The current test driver keeps all its state in memory and is not thread safe. Since background jobs will need to access state from a thread periodically we need to make the test driver thread safe. This is done with 2 levels of locking - A global driver lock. - A per-connection lock Before taking the per-connection lock, the global driver lock must be acquired. The driver lock can be released the moment the connection lock is acquired. The connection lock must be held for the duration of all driver methods which are accessing the 'struct testConn' or 'struct testDom' or 'struct testNet' data. To keep this reasonably unobtrusive, the GET_CONNECT, and GET_DOMAIN / GET_NETWORK macros have been altered to do the neccessary lock acquisition. The RELEASE_DOMAIN and RELEASE_NETWORL macros are new, and must be used prior to returning from any driver method so that mutex are released. This is a fairly coarse level of locking, but effective enough for the test driver which is not performance critical - merely safety critical. This model should apply reasonably safely to the QEMU driver too, though we may wish to make it finer grained. test.c | 245 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++--------- 1 file changed, 214 insertions(+), 31 deletions(-) Dan diff -r d56f1d6ccb4a src/test.c --- a/src/test.c Fri Jan 04 17:48:15 2008 -0500 +++ b/src/test.c Fri Jan 04 17:52:09 2008 -0500 @@ -37,12 +37,31 @@ #include <unistd.h> #include <net/if.h> #include <netinet/in.h> +#include <pthread.h> #include "internal.h" #include "test.h" #include "xml.h" #include "buf.h" #include "uuid.h" +#include "job.h" + + +/** + * Description of thread locking requirements: + * + * Locks on objects: + * + * - Global driver lock + * - Per connection lock + * + * If we wanted better granularity we could lock per-domain but + * that's overkill for now + * + * The driver lock must be held before acquiring a connection lock + * + * The GET / RELEASE macros should be used for this + */ /* Flags that determine the action to take on a shutdown or crash of a domain */ @@ -106,6 +125,7 @@ typedef struct _testNet *testNetPtr; #define MAX_NETWORKS 20 struct _testConn { + pthread_mutex_t lock; char path[PATH_MAX]; int nextDomID; virNodeInfo nodeInfo; @@ -117,6 +137,8 @@ typedef struct _testConn testConn; typedef struct _testConn testConn; typedef struct _testConn *testConnPtr; +static pthread_mutex_t driverLock = PTHREAD_MUTEX_INITIALIZER; + #define TEST_MODEL "i686" #define TEST_MODEL_WORDSIZE "32" @@ -131,36 +153,62 @@ static const virNodeInfo defaultNodeInfo 2, }; +/* Must call RELEASE_DOMAIN after this before returning */ #define GET_DOMAIN(dom, ret) \ int domidx; \ testConnPtr privconn; \ testDomPtr privdom; \ \ + pthread_mutex_lock(&driverLock); \ privconn = (testConnPtr)dom->conn->privateData; \ - if ((domidx = getDomainIndex(dom)) < 0) { \ + pthread_mutex_lock(&privconn->lock); \ + pthread_mutex_unlock(&driverLock); \ + if ((domidx = getDomainIndex(privconn, dom)) < 0) { \ testError((dom)->conn, (dom), NULL, VIR_ERR_INVALID_ARG, \ __FUNCTION__); \ + pthread_mutex_unlock(&privconn->lock); \ return (ret); \ } \ privdom = &privconn->domains[domidx]; +/* Must call RELEASE_NETWORK after this before returning */ #define GET_NETWORK(net, ret) \ int netidx; \ testConnPtr privconn; \ testNetPtr privnet; \ \ + pthread_mutex_lock(&driverLock); \ privconn = (testConnPtr)net->conn->privateData; \ - if ((netidx = getNetworkIndex(net)) < 0) { \ + pthread_mutex_lock(&privconn->lock); \ + pthread_mutex_unlock(&driverLock); \ + if ((netidx = getNetworkIndex(privconn, net)) < 0) { \ testError((net)->conn, NULL, (net), VIR_ERR_INVALID_ARG, \ __FUNCTION__); \ + pthread_mutex_unlock(&privconn->lock); \ return (ret); \ } \ privnet = &privconn->networks[netidx]; +/* Must call RELEASE_CONNECTION after this before returning */ #define GET_CONNECTION(conn, ret) \ testConnPtr privconn; \ \ - privconn = (testConnPtr)conn->privateData; + pthread_mutex_lock(&driverLock); \ + privconn = (testConnPtr)conn->privateData; \ + pthread_mutex_lock(&privconn->lock); \ + pthread_mutex_unlock(&driverLock); + +/* To be called after GET_CONNECTIOn */ +#define RELEASE_CONNECTION() \ + pthread_mutex_unlock(&privconn->lock) + +/* To be called after GET_NETWORK */ +#define RELEASE_NETWORK() \ + pthread_mutex_unlock(&privconn->lock) + +/* To be called after GET_DOMAIN */ +#define RELEASE_DOMAIN() \ + pthread_mutex_unlock(&privconn->lock) static void @@ -230,6 +278,7 @@ static int testLoadDomain(virConnectPtr if (gettimeofday(&tv, NULL) < 0) { testError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR, _("getting time of day")); + RELEASE_CONNECTION(); return (-1); } @@ -327,7 +376,7 @@ static int testLoadDomain(virConnectPtr } } if (handle < 0) - return (-1); + goto error; privconn->domains[handle].active = 1; privconn->domains[handle].id = domid; @@ -351,11 +400,13 @@ static int testLoadDomain(virConnectPtr privconn->domains[handle].onPoweroff = onPoweroff; privconn->domains[handle].onCrash = onCrash; + RELEASE_CONNECTION(); return (handle); error: if (name) free(name); + RELEASE_CONNECTION(); return (-1); } @@ -488,7 +539,7 @@ static int testLoadNetwork(virConnectPtr } } if (handle < 0) - return (-1); + goto error; privconn->networks[handle].active = 1; privconn->networks[handle].running = 1; @@ -522,6 +573,8 @@ static int testLoadNetwork(virConnectPtr strncpy(privconn->networks[handle].dhcpEnd, dhcpend, sizeof(privconn->networks[handle].dhcpEnd)-1); privconn->networks[handle].dhcpEnd[sizeof(privconn->networks[handle].dhcpEnd)-1] = '\0'; free(dhcpend); + + RELEASE_CONNECTION(); return (handle); error: @@ -535,6 +588,7 @@ static int testLoadNetwork(virConnectPtr free(dhcpend); if (name) free(name); + RELEASE_CONNECTION(); return (-1); } @@ -669,7 +723,7 @@ static int testOpenFromFile(virConnectPt char *str; xmlDocPtr xml = NULL; xmlNodePtr root = NULL; - xmlNodePtr *domains, *networks = NULL; + xmlNodePtr *domains = NULL, *networks = NULL; xmlXPathContextPtr ctxt = NULL; virNodeInfoPtr nodeInfo; testConnPtr privconn = malloc(sizeof(testConn)); @@ -851,9 +905,8 @@ static int testOpenFromFile(virConnectPt return VIR_DRV_OPEN_ERROR; } -static int getDomainIndex(virDomainPtr domain) { +static int getDomainIndex(testConnPtr privconn, virDomainPtr domain) { int i; - GET_CONNECTION(domain->conn, -1); for (i = 0 ; i < MAX_DOMAINS ; i++) { if (domain->id >= 0) { @@ -867,9 +920,8 @@ static int getDomainIndex(virDomainPtr d return (-1); } -static int getNetworkIndex(virNetworkPtr network) { +static int getNetworkIndex(testConnPtr privconn, virNetworkPtr network) { int i; - GET_CONNECTION(network->conn, -1); for (i = 0 ; i < MAX_NETWORKS ; i++) { if (STREQ(network->name, privconn->networks[i].name)) @@ -956,8 +1008,10 @@ static char * testGetURI (virConnectPtr if (asprintf (&uri, "test://%s", privconn->path) == -1) { testError (conn, NULL, NULL, VIR_ERR_SYSTEM_ERROR, strerror (errno)); + RELEASE_CONNECTION(); return NULL; } + RELEASE_CONNECTION(); return uri; } @@ -972,6 +1026,7 @@ static int testNodeGetInfo(virConnectPtr { GET_CONNECTION(conn, -1); memcpy(info, &privconn->nodeInfo, sizeof(virNodeInfo)); + RELEASE_CONNECTION(); return (0); } @@ -1022,6 +1077,7 @@ static int testNumOfDomains(virConnectPt continue; numActive++; } + RELEASE_CONNECTION(); return (numActive); } @@ -1035,22 +1091,30 @@ testDomainCreateLinux(virConnectPtr conn if (xmlDesc == NULL) { testError(conn, NULL, NULL, VIR_ERR_INVALID_ARG, __FUNCTION__); + RELEASE_CONNECTION(); return (NULL); } if (privconn->numDomains == MAX_DOMAINS) { testError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR, _("too many domains")); + RELEASE_CONNECTION(); return (NULL); } domid = privconn->nextDomID++; - if ((handle = testLoadDomainFromDoc(conn, domid, xmlDesc)) < 0) + if ((handle = testLoadDomainFromDoc(conn, domid, xmlDesc)) < 0) { + RELEASE_CONNECTION(); return (NULL); + } privconn->domains[handle].config = 0; dom = virGetDomain(conn, privconn->domains[handle].name, privconn->domains[handle].uuid); - if (dom == NULL) return NULL; + if (dom == NULL) { + RELEASE_CONNECTION(); + return NULL; + } privconn->numDomains++; + RELEASE_CONNECTION(); return (dom); } @@ -1072,12 +1136,17 @@ static virDomainPtr testLookupDomainByID if (idx < 0) { testError (conn, NULL, NULL, VIR_ERR_NO_DOMAIN, NULL); + RELEASE_CONNECTION(); return(NULL); } dom = virGetDomain(conn, privconn->domains[idx].name, privconn->domains[idx].uuid); - if (dom == NULL) return NULL; + if (dom == NULL) { + RELEASE_CONNECTION(); + return NULL; + } dom->id = id; + RELEASE_CONNECTION(); return (dom); } @@ -1098,13 +1167,18 @@ static virDomainPtr testLookupDomainByUU if (idx < 0) { testError (conn, NULL, NULL, VIR_ERR_NO_DOMAIN, NULL); + RELEASE_CONNECTION(); return NULL; } dom = virGetDomain(conn, privconn->domains[idx].name, privconn->domains[idx].uuid); - if (dom == NULL) return NULL; + if (dom == NULL) { + RELEASE_CONNECTION(); + return NULL; + } dom->id = privconn->domains[idx].id; + RELEASE_CONNECTION(); return dom; } @@ -1125,13 +1199,18 @@ static virDomainPtr testLookupDomainByNa if (idx < 0) { testError (conn, NULL, NULL, VIR_ERR_NO_DOMAIN, NULL); + RELEASE_CONNECTION(); return NULL; } dom = virGetDomain(conn, privconn->domains[idx].name, privconn->domains[idx].uuid); - if (dom == NULL) return NULL; + if (dom == NULL) { + RELEASE_CONNECTION(); + return NULL; + } dom->id = privconn->domains[idx].id; + RELEASE_CONNECTION(); return dom; } @@ -1148,6 +1227,7 @@ static int testListDomains (virConnectPt ids[n++] = privconn->domains[i].id; } } + RELEASE_CONNECTION(); return (n); } @@ -1162,6 +1242,7 @@ static int testDestroyDomain (virDomainP } else { privdom->active = 0; } + RELEASE_DOMAIN(); return (0); } @@ -1171,10 +1252,12 @@ static int testResumeDomain (virDomainPt if (privdom->info.state != VIR_DOMAIN_PAUSED) { testError(domain->conn, domain, NULL, VIR_ERR_INTERNAL_ERROR, "domain not paused"); + RELEASE_DOMAIN(); return -1; } privdom->info.state = VIR_DOMAIN_RUNNING; + RELEASE_DOMAIN(); return (0); } @@ -1185,10 +1268,12 @@ static int testPauseDomain (virDomainPtr if (privdom->info.state == VIR_DOMAIN_SHUTOFF || privdom->info.state == VIR_DOMAIN_PAUSED) { testError(domain->conn, domain, NULL, VIR_ERR_INTERNAL_ERROR, "domain not running"); + RELEASE_DOMAIN(); return -1; } privdom->info.state = VIR_DOMAIN_PAUSED; + RELEASE_DOMAIN(); return (0); } @@ -1198,13 +1283,14 @@ static int testShutdownDomain (virDomain if (privdom->info.state == VIR_DOMAIN_SHUTOFF) { testError(domain->conn, domain, NULL, VIR_ERR_INTERNAL_ERROR, "domain not running"); + RELEASE_DOMAIN(); return -1; } privdom->info.state = VIR_DOMAIN_SHUTOFF; domain->id = -1; privdom->id = -1; - + RELEASE_DOMAIN(); return (0); } @@ -1245,6 +1331,7 @@ static int testRebootDomain (virDomainPt break; } + RELEASE_DOMAIN(); return (0); } @@ -1256,6 +1343,7 @@ static int testGetDomainInfo (virDomainP if (gettimeofday(&tv, NULL) < 0) { testError(domain->conn, domain, NULL, VIR_ERR_INTERNAL_ERROR, _("getting time of day")); + RELEASE_DOMAIN(); return (-1); } @@ -1266,10 +1354,12 @@ static int testGetDomainInfo (virDomainP privdom->info.cpuTime = ((tv.tv_sec * 1000ll * 1000ll * 1000ll) + (tv.tv_usec * 1000ll)); } memcpy(info, &privdom->info, sizeof(virDomainInfo)); + + RELEASE_DOMAIN(); return (0); } -static char *testDomainDumpXML(virDomainPtr domain, int flags); +static char *testDomainDumpXMLLocked(virDomainPtr domain, testDomPtr privdom, int flags); #define TEST_SAVE_MAGIC "TestGuestMagic" @@ -1280,11 +1370,12 @@ static int testDomainSave(virDomainPtr d int fd, len; GET_DOMAIN(domain, -1); - xml = testDomainDumpXML(domain, 0); + xml = testDomainDumpXMLLocked(domain, privdom, 0); if ((fd = open(path, O_CREAT|O_TRUNC|O_WRONLY, S_IRUSR|S_IWUSR)) < 0) { testError(domain->conn, domain, NULL, VIR_ERR_INTERNAL_ERROR, "cannot save domain"); + RELEASE_DOMAIN(); return (-1); } len = strlen(xml); @@ -1292,24 +1383,28 @@ static int testDomainSave(virDomainPtr d testError(domain->conn, domain, NULL, VIR_ERR_INTERNAL_ERROR, "cannot write header"); close(fd); + RELEASE_DOMAIN(); return (-1); } if (write(fd, (char*)&len, sizeof(len)) != sizeof(len)) { testError(domain->conn, domain, NULL, VIR_ERR_INTERNAL_ERROR, "cannot write metadata length"); close(fd); + RELEASE_DOMAIN(); return (-1); } if (write(fd, xml, len) != len) { testError(domain->conn, domain, NULL, VIR_ERR_INTERNAL_ERROR, "cannot write metadata"); close(fd); + RELEASE_DOMAIN(); return (-1); } if (close(fd) < 0) { testError(domain->conn, domain, NULL, VIR_ERR_INTERNAL_ERROR, "cannot save domain data"); close(fd); + RELEASE_DOMAIN(); return (-1); } if (privdom->config) { @@ -1319,8 +1414,10 @@ static int testDomainSave(virDomainPtr d } else { privdom->active = 0; } + RELEASE_DOMAIN(); return 0; } + static int testDomainRestore(virConnectPtr conn, const char *path) @@ -1333,42 +1430,49 @@ static int testDomainRestore(virConnectP if ((fd = open(path, O_RDONLY)) < 0) { testError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR, "cannot read domain image"); + RELEASE_CONNECTION(); return (-1); } if (read(fd, magic, sizeof(magic)) != sizeof(magic)) { testError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR, "incomplete save header"); close(fd); + RELEASE_CONNECTION(); return (-1); } if (memcmp(magic, TEST_SAVE_MAGIC, sizeof(magic))) { testError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR, "mismatched header magic"); close(fd); + RELEASE_CONNECTION(); return (-1); } if (read(fd, (char*)&len, sizeof(len)) != sizeof(len)) { testError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR, "failed to read metadata length"); close(fd); + RELEASE_CONNECTION(); return (-1); } if (len < 1 || len > 8192) { testError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR, "length of metadata out of range"); close(fd); + RELEASE_CONNECTION(); return (-1); } xml = malloc(len+1); if (!xml) { testError(conn, NULL, NULL, VIR_ERR_NO_MEMORY, "xml"); close(fd); + RELEASE_CONNECTION(); return (-1); } if (read(fd, xml, len) != len) { testError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR, "incomplete metdata"); close(fd); + RELEASE_CONNECTION(); return (-1); } xml[len] = '\0'; @@ -1376,6 +1480,7 @@ static int testDomainRestore(virConnectP domid = privconn->nextDomID++; ret = testLoadDomainFromDoc(conn, domid, xml); free(xml); + RELEASE_CONNECTION(); return ret < 0 ? -1 : 0; } @@ -1389,18 +1494,21 @@ static int testDomainCoreDump(virDomainP if ((fd = open(to, O_CREAT|O_TRUNC|O_WRONLY, S_IRUSR|S_IWUSR)) < 0) { testError(domain->conn, domain, NULL, VIR_ERR_INTERNAL_ERROR, "cannot save domain core"); + RELEASE_DOMAIN(); return (-1); } if (write(fd, TEST_SAVE_MAGIC, sizeof(TEST_SAVE_MAGIC)) != sizeof(TEST_SAVE_MAGIC)) { testError(domain->conn, domain, NULL, VIR_ERR_INTERNAL_ERROR, "cannot write header"); close(fd); + RELEASE_DOMAIN(); return (-1); } if (close(fd) < 0) { testError(domain->conn, domain, NULL, VIR_ERR_INTERNAL_ERROR, "cannot save domain data"); close(fd); + RELEASE_DOMAIN(); return (-1); } if (privdom->config) { @@ -1410,6 +1518,7 @@ static int testDomainCoreDump(virDomainP } else { privdom->active = 0; } + RELEASE_DOMAIN(); return 0; } @@ -1418,9 +1527,12 @@ static char *testGetOSType(virDomainPtr } static unsigned long testGetMaxMemory(virDomainPtr domain) { + unsigned long ret; GET_DOMAIN(domain, -1); - return privdom->info.maxMem; + ret = privdom->info.maxMem; + RELEASE_DOMAIN(); + return ret; } static int testSetMaxMemory(virDomainPtr domain, @@ -1430,6 +1542,7 @@ static int testSetMaxMemory(virDomainPtr /* XXX validate not over host memory wrt to other domains */ privdom->info.maxMem = memory; + RELEASE_DOMAIN(); return (0); } @@ -1440,10 +1553,12 @@ static int testSetMemory(virDomainPtr do if (memory > privdom->info.maxMem) { testError(domain->conn, domain, NULL, VIR_ERR_INVALID_ARG, __FUNCTION__); + RELEASE_DOMAIN(); return (-1); } privdom->info.memory = memory; + RELEASE_DOMAIN(); return (0); } @@ -1454,20 +1569,21 @@ static int testSetVcpus(virDomainPtr dom /* We allow more cpus in guest than host */ if (nrCpus > 32) { testError(domain->conn, domain, NULL, VIR_ERR_INVALID_ARG, __FUNCTION__); + RELEASE_DOMAIN(); return (-1); } privdom->info.nrVirtCpu = nrCpus; + RELEASE_DOMAIN(); return (0); } -static char *testDomainDumpXML(virDomainPtr domain, int flags ATTRIBUTE_UNUSED) +static char *testDomainDumpXMLLocked(virDomainPtr domain, testDomPtr privdom, int flags ATTRIBUTE_UNUSED) { virBufferPtr buf; char *xml; unsigned char *uuid; char uuidstr[VIR_UUID_STRING_BUFLEN]; - GET_DOMAIN(domain, NULL); if (!(buf = virBufferNew(4000))) { testError(domain->conn, domain, NULL, VIR_ERR_NO_MEMORY, __FUNCTION__); @@ -1489,8 +1605,17 @@ static char *testDomainDumpXML(virDomain xml = buf->content; free(buf); - return (xml); +} + +static char *testDomainDumpXML(virDomainPtr domain, int flags) +{ + char *xml; + GET_DOMAIN(domain, NULL); + + xml = testDomainDumpXMLLocked(domain, privdom, flags); + RELEASE_DOMAIN(); + return xml; } static int testNumOfDefinedDomains(virConnectPtr conn) { @@ -1503,6 +1628,7 @@ static int testNumOfDefinedDomains(virCo continue; numInactive++; } + RELEASE_CONNECTION(); return (numInactive); } @@ -1518,6 +1644,7 @@ static int testListDefinedDomains(virCon names[n++] = strdup(privconn->domains[i].name); } } + RELEASE_CONNECTION(); return (n); } @@ -1525,12 +1652,14 @@ static virDomainPtr testDomainDefineXML( const char *doc) { int handle; xmlDocPtr xml; + virDomainPtr ret; GET_CONNECTION(conn, NULL); if (!(xml = xmlReadDoc(BAD_CAST doc, "domain.xml", NULL, XML_PARSE_NOENT | XML_PARSE_NONET | XML_PARSE_NOERROR | XML_PARSE_NOWARNING))) { testError(conn, NULL, NULL, VIR_ERR_XML_ERROR, _("domain")); + RELEASE_CONNECTION(); return (NULL); } @@ -1539,10 +1668,14 @@ static virDomainPtr testDomainDefineXML( xmlFreeDoc(xml); - if (handle < 0) + if (handle < 0) { + RELEASE_CONNECTION(); return (NULL); - - return virGetDomain(conn, privconn->domains[handle].name, privconn->domains[handle].uuid); + } + + ret = virGetDomain(conn, privconn->domains[handle].name, privconn->domains[handle].uuid); + RELEASE_CONNECTION(); + return ret; } static int testDomainCreate(virDomainPtr domain) { @@ -1551,12 +1684,14 @@ static int testDomainCreate(virDomainPtr if (privdom->info.state != VIR_DOMAIN_SHUTOFF) { testError(domain->conn, domain, NULL, VIR_ERR_INTERNAL_ERROR, _("Domain is already running")); + RELEASE_DOMAIN(); return (-1); } domain->id = privdom->id = privconn->nextDomID++; privdom->info.state = VIR_DOMAIN_RUNNING; + RELEASE_DOMAIN(); return (0); } @@ -1566,11 +1701,13 @@ static int testDomainUndefine(virDomainP if (privdom->info.state != VIR_DOMAIN_SHUTOFF) { testError(domain->conn, domain, NULL, VIR_ERR_INTERNAL_ERROR, _("Domain is still running")); + RELEASE_DOMAIN(); return (-1); } privdom->active = 0; + RELEASE_DOMAIN(); return (0); } @@ -1579,6 +1716,7 @@ static int testDomainGetAutostart(virDom { GET_DOMAIN(domain, -1); *autostart = privdom->autostart; + RELEASE_DOMAIN(); return (0); } @@ -1588,6 +1726,7 @@ static int testDomainSetAutostart(virDom { GET_DOMAIN(domain, -1); privdom->autostart = autostart ? 1 : 0; + RELEASE_DOMAIN(); return (0); } @@ -1611,11 +1750,13 @@ static int testDomainGetSchedulerParams( GET_DOMAIN(domain, -1); if (*nparams != 1) { testError(domain->conn, domain, NULL, VIR_ERR_INVALID_ARG, "nparams"); + RELEASE_DOMAIN(); return (-1); } strcpy(params[0].field, "weight"); params[0].type = VIR_DOMAIN_SCHED_FIELD_UINT; params[0].value.ui = privdom->weight; + RELEASE_DOMAIN(); return 0; } @@ -1627,17 +1768,21 @@ static int testDomainSetSchedulerParams( GET_DOMAIN(domain, -1); if (nparams != 1) { testError(domain->conn, domain, NULL, VIR_ERR_INVALID_ARG, "nparams"); + RELEASE_DOMAIN(); return (-1); } if (STRNEQ(params[0].field, "weight")) { testError(domain->conn, domain, NULL, VIR_ERR_INVALID_ARG, "field"); + RELEASE_DOMAIN(); return (-1); } if (params[0].type != VIR_DOMAIN_SCHED_FIELD_UINT) { testError(domain->conn, domain, NULL, VIR_ERR_INVALID_ARG, "type"); + RELEASE_DOMAIN(); return (-1); } privdom->weight = params[0].value.ui; + RELEASE_DOMAIN(); return 0; } @@ -1662,6 +1807,7 @@ static virNetworkPtr testLookupNetworkBy const unsigned char *uuid) { int i, idx = -1; + virNetworkPtr ret; GET_CONNECTION(conn, NULL); for (i = 0 ; i < MAX_NETWORKS ; i++) { @@ -1677,13 +1823,16 @@ static virNetworkPtr testLookupNetworkBy return NULL; } - return virGetNetwork(conn, privconn->networks[idx].name, privconn->networks[idx].uuid); + ret = virGetNetwork(conn, privconn->networks[idx].name, privconn->networks[idx].uuid); + RELEASE_CONNECTION(); + return ret; } static virNetworkPtr testLookupNetworkByName(virConnectPtr conn, const char *name) { int i, idx = -1; + virNetworkPtr ret; GET_CONNECTION(conn, NULL); for (i = 0 ; i < MAX_NETWORKS ; i++) { @@ -1696,10 +1845,13 @@ static virNetworkPtr testLookupNetworkBy if (idx < 0) { testError (conn, NULL, NULL, VIR_ERR_NO_NETWORK, NULL); + RELEASE_CONNECTION(); return NULL; } - return virGetNetwork(conn, privconn->networks[idx].name, privconn->networks[idx].uuid); + ret = virGetNetwork(conn, privconn->networks[idx].name, privconn->networks[idx].uuid); + RELEASE_CONNECTION(); + return ret; } @@ -1713,6 +1865,7 @@ static int testNumNetworks(virConnectPtr continue; numInactive++; } + RELEASE_CONNECTION(); return (numInactive); } @@ -1726,6 +1879,7 @@ static int testListNetworks(virConnectPt names[n++] = strdup(privconn->networks[i].name); } } + RELEASE_CONNECTION(); return (n); } @@ -1739,6 +1893,7 @@ static int testNumDefinedNetworks(virCon continue; numInactive++; } + RELEASE_CONNECTION(); return (numInactive); } @@ -1752,6 +1907,7 @@ static int testListDefinedNetworks(virCo names[n++] = strdup(privconn->networks[i].name); } } + RELEASE_CONNECTION(); return (n); } @@ -1762,21 +1918,29 @@ static virNetworkPtr testNetworkCreate(v if (xml == NULL) { testError(conn, NULL, NULL, VIR_ERR_INVALID_ARG, __FUNCTION__); + RELEASE_CONNECTION(); return (NULL); } if (privconn->numNetworks == MAX_NETWORKS) { testError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR, _("too many networks")); + RELEASE_CONNECTION(); return (NULL); } - if ((handle = testLoadNetworkFromDoc(conn, xml)) < 0) + if ((handle = testLoadNetworkFromDoc(conn, xml)) < 0) { + RELEASE_CONNECTION(); return (NULL); + } privconn->networks[handle].config = 0; net = virGetNetwork(conn, privconn->networks[handle].name, privconn->networks[handle].uuid); - if (net == NULL) return NULL; + if (net == NULL) { + RELEASE_CONNECTION(); + return NULL; + } privconn->numNetworks++; + RELEASE_CONNECTION(); return (net); } @@ -1787,21 +1951,29 @@ static virNetworkPtr testNetworkDefine(v if (xml == NULL) { testError(conn, NULL, NULL, VIR_ERR_INVALID_ARG, __FUNCTION__); + RELEASE_CONNECTION(); return (NULL); } if (privconn->numNetworks == MAX_NETWORKS) { testError(conn, NULL, NULL, VIR_ERR_INTERNAL_ERROR, _("too many networks")); + RELEASE_CONNECTION(); return (NULL); } - if ((handle = testLoadNetworkFromDoc(conn, xml)) < 0) + if ((handle = testLoadNetworkFromDoc(conn, xml)) < 0) { + RELEASE_CONNECTION(); return (NULL); + } net = virGetNetwork(conn, privconn->networks[handle].name, privconn->networks[handle].uuid); privconn->networks[handle].config = 1; - if (net == NULL) return NULL; + if (net == NULL) { + RELEASE_CONNECTION(); + return NULL; + } privconn->numNetworks++; + RELEASE_CONNECTION(); return (net); } @@ -1811,11 +1983,13 @@ static int testNetworkUndefine(virNetwor if (privnet->running) { testError(network->conn, NULL, network, VIR_ERR_INTERNAL_ERROR, _("Network is still running")); + RELEASE_NETWORK(); return (-1); } privnet->active = 0; + RELEASE_NETWORK(); return (0); } @@ -1825,11 +1999,13 @@ static int testNetworkStart(virNetworkPt if (privnet->running) { testError(network->conn, NULL, network, VIR_ERR_INTERNAL_ERROR, _("Network is already running")); + RELEASE_NETWORK(); return (-1); } privnet->running = 1; + RELEASE_NETWORK(); return (0); } @@ -1841,6 +2017,7 @@ static int testNetworkDestroy(virNetwork } else { privnet->active = 0; } + RELEASE_NETWORK(); return (0); } @@ -1853,6 +2030,7 @@ static char *testNetworkDumpXML(virNetwo if (!(buf = virBufferNew(4000))) { testError(network->conn, NULL, network, VIR_ERR_NO_MEMORY, __FUNCTION__); + RELEASE_NETWORK(); return (NULL); } @@ -1882,6 +2060,7 @@ static char *testNetworkDumpXML(virNetwo xml = buf->content; free(buf); + RELEASE_NETWORK(); return (xml); } @@ -1891,8 +2070,10 @@ static char *testNetworkGetBridgeName(vi bridge = strdup(privnet->bridge); if (!bridge) { testError(network->conn, NULL, network, VIR_ERR_NO_MEMORY, "network"); + RELEASE_NETWORK(); return NULL; } + RELEASE_NETWORK(); return bridge; } @@ -1900,6 +2081,7 @@ static int testNetworkGetAutostart(virNe int *autostart) { GET_NETWORK(network, -1); *autostart = privnet->autostart; + RELEASE_NETWORK(); return (0); } @@ -1907,6 +2089,7 @@ static int testNetworkSetAutostart(virNe int autostart) { GET_NETWORK(network, -1); privnet->autostart = autostart ? 1 : 0; + RELEASE_NETWORK(); return (0); } -- |=- Red Hat, Engineering, Emerging Technologies, Boston. +1 978 392 2496 -=| |=- Perl modules: http://search.cpan.org/~danberr/ -=| |=- Projects: http://freshmeat.net/~danielpb/ -=| |=- GnuPG: 7D3B9505 F3C9 553F A1DA 4AC2 5648 23C1 B3DF F742 7D3B 9505 -=| -- Libvir-list mailing list Libvir-list@xxxxxxxxxx https://www.redhat.com/mailman/listinfo/libvir-list