[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <500E5951.5020900@amd.com>
Date: Tue, 24 Jul 2012 10:14:09 +0200
From: Andre Przywara <andre.przywara@....com>
To: Vladimir Davydov <vdavydov@...allels.com>
CC: Borislav Petkov <bp@...64.org>,
Thomas Gleixner <tglx@...utronix.de>,
Ingo Molnar <mingo@...hat.com>,
"H. Peter Anvin" <hpa@...or.com>, Andi Kleen <ak@...ux.intel.com>,
Borislav Petkov <borislav.petkov@....com>,
"x86@...nel.org" <x86@...nel.org>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
Andreas Herrmann <andreas.herrmann3@....com>
Subject: Re: [PATCH 2/2] cpu: intel, amd: mask cleared cpuid features
On 07/24/2012 09:06 AM, Vladimir Davydov wrote:
> On 07/21/2012 02:37 PM, Borislav Petkov wrote:
>> (+ Andre who's been doing some cross vendor stuff)
>>
>> On Fri, Jul 20, 2012 at 08:37:33PM +0400, Vladimir Davydov wrote:
>>> If 'clearcpuid=N' is specified in boot options, CPU feature #N won't be
>>> reported in /proc/cpuinfo and used by the kernel. However, if a
>>> userpsace process checks CPU features directly using the cpuid
>>> instruction, it will be reported about all features supported by the CPU
>>> irrespective of what features are cleared.
>>>
>>> The patch makes the clearcpuid boot option not only clear CPU features
>>> in kernel but also mask them in hardware for Intel and AMD CPUs that
>>> support it so that the features cleared won't be reported even by the
>>> cpuid instruction.
>>>
>>> This can be useful for migration of virtual machines managed by
>>> hypervisors that do not support/use Intel VT/AMD-V hardware-assisted
>>> virtualization technology.
But for this case you want it more fine-grained, say on a pre-process or
per-container level, right?
For hardware-assisted virtualization you simply don't need it, and for
Xen PV guests for instance this can be more safely done by the
hypervisor. I assume Parallels is similar in this respect, so you may
want to switch the MSRs on the guest's entry and exit by the VMM.
Also if you want to restrict a guest's CPUID features, you don't want to
do this at the guest's discretion, but better one level below where the
guest cannot revert this, right?
In general I am not reluctant to have this feature with a sane
interface, but I simply don't see the usefulness of having it per kernel.
Also note that AFAIK this masking only helps with the basic CPUID
features, namely leaf 1 and 0x80000001 for ECX and EDX. This does not
cover the more advanced features and not the new ones at leaf 7.
>> So opening the floodgates to people fiddling with this (not only
>> migrators) makes me feel pretty uneasy. And I won't wonder if all of
>> a sudden strange failures start to appear because code is querying
>> cpuid features but some funny distro has disabled it in its kernel boot
>> options.
Actually these "strange failures" would be a bug then. If CPUID is not
there, the feature is not there. Full stop. In the past we had had
already some trouble with people ignoring CPUID and stating some funny
things like: "Every XYZ processor has this feature."
If someone disables MCE, then on purpose. Let the code cope with it.
And Boris: I don't like this "majority of users" argument. If there is
some sense in this feature, why not have it (unless it significantly
hurts the code base)? Remember, this is Linux: If you want to shoot
yourself in the foot, we will not prevent you.
Regards,
Andre.
--
Andre Przywara
AMD-Operating System Research Center (OSRC), Dresden, Germany
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists