lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 31 May 2024 02:56:09 +0000
From: "Zeng, Xin" <xin.zeng@...el.com>
To: "Tian, Kevin" <kevin.tian@...el.com>, Alex Williamson
	<alex.williamson@...hat.com>
CC: Arnd Bergmann <arnd@...db.de>, Jason Gunthorpe <jgg@...pe.ca>, "Yishai
 Hadas" <yishaih@...dia.com>, Shameer Kolothum
	<shameerali.kolothum.thodi@...wei.com>, "Cao, Yahui" <yahui.cao@...el.com>,
	"Cabiddu, Giovanni" <giovanni.cabiddu@...el.com>, "kvm@...r.kernel.org"
	<kvm@...r.kernel.org>, qat-linux <qat-linux@...el.com>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: RE: [PATCH] vfio/qat: add PCI_IOV dependency

On Wednesday, May 29, 2024 1:36 PM, Tian, Kevin <kevin.tian@...el.com> wrote:
> To: Zeng, Xin <xin.zeng@...el.com>; Arnd Bergmann <arnd@...nel.org>;
> Cabiddu, Giovanni <giovanni.cabiddu@...el.com>; Alex Williamson
> <alex.williamson@...hat.com>; Cao, Yahui <yahui.cao@...el.com>
> Cc: Arnd Bergmann <arnd@...db.de>; Jason Gunthorpe <jgg@...pe.ca>;
> Yishai Hadas <yishaih@...dia.com>; Shameer Kolothum
> <shameerali.kolothum.thodi@...wei.com>; kvm@...r.kernel.org; qat-
> linux <qat-linux@...el.com>; linux-kernel@...r.kernel.org
> Subject: RE: [PATCH] vfio/qat: add PCI_IOV dependency
> 
> > From: Zeng, Xin <xin.zeng@...el.com>
> > Sent: Wednesday, May 29, 2024 11:11 AM
> >
> > On Wednesday, May 29, 2024 10:25 AM, Tian, Kevin <kevin.tian@...el.com>
> > > To: Arnd Bergmann <arnd@...nel.org>; Zeng, Xin <xin.zeng@...el.com>;
> > > Cabiddu, Giovanni <giovanni.cabiddu@...el.com>; Alex Williamson
> > > <alex.williamson@...hat.com>; Cao, Yahui <yahui.cao@...el.com>
> > > Cc: Arnd Bergmann <arnd@...db.de>; Jason Gunthorpe <jgg@...pe.ca>;
> > > Yishai Hadas <yishaih@...dia.com>; Shameer Kolothum
> > > <shameerali.kolothum.thodi@...wei.com>; kvm@...r.kernel.org; qat-
> > > linux <qat-linux@...el.com>; linux-kernel@...r.kernel.org
> > > Subject: RE: [PATCH] vfio/qat: add PCI_IOV dependency
> > >
> > > > From: Arnd Bergmann <arnd@...nel.org>
> > > > Sent: Tuesday, May 28, 2024 8:05 PM
> > > >
> > > > From: Arnd Bergmann <arnd@...db.de>
> > > >
> > > > The newly added driver depends on the crypto driver, but it uses
> > exported
> > > > symbols that are only available when IOV is also turned on:
> > >
> > > at a glance those undefined symbols don't use any symbol under
> > > IOV. They are just wrappers to certain callbacks registered by
> > > by respective qat drivers which support migration.
> > >
> > > Probably they'd better be moved out of CONFIG_PCI_IOV in
> > > "drivers/crypto/intel/qat/qat_common/Makefile" to remove
> > > this dependency in vfio variant driver.
> > >
> >
> > Thanks, Kevin :-). This dependency is like the relationship between the QAT
> > vfio
> > variant driver and macro CRYPTO_DEV_QAT_4XXX. The variant driver
> doesn't
> > directly reference the symbols exported by module qat_4xxx which is
> > protected
> > by CRYPTO_DEV_QAT_4XXX, but requires the module qat_4xxx at runtime
> so
> > far.
> > Alex suggested to put CRYPTO_DEV_QAT_4XXX as the dependency of this
> > variant
> > driver.
> > For CONFIG_PCI_IOV, if it is disabled, this variant driver doesn't serve the
> > user as
> > well since no VFs will be created by QAT PF driver. To keep the consistency,
> it
> > might
> > be right to make it as the dependency of this variant driver as Arnd pointed
> > out.
> > What do you think?
> >
> 
> Following this rationale then we need also make PCI_IOV a dependency
> for mlx5 and hisilicon given they are for VF migration too?

After more thoughts about this, I would agree with your first point that
PCI_IOV should not be the dependency of the variant driver if we consider
passthrough VFs in a nested virtualized environment. 
So decoupling PCI_IOV from migration helpers in QAT PF driver sounds a
better option. 

Thanks,
Xin

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ