Re: [PATCH v1 1/2] x86/mm, kexec: Fix memory corruption with SME on successive kexecs

2017-07-27 Thread Tom Lendacky
On 7/27/2017 12:34 PM, Linus Torvalds wrote: On Thu, Jul 27, 2017 at 7:15 AM, Tom Lendacky wrote: I can #ifdef the wbinvd based on whether AMD_MEM_ENCRYPT is configured or not so that the wbinvd is avoided if not configured. I suspect an ifdef will be useless, since things like distro kernel

Re: [PATCH v1 1/2] x86/mm, kexec: Fix memory corruption with SME on successive kexecs

2017-07-27 Thread Linus Torvalds
On Thu, Jul 27, 2017 at 7:15 AM, Tom Lendacky wrote: > > I can #ifdef the wbinvd based on whether AMD_MEM_ENCRYPT is configured > or not so that the wbinvd is avoided if not configured. I suspect an ifdef will be useless, since things like distro kernels tend to enable everything. So it should p

Re: [PATCH v1 1/2] x86/mm, kexec: Fix memory corruption with SME on successive kexecs

2017-07-27 Thread Tom Lendacky
On 7/27/2017 2:17 AM, Ingo Molnar wrote: * Tom Lendacky wrote: After issuing successive kexecs it was found that the SHA hash failed verification when booting the kexec'd kernel. When SME is enabled, the change from using pages that were marked encrypted to now being marked as not encrypted

Re: [PATCH v1 1/2] x86/mm, kexec: Fix memory corruption with SME on successive kexecs

2017-07-27 Thread Ingo Molnar
* Tom Lendacky wrote: > After issuing successive kexecs it was found that the SHA hash failed > verification when booting the kexec'd kernel. When SME is enabled, the > change from using pages that were marked encrypted to now being marked as > not encrypted (through new identify mapped page ta