Received: by 2002:a25:e74b:0:0:0:0:0 with SMTP id e72csp345239ybh; Mon, 20 Jul 2020 18:46:22 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzZMFou8ywli1bVvlm/RRIZ+s0Zy55oGjxd6RRaceIB1lBtOmktdplMguXd2GjFapDd+M7Z X-Received: by 2002:aa7:cd18:: with SMTP id b24mr24970889edw.3.1595295982026; Mon, 20 Jul 2020 18:46:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1595295982; cv=none; d=google.com; s=arc-20160816; b=Vtg0M2WH1dMO2Ziyxa/w/ddA7eZbiM/d3lPAeytSIyyHiKAHsvUP5Dn1iVL3ei6TRj zWCpemsLUA/zFzG9T/lqOYyrCH+QLxCoj24d4/Js/VWjiK7yLE3lkCyMTzAXxKJipT6M RWmVEGQV9EUAXwNDJNC16M/dLVzlTnDR9iJnPu7iaCMUq//Pm/QV14gZJZ+NDAmJG+CH nGHXY1917QNnxNHUe3JnLJchRiMj4eTWWTomv2OJlWa721d/Uw7KrDxPF9NpWC9k15VF zfo558v9fTHHQclWUS5DkSs9FKipTSNr9I2SX92Z+rYVgXEU3xPyVYLZWjR2NX/m8eFd vR1A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date:ironport-sdr:ironport-sdr; bh=Dqa00tITTf8xgntZAN7gobuJCukYRRy/YdtPu4jB5ss=; b=lwCFAfL4ntB0W5BNnKaJXSXLV7Z63M/Jv5NRfRWfpQZ4b1clNjDA+mcxCwmFybopiH 6cjP+LvQ7CtODvsvnmTBE6rLZBuhAUT0+vZ7T92fah0+0EsLFdu3Fy9twO3HY3mk1gQk Dhy3awJVCYJoAOWE27rZ2CSZyHrwE57MWEhbr6kTW0vzOrY3Nq4raiGaV3jGmo6/PLu2 QgCGyTEVPYNqYT5COd4suQc4rUjhZkpFzHA61YunHz3UoKZCToPSmXsyLjBgxbyc7A0X LsL8x7zxw2y5ZvdknHAwoElWvcQZr0PLZSP7XHT9FkXlkEr9g3ZYPh9vejK5TN7nc2cy uOEw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w23si12008006eds.47.2020.07.20.18.45.58; Mon, 20 Jul 2020 18:46:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726483AbgGUBpt (ORCPT + 99 others); Mon, 20 Jul 2020 21:45:49 -0400 Received: from mga17.intel.com ([192.55.52.151]:56794 "EHLO mga17.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725954AbgGUBpt (ORCPT ); Mon, 20 Jul 2020 21:45:49 -0400 IronPort-SDR: gfO2w3nz5I7iUFtj1/p6SmRbBe+Cn+55w39LJTf7cXDzokuRCcHywkIO+CjYqVtyegNOFXf8lT qkkSAZUhW7cg== X-IronPort-AV: E=McAfee;i="6000,8403,9688"; a="130121533" X-IronPort-AV: E=Sophos;i="5.75,377,1589266800"; d="scan'208";a="130121533" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Jul 2020 18:45:48 -0700 IronPort-SDR: KRaxwk92I+jel9tcLEJ2Nj2mexLNFK2VnXAavZ9QcNJIPrp9Lbx2Yh71ym9Ka0GtwL3+p924nn p5m1lOXlOLCg== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.75,377,1589266800"; d="scan'208";a="326229072" Received: from jacob-builder.jf.intel.com (HELO jacob-builder) ([10.7.199.155]) by FMSMGA003.fm.intel.com with ESMTP; 20 Jul 2020 18:45:48 -0700 Date: Mon, 20 Jul 2020 18:52:33 -0700 From: Jacob Pan To: Auger Eric Cc: iommu@lists.linux-foundation.org, LKML , Joerg Roedel , Alex Williamson , Lu Baolu , David Woodhouse , Yi Liu , "Tian, Kevin" , Raj Ashok , Christoph Hellwig , Jean-Philippe Brucker , Jonathan Corbet , jacob.jun.pan@linux.intel.com Subject: Re: [PATCH v5 2/5] iommu/uapi: Add argsz for user filled data Message-ID: <20200720185233.3e5841c1@jacob-builder> In-Reply-To: <1538ec69-62a2-ea04-0870-a583fc63a2bf@redhat.com> References: <1594925117-64892-1-git-send-email-jacob.jun.pan@linux.intel.com> <1594925117-64892-3-git-send-email-jacob.jun.pan@linux.intel.com> <1538ec69-62a2-ea04-0870-a583fc63a2bf@redhat.com> Organization: OTC X-Mailer: Claws Mail 3.13.2 (GTK+ 2.24.30; x86_64-pc-linux-gnu) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 17 Jul 2020 15:44:23 +0200 Auger Eric wrote: > Hi Jacob, > > On 7/16/20 8:45 PM, Jacob Pan wrote: > > As IOMMU UAPI gets extended, user data size may increase. To support > > backward compatibiliy, this patch introduces a size field to each > > UAPI data structures. It is *always* the responsibility for the > > user to fill in the correct size. Padding fields are adjusted to > > ensure 8 byte alignment. > > > > Specific scenarios for user data handling are documented in: > > Documentation/userspace-api/iommu.rst > > > > Signed-off-by: Liu Yi L > > Signed-off-by: Jacob Pan > > --- > > include/uapi/linux/iommu.h | 12 +++++++++--- > > 1 file changed, 9 insertions(+), 3 deletions(-) > > > > diff --git a/include/uapi/linux/iommu.h b/include/uapi/linux/iommu.h > > index e907b7091a46..d5e9014f690e 100644 > > --- a/include/uapi/linux/iommu.h > > +++ b/include/uapi/linux/iommu.h > > @@ -135,6 +135,7 @@ enum iommu_page_response_code { > > > > /** > > * struct iommu_page_response - Generic page response information > > + * @argsz: User filled size of this data > > * @version: API version of this structure > > * @flags: encodes whether the corresponding fields are valid > > * (IOMMU_FAULT_PAGE_RESPONSE_* values) > > @@ -143,6 +144,7 @@ enum iommu_page_response_code { > > * @code: response code from &enum iommu_page_response_code > > */ > > struct iommu_page_response { > > + __u32 argsz; > > #define IOMMU_PAGE_RESP_VERSION_1 1 > Don't you need to incr the version for all the modified structs? not literal "flags" but @cache and @granularity are flags in reality. I think that is OK. I also updated document to say "flags or equivalent". > > __u32 version; > > #define IOMMU_PAGE_RESP_PASID_VALID (1 << 0) > > @@ -218,6 +220,7 @@ struct iommu_inv_pasid_info { > > /** > > * struct iommu_cache_invalidate_info - First level/stage > > invalidation > > * information > > + * @argsz: User filled size of this data > > * @version: API version of this structure > > * @cache: bitfield that allows to select which caches to > > invalidate > > * @granularity: defines the lowest granularity used for the > > invalidation: @@ -246,6 +249,7 @@ struct iommu_inv_pasid_info { > > * must support the used granularity. > > */ > > struct iommu_cache_invalidate_info { > > + __u32 argsz; > > #define IOMMU_CACHE_INVALIDATE_INFO_VERSION_1 1 > > __u32 version; > so there is no "flags" field in this struct. Is it OK? > > /* IOMMU paging structure cache */ > > @@ -255,7 +259,7 @@ struct iommu_cache_invalidate_info { > > #define IOMMU_CACHE_INV_TYPE_NR (3) > > __u8 cache; > > __u8 granularity; > > - __u8 padding[2]; > > + __u8 padding[6]; > > union { > > struct iommu_inv_pasid_info pasid_info; > > struct iommu_inv_addr_info addr_info; > > @@ -292,6 +296,7 @@ struct iommu_gpasid_bind_data_vtd { > > > > /** > > * struct iommu_gpasid_bind_data - Information about device and > > guest PASID binding > > + * @argsz: User filled size of this data > > * @version: Version of this data structure > > * @format: PASID table entry format > > * @flags: Additional information on guest bind request > > @@ -309,17 +314,18 @@ struct iommu_gpasid_bind_data_vtd { > > * PASID to host PASID based on this bind data. > > */ > > struct iommu_gpasid_bind_data { > > + __u32 argsz; > > #define IOMMU_GPASID_BIND_VERSION_1 1 > > __u32 version; > > #define IOMMU_PASID_FORMAT_INTEL_VTD 1 > > __u32 format; > > + __u32 addr_width; > > #define IOMMU_SVA_GPASID_VAL (1 << 0) /* guest PASID valid > > */ __u64 flags; > > __u64 gpgd; > > __u64 hpasid; > > __u64 gpasid; > > - __u32 addr_width; > > - __u8 padding[12]; > > + __u8 padding[8]; > > /* Vendor specific data */ > > union { > > struct iommu_gpasid_bind_data_vtd vtd; > > > Thanks > > Eric > [Jacob Pan]