RE: [PATCH 4/4] MSR: msr Batch processing feature

2016-03-03 Thread Mcfadden, Marty Jay
> From: One Thousand Gnomes [mailto:gno...@lxorguk.ukuu.org.uk] > Sent: Thursday, March 03, 2016 9:21 AM > > That strikes me as a very bad idea btw. If your opener was privileged and > leaks > the handle via exec or anything else to another process that process inherits > the > powers which mean

RE: [PATCH 0/4] MSR: MSR: MSR Whitelist and Batch Introduction

2016-02-29 Thread Mcfadden, Marty Jay
> From: Borislav Petkov [mailto:b...@alien8.de] > Sent: Monday, February 29, 2016 10:21 AM > To: George Spelvin > > From a quick look, the stuff in the examples was already in the rapl driver. > The examples provided were to address why bit-level access granularity was needed. They were not int

RE: [PATCH 0/4] MSR: MSR: MSR Whitelist and Batch Introduction

2016-02-28 Thread Mcfadden, Marty Jay
> On Sun, Feb 28, 2016, Borislav Petkov wrote: > > Can we have some concrete examples for that please? > Our environment allows users to have exclusive access to some number of compute nodes for a limited time. Bit-level control of MSRs is required when a user might gain root or, more commonl

RE: [PATCH 0/4] MSR: MSR: MSR Whitelist and Batch Introduction

2016-02-28 Thread Mcfadden, Marty Jay
> * Ingo Molnar [mailto:mingo.kernel@gmail.com] wrote: > > No, we really don't want to touch the old MSR code - it's a very opaque API > with > various deep limitations. > > What I'd like to see instead is to use a modern system monitoring interface - > and > in fact that already happened i