Privilege Level
In all three cases, only privileged applications (usually the OS kernel) may modify IF. Note that this only applies to protected mode code (real mode code may always modify IF).
CLI and STI are privileged instructions, which trigger a general protection fault if an unprivileged application attempts to execute it, while POPF will simply not modify the IF flag if the application is unprivileged.
The privilege level required to execute a CLI or STI instruction, or set IF using POPF, is not determined by the IOPL (I/O Privilege Level) in EFLAGS. If the IOPL is set to 2 for example, any program running only in ring 0 can execute a CLI. Most modern operating systems set the IOPL to be 0 so only the kernel can execute CLI/STI. The reason for this is that since clearing IF will force the processor to ignore ALL interrupts, the kernel may never get control back if it is not set to 1 again.
Read more about this topic: Interrupt Flag
Famous quotes containing the words privilege and/or level:
“Postmodernism refuses to privilege any one perspective, and recognizes only difference, never inequality, only fragments, never conflict.”
—Elizabeth Wilson (b. 1936)
“There are old heads in the world who cannot help me by their example or advice to live worthily and satisfactorily to myself; but I believe that it is in my power to elevate myself this very hour above the common level of my life.”
—Henry David Thoreau (18171862)