diff options
author | Linus Torvalds <torvalds@linux-foundation.org> | 2022-05-23 20:34:58 -0700 |
---|---|---|
committer | Linus Torvalds <torvalds@linux-foundation.org> | 2022-05-23 20:34:58 -0700 |
commit | cfe1cb014bf947c8a85e542ab0f7a417adca7059 (patch) | |
tree | c2d48ccbcc432f5f487b5cc5b3cf6538aef85c0d /tools/arch/x86/include/asm | |
parent | d6ecaa0024485effd065124fe774de2e22095f2d (diff) | |
parent | e3a3bbe3e99de73043a1d32d36cf4d211dc58c7e (diff) |
Merge tag 'x86_sgx_for_v5.19_rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip
Pull x86 SGX updates from Dave Hansen:
"A set of patches to prevent crashes in SGX enclaves under heavy memory
pressure:
SGX uses normal RAM allocated from special shmem files as backing
storage when it runs out of SGX memory (EPC). The code was overly
aggressive when freeing shmem pages and was inadvertently freeing
perfectly good data. This resulted in failures in the SGX instructions
used to swap data back into SGX memory.
This turned out to be really hard to trigger in mainline. It was
originally encountered testing the out-of-tree "SGX2" patches, but
later reproduced on mainline.
Fix the data loss by being more careful about truncating pages out of
the backing storage and more judiciously setting pages dirty"
* tag 'x86_sgx_for_v5.19_rc1' of git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip:
x86/sgx: Ensure no data in PCMD page after truncate
x86/sgx: Fix race between reclaimer and page fault handler
x86/sgx: Obtain backing storage page with enclave mutex held
x86/sgx: Mark PCMD page as dirty when modifying contents
x86/sgx: Disconnect backing page references from dirty status
Diffstat (limited to 'tools/arch/x86/include/asm')
0 files changed, 0 insertions, 0 deletions