Re: [Xen-devel] [PATCH 10/24] xen: mask XSAVE from cpuid

From: Arjan van de Ven
Date: Tue Mar 17 2009 - 11:52:18 EST


On Tue, 17 Mar 2009 12:56:21 +0100
Andi Kleen <andi@xxxxxxxxxxxxxx> wrote:

> > The point is YOU DON'T KNOW. In particular, there might be new
> > traps, there might be new state, there might be new MSRs, there
> > might be new control bits... anything. Therefore, you cannot
> > blindly pass the bit on, even though XSAVE solves one part of the
> > problem.
>
> I think what will happen if you don't expose it is that there will
> be always hypervisors which are behind and applications/OS will end up
> doing probing for opcodes instead of trusting CPUID bits.
>
> Probably not what you intended.
>

well the choice fundamentally is
1) Have correct applications work, even though you might not always get
all new features that the hardware could have done.. at the expense
that someone who wants to do horrible things can
2) Have all latest features always there, but break correctly written
apps/oses every 2 years.

I'd go for option 1 any day of the week, hands down.
Esp if the "cpu cloaking" kind of things really disable the
instructions... but even without.

--
Arjan van de Ven Intel Open Source Technology Centre
For development, discussion and tips for power savings,
visit http://www.lesswatts.org
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/