Show patches with: State = Action Required       |   790 patches
« 1 2 3 47 8 »
Patch Series A/R/T S/W/F Date Submitter Delegate State
[v21,12/28] x86/sgx: Enumerate and track EPC sections Intel SGX foundations - - - 0 0 0 2019-07-13 Jarkko Sakkinen New
[v21,11/28] x86/sgx: Add wrappers for ENCLS leaf functions Intel SGX foundations - - - 0 0 0 2019-07-13 Jarkko Sakkinen New
[v21,10/28] x86/sgx: Add SGX1 and SGX2 architectural data structures Intel SGX foundations - - - 0 0 0 2019-07-13 Jarkko Sakkinen New
[v21,09/28] x86/sgx: Add ENCLS architectural error codes Intel SGX foundations - - - 0 0 0 2019-07-13 Jarkko Sakkinen New
[v21,08/28] x86/cpu/intel: Detect SGX support and update caps appropriately Intel SGX foundations - - - 0 0 0 2019-07-13 Jarkko Sakkinen New
[v21,07/28] x86/mm: x86/sgx: Signal SIGSEGV for userspace #PFs w/ PF_SGX Intel SGX foundations - - - 0 0 0 2019-07-13 Jarkko Sakkinen New
[v21,06/28] x86/mm: x86/sgx: Add new 'PF_SGX' page fault error code bit Intel SGX foundations - - - 0 0 0 2019-07-13 Jarkko Sakkinen New
[v21,05/28] x86/msr: Add SGX Launch Control MSR definitions Intel SGX foundations - - - 0 0 0 2019-07-13 Jarkko Sakkinen New
[v21,04/28] x86/cpufeatures: Add Intel-defined SGX_LC feature bit Intel SGX foundations - - - 0 0 0 2019-07-13 Jarkko Sakkinen New
[v21,03/28] x86/msr: Add IA32_FEATURE_CONTROL.SGX_ENABLE definition Intel SGX foundations - - - 0 0 0 2019-07-13 Jarkko Sakkinen New
[v21,02/28] x86/cpufeatures: Add SGX sub-features (as Linux-defined bits) Intel SGX foundations - - - 0 0 0 2019-07-13 Jarkko Sakkinen New
[v21,01/28] x86/cpufeatures: Add Intel-defined SGX feature bit Intel SGX foundations - 1 - 0 0 0 2019-07-13 Jarkko Sakkinen New
[RFC,v4,3/3] selftests/x86/sgx: Augment SGX selftest to test vDSO API x86/sgx: Amend vDSO API to allow enclave/host parameter passing on untrusted stack - - - 0 0 0 2019-07-13 Xing, Cedric New
[RFC,v4,2/3] x86/vdso: Modify __vdso_sgx_enter_enclave() to allow parameter passing on untrusted ... x86/sgx: Amend vDSO API to allow enclave/host parameter passing on untrusted stack - - - 0 0 0 2019-07-13 Xing, Cedric New
[RFC,v4,1/3] selftests/x86/sgx: Fix Makefile for SGX selftest x86/sgx: Amend vDSO API to allow enclave/host parameter passing on untrusted stack - - - 0 0 0 2019-07-13 Xing, Cedric New
x86/sgx: Use a loop to release mm_struct's in sgx_release() x86/sgx: Use a loop to release mm_struct's in sgx_release() - - - 0 0 0 2019-07-12 Jarkko Sakkinen New
[for_v21] x86/sgx: Return error from driver init if launch control isn't supported [for_v21] x86/sgx: Return error from driver init if launch control isn't supported - - - 0 0 0 2019-07-12 Sean Christopherson New
[for_v21] x86/sgx: Provide stub for sgx_drv_init when driver is disabled [for_v21] x86/sgx: Provide stub for sgx_drv_init when driver is disabled - - - 0 0 0 2019-07-12 Sean Christopherson New
[for_v21] x86/sgx: Flush work if and only if the work struct has been init'd [for_v21] x86/sgx: Flush work if and only if the work struct has been init'd - - - 0 0 0 2019-07-12 Sean Christopherson New
[for_v21,v2,2/2] x86/sgx: Use mmu_notifier.release() instead of per-vma refcounting x86/sgx: Use SRCU and mmu_notifier - - - 0 0 0 2019-07-12 Sean Christopherson New
[for_v21,v2,1/2] x86/sgx: Use SRCU to protect mm_list during reclaim x86/sgx: Use SRCU and mmu_notifier - - - 0 0 0 2019-07-12 Sean Christopherson New
[for_v21] x86/vdso: Do not attempt to fixup #DB or #BP exceptions [for_v21] x86/vdso: Do not attempt to fixup #DB or #BP exceptions 1 - - 0 0 0 2019-07-11 Sean Christopherson New
[for_v21] docs: x86/sgx: Add a blurb on basic EPC management to 'kernel internals' [for_v21] docs: x86/sgx: Add a blurb on basic EPC management to 'kernel internals' 1 - - 0 0 0 2019-07-11 Sean Christopherson New
[for_v21] x86/sgx: Annotate SGX driver init functions with __init [for_v21] x86/sgx: Annotate SGX driver init functions with __init - - - 0 0 0 2019-07-11 Sean Christopherson New
[for_v21,2/2] x86/sgx: Use mmu_notifier.release() instead of per-vma refcounting x86/sgx: Use SRCU and mmu_notifier 1 - - 0 0 0 2019-07-11 Sean Christopherson New
[for_v21,1/2] x86/sgx: Use SRCU to protect mm_list during reclaim x86/sgx: Use SRCU and mmu_notifier 1 - - 0 0 0 2019-07-11 Sean Christopherson New
[RFC,v3,3/3] selftests/x86: Augment SGX selftest to test new __vdso_sgx_enter_enclave() and its c... x86/sgx: Amend vDSO API to allow enclave/host parameter passing on untrusted stack - - - 0 0 0 2019-07-11 Xing, Cedric New
[RFC,v3,2/3] x86/vdso: Modify __vdso_sgx_enter_enclave() to allow parameter passing on untrusted ... x86/sgx: Amend vDSO API to allow enclave/host parameter passing on untrusted stack - - - 0 0 0 2019-07-11 Xing, Cedric New
[RFC,v3,1/3] selftests/x86: Fixed Makefile for SGX selftest x86/sgx: Amend vDSO API to allow enclave/host parameter passing on untrusted stack - - - 0 0 0 2019-07-11 Xing, Cedric New
[RFC,v3,4/4] x86/sgx: Implement SGX specific hooks in SELinux security/x86/sgx: SGX specific LSM hooks - - - 0 0 0 2019-07-07 Xing, Cedric New
[RFC,v3,3/4] X86/sgx: Introduce EMA as a new LSM module security/x86/sgx: SGX specific LSM hooks - - - 0 0 0 2019-07-07 Xing, Cedric New
[RFC,v3,2/4] x86/64: Call LSM hooks from SGX subsystem/module security/x86/sgx: SGX specific LSM hooks - - - 0 0 0 2019-07-07 Xing, Cedric New
[RFC,v3,1/4] x86/sgx: Add SGX specific LSM hooks security/x86/sgx: SGX specific LSM hooks - - - 0 0 0 2019-07-07 Xing, Cedric New
[RFC,v2,3/3] x86/sgx: Implement SGX specific hooks in SELinux security/x86/sgx: SGX specific LSM hooks - - - 0 0 0 2019-06-27 Xing, Cedric New
[RFC,v2,2/3] x86/sgx: Call LSM hooks from SGX subsystem/module security/x86/sgx: SGX specific LSM hooks - - - 0 0 0 2019-06-27 Xing, Cedric New
[RFC,v2,1/3] x86/sgx: Add SGX specific LSM hooks security/x86/sgx: SGX specific LSM hooks - - - 0 0 0 2019-06-27 Xing, Cedric New
[RFC,v4,12/12] LSM: x86/sgx: Show line of sight to LSM support SGX2's EAUG security: x86/sgx: SGX vs. LSM - - - 0 0 0 2019-06-19 Sean Christopherson New
[RFC,v4,11/12] security/apparmor: Add enclave_load() implementation security: x86/sgx: SGX vs. LSM - - - 0 0 0 2019-06-19 Sean Christopherson New
[RFC,v4,10/12] security/selinux: Add enclave_load() implementation security: x86/sgx: SGX vs. LSM - - - 0 0 0 2019-06-19 Sean Christopherson New
[RFC,v4,09/12] LSM: x86/sgx: Introduce ->enclave_load() hook for Intel SGX security: x86/sgx: SGX vs. LSM - - - 0 0 0 2019-06-19 Sean Christopherson New
[RFC,v4,08/12] security/selinux: Require SGX_MAPWX to map enclave page WX security: x86/sgx: SGX vs. LSM - - - 0 0 0 2019-06-19 Sean Christopherson New
[RFC,v4,07/12] LSM: x86/sgx: Introduce ->enclave_map() hook for Intel SGX security: x86/sgx: SGX vs. LSM - - - 0 0 0 2019-06-19 Sean Christopherson New
[RFC,v4,06/12] mm: Introduce vm_ops->may_mprotect() security: x86/sgx: SGX vs. LSM - - - 0 0 0 2019-06-19 Sean Christopherson New
[RFC,v4,05/12] x86/sgx: Enforce noexec filesystem restriction for enclaves security: x86/sgx: SGX vs. LSM - - - 0 0 0 2019-06-19 Sean Christopherson New
[RFC,v4,04/12] x86/sgx: Require userspace to define enclave pages' protection bits security: x86/sgx: SGX vs. LSM - - - 0 0 0 2019-06-19 Sean Christopherson New
[RFC,v4,03/12] selftests: x86/sgx: Mark the enclave loader as not needing an exec stack security: x86/sgx: SGX vs. LSM - - - 0 0 0 2019-06-19 Sean Christopherson New
[RFC,v4,02/12] x86/sgx: Do not naturally align MAP_FIXED address security: x86/sgx: SGX vs. LSM - - - 0 0 0 2019-06-19 Sean Christopherson New
[RFC,v4,01/12] x86/sgx: Use mmu_notifier.release() instead of per-vma refcounting security: x86/sgx: SGX vs. LSM - - - 0 0 0 2019-06-19 Sean Christopherson New
[RFC] x86/sgx: Use mmu_notifier.release() instead of per-vma refcounting [RFC] x86/sgx: Use mmu_notifier.release() instead of per-vma refcounting - - - 0 0 0 2019-06-19 Sean Christopherson New
x86/sgx: rip off the refcount from sgx_encl_add_page flow x86/sgx: rip off the refcount from sgx_encl_add_page flow - - - 0 0 0 2019-06-19 Jarkko Sakkinen New
[RFC,v3,12/12] LSM: x86/sgx: Show line of sight to LSM support SGX2's EAUG security: x86/sgx: SGX vs. LSM, round 3 - - - 0 0 0 2019-06-17 Sean Christopherson New
[RFC,v3,11/12] security/apparmor: Add enclave_load() implementation security: x86/sgx: SGX vs. LSM, round 3 - - - 0 0 0 2019-06-17 Sean Christopherson New
[RFC,v3,10/12] security/selinux: Add enclave_load() implementation security: x86/sgx: SGX vs. LSM, round 3 - - - 0 0 0 2019-06-17 Sean Christopherson New
[RFC,v3,09/12] LSM: x86/sgx: Introduce ->enclave_load() hook for Intel SGX security: x86/sgx: SGX vs. LSM, round 3 - - - 0 0 0 2019-06-17 Sean Christopherson New
[RFC,v3,08/12] security/selinux: Require SGX_EXECMEM to map enclave page WX security: x86/sgx: SGX vs. LSM, round 3 - - - 0 0 0 2019-06-17 Sean Christopherson New
[RFC,v3,07/12] LSM: x86/sgx: Introduce ->enclave_map() hook for Intel SGX security: x86/sgx: SGX vs. LSM, round 3 - - - 0 0 0 2019-06-17 Sean Christopherson New
[RFC,v3,06/12] mm: Introduce vm_ops->may_mprotect() security: x86/sgx: SGX vs. LSM, round 3 - - - 0 0 0 2019-06-17 Sean Christopherson New
[RFC,v3,05/12] x86/sgx: Enforce noexec filesystem restriction for enclaves security: x86/sgx: SGX vs. LSM, round 3 - - - 0 0 0 2019-06-17 Sean Christopherson New
[RFC,v3,04/12] x86/sgx: Require userspace to define enclave pages' protection bits security: x86/sgx: SGX vs. LSM, round 3 - - - 0 0 0 2019-06-17 Sean Christopherson New
[RFC,v3,03/12] selftests: x86/sgx: Mark the enclave loader as not needing an exec stack security: x86/sgx: SGX vs. LSM, round 3 - - - 0 0 0 2019-06-17 Sean Christopherson New
[RFC,v3,02/12] x86/sgx: Do not naturally align MAP_FIXED address security: x86/sgx: SGX vs. LSM, round 3 - - - 0 0 0 2019-06-17 Sean Christopherson New
[RFC,v3,01/12] x86/sgx: Add mm to enclave at mmap() security: x86/sgx: SGX vs. LSM, round 3 - - - 0 0 0 2019-06-17 Sean Christopherson New
[RFC] x86/sgx: Check that the address is within ELRANGE [RFC] x86/sgx: Check that the address is within ELRANGE - - - 0 0 0 2019-06-13 Jarkko Sakkinen New
[RFC] x86/sgx: Do not increase encl->refcount for VMAs [RFC] x86/sgx: Do not increase encl->refcount for VMAs - - - 0 0 0 2019-06-13 Jarkko Sakkinen New
[RFC] x86/sgx: Do not increase encl->refcount for VMAs [RFC] x86/sgx: Do not increase encl->refcount for VMAs - - - 0 0 0 2019-06-13 Jarkko Sakkinen New
[RFC,v1,3/3] LSM/x86/sgx: Call new LSM hooks from SGX subsystem security/x86/sgx: SGX specific LSM hooks - - - 0 0 0 2019-06-10 Xing, Cedric New
[RFC,v1,2/3] LSM/x86/sgx: Implement SGX specific hooks in SELinux security/x86/sgx: SGX specific LSM hooks - - - 0 0 0 2019-06-10 Xing, Cedric New
[RFC,v1,1/3] LSM/x86/sgx: Add SGX specific LSM hooks security/x86/sgx: SGX specific LSM hooks - - - 0 0 0 2019-06-10 Xing, Cedric New
[RFC,v2,5/5] security/selinux: Add enclave_load() implementation security: x86/sgx: SGX vs. LSM - - - 0 0 0 2019-06-06 Sean Christopherson New
[RFC,v2,4/5] LSM: x86/sgx: Introduce ->enclave_load() hook for Intel SGX security: x86/sgx: SGX vs. LSM - - - 0 0 0 2019-06-06 Sean Christopherson New
[RFC,v2,3/5] x86/sgx: Enforce noexec filesystem restriction for enclaves security: x86/sgx: SGX vs. LSM - - - 0 0 0 2019-06-06 Sean Christopherson New
[RFC,v2,2/5] x86/sgx: Require userspace to define enclave pages' protection bits security: x86/sgx: SGX vs. LSM - - - 0 0 0 2019-06-06 Sean Christopherson New
[RFC,v2,1/5] mm: Introduce vm_ops->may_mprotect() security: x86/sgx: SGX vs. LSM - - - 0 0 0 2019-06-06 Sean Christopherson New
[7/7] x86/sgx: Add a reserved field to sgx_enclave_add_region to drop 'packed' x86/sgx: Clean up and enhance add pages ioctl - - - 0 0 0 2019-06-05 Sean Christopherson New
[6/7] x86/sgx: Use the actual zero page as the source when adding zero pages x86/sgx: Clean up and enhance add pages ioctl - - - 0 0 0 2019-06-05 Sean Christopherson New
[5/7] x86/sgx: Add flag to zero added region instead of copying from source x86/sgx: Clean up and enhance add pages ioctl - - - 0 0 0 2019-06-05 Sean Christopherson New
[4/7] x86/sgx: Allow userspace to add multiple pages in single ioctl() x86/sgx: Clean up and enhance add pages ioctl - - - 0 0 0 2019-06-05 Sean Christopherson New
[3/7] x86/sgx: Let ioctl helpers do copy to/from user x86/sgx: Clean up and enhance add pages ioctl - - - 0 0 0 2019-06-05 Sean Christopherson New
[2/7] x86/sgx: Remove unnecessary @cmd parameter from ioctl helpers x86/sgx: Clean up and enhance add pages ioctl - - - 0 0 0 2019-06-05 Sean Christopherson New
[1/7] x86/sgx: Remove dead code to handle non-existent IOR ioctl x86/sgx: Clean up and enhance add pages ioctl - - - 0 0 0 2019-06-05 Sean Christopherson New
[RFC,9/9] security/selinux: Add enclave_load() implementation security: x86/sgx: SGX vs. LSM - - - 0 0 0 2019-05-31 Sean Christopherson New
[RFC,8/9] LSM: x86/sgx: Introduce ->enclave_load() hook for Intel SGX security: x86/sgx: SGX vs. LSM - - - 0 0 0 2019-05-31 Sean Christopherson New
[RFC,7/9] x86/sgx: Enforce noexec filesystem restriction for enclaves security: x86/sgx: SGX vs. LSM - - - 0 0 0 2019-05-31 Sean Christopherson New
[RFC,6/9] x86/sgx: Require userspace to provide allowed prots to ADD_PAGES security: x86/sgx: SGX vs. LSM - - - 0 0 0 2019-05-31 Sean Christopherson New
[RFC,5/9] x86/sgx: Restrict mapping without an enclave page to PROT_NONE security: x86/sgx: SGX vs. LSM - - - 0 0 0 2019-05-31 Sean Christopherson New
[RFC,4/9] mm: Introduce vm_ops->mprotect() security: x86/sgx: SGX vs. LSM - - - 0 0 0 2019-05-31 Sean Christopherson New
[RFC,3/9] x86/sgx: Allow userspace to add multiple pages in single ioctl() security: x86/sgx: SGX vs. LSM - - - 0 0 0 2019-05-31 Sean Christopherson New
[RFC,2/9] x86/sgx: Do not naturally align MAP_FIXED address security: x86/sgx: SGX vs. LSM - - - 0 0 0 2019-05-31 Sean Christopherson New
[RFC,1/9] x86/sgx: Remove unused local variable in sgx_encl_release() security: x86/sgx: SGX vs. LSM - - - 0 0 0 2019-05-31 Sean Christopherson New
[RFC,v2,3/3] selftests/x86: Augment SGX selftest to test new __vdso_sgx_enter_enclave() and its c... An alternative __vdso_sgx_enter_enclave() to allow enclave/host parameter passing using untrusted... - - - 0 0 0 2019-04-24 Xing, Cedric New
[RFC,v2,2/3] x86/vdso: Modify __vdso_sgx_enter_enclave() to allow parameter passing on untrusted ... An alternative __vdso_sgx_enter_enclave() to allow enclave/host parameter passing using untrusted... - - - 0 0 0 2019-04-24 Xing, Cedric New
[RFC,v2,1/3] selftests/x86: Fixed Makefile for SGX selftest An alternative __vdso_sgx_enter_enclave() to allow enclave/host parameter passing using untrusted... - - - 0 0 0 2019-04-24 Xing, Cedric New
[RFC,v1,3/3] selftests/x86: Augment SGX selftest to test new __vdso_sgx_enter_enclave() and its c... An alternative __vdso_sgx_enter_enclave() to allow enclave/host parameter passing using untrusted... - - - 0 0 0 2019-04-22 Xing, Cedric New
[RFC,v1,2/3] x86/vdso: Modify __vdso_sgx_enter_enclave() to allow parameter passing on untrusted ... An alternative __vdso_sgx_enter_enclave() to allow enclave/host parameter passing using untrusted... - - - 0 0 0 2019-04-22 Xing, Cedric New
[RFC,v1,1/3] selftests/x86: Fixed Makefile for SGX selftest An alternative __vdso_sgx_enter_enclave() to allow enclave/host parameter passing using untrusted... - - - 0 0 0 2019-04-22 Xing, Cedric New
[v20,28/28] docs: x86/sgx: Document the enclave API Intel SGX1 support - - - 0 0 0 2019-04-17 Jarkko Sakkinen New
[v20,27/28] docs: x86/sgx: Document kernel internals Intel SGX1 support - - - 0 0 0 2019-04-17 Jarkko Sakkinen New
[v20,26/28] docs: x86/sgx: Add Architecture documentation Intel SGX1 support - - - 0 0 0 2019-04-17 Jarkko Sakkinen New
[v20,25/28] x86/sgx: Update MAINTAINERS Intel SGX1 support - - - 0 0 0 2019-04-17 Jarkko Sakkinen New
[v20,24/28] selftests/x86: Add a selftest for SGX Intel SGX1 support - - - 0 0 0 2019-04-17 Jarkko Sakkinen New
« 1 2 3 47 8 »