[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH RFC 1/4] xen: add a domain unique id to each domain



Hi Juergen,

On 14/09/2021 13:35, Juergen Gross wrote:
Xenstore is referencing domains by their domid, but reuse of a domid
can lead to the situation that Xenstore can't tell whether a domain
with that domid has been deleted and created again without Xenstore
noticing the domain is a new one now.

Add a global domain creation unique id which is updated when creating
a new domain, and store that value in struct domain of the new domain.
The global unique id is initialized with the system time and updates
are done via the xorshift algorithm which is used for pseudo random
number generation, too (see https://en.wikipedia.org/wiki/Xorshift).

Signed-off-by: Juergen Gross <jgross@xxxxxxxx>
---
  xen/common/domain.c     | 16 ++++++++++++++++
  xen/include/xen/sched.h |  3 +++
  2 files changed, 19 insertions(+)

diff --git a/xen/common/domain.c b/xen/common/domain.c
index 6ee5d033b0..755349b93f 100644
--- a/xen/common/domain.c
+++ b/xen/common/domain.c
@@ -84,6 +84,9 @@ vcpu_info_t dummy_vcpu_info;
bool __read_mostly vmtrace_available; +/* Unique domain identifier, protected by domctl lock. */
+static uint64_t unique_id;
+
  static void __domain_finalise_shutdown(struct domain *d)
  {
      struct vcpu *v;
@@ -473,6 +476,18 @@ static void _domain_destroy(struct domain *d)
      free_domain_struct(d);
  }
+static uint64_t get_unique_id(void)

The implementation is assuming that domain cannot be created concurrently. The rest of domain_create() seems to be able to cope with concurrent call (even if domctl prevents this situation today).

So I think we would want to make this call safe as well. One possibility would be to (ab)use the domlist_update_lock (I think the uniq ID is only necessary for real domains).

Cheers,

--
Julien Grall



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.