All of lore.kernel.org
 help / color / mirror / Atom feed
From: "Liu, Yi L" <yi.l.liu@intel.com>
To: Alex Williamson <alex.williamson@redhat.com>
Cc: "eric.auger@redhat.com" <eric.auger@redhat.com>,
	"baolu.lu@linux.intel.com" <baolu.lu@linux.intel.com>,
	"joro@8bytes.org" <joro@8bytes.org>,
	"Tian, Kevin" <kevin.tian@intel.com>,
	"jacob.jun.pan@linux.intel.com" <jacob.jun.pan@linux.intel.com>,
	"Raj, Ashok" <ashok.raj@intel.com>,
	"Tian, Jun J" <jun.j.tian@intel.com>,
	"Sun, Yi Y" <yi.y.sun@intel.com>,
	"jean-philippe@linaro.org" <jean-philippe@linaro.org>,
	"peterx@redhat.com" <peterx@redhat.com>,
	"Wu, Hao" <hao.wu@intel.com>,
	"iommu@lists.linux-foundation.org"
	<iommu@lists.linux-foundation.org>,
	"kvm@vger.kernel.org" <kvm@vger.kernel.org>,
	"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>
Subject: RE: [PATCH v3 03/14] vfio/type1: Report iommu nesting info to userspace
Date: Fri, 3 Jul 2020 13:03:17 +0000	[thread overview]
Message-ID: <CY4PR11MB1432BFE42BF336EE8C99CEC9C36A0@CY4PR11MB1432.namprd11.prod.outlook.com> (raw)
In-Reply-To: <CY4PR11MB14320E069DF2C75131A94DB3C36A0@CY4PR11MB1432.namprd11.prod.outlook.com>

Hi Alex,

> From: Liu, Yi L <yi.l.liu@intel.com>
> Sent: Friday, July 3, 2020 2:06 PM
[...]
> > > +#define VFIO_IOMMU_TYPE1_INFO_CAP_NESTING  3
> > > +
> > > +struct vfio_iommu_type1_info_cap_nesting {
> > > +	struct	vfio_info_cap_header header;
> > > +	__u32	flags;
> >
> > I think there's an alignment issue here for a uapi.  The header field
> > is 8-bytes total and info[] should start at an 8-byte alignment to
> > allow data[] within info to have 8-byte alignment.  This could lead to
> > the structure having a compiler dependent size and offsets.  We should
> > add a 4-byte reserved field here to resolve.
> 
> got it. or how about defining the flags as __u64?
> 
> >
> > > +	__u8	info[];
> > > +};
> >
> > This should have a lot more description around it, a user could not
> > infer that info[] is including a struct iommu_nesting_info from the
> > information provided here.
> > Thanks,
> 
> sure. BTW. do you think it is necessary to add a flag to indicate the info[] is a
> struct iommu_nesting_info? or as a start, it's not necessary to do it.

seems like I misunderstood your comment. Does below description suits
your comment?

/*
 * Reporting nesting info to user space.
 *
 * @info:       the nesting info provided by IOMMU driver. Today
 *              it is expected to be a struct iommu_nesting_info
 *              data.
 */
struct vfio_iommu_type1_info_cap_nesting {
        struct  vfio_info_cap_header header;
        __u32   flags;
        __u32   padding;
        __u8    info[];
};

Thanks,
Yi Liu

> Regards,
> Yi Liu
> 
> > Alex
> >
> > > +
> > >  #define VFIO_IOMMU_GET_INFO _IO(VFIO_TYPE, VFIO_BASE + 12)
> > >
> > >  /**


WARNING: multiple messages have this Message-ID (diff)
From: "Liu, Yi L" <yi.l.liu@intel.com>
To: Alex Williamson <alex.williamson@redhat.com>
Cc: "jean-philippe@linaro.org" <jean-philippe@linaro.org>,
	"Tian, Kevin" <kevin.tian@intel.com>,
	"Raj, Ashok" <ashok.raj@intel.com>,
	"kvm@vger.kernel.org" <kvm@vger.kernel.org>,
	"iommu@lists.linux-foundation.org"
	<iommu@lists.linux-foundation.org>,
	"linux-kernel@vger.kernel.org" <linux-kernel@vger.kernel.org>,
	"Sun, Yi Y" <yi.y.sun@intel.com>, "Wu, Hao" <hao.wu@intel.com>,
	"Tian, Jun J" <jun.j.tian@intel.com>
Subject: RE: [PATCH v3 03/14] vfio/type1: Report iommu nesting info to userspace
Date: Fri, 3 Jul 2020 13:03:17 +0000	[thread overview]
Message-ID: <CY4PR11MB1432BFE42BF336EE8C99CEC9C36A0@CY4PR11MB1432.namprd11.prod.outlook.com> (raw)
In-Reply-To: <CY4PR11MB14320E069DF2C75131A94DB3C36A0@CY4PR11MB1432.namprd11.prod.outlook.com>

Hi Alex,

> From: Liu, Yi L <yi.l.liu@intel.com>
> Sent: Friday, July 3, 2020 2:06 PM
[...]
> > > +#define VFIO_IOMMU_TYPE1_INFO_CAP_NESTING  3
> > > +
> > > +struct vfio_iommu_type1_info_cap_nesting {
> > > +	struct	vfio_info_cap_header header;
> > > +	__u32	flags;
> >
> > I think there's an alignment issue here for a uapi.  The header field
> > is 8-bytes total and info[] should start at an 8-byte alignment to
> > allow data[] within info to have 8-byte alignment.  This could lead to
> > the structure having a compiler dependent size and offsets.  We should
> > add a 4-byte reserved field here to resolve.
> 
> got it. or how about defining the flags as __u64?
> 
> >
> > > +	__u8	info[];
> > > +};
> >
> > This should have a lot more description around it, a user could not
> > infer that info[] is including a struct iommu_nesting_info from the
> > information provided here.
> > Thanks,
> 
> sure. BTW. do you think it is necessary to add a flag to indicate the info[] is a
> struct iommu_nesting_info? or as a start, it's not necessary to do it.

seems like I misunderstood your comment. Does below description suits
your comment?

/*
 * Reporting nesting info to user space.
 *
 * @info:       the nesting info provided by IOMMU driver. Today
 *              it is expected to be a struct iommu_nesting_info
 *              data.
 */
struct vfio_iommu_type1_info_cap_nesting {
        struct  vfio_info_cap_header header;
        __u32   flags;
        __u32   padding;
        __u8    info[];
};

Thanks,
Yi Liu

> Regards,
> Yi Liu
> 
> > Alex
> >
> > > +
> > >  #define VFIO_IOMMU_GET_INFO _IO(VFIO_TYPE, VFIO_BASE + 12)
> > >
> > >  /**

_______________________________________________
iommu mailing list
iommu@lists.linux-foundation.org
https://lists.linuxfoundation.org/mailman/listinfo/iommu

  reply	other threads:[~2020-07-03 13:03 UTC|newest]

Thread overview: 110+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-06-24  8:55 [PATCH v3 00/14] vfio: expose virtual Shared Virtual Addressing to VMs Liu Yi L
2020-06-24  8:55 ` Liu Yi L
2020-06-24  8:55 ` [PATCH v3 01/14] vfio/type1: Refactor vfio_iommu_type1_ioctl() Liu Yi L
2020-06-24  8:55   ` Liu Yi L
2020-07-02 21:21   ` Alex Williamson
2020-07-02 21:21     ` Alex Williamson
2020-07-03  3:46     ` Liu, Yi L
2020-07-03  3:46       ` Liu, Yi L
2020-06-24  8:55 ` [PATCH v3 02/14] iommu: Report domain nesting info Liu Yi L
2020-06-24  8:55   ` Liu Yi L
2020-06-26  7:47   ` Jean-Philippe Brucker
2020-06-26  7:47     ` Jean-Philippe Brucker
2020-06-26 16:04     ` Robin Murphy
2020-06-26 16:04       ` Robin Murphy
2020-06-27  6:53       ` Liu, Yi L
2020-06-27  6:53         ` Liu, Yi L
2020-06-30  1:20         ` Tian, Kevin
2020-06-30  1:20           ` Tian, Kevin
2020-06-27  6:14     ` Liu, Yi L
2020-06-27  6:14       ` Liu, Yi L
2020-06-29  9:24   ` Stefan Hajnoczi
2020-06-29  9:24     ` Stefan Hajnoczi
2020-06-29 12:23     ` Liu, Yi L
2020-06-29 12:23       ` Liu, Yi L
2020-06-30  2:00       ` Tian, Kevin
2020-06-30  2:00         ` Tian, Kevin
2020-06-30  3:45         ` Liu, Yi L
2020-06-30  3:45           ` Liu, Yi L
2020-07-03  9:59         ` Stefan Hajnoczi
2020-07-03  9:59           ` Stefan Hajnoczi
2020-07-02 17:54   ` Alex Williamson
2020-07-02 17:54     ` Alex Williamson
2020-07-03  3:53     ` Liu, Yi L
2020-07-03  3:53       ` Liu, Yi L
2020-06-24  8:55 ` [PATCH v3 03/14] vfio/type1: Report iommu nesting info to userspace Liu Yi L
2020-06-24  8:55   ` Liu Yi L
2020-07-02 18:38   ` Alex Williamson
2020-07-02 18:38     ` Alex Williamson
2020-07-03  6:05     ` Liu, Yi L
2020-07-03  6:05       ` Liu, Yi L
2020-07-03 13:03       ` Liu, Yi L [this message]
2020-07-03 13:03         ` Liu, Yi L
2020-06-24  8:55 ` [PATCH v3 04/14] vfio: Add PASID allocation/free support Liu Yi L
2020-06-24  8:55   ` Liu Yi L
2020-07-02 21:17   ` Alex Williamson
2020-07-02 21:17     ` Alex Williamson
2020-07-03  6:08     ` Liu, Yi L
2020-07-03  6:08       ` Liu, Yi L
2020-06-24  8:55 ` [PATCH v3 05/14] iommu/vt-d: Support setting ioasid set to domain Liu Yi L
2020-06-24  8:55   ` Liu Yi L
2020-06-24  8:55 ` [PATCH v3 06/14] vfio/type1: Add VFIO_IOMMU_PASID_REQUEST (alloc/free) Liu Yi L
2020-06-24  8:55   ` Liu Yi L
2020-07-02 21:18   ` Alex Williamson
2020-07-02 21:18     ` Alex Williamson
2020-07-03  6:28     ` Liu, Yi L
2020-07-03  6:28       ` Liu, Yi L
2020-07-08  8:16       ` Liu, Yi L
2020-07-08  8:16         ` Liu, Yi L
2020-07-08 19:54         ` Alex Williamson
2020-07-08 19:54           ` Alex Williamson
2020-07-09  0:32           ` Liu, Yi L
2020-07-09  0:32             ` Liu, Yi L
2020-07-09  1:56             ` Tian, Kevin
2020-07-09  1:56               ` Tian, Kevin
2020-07-09  2:08               ` Liu, Yi L
2020-07-09  2:08                 ` Liu, Yi L
2020-07-09  2:18                 ` Tian, Kevin
2020-07-09  2:18                   ` Tian, Kevin
2020-07-09  2:26                   ` Liu, Yi L
2020-07-09  2:26                     ` Liu, Yi L
2020-07-09  7:16                     ` Liu, Yi L
2020-07-09  7:16                       ` Liu, Yi L
2020-07-09 14:27                       ` Alex Williamson
2020-07-09 14:27                         ` Alex Williamson
2020-07-09 18:05                         ` Jacob Pan
2020-07-09 18:05                           ` Jacob Pan
2020-07-10  5:39                         ` Liu, Yi L
2020-07-10  5:39                           ` Liu, Yi L
2020-07-10 12:55                           ` Alex Williamson
2020-07-10 12:55                             ` Alex Williamson
2020-07-10 13:03                             ` Liu, Yi L
2020-07-10 13:03                               ` Liu, Yi L
2020-06-24  8:55 ` [PATCH v3 07/14] iommu: Pass domain to sva_unbind_gpasid() Liu Yi L
2020-06-24  8:55   ` Liu Yi L
2020-06-24  8:55 ` [PATCH v3 08/14] iommu/vt-d: Check ownership for PASIDs from user-space Liu Yi L
2020-06-24  8:55   ` Liu Yi L
2020-06-24  8:55 ` [PATCH v3 09/14] vfio/type1: Support binding guest page tables to PASID Liu Yi L
2020-06-24  8:55   ` Liu Yi L
2020-07-02 21:19   ` Alex Williamson
2020-07-02 21:19     ` Alex Williamson
2020-07-03  6:46     ` Liu, Yi L
2020-07-03  6:46       ` Liu, Yi L
2020-06-24  8:55 ` [PATCH v3 10/14] vfio/type1: Allow invalidating first-level/stage IOMMU cache Liu Yi L
2020-06-24  8:55   ` Liu Yi L
2020-07-02 21:19   ` Alex Williamson
2020-07-02 21:19     ` Alex Williamson
2020-07-03  3:47     ` Liu, Yi L
2020-07-03  3:47       ` Liu, Yi L
2020-06-24  8:55 ` [PATCH v3 11/14] vfio/type1: Add vSVA support for IOMMU-backed mdevs Liu Yi L
2020-06-24  8:55   ` Liu Yi L
2020-06-24  8:55 ` [PATCH v3 12/14] vfio/pci: Expose PCIe PASID capability to guest Liu Yi L
2020-06-24  8:55   ` Liu Yi L
2020-06-24  8:55 ` [PATCH v3 13/14] vfio: Document dual stage control Liu Yi L
2020-06-24  8:55   ` Liu Yi L
2020-06-29  9:21   ` Stefan Hajnoczi
2020-06-29  9:21     ` Stefan Hajnoczi
2020-06-29  9:24     ` Liu, Yi L
2020-06-29  9:24       ` Liu, Yi L
2020-06-24  8:55 ` [PATCH v3 14/14] iommu/vt-d: Support reporting nesting capability info Liu Yi L
2020-06-24  8:55   ` Liu Yi L

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=CY4PR11MB1432BFE42BF336EE8C99CEC9C36A0@CY4PR11MB1432.namprd11.prod.outlook.com \
    --to=yi.l.liu@intel.com \
    --cc=alex.williamson@redhat.com \
    --cc=ashok.raj@intel.com \
    --cc=baolu.lu@linux.intel.com \
    --cc=eric.auger@redhat.com \
    --cc=hao.wu@intel.com \
    --cc=iommu@lists.linux-foundation.org \
    --cc=jacob.jun.pan@linux.intel.com \
    --cc=jean-philippe@linaro.org \
    --cc=joro@8bytes.org \
    --cc=jun.j.tian@intel.com \
    --cc=kevin.tian@intel.com \
    --cc=kvm@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=peterx@redhat.com \
    --cc=yi.y.sun@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.