[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] xenfs aka /proc/xen



On 06/05/2010 09:29 AM, Bastian Blank wrote:
> On Fri, May 28, 2010 at 06:40:02AM +0100, Keir Fraser wrote:
>   
>> On 27/05/2010 23:54, "Bastian Blank" <waldi@xxxxxxxxxx> wrote:
>>     
>>> One of the entries (capabilities) provides information about the
>>> proviledge level to the hypervisor and belongs more likely into
>>> /sys/hypervisor. The four other are plain old devices and belongs into
>>> /dev.
>>>       
> Okay. I thought about it and would settle for the following:
> * $SYSFS/hypervisor/properties/guest_capabilites
>   It includes the same value then $XENFS/capabilities. Or should that be
>   changed as the meaning of "control_d" is not really clear (like
>   "control-domain")?
>   

The general rule for sysfs is one value per file.  It would probably be
more consistent to have a (guest_)capabilities directory, with a file
per capability (containing 1/0, or some other value if appropriate).

> * $DEV/xen/xenbus
>   Merge into builtin xenbus support or own module xenbus-user
>   

Would you expect to change the actual ABI/protocol?

> * $DEV/xen/privcmd
>   - Module xen-control or so
>   - *Needs to check for CAP_ADMIN*
> * $DEV/xen/xenstored
>   - Module xen-control or so
>   - Merges xsd_kva and xsd_port
>   - Supports:
>     - mmap, only support pagesized maps
>     - ioctl: get event channel port, get size (page size may be different)
>   

Yes, the interface of exposing the xenstore mfn to userspace has always
seemed a bit mad.  The kernel driver should do the mapping for
usermode.  Does it also need to expose the xs event channel?  Or can the
kernel just handle it internally and expose a normal blocking interface.

In fact, does it needs its own separate driver?  This is just
symmetrical with /{proc,dev}/xen/xenbus.  Can that driver be made to
handle both ends?  Or at least a driver which looks symmetric to the
guest-side xenbus?

>   - Security constraints needs check. What can a user with access to
>     this device do?
>   

Policy should be enforced by xenstored itself.  Guests are not
trustworthy in general, so there's no point in enforcing anything within
the guest kernel.

> * Core kernel may trigger loading of xen-control module by some means
>   (to be defined).
>   

All a bit awkward, since there's no obvious trigger to hang the load
event off.  Maybe key them off Xen or xenbus bringup as some kind of
adjunct pseudo device?

    J

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.