summaryrefslogtreecommitdiffstats
path: root/balbir/config.c
diff options
context:
space:
mode:
Diffstat (limited to 'balbir/config.c')
-rw-r--r--balbir/config.c704
1 files changed, 704 insertions, 0 deletions
diff --git a/balbir/config.c b/balbir/config.c
new file mode 100644
index 0000000..bed45ce
--- /dev/null
+++ b/balbir/config.c
@@ -0,0 +1,704 @@
+/*
+ * Copyright IBM Corporation. 2007
+ *
+ * Authors: Balbir Singh <balbir@linux.vnet.ibm.com>
+ * Dhaval Giani <dhaval@linux.vnet.ibm.com>
+ *
+ * This program is free software; you can redistribute it and/or modify it
+ * under the terms of version 2.1 of the GNU Lesser General Public License
+ * as published by the Free Software Foundation.
+ *
+ * This program is distributed in the hope that it would be useful, but
+ * WITHOUT ANY WARRANTY; without even the implied warranty of
+ * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
+ *
+ * TODOs:
+ * 1. Implement our own hashing scheme
+ * 2. Add namespace support
+ * 3. Add support for parsing cgroup filesystem and creating a
+ * config out of it.
+ *
+ * Code initiated and designed by Balbir Singh. All faults are most likely
+ * his mistake.
+ */
+
+#include <assert.h>
+#include <dirent.h>
+#include <errno.h>
+#include <grp.h>
+#include <libcgroup.h>
+#include <limits.h>
+#include <pwd.h>
+#include <search.h>
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <unistd.h>
+
+#include <sys/mount.h>
+#include <sys/stat.h>
+#include <sys/types.h>
+
+extern FILE *yyin;
+extern int yyparse(void);
+extern int yydebug;
+extern int line_no;
+extern int verbose;
+
+struct hsearch_data group_hash;
+struct list_of_names *group_list;
+struct mount_table *mount_table;
+
+const char library_ver[] = "0.01";
+const char cg_filesystem[] = "cgroup";
+
+struct cg_group *current_group;
+
+const char *cg_controller_names[] = {
+ "cpu",
+ NULL,
+};
+
+/*
+ * File traversal routines require the maximum number of open file
+ * descriptors to be specified
+ */
+const int cg_max_openfd = 20;
+
+/*
+ * Insert the group into the list of group names we maintain. This helps
+ * us cleanup nicely
+ */
+int cg_insert_into_group_list(const char *name)
+{
+ struct list_of_names *tmp, *curr;
+
+ tmp = malloc(sizeof(*tmp));
+ if (!tmp)
+ return 0;
+ tmp->next = NULL;
+ tmp->name = (char *)name;
+
+ if (!group_list) {
+ group_list = tmp;
+ return 1;
+ }
+ curr = group_list;
+ while (curr->next)
+ curr = curr->next;
+
+ curr->next = tmp;
+ return 1;
+}
+
+/*
+ * Cleanup the group list. We walk the group list and free the entries in the
+ * hash tables and controller specific entries.
+ */
+int cg_cleanup_group_list(void)
+{
+ struct list_of_names *curr = group_list, *tmp;
+ ENTRY item, *found_item;
+ int ret;
+ struct cg_group *cg_group;
+
+ while (curr) {
+ tmp = curr;
+ curr = curr->next;
+ item.key = tmp->name;
+ ret = hsearch_r(item, FIND, &found_item, &group_hash);
+ if (!ret) {
+ printf("Most likely a bug in the code\n");
+ continue;
+ }
+ /*
+ * Free the name and it's value
+ */
+ free(tmp->name);
+ cg_group = (struct cg_group *)found_item->data;
+ /*
+ * Controller specific cleanup
+ */
+ if (cg_group->cpu_config.shares)
+ free(cg_group->cpu_config.shares);
+
+ free(found_item->data);
+ }
+
+ return 1;
+}
+
+/*
+ * Find and walk the mount_table structures to find the specified controller
+ * name. This routine is *NOT* thread safe.
+ */
+struct mount_table *cg_find_mount_info(const char *controller_name)
+{
+ struct mount_table *curr = mount_table;
+ char *str;
+
+ while (curr) {
+ str = curr->options;
+ if (!str)
+ return NULL;
+
+ str = strtok(curr->options, ",");
+ do {
+ if (!strncmp(str, controller_name, strlen(str)))
+ return curr;
+ str = strtok(NULL, ",");
+ } while(str);
+ curr = curr->next;
+ }
+ return NULL;
+}
+
+int cg_cpu_controller_settings(struct cg_group *cg_group,
+ const char *group_path)
+{
+ int ret = 1;
+ char *shares_file;
+
+ shares_file = malloc(strlen(group_path) + strlen("/cpu.shares") + 1);
+ if (!shares_file)
+ return 0;
+
+ strncpy(shares_file, group_path, strlen(group_path));
+ shares_file = strncat(shares_file, "/cpu.shares",
+ strlen("/cpu.shares"));
+ dbg("shares file is %s\n", shares_file);
+ if (cg_group->cpu_config.shares) {
+ FILE *fd = fopen(shares_file, "rw+");
+ if (!fd)
+ goto cleanup_shares;
+ /*
+ * Assume that one write will do it for us
+ */
+ fwrite(cg_group->cpu_config.shares,
+ strlen(cg_group->cpu_config.shares), 1, fd);
+ fclose(fd);
+ }
+cleanup_shares:
+ free(shares_file);
+ return ret;
+}
+
+int cg_controller_handle_option(struct cg_group *cg_group,
+ const char *cg_controller_name,
+ const char *group_path)
+{
+ int ret = 0;
+ if (!strncmp(cg_controller_name, "cpu", strlen("cpu"))) {
+ ret = cg_cpu_controller_settings(cg_group, group_path);
+ } else
+ assert(0);
+ return ret;
+}
+
+int cg_create_group(struct cg_group *cg_group)
+{
+ int i, ret;
+ struct mount_table *mount_info;
+ char *group_path, *tasks_file, *shares_file;
+
+ dbg("found group %s\n", cg_group->name);
+
+ for (i = 0; cg_controller_names[i]; i++) {
+
+ /*
+ * Find the mount point related information
+ */
+ mount_info = cg_find_mount_info(cg_controller_names[i]);
+ dbg("mount_info for controller %s:%s\n",
+ mount_info->mount_point, cg_controller_names[i]);
+ if (!mount_info)
+ return 0;
+
+ /*
+ * TODO: Namespace support is most likely going to be
+ * plugged in here
+ */
+
+ /*
+ * Find the path to the group directory
+ */
+ group_path = cg_build_group_path(cg_group, mount_info);
+ if (!group_path)
+ goto cleanup_group;
+
+ /*
+ * Create the specified directory. Errors are ignored.
+ * If the directory already exists, we are most likely
+ * OK
+ */
+ ret = cg_make_directory(cg_group, group_path);
+ if (!ret && (errno != EEXIST))
+ goto cleanup_dir;
+
+ /*
+ * Find the tasks file, should probably be encapsulated
+ * like we encapsulate cg_build_group_path
+ */
+ tasks_file = malloc(strlen(group_path) + strlen("/tasks") + 1);
+ if (!tasks_file)
+ goto cleanup_dir;
+ strncpy(tasks_file, group_path, strlen(group_path));
+ tasks_file = strncat(tasks_file, "/tasks", strlen("/tasks"));
+ dbg("tasks file is %s\n", tasks_file);
+
+ /*
+ * Assign task file ownership
+ */
+ ret = chown(tasks_file, cg_group->tasks_uid,
+ cg_group->tasks_gid);
+ if (ret < 0)
+ goto cleanup_perm;
+
+ /*
+ * Controller specific work, errors are not fatal.
+ */
+ cg_controller_handle_option(cg_group, cg_controller_names[i],
+ group_path);
+ free(tasks_file);
+ free(group_path);
+ }
+ return 1;
+cleanup_perm:
+ rmdir(group_path);
+cleanup_dir:
+ free(group_path);
+cleanup_group:
+ return 0;
+}
+
+/*
+ * Go ahead and create the groups in the filesystem. This routine will need
+ * to be revisited everytime new controllers are added.
+ */
+int cg_create_groups(void)
+{
+ struct list_of_names *curr = group_list, *tmp;
+ ENTRY item, *found_item;
+ struct cg_group *cg_group;
+ int ret = 1;
+
+ while (curr) {
+ tmp = curr;
+ curr = curr->next;
+ item.key = tmp->name;
+ ret = hsearch_r(item, FIND, &found_item, &group_hash);
+ if (!ret)
+ return 0;
+ cg_group = (struct cg_group *)found_item->data;
+ ret = cg_create_group(cg_group);
+ if (!ret)
+ break;
+ }
+
+ return ret;
+}
+
+/*
+ * Go ahead and create the groups in the filesystem. This routine will need
+ * to be revisited everytime new controllers are added.
+ */
+int cg_destroy_groups(void)
+{
+ struct list_of_names *curr = group_list, *tmp;
+ ENTRY item, *found_item;
+ struct cg_group *cg_group;
+ int ret;
+ struct mount_table *mount_info;
+ char *group_path;
+
+ while (curr) {
+ tmp = curr;
+ curr = curr->next;
+ item.key = tmp->name;
+ ret = hsearch_r(item, FIND, &found_item, &group_hash);
+ if (!ret)
+ return 0;
+ cg_group = (struct cg_group *)found_item->data;
+ mount_info = cg_find_mount_info("cpu");
+ dbg("mount_info for cpu %s\n", mount_info->mount_point);
+ if (!mount_info)
+ return 0;
+ group_path = malloc(strlen(mount_info->mount_point) +
+ strlen(cg_group->name) + 2);
+ if (!group_path)
+ return 0;
+ strncpy(group_path, mount_info->mount_point,
+ strlen(mount_info->mount_point) + 1);
+ dbg("group_path is %s\n", group_path);
+ strncat(group_path, "/", strlen("/"));
+ strncat(group_path, cg_group->name, strlen(cg_group->name));
+ dbg("group_path is %s\n", group_path);
+ /*
+ * We might strategically add migrate tasks here, so that
+ * rmdir is successful. TODO: Later
+ */
+ ret = rmdir(group_path);
+ if (ret < 0)
+ goto err;
+ }
+
+ return 1;
+err:
+ free(group_path);
+ return 0;
+}
+/*
+ * The cg_get_current_group routine is used by the parser to figure out
+ * the current group that is being built and fill it in with the information
+ * as it parses through the configuration file
+ */
+struct cg_group *cg_get_current_group(void)
+{
+ if (!current_group)
+ current_group = calloc(1, sizeof(*current_group));
+
+ return current_group;
+}
+
+/*
+ * This routine should be invoked when the current group being parsed is
+ * completely parsed
+ */
+void cg_put_current_group(void)
+{
+ /*
+ * NOTE: we do not free the group, the group is installed into the
+ * hash table, the cleanup routine will do the freeing of the group
+ */
+ current_group = NULL;
+}
+
+int cg_insert_group(const char *group_name)
+{
+ struct cg_group *cg_group = cg_get_current_group();
+ ENTRY item, *found_item;
+ int ret;
+
+ if (!cg_group)
+ return 0;
+ /*
+ * Dont' copy the name over, just point to it
+ */
+ cg_group->name = (char *)group_name;
+ item.key = (char *)group_name;
+ item.data = cg_group;
+ dbg("Inserting %s into hash table\n", group_name);
+ ret = hsearch_r(item, ENTER, &found_item, &group_hash);
+ if (!ret) {
+ if (found_item)
+ errno = EEXIST;
+ errno = ENOMEM;
+ goto err;
+ }
+ ret = cg_insert_into_group_list(group_name);
+ if (!ret)
+ goto err;
+ dbg("Inserted %s into hash and list\n", group_name);
+ cg_put_current_group();
+ return 1;
+err:
+ cg_cleanup_group_list();
+ return 0;
+}
+
+/*
+ * Because of the way parsing works (bottom-up, shift-reduce), we don't
+ * know the name of the controller yet. Compilers build an AST and use
+ * a symbol table to deal with this problem. This code does simple things
+ * like concatinating strings and passing them upwards. This routine is
+ * *NOT* thread safe.
+ *
+ * This code will need modification everytime new controller support is
+ * added.
+ */
+int cg_parse_controller_options(char *controller, char *name_value)
+{
+ struct cg_group *cg_group = cg_get_current_group();
+ char *name, *value;
+
+ if (!cg_group)
+ return 0;
+
+ if (!strncmp(controller, "cpu", strlen("cpu"))) {
+ name = strtok(name_value, " ");
+ value = strtok(NULL, " ");
+ if (!strncmp(name, "cpu.shares", strlen("cpu.shares")))
+ cg_group->cpu_config.shares = strdup(value);
+ else {
+ free(controller);
+ free(name_value);
+ return 0;
+ }
+ dbg("cpu name %s value %s\n", name, value);
+ } else {
+ return 0;
+ }
+ free(controller);
+ free(name_value);
+ return 1;
+}
+
+/*
+ * Convert the uid/gid field and supplied value to appropriate task
+ * permissions. This routine is *NOT* thread safe.
+ */
+int cg_group_task_perm(char *perm_type, char *value)
+{
+ struct cg_group *cg_group = cg_get_current_group();
+ struct passwd *pw;
+ struct group *group;
+ long val = atoi(value);
+ if (!strncmp(perm_type, "uid", strlen("uid"))) {
+ if (!val) { /* We got the identifier as a name */
+ pw = getpwnam(value);
+ if (!pw) {
+ free(perm_type);
+ free(value);
+ return 0;
+ } else {
+ cg_group->tasks_uid = pw->pw_uid;
+ }
+ } else {
+ cg_group->tasks_uid = val;
+ }
+ dbg("TASKS %s: %d\n", perm_type, cg_group->tasks_uid);
+ }
+ if (!strncmp(perm_type, "gid", strlen("gid"))) {
+ if (!val) { /* We got the identifier as a name */
+ group = getgrnam(value);
+ if (!group) {
+ free(perm_type);
+ free(value);
+ return 0;
+ } else {
+ cg_group->tasks_gid = group->gr_gid;
+ }
+ } else {
+ cg_group->tasks_gid = val;
+ }
+ dbg("TASKS %s: %d\n", perm_type, cg_group->tasks_gid);
+ }
+ free(perm_type);
+ free(value);
+ return 1;
+}
+
+int cg_group_admin_perm(char *perm_type, char *value)
+{
+ struct cg_group *cg_group = cg_get_current_group();
+ struct passwd *pw;
+ struct group *group;
+ long val = atoi(value);
+ if (!strncmp(perm_type, "uid", strlen("uid"))) {
+ if (!val) { /* We got the identifier as a name */
+ pw = getpwnam(value);
+ if (!pw) {
+ free(perm_type);
+ free(value);
+ return 0;
+ } else {
+ cg_group->admin_uid = pw->pw_uid;
+ }
+ } else {
+ cg_group->admin_uid = val;
+ }
+ dbg("ADMIN %s: %d\n", perm_type, cg_group->admin_uid);
+ }
+ if (!strncmp(perm_type, "gid", strlen("gid"))) {
+ if (!val) { /* We got the identifier as a name */
+ group = getgrnam(value);
+ if (!group) {
+ free(perm_type);
+ free(value);
+ return 0;
+ } else {
+ cg_group->admin_gid = group->gr_gid;
+ }
+ } else {
+ cg_group->admin_gid = val;
+ }
+ dbg("ADMIN %s: %d\n", perm_type,
+ cg_group->admin_gid);
+ }
+ free(perm_type);
+ free(value);
+ return 1;
+}
+
+/*
+ * We maintain a hash table. The group hash table maintains the parameters for
+ * each group, including the parameters for each controller
+ *
+ * TODO: Make the initialization a run time configuration parameter
+ */
+int cg_init_group_and_mount_info(void)
+{
+ int ret;
+
+ group_list = NULL;
+ mount_table = NULL;
+ current_group = NULL;
+
+ ret = hcreate_r(MAX_GROUP_ELEMENTS, &group_hash);
+ if (!ret)
+ return 0;
+ return 1;
+}
+
+/*
+ * This routine should be called only once all elements of the hash table have
+ * been freed. Otherwise, we'll end up with a memory leak.
+ */
+void cg_destroy_group_and_mount_info(void)
+{
+ hdestroy_r(&group_hash);
+ group_list = NULL;
+ mount_table = NULL;
+ current_group = NULL;
+}
+
+/*
+ * Insert a name, mount_point pair into the mount_table data structure
+ * TODO: Validate names and mount points
+ */
+int cg_insert_into_mount_table(const char *name, const char *mount_point)
+{
+ struct mount_table *tmp, *prev = mount_table;
+
+ while (prev && prev->next != NULL &&
+ (strncmp(mount_point, prev->mount_point, strlen(mount_point))))
+ prev = prev->next;
+
+ if (prev &&
+ !(strncmp(mount_point, prev->mount_point, strlen(mount_point)))) {
+ prev->options = realloc(prev->options, strlen(prev->options)
+ + strlen(name) + 2);
+ if (!prev->options)
+ return 0;
+ strncat(prev->options, ",", strlen(","));
+ strncat(prev->options, name, strlen(name));
+ dbg("options %s: mount_point %s\n", prev->options,
+ prev->mount_point);
+ return 1;
+ }
+
+ tmp = malloc(sizeof(*tmp));
+ if (!tmp)
+ return 0;
+
+ tmp->next = NULL;
+ tmp->mount_point = (char *)mount_point;
+ tmp->options = (char *)name;
+ dbg("options %s: mount_point %s\n", tmp->options, tmp->mount_point);
+
+ if (!prev) {
+ mount_table = tmp;
+ return 1;
+ } else {
+ prev->next = tmp;
+ }
+
+ return 1;
+}
+
+void cg_cleanup_mount_table(void)
+{
+ struct mount_table *curr = mount_table, *tmp;
+
+ while (curr) {
+ tmp = curr;
+ curr = curr->next;
+ tmp->next = NULL;
+
+ /*
+ * Some of this data might have been allocated by the lexer
+ * while parsing tokens
+ */
+ free(tmp->mount_point);
+ free(tmp->options);
+
+ free(tmp);
+ }
+}
+
+int cg_load_config(const char *pathname)
+{
+ yyin = fopen(pathname, "rw");
+ if (!yyin) {
+ dbg("Failed to open file %s\n", pathname);
+ return 0;
+ }
+
+ if (!cg_init_group_and_mount_info())
+ return 0;
+
+ if (yyparse() != 0) {
+ dbg("Failed to parse file %s\n", pathname);
+ return 0;
+ }
+
+ if (!cg_mount_controllers())
+ goto err_mnt;
+ if (!cg_create_groups())
+ goto err_grp;
+
+ fclose(yyin);
+ return 1;
+err_grp:
+ cg_destroy_groups();
+ cg_cleanup_group_list();
+err_mnt:
+ cg_unmount_controllers();
+ cg_cleanup_mount_table();
+ fclose(yyin);
+ return 0;
+}
+
+void cg_unload_current_config(void)
+{
+ cg_destroy_groups();
+ cg_cleanup_group_list();
+ cg_unmount_controllers();
+ cg_cleanup_mount_table();
+ cg_destroy_group_and_mount_info();
+}
+
+int main(int argc, char *argv[])
+{
+ int c;
+ char filename[PATH_MAX];
+ int ret;
+
+ if (argc < 2) {
+ fprintf(stderr, "usage is %s <option> <config file>\n",
+ argv[0]);
+ exit(2);
+ }
+
+ while ((c = getopt(argc, argv, "l:ur:")) > 0) {
+ switch (c) {
+ case 'u':
+ cg_unload_current_config();
+ break;
+ case 'r':
+ cg_unload_current_config();
+ /* FALLTHROUGH */
+ case 'l':
+ strncpy(filename, optarg, PATH_MAX);
+ ret = cg_load_config(filename);
+ if (!ret)
+ exit(3);
+ break;
+ default:
+ fprintf(stderr, "Invalid command line option\n");
+ break;
+ }
+ }
+
+ cg_destroy_group_and_mount_info();
+}