WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] Re: [Xen-users] block level intercept with blktap

Hi,

Developing blktap2 drivers in userspace is very easy.

You can find the source under tools/blktap2 in the Xen source tarball.
I suggest starting with the README and taking a look at tools/blktap2/drivers/block_ram.c which is a simple ramdisk implementation.
Blktap2 also allows the creation of "stacking" drivers which would probably be a good fit for an encryption driver as you could then use it with abitary backends.
CC'd the xen-devel list if anyone wants to chime in?

Just a note, take a look at the post to xen-devel about the tap-ctl utility being introduced, the documentation is yet to be updated to reflect it.

Joseph.




On 6 October 2011 08:01, <kuei.sun@xxxxxxxxxxx> wrote:
Hi all,

I am trying to implement a blktap driver which will intercept block data from DomU OS and perform encryption/decryption on the fly. Is this possible? Also, where can I get good documentation on the data structures used by blktap and how to install Xen from source on Debian Squeeze? Thank you all very much.

-Jack


_______________________________________________
Xen-users mailing list
Xen-users@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-users



--
Founder | Director | VP Research
Orion Virtualisation Solutions
 | www.orionvm.com.au | Phone: 1300 56 99 52 | Mobile: 0428 754 846

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
<Prev in Thread] Current Thread [Next in Thread>
  • [Xen-devel] Re: [Xen-users] block level intercept with blktap, Joseph Glanville <=