[tip: x86/sgx] x86/sgx: Prevent attempts to reclaim poisoned pages

2025-05-15 Thread tip-bot2 for Andrew Zaborowski
The following commit has been merged into the x86/sgx branch of tip: Commit-ID: ed16618c380c32c68c06186d0ccbb0d5e0586e59 Gitweb: https://git.kernel.org/tip/ed16618c380c32c68c06186d0ccbb0d5e0586e59 Author:Andrew Zaborowski AuthorDate:Fri, 09 May 2025 01:04:29 +02:00

[PATCH v2] x86/sgx: Prevent attempts to reclaim poisoned pages

2025-05-08 Thread Andrew Zaborowski
because memory_failure() runs in process context and no spinlocks are held, explicitly noted in a mm/memory-failure.c comment. Signed-off-by: Andrew Zaborowski --- Changes in v2: - improve commit message following Dave Hansen's input: explain why the SGX ops crash, replace page with epc

Re: [PATCH] x86: sgx: Don't track poisoned pages for reclaiming

2025-02-11 Thread Andrew Zaborowski
claimed seems reasonable on its own. > > On 2/11/25 07:01, Andrew Zaborowski wrote: > > Pages used by an enclave only get page->poison set in > > Could we please call these "epc_page" instead of "page"? Ok, makes sense. > > > arch_memory_failure()

[PATCH] x86: sgx: Don't track poisoned pages for reclaiming

2025-02-11 Thread Andrew Zaborowski
cs. It'll be added to &node->sgx_poison_page_list later in sgx_encl_release()->sgx_free_epc_page() Tested with CONFIG_PROVE_LOCKING as suggested by Tony Luck. Signed-off-by: Andrew Zaborowski --- arch/x86/kernel/cpu/sgx/main.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/arch/x86/kern

Re: [PATCH v2] brcmfmac: add support for CQM RSSI notifications

2021-01-15 Thread Andrew Zaborowski
On Fri, 15 Jan 2021 at 15:12, Arend Van Spriel wrote:> > + Johannes > - netdevs > > On 1/14/2021 5:36 PM, 'Alvin Šipraga' via BRCM80211-DEV-LIST,PDL wrote: > > Add support for CQM RSSI measurement reporting and advertise the > > NL80211_EXT_FEATURE_CQM_RSSI_LIST feature. This enables a userspace >

Re: Issue with iwd + Linux 5.8.3 + WPA Enterprise

2020-08-26 Thread Andrew Zaborowski
On Wed, 26 Aug 2020 at 14:10, Herbert Xu wrote: > On Wed, Aug 26, 2020 at 01:59:53PM +0200, Ard Biesheuvel wrote: > > On Wed, 26 Aug 2020 at 13:50, Herbert Xu > > wrote: > > > > > > On Wed, Aug 26, 2020 at 12:40:14PM +0200, Ard Biesheuvel wrote: > > > > > > > > It would be helpful if someone cou

Re: [PATCH 05/11] keys: Add a 'recurse' flag for keyring searches

2019-04-24 Thread Andrew Zaborowski
On Wed, 24 Apr 2019 at 18:14, David Howells wrote: > Add a 'recurse' flag for keyring searches so that the flag can be omitted > and recursion disabled, thereby allowing just the nominated keyring to be > searched and none of the children. > > Signed-off-by: David Howells > --- > > Documentation

Re: [PATCH v6 3/6] crypto: AF_ALG -- add asymmetric cipher interface

2016-06-16 Thread Andrew Zaborowski
Hi Stephan, On 16 June 2016 at 17:38, Stephan Mueller wrote: >> This isn't an issue with AF_ALG, I should have changed the subject >> line perhaps. In this case it's an inconsistency between some >> implementations and the documentation (header comment). It affects >> users accessing the cipher

Re: [PATCH v6 3/6] crypto: AF_ALG -- add asymmetric cipher interface

2016-06-16 Thread Andrew Zaborowski
Hi Stephan, On 16 June 2016 at 10:05, Stephan Mueller wrote: > Am Dienstag, 14. Juni 2016, 09:42:34 schrieb Andrew Zaborowski: > > Hi Andrew, > >> > >> > I think we have agreed on dropping the length enforcement at the interface >> > level. >> >&

Re: [PATCH v6 3/6] crypto: AF_ALG -- add asymmetric cipher interface

2016-06-14 Thread Andrew Zaborowski
Hi Stephan, On 14 June 2016 at 07:12, Stephan Mueller wrote: > Am Dienstag, 14. Juni 2016, 00:16:11 schrieb Andrew Zaborowski: >> On 8 June 2016 at 21:14, Mat Martineau >> >> wrote: >> > On Wed, 8 Jun 2016, Stephan Mueller wrote: >> >> What is your

Re: [PATCH v6 3/6] crypto: AF_ALG -- add asymmetric cipher interface

2016-06-13 Thread Andrew Zaborowski
Hi, On 8 June 2016 at 21:14, Mat Martineau wrote: > On Wed, 8 Jun 2016, Stephan Mueller wrote: >> What is your concern? > Userspace must allocate larger buffers than it knows are necessary for > expected results. > > It looks like the software rsa implementation handles shorter output buffers > o

Re: [PATCH 4/8] akcipher: Move the RSA DER encoding to the crypto layer

2016-02-23 Thread Andrew Zaborowski
Hi David, On 23 February 2016 at 11:55, David Howells wrote: > Andrew Zaborowski wrote: > >> AIUI Tadeusz is proposing adding the hashing as a new feature. Note >> though that the hash paremeter won't make sense for the encrypt, >> decrypt or verify operatio

Re: [PATCH 4/8] akcipher: Move the RSA DER encoding to the crypto layer

2016-02-22 Thread Andrew Zaborowski
Hi, On 22 February 2016 at 23:28, David Howells wrote: > Tadeusz Struk wrote: > >> I wonder if this should be merged with the crypto/rsa-pkcs1pad.c template >> that we already have. Looks like the two do the same padding now. I think that'd be a good thing to do. >> Should we merge then and pa