[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <cover.1501092102.git.thomas.lendacky@amd.com>
Date: Wed, 26 Jul 2017 13:04:32 -0500
From: Tom Lendacky <thomas.lendacky@....com>
To: x86@...nel.org, linux-kernel@...r.kernel.org
Cc: Ingo Molnar <mingo@...hat.com>, Borislav Petkov <bp@...en8.de>,
Andy Lutomirski <luto@...nel.org>,
"H. Peter Anvin" <hpa@...or.com>,
Thomas Gleixner <tglx@...utronix.de>,
Dave Young <dyoung@...hat.com>,
Brijesh Singh <brijesh.singh@....com>,
<kexec@...ts.infradead.org>
Subject: [PATCH v1 0/2] x86: Secure Memory Encryption (SME) fixes 2017-07-26
This patch series addresses some issues found during further testing of
Secure Memory Encryption (SME).
The following fixes are included in this update series:
- Fix a cache-related memory corruption when kexec is invoked in
successive instances
- Remove the encryption mask from the protection properties returned
by arch_apei_get_mem_attribute() when SME is active
---
This patch series is based off of the master branch of tip:
https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git master
Commit 8333bcad393c ("Merge branch 'x86/asm'")
Cc: <kexec@...ts.infradead.org>
Tom Lendacky (2):
x86/mm, kexec: Fix memory corruption with SME on successive kexecs
acpi, x86: Remove encryption mask from ACPI page protection type
arch/x86/include/asm/acpi.h | 7 ++++++-
arch/x86/kernel/relocate_kernel_64.S | 7 +++++++
2 files changed, 13 insertions(+), 1 deletion(-)
--
1.9.1
Powered by blists - more mailing lists