Skip to content

Commit 89f6602

Browse files
committed
Merge tag 'x86_urgent_for_v5.15_rc6' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
Pull x86 fixes from Borislav Petkov: - Do not enable AMD memory encryption in Kconfig by default due to shortcomings of some platforms, leading to boot failures. - Mask out invalid bits in the MXCSR for 32-bit kernels again because Thomas and I don't know how to mask out bits properly. Third time's the charm. * tag 'x86_urgent_for_v5.15_rc6' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip: x86/fpu: Mask out the invalid MXCSR bits properly x86/Kconfig: Do not enable AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT automatically
2 parents cf52ad5 + b2381ac commit 89f6602

File tree

2 files changed

+1
-2
lines changed

2 files changed

+1
-2
lines changed

arch/x86/Kconfig

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1525,7 +1525,6 @@ config AMD_MEM_ENCRYPT
15251525

15261526
config AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT
15271527
bool "Activate AMD Secure Memory Encryption (SME) by default"
1528-
default y
15291528
depends on AMD_MEM_ENCRYPT
15301529
help
15311530
Say yes to have system memory encrypted by default if running on

arch/x86/kernel/fpu/signal.c

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -385,7 +385,7 @@ static int __fpu_restore_sig(void __user *buf, void __user *buf_fx,
385385
return -EINVAL;
386386
} else {
387387
/* Mask invalid bits out for historical reasons (broken hardware). */
388-
fpu->state.fxsave.mxcsr &= ~mxcsr_feature_mask;
388+
fpu->state.fxsave.mxcsr &= mxcsr_feature_mask;
389389
}
390390

391391
/* Enforce XFEATURE_MASK_FPSSE when XSAVE is enabled */

0 commit comments

Comments
 (0)