Received: by 10.192.165.148 with SMTP id m20csp1114283imm; Fri, 27 Apr 2018 13:00:08 -0700 (PDT) X-Google-Smtp-Source: AB8JxZoAXe3rEgzUHDeQY8C+Ho6yIY8qQavLkg47oIswUASza/LaEbZxsFQUUbHVMChjt+1rHwB6 X-Received: by 10.98.205.69 with SMTP id o66mr3344855pfg.250.1524859208266; Fri, 27 Apr 2018 13:00:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524859208; cv=none; d=google.com; s=arc-20160816; b=DYzin7uutpwQU/I+bFhvQxHhZWf+VYSt1G93NMnKBOg3aVLI9K8e3t9mbMWur7YTHP sdZw7ooAMYRNIC56tKeg2iMxEUXKqpZeo4tShZHLH95973aDJftHRJPz/pj/Digl7OpR Uo0EiijFMSDo5tb8QHriPLjmvCIIyFh/u7q5mI6LX7uc9vsQtjO20oExjz8d2PlarZIJ WZbFyp7LuFwWLa1h5a5SkDnDXv3ZAOS9zF2rrEmDGukDNWDDxBqdIkRmKITDWnAtfwAS GBxB/EiDScsyTD7KYXyTzT0vhlxkBKXWucme4BL1wzTubvR0ZiB5t8N6GGtH1kUbGHwT +tPA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:cc:to:subject :message-id:date:from:references:in-reply-to:mime-version :dkim-signature:arc-authentication-results; bh=Icxl+hhMIL6OoaVaDsHxNCPnwm+FigZX5nocG5EWrkg=; b=pXn2vPxwpWGw+hcpMrr8SC/hsslKJuMrqBp+L2CVHCddyURmSnVCZMMu5dTOTesn1A Al3eE/4CO452Ocr59qWwctLseF3KSpjNocvlKe/Tr33BfM0tu2gpiL6iqSMrpLuSgRyR KXCvi/SWL/+N6Y2ib1LiLTZrONKchkJOjtrRSTbuM1HSZdlTed7h0WXWpH7cwxXvISJy tfbTuo6ODFYbVc57c/NYOjWWSFlp7Km35PKjUYibxQMEP/MS9qdSiBiTkCYK6RIeUkJ6 p44ZdG5cs8QB+3PDgkUcpJIXlwZ7mfo8Pp/+z8ss8T235d+JTUfV4EvmGhsHKlgqqHlB aCug== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=GxBhFMNE; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r87si1866862pfg.305.2018.04.27.12.59.54; Fri, 27 Apr 2018 13:00:08 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=GxBhFMNE; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1759171AbeD0T6q (ORCPT + 99 others); Fri, 27 Apr 2018 15:58:46 -0400 Received: from mail-qt0-f194.google.com ([209.85.216.194]:43497 "EHLO mail-qt0-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1758944AbeD0T6p (ORCPT ); Fri, 27 Apr 2018 15:58:45 -0400 Received: by mail-qt0-f194.google.com with SMTP id l11-v6so3845146qtj.10; Fri, 27 Apr 2018 12:58:44 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:sender:in-reply-to:references:from:date:message-id :subject:to:cc:content-transfer-encoding; bh=Icxl+hhMIL6OoaVaDsHxNCPnwm+FigZX5nocG5EWrkg=; b=GxBhFMNEsBWo/zlssOKSolgD/G6Qx3G6FH3nBkJ0RF5WGZwzJ6/AmnoxOYNQJXhnnJ i2mTlIDUm3A3MRnNrWF4ixhvFWG0ube8n3ADs3q4GPW59wRdNe2ffZvF9kJ679rWOaQx M/LwTNLADOl9t+O+8gzbIwfNZxrDT0kPTI+gg/IeMEdelM+KvcutwJtCLJAOJgjTAm4m H43xa0KdtbtM07oVCYQKrpr7nPmuXTywaZ9INqCJLFS/fXLR8QvGm9yMciS9n80eoJnn Rc6Md0I3ICr9eI9ZZCrRoDOyUukxG3mCI5MxfnSnylkB7wH5QOyAFsTvhXkurtSHZqms Vjag== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:sender:in-reply-to:references:from :date:message-id:subject:to:cc:content-transfer-encoding; bh=Icxl+hhMIL6OoaVaDsHxNCPnwm+FigZX5nocG5EWrkg=; b=RILqIRuYtdPVB4CJRbEN8JkGneV0oHMC6EKg9NtPfRAbuWulKVGn4ZbcdOJpE8h9Sm FOpj4D0UI+r8M2UQzXv2+uNcopxtZ/4GICzAaE2YxK78K+46Wk+Pa2vocsi8T1K18+rR WjB4iCbE/Er7xnwhE7CVtWKjGtojYqZxjeUEFlJ9gzInOkNh6J0RRJQuZ+cbStAtB7m6 U1HEyzXOMKLknLng9ls/zM1YZO2drvDfUXro7g6Kbw5866d9Imq+lHTMJExrelar6qRd nOSPFluUDwrCjWZhWfmeDJi8roaaqgfhejdYEABY7n/uPOVb+44C/0+Tu1EyPSOvabmz uV4w== X-Gm-Message-State: ALQs6tBaiSle70HQ+TL6Z5BymRspzIrihOUWr5M4eQpi9wvzWRxlPJTW jS2Pp3pJ34w926PokTtROUDjlCXpCHoWPhAJkT0ooVOs X-Received: by 2002:a0c:af34:: with SMTP id i49-v6mr3252910qvc.210.1524859124240; Fri, 27 Apr 2018 12:58:44 -0700 (PDT) MIME-Version: 1.0 Received: by 10.12.185.3 with HTTP; Fri, 27 Apr 2018 12:58:43 -0700 (PDT) In-Reply-To: References: <20180423080512.1614520-1-arnd@arndb.de> <20180427193204.GD23874@flask> From: Arnd Bergmann Date: Fri, 27 Apr 2018 21:58:43 +0200 X-Google-Sender-Auth: iNj4a_V3TvsXh12rR4X4A7LlxP8 Message-ID: Subject: Re: [PATCH] [RESEND] KVM: x86: use timespec64 for KVM_HC_CLOCK_PAIRING To: =?UTF-8?B?UmFkaW0gS3LEjW3DocWZ?= Cc: Paolo Bonzini , Thomas Gleixner , Ingo Molnar , "H. Peter Anvin" , "the arch/x86 maintainers" , kvm@vger.kernel.org, Linux Kernel Mailing List Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Apr 27, 2018 at 9:45 PM, Arnd Bergmann wrote: > On Fri, Apr 27, 2018 at 9:32 PM, Radim Kr=C4=8Dm=C3=A1=C5=99 wrote: >> 2018-04-23 10:04+0200, Arnd Bergmann: >>> The hypercall was added using a struct timespec based implementation, >>> but we should not use timespec in new code. >>> >>> This changes it to timespec64. There is no functional change >>> here since the implementation is only used in 64-bit kernels >>> that use the same definition for timespec and timespec64. >>> >>> Fixes: 55dd00a73a51 ("KVM: x86: add KVM_HC_CLOCK_PAIRING hypercall") >> >> (Removed the "Fixes:" tag as it doesn't really change behavior.) >> >>> Signed-off-by: Arnd Bergmann >>> --- >>> I originally sent this in October, but got no reply. The patch >>> is still required for the overall cleanup of 'timespec' uses >>> in the kernel, please apply. >> >> Queued now, thanks! >> >> Anything we need to do for the x86_platform_ops switch? > > I think it's on me to resend what I have. That patch is one of the few > remaining ones in my backlog for y2038 after having sent out > some 50 other patches (some new, some old). > > It has been in my testing tree since October though and not shown > any regressions for a while (I had to do one modification after > Jailhouse got merged), so I'll just send it out now. I remember the problem now, that patch relied on another one that turned out to be too ugly: https://patchwork.kernel.org/patch/10016923/ I still had that as part of my own test builds, as the one that we do want fails without it. However, one other patch I sent today ("timekeeping: Remove timespec64 hack") should provide a better path and let me completely avoid that hack. I'll give that a try now and send the modified x86_platform_ops patch. Arnd