lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20230611110551.GEZIWqj1EgUPmZbPne@fat_crate.local>
Date:   Sun, 11 Jun 2023 13:05:51 +0200
From:   Borislav Petkov <bp@...en8.de>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     x86-ml <x86@...nel.org>, lkml <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] x86/urgent for v6.4-rc6

Hi Linus,

please pull a single urgent x86 fix for 6.4.

Thx.

---

The following changes since commit edc0a2b5957652f4685ef3516f519f84807087db:

  x86/topology: Fix erroneous smp_num_siblings on Intel Hybrid platforms (2023-05-25 10:48:42 -0700)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git tags/x86_urgent_for_v6.4_rc6

for you to fetch changes up to a37f2699c36a7f6606ba3300f243227856c5ad6b:

  x86/head/64: Switch to KERNEL_CS as soon as new GDT is installed (2023-06-02 16:59:57 -0700)

----------------------------------------------------------------
- Set up the kernel CS earlier in the boot process in case EFI boots the
  kernel after bypassing the decompressor and the CS descriptor used
  ends up being the EFI one which is not mapped in the identity page
  table, leading to early SEV/SNP guest communication exceptions
  resulting in the guest crashing

----------------------------------------------------------------
Tom Lendacky (1):
      x86/head/64: Switch to KERNEL_CS as soon as new GDT is installed

 arch/x86/kernel/head_64.S | 18 +++++++++---------
 1 file changed, 9 insertions(+), 9 deletions(-)

-- 
Regards/Gruss,
    Boris.

https://people.kernel.org/tglx/notes-about-netiquette

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ