summarylogtreecommitdiffstats
path: root/0024-Documentation-x86-Introduce-enclave-runtime-manageme.patch
diff options
context:
space:
mode:
Diffstat (limited to '0024-Documentation-x86-Introduce-enclave-runtime-manageme.patch')
-rw-r--r--0024-Documentation-x86-Introduce-enclave-runtime-manageme.patch47
1 files changed, 47 insertions, 0 deletions
diff --git a/0024-Documentation-x86-Introduce-enclave-runtime-manageme.patch b/0024-Documentation-x86-Introduce-enclave-runtime-manageme.patch
new file mode 100644
index 000000000000..381c703a49aa
--- /dev/null
+++ b/0024-Documentation-x86-Introduce-enclave-runtime-manageme.patch
@@ -0,0 +1,47 @@
+From 20acb57bc235f289b2d083a408d134a0db676ed1 Mon Sep 17 00:00:00 2001
+From: Reinette Chatre <reinette.chatre@intel.com>
+Date: Mon, 7 Feb 2022 16:45:46 -0800
+Subject: [PATCH 24/34] Documentation/x86: Introduce enclave runtime management
+ section
+
+Enclave runtime management is introduced following the pattern
+of the section describing enclave building. Provide a brief
+summary of enclave runtime management, pointing to the functions
+implementing the ioctl()s that will contain details within their
+kernel-doc.
+
+Signed-off-by: Reinette Chatre <reinette.chatre@intel.com>
+---
+ Documentation/x86/sgx.rst | 16 ++++++++++++++++
+ 1 file changed, 16 insertions(+)
+
+diff --git a/Documentation/x86/sgx.rst b/Documentation/x86/sgx.rst
+index 9df620b59f83..4059efbb4d2e 100644
+--- a/Documentation/x86/sgx.rst
++++ b/Documentation/x86/sgx.rst
+@@ -138,6 +138,22 @@ pages and establish enclave page permissions.
+ sgx_ioc_enclave_init
+ sgx_ioc_enclave_provision
+
++Enclave runtime management
++--------------------------
++
++Systems supporting SGX2 additionally support changes to initialized
++enclaves: modifying enclave page permissions and type, and dynamically
++adding and removing of enclave pages. When an enclave accesses an address
++within its address range that does not have a backing page then a new
++regular page will be dynamically added to the enclave. The enclave is
++still required to run EACCEPT on the new page before it can be used.
++
++.. kernel-doc:: arch/x86/kernel/cpu/sgx/ioctl.c
++ :functions: sgx_ioc_enclave_relax_perm
++ sgx_ioc_enclave_restrict_perm
++ sgx_ioc_enclave_modt
++ sgx_ioc_enclave_remove_pages
++
+ Enclave vDSO
+ ------------
+
+--
+2.35.1
+