public inbox for linux-sgx@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2022-04-01 14:24:42 to 2022-04-28 22:44:17 UTC [more...]

[RFC PATCH 0/4] SGX shmem backing store issue
 2022-04-28 22:44 UTC  (14+ messages)
` [RFC PATCH 1/4] x86/sgx: Do not free backing memory on ENCLS[ELDU] failure
` [RFC PATCH 2/4] x86/sgx: Set dirty bit after modifying page contents
` [RFC PATCH 3/4] x86/sgx: Obtain backing storage page with enclave mutex held
` [RFC PATCH 4/4] x86/sgx: Do not allocate backing pages when loading from backing store

[PATCH V4 00/31] x86/sgx and selftests/sgx: Support SGX2
 2022-04-26  4:10 UTC  (60+ messages)
` [PATCH V4 01/31] x86/sgx: Add short descriptions to ENCLS wrappers
` [PATCH V4 02/31] x86/sgx: Add wrapper for SGX2 EMODPR function
` [PATCH V4 03/31] x86/sgx: Add wrapper for SGX2 EMODT function
` [PATCH V4 04/31] x86/sgx: Add wrapper for SGX2 EAUG function
` [PATCH V4 05/31] x86/sgx: Support loading enclave page without VMA permissions check
` [PATCH V4 06/31] x86/sgx: Export sgx_encl_ewb_cpumask()
` [PATCH V4 07/31] x86/sgx: Rename sgx_encl_ewb_cpumask() as sgx_encl_cpumask()
` [PATCH V4 08/31] x86/sgx: Move PTE zap code to new sgx_zap_enclave_ptes()
` [PATCH V4 09/31] x86/sgx: Make sgx_ipi_cb() available internally
` [PATCH V4 10/31] x86/sgx: Create utility to validate user provided offset and length
` [PATCH V4 11/31] x86/sgx: Keep record of SGX page type
` [PATCH V4 12/31] x86/sgx: Export sgx_encl_{grow,shrink}()
` [PATCH V4 13/31] x86/sgx: Export sgx_encl_page_alloc()
` [PATCH V4 14/31] x86/sgx: Support VA page allocation without reclaiming
` [PATCH V4 15/31] x86/sgx: Support restricting of enclave page permissions
` [PATCH V4 16/31] x86/sgx: Support adding of pages to an initialized enclave
` [PATCH V4 17/31] x86/sgx: Tighten accessible memory range after enclave initialization
` [PATCH V4 18/31] x86/sgx: Support modifying SGX page type
` [PATCH V4 19/31] x86/sgx: Support complete page removal
` [PATCH V4 20/31] x86/sgx: Free up EPC pages directly to support large page ranges
` [PATCH V4 21/31] Documentation/x86: Introduce enclave runtime management section
` [PATCH V4 22/31] selftests/sgx: Add test for EPCM permission changes
` [PATCH V4 23/31] selftests/sgx: Add test for TCS page "
` [PATCH V4 24/31] selftests/sgx: Test two different SGX2 EAUG flows
` [PATCH V4 25/31] selftests/sgx: Introduce dynamic entry point
` [PATCH V4 26/31] selftests/sgx: Introduce TCS initialization enclave operation
` [PATCH V4 27/31] selftests/sgx: Test complete changing of page type flow
` [PATCH V4 28/31] selftests/sgx: Test faulty enclave behavior
` [PATCH V4 29/31] selftests/sgx: Test invalid access to removed enclave page
` [PATCH V4 30/31] selftests/sgx: Test reclaiming of untouched page
` [PATCH V4 31/31] selftests/sgx: Page removal stress test

[PATCH v4 0/9] Support microcode updates affecting SGX
 2022-04-25 14:00 UTC  (19+ messages)
` [PATCH v4 1/9] x86/sgx: Introduce mechanism to prevent new initializations of EPC pages
` [PATCH v4 2/9] x86/sgx: Save enclave pointer for VA page
` [PATCH v4 3/9] x86/sgx: Keep record for SGX VA and Guest page type
` [PATCH v4 4/9] x86/sgx: Save the size of each EPC section
` [PATCH v4 5/9] x86/sgx: Forced EPC page zapping for EUPDATESVN
` [PATCH v4 6/9] x86/sgx: Define error codes for ENCLS[EUPDATESVN]
` [PATCH v4 7/9] x86/sgx: Implement ENCLS[EUPDATESVN]
` [PATCH v4 8/9] x86/cpu: Call ENCLS[EUPDATESVN] procedure in microcode update
` [PATCH v4 9/9] x86/sgx: Call ENCLS[EUPDATESVN] during SGX initialization

'WARNING in vcpu_enter_guest' bug in arch/x86/kvm/x86.c:9877
 2022-04-15 21:09 UTC 

[PATCH V3 00/30] x86/sgx and selftests/sgx: Support SGX2
 2022-04-06 22:42 UTC  (79+ messages)
` [PATCH V3 01/30] x86/sgx: Add short descriptions to ENCLS wrappers
` [PATCH V3 02/30] x86/sgx: Add wrapper for SGX2 EMODPR function
` [PATCH V3 03/30] x86/sgx: Add wrapper for SGX2 EMODT function
` [PATCH V3 04/30] x86/sgx: Add wrapper for SGX2 EAUG function
` [PATCH V3 05/30] x86/sgx: Support loading enclave page without VMA permissions check
` [PATCH V3 06/30] x86/sgx: Export sgx_encl_ewb_cpumask()
` [PATCH V3 07/30] x86/sgx: Rename sgx_encl_ewb_cpumask() as sgx_encl_cpumask()
` [PATCH V3 08/30] x86/sgx: Move PTE zap code to new sgx_zap_enclave_ptes()
` [PATCH V3 09/30] x86/sgx: Make sgx_ipi_cb() available internally
` [PATCH V3 10/30] x86/sgx: Create utility to validate user provided offset and length
` [PATCH V3 11/30] x86/sgx: Keep record of SGX page type
` [PATCH V3 12/30] x86/sgx: Export sgx_encl_{grow,shrink}()
` [PATCH V3 13/30] x86/sgx: Export sgx_encl_page_alloc()
` [PATCH V3 14/30] x86/sgx: Support restricting of enclave page permissions
` [PATCH V3 15/30] x86/sgx: Support adding of pages to an initialized enclave
` [PATCH V3 16/30] x86/sgx: Tighten accessible memory range after enclave initialization
` [PATCH V3 17/30] x86/sgx: Support modifying SGX page type
` [PATCH V3 18/30] x86/sgx: Support complete page removal
` [PATCH V3 19/30] x86/sgx: Free up EPC pages directly to support large page ranges
` [PATCH V3 20/30] Documentation/x86: Introduce enclave runtime management section
` [PATCH V3 21/30] selftests/sgx: Add test for EPCM permission changes
` [PATCH V3 22/30] selftests/sgx: Add test for TCS page "
` [PATCH V3 23/30] selftests/sgx: Test two different SGX2 EAUG flows
` [PATCH V3 24/30] selftests/sgx: Introduce dynamic entry point
` [PATCH V3 25/30] selftests/sgx: Introduce TCS initialization enclave operation
` [PATCH V3 26/30] selftests/sgx: Test complete changing of page type flow
` [PATCH V3 27/30] selftests/sgx: Test faulty enclave behavior
` [PATCH V3 28/30] selftests/sgx: Test invalid access to removed enclave page
` [PATCH V3 29/30] selftests/sgx: Test reclaiming of untouched page
` [PATCH V3 30/30] selftests/sgx: Page removal stress test

[RFC PATCH v3 00/10] Support microcode updates affecting SGX
 2022-04-06  6:34 UTC  (26+ messages)
` [RFC PATCH v3 01/10] x86/sgx: Introduce mechanism to prevent new initializations of EPC pages
` [RFC PATCH v3 02/10] x86/sgx: Provide VA page non-NULL owner
` [RFC PATCH v3 03/10] x86/sgx: Save enclave pointer for VA page
` [RFC PATCH v3 04/10] x86/sgx: Keep record for SGX VA and Guest page type
` [RFC PATCH v3 05/10] x86/sgx: Save the size of each EPC section
` [RFC PATCH v3 06/10] x86/sgx: Forced EPC page zapping for EUPDATESVN
` [RFC PATCH v3 09/10] x86/cpu: Call ENCLS[EUPDATESVN] procedure in microcode update
` [RFC PATCH v3 10/10] x86/sgx: Call ENCLS[EUPDATESVN] during SGX initialization

[PATCH RFC] x86/sgx: Simplify struct sgx_enclave_restrict_permissions
 2022-04-05 18:35 UTC  (4+ messages)

Odd looking #PF fault code
 2022-04-05  5:59 UTC  (4+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox