[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <164736509088.181560.2887686123582116702.stgit@omen>
Date: Tue, 15 Mar 2022 11:29:57 -0600
From: Alex Williamson <alex.williamson@...hat.com>
To: alex.williamson@...hat.com, kvm@...r.kernel.org
Cc: linux-kernel@...r.kernel.org, jgg@...dia.com,
shameerali.kolothum.thodi@...wei.com, kevin.tian@...el.com,
yishaih@...dia.com, linux-doc@...r.kernel.org, corbet@....net,
hch@...radead.org
Subject: [PATCH v4] vfio-pci: Provide reviewers and acceptance criteria for
variant drivers
Device specific extensions for devices exposed to userspace through
the vfio-pci-core library open both new functionality and new risks.
Here we attempt to provided formalized requirements and expectations
to ensure that future drivers both collaborate in their interaction
with existing host drivers, as well as receive additional reviews
from community members with experience in this area.
Cc: Jason Gunthorpe <jgg@...dia.com>
Acked-by: Shameer Kolothum <shameerali.kolothum.thodi@...wei.com>
Reviewed-by: Yishai Hadas <yishaih@...dia.com>
Acked-by: Kevin Tian <kevin.tian@...el.com>
Signed-off-by: Alex Williamson <alex.williamson@...hat.com>
---
v4:
Banish the word "vendor", replace with "device specific"
Minor wording changes in docs file
Add sign-offs from Kevin and Yishai
I'll drop Jason from reviewers if there's no positive approval
after this round.
v3:
Relocate to Documentation/driver-api/
Include index.rst reference
Cross link from maintainer-entry-profile
Add Shameer's Ack
v2:
Added Yishai
v1:
Per the proposal here[1], I've collected those that volunteered and
those that I interpreted as showing interest (alpha by last name). For
those on the reviewers list below, please R-b/A-b to keep your name as a
reviewer. More volunteers are still welcome, please let me know
explicitly; R-b/A-b will not be used to automatically add reviewers but
are of course welcome. Thanks,
Alex
[1]https://lore.kernel.org/all/20220310134954.0df4bb12.alex.williamson@redhat.com/
Documentation/driver-api/index.rst | 1 +
.../vfio-pci-device-specific-driver-acceptance.rst | 35 ++++++++++++++++++++
.../maintainer/maintainer-entry-profile.rst | 1 +
MAINTAINERS | 10 ++++++
4 files changed, 47 insertions(+)
create mode 100644 Documentation/driver-api/vfio-pci-device-specific-driver-acceptance.rst
diff --git a/Documentation/driver-api/index.rst b/Documentation/driver-api/index.rst
index c57c609ad2eb..a7b0223e2886 100644
--- a/Documentation/driver-api/index.rst
+++ b/Documentation/driver-api/index.rst
@@ -103,6 +103,7 @@ available subsections can be seen below.
sync_file
vfio-mediated-device
vfio
+ vfio-pci-device-specific-driver-acceptance
xilinx/index
xillybus
zorro
diff --git a/Documentation/driver-api/vfio-pci-device-specific-driver-acceptance.rst b/Documentation/driver-api/vfio-pci-device-specific-driver-acceptance.rst
new file mode 100644
index 000000000000..b7b99b876b50
--- /dev/null
+++ b/Documentation/driver-api/vfio-pci-device-specific-driver-acceptance.rst
@@ -0,0 +1,35 @@
+.. SPDX-License-Identifier: GPL-2.0
+
+Acceptance criteria for vfio-pci device specific driver variants
+================================================================
+
+Overview
+--------
+The vfio-pci driver exists as a device agnostic driver using the
+system IOMMU and relying on the robustness of platform fault
+handling to provide isolated device access to userspace. While the
+vfio-pci driver does include some device specific support, further
+extensions for yet more advanced device specific features are not
+sustainable. The vfio-pci driver has therefore split out
+vfio-pci-core as a library that may be reused to implement features
+requiring device specific knowledge, ex. saving and loading device
+state for the purposes of supporting migration.
+
+In support of such features, it's expected that some device specific
+variants may interact with parent devices (ex. SR-IOV PF in support of
+a user assigned VF) or other extensions that may not be otherwise
+accessible via the vfio-pci base driver. Authors of such drivers
+should be diligent not to create exploitable interfaces via these
+interactions or allow unchecked userspace data to have an effect
+beyond the scope of the assigned device.
+
+New driver submissions are therefore requested to have approval via
+sign-off/ack/review/etc for any interactions with parent drivers.
+Additionally, drivers should make an attempt to provide sufficient
+documentation for reviewers to understand the device specific
+extensions, for example in the case of migration data, how is the
+device state composed and consumed, which portions are not otherwise
+available to the user via vfio-pci, what safeguards exist to validate
+the data, etc. To that extent, authors should additionally expect to
+require reviews from at least one of the listed reviewers, in addition
+to the overall vfio maintainer.
diff --git a/Documentation/maintainer/maintainer-entry-profile.rst b/Documentation/maintainer/maintainer-entry-profile.rst
index 5d5cc3acdf85..93b2ae6c34a9 100644
--- a/Documentation/maintainer/maintainer-entry-profile.rst
+++ b/Documentation/maintainer/maintainer-entry-profile.rst
@@ -103,3 +103,4 @@ to do something different in the near future.
../nvdimm/maintainer-entry-profile
../riscv/patch-acceptance
../driver-api/media/maintainer-entry-profile
+ ../driver-api/vfio-pci-device-specific-driver-acceptance
diff --git a/MAINTAINERS b/MAINTAINERS
index 4322b5321891..fb71542c46d6 100644
--- a/MAINTAINERS
+++ b/MAINTAINERS
@@ -20314,6 +20314,16 @@ F: drivers/vfio/mdev/
F: include/linux/mdev.h
F: samples/vfio-mdev/
+VFIO PCI DEVICE SPECIFIC DRIVERS
+R: Jason Gunthorpe <jgg@...dia.com>
+R: Yishai Hadas <yishaih@...dia.com>
+R: Shameer Kolothum <shameerali.kolothum.thodi@...wei.com>
+R: Kevin Tian <kevin.tian@...el.com>
+L: kvm@...r.kernel.org
+S: Maintained
+P: Documentation/driver-api/vfio-pci-device-specific-driver-acceptance.rst
+F: drivers/vfio/pci/*/
+
VFIO PLATFORM DRIVER
M: Eric Auger <eric.auger@...hat.com>
L: kvm@...r.kernel.org
Powered by blists - more mailing lists