# System Management Mode

> operating mode of x86 central processor units

**Wikidata**: [Q1197124](https://www.wikidata.org/wiki/Q1197124)  
**Wikipedia**: [English](https://en.wikipedia.org/wiki/System_Management_Mode)  
**Source**: https://4ort.xyz/entity/system-management-mode

## Summary
System Management Mode (SMM) is an operating mode of x86 central processor units, functioning at a protection level called Ring −2. It is designed for handling system-level management tasks like power control and hardware monitoring, operating with higher privileges than the kernel (Ring 0).

## Key Facts
- SMM operates at the Ring −2 protection level, making it the most privileged execution mode in x86 architecture.
- It is a subclass of the "ring" class, representing a layer of protection in computer systems.
- The mode has multiple aliases including SMM, Ring −2, and translations in Japanese (システム管理モード), Russian (Режим системного управления), Korean (시스템 관리 방식), and others.
- It is assigned identifiers in knowledge bases: Foldoc ID "System+Management+Mode", Freebase ID "/m/097r_9", and Microsoft Academic ID "200626474".
- SMM is documented across 11 Wikimedia projects and the parent "ring" class has 19 sitelinks.
- It is described as "operating mode of x86 central processor units" in Wikidata.

## FAQs
### Q: What is the primary purpose of System Management Mode?  
A: SMM handles critical system-level functions like power management, thermal control, and hardware-specific operations by executing code in a highly privileged, isolated environment.

### Q: How does System Management Mode relate to other protection rings?  
A: It operates at Ring −2, a protection level above Ring 0 (kernel mode), granting it exclusive access to hardware resources and system state that other modes cannot access.

### Q: Which architectures support System Management Mode?  
A: It is specifically designed for x86 central processor units, as noted in its Wikidata description and Microsoft Academic classification.

### Q: Why is System Management Mode isolated from other execution modes?  
A: Its high-privileged Ring −2 level ensures that management tasks like emergency shutdowns or firmware updates are protected from interference by operating systems or applications.

## Why It Matters
System Management Mode is fundamental to system reliability in x86 computing. It enables critical functions like power management and thermal protection that prevent hardware damage and ensure system stability. By operating at Ring −2—a more privileged level than the kernel—it provides a secure, isolated environment for hardware vendors and system firmware to implement essential low-level controls. This mode underpins modern PC reliability, allowing operations like emergency sleep states or fan adjustments to occur without OS mediation, safeguarding user data and hardware integrity during critical events.

## Notable For
- Exclusive Ring −2 privilege level: The only execution mode in x86 architecture more privileged than Ring 0 (kernel mode).  
- Multi-lingual documentation: Has official aliases in 9 languages (Japanese, Russian, Korean, Arabic, Catalan, Czech, German, Spanish, Ukrainian).  
- Embedded system role: Enables hardware-specific management tasks that bypass the OS, crucial for power efficiency and hardware safety.  
- Legacy integration: Maintained across generations of x86 processors despite being a pre-OS execution environment.

## Body
### Definition and Classification  
System Management Mode (SMM) is an operating mode for x86 central processor units, classified under the "ring" protection layer class. It operates at Ring −2, a level above Ring 0 (kernel mode), granting it the highest hardware privilege in standard x86 architecture.  

### Aliases and Identifiers  
- Official aliases include SMM, Ring −2, ring -2, and translations in Japanese (システム管理モード), Russian (Режим системного управления), Korean (시스템 관리 방식), and others.  
- Knowledge base identifiers: Foldoc ID "System+Management+Mode", Freebase ID "/m/097r_9", Microsoft Academic ID "200626474".  

### Operational Context  
- Execution environment: Code runs in an isolated memory region (SMRAM) inaccessible to the OS or other programs.  
- Primary functions: Power management (e.g., sleep states), thermal control, hardware monitoring, and emergency system recovery.  
- Trigger: Activated via System Management Interrupt (SMI), typically from firmware or hardware events.  

### Documentation and Reach  
- Present in 11 Wikimedia projects (Wikipedia, Wikidata, etc.), with the parent "ring" class documented in 19 sites.  
- Recognized in Wikidata as "operating mode of x86 central processor units" and in Microsoft Academic (discontinued).

## References

1. Freebase Data Dumps. 2013