[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH] Clear device-model information when destroying an HVM domain with stubdom
Jun Zhu (Intern) writes ("[Xen-devel] [PATCH] Clear device-model information when destroying an HVM domain with stubdom"): > This patch clears the device-model information from xenstore when > destroying an HVM domain with stubdom. I don't think this patch is correct. > + xs_rm(ctx->xsh, XBT_NULL, libxl_sprintf(ctx, > "/local/domain/0/device-model/%d", domid)); > + This removes the information from xenstore before the process is killed. These things should be done in the opposite order, so that we are never (even briefly) in a situation with a dm (whether stubdom or dom0 process) which is not mentioned in xenstore. The code already has this bug in the dom0 process case. > pid = libxl_xs_read(ctx, XBT_NULL, libxl_sprintf(ctx, > "/local/domain/%d/image/device-model-pid", domid)); > if (!pid) { > int stubdomid = libxl_get_stubdom_id(ctx, domid); > @@ -844,7 +846,6 @@ > XL_LOG(ctx, XL_LOG_ERROR, "Device model is a stubdom, domid=%d\n", > stubdomid); > return libxl_domain_destroy(ctx, stubdomid, 0); > } > - xs_rm(ctx->xsh, XBT_NULL, libxl_sprintf(ctx, > "/local/domain/0/device-model/%d", domid)); > > ret = kill(atoi(pid), SIGHUP); > if (ret < 0 && errno == ESRCH) { The right answer is probably to move the xs_rm until _after_ the kill is dealt with, and to put the kill section in an else branch of the if, and remove the return in the stubdom case and replace it with an ordinary error check. Ian. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxx http://lists.xensource.com/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |