From patchwork Wed Jan 18 12:29:21 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Arnaldo Carvalho de Melo X-Patchwork-Id: 45263 Return-Path: Delivered-To: ouuuleilei@gmail.com Received: by 2002:adf:eb09:0:0:0:0:0 with SMTP id s9csp2330784wrn; Wed, 18 Jan 2023 05:16:30 -0800 (PST) X-Google-Smtp-Source: AMrXdXvNo0ajIHOU6s5nSWo7K5vK+TiilYOL/JNagYROPACihvcsidm4T4YSRmiU0ZIQ18a6TyyJ X-Received: by 2002:a05:6402:400a:b0:496:bdb5:572f with SMTP id d10-20020a056402400a00b00496bdb5572fmr8598134eda.31.1674047789953; Wed, 18 Jan 2023 05:16:29 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1674047789; cv=none; d=google.com; s=arc-20160816; b=JM3x5mOkU5DyO0kUKwvtWw4/cffFiEjxGVNWHinS/Le7vyKloCaj+t59tOz3DoC5OH NGpXy8KLSWvsIW/zzbGpgqpsL/Yf98rFZ1COUteafza0fO7OWkx3mV40VxYe+3oBxewx cnSC3XEO/UxMObX2X8RdrgoCsRabYGeap5Ikj/hvJatCk4HRgGj928h8sDWJfmGSSvcm TzQmduBZVwQgROreR8lTCoRQnvjJ2Cio2ewezOfIaPUYd+xmbPZ1DBM99uQiXE3VXOaf JQkl/kbnUWLQIshlb2j+1bE7OBCcjRFJxk+EVoY7vZD/ln6vF23sMAXI/6AQAkPDDRQ7 4YLA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-disposition:mime-version:message-id :subject:cc:to:from:date:dkim-signature; bh=jGDyL0GhEMZjJ18ky6g8lqquEQ/KT7Q5zN+t/fqOVqs=; b=woxJa2FbI9yVOTkHXxMXxTPD271KsklSQ8YZaBcMpHDOaI/12gzQDLzho8sl0mWbnS 4o5F5I1tqTOzlOOHx0hY4gazHuXBehvbCGnNHVKURfiVBue367MK3hGpus/j3Uf688GF DZ/FaCyT2chJgqDfdUzce144xF4d+Lb8bG1vNwujuzPjxKnla24FL8yj40yGIlkk+Kx4 FQAESgBO7fPp0bQ94yhxqqYSN23Fdh3qMz52F/v4lHQUyBFYNNwEjw7W6spydx1QgTnU BN81yFDauCcgY2b9WyIE/28BsUqK1oP/epUJJg/A1oPCgP6pyU+0q/8b1ILHurkq/k5n 380Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=IXdsOTUJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id t10-20020aa7d70a000000b00499b335829bsi11361919edq.447.2023.01.18.05.16.05; Wed, 18 Jan 2023 05:16:29 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=IXdsOTUJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229956AbjARNIT (ORCPT + 99 others); Wed, 18 Jan 2023 08:08:19 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38722 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230468AbjARNHQ (ORCPT ); Wed, 18 Jan 2023 08:07:16 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6213ED88CF for ; Wed, 18 Jan 2023 04:29:25 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id EF2DC61784 for ; Wed, 18 Jan 2023 12:29:24 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 32BE5C433D2; Wed, 18 Jan 2023 12:29:24 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1674044964; bh=6T23F6+Ob0cZya6e1U5EmAV8lJw8OafnZnvNZoe0b/U=; h=Date:From:To:Cc:Subject:From; b=IXdsOTUJpV29r8CXDGmORtsMzzrsCkbeuE2++mjr5dtAyl7aUPin79OOG9qZu6vkS PNjNEitiXXOAXUGQ+O3wgfgsfnkEN97QCVHH0WP3kO84hE//6lBSmNsIIqbFWNdYXa 4ZdHs/FGJwTZa82eWk+xadRvG7H1fLKjygek8P4cbRnFUveZ3W+OG40KGXuRSKKhMN 4EWBoW7DQ4i0TfvWN52Ufs5fuiuP7+hWe5A9rcX7W3FgnwQyfivGPWao+uph44Fbqj /K8nz3asALXMhzL4JQDlDvEVku+cL4KdSS3p9sc7Oa4cNtFv1YIbJ5uPvrqp4UaC3d sHBesJXXxZnQQ== Received: by quaco.ghostprotocols.net (Postfix, from userid 1000) id 6C45C405BE; Wed, 18 Jan 2023 09:29:21 -0300 (-03) Date: Wed, 18 Jan 2023 09:29:21 -0300 From: Arnaldo Carvalho de Melo To: linux-kernel@vger.kernel.org Cc: Gavin Shan , Marc Zyngier , Adrian Hunter , Ian Rogers , Jiri Olsa , Namhyung Kim Subject: [PATCH 1/1 FYI] tools kvm headers arm64: Update KVM header from the kernel sources Message-ID: MIME-Version: 1.0 Content-Disposition: inline X-Spam-Status: No, score=-7.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1755366335332273973?= X-GMAIL-MSGID: =?utf-8?q?1755366335332273973?= tldr; Just FYI, I'm carrying this on the perf tools tree. - Arnaldo Full explanation: There used to be no copies, with tools/ code using kernel headers directly. From time to time tools/perf/ broke due to legitimate kernel hacking. At some point Linus complained about such direct usage. Then we adopted the current model. The way these headers are used in perf are not restricted to just including them to compile something. There are sometimes used in scripts that convert defines into string tables, etc, so some change may break one of these scripts, or new MSRs may use some different #define pattern, etc. E.g.: $ ls -1 tools/perf/trace/beauty/*.sh | head -5 tools/perf/trace/beauty/arch_errno_names.sh tools/perf/trace/beauty/drm_ioctl.sh tools/perf/trace/beauty/fadvise.sh tools/perf/trace/beauty/fsconfig.sh tools/perf/trace/beauty/fsmount.sh $ $ tools/perf/trace/beauty/fadvise.sh static const char *fadvise_advices[] = { [0] = "NORMAL", [1] = "RANDOM", [2] = "SEQUENTIAL", [3] = "WILLNEED", [4] = "DONTNEED", [5] = "NOREUSE", }; $ The tools/perf/check-headers.sh script, part of the tools/ build process, points out changes in the original files. So its important not to touch the copies in tools/ when doing changes in the original kernel headers, that will be done later, when check-headers.sh inform about the change to the perf tools hackers. --- To pick the changes from: 9cb1096f8590bc59 ("KVM: arm64: Enable ring-based dirty memory tracking") That doesn't result in any changes in tooling (built on a Libre Computer Firefly ROC-RK3399-PC-V1.1-A), only addresses this perf build warning: Warning: Kernel ABI header at 'tools/arch/arm64/include/uapi/asm/kvm.h' differs from latest version at 'arch/arm64/include/uapi/asm/kvm.h' diff -u tools/arch/arm64/include/uapi/asm/kvm.h arch/arm64/include/uapi/asm/kvm.h Cc: Adrian Hunter Cc: Gavin Shan Cc: Ian Rogers Cc: Jiri Olsa Cc: Marc Zyngier Cc: Namhyung Kim Link: http://lore.kernel.org/lkml/ Signed-off-by: Arnaldo Carvalho de Melo --- tools/arch/arm64/include/uapi/asm/kvm.h | 1 + 1 file changed, 1 insertion(+) diff --git a/tools/arch/arm64/include/uapi/asm/kvm.h b/tools/arch/arm64/include/uapi/asm/kvm.h index 316917b9870704de..a7a857f1784d80d6 100644 --- a/tools/arch/arm64/include/uapi/asm/kvm.h +++ b/tools/arch/arm64/include/uapi/asm/kvm.h @@ -43,6 +43,7 @@ #define __KVM_HAVE_VCPU_EVENTS #define KVM_COALESCED_MMIO_PAGE_OFFSET 1 +#define KVM_DIRTY_LOG_PAGE_OFFSET 64 #define KVM_REG_SIZE(id) \ (1U << (((id) & KVM_REG_SIZE_MASK) >> KVM_REG_SIZE_SHIFT))