From nobody Sun Feb 8 09:33:04 2026 Received: from mail-pj1-f73.google.com (mail-pj1-f73.google.com [209.85.216.73]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 3713F34321D for ; Wed, 12 Nov 2025 16:07:13 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.216.73 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1762963635; cv=none; b=b5446jrydqqe5Gi5EKEAd9h0lrWzlHUubaOukPzH5o210cXGaP0r38nqcbPvnf38Cj+c/1aorcnNgRU1FebmckPWz1MIL3Zrc7ynbUHs2vpJFDDbuX4vgfKVTPQQi4wJLJ8gBYzsNa42PEHXe0FvTR+XHazYMipTkWeWZ789S8Q= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1762963635; c=relaxed/simple; bh=FWETxRtMVjkLK+WfqnbYriRIlbE+xBHWvnDlkLiYk1Y=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=c07q3ex0cNl16133rx9+DJ9M794nowSrTpH9s0W8x5dMkRVOsEzhZQbEgNoZbfg+us7q3IQ92kSjptZ6nHeCqBoZAAMrQWRVpZbdlg3KvDmUygazpz7x03b/r50xtVBvyxEnnoyHRY/Ny+Gtf9aiwPtK3eyf1stOSmHQxSZl2/8= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=WnHC4DSp; arc=none smtp.client-ip=209.85.216.73 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="WnHC4DSp" Received: by mail-pj1-f73.google.com with SMTP id 98e67ed59e1d1-3416dc5752aso2543931a91.1 for ; Wed, 12 Nov 2025 08:07:13 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1762963632; x=1763568432; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:from:to:cc:subject:date:message-id:reply-to; bh=eTjoKHmggOYgTdGIQs6uKfwAZuQVBnxqpwF3nx2QCb8=; b=WnHC4DSpUfKJhsrRGPaaQ+CzvM+A6EP8PztrnUZmOFMoK6rBZDY/JJlvVrF8CRWoyf HirmaA2stDhrnK+fUM8O2l+izCeZFQDGo2Bol48Q60CVVt9J8Oiy6S/DuoFSM5JTk7FP 2yNUbwTWbYg96JlI+HFWqE153YaSmSVqfUI9dTdhEpaq5JKV5I/8VXalYqIZpoLVxtO0 KTJL4VQ2EC4i7kj/uKserRpZ1L/idhNNqARjT4GNFD5uFZ7XJ+ZaO/ZG7o1cG/rxaLlu cn1SM0QGrbmvhEfVOyOgr8Xq00u0Dmwp77Pvxg6iD4XjK9gRGYVAYeKBzZZj/Ju+ZAIV zQJA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1762963632; x=1763568432; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=eTjoKHmggOYgTdGIQs6uKfwAZuQVBnxqpwF3nx2QCb8=; b=XNksNfvd2kX3Yv++gFrcsNL78Ug3HN8qNnjkjJf7t/oa5vAfELFVuBuxmnsTr8j6ie egoiIsiAGdQU8Ga9v8/1spT9JqjSndP3cBbOI0My/Nsnkiz5XoFBb8S5XC75dFPuxkvB a7nkrJHM7MSnnuSnI5/PEyoKTi9n+4J98zrkM1RcU9ijfZ+7DMiiHyFQkTNjn5kqNzKb GDexPq4a8yp/UXlECvzqzQDZnA/JDM2BcIxnfZrePvtS3Wa+LQjTBYHsQleZIKTwml3K 7aoa0DUGnHZSPz/YVEKNc46xLplWE1jVQf7tHcpMp3fls99/76Ax/IbMRktdW9B7brgG qywg== X-Forwarded-Encrypted: i=1; AJvYcCVDbTUtq5dM/Ji1ZGOpfPZYy4u1M5HbPDSs5mitL3QHS4MWhzsYacAxrQDvRkhysIs1l14Be71E+0IlPPo=@vger.kernel.org X-Gm-Message-State: AOJu0Yzcr5iUX3yKZrHo4MKTJZqdKpjDtwEeNGwGFCkfh3rfZkc/6J0K Ew5xtb7JfthXMVL34FhcyDLHJ+xXCBmdgj2RC92VfG9irdodMQedEUnTow4S3cZpVQDc/W+dyzt 0ZvHUjw== X-Google-Smtp-Source: AGHT+IHJZKkEiToM4fKaG/NQNsxc49aGGeWBuNh03TBSSQJQx8lPhD3KWW6Av/PBLEC9yzKJDa1KrmBSRaU= X-Received: from pjboj14.prod.google.com ([2002:a17:90b:4d8e:b0:33b:c211:1fa9]) (user=seanjc job=prod-delivery.src-stubby-dispatcher) by 2002:a17:90a:bc9:b0:343:e082:b327 with SMTP id 98e67ed59e1d1-343e082b6ffmr2584900a91.31.1762963632513; Wed, 12 Nov 2025 08:07:12 -0800 (PST) Reply-To: Sean Christopherson Date: Wed, 12 Nov 2025 08:07:04 -0800 In-Reply-To: <20251112160708.1343355-1-seanjc@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20251112160708.1343355-1-seanjc@google.com> X-Mailer: git-send-email 2.51.2.1041.gc1ab5b90ca-goog Message-ID: <20251112160708.1343355-2-seanjc@google.com> Subject: [PATCH 1/5] x86/sgx: Add a missing colon in kernel-doc markup for "struct sgx_enclave_run" From: Sean Christopherson To: Jarkko Sakkinen , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org Cc: linux-sgx@vger.kernel.org, linux-kernel@vger.kernel.org, Stephen Rothwell , Sean Christopherson Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Add a missing ':' for the description of sgx_enclave_run.reserved so that documentation for the member is correctly generated: WARNING: arch/x86/include/uapi/asm/sgx.h:184 struct member 'reserved' not described in 'sgx_enclave_run' Reported-by: Stephen Rothwell Closes: https://lore.kernel.org/all/20251106145506.145fc620@canb.auug.org.au Signed-off-by: Sean Christopherson Reviewed-by: Jarkko Sakkinen Reviewed-by: Kai Huang --- arch/x86/include/uapi/asm/sgx.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/x86/include/uapi/asm/sgx.h b/arch/x86/include/uapi/asm/sg= x.h index 2dd35bbdc822..a438ea43bfd1 100644 --- a/arch/x86/include/uapi/asm/sgx.h +++ b/arch/x86/include/uapi/asm/sgx.h @@ -166,7 +166,7 @@ typedef int (*sgx_enclave_user_handler_t)(long rdi, lon= g rsi, long rdx, * @exception_addr: The address that triggered the exception * @user_handler: User provided callback run on exception * @user_data: Data passed to the user handler - * @reserved Reserved for future extensions + * @reserved: Reserved for future extensions * * If @user_handler is provided, the handler will be invoked on all return= paths * of the normal flow. The user handler may transfer control, e.g. via a --=20 2.51.2.1041.gc1ab5b90ca-goog From nobody Sun Feb 8 09:33:04 2026 Received: from mail-pl1-f201.google.com (mail-pl1-f201.google.com [209.85.214.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 29EAE343D6F for ; Wed, 12 Nov 2025 16:07:14 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.214.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1762963636; cv=none; b=gJHAafGparNy+VBbawfyYAkFnNUVm8P8VUostR77pRGiXnsUsREsMrrzM02trmwzNWWbFOxwkCu1BV7CNwd7VxwtuwcmJtQZqy1Uku6j4SFippyhgusqdAy8v0i+iID+Sp6obzSMvkkdi47kyVM4c89xgXWwnHS28oWTNm6oVqE= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1762963636; c=relaxed/simple; bh=vfPFTFts+O9/qnjhFzifocpQWwiaPjp7RusofTyF4ak=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=q/HFDQHKFqiAlnlNLCDRCaUyzohGdzY2m2yi5yK8Moc1LlJe1vQ1OGhNn9MHjd4QM1ohgSLlqBanlMwIzIdwod8N1Oj/dmvZFzJa7Yiim53+mGL7fi/FAho7vTL6odKhQx1eaVCW0M1GiocOq1D+2hu9mkhbiVTtfX62rEZsRM4= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=0V6+CXFL; arc=none smtp.client-ip=209.85.214.201 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="0V6+CXFL" Received: by mail-pl1-f201.google.com with SMTP id d9443c01a7336-29848363458so23296115ad.2 for ; Wed, 12 Nov 2025 08:07:14 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1762963634; x=1763568434; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:from:to:cc:subject:date:message-id:reply-to; bh=FfunJ/ItZMKzoPtNCzcWcDET3PL8bYrh6b1GoUKPhWM=; b=0V6+CXFLAGtOl4I/o8dh93du4E0qKRnFrClLo8Oz9JVvCDlZ4uEnBHyHK5vJ6Y0GFi 0/gy9h7YnqoDlyIkZxOHhWIofDUrzUBVffk5wokCTGLWRB1bJfhQZA07LJW7Umxg7SRk DtPrr6f3vyD6EOjDgD0XQwnPUrfZnhdZzMEm3QRKWJ+B+VxNM3Rv6alCCIZs1azKtMLP ZHSUlznz0MdDldyLiIemk6zrvI85fDAJpCNlDwjQmJtt0cqK0RFEvc7g7hvh2z45Acj5 5jaNvP22dw/OwuM6zlsI9LGV8DwLSMBpDbjrs9nZfF+DcgJYe0W+PeV4YLPbDNUvIoYC hl3g== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1762963634; x=1763568434; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=FfunJ/ItZMKzoPtNCzcWcDET3PL8bYrh6b1GoUKPhWM=; b=eOFCbdEVlxAmKLJisB5S3sBbCPKadmoJoH16TxBtnwDz3DMK5m2FLEXio2ujxN57Yd YMBHt1BgymTZ+tmOoJZsrmACYEtM+hizkbI5LFl/6heLcqmg9hcp9jr6FrRSvO9jupLC ssZHGeGkkA+B3nbUaR0KEDw6KXtaKYkcEUEZKoPoQkhZGOsqUnjHwh4XCYTTALp4IQWE +0BWvj0q8tShQfvUF9AdoLlIxORvT7REi0trTTzwQ7ZMzK/G0zLlCa+D59XJmVZs4OFP SWCaW2Q1DApiJdFCzLYt3ZfSgVGm1G62hYb3F06HUUUsj+65KR4/pKoAqTNVjeNzfO56 h9Zg== X-Forwarded-Encrypted: i=1; AJvYcCU/qhjaJ9oIUV7miJmyRooIKhtGLTgCzLeCG+4eMnxpYKmaWdBbnMOK5Hp6Y10cubOYUavZQopaPW6mx2Y=@vger.kernel.org X-Gm-Message-State: AOJu0YySjRvVaQAejPeqSKS3etlGR+FDizZdx1MErkkLhGHB34AxXP/O qflz2pWFhQM/rkK2mj+3BvPFyOCs2O84wR8D+bmAeHgUnp8mEtdw3+iqRj4Sy5lD3xJCyu3NWqB MKs81Kg== X-Google-Smtp-Source: AGHT+IGPM+FL5iDTJezPnnxj3ZrI7o/h1RB9PJEV738qzsyjTKGBwTcX5RKvAm11TxhAvf6YY9dkHxnyxDY= X-Received: from pldo20.prod.google.com ([2002:a17:903:94:b0:297:e751:aa56]) (user=seanjc job=prod-delivery.src-stubby-dispatcher) by 2002:a17:903:3c4e:b0:295:5864:8009 with SMTP id d9443c01a7336-2984ee03287mr41328465ad.44.1762963634199; Wed, 12 Nov 2025 08:07:14 -0800 (PST) Reply-To: Sean Christopherson Date: Wed, 12 Nov 2025 08:07:05 -0800 In-Reply-To: <20251112160708.1343355-1-seanjc@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20251112160708.1343355-1-seanjc@google.com> X-Mailer: git-send-email 2.51.2.1041.gc1ab5b90ca-goog Message-ID: <20251112160708.1343355-3-seanjc@google.com> Subject: [PATCH 2/5] x86/sgx: Add kernel-doc descriptions for params passed to vDSO user handler From: Sean Christopherson To: Jarkko Sakkinen , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org Cc: linux-sgx@vger.kernel.org, linux-kernel@vger.kernel.org, Stephen Rothwell , Sean Christopherson Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Add kernel-doc markup for the register parameters passed by the vDSO blob to the user handler to suppress build warnings, e.g. WARNING: arch/x86/include/uapi/asm/sgx.h:157 function parameter 'r8' not described in 'sgx_enclave_user_handler_t' Call out that except for RSP, the registers are undefined on asynchronous exits as far as the vDSO ABI is concerned. E.g. the vDSO's exception handler clobbers RDX, RDI, and RSI, and the kernel doesn't guarantee that R8 or R9 will be zero (the synthetic value loaded by the CPU). Reported-by: Stephen Rothwell Closes: https://lore.kernel.org/all/20251106145506.145fc620@canb.auug.org.au Signed-off-by: Sean Christopherson Reviewed-by: Jarkko Sakkinen Reviewed-by: Kai Huang --- arch/x86/include/uapi/asm/sgx.h | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/arch/x86/include/uapi/asm/sgx.h b/arch/x86/include/uapi/asm/sg= x.h index a438ea43bfd1..0d408f001ac6 100644 --- a/arch/x86/include/uapi/asm/sgx.h +++ b/arch/x86/include/uapi/asm/sgx.h @@ -143,6 +143,12 @@ struct sgx_enclave_run; /** * typedef sgx_enclave_user_handler_t - Exit handler function accepted by * __vdso_sgx_enter_enclave() + * @rdi: RDI at the time of EEXIT, undefined on AEX + * @rsi: RSI at the time of EEXIT, undefined on AEX + * @rdx: RDX at the time of EEXIT, undefined on AEX + * @rsp: RSP (untrusted) at the time of EEXIT or AEX + * @r8: R8 at the time of EEXIT, undefined on AEX + * @r9: R9 at the time of EEXIT, undefined on AEX * @run: The run instance given by the caller * * The register parameters contain the snapshot of their values at enclave --=20 2.51.2.1041.gc1ab5b90ca-goog From nobody Sun Feb 8 09:33:04 2026 Received: from mail-pg1-f201.google.com (mail-pg1-f201.google.com [209.85.215.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id CD9903446A9 for ; Wed, 12 Nov 2025 16:07:16 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.215.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1762963638; cv=none; b=vEThJOjxvfxHLMMGgb6a+BUCU/7MukKQHubVPro4es+zTyPh9mYkw4GqJEMA+wFdzse3bOT4bJ7Nfoge+UXbvZ8/f0sU42xkRppt/94zGEJiogKCf6XRUQ1XRlirqpPcvMiOKBNm4qwYVFPjNLJk9CcTz59AfQsSM19/YN6pT/s= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1762963638; c=relaxed/simple; bh=rcoXkrER8UQqtVDDcBsXRfRyMxzZ7C3Dm11vbqk1f6I=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=QAnImbxJwup1RifCOdu4Pui4/ORoB3+Qx3Fw4SnrLdS+Pm83jw31hJIee0QKsRIFop19juJlj51VTns7J0EOBtarS0PLk7eQ4iEkhosyCTIQjFnZH7EKa44Ht8S/iU+HacHwYEcTcvYK72wTJ17sw8XKlINBISJuuTxKMJm0Was= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=g7QUJdO7; arc=none smtp.client-ip=209.85.215.201 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="g7QUJdO7" Received: by mail-pg1-f201.google.com with SMTP id 41be03b00d2f7-b5edecdf94eso1974504a12.2 for ; Wed, 12 Nov 2025 08:07:16 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1762963636; x=1763568436; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:from:to:cc:subject:date:message-id:reply-to; bh=bCzRXVVfXNZOo2hC0W4eg4zwEOxmih4nLIdPA+K4xx0=; b=g7QUJdO78zoDrjHtnBtlSXGxkEuyHsgjZJjClGhCpNlNHIYUmzFsYaHrq+KwwEHQjg vSqFn0y6C/UOQ+o3WEeYlnr+fvs9y2XfwVEbMbIJYsPHihPKEOJikwPuC9Ic8U1Lk9c0 3WbDtGaE9PBlvnQJlymd2j6iZYHlm2IiY17bLNazPkpmeIETqQZu0JL7SVG2ek8uHGel Fi7j+bIvHyb0xtxf4iO2WhYuxsiPJssfdzrCDpiTZIl6KxH64Ubk0lCPSo679ovvAFHb QX8N3vyBbZwx+cFRlvnhRBeTQtEuLJYZSW0kfA/L6xS85pOkYlEosBKi+FkTAm8OwJCY oAGA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1762963636; x=1763568436; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=bCzRXVVfXNZOo2hC0W4eg4zwEOxmih4nLIdPA+K4xx0=; b=dVWmcl6coffIUkmTFYBvGWA6b2f+GyirQMc2ist/r7n9QPkE1qNcx70MpeMGUs+5PP IDexyM3KHzFJWYt3/5W0+/ql8M4vokTSAAa4vv0rlAp3IcQ2rQcy9yf21cUQaKvoP/gg WBj/QkEiqSa3qJAi+h6YsNP8IDHA5TCjs9uy4LMwih+yqc+PS9+XZ6yhm10fwknsa92L VKOwzR5S+brkFVIlBCVQnSsSyM93rTL4sfz9mt94oxTzok4jIrNUzvGpDZ26n0aUFhYw 6pJdoS4+oIu0PkyD5F1KnPyp3Pr3jacx0mtvvgcQ+rbn6N7IY6+8bBb+DU+DtC/vpYeg bEzA== X-Forwarded-Encrypted: i=1; AJvYcCWLDm7ae8HFjmFFqmor8EsGn6avv3uB/qkI9hTbjjGtpNabsIC3NEcU9WzIyQsr8cdIJ6Y9tynN+uA8qYM=@vger.kernel.org X-Gm-Message-State: AOJu0YybjfsZ6tRHVaZU6xYjUnRWBMkjleCwUtgwoc1eRUJfFwIqEa0y +nT5ok6M2eZu6mOB5SpASUTRN1467nW2fPnzire+asOKEGllFuMvsGxmH/RKf+JG/kPKXUh84+L PcbdRQQ== X-Google-Smtp-Source: AGHT+IGKPunQm5ISPEqmOuS0fN1GRnuQRNFwIf0v6JN1Vqk0oMGs54IRqGDPeVp9726Ni0Fsf0MNaCVFefI= X-Received: from plhs17.prod.google.com ([2002:a17:903:3211:b0:298:88:c005]) (user=seanjc job=prod-delivery.src-stubby-dispatcher) by 2002:a17:902:d485:b0:298:33c9:ed91 with SMTP id d9443c01a7336-2984ede99cfmr43566815ad.32.1762963635961; Wed, 12 Nov 2025 08:07:15 -0800 (PST) Reply-To: Sean Christopherson Date: Wed, 12 Nov 2025 08:07:06 -0800 In-Reply-To: <20251112160708.1343355-1-seanjc@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20251112160708.1343355-1-seanjc@google.com> X-Mailer: git-send-email 2.51.2.1041.gc1ab5b90ca-goog Message-ID: <20251112160708.1343355-4-seanjc@google.com> Subject: [PATCH 3/5] x86/sgx: Document structs and enums with '@', not '%' From: Sean Christopherson To: Jarkko Sakkinen , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org Cc: linux-sgx@vger.kernel.org, linux-kernel@vger.kernel.org, Stephen Rothwell , Sean Christopherson Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Use '@' to document structure members and enum values in kernel-doc markup, as per Documentation/doc-guide/kernel-doc.rst and flagged by make htmldocs. WARNING: arch/x86/include/uapi/asm/sgx.h:17 Enum value 'SGX_PAGE_MEASURE' not described in enum 'sgx_page_flags' Opportunistically add a missing ':' for SGX_CHILD_PRESENT. Reported-by: Stephen Rothwell Closes: https://lore.kernel.org/all/20251106145506.145fc620@canb.auug.org.au Signed-off-by: Sean Christopherson Reviewed-by: Kai Huang --- arch/x86/include/asm/sgx.h | 60 ++++++++++++++++----------------- arch/x86/include/uapi/asm/sgx.h | 2 +- 2 files changed, 31 insertions(+), 31 deletions(-) diff --git a/arch/x86/include/asm/sgx.h b/arch/x86/include/asm/sgx.h index c2c4c0d22ca4..a88c4ab95edd 100644 --- a/arch/x86/include/asm/sgx.h +++ b/arch/x86/include/asm/sgx.h @@ -66,19 +66,19 @@ enum sgx_encls_function { =20 /** * enum sgx_return_code - The return code type for ENCLS, ENCLU and ENCLV - * %SGX_EPC_PAGE_CONFLICT: Page is being written by other ENCLS function. - * %SGX_NOT_TRACKED: Previous ETRACK's shootdown sequence has not + * @SGX_EPC_PAGE_CONFLICT: Page is being written by other ENCLS function. + * @SGX_NOT_TRACKED: Previous ETRACK's shootdown sequence has not * been completed yet. - * %SGX_CHILD_PRESENT SECS has child pages present in the EPC. - * %SGX_INVALID_EINITTOKEN: EINITTOKEN is invalid and enclave signer's + * @SGX_CHILD_PRESENT: SECS has child pages present in the EPC. + * @SGX_INVALID_EINITTOKEN: EINITTOKEN is invalid and enclave signer's * public key does not match IA32_SGXLEPUBKEYHASH. - * %SGX_PAGE_NOT_MODIFIABLE: The EPC page cannot be modified because it + * @SGX_PAGE_NOT_MODIFIABLE: The EPC page cannot be modified because it * is in the PENDING or MODIFIED state. - * %SGX_INSUFFICIENT_ENTROPY: Insufficient entropy in RNG. - * %SGX_NO_UPDATE: EUPDATESVN could not update the CPUSVN because the + * @SGX_INSUFFICIENT_ENTROPY: Insufficient entropy in RNG. + * @SGX_NO_UPDATE: EUPDATESVN could not update the CPUSVN because the * current SVN was not newer than CPUSVN. This is the most * common error code returned by EUPDATESVN. - * %SGX_UNMASKED_EVENT: An unmasked event, e.g. INTR, was received + * @SGX_UNMASKED_EVENT: An unmasked event, e.g. INTR, was received */ enum sgx_return_code { SGX_EPC_PAGE_CONFLICT =3D 7, @@ -96,7 +96,7 @@ enum sgx_return_code { =20 /** * enum sgx_miscselect - additional information to an SSA frame - * %SGX_MISC_EXINFO: Report #PF or #GP to the SSA frame. + * @SGX_MISC_EXINFO: Report #PF or #GP to the SSA frame. * * Save State Area (SSA) is a stack inside the enclave used to store proce= ssor * state when an exception or interrupt occurs. This enum defines addition= al @@ -113,16 +113,16 @@ enum sgx_miscselect { =20 /** * enum sgx_attributes - the attributes field in &struct sgx_secs - * %SGX_ATTR_INIT: Enclave can be entered (is initialized). - * %SGX_ATTR_DEBUG: Allow ENCLS(EDBGRD) and ENCLS(EDBGWR). - * %SGX_ATTR_MODE64BIT: Tell that this a 64-bit enclave. - * %SGX_ATTR_PROVISIONKEY: Allow to use provisioning keys for remote + * @SGX_ATTR_INIT: Enclave can be entered (is initialized). + * @SGX_ATTR_DEBUG: Allow ENCLS(EDBGRD) and ENCLS(EDBGWR). + * @SGX_ATTR_MODE64BIT: Tell that this a 64-bit enclave. + * @SGX_ATTR_PROVISIONKEY: Allow to use provisioning keys for remote * attestation. - * %SGX_ATTR_KSS: Allow to use key separation and sharing (KSS). - * %SGX_ATTR_EINITTOKENKEY: Allow to use token signing key that is used to + * @SGX_ATTR_KSS: Allow to use key separation and sharing (KSS). + * @SGX_ATTR_EINITTOKENKEY: Allow to use token signing key that is used to * sign cryptographic tokens that can be passed to * EINIT as an authorization to run an enclave. - * %SGX_ATTR_ASYNC_EXIT_NOTIFY: Allow enclaves to be notified after an + * @SGX_ATTR_ASYNC_EXIT_NOTIFY: Allow enclaves to be notified after an * asynchronous exit has occurred. */ enum sgx_attribute { @@ -195,7 +195,7 @@ struct sgx_secs { =20 /** * enum sgx_tcs_flags - execution flags for TCS - * %SGX_TCS_DBGOPTIN: If enabled allows single-stepping and breakpoints + * @SGX_TCS_DBGOPTIN: If enabled allows single-stepping and breakpoints * inside an enclave. It is cleared by EADD but can * be set later with EDBGWR. */ @@ -260,11 +260,11 @@ struct sgx_pageinfo { =20 /** * enum sgx_page_type - bits in the SECINFO flags defining the page type - * %SGX_PAGE_TYPE_SECS: a SECS page - * %SGX_PAGE_TYPE_TCS: a TCS page - * %SGX_PAGE_TYPE_REG: a regular page - * %SGX_PAGE_TYPE_VA: a VA page - * %SGX_PAGE_TYPE_TRIM: a page in trimmed state + * @SGX_PAGE_TYPE_SECS: a SECS page + * @SGX_PAGE_TYPE_TCS: a TCS page + * @SGX_PAGE_TYPE_REG: a regular page + * @SGX_PAGE_TYPE_VA: a VA page + * @SGX_PAGE_TYPE_TRIM: a page in trimmed state * * Make sure when making changes to this enum that its values can still fit * in the bitfield within &struct sgx_encl_page @@ -282,14 +282,14 @@ enum sgx_page_type { =20 /** * enum sgx_secinfo_flags - the flags field in &struct sgx_secinfo - * %SGX_SECINFO_R: allow read - * %SGX_SECINFO_W: allow write - * %SGX_SECINFO_X: allow execution - * %SGX_SECINFO_SECS: a SECS page - * %SGX_SECINFO_TCS: a TCS page - * %SGX_SECINFO_REG: a regular page - * %SGX_SECINFO_VA: a VA page - * %SGX_SECINFO_TRIM: a page in trimmed state + * @SGX_SECINFO_R: allow read + * @SGX_SECINFO_W: allow write + * @SGX_SECINFO_X: allow execution + * @SGX_SECINFO_SECS: a SECS page + * @SGX_SECINFO_TCS: a TCS page + * @SGX_SECINFO_REG: a regular page + * @SGX_SECINFO_VA: a VA page + * @SGX_SECINFO_TRIM: a page in trimmed state */ enum sgx_secinfo_flags { SGX_SECINFO_R =3D BIT(0), diff --git a/arch/x86/include/uapi/asm/sgx.h b/arch/x86/include/uapi/asm/sg= x.h index 0d408f001ac6..3c4d52072189 100644 --- a/arch/x86/include/uapi/asm/sgx.h +++ b/arch/x86/include/uapi/asm/sgx.h @@ -10,7 +10,7 @@ =20 /** * enum sgx_page_flags - page control flags - * %SGX_PAGE_MEASURE: Measure the page contents with a sequence of + * @SGX_PAGE_MEASURE: Measure the page contents with a sequence of * ENCLS[EEXTEND] operations. */ enum sgx_page_flags { --=20 2.51.2.1041.gc1ab5b90ca-goog From nobody Sun Feb 8 09:33:04 2026 Received: from mail-pf1-f201.google.com (mail-pf1-f201.google.com [209.85.210.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id A08123451BF for ; Wed, 12 Nov 2025 16:07:18 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.210.201 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1762963640; cv=none; b=f+l3Hdd5/t0oc2/9Py4TfrMR88PWolJaJtDUtGc3Zk3XEZ4+XomUgpPKtR6JhTfzjhWmUN4t/dthcCqBmZQFRYVvs0YkuNMUA8QxjmwV/CToaDOeS+UXjTmUJbWVl68RL2xBlZgaTTtjgZ9+bTYyiH40SKrtQPUbaS+bMKOiy3E= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1762963640; c=relaxed/simple; bh=9acULfMg/Em2axGK9DycBu+aaZYt/pGLTnRxCeFygXU=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=imyF+Ei2edeLc9KNSHBcGHYN+AGzqTt6U41verKweplTvEaQKByek639y/9ZIzpoyTs+eFxig6kRXRwvzm/6zR0kP+YhTG7GD12HDBto2Tyf8DYbSU1o+cinLI0lPt2V+To9Qh9N6vyt+i1DUWBj4r6K3FEpxc4KQFT7Zggy0OI= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=JMj5eyIc; arc=none smtp.client-ip=209.85.210.201 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="JMj5eyIc" Received: by mail-pf1-f201.google.com with SMTP id d2e1a72fcca58-7b89ee2c1a4so261507b3a.2 for ; Wed, 12 Nov 2025 08:07:18 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1762963638; x=1763568438; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:from:to:cc:subject:date:message-id:reply-to; bh=T0PD3WVE3Et8Mx4ML0jlkTqIwvMykTxKsHBXz3f7gqI=; b=JMj5eyIcEKjeKgi28k6lLCC/fBQF6evMjnHpYAQxQjyNNKSqIqDxwC5utZGkAHMJEk bHZ/XKEYlMKIgh1awBlpBeIYaFz6EWcXt6qZ/mdXR/encqDyGbPbT/JZ+ZLmDFjXCPun 8g2OfmelWnXQfL+6soHfX+IoR2y9Ti89SGsru35ypdrLmv6wfazn91nos1ulrivyl4DL r4hegxToPOFzqajoBPxMY35fekZ8kb1j/NC0+lcjaZxdyj80AzUFzCpQ2Mel5C/ZxjLy ZXLyqInsG3T5pyqb7RDPyiB6BIZa0g4GrHzNSQEsMODQ7bHJLITpMMVu+q1R8GeZQOgA +Oxw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1762963638; x=1763568438; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=T0PD3WVE3Et8Mx4ML0jlkTqIwvMykTxKsHBXz3f7gqI=; b=TFeyaQM1ntLRL/JkknWdlQ/QAzjg78XlYOH3b2fu5E0q6zdEoO34h6PdbGtolMljNS pw4aC1cEpN1myEmgLZzw+UrCtWz959qTLEbjYznAonGpD32qQYuvArabtapbPFfR0sBC asKUr3jH5bGhg/AkgIg1wJCv3ssY7LxJZgjco+ff3sIKqMLyvpC6dHQYRKPm7EnaPSgq L034JNpy6yNkfeezYrCXHVFm1bADQwWvbvntpJc5Ojo+H9E/k4Uc7VMjaUXGqAuJZyOf QMPidEdpHFbgj4Jick3/cxJzPYmBdHqZSU68gazXndPgWQRtY7BKBVDZ4BO/m7O+MxgU 3hoQ== X-Forwarded-Encrypted: i=1; AJvYcCVLmdazFsp0ziWSfHB9kwmiUbXHwtcIY6FmMUZg3hfkysYHDCmn3kCjZd30x5xvNVan/wrNa3fwtCSQVPY=@vger.kernel.org X-Gm-Message-State: AOJu0Ywy7qPanvW7eKTis4DNr08y44QHai1v/EP15XH93LmUQTkV4sUR Vz2jZFAj7/71LWY7QTZcTCtaRPyp+Xg9HFxvNw479qGXY5cicBXYWpZf6LnitL1asfCBBILQw0k lJueMuQ== X-Google-Smtp-Source: AGHT+IEjXXyndI3uyYnz6VdwVRwrRE/2TwTE6PlHeOG9AsQOOA8swuLYcU/PB/iJul+vKtv3h6P+91qtb18= X-Received: from pgbfe27.prod.google.com ([2002:a05:6a02:289b:b0:bac:a20:5eed]) (user=seanjc job=prod-delivery.src-stubby-dispatcher) by 2002:a05:6a21:6452:b0:359:9d33:df08 with SMTP id adf61e73a8af0-3599d33e666mr2467151637.18.1762963637808; Wed, 12 Nov 2025 08:07:17 -0800 (PST) Reply-To: Sean Christopherson Date: Wed, 12 Nov 2025 08:07:07 -0800 In-Reply-To: <20251112160708.1343355-1-seanjc@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20251112160708.1343355-1-seanjc@google.com> X-Mailer: git-send-email 2.51.2.1041.gc1ab5b90ca-goog Message-ID: <20251112160708.1343355-5-seanjc@google.com> Subject: [PATCH 4/5] x86/sgx: Remove superfluous asterisk from copyright comment in asm/sgx.h From: Sean Christopherson To: Jarkko Sakkinen , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org Cc: linux-sgx@vger.kernel.org, linux-kernel@vger.kernel.org, Stephen Rothwell , Sean Christopherson Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Drop an asterisk from a file-level copyright comment so that the comment isn't intrepeted as a kernel-doc comment. E.g. if arch/x86/include/asm/sgx.h is fed into kernel-doc processing: WARNING: ./arch/x86/include/asm/sgx.h:2 This comment starts with '/**', but isn't a kernel-doc comment. Refer Documentation/doc-guide/kernel-doc.= rst Signed-off-by: Sean Christopherson Reviewed-by: Jarkko Sakkinen Reviewed-by: Kai Huang --- arch/x86/include/asm/sgx.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/x86/include/asm/sgx.h b/arch/x86/include/asm/sgx.h index a88c4ab95edd..3c90cae04e1d 100644 --- a/arch/x86/include/asm/sgx.h +++ b/arch/x86/include/asm/sgx.h @@ -1,5 +1,5 @@ /* SPDX-License-Identifier: GPL-2.0 */ -/** +/* * Copyright(c) 2016-20 Intel Corporation. * * Intel Software Guard Extensions (SGX) support. --=20 2.51.2.1041.gc1ab5b90ca-goog From nobody Sun Feb 8 09:33:04 2026 Received: from mail-pj1-f74.google.com (mail-pj1-f74.google.com [209.85.216.74]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 2D9BC350280 for ; Wed, 12 Nov 2025 16:07:20 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.216.74 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1762963641; cv=none; b=MODOVfULpOtPUrLKxeIMJo8ogwAK2KGKudV+bmn8xHfCSDr8sQYF9gvOOdU0GzQ0UUVMd8Br7i/rV7lvaYev7CpPL5heo+o6ITFLhBIUP93tvs9q18ydtnmoFdyis0UEnFQ4zuOgW5/HKdm/M2LixD7uPKjbOLyqqztuJdCWly8= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1762963641; c=relaxed/simple; bh=/JOce5MvxYjnhG+9whc6YtktzEE1MUnOCL4g++H5Qvw=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=TP1qEXppQph59FGpEtta5WIjzt4tCFZDvS3SriHy9ZqreVWIQreU4j+3/23v9i8XekRom3gtLTFNWb/J3N8SDzAvNEUC4Edomi8q5VYg5YlZwh2kOuvfJMfINbmdyX3uN+ma5xABNSW1Yb+hqSVjbxO4kSUHHn5DnuwGFHthXgk= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=rMMomRg3; arc=none smtp.client-ip=209.85.216.74 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--seanjc.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="rMMomRg3" Received: by mail-pj1-f74.google.com with SMTP id 98e67ed59e1d1-342701608e2so1266973a91.1 for ; Wed, 12 Nov 2025 08:07:20 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1762963639; x=1763568439; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:from:to:cc:subject:date:message-id:reply-to; bh=NeRxT3I5fTlFPGzsOfdrv5zO/0SPs+Jxk1vfyCkm7NQ=; b=rMMomRg3V7MAGEUJ+gtjOKRCAO/apCDGxAXR3U04svMHL3XtFAC/cv43G1kIjvfTAj fQj2HGJUrw5/mwJouqNy3Oqrogas7AvAOyoHbF18sjYeVy/R0vsi6CKeM7cyu1XgmG1Z hgsdYIyNwagmXOAd8hCI/MB8xqdFEbjSerzYq+CAvUxXkJaF6JSHVfDdrtX9YsM0bnlq cZxZJ1PWZsFw+QK5mpd33DC1jIJcubtWtwIfmf+pspWBXX95rFwhml5femTxjYzA/nDK dJb62haGSN2fWxbNxISZ//baDFMU2j9YWefAw3qlnXR1QtP3WBJ7SfgqxRz7Vy695fuw pvBw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1762963639; x=1763568439; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:reply-to:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=NeRxT3I5fTlFPGzsOfdrv5zO/0SPs+Jxk1vfyCkm7NQ=; b=gJPXcTjNB9C2HC/r8hQbdDH4tTyxqH8NgXBjYNrBinXU6F7B8z+oA0A6cSssfOjWuX I7wUaKh2FGoVtHClEPVt6qC9QjmZShhqsM6LBqf7b9v0G+4MHGFcpDB/eqbFshwlHUWW gbGxvLeT34HGzhII/PLDjVUhsuda5oqqJChyoKE/eTxFjlytGF8QmYl7fJKbAjCwuh9y jHV07W0dee4W24ROLxCsPapjLYMYUnMRhFrQ/kKL6dJhR/4sPRat0ggr/NJ4LYvkf0wk WKdvfa4gzC37lGdQCiOcDPV/TJQoc4qooTLf0fFYH85R/QyF0zd2Dw47/joQh3xfueA5 O8VQ== X-Forwarded-Encrypted: i=1; AJvYcCWJTiB73JKykJ3Z6vZeYZUmgaQjG5jbuH7zoX2A3sIw7W89K7zvYsYLCGiglTmmparH7McNbJoQVgGdRm4=@vger.kernel.org X-Gm-Message-State: AOJu0YxV5Wky6LK/iqGsAy6pda5oe+5KO7qgA8rl7nxNiPfE5hgt59xX 22SOzks3rbug/+Y/6N2WWKFG+JHFoSkFKZeI6wxn1joLNnQ4EQNMz3+6Qb1Ol8UZJee8HEAMWi2 wRabd2Q== X-Google-Smtp-Source: AGHT+IHW/VRW2YS3MUxdH2USXZLmkU4KxcWEaSqjoMCmQ+a2fgXYqtxaEYVcXnrl//MQDzhTVtj5DS7SUhw= X-Received: from pjpy13.prod.google.com ([2002:a17:90a:a40d:b0:33b:51fe:1a73]) (user=seanjc job=prod-delivery.src-stubby-dispatcher) by 2002:a17:90b:3f43:b0:340:dd2c:a3da with SMTP id 98e67ed59e1d1-343ddde89f2mr3893297a91.8.1762963639540; Wed, 12 Nov 2025 08:07:19 -0800 (PST) Reply-To: Sean Christopherson Date: Wed, 12 Nov 2025 08:07:08 -0800 In-Reply-To: <20251112160708.1343355-1-seanjc@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20251112160708.1343355-1-seanjc@google.com> X-Mailer: git-send-email 2.51.2.1041.gc1ab5b90ca-goog Message-ID: <20251112160708.1343355-6-seanjc@google.com> Subject: [PATCH 5/5] x86/sgx: Fix a typo in the kernel-doc comment for enum sgx_attribute From: Sean Christopherson To: Jarkko Sakkinen , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , x86@kernel.org Cc: linux-sgx@vger.kernel.org, linux-kernel@vger.kernel.org, Stephen Rothwell , Sean Christopherson Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" Use the exact enum name when documenting "enum sgx_attribute" to fix a warning if the file is fed into kernel-doc processing: WARNING: ./arch/x86/include/asm/sgx.h:139 expecting prototype for enum sgx_attributes. Prototype was for enum sgx_attribute instead Signed-off-by: Sean Christopherson Reviewed-by: Jarkko Sakkinen Reviewed-by: Kai Huang --- arch/x86/include/asm/sgx.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/x86/include/asm/sgx.h b/arch/x86/include/asm/sgx.h index 3c90cae04e1d..04958459a7ca 100644 --- a/arch/x86/include/asm/sgx.h +++ b/arch/x86/include/asm/sgx.h @@ -112,7 +112,7 @@ enum sgx_miscselect { #define SGX_SSA_MISC_EXINFO_SIZE 16 =20 /** - * enum sgx_attributes - the attributes field in &struct sgx_secs + * enum sgx_attribute - the attributes field in &struct sgx_secs * @SGX_ATTR_INIT: Enclave can be entered (is initialized). * @SGX_ATTR_DEBUG: Allow ENCLS(EDBGRD) and ENCLS(EDBGWR). * @SGX_ATTR_MODE64BIT: Tell that this a 64-bit enclave. --=20 2.51.2.1041.gc1ab5b90ca-goog