Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp9182014imu; Tue, 4 Dec 2018 23:49:10 -0800 (PST) X-Google-Smtp-Source: AFSGD/X9kRacYXKBeGssdgPis01Zy73oVWD8ZJNBv08hoee1mjRMpggKyHT5Js+qfVqQtJ//6rvT X-Received: by 2002:a63:6302:: with SMTP id x2mr19346975pgb.183.1543996150877; Tue, 04 Dec 2018 23:49:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1543996150; cv=none; d=google.com; s=arc-20160816; b=Jl8GG+Oz3XpKe7Rq3lB9vnkhza91CHhdRCZnEQoV3H63a/ZpsdJM1d3/szS6E1cunK 50R115xlt6brdBG4JE2X+MLntTJsS+LSW5h9jh/REXKnDkx5eqBwQpACJ9iZI3f1GCd5 1YOylFXerz6zMm1/T0liUNh9mrGrqstHr+/ovytGE26wzyuAp0ZFVdlkfy0p/bsdGed8 mmFyzwLy9SFv361hGrIVCxEl+Z2zwrjNXaPcFfarC3Ac5GGIYrOK4VzYNMd9ffzKSJB6 zhCisTzaez2jLlrR3eNnTguRKzprJICGQmmsyqmUZAoHswxE1uemz3Xbp8X9nA74zn+Q Ld+w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=Fhy9ph+CxFVfAm3vlG1TXZt2GlYRWKsfJC58RUu3QPQ=; b=WXYTG6i1dFKutaTIbbhwNhLMYyeIsj5ALpvBMkVB88qje/tqEUP+Lka6bzm4FjfNel vBrB1CLyeo5bCHG7O9+qLxCK+sLD8ZU9Q97GpEZTsz/7iIgZf8df2hDYQKkkm28v01Vg K5sirgxXsdcoT4nwk7Marxnwt4TJsAUbJY/oCiccTIRdHy8En7Lm0ClAXwIhTg6MaY4x +7Ac308f7k5hD8coqMdqJtFtdqGOsQb+RYXNEkce9ujydvOIMaieROOhlcWUwr3nLQLC lYVgoZ6nTu5QLeWyQy89yrQ0mg2N9XgZh+1dD5xstqQllFU2XvJcSybDns9p+cljW1NS psAw== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=JbCeeHmz; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 61si19100823plc.364.2018.12.04.23.48.56; Tue, 04 Dec 2018 23:49:10 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=JbCeeHmz; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727158AbeLEHrO (ORCPT + 99 others); Wed, 5 Dec 2018 02:47:14 -0500 Received: from mail-wr1-f65.google.com ([209.85.221.65]:45290 "EHLO mail-wr1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726171AbeLEHrO (ORCPT ); Wed, 5 Dec 2018 02:47:14 -0500 Received: by mail-wr1-f65.google.com with SMTP id b14so4959640wru.12 for ; Tue, 04 Dec 2018 23:47:13 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=Fhy9ph+CxFVfAm3vlG1TXZt2GlYRWKsfJC58RUu3QPQ=; b=JbCeeHmz00vaa4JjcvYVYx48rtfjGDoUJLQXNnzYDS9lz41iNuwPsU+Am1AAMbFzXK +FapXgDNH9Zsjjsx3Dc992RYeZpw1LigBoeXd9bzViEtC2vCQ1qgzi/9O/kr4Y9Y2teX +Q+0zY++35n21iE+FgPnZhybcEJFzrEm1Z4iv3Iy/ILyW+QuE9LePv4IjVNOaoA6AICT +mfdFzyGz7mE8PCn1+yQVFfN2ZjlOxdZS+WYRy6tMowEeKK5lN1gCrQBSOLvCnfAIYtH MvNo7XsiLju9IEiMBc1x//oq1eLMDKRvWhsym5PjmDynQSmjx3JTKkWppb+kOb3Qgck9 nivQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :references:mime-version:content-disposition:in-reply-to:user-agent; bh=Fhy9ph+CxFVfAm3vlG1TXZt2GlYRWKsfJC58RUu3QPQ=; b=eeXtHAyig82T2YmFZprqR8pCXm3s9t7h4mtFkXWDWy5bAPn4Bmk/YWWRDb8pYEesZw XZdjb0r3lyqE1zQTrGMUs7EtYRrzR0dRKIzCb5elPD+WNrkbhc+G65I6Rec+fVBfAMbM SQdx/tP0XHnqlOskD6zlBb2TOl0lFJJn4DMK7TL+WZPT+S/S2RqoTNPYMMxPc20Prfx1 jawkY9tYnae6Gw0LBnv0CFo2pFPVx5hfzyyQw9mcWZOfUM6ofnDElsA5fYnsZtK3dhBW DsbGBAAiD0hC/B0ldVmPMcw/9LQSW3XA6H08ygLNvdYtwwKt6nL0e3RudPrcEl/a1+NL kgfQ== X-Gm-Message-State: AA+aEWZfgGpFOg9J0XJ4Rv/c521kMfTKtnnLSSzpxCGHB7JaElFrKTJP FUa45dBMj/RfudOkNP+O0bismqYA X-Received: by 2002:adf:90e5:: with SMTP id i92mr19602722wri.210.1543996032518; Tue, 04 Dec 2018 23:47:12 -0800 (PST) Received: from gmail.com (2E8B0CD5.catv.pool.telekom.hu. [46.139.12.213]) by smtp.gmail.com with ESMTPSA id 14sm24980861wmv.36.2018.12.04.23.47.11 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Tue, 04 Dec 2018 23:47:11 -0800 (PST) Date: Wed, 5 Dec 2018 08:47:09 +0100 From: Ingo Molnar To: "Lendacky, Thomas" Cc: "linux-kernel@vger.kernel.org" , Ricardo Neri , "x86@kernel.org" , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , Thomas Gleixner Subject: Re: [PATCH] x86/umip: Make the UMIP activated message generic Message-ID: <20181205074709.GA105592@gmail.com> References: <20181204222718.9375.11043.stgit@tlendack-t1.amdoffice.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20181204222718.9375.11043.stgit@tlendack-t1.amdoffice.net> User-Agent: Mutt/1.9.4 (2018-02-28) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org * Lendacky, Thomas wrote: > The User Mode Instruction Prevention (UMIP) feature is part of the x86_64 > instruction set architecture and not specific to Intel. Make the message > generic. > > Signed-off-by: Tom Lendacky > --- > > This patch is against the x86/cpu branch of the tip tree: > git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git x86/cpu > > arch/x86/kernel/cpu/common.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/arch/x86/kernel/cpu/common.c b/arch/x86/kernel/cpu/common.c > index 2c56b80..cb28e98 100644 > --- a/arch/x86/kernel/cpu/common.c > +++ b/arch/x86/kernel/cpu/common.c > @@ -353,7 +353,7 @@ static __always_inline void setup_umip(struct cpuinfo_x86 *c) > > cr4_set_bits(X86_CR4_UMIP); > > - pr_info_once("x86/cpu: Intel User Mode Instruction Prevention (UMIP) activated\n"); > + pr_info_once("x86/cpu: User Mode Instruction Prevention (UMIP) activated\n"); Is there any public information about which AMD CPUs are going to support it? The latest AMD CPU I can test on is a Ryzen Threadripper 1950X, and that doesn't have UMIP. Thanks, Ingo