[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH] Clear device-model information when destroying an HVM domain with stubdom



Jun Zhu (Intern) writes ("[Xen-devel] [PATCH] Clear device-model information 
when destroying an HVM domain with stubdom"):
> This patch clears the device-model information from xenstore when
> destroying an HVM domain with stubdom.

I don't think this patch is correct.

> +     xs_rm(ctx->xsh, XBT_NULL, libxl_sprintf(ctx, 
> "/local/domain/0/device-model/%d", domid));
> +

This removes the information from xenstore before the process is
killed.  These things should be done in the opposite order, so that we
are never (even briefly) in a situation with a dm (whether stubdom or
dom0 process) which is not mentioned in xenstore.

The code already has this bug in the dom0 process case.

>      pid = libxl_xs_read(ctx, XBT_NULL, libxl_sprintf(ctx, 
> "/local/domain/%d/image/device-model-pid", domid));
>      if (!pid) {
>          int stubdomid = libxl_get_stubdom_id(ctx, domid);
> @@ -844,7 +846,6 @@
>          XL_LOG(ctx, XL_LOG_ERROR, "Device model is a stubdom, domid=%d\n", 
> stubdomid);
>          return libxl_domain_destroy(ctx, stubdomid, 0);
>      }
> -    xs_rm(ctx->xsh, XBT_NULL, libxl_sprintf(ctx, 
> "/local/domain/0/device-model/%d", domid));
>  
>      ret = kill(atoi(pid), SIGHUP);
>      if (ret < 0 && errno == ESRCH) {

The right answer is probably to move the xs_rm until _after_ the kill
is dealt with, and to put the kill section in an else branch of the
if, and remove the return in the stubdom case and replace it with an
ordinary error check.

Ian.

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.