Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp2735744pxj; Mon, 31 May 2021 09:25:44 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzzj0c8jsiMzC8ac28AFL3U1uKd9i+6a4KRkhc+jj9q5qomyil7e4AbOaQJfaxUrMzNQgW6 X-Received: by 2002:a50:d69e:: with SMTP id r30mr18951859edi.186.1622478343916; Mon, 31 May 2021 09:25:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1622478343; cv=none; d=google.com; s=arc-20160816; b=XTIkLrGldKzVpkB5rliTql5FzfW9o1TRUundgBMUlzb8GYw8pmkLBLqK9l1s5SAPL7 22ajjIPC/m+uAEDn4inCUBEdNQ1neHQel1F+QWvgJltX+lfSjiexf3me99kJzKMYRkQz mpq3qCCKwHEexchJ5e2YIBWxq1TrDYflOopbUmgfhSVYAVhA4MPV/SasoCFDlYhvCWsM 1qVd+1DglOXscWbF10r4GS21WBurU/yQtZcjlJ9KzBuAkSY5pQdSJyfCPHhA73xPjyVg rLGB2PF4BUjPQY+n6epYIE7FISj22FmSODeQEHyWrzGAmBC1Rk6gl5FfHpftYPa4PGCT UqRQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=RXuFVX/fx0mT0Hb9jZlxTxNj/A/bch8FfnwLoRpYf4U=; b=XDc2WRESBLbHhciiMQpy6bgRZYDRjpKn6ZLkC9G1z9U2cMDelva60E8OeQCxYPvI+A fjgJrEg5bjxPqjmTyW6+lyxZ168s489UvIosyOIrtA6QSBAhPTCutuhsNATuMCDNIrIG WCOgoAKIcT/QlCXcShmc9GsuYR1xSwGUFmgD5Q7kZRGzHCC7y+NFWnDvlTVMt4Z3yxhr ksV3oL8bDcrEDzSAXxhf13tUcgeiYILyEFNt3AQcfoZHlQg0hvNOmhh3G6aU4pMTIPM5 9RDeibMdXr5H+JyhN0+zCSivA5rmyek4/stFSZOjTssB0yAkB+gz5IYi+iULaTOJ7jas bdSQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=VaUPte0N; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ao10si13162534ejc.33.2021.05.31.09.25.20; Mon, 31 May 2021 09:25:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=VaUPte0N; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234028AbhEaQXs (ORCPT + 99 others); Mon, 31 May 2021 12:23:48 -0400 Received: from mail.kernel.org ([198.145.29.99]:37958 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231826AbhEaOnd (ORCPT ); Mon, 31 May 2021 10:43:33 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id BE29C6191D; Mon, 31 May 2021 13:54:22 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1622469263; bh=JUKEIcUfB95gMzsVG56H79iWc8ZzGhb934BU53z15Ho=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=VaUPte0NpvG5sAC0M879595AlIrh3CwZP5ZtCoN8pEERPpnkdnQkr2atL/bWcG+oU eryo8Vr6adiThXcrxOoRPdn0+hQhZk6dfmVOOZKeR29K3fP2tqZ+f1RJYW5B3KEL7A XsPHpf6ZSXBB2XrXAmB0lQF03oolIuR8DO/EIJgI= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Joe Richey , Paolo Bonzini Subject: [PATCH 5.12 130/296] KVM: X86: Use _BITUL() macro in UAPI headers Date: Mon, 31 May 2021 15:13:05 +0200 Message-Id: <20210531130708.263139199@linuxfoundation.org> X-Mailer: git-send-email 2.31.1 In-Reply-To: <20210531130703.762129381@linuxfoundation.org> References: <20210531130703.762129381@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Joe Richey commit fb1070d18edb37daf3979662975bc54625a19953 upstream. Replace BIT() in KVM's UPAI header with _BITUL(). BIT() is not defined in the UAPI headers and its usage may cause userspace build errors. Fixes: fb04a1eddb1a ("KVM: X86: Implement ring-based dirty memory tracking") Signed-off-by: Joe Richey Message-Id: <20210521085849.37676-3-joerichey94@gmail.com> Signed-off-by: Paolo Bonzini Signed-off-by: Greg Kroah-Hartman --- include/uapi/linux/kvm.h | 5 +++-- tools/include/uapi/linux/kvm.h | 5 +++-- 2 files changed, 6 insertions(+), 4 deletions(-) --- a/include/uapi/linux/kvm.h +++ b/include/uapi/linux/kvm.h @@ -8,6 +8,7 @@ * Note: you must update KVM_API_VERSION if you change this interface. */ +#include #include #include #include @@ -1834,8 +1835,8 @@ struct kvm_hyperv_eventfd { * conversion after harvesting an entry. Also, it must not skip any * dirty bits, so that dirty bits are always harvested in sequence. */ -#define KVM_DIRTY_GFN_F_DIRTY BIT(0) -#define KVM_DIRTY_GFN_F_RESET BIT(1) +#define KVM_DIRTY_GFN_F_DIRTY _BITUL(0) +#define KVM_DIRTY_GFN_F_RESET _BITUL(1) #define KVM_DIRTY_GFN_F_MASK 0x3 /* --- a/tools/include/uapi/linux/kvm.h +++ b/tools/include/uapi/linux/kvm.h @@ -8,6 +8,7 @@ * Note: you must update KVM_API_VERSION if you change this interface. */ +#include #include #include #include @@ -1834,8 +1835,8 @@ struct kvm_hyperv_eventfd { * conversion after harvesting an entry. Also, it must not skip any * dirty bits, so that dirty bits are always harvested in sequence. */ -#define KVM_DIRTY_GFN_F_DIRTY BIT(0) -#define KVM_DIRTY_GFN_F_RESET BIT(1) +#define KVM_DIRTY_GFN_F_DIRTY _BITUL(0) +#define KVM_DIRTY_GFN_F_RESET _BITUL(1) #define KVM_DIRTY_GFN_F_MASK 0x3 /*