Gleb Natapov wrote:
Andrew,
On Wed, Oct 15, 2008 at 07:18:52AM -0700, Andrew Biggadike wrote:
Gleb Natapov <[EMAIL PROTECTED]> wrote:
Of course, you should also take a look at VMware's VMCI. If we're going
to have a socket interface, if we can have a compatible userspace
interface, that would probably be a good thing.
I looked at what I could find about VMCI
(http://pubs.vmware.com/vmci-sdk/index.html).
I believe Anthony intended for you to look at the sockets interface to
VMCI: http://www.vmware.com/pdf/ws65_s2_vmci_sockets.pdf.
Using VMCI socket requires loading kernel module in a guest and in a host.
Is this correct?
Note that their addressing scheme uses a CID/port pair. I think it's
interesting and somewhat safe because it basically mirrors an IP/port
pair. That makes it relatively safe because that addressing mechanism
is well known (with it's advantages and flaws). For instance, you need
some sort of authority to assign out ports. It doesn't really help with
discovery either.
Another possibility would be to have the address be like sockaddr_un.
You could actually have it be file paths. The effect would be that any
VMs that can communicate with each other could have a common namespace.
You could extend the analogy and actually create controllable
permissions that could be used to control who can talk to who. You
could even create a synthetic filesystem in the guest that could mount
this namespace allowing very sophisticated enumeration/permission
control. This is probably the complete opposite end in terms of having
a novel interface.
The best solution is probably somewhere between the two.
Regards,
Anthony Liguori
--
Gleb.
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at http://vger.kernel.org/majordomo-info.html