[libvirt] [RFC] Power Hypervisor Libvirt support
Daniel Veillard
veillard at redhat.com
Wed Apr 29 15:22:48 UTC 2009
On Thu, Apr 23, 2009 at 06:44:13PM -0300, Eduardo Otubo wrote:
> I very am glad with all the feedback I got. The following attachtment is
> the result of the work using all the suggestions the list made. I also
> have a few comments over this new RFC. Here is a little Changelog:
>
[...]
> --- a/include/libvirt/virterror.h
> +++ b/include/libvirt/virterror.h
> @@ -61,6 +61,7 @@ typedef enum {
> VIR_FROM_UML, /* Error at the UML driver */
> VIR_FROM_NODEDEV, /* Error from node device monitor */
> VIR_FROM_XEN_INOTIFY, /* Error from xen inotify layer */
> + VIR_FROM_PHYP, /* Error from IBM power hypervisor */
> VIR_FROM_SECURITY, /* Error from security framework */
> VIR_FROM_VBOX, /* Error from VirtualBox driver */
> } virErrorDomain;
that you can't do, you must add at the end of the enum to preserve the
values for previous items in the enum.
[...]
> +PHYP_DRIVER_SOURCES = \
> + phyp_driver.c phyp_driver.h
> +
Hum, maybe we should do like for vbox driver, use a subdir to
limit the amount of files in the src/ directory, so I suggest using
phyp/phyp_driver.c and phyp/phyp_driver.h
I guess copying what was done for vbox/ files would be fine.
> diff --git a/src/libvirt.c b/src/libvirt.c
> index 95a861e..617d957 100644
> --- a/src/libvirt.c
> +++ b/src/libvirt.c
> @@ -55,6 +55,9 @@
> #ifdef WITH_OPENVZ
> #include "openvz_driver.h"
> #endif
> +#ifdef WITH_PHYP
> +#include "phyp_driver.h"
> +#endif
phyp/phyp_driver.h
> #ifdef WITH_VBOX
> #include "vbox/vbox_driver.h"
> #endif
[...]
> +#if WITH_PHYP
> + if (STRCASEEQ(type, "Phyp"))
we should probably use lower case there but it's equivalent.
> --- /dev/null
> +++ b/src/phyp_driver.c
> @@ -0,0 +1,496 @@
> +
> +/*
> + * Copyright IBM Corp. 2009
> + *
> + * phyp_driver.c: ssh layer to access Power Hypervisors
> + *
> + * Authors:
> + * Eduardo Otubo <otubo at linux.vnet.ibm.com>
> + *
> + * This library is free software; you can redistribute it and/or
> + * modify it under the terms of the GNU Lesser General Public
> + * License as published by the Free Software Foundation; either
> + * version 2.1 of the License, or (at your option) any later version.
> + *
> + * This library is distributed in the hope that it will be useful,
> + * but WITHOUT ANY WARRANTY; without even the implied warranty of
> + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
> + * Lesser General Public License for more details.
> + *
> + * You should have received a copy of the GNU Lesser General Public
> + * License along with this library; if not, write to the Free Software
> + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
> + */
okay
[...]
> +/* this functions is the layer that manipulates the ssh channel itself
> + * and executes the commands on the remote machine */
> +static char *
> +__inner_exec_command(SSH_SESSION * session, char *cmd, int *exit_status)
> +{
> + CHANNEL *channel = channel_new(session);
> + BUFFER *readbuf = buffer_new();
> + virBuffer tex_ret = VIR_BUFFER_INITIALIZER;
> +
> + int ret = 0;
> +
> + if (channel_open_session(channel) == SSH_ERROR)
> + (*exit_status) = SSH_CHANNEL_OPEN_ERR;
> +
> + if (channel_request_exec(channel, cmd) == SSH_ERROR)
> + (*exit_status) = SSH_CHANNEL_EXEC_ERR;
> +
> + if (channel_send_eof(channel) == SSH_ERROR)
> + (*exit_status) = SSH_CHANNEL_SEND_EOF_ERR;
That looks a bit weird, I think in those 3 cases I would goto an
error: label directly and return the error value.
> + while (channel && channel_is_open(channel)) {
> + ret = channel_read(channel, readbuf, 0, 0);
> + if (ret < 0) {
> + (*exit_status) = SSH_CHANNEL_READ_ERR;
> + break;
> + }
> +
> + if (ret == 0) {
> + channel_send_eof(channel);
> + while(channel_get_exit_status(channel) == -1){
> + channel_poll(channel,0);
> + usleep(50);
> + }
It's always a bit nasty to sleep like that. Is there really now way
to use something like poll or select instead ? In average you're gonna
be waken up multiple time while waiting for your answer while the kernel
could instead wake you up exactly when you have the data.
> + if (channel_close(channel) == SSH_ERROR)
> + (*exit_status) = SSH_CHANNEL_CLOSE_ERR;
> +
> + (*exit_status) = channel_get_exit_status(channel);
> +
> + channel_free(channel);
> + channel = NULL;
> + break;
> + }
> +
> + buffer_add_u8(readbuf, 0);
> + virBufferStrcat(&tex_ret, buffer_get(readbuf));
> + }
[...]
> +
> +/* return the lpar_id given a name and a managed system name */
> +static int
> +phypGetLparID(SSH_SESSION * ssh_session, const char *managed_system,
> + const char *name)
> +{
> + int exit_status = 0;
> + virBuffer cmd = VIR_BUFFER_INITIALIZER;
> +
> + virBufferVSprintf(&cmd,
> + "lssyscfg -r lpar -m %s --filter lpar_names=%s -F lpar_id",
> + managed_system, name);
> + const char *tex_ret =
> + __inner_exec_command(ssh_session, virBufferContentAndReset(&cmd),
> + &exit_status);
> +
> + virBufferContentAndReset(&cmd);
Huh ? you're supposed to get the resulting char *, and then free it
later once you're done with the data. Here youre just leaking memory
I'm afraid
same thing for most of the commands in that file.
> +static int
> +phypNumDomains(virConnectPtr conn)
> +{
> + int exit_status = 0;
> + char managed_system[strlen(conn->uri->path) - 1];
> + SSH_SESSION *ssh_session = conn->privateData;
> + virBuffer cmd = VIR_BUFFER_INITIALIZER;
> +
> + stripPath((char *) &managed_system, conn->uri->path);
> + virBufferVSprintf(&cmd,
> + "lssyscfg -r lpar -m %s -F lpar_id|grep -c ^[0-9]*",
> + managed_system);
> + const char *ndom =
> + __inner_exec_command(ssh_session, virBufferContentAndReset(&cmd),
> + &exit_status);
This can't be a const char *really or you're using a temporary buffer
I'm afraid you're loosing memory here
> + virBufferContentAndReset(&cmd);
> + if(exit_status < 0 || ndom == NULL)
> + return 0;
and if you free that memeory you would just use a freed string here,
> + return atoi(ndom);
> +}
I guess you really need to clean up how you build those routines,
make clear error path and do more anylysis of the allocations. I would
also suggest to use the virStrToLong_i routine instead of calling atoi()
directly.
[...]
> diff --git a/src/phyp_driver.h b/src/phyp_driver.h
> new file mode 100644
> index 0000000..c2d9c9b
> --- /dev/null
> +++ b/src/phyp_driver.h
> @@ -0,0 +1,21 @@
> +#include <config.h>
> +#include <libssh/libssh.h>
> +
> +#define MAXSIZE 65536
> +#define LPAR_EXEC_ERR -1
> +#define SSH_CONN_ERR -2
> +#define SSH_AUTH_PUBKEY_ERR -3
> +#define SSH_AUTH_ERR -4
> +#define SSH_CHANNEL_OPEN_ERR -5
> +#define SSH_CHANNEL_EXEC_ERR -6
> +#define SSH_CHANNEL_SEND_EOF_ERR -7
> +#define SSH_CHANNEL_CLOSE_ERR -8
> +#define SSH_CHANNEL_READ_ERR -9
> +#define PHYP_NO_MEM -10
I would at least comment those constants.
Daniel
--
Daniel Veillard | libxml Gnome XML XSLT toolkit http://xmlsoft.org/
daniel at veillard.com | Rpmfind RPM search engine http://rpmfind.net/
http://veillard.com/ | virtualization library http://libvirt.org/
More information about the libvir-list
mailing list