Received: by 2002:a17:90b:8d0:0:0:0:0 with SMTP id ds16csp195566pjb; Thu, 16 Jul 2020 11:41:44 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy0aB7h56np9wkT2JZld8DXNcKdWmBuAvLn676IMHcQU0ok+19QEAjTLmFzhnNQVI07rJHn X-Received: by 2002:a50:8f83:: with SMTP id y3mr5883523edy.257.1594924903833; Thu, 16 Jul 2020 11:41:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1594924903; cv=none; d=google.com; s=arc-20160816; b=XZ2c54Xj5KE/YUxs+PYfrbnECzBJyL+dRBZcP6+z4tXPCScfo4rDpPgLAs++hlUr7a DNZDrNd/C/CgcuIKYwedJYYadIZ7wLPyyUsLIskKHlPkr8yjFStSd99l6BAXHkHEzxpy msgJMrkMC+8YuAe4qFv++YPaAdLnS5Y3mEVySiq1jr/e9WSHSxSSdPX3JPOFv22+I14l epomu2xEEOw7KN5Zc9S6EDRYkp5KwHmZk4s9XKvgDFljXw4H2gxBdA9PFlLfMHLR+HSY tyFyBZeJM05AC0HW2d8d0QQeEOEUcDAdx+dwwjxMbSgRUBTKWvJLifSp3etwXN6nAqZm dGEw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:ironport-sdr:ironport-sdr; bh=6kos1PxZwDW+cnBv6VPeF9DL+b0CjfPyugfOF22drQo=; b=XgAjKTUjdzeGjXu6e+58kMUo/7haeBlVJYT3b7NE3v8uEKVSIHbfJUPHOSGU23WWng yvpjoSswy6mS41ZxCfUu1/Za4hbnOH9o8J0nEy2GeYTsZ90YnRs+qrLH9hIqN71XlDKW Om2DwbeMLjS9hdCG+qEGMAiUxfiXuOJIJAcWel42wMaIHlZuVDBaQnqD9yLG+KTpVAsH c7CE2za3cKTKpK0k/K3PRU9yCqwmL9X+hkb+EUdP2SbtTn5apLb/i6AoNODES0VNWGPD apbwi/kVmYXkdNR07KKP64EzTDTZEciYh7z6tr6L04m2PrCdz1AOeyijpGjccV7yVia1 hpiw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id z21si3517802ejm.542.2020.07.16.11.41.21; Thu, 16 Jul 2020 11:41:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729481AbgGPSi4 (ORCPT + 99 others); Thu, 16 Jul 2020 14:38:56 -0400 Received: from mga09.intel.com ([134.134.136.24]:21162 "EHLO mga09.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726986AbgGPSir (ORCPT ); Thu, 16 Jul 2020 14:38:47 -0400 IronPort-SDR: GvYjcVlwidpdLDmJeZARcUMAyZBtmp609wHoRLk0fofzkIUDn5Pf/WICvHi/jli5ZwEMPaUiNm TkLmfbEWfbtA== X-IronPort-AV: E=McAfee;i="6000,8403,9684"; a="150857725" X-IronPort-AV: E=Sophos;i="5.75,360,1589266800"; d="scan'208";a="150857725" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga005.jf.intel.com ([10.7.209.41]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 16 Jul 2020 11:38:42 -0700 IronPort-SDR: RbGjVsKUnVYvvmta/zO1K62zgFbyHGIAE6PCFcFi8/fCv4FzOOotUohZQSbQ1jSKkI1GuJke9a ZDa1QQ/phecA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.75,360,1589266800"; d="scan'208";a="460572044" Received: from jacob-builder.jf.intel.com ([10.7.199.155]) by orsmga005.jf.intel.com with ESMTP; 16 Jul 2020 11:38:35 -0700 From: Jacob Pan To: iommu@lists.linux-foundation.org, LKML , Joerg Roedel , Alex Williamson Cc: "Lu Baolu" , David Woodhouse , Yi Liu , "Tian, Kevin" , Raj Ashok , "Christoph Hellwig" , Jean-Philippe Brucker , Eric Auger , Jonathan Corbet , Jacob Pan Subject: [PATCH v5 2/5] iommu/uapi: Add argsz for user filled data Date: Thu, 16 Jul 2020 11:45:14 -0700 Message-Id: <1594925117-64892-3-git-send-email-jacob.jun.pan@linux.intel.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1594925117-64892-1-git-send-email-jacob.jun.pan@linux.intel.com> References: <1594925117-64892-1-git-send-email-jacob.jun.pan@linux.intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org As IOMMU UAPI gets extended, user data size may increase. To support backward compatibiliy, this patch introduces a size field to each UAPI data structures. It is *always* the responsibility for the user to fill in the correct size. Padding fields are adjusted to ensure 8 byte alignment. Specific scenarios for user data handling are documented in: Documentation/userspace-api/iommu.rst Signed-off-by: Liu Yi L Signed-off-by: Jacob Pan --- include/uapi/linux/iommu.h | 12 +++++++++--- 1 file changed, 9 insertions(+), 3 deletions(-) diff --git a/include/uapi/linux/iommu.h b/include/uapi/linux/iommu.h index e907b7091a46..d5e9014f690e 100644 --- a/include/uapi/linux/iommu.h +++ b/include/uapi/linux/iommu.h @@ -135,6 +135,7 @@ enum iommu_page_response_code { /** * struct iommu_page_response - Generic page response information + * @argsz: User filled size of this data * @version: API version of this structure * @flags: encodes whether the corresponding fields are valid * (IOMMU_FAULT_PAGE_RESPONSE_* values) @@ -143,6 +144,7 @@ enum iommu_page_response_code { * @code: response code from &enum iommu_page_response_code */ struct iommu_page_response { + __u32 argsz; #define IOMMU_PAGE_RESP_VERSION_1 1 __u32 version; #define IOMMU_PAGE_RESP_PASID_VALID (1 << 0) @@ -218,6 +220,7 @@ struct iommu_inv_pasid_info { /** * struct iommu_cache_invalidate_info - First level/stage invalidation * information + * @argsz: User filled size of this data * @version: API version of this structure * @cache: bitfield that allows to select which caches to invalidate * @granularity: defines the lowest granularity used for the invalidation: @@ -246,6 +249,7 @@ struct iommu_inv_pasid_info { * must support the used granularity. */ struct iommu_cache_invalidate_info { + __u32 argsz; #define IOMMU_CACHE_INVALIDATE_INFO_VERSION_1 1 __u32 version; /* IOMMU paging structure cache */ @@ -255,7 +259,7 @@ struct iommu_cache_invalidate_info { #define IOMMU_CACHE_INV_TYPE_NR (3) __u8 cache; __u8 granularity; - __u8 padding[2]; + __u8 padding[6]; union { struct iommu_inv_pasid_info pasid_info; struct iommu_inv_addr_info addr_info; @@ -292,6 +296,7 @@ struct iommu_gpasid_bind_data_vtd { /** * struct iommu_gpasid_bind_data - Information about device and guest PASID binding + * @argsz: User filled size of this data * @version: Version of this data structure * @format: PASID table entry format * @flags: Additional information on guest bind request @@ -309,17 +314,18 @@ struct iommu_gpasid_bind_data_vtd { * PASID to host PASID based on this bind data. */ struct iommu_gpasid_bind_data { + __u32 argsz; #define IOMMU_GPASID_BIND_VERSION_1 1 __u32 version; #define IOMMU_PASID_FORMAT_INTEL_VTD 1 __u32 format; + __u32 addr_width; #define IOMMU_SVA_GPASID_VAL (1 << 0) /* guest PASID valid */ __u64 flags; __u64 gpgd; __u64 hpasid; __u64 gpasid; - __u32 addr_width; - __u8 padding[12]; + __u8 padding[8]; /* Vendor specific data */ union { struct iommu_gpasid_bind_data_vtd vtd; -- 2.7.4