linux-sgx.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2020-11-18 17:19:54 to 2021-01-12 18:37:04 UTC [more...]

[PATCH v3] x86/sgx: Synchronize encl->srcu in sgx_encl_release()
 2021-01-12 18:35 UTC  (6+ messages)

[RFC PATCH 00/23] KVM SGX virtualization support
 2021-01-12 17:51 UTC  (97+ messages)
` [RFC PATCH 01/23] x86/sgx: Split out adding EPC page to free list to separate helper
` [RFC PATCH 02/23] x86/sgx: Add enum for SGX_CHILD_PRESENT error code
` [RFC PATCH 03/23] x86/sgx: Introduce virtual EPC for use by KVM guests
` [RFC PATCH 04/23] x86/cpufeatures: Add SGX1 and SGX2 sub-features
` [RFC PATCH 05/23] x86/cpu/intel: Allow SGX virtualization without Launch Control support
` [RFC PATCH 06/23] x86/sgx: Expose SGX architectural definitions to the kernel
` [RFC PATCH 07/23] x86/sgx: Move ENCLS leaf definitions to sgx_arch.h
` [RFC PATCH 08/23] x86/sgx: Add SGX2 ENCLS leaf definitions (EAUG, EMODPR and EMODT)
` [RFC PATCH 09/23] x86/sgx: Add encls_faulted() helper
` [RFC PATCH 10/23] x86/sgx: Add helper to update SGX_LEPUBKEYHASHn MSRs
` [RFC PATCH 11/23] x86/sgx: Add helpers to expose ECREATE and EINIT to KVM
` [RFC PATCH 12/23] x86/sgx: Move provisioning device creation out of SGX driver
` [RFC PATCH 13/23] KVM: VMX: Convert vcpu_vmx.exit_reason to a union
` [RFC PATCH 14/23] KVM: x86: Export kvm_mmu_gva_to_gpa_{read,write}() for SGX (VMX)
` [RFC PATCH 15/23] KVM: x86: Define new #PF SGX error code bit
` [RFC PATCH 16/23] KVM: x86: Add SGX feature leaf to reverse CPUID lookup
` [RFC PATCH 17/23] KVM: VMX: Add basic handling of VM-Exit from SGX enclave
` [RFC PATCH 18/23] KVM: VMX: Frame in ENCLS handler for SGX virtualization
` [RFC PATCH 19/23] KVM: VMX: Add SGX ENCLS[ECREATE] handler to enforce CPUID restrictions
` [RFC PATCH 20/23] KVM: VMX: Add emulation of SGX Launch Control LE hash MSRs
` [RFC PATCH 21/23] KVM: VMX: Add ENCLS[EINIT] handler to support SGX Launch Control (LC)
` [RFC PATCH 22/23] KVM: VMX: Enable SGX virtualization for SGX1, SGX2 and LC
` [RFC PATCH 23/23] KVM: x86: Add capability to grant VM access to privileged SGX attribute

[PATCH 0/2] x86/sgx: Take away EREMOVE from sgx_free_epc_page()
 2021-01-11 22:36 UTC  (3+ messages)
` [PATCH 1/2] x86/sgx: Remove a warn "
` [PATCH 2/2] x86/sgx: Wipe out EREMOVE "

Creating executable device nodes in /dev?
 2020-12-22 22:14 UTC  (31+ messages)
              ` Antw: [EXT] Re: [systemd-devel] "
                    `  "

[PATCH v2] sgx.7: New page with overview of Software Guard eXtensions (SGX)
 2020-12-22 18:53 UTC  (2+ messages)

[PATCH] sgx.7: New page with overview of Software Guard eXtensions (SGX)
 2020-12-18 12:51 UTC  (13+ messages)

[PATCH RFC] x86/sgx: Add trivial NUMA allocation
 2020-12-16 13:50 UTC 

[PATCH] x86/sgx: Synchronize encl->srcu in sgx_encl_release()
 2020-12-16 12:25 UTC  (8+ messages)

[PATCH] x86/sgx: Synchronize encl->srcu in sgx_encl_release()
 2020-12-15 21:40 UTC 

[PATCH v41 00/24] Intel SGX foundations
 2020-12-15 15:58 UTC  (4+ messages)

Away next week (51)
 2020-12-11 13:05 UTC 

[PATCH] x86/sgx: Return -EINVAL on a zero length buffer in sgx_ioc_enclave_add_pages()
 2020-12-04  5:19 UTC  (2+ messages)

[PATCH] x86/sgx: Initialize "ret" in sgx_ioc_enclave_add_pages()
 2020-12-03 18:24 UTC  (3+ messages)

[PATCH 0/2] Fix some kernel-doc markups with wrong identifiers
 2020-12-02 16:24 UTC  (4+ messages)
` [PATCH 1/2] asm: sgx.h: fix a typo on a kernel-doc markup

[bug report] x86/sgx: Add SGX_IOC_ENCLAVE_ADD_PAGES
 2020-12-02 16:23 UTC  (2+ messages)

[PATCH v40 00/24] Intel SGX foundations
 2020-11-24 21:57 UTC  (19+ messages)
` [PATCH v40 10/24] mm: Add 'mprotect' hook to struct vm_operations_struct

[PATCH] selftests/x86: Fix malformed src_offset initialization
 2020-11-19 18:04 UTC  (11+ messages)

[PATCH 2/4] x86/sgx: Put enclaves into anonymous files
 2020-11-19 16:09 UTC  (4+ messages)

[PATCH,RESEND] x86/sgx: Return -ERESTARTSYS in sgx_ioc_enclave_add_pages()
 2020-11-18 21:39 UTC 

[PATCH] x86/sgx: Return -ERESTARTSYS in sgx_ioc_enclave_add_pages()
 2020-11-18 20:38 UTC 


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).