Linux SGX
[Prev Page][Next Page]
- RE: [RFC PATCH v3 03/10] x86/sgx: Save enclave pointer for VA page
- From: "Zhang, Cathy" <cathy.zhang@xxxxxxxxx>
- Re: [PATCH V3 14/30] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 15/30] x86/sgx: Support adding of pages to an initialized enclave
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 17/30] x86/sgx: Support modifying SGX page type
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 03/10] x86/sgx: Save enclave pointer for VA page
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 19/30] x86/sgx: Free up EPC pages directly to support large page ranges
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 05/10] x86/sgx: Save the size of each EPC section
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [RFC PATCH v3 06/10] x86/sgx: Forced EPC page zapping for EUPDATESVN
- From: "Zhang, Cathy" <cathy.zhang@xxxxxxxxx>
- Re: [PATCH V3 21/30] selftests/sgx: Add test for EPCM permission changes
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 14/30] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 21/30] selftests/sgx: Add test for EPCM permission changes
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V3 14/30] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC] x86/sgx: Simplify struct sgx_enclave_restrict_permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 17/30] x86/sgx: Support modifying SGX page type
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V3 17/30] x86/sgx: Support modifying SGX page type
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 19/30] x86/sgx: Free up EPC pages directly to support large page ranges
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH RFC] x86/sgx: Simplify struct sgx_enclave_restrict_permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V3 14/30] x86/sgx: Support restricting of enclave page permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V3 14/30] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 14/30] x86/sgx: Support restricting of enclave page permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V3 19/30] x86/sgx: Free up EPC pages directly to support large page ranges
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH RFC] x86/sgx: Simplify struct sgx_enclave_restrict_permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V3 19/30] x86/sgx: Free up EPC pages directly to support large page ranges
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V3 17/30] x86/sgx: Support modifying SGX page type
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 14/30] x86/sgx: Support restricting of enclave page permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH RFC] x86/sgx: Simplify struct sgx_enclave_restrict_permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 17/30] x86/sgx: Support modifying SGX page type
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V3 14/30] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 19/30] x86/sgx: Free up EPC pages directly to support large page ranges
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 14/30] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 15/30] x86/sgx: Support adding of pages to an initialized enclave
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 19/30] x86/sgx: Free up EPC pages directly to support large page ranges
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 18/30] x86/sgx: Support complete page removal
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 17/30] x86/sgx: Support modifying SGX page type
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 16/30] x86/sgx: Tighten accessible memory range after enclave initialization
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 12/30] x86/sgx: Export sgx_encl_{grow,shrink}()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 21/30] selftests/sgx: Add test for EPCM permission changes
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 21/30] selftests/sgx: Add test for EPCM permission changes
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 11/30] x86/sgx: Keep record of SGX page type
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 10/30] x86/sgx: Create utility to validate user provided offset and length
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 09/30] x86/sgx: Make sgx_ipi_cb() available internally
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 08/30] x86/sgx: Move PTE zap code to new sgx_zap_enclave_ptes()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 07/30] x86/sgx: Rename sgx_encl_ewb_cpumask() as sgx_encl_cpumask()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 06/30] x86/sgx: Export sgx_encl_ewb_cpumask()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 05/30] x86/sgx: Support loading enclave page without VMA permissions check
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 04/30] x86/sgx: Add wrapper for SGX2 EAUG function
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 03/30] x86/sgx: Add wrapper for SGX2 EMODT function
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 02/30] x86/sgx: Add wrapper for SGX2 EMODPR function
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 01/30] x86/sgx: Add short descriptions to ENCLS wrappers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Odd looking #PF fault code
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 14/30] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 15/30] x86/sgx: Support adding of pages to an initialized enclave
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3 14/30] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Odd looking #PF fault code
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH V3 15/30] x86/sgx: Support adding of pages to an initialized enclave
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 01/30] x86/sgx: Add short descriptions to ENCLS wrappers
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 02/30] x86/sgx: Add wrapper for SGX2 EMODPR function
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: Odd looking #PF fault code
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 05/30] x86/sgx: Support loading enclave page without VMA permissions check
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 18/30] x86/sgx: Support complete page removal
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 30/30] selftests/sgx: Page removal stress test
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 07/30] x86/sgx: Rename sgx_encl_ewb_cpumask() as sgx_encl_cpumask()
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 25/30] selftests/sgx: Introduce TCS initialization enclave operation
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 11/30] x86/sgx: Keep record of SGX page type
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 29/30] selftests/sgx: Test reclaiming of untouched page
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 24/30] selftests/sgx: Introduce dynamic entry point
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 04/30] x86/sgx: Add wrapper for SGX2 EAUG function
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 20/30] Documentation/x86: Introduce enclave runtime management section
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 27/30] selftests/sgx: Test faulty enclave behavior
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 09/30] x86/sgx: Make sgx_ipi_cb() available internally
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 08/30] x86/sgx: Move PTE zap code to new sgx_zap_enclave_ptes()
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 10/30] x86/sgx: Create utility to validate user provided offset and length
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 03/30] x86/sgx: Add wrapper for SGX2 EMODT function
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 12/30] x86/sgx: Export sgx_encl_{grow,shrink}()
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 19/30] x86/sgx: Free up EPC pages directly to support large page ranges
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 23/30] selftests/sgx: Test two different SGX2 EAUG flows
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 00/30] x86/sgx and selftests/sgx: Support SGX2
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 13/30] x86/sgx: Export sgx_encl_page_alloc()
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 21/30] selftests/sgx: Add test for EPCM permission changes
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 26/30] selftests/sgx: Test complete changing of page type flow
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 06/30] x86/sgx: Export sgx_encl_ewb_cpumask()
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 14/30] x86/sgx: Support restricting of enclave page permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 17/30] x86/sgx: Support modifying SGX page type
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 16/30] x86/sgx: Tighten accessible memory range after enclave initialization
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 22/30] selftests/sgx: Add test for TCS page permission changes
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 28/30] selftests/sgx: Test invalid access to removed enclave page
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Odd looking #PF fault code
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 06/10] x86/sgx: Forced EPC page zapping for EUPDATESVN
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 05/10] x86/sgx: Save the size of each EPC section
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 04/10] x86/sgx: Keep record for SGX VA and Guest page type
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 03/10] x86/sgx: Save enclave pointer for VA page
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 02/10] x86/sgx: Provide VA page non-NULL owner
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v3 01/10] x86/sgx: Introduce mechanism to prevent new initializations of EPC pages
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [RFC PATCH v3 09/10] x86/cpu: Call ENCLS[EUPDATESVN] procedure in microcode update
- From: "Zhang, Cathy" <cathy.zhang@xxxxxxxxx>
- RE: [RFC PATCH v3 09/10] x86/cpu: Call ENCLS[EUPDATESVN] procedure in microcode update
- From: "Zhang, Cathy" <cathy.zhang@xxxxxxxxx>
- Re: [RFC PATCH v3 09/10] x86/cpu: Call ENCLS[EUPDATESVN] procedure in microcode update
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH v3 09/10] x86/cpu: Call ENCLS[EUPDATESVN] procedure in microcode update
- From: Borislav Petkov <bp@xxxxxxxxx>
- [RFC PATCH v3 10/10] x86/sgx: Call ENCLS[EUPDATESVN] during SGX initialization
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH v3 09/10] x86/cpu: Call ENCLS[EUPDATESVN] procedure in microcode update
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH v3 08/10] x86/sgx: Implement ENCLS[EUPDATESVN]
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH v3 07/10] x86/sgx: Define error codes for ENCLS[EUPDATESVN]
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH v3 06/10] x86/sgx: Forced EPC page zapping for EUPDATESVN
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH v3 05/10] x86/sgx: Save the size of each EPC section
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH v3 04/10] x86/sgx: Keep record for SGX VA and Guest page type
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH v3 03/10] x86/sgx: Save enclave pointer for VA page
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH v3 02/10] x86/sgx: Provide VA page non-NULL owner
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH v3 01/10] x86/sgx: Introduce mechanism to prevent new initializations of EPC pages
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH v3 00/10] Support microcode updates affecting SGX
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- Re: [PATCH v2] selftests/sgx: Use rip relative addressing for encl_stack
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2] selftests/sgx: Use rip relative addressing for encl_stack
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH v2 1/2] selftests/sgx: Use rip relative addressing for encl_stack
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2] selftests/sgx: Use rip relative addressing for encl_stack
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] selftests/sgx: Use rip relative addressing for encl_stack
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH v2 1/2] selftests/sgx: Use rip relative addressing for encl_stack
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] selftests/sgx: Use rip relative addressing for encl_stack
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH v2 1/2] selftests/sgx: Use rip relative addressing for encl_stack
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] selftests/sgx: Use rip relative addressing for encl_stack
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH] x86/sgx: Allow RW for TCS pages
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] selftests/sgx: Use rip relative addressing for encl_stack
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v2 1/2] selftests/sgx: Use rip relative addressing for encl_stack
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH v2 1/2] selftests/sgx: Use rip relative addressing for encl_stack
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH] x86/sgx: Allow RW for TCS pages
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH v2 2/2] selftests/sgx: Make TCS table relocatable
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2 1/2] selftests/sgx: Use rip relative addressing for encl_stack
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] selftests/sgx: Make TCS table relocatable
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [RFC PATCH v2 09/10] x86/cpu: Call ENCLS[EUPDATESVN] procedure in microcode update
- From: "Zhang, Cathy" <cathy.zhang@xxxxxxxxx>
- RE: [RFC PATCH v2 01/10] x86/sgx: Introduce mechanism to prevent new initializations of EPC pages
- From: "Zhang, Cathy" <cathy.zhang@xxxxxxxxx>
- [PATCH] selftest/sgx: Use rip relative addressing for encl_stack
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] x86/sgx: Allow RW for TCS pages
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 01/10] x86/sgx: Introduce mechanism to prevent new initializations of EPC pages
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [RFC PATCH v2 09/10] x86/cpu: Call ENCLS[EUPDATESVN] procedure in microcode update
- From: Jethro Beekman <jethro@xxxxxxxxxxxx>
- Re: [RFC PATCH v2 09/10] x86/cpu: Call ENCLS[EUPDATESVN] procedure in microcode update
- From: Jethro Beekman <jethro@xxxxxxxxxxxx>
- RE: [RFC PATCH v2 01/10] x86/sgx: Introduce mechanism to prevent new initializations of EPC pages
- From: "Zhang, Cathy" <cathy.zhang@xxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 01/10] x86/sgx: Introduce mechanism to prevent new initializations of EPC pages
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- RE: [RFC PATCH v2 01/10] x86/sgx: Introduce mechanism to prevent new initializations of EPC pages
- From: "Zhang, Cathy" <cathy.zhang@xxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 01/10] x86/sgx: Introduce mechanism to prevent new initializations of EPC pages
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2 09/10] x86/cpu: Call ENCLS[EUPDATESVN] procedure in microcode update
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH v2 09/10] x86/cpu: Call ENCLS[EUPDATESVN] procedure in microcode update
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH v2 09/10] x86/cpu: Call ENCLS[EUPDATESVN] procedure in microcode update
- From: Jethro Beekman <jethro@xxxxxxxxxxxx>
- Re: [RFC PATCH v2 09/10] x86/cpu: Call ENCLS[EUPDATESVN] procedure in microcode update
- From: Jethro Beekman <jethro@xxxxxxxxxxxx>
- [RFC PATCH v2 10/10] x86/sgx: Call ENCLS[EUPDATESVN] during SGX initialization
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH v2 08/10] x86/sgx: Implement ENCLS[EUPDATESVN]
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH v2 09/10] x86/cpu: Call ENCLS[EUPDATESVN] procedure in microcode update
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH v2 07/10] x86/sgx: Define error codes for ENCLS[EUPDATESVN]
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH v2 05/10] x86/sgx: Save the size of each EPC section
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH v2 06/10] x86/sgx: Forced EPC page zapping for EUPDATESVN
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH v2 01/10] x86/sgx: Introduce mechanism to prevent new initializations of EPC pages
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH v2 02/10] x86/sgx: Provide VA page non-NULL owner
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH v2 04/10] x86/sgx: Keep record for SGX VA and Guest page type
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH v2 03/10] x86/sgx: Save enclave pointer for VA page
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH v2 00/10] Support microcode updates affecting SGX
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- Re: [RFC PATCH v2.1 01/30] x86/sgx: Add short descriptions to ENCLS wrappers
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 06/32] x86/sgx: Support VMA permissions more relaxed than enclave permissions
- From: "Dr. Greg" <greg@xxxxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- Re: [PATCH v6] x86/sgx: Free backing memory after faulting the enclave page
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- RE: [RFC PATCH 00/11] Support microcode updates affecting SGX
- From: "Zhang, Cathy" <cathy.zhang@xxxxxxxxx>
- RE: [RFC PATCH 09/11] x86/microcode: Expose EUPDATESVN procedure via sysfs
- From: "Zhang, Cathy" <cathy.zhang@xxxxxxxxx>
- Re: [RFC PATCH v2.1 14/30] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2.1 14/30] x86/sgx: Support restricting of enclave page permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [RFC PATCH v2.1 14/30] x86/sgx: Support restricting of enclave page permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [RFC PATCH v2.1 14/30] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2.1 14/30] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH 00/11] Support microcode updates affecting SGX
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [RFC PATCH 00/11] Support microcode updates affecting SGX
- From: "Raj, Ashok" <ashok.raj@xxxxxxxxx>
- Re: [RFC PATCH 00/11] Support microcode updates affecting SGX
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH 00/11] Support microcode updates affecting SGX
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [RFC PATCH 00/11] Support microcode updates affecting SGX
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [no subject]
- Re: [RFC PATCH 00/11] Support microcode updates affecting SGX
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH 00/11] Support microcode updates affecting SGX
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH v2.1 14/30] x86/sgx: Support restricting of enclave page permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [RFC PATCH 00/11] Support microcode updates affecting SGX
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [RFC PATCH v2.1 14/30] x86/sgx: Support restricting of enclave page permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [RFC PATCH 09/11] x86/microcode: Expose EUPDATESVN procedure via sysfs
- From: Borislav Petkov <bp@xxxxxxxxx>
- Re: [RFC PATCH 09/11] x86/microcode: Expose EUPDATESVN procedure via sysfs
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [RFC PATCH 09/11] x86/microcode: Expose EUPDATESVN procedure via sysfs
- From: Borislav Petkov <bp@xxxxxxxxx>
- [RFC PATCH 11/11] Documentation/x86/sgx: Document EUPDATESVN sysfs file
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH 10/11] x86/sgx: Call ENCLS[EUPDATESVN] during SGX initialization
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH 09/11] x86/microcode: Expose EUPDATESVN procedure via sysfs
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH 08/11] x86/sgx: Implement ENCLS[EUPDATESVN]
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH 07/11] x86/sgx: Define error codes for ENCLS[EUPDATESVN]
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH 06/11] x86/sgx: Forced EPC page zapping for EUPDATESVN
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH 05/11] x86/sgx: Save the size of each EPC section
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH 04/11] x86/sgx: Keep record for SGX VA and Guest page type
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH 03/11] x86/sgx: Save enclave pointer for VA page
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH 02/11] x86/sgx: Provide VA page non-NULL owner
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH 01/11] x86/sgx: Introduce mechanism to prevent new initializations of EPC pages
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- [RFC PATCH 00/11] Support microcode updates affecting SGX
- From: Cathy Zhang <cathy.zhang@xxxxxxxxx>
- Re: [RFC PATCH v2.1 14/30] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2.1 14/30] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6] x86/sgx: Free backing memory after faulting the enclave page
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6] x86/sgx: Free backing memory after faulting the enclave page
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V2 06/32] x86/sgx: Support VMA permissions more relaxed than enclave permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 06/32] x86/sgx: Support VMA permissions more relaxed than enclave permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V2 06/32] x86/sgx: Support VMA permissions more relaxed than enclave permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 06/32] x86/sgx: Support VMA permissions more relaxed than enclave permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH RFC v3 3/3] x86/sgx: Implement EAUG population with MAP_POPULATE
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v6] x86/sgx: Free backing memory after faulting the enclave page
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC v3 3/3] x86/sgx: Implement EAUG population with MAP_POPULATE
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC v3 2/3] x86/sgx: Export sgx_encl_page_alloc()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC v3 1/3] mm: Add f_op->populate() for populating memory outside of core mm
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC v3 0/3] MAP_POPULATE for device memory
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v2 1/3] mm: Add f_op->populate() for populating memory outside of core mm
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC v2 3/3] x86/sgx: Implement EAUG population with MAP_POPULATE
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC v2 2/3] x86/sgx: Export sgx_encl_page_alloc()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC v2 1/3] mm: Add f_op->populate() for populating memory outside of core mm
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC v2 0/3] MAP_POPULATE for device memory
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC 0/3] MAP_POPULATE for device memory
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 06/32] x86/sgx: Support VMA permissions more relaxed than enclave permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 06/32] x86/sgx: Support VMA permissions more relaxed than enclave permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 06/32] x86/sgx: Support VMA permissions more relaxed than enclave permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] x86/sgx: Enable PROT_EXEC for EAUG'd pages
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] x86/sgx: Enable PROT_EXEC for EAUG'd pages
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- RE: [PATCH RFC 0/3] MAP_POPULATE for device memory
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH V2 06/32] x86/sgx: Support VMA permissions more relaxed than enclave permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH] x86/sgx: Enable PROT_EXEC for EAUG'd pages
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] x86/sgx: Enable PROT_EXEC for EAUG'd pages
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V2 06/32] x86/sgx: Support VMA permissions more relaxed than enclave permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 21/32] selftests/sgx: Test two different SGX2 EAUG flows
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 19/32] x86/sgx: Support adding of pages to an initialized enclave
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] x86/sgx: Enable PROT_EXEC for EAUG'd pages
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] x86/sgx: Enable PROT_EXEC for EAUG'd pages
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC 0/3] MAP_POPULATE for device memory
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC 0/3] MAP_POPULATE for device memory
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/3] MAP_POPULATE for device memory
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v2] mm: Add f_ops->populate()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v2] mm: Add f_ops->populate()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] x86/sgx: Enable PROT_EXEC for EAUG'd pages
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v2] mm: Add f_ops->populate()
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH 0/6] Remove usage of list iterator past the loop body
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 0/6] Remove usage of list iterator past the loop body
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH RFC v2] mm: Add f_ops->populate()
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH RFC 0/3] MAP_POPULATE for device memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH RFC 0/3] MAP_POPULATE for device memory
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC 0/3] MAP_POPULATE for device memory
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC 1/3] mm: Add f_ops->populate()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC 1/3] mm: Add f_ops->populate()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v2] mm: Add f_ops->populate()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC v2] mm: Add f_ops->populate()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC 0/3] MAP_POPULATE for device memory
- From: David Hildenbrand <david@xxxxxxxxxx>
- Re: [PATCH RFC 0/3] MAP_POPULATE for device memory
- From: Christoph Hellwig <hch@xxxxxxxxxxxxx>
- Re: [PATCH RFC v2] mm: Add f_ops->populate()
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH RFC v2] mm: Add f_ops->populate()
- From: Andrew Morton <akpm@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH RFC 1/3] mm: Add f_ops->populate()
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH RFC 1/3] mm: Add f_ops->populate()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC 1/3] mm: Add f_ops->populate()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC 0/3] MAP_POPULATE for device memory
- From: "'Jarkko Sakkinen'" <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC] x86: Add SGX_IOC_ENCLAVE_AUGMENT_PAGES
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC] x86: Add SGX_IOC_ENCLAVE_AUGMENT_PAGES
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC] x86: Add SGX_IOC_ENCLAVE_AUGMENT_PAGES
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC] x86: Add SGX_IOC_ENCLAVE_AUGMENT_PAGES
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC 0/3] MAP_POPULATE for device memory
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH RFC 1/3] mm: Add f_ops->populate()
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- RE: [PATCH RFC 0/3] MAP_POPULATE for device memory
- From: David Laight <David.Laight@xxxxxxxxxx>
- [PATCH RFC 3/3] x86/sgx: Implement EAUG population with MAP_POPULATE
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC 2/3] x86/sgx: Export sgx_encl_page_alloc()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC 1/3] mm: Add f_ops->populate()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC 0/3] MAP_POPULATE for device memory
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC] mm: Add f_ops->populate()
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH RFC] mm: Add f_ops->populate()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC] mm: Add f_ops->populate()
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH RFC] mm: Add f_ops->populate()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC] mm: Add f_ops->populate()
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- [PATCH RFC v2] mm: Add f_ops->populate()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC] mm: Add f_ops->populate()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC] mm: Add f_ops->populate()
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- [PATCH RFC] mm: Add f_ops->populate()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC] x86: Add SGX_IOC_ENCLAVE_AUGMENT_PAGES
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC] x86: Add SGX_IOC_ENCLAVE_AUGMENT_PAGES
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC] x86: Add SGX_IOC_ENCLAVE_AUGMENT_PAGES
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] x86/sgx: Do not limit EAUG'd pages by pre-initialization policy
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH RFC] x86: Add SGX_IOC_ENCLAVE_AUGMENT_PAGES
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 08/32] x86/sgx: x86/sgx: Add sgx_encl_page->vm_run_prot_bits for dynamic permission changes
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [no subject]
- Re: [PATCH v3] x86/sgx: Do not limit EAUG'd pages by pre-initialization policy
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH RFC] x86: Add SGX_IOC_ENCLAVE_AUGMENT_PAGES
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH RFC] x86: Add SGX_IOC_ENCLAVE_AUGMENT_PAGES
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- Re: [PATCH RFC] x86: Add SGX_IOC_ENCLAVE_AUGMENT_PAGES
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH RFC] x86: Add SGX_IOC_ENCLAVE_AUGMENT_PAGES
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2.1 01/30] x86/sgx: Add short descriptions to ENCLS wrappers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [RFC PATCH v2.1 01/30] x86/sgx: Add short descriptions to ENCLS wrappers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 20/30] x86/sgx: Support modifying SGX page type
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 12/30] x86/sgx: Create utility to validate user provided offset and length
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 06/30] x86/sgx: Support VMA permissions more relaxed than enclave permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 26/30] selftests/sgx: Test faulty enclave behavior
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 11/30] x86/sgx: Make sgx_ipi_cb() available internally
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 17/30] x86/sgx: Support adding of pages to an initialized enclave
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 05/30] Documentation/x86: Document SGX permission details
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 01/30] x86/sgx: Add short descriptions to ENCLS wrappers
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 03/30] x86/sgx: Add wrapper for SGX2 EMODT function
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 04/30] x86/sgx: Add wrapper for SGX2 EAUG function
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 08/30] x86/sgx: Export sgx_encl_ewb_cpumask()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 14/30] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 30/30] selftests/sgx: Page removal stress test
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 25/30] selftests/sgx: Test complete changing of page type flow
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 18/30] x86/sgx: Tighten accessible memory range after enclave initialization
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 21/30] x86/sgx: Support complete page removal
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 29/30] x86/sgx: Free up EPC pages directly to support large page ranges
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 19/30] selftests/sgx: Test two different SGX2 EAUG flows
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 24/30] selftests/sgx: Introduce TCS initialization enclave operation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 16/30] selftests/sgx: Add test for TCS page permission changes
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 27/30] selftests/sgx: Test invalid access to removed enclave page
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 23/30] selftests/sgx: Introduce dynamic entry point
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 22/30] Documentation/x86: Introduce enclave runtime management section
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 15/30] selftests/sgx: Add test for EPCM permission changes
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 10/30] x86/sgx: Move PTE zap code to new sgx_zap_enclave_ptes()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 28/30] selftests/sgx: Test reclaiming of untouched page
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 13/30] x86/sgx: Keep record of SGX page type
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 09/30] x86/sgx: Rename sgx_encl_ewb_cpumask() as sgx_encl_cpumask()
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 07/30] x86/sgx: Add pfn_mkwrite() handler for present PTEs
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [RFC PATCH v2.1 02/30] x86/sgx: Add wrapper for SGX2 EMODPR function
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 15/32] x86/sgx: Support relaxing of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 08/32] x86/sgx: x86/sgx: Add sgx_encl_page->vm_run_prot_bits for dynamic permission changes
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Xiaomeng Tong <xiam0nd.tong@xxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- [PATCH v3] x86/sgx: Do not limit EAUG'd pages by pre-initialization policy
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v2] x86/sgx: Do not limit EAUG'd pages by pre-initialization policy
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] x86/sgx: Do not limit EAUG'd pages by pre-initialization policy
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] x86/sgx: Do not limit EAUG'd pages by pre-initialization policy
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH] x86/sgx: Do not limit EAUG'd pages by pre-initialization policy
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 00/32] x86/sgx and selftests/sgx: Support SGX2
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5] x86/sgx: Free backing memory after faulting the enclave page
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v6] x86/sgx: Free backing memory after faulting the enclave page
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V2 00/32] x86/sgx and selftests/sgx: Support SGX2
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- [PATCH v12] sgx.7: New page with overview of Software Guard eXtensions (SGX)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxxx>
- RE: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Xiaomeng Tong <xiam0nd.tong@xxxxxxxxx>
- Re: [Kgdb-bugreport] [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Daniel Thompson <daniel.thompson@xxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- RE: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Xiaomeng Tong <xiam0nd.tong@xxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Xiaomeng Tong <xiam0nd.tong@xxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Jakob Koschel <jakobkoschel@xxxxxxxxx>
- RE: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Xiaomeng Tong <xiam0nd.tong@xxxxxxxxx>
- RE: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: David Laight <David.Laight@xxxxxxxxxx>
- RE: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Xiaomeng Tong <xiam0nd.tong@xxxxxxxxx>
- Re: [PATCH V2 00/32] x86/sgx and selftests/sgx: Support SGX2
- From: Nathaniel McCallum <nathaniel@xxxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V2 00/32] x86/sgx and selftests/sgx: Support SGX2
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [no subject]
- Re: [Intel-gfx] [PATCH 6/6] treewide: remove check of list iterator against head past the loop body
- From: Tvrtko Ursulin <tvrtko.ursulin@xxxxxxxxxxxxxxx>
- Re: [PATCH V2 00/32] x86/sgx and selftests/sgx: Support SGX2
- From: Nathaniel McCallum <nathaniel@xxxxxxxxxxx>
- Re: [PATCH v5] x86/sgx: Free backing memory after faulting the enclave page
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- RE: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Xiaomeng Tong <xiam0nd.tong@xxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Rasmus Villemoes <linux@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v5] x86/sgx: Free backing memory after faulting the enclave page
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- RE: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 6/6] treewide: remove check of list iterator against head past the loop body
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- [PATCH] wait: Parameterize the return variable to ___wait_event()
- From: "Matthew Wilcox (Oracle)" <willy@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH v5] x86/sgx: Free backing memory after faulting the enclave page
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Jakob Koschel <jakobkoschel@xxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Greg KH <greg@xxxxxxxxx>
- Re: [PATCH 13/25] x86/sgx: Support adding of pages to initialized enclave
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH 13/25] x86/sgx: Support adding of pages to initialized enclave
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v5] x86/sgx: Free backing memory after faulting the enclave page
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Jakob Koschel <jakobkoschel@xxxxxxxxx>
- Re: [PATCH v4] x86/sgx: Free backing memory after faulting the enclave page
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Christian König <christian.koenig@xxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH 1/6] drivers: usb: remove usage of list iterator past the loop body
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- RE: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: David Laight <David.Laight@xxxxxxxxxx>
- RE: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: David Laight <David.Laight@xxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Barnabás Pőcze <pobrn@xxxxxxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Segher Boessenkool <segher@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Jakob Koschel <jakobkoschel@xxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Jakob Koschel <jakobkoschel@xxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Jeffrey Walton <noloader@xxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Christian König <christian.koenig@xxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: James Bottomley <James.Bottomley@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Johannes Berg <johannes@xxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Matthew Wilcox <willy@xxxxxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Christian König <christian.koenig@xxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Linus Torvalds <torvalds@xxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/6] drivers: usb: remove usage of list iterator past the loop body
- From: Joe Perches <joe@xxxxxxxxxxx>
- RE: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: "Dhanraj, Vijay" <vijay.dhanraj@xxxxxxxxx>
- Re: [PATCH v4] x86/sgx: Free backing memory after faulting the enclave page
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 1/6] drivers: usb: remove usage of list iterator past the loop body
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 6/6] treewide: remove check of list iterator against head past the loop body
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH v4] x86/sgx: Free backing memory after faulting the enclave page
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Christian König <christian.koenig@xxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Jakob Koschel <jakobkoschel@xxxxxxxxx>
- Re: [PATCH 1/6] drivers: usb: remove usage of list iterator past the loop body
- From: Jakob Koschel <jakobkoschel@xxxxxxxxx>
- Re: [PATCH 3/6] treewide: fix incorrect use to determine if list is empty
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 1/6] drivers: usb: remove usage of list iterator past the loop body
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Greg KH <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6/6] treewide: remove check of list iterator against head past the loop body
- From: Jakob Koschel <jakobkoschel@xxxxxxxxx>
- [PATCH 3/6] treewide: fix incorrect use to determine if list is empty
- From: Jakob Koschel <jakobkoschel@xxxxxxxxx>
- [PATCH 4/6] drivers: remove unnecessary use of list iterator variable
- From: Jakob Koschel <jakobkoschel@xxxxxxxxx>
- [PATCH 2/6] treewide: remove using list iterator after loop body as a ptr
- From: Jakob Koschel <jakobkoschel@xxxxxxxxx>
- [PATCH 1/6] drivers: usb: remove usage of list iterator past the loop body
- From: Jakob Koschel <jakobkoschel@xxxxxxxxx>
- [PATCH 5/6] treewide: remove dereference of list iterator after loop body
- From: Jakob Koschel <jakobkoschel@xxxxxxxxx>
- [PATCH 0/6] Remove usage of list iterator past the loop body
- From: Jakob Koschel <jakobkoschel@xxxxxxxxx>
- Re: [PATCH v4] x86/sgx: Free backing memory after faulting the enclave page
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- RE: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: "Dhanraj, Vijay" <vijay.dhanraj@xxxxxxxxx>
- Re: [PATCH V2 00/32] x86/sgx and selftests/sgx: Support SGX2
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V2 19/32] x86/sgx: Support adding of pages to an initialized enclave
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 1/4] selftests/sgx: Fix NULL-pointer-dereference upon early test failure
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 00/32] x86/sgx and selftests/sgx: Support SGX2
- From: Nathaniel McCallum <nathaniel@xxxxxxxxxxx>
- Re: [PATCH V2 00/32] x86/sgx and selftests/sgx: Support SGX2
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V2 00/32] x86/sgx and selftests/sgx: Support SGX2
- From: Nathaniel McCallum <nathaniel@xxxxxxxxxxx>
- Re: [PATCH V2 1/4] selftests/sgx: Fix NULL-pointer-dereference upon early test failure
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V2 19/32] x86/sgx: Support adding of pages to an initialized enclave
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH v4] x86/sgx: Free backing memory after faulting the enclave page
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH v4] x86/sgx: Free backing memory after faulting the enclave page
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] x86/sgx: Free backing memory after faulting the enclave page
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] x86/sgx: Free backing memory after faulting the enclave page
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] x86/sgx: Free backing memory after faulting the enclave page
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] selftests: sgx: Treat CC as one argument
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v11] sgx.7: New page with overview of Software Guard eXtensions (SGX)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 1/4] selftests/sgx: Fix NULL-pointer-dereference upon early test failure
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 4/4] selftests/sgx: Remove extra newlines in test output
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 3/4] selftests/sgx: Ensure enclave data available during debug print
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 2/4] selftests/sgx: Do not attempt enclave build without valid enclave
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: aesmd availability
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] x86/sgx: Free backing memory after faulting the enclave page
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v3] x86/sgx: Free backing memory after faulting the enclave page
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 19/32] x86/sgx: Support adding of pages to an initialized enclave
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 19/32] x86/sgx: Support adding of pages to an initialized enclave
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 19/32] x86/sgx: Support adding of pages to an initialized enclave
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V3] x86/sgx: Add poison handling to reclaimer
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V3] x86/sgx: Add poison handling to reclaimer
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH V3] x86/sgx: Add poison handling to reclaimer
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH 1/4] selftests/sgx: Fix segfault upon early test failure
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 3/4] selftests/sgx: Ensure enclave data available during debug print
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/4] selftests/sgx: Do not attempt enclave build without valid enclave
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 4/4] selftests/sgx: Remove extra newlines in test output
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2 2/2] selftests: sgx: Treat CC as one argument
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 1/2] selftests: x86: add validity check and allow field splitting
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- [PATCH V2 1/2] selftests: x86: add validity check and allow field splitting
- From: Muhammad Usama Anjum <usama.anjum@xxxxxxxxxxxxx>
- [PATCH V2 0/2] selftests: sgx: Fix build of test_sgx
- From: Muhammad Usama Anjum <usama.anjum@xxxxxxxxxxxxx>
- [PATCH V2 2/2] selftests: sgx: Treat CC as one argument
- From: Muhammad Usama Anjum <usama.anjum@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] selftests: x86: allow expansion of $(CC)
- From: Muhammad Usama Anjum <usama.anjum@xxxxxxxxxxxxx>
- Re: [PATCH 1/2] selftests: x86: allow expansion of $(CC)
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selftests: x86: allow expansion of $(CC)
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selftests: x86: allow expansion of $(CC)
- From: Muhammad Usama Anjum <usama.anjum@xxxxxxxxxxxxx>
- Re: [PATCH 2/2] selftests: sgx: Treat CC as one argument
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH 1/2] selftests: x86: allow expansion of $(CC)
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] selftests: sgx: Treat CC as one argument
- From: Muhammad Usama Anjum <usama.anjum@xxxxxxxxxxxxx>
- [PATCH 1/2] selftests: x86: allow expansion of $(CC)
- From: Muhammad Usama Anjum <usama.anjum@xxxxxxxxxxxxx>
- [PATCH 0/2] selftests: sgx: Fix build of test_sgx
- From: Muhammad Usama Anjum <usama.anjum@xxxxxxxxxxxxx>
- Re: [PATCH v11] sgx.7: New page with overview of Software Guard eXtensions (SGX)
- From: "Alejandro Colomar (man-pages)" <alx.manpages@xxxxxxxxx>
- [PATCH V3 1/4] selftests/sgx: Fix NULL-pointer-dereference upon early test failure
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 0/4] selftests/sgx: Early enclave loading error path fixes
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 3/4] selftests/sgx: Ensure enclave data available during debug print
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 2/4] selftests/sgx: Do not attempt enclave build without valid enclave
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3 4/4] selftests/sgx: Remove extra newlines in test output
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V3] x86/sgx: Silence softlockup detection when releasing large enclaves
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 17/32] selftests/sgx: Add test for EPCM permission changes
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 08/32] x86/sgx: x86/sgx: Add sgx_encl_page->vm_run_prot_bits for dynamic permission changes
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 32/32] selftests/sgx: Page removal stress test
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 24/32] Documentation/x86: Introduce enclave runtime management section
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 00/32] x86/sgx and selftests/sgx: Support SGX2
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 28/32] selftests/sgx: Test faulty enclave behavior
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 13/32] x86/sgx: Create utility to validate user provided offset and length
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 11/32] x86/sgx: Move PTE zap code to new sgx_zap_enclave_ptes()
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 26/32] selftests/sgx: Introduce TCS initialization enclave operation
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 12/32] x86/sgx: Make sgx_ipi_cb() available internally
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 14/32] x86/sgx: Keep record of SGX page type
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 04/32] x86/sgx: Add wrapper for SGX2 EAUG function
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 09/32] x86/sgx: Export sgx_encl_ewb_cpumask()
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 23/32] x86/sgx: Support complete page removal
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 25/32] selftests/sgx: Introduce dynamic entry point
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 30/32] selftests/sgx: Test reclaiming of untouched page
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 27/32] selftests/sgx: Test complete changing of page type flow
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 29/32] selftests/sgx: Test invalid access to removed enclave page
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 16/32] x86/sgx: Support restricting of enclave page permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 22/32] x86/sgx: Support modifying SGX page type
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 15/32] x86/sgx: Support relaxing of enclave page permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 03/32] x86/sgx: Add wrapper for SGX2 EMODT function
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 10/32] x86/sgx: Rename sgx_encl_ewb_cpumask() as sgx_encl_cpumask()
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 21/32] selftests/sgx: Test two different SGX2 EAUG flows
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 07/32] x86/sgx: Add pfn_mkwrite() handler for present PTEs
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 19/32] x86/sgx: Support adding of pages to an initialized enclave
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 01/32] x86/sgx: Add short descriptions to ENCLS wrappers
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 06/32] x86/sgx: Support VMA permissions more relaxed than enclave permissions
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 02/32] x86/sgx: Add wrapper for SGX2 EMODPR function
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 31/32] x86/sgx: Free up EPC pages directly to support large page ranges
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 05/32] Documentation/x86: Document SGX permission details
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 20/32] x86/sgx: Tighten accessible memory range after enclave initialization
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 18/32] selftests/sgx: Add test for TCS page permission changes
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH] KVM: VMX: pass TME information to guests
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH] KVM: VMX: pass TME information to guests
- From: Fares Mehanna <faresx@xxxxxxxxx>
- [PATCH V3] x86/sgx: Add poison handling to reclaimer
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V2 1/4] selftests/sgx: Fix NULL-pointer-dereference upon early test failure
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 1/4] selftests/sgx: Fix NULL-pointer-dereference upon early test failure
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V2 0/4] selftests/sgx: Early enclave loading error path fixes
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 4/4] selftests/sgx: Remove extra newlines in test output
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 3/4] selftests/sgx: Ensure enclave data available during debug print
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 2/4] selftests/sgx: Do not attempt enclave build without valid enclave
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH V2 1/4] selftests/sgx: Fix NULL-pointer-dereference upon early test failure
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- [PATCH V2 2/4] selftests/sgx: Do not attempt enclave build without valid enclave
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 4/4] selftests/sgx: Remove extra newlines in test output
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 1/4] selftests/sgx: Fix NULL-pointer-dereference upon early test failure
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 3/4] selftests/sgx: Ensure enclave data available during debug print
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH V2 0/4] selftests/sgx: Early enclave loading error path fixes
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: aesmd availability
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- Re: [PATCH v3 1/2] x86/sgx: Add accounting for tracking overcommit
- From: Anand Krishnamoorthi <anakrish@xxxxxxxxxxxxx>
- Re: [PATCH v3] x86/sgx: Free backing memory after faulting the enclave page
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH v3 1/2] x86/sgx: Add accounting for tracking overcommit
- From: "Accardi, Kristen C" <kristen.c.accardi@xxxxxxxxx>
- Re: [PATCH 1/4] selftests/sgx: Fix segfault upon early test failure
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH 3/4] selftests/sgx: Ensure enclave data available during debug print
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH 1/4] selftests/sgx: Fix segfault upon early test failure
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 2/4] selftests/sgx: Do not attempt enclave build without valid enclave
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH 1/4] selftests/sgx: Fix segfault upon early test failure
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH 4/4] selftests/sgx: Remove extra newlines in test output
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 3/4] selftests/sgx: Ensure enclave data available during debug print
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 2/4] selftests/sgx: Do not attempt enclave build without valid enclave
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 1/4] selftests/sgx: Fix segfault upon early test failure
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH 2/2] x86/sgx: Allow sgx_reclaim_pages() to report failure
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH 3/4] selftests/sgx: Ensure enclave data available during debug print
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH 4/4] selftests/sgx: Remove extra newlines in test output
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH 2/4] selftests/sgx: Do not attempt enclave build without valid enclave
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH 1/4] selftests/sgx: Fix segfault upon early test failure
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH 0/4] selftests/sgx: Early enclave loading error path fixes
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: aesmd availability
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- aesmd availability
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/2] x86/sgx: Add accounting for tracking overcommit
- From: Anand Krishnamoorthi <anakrish@xxxxxxxxxxxxx>
- Re: [PATCH v11] sgx.7: New page with overview of Software Guard eXtensions (SGX)
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] x86/sgx: Free backing memory after faulting the enclave page
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] x86/sgx: Allow sgx_reclaim_pages() to report failure
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 2/2] x86/sgx: Allow sgx_reclaim_pages() to report failure
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 1/2] x86/sgx: fixup for available backing pages calculation
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [syzbot] memory leak in kvm_vcpu_ioctl_set_cpuid2
- From: Sean Christopherson <seanjc@xxxxxxxxxx>
- [syzbot] memory leak in kvm_vcpu_ioctl_set_cpuid2
- From: syzbot <syzbot+ead0473557070d5432cd@xxxxxxxxxxxxxxxxxxxxxxxxx>
- [PATCH 2/2] x86/sgx: Allow sgx_reclaim_pages() to report failure
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH 1/2] x86/sgx: fixup for available backing pages calculation
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH 0/2] Fixups for overcommit limit pages
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH 05/25] x86/sgx: Introduce runtime protection bits
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2] x86/sgx: Silence softlockup detection when releasing large enclaves
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] x86/sgx: Silence softlockup detection when releasing large enclaves
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] x86/sgx: Silence softlockup detection when releasing large enclaves
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] x86/sgx: Free backing memory after faulting the enclave page
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH V2] x86/sgx: Silence softlockup detection when releasing large enclaves
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: Testing 5.17 bugfix material
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Testing 5.17 bugfix material
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- Re: Testing 5.17 bugfix material
- From: "Accardi, Kristen C" <kristen.c.accardi@xxxxxxxxx>
- Re: Testing 5.17 bugfix material
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Testing 5.17 bugfix material
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
- Re: Testing 5.17 bugfix material
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Testing 5.17 bugfix material
- From: "Accardi, Kristen C" <kristen.c.accardi@xxxxxxxxx>
- Re: Testing 5.17 bugfix material
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3] x86/sgx: Free backing memory after faulting the enclave page
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: Testing 5.17 bugfix material
- From: Jarkko Sakkinen <jarkko.sakkinen@xxxxxx>
- Re: [PATCH V2] x86/sgx: Add poison handling to reclaimer
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH V2] x86/sgx: Add poison handling to reclaimer
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: Testing 5.17 bugfix material
- From: "Haitao Huang" <haitao.huang@xxxxxxxxxxxxxxx>
- Testing 5.17 bugfix material
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH V2] x86/sgx: Add poison handling to reclaimer
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH 05/25] x86/sgx: Introduce runtime protection bits
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH] x86/sgx: Silence softlockup detection when releasing large enclaves
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH] x86/sgx: Add poison handling to reclaimer
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH V2] x86/sgx: Add poison handling to reclaimer
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 2/2] x86/sgx: account backing pages
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH v3 1/2] x86/sgx: Add accounting for tracking overcommit
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] x86/sgx: Silence softlockup detection when releasing large enclaves
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH] x86/sgx: Add poison handling to reclaimer
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 05/25] x86/sgx: Introduce runtime protection bits
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- [PATCH V2] x86/sgx: Add poison handling to reclaimer
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH] x86/sgx: Add poison handling to reclaimer
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- Re: [PATCH] x86/sgx: Add poison handling to reclaimer
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH] x86/sgx: Add poison handling to reclaimer
- From: Dave Hansen <dave.hansen@xxxxxxxxx>
- [PATCH] x86/sgx: Add poison handling to reclaimer
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH 05/25] x86/sgx: Introduce runtime protection bits
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH 05/25] x86/sgx: Introduce runtime protection bits
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- Re: [PATCH 05/25] x86/sgx: Introduce runtime protection bits
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH] x86/sgx: Silence softlockup detection when releasing large enclaves
- From: Reinette Chatre <reinette.chatre@xxxxxxxxx>
- [PATCH v3 2/2] x86/sgx: account backing pages
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v3 1/2] x86/sgx: Add accounting for tracking overcommit
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- [PATCH v3 0/2] x86/sgx: Limit EPC overcommit
- From: Kristen Carlson Accardi <kristen@xxxxxxxxxxxxxxx>
- Re: [PATCH 05/25] x86/sgx: Introduce runtime protection bits
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 05/25] x86/sgx: Introduce runtime protection bits
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 05/25] x86/sgx: Introduce runtime protection bits
- From: Jarkko Sakkinen <jarkko@xxxxxxxxxx>
- Re: [PATCH 05/25] x86/sgx: Introduce runtime protection bits
- From: Nathaniel McCallum <nathaniel@xxxxxxxxxxx>
[Index of Archives]
[AMD Graphics]
[Linux USB]
[Video for Linux]
[Linux SCSI]
[Samba]
[Yosemite News]