Linux SGX
[Prev Page][Next Page]
- Re: [PATCH v2 1/5] selftests/sgx: Retry the ioctl()'s returned with EAGAIN
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 5/5] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/5] selftests/sgx: Retry the ioctl()'s returned with EAGAIN
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/5] selftests/sgx: Retry the ioctl()'s returned with EAGAIN
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 4/5] selftests/sgx: Include the dynamic heap size to the ELRANGE calculation
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH v2 5/5] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH v2 3/5] selftests/sgx: Use encl->encl_size in sigstruct.c
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH v2 2/5] selftests/sgx: Move ENCL_HEAP_SIZE_DEFAULT to main.c
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH v2 1/5] selftests/sgx: Retry the ioctl()'s returned with EAGAIN
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH v2 5/5] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/2] x86/sgx: Do not fail on incomplete sanitization on premature stop of ksgxd
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/2] x86/sgx: Do not fail on incomplete sanitization on premature stop of ksgxd
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V5 15/31] x86/sgx: Support restricting of enclave page permissions
- From: zhubojun <bojun.zhu@xxxxxxxxxxx>
- Re: [PATCH V5 15/31] x86/sgx: Support restricting of enclave page permissions
- From: zhubojun <bojun.zhu@xxxxxxxxxxx>
- Re: [PATCH v3 1/2] x86/sgx: Do not fail on incomplete sanitization on premature stop of ksgxd
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH RFC] x86/sgx: Use a heap allocated list head for unsanitized pages
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC] x86/sgx: Use a heap allocated list head for unsanitized pages
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH RFC] x86/sgx: Use a heap allocated list head for unsanitized pages
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3 2/2] x86/sgx: Handle VA page allocation failure for EAUG on PF.
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3 1/2] x86/sgx: Do not fail on incomplete sanitization on premature stop of ksgxd
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3 0/2] Critical fixes for v6.0
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 1/2] x86/sgx: Do not fail on incomplete sanitization on premature stop of ksgxd
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 2/2] x86/sgx: Handle VA page allocation failure for EAUG on PF.
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 0/2] x86/sgx: Critical fixes for v6.0
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] x86/sgx: Do not fail on incomplete sanitization on premature stop of ksgxd
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 1/2] x86/sgx: Do not fail on incomplete sanitization on premature stop of ksgxd
- From: "jarkko@xxxxxxxxxx" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] x86/sgx: Do not fail on incomplete sanitization on premature stop of ksgxd
- From: "jarkko@xxxxxxxxxx" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] x86/sgx: Do not fail on incomplete sanitization on premature stop of ksgxd
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH v2 4/5] selftests/sgx: Include the dynamic heap size to the ELRANGE calculation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 2/5] selftests/sgx: Move ENCL_HEAP_SIZE_DEFAULT to main.c
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 0/5] Test a large dynamic heap
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 1/5] selftests/sgx: Retry the ioctl()'s returned with EAGAIN
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 5/5] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 3/5] selftests/sgx: Use encl->encl_size in sigstruct.c
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 3/5] selftests/sgx: Use encl->encl_size in sigstruct.c
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 5/5] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 4/5] selftests/sgx: Include the dynamic heap size to the ELRANGE calculation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 2/5] selftests/sgx: Move ENCL_HEAP_SIZE_DEFAULT to main.c
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 1/5] selftests/sgx: Retry the ioctl()'s returned with EAGAIN
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 0/5] selftests/sgx: Test a large dynamic heap
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 4/6] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 4/6] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] x86/sgx: Do not fail on incomplete sanitization on premature stop of ksgxd
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 2/2] x86/sgx: Handle VA page allocation failure for EAUG on PF.
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 1/2] x86/sgx: Do not fail on incomplete sanitization on premature stop of ksgxd
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 0/2] x86/sgx: Fixes for v6.0
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/6] x86/sgx: Do not consider unsanitized pages an error
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/6] x86/sgx: Do not consider unsanitized pages an error
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH v2 2/6] x86/sgx: Do not consider unsanitized pages an error
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/6] x86/sgx: Do not consider unsanitized pages an error
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH v2 2/6] x86/sgx: Do not consider unsanitized pages an error
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V5 15/31] x86/sgx: Support restricting of enclave page permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH v2 2/6] x86/sgx: Do not consider unsanitized pages an error
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [PATCH 1/6] x86/sgx: Do not consider unsanitized pages an error
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 4/6] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 4/6] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 4/6] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/6] x86/sgx: Do not consider unsanitized pages an error
- From: "jarkko@xxxxxxxxxx" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/6] x86/sgx: Do not consider unsanitized pages an error
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 6/6] selftests/sgx: Add a bpftrace script for tracking allocation errors
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 4/6] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH 4/6] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH 1/6] x86/sgx: Do not consider unsanitized pages an error
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 6/6] selftests/sgx: Add a bpftrace script for tracking allocation errors
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 2/6] x86/sgx: Do not consider unsanitized pages an error
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH v7 0/3] x86/sgx: fine grained SGX MCA behavior
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 4/6] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/6] x86/sgx: Do not consider unsanitized pages an error
- From: "jarkko@xxxxxxxxxx" <jarkko@xxxxxxxxxx>
- Re: [PATCH 6/6] selftests/sgx: Add a bpftrace script for tracking allocation errors
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 6/6] selftests/sgx: Add a bpftrace script for tracking allocation errors
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 5/6] selftests/sgx: retry the ioctls returned with EAGAIN
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 5/6] selftests/sgx: retry the ioctls returned with EAGAIN
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 4/6] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/6] x86/sgx: Do not consider unsanitized pages an error
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/6] x86/sgx: Do not consider unsanitized pages an error
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/6] x86/sgx: Do not consider unsanitized pages an error
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/6] x86/sgx: Do not consider unsanitized pages an error
- From: "jarkko@xxxxxxxxxx" <jarkko@xxxxxxxxxx>
- Re: [PATCH V5 15/31] x86/sgx: Support restricting of enclave page permissions
- From: zhubojun <bojun.zhu@xxxxxxxxxxx>
- Re: [PATCH v2 2/6] x86/sgx: Do not consider unsanitized pages an error
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v7 1/3] x86/sgx: Rename the owner field of struct sgx_epc_page as encl_owner
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- Re: [PATCH v7 1/3] x86/sgx: Rename the owner field of struct sgx_epc_page as encl_owner
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH v7 1/3] x86/sgx: Rename the owner field of struct sgx_epc_page as encl_owner
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- [PATCH v7 2/3] x86/sgx: Introduce union with vepc_vaddr field for virtualization case
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- [PATCH v7 0/3] x86/sgx: fine grained SGX MCA behavior
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- [PATCH v7 3/3] x86/sgx: Fine grained SGX MCA behavior for virtualization
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- Re: [PATCH 1/6] x86/sgx: Do not consider unsanitized pages an error
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2 2/6] x86/sgx: Do not consider unsanitized pages an error
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH v2 6/6] selftests/sgx: Add a bpftrace script for tracking allocation errors
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH v2 5/6] selftests/sgx: retry the ioctls returned with EAGAIN
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH v2 4/6] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH v2 0/6] x86/sgx: A collection of tests and fixes
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 3/6] x86/sgx: Handle VA page allocation failure for EAUG on PF.
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/6] x86/sgx: Do not consider unsanitized pages an error
- From: "jarkko@xxxxxxxxxx" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/6] x86/sgx: Do not consider unsanitized pages an error
- From: "jarkko@xxxxxxxxxx" <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 0/6] x86/sgx: A collection of tests and fixes
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 1/6] x86/sgx: Do not consider unsanitized pages an error
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 3/6] x86/sgx: Handle VA page allocation failure for EAUG on PF.
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH 1/6] x86/sgx: Do not consider unsanitized pages an error
- From: "jarkko@xxxxxxxxxx" <jarkko@xxxxxxxxxx>
- Re: [PATCH 6/6] selftests/sgx: Add a bpftrace script for tracking allocation errors
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 6/6] selftests/sgx: Add a bpftrace script for tracking allocation errors
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 3/6] x86/sgx: Handle VA page allocation failure for EAUG on PF.
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 5/6] selftests/sgx: retry the ioctls returned with EAGAIN
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2 0/6] x86/sgx: A collection of tests and fixes
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 6/6] selftests/sgx: Add a bpftrace script for tracking allocation errors
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH 5/6] selftests/sgx: retry the ioctls returned with EAGAIN
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH 4/6] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH 1/6] x86/sgx: Do not consider unsanitized pages an error
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH v2 3/6] x86/sgx: Handle VA page allocation failure for EAUG on PF.
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH v2 0/6] x86/sgx: A collection of tests and fixes
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH v2 6/6] selftests/sgx: Add a bpftrace script for tracking allocation errors
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 5/6] selftests/sgx: retry the ioctls returned with EAGAIN
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 4/6] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 3/6] x86/sgx: Handle VA page allocation failure for EAUG on PF.
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 2/6] x86/sgx: Do not consider unsanitized pages an error
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 1/6] selftests/sgx: Ignore OpenSSL 3.0 deprecated functions warning
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 0/6] x86/sgx: A collection of tests and fixes
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/6] x86/sgx: Do not consider unsanitized pages an error
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- Re: [PATCH] selftests/sgx: Fix OpenSSL deprecated warning for ERR_get_error_line
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] selftests/sgx: Fix OpenSSL deprecated warning for ERR_get_error_line
- From: Dhanuka <wdnuka@xxxxxxxxx>
- Re: [PATCH 1/6] x86/sgx: Do not consider unsanitized pages an error
- From: "jarkko@xxxxxxxxxx" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/6] x86/sgx: Do not consider unsanitized pages an error
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 1/6] x86/sgx: Do not consider unsanitized pages an error
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 1/6] x86/sgx: Do not consider unsanitized pages an error
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/6] x86/sgx: Do not consider unsanitized pages an error
- From: "jarkko@xxxxxxxxxx" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/6] x86/sgx: Do not consider unsanitized pages an error
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 1/6] x86/sgx: Do not consider unsanitized pages an error
- From: "jarkko@xxxxxxxxxx" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/6] x86/sgx: Do not consider unsanitized pages an error
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 6/6] selftests/sgx: Add a bpftrace script for tracking allocation errors
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 5/6] selftests/sgx: retry the ioctls returned with EAGAIN
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 4/6] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/6] x86/sgx: Do not consider unsanitized pages an error
- From: "jarkko@xxxxxxxxxx" <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/6] x86/sgx: Do not consider unsanitized pages an error
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/6] x86/sgx: Do not consider unsanitized pages an error
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/6] x86/sgx: Do not consider unsanitized pages an error
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/6] x86/sgx: Do not consider unsanitized pages an error
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 3/6] selftests/sgx: Ignore OpenSSL 3.0 deprecated functions warning
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] selftests/sgx: Fix OpenSSL deprecated warning for ERR_get_error_line
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 6/6] selftests/sgx: Add a bpftrace script for tracking allocation errors
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH 5/6] selftests/sgx: retry the ioctls returned with EAGAIN
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH 4/6] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH 2/6] x86/sgx: Handle VA page allocation failure for EAUG on PF.
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH 1/6] x86/sgx: Do not consider unsanitized pages an error
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH 3/6] selftests/sgx: Ignore OpenSSL 3.0 deprecated functions warning
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH] selftests/sgx: Fix OpenSSL deprecated warning for ERR_get_error_line
- From: Dhanuka <wdnuka@xxxxxxxxx>
- [PATCH 5/6] selftests/sgx: retry the ioctls returned with EAGAIN
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 4/6] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 6/6] selftests/sgx: Add a bpftrace script for tracking allocation errors
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 3/6] selftests/sgx: Ignore OpenSSL 3.0 deprecated functions warning
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 2/6] x86/sgx: Handle VA page allocation failure for EAUG on PF.
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 1/6] x86/sgx: Do not consider unsanitized pages an error
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 0/6] x86/sgx: Test and fixes
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] selftests/sgx: Fix OpenSSL deprecated warning for ERR_get_error_line
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3] KVM: VMX: Allow exposing EDECCSSA user leaf function to KVM guest
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH RESEND v6 1/3] x86/sgx: Rename the owner field of struct sgx_epc_page as encl_owner
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- Re: [PATCH RESEND v6 2/3] x86/sgx: Introduce union with vepc_vaddr field for virtualization case
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] selftests/sgx: Fix OpenSSL deprecated warning for ERR_get_error_line
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RESEND v6 1/3] x86/sgx: Rename the owner field of struct sgx_epc_page as encl_owner
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] x86/sgx: Allow exposing EDECCSSA user leaf function to KVM guest
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH v2] x86/sgx: Allow exposing EDECCSSA user leaf function to KVM guest
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH RESEND v6 2/3] x86/sgx: Introduce union with vepc_vaddr field for virtualization case
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- Re: [PATCH RESEND v6 1/3] x86/sgx: Rename the owner field of struct sgx_epc_page as encl_owner
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- [PATCH] selftests/sgx: Fix OpenSSL deprecated warning for ERR_get_error_line
- From: Dhanuka Warusadura <wdnuka@xxxxxxxxx>
- Re: [PATCH RESEND v6 1/3] x86/sgx: Rename the owner field of struct sgx_epc_page as encl_owner
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RESEND v6 2/3] x86/sgx: Introduce union with vepc_vaddr field for virtualization case
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] x86/sgx: Do not consider unsanitized pages an error
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4] x86/sgx: Do not consider unsanitized pages an error
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- [PATCH RESEND v6 3/3] x86/sgx: Fine grained SGX MCA behavior for virtualization
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- [PATCH RESEND v6 0/3] x86/sgx: fine grained SGX MCA behavior
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- [PATCH RESEND v6 2/3] x86/sgx: Introduce union with vepc_vaddr field for virtualization case
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- [PATCH RESEND v6 1/3] x86/sgx: Rename the owner field of struct sgx_epc_page as encl_owner
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- Re: [PATCH v4] x86/sgx: Do not consider unsanitized pages an error
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: WARNING: CPU: 1 PID: 83 at arch/x86/kernel/cpu/sgx/main.c:446 ksgxd+0x1b7/0x1d0
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH v4] x86/sgx: Do not consider unsanitized pages an error
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4] x86/sgx: Do not consider unsanitized pages an error
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] x86/sgx: Allow exposing EDECCSSA user leaf function to KVM guest
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] x86/sgx: Do not consider unsanitized pages an error
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] x86/sgx: Do not consider unsanitized pages an error
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] x86/sgx: Do not consider unsanitized pages an error
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v3] x86/sgx: Do not consider unsanitized pages an error
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] x86/sgx: Do not consider unsanitized pages an error
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v3] x86/sgx: Do not consider unsanitized pages an error
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] x86/sgx: Allow exposing EDECCSSA user leaf function to KVM guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v2] x86/sgx: Allow exposing EDECCSSA user leaf function to KVM guest
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v2] x86/sgx: Allow exposing EDECCSSA user leaf function to KVM guest
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v3] x86/sgx: Do not consider unsanitized pages an error
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- Re: [PATCH v3] x86/sgx: Do not consider unsanitized pages an error
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: WARNING: CPU: 1 PID: 83 at arch/x86/kernel/cpu/sgx/main.c:446 ksgxd+0x1b7/0x1d0
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: WARNING: CPU: 1 PID: 83 at arch/x86/kernel/cpu/sgx/main.c:446 ksgxd+0x1b7/0x1d0
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3] x86/sgx: Do not consider unsanitized pages an error
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: WARNING: CPU: 1 PID: 83 at arch/x86/kernel/cpu/sgx/main.c:446 ksgxd+0x1b7/0x1d0
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- [PATCH v2] x86/sgx: Do not consider unsanitized pages an error
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: WARNING: CPU: 1 PID: 83 at arch/x86/kernel/cpu/sgx/main.c:446 ksgxd+0x1b7/0x1d0
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] selftests/sgx: retry the ioctls returned with EAGAIN
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] x86/sgx: Print EREMOVE return value in __sgx_sanitize_pages()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: WARNING: CPU: 1 PID: 83 at arch/x86/kernel/cpu/sgx/main.c:446 ksgxd+0x1b7/0x1d0
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: WARNING: CPU: 1 PID: 83 at arch/x86/kernel/cpu/sgx/main.c:446 ksgxd+0x1b7/0x1d0
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] x86/sgx: Print EREMOVE return value in __sgx_sanitize_pages()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: WARNING: CPU: 1 PID: 83 at arch/x86/kernel/cpu/sgx/main.c:446 ksgxd+0x1b7/0x1d0
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] selftests/sgx: retry the ioctls returned with EAGAIN
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] x86/sgx: Allow exposing EDECCSSA user leaf function to KVM guest
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] x86/sgx: Allow exposing EDECCSSA user leaf function to KVM guest
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: WARNING: CPU: 1 PID: 83 at arch/x86/kernel/cpu/sgx/main.c:446 ksgxd+0x1b7/0x1d0
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/2] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: WARNING: CPU: 1 PID: 83 at arch/x86/kernel/cpu/sgx/main.c:446 ksgxd+0x1b7/0x1d0
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: WARNING: CPU: 1 PID: 83 at arch/x86/kernel/cpu/sgx/main.c:446 ksgxd+0x1b7/0x1d0
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: WARNING: CPU: 1 PID: 83 at arch/x86/kernel/cpu/sgx/main.c:446 ksgxd+0x1b7/0x1d0
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: WARNING: CPU: 1 PID: 83 at arch/x86/kernel/cpu/sgx/main.c:446 ksgxd+0x1b7/0x1d0
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH] selftests/sgx: retry the ioctls returned with EAGAIN
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: WARNING: CPU: 1 PID: 83 at arch/x86/kernel/cpu/sgx/main.c:446 ksgxd+0x1b7/0x1d0
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: WARNING: CPU: 1 PID: 83 at arch/x86/kernel/cpu/sgx/main.c:446 ksgxd+0x1b7/0x1d0
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: WARNING: CPU: 1 PID: 83 at arch/x86/kernel/cpu/sgx/main.c:446 ksgxd+0x1b7/0x1d0
- From: Paul Menzel <pmenzel@xxxxxxxxxxxxx>
- Re: [PATCH] [v2] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- [PATCH v2] x86/sgx: Allow exposing EDECCSSA user leaf function to KVM guest
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH 2/2] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [PATCH 2/2] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: "Dhanraj, Vijay" <vijay.dhanraj@xxxxxxxxx>
- Re: [PATCH 2/2] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- RE: [PATCH 2/2] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: "Dhanraj, Vijay" <vijay.dhanraj@xxxxxxxxx>
- Re: [PATCH 2/2] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] x86/sgx: Allow exposing EDECCSSA user leaf function to KVM guest
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH 2/2] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- RE: [PATCH 2/2] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: "Dhanraj, Vijay" <vijay.dhanraj@xxxxxxxxx>
- Re: [PATCH 2/2] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH] selftests/sgx: retry the ioctls returned with EAGAIN
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [syzbot] BUG: unable to handle kernel paging request in kvm_arch_hardware_enable
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [syzbot] BUG: unable to handle kernel paging request in kvm_arch_hardware_enable
- From: syzbot <syzbot+4f6eb69074ff62a1a33b@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH] selftests/sgx: retry the ioctls returned with EAGAIN
- From: Haitao Huang <haitao.huang@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] selftests/sgx: Ignore OpenSSL 3.0 deprecated functions warning
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] selftests/sgx: Add SGX selftest augment_via_eaccept_long
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 1/2] x86/sgx: Handle VA page allocation failure for EAUG on PF.
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] x86/sgx: handle VA page allocation failure for EAUG on PF.
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [PATCH] Add SGX selftest `augment_via_eaccept_long`
- From: "Dhanraj, Vijay" <vijay.dhanraj@xxxxxxxxx>
- Re: [PATCH] x86/sgx: handle VA page allocation failure for EAUG on PF.
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- Re: [PATCH] Add SGX selftest `augment_via_eaccept_long`
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- [PATCH] x86/sgx: handle VA page allocation failure for EAUG on PF.
- From: Haitao Huang <haitao.huang@xxxxxxxxxxxxxxx>
- RE: [PATCH v6 0/3] x86/sgx: fine grained SGX MCA behavior
- From: "Du, Fan" <fan.du@xxxxxxxxx>
- Re: [PATCH] x86/sgx: handle VA page allocation failure for EAUG on PF.
- From: "jarkko@xxxxxxxxxx" <jarkko@xxxxxxxxxx>
- Re: [PATCH] selftests/sgx: retry the ioctls returned with EAGAIN
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] x86/sgx: handle VA page allocation failure for EAUG on PF.
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] selftests/sgx: Ignore OpenSSL 3.0 deprecated functions warning
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] Add SGX selftest `augment_via_eaccept_long`
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] Add SGX selftest `augment_via_eaccept_long`
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] Add SGX selftest `augment_via_eaccept_long`
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [PATCH] x86/sgx: handle VA page allocation failure for EAUG on PF.
- From: "Dhanraj, Vijay" <vijay.dhanraj@xxxxxxxxx>
- [PATCH] selftests/sgx: retry the ioctls returned with EAGAIN
- From: Haitao Huang <haitao.huang@xxxxxxxxxxxxxxx>
- [PATCH] x86/sgx: handle VA page allocation failure for EAUG on PF.
- From: Haitao Huang <haitao.huang@xxxxxxxxxxxxxxx>
- [PATCH v2] x86/sgx: Improve comments for sgx_encl_lookup/alloc_backing()
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v2] selftests/sgx: Ignore OpenSSL 3.0 deprecated functions warning
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH] Add SGX selftest `augment_via_eaccept_long`
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- RE: [PATCH] Add SGX selftest `augment_via_eaccept_long`
- From: "Dhanraj, Vijay" <vijay.dhanraj@xxxxxxxxx>
- Re: [PATCH] Add SGX selftest `augment_via_eaccept_long`
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- Re: [PATCH] [v2] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: "jarkko@xxxxxxxxxx" <jarkko@xxxxxxxxxx>
- RE: [PATCH] Add SGX selftest `augment_via_eaccept_long`
- From: "Dhanraj, Vijay" <vijay.dhanraj@xxxxxxxxx>
- RE: [PATCH] [v2] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- Re: [PATCH] Add SGX selftest `augment_via_eaccept_long`
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] Add SGX selftest `augment_via_eaccept_long`
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] [v2] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: "jarkko@xxxxxxxxxx" <jarkko@xxxxxxxxxx>
- Re: [PATCH] Add SGX selftest `augment_via_eaccept_long`
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] [v2] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: "Huang, Kai" <kai.huang@xxxxxxxxx>
- RE: [PATCH] Add SGX selftest `augment_via_eaccept_long`
- From: "Dhanraj, Vijay" <vijay.dhanraj@xxxxxxxxx>
- Re: [PATCH] Add SGX selftest `augment_via_eaccept_long`
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] Add SGX selftest `augment_via_eaccept_long`
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [PATCH] Add SGX selftest `augment_via_eaccept_long`
- From: "Dhanraj, Vijay" <vijay.dhanraj@xxxxxxxxx>
- Re: [PATCH] Add SGX selftest `augment_via_eaccept_long`
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] Add SGX selftest `augment_via_eaccept_long`
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] Add SGX selftest `augment_via_eaccept_long`
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [PATCH] Add SGX selftest `augment_via_eaccept_long`
- From: "Dhanraj, Vijay" <vijay.dhanraj@xxxxxxxxx>
- Re: [PATCH] Add SGX selftest `augment_via_eaccept_long`
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] Add SGX selftest `augment_via_eaccept_long`
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] Add SGX selftest `augment_via_eaccept_long`
- From: vijay.dhanraj@xxxxxxxxx
- Re: Support SGX2 V5: Seg-fault with EACCEPT for large number of EPC pages
- From: "jarkko@xxxxxxxxxx" <jarkko@xxxxxxxxxx>
- RE: Support SGX2 V5: Seg-fault with EACCEPT for large number of EPC pages
- From: "Dhanraj, Vijay" <vijay.dhanraj@xxxxxxxxx>
- Re: Support SGX2 V5: Seg-fault with EACCEPT for large number of EPC pages
- From: "jarkko@xxxxxxxxxx" <jarkko@xxxxxxxxxx>
- Re: [PATCH] [v2] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] [v2] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: Support SGX2 V5: Seg-fault with EACCEPT for large number of EPC pages
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- RE: Support SGX2 V5: Seg-fault with EACCEPT for large number of EPC pages
- From: "Dhanraj, Vijay" <vijay.dhanraj@xxxxxxxxx>
- Re: Support SGX2 V5: Seg-fault with EACCEPT for large number of EPC pages
- From: "jarkko@xxxxxxxxxx" <jarkko@xxxxxxxxxx>
- Re: [PATCH] x86/sgx: Improve comments for sgx_encl_lookup/alloc_backing()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] x86/sgx: Improve comments for sgx_encl_lookup/alloc_backing()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Support SGX2 V5: Seg-fault with EACCEPT for large number of EPC pages
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- RE: Support SGX2 V5: Seg-fault with EACCEPT for large number of EPC pages
- From: "Dhanraj, Vijay" <vijay.dhanraj@xxxxxxxxx>
- Re: Support SGX2 V5: Seg-fault with EACCEPT for large number of EPC pages
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Support SGX2 V5: Seg-fault with EACCEPT for large number of EPC pages
- From: "Dhanraj, Vijay" <vijay.dhanraj@xxxxxxxxx>
- Re: [PATCH] [v2] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- Re: [PATCH] [v2] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- Re: [PATCH] x86/sgx: Improve comments for sgx_encl_lookup/alloc_backing()
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH] selftests/sgx: Ignore OpenSSL 3.0 deprecated functions warning
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] [v2] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] x86/sgx: Improve comments for sgx_encl_lookup/alloc_backing()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] x86/sgx: Allow exposing EDECCSSA user leaf function to KVM guest
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH] [v2] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH] [v2] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH] [v2] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH] [v2] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- Re: [PATCH] [v2] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH] [v2] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- Re: [PATCH] [v2] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [CLOSED] Re: [CFP LPC 2022] Confidential Computing Microconference
- From: Jörg Rödel <joro@xxxxxxxxxx>
- [PATCH v6 3/3] x86/sgx: Fine grained SGX MCA behavior for virtualization
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- [PATCH v6 2/3] x86/sgx: Introduce union with vepc_vaddr field for virtualization case
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- [PATCH v6 1/3] x86/sgx: Rename the owner field of struct sgx_epc_page as encl_owner
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- [PATCH v6 0/3] x86/sgx: fine grained SGX MCA behavior
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- Re: [PATCH] [v2] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH] [v2] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH] [v2] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH v5 3/3] x86/sgx: Fine grained SGX MCA behavior for normal case
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- Re: [PATCH v5 2/3] x86/sgx: Fine grained SGX MCA behavior for virtualization
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- Re: [PATCH] [v2] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH] [v2] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v5 1/3] x86/sgx: Repurpose the owner field as the virtual address of virtual EPC page
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH] selftests/sgx: Ignore OpenSSL 3.0 deprecated functions warning
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH] selftests/sgx: Ignore OpenSSL 3.0 deprecated functions warning
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH] selftests/sgx: Ignore OpenSSL 3.0 deprecated functions warning
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH] selftests/sgx: Ignore OpenSSL 3.0 deprecated functions warning
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/3] x86/sgx: Fine grained SGX MCA behavior for normal case
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v5 2/3] x86/sgx: Fine grained SGX MCA behavior for virtualization
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v5 1/3] x86/sgx: Repurpose the owner field as the virtual address of virtual EPC page
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH] [v2] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH] [v2] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [PATCH] [v2] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: Dave Hansen <dave.hansen@xxxxxxxxxxxxxxx>
- [PATCH] x86/sgx: Improve comments for sgx_encl_lookup/alloc_backing()
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- Re: [PATCH] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- Re: [PATCH] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] x86/sgx: Drop 'page_index' from sgx_backingf
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3 00/21] Update Documentation/ cross references and fix issues
- From: Mauro Carvalho Chehab <mchehab@xxxxxxxxxx>
- [PATCH v3 06/21] x86/sgx: fix kernel-doc markups
- From: Mauro Carvalho Chehab <mchehab@xxxxxxxxxx>
- [PATCH] x86/sgx: Drop 'page_index' from sgx_backing
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH 04/22] x86/sgx: fix kernel-doc markups
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH] x86/sgx: Allow enclaves to use Asynchrounous Exit Notification
- From: Dave Hansen <dave.hansen@xxxxxxxxxxxxxxx>
- [syzbot] general protection fault in kvm_arch_vcpu_ioctl
- From: syzbot <syzbot+8cdad6430c24f396f158@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 00/22] Fix kernel-doc warnings at linux-next
- From: Bagas Sanjaya <bagasdotme@xxxxxxxxx>
- Re: [PATCH 04/22] x86/sgx: fix kernel-doc markups
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH 00/22] Fix kernel-doc warnings at linux-next
- From: Mauro Carvalho Chehab <mchehab@xxxxxxxxxx>
- [PATCH 04/22] x86/sgx: fix kernel-doc markups
- From: Mauro Carvalho Chehab <mchehab@xxxxxxxxxx>
- Re: [PATCH v5 0/3] x86/sgx: fine grained SGX MCA behavior
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5 3/3] x86/sgx: Fine grained SGX MCA behavior for normal case
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- [PATCH v5 2/3] x86/sgx: Fine grained SGX MCA behavior for virtualization
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- [PATCH v5 1/3] x86/sgx: Repurpose the owner field as the virtual address of virtual EPC page
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- [PATCH v5 0/3] x86/sgx: fine grained SGX MCA behavior
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- Re: 'WARNING in handle_exception_nmi' bug at arch/x86/kvm/vmx/vmx.c:4959
- From: Paolo Bonzini <pbonzini@xxxxxxxxxx>
- Re: 'WARNING in handle_exception_nmi' bug at arch/x86/kvm/vmx/vmx.c:4959
- From: Dmitry Vyukov <dvyukov@xxxxxxxxxx>
- Re: 'WARNING in vcpu_enter_guest' bug in arch/x86/kvm/x86.c:9877
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Inquiry about the license of the OOT linux-sgx-driver
- From: <xymeng16@xxxxxxxxx>
- Re: [PATCH v2] selftests/sgx: add test_encl.elf to TEST_GEN_FILES
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v4 0/3] x86/sgx: fine grained SGX MCA behavior
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- Re: [PATCH v4 0/3] x86/sgx: fine grained SGX MCA behavior
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 2/3] x86/sgx: Fine grained SGX MCA behavior for virtualization
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- Re: [PATCH v4 0/3] x86/sgx: fine grained SGX MCA behavior
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 2/3] x86/sgx: Fine grained SGX MCA behavior for virtualization
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 2/3] x86/sgx: Fine grained SGX MCA behavior for virtualization
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v4 1/3] x86/sgx: Repurpose the owner field as the virtual address of virtual EPC page
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- Re: [PATCH v4 1/3] x86/sgx: Repurpose the owner field as the virtual address of virtual EPC page
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH v4 0/3] x86/sgx: fine grained SGX MCA behavior
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- [PATCH v4 2/3] x86/sgx: Fine grained SGX MCA behavior for virtualization
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- [PATCH v4 1/3] x86/sgx: Repurpose the owner field as the virtual address of virtual EPC page
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- [PATCH v4 3/3] x86/sgx: Fine grained SGX MCA behavior for normal case
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- Re: [PATCH v3 0/3] x86/sgx: fine grained SGX MCA behavior
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [PATCH v3 0/3] x86/sgx: fine grained SGX MCA behavior
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH v3 0/3] x86/sgx: fine grained SGX MCA behavior
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 0/3] x86/sgx: fine grained SGX MCA behavior
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- Re: [PATCH v3 0/3] x86/sgx: fine grained SGX MCA behavior
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: VMA's not getting merged
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 0/3] x86/sgx: fine grained SGX MCA behavior
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: VMA's not getting merged
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [PATCH v3 0/3] x86/sgx: fine grained SGX MCA behavior
- From: "Du, Fan" <fan.du@xxxxxxxxx>
- Re: [PATCH V5 00/31] x86/sgx and selftests/sgx: Support SGX2
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] selftests/sgx: add test_encl.elf to TEST_GEN_FILES
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 0/3] x86/sgx: fine grained SGX MCA behavior
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3 3/3] x86/sgx: Fine grained SGX MCA behavior for normal case
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- [PATCH v3 2/3] x86/sgx: Fine grained SGX MCA behavior for virtualization
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- [PATCH v3 1/3] x86/sgx: Repurpose the owner field as the virtual address of virtual EPC page
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- [PATCH v3 0/3] x86/sgx: fine grained SGX MCA behavior
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- Re: [PATCH v5 0/9] Support microcode updates affecting SGX
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [PATCH v5 0/9] Support microcode updates affecting SGX
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v5 3/9] x86/sgx: Keep record for SGX VA and Guest page type
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2] selftests/sgx: add test_encl.elf to TEST_GEN_FILES
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [PATCH v5 3/9] x86/sgx: Keep record for SGX VA and Guest page type
- From: "Zhang, Cathy" <cathy.zhang@xxxxxxxxx>
- RE: [PATCH v5 3/9] x86/sgx: Keep record for SGX VA and Guest page type
- From: "Zhang, Cathy" <cathy.zhang@xxxxxxxxx>
- Re: [PATCH v3] x86/sgx: Set active memcg prior to shmem allocation
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- Re: [PATCH v5 3/9] x86/sgx: Keep record for SGX VA and Guest page type
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 2/9] x86/sgx: Save enclave pointer for VA page
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5 1/9] x86/sgx: Introduce mechanism to prevent new initializations of EPC pages
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v3] x86/sgx: Set active memcg prior to shmem allocation
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [CFP LPC 2022] Confidential Computing Microconference
- From: Jörg Rödel <joro@xxxxxxxxxx>
- Re: [PATCH v2] x86/sgx: Set active memcg prior to shmem allocation
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] x86/sgx: Set active memcg prior to shmem allocation
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH v2] x86/sgx: Set active memcg prior to shmem allocation
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v5 3/9] x86/sgx: Keep record for SGX VA and Guest page type
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [PATCH v5 2/9] x86/sgx: Save enclave pointer for VA page
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [PATCH v5 1/9] x86/sgx: Introduce mechanism to prevent new initializations of EPC pages
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [PATCH v5 7/9] x86/sgx: Implement ENCLS[EUPDATESVN]
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [PATCH v5 4/9] x86/sgx: Save the size of each EPC section
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [PATCH v5 0/9] Support microcode updates affecting SGX
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [PATCH v5 5/9] x86/sgx: Forced EPC page zapping for EUPDATESVN
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [PATCH v5 6/9] x86/sgx: Define error codes for ENCLS[EUPDATESVN]
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [PATCH v5 9/9] x86/sgx: Call ENCLS[EUPDATESVN] during SGX initialization
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [PATCH v5 8/9] x86/cpu: Call ENCLS[EUPDATESVN] procedure in microcode update
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- Re: [PATCH v2 2/4] x86/sgx: add struct sgx_vepc_page to manage EPC pages for vepc
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- Re: [PATCH v2] x86/sgx: Set active memcg prior to shmem allocation
- From: Roman Gushchin <roman.gushchin@xxxxxxxxx>
- Re: [PATCH v2 2/4] x86/sgx: add struct sgx_vepc_page to manage EPC pages for vepc
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH v2] x86/sgx: Set active memcg prior to shmem allocation
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v2] x86/sgx: Set active memcg prior to shmem allocation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/4] x86/sgx: add struct sgx_vepc_page to manage EPC pages for vepc
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 2/4] x86/sgx: add struct sgx_vepc_page to manage EPC pages for vepc
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/4] x86/sgx: Move struct sgx_vepc definition to sgx.h
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] x86/sgx: Set active memcg prior to shmem allocation
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- [PATCH v2] x86/sgx: Set active memcg prior to shmem allocation
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH] x86/sgx: Set active memcg prior to shmem allocation
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH] x86/sgx: Set active memcg prior to shmem allocation
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH] x86/sgx: Set active memcg prior to shmem allocation
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH] x86/sgx: Set active memcg prior to shmem allocation
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [PATCH] x86/sgx: Set active memcg prior to shmem allocation
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- [PATCH v2 2/4] x86/sgx: add struct sgx_vepc_page to manage EPC pages for vepc
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- [PATCH v2 4/4] x86/sgx: Fine grained SGX MCA behavior for normal case
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- [PATCH v2 3/4] x86/sgx: Fine grained SGX MCA behavior for virtualization
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- [PATCH v2 1/4] x86/sgx: Move struct sgx_vepc definition to sgx.h
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- [PATCH v2 0/4] x86/sgx: fine grained SGX MCA behavior
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- Re: [PATCH] selftests/sgx: add test_encl.elf to TEST_GEN_FILES
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] selftests/sgx: add test_encl.elf to TEST_GEN_FILES
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] x86/sgx: Set active memcg prior to shmem allocation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/4] x86/sgx: fine grained SGX MCA behavior
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- Re: VMA's not getting merged
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] x86/sgx: Set active memcg prior to shmem allocation
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH] x86/sgx: Set active memcg prior to shmem allocation
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [RFC PATCH] x86/sgx: Set active memcg prior to shmem allocation
- From: Michal Hocko <mhocko@xxxxxxxx>
- Re: [PATCH 0/4] x86/sgx: fine grained SGX MCA behavior
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: VMA's not getting merged
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH] x86/sgx: Set active memcg prior to shmem allocation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH] x86/sgx: Set active memcg prior to shmem allocation
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: VMA's not getting merged
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 0/4] x86/sgx: fine grained SGX MCA behavior
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- Re: [PATCH 0/4] x86/sgx: fine grained SGX MCA behavior
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH 0/4] x86/sgx: fine grained SGX MCA behavior
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- RE: [PATCH 0/4] x86/sgx: fine grained SGX MCA behavior
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- VMA's not getting merged
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/4] x86/sgx: fine grained SGX MCA behavior
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- RE: [PATCH 0/4] x86/sgx: fine grained SGX MCA behavior
- From: "Luck, Tony" <tony.luck@xxxxxxxxx>
- Re: [PATCH V3 4/5] x86/sgx: Fix race between reclaimer and page fault handler
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 1/5] x86/sgx: Disconnect backing page references from dirty status
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 3/5] x86/sgx: Obtain backing storage page with enclave mutex held
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/4] x86/sgx: fine grained SGX MCA behavior
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 5/5] x86/sgx: Ensure no data in PCMD page after truncate
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH V3 5/5] x86/sgx: Ensure no data in PCMD page after truncate
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 0/5] SGX shmem backing store issue
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 1/5] x86/sgx: Disconnect backing page references from dirty status
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 4/5] x86/sgx: Fix race between reclaimer and page fault handler
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 2/5] x86/sgx: Mark PCMD page as dirty when modifying contents
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 3/5] x86/sgx: Obtain backing storage page with enclave mutex held
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [RFC PATCH 1/4] x86/sgx: Do not free backing memory on ENCLS[ELDU] failure
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V5 00/31] x86/sgx and selftests/sgx: Support SGX2
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 2/5] x86/sgx: Mark PCMD page as dirty when modifying contents
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 3/5] x86/sgx: Obtain backing storage page with enclave mutex held
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 0/4] SGX shmem backing store issue
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/4] x86/sgx: add struct sgx_vepc_page to manage EPC pages for vepc
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- Re: [PATCH 1/4] x86/sgx: Move struct sgx_vepc definition to sgx.h
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- Re: [PATCH 0/4] x86/sgx: fine grained SGX MCA behavior
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- Re: [PATCH 3/4] x86/sgx: Fine grained SGX MCA behavior for virtualization
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH 3/4] x86/sgx: Fine grained SGX MCA behavior for virtualization
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- Re: [PATCH 3/4] x86/sgx: Fine grained SGX MCA behavior for virtualization
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [RFC PATCH 1/4] x86/sgx: Do not free backing memory on ENCLS[ELDU] failure
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [PATCH V5 00/31] x86/sgx and selftests/sgx: Support SGX2
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [RFC PATCH 1/4] x86/sgx: Do not free backing memory on ENCLS[ELDU] failure
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- Re: [PATCH V2 3/5] x86/sgx: Obtain backing storage page with enclave mutex held
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V2 5/5] x86/sgx: Ensure no data in PCMD page after truncate
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V2 2/5] x86/sgx: Mark PCMD page as dirty when modifying contents
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [RFC PATCH 0/4] SGX shmem backing store issue
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V2 0/5] SGX shmem backing store issue
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- Re: [PATCH V2 3/5] x86/sgx: Obtain backing storage page with enclave mutex held
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 2/5] x86/sgx: Mark PCMD page as dirty when modifying contents
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 5/5] x86/sgx: Ensure no data in PCMD page after truncate
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/4] x86/sgx: add struct sgx_vepc_page to manage EPC pages for vepc
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/4] x86/sgx: Move struct sgx_vepc definition to sgx.h
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 0/4] x86/sgx: fine grained SGX MCA behavior
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 1/4] x86/sgx: Do not free backing memory on ENCLS[ELDU] failure
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 4/5] x86/sgx: Fix race between reclaimer and page fault handler
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V2 1/5] x86/sgx: Disconnect backing page references from dirty status
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [RFC PATCH 0/4] SGX shmem backing store issue
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V5 00/31] x86/sgx and selftests/sgx: Support SGX2
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 4/5] x86/sgx: Fix race between reclaimer and page fault handler
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH V2 1/5] x86/sgx: Disconnect backing page references from dirty status
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH V5 09/31] x86/sgx: Make sgx_ipi_cb() available internally
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 10/31] x86/sgx: Create utility to validate user provided offset and length
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 19/31] x86/sgx: Support complete page removal
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 16/31] x86/sgx: Support adding of pages to an initialized enclave
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 08/31] x86/sgx: Move PTE zap code to new sgx_zap_enclave_ptes()
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 20/31] x86/sgx: Free up EPC pages directly to support large page ranges
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 25/31] selftests/sgx: Introduce dynamic entry point
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 12/31] x86/sgx: Export sgx_encl_{grow,shrink}()
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 26/31] selftests/sgx: Introduce TCS initialization enclave operation
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 24/31] selftests/sgx: Test two different SGX2 EAUG flows
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 13/31] x86/sgx: Export sgx_encl_page_alloc()
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 17/31] x86/sgx: Tighten accessible memory range after enclave initialization
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 02/31] x86/sgx: Add wrapper for SGX2 EMODPR function
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 18/31] x86/sgx: Support modifying SGX page type
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 01/31] x86/sgx: Add short descriptions to ENCLS wrappers
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 21/31] Documentation/x86: Introduce enclave runtime management section
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 30/31] selftests/sgx: Test reclaiming of untouched page
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 07/31] x86/sgx: Rename sgx_encl_ewb_cpumask() as sgx_encl_cpumask()
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 15/31] x86/sgx: Support restricting of enclave page permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 28/31] selftests/sgx: Test faulty enclave behavior
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 31/31] selftests/sgx: Page removal stress test
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 27/31] selftests/sgx: Test complete changing of page type flow
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 14/31] x86/sgx: Support VA page allocation without reclaiming
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 04/31] x86/sgx: Add wrapper for SGX2 EAUG function
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 05/31] x86/sgx: Support loading enclave page without VMA permissions check
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 29/31] selftests/sgx: Test invalid access to removed enclave page
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 00/31] x86/sgx and selftests/sgx: Support SGX2
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 22/31] selftests/sgx: Add test for EPCM permission changes
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 06/31] x86/sgx: Export sgx_encl_ewb_cpumask()
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 03/31] x86/sgx: Add wrapper for SGX2 EMODT function
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 23/31] selftests/sgx: Add test for TCS page permission changes
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V5 11/31] x86/sgx: Keep record of SGX page type
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH 2/4] x86/sgx: add struct sgx_vepc_page to manage EPC pages for vepc
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- [PATCH 4/4] x86/sgx: Fine grained SGX MCA behavior for normal case
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- [PATCH 1/4] x86/sgx: Move struct sgx_vepc definition to sgx.h
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- [PATCH 3/4] x86/sgx: Fine grained SGX MCA behavior for virtualization
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- [PATCH 0/4] x86/sgx: fine grained SGX MCA behavior
- From: Zhiquan Li <zhiquan1.li@xxxxxxxxx>
- Re: [RFC PATCH 1/4] x86/sgx: Do not free backing memory on ENCLS[ELDU] failure
- From: Kai Huang <kai.huang@xxxxxxxxx>
- [PATCH V2 3/5] x86/sgx: Obtain backing storage page with enclave mutex held
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 5/5] x86/sgx: Ensure no data in PCMD page after truncate
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 2/5] x86/sgx: Mark PCMD page as dirty when modifying contents
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 0/5] SGX shmem backing store issue
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 1/5] x86/sgx: Disconnect backing page references from dirty status
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 4/5] x86/sgx: Fix race between reclaimer and page fault handler
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [RFC PATCH 1/4] x86/sgx: Do not free backing memory on ENCLS[ELDU] failure
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [RFC PATCH 0/4] SGX shmem backing store issue
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [RFC PATCH 2/4] x86/sgx: Set dirty bit after modifying page contents
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 0/4] SGX shmem backing store issue
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 0/4] SGX shmem backing store issue
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 1/4] x86/sgx: Do not free backing memory on ENCLS[ELDU] failure
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 3/4] x86/sgx: Obtain backing storage page with enclave mutex held
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 2/4] x86/sgx: Set dirty bit after modifying page contents
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH] x86/sgx: simplify the return expression of sgx_drv_init()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 2/4] x86/sgx: Set dirty bit after modifying page contents
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 1/4] x86/sgx: Do not free backing memory on ENCLS[ELDU] failure
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] x86/sgx: simplify the return expression of sgx_drv_init()
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH 0/4] SGX shmem backing store issue
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] x86/sgx: simplify the return expression of sgx_drv_init()
- Re: [RFC PATCH 0/4] SGX shmem backing store issue
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [RFC PATCH 0/4] SGX shmem backing store issue
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [RFC PATCH 0/4] SGX shmem backing store issue
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH 0/4] SGX shmem backing store issue
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH 0/4] SGX shmem backing store issue
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH 0/4] SGX shmem backing store issue
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [RFC PATCH 0/4] SGX shmem backing store issue
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 1/4] x86/sgx: Do not free backing memory on ENCLS[ELDU] failure
- From: Kai Huang <kai.huang@xxxxxxxxx>
- Re: [RFC PATCH 0/4] SGX shmem backing store issue
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH 0/4] SGX shmem backing store issue
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [RFC PATCH 0/4] SGX shmem backing store issue
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH 0/4] SGX shmem backing store issue
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [RFC PATCH 0/4] SGX shmem backing store issue
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [RFC PATCH 0/4] SGX shmem backing store issue
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH 0/4] SGX shmem backing store issue
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [RFC PATCH 1/4] x86/sgx: Do not free backing memory on ENCLS[ELDU] failure
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [RFC PATCH 1/4] x86/sgx: Do not free backing memory on ENCLS[ELDU] failure
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH 3/4] x86/sgx: Obtain backing storage page with enclave mutex held
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [RFC PATCH 2/4] x86/sgx: Set dirty bit after modifying page contents
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [RFC PATCH 1/4] x86/sgx: Do not free backing memory on ENCLS[ELDU] failure
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [RFC PATCH 0/4] SGX shmem backing store issue
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [RFC PATCH 3/4] x86/sgx: Obtain backing storage page with enclave mutex held
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH 2/4] x86/sgx: Set dirty bit after modifying page contents
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH 1/4] x86/sgx: Do not free backing memory on ENCLS[ELDU] failure
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH 0/4] SGX shmem backing store issue
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH 0/4] SGX shmem backing store issue
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [RFC PATCH 0/4] SGX shmem backing store issue
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH 4/4] x86/sgx: Do not allocate backing pages when loading from backing store
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH 1/4] x86/sgx: Do not free backing memory on ENCLS[ELDU] failure
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH 3/4] x86/sgx: Obtain backing storage page with enclave mutex held
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [RFC PATCH 2/4] x86/sgx: Set dirty bit after modifying page contents
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V4 00/31] x86/sgx and selftests/sgx: Support SGX2
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V4 00/31] x86/sgx and selftests/sgx: Support SGX2
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- RE: [PATCH V4 00/31] x86/sgx and selftests/sgx: Support SGX2
- From: "Dhanraj, Vijay" <vijay.dhanraj@xxxxxxxxx>
- Re: [PATCH v4 1/9] x86/sgx: Introduce mechanism to prevent new initializations of EPC pages
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [PATCH v4 5/9] x86/sgx: Forced EPC page zapping for EUPDATESVN
- From: "Zhang, Cathy" <cathy.zhang@xxxxxxxxx>
- RE: [PATCH v4 2/9] x86/sgx: Save enclave pointer for VA page
- From: "Zhang, Cathy" <cathy.zhang@xxxxxxxxx>
- RE: [PATCH v4 1/9] x86/sgx: Introduce mechanism to prevent new initializations of EPC pages
- From: "Zhang, Cathy" <cathy.zhang@xxxxxxxxx>
- RE: [PATCH v4 8/9] x86/cpu: Call ENCLS[EUPDATESVN] procedure in microcode update
- From: "Zhang, Cathy" <cathy.zhang@xxxxxxxxx>
- Re: [PATCH V4 00/31] x86/sgx and selftests/sgx: Support SGX2
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V4 00/31] x86/sgx and selftests/sgx: Support SGX2
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V4 00/31] x86/sgx and selftests/sgx: Support SGX2
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V4 00/31] x86/sgx and selftests/sgx: Support SGX2
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- RE: [PATCH V4 00/31] x86/sgx and selftests/sgx: Support SGX2
- From: "Dhanraj, Vijay" <vijay.dhanraj@xxxxxxxxx>
- Re: [PATCH v4 5/9] x86/sgx: Forced EPC page zapping for EUPDATESVN
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 2/9] x86/sgx: Save enclave pointer for VA page
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 1/9] x86/sgx: Introduce mechanism to prevent new initializations of EPC pages
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v4 8/9] x86/cpu: Call ENCLS[EUPDATESVN] procedure in microcode update
- From: Borislav Petkov <bp@xxxxxxxxx>
- [PATCH v4 8/9] x86/cpu: Call ENCLS[EUPDATESVN] procedure in microcode update
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [PATCH v4 3/9] x86/sgx: Keep record for SGX VA and Guest page type
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [PATCH v4 5/9] x86/sgx: Forced EPC page zapping for EUPDATESVN
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [PATCH v4 6/9] x86/sgx: Define error codes for ENCLS[EUPDATESVN]
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [PATCH v4 7/9] x86/sgx: Implement ENCLS[EUPDATESVN]
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [PATCH v4 4/9] x86/sgx: Save the size of each EPC section
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [PATCH v4 2/9] x86/sgx: Save enclave pointer for VA page
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [PATCH v4 9/9] x86/sgx: Call ENCLS[EUPDATESVN] during SGX initialization
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [PATCH v4 0/9] Support microcode updates affecting SGX
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [PATCH v4 1/9] x86/sgx: Introduce mechanism to prevent new initializations of EPC pages
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- Re: [PATCH V4 00/31] x86/sgx and selftests/sgx: Support SGX2
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: 'WARNING in vcpu_enter_guest' bug in arch/x86/kvm/x86.c:9877
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- Re: [PATCH V4 14/31] x86/sgx: Support VA page allocation without reclaiming
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V4 14/31] x86/sgx: Support VA page allocation without reclaiming
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- RE: [PATCH V4 00/31] x86/sgx and selftests/sgx: Support SGX2
- From: "Dhanraj, Vijay" <vijay.dhanraj@xxxxxxxxx>
- Re: [PATCH V4 00/31] x86/sgx and selftests/sgx: Support SGX2
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V4 00/31] x86/sgx and selftests/sgx: Support SGX2
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V4 21/31] Documentation/x86: Introduce enclave runtime management section
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V4 11/31] x86/sgx: Keep record of SGX page type
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V4 15/31] x86/sgx: Support restricting of enclave page permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V4 18/31] x86/sgx: Support modifying SGX page type
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V4 16/31] x86/sgx: Support adding of pages to an initialized enclave
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V4 14/31] x86/sgx: Support VA page allocation without reclaiming
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V4 00/31] x86/sgx and selftests/sgx: Support SGX2
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V4 21/31] Documentation/x86: Introduce enclave runtime management section
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V4 16/31] x86/sgx: Support adding of pages to an initialized enclave
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V4 15/31] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V4 15/31] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V4 14/31] x86/sgx: Support VA page allocation without reclaiming
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V4 11/31] x86/sgx: Keep record of SGX page type
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V4 18/31] x86/sgx: Support modifying SGX page type
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH V4 20/31] x86/sgx: Free up EPC pages directly to support large page ranges
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 19/31] x86/sgx: Support complete page removal
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 09/31] x86/sgx: Make sgx_ipi_cb() available internally
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 27/31] selftests/sgx: Test complete changing of page type flow
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 25/31] selftests/sgx: Introduce dynamic entry point
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 04/31] x86/sgx: Add wrapper for SGX2 EAUG function
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 24/31] selftests/sgx: Test two different SGX2 EAUG flows
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 30/31] selftests/sgx: Test reclaiming of untouched page
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 31/31] selftests/sgx: Page removal stress test
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 28/31] selftests/sgx: Test faulty enclave behavior
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 23/31] selftests/sgx: Add test for TCS page permission changes
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 16/31] x86/sgx: Support adding of pages to an initialized enclave
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 11/31] x86/sgx: Keep record of SGX page type
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 05/31] x86/sgx: Support loading enclave page without VMA permissions check
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 18/31] x86/sgx: Support modifying SGX page type
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 12/31] x86/sgx: Export sgx_encl_{grow,shrink}()
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 13/31] x86/sgx: Export sgx_encl_page_alloc()
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 06/31] x86/sgx: Export sgx_encl_ewb_cpumask()
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 02/31] x86/sgx: Add wrapper for SGX2 EMODPR function
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 00/31] x86/sgx and selftests/sgx: Support SGX2
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 29/31] selftests/sgx: Test invalid access to removed enclave page
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 22/31] selftests/sgx: Add test for EPCM permission changes
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 10/31] x86/sgx: Create utility to validate user provided offset and length
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 08/31] x86/sgx: Move PTE zap code to new sgx_zap_enclave_ptes()
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 21/31] Documentation/x86: Introduce enclave runtime management section
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 01/31] x86/sgx: Add short descriptions to ENCLS wrappers
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 03/31] x86/sgx: Add wrapper for SGX2 EMODT function
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 15/31] x86/sgx: Support restricting of enclave page permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 07/31] x86/sgx: Rename sgx_encl_ewb_cpumask() as sgx_encl_cpumask()
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 14/31] x86/sgx: Support VA page allocation without reclaiming
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 26/31] selftests/sgx: Introduce TCS initialization enclave operation
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V4 17/31] x86/sgx: Tighten accessible memory range after enclave initialization
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V3 15/30] x86/sgx: Support adding of pages to an initialized enclave
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V3 19/30] x86/sgx: Free up EPC pages directly to support large page ranges
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V3 17/30] x86/sgx: Support modifying SGX page type
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V3 14/30] x86/sgx: Support restricting of enclave page permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- RE: [RFC PATCH v3 05/10] x86/sgx: Save the size of each EPC section
- From: "Zhang, Cathy" <cathy.zhang@xxxxxxxxx>
- RE: [RFC PATCH v3 01/10] x86/sgx: Introduce mechanism to prevent new initializations of EPC pages
- From: "Zhang, Cathy" <cathy.zhang@xxxxxxxxx>
- RE: [RFC PATCH v3 04/10] x86/sgx: Keep record for SGX VA and Guest page type
- From: "Zhang, Cathy" <cathy.zhang@xxxxxxxxx>
[Index of Archives]
[AMD Graphics]
[Linux USB]
[Video for Linux]
[Linux SCSI]
[Samba]
[Yosemite News]