This patch series addresses some issues found during further testing of Secure Memory Encryption (SME). The following fixes are included in this update series: - Fix a cache-related memory corruption when kexec is invoked in successive instances - Remove the encryption mask from the protection properties returned by arch_apei_get_mem_attribute() when SME is active --- This patch series is based off of the master branch of tip: https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git master Commit 8333bcad393c ("Merge branch 'x86/asm'") Cc: <kexec at lists.infradead.org> Changes since v1: - Patch #1: - Only issue wbinvd if SME is active - Patch #2: - Create a no encryption version of the PAGE_KERNEL protection type and use that in arch_apei_get_mem_attribute() - General comment and patch description clean up Tom Lendacky (2): x86/mm, kexec: Fix memory corruption with SME on successive kexecs acpi, x86: Remove encryption mask from ACPI page protection type arch/x86/include/asm/acpi.h | 11 ++++++----- arch/x86/include/asm/kexec.h | 3 ++- arch/x86/include/asm/pgtable_types.h | 1 + arch/x86/kernel/machine_kexec_64.c | 3 ++- arch/x86/kernel/relocate_kernel_64.S | 14 ++++++++++++++ 5 files changed, 25 insertions(+), 7 deletions(-) -- 1.9.1