Hello, On Wed, Jan 20, 2021 at 03:18:29PM -0800, Vipin Sharma wrote: > RDMA cgroup expose hardware details to users. In rdma.{max, current} > interface files we can see actual hardware names. Only difference No, what's shown is the device name followed by resources which are commonly defined for all rdma devices. The format is the same as io controller interface files. > compared to Encryption ID cgroup is that latter is exposing that detail > via file names. > > Will you prefer that encryption ID cgroup do things similar to RDMA > cgroup? It can have 3 files I don't know how many times I have to repeat the same point to get it across. For any question about actual abstraction, you haven't provided any kind of actual research or analysis and just keep pushing the same thing over and over again. Maybe the situation is such that it makes sense to change the rule but that needs substantial justifications. I've been asking to see whether there are such justifications but all I've been getting are empty answers. Until such discussions take place, please consider the series nacked and please excuse if I don't respond promptly in this thread. > > Attaching the interface to kvm side, most likely, instead of exposing the > > feature through cgroup. > I am little confused, do you mean moving files from the kernel/cgroup/ > to kvm related directories or you are recommending not to use cgroup at > all? I hope it is the former :) > > Only issue with this is that TDX is not limited to KVM, they have > potential use cases for MKTME without KVM. There are ways to integrate with cgroup through other interfaces - e.g. take a look at how bpf works with cgroups. Here, it isn't ideal but may work out if things actually require a lot of hardware dependent bits. There's also RDT which exists outside of cgroup for similar reasons. Thanks. -- tejun