All of lore.kernel.org
 help / color / mirror / Atom feed
From: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
To: x86@kernel.org, platform-driver-x86@vger.kernel.org,
	linux-sgx@vger.kernel.org
Cc: dave.hansen@intel.com, sean.j.christopherson@intel.com,
	nhorman@redhat.com, npmccallum@redhat.com, serge.ayoun@intel.com,
	shay.katz-zamir@intel.com, haitao.huang@linux.intel.com,
	andriy.shevchenko@linux.intel.com, tglx@linutronix.de,
	kai.svahn@intel.com, mark.shanahan@intel.com,
	luto@amacapital.net, Dave Hansen <dave.hansen@linux.intel.com>,
	Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>,
	Andy Lutomirski <luto@kernel.org>,
	Peter Zijlstra <peterz@infradead.org>,
	Ingo Molnar <mingo@redhat.com>, Borislav Petkov <bp@alien8.de>,
	"H. Peter Anvin" <hpa@zytor.com>,
	linux-kernel@vger.kernel.org (open list:X86 MM)
Subject: [PATCH v17 08/23] x86/mm: x86/sgx: Signal SIGSEGV for userspace #PFs w/ PF_SGX
Date: Fri, 16 Nov 2018 03:01:15 +0200	[thread overview]
Message-ID: <20181116010412.23967-9-jarkko.sakkinen@linux.intel.com> (raw)
In-Reply-To: <20181116010412.23967-1-jarkko.sakkinen@linux.intel.com>

From: Sean Christopherson <sean.j.christopherson@intel.com>

The PF_SGX bit is set if and only if the #PF is detected by the SGX
Enclave Page Cache Map (EPCM).  The EPCM is a hardware-managed table
that enforces accesses to an enclave's EPC pages in addition to the
software-managed kernel page tables, i.e. the effective permissions
for an EPC page are a logical AND of the kernel's page tables and
the corresponding EPCM entry.

The EPCM is consulted only after an access walks the kernel's page
tables, i.e.:

  a. the access was allowed by the kernel
  b. the kernel's tables have become less restrictive than the EPCM
  c. the kernel cannot fixup the cause of the fault

Noteably, (b) implies that either the kernel has botched the EPC
mappings or the EPCM has been invalidated (see below).  Regardless of
why the fault occurred, userspace needs to be alerted so that it can
take appropriate action, e.g. restart the enclave.  This is reinforced
by (c) as the kernel doesn't really have any other reasonable option,
i.e. signalling SIGSEGV is actually the least severe action possible.

Although the primary purpose of the EPCM is to prevent a malicious or
compromised kernel from attacking an enclave, e.g. by modifying the
enclave's page tables, do not WARN on a #PF w/ PF_SGX set.  The SGX
architecture effectively allows the CPU to invalidate all EPCM entries
at will and requires that software be prepared to handle an EPCM fault
at any time.  The architecture defines this behavior because the EPCM
is encrypted with an ephemeral key that isn't exposed to software.  As
such, the EPCM entries cannot be preserved across transitions that
result in a new key being used, e.g. CPU power down as part of an S3
transition or when a VM is live migrated to a new physical system.

Cc: Andy Lutomirski <luto@amacapital.net>
Cc: Dave Hansen <dave.hansen@linux.intel.com>
Signed-off-by: Sean Christopherson <sean.j.christopherson@intel.com>
Signed-off-by: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
---
 arch/x86/mm/fault.c | 13 +++++++++++++
 1 file changed, 13 insertions(+)

diff --git a/arch/x86/mm/fault.c b/arch/x86/mm/fault.c
index 71d4b9d4d43f..eb8db2425b5b 100644
--- a/arch/x86/mm/fault.c
+++ b/arch/x86/mm/fault.c
@@ -1108,6 +1108,19 @@ access_error(unsigned long error_code, struct vm_area_struct *vma)
 	if (error_code & X86_PF_PK)
 		return 1;
 
+	/*
+	 * Access is blocked by the Enclave Page Cache Map (EPCM), i.e. the
+	 * access is allowed by the PTE but not the EPCM.  This usually happens
+	 * when the EPCM is yanked out from under us, e.g. by hardware after a
+	 * suspend/resume cycle.  In any case, software, i.e. the kernel, can't
+	 * fix the source of the fault as the EPCM can't be directly modified
+	 * by software.  Handle the fault as an access error in order to signal
+	 * userspace, e.g. so that userspace can rebuild their enclave(s), even
+	 * though userspace may not have actually violated access permissions.
+	 */
+	if (unlikely(error_code & X86_PF_SGX))
+		return 1;
+
 	/*
 	 * Make sure to check the VMA so that we do not perform
 	 * faults just to hit a X86_PF_PK as soon as we fill in a
-- 
2.19.1


WARNING: multiple messages have this Message-ID (diff)
From: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
To: x86@kernel.org, platform-driver-x86@vger.kernel.org,
	linux-sgx@vger.kernel.org
Cc: dave.hansen@intel.com, sean.j.christopherson@intel.com,
	nhorman@redhat.com, npmccallum@redhat.com, serge.ayoun@intel.com,
	shay.katz-zamir@intel.com, haitao.huang@linux.intel.com,
	andriy.shevchenko@linux.intel.com, tglx@linutronix.de,
	kai.svahn@intel.com, mark.shanahan@intel.com,
	luto@amacapital.net, Dave Hansen <dave.hansen@linux.intel.com>,
	Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>,
	Andy Lutomirski <luto@kernel.org>,
	Peter Zijlstra <peterz@infradead.org>,
	Ingo Molnar <mingo@redhat.com>, Borislav Petkov <bp@alien8.de>,
	"H. Peter Anvin" <hpa@zytor.com>,
	"open list:X86 MM" <linux-kernel@vger.kernel.org>
Subject: [PATCH v17 08/23] x86/mm: x86/sgx: Signal SIGSEGV for userspace #PFs w/ PF_SGX
Date: Fri, 16 Nov 2018 03:01:15 +0200	[thread overview]
Message-ID: <20181116010412.23967-9-jarkko.sakkinen@linux.intel.com> (raw)
In-Reply-To: <20181116010412.23967-1-jarkko.sakkinen@linux.intel.com>

From: Sean Christopherson <sean.j.christopherson@intel.com>

The PF_SGX bit is set if and only if the #PF is detected by the SGX
Enclave Page Cache Map (EPCM).  The EPCM is a hardware-managed table
that enforces accesses to an enclave's EPC pages in addition to the
software-managed kernel page tables, i.e. the effective permissions
for an EPC page are a logical AND of the kernel's page tables and
the corresponding EPCM entry.

The EPCM is consulted only after an access walks the kernel's page
tables, i.e.:

  a. the access was allowed by the kernel
  b. the kernel's tables have become less restrictive than the EPCM
  c. the kernel cannot fixup the cause of the fault

Noteably, (b) implies that either the kernel has botched the EPC
mappings or the EPCM has been invalidated (see below).  Regardless of
why the fault occurred, userspace needs to be alerted so that it can
take appropriate action, e.g. restart the enclave.  This is reinforced
by (c) as the kernel doesn't really have any other reasonable option,
i.e. signalling SIGSEGV is actually the least severe action possible.

Although the primary purpose of the EPCM is to prevent a malicious or
compromised kernel from attacking an enclave, e.g. by modifying the
enclave's page tables, do not WARN on a #PF w/ PF_SGX set.  The SGX
architecture effectively allows the CPU to invalidate all EPCM entries
at will and requires that software be prepared to handle an EPCM fault
at any time.  The architecture defines this behavior because the EPCM
is encrypted with an ephemeral key that isn't exposed to software.  As
such, the EPCM entries cannot be preserved across transitions that
result in a new key being used, e.g. CPU power down as part of an S3
transition or when a VM is live migrated to a new physical system.

Cc: Andy Lutomirski <luto@amacapital.net>
Cc: Dave Hansen <dave.hansen@linux.intel.com>
Signed-off-by: Sean Christopherson <sean.j.christopherson@intel.com>
Signed-off-by: Jarkko Sakkinen <jarkko.sakkinen@linux.intel.com>
---
 arch/x86/mm/fault.c | 13 +++++++++++++
 1 file changed, 13 insertions(+)

diff --git a/arch/x86/mm/fault.c b/arch/x86/mm/fault.c
index 71d4b9d4d43f..eb8db2425b5b 100644
--- a/arch/x86/mm/fault.c
+++ b/arch/x86/mm/fault.c
@@ -1108,6 +1108,19 @@ access_error(unsigned long error_code, struct vm_area_struct *vma)
 	if (error_code & X86_PF_PK)
 		return 1;
 
+	/*
+	 * Access is blocked by the Enclave Page Cache Map (EPCM), i.e. the
+	 * access is allowed by the PTE but not the EPCM.  This usually happens
+	 * when the EPCM is yanked out from under us, e.g. by hardware after a
+	 * suspend/resume cycle.  In any case, software, i.e. the kernel, can't
+	 * fix the source of the fault as the EPCM can't be directly modified
+	 * by software.  Handle the fault as an access error in order to signal
+	 * userspace, e.g. so that userspace can rebuild their enclave(s), even
+	 * though userspace may not have actually violated access permissions.
+	 */
+	if (unlikely(error_code & X86_PF_SGX))
+		return 1;
+
 	/*
 	 * Make sure to check the VMA so that we do not perform
 	 * faults just to hit a X86_PF_PK as soon as we fill in a
-- 
2.19.1

  parent reply	other threads:[~2018-11-16  1:06 UTC|newest]

Thread overview: 305+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
     [not found] <20181116010412.23967-1-jarkko.sakkinen@linux.intel.com>
2018-11-16  1:01 ` [PATCH v17 01/23] x86/sgx: Update MAINTAINERS Jarkko Sakkinen
2018-11-16  1:01   ` Jarkko Sakkinen
2018-11-16 14:22   ` Borislav Petkov
2018-11-16 15:07     ` Jarkko Sakkinen
2018-11-16 20:24       ` Borislav Petkov
2018-11-18  8:20         ` Jarkko Sakkinen
2018-11-16  1:01 ` [PATCH v17 02/23] x86/cpufeatures: Add Intel-defined SGX feature bit Jarkko Sakkinen
2018-11-16  1:01   ` Jarkko Sakkinen
2018-11-16 14:28   ` Borislav Petkov
2018-11-16 14:28     ` Borislav Petkov
2018-11-16 15:13     ` Jarkko Sakkinen
2018-11-16 15:13       ` Jarkko Sakkinen
2018-11-16 15:18       ` Jarkko Sakkinen
2018-11-16 15:18         ` Jarkko Sakkinen
2018-11-16 20:53         ` Borislav Petkov
2018-11-16 20:53           ` Borislav Petkov
2018-11-16  1:01 ` [PATCH v17 03/23] x86/cpufeatures: Add SGX sub-features (as Linux-defined bits) Jarkko Sakkinen
2018-11-16  1:01   ` Jarkko Sakkinen
2018-11-16 14:37   ` Borislav Petkov
2018-11-16 14:37     ` Borislav Petkov
2018-11-16 15:38     ` Sean Christopherson
2018-11-16 15:38       ` Sean Christopherson
2018-11-16 23:31   ` Dave Hansen
2018-11-16 23:31     ` Dave Hansen
2018-11-18  8:36     ` Jarkko Sakkinen
2018-11-18  8:36       ` Jarkko Sakkinen
2018-11-16  1:01 ` [PATCH v17 04/23] x86/msr: Add IA32_FEATURE_CONTROL.SGX_ENABLE definition Jarkko Sakkinen
2018-11-16  1:01   ` Jarkko Sakkinen
2018-11-16  1:01 ` [PATCH v17 05/23] x86/cpufeatures: Add Intel-defined SGX_LC feature bit Jarkko Sakkinen
2018-11-16  1:01   ` Jarkko Sakkinen
2018-11-16  1:01 ` [PATCH v17 06/23] x86/cpu/intel: Detect SGX support and update caps appropriately Jarkko Sakkinen
2018-11-16  1:01   ` Jarkko Sakkinen
2018-11-16 23:32   ` Dave Hansen
2018-11-16 23:32     ` Dave Hansen
2018-11-18  8:37     ` Jarkko Sakkinen
2018-11-18  8:37       ` Jarkko Sakkinen
2018-11-21 18:17   ` Borislav Petkov
2018-11-21 18:17     ` Borislav Petkov
2018-11-24 13:54     ` Jarkko Sakkinen
2018-11-24 13:54       ` Jarkko Sakkinen
2018-11-16  1:01 ` [PATCH v17 07/23] x86/mm: x86/sgx: Add new 'PF_SGX' page fault error code bit Jarkko Sakkinen
2018-11-16  1:01   ` Jarkko Sakkinen
2018-11-16 23:33   ` Dave Hansen
2018-11-16 23:33     ` Dave Hansen
2018-11-18  8:38     ` Jarkko Sakkinen
2018-11-18  8:38       ` Jarkko Sakkinen
2018-11-16  1:01 ` Jarkko Sakkinen [this message]
2018-11-16  1:01   ` [PATCH v17 08/23] x86/mm: x86/sgx: Signal SIGSEGV for userspace #PFs w/ PF_SGX Jarkko Sakkinen
2018-11-16  1:01 ` [PATCH v17 09/23] x86/sgx: Define SGX1 and SGX2 ENCLS leafs Jarkko Sakkinen
2018-11-16  1:01   ` Jarkko Sakkinen
2018-11-16  1:01 ` [PATCH v17 10/23] x86/sgx: Add ENCLS architectural error codes Jarkko Sakkinen
2018-11-16  1:01   ` Jarkko Sakkinen
2018-11-16  1:01 ` [PATCH v17 11/23] x86/sgx: Add SGX1 and SGX2 architectural data structures Jarkko Sakkinen
2018-11-16  1:01   ` Jarkko Sakkinen
2018-11-16  1:01 ` [PATCH v17 12/23] x86/sgx: Add definitions for SGX's CPUID leaf and variable sub-leafs Jarkko Sakkinen
2018-11-16  1:01   ` Jarkko Sakkinen
2018-11-16  1:01 ` [PATCH v17 13/23] x86/msr: Add SGX Launch Control MSR definitions Jarkko Sakkinen
2018-11-16  1:01   ` Jarkko Sakkinen
2018-11-16 17:29   ` Sean Christopherson
2018-11-16 17:29     ` Sean Christopherson
2018-11-18  8:19     ` Jarkko Sakkinen
2018-11-18  8:19       ` Jarkko Sakkinen
2018-11-16  1:01 ` [PATCH v17 14/23] x86/sgx: Add wrappers for ENCLS leaf functions Jarkko Sakkinen
2018-11-16  1:01   ` Jarkko Sakkinen
2018-11-16  1:01 ` [PATCH v17 15/23] x86/sgx: Enumerate and track EPC sections Jarkko Sakkinen
2018-11-16  1:01   ` Jarkko Sakkinen
2018-11-16  1:01 ` [PATCH v17 16/23] x86/sgx: Add functions to allocate and free EPC pages Jarkko Sakkinen
2018-11-16  1:01   ` Jarkko Sakkinen
2018-11-16  1:01 ` [PATCH v17 17/23] x86/sgx: Add sgx_einit() for initializing enclaves Jarkko Sakkinen
2018-11-16  1:01   ` Jarkko Sakkinen
2018-11-16  1:01 ` [PATCH v17 18/23] platform/x86: Intel SGX driver Jarkko Sakkinen
2018-11-16  1:01   ` Jarkko Sakkinen
2018-11-16  1:37   ` Randy Dunlap
2018-11-16  1:37     ` Randy Dunlap
2018-11-16 11:23     ` Jarkko Sakkinen
2018-11-16 11:23       ` Jarkko Sakkinen
2018-11-19 15:06   ` Jarkko Sakkinen
2018-11-19 15:06     ` Jarkko Sakkinen
2018-11-19 16:22     ` Jethro Beekman
2018-11-19 16:22       ` Jethro Beekman
2018-11-19 17:19       ` Jarkko Sakkinen
2018-11-19 17:19         ` Jarkko Sakkinen
2018-11-19 17:39         ` Jethro Beekman
2018-11-20 10:58           ` Jarkko Sakkinen
2018-11-21 15:24             ` Jarkko Sakkinen
2018-11-19 18:18         ` Andy Lutomirski
2018-11-19 18:18           ` Andy Lutomirski
2018-11-20 11:00           ` Jarkko Sakkinen
2018-11-20 11:00             ` Jarkko Sakkinen
2018-11-19 15:29   ` Andy Lutomirski
2018-11-19 16:19     ` Jarkko Sakkinen
2018-11-19 16:59       ` Andy Lutomirski
2018-11-20 12:04         ` Jarkko Sakkinen
2018-11-22 11:12           ` Dr. Greg
2018-11-22 15:21             ` Andy Lutomirski
2018-11-22 15:21               ` Andy Lutomirski
2018-11-24 17:21               ` Jarkko Sakkinen
2018-11-24 17:21                 ` Jarkko Sakkinen
2018-11-24 20:13                 ` Dr. Greg
2018-11-24 20:13                   ` Dr. Greg
2018-11-26 21:15                   ` Jarkko Sakkinen
2018-11-26 21:15                     ` Jarkko Sakkinen
2018-11-25 14:53                 ` Jarkko Sakkinen
2018-11-25 14:53                   ` Jarkko Sakkinen
2018-11-25 16:22                   ` Andy Lutomirski
2018-11-25 16:22                     ` Andy Lutomirski
2018-11-25 18:55                     ` Dr. Greg
2018-11-25 18:55                       ` Dr. Greg
2018-11-25 23:51                       ` Jarkko Sakkinen
     [not found]                       ` <D45BC005-5064-4C75-B486-4E43C454E2F6@amacapital.net>
2018-11-26  0:37                         ` Andy Lutomirski
2018-11-26  0:37                           ` Andy Lutomirski
2018-11-26 11:00                           ` Dr. Greg
2018-11-26 11:00                             ` Dr. Greg
2018-11-26 18:22                             ` Andy Lutomirski
2018-11-26 18:22                               ` Andy Lutomirski
2018-11-26 22:16                             ` Jarkko Sakkinen
2018-11-26 22:16                               ` Jarkko Sakkinen
2018-11-26 21:51                     ` Jarkko Sakkinen
2018-11-26 21:51                       ` Jarkko Sakkinen
2018-11-26 23:04                       ` Jarkko Sakkinen
2018-11-26 23:04                         ` Jarkko Sakkinen
2018-11-27  8:55                         ` Dr. Greg
2018-11-27  8:55                           ` Dr. Greg
2018-11-27 16:41                           ` Jarkko Sakkinen
2018-11-27 16:41                             ` Jarkko Sakkinen
2018-11-27 17:55                             ` Andy Lutomirski
2018-11-27 17:55                               ` Andy Lutomirski
2018-11-28 10:49                               ` Dr. Greg
2018-11-28 10:49                                 ` Dr. Greg
2018-11-28 19:22                                 ` Jarkko Sakkinen
2018-11-28 19:22                                   ` Jarkko Sakkinen
2018-12-10 10:49                                   ` Dr. Greg
2018-12-10 10:49                                     ` Dr. Greg
2018-12-12 18:00                                     ` Jarkko Sakkinen
2018-12-12 18:00                                       ` Jarkko Sakkinen
2018-12-14 23:59                                       ` Dr. Greg
2018-12-14 23:59                                         ` Dr. Greg
2018-12-15  0:06                                         ` Sean Christopherson
2018-12-15  0:06                                           ` Sean Christopherson
2018-12-15 23:22                                           ` Dr. Greg
2018-12-15 23:22                                             ` Dr. Greg
2018-12-17 14:27                                             ` Sean Christopherson
2018-12-17 14:27                                               ` Sean Christopherson
2018-12-17 13:28                                           ` Jarkko Sakkinen
2018-12-17 13:28                                             ` Jarkko Sakkinen
2018-12-17 13:39                                             ` Jarkko Sakkinen
2018-12-17 13:39                                               ` Jarkko Sakkinen
2018-12-17 14:08                                               ` Jarkko Sakkinen
2018-12-17 14:08                                                 ` Jarkko Sakkinen
2018-12-17 14:13                                                 ` Jarkko Sakkinen
2018-12-17 14:13                                                   ` Jarkko Sakkinen
2018-12-17 16:34                                                   ` Dr. Greg
2018-12-17 16:34                                                     ` Dr. Greg
2018-12-17 17:31                                                 ` Sean Christopherson
2018-12-17 17:31                                                   ` Sean Christopherson
2018-12-17 17:49                                                   ` Jarkko Sakkinen
2018-12-17 17:49                                                     ` Jarkko Sakkinen
2018-12-17 18:09                                                     ` Sean Christopherson
2018-12-17 18:09                                                       ` Sean Christopherson
2018-12-17 18:23                                                       ` Jarkko Sakkinen
2018-12-17 18:23                                                         ` Jarkko Sakkinen
2018-12-17 18:46                                                         ` Sean Christopherson
2018-12-17 18:46                                                           ` Sean Christopherson
2018-12-17 19:36                                                           ` Jarkko Sakkinen
2018-12-17 19:36                                                             ` Jarkko Sakkinen
2018-11-27 16:46                           ` Jarkko Sakkinen
2018-11-27 16:46                             ` Jarkko Sakkinen
2018-11-28 21:52                           ` Andy Lutomirski
2018-11-28 21:52                             ` Andy Lutomirski
2018-11-27  7:46                       ` Jethro Beekman
2018-11-27 16:36                         ` Jarkko Sakkinen
2018-11-22 20:56             ` Andy Lutomirski
2018-11-22 20:56               ` Andy Lutomirski
2018-11-23 10:39               ` Dr. Greg
2018-11-23 10:39                 ` Dr. Greg
2018-11-24 16:45                 ` Jarkko Sakkinen
2018-11-24 16:45                   ` Jarkko Sakkinen
2018-11-28  5:08                   ` Jarkko Sakkinen
2018-11-28  5:08                     ` Jarkko Sakkinen
2018-11-28  5:38                     ` Jethro Beekman
2018-12-09 17:01         ` Pavel Machek
2018-12-09 17:01           ` Pavel Machek
2018-11-20 11:15     ` Dr. Greg
2018-11-20 11:15       ` Dr. Greg
2018-11-24 16:15       ` Jarkko Sakkinen
2018-11-24 19:24         ` Dr. Greg
2018-11-26 19:39           ` Jarkko Sakkinen
2018-12-09 17:01     ` Pavel Machek
2018-12-09 17:01       ` Pavel Machek
2018-12-10 14:46       ` Dr. Greg
2018-12-10 14:46         ` Dr. Greg
2018-12-17 17:45   ` Dave Hansen
2018-12-17 17:45     ` Dave Hansen
2018-12-17 18:01     ` Jarkko Sakkinen
2018-12-17 18:01       ` Jarkko Sakkinen
2018-12-17 18:07       ` Dave Hansen
2018-12-17 18:07         ` Dave Hansen
2018-12-17 18:31         ` Jarkko Sakkinen
2018-12-17 18:31           ` Jarkko Sakkinen
2018-12-17 18:36       ` Sean Christopherson
2018-12-17 18:36         ` Sean Christopherson
2018-12-17 18:43         ` Jarkko Sakkinen
2018-12-17 18:43           ` Jarkko Sakkinen
2018-12-17 18:47           ` Dave Hansen
2018-12-17 18:47             ` Dave Hansen
2018-12-17 19:12             ` Andy Lutomirski
2018-12-17 19:12               ` Andy Lutomirski
2018-12-17 19:17               ` Dave Hansen
2018-12-17 19:17                 ` Dave Hansen
2018-12-17 19:25                 ` Andy Lutomirski
2018-12-17 19:25                   ` Andy Lutomirski
2018-12-17 19:54                   ` Jarkko Sakkinen
2018-12-17 19:54                     ` Jarkko Sakkinen
2018-12-17 19:49                 ` Jarkko Sakkinen
2018-12-17 19:49                   ` Jarkko Sakkinen
2018-12-17 19:53                   ` Dave Hansen
2018-12-17 19:53                     ` Dave Hansen
2018-12-17 19:55                     ` Andy Lutomirski
2018-12-17 19:55                       ` Andy Lutomirski
2018-12-17 20:03                       ` Dave Hansen
2018-12-17 20:03                         ` Dave Hansen
2018-12-17 20:10                         ` Andy Lutomirski
2018-12-17 20:10                           ` Andy Lutomirski
2018-12-17 20:15                           ` Dave Hansen
2018-12-17 20:15                             ` Dave Hansen
2018-12-17 22:36                             ` Sean Christopherson
2018-12-17 22:36                               ` Sean Christopherson
2018-12-18  1:40                           ` Jarkko Sakkinen
2018-12-18  1:40                             ` Jarkko Sakkinen
2018-12-17 22:20               ` Sean Christopherson
2018-12-17 22:20                 ` Sean Christopherson
2018-12-18  1:39                 ` Jarkko Sakkinen
2018-12-18  1:39                   ` Jarkko Sakkinen
2018-12-18  3:27                   ` Jarkko Sakkinen
2018-12-18  3:27                     ` Jarkko Sakkinen
2018-12-18  5:02                     ` Andy Lutomirski
2018-12-18  5:02                       ` Andy Lutomirski
2018-12-18 13:27                       ` Jarkko Sakkinen
2018-12-18 13:27                         ` Jarkko Sakkinen
2018-12-18  4:55                   ` Andy Lutomirski
2018-12-18  4:55                     ` Andy Lutomirski
2018-12-18 13:18                     ` Jarkko Sakkinen
2018-12-18 13:18                       ` Jarkko Sakkinen
2018-12-18  4:59                 ` Andy Lutomirski
2018-12-18  4:59                   ` Andy Lutomirski
2018-12-18 13:11                   ` Jarkko Sakkinen
2018-12-18 13:11                     ` Jarkko Sakkinen
2018-12-18 15:44                   ` Sean Christopherson
2018-12-18 15:44                     ` Sean Christopherson
2018-12-18 18:53                     ` Sean Christopherson
2018-12-18 18:53                       ` Sean Christopherson
2018-12-19  5:00                       ` Jarkko Sakkinen
2018-12-19  5:00                         ` Jarkko Sakkinen
2018-12-19  5:13                         ` Jarkko Sakkinen
2018-12-19  5:13                           ` Jarkko Sakkinen
2018-12-21 18:28                         ` Sean Christopherson
2018-12-21 18:28                           ` Sean Christopherson
2018-12-22  0:01                           ` Jarkko Sakkinen
2018-12-22  0:01                             ` Jarkko Sakkinen
2018-12-19  4:47                     ` Jarkko Sakkinen
2018-12-19  4:47                       ` Jarkko Sakkinen
2018-12-19  5:24                       ` Jarkko Sakkinen
2018-12-19  5:24                         ` Jarkko Sakkinen
2018-12-18  1:17               ` Jarkko Sakkinen
2018-12-18  1:17                 ` Jarkko Sakkinen
2018-12-18  1:31                 ` Jarkko Sakkinen
2018-12-18  1:31                   ` Jarkko Sakkinen
2018-12-17 18:48           ` Sean Christopherson
2018-12-17 18:48             ` Sean Christopherson
2018-12-17 19:09             ` Dave Hansen
2018-12-17 19:09               ` Dave Hansen
2018-12-17 19:37               ` Jarkko Sakkinen
2018-12-17 19:37                 ` Jarkko Sakkinen
2018-12-17 19:40                 ` Dave Hansen
2018-12-17 19:40                   ` Dave Hansen
2018-12-17 19:33             ` Jarkko Sakkinen
2018-12-17 19:33               ` Jarkko Sakkinen
2018-12-17 20:21               ` Jarkko Sakkinen
2018-12-17 20:21                 ` Jarkko Sakkinen
2018-12-18 13:13                 ` Jarkko Sakkinen
2018-12-18 13:13                   ` Jarkko Sakkinen
2018-12-18 15:46                   ` Sean Christopherson
2018-12-18 15:46                     ` Sean Christopherson
2018-12-18  5:55   ` Andy Lutomirski
2018-12-18  5:55     ` Andy Lutomirski
2018-12-19  5:22     ` Jarkko Sakkinen
2018-12-19  5:22       ` Jarkko Sakkinen
2018-11-16  1:01 ` [PATCH v17 19/23] platform/x86: sgx: Add swapping functionality to the " Jarkko Sakkinen
2018-11-16  1:01   ` Jarkko Sakkinen
2018-11-16  1:01 ` [PATCH v17 20/23] x86/sgx: Add a simple swapper for the EPC memory manager Jarkko Sakkinen
2018-11-16  1:01   ` Jarkko Sakkinen
2018-11-16  1:01 ` [PATCH v17 21/23] platform/x86: ptrace() support for the SGX driver Jarkko Sakkinen
2018-11-16  1:01   ` Jarkko Sakkinen
2018-11-16  1:01 ` [PATCH v17 22/23] x86/sgx: SGX documentation Jarkko Sakkinen
2018-11-16  1:01   ` Jarkko Sakkinen
2018-12-03  3:28   ` Randy Dunlap
2018-12-03  9:32     ` Jarkko Sakkinen
2018-11-16  1:01 ` [PATCH v17 23/23] selftests/x86: Add a selftest for SGX Jarkko Sakkinen
2018-11-16  1:01   ` Jarkko Sakkinen
2018-11-16  1:01   ` jarkko.sakkinen
2018-11-16  1:01   ` Jarkko Sakkinen
2018-11-16 11:17 ` [PATCH v17 00/23] Intel SGX1 support Jarkko Sakkinen
2018-11-16 11:17   ` Jarkko Sakkinen
2018-11-16 11:17   ` jarkko.sakkinen
2018-11-16 11:17   ` Jarkko Sakkinen

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20181116010412.23967-9-jarkko.sakkinen@linux.intel.com \
    --to=jarkko.sakkinen@linux.intel.com \
    --cc=andriy.shevchenko@linux.intel.com \
    --cc=bp@alien8.de \
    --cc=dave.hansen@intel.com \
    --cc=dave.hansen@linux.intel.com \
    --cc=haitao.huang@linux.intel.com \
    --cc=hpa@zytor.com \
    --cc=kai.svahn@intel.com \
    --cc=linux-kernel@vger.kernel.org \
    --cc=linux-sgx@vger.kernel.org \
    --cc=luto@amacapital.net \
    --cc=luto@kernel.org \
    --cc=mark.shanahan@intel.com \
    --cc=mingo@redhat.com \
    --cc=nhorman@redhat.com \
    --cc=npmccallum@redhat.com \
    --cc=peterz@infradead.org \
    --cc=platform-driver-x86@vger.kernel.org \
    --cc=sean.j.christopherson@intel.com \
    --cc=serge.ayoun@intel.com \
    --cc=shay.katz-zamir@intel.com \
    --cc=tglx@linutronix.de \
    --cc=x86@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.