From mboxrd@z Thu Jan 1 00:00:00 1970 From: Randy Dunlap Subject: [PATCH v14 10/19] x86/sgx: Detect Intel SGX To: Jarkko Sakkinen , , CC: , , , , , , , , Suresh Siddha , Thomas Gleixner , "Ingo Molnar" , Borislav Petkov , "H. Peter Anvin" , "Rafael J. Wysocki" , "Reinette Chatre" , Greg Kroah-Hartman , "Kirill A. Shutemov" , Andi Kleen , "open list:X86 ARCHITECTURE (32-BIT AND 64-BIT)" References: <20180925130845.9962-1-jarkko.sakkinen@linux.intel.com> <20180925130845.9962-11-jarkko.sakkinen@linux.intel.com> Message-ID: <7ea823ce-d6ee-1ff0-efb4-3ca93536fb7e@infradead.org> Date: Tue, 25 Sep 2018 13:02:14 -0700 In-Reply-To: <20180925130845.9962-11-jarkko.sakkinen@linux.intel.com> Content-Type: text/plain; charset="utf-8" Sender: Return-Path: platform-driver-x86-owner@vger.kernel.org MIME-Version: 1.0 List-ID: On 9/25/18 6:06 AM, Jarkko Sakkinen wrote: > diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig > index 1a0be022f91d..b47e1a144409 100644 > --- a/arch/x86/Kconfig > +++ b/arch/x86/Kconfig > @@ -1913,6 +1913,23 @@ config X86_INTEL_MEMORY_PROTECTION_KEYS > > If unsure, say y. > > +config INTEL_SGX_CORE > + bool "Intel SGX core functionality" > + depends on X86_64 && CPU_SUP_INTEL > + help > + Intel Software Guard eXtensions (SGX) CPU feature that allows ring 3 > + applications to create enclaves: private regions of memory that are > + architecturally protected from unauthorized access and/or modification. > + > + This option enables kernel recognition of SGX, high-level management > + of the Enclave Page Cache (EPC), tracking and writing of SGX Launch > + Enclave Hash MSRs, and allows for virtualization of SGX via KVM. By > + itself, this option does not provide SGX support to userspace. > + > + For details, see Documentation/x86/intel_sgx.rst > + > + If unsure, say N. > + Hi, coding-style.rst says that help text should be indented with one tab + 2 spaces. thanks. -- ~Randy