From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754294AbYJCXeo (ORCPT ); Fri, 3 Oct 2008 19:34:44 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1753352AbYJCXee (ORCPT ); Fri, 3 Oct 2008 19:34:34 -0400 Received: from terminus.zytor.com ([198.137.202.10]:60313 "EHLO terminus.zytor.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752796AbYJCXed (ORCPT ); Fri, 3 Oct 2008 19:34:33 -0400 Message-ID: <48E6AB15.8060405@zytor.com> Date: Fri, 03 Oct 2008 16:30:29 -0700 From: "H. Peter Anvin" User-Agent: Thunderbird 2.0.0.14 (X11/20080501) MIME-Version: 1.0 To: "Nakajima, Jun" CC: "akataria@vmware.com" , Jeremy Fitzhardinge , "avi@redhat.com" , Rusty Russell , Gerd Hoffmann , Ingo Molnar , the arch/x86 maintainers , LKML , Daniel Hecht , Zach Amsden , "virtualization@lists.linux-foundation.org" , "kvm@vger.kernel.org" Subject: Re: [RFC] CPUID usage for interaction between Hypervisors and Linux. References: <1222881242.9381.17.camel@alok-dev1> <48E3B19D.6060905@zytor.com> <1222882431.9381.23.camel@alok-dev1> <48E3BC21.4080803@goop.org> <1222895153.9381.69.camel@alok-dev1> <48E3FDD5.7040106@zytor.com> <0B53E02A2965CE4F9ADB38B34501A3A15D927EA4@orsmsx505.amr.corp.intel.com> <48E422CA.2010606@zytor.com> <0B53E02A2965CE4F9ADB38B34501A3A15DCBA221@orsmsx505.amr.corp.intel.com> In-Reply-To: <0B53E02A2965CE4F9ADB38B34501A3A15DCBA221@orsmsx505.amr.corp.intel.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Nakajima, Jun wrote: > What it means their hypervisor returns the interface signature (i.e. "Hv#1"), and that defines the interface. If we use "Lv_1", for example, we can define the interface 0x40000002 through 0x400000FF for Linux. Since leaf 0x40000000 and 0x40000001 are separate, we can decouple the hypervisor vender from the interface it supports. Right so far. > This also allows a hypervisor to support multiple interfaces. Wrong. This isn't a two-way interface. It's a one-way interface, and it *SHOULD BE*; exposing different information depending on what is running is a hack that is utterly tortorous at best. > > In fact, both Xen and KVM are using the leaf 0x40000001 for different purposes today (Xen: Xen version number, KVM: KVM para-virtualization features). But I don't think this would break their existing binaries mainly because they would need to expose the interface explicitly now. > >>>> This further underscores my belief that using 0x400000xx for >>>> anything "standards-based" at all is utterly futile, and that this >>>> space should be treated as vendor identification and the rest as >>>> vendor-specific. Any hope of creating a standard that's actually >>>> usable needs to be outside this space, e.g. in the 0x40SSSSxx >>>> space I proposed earlier. >>> Actually I'm not sure I'm following your logic. Are you saying using >>> that 0x400000xx for anything "standards-based" is utterly futile >>> because Microsoft said "the range is hypervisor vendor-neutral"? Or >>> you were not sure what they meant there. If we are not clear, we can >>> ask them. >>> >> What I'm saying is that Microsoft is effectively squatting on the >> 0x400000xx space with their definition. As written, it's not even >> clear that it will remain consistent between *their own* hypervisors, >> even less anyone else's. > > I hope the above clarified your concern. You can google-search a more detailed public spec. Let me know if you want to know a specific URL. > No, it hasn't "clarified my concern" in any way. It's exactly *underscoring* it. In other words, I consider 0x400000xx unusable for anything that is standards-based. The interfaces everyone is currently using aren't designed to export multiple interfaces; they're designed to tell the guest which *one* interface is exported. That is fine, we just need to go elsewhere. -hpa