Re: [PATCH v14 10/19] x86/sgx: Detect Intel SGX

From: Jarkko Sakkinen
Date: Thu Sep 27 2018 - 09:13:12 EST


On Tue, Sep 25, 2018 at 01:02:14PM -0700, Randy Dunlap wrote:
> On 9/25/18 6:06 AM, Jarkko Sakkinen wrote:
> > diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig
> > index 1a0be022f91d..b47e1a144409 100644
> > --- a/arch/x86/Kconfig
> > +++ b/arch/x86/Kconfig
> > @@ -1913,6 +1913,23 @@ config X86_INTEL_MEMORY_PROTECTION_KEYS
> >
> > If unsure, say y.
> >
> > +config INTEL_SGX_CORE
> > + bool "Intel SGX core functionality"
> > + depends on X86_64 && CPU_SUP_INTEL
> > + help
> > + Intel Software Guard eXtensions (SGX) CPU feature that allows ring 3
> > + applications to create enclaves: private regions of memory that are
> > + architecturally protected from unauthorized access and/or modification.
> > +
> > + This option enables kernel recognition of SGX, high-level management
> > + of the Enclave Page Cache (EPC), tracking and writing of SGX Launch
> > + Enclave Hash MSRs, and allows for virtualization of SGX via KVM. By
> > + itself, this option does not provide SGX support to userspace.
> > +
> > + For details, see Documentation/x86/intel_sgx.rst
> > +
> > + If unsure, say N.
> > +
>
> Hi,
> coding-style.rst says that help text should be indented with
> one tab + 2 spaces.
>
> thanks.

Thank you.

/Jarkko