Il 04/04/2012 03:18, Michael Roth ha scritto:
> Attacking the IDL/schema side first is the more rationale approach. From
> there we can potentially generate ASN.1 BER/DER visitors for the protocol
> side, or potentially even just vmstate bindings as a start. I've recently
> started looking into the latter... it's completely feasible, the only
> downside is it complicates the IDL due requiring support for a lot of
> what are very much vmstate-specific items, but it should be possible to
> do this in a manner where those annotations are self-contained and
> ignorable if we opted to replace vmstate-style declarations.

We can also keep the current vmstate descriptions, but access fields
from the automatically-generated visitors instead of struct fields.
This keeps the IDL simple.

Paolo

Reply via email to