From mboxrd@z Thu Jan 1 00:00:00 1970 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="AsI6Y/xq" Received: from mail-pl1-x630.google.com (mail-pl1-x630.google.com [IPv6:2607:f8b0:4864:20::630]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EFBD6D66; Tue, 21 Nov 2023 14:57:04 -0800 (PST) Received: by mail-pl1-x630.google.com with SMTP id d9443c01a7336-1cf61eed213so21970015ad.2; Tue, 21 Nov 2023 14:57:04 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1700607424; x=1701212224; darn=vger.kernel.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:sender:from:to:cc:subject:date :message-id:reply-to; bh=I57gFn6zue+8kkqtl3RkaJdXFKQmQ2JzNCRbeVy0Nms=; b=AsI6Y/xq1hApC5U573N785n6W1i92im6qE3TjL7pSEH1H5Df2psoWQk/D5LWLZV09M vSkDA51P06XneK4V3eUOlkDW/I8cVBdVQKdD/f6en8Po73y6z4ZdhP6uKrlaTq00VqGn i8rCqJX9GnWhW7o9OuRlr50LClbGr+SFWg/q04rtch+XWRCVUg+pwIODX7yJmpNerIwx YMFS9cKjetyg9IAx+zLnSKd3uQx9zgLVL0fgfTn6jwyl+7ncZmoVLCJsqBV5IcF6CvYM LkZfH9x7mD+K5hE/4wpte4oZ9tAYyQKvp8yPPzRC7Xx7KP4aJceMTWShirTt7NaM9EzD lEAQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1700607424; x=1701212224; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:sender:x-gm-message-state:from :to:cc:subject:date:message-id:reply-to; bh=I57gFn6zue+8kkqtl3RkaJdXFKQmQ2JzNCRbeVy0Nms=; b=TXwL9tL33RYRU/l8tDhvQ8mQpEzFQbZG5gL6gxe0Qdld0u7dseWzLvYa1hnoMRsgbs tGH2mCp7s+5Fnl/c1A084E2HEfD1eUW3m/tUkpZLBYS/MhMUZsg//luOovBMqn+dPzSZ f2hVTTVO4EBtvbL5Iy13SbAWb3+58EARurd7eiqWt+z8yJ+1QZNWMuZdlienmb22jR3Z o6dbhZ2PFf/vs6NyI8/Jd2EHD2F/Vp4nvDok7T/d412NEwc6gvmIJq2AjxjJpvLY+JwN ybUpR/DcDj4+arvCWNIDYq/QUh/lXmT8tfgJVbXb+sncyYw4f7tHzGK3rvwyzCCxK/MS 5ZzQ== X-Gm-Message-State: AOJu0YwOh4yxa/QnxNeLEwrTNOXCdOgYTYcgdyYoYcyW4r51TASSkUTR orRXEiXvf2E/k8Cb4n/8a9NSXXgmUSo= X-Google-Smtp-Source: AGHT+IH8fB1cs3ffiEd9JK8XO3sS19JX7Y5A1zj+bnxNqxT0mMcQ3vG4M/obcmtxOIfilUzz6S4poA== X-Received: by 2002:a17:902:dac1:b0:1cc:4e46:3e45 with SMTP id q1-20020a170902dac100b001cc4e463e45mr708746plx.49.1700607424390; Tue, 21 Nov 2023 14:57:04 -0800 (PST) Received: from bangji.hsd1.ca.comcast.net ([2601:647:6780:42e0:7377:923f:1ff3:266d]) by smtp.gmail.com with ESMTPSA id m12-20020a1709026bcc00b001cc47c1c29csm8413189plt.84.2023.11.21.14.57.03 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 21 Nov 2023 14:57:03 -0800 (PST) Sender: Namhyung Kim From: Namhyung Kim To: Arnaldo Carvalho de Melo , Jiri Olsa Cc: Ian Rogers , Adrian Hunter , Peter Zijlstra , Ingo Molnar , LKML , linux-perf-users@vger.kernel.org, Heiko Carstens , Vasily Gorbik , Alexander Gordeev , Christian Borntraeger , Sven Schnelle , linux-s390@vger.kernel.org Subject: [PATCH 10/14] tools headers: Update tools's copy of s390/asm headers Date: Tue, 21 Nov 2023 14:56:45 -0800 Message-ID: <20231121225650.390246-10-namhyung@kernel.org> X-Mailer: git-send-email 2.43.0.rc1.413.gea7ed67945-goog In-Reply-To: <20231121225650.390246-1-namhyung@kernel.org> References: <20231121225650.390246-1-namhyung@kernel.org> Precedence: bulk X-Mailing-List: linux-s390@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit tldr; Just FYI, I'm carrying this on the perf tools tree. Full explanation: There used to be no copies, with tools/ code using kernel headers directly. From time to time tools/perf/ broke due to legitimate kernel hacking. At some point Linus complained about such direct usage. Then we adopted the current model. The way these headers are used in perf are not restricted to just including them to compile something. There are sometimes used in scripts that convert defines into string tables, etc, so some change may break one of these scripts, or new MSRs may use some different #define pattern, etc. E.g.: $ ls -1 tools/perf/trace/beauty/*.sh | head -5 tools/perf/trace/beauty/arch_errno_names.sh tools/perf/trace/beauty/drm_ioctl.sh tools/perf/trace/beauty/fadvise.sh tools/perf/trace/beauty/fsconfig.sh tools/perf/trace/beauty/fsmount.sh $ $ tools/perf/trace/beauty/fadvise.sh static const char *fadvise_advices[] = { [0] = "NORMAL", [1] = "RANDOM", [2] = "SEQUENTIAL", [3] = "WILLNEED", [4] = "DONTNEED", [5] = "NOREUSE", }; $ The tools/perf/check-headers.sh script, part of the tools/ build process, points out changes in the original files. So its important not to touch the copies in tools/ when doing changes in the original kernel headers, that will be done later, when check-headers.sh inform about the change to the perf tools hackers. Cc: Heiko Carstens Cc: Vasily Gorbik Cc: Alexander Gordeev Cc: Christian Borntraeger Cc: Sven Schnelle Cc: linux-s390@vger.kernel.org Signed-off-by: Namhyung Kim --- tools/arch/s390/include/uapi/asm/kvm.h | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/tools/arch/s390/include/uapi/asm/kvm.h b/tools/arch/s390/include/uapi/asm/kvm.h index a73cf01a1606..abe926d43cbe 100644 --- a/tools/arch/s390/include/uapi/asm/kvm.h +++ b/tools/arch/s390/include/uapi/asm/kvm.h @@ -159,6 +159,22 @@ struct kvm_s390_vm_cpu_subfunc { __u8 reserved[1728]; }; +#define KVM_S390_VM_CPU_PROCESSOR_UV_FEAT_GUEST 6 +#define KVM_S390_VM_CPU_MACHINE_UV_FEAT_GUEST 7 + +#define KVM_S390_VM_CPU_UV_FEAT_NR_BITS 64 +struct kvm_s390_vm_cpu_uv_feat { + union { + struct { + __u64 : 4; + __u64 ap : 1; /* bit 4 */ + __u64 ap_intr : 1; /* bit 5 */ + __u64 : 58; + }; + __u64 feat; + }; +}; + /* kvm attributes for crypto */ #define KVM_S390_VM_CRYPTO_ENABLE_AES_KW 0 #define KVM_S390_VM_CRYPTO_ENABLE_DEA_KW 1 -- 2.43.0.rc1.413.gea7ed67945-goog