Hi,

Sorry I didn't respond to v31 with this so that it could
have been fixed in v32.

On 6/1/20 12:52 AM, Jarkko Sakkinen wrote:
> diff --git a/arch/x86/Kconfig b/arch/x86/Kconfig
> index 2d3f963fd6f1..d246c6071e8d 100644
> --- a/arch/x86/Kconfig
> +++ b/arch/x86/Kconfig
> @@ -1948,6 +1948,22 @@ config X86_INTEL_TSX_MODE_AUTO
>         side channel attacks- equals the tsx=auto command line parameter.
>  endchoice
>  
> +config INTEL_SGX
> +     bool "Intel SGX"
> +     depends on X86_64 && CPU_SUP_INTEL
> +     depends on CRYPTO=y
> +     depends on CRYPTO_SHA256=y
> +     select SRCU
> +     select MMU_NOTIFIER
> +     help
> +       Intel(R) SGX is a set of CPU instructions that can be used by
> +       applications to set aside private regions of code and data, referred
> +       to as enclaves. An enclave's private memory can only be accessed by
> +       code running within the enclave. Accesses from outside the enclave,
> +       including other enclaves, are disallowed by hardware.

Either the prompt
        bool "Intel SGX"
or the help text should tell us what SGX means.
(Software Guard eXtensions)

> +
> +       If unsure, say N.
> +
>  config EFI
>       bool "EFI runtime service support"
>       depends on ACPI

thanks.
-- 
~Randy

Reply via email to