Your suggestion is absolutely right, though it needs more modification. I will
try to make a new patch.
Jun Zhu
Citrix Systems UK
________________________________________
From: Ian Jackson
Sent: 08 September 2010 09:51
To: Jun Zhu (Intern)
Cc: xen-devel@xxxxxxxxxxxxxxxxxxx
Subject: Re: [Xen-devel] [PATCH] Clear device-model information when destroying
an HVM domain with stubdom
Jun Zhu (Intern) writes ("[Xen-devel] [PATCH] Clear device-model information
when destroying an HVM domain with stubdom"):
> This patch clears the device-model information from xenstore when
> destroying an HVM domain with stubdom.
I don't think this patch is correct.
> + xs_rm(ctx->xsh, XBT_NULL, libxl_sprintf(ctx,
> "/local/domain/0/device-model/%d", domid));
> +
This removes the information from xenstore before the process is
killed. These things should be done in the opposite order, so that we
are never (even briefly) in a situation with a dm (whether stubdom or
dom0 process) which is not mentioned in xenstore.
The code already has this bug in the dom0 process case.
> pid = libxl_xs_read(ctx, XBT_NULL, libxl_sprintf(ctx,
> "/local/domain/%d/image/device-model-pid", domid));
> if (!pid) {
> int stubdomid = libxl_get_stubdom_id(ctx, domid);
> @@ -844,7 +846,6 @@
> XL_LOG(ctx, XL_LOG_ERROR, "Device model is a stubdom, domid=%d\n",
> stubdomid);
> return libxl_domain_destroy(ctx, stubdomid, 0);
> }
> - xs_rm(ctx->xsh, XBT_NULL, libxl_sprintf(ctx,
> "/local/domain/0/device-model/%d", domid));
>
> ret = kill(atoi(pid), SIGHUP);
> if (ret < 0 && errno == ESRCH) {
The right answer is probably to move the xs_rm until _after_ the kill
is dealt with, and to put the kill section in an else branch of the
if, and remove the return in the stubdom case and replace it with an
ordinary error check.
Ian.
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|