aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authoriap10@labyrinth.cl.cam.ac.uk <iap10@labyrinth.cl.cam.ac.uk>2003-09-29 08:50:37 +0000
committeriap10@labyrinth.cl.cam.ac.uk <iap10@labyrinth.cl.cam.ac.uk>2003-09-29 08:50:37 +0000
commit8468f856c18838107ea4f25d9dcef2220cadd780 (patch)
tree0fd1181ea84a41b124014841a36c892471783a50
parent07374dc028ab2f0e53b6f3c4013970d877e82155 (diff)
downloadxen-8468f856c18838107ea4f25d9dcef2220cadd780.tar.gz
xen-8468f856c18838107ea4f25d9dcef2220cadd780.tar.bz2
xen-8468f856c18838107ea4f25d9dcef2220cadd780.zip
bitkeeper revision 1.470 (3f77f25dLnNa4xk_syeLDfNYb2Woyw)
add examples, update TODO
-rw-r--r--.rootkeys1
-rw-r--r--TODO59
-rw-r--r--tools/control/Makefile2
-rw-r--r--tools/control/etc.exports-example20
4 files changed, 65 insertions, 17 deletions
diff --git a/.rootkeys b/.rootkeys
index fd136bba68..89186f3891 100644
--- a/.rootkeys
+++ b/.rootkeys
@@ -17,6 +17,7 @@
3f0d61da3O5gkcntbIOdUmN2-RcZbQ tools/control/doc/INSTALL-cmdline
3eca6a96a31IwaKtkEa4jmzwTWlm8Q tools/control/doc/INSTALL-web
3f0d61daCTHGCpQK0Brz3PAp80d_2Q tools/control/doc/USAGE-cmdline
+3f77f25c4zdCalc5d0YnMGEnc9By-Q tools/control/etc.exports-example
3f776bd12y6bW-wtcs6rD2qhdpT_Rw tools/control/examples/grub.conf-example
3f776bd1RBu7Gnce6Bq9328QFUZBsw tools/control/examples/xen-mynewdom
3eb781fcabCKRogwxJA3-jJKstw9Vg tools/control/examples/xenctl.xml
diff --git a/TODO b/TODO
index cfaaf90ff6..911282c343 100644
--- a/TODO
+++ b/TODO
@@ -6,7 +6,8 @@ Known limitations and work in progress
The "xenctl" tool used for controling domains is still rather clunky
and not very user friendly. In particular, it should have an option to
create and start a domain with all the necessary parameters set from a
-named xml file.
+named xml file. Update: the 'xenctl script' functionality combined
+with the '-i' option to 'domain new' sort of does this.
The java xenctl tool is really just a frontend for a bunch of C tools
named xi_* that do the actual work of talking to Xen and setting stuff
@@ -17,26 +18,32 @@ than xenctl but its arguably clearer what's going on.
There's also a nice web based interface for controlling domains that
uses apache/tomcat. Unfortunately, this has fallen out of sync with
respect to the underlying tools, so is currently not built by default
-and needs fixing.
-
-The current Virtual Firewall Router (VFR) implementation in the
-snapshot tree is very rudimentary, and in particular, lacks the IP
-port-space sharing across domains that we've proposed that promises to
-provide a better alternative to NAT. There's a complete new
-implementation under development which also supports much better
-logging and auditing support. The current network scheduler is just
-simple round-robin between domains, without any rate limiting or rate
-guarantees. Dropping in a new scheduler should be straightforward, and
-is planned as part of the VFRv2 work package.
+and needs fixing. It shouldn't be hard to bring it up to date.
+
+The current Xen Virtual Firewall Router (VFR) implementation in the
+snapshot tree is very rudimentary, and in particular, lacks the RSIP
+IP port-space sharing across domains that provides a better
+alternative to NAT. There's a complete new implementation under
+development which also supports much better logging and auditing
+support. For now, if you want NAT, see the xen_nat_enable scripts and
+get domain0 to do it for you.
+
+The current network scheduler is just simple round-robin between
+domains, without any rate limiting or rate guarantees. Dropping in a
+new scheduler is straightforward, and is planned as part of the
+VFRv2 work package.
Another area that needs further work is the interface between Xen and
domain0 user space where the various XenoServer control daemons run.
The current interface is somewhat ad-hoc, making use of various
/proc/xeno entries that take a random assortment of arguments. We
intend to reimplement this to provide a consistent means of feeding
-back accounting and logging information to the control daemon. Also,
-we should provide all domains with a read/write virtual console
-interface -- currently for domains >1 it is output only.
+back accounting and logging information to the control daemon, and
+enabling control instructions to be sent the other way (e.g. domain 3:
+reduce your memory footprint to 10000 pages. You have 1s to comply.)
+We should also use the same interface to provide domains with a
+read/write virtual console interface. The current implemenation is
+output only, though domain0 can use the VGA console read/write.
There's also a number of memory management hacks that didn't make this
release: We have plans for a "universal buffer cache" that enables
@@ -58,7 +65,8 @@ We have the equivalent of balloon driver functionality to control
domain's memory usage, enabling a domain to give back unused pages to
Xen. This needs properly documenting, and perhaps a way of domain0
signalling to a domain that it requires it to reduce its memory
-footprint, rather than just the domain volunteering.
+footprint, rather than just the domain volunteering (see section on
+the improved control interface).
The current disk scheduler is rather simplistic (batch round robin),
and could be replaced by e.g. Cello if we have QoS isolation
@@ -82,3 +90,22 @@ page directory to a write-able page, we must ensure that no other CPU
still has the page in its TLB to ensure memory system integrity. One
other issue for supporting MP guests is that we'll need some sort of
CPU gang scheduler, which will require some research.
+
+Currently, the privileged domain0 can request access to the underlying
+hardware. This is how we enable the VGA console and Xserver to run in
+domain0. We are planning on extending this functionality to enable
+other device drivers for 'low performance' devices to be run in
+domain0, and then virtualized to other domains by domain0. This will
+enable random PCMCIA and USB devices to be used that we're unlikely to
+ever get around to writing a Xen driver for.
+
+We'd also like to experiment moving the network and block device
+drivers out of Xen, and each into their own special domains that are
+given access to the specific set of h/w resources they need to
+operate. This will provide some isolation against faulty device
+drivers, potentially allowing them to be restarted on failure. There
+may be more context switches incurred, but due to Xen's pipelined
+asynchronous i/o interface we expect this overhead to be amortised.
+This architecture would also allow device drivers to be easily
+upgraded independent of Xen, which is necessary for our vision of Xen
+as a next-gen BIOS replacement.
diff --git a/tools/control/Makefile b/tools/control/Makefile
index 1086f47ddb..7b8cefe966 100644
--- a/tools/control/Makefile
+++ b/tools/control/Makefile
@@ -8,7 +8,7 @@ clean: clean-cmdline clean-web
examples: FORCE
mkdir -p ../../../install/etc
- cp examples/xen* examples/grub.conf* ../../../install/etc/
+ cp examples/xen* examples/*example ../../../install/etc/
cmdline: FORCE
ant -buildfile build-cmdline.xml dist
diff --git a/tools/control/etc.exports-example b/tools/control/etc.exports-example
new file mode 100644
index 0000000000..3a56773292
--- /dev/null
+++ b/tools/control/etc.exports-example
@@ -0,0 +1,20 @@
+/local/roots/root1 169.254.1.1(rw,no_root_squash)
+/local/roots/root2 169.254.1.2(rw,no_root_squash)
+/local/roots/root3 169.254.1.3(rw,no_root_squash)
+/local/roots/root4 169.254.1.4(rw,no_root_squash)
+/local/roots/root5 169.254.1.5(rw,no_root_squash)
+/local/roots/root6 169.254.1.6(rw,no_root_squash)
+/local/roots/root7 169.254.1.7(rw,no_root_squash)
+/local/roots/root8 169.254.1.8(rw,no_root_squash)
+
+#/usr 169.254.1/24(ro,no_root_squash)
+
+/local/usrs/usr1 169.254.1.1(rw,no_root_squash)
+/local/usrs/usr2 169.254.1.2(rw,no_root_squash)
+/local/usrs/usr3 169.254.1.3(rw,no_root_squash)
+/local/usrs/usr4 169.254.1.4(rw,no_root_squash)
+/local/usrs/usr5 169.254.1.5(rw,no_root_squash)
+/local/usrs/usr6 169.254.1.6(rw,no_root_squash)
+/local/usrs/usr7 169.254.1.7(rw,no_root_squash)
+/local/usrs/usr8 169.254.1.8(rw,no_root_squash)
+