[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [DOCDAY PATCH] docs: initial documentation for xenstore paths



On Mon, 2012-09-24 at 12:35 +0100, Ian Jackson wrote:
> Ian Campbell writes ("Re: [DOCDAY PATCH] docs: initial documentation for 
> xenstore paths"):
> > On Thu, 2012-08-09 at 15:02 +0100, Ian Jackson wrote:
> > > Ian Campbell writes ("Re: [DOCDAY PATCH] docs: initial documentation for 
> > > xenstore paths"):
> > > ...
> > > > > --- a/docs/misc/xenstore-paths.markdown
> > > > > +++ b/docs/misc/xenstore-paths.markdown
> > > > > @@ -0,0 +1,294 @@
> > > ...
> > > > > +PATH can contain simple regex constructs following the POSIX regexp
> > > > > +syntax described in regexp(7). In addition the following additional
> > > > > +wild card names are defined and are evaluated before regexp 
> > > > > expansion:
> > > 
> > > Can we use a restricted perl re syntax ?  That avoids weirdness with
> > > the rules for \.
> > 
> > Is "restricted perl re syntax" a well defined thing (reference?) or do
> > you just mean perlre(1)--?
> 
> I mean pcre, or perlre(1), probably.
> 
> > What's the weirdness with \.?
> 
> In Perl syntax, a punctuation character preceded by \ is always a
> literal, and all metacharacters are unbackslashed punctuation.

Great, I think I can cope with that.

I suspect I've mostly used that syntax already anyhow.

> In regexp(7) you need to remember which of ( ) | [ ] . & $ need
> \-escaping to be literals and which need \-annotating to be
> metacharacters.  (And there are various dialects of this too; for
> example Emacs regexps require \ in front of a different subset of the
> punctuation.)

Yes, I don't think I've ever done a regexp search and replace in emacs
successfully on my first attempt.

> I don't particularly care about all the fancy (?:...) etc. extensions,
> but being able to write the regexp without referring to the manual, or
> experimenting, is very good - particularly in a document which will be
> tested at most rather indirectly.
> 
> > > > > +The process ID of the device model associated with this domain, if it
> > > > > +has one.
> > > > > +
> > > > > +XXX why is this visible to the guest?
> > > 
> > > I think some of these things were put here just because there wasn't
> > > another place for the toolstack to store things.  See also the
> > > arbitrary junk stored by scripts in the device backend directories.
> > 
> > Should we define a proper home for these? e.g. /$toolstack/$domid?
> 
> Yes, we should, but the purpose of the doc is to document what we do
> now, not what we will do :-).  I just replied to explain your XXX.

Thanks. I've tagged this one as INTERNAL.

> > > This should have a cross-reference to the documentation defining
> > > static-max etc.  I thought we had some in tree but I can't seem to
> > > find it.  The best I can find is docs/man/xl.cfg.pod.5.
> > 
> > I think you might be thinking of tools/libxl/libxl_memory.txt.
> > 
> > Shall we move that doc to docs/misc?
> 
> Good idea.

I'll incorporate this move into the next version of the patch.

> > Perhaps:
> > 
> >         every effort to ... reach this target
> > 
> > ? but I'm not sure that is strictly correct, a guest can use less if it
> > wants to. So perhaps
> > 
> >         every effort to ... not use more than this
> >         
> > ? seems clumsy though.
> 
> :-).  These all seem fine to me.

I went with "make every effort to every effort use no more
than this amount of RAM". I don't think there's any point in requiring a
guest to use more RAM than it wants to.

> > > I think it's not specified anywhere.  It's ad-hoc.  The guest
> > > shouldn't need to see it but exposing it readonly is probably
> > > harmless.  Except perhaps for the vnc password ?
> > 
> > vnc password appears to go into /vm/$uuid/vncpass (looking at libxl code
> > only).
> 
> Yuk.  We want to abolish /vm/$uuid/ surely.
> 
> > AFAIK it does nothing special with the perms, but /vm/$uuid is not guest
> > readable (perms are "n0") so I think that works out ok.
> > 
> > I wonder if that's part of the point of /vm/$uuid.
> 
> Perhaps we should make a new directory for this.  We do seem to have
> quite a bit of cruft in our system which attempting to write this
> document is revealing.
> 
> The right answer is probably to mention it in the doc as "likely to
> move".

I've noticed that nothing in here appears to be readable by guests.
Therefore I have marked them all with new tags INTERNAL (guest
should/must not read)  and "n" (guest's can't even read).

Thanks for the review/discussion. V2 of this patch to follow shortly.

Ian.



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.