Quantcast
Channel: Linux | Kernel
Browsing all 165258 articles
Browse latest View live

[v2 PATCH] trace, kasan: silence Kasan warning in check_stack

When enabling stack trace via "echo 1 > /proc/sys/kernel/stack_tracer_enabled", the below KASAN warning is triggered: BUG: KASAN: stack-out-of-bounds

View Article



[PATCH 00/33] x86: Memory Protection Keys (v10)

Memory Protection Keys for User pages is a CPU feature which will first appear on Skylake Servers, but will also be supported on future non-server par

View Article

[PATCH 01/33] mm: introduce get_user_pages_remote()

From: Dave Hansen <dave.hansen@linux.intel.com> For protection keys, we need to understand whether protections should be enforced in software or not.

View Article

[PATCH 02/33] mm: overload get_user_pages() functions

From: Dave Hansen <dave.hansen@linux.intel.com> The concept here was a suggestion from Ingo. The implementation horrors are all mine. This allows g

View Article

[PATCH 03/33] mm, gup: switch callers of get_user_pages() to not pass tsk/mm

From: Dave Hansen <dave.hansen@linux.intel.com> We will soon modify the vanilla get_user_pages() so it can no longer be used on mm/tasks other than '

View Article


[PATCH 04/33] x86, fpu: add placeholder for Processor Trace XSAVE state

From: Dave Hansen <dave.hansen@linux.intel.com> There is an XSAVE state component for Intel Processor Trace (PT). But, we do not currently use it. W

View Article

[PATCH 05/33] x86, pkeys: Add Kconfig option

From: Dave Hansen <dave.hansen@linux.intel.com> I don't have a strong opinion on whether we need a Kconfig prompt or not. Protection Keys has relati

View Article

[PATCH 06/33] x86, pkeys: cpuid bit definition

From: Dave Hansen <dave.hansen@linux.intel.com> There are two CPUID bits for protection keys. One is for whether the CPU contains the feature, and t

View Article


[PATCH 07/33] x86, pkeys: define new CR4 bit

From: Dave Hansen <dave.hansen@linux.intel.com> There is a new bit in CR4 for enabling protection keys. We will actually enable it later in the seri

View Article


[PATCH 08/33] x86, pkeys: add PKRU xsave fields and data structure(s)

From: Dave Hansen <dave.hansen@linux.intel.com> The protection keys register (PKRU) is saved and restored using xsave. Define the data structure tha

View Article

[PATCH 09/33] x86, pkeys: PTE bits for storing protection key

From: Dave Hansen <dave.hansen@linux.intel.com> Previous documentation has referred to these 4 bits as "ignored". That means that software could have

View Article

[PATCH 10/33] x86, pkeys: new page fault error code bit: PF_PK

From: Dave Hansen <dave.hansen@linux.intel.com> Note: "PK" is how the Intel SDM refers to this bit, so we also use that nomenclature. This only defi

View Article

[PATCH 11/33] x86, pkeys: store protection in high VMA flags

From: Dave Hansen <dave.hansen@linux.intel.com> vma->vm_flags is an 'unsigned long', so has space for 32 flags on 32-bit architectures. The high 32

View Article


[PATCH 12/33] x86, pkeys: arch-specific protection bits

From: Dave Hansen <dave.hansen@linux.intel.com> Lots of things seem to do: vma->vm_page_prot = vm_get_page_prot(flags); and the ptes get cr

View Article

[PATCH 13/33] x86, pkeys: pass VMA down in to fault signal generation code

From: Dave Hansen <dave.hansen@linux.intel.com> During a page fault, we look up the VMA to ensure that the fault is in a region with a valid mapping.

View Article


[PATCH 14/33] signals, pkeys: notify userspace about protection key faults

From: Dave Hansen <dave.hansen@linux.intel.com> A protection key fault is very similar to any other access error. There must be a VMA, etc... We eve

View Article

[PATCH 15/33] x86, pkeys: fill in pkey field in siginfo

From: Dave Hansen <dave.hansen@linux.intel.com> This fills in the new siginfo field: si_pkey to indicate to userspace which protection key was set on

View Article


[PATCH 16/33] x86, pkeys: add functions to fetch PKRU

From: Dave Hansen <dave.hansen@linux.intel.com> This adds the raw instruction to access PKRU as well as some accessor functions that correctly handle

View Article

[PATCH 17/33] mm: factor out VMA fault permission checking

From: Dave Hansen <dave.hansen@linux.intel.com> This code matches a fault condition up with the VMA and ensures that the VMA allows the fault to be h

View Article

[PATCH 18/33] x86, mm: simplify get_user_pages() PTE bit handling

From: Dave Hansen <dave.hansen@linux.intel.com> The current get_user_pages() code is a wee bit more complicated than it needs to be for pte bit check

View Article
Browsing all 165258 articles
Browse latest View live




Latest Images