From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 929D335B659 for ; Wed, 4 Mar 2026 15:59:33 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1772639973; cv=none; b=uG//DzOUfuCbbudveMSeSxWXmk9tH7UDHEARJFFSnxidvGxo2EkydJcxUR3mmc2ohxI7iqOAf6h15SsnbtsJjm6IzmTTbNcYfLaBhOBVQCbeNOpa/Z97qQCFRmUzfU27r+KEO7kN3dWZErn/rnMZDlnqTtylaeZLlkz8WAsKFao= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1772639973; c=relaxed/simple; bh=r2HSvu8pgUBw++d96rnfYoMLL8dQb2DGY7IisJKZY1s=; h=Date:From:To:Cc:Subject:Message-ID:MIME-Version:Content-Type: Content-Disposition; b=qKWmPnPfhmm8liYwUnhbGG46KFZ7NhzK5d26vspf+BgFlU+X5tqQ2x7Rq+Jb217JhiAbV/6/uP4XVleMPY0LqYW9kINjf3IKpw8preb8NDYj6XIUNdrp9qC6Sb4ateCEVyvGswUpo3fjnls4jkfseX/+OVcCf3FIqf+PXF8I038= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=YmgSLStk; arc=none smtp.client-ip=10.30.226.201 Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="YmgSLStk" Received: by smtp.kernel.org (Postfix) with ESMTPSA id C0165C4CEF7; Wed, 4 Mar 2026 15:59:32 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1772639973; bh=r2HSvu8pgUBw++d96rnfYoMLL8dQb2DGY7IisJKZY1s=; h=Date:From:To:Cc:Subject:From; b=YmgSLStkBkeCVa0UP2yYtsN/QhpymdRj/dyy01anzG8sEien6OhOskqCUKLvAa2KS qXTJvS7Pg8xfdxklI6XcwgQEUgu4ZrF86rGWWDYGoKHY/GvNp6FdlEsecVbvEToS+G qXYg3sC2PWU1sHZDti8fUqaVCIgsQJ8reKZadf5AjEVP2kso3S2Wu0uu6zrwmHG8Vk /sX+6wwqXgO1PiKYMqFPB6aT6lxZJMPW6ZWZrIYPxiNExT31EZ9HPV1NiI1tvmcaoK oR7dRwzVxS0KOwsoZAF9ZYaxE/hwIid/CdJ8C0FKkMqnQ+IGLrzNSndBQpugFHxOgB SFdI3HNTBtqFA== Date: Wed, 4 Mar 2026 12:59:30 -0300 From: Arnaldo Carvalho de Melo To: linux-kernel@vger.kernel.org Cc: Sean Christopherson , Khushit Shah , Michael Roth , Adrian Hunter , Ian Rogers , James Clark , Jiri Olsa , Namhyung Kim Subject: [PATCH 1/1 fyi] tools headers UAPI: Sync x86's asm/kvm.h with the kernel sources Message-ID: Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline tldr; Just FYI, I'm carrying this on the perf tools tree. Full explanation: There used to be no copies, with tools/ code using kernel headers directly. From time to time tools/perf/ broke due to legitimate kernel hacking. At some point Linus complained about such direct usage. Then we adopted the current model. See further details at: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/tools/include/uapi/README To pick the changes in: 6517dfbcc918f970 ("KVM: x86: Add x2APIC "features" to control EOI broadcast suppression") 20c3c4108d58f87c ("KVM: SEV: Add KVM_SEV_SNP_ENABLE_REQ_CERTS command") This silences these perf build warning: Warning: Kernel ABI header differences: diff -u tools/arch/x86/include/uapi/asm/kvm.h arch/x86/include/uapi/asm/kvm.h Please see tools/include/uapi/README for further details. Cc: Sean Christopherson Cc: Khushit Shah Cc: Michael Roth Signed-off-by: Arnaldo Carvalho de Melo --- tools/arch/x86/include/uapi/asm/kvm.h | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/tools/arch/x86/include/uapi/asm/kvm.h b/tools/arch/x86/include/uapi/asm/kvm.h index 7ceff65836525c74..846a63215ce14b43 100644 --- a/tools/arch/x86/include/uapi/asm/kvm.h +++ b/tools/arch/x86/include/uapi/asm/kvm.h @@ -503,6 +503,7 @@ struct kvm_sync_regs { #define KVM_X86_GRP_SEV 1 # define KVM_X86_SEV_VMSA_FEATURES 0 # define KVM_X86_SNP_POLICY_BITS 1 +# define KVM_X86_SEV_SNP_REQ_CERTS 2 struct kvm_vmx_nested_state_data { __u8 vmcs12[KVM_STATE_NESTED_VMX_VMCS_SIZE]; @@ -743,6 +744,7 @@ enum sev_cmd_id { KVM_SEV_SNP_LAUNCH_START = 100, KVM_SEV_SNP_LAUNCH_UPDATE, KVM_SEV_SNP_LAUNCH_FINISH, + KVM_SEV_SNP_ENABLE_REQ_CERTS, KVM_SEV_NR_MAX, }; @@ -914,8 +916,10 @@ struct kvm_sev_snp_launch_finish { __u64 pad1[4]; }; -#define KVM_X2APIC_API_USE_32BIT_IDS (1ULL << 0) -#define KVM_X2APIC_API_DISABLE_BROADCAST_QUIRK (1ULL << 1) +#define KVM_X2APIC_API_USE_32BIT_IDS _BITULL(0) +#define KVM_X2APIC_API_DISABLE_BROADCAST_QUIRK _BITULL(1) +#define KVM_X2APIC_ENABLE_SUPPRESS_EOI_BROADCAST _BITULL(2) +#define KVM_X2APIC_DISABLE_SUPPRESS_EOI_BROADCAST _BITULL(3) struct kvm_hyperv_eventfd { __u32 conn_id; -- 2.53.0