Documentation/core-api/protection-keys.rst | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)
According to https://www.phoronix.com/news/AMD-PRM-PCID-PKEY .
Tested on a 5900X via the program in pkeys(7) and
`grep ospke /proc/cpuinfo`.
---
Documentation/core-api/protection-keys.rst | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Documentation/core-api/protection-keys.rst b/Documentation/core-api/protection-keys.rst
index 7eb7c6023e09..59e7c178af4b 100644
--- a/Documentation/core-api/protection-keys.rst
+++ b/Documentation/core-api/protection-keys.rst
@@ -11,7 +11,7 @@ application changes protection domains.
Pkeys Userspace (PKU) is a feature which can be found on:
* Intel server CPUs, Skylake and later
* Intel client CPUs, Tiger Lake (11th Gen Core) and later
- * Future AMD CPUs
+ * AMD Zen 3 and later
* arm64 CPUs implementing the Permission Overlay Extension (FEAT_S1POE)
x86_64
--
2.51.0
On Wed, Nov 19, 2025 at 09:01:30AM -0500, Daniel Tang wrote:
> According to https://www.phoronix.com/news/AMD-PRM-PCID-PKEY .
Please don't quote some webpage but dig out the processor programming
references and find the OSPKE bit:
https://www.amd.com/en/search/documentation/hub.html#sortCriteria=%40amd_release_date%20descending&f-amd_document_type=Programmer%20References
Hint: document numbers 55898 for Zen3 and 56176 for Zen2 and you can compare
which one adds the bit, and then say which document that is.
No need to add the link to it - people can then find the document by
themselves because those vendor URLs are not stable either. :-\
> Tested on a 5900X via the program in pkeys(7) and
> `grep ospke /proc/cpuinfo`.
<-- You need to add your Signed-off-by: here.
You can check out:
https://www.kernel.org/doc/html/latest/process/submitting-patches.html
> ---
> Documentation/core-api/protection-keys.rst | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/Documentation/core-api/protection-keys.rst b/Documentation/core-api/protection-keys.rst
> index 7eb7c6023e09..59e7c178af4b 100644
> --- a/Documentation/core-api/protection-keys.rst
> +++ b/Documentation/core-api/protection-keys.rst
> @@ -11,7 +11,7 @@ application changes protection domains.
> Pkeys Userspace (PKU) is a feature which can be found on:
> * Intel server CPUs, Skylake and later
> * Intel client CPUs, Tiger Lake (11th Gen Core) and later
> - * Future AMD CPUs
> + * AMD Zen 3 and later
> * arm64 CPUs implementing the Permission Overlay Extension (FEAT_S1POE)
>
> x86_64
Thx.
--
Regards/Gruss,
Boris.
https://people.kernel.org/tglx/notes-about-netiquette
On Wednesday, 19 November 2025, 16:50:38 EST Borislav Petkov <bp@alien8.de> wrote: > 55898 for Zen3 Added mention. > 56176 for Zen2 I was unable to locate that document. AMD's website had redirects, and linkrot affected wikichip.org and github.com/amd/amd_energy. I'll just leave it out.
This is shown on page 78 of AMD document 55898 "Preliminary Processor
Programming Reference (PPR) for AMD Family 19h Model 01h, Revision B1
Processors Volume 1 of 2" for Zen 3.
I tested this on my 5900X via the program in pkeys(7) and
`grep ospke /proc/cpuinfo`.
Signed-off-by: Daniel Tang <danielzgtg.opensource@gmail.com>
---
Documentation/core-api/protection-keys.rst | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/Documentation/core-api/protection-keys.rst b/Documentation/core-api/protection-keys.rst
index 7eb7c6023e09..59e7c178af4b 100644
--- a/Documentation/core-api/protection-keys.rst
+++ b/Documentation/core-api/protection-keys.rst
@@ -11,7 +11,7 @@ application changes protection domains.
Pkeys Userspace (PKU) is a feature which can be found on:
* Intel server CPUs, Skylake and later
* Intel client CPUs, Tiger Lake (11th Gen Core) and later
- * Future AMD CPUs
+ * AMD Zen 3 and later
* arm64 CPUs implementing the Permission Overlay Extension (FEAT_S1POE)
x86_64
--
2.51.0
© 2016 - 2025 Red Hat, Inc.