by a Booleanin its descriptor.XOS (Example <strong>Operating</strong> <strong>System</strong>): an imaginary operating system, portions of which are used in thisbook as examples.Glossary-12 121960-001
INDEX8089 I/O processor, 8-18254 Programmable Interval Timer (PIT), 4-5,4-9,4-138259A Programmable Interrupt Controller(PIC), 4-6, 6-1, 6-6, 7-680287 Numerics Processor Extension (NPX),1-7,7-4,7-5,7-8, Chapter 12access rights (field of descriptor), 2-21, 2-22,9-2, 11-5, 11-10, 13-1, 13-2, 13-4accessed bit, 2-7, 5-3, 9-1, 9-4, 9-5, 9-7, 10-2ADC, 7-8addressing mechanism, 2-1ADJUST$RPL, 2-16, 13~2alias, 2-17 thru 2-22, 3-2,4-10,4-12, Chapter 5,6-5,8-2,9-3,9-7, 10-3, 11-2, 11-9, 13-5ARPL, 2-16, 13-2 thru 13-4ASM<strong>286</strong>, 3-6, 4-13, 11-4, 13-2ASSUME, 11-4asynchronous execution, 1-6back link (of TSS), 4-1 thru 4-4, 4-7, 4-13, 7-5,7-6, 10-2, 11-10base address, 2-4, 2-15, 4-1, 5-3, 9-3,9-5, 10-3,11-3, 11-10, 11-11binding, 1-8, 2-8, 2-9, Chapter 11Binder, see <strong>iAPX</strong> <strong>286</strong> Binderbootloadable, see module, bootloadableBOUND,7-4bound check exception, 7-4boundary tags, 3-2, 3-5, 3-6, 9-3breakpoint, 2-17, 7-3buffer, 2-18, 3-1, 3-10, 5-10, 8-1, 8-3, 8-5, 8-7,9-2,9-4Builder, see <strong>iAPX</strong> <strong>286</strong> <strong>System</strong> BuilderBUSY/ pin, 12-2, 12-3busy task, 4-3, 4-4, 7-7CALL, 2-7, 2-9, 2-10, 4-2 thru 4-4, 4-13, 4-17,6-1,6-2,6-4,6-6,7-5 thru 7-7, 11-3carry flag (CF), 7-8CLI, 4-6, 4-7, 5-6, 6-2, 8-2CL TS, 12-2, 12-4CMPS, 7-7combine type, 11-4COMPACT, 11-4, 11-5compaction, 3-10 .compiler control statements, 11-4conforming segment, 2-5, 6-2, 6-7, 6-8critical section, 5-5 thru 5-7, 12-4CS register, 4-4,6-9,7-5 thru 7-7, 9-1,9-6, 9-7,10-1, 11-3, 11-9, 12-5current privilege level (CPL), 2-11, 2-16, 4-6,5-6,6-2,6-7,6-8,8-2, 10-1, 10-2, 13-3deadlock, 5-7, 5-10debugger, 2-17, 7-3,11-3,11-10deletionof segment, 2-20,5-2,5-3,8-3,9-5, 13-1of descriptor, 13-5DESCRP section, 11-11, 11-12descriptor, 2-2,2-12, 11-6, 11-9data segment, 2-2, 2-3, 2-6, 2-14, 2-15, 2~18,7-7,9-3 thru 9-5, 9-7dynamic creation, 3-1, 3-2executable segment, 2-2, 2-4, 2-6,2-7,2-14,2-15,2-17,6-7,7-7,9-7gate, 2-2, 2-7 thru 2-11, 2-15, 6-2,7-6,9-1,9-2, 10-2, 11-3, 11-9system segment, 2-2, 2-5descriptor privilege level (DPL), 2-3, 2-6, 2-9,2-11,2-15,2-20,2-21,4-3,5-7,6-7,6-8,8-2,8-5, 8-7descriptor table, 2-2, 2-12, 2-15see also global descriptor table, localdescriptor table, interrupt descriptor tableDESNAM section, 11-11device drivers, 5-17, 8-1, 8-2, 8-4, 8-7, 9-2, 9-4,11-2, 11-4DI register, 7-7DISABLE, 6·2, 6-4, 7-1dispatching, 4-9, 4-13, 5-7,9-5, 11-4divide error exception, 6-7, 7-3double fault, 7-5, 9-2, 9-4DPL, see descriptor privilege levelDS register, 2-17, 2-18, 2-21, 4-12, 7-5 thru 7-7,9-1, 9-6, 9-7, 10-1dynamic system, 1-7 thru 1-10,2-2,2-3,2-12,2-18 thru 2-20,2-22,3-1,4-4,5-7,6-5, 11-8effective privilege level, 2-16EM (emulation mode) flag, 7-4, 7-8, 12-1 thru12-3emulation, 7-8, 12-1, 12-4ENABLE,6-2ENTER,7-6ENTRY, 11-6EPROM,10-3ERROR/ pin, 7-8, 12-1 thru 12-3, 12-5error code, 7-1, 7-2, 7-5 thru 7-7, 7-9, 9-2, 9-3,12-5Index-1121960·001
- Page 2 and 3:
LITERATUREIn addition to the produc
- Page 4 and 5:
Intel Corporation makes no warranty
- Page 6 and 7:
PREFACEExternal LiteratureMany aspe
- Page 8:
Table of ContentsCHAPTER 1PageINTRO
- Page 11 and 12:
TABLE OF CONTENTSCHAPTER 9PageVIRTU
- Page 13 and 14:
TABLE OF CONTENTSLIST OF FIGURESFig
- Page 15:
Introduction to Protected 1Multitas
- Page 18 and 19:
INTRODUCTION TO PROTECTED MULTITASK
- Page 20 and 21:
inter INTRODUCTION TO PROTECTED MUL
- Page 22 and 23:
111'eI INTRODUCTION TO PROTECTED MU
- Page 24 and 25:
INTRODUCTION TO PROTECTED MULTITASK
- Page 26 and 27:
INTRODUCTION TO PROTECTED MULTITASK
- Page 29:
Using Hardware2Protection Features
- Page 32 and 33:
USING HARDWARE PROTECTION,FEATURESs
- Page 34 and 35:
interUSING HARDWARE PROTECTION FEAT
- Page 36 and 37:
USING HARDWARE PROTECTION FEATURES(
- Page 38 and 39:
USING HARDWARE PROTECTION FEATURES
- Page 40 and 41:
USING HARDWARE PROTECTION FEATUREST
- Page 42 and 43:
USING HARDWARE PROTECTION FEATURESo
- Page 44 and 45:
USING HARDWARE PROTECTION FEATURESL
- Page 46 and 47:
USING HARDWARE PROTECTION FEATUREST
- Page 48 and 49:
USING HARDWARE PROTECTION FEATURESE
- Page 50 and 51:
inl:el~USING HARDWARE PROTECTION FE
- Page 52 and 53:
IntelUSING HARDWARE PROTECTION FEAT
- Page 54 and 55:
IntelU~ING HARDWARE PROTECTION FEAT
- Page 56 and 57:
lSLDTFORMATRt;;SERV~~"O~iA~~.~ijij
- Page 59 and 60:
CHAPTER 3REAL MEMORY MANAGEMENTIn d
- Page 61 and 62:
REAL MEMORY MANAGEMENTIALLOCATEGATE
- Page 63 and 64:
interREAL MEMORY MANAGEMENTBEFOREAF
- Page 65 and 66:
REAL MEMORY MANAGEMENTGLOBAL DESCRI
- Page 67 and 68:
REAL MEMORY MANAGEMENTTable 3-1. Ac
- Page 69 and 70:
REAL MEMORY MANAGEMENTBEFOREI "FREE
- Page 71 and 72:
REAL MEMORY MANAGEMENTBEFOREI "FREE
- Page 73 and 74:
REAL MEMORY MANAGEMENTPL/M-286 COMP
- Page 75 and 76:
REAL MEMORY MANAGEMENTPL/M-286 COMP
- Page 77 and 78:
REAL MEMORY MANAGEMENTPL/M-286 COMP
- Page 79:
REAL MEMORY MANAGEMENTPL/M-286 COMP
- Page 82 and 83:
IIIIIIIIIIIIIIIIIIIIII
- Page 84 and 85:
II I telTASK MANAGEMENTCPUTASK REGI
- Page 86 and 87:
TASK MANAGEMENTIf the proc~sser, wh
- Page 88 and 89:
TASK MANAGEMENTUsually, termination
- Page 90 and 91:
TASK MANAGEMENTTASK XTSS TSS TSS TS
- Page 92 and 93:
TASK MANAGEMENTSCHEDULING POLICIEST
- Page 94 and 95:
TASK MANAGEMENTThe example in figur
- Page 96 and 97:
TASK MANAGEMENTREADY QUEUESBY PRIOR
- Page 98 and 99:
IIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIIII
- Page 101 and 102:
CHAPTER 5DATA SHARING, ALIASING, AN
- Page 103 and 104:
DATA SHARING, ALIASING, AND SYNCHRO
- Page 105 and 106:
interDATA SHARING, ALIASING, AND SV
- Page 107 and 108:
DATA SHARING, ALIASING, AND SYNCHRO
- Page 109 and 110:
DATA SHARING, ALIASING, AND SYNCHRO
- Page 111 and 112:
DATA SHARING, ALIASING, AND SYNCHRO
- Page 113 and 114:
DATA SHARING, ALIASING, AND SYNCHRO
- Page 115 and 116:
DATA SHARING, ALIASING, AND SYNCHRO
- Page 117:
DATA SHARING, ALIASING, AND SYNCHRO
- Page 121 and 122:
CHAPTER 6SIGNALS AND INTERRUPTSInte
- Page 123 and 124:
interSIGNALS AND INTERRUPTSlOTGOTTS
- Page 125 and 126:
SIGNALS AND INTERRUPTSTable 6-1. In
- Page 127 and 128:
SIGNALS AND INTERRUPTSSend interrup
- Page 129 and 130:
SIGNALS AND INTERRUPTSprocedure suc
- Page 131:
Handling Exception Conditions 7
- Page 134 and 135:
HANDLING EXCEPTION CONDITIONSError
- Page 136 and 137:
HANDLING EXCEPTION CONDITIONSAn exc
- Page 138 and 139:
HANDLING EXCEPTION CONDITIONSA few
- Page 140 and 141:
HANDLING EXCEPTION CONDITIONSAn ins
- Page 143 and 144:
CHAPTER 8INPUT /OUTPUTMany of the c
- Page 145 and 146:
INPUT /OUTPUTYou can still take adv
- Page 147 and 148:
INPUT /OUTPUT• Only the operating
- Page 149:
INPUT /OUTPUTtask the I/0 procedure
- Page 153 and 154:
CHAPTER 9VIRTUAL MEMORYThe memory l
- Page 155 and 156:
VIRTUAL MEMORYthose segments that a
- Page 157 and 158:
VIRTUAL MEMORY• Return the RAM sp
- Page 159 and 160:
VIRTUAL MEMORYReplacementThe operat
- Page 161 and 162:
System Initialization10
- Page 163 and 164:
CHAPTER 10SYSTEM INITIALIZATIONThe
- Page 165 and 166:
SYSTEM INITIALIZATIONStarting the f
- Page 167 and 168:
iAPX286 "ACRO ASSEMBLERLOCOBJEnter
- Page 169 and 170:
iAPX286 MACRO ASSEMBLEtEnter Protec
- Page 171 and 172:
iAPX286 MACRO ASSEMBLER·· Enter ~
- Page 173 and 174:
iAPX286 'UCRO USE148LER Ente,. P,.o
- Page 175 and 176:
iAPX286 MACRO ASSEMBLEREnt9~ P~otec
- Page 177:
iAPX286 MACRO ASSEMBLE~ INITIAL TAS
- Page 181 and 182:
CHAPTER 11BINDING AND LOADINGBindin
- Page 183 and 184:
BINDING AND LOADINGNamingThe names
- Page 185 and 186:
BINDING AND LOADING$ COMPACT (NUCLE
- Page 187 and 188: interBINDING AND LOADINGsystem-IDiA
- Page 189 and 190: BIND.ING AND LOADINGConverting a Pr
- Page 191 and 192: BINDING AND LOADINGThe OMF of each
- Page 193 and 194: interBINDING AND LOADINGsystem-IDiA
- Page 195 and 196: BINDING AND LOADINGPL/M-2B6 COMPILE
- Page 197 and 198: BINDING AND LOADI.NGPL/M-286 COMPIL
- Page 199 and 200: BINDING AND LOADINGPL/M-286 COMPILE
- Page 201 and 202: BINDING AND LOADINGPL/M-2B6 COMPILE
- Page 203 and 204: BINDING AND LOAD.INGPL/M-286 COMPIL
- Page 205 and 206: interBINDING AND LOADINGPL/M-286 CO
- Page 207 and 208: BINDING AND LOADINGPL/M-286 COMPILE
- Page 209: Numerics Processor Extension 12
- Page 212 and 213: NUMERICS PROCESSOR EXTENSIONMath Pr
- Page 214 and 215: interNUMERICS PROCESSOR EXTENSION
- Page 217: Extended Protection13
- Page 220 and 221: EXTENDED PROTECTIONIndirect NamingT
- Page 222 and 223: EXTENDED PROTECTIONanother procedur
- Page 225: Glossary
- Page 228 and 229: GLOSSARYbootloadable module: a modu
- Page 230 and 231: GLOSSARYexception: a processor-dete
- Page 232 and 233: GLOSSARYintersegment reference: a r
- Page 234 and 235: GLOSSARYoutward call: the attempt t
- Page 236 and 237: GLOSSARYscheduling state: one of se
- Page 240 and 241: INDEXES register, 2-17, 2-18, 2-21,
- Page 242 and 243: INDEXpresent bit, 2-2, 2-3, 2-9, 5-
- Page 245 and 246: interu.s. SALES OFFICESALAIWIA IlEQ
- Page 247 and 248: interu.s. DISTRIBUTORSNEW YORK (C"n
- Page 249 and 250: intJINTEL INTERNATIONAL SALES OFFIC