MSI MS-9A08 User Manual

Page 55

Advertising
background image

4-7

MS-9A08

Hardware Prefetcher

The processor has a hardware prefetcher that automatically analyzes its re-

quirements and prefetches data and instructions from the memory into the Level

2 cache that are likely to be required in the near future. This reduces the la-

tency associated with memory reads. When enabled, the processor’s hardware

prefetcher will be enabled and allowed to automatically prefetch data and code

for the processor. When disabled, the processor’s hardware prefetcher will be

disabled.

Adjacent Cache Line Prefetch

The processor has a hardware adjacent cache line prefetch mechanism that

automatically fetches an extra 64-byte cache line whenever the processor re-

quests for a 64-byte cache line. This reduces cache latency by making the next

cache line immediately available if the processor requires it as well. When en-

abled, the processor will retrieve the currently requested cache line, as well as

the subsequent cache line. When disabled, the processor will only retrieve the

currently requested cache line.

Max CPUID Value Limit

The Max CPUID Value Limit BIOS feature allows you to circumvent problems

with older operating systems that do not support the Intel Pentium 4 processor

with Hyper-Threading Technology. When enabled, the processor will limit the

maximum CPUID input value to 03h when queried, even if the processor sup-

ports a higher CPUID input value. When disabled, the processor will return the

actual maximum CPUID input value of the processor when queried.

Intel(R) Virtualization Tech

Virtualization enhanced by Intel Virtualization Technology will allow a platform to

run multiple operating systems and applications in independent partitions. With

virtualization, one computer system can function as multiple irtual?systems.

TM2 Function

This setting enables/disables the TM2 (Thermal Monitor 2) function.

Execute Disable Bit Capability

Intel’s Execute Disable Bit functionality can prevent certain classes of malicious

“buffer overflow” attacks when combined with a supporting operating system.

This functionality allows the processor to classify areas in memory by where

application code can execute and where it cannot. When a malicious worm

attempts to insert code in the buffer, the processor disables code execution,

preventing damage or worm propagation.

Advertising