From mboxrd@z Thu Jan 1 00:00:00 1970 Return-path: Received: from mail-sn1nam01on0076.outbound.protection.outlook.com ([104.47.32.76] helo=NAM01-SN1-obe.outbound.protection.outlook.com) by bombadil.infradead.org with esmtps (Exim 4.87 #1 (Red Hat Linux)) id 1daQgI-0001yP-AA for kexec@lists.infradead.org; Wed, 26 Jul 2017 18:05:12 +0000 From: Tom Lendacky Subject: [PATCH v1 0/2] x86: Secure Memory Encryption (SME) fixes 2017-07-26 Date: Wed, 26 Jul 2017 13:04:32 -0500 Message-Id: MIME-Version: 1.0 List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "kexec" Errors-To: kexec-bounces+dwmw2=infradead.org@lists.infradead.org To: x86@kernel.org, linux-kernel@vger.kernel.org Cc: Brijesh Singh , kexec@lists.infradead.org, Ingo Molnar , Borislav Petkov , Andy Lutomirski , "H. Peter Anvin" , Thomas Gleixner , Dave Young This patch series addresses some issues found during further testing of Secure Memory Encryption (SME). The following fixes are included in this update series: - Fix a cache-related memory corruption when kexec is invoked in successive instances - Remove the encryption mask from the protection properties returned by arch_apei_get_mem_attribute() when SME is active --- This patch series is based off of the master branch of tip: https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git master Commit 8333bcad393c ("Merge branch 'x86/asm'") Cc: Tom Lendacky (2): x86/mm, kexec: Fix memory corruption with SME on successive kexecs acpi, x86: Remove encryption mask from ACPI page protection type arch/x86/include/asm/acpi.h | 7 ++++++- arch/x86/kernel/relocate_kernel_64.S | 7 +++++++ 2 files changed, 13 insertions(+), 1 deletion(-) -- 1.9.1 _______________________________________________ kexec mailing list kexec@lists.infradead.org http://lists.infradead.org/mailman/listinfo/kexec