WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] xenfs aka /proc/xen

To: Keir Fraser <keir.fraser@xxxxxxxxxxxxx>
Subject: Re: [Xen-devel] xenfs aka /proc/xen
From: Bastian Blank <waldi@xxxxxxxxxx>
Date: Sat, 5 Jun 2010 18:29:47 +0200
Cc: Jeremy Fitzhardinge <jeremy@xxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxx>
Delivery-date: Sat, 05 Jun 2010 09:30:47 -0700
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <C82515C2.161B1%keir.fraser@xxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Mail-followup-to: Bastian Blank <waldi@xxxxxxxxxx>, Keir Fraser <keir.fraser@xxxxxxxxxxxxx>, Jeremy Fitzhardinge <jeremy@xxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxx>
References: <20100527225440.GC25018@xxxxxxxxxxxxxxxxxxxxxxx> <C82515C2.161B1%keir.fraser@xxxxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: Mutt/1.5.18 (2008-05-17)
On Fri, May 28, 2010 at 06:40:02AM +0100, Keir Fraser wrote:
> On 27/05/2010 23:54, "Bastian Blank" <waldi@xxxxxxxxxx> wrote:
> > One of the entries (capabilities) provides information about the
> > proviledge level to the hypervisor and belongs more likely into
> > /sys/hypervisor. The four other are plain old devices and belongs into
> > /dev.

Okay. I thought about it and would settle for the following:
* $SYSFS/hypervisor/properties/guest_capabilites
  It includes the same value then $XENFS/capabilities. Or should that be
  changed as the meaning of "control_d" is not really clear (like
  "control-domain")?
* $DEV/xen/xenbus
  Merge into builtin xenbus support or own module xenbus-user
* $DEV/xen/privcmd
  - Module xen-control or so
  - *Needs to check for CAP_ADMIN*
* $DEV/xen/xenstored
  - Module xen-control or so
  - Merges xsd_kva and xsd_port
  - Supports:
    - mmap, only support pagesized maps
    - ioctl: get event channel port, get size (page size may be different)
  - Security constraints needs check. What can a user with access to
    this device do?
* Core kernel may trigger loading of xen-control module by some means
  (to be defined).

> If that stuff got moved somewhere 'better', it would be fine to update the
> tools to check both new and old locations.

I would start with adding the new stuff then check the tools to work
with both and just ignore for another merge try or remove xenfs later.

Bastian

-- 
Power is danger.
                -- The Centurion, "Balance of Terror", stardate 1709.2

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

<Prev in Thread] Current Thread [Next in Thread>