The following commit has been merged into the x86/sgx branch of tip:
Commit-ID: ed16618c380c32c68c06186d0ccbb0d5e0586e59
Gitweb:
https://git.kernel.org/tip/ed16618c380c32c68c06186d0ccbb0d5e0586e59
Author:Andrew Zaborowski
AuthorDate:Fri, 09 May 2025 01:04:29 +02:00
because
memory_failure() runs in process context and no spinlocks are held,
explicitly noted in a mm/memory-failure.c comment.
Signed-off-by: Andrew Zaborowski
---
Changes in v2:
- improve commit message following Dave Hansen's input: explain why
the SGX ops crash, replace page with epc
claimed seems reasonable on its own.
>
> On 2/11/25 07:01, Andrew Zaborowski wrote:
> > Pages used by an enclave only get page->poison set in
>
> Could we please call these "epc_page" instead of "page"?
Ok, makes sense.
>
> > arch_memory_failure()
cs. It'll be added to &node->sgx_poison_page_list later in
sgx_encl_release()->sgx_free_epc_page()
Tested with CONFIG_PROVE_LOCKING as suggested by Tony Luck.
Signed-off-by: Andrew Zaborowski
---
arch/x86/kernel/cpu/sgx/main.c | 2 ++
1 file changed, 2 insertions(+)
diff --git a/arch/x86/kern
On Fri, 15 Jan 2021 at 15:12, Arend Van Spriel
wrote:>
> + Johannes
> - netdevs
>
> On 1/14/2021 5:36 PM, 'Alvin Šipraga' via BRCM80211-DEV-LIST,PDL wrote:
> > Add support for CQM RSSI measurement reporting and advertise the
> > NL80211_EXT_FEATURE_CQM_RSSI_LIST feature. This enables a userspace
>
On Wed, 26 Aug 2020 at 14:10, Herbert Xu wrote:
> On Wed, Aug 26, 2020 at 01:59:53PM +0200, Ard Biesheuvel wrote:
> > On Wed, 26 Aug 2020 at 13:50, Herbert Xu
> > wrote:
> > >
> > > On Wed, Aug 26, 2020 at 12:40:14PM +0200, Ard Biesheuvel wrote:
> > > >
> > > > It would be helpful if someone cou
On Wed, 24 Apr 2019 at 18:14, David Howells wrote:
> Add a 'recurse' flag for keyring searches so that the flag can be omitted
> and recursion disabled, thereby allowing just the nominated keyring to be
> searched and none of the children.
>
> Signed-off-by: David Howells
> ---
>
> Documentation
Hi Stephan,
On 16 June 2016 at 17:38, Stephan Mueller wrote:
>> This isn't an issue with AF_ALG, I should have changed the subject
>> line perhaps. In this case it's an inconsistency between some
>> implementations and the documentation (header comment). It affects
>> users accessing the cipher
Hi Stephan,
On 16 June 2016 at 10:05, Stephan Mueller wrote:
> Am Dienstag, 14. Juni 2016, 09:42:34 schrieb Andrew Zaborowski:
>
> Hi Andrew,
>
>> >
>> > I think we have agreed on dropping the length enforcement at the interface
>> > level.
>>
>&
Hi Stephan,
On 14 June 2016 at 07:12, Stephan Mueller wrote:
> Am Dienstag, 14. Juni 2016, 00:16:11 schrieb Andrew Zaborowski:
>> On 8 June 2016 at 21:14, Mat Martineau
>>
>> wrote:
>> > On Wed, 8 Jun 2016, Stephan Mueller wrote:
>> >> What is your
Hi,
On 8 June 2016 at 21:14, Mat Martineau
wrote:
> On Wed, 8 Jun 2016, Stephan Mueller wrote:
>> What is your concern?
> Userspace must allocate larger buffers than it knows are necessary for
> expected results.
>
> It looks like the software rsa implementation handles shorter output buffers
> o
Hi David,
On 23 February 2016 at 11:55, David Howells wrote:
> Andrew Zaborowski wrote:
>
>> AIUI Tadeusz is proposing adding the hashing as a new feature. Note
>> though that the hash paremeter won't make sense for the encrypt,
>> decrypt or verify operatio
Hi,
On 22 February 2016 at 23:28, David Howells wrote:
> Tadeusz Struk wrote:
>
>> I wonder if this should be merged with the crypto/rsa-pkcs1pad.c template
>> that we already have. Looks like the two do the same padding now.
I think that'd be a good thing to do.
>> Should we merge then and pa
13 matches
Mail list logo