[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH] x86: wrap kexec feature with CONFIG_KEXEC
On 01/09/15 11:36, Ian Campbell wrote: > On Thu, 2015-08-27 at 10:44 -0500, Jonathan Creekmore wrote: >>> On Aug 27, 2015, at 10:27 AM, David Vrabel <david.vrabel@xxxxxxxxxx> >>> wrote: >>> >>> On 27/08/15 15:47, Jonathan Creekmore wrote: >>>> Add the appropriate #if checks around the kexec code in the x86 >>>> codebase >>>> so that the feature can actually be turned off by the flag instead of >>>> always required to be enabled on x86. >>> What's your use case for this? >>> >> The use case is for a slimmed down version of the hypervisor that can be >> used as a security hypervisor, exposing as little extra functionality as >> possible. When looking for features to trim out to reduce the attack >> surface, I saw the flag for KEXEC and wanted to disable that, then ran >> into compile problems. > Can this not be achieved at runtime with XSM? Doing so would be contrary to the intent of reducing the attack surface. > > In general (i.e. not 100% consistently, I think) we have tended to avoid > making things user-facing compile time options. Many of the existing > CONFIG_* and HAVE_* are really about things which are arch dependent, or > require specific porting to each arch etc. I think the KEXEC flag is one of > those. > > This keeps the test matrix more reasonable (unlike e.g. Linux's Kconfig) > and also helps us by ensuring that users are mostly running one of a small > number of possible configs. > > I slightly fear that after Kexec you are going to want to strip out more > and more stuff... I for one welcome a Kconfig style approach. We will never be in the same order of magnitude of options as Linux, and it will help to properly modularise the code. ~Andrew _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |