[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <a535e22d-b87d-6b26-bb92-086cea52504c@intel.com>
Date: Mon, 29 Mar 2021 08:06:59 -0700
From: Dave Hansen <dave.hansen@...el.com>
To: Thomas Gleixner <tglx@...utronix.de>,
Andy Lutomirski <luto@...nel.org>
Cc: "Bae, Chang Seok" <chang.seok.bae@...el.com>,
X86 ML <x86@...nel.org>, LKML <linux-kernel@...r.kernel.org>,
libc-alpha <libc-alpha@...rceware.org>,
Florian Weimer <fweimer@...hat.com>,
Rich Felker <dalias@...c.org>, Kyle Huey <me@...ehuey.com>,
Keno Fischer <keno@...iacomputing.com>,
Linux API <linux-api@...r.kernel.org>
Subject: Re: Candidate Linux ABI for Intel AMX and hypothetical new related
features
On 3/27/21 5:53 PM, Thomas Gleixner wrote:
> Making it solely depend on XCR0 and fault if not requested upfront is
> bringing you into the situation that you broke 'legacy code' which
> relied on the CPUID bit and that worked until now which gets you
> in the no-regression trap.
Trying to find the right place to jump into this thread... :)
I don't know what apps do in practice. But, the enumeration of the
features in the SDM describes three steps:
1. Check for XGETBV support
2. Use XGETBV[0] to check that the OS is aware of the feature and is
context-switching it
3. Detect the feature itself
So, apps *are* supposed to be checking XCR0 via XGETBV. If they don't,
they run the risk of a feature being supported by the CPU and the
registers "working" but not being context-switched.
Zeroing out bits in XCR0 will have the effect of telling the app that
the OS isn't context-switching the state. I think this means that apps
will see the same thing in both situations:
1. If they run an old (say pre-AVX-512) kernel on new AVX-512-enabled
hardware, or
2. They run a new kernel with this fancy proposed XCR0-switching
mechanism
I _think_ that gets us off the hook for an ABI break, at least for AVX-512.
Powered by blists - more mailing lists