[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <2728119.mhk5qWAgFL@daniel-desktop3>
Date: Wed, 19 Nov 2025 19:47:20 -0500
From: Daniel Tang <danielzgtg.opensource@...il.com>
To: Borislav Petkov <bp@...en8.de>
Cc: linux-doc@...r.kernel.org, x86@...nel.org, linux-kernel@...r.kernel.org,
Ira Weiny <ira.weiny@...el.com>, Dave Hansen <dave.hansen@...ux.intel.com>,
Babu Moger <babu.moger@....com>
Subject: [PATCH v2] Documentation/protection-keys: Mark as available on AMD
This is shown on page 78 of AMD document 55898 "Preliminary Processor
Programming Reference (PPR) for AMD Family 19h Model 01h, Revision B1
Processors Volume 1 of 2" for Zen 3.
I tested this on my 5900X via the program in pkeys(7) and
`grep ospke /proc/cpuinfo`.
Signed-off-by: Daniel Tang <danielzgtg.opensource@...il.com>
---
Documentation/core-api/protection-keys.rst | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Documentation/core-api/protection-keys.rst b/Documentation/core-api/protection-keys.rst
index 7eb7c6023e09..59e7c178af4b 100644
--- a/Documentation/core-api/protection-keys.rst
+++ b/Documentation/core-api/protection-keys.rst
@@ -11,7 +11,7 @@ application changes protection domains.
Pkeys Userspace (PKU) is a feature which can be found on:
* Intel server CPUs, Skylake and later
* Intel client CPUs, Tiger Lake (11th Gen Core) and later
- * Future AMD CPUs
+ * AMD Zen 3 and later
* arm64 CPUs implementing the Permission Overlay Extension (FEAT_S1POE)
x86_64
--
2.51.0
Powered by blists - more mailing lists