
On Thu, Apr 23, 2009 at 06:44:13PM -0300, Eduardo Otubo wrote:
I very am glad with all the feedback I got. The following attachtment is the result of the work using all the suggestions the list made. I also have a few comments over this new RFC. Here is a little Changelog:
[...]
--- a/include/libvirt/virterror.h +++ b/include/libvirt/virterror.h @@ -61,6 +61,7 @@ typedef enum { VIR_FROM_UML, /* Error at the UML driver */ VIR_FROM_NODEDEV, /* Error from node device monitor */ VIR_FROM_XEN_INOTIFY, /* Error from xen inotify layer */ + VIR_FROM_PHYP, /* Error from IBM power hypervisor */ VIR_FROM_SECURITY, /* Error from security framework */ VIR_FROM_VBOX, /* Error from VirtualBox driver */ } virErrorDomain;
that you can't do, you must add at the end of the enum to preserve the values for previous items in the enum. [...]
+PHYP_DRIVER_SOURCES = \ + phyp_driver.c phyp_driver.h +
Hum, maybe we should do like for vbox driver, use a subdir to limit the amount of files in the src/ directory, so I suggest using phyp/phyp_driver.c and phyp/phyp_driver.h I guess copying what was done for vbox/ files would be fine.
diff --git a/src/libvirt.c b/src/libvirt.c index 95a861e..617d957 100644 --- a/src/libvirt.c +++ b/src/libvirt.c @@ -55,6 +55,9 @@ #ifdef WITH_OPENVZ #include "openvz_driver.h" #endif +#ifdef WITH_PHYP +#include "phyp_driver.h" +#endif
phyp/phyp_driver.h
#ifdef WITH_VBOX #include "vbox/vbox_driver.h" #endif [...] +#if WITH_PHYP + if (STRCASEEQ(type, "Phyp"))
we should probably use lower case there but it's equivalent.
--- /dev/null +++ b/src/phyp_driver.c @@ -0,0 +1,496 @@ + +/* + * Copyright IBM Corp. 2009 + * + * phyp_driver.c: ssh layer to access Power Hypervisors + * + * Authors: + * Eduardo Otubo <otubo at linux.vnet.ibm.com> + * + * This library is free software; you can redistribute it and/or + * modify it under the terms of the GNU Lesser General Public + * License as published by the Free Software Foundation; either + * version 2.1 of the License, or (at your option) any later version. + * + * This library is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + * Lesser General Public License for more details. + * + * You should have received a copy of the GNU Lesser General Public + * License along with this library; if not, write to the Free Software + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA + */
okay [...]
+/* this functions is the layer that manipulates the ssh channel itself + * and executes the commands on the remote machine */ +static char * +__inner_exec_command(SSH_SESSION * session, char *cmd, int *exit_status) +{ + CHANNEL *channel = channel_new(session); + BUFFER *readbuf = buffer_new(); + virBuffer tex_ret = VIR_BUFFER_INITIALIZER; + + int ret = 0; + + if (channel_open_session(channel) == SSH_ERROR) + (*exit_status) = SSH_CHANNEL_OPEN_ERR; + + if (channel_request_exec(channel, cmd) == SSH_ERROR) + (*exit_status) = SSH_CHANNEL_EXEC_ERR; + + if (channel_send_eof(channel) == SSH_ERROR) + (*exit_status) = SSH_CHANNEL_SEND_EOF_ERR;
That looks a bit weird, I think in those 3 cases I would goto an error: label directly and return the error value.
+ while (channel && channel_is_open(channel)) { + ret = channel_read(channel, readbuf, 0, 0); + if (ret < 0) { + (*exit_status) = SSH_CHANNEL_READ_ERR; + break; + } + + if (ret == 0) { + channel_send_eof(channel); + while(channel_get_exit_status(channel) == -1){ + channel_poll(channel,0); + usleep(50); + }
It's always a bit nasty to sleep like that. Is there really now way to use something like poll or select instead ? In average you're gonna be waken up multiple time while waiting for your answer while the kernel could instead wake you up exactly when you have the data.
+ if (channel_close(channel) == SSH_ERROR) + (*exit_status) = SSH_CHANNEL_CLOSE_ERR; + + (*exit_status) = channel_get_exit_status(channel); + + channel_free(channel); + channel = NULL; + break; + } + + buffer_add_u8(readbuf, 0); + virBufferStrcat(&tex_ret, buffer_get(readbuf)); + } [...]
+ +/* return the lpar_id given a name and a managed system name */ +static int +phypGetLparID(SSH_SESSION * ssh_session, const char *managed_system, + const char *name) +{ + int exit_status = 0; + virBuffer cmd = VIR_BUFFER_INITIALIZER; + + virBufferVSprintf(&cmd, + "lssyscfg -r lpar -m %s --filter lpar_names=%s -F lpar_id", + managed_system, name); + const char *tex_ret = + __inner_exec_command(ssh_session, virBufferContentAndReset(&cmd), + &exit_status); + + virBufferContentAndReset(&cmd);
Huh ? you're supposed to get the resulting char *, and then free it later once you're done with the data. Here youre just leaking memory I'm afraid same thing for most of the commands in that file.
+static int +phypNumDomains(virConnectPtr conn) +{ + int exit_status = 0; + char managed_system[strlen(conn->uri->path) - 1]; + SSH_SESSION *ssh_session = conn->privateData; + virBuffer cmd = VIR_BUFFER_INITIALIZER; + + stripPath((char *) &managed_system, conn->uri->path); + virBufferVSprintf(&cmd, + "lssyscfg -r lpar -m %s -F lpar_id|grep -c ^[0-9]*", + managed_system); + const char *ndom = + __inner_exec_command(ssh_session, virBufferContentAndReset(&cmd), + &exit_status);
This can't be a const char *really or you're using a temporary buffer I'm afraid you're loosing memory here
+ virBufferContentAndReset(&cmd); + if(exit_status < 0 || ndom == NULL) + return 0;
and if you free that memeory you would just use a freed string here,
+ return atoi(ndom); +}
I guess you really need to clean up how you build those routines, make clear error path and do more anylysis of the allocations. I would also suggest to use the virStrToLong_i routine instead of calling atoi() directly. [...]
diff --git a/src/phyp_driver.h b/src/phyp_driver.h new file mode 100644 index 0000000..c2d9c9b --- /dev/null +++ b/src/phyp_driver.h @@ -0,0 +1,21 @@ +#include <config.h> +#include <libssh/libssh.h> + +#define MAXSIZE 65536 +#define LPAR_EXEC_ERR -1 +#define SSH_CONN_ERR -2 +#define SSH_AUTH_PUBKEY_ERR -3 +#define SSH_AUTH_ERR -4 +#define SSH_CHANNEL_OPEN_ERR -5 +#define SSH_CHANNEL_EXEC_ERR -6 +#define SSH_CHANNEL_SEND_EOF_ERR -7 +#define SSH_CHANNEL_CLOSE_ERR -8 +#define SSH_CHANNEL_READ_ERR -9 +#define PHYP_NO_MEM -10
I would at least comment those constants. Daniel -- Daniel Veillard | libxml Gnome XML XSLT toolkit http://xmlsoft.org/ daniel@veillard.com | Rpmfind RPM search engine http://rpmfind.net/ http://veillard.com/ | virtualization library http://libvirt.org/