Intel 253668-032US User Manual

Page of 806
3-6   Vol. 3
PROTECTED-MODE MEMORY MANAGEMENT
Access checks can be used to protect not only against referencing an address outside 
the limit of a segment, but also against performing disallowed operations in certain 
segments. For example, since code segments are designated as read-only segments, 
hardware can be used to prevent writes into code segments. The access rights infor-
mation created for segments can also be used to set up protection rings or levels. 
Protection levels can be used to protect operating-system procedures from unautho-
rized access by application programs.
3.2.4 
Segmentation in IA-32e Mode
In IA-32e mode of Intel 64 architecture, the effects of segmentation depend on 
whether the processor is running in compatibility mode or 64-bit mode. In compati-
bility mode, segmentation functions just as it does using legacy 16-bit or 32-bit 
protected mode semantics.
Figure 3-4.  Multi-Segment Model
Linear Address Space
(or Physical Memory)
Segment
Registers
CS
Segment
Descriptors
Limit
Access
Base Address
SS
Limit
Access
Base Address
DS
Limit
Access
Base Address
ES
Limit
Access
Base Address
FS
Limit
Access
Base Address
GS
Limit
Access
Base Address
Limit
Access
Base Address
Limit
Access
Base Address
Limit
Access
Base Address
Limit
Access
Base Address
Stack
Code
Data
Data
Data
Data