[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] libvirt: [PATCH] libxl: Check for control_d string to decide about dom0
On 12.03.2014 13:08, Ian Campbell wrote: > On Wed, 2014-03-12 at 13:03 +0100, Stefan Bader wrote: >> I have been looking into a bug report (see BugLink) which reported >> libvirt to fail starting inside a Xen guest. Upon further investigation >> I found that some tools that help monitoring Xen guests will mount >> xenfs to /proc/xen. This will create a capabilities files there even >> if the guest is not dom0. However it will return nothing when reading >> from it. > > This seems consistent with the xencommons initscript which does: > # run this script only in dom0: > # no capabilities file in xenlinux domU kernel > # empty capabilities file in pv_ops domU kernel > if test -f /proc/xen/capabilities && \ > ! grep -q "control_d" /proc/xen/capabilities ; then > exit 0 > fi > >> >> Ian, just to sanity check myself. I looked at the xenfs code and to >> me there only seem to be those two outcomes (either "control_d" for >> running in dom0 or notrhing if not). >> >> With the following patch applied, libvirt starts up correctly in >> the normal guests (with xenfs mounted) without initializing libxl. >> And also in dom0 where it still enables the libxl driver (if the >> xl toolstack is selected). >> >> -Stefan >> >> From f11949caca6dfe1a802472a2a6d4fe760115ccc6 Mon Sep 17 00:00:00 2001 >> From: Stefan Bader <stefan.bader@xxxxxxxxxxxxx> >> Date: Wed, 12 Mar 2014 11:37:16 +0100 >> Subject: [PATCH] libxl: Check for control_d string to decide about dom0 >> >> As soon as any guest mounts xenfs to /proc/xen, there is a capabilities >> file in that directory. However it returns nothing when reading from it. >> Change the test to actually check the contents of the file. >> >> BugLink: http://bugs.launchpad.net/bugs/1248025 >> >> Signed-off-by: Stefan Bader <stefan.bader@xxxxxxxxxxxxx> >> --- >> src/libxl/libxl_driver.c | 14 ++++++++++++-- >> 1 file changed, 12 insertions(+), 2 deletions(-) >> >> diff --git a/src/libxl/libxl_driver.c b/src/libxl/libxl_driver.c >> index 65d80a2..844e828 100644 >> --- a/src/libxl/libxl_driver.c >> +++ b/src/libxl/libxl_driver.c >> @@ -944,6 +944,7 @@ libxlDriverShouldLoad(bool privileged) >> bool ret = false; >> virCommandPtr cmd; >> int status; >> + char *output = NULL; >> >> /* Don't load if non-root */ >> if (!privileged) { >> @@ -951,8 +952,17 @@ libxlDriverShouldLoad(bool privileged) >> return ret; >> } >> >> - /* Don't load if not running on a Xen control domain (dom0) */ >> - if (!virFileExists("/proc/xen/capabilities")) { >> + /* >> + * Don't load if not running on a Xen control domain (dom0). It is not >> + * sufficient to check for the file to exist as any guest can mount >> + * xenfs to /proc/xen. >> + */ >> + status = virFileReadAll("/proc/xen/capabilities", 10. &output); > > Is this "." supposed to be a ","? Darn, I thought I had fixed that. Unfortunately in the wrong place. Yes, that should be a ",". Sorry -Stefan > >> + if (status >= 0) { >> + status = strncmp(output, "control_d", 9); >> + } >> + VIR_FREE(output); >> + if (status) { >> VIR_INFO("No Xen capabilities detected, probably not running " >> "in a Xen Dom0. Disabling libxenlight driver"); >> > > Attachment:
signature.asc _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |