Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp691757pxb; Wed, 20 Jan 2021 18:45:30 -0800 (PST) X-Google-Smtp-Source: ABdhPJyTEXWmN/NxQ0CJO8MaN34tWVw79d64nE96s2U5yT0pbYvGF7PEU9bVCudWSq2bZW9EL7Eg X-Received: by 2002:a17:907:d8e:: with SMTP id go14mr8014428ejc.472.1611197130431; Wed, 20 Jan 2021 18:45:30 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1611197130; cv=none; d=google.com; s=arc-20160816; b=n0cx1uc7Vqtg3kQptxkEKoh2SWAJFNAH6syRwmo4R+lyppcxBhJ4BvdB3+Z76Virk5 QwUMDUH3fZ9v5IZIRNVIw9FIXOuX1E6UP/9T2+Ezpzrpz2YY0UGfY27DTNxjtc1EqKs6 r/kOdZkMTej1sBpBe3t3Xwf/nP6PCffBn/ZGHXGFQ1nt6WE0oTcqFQejzreNOfmHHdix zye7cSufQq7fw4W7U6munUBi2ZFDNnjNG2etXqkIvCkxGYm+/y8UTxmY3Qmh9QE4o6sO 9iAh+OPnH7T2dBRfXSKKfbBVvyMEjCXzti8ciOTaVxaSecqFYsUsCc78xsoqkEFDxtLg +xmw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:sender:dkim-signature; bh=Kuz1Z8yFOKqntoZqWEZMArKOxWgkIyDqBbny1W4ic1M=; b=xJiErnmutypqjWJRMqZUgmcgdo3vzYkUS3pv9+tRU/+t5+UMBr9rvjRqEe5DGLHMOf b8xgbTwmGUr0nSoiGHoDUP5ACEk4J9tQMR1cVlyI7NId9/AEvHo+IwJvxHMcNxU/wWP+ OqUr+TdU4ha0A/ExDrd/8F0juiX74cOY/nnjhaOWmcHXAATg2VsJ375Tk5vXCNVzuqNR 0SZh0BFVY86dU1WlRriql0YwDROT2Uq72SR0iaPAy02mRUQGVXERPBpE1I13CO+HY3Rg 77cGMCCcQHg8AySL4LD8HSyQG1tevx31+LDp7hDPoqbP3er8loYjXxrI04s4aNJSJlKh PanA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=HJlmkRDv; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b20si1569085edy.183.2021.01.20.18.45.07; Wed, 20 Jan 2021 18:45:30 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=HJlmkRDv; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2393133AbhAUA3U (ORCPT + 99 others); Wed, 20 Jan 2021 19:29:20 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57502 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2404197AbhATXeZ (ORCPT ); Wed, 20 Jan 2021 18:34:25 -0500 Received: from mail-qv1-xf2b.google.com (mail-qv1-xf2b.google.com [IPv6:2607:f8b0:4864:20::f2b]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A8754C061575; Wed, 20 Jan 2021 15:33:44 -0800 (PST) Received: by mail-qv1-xf2b.google.com with SMTP id d11so80229qvo.11; Wed, 20 Jan 2021 15:33:44 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to; bh=Kuz1Z8yFOKqntoZqWEZMArKOxWgkIyDqBbny1W4ic1M=; b=HJlmkRDv2hPtYnuU5c270k+st/MAdNAqkEg/D9vHyvSK9kKH73Zjbctd7WVUKy6247 HkQxh4CdcW2DT9yAgApoSW5PpLB4pjrOWlxx/EKsDvpOSfDC7qReqn950tJtAfAKWOzy KA/8CQvR6JfJrhPQtE9guNZttGprU+hbN4YyyaoiGtAJndqmJysGXPVyXyruoUDqLtL3 omGUe1oEcvwiIpLmBTJek7bTA7w2yT27u25onP7lsCxZK46SQNs+JCLRKlf+mq2gGetG vydZ2LO27zn5lX+JaxD0f4njHfv2cQboM6Ync9BZTAbzNbGoWTk3d4aqmwS8isJMaTDe Hmnw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:date:from:to:cc:subject:message-id :references:mime-version:content-disposition:in-reply-to; bh=Kuz1Z8yFOKqntoZqWEZMArKOxWgkIyDqBbny1W4ic1M=; b=bW3taC2pZOpX1UlIfofqQZA2fABBXsII1HMlTO+PI6rmY8q80yZtB79zKNAQqv0RYb 5TWW8tHCl70GwXNQhl9HTMwmD6qV4tWTO7n58/kIpQZ5MCWFinhFx6b48EIoY5vUu3Rx VgjfsqiT5OSoNjgHKVIYFjRlz8rd/W+XBiuCHDTNDbeKpwCALGz2ZC8m/uZbBYMtEHwt N4prMtj+CUBG6dgxcgYCFmZGWMtLLKVeffyjmQjchzO6U8aI9gn8WYEm4BWSMmtfhGrl gI5FnyuCiuB4Hy3ZKOr4PdXfozRQO8dRG4gsjbtfJ8l2Avsmqwf3Fep4R9xmw4no/8Nc Up8Q== X-Gm-Message-State: AOAM530VSaqFNuVxZyJtlMcq8yx3rib6b9ahn5xSTHSj1tM/CCPpU1+B kMBtrPpAlCPPeOSl3+vv2Cs= X-Received: by 2002:a0c:e651:: with SMTP id c17mr11632401qvn.34.1611185623591; Wed, 20 Jan 2021 15:33:43 -0800 (PST) Received: from localhost ([2620:10d:c091:480::1:1b8f]) by smtp.gmail.com with ESMTPSA id 8sm2473388qkr.28.2021.01.20.15.33.42 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 20 Jan 2021 15:33:42 -0800 (PST) Sender: Tejun Heo Date: Wed, 20 Jan 2021 18:32:56 -0500 From: Tejun Heo To: Vipin Sharma Cc: thomas.lendacky@amd.com, brijesh.singh@amd.com, jon.grimm@amd.com, eric.vantassell@amd.com, pbonzini@redhat.com, seanjc@google.com, hannes@cmpxchg.org, frankja@linux.ibm.com, borntraeger@de.ibm.com, corbet@lwn.net, joro@8bytes.org, vkuznets@redhat.com, wanpengli@tencent.com, jmattson@google.com, tglx@linutronix.de, mingo@redhat.com, bp@alien8.de, hpa@zytor.com, gingell@google.com, rientjes@google.com, dionnaglaze@google.com, kvm@vger.kernel.org, x86@kernel.org, cgroups@vger.kernel.org, linux-doc@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [Patch v4 1/2] cgroup: svm: Add Encryption ID controller Message-ID: References: <20210108012846.4134815-1-vipinsh@google.com> <20210108012846.4134815-2-vipinsh@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello, On Wed, Jan 20, 2021 at 03:18:29PM -0800, Vipin Sharma wrote: > RDMA cgroup expose hardware details to users. In rdma.{max, current} > interface files we can see actual hardware names. Only difference No, what's shown is the device name followed by resources which are commonly defined for all rdma devices. The format is the same as io controller interface files. > compared to Encryption ID cgroup is that latter is exposing that detail > via file names. > > Will you prefer that encryption ID cgroup do things similar to RDMA > cgroup? It can have 3 files I don't know how many times I have to repeat the same point to get it across. For any question about actual abstraction, you haven't provided any kind of actual research or analysis and just keep pushing the same thing over and over again. Maybe the situation is such that it makes sense to change the rule but that needs substantial justifications. I've been asking to see whether there are such justifications but all I've been getting are empty answers. Until such discussions take place, please consider the series nacked and please excuse if I don't respond promptly in this thread. > > Attaching the interface to kvm side, most likely, instead of exposing the > > feature through cgroup. > I am little confused, do you mean moving files from the kernel/cgroup/ > to kvm related directories or you are recommending not to use cgroup at > all? I hope it is the former :) > > Only issue with this is that TDX is not limited to KVM, they have > potential use cases for MKTME without KVM. There are ways to integrate with cgroup through other interfaces - e.g. take a look at how bpf works with cgroups. Here, it isn't ideal but may work out if things actually require a lot of hardware dependent bits. There's also RDT which exists outside of cgroup for similar reasons. Thanks. -- tejun