From: Alex Williamson <alex.williamson@redhat.com>
To: kvm@vger.kernel.org
Cc: linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org,
dev@dpdk.org, mtosatti@redhat.com, thomas@monjalon.net,
bluca@debian.org, jerinjacobk@gmail.com,
bruce.richardson@intel.com, cohuck@redhat.com
Subject: [dpdk-dev] [RFC PATCH 0/7] vfio/pci: SR-IOV support
Date: Tue, 04 Feb 2020 16:05:34 -0700 [thread overview]
Message-ID: <158085337582.9445.17682266437583505502.stgit@gimli.home> (raw)
There seems to be an ongoing desire to use userspace, vfio-based
drivers for both SR-IOV PF and VF devices. The fundamental issue
with this concept is that the VF is not fully independent of the PF
driver. Minimally the PF driver might be able to deny service to the
VF, VF data paths might be dependent on the state of the PF device,
or the PF my have some degree of ability to inspect or manipulate the
VF data. It therefore would seem irresponsible to unleash VFs onto
the system, managed by a user owned PF.
We address this in a few ways in this series. First, we can use a bus
notifier and the driver_override facility to make sure VFs are bound
to the vfio-pci driver by default. This should eliminate the chance
that a VF is accidentally bound and used by host drivers. We don't
however remove the ability for a host admin to change this override.
The next issue we need to address is how we let userspace drivers
opt-in to this participation with the PF driver. We do not want an
admin to be able to unwittingly assign one of these VFs to a tenant
that isn't working in collaboration with the PF driver. We could use
IOMMU grouping, but this seems to push too far towards tightly coupled
PF and VF drivers. This series introduces a "VF token", implemented
as a UUID, as a shared secret between PF and VF drivers. The token
needs to be set by the PF driver and used as part of the device
matching by the VF driver. Provisions in the code also account for
restarting the PF driver with active VF drivers, requiring the PF to
use the current token to re-gain access to the PF.
The above solutions introduce a bit of a modification to the VFIO ABI
and an additional ABI extension. The modification is that the
VFIO_GROUP_GET_DEVICE_FD ioctl is specified to require a char string
from the user providing the device name. For this solution, we extend
the syntax to allow the device name followed by key/value pairs. In
this case we add "vf_token=3e7e882e-1daf-417f-ad8d-882eea5ee337", for
example. These options are expected to be space separated. Matching
these key/value pairs is entirely left to the vfio bus driver (ex.
vfio-pci) and the internal ops structure is extended to allow this
optional support. This extension should be fully backwards compatible
to existing userspace, such code will simply fail to open these newly
exposed devices, as intended.
I've been debating whether instead of the above we should allow the
user to get the device fd as normal, but restrict the interfaces until
the user authenticates, but I'm afraid this would be a less backwards
compatible solution. It would be just as unclear to the user why a
device read/write/mmap/ioctl failed as it might be to why getting the
device fd could fail. However in the latter case, I believe we do a
better job of restricting how far userspace code might go before they
ultimately fail. I'd welcome discussion in the space, and or course
the extension of the GET_DEVICE_FD string.
Finally, the user needs to be able to set a VF token. I add a
VFIO_DEVICE_FEATURE ioctl for this that's meant to be reusable for
getting, setting, and probing arbitrary features of a device.
I'll reply to this cover letter with a very basic example of a QEMU
update to support this interface, though I haven't found a device yet
that behaves well with the PF running in one VM with the VF in
another, or really even just a PF running in a VM with SR-IOV enabled.
I know these devices exist though, and I suspect QEMU will not be the
primary user of this support for now, but this behavior reaffirms my
concerns to prevent mis-use.
Please comment. In particular, does this approach meet the DPDK needs
for userspace PF and VF drivers, with the hopefully minor hurdle of
sharing a token between drivers. The token is of course left to
userspace how to manage, and might be static (and not very secret) for
a given set of drivers. Thanks,
Alex
---
Alex Williamson (7):
vfio: Include optional device match in vfio_device_ops callbacks
vfio/pci: Implement match ops
vfio/pci: Introduce VF token
vfio: Introduce VFIO_DEVICE_FEATURE ioctl and first user
vfio/pci: Add sriov_configure support
vfio/pci: Remove dev_fmt definition
vfio/pci: Cleanup .probe() exit paths
drivers/vfio/pci/vfio_pci.c | 315 ++++++++++++++++++++++++++++++++---
drivers/vfio/pci/vfio_pci_private.h | 10 +
drivers/vfio/vfio.c | 19 ++
include/linux/vfio.h | 3
include/uapi/linux/vfio.h | 37 ++++
5 files changed, 356 insertions(+), 28 deletions(-)
next reply other threads:[~2020-02-04 23:05 UTC|newest]
Thread overview: 25+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-02-04 23:05 Alex Williamson [this message]
2020-02-04 23:05 ` [dpdk-dev] [RFC PATCH 1/7] vfio: Include optional device match in vfio_device_ops callbacks Alex Williamson
2020-02-06 11:14 ` Cornelia Huck
2020-02-06 18:18 ` Alex Williamson
2020-02-07 9:33 ` Cornelia Huck
2020-02-04 23:05 ` [dpdk-dev] [RFC PATCH 2/7] vfio/pci: Implement match ops Alex Williamson
2020-02-04 23:06 ` [dpdk-dev] [RFC PATCH 3/7] vfio/pci: Introduce VF token Alex Williamson
2020-02-05 7:57 ` Liu, Yi L
2020-02-05 14:13 ` Alex Williamson
2020-02-04 23:06 ` [dpdk-dev] [RFC PATCH 4/7] vfio: Introduce VFIO_DEVICE_FEATURE ioctl and first user Alex Williamson
2020-02-04 23:06 ` [dpdk-dev] [RFC PATCH 5/7] vfio/pci: Add sriov_configure support Alex Williamson
2020-02-04 23:06 ` [dpdk-dev] [RFC PATCH 6/7] vfio/pci: Remove dev_fmt definition Alex Williamson
2020-02-06 13:45 ` Cornelia Huck
2020-02-04 23:06 ` [dpdk-dev] [RFC PATCH 7/7] vfio/pci: Cleanup .probe() exit paths Alex Williamson
2020-02-04 23:17 ` [dpdk-dev] [RFC PATCH 0/7] vfio/pci: SR-IOV support Alex Williamson
2020-02-05 7:57 ` Liu, Yi L
2020-02-05 14:18 ` Alex Williamson
2020-02-05 7:01 ` Christoph Hellwig
2020-02-05 13:58 ` Alex Williamson
2020-02-05 7:57 ` Liu, Yi L
2020-02-05 14:10 ` Alex Williamson
2020-02-11 11:18 ` Jerin Jacob
2020-02-11 13:57 ` Thomas Monjalon
2020-02-11 17:06 ` Alex Williamson
2020-02-11 18:03 ` Jerin Jacob
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=158085337582.9445.17682266437583505502.stgit@gimli.home \
--to=alex.williamson@redhat.com \
--cc=bluca@debian.org \
--cc=bruce.richardson@intel.com \
--cc=cohuck@redhat.com \
--cc=dev@dpdk.org \
--cc=jerinjacobk@gmail.com \
--cc=kvm@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-pci@vger.kernel.org \
--cc=mtosatti@redhat.com \
--cc=thomas@monjalon.net \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).