Received: by 2002:ac0:98c7:0:0:0:0:0 with SMTP id g7-v6csp6310954imd; Wed, 31 Oct 2018 09:47:47 -0700 (PDT) X-Google-Smtp-Source: AJdET5cM4lfsmzjRkFbSSzS2Gineq7eLIyMsihI5l+FNJ7reUVk/lF49EoESZHhQZVJD+TNUGNZ4 X-Received: by 2002:a62:5287:: with SMTP id g129-v6mr4132729pfb.17.1541004467497; Wed, 31 Oct 2018 09:47:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1541004467; cv=none; d=google.com; s=arc-20160816; b=G4N75I5IXY6zCR0n31KCVTpI/xRfP6sVZfKV5x50jb+Ou/AxI6FNnN7vZB8KhjJS6F fVjNwh2wOVZidUSvW1peCz9gUXhhOY6MrsAP3V1Mk2HxaKcuFXcEVx/7AM/LwmevhYXL Ijv8a8JF/tcACSv6f5ho0xyVHMBp9sAP9jglygoB8ibWAsCL0/vM+xykjPYNX3yW/vWP q1LNWHRP8W3goO+UDVhRNIv09UVp2wemTigYU1PUacU7cVgQwd9rKK0dj5MHa4b43Ccr PkEHutXvaUvuTgQpT6UqVVy/6bzLyEG7WetrNL5eSCLB9n94KHuCs7uiZw+xI0hrjUNi Kwfg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dkim-signature; bh=lfRKkdbI27U0XhHGRp3TAd2fW8AhcxtXqnnXjpd/zrU=; b=FRYAWqoHMTwzumsxC8JyRVyOnbU6D6eClg/g8xpyJusHqfz3HrYzOcl+jayi937kDz lqlNIUJ7LqsRF2gdswlnrLrIb+c4Q+dDzXJk7lc934Tr4354OPG5BKs5NgoV3lMJkfOn xxJ1RRJhD8dXIo83AToxp3/dRIkibW95oz3czwFw48sfPL9/9LtTjWa/0JFFrIAosFgZ A6IDuK/nGA+Vn2XKQK6BuAn/SOhI7c8g7aDrTBUxtq922jfTdHrqqPV8c+uWtZ07rqeS ngmikrGG7QwL9Fr4fvjAC0KHuQQNjoXkrLSjczaGd6asZ0w5fLEBr+bflpPz+pvLr34c wCbw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=X5c6sw34; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x33-v6si19693290plb.49.2018.10.31.09.47.32; Wed, 31 Oct 2018 09:47:47 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=X5c6sw34; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730218AbeKABp0 (ORCPT + 99 others); Wed, 31 Oct 2018 21:45:26 -0400 Received: from mail.kernel.org ([198.145.29.99]:60150 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729775AbeKABpZ (ORCPT ); Wed, 31 Oct 2018 21:45:25 -0400 Received: from jouet.infradead.org (unknown [179.97.41.186]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 8419620823; Wed, 31 Oct 2018 16:46:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1541004397; bh=Cesggr+pElpumzgeW5DMfZRR90//ht3kRMsTy1aoSD0=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=X5c6sw34gc+MYMPIwwCFfJ9qSJ5ponVkHTm7IhMe/yf19s4dZSA2K3UOHH8sCougK ppkTV5EGorZGBhZgsdVNelv3Ug2FMlBgU9o5afum/Cc06q1yavHgN3n9qdlCLS1SR1 pjnsCo0w7uOUXrlrPxObL1ruVQ1go807COc6cCIg= From: Arnaldo Carvalho de Melo To: Ingo Molnar Cc: Clark Williams , linux-kernel@vger.kernel.org, linux-perf-users@vger.kernel.org, Arnaldo Carvalho de Melo , Jiri Olsa , Namhyung Kim Subject: [PATCH 22/28] tools headers: Sync the various kvm.h header copies Date: Wed, 31 Oct 2018 13:45:02 -0300 Message-Id: <20181031164508.4784-23-acme@kernel.org> X-Mailer: git-send-email 2.14.4 In-Reply-To: <20181031164508.4784-1-acme@kernel.org> References: <20181031164508.4784-1-acme@kernel.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Arnaldo Carvalho de Melo For powerpc, s390, x86 and the main uapi linux/kvm.h header, none of them entail changes in tooling. Cc: Jiri Olsa Cc: Namhyung Kim Link: https://lkml.kernel.org/n/tip-avn7iy8f4tcm2y40sbsdk31m@git.kernel.org Signed-off-by: Arnaldo Carvalho de Melo --- tools/arch/powerpc/include/uapi/asm/kvm.h | 1 + tools/arch/s390/include/uapi/asm/kvm.h | 2 ++ tools/arch/x86/include/uapi/asm/kvm.h | 6 ++---- tools/include/uapi/linux/kvm.h | 21 +++++++++++++++++++-- 4 files changed, 24 insertions(+), 6 deletions(-) diff --git a/tools/arch/powerpc/include/uapi/asm/kvm.h b/tools/arch/powerpc/include/uapi/asm/kvm.h index 1b32b56a03d3..8c876c166ef2 100644 --- a/tools/arch/powerpc/include/uapi/asm/kvm.h +++ b/tools/arch/powerpc/include/uapi/asm/kvm.h @@ -634,6 +634,7 @@ struct kvm_ppc_cpu_char { #define KVM_REG_PPC_DEC_EXPIRY (KVM_REG_PPC | KVM_REG_SIZE_U64 | 0xbe) #define KVM_REG_PPC_ONLINE (KVM_REG_PPC | KVM_REG_SIZE_U32 | 0xbf) +#define KVM_REG_PPC_PTCR (KVM_REG_PPC | KVM_REG_SIZE_U64 | 0xc0) /* Transactional Memory checkpointed state: * This is all GPRs, all VSX regs and a subset of SPRs diff --git a/tools/arch/s390/include/uapi/asm/kvm.h b/tools/arch/s390/include/uapi/asm/kvm.h index 9a50f02b9894..16511d97e8dc 100644 --- a/tools/arch/s390/include/uapi/asm/kvm.h +++ b/tools/arch/s390/include/uapi/asm/kvm.h @@ -160,6 +160,8 @@ struct kvm_s390_vm_cpu_subfunc { #define KVM_S390_VM_CRYPTO_ENABLE_DEA_KW 1 #define KVM_S390_VM_CRYPTO_DISABLE_AES_KW 2 #define KVM_S390_VM_CRYPTO_DISABLE_DEA_KW 3 +#define KVM_S390_VM_CRYPTO_ENABLE_APIE 4 +#define KVM_S390_VM_CRYPTO_DISABLE_APIE 5 /* kvm attributes for migration mode */ #define KVM_S390_VM_MIGRATION_STOP 0 diff --git a/tools/arch/x86/include/uapi/asm/kvm.h b/tools/arch/x86/include/uapi/asm/kvm.h index 8a6eff9c27f3..dabfcf7c3941 100644 --- a/tools/arch/x86/include/uapi/asm/kvm.h +++ b/tools/arch/x86/include/uapi/asm/kvm.h @@ -300,10 +300,7 @@ struct kvm_vcpu_events { __u8 injected; __u8 nr; __u8 has_error_code; - union { - __u8 pad; - __u8 pending; - }; + __u8 pending; __u32 error_code; } exception; struct { @@ -387,6 +384,7 @@ struct kvm_sync_regs { #define KVM_STATE_NESTED_GUEST_MODE 0x00000001 #define KVM_STATE_NESTED_RUN_PENDING 0x00000002 +#define KVM_STATE_NESTED_EVMCS 0x00000004 #define KVM_STATE_NESTED_SMM_GUEST_MODE 0x00000001 #define KVM_STATE_NESTED_SMM_VMXON 0x00000002 diff --git a/tools/include/uapi/linux/kvm.h b/tools/include/uapi/linux/kvm.h index 2875ce85b322..2b7a652c9fa4 100644 --- a/tools/include/uapi/linux/kvm.h +++ b/tools/include/uapi/linux/kvm.h @@ -420,13 +420,19 @@ struct kvm_run { struct kvm_coalesced_mmio_zone { __u64 addr; __u32 size; - __u32 pad; + union { + __u32 pad; + __u32 pio; + }; }; struct kvm_coalesced_mmio { __u64 phys_addr; __u32 len; - __u32 pad; + union { + __u32 pad; + __u32 pio; + }; __u8 data[8]; }; @@ -751,6 +757,15 @@ struct kvm_ppc_resize_hpt { #define KVM_S390_SIE_PAGE_OFFSET 1 +/* + * On arm64, machine type can be used to request the physical + * address size for the VM. Bits[7-0] are reserved for the guest + * PA size shift (i.e, log2(PA_Size)). For backward compatibility, + * value 0 implies the default IPA size, 40bits. + */ +#define KVM_VM_TYPE_ARM_IPA_SIZE_MASK 0xffULL +#define KVM_VM_TYPE_ARM_IPA_SIZE(x) \ + ((x) & KVM_VM_TYPE_ARM_IPA_SIZE_MASK) /* * ioctls for /dev/kvm fds: */ @@ -958,6 +973,8 @@ struct kvm_ppc_resize_hpt { #define KVM_CAP_HYPERV_SEND_IPI 161 #define KVM_CAP_COALESCED_PIO 162 #define KVM_CAP_HYPERV_ENLIGHTENED_VMCS 163 +#define KVM_CAP_EXCEPTION_PAYLOAD 164 +#define KVM_CAP_ARM_VM_IPA_SIZE 165 #ifdef KVM_CAP_IRQ_ROUTING -- 2.14.4