From: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com> To: x86@kernel.org, platform-driver-x86@vger.kernel.org Cc: dave.hansen@intel.com, sean.j.christopherson@intel.com, nhorman@redhat.com, npmccallum@redhat.com, Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>, Thomas Gleixner <tglx@linutronix.de>, Ingo Molnar <mingo@redhat.com>, "H. Peter Anvin" <hpa@zytor.com>, "Rafael J. Wysocki" <rafael.j.wysocki@intel.com>, Vikas Shivappa <vikas.shivappa@linux.intel.com>, Greg Kroah-Hartman <gregkh@linuxfoundation.org>, Andi Kleen <ak@linux.intel.com>, "Kirill A. Shutemov" <kirill.shutemov@linux.intel.com>, linux-kernel@vger.kernel.org (open list:X86 ARCHITECTURE (32-BIT AND 64-BIT)), intel-sgx-kernel-dev@lists.01.org (open list:INTEL SGX) Subject: [PATCH v11 07/13] x86, sgx: detect Intel SGX Date: Fri, 8 Jun 2018 19:09:42 +0200 [thread overview] Message-ID: <20180608171216.26521-8-jarkko.sakkinen@linux.intel.com> (raw) In-Reply-To: <20180608171216.26521-1-jarkko.sakkinen@linux.intel.com> From: Sean Christopherson <sean.j.christopherson@intel.com> Intel(R) SGX is a set of CPU instructions that can be used by applications to set aside private regions of code and data. The code outside the enclave is disallowed to access the memory inside the enclave by the CPU access control. This commit adds the check for SGX to arch/x86 and a new config option, INTEL_SGX_CORE. Exposes a boolean variable 'sgx_enabled' to query whether or not the SGX support is available. Signed-off-by: Sean Christopherson <sean.j.christopherson@intel.com> Reviewed-by: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com> Tested-by: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com> Signed-off-by: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com> --- arch/x86/Kconfig | 19 ++++++++++++ arch/x86/include/asm/sgx.h | 25 ++++++++++++++++ arch/x86/include/asm/sgx_pr.h | 20 +++++++++++++ arch/x86/kernel/cpu/Makefile | 1 + arch/x86/kernel/cpu/intel_sgx.c | 53 +++++++++++++++++++++++++++++++++ 5 files changed, 118 insertions(+) create mode 100644 arch/x86/include/asm/sgx.h create mode 100644 arch/x86/include/asm/sgx_pr.h create mode 100644 arch/x86/kernel/cpu/intel_sgx.c diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig index c07f492b871a..42015d5366ef 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@ -1925,6 +1925,25 @@ config X86_INTEL_MEMORY_PROTECTION_KEYS If unsure, say y. +config INTEL_SGX_CORE + prompt "Intel SGX core functionality" + def_bool n + depends on X86_64 && CPU_SUP_INTEL + help + Intel Software Guard eXtensions (SGX) is a set of CPU instructions + that allows ring 3 applications to create enclaves; private regions + of memory that are protected, by hardware, from unauthorized access + and/or modification. + + This option enables kernel recognition of SGX, high-level management + of the Enclave Page Cache (EPC), tracking and writing of SGX Launch + Enclave Hash MSRs, and allows for virtualization of SGX via KVM. By + iteslf, this option does not provide SGX support to userspace. + + For details, see Documentation/x86/intel_sgx.rst + + If unsure, say N. + config EFI bool "EFI runtime service support" depends on ACPI diff --git a/arch/x86/include/asm/sgx.h b/arch/x86/include/asm/sgx.h new file mode 100644 index 000000000000..fa3e6e0eb8af --- /dev/null +++ b/arch/x86/include/asm/sgx.h @@ -0,0 +1,25 @@ +// SPDX-License-Identifier: (GPL-2.0 OR BSD-3-Clause) +// Copyright(c) 2016-18 Intel Corporation. +// +// Authors: +// +// Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com> +// Suresh Siddha <suresh.b.siddha@intel.com> +// Sean Christopherson <sean.j.christopherson@intel.com> + +#ifndef _ASM_X86_SGX_H +#define _ASM_X86_SGX_H + +#include <linux/types.h> + +#define SGX_CPUID 0x12 + +enum sgx_cpuid { + SGX_CPUID_CAPABILITIES = 0, + SGX_CPUID_ATTRIBUTES = 1, + SGX_CPUID_EPC_BANKS = 2, +}; + +extern bool sgx_enabled; + +#endif /* _ASM_X86_SGX_H */ diff --git a/arch/x86/include/asm/sgx_pr.h b/arch/x86/include/asm/sgx_pr.h new file mode 100644 index 000000000000..876dc44c2ccc --- /dev/null +++ b/arch/x86/include/asm/sgx_pr.h @@ -0,0 +1,20 @@ +// SPDX-License-Identifier: (GPL-2.0 OR BSD-3-Clause) +// Copyright(c) 2016-17 Intel Corporation. +// +// Authors: +// +// Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com> +// Suresh Siddha <suresh.b.siddha@intel.com> +// Serge Ayoun <serge.ayoun@intel.com> +// Shay Katz-zamir <shay.katz-zamir@intel.com> + +#ifndef _ASM_X86_SGX_PR_H +#define _ASM_X86_SGX_PR_H + +#include <linux/printk.h> +#include <linux/ratelimit.h> + +#undef pr_fmt +#define pr_fmt(fmt) "intel_sgx: " fmt + +#endif /* _ASM_X86_SGX_PR_H */ diff --git a/arch/x86/kernel/cpu/Makefile b/arch/x86/kernel/cpu/Makefile index a66229f51b12..9552ff5b4ec3 100644 --- a/arch/x86/kernel/cpu/Makefile +++ b/arch/x86/kernel/cpu/Makefile @@ -36,6 +36,7 @@ obj-$(CONFIG_CPU_SUP_TRANSMETA_32) += transmeta.o obj-$(CONFIG_CPU_SUP_UMC_32) += umc.o obj-$(CONFIG_INTEL_RDT) += intel_rdt.o intel_rdt_rdtgroup.o intel_rdt_monitor.o intel_rdt_ctrlmondata.o +obj-$(CONFIG_INTEL_SGX_CORE) += intel_sgx.o obj-$(CONFIG_X86_MCE) += mcheck/ obj-$(CONFIG_MTRR) += mtrr/ diff --git a/arch/x86/kernel/cpu/intel_sgx.c b/arch/x86/kernel/cpu/intel_sgx.c new file mode 100644 index 000000000000..db6b315334f4 --- /dev/null +++ b/arch/x86/kernel/cpu/intel_sgx.c @@ -0,0 +1,53 @@ +// SPDX-License-Identifier: (GPL-2.0 OR BSD-3-Clause) +// Copyright(c) 2016-17 Intel Corporation. +// +// Authors: +// +// Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com> +// Suresh Siddha <suresh.b.siddha@intel.com> +// Serge Ayoun <serge.ayoun@intel.com> +// Shay Katz-zamir <shay.katz-zamir@intel.com> +// Sean Christopherson <sean.j.christopherson@intel.com> + +#include <asm/sgx.h> +#include <asm/sgx_pr.h> +#include <linux/freezer.h> +#include <linux/highmem.h> +#include <linux/kthread.h> +#include <linux/ratelimit.h> +#include <linux/sched/signal.h> +#include <linux/slab.h> + +bool sgx_enabled __ro_after_init = false; +EXPORT_SYMBOL(sgx_enabled); + +static __init bool sgx_is_enabled(void) +{ + unsigned long fc; + + if (boot_cpu_data.x86_vendor != X86_VENDOR_INTEL) + return false; + + if (!boot_cpu_has(X86_FEATURE_SGX)) + return false; + + if (!boot_cpu_has(X86_FEATURE_SGX1)) + return false; + + rdmsrl(MSR_IA32_FEATURE_CONTROL, fc); + if (!(fc & FEATURE_CONTROL_LOCKED)) + return false; + + if (!(fc & FEATURE_CONTROL_SGX_ENABLE)) + return false; + + return true; +} + +static __init int sgx_init(void) +{ + sgx_enabled = sgx_is_enabled(); + return 0; +} + +arch_initcall(sgx_init); -- 2.17.0
WARNING: multiple messages have this Message-ID (diff)
From: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com> To: x86@kernel.org, platform-driver-x86@vger.kernel.org Cc: dave.hansen@intel.com, sean.j.christopherson@intel.com, nhorman@redhat.com, npmccallum@redhat.com, Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>, Thomas Gleixner <tglx@linutronix.de>, Ingo Molnar <mingo@redhat.com>, "H. Peter Anvin" <hpa@zytor.com>, "Rafael J. Wysocki" <rafael.j.wysocki@intel.com>, Vikas Shivappa <vikas.shivappa@linux.intel.com>, Greg Kroah-Hartman <gregkh@linuxfoundation.org>, Andi Kleen <ak@linux.intel.com>, "Kirill A. Shutemov" <kirill.shutemov@linux.intel.com>, "open list:X86 ARCHITECTURE 32-BIT AND 64-BIT" <linux-kernel@vger.kernel.org>, "open list:INTEL SGX" <intel-sgx-kernel-dev@lists.01.org> Subject: [PATCH v11 07/13] x86, sgx: detect Intel SGX Date: Fri, 8 Jun 2018 19:09:42 +0200 [thread overview] Message-ID: <20180608171216.26521-8-jarkko.sakkinen@linux.intel.com> (raw) In-Reply-To: <20180608171216.26521-1-jarkko.sakkinen@linux.intel.com> From: Sean Christopherson <sean.j.christopherson@intel.com> Intel(R) SGX is a set of CPU instructions that can be used by applications to set aside private regions of code and data. The code outside the enclave is disallowed to access the memory inside the enclave by the CPU access control. This commit adds the check for SGX to arch/x86 and a new config option, INTEL_SGX_CORE. Exposes a boolean variable 'sgx_enabled' to query whether or not the SGX support is available. Signed-off-by: Sean Christopherson <sean.j.christopherson@intel.com> Reviewed-by: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com> Tested-by: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com> Signed-off-by: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com> --- arch/x86/Kconfig | 19 ++++++++++++ arch/x86/include/asm/sgx.h | 25 ++++++++++++++++ arch/x86/include/asm/sgx_pr.h | 20 +++++++++++++ arch/x86/kernel/cpu/Makefile | 1 + arch/x86/kernel/cpu/intel_sgx.c | 53 +++++++++++++++++++++++++++++++++ 5 files changed, 118 insertions(+) create mode 100644 arch/x86/include/asm/sgx.h create mode 100644 arch/x86/include/asm/sgx_pr.h create mode 100644 arch/x86/kernel/cpu/intel_sgx.c diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig index c07f492b871a..42015d5366ef 100644 --- a/arch/x86/Kconfig +++ b/arch/x86/Kconfig @@ -1925,6 +1925,25 @@ config X86_INTEL_MEMORY_PROTECTION_KEYS If unsure, say y. +config INTEL_SGX_CORE + prompt "Intel SGX core functionality" + def_bool n + depends on X86_64 && CPU_SUP_INTEL + help + Intel Software Guard eXtensions (SGX) is a set of CPU instructions + that allows ring 3 applications to create enclaves; private regions + of memory that are protected, by hardware, from unauthorized access + and/or modification. + + This option enables kernel recognition of SGX, high-level management + of the Enclave Page Cache (EPC), tracking and writing of SGX Launch + Enclave Hash MSRs, and allows for virtualization of SGX via KVM. By + iteslf, this option does not provide SGX support to userspace. + + For details, see Documentation/x86/intel_sgx.rst + + If unsure, say N. + config EFI bool "EFI runtime service support" depends on ACPI diff --git a/arch/x86/include/asm/sgx.h b/arch/x86/include/asm/sgx.h new file mode 100644 index 000000000000..fa3e6e0eb8af --- /dev/null +++ b/arch/x86/include/asm/sgx.h @@ -0,0 +1,25 @@ +// SPDX-License-Identifier: (GPL-2.0 OR BSD-3-Clause) +// Copyright(c) 2016-18 Intel Corporation. +// +// Authors: +// +// Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com> +// Suresh Siddha <suresh.b.siddha@intel.com> +// Sean Christopherson <sean.j.christopherson@intel.com> + +#ifndef _ASM_X86_SGX_H +#define _ASM_X86_SGX_H + +#include <linux/types.h> + +#define SGX_CPUID 0x12 + +enum sgx_cpuid { + SGX_CPUID_CAPABILITIES = 0, + SGX_CPUID_ATTRIBUTES = 1, + SGX_CPUID_EPC_BANKS = 2, +}; + +extern bool sgx_enabled; + +#endif /* _ASM_X86_SGX_H */ diff --git a/arch/x86/include/asm/sgx_pr.h b/arch/x86/include/asm/sgx_pr.h new file mode 100644 index 000000000000..876dc44c2ccc --- /dev/null +++ b/arch/x86/include/asm/sgx_pr.h @@ -0,0 +1,20 @@ +// SPDX-License-Identifier: (GPL-2.0 OR BSD-3-Clause) +// Copyright(c) 2016-17 Intel Corporation. +// +// Authors: +// +// Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com> +// Suresh Siddha <suresh.b.siddha@intel.com> +// Serge Ayoun <serge.ayoun@intel.com> +// Shay Katz-zamir <shay.katz-zamir@intel.com> + +#ifndef _ASM_X86_SGX_PR_H +#define _ASM_X86_SGX_PR_H + +#include <linux/printk.h> +#include <linux/ratelimit.h> + +#undef pr_fmt +#define pr_fmt(fmt) "intel_sgx: " fmt + +#endif /* _ASM_X86_SGX_PR_H */ diff --git a/arch/x86/kernel/cpu/Makefile b/arch/x86/kernel/cpu/Makefile index a66229f51b12..9552ff5b4ec3 100644 --- a/arch/x86/kernel/cpu/Makefile +++ b/arch/x86/kernel/cpu/Makefile @@ -36,6 +36,7 @@ obj-$(CONFIG_CPU_SUP_TRANSMETA_32) += transmeta.o obj-$(CONFIG_CPU_SUP_UMC_32) += umc.o obj-$(CONFIG_INTEL_RDT) += intel_rdt.o intel_rdt_rdtgroup.o intel_rdt_monitor.o intel_rdt_ctrlmondata.o +obj-$(CONFIG_INTEL_SGX_CORE) += intel_sgx.o obj-$(CONFIG_X86_MCE) += mcheck/ obj-$(CONFIG_MTRR) += mtrr/ diff --git a/arch/x86/kernel/cpu/intel_sgx.c b/arch/x86/kernel/cpu/intel_sgx.c new file mode 100644 index 000000000000..db6b315334f4 --- /dev/null +++ b/arch/x86/kernel/cpu/intel_sgx.c @@ -0,0 +1,53 @@ +// SPDX-License-Identifier: (GPL-2.0 OR BSD-3-Clause) +// Copyright(c) 2016-17 Intel Corporation. +// +// Authors: +// +// Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com> +// Suresh Siddha <suresh.b.siddha@intel.com> +// Serge Ayoun <serge.ayoun@intel.com> +// Shay Katz-zamir <shay.katz-zamir@intel.com> +// Sean Christopherson <sean.j.christopherson@intel.com> + +#include <asm/sgx.h> +#include <asm/sgx_pr.h> +#include <linux/freezer.h> +#include <linux/highmem.h> +#include <linux/kthread.h> +#include <linux/ratelimit.h> +#include <linux/sched/signal.h> +#include <linux/slab.h> + +bool sgx_enabled __ro_after_init = false; +EXPORT_SYMBOL(sgx_enabled); + +static __init bool sgx_is_enabled(void) +{ + unsigned long fc; + + if (boot_cpu_data.x86_vendor != X86_VENDOR_INTEL) + return false; + + if (!boot_cpu_has(X86_FEATURE_SGX)) + return false; + + if (!boot_cpu_has(X86_FEATURE_SGX1)) + return false; + + rdmsrl(MSR_IA32_FEATURE_CONTROL, fc); + if (!(fc & FEATURE_CONTROL_LOCKED)) + return false; + + if (!(fc & FEATURE_CONTROL_SGX_ENABLE)) + return false; + + return true; +} + +static __init int sgx_init(void) +{ + sgx_enabled = sgx_is_enabled(); + return 0; +} + +arch_initcall(sgx_init); -- 2.17.0
next prev parent reply other threads:[~2018-06-08 17:20 UTC|newest] Thread overview: 181+ messages / expand[flat|nested] mbox.gz Atom feed top 2018-06-08 17:09 [PATCH v11 00/13] Intel SGX1 support Jarkko Sakkinen 2018-06-08 17:09 ` Jarkko Sakkinen 2018-06-08 17:09 ` Jarkko Sakkinen 2018-06-08 17:09 ` Jarkko Sakkinen 2018-06-08 17:09 ` [PATCH v11 01/13] compiler.h, kasan: add __SANITIZE_ADDRESS__ check for __no_kasan_or_inline Jarkko Sakkinen 2018-06-08 17:09 ` Jarkko Sakkinen 2018-06-08 17:09 ` [PATCH v11 02/13] x86, sgx: updated MAINTAINERS Jarkko Sakkinen 2018-06-08 17:09 ` Jarkko Sakkinen 2018-06-08 17:09 ` [PATCH v11 03/13] x86, sgx: add SGX definitions to cpufeature Jarkko Sakkinen 2018-06-08 17:09 ` Jarkko Sakkinen 2018-06-08 17:09 ` [PATCH v11 04/13] x86, sgx: add SGX definitions to msr-index.h Jarkko Sakkinen 2018-06-08 17:09 ` Jarkko Sakkinen 2018-06-08 17:25 ` Dave Hansen 2018-06-19 13:18 ` Jarkko Sakkinen 2018-06-19 13:18 ` Jarkko Sakkinen 2018-06-19 14:01 ` Dave Hansen 2018-06-19 14:01 ` Dave Hansen 2018-06-21 17:22 ` Jarkko Sakkinen 2018-06-21 17:22 ` Jarkko Sakkinen 2018-06-08 17:09 ` [PATCH v11 05/13] x86, cpufeatures: add Intel-defined SGX leaf CPUID_12_EAX Jarkko Sakkinen 2018-06-08 17:09 ` Jarkko Sakkinen 2018-06-08 17:09 ` [PATCH v11 06/13] crypto: aesni: add minimal build option for SGX LE Jarkko Sakkinen 2018-06-08 17:09 ` Jarkko Sakkinen 2018-06-08 17:27 ` Dave Hansen 2018-06-11 15:24 ` Sean Christopherson 2018-06-08 17:09 ` Jarkko Sakkinen [this message] 2018-06-08 17:09 ` [PATCH v11 07/13] x86, sgx: detect Intel SGX Jarkko Sakkinen 2018-06-08 17:36 ` Dave Hansen 2018-06-18 21:36 ` [intel-sgx-kernel-dev] " Andy Lutomirski 2018-06-25 7:39 ` Jarkko Sakkinen 2018-06-19 13:33 ` Jarkko Sakkinen 2018-06-19 13:33 ` Jarkko Sakkinen 2018-06-11 11:35 ` Neil Horman 2018-06-19 13:34 ` Jarkko Sakkinen 2018-06-19 13:34 ` Jarkko Sakkinen 2018-06-08 17:09 ` [PATCH v11 08/13] x86, sgx: added ENCLS wrappers Jarkko Sakkinen 2018-06-08 17:09 ` Jarkko Sakkinen 2018-06-08 17:43 ` Dave Hansen 2018-06-19 13:25 ` Jarkko Sakkinen 2018-06-19 13:25 ` Jarkko Sakkinen 2018-06-20 13:12 ` Sean Christopherson 2018-06-20 13:12 ` Sean Christopherson 2018-06-25 9:16 ` Jarkko Sakkinen 2018-06-25 9:16 ` Jarkko Sakkinen 2018-06-08 17:09 ` [PATCH v11 09/13] x86, sgx: basic routines for enclave page cache Jarkko Sakkinen 2018-06-08 17:09 ` Jarkko Sakkinen 2018-06-08 18:21 ` Jethro Beekman 2018-06-18 21:33 ` [intel-sgx-kernel-dev] " Andy Lutomirski 2018-06-25 7:36 ` Jarkko Sakkinen 2018-06-19 14:08 ` Jarkko Sakkinen 2018-06-19 14:08 ` Jarkko Sakkinen 2018-06-19 15:44 ` Jethro Beekman 2018-06-19 15:44 ` Jethro Beekman 2018-06-08 18:24 ` Dave Hansen 2018-06-19 14:57 ` Jarkko Sakkinen 2018-06-19 14:57 ` Jarkko Sakkinen 2018-06-19 15:19 ` Neil Horman 2018-06-19 15:19 ` Neil Horman 2018-06-19 15:32 ` Dave Hansen 2018-06-19 15:32 ` Dave Hansen 2018-06-25 9:01 ` Jarkko Sakkinen 2018-06-25 9:01 ` Jarkko Sakkinen 2018-06-19 15:59 ` Sean Christopherson 2018-06-19 15:59 ` Sean Christopherson 2018-06-25 9:14 ` Jarkko Sakkinen 2018-06-25 9:14 ` Jarkko Sakkinen 2018-06-10 5:32 ` [intel-sgx-kernel-dev] " Andy Lutomirski 2018-06-11 15:12 ` Sean Christopherson 2018-06-20 13:21 ` Sean Christopherson 2018-06-20 13:21 ` Sean Christopherson 2018-06-25 9:21 ` Jarkko Sakkinen 2018-06-25 9:21 ` Jarkko Sakkinen 2018-06-25 16:14 ` Neil Horman 2018-06-25 16:14 ` Neil Horman 2018-06-20 15:26 ` Sean Christopherson 2018-06-20 15:26 ` Sean Christopherson 2018-06-25 9:21 ` Jarkko Sakkinen 2018-06-25 9:21 ` Jarkko Sakkinen 2018-06-08 17:09 ` [PATCH v11 10/13] intel_sgx: driver for Intel Software Guard Extensions Jarkko Sakkinen 2018-06-08 17:09 ` Jarkko Sakkinen 2018-06-08 19:35 ` Dave Hansen 2018-06-19 13:29 ` Jarkko Sakkinen 2018-06-19 13:29 ` Jarkko Sakkinen 2018-06-08 17:09 ` [PATCH v11 11/13] intel_sgx: ptrace() support Jarkko Sakkinen 2018-06-08 17:09 ` Jarkko Sakkinen 2018-06-08 18:34 ` Dave Hansen 2018-06-11 15:02 ` Sean Christopherson 2018-06-19 13:38 ` Jarkko Sakkinen 2018-06-08 17:09 ` [PATCH v11 12/13] intel_sgx: driver documentation Jarkko Sakkinen 2018-06-08 17:09 ` Jarkko Sakkinen 2018-06-08 17:09 ` Jarkko Sakkinen 2018-06-08 18:32 ` Jethro Beekman 2018-06-19 13:30 ` Jarkko Sakkinen 2018-06-19 13:30 ` Jarkko Sakkinen 2018-06-08 21:41 ` Randy Dunlap 2018-06-08 21:41 ` Randy Dunlap 2018-06-19 13:31 ` Jarkko Sakkinen 2018-06-19 13:31 ` Jarkko Sakkinen 2018-06-08 17:09 ` [PATCH v11 13/13] intel_sgx: in-kernel launch enclave Jarkko Sakkinen 2018-06-08 17:09 ` Jarkko Sakkinen 2018-06-08 18:50 ` [intel-sgx-kernel-dev] " Andy Lutomirski 2018-06-19 15:05 ` Jarkko Sakkinen 2018-06-10 5:39 ` Andy Lutomirski 2018-06-11 5:17 ` Andy Lutomirski 2018-06-11 11:52 ` Neil Horman 2018-06-12 4:55 ` Andy Lutomirski 2018-06-12 17:45 ` Neil Horman 2018-06-18 21:58 ` Andy Lutomirski 2018-06-19 13:17 ` Neil Horman 2018-06-20 16:28 ` Nathaniel McCallum 2018-06-20 18:16 ` Jethro Beekman 2018-06-20 18:39 ` Jethro Beekman 2018-06-20 21:01 ` Sean Christopherson 2018-06-21 12:32 ` Nathaniel McCallum 2018-06-21 15:29 ` Neil Horman 2018-06-21 19:11 ` Nathaniel McCallum 2018-06-21 21:20 ` Sean Christopherson 2018-06-25 21:00 ` Nathaniel McCallum 2018-06-25 22:35 ` Sean Christopherson 2018-06-21 22:48 ` Andy Lutomirski 2018-06-25 21:06 ` Nathaniel McCallum 2018-06-25 23:40 ` Andy Lutomirski 2018-06-25 9:41 ` Jarkko Sakkinen 2018-06-25 15:45 ` Andy Lutomirski 2018-06-25 21:28 ` Nathaniel McCallum 2018-06-26 8:43 ` Jarkko Sakkinen 2018-06-26 15:01 ` Nathaniel McCallum 2018-06-27 15:31 ` Jarkko Sakkinen 2018-06-21 12:12 ` Nathaniel McCallum 2018-06-25 9:27 ` Jarkko Sakkinen 2018-06-25 21:26 ` Nathaniel McCallum 2018-06-20 7:23 ` Jarkko Sakkinen 2018-06-12 10:50 ` [PATCH v11 00/13] Intel SGX1 support Pavel Machek 2018-06-12 10:50 ` Pavel Machek 2018-06-19 14:59 ` Jarkko Sakkinen 2018-06-19 14:59 ` Jarkko Sakkinen 2018-06-19 14:59 ` Jarkko Sakkinen 2018-06-19 20:04 ` Pavel Machek 2018-06-19 20:04 ` Pavel Machek 2018-06-19 20:23 ` Peter Zijlstra 2018-06-19 20:23 ` Peter Zijlstra 2018-06-19 20:23 ` Peter Zijlstra 2018-06-19 20:23 ` Peter Zijlstra 2018-06-19 21:48 ` Josh Triplett 2018-06-19 21:48 ` Josh Triplett 2018-06-19 21:48 ` Josh Triplett 2018-06-19 21:48 ` Josh Triplett 2018-12-09 20:06 ` Pavel Machek 2018-12-09 20:06 ` Pavel Machek 2018-12-09 20:06 ` Pavel Machek 2018-12-09 20:06 ` Pavel Machek 2018-12-10 7:47 ` Josh Triplett 2018-12-10 7:47 ` Josh Triplett 2018-12-10 7:47 ` Josh Triplett 2018-12-10 7:47 ` Josh Triplett 2018-12-10 8:27 ` Pavel Machek 2018-12-10 8:27 ` Pavel Machek 2018-12-10 8:27 ` Pavel Machek 2018-12-10 8:27 ` Pavel Machek 2018-12-10 23:12 ` Josh Triplett 2018-12-10 23:12 ` Josh Triplett 2018-12-10 23:12 ` Josh Triplett 2018-12-10 23:12 ` Josh Triplett 2018-12-11 18:10 ` Dave Hansen 2018-12-11 18:10 ` Dave Hansen 2018-12-11 18:10 ` Dave Hansen 2018-12-11 18:10 ` Dave Hansen 2018-12-11 18:31 ` Sean Christopherson 2018-12-11 18:31 ` Sean Christopherson 2018-12-11 18:31 ` Sean Christopherson 2018-12-11 18:31 ` Sean Christopherson 2018-06-19 20:36 ` Peter Zijlstra 2018-06-19 20:36 ` Peter Zijlstra 2018-06-19 20:36 ` Peter Zijlstra 2018-06-19 20:36 ` Peter Zijlstra 2018-06-21 12:55 ` Ingo Molnar 2018-06-21 12:55 ` Ingo Molnar 2018-06-21 12:55 ` Ingo Molnar 2018-06-25 9:44 ` Jarkko Sakkinen 2018-06-25 9:44 ` Jarkko Sakkinen 2018-06-25 9:44 ` Jarkko Sakkinen
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20180608171216.26521-8-jarkko.sakkinen@linux.intel.com \ --to=jarkko.sakkinen@linux.intel.com \ --cc=ak@linux.intel.com \ --cc=dave.hansen@intel.com \ --cc=gregkh@linuxfoundation.org \ --cc=hpa@zytor.com \ --cc=intel-sgx-kernel-dev@lists.01.org \ --cc=kirill.shutemov@linux.intel.com \ --cc=linux-kernel@vger.kernel.org \ --cc=mingo@redhat.com \ --cc=nhorman@redhat.com \ --cc=npmccallum@redhat.com \ --cc=platform-driver-x86@vger.kernel.org \ --cc=rafael.j.wysocki@intel.com \ --cc=sean.j.christopherson@intel.com \ --cc=tglx@linutronix.de \ --cc=vikas.shivappa@linux.intel.com \ --cc=x86@kernel.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.