linux-sgx.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2019-05-15 10:35:31 to 2019-06-05 14:08:16 UTC [more...]

[RFC PATCH 0/9] security: x86/sgx: SGX vs. LSM
 2019-06-05 14:08 UTC  (64+ messages)
` [RFC PATCH 1/9] x86/sgx: Remove unused local variable in sgx_encl_release()
` [RFC PATCH 2/9] x86/sgx: Do not naturally align MAP_FIXED address
` [RFC PATCH 3/9] x86/sgx: Allow userspace to add multiple pages in single ioctl()
` [RFC PATCH 4/9] mm: Introduce vm_ops->mprotect()
` [RFC PATCH 5/9] x86/sgx: Restrict mapping without an enclave page to PROT_NONE
` [RFC PATCH 6/9] x86/sgx: Require userspace to provide allowed prots to ADD_PAGES
` [RFC PATCH 7/9] x86/sgx: Enforce noexec filesystem restriction for enclaves
` [RFC PATCH 8/9] LSM: x86/sgx: Introduce ->enclave_load() hook for Intel SGX
` [RFC PATCH 9/9] security/selinux: Add enclave_load() implementation

[PATCH v20 00/28] Intel SGX1 support
 2019-06-04 20:12 UTC  (6+ messages)
` [PATCH v20 15/28] x86/sgx: Add the Linux SGX Enclave Driver

[PATCH v20 00/28] Intel SGX1 support
 2019-06-04 11:39 UTC  (146+ messages)
                      ` SGX vs LSM (Re: [PATCH v20 00/28] Intel SGX1 support)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).