Received: by 2002:a05:6a10:d5a5:0:0:0:0 with SMTP id gn37csp67661pxb; Tue, 5 Oct 2021 23:31:54 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzWOYE/GPApXNE1YvtP/jfRnX0kaOIyc5XNDT2k3AtJuiwWcpx33VVJQRcAkA4y+fllC9Qq X-Received: by 2002:a50:e183:: with SMTP id k3mr33199299edl.22.1633501913696; Tue, 05 Oct 2021 23:31:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1633501913; cv=none; d=google.com; s=arc-20160816; b=DajQ//ugwxEor0/9YKQeJMD5636VDNXx97Wk53fakT57hANLMK0LP8sRYZCmRdZ8Wp FqhDbaAR1yY6hS5OgMnegoP/aoE+l9O8VvO9F+QTyg7RI1qBx5QJnbB0/5Nxsdy2AAIS BFZEkCRvgShOScIhbyIl3hgUdDoZo3ihIh8J9bPIPiETLIylPpuheYyqGRJ2DMHJQCP+ cUvYP1OJGY9urfVY4AoUc6eCyiJOkAPmie1NT8lBgVCuJ84A7+J+SWyjFiaoFVnz1vss fjC2HLzBPG8M2VwpNYT8wHjL6GT+U6uYrWSLgvQVq0L2uQLfufxp7nxAmj2nc+OFuUiz qb6A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=/DUSSQXYAV5QBHZ014rFfdkftzAKkrP6CcXVPWpwsjk=; b=yN6ezv8Fo2eNtH7k60vor+e0hCrunZGbw/Kv3+8yCXQkctVfAdwxRRrlvxwf+tQ0x9 0LtzUa+0PTO4TC9Rw67/enVjq+gahTNWPbXRmHK856u3629+/+CivaaU/93V1lCmP1gz 8n1s0v8zMsFIQf5iDEoK+vtW+wMVSbWZTYbrKZPESN/i+htrnVdoGXIou9brGpd3Arnb BNayZVuKEgFd7sxKwDL3Dwuq9R4fEQMbglzdLiVebdq6zSWwGKTn68Suo+H5w4DuGVim Qozy3gOpytrpGUIw6khhnmN2EHW66tjWMNm6tFYnwF/o7KEhCVLz8IPqLx+NgfqmNiY3 CLFg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id y102si24368619ede.370.2021.10.05.23.31.29; Tue, 05 Oct 2021 23:31:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233968AbhJFG3f (ORCPT + 99 others); Wed, 6 Oct 2021 02:29:35 -0400 Received: from mx3.molgen.mpg.de ([141.14.17.11]:37181 "EHLO mx1.molgen.mpg.de" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S229797AbhJFG3e (ORCPT ); Wed, 6 Oct 2021 02:29:34 -0400 Received: from [192.168.0.2] (ip5f5ae933.dynamic.kabel-deutschland.de [95.90.233.51]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) (Authenticated sender: pmenzel) by mx.molgen.mpg.de (Postfix) with ESMTPSA id D2B2B61E64784; Wed, 6 Oct 2021 08:27:39 +0200 (CEST) Subject: Re: `AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT=y` causes AMDGPU to fail on Ryzen: amdgpu: SME is not compatible with RAVEN To: Borislav Petkov Cc: Tom Lendacky , Thomas Gleixner , Ingo Molnar , x86@kernel.org, Dave Hansen , Andy Lutomirski , Peter Zijlstra , LKML , amd-gfx@lists.freedesktop.org References: <8bbacd0e-4580-3194-19d2-a0ecad7df09c@molgen.mpg.de> From: Paul Menzel Message-ID: <946736c0-d3bc-ed87-70bc-93c0c3cb998a@molgen.mpg.de> Date: Wed, 6 Oct 2021 08:27:39 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.14.0 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Dear Borislav, Thank you for your reply. Am 05.10.21 um 16:38 schrieb Borislav Petkov: > On Tue, Oct 05, 2021 at 04:29:41PM +0200, Paul Menzel wrote: >> Selecting the symbol `AMD_MEM_ENCRYPT` – as >> done in Debian 5.13.9-1~exp1 [1] – also selects >> `AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT`, as it defaults to yes, > > I'm assuming that "selecting" is done automatically: alldefconfig, > olddefconfig? > > Because CONFIG_AMD_MEM_ENCRYPT_ACTIVE_BY_DEFAULT only depends on > CONFIG_AMD_MEM_ENCRYPT and former can be disabled in oldconfig or > menuconfig etc. Sorry for being unclear. Distributions want to enable support for that feature, but as long as it breaks systems, it should be opt-in via the Linux kernel command line, and not opt-out. Also the Kconfig help texts do not mention anything about these problems, and the AMDGPU log message is of level info and not error. It’d be even better, if the message would contain the information, how to disable SME (`mem_encrypt=off`). Kind regards, Paul