Intel® ISA Extensions
Use hardware-based isolation and memory encryption to provide more code protection in your solutions.
Announcements
Welcome to the Intel Community. If you get an answer you like, please mark it as an Accepted Solution to help others. Thank you!
For the latest information on Intel’s response to the Log4j/Log4Shell vulnerability, please see Intel-SA-00646

PKRU vs xstate

Beulich__Jan
Beginner
363 Views

I've noticed that none of the emulated CPUs have CPUID leaf D subleaf 0 EAX bit 9 set, or leaf D subleaf 9 populated, no matter that some have leaf 7 subleaf 0 ECX bit 4 set. Is this intentional or something that's planned to get addressed?

0 Kudos
1 Reply
Beulich__Jan
Beginner
362 Views

That's for SDE - I should have said so.

Reply