Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp457690pxb; Thu, 5 Nov 2020 04:50:43 -0800 (PST) X-Google-Smtp-Source: ABdhPJz88Gj3YQdCvUGmikpealnuUeaq6H1eyjEzFmYLNkgpL9hDeUgtekgHUik2bmQutrh/NXZI X-Received: by 2002:a17:906:4944:: with SMTP id f4mr927908ejt.231.1604580642955; Thu, 05 Nov 2020 04:50:42 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1604580642; cv=none; d=google.com; s=arc-20160816; b=nUrbFEuwCkIFFmfywMq4Rytda75ifV1H+qGZ6HSDXqAGqdflphAPaxc0XBhO/Wp2DR y0/Qgcm7BmvMylG6P21ZvzqaI+Z50KSgeNt7dpmKkzbAyUHSvmMjoE7HDZ1IgE6mRyEp SF4olCODEa1WqO0UtLUiiD/8EInqugfFx1dnxE9xKjUCRkQHtOf/lkwuPI+uepg6Wz2U NMr1gfGU5MUbbv2VmuhhhtbWO0XTFLEMjwSCdj+ZTuoNSEPF5IqI53jOYSyKhO1W/XnX MGbV07Hm5Oy0Zv2UDClT/hcPWQfJouULJFRfD9Whk963wzZJjkgHTRYt5pB0VPPtYwza EKZA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :ironport-sdr:ironport-sdr; bh=91nxvjv5SQXoAirxql/SqqmS8zEUkaexRVgokQd+aU8=; b=UpkLhRSYvd/IdpYlCGGnWWSB8ov180BprDPMU1yZDPwyiUnbKIWnfdAUOB4llMKo2j gmv5Hs9P0wWbvT82OEqYwL8h8gh04aa3etHUdATfbcOaah8eV67g+Ve9Ph+CwxItkwup PW+q6pMu/WDqTtsSEGaMJSayf8kq61MBzKftqp/ahJwatg4bvyvv9iSzFd9VQTPzvh3s EmIP12QMNapLfvVzrMLAv9DLev9jeBd8FqmHxapvcgcWqnwRhg2h19jEGJBlodsVqqb8 gHZmLw5XMFQ8DBsxbih1b2Cngej741yWQjqj6FpESBlBBCxwh7vMpjmOwlmenaLC/2q+ uSzw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h90si1071608edd.326.2020.11.05.04.50.20; Thu, 05 Nov 2020 04:50:42 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730139AbgKEMs2 (ORCPT + 99 others); Thu, 5 Nov 2020 07:48:28 -0500 Received: from mga18.intel.com ([134.134.136.126]:33024 "EHLO mga18.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726067AbgKEMs1 (ORCPT ); Thu, 5 Nov 2020 07:48:27 -0500 IronPort-SDR: tgnc7zLUPaj7DELnNqFMKsxCPgfIH74Gtgl9Hro/b320JiE86qQOSXG0QsTmwJTYJHOOgYiRmc ZFrTobqp4kMQ== X-IronPort-AV: E=McAfee;i="6000,8403,9795"; a="157153686" X-IronPort-AV: E=Sophos;i="5.77,453,1596524400"; d="scan'208";a="157153686" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga005.jf.intel.com ([10.7.209.41]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Nov 2020 04:48:27 -0800 IronPort-SDR: bjAyaUlYUUdwRfgQuancvAgT+zd4ZzdilZJqsn1KfZeaBxlyfo7xuQWYMt2JwPgRbH1vD+LCWQ zZWRbemhNcGQ== X-IronPort-AV: E=Sophos;i="5.77,453,1596524400"; d="scan'208";a="539384791" Received: from shuo-intel.sh.intel.com (HELO localhost) ([10.239.154.30]) by orsmga005-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Nov 2020 04:48:24 -0800 Date: Thu, 5 Nov 2020 20:48:22 +0800 From: Shuo A Liu To: Greg Kroah-Hartman Cc: linux-kernel@vger.kernel.org, x86@kernel.org, "H . Peter Anvin" , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Sean Christopherson , Yu Wang , Reinette Chatre , Zhi Wang , Zhenyu Wang Subject: Re: [PATCH v5 06/17] virt: acrn: Introduce VM management interfaces Message-ID: <20201105124822.GF17702@shuo-intel.sh.intel.com> References: <20201019061803.13298-1-shuo.a.liu@intel.com> <20201019061803.13298-7-shuo.a.liu@intel.com> <20201104190235.GA2855400@kroah.com> <20201105031029.GB17702@shuo-intel.sh.intel.com> <20201105062907.GA693781@kroah.com> <20201105073545.GD17702@shuo-intel.sh.intel.com> <20201105082639.GB3426404@kroah.com> <20201105090200.GE17702@shuo-intel.sh.intel.com> <20201105091645.GA3436809@kroah.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Disposition: inline In-Reply-To: <20201105091645.GA3436809@kroah.com> User-Agent: Mutt/1.8.3 (2017-05-23) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu 5.Nov'20 at 10:16:45 +0100, Greg Kroah-Hartman wrote: >On Thu, Nov 05, 2020 at 05:02:00PM +0800, Shuo A Liu wrote: >> On Thu 5.Nov'20 at 9:26:39 +0100, Greg Kroah-Hartman wrote: >> > On Thu, Nov 05, 2020 at 03:35:45PM +0800, Shuo A Liu wrote: >> > > On Thu 5.Nov'20 at 7:29:07 +0100, Greg Kroah-Hartman wrote: >> > > > On Thu, Nov 05, 2020 at 11:10:29AM +0800, Shuo A Liu wrote: >> > > > > On Wed 4.Nov'20 at 20:02:35 +0100, Greg Kroah-Hartman wrote: >> > > > > > On Mon, Oct 19, 2020 at 02:17:52PM +0800, shuo.a.liu@intel.com wrote: >> > > > > > > --- /dev/null >> > > > > > > +++ b/include/uapi/linux/acrn.h >> > > > > > > @@ -0,0 +1,56 @@ >> > > > > > > +/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */ >> > > > > > > +/* >> > > > > > > + * Userspace interface for /dev/acrn_hsm - ACRN Hypervisor Service Module >> > > > > > > + * >> > > > > > > + * This file can be used by applications that need to communicate with the HSM >> > > > > > > + * via the ioctl interface. >> > > > > > > + */ >> > > > > > > + >> > > > > > > +#ifndef _UAPI_ACRN_H >> > > > > > > +#define _UAPI_ACRN_H >> > > > > > > + >> > > > > > > +#include >> > > > > > > + >> > > > > > > +/** >> > > > > > > + * struct acrn_vm_creation - Info to create a User VM >> > > > > > > + * @vmid: User VM ID returned from the hypervisor >> > > > > > > + * @reserved0: Reserved >> > > > > > > + * @vcpu_num: Number of vCPU in the VM. Return from hypervisor. >> > > > > > > + * @reserved1: Reserved >> > > > > > > + * @uuid: UUID of the VM. Pass to hypervisor directly. >> > > > > > > + * @vm_flag: Flag of the VM creating. Pass to hypervisor directly. >> > > > > > > + * @ioreq_buf: Service VM GPA of I/O request buffer. Pass to >> > > > > > > + * hypervisor directly. >> > > > > > > + * @cpu_affinity: CPU affinity of the VM. Pass to hypervisor directly. >> > > > > > > + * @reserved2: Reserved >> > > > > > >> > > > > > Reserved and must be 0? >> > > > > >> > > > > Not a must. >> > > > >> > > > That's guaranteed to come back and bite you in the end. >> > > >> > > OK. I can fill them with zero before passing them to hypervisor. >> > > >> > > > You all have read the "how to write a good api" document, right? >> > > >> > > Is it Documentation/driver-api/ioctl.rst? Or i missed.. >> > >> > That's one good document, but no, not what I was referring to. I was >> > thinking of Documentation/process/adding-syscalls.rst, which is what you >> > are doing here implicitly with these new ioctls (every ioctl is a brand >> > new syscall.) >> >> I will read it as well. Thanks. >> >> > >> > > > > > What are they reserved for? >> > > > > > >> > > > > > Same for all of the reserved fields, why? >> > > > > >> > > > > Some reserved fields are to map layout in the hypervisor side, others >> > > > > are for future use. >> > > > >> > > > ioctls should not have these, again, please read the documentation. If >> > > > you need something new in the future, just make a new ioctl. >> > > >> > > OK. I will remove some reserved fields for scalability. >> > >> > "scalability" should have nothing to do with any of this, right? What >> > am I missing? >> >> Sorry, i meant reserved fields for future use. > >Again, this is not how you do that at all. If you need something "in >the future", create it then. What you are doing here ensures that you >will never be able to do it then either, so don't even pretend :) > >Read the syscall document for why this is the case. Alright. I will remove that type of reserved fields. Thank you. > >> > > Though i can >> > > keep some reserved fields for alignment (and to keep same data structure >> > > layout with the hypervisor), right? >> > > Documentation/driver-api/ioctl.rst says that explicit reserved fields >> > > could be used. >> > >> > If you need alignment, yes, that is fine, but that's not what you are >> > saying these are for. And if you need alignment, why not move things >> > around so they are properly aligned. >> > >> > And this structure has nothing to do with the hypervisor structure, >> > that's a internal-kernel structure, not a userspace-visable thing if you >> > are doing things correctly. >> >> It's the same structure with the one in hypervisor. HSM driver >> doesn't maintain the VM much, it just pass the data for VM creation from >> userspace to hypervisor. > >That sounds ripe for abuse, good luck! The hypervisor will do the sanity check. In this case, HSM driver can be kept simple. Thanks shuo