[OS-BUILD PATCHv3 2/15] x86/sgx: Add TAINT_TECH_PREVIEW for virtual EPC

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



From: Peter Georg <peter.georg@xxxxxxxxxxxxxxxxxxxxxxxx>

x86/sgx: Add TAINT_TECH_PREVIEW for virtual EPC

Bugzilla: http://bugzilla.redhat.com/2025959
Upstream Status: RHEL only

Note: Wrapped with #ifdef CONFIG_RHEL_DIFFERENCES

commit 0a1a9412eb0c13019cd14831b1a5777f84ef93da
Author: Wander Lairson Costa <wander@xxxxxxxxxx>
Date:   Wed Nov 24 14:16:38 2021 -0300

    x86/sgx: Add TAINT_TECH_PREVIEW for virtual EPC

    Bugzilla: http://bugzilla.redhat.com/2025959
    Upstream Status: RHEL only

    commit 3885eac465868e3755067287a75d40bf4f747c31
    Author: Bandan Das <bsd@xxxxxxxxxx>
    Date:   Tue Jun 29 13:53:40 2021 -0400

        x86/sgx: Add TAINT_TECH_PREVIEW for virtual EPC

        Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1977474
        Upstream Status: RHEL Only

        Userspace opens /dev/sgx_vepc to enable kvm guests use SGX.
        Mark it as tech preview just like we do it for /dev/sgx_enclave.

        Signed-off-by: Bandan Das <bsd@xxxxxxxxxx>

    Signed-off-by: Wander Lairson Costa <wander@xxxxxxxxxx>

Signed-off-by: Peter Georg <peter.georg@xxxxxxxxxxxxxxxxxxxxxxxx>

diff --git a/arch/x86/kernel/cpu/sgx/virt.c b/arch/x86/kernel/cpu/sgx/virt.c
index blahblah..blahblah 100644
--- a/arch/x86/kernel/cpu/sgx/virt.c
+++ b/arch/x86/kernel/cpu/sgx/virt.c
@@ -265,6 +265,14 @@ static int sgx_vepc_open(struct inode *inode, struct file *file)
 	mutex_init(&vepc->lock);
 	xa_init(&vepc->page_array);
 
+#ifdef CONFIG_RHEL_DIFFERENCES
+	static bool warned = false;
+	if (!warned) {
+		mark_tech_preview("Intel Software Guard Extensions (SGX)", NULL);
+		warned = true;
+	}
+#endif
+
 	file->private_data = vepc;
 
 	return 0;

--
https://gitlab.com/cki-project/kernel-ark/-/merge_requests/1610
_______________________________________________
kernel mailing list -- kernel@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe send an email to kernel-leave@xxxxxxxxxxxxxxxxxxxxxxx
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/kernel@xxxxxxxxxxxxxxxxxxxxxxx
Do not reply to spam on the list, report it: https://pagure.io/fedora-infrastructure




[Index of Archives]     [Fedora General Discussion]     [Older Fedora Users Archive]     [Fedora Advisory Board]     [Fedora Security]     [Fedora Devel Java]     [Fedora Legacy]     [Fedora Desktop]     [ATA RAID]     [Fedora Marketing]     [Fedora Mentors]     [Fedora Package Announce]     [Fedora Package Review]     [Fedora Music]     [Fedora Packaging]     [Centos]     [Fedora SELinux]     [Coolkey]     [Yum Users]     [Tux]     [Yosemite News]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [USB]     [Asterisk PBX]

  Powered by Linux