[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [DOCDAY PATCH] docs: initial documentation for xenstore paths
On Mon, 2012-09-24 at 12:35 +0100, Ian Jackson wrote: > Ian Campbell writes ("Re: [DOCDAY PATCH] docs: initial documentation for > xenstore paths"): > > On Thu, 2012-08-09 at 15:02 +0100, Ian Jackson wrote: > > > Ian Campbell writes ("Re: [DOCDAY PATCH] docs: initial documentation for > > > xenstore paths"): > > > ... > > > > > --- a/docs/misc/xenstore-paths.markdown > > > > > +++ b/docs/misc/xenstore-paths.markdown > > > > > @@ -0,0 +1,294 @@ > > > ... > > > > > +PATH can contain simple regex constructs following the POSIX regexp > > > > > +syntax described in regexp(7). In addition the following additional > > > > > +wild card names are defined and are evaluated before regexp > > > > > expansion: > > > > > > Can we use a restricted perl re syntax ? That avoids weirdness with > > > the rules for \. > > > > Is "restricted perl re syntax" a well defined thing (reference?) or do > > you just mean perlre(1)--? > > I mean pcre, or perlre(1), probably. > > > What's the weirdness with \.? > > In Perl syntax, a punctuation character preceded by \ is always a > literal, and all metacharacters are unbackslashed punctuation. Great, I think I can cope with that. I suspect I've mostly used that syntax already anyhow. > In regexp(7) you need to remember which of ( ) | [ ] . & $ need > \-escaping to be literals and which need \-annotating to be > metacharacters. (And there are various dialects of this too; for > example Emacs regexps require \ in front of a different subset of the > punctuation.) Yes, I don't think I've ever done a regexp search and replace in emacs successfully on my first attempt. > I don't particularly care about all the fancy (?:...) etc. extensions, > but being able to write the regexp without referring to the manual, or > experimenting, is very good - particularly in a document which will be > tested at most rather indirectly. > > > > > > +The process ID of the device model associated with this domain, if it > > > > > +has one. > > > > > + > > > > > +XXX why is this visible to the guest? > > > > > > I think some of these things were put here just because there wasn't > > > another place for the toolstack to store things. See also the > > > arbitrary junk stored by scripts in the device backend directories. > > > > Should we define a proper home for these? e.g. /$toolstack/$domid? > > Yes, we should, but the purpose of the doc is to document what we do > now, not what we will do :-). I just replied to explain your XXX. Thanks. I've tagged this one as INTERNAL. > > > This should have a cross-reference to the documentation defining > > > static-max etc. I thought we had some in tree but I can't seem to > > > find it. The best I can find is docs/man/xl.cfg.pod.5. > > > > I think you might be thinking of tools/libxl/libxl_memory.txt. > > > > Shall we move that doc to docs/misc? > > Good idea. I'll incorporate this move into the next version of the patch. > > Perhaps: > > > > every effort to ... reach this target > > > > ? but I'm not sure that is strictly correct, a guest can use less if it > > wants to. So perhaps > > > > every effort to ... not use more than this > > > > ? seems clumsy though. > > :-). These all seem fine to me. I went with "make every effort to every effort use no more than this amount of RAM". I don't think there's any point in requiring a guest to use more RAM than it wants to. > > > I think it's not specified anywhere. It's ad-hoc. The guest > > > shouldn't need to see it but exposing it readonly is probably > > > harmless. Except perhaps for the vnc password ? > > > > vnc password appears to go into /vm/$uuid/vncpass (looking at libxl code > > only). > > Yuk. We want to abolish /vm/$uuid/ surely. > > > AFAIK it does nothing special with the perms, but /vm/$uuid is not guest > > readable (perms are "n0") so I think that works out ok. > > > > I wonder if that's part of the point of /vm/$uuid. > > Perhaps we should make a new directory for this. We do seem to have > quite a bit of cruft in our system which attempting to write this > document is revealing. > > The right answer is probably to mention it in the doc as "likely to > move". I've noticed that nothing in here appears to be readable by guests. Therefore I have marked them all with new tags INTERNAL (guest should/must not read) and "n" (guest's can't even read). Thanks for the review/discussion. V2 of this patch to follow shortly. Ian. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |