Browse Prior Art Database

Tool for Conversion of Assembly Language Programs From Real to Protected Mode on the Intel 80286 (Iapx 286/10) Microprocessor

IP.com Disclosure Number: IPCOM000040097D
Original Publication Date: 1987-Sep-01
Included in the Prior Art Database: 2005-Feb-01
Document File: 1 page(s) / 12K

Publishing Venue

IBM

Related People

Bartek, BA: AUTHOR [+2]

Abstract

A tool is described for assisting in the conversion of assembly language programs from real to protected mode on the Intel 80286. New operating systems for the 80286 will be using the protect mode rather then the real mode used today. An automated way to aid programmers in their conversion efforts of existing applications is necessary. The Intel 80286 microprocessor uses two operating modes: a real mode where all the memory and I/O operations are available to any program and a protect mode where the memory and I/O operations are only allocated by the operating system. By allowing the operating system to completely manage memory, programs are protected from impacting each other. Many large applications exist today in real mode. They require conversion to allow them to function in protect mode.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 74% of the total text.

Page 1 of 1

Tool for Conversion of Assembly Language Programs From Real to Protected Mode on the Intel 80286 (Iapx 286/10) Microprocessor

A tool is described for assisting in the conversion of assembly language programs from real to protected mode on the Intel 80286. New operating systems for the 80286 will be using the protect mode rather then the real mode used today. An automated way to aid programmers in their conversion efforts of existing applications is necessary. The Intel 80286 microprocessor uses two operating modes: a real mode where all the memory and I/O operations are available to any program and a protect mode where the memory and I/O operations are only allocated by the operating system. By allowing the operating system to completely manage memory, programs are protected from impacting each other. Many large applications exist today in real mode. They require conversion to allow them to function in protect mode. To allow programmers to identify lines of source code that might violate the conventions of protect mode, a software tool was written which performed the following important functions. First, it evaluated all real-mode instructions as violators, potential violators or nonviolators of protect-mode instructions. Then, it generated a listing file with the lines of each instruction marked as to type. Options are provided for selecting which types of instructions to mark. One could mark all the violator instructions and all the potential violators or selec...