Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp639092pxa; Wed, 12 Aug 2020 10:00:46 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyIdmvFfpUC4HADqFZo7thfIZLUYd/f8pXRTc+NdLqNiANvk+bqDSJx6dRqUVIZdGp/nfxs X-Received: by 2002:aa7:da87:: with SMTP id q7mr830279eds.166.1597251646608; Wed, 12 Aug 2020 10:00:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597251646; cv=none; d=google.com; s=arc-20160816; b=U2SKkyV2Lmb41i+USx6T21GaJp+3wMXZ4dHIXWwxZfATsuJsvZmS/YCud8+b3zQGdr wr89KX86rfnEBsxil2ow9586FOhkBbRS5xM4xLb/o9zQjRyhmDhQc4eUBc+faUQsHX2f 8Tyf0hyEB3YFe48Xi3z+a50Pspqqc5x9N19ebDDi9htKkS3Y+FyaV5/8acIjQIpRX7ok ZJ/3/RL5YrrZiqSMTBmEqGY6lXB9foVWpCCaW475s7+H/763zk8ZhcIxWWT3yzUnG19z 5e3jfeDn+saGzJHHjpuFsgeAI8fvUvcZRceE58JegnXCt4TCmJNe5Iht701Fmh1UFhyi XnoA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=x/TMDbTXRPMHA++0X0V/1R29t8yISpXHRZTrFNiw52A=; b=ETf9G5gKRQiw59A7U3RRjxVtn99rUU/OjWas+PjUZPhKl3j/kV4hz70hbPSF7+wnTP IehAPJLXCazGl7g/Wxjqk7mbjVScPlDdSe5ZYbi+OqENLdPZciyK1cA6GqyyDfzfHehw tammZ9yxH/ShYOsQXNJq2bS9ocfGxlIncxY4Ap5/vM0AKUpgzlXk32mg5tA1tv0gsoCD M7+nbCQv+MhKw7mxw/dEPyP530XAwr38FOF+33CeG+3AvtcrS6j7loyjsasspvHbcoor pbsAtSLyGfNGh53b9F8RkcSWrJx82fzCha5a0dvIJcgC7e7HR5GXH9zWVKxOGKg4uYuI RCxA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=jEPkZFGg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dc15si1462629ejb.285.2020.08.12.10.00.21; Wed, 12 Aug 2020 10:00:46 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=jEPkZFGg; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726510AbgHLQ7c (ORCPT + 99 others); Wed, 12 Aug 2020 12:59:32 -0400 Received: from us-smtp-delivery-1.mimecast.com ([205.139.110.120]:41470 "EHLO us-smtp-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725872AbgHLQ73 (ORCPT ); Wed, 12 Aug 2020 12:59:29 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1597251567; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=x/TMDbTXRPMHA++0X0V/1R29t8yISpXHRZTrFNiw52A=; b=jEPkZFGgvEMjV5U3A/SzQDHqtvGNOvHDoyjD10Ywlarr6ynmNQqfz5LU2NDaGYDFc2F5Et NPPUzzNYnCqLv/ox4erzCI/FPP7rni9q4VPlMSED+Lo2Gte+D4O4i4OxVBdFadIq3fdvkP XFbfASJ96yTrUYNUoPLgQ2DlXmBMsmE= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-392-pPvv2GvsObOnxmeBqAXoZA-1; Wed, 12 Aug 2020 12:59:23 -0400 X-MC-Unique: pPvv2GvsObOnxmeBqAXoZA-1 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id C7AFF1835862; Wed, 12 Aug 2020 16:59:21 +0000 (UTC) Received: from [10.36.113.93] (ovpn-113-93.ams2.redhat.com [10.36.113.93]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 1168119D71; Wed, 12 Aug 2020 16:59:15 +0000 (UTC) Subject: Re: [PATCH v7 2/7] iommu/uapi: Add argsz for user filled data To: Jacob Pan , iommu@lists.linux-foundation.org, LKML , Joerg Roedel , Alex Williamson Cc: Lu Baolu , David Woodhouse , Yi Liu , "Tian, Kevin" , Raj Ashok , Christoph Hellwig , Jean-Philippe Brucker , Jonathan Corbet References: <1596068467-49322-1-git-send-email-jacob.jun.pan@linux.intel.com> <1596068467-49322-3-git-send-email-jacob.jun.pan@linux.intel.com> From: Auger Eric Message-ID: <1ac39547-143b-2a2e-e142-92be023ef8d7@redhat.com> Date: Wed, 12 Aug 2020 18:59:14 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.5.0 MIME-Version: 1.0 In-Reply-To: <1596068467-49322-3-git-send-email-jacob.jun.pan@linux.intel.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.84 on 10.5.11.23 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, On 7/30/20 2:21 AM, Jacob Pan wrote: > As IOMMU UAPI gets extended, user data size may increase. To support > backward compatibiliy, this patch introduces a size field to each UAPI s/compatibiliy/compatibility > data structures. It is *always* the responsibility for the user to fill in > the correct size. Padding fields are adjusted to ensure 8 byte alignment. > > Specific scenarios for user data handling are documented in: > Documentation/userspace-api/iommu.rst you may mention the struct version does not need to be incremented as no IOCTL uses the structs yet. > > Signed-off-by: Liu Yi L > Signed-off-by: Jacob Pan > --- > include/uapi/linux/iommu.h | 12 +++++++++--- > 1 file changed, 9 insertions(+), 3 deletions(-) > > diff --git a/include/uapi/linux/iommu.h b/include/uapi/linux/iommu.h > index e907b7091a46..d5e9014f690e 100644 > --- a/include/uapi/linux/iommu.h > +++ b/include/uapi/linux/iommu.h > @@ -135,6 +135,7 @@ enum iommu_page_response_code { > > /** > * struct iommu_page_response - Generic page response information > + * @argsz: User filled size of this data > * @version: API version of this structure > * @flags: encodes whether the corresponding fields are valid > * (IOMMU_FAULT_PAGE_RESPONSE_* values) > @@ -143,6 +144,7 @@ enum iommu_page_response_code { > * @code: response code from &enum iommu_page_response_code > */ > struct iommu_page_response { > + __u32 argsz; > #define IOMMU_PAGE_RESP_VERSION_1 1 > __u32 version; > #define IOMMU_PAGE_RESP_PASID_VALID (1 << 0) > @@ -218,6 +220,7 @@ struct iommu_inv_pasid_info { > /** > * struct iommu_cache_invalidate_info - First level/stage invalidation > * information > + * @argsz: User filled size of this data > * @version: API version of this structure > * @cache: bitfield that allows to select which caches to invalidate > * @granularity: defines the lowest granularity used for the invalidation: > @@ -246,6 +249,7 @@ struct iommu_inv_pasid_info { > * must support the used granularity. > */ > struct iommu_cache_invalidate_info { > + __u32 argsz; > #define IOMMU_CACHE_INVALIDATE_INFO_VERSION_1 1 > __u32 version; > /* IOMMU paging structure cache */ > @@ -255,7 +259,7 @@ struct iommu_cache_invalidate_info { > #define IOMMU_CACHE_INV_TYPE_NR (3) > __u8 cache; > __u8 granularity; > - __u8 padding[2]; > + __u8 padding[6]; > union { > struct iommu_inv_pasid_info pasid_info; > struct iommu_inv_addr_info addr_info; > @@ -292,6 +296,7 @@ struct iommu_gpasid_bind_data_vtd { > > /** > * struct iommu_gpasid_bind_data - Information about device and guest PASID binding > + * @argsz: User filled size of this data > * @version: Version of this data structure > * @format: PASID table entry format > * @flags: Additional information on guest bind request > @@ -309,17 +314,18 @@ struct iommu_gpasid_bind_data_vtd { > * PASID to host PASID based on this bind data. > */ > struct iommu_gpasid_bind_data { > + __u32 argsz; > #define IOMMU_GPASID_BIND_VERSION_1 1 > __u32 version; > #define IOMMU_PASID_FORMAT_INTEL_VTD 1 > __u32 format; > + __u32 addr_width; > #define IOMMU_SVA_GPASID_VAL (1 << 0) /* guest PASID valid */ > __u64 flags; > __u64 gpgd; > __u64 hpasid; > __u64 gpasid; > - __u32 addr_width; > - __u8 padding[12]; > + __u8 padding[8]; > /* Vendor specific data */ > union { > struct iommu_gpasid_bind_data_vtd vtd; > Reviewed-by: Eric Auger Thanks Eric