[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH] libvchan: create xenstore entries in one transaction



> -----Original Message-----
> From: Xen-devel [mailto:xen-devel-bounces@xxxxxxxxxxxxxxxxxxxx] On Behalf
> Of Marek Marczykowski-Górecki
> Sent: 30 October 2018 23:49
> To: xen-devel@xxxxxxxxxxxxxxxxxxxx
> Cc: Wei Liu <wei.liu2@xxxxxxxxxx>; Ian Jackson <Ian.Jackson@xxxxxxxxxx>;
> Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx>
> Subject: [Xen-devel] [PATCH] libvchan: create xenstore entries in one
> transaction
> 
> This will prevent race when client waits for server with xs_watch - all
> entries should appear at once.

Watches should be put on the "state" key to avoid this kind of thing. That key 
should always be the last thing modified and hence there should never really be 
the need for xenstore transactions at all.

  Paul

> 
> Signed-off-by: Marek Marczykowski-Górecki
> <marmarek@xxxxxxxxxxxxxxxxxxxxxx>
> ---
>  tools/libvchan/init.c | 21 ++++++++++++++++-----
>  1 file changed, 16 insertions(+), 5 deletions(-)
> 
> diff --git a/tools/libvchan/init.c b/tools/libvchan/init.c
> index 0b3759a056..ba5a6eb29e 100644
> --- a/tools/libvchan/init.c
> +++ b/tools/libvchan/init.c
> @@ -250,6 +250,7 @@ static int init_xs_srv(struct libxenvchan *ctrl, int
> domain, const char* xs_base
>       char buf[64];
>       char ref[16];
>       char* domid_str = NULL;
> +     xs_transaction_t xs_trans = NULL;
>       xs = xs_domain_open();
>       if (!xs)
>               goto fail;
> @@ -265,21 +266,31 @@ static int init_xs_srv(struct libxenvchan *ctrl, int
> domain, const char* xs_base
>       perms[1].id = domain;
>       perms[1].perms = XS_PERM_READ;
> 
> +retry_transaction:
> +     xs_trans = xs_transaction_start(xs);
> +     if (!xs_trans)
> +             goto fail_xs_open;
> +
>       snprintf(ref, sizeof ref, "%d", ring_ref);
>       snprintf(buf, sizeof buf, "%s/ring-ref", xs_base);
> -     if (!xs_write(xs, 0, buf, ref, strlen(ref)))
> +     if (!xs_write(xs, xs_trans, buf, ref, strlen(ref)))
>               goto fail_xs_open;
> -     if (!xs_set_permissions(xs, 0, buf, perms, 2))
> +     if (!xs_set_permissions(xs, xs_trans, buf, perms, 2))
>               goto fail_xs_open;
> 
>       snprintf(ref, sizeof ref, "%d", ctrl->event_port);
>       snprintf(buf, sizeof buf, "%s/event-channel", xs_base);
> -     if (!xs_write(xs, 0, buf, ref, strlen(ref)))
> +     if (!xs_write(xs, xs_trans, buf, ref, strlen(ref)))
>               goto fail_xs_open;
> -     if (!xs_set_permissions(xs, 0, buf, perms, 2))
> +     if (!xs_set_permissions(xs, xs_trans, buf, perms, 2))
>               goto fail_xs_open;
> 
> -     ret = 0;
> +     if (!xs_transaction_end(xs, xs_trans, 0)) {
> +             if (errno == EAGAIN)
> +                     goto retry_transaction;
> +     } else {
> +             ret = 0;
> +     }
>   fail_xs_open:
>       free(domid_str);
>       xs_daemon_close(xs);
> --
> 2.17.2
> 
> 
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxxxxxxxxx
> https://lists.xenproject.org/mailman/listinfo/xen-devel
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.