[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 0/8] Domain Groups: Introduction
Keir Fraser wrote: > On 20/2/07 23:01, "Ian Pratt" <m+Ian.Pratt@xxxxxxxxxxxx> wrote: >> It's certainly useful to be able to pause groups of domains e.g. when >> debugging cluster filesystems etc. > > That doesn't require Xen to be aware of the groups. If the domains need to > be paused as instantaneously as possible then a multicall of domctls may > well suffice. Using multicall is a different, but reasonable approach to operate on a set of domains with a similar level of atomicity to what's currently in the domgrps patch. That said, I stopped well short of absolute atomicity in the domgrps implementation to avoid being offensively intrusive. By extending the domgrps approach to work with the scheduler it's possible to provide group operations with a level of atomicity not achievable from the current mutlicall implementation. However, deciding what degree of atomicity is necessary falls into what I believe should be a separate (but important) discussion. > I think we need to decide whether the benefits of supporting > this concept down to the hypervisor make it worth adding significant > extra management code at ring 0. This is the part of the discussion I most wanted to have. Whatever mechanism you use to operate on a set of domains, life is better when the hypervisor is aware of the group abstraction. With a group-aware hypervisor there is a robustness gain because even if the entire control stack falls over, group data can be re-populated from the hypervisor. Also, having group data managed in the hypervisor provides a level of separation between the group policy in the control stack and the management mechanism in the VMM. However, most interesting are the opportunities gained with integration of XSM/ACM. There are new opportunities for isolation of domain groups, dom0 decomposition, and more powerful primitives for the XSM policy language. We can get into more detail here if this high-level overview doesn't do enough to justify the ~650 lines (including comments and whitespace) of additional ring 0 code. > There may be a more compelling argument for groups as a security > abstraction, but I think we need to stand back and work out the overall > story there with XSM and all. Although both Domain Groups and XSM can stand on their own merits we've been aiming for integration of two from the start. The integration is planned, but not yet started because we want to incorporate community feedback on each project individually. Improvements are in progress for XSM and I'm certainly willing to discuss revisions for Domain Groups. -Chris _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |