Service Administrators

This guide covers GEOPM’s integration with the Linux OS, directories influenced by GEOPM, the utilization of files within those directories, and a command-line tool for configuring the GEOPM Service. For further details, explore the subsequent sections:

Linux Integration

The GEOPM Service integrates seamlessly with the Linux OS through Systemd. It is packaged within the geopm-service binary package, and administrators can install it using their respective package management systems. Use systemctl to interact with geopm Systemd Unit.

GEOPM Service Files

Beyond the files that come with the installation packages, the GEOPM Service may generate and modify additional files during its active state. These files are housed within two primary directories:

  • /etc/geopm: This directory contains configuration files, including access control lists. Files here persist across both reboots and service restarts.

  • /run/geopm: This directory contains files that monitor data about clients actively engaging the service, files that help maintain the GEOPM Service’s state, and files that are used by GEOPM’s save/restore mechanism. Should the service halt unexpectedly, these files aid in its subsequent restart. However, remember that the /run directory’s contents get deleted upon a system reboot.

Furthermore, the GEOPM Service ensures robust security measures:

  • Both /etc/geopm and /run/geopm directories and their contained files are established with restricted access permissions and root ownership.

  • The service will avoid reading any file or directory if there’s a relaxation in access restrictions, non-root ownership, or if they’re substituted by symbolic links or non-standard files. Should these conditions not be met, the affected file or directory will be renamed with a UUID and a warning will be dispatched to the syslog. While these renamed entities can assist an administrator in investigations, they are otherwise ignored by the GEOPM Service.

For seamless operation and security, it’s advised to manage the GEOPM Service system files using GEOPM tools like geopmaccess. However, administrators opting to handle GEOPM system files outside of a GEOPM interface should be vigilant of the necessary permission and ownership criteria. Delve deeper into the GEOPM security intricacies by referring to the Security Guide.

Configuring Access Lists

The geopmaccess(1) command line tool is used by a system administrator to manage access to the features provided by the GEOPM Service. The GEOPM Service does not allow read or write access for any non-root user until the system administrator explicitly configures the service using the geopmaccess command line tool. This command line interface allows the administrator to set access permissions for all users, and may extend these default privileges for specific Unix groups.

Configuring Systemd Unit File

The GEOPM Systemd unit is configured with the geopm.service file that is installed as part of the geopm-service package. This configuration file may be amended using the command systemctl edit geopm.service. See systemctl(1) for more details.

An administrator may wish to modify the GEOPM_VERBOSITY environment variable set in the configuration file. Increasing this will cause more messages to be printed in the system journal which may assist in debugging problems where expected signals or controls are not available.

  • GEOPM_VERBOSITY=0: Print errors and critical warning messages

  • GEOPM_VERBOSITY=1: Print warning messages

  • GEOPM_VERBOSITY=2: Print diagnostic info messages

The scope of messages printed when GEOPM_VERBOSITY is non-zero may increase in the future.

The MSR Driver

Access to MSRs enhances the capabilities of the GEOPM Access Service by providing additional hardware telemetry and controls. While the GEOPM Access Service can function without access to MSRs, it provides a limited set of CPU features. For the GEOPM Runtime to function correctly, these MSR-related CPU features are necessary. Hence, MSR support is a hard requirement for the GEOPM Runtime which may be relaxed in a future release.

One of two drivers may be used by the GEOPM Access Service to enable the MSR features: the standard Linux (in-tree) MSR driver or the msr-safe kernel driver maintained by LLNL. The msr-safe driver is preferred by GEOPM if both kernel modules are loaded because it provides low latency interface for reading and writing many MSR values at once through an ioctl(2) system call, possibly improving the performance of GEOPM Runtime or other MSR usages.

The msr-safe kernel driver source code can be found here. It’s distributed with the OpenSUSE Hardware Repository and can be installed from the RPMs provided there. For more information about the necessary configuration of msr-safe see: Configuring msr-safe and the install guide. Note that subsequent to v1.7.0 of msr-safe, it is required that the msr-safe allow list be configured prior to starting the GEOPM Access Service.

In the absence of the msr-safe kernel driver, users may access MSRs using the standard Linux MSR driver. This can be loaded with the command:

modprobe msr

The standard MSR driver be loaded to enable MSR access through the GEOPM Systemd Service when msr-safe is not installed.