* [PATCH] kernel: enable CONFIG_X86_INTEL_UMIP on x86_64
@ 2020-06-09 17:30 Peter Müller
2020-06-10 14:52 ` Arne Fitzenreiter
0 siblings, 1 reply; 2+ messages in thread
From: Peter Müller @ 2020-06-09 17:30 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 1459 bytes --]
Quoted from https://capsule8.com/blog/kernel-configuration-glossary/:
> Significance: High
>
> The User Mode Instruction Prevention (UMIP) is a security feature in newer
> Intel processors. If enabled a general protection fault is issued if the SGDT
> SLDT SIDT SMSW or STR instructions are executed in user mode. These
> instructions unnecessarily expose information about the hardware state.
Personally, I do not like Intel's "hardware security features" as they
often turned out as being difficult to handle, to implement and
completely useless or even contraproductive at the end of the day (SGX?
Why, did anyone mentioned SGX?!). Anyway, here we go...
Fixes: #12367
Cc: Arne Fitzenreiter <arne.fitzenreiter(a)ipfire.org>
Cc: Michael Tremer <michael.tremer(a)ipfire.org>
Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
---
config/kernel/kernel.config.x86_64-ipfire | 1 +
1 file changed, 1 insertion(+)
diff --git a/config/kernel/kernel.config.x86_64-ipfire b/config/kernel/kernel.config.x86_64-ipfire
index 6a5fbbfe9..f37b4b5d4 100644
--- a/config/kernel/kernel.config.x86_64-ipfire
+++ b/config/kernel/kernel.config.x86_64-ipfire
@@ -459,6 +459,7 @@ CONFIG_X86_EXTENDED_PLATFORM=y
# CONFIG_X86_GOLDFISH is not set
# CONFIG_X86_INTEL_MID is not set
CONFIG_X86_INTEL_LPSS=y
+CONFIG_X86_INTEL_UMIP=y
CONFIG_X86_AMD_PLATFORM_DEVICE=y
CONFIG_IOSF_MBI=y
# CONFIG_IOSF_MBI_DEBUG is not set
--
2.26.2
^ permalink raw reply [flat|nested] 2+ messages in thread
* Re: [PATCH] kernel: enable CONFIG_X86_INTEL_UMIP on x86_64
2020-06-09 17:30 [PATCH] kernel: enable CONFIG_X86_INTEL_UMIP on x86_64 Peter Müller
@ 2020-06-10 14:52 ` Arne Fitzenreiter
0 siblings, 0 replies; 2+ messages in thread
From: Arne Fitzenreiter @ 2020-06-10 14:52 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 1583 bytes --]
This option is added with kernel 4.15!!!
Arne
Am 2020-06-09 19:30, schrieb Peter Müller:
> Quoted from https://capsule8.com/blog/kernel-configuration-glossary/:
>
>> Significance: High
>>
>> The User Mode Instruction Prevention (UMIP) is a security feature in
>> newer
>> Intel processors. If enabled a general protection fault is issued if
>> the SGDT
>> SLDT SIDT SMSW or STR instructions are executed in user mode. These
>> instructions unnecessarily expose information about the hardware
>> state.
>
> Personally, I do not like Intel's "hardware security features" as they
> often turned out as being difficult to handle, to implement and
> completely useless or even contraproductive at the end of the day (SGX?
> Why, did anyone mentioned SGX?!). Anyway, here we go...
>
> Fixes: #12367
>
> Cc: Arne Fitzenreiter <arne.fitzenreiter(a)ipfire.org>
> Cc: Michael Tremer <michael.tremer(a)ipfire.org>
> Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
> ---
> config/kernel/kernel.config.x86_64-ipfire | 1 +
> 1 file changed, 1 insertion(+)
>
> diff --git a/config/kernel/kernel.config.x86_64-ipfire
> b/config/kernel/kernel.config.x86_64-ipfire
> index 6a5fbbfe9..f37b4b5d4 100644
> --- a/config/kernel/kernel.config.x86_64-ipfire
> +++ b/config/kernel/kernel.config.x86_64-ipfire
> @@ -459,6 +459,7 @@ CONFIG_X86_EXTENDED_PLATFORM=y
> # CONFIG_X86_GOLDFISH is not set
> # CONFIG_X86_INTEL_MID is not set
> CONFIG_X86_INTEL_LPSS=y
> +CONFIG_X86_INTEL_UMIP=y
> CONFIG_X86_AMD_PLATFORM_DEVICE=y
> CONFIG_IOSF_MBI=y
> # CONFIG_IOSF_MBI_DEBUG is not set
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2020-06-10 14:52 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-06-09 17:30 [PATCH] kernel: enable CONFIG_X86_INTEL_UMIP on x86_64 Peter Müller
2020-06-10 14:52 ` Arne Fitzenreiter
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox