From owner-freebsd-hackers@FreeBSD.ORG Mon May 19 15:01:08 2008 Return-Path: Delivered-To: freebsd-hackers@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 668FC1065671; Mon, 19 May 2008 15:01:08 +0000 (UTC) (envelope-from jhb@freebsd.org) Received: from elvis.mu.org (elvis.mu.org [192.203.228.196]) by mx1.freebsd.org (Postfix) with ESMTP id 4D00A8FC0C; Mon, 19 May 2008 15:01:08 +0000 (UTC) (envelope-from jhb@freebsd.org) Received: from zion.baldwin.cx (unknown [208.65.91.234]) by elvis.mu.org (Postfix) with ESMTP id 9E0791A4D8D; Mon, 19 May 2008 08:01:07 -0700 (PDT) From: John Baldwin To: freebsd-hackers@freebsd.org Date: Mon, 19 May 2008 10:37:11 -0400 User-Agent: KMail/1.9.7 References: <482E93C0.4070802@icyb.net.ua> <48307700.70304@FreeBSD.org> <20080518152945.60989b9c@bhuda.mired.org> In-Reply-To: <20080518152945.60989b9c@bhuda.mired.org> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <200805191037.12130.jhb@freebsd.org> Cc: Mike Meyer , Rui Paulo Subject: Re: rdmsr from userspace X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 19 May 2008 15:01:08 -0000 On Sunday 18 May 2008 03:29:45 pm Mike Meyer wrote: > On Sun, 18 May 2008 19:35:44 +0100 > > Rui Paulo wrote: > > Mike Meyer wrote: > > > On Sun, 18 May 2008 16:50:28 +0100 > > > > > > Rui Paulo wrote: > > >> Mike Meyer wrote: > > >>> On Sat, 17 May 2008 11:13:52 +0300 > > >>> > > >>> Andriy Gapon wrote: > > >>>> It seems that rdmsr instruction can be executed only at the highest > > >>>> privilege level and thus is not permitted from userland. Maybe we > > >>>> should provide something like Linux /dev/cpu/msr? > > >>>> I don't like interface of that device, I think that ioctl approach > > >>>> would be preferable in this case. > > >>>> Something like create /dev/cpuN and allow some ioctls on it: > > >>>> ioctl(cpu_fd, CPU_RDMSR, arg). > > >>>> What do you think? > > >>> > > >>> Ok, this points directly at a question I've been wondering about, but > > >>> haven't been able to find an answer in the google. > > >>> > > >>> I've been mucking about with general access to sysctl's (a sysctl > > >>> plugin for gkrellm, and a python module for accessing sysctls), and > > >>> with that hammer in my hand, the nail for this problem is obviously a > > >>> dev.cpu.#.msr sysctl. > > >> > > >> How can you request a rdmsr within the sysctl tree? I don't think > > >> sysctl is appropriate here either. > > > > > > Reading (or writing) a sysctl mib can trigger a sysctl handler, which > > > can do pretty much anything. In particular, there are already examples > > > in the kernel where sysctl handlers use devices that don't have /dev > > > entries to get & set their values. Look through kern/kern_cpu.c and > > > i386/cpufreq/p4tcc.c to see the two ends of that kind of > > > connection. In fact, the cpu frequency sysctls would seem to be an > > > excellent model for something like the msr. > > > > > > ioctl, open+read/write, sysctl - they're all just interfaces to kernel > > > handlers. > > > > > > > > > Yes, sure, but who do you select the MSR you want to read or write? > > > > dev.cpu.N. ? > > I don't think that would work - you'd have to register all those > hexadecimal strings as sysctl names. You could do an interface like > this, but the calling program would have to use sysctlnametomib to get > dev.cpu.N.msr, then append the MSR number to the results. Not really > very pretty. If you want to allow the user to poke at arbitrary msrs, > this would be a way to do it with sysctls, but the file api is > probably better. Actually, you don't have to register all of them. You can write a node handler which parses the next item in the MIB directly. Look at the all the proc sysctl's which accept a PID for example. That said, I think if someone already has a device driver done that is fine. I also think it is ok to let root request arbitrary MSR's from userland using an ioctl() or the like. -- John Baldwin