Received: by 2002:a05:6a10:6d10:0:0:0:0 with SMTP id gq16csp764319pxb; Fri, 22 Apr 2022 10:38:59 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzASMpolRWzeh00YeqkHg4MW6d3ebnlQgZnoKNRclxVCekx5qpjGKaR7dEmDgX8hLbO3sHO X-Received: by 2002:a17:90b:3881:b0:1c7:c02b:bcf8 with SMTP id mu1-20020a17090b388100b001c7c02bbcf8mr6660097pjb.131.1650649138885; Fri, 22 Apr 2022 10:38:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1650649138; cv=none; d=google.com; s=arc-20160816; b=C4LJ5VQIWlRdpZ2IuKMm7ELo+rsfAuWWlRoSTtUqjIQ/cp69UruPDs6ugsIICrB9Ha jzztoMlunIYa91FKFgk+DaaTnlJ3UdV5+ED7QG2nPhJzAAgQD6YZ5zwV4U6nrOjP9EO7 TpDkpmegJS5oe9LDkM5ZdzEKL/p88Ch3za160PBH1S0GsUFJMuXmpGFfjJ1HtshY/WqH 1uLAsa6bTL5j8a/KUz4NmrJyFfQIniXBZxE7JxicxxydF0Z2PDzUg6ls3Iup4WDuccQP 2ewn1e5F5pHN3SwqfpL7Q3K4TpaHl55ubfcmDeQj1osRaUWEnoHAFuAVWeBQY3er26LF +YqA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:references:in-reply-to :subject:cc:to:from:message-id:date:dkim-signature; bh=HO+54emmbeyna3EI22/62155EWEVGGBTv7GwUuwcxH0=; b=K6REhGlnxmybtP4JNvC+uNhifTplhwnXOzXtWwrMqmYJ5K79OPWzj46LL5Wbnnbfo1 ATDqzoUNTK7oXDGIWiCOSv7g2/C/mdfQgbQOrteKWD2JTfPaqXXN+aKC9sFVqixmMzrj 1/nA6kq90Ry56xrMJePJOBZHY/2KkZ2pwMIcL+dToqdEKtCQV1UcH+6eg+D796cZubWE U597DLetvG1XCEwyqGOUEoIJdybpvmEvYKwcnaDGnth6Ex1g8ArG/2PtFtjfD8JN/5YK F6T6eJr7uQsc+JesjQ6aAZSB5LoA+G6WMwqa4wDYu+lfI+pw0twfHF2O3hFeM1Qo6WrF 4dkw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=XURCIgmb; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id w11-20020a056a0014cb00b004fa7cbb60ccsi8669849pfu.284.2022.04.22.10.38.58 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 22 Apr 2022 10:38:58 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=XURCIgmb; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 38344E6C53; Fri, 22 Apr 2022 10:28:28 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1446357AbiDVKEM (ORCPT + 99 others); Fri, 22 Apr 2022 06:04:12 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:43168 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1446353AbiDVKEK (ORCPT ); Fri, 22 Apr 2022 06:04:10 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [IPv6:2604:1380:4641:c500::1]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3A9E353E32; Fri, 22 Apr 2022 03:01:18 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id AF39861BCE; Fri, 22 Apr 2022 10:01:17 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 1E068C385A0; Fri, 22 Apr 2022 10:01:17 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1650621677; bh=Wd+lczt9RgngB+KHzFwDqzcWWJ5RsUNianvpFDvjBR4=; h=Date:From:To:Cc:Subject:In-Reply-To:References:From; b=XURCIgmbHSzRc2sunmW23qD95gOcgPejG/ca+zhwIpRmOV+BJ3DR1b3kYWq/tc/Bc QMMFwTRfAeo3wgBdl8GE5xUVH7Pn49mbE53wJXJcwcjqpJKKjzvGungj8y6Lx6217p 83H/9vyNPwcPr/MeK8M2Mxb2Mdp5iRFoEuTUOCX2eYHwV7/Jp9aysd2mcaoyGsnJsp 5hCASXGz9VpzREL4zA3KJuiVEtgZkt3qCFDpzfHlNWyVvaotBXgcMbfuDNkVrI44/v ww4oTyAe0SgxaAZytIHUXauYVntyBhZwK8+jTK3lpu1cD8pUOm8U/tsP4LBLA52pjD DbSRvHfaeLhrQ== Received: from sofa.misterjones.org ([185.219.108.64] helo=why.misterjones.org) by disco-boy.misterjones.org with esmtpsa (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from ) id 1nhq6E-0067tx-DP; Fri, 22 Apr 2022 11:01:14 +0100 Date: Fri, 22 Apr 2022 11:01:14 +0100 Message-ID: <87a6cda13p.wl-maz@kernel.org> From: Marc Zyngier To: Paolo Bonzini Cc: Oliver Upton , linux-kernel@vger.kernel.org, kvm@vger.kernel.org, will@kernel.org, apatel@ventanamicro.com, atishp@rivosinc.com, seanjc@google.com, pgonda@google.com Subject: Re: [PATCH 0/4] KVM: fix KVM_EXIT_SYSTEM_EVENT mess In-Reply-To: References: <20220421180443.1465634-1-pbonzini@redhat.com> User-Agent: Wanderlust/2.15.9 (Almost Unreal) SEMI-EPG/1.14.7 (Harue) FLIM-LB/1.14.9 (=?UTF-8?B?R29qxY0=?=) APEL-LB/10.8 EasyPG/1.0.0 Emacs/27.1 (x86_64-pc-linux-gnu) MULE/6.0 (HANACHIRUSATO) MIME-Version: 1.0 (generated by SEMI-EPG 1.14.7 - "Harue") Content-Type: text/plain; charset=US-ASCII X-SA-Exim-Connect-IP: 185.219.108.64 X-SA-Exim-Rcpt-To: pbonzini@redhat.com, oupton@google.com, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, will@kernel.org, apatel@ventanamicro.com, atishp@rivosinc.com, seanjc@google.com, pgonda@google.com X-SA-Exim-Mail-From: maz@kernel.org X-SA-Exim-Scanned: No (on disco-boy.misterjones.org); SAEximRunCond expanded to false X-Spam-Status: No, score=-2.9 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,MAILING_LIST_MULTI, RDNS_NONE,SPF_HELO_NONE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 22 Apr 2022 10:41:34 +0100, Paolo Bonzini wrote: > > On 4/22/22 09:58, Oliver Upton wrote: > > Is there any way we could clean this up in 5.18 and leave the whole > > ndata/data pattern for 5.19? > > > > IOW, for 5.18 go back and fix the padding: > > > > struct { > > __u32 type; > > __u32 pad; > > __u64 flags; > > } system_event; > > > > Then for 5.19 circle back on the data business, except use a flag bit > > for it: > > > > struct { > > __u32 type; > > __u32 pad; > > #define KVM_SYSTEM_EVENT_NDATA_VALID (1u << 63) > > __u64 flags; > > __u64 ndata; > > __u64 data[16]; > > } system_event; > > > > Where we apply that bit to system_event::flags this time instead of > > ::type. Could also go the CAP route. > > These patches are against kvm/next, so that is already what I did. :) Can you please post a complete series? It is becoming really hard to track what you are doing. > On the other hand right now the ARM and RISC-V flags are unusable with > 32-bit userspace, so we need to fix _something_ in 5.18 as well. What 32bit userspace? arm64 doesn't have any that can interact with KVM, so I don't see anything to fix on that front. > For > your proposal, all that's missing is a 5.18 patch to add the > padding. But since the flags UAPI was completely unused before 5.18 > and there's no reason to inflict the different naming of fields to > userspace. So I think we want to apply this UAPI change in 5.18 too. As it was pointed out already, CrosVM has already started looking at the flags. The fact that it was always 0 until now doesn't make it less of a UAPI. I'd like to see a full series that implements the transition before we make a decision on this. Thanks, M. -- Without deviation from the norm, progress is not possible.