lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <YdwO50sY81Qjr/H7@zn.tnic>
Date:   Mon, 10 Jan 2022 11:48:07 +0100
From:   Borislav Petkov <bp@...e.de>
To:     Linus Torvalds <torvalds@...ux-foundation.org>
Cc:     x86-ml <x86@...nel.org>, lkml <linux-kernel@...r.kernel.org>
Subject: [GIT PULL] x86/sgx for v5.17

Hi Linus,

please pull a relatively lively (in comparison to other tip branches)
x86/sgx development branch for 5.17.

Thx.

---

The following changes since commit ac5d272a0ad0419f52e08c91953356e32b075af7:

  x86/sgx: Fix free page accounting (2021-11-16 11:17:43 -0800)

are available in the Git repository at:

  git://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git tags/x86_sgx_for_v5.17_rc1

for you to fetch changes up to 2056e2989bf47ad7274ecc5e9dda2add53c112f9:

  x86/sgx: Fix NULL pointer dereference on non-SGX systems (2022-01-07 08:47:23 -0800)

----------------------------------------------------------------
- Add support for handling hw errors in SGX pages: poisoning, recovering
from poison memory and error injection into SGX pages

- A bunch of changes to the SGX selftests to simplify and allow of SGX
features testing without the need of a whole SGX software stack

- Add a sysfs attribute which is supposed to show the amount of SGX
memory in a NUMA node, similar to what /proc/meminfo is to normal
memory

- The usual bunch of fixes and cleanups too

----------------------------------------------------------------
Dave Hansen (1):
      x86/sgx: Fix NULL pointer dereference on non-SGX systems

Ingo Molnar (1):
      Merge branch 'x86/urgent' into x86/sgx, to resolve conflict

Jarkko Sakkinen (10):
      selftests/sgx: Assign source for each segment
      selftests/sgx: Make data measurement for an enclave segment optional
      selftests/sgx: Create a heap for the test enclave
      selftests/sgx: Dump segments and /proc/self/maps only on failure
      selftests/sgx: Encpsulate the test enclave creation
      selftests/sgx: Move setup_test_encl() to each TEST_F()
      selftests/sgx: Add a new kselftest: Unclobbered_vdso_oversubscribed
      selftests/sgx: Provide per-op parameter structs for the test enclave
      x86/sgx: Add an attribute for the amount of SGX memory in a NUMA node
      selftests/sgx: Fix corrupted cpuid macro invocation

Reinette Chatre (5):
      selftests/sgx: Rename test properties in preparation for more enclave tests
      selftests/sgx: Add page permission and exception test
      selftests/sgx: Enable multiple thread support
      selftests/sgx: Add test for multiple TCS entry
      x86/sgx: Fix minor documentation issues

Sean Christopherson (1):
      selftests/sgx: Fix a benign linker warning

Tony Luck (7):
      x86/sgx: Add new sgx_epc_page flag bit to mark free pages
      x86/sgx: Add infrastructure to identify SGX EPC pages
      x86/sgx: Initial poison handling for dirty and free pages
      x86/sgx: Add SGX infrastructure to recover from poison
      x86/sgx: Hook arch_memory_failure() into mainline code
      x86/sgx: Add hook to error injection address validation
      x86/sgx: Add check for SGX pages to ghes_do_memory_failure()

 Documentation/ABI/stable/sysfs-devices-node       |   6 +
 Documentation/firmware-guide/acpi/apei/einj.rst   |  19 ++
 Documentation/x86/sgx.rst                         |  14 +-
 arch/Kconfig                                      |   4 +
 arch/x86/Kconfig                                  |   2 +
 arch/x86/include/asm/processor.h                  |   8 +
 arch/x86/include/asm/set_memory.h                 |   4 +
 arch/x86/kernel/cpu/sgx/main.c                    | 162 +++++++++-
 arch/x86/kernel/cpu/sgx/sgx.h                     |   8 +-
 drivers/acpi/apei/einj.c                          |   3 +-
 drivers/acpi/apei/ghes.c                          |   2 +-
 drivers/base/node.c                               |   3 +
 include/linux/mm.h                                |  13 +
 include/linux/numa.h                              |   4 +
 mm/memory-failure.c                               |  19 +-
 tools/testing/selftests/sgx/Makefile              |   2 +-
 tools/testing/selftests/sgx/defines.h             |  33 +-
 tools/testing/selftests/sgx/load.c                |  40 ++-
 tools/testing/selftests/sgx/main.c                | 356 +++++++++++++++++++---
 tools/testing/selftests/sgx/main.h                |   6 +-
 tools/testing/selftests/sgx/sigstruct.c           |  12 +-
 tools/testing/selftests/sgx/test_encl.c           |  60 +++-
 tools/testing/selftests/sgx/test_encl_bootstrap.S |  21 +-
 23 files changed, 698 insertions(+), 103 deletions(-)

-- 
Regards/Gruss,
    Boris.

SUSE Software Solutions Germany GmbH, GF: Ivo Totev, HRB 36809, AG Nürnberg

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ