This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from 3bd6e5854bf9 Merge tag 'asm-generic-6.0' of git://git.kernel.org/pub/sc [...] new 4c3f73584c0c x86/sgx: Add short descriptions to ENCLS wrappers new 0fb2126db841 x86/sgx: Add wrapper for SGX2 EMODPR function new 09b38d0b412d x86/sgx: Add wrapper for SGX2 EMODT function new 61416b294af0 x86/sgx: Add wrapper for SGX2 EAUG function new b3fb517dc602 x86/sgx: Support loading enclave page without VMA permissi [...] new 7f391752d4ad x86/sgx: Export sgx_encl_ewb_cpumask() new bdaa8799f697 x86/sgx: Rename sgx_encl_ewb_cpumask() as sgx_encl_cpumask() new f89c2f9bf5a6 x86/sgx: Move PTE zap code to new sgx_zap_enclave_ptes() new c7c6a8a61b00 x86/sgx: Make sgx_ipi_cb() available internally new dda03e2c331b x86/sgx: Create utility to validate user provided offset a [...] new 8cb7b502f31e x86/sgx: Keep record of SGX page type new 3a5351415228 x86/sgx: Export sgx_encl_{grow,shrink}() new 8123073c4335 x86/sgx: Export sgx_encl_page_alloc() new a76e7f1f1888 x86/sgx: Support VA page allocation without reclaiming new ff08530a5232 x86/sgx: Support restricting of enclave page permissions new 5a90d2c3f5ef x86/sgx: Support adding of pages to an initialized enclave new 7b013e723a1f x86/sgx: Tighten accessible memory range after enclave ini [...] new 45d546b8c109 x86/sgx: Support modifying SGX page type new 9849bb27152c x86/sgx: Support complete page removal new a0506b3b0636 x86/sgx: Free up EPC pages directly to support large page ranges new 629b5155d01b Documentation/x86: Introduce enclave runtime management section new 20404a808593 selftests/sgx: Add test for EPCM permission changes new 7088c81f9473 selftests/sgx: Add test for TCS page permission changes new 67f1f70a23d1 selftests/sgx: Test two different SGX2 EAUG flows new 7eb4370152be selftests/sgx: Introduce dynamic entry point new b564982fda13 selftests/sgx: Introduce TCS initialization enclave operation new 33c5aac3bf32 selftests/sgx: Test complete changing of page type flow new 50b822e4b785 selftests/sgx: Test faulty enclave behavior new 35c7e6dacb03 selftests/sgx: Test invalid access to removed enclave page new 08ceab2c37d3 selftests/sgx: Test reclaiming of untouched page new 6507cce561b4 selftests/sgx: Page removal stress test new e0a5915f1cca x86/sgx: Drop 'page_index' from sgx_backing new 9e2f40233670 Merge tag 'x86_sgx_for_v6.0-2022-08-03.1' of git://git.ker [...]
The 33 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: Documentation/x86/sgx.rst | 15 + arch/x86/include/asm/sgx.h | 8 + arch/x86/include/uapi/asm/sgx.h | 62 + arch/x86/kernel/cpu/sgx/encl.c | 330 ++++- arch/x86/kernel/cpu/sgx/encl.h | 16 +- arch/x86/kernel/cpu/sgx/encls.h | 33 + arch/x86/kernel/cpu/sgx/ioctl.c | 641 ++++++++- arch/x86/kernel/cpu/sgx/main.c | 75 +- arch/x86/kernel/cpu/sgx/sgx.h | 3 + tools/testing/selftests/sgx/defines.h | 23 + tools/testing/selftests/sgx/load.c | 41 + tools/testing/selftests/sgx/main.c | 1435 +++++++++++++++++++++ tools/testing/selftests/sgx/main.h | 1 + tools/testing/selftests/sgx/test_encl.c | 68 + tools/testing/selftests/sgx/test_encl_bootstrap.S | 6 + 15 files changed, 2627 insertions(+), 130 deletions(-)