Re: [PATCH 1/2] docs: mm/gup: pin_user_pages.rst: add a "case 5"

2020-06-12 Thread John Hubbard
On 2020-06-12 12:24, Matthew Wilcox wrote: On Fri, May 29, 2020 at 04:43:08PM -0700, John Hubbard wrote: +CASE 5: Pinning in order to write to the data within the page +- +Even though neither DMA nor Direct IO is involved, just a

Re: [PATCH 1/2] docs: mm/gup: pin_user_pages.rst: add a "case 5"

2020-06-12 Thread Matthew Wilcox
On Fri, May 29, 2020 at 04:43:08PM -0700, John Hubbard wrote: > +CASE 5: Pinning in order to write to the data within the page > +- > +Even though neither DMA nor Direct IO is involved, just a simple case of > "pin, > +access page's

Re: [PATCH] s390: protvirt: virtio: Refuse device without IOMMU

2020-06-12 Thread Pierre Morel
On 2020-06-12 15:45, Mauricio Tavares wrote: On Wed, Jun 10, 2020 at 12:32 PM Pierre Morel wrote: Protected Virtualisation protects the memory of the guest and do not allow a the host to access all of its memory. Let's refuse a VIRTIO device which does not use IOMMU protected access.

Re: [PATCH] drivers\block: Use kobj_to_dev() API

2020-06-12 Thread Michael S. Tsirkin
On Fri, Jun 12, 2020 at 03:10:56PM +0800, Wang Qing wrote: > Use kobj_to_dev() API instead of container_of(). > > Signed-off-by: Wang Qing > --- > drivers/block/virtio_blk.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > mode change 100644 => 100755 drivers/block/virtio_blk.c

Re: [PATCH v3 47/75] x86/sev-es: Add Runtime #VC Exception Handler

2020-06-12 Thread Borislav Petkov
On Thu, Jun 11, 2020 at 01:48:31PM +0200, Joerg Roedel wrote: > The most important use-case is #VC->NMI->#VC. When an NMI hits while the > #VC handler uses the GHCB and the NMI handler causes another #VC, then > the contents of the GHCB needs to be backed up, so that it doesn't > destroy the GHCB

Re: [PATCH] s390: protvirt: virtio: Refuse device without IOMMU

2020-06-12 Thread Pierre Morel
On 2020-06-12 11:21, Pierre Morel wrote: On 2020-06-11 05:10, Jason Wang wrote: On 2020/6/10 下午9:11, Pierre Morel wrote: Protected Virtualisation protects the memory of the guest and do not allow a the host to access all of its memory. Let's refuse a VIRTIO device which does not use

[PATCH] drm/virtio: fix unblank

2020-06-12 Thread Gerd Hoffmann
When going through a disable/enable cycle without changing the framebuffer the optimization added by commit 3954ff10e06e causes the screen stay blank. Add a bool to force an update to fix that. Cc: 1882...@bugs.launchpad.net Fixes: 3954ff10e06e ("drm/virtio: skip set_scanout if framebuffer

Re: [PATCH v3 59/75] x86/sev-es: Handle MONITOR/MONITORX Events

2020-06-12 Thread Joerg Roedel
On Thu, Jun 11, 2020 at 02:33:12PM -0500, Tom Lendacky wrote: > I don't think there is any guarantee that MONITOR/MWAIT would work within a > guest (I'd have to dig some more on that to get a definitive answer, but > probably not necessary to do). As you say, if KVM emulates it as a NOP, > there's

Re: [PATCH] s390: protvirt: virtio: Refuse device without IOMMU

2020-06-12 Thread Pierre Morel
On 2020-06-11 05:10, Jason Wang wrote: On 2020/6/10 下午9:11, Pierre Morel wrote: Protected Virtualisation protects the memory of the guest and do not allow a the host to access all of its memory. Let's refuse a VIRTIO device which does not use IOMMU protected access. Signed-off-by: Pierre

Re: [PATCH v3 64/75] x86/sev-es: Cache CPUID results for improved performance

2020-06-12 Thread Joerg Roedel
On Tue, Apr 28, 2020 at 05:17:14PM +0200, Joerg Roedel wrote: > From: Mike Stunes > > To avoid a future VMEXIT for a subsequent CPUID function, cache the > results returned by CPUID into an xarray. > > [tl: coding standard changes, register zero extension] > > Signed-off-by: Mike Stunes >