summaryrefslogtreecommitdiff
path: root/tools/arch/x86/include/asm
diff options
context:
space:
mode:
authorLinus Torvalds <torvalds@linux-foundation.org>2022-05-23 20:34:58 -0700
committerLinus Torvalds <torvalds@linux-foundation.org>2022-05-23 20:34:58 -0700
commitcfe1cb014bf947c8a85e542ab0f7a417adca7059 (patch)
treec2d48ccbcc432f5f487b5cc5b3cf6538aef85c0d /tools/arch/x86/include/asm
parentd6ecaa0024485effd065124fe774de2e22095f2d (diff)
parente3a3bbe3e99de73043a1d32d36cf4d211dc58c7e (diff)
Merge tag 'x86_sgx_for_v5.19_rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
Pull x86 SGX updates from Dave Hansen: "A set of patches to prevent crashes in SGX enclaves under heavy memory pressure: SGX uses normal RAM allocated from special shmem files as backing storage when it runs out of SGX memory (EPC). The code was overly aggressive when freeing shmem pages and was inadvertently freeing perfectly good data. This resulted in failures in the SGX instructions used to swap data back into SGX memory. This turned out to be really hard to trigger in mainline. It was originally encountered testing the out-of-tree "SGX2" patches, but later reproduced on mainline. Fix the data loss by being more careful about truncating pages out of the backing storage and more judiciously setting pages dirty" * tag 'x86_sgx_for_v5.19_rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip: x86/sgx: Ensure no data in PCMD page after truncate x86/sgx: Fix race between reclaimer and page fault handler x86/sgx: Obtain backing storage page with enclave mutex held x86/sgx: Mark PCMD page as dirty when modifying contents x86/sgx: Disconnect backing page references from dirty status
Diffstat (limited to 'tools/arch/x86/include/asm')
0 files changed, 0 insertions, 0 deletions