[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] Re: xsm: Consolidate xsm processing within domain control hypercall.
On 04/12/07 16:20 -0500, George S. Coker, II wrote: > A couple of things: > > - For these modifications to work, updates also have to be made to the dummy > module for XSM_ENABLE=y to compile > > - I do not think these modifications are a win. I would like to see this > changeset reverted for the following reasons: > > 1) While it may reduce the number of lines of code in the domctl hypercall, > it won't really reduce the overall number of lines of code in the hypervisor > if a module chooses to implement security operations on all of the donctl > operations. True, but it does concentrate the code in the security module. Also, it only requires one entry point to the security module from within the domctrl hypercall. I think that makes the code more maintainable and less likely that new domctl operations will bypass xsm security. > 2) This will also impose on the security modules the responsibility to > acquire and hold locks on hypervisor resources. It would seem dangerous to > give modules this responsibility. I don't see it, the locking logic is still the same. Can you show me where the module needs to acquire locks differently than without the patch? > 3) Performance will be impacted because of the additional multiplexing in 1) > and additional resource management in 2). I thought about this. I concluded it probably isn't measurable and even if so, it really doesn't matter because domctl hypercalls are infrequent and never performance-critical. Mike -- Mike D. Day IBM LTC Cell: 919 412-3900 Sametime: ncmike@xxxxxxxxxx AIM: ncmikeday Yahoo: ultra.runner PGP key: http://www.ncultra.org/ncmike/pubkey.asc _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |