Received: by 2002:a05:7412:b101:b0:e2:908c:2ebd with SMTP id az1csp2831967rdb; Wed, 15 Nov 2023 11:48:21 -0800 (PST) X-Google-Smtp-Source: AGHT+IFNbMbhNijHRr+EhPbH/YXiJEBnlT+sYE/Me1oC8KeRsLchgA+U3vcr70X/5asw6hxNATQ0 X-Received: by 2002:a17:90b:4c04:b0:27d:76e2:ab18 with SMTP id na4-20020a17090b4c0400b0027d76e2ab18mr12507935pjb.9.1700077700802; Wed, 15 Nov 2023 11:48:20 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700077700; cv=none; d=google.com; s=arc-20160816; b=rN6vIyWqw9X0RcvmWUw+Xl/pLqWZRfb2W3nuWCDFIIGuvSQkbv0Jh0GHkmWEdx+UT8 +VbUU2dnPNJDUQfXge0ecfXO9w4th1dvPrAe0abwCRXUCpy6y/FBf7/UNMoQF7EZdi5+ 5pTu0eLnuaV4cOBW6RWblzO3fkOYpACDRbhbnhMZaV0oyZ6/p7rJn3TMIVa+y7Dd9yWR Q8ihfilnqEZzMpNI20zcTXnEFJbM5KCITN4QScTrPTU2hDHdTeBGVhDSKt2kM+FmP7DC wg10/PeZAecceDSpZ/0uR2+q7eEdvRbPYRJpDvCLmhMkIxmlAU1CCiPaq28/sLfZWoy/ MO/Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=0CMykeQup+UcIXwLhRxd6ite3nv0zt1069OA+3hbP0Q=; fh=oY5VZxC4OYJaeaYJhxCuNxKA3JJmGIwcPPjRFY/HMYo=; b=pRA8DCGTs4FluykpLvmqDqSbbAQJEc+JyUH/GOJTRWjmxQEIeTrMAE2VSpHS20STOD 7iiuzKguFelsVfxDIVUCBu2gFXg4G/t9zEtgbL+veHePtztigCqXlXoJ0iyFO7JvTyc+ NexWkZp3iMRF3DhHwSNDJeqsIG0XJjfbk3N+jHgLrM64/qLB2uKr4xDCSGcc9PWnKfKC CoQmuKeU7JIpvCHvEg57z18HJc/NF7T1BwewflhBVJRy+HkMc0zOBabTEL5dmvkWCkb0 CHY/58hKyKrNAGpbjdQhqTpf10N5F/xAp5YXSExtbMqJBmCB8jXj9labjxralDisU3v4 VgQQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@infradead.org header.s=bombadil.20210309 header.b=t6AnYRFJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from agentk.vger.email (agentk.vger.email. [23.128.96.32]) by mx.google.com with ESMTPS id i3-20020a17090acf8300b002777081181fsi375683pju.51.2023.11.15.11.48.20 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Nov 2023 11:48:20 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) client-ip=23.128.96.32; Authentication-Results: mx.google.com; dkim=pass header.i=@infradead.org header.s=bombadil.20210309 header.b=t6AnYRFJ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.32 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id D2D758023EFA; Wed, 15 Nov 2023 11:48:16 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235298AbjKOTsE (ORCPT + 99 others); Wed, 15 Nov 2023 14:48:04 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:49846 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235305AbjKOTsC (ORCPT ); Wed, 15 Nov 2023 14:48:02 -0500 Received: from bombadil.infradead.org (bombadil.infradead.org [IPv6:2607:7c80:54:3::133]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8828E1AB; Wed, 15 Nov 2023 11:47:59 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=bombadil.20210309; h=Content-Transfer-Encoding: Content-Type:In-Reply-To:From:References:Cc:To:Subject:MIME-Version:Date: Message-ID:Sender:Reply-To:Content-ID:Content-Description; bh=0CMykeQup+UcIXwLhRxd6ite3nv0zt1069OA+3hbP0Q=; b=t6AnYRFJPAtg1Cacp/8EbyRXN9 G3nX2VuCjMsM7wBmvwx+bxLvsGdxWF3P8c51k0ubkoZx1RsipJvigEwTrY5FnCLjuVxPqTo0cCcz3 LaY7msDUZ0FgrVZAf4wlCQ9fm8e+lpr0nLdYLupNHfGiSALppIOk/NnGQWFDgSKLpGuOZA0ZRquCd vuWBmAXc/TrOFExXydIgGJYNmUtA/88KIA7+A2n+V8Jf28aTX37I85toPBWi+vijBTNaczrrnjZVM Ebi+DPmwNCxUZ2MytyIzrmyqUahFDLDkXbahPraYzRu0aTuIuAYXjGO2jaC/ocLoI6pNJW4HcqqcS PcY6k65Q==; Received: from [50.53.46.231] (helo=[192.168.254.15]) by bombadil.infradead.org with esmtpsa (Exim 4.96 #2 (Red Hat Linux)) id 1r3Lre-001cFD-18; Wed, 15 Nov 2023 19:47:54 +0000 Message-ID: <0f74ba84-a0fb-41cb-b22c-943f47c631da@infradead.org> Date: Wed, 15 Nov 2023 11:47:53 -0800 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH] LoongArch: KVM: Fix build due to API changes Content-Language: en-US To: Huacai Chen , Paolo Bonzini , Huacai Chen , Tianrui Zhao , Bibo Mao Cc: kvm@vger.kernel.org, loongarch@lists.linux.dev, linux-kernel@vger.kernel.org, Xuerui Wang , Jiaxun Yang References: <20231115090735.2404866-1-chenhuacai@loongson.cn> From: Randy Dunlap In-Reply-To: <20231115090735.2404866-1-chenhuacai@loongson.cn> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Wed, 15 Nov 2023 11:48:17 -0800 (PST) On 11/15/23 01:07, Huacai Chen wrote: > Commit 8569992d64b8f750e34b7858eac ("KVM: Use gfn instead of hva for > mmu_notifier_retry") replaces mmu_invalidate_retry_hva() usage with > mmu_invalidate_retry_gfn() for X86, LoongArch also need similar changes > to fix build. > > Signed-off-by: Huacai Chen Reported-by: Randy Dunlap Tested-by: Randy Dunlap # build-tested Acked-by: Randy Dunlap Thanks. > --- > arch/loongarch/kvm/mmu.c | 4 ++-- > 1 file changed, 2 insertions(+), 2 deletions(-) > > diff --git a/arch/loongarch/kvm/mmu.c b/arch/loongarch/kvm/mmu.c > index 80480df5f550..9463ebecd39b 100644 > --- a/arch/loongarch/kvm/mmu.c > +++ b/arch/loongarch/kvm/mmu.c > @@ -627,7 +627,7 @@ static bool fault_supports_huge_mapping(struct kvm_memory_slot *memslot, > * > * There are several ways to safely use this helper: > * > - * - Check mmu_invalidate_retry_hva() after grabbing the mapping level, before > + * - Check mmu_invalidate_retry_gfn() after grabbing the mapping level, before > * consuming it. In this case, mmu_lock doesn't need to be held during the > * lookup, but it does need to be held while checking the MMU notifier. > * > @@ -807,7 +807,7 @@ static int kvm_map_page(struct kvm_vcpu *vcpu, unsigned long gpa, bool write) > > /* Check if an invalidation has taken place since we got pfn */ > spin_lock(&kvm->mmu_lock); > - if (mmu_invalidate_retry_hva(kvm, mmu_seq, hva)) { > + if (mmu_invalidate_retry_gfn(kvm, mmu_seq, gfn)) { > /* > * This can happen when mappings are changed asynchronously, but > * also synchronously if a COW is triggered by -- ~Randy