Received: by 10.223.185.116 with SMTP id b49csp1461101wrg; Wed, 21 Feb 2018 19:53:04 -0800 (PST) X-Google-Smtp-Source: AH8x224qc/D08LOBoctnijW2Q54sxPb8DBOa9K6ldsawWH78molL4EI7i55n0AAbCSEJ9vXgjtrM X-Received: by 10.101.97.139 with SMTP id c11mr4493945pgv.435.1519271584878; Wed, 21 Feb 2018 19:53:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519271584; cv=none; d=google.com; s=arc-20160816; b=zU9ffMCOIJejU92OwbH59BQmpFUiYbTHQJm3lruQvzG2vyspLORBUiCf2hWgjYPlqy KZn1BB1gozMbR4aoMvAOQ16iQaMhvC1lzyHlL8YrMXb1UKXg5eUgUJAfuVPRI+2Gl3Ja RjXwwOB6Hp4tax4sKVc/4OLPTlFgNXxfTUW7cX7pFBGcYzO3nmW2LrvDk9r7ZZDb1U4v RtoNqKR01w8DBKOda+GsREeADvV4eYubg93ClS9MCBayGCR96HzKoa/RiV+X33ogYgTf krp2NdSv3clMpEgAOvTeNipuYY+HNpm/QUBgmsOdi7bijYu9eCsPU/rdTSc98LIXdo+3 +53g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :mime-version:organization:references:in-reply-to:date:cc:to:from :subject:arc-authentication-results; bh=zwO/HHOr3JLDIG42x0LtQ0kDX/hGJHpqpq/1iK1tc4w=; b=Nn56EXiaiUn1VZ8b8SOWMTZhsBi3xxdfgforJfN5bYL2fq+5dPGY8ec+qIeZw+7+Ca jb1FD7A+hHrfNC1o15SIMmG7taVRobqG8gP9M8JwnNx3BmbZrM6jJ/CFq24/vQBij2NA sXbIvF6IaW3UPtiPVJgFLBP9ctSGSg20xjexA6TjlRZvufVM6gk22lR6fIZVNlyQCpYY aV73XD0a2BDJM7ZruBVQPmZ7LeD6lfzCg5c096tTpmY8Mr7Z55S0hrgot1x9ponQ7iJD F34RRkUmWz5b2gKsK2KymQ4lND6fg5T5IKseAhEHx68JS1eA4dOwjywJkitKq+Mqsaep FZGw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q1-v6si2449906plb.764.2018.02.21.19.52.50; Wed, 21 Feb 2018 19:53:04 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752222AbeBVDwB (ORCPT + 99 others); Wed, 21 Feb 2018 22:52:01 -0500 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:44978 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751998AbeBVDwA (ORCPT ); Wed, 21 Feb 2018 22:52:00 -0500 Received: from pps.filterd (m0098394.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w1M3n08V047475 for ; Wed, 21 Feb 2018 22:52:00 -0500 Received: from e06smtp12.uk.ibm.com (e06smtp12.uk.ibm.com [195.75.94.108]) by mx0a-001b2d01.pphosted.com with ESMTP id 2g9ggftysf-1 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=NOT) for ; Wed, 21 Feb 2018 22:51:59 -0500 Received: from localhost by e06smtp12.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Thu, 22 Feb 2018 03:51:57 -0000 Received: from b06cxnps4074.portsmouth.uk.ibm.com (9.149.109.196) by e06smtp12.uk.ibm.com (192.168.101.142) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; Thu, 22 Feb 2018 03:51:55 -0000 Received: from d06av21.portsmouth.uk.ibm.com (d06av21.portsmouth.uk.ibm.com [9.149.105.232]) by b06cxnps4074.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id w1M3psCY47382702; Thu, 22 Feb 2018 03:51:54 GMT Received: from d06av21.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id A318852043; Thu, 22 Feb 2018 02:43:47 +0000 (GMT) Received: from ozlabs.au.ibm.com (unknown [9.192.253.14]) by d06av21.portsmouth.uk.ibm.com (Postfix) with ESMTP id 52B135203F; Thu, 22 Feb 2018 02:43:47 +0000 (GMT) Received: from adsilva.ozlabs.ibm.com (haven.au.ibm.com [9.192.254.114]) (using TLSv1.2 with cipher AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.au.ibm.com (Postfix) with ESMTPSA id E7F3AA0146; Thu, 22 Feb 2018 14:51:52 +1100 (AEDT) Subject: Re: [PATCH] ocxl: Add get_metadata IOCTL to share OCXL information to userspace From: "Alastair D'Silva" To: Balbir Singh , Frederic Barrat Cc: Arnd Bergmann , frederic.barrat@fr.ibm.com, Greg KH , "linux-kernel@vger.kernel.org" , linuxppc-dev , Andrew Donnellan Date: Thu, 22 Feb 2018 14:51:52 +1100 In-Reply-To: References: <20180221045736.7614-1-alastair@au1.ibm.com> Organization: IBM Australia Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.26.5 (3.26.5-1.fc27) Mime-Version: 1.0 Content-Transfer-Encoding: 7bit X-TM-AS-GCONF: 00 x-cbid: 18022203-0008-0000-0000-000004D2FCE6 X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 18022203-0009-0000-0000-00001E66073C Message-Id: <1519271512.2867.14.camel@au1.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2018-02-22_01:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 impostorscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1709140000 definitions=main-1802220049 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 2018-02-22 at 14:46 +1100, Balbir Singh wrote: > lpc_size could be added. It's currently useless to the library, but > > doesn't > > hurt. The one which was giving me troubles on a previous version of > > this > > patch was the lpc numa node ID, since that was experimental code > > and felt > > out of place considering what's been upstreamed in skiboot and > > linux so far. > > > > Yeah, I think metadata will evolve for a while till it settle's down. > Since ocxl_ioctl_get_metadata is exposed via uapi, a newer program > calling an older kernel will never work, since the size of that > struct > will always be larger than what the OS supports and our > copy_to_user() > will fail. The other option is for the user program to try all > possible versions till one succeeds, that is bad as well. I think > there are a few ways around it, if we care about this combination. > > Balbir Singh. > We have a number of reserved members at the end of the struct which can be re-purposed for future information (with a corresponding bump of the version number). -- Alastair D'Silva Open Source Developer Linux Technology Centre, IBM Australia mob: 0423 762 819