On Thu, 2025-08-14 at 10:34 +0300, Reshetova, Elena wrote: > All running enclaves and cryptographic assets (such as internal SGX > encryption keys) are assumed to be compromised whenever an SGX-related > microcode update occurs. To mitigate this assumed compromise the new > supervisor SGX instruction ENCLS[EUPDATESVN] can generate fresh > cryptographic assets. > > Before executing EUPDATESVN, all SGX memory must be marked as unused. This > requirement ensures that no potentially compromised enclave survives the > update and allows the system to safely regenerate cryptographic assets. > > Add the method to perform ENCLS[EUPDATESVN]. However, until the follow up > patch that wires calling sgx_update_svn() from sgx_inc_usage_count(), this > code is not reachable. > > Reviewed-by: Jarkko Sakkinen <jar...@kernel.org> > Signed-off-by: Elena Reshetova <elena.reshet...@intel.com>
Reviewed-by: Kai Huang <kai.hu...@intel.com> > > + * Return: > + * * %0: - Success or not supported > + * * %-EAGAIN: - Can be safely retried, failure is due to lack > of > + * * entropy in RNG Nit: if another version is ever needed, I think it would be better to make the text vertical aligned w/o the leading '-', i.e., * %-EAGAIN: - Can be .... entropy in RNG. .. instead of * %-EAGAIN: - Can be .... entropy in RNG.