Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 04 Sep 2003 10:56:46 -0400
From:      cjarvis@vci.com
To:        Peter Pentchev <roam@ringlet.net>, Don Bowman <don@sandvine.com>, "'freebsd-hackers@freebsd.org'" <freebsd-hackers@freebsd.org>
Subject:   Re: non reliable nmi
Message-ID:  <T6478a49547c0a87ba83a4@vci-gateway.vci.com>
In-Reply-To: <20030904131244.GU556@straylight.oblivion.bg>

next in thread | previous in thread | raw e-mail | index | archive | help
In <20030904131244.GU556@straylight.oblivion.bg>, on 09/04/03 
   at 09:12 AM, Peter Pentchev <roam@ringlet.net> said:

>I haven't kept quite up to date on my x86 hardware lately (read: in the
>past five to ten years), but I distinctly remember a time when everyone
>referred to x86's NMI as a joke: a non-maskable interrupt that anyone
>could mask using a simple CLI instruction.  Not sure if this is still the
>case, others would have to say if today's processors still may get so
>wedged that a NMI request would simply be ignored.

CLI doesn't stop an NMI, but you can mask off NMI in the CMOS RAM.  On
standard PC-AT platforms anyway.

-- 
Clark




**********************************************************************
This email, and any files transmitted with it, are confidential
and intended solely for the use of the individual or entity to
whom they are addressed. If you have received this email
in error please advise itmail@vci.com.
**********************************************************************



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?T6478a49547c0a87ba83a4>