Quoted from https://capsule8.com/blog/kernel-configuration-glossary/: > Significance: High > > The User Mode Instruction Prevention (UMIP) is a security feature in newer > Intel processors. If enabled a general protection fault is issued if the SGDT > SLDT SIDT SMSW or STR instructions are executed in user mode. These > instructions unnecessarily expose information about the hardware state. Personally, I do not like Intel's "hardware security features" as they often turned out as being difficult to handle, to implement and completely useless or even contraproductive at the end of the day (SGX? Why, did anyone mentioned SGX?!). Anyway, here we go... Fixes: #12367 Cc: Arne Fitzenreiter Cc: Michael Tremer Signed-off-by: Peter Müller --- config/kernel/kernel.config.x86_64-ipfire | 1 + 1 file changed, 1 insertion(+) diff --git a/config/kernel/kernel.config.x86_64-ipfire b/config/kernel/kernel.config.x86_64-ipfire index 6a5fbbfe9..f37b4b5d4 100644 --- a/config/kernel/kernel.config.x86_64-ipfire +++ b/config/kernel/kernel.config.x86_64-ipfire @@ -459,6 +459,7 @@ CONFIG_X86_EXTENDED_PLATFORM=y # CONFIG_X86_GOLDFISH is not set # CONFIG_X86_INTEL_MID is not set CONFIG_X86_INTEL_LPSS=y +CONFIG_X86_INTEL_UMIP=y CONFIG_X86_AMD_PLATFORM_DEVICE=y CONFIG_IOSF_MBI=y # CONFIG_IOSF_MBI_DEBUG is not set -- 2.26.2