Home
last modified time | relevance | path

Searched refs:SGX_ATTR_PROVISIONKEY (Results 1 - 4 of 4) sorted by relevance

/kernel/linux/linux-6.6/arch/x86/include/asm/
H A Dsgx.h112 * %SGX_ATTR_PROVISIONKEY: Allow to use provisioning keys for remote
126 SGX_ATTR_PROVISIONKEY = BIT(4), enumerator
146 #define SGX_ATTR_PRIV_MASK (SGX_ATTR_PROVISIONKEY | \
/kernel/linux/linux-6.6/arch/x86/kvm/vmx/
H A Dsgx.c166 (attributes & SGX_ATTR_PROVISIONKEY)) { in __handle_encls_ecreate()
167 if (sgx_12_1->eax & SGX_ATTR_PROVISIONKEY) in __handle_encls_ecreate()
272 * guest could do ECREATE w/ SECS.SGX_ATTR_PROVISIONKEY=0, and in handle_encls_ecreate()
273 * simultaneously set SGX_ATTR_PROVISIONKEY to bypass the check to in handle_encls_ecreate()
/kernel/linux/linux-6.6/arch/x86/kernel/cpu/sgx/
H A Dmain.c885 * attributes. Currently only SGX_ATTR_PROVISIONKEY indicated by
889 * -0: SGX_ATTR_PROVISIONKEY is appended to allowed_attributes
905 *allowed_attributes |= SGX_ATTR_PROVISIONKEY; in sgx_set_attribute()
/kernel/linux/linux-6.6/arch/x86/kvm/
H A Dx86.c6406 if ((allowed_attributes & SGX_ATTR_PROVISIONKEY) && in kvm_vm_ioctl_enable_cap()
6407 !(allowed_attributes & ~SGX_ATTR_PROVISIONKEY)) in kvm_vm_ioctl_enable_cap()

Completed in 20 milliseconds