You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Occlum gets the untrusted memory range and registers the untrusted memory range into the SGX untrusted allocator.
Motivation
When supporting the untrusted device, we could get some untrusted memory that is shared with the device. The SGX untrusted allocator could help to manage this area. The application may do mprotect or munmap with the virtual address inside the untrusted area.
Summary
Occlum gets the untrusted memory range and registers the untrusted memory range into the SGX untrusted allocator.
Motivation
When supporting the untrusted device, we could get some untrusted memory that is shared with the device. The SGX untrusted allocator could help to manage this area. The application may do mprotect or munmap with the virtual address inside the untrusted area.
Guide-level explanation
The existing sgx-untrusted-alloc crate (https://github.com/occlum/ngo/tree/master/src/libos/crates/sgx-untrusted-alloc) could be extended to support the new feature.
The new interfaces are required:
Below is one example:
When an application performs munmap with an untrusted memory address
The text was updated successfully, but these errors were encountered: