1 <!DOCTYPE HTML PUBLIC
"-//IETF//DTD HTML 2.0//EN">
4 <TITLE>80386 Programmer's Reference Manual -- Section
6.1</TITLE>
7 <B>up:
</B> <A HREF=
"c06.htm">
8 Chapter
6 -- Protection
</A><BR>
9 <B>prev:
</B> <A HREF=
"c06.htm">Chapter
6 -- Protection
</A><BR>
10 <B>next:
</B> <A HREF=
"s06_02.htm">6.2 Overview of
80386 Protection Mechanisms
</A>
14 <H1>6.1 Why Protection?
</H1>
15 The purpose of the protection features of the
80386 is to help detect and
16 identify bugs. The
80386 supports sophisticated applications that may
17 consist of hundreds or thousands of program modules. In such applications,
18 the question is how bugs can be found and eliminated as quickly as possible
19 and how their damage can be tightly confined. To help debug applications
20 faster and make them more robust in production, the
80386 contains
21 mechanisms to verify memory accesses and instruction execution for
22 conformance to protection criteria. These mechanisms may be used or ignored,
23 according to system design objectives.
27 <B>up:
</B> <A HREF=
"c06.htm">
28 Chapter
6 -- Protection
</A><BR>
29 <B>prev:
</B> <A HREF=
"c06.htm">Chapter
6 -- Protection
</A><BR>
30 <B>next:
</B> <A HREF=
"s06_02.htm">6.2 Overview of
80386 Protection Mechanisms
</A>