On 9/25/18 6:06 AM, Jarkko Sakkinen wrote:
> diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig
> index 1a0be022f91d..b47e1a144409 100644
> --- a/arch/x86/Kconfig
> +++ b/arch/x86/Kconfig
> @@ -1913,6 +1913,23 @@ config X86_INTEL_MEMORY_PROTECTION_KEYS
>  
>         If unsure, say y.
>  
> +config INTEL_SGX_CORE
> +     bool "Intel SGX core functionality"
> +     depends on X86_64 && CPU_SUP_INTEL
> +     help
> +     Intel Software Guard eXtensions (SGX) CPU feature that allows ring 3
> +     applications to create enclaves: private regions of memory that are
> +     architecturally protected from unauthorized access and/or modification.
> +
> +     This option enables kernel recognition of SGX, high-level management
> +     of the Enclave Page Cache (EPC), tracking and writing of SGX Launch
> +     Enclave Hash MSRs, and allows for virtualization of SGX via KVM. By
> +     itself, this option does not provide SGX support to userspace.
> +
> +     For details, see Documentation/x86/intel_sgx.rst
> +
> +     If unsure, say N.
> +

Hi,
coding-style.rst says that help text should be indented with
one tab + 2 spaces.

thanks.

-- 
~Randy

Reply via email to