Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp395681rwb; Fri, 18 Nov 2022 03:07:30 -0800 (PST) X-Google-Smtp-Source: AA0mqf7mS6eAAB1BYfdlbhxcn8t3iYr55KUJtuGNWXSdkqrmt/kA8fgGOicG9epSHqp+PMCn9i3q X-Received: by 2002:aa7:9ad6:0:b0:536:e549:8480 with SMTP id x22-20020aa79ad6000000b00536e5498480mr7525877pfp.6.1668769650689; Fri, 18 Nov 2022 03:07:30 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1668769650; cv=none; d=google.com; s=arc-20160816; b=MUlEYQjlE5hD7p+icejsPUZZJk7AfIHOGNvhbYJ+MDBEVbPHAdLmK0lEqkpThHndP4 vQ1xNXr+Ogi5OIEAjQI+0cJYxHq1RH2ihyVKiPqbUS5L6J7Gowb0iWSURVW6cy1rSIue eZZPnUUpZIGDolzExR2qQg1Z4K5WJIERcOFuhlzE/ZtEETRqWORvzz+VpW5Kn4ASVUJx yBWAYF2+GsaXgU3XvBnvuJLE6uV6zetRe9Gs0wMOsrbAkecuZriZlmWY9mf7f99Tb+96 Apy8E3pJZszRAqOobT0L3Fa0ryco4htZ+mPyNc7Nona0LBwKKRYoiR2Z/CGYR6VUwFpY N0VQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:user-agent:references:message-id :in-reply-to:subject:cc:to:from:date; bh=yHoj1dOCVntyQygwm3xULvu/xyOrxOjkslvm/N5ab2s=; b=RqrJw69TicolnPbLZ/8iDxZTl92I59JEDJD5f6u10CUdU4TcLObVsPSx+/bd+wlkzA VFDvObR2QyJLxHszI7PBkr6goKkSPLnssvkZfoEVG75SqjsJGy6UOj9JPSGQKTnpFqxy SeMLUeUZlH5kcWGmSerNhYdqUJAcjtNhgy/CeT2vSI0w4UOer5YXlmuA30/mHx3RBzpm fjDu4CR94BZfAtrvv3vaUHInUPvy1g/m6K9c0Is09tTYB41icN2PemRqPqg/s2/efNYN n5/MOHk88ZpKyyl5wH7RQFk4Fngb/v+H9vKPnj2gVZIoXvX3ALCbNBAXu6X2AFMoCgpm bOxg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id t16-20020a056a00139000b00571a5c5eaa5si3856680pfg.150.2022.11.18.03.07.06; Fri, 18 Nov 2022 03:07:30 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235150AbiKRK4G (ORCPT + 92 others); Fri, 18 Nov 2022 05:56:06 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40520 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S241616AbiKRK4D (ORCPT ); Fri, 18 Nov 2022 05:56:03 -0500 X-Greylist: delayed 401 seconds by postgrey-1.37 at lindbergh.monkeyblade.net; Fri, 18 Nov 2022 02:56:01 PST Received: from utopia.booyaka.com (utopia.booyaka.com [74.50.51.50]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5B86A91523 for ; Fri, 18 Nov 2022 02:56:01 -0800 (PST) Received: (qmail 7247 invoked by uid 1019); 18 Nov 2022 10:49:18 -0000 Received: from localhost (sendmail-bs@127.0.0.1) by localhost with SMTP; 18 Nov 2022 10:49:18 -0000 Date: Fri, 18 Nov 2022 10:49:18 +0000 (UTC) From: Paul Walmsley To: Palmer Dabbelt cc: Conor Dooley , Atish Patra , corbet@lwn.net, Paul Walmsley , Palmer Dabbelt , aou@eecs.berkeley.edu, conor.dooley@microchip.com, linux-doc@vger.kernel.org, linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, linux@rivosinc.com Subject: Re: [PATCH 2/4] Documentation: RISC-V: Allow patches for non-standard behavior In-Reply-To: <20221013045619.18906-3-palmer@rivosinc.com> Message-ID: References: <20221013045619.18906-1-palmer@rivosinc.com> <20221013045619.18906-3-palmer@rivosinc.com> User-Agent: Alpine 2.21.999 (DEB 260 2018-02-26) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00,SPF_HELO_PASS, SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, On Wed, 12 Oct 2022, Palmer Dabbelt wrote: > From: Palmer Dabbelt > > The patch acceptance policy forbids accepting support for non-standard > behavior. This policy was written in order to both steer implementers > towards the standards and to avoid coupling the upstream kernel too > tightly to vendor-specific features. Those were good goals, but in > practice the policy just isn't working: every RISC-V system we have > needs vendor-specific behavior in the kernel and we end up taking that > support which violates the policy. That's confusing for contributors, > which is the main reason we have a written policy in the first place. > > So let's just start taking code for vendor-defined behavior. I think I understand the motivation behind this patch: to align the stated patch acceptance policy with the actual maintenance practice for arch/riscv. Along those lines, how about the following tweaks, based on your original patch? Probably the most significant proposed change from what you wrote is to temporarily drop the section about accepting patches for hardware that doesn't yet exist. I know arch/x86 does this, but my recollection is that the maintainers there started doing that after the key x86 hardware manufacturers established a track record of consistently releasing mass-market hardware that implemented what they promised. Not sure we're at that point with RISC-V yet. We'll get there at some point, but maybe we can add that clause back in once that happens? - Paul From: Paul Walmsley Date: Fri, 18 Nov 2022 02:16:17 -0600 Subject: [PATCH] Documentation: RISC-V: Allow patches for widely available hardware This patch, based on an earlier patch from Palmer, updates the patch acceptance policy to note that the maintainers may also accept patches for RISC-V hardware that contains features that may not be strictly RISC-V-compliant, but which is widely available. The intention here is to align the stated policy with the de-facto upstream Linux policy. Link: https://lore.kernel.org/linux-riscv/20221013045619.18906-3-palmer@rivosinc.com/ # Palmer's original patch Cc: Palmer Dabbelt Signed-off-by: Paul Walmsley --- Documentation/riscv/patch-acceptance.rst | 13 +++++++++---- 1 file changed, 9 insertions(+), 4 deletions(-) diff --git a/Documentation/riscv/patch-acceptance.rst b/Documentation/riscv/patch-acceptance.rst index 5da6f9b273d6..2e3f9ecdd977 100644 --- a/Documentation/riscv/patch-acceptance.rst +++ b/Documentation/riscv/patch-acceptance.rst @@ -29,7 +29,12 @@ their own custom extensions. These custom extensions aren't required to go through any review or ratification process by the RISC-V Foundation. To avoid the maintenance complexity and potential performance impact of adding kernel code for implementor-specific -RISC-V extensions, we'll only accept patches for extensions that -have been officially frozen or ratified by the RISC-V Foundation. -(Implementors, may, of course, maintain their own Linux kernel trees -containing code for any custom extensions that they wish.) +RISC-V extensions, we'll only consider patches for extensions that +either: + +- Have been officially frozen or ratified by the RISC-V Foundation, or +- Have been implemented in hardware that is widely available, per standard + Linux practice + +(Implementors, may, of course, maintain their own Linux kernel +trees containing code for any custom extensions that they wish.) -- 2.38.1