[libvirt] [PATCH v2] rpc: make daemon spawning a bit more intelligent

Martin Kletzander mkletzan at redhat.com
Wed Sep 17 14:00:54 UTC 2014


On Tue, Sep 16, 2014 at 10:22:53AM -0400, John Ferlan wrote:
>
>
>On 09/16/2014 05:16 AM, Martin Kletzander wrote:
>> This way it behaves more like the daemon itself does (acquiring a
>> pidfile, deleting the socket before binding, etc.).
>>
>> Resolves: https://bugzilla.redhat.com/show_bug.cgi?id=927369
>> Resolves: https://bugzilla.redhat.com/show_bug.cgi?id=1138604
>>
>> Signed-off-by: Martin Kletzander <mkletzan at redhat.com>
>> ---
>>  src/rpc/virnetsocket.c | 65 +++++++++++++++++++++++++++++++++++++++++++-------
>>  1 file changed, 57 insertions(+), 8 deletions(-)
>>
>
>The error path/retry logic needs a tweak... I added some inline thinking
>since we don't have a virtual whiteboard to share on this!
>

Yes, it does.  I didn't think it through from scratch, just adjusted
to your comments.  This time I went through it few times.  Just let me
confirm I understood what you meant everywhere.

>> diff --git a/src/rpc/virnetsocket.c b/src/rpc/virnetsocket.c
>> index 80aeddf..7be1492 100644
>> --- a/src/rpc/virnetsocket.c
>> +++ b/src/rpc/virnetsocket.c
>> @@ -51,9 +51,11 @@
>>  #include "virlog.h"
>>  #include "virfile.h"
>>  #include "virthread.h"
>> +#include "virpidfile.h"
>>  #include "virprobe.h"
>>  #include "virprocess.h"
>>  #include "virstring.h"
>> +#include "dirname.h"
>>  #include "passfd.h"
>>
>>  #if WITH_SSH2
>> @@ -541,7 +543,10 @@ int virNetSocketNewConnectUNIX(const char *path,
>>                                 const char *binary,
>>                                 virNetSocketPtr *retsock)
>>  {
>> +    char *binname = NULL;
>> +    char *pidpath = NULL;
>>      int fd, passfd = -1;
>> +    int pidfd = -1;
>>      virSocketAddr localAddr;
>>      virSocketAddr remoteAddr;
>>
>> @@ -580,16 +585,47 @@ int virNetSocketNewConnectUNIX(const char *path,
>>              goto error;
>>          }
>>
>> +        if (!(binname = last_component(binary)) || binname[0] == '\0') {
>> +            virReportError(VIR_ERR_INTERNAL_ERROR,
>> +                           _("Cannot determine basename for binary '%s'"),
>> +                           binary);
>> +            goto error;
>> +        }
>> +
>> +        if (virPidFileConstructPath(false, NULL, binname, &pidpath) < 0)
>> +            goto error;
>
>Since the first param is false, we are guaranteed only that 'pidpath' is
>the path to the virGetUserRuntimeDirectory() for "$binname.pid".
>
>We are not sure if we created the path in virFileMakePathHelper() or
>not. If we later then delete the file on the error path how does that
>affect the daemon that wins the race?  See the conundrum?
>

This is only about deleting the pidfile, right?  Deleting it only when
it is acquired (pidfd >= 0) should fix this.

I'll try describing it here a little bit more:

virNetSocketNewConnectUNIX() is called with (spawnDaemon == true) only
if (privileged == false).  virPidFileConstructPath() is called also
only when (spawnDaemon == true) and guarantees that the path for the
pidfile exists and is constructed the same way it is in daemon.  The
path should not be deleted no matter whether we fail or not, those
directories should be kept there for later.

>> +
>> +        pidfd = virPidFileAcquirePath(pidpath, false, getpid());
>> +        VIR_FREE(pidpath);
>
>Because you VIR_FREE() here, there is no way for the error: path to have
>a non NULL pidpath... and delete the pidpath.
>

Using VIR_FREE(pidpath); in both error path and before return 0 (my
initial idea) should take care of this.

>> +        if (pidfd < 0) {
>
>Getting here means we were unable to get the pidfile lock and I don't
>think we want to delete the pidpath... Since it's probably owned by some
>other daemon
>

if (pidfd < 0) then it means it will not get deleted.  By the way it
doesn't have to be deleted, closing should be enough to unlock the
file.

>> +            /*
>> +             * This can happen in a very rare case of two clients spawning two
>> +             * daemons at the same time, and the error in the logs that gets
>> +             * reset here can be a clue to some future debugging.
>> +             */
>> +            virResetLastError();
>> +            spawnDaemon = false;
>> +            goto retry;
>> +        }
>
>If we get here, we've written our pid into the pidfile and we have have
>the lock... So that means we should own the file. Errors from here
>should delete the file.
>

Right, there's nothing wrong.

>> +
>>          if ((passfd = socket(PF_UNIX, SOCK_STREAM, 0)) < 0) {
>>              virReportSystemError(errno, "%s", _("Failed to create socket"));
>>              goto error;
>>          }
>>
>>          /*
>> -         * We have to fork() here, because umask() is set
>> -         * per-process, chmod() is racy and fchmod() has undefined
>> -         * behaviour on sockets according to POSIX, so it doesn't
>> -         * work outside Linux.
>> +         * We already even acquired the pidfile, so no one else should be using
>> +         * @path right now.  So we're OK to unlink it and paying attention to
>> +         * the return value makes no real sense here.  Only if it's not an
>> +         * abstract socket, of course.
>> +         */
>> +        if (path[0] != '@')
>> +            unlink(path);
>> +
>> +        /*
>> +         * We have to fork() here, because umask() is set per-process, chmod()
>> +         * is racy and fchmod() has undefined behaviour on sockets according to
>> +         * POSIX, so it doesn't work outside Linux.
>>           */
>>          if ((pid = virFork()) < 0)
>>              goto error;
>> @@ -607,12 +643,15 @@ int virNetSocketNewConnectUNIX(const char *path,
>>
>>          if (status != EXIT_SUCCESS) {
>>              /*
>> -             * OK, so the subprocces failed to bind() the socket.  This may mean
>> -             * that another daemon was starting at the same time and succeeded
>> -             * with its bind().  So we'll try connecting again, but this time
>> -             * without spawning the daemon.
>> +             * OK, so the child failed to bind() the socket.  This may mean that
>> +             * another daemon was starting at the same time and succeeded with
>> +             * its bind() (even though it should not happen because we using a
>> +             * pidfile for the race).  So we'll try connecting again, but this
>> +             * time without spawning the daemon.
>>               */
>>              spawnDaemon = false;
>> +            VIR_FORCE_CLOSE(pidfd);
>
>And this is where it gets tricky for me with respect to whether we
>should delete the file.  We're supposed to have the lock on it and it
>should have our pid in it. So theory says we should delete & close the
>file, probably not a terrible thing to do.
>

Yes, we should do that, we acquired the pidfile and we're not going to
spawn a daemon.

>Once we close, we give up the lock allowing another racer to grab and
>place their pid there (and re-create if necessary since the acquire code
>has logic to handle a file being deleted during a race.
>
>If the subsequent connect fails, we have pidfd == -1 and thus the delete
>won't occur in the error: path (since we no longer own the file).
>

Deleting the file here and setting the pidfd to -1 should take care of
that.

>If the subsequent connect passes, I assume that's like if the first one
>succeeded and we wouldn't be managing the pidfile anyway.
>

Although since we are the only ones that should be able to bind the
socket we can safely go the error path here.  I just left the goto
retry here in case some magic happens and some functional daemon is
started in the meantime.  That is highly unlikely since two things
would have to happen between here (closing pidfd and deleting the
pidpath) and the connect() in order for the connect to be
successful.  Daemon would have to be started, acquired his pidfile,
the problem why we couldn't bind() would have to go away and the
daemon would have to also call bind() and listen() on the socket.  All
of that before the second connect(), so "goto error;" probably makes
more sense here.  There's nothing to save.

>> +            VIR_FORCE_CLOSE(passfd);
>>              goto retry;
>>          }
>>
>> @@ -629,6 +668,12 @@ int virNetSocketNewConnectUNIX(const char *path,
>>              goto error;
>>          }
>>
>> +        /*
>> +         * Do we need to eliminate the super-rare race here any more?  It would
>> +         * need incorporating the following VIR_FORCE_CLOSE() into a
>> +         * virCommandHook inside a virNetSocketForkDaemon().
>> +         */
>> +        VIR_FORCE_CLOSE(pidfd);
>>          if (virNetSocketForkDaemon(binary, passfd) < 0)
>>              goto error;
>>      }
>> @@ -645,8 +690,12 @@ int virNetSocketNewConnectUNIX(const char *path,
>
>Making no other changes - when we get here we've either "A" closed the
>pidfd and have done the ForkDaemon or "B" the connect() succeeded on
>either the first or one of the retry paths (which we're not sure).
>
>If we do the VIR_FREE(pidpath) here instead of right after AcquirePath,
>then we don't leak the memory in the event we went through the connect
>failure path at least once and we still allow the error path below to
>delete the pidpath if it owned it.
>

The file should be deleted before trying to connect for the second
time (makes more sense to me), but as I have written above, everything
that fails after we've acquired the pidpath could have just goto error;

>>      return 0;
>>
>>   error:
>> +    if (pidfd > 0)
>> +        virPidFileDeletePath(pidpath);
>
>Probably should be "if (pidfd != -1)" or ">= 0" - the corollary to "if
>(pidfd < 0)"...
>
>For the current code - pidpath == NULL, so this is a noop... Moving the
>VIR_FREE(pidpath) to "later" before the return 0 allows us to delete the
>pidpath which we're supposed to own on various goto error paths.
>

Yes, VIR_FREE(pidpath) shouldn't be done before deleting the pidfile.

>
>
>I think with moving the VIR_FREE(pidpath) to just above the return 0
>will be fine. I've convinced myself we want to delete the pidpath in the
>second of the retry loops, but I'm OK if it's not deleted there as well
>- especially since it's not 100% clear why we're in the failure path.
>And third the "pidfd != -1" should be the condition to call the delete
>in the error path.  I'm OK with not seeing a v3...
>

Wow, I just reached this part of the mail when I wrote it already :)

My current diff to the previous version looks like this:

diff --git i/src/rpc/virnetsocket.c w/src/rpc/virnetsocket.c
index 7be1492..e0efb14 100644
--- i/src/rpc/virnetsocket.c
+++ w/src/rpc/virnetsocket.c
@@ -596,7 +596,6 @@ int virNetSocketNewConnectUNIX(const char *path,
             goto error;

         pidfd = virPidFileAcquirePath(pidpath, false, getpid());
-        VIR_FREE(pidpath);
         if (pidfd < 0) {
             /*
              * This can happen in a very rare case of two clients
              spawning two
@@ -650,6 +649,7 @@ int virNetSocketNewConnectUNIX(const char *path,
              * time without spawning the daemon.
              */
             spawnDaemon = false;
+            virPidFileDeletePath(pidpath);
             VIR_FORCE_CLOSE(pidfd);
             VIR_FORCE_CLOSE(passfd);
             goto retry;
@@ -674,6 +674,7 @@ int virNetSocketNewConnectUNIX(const char *path,
          * virCommandHook inside a virNetSocketForkDaemon().
          */
         VIR_FORCE_CLOSE(pidfd);
+        pidfd = -1;
         if (virNetSocketForkDaemon(binary, passfd) < 0)
             goto error;
     }
@@ -687,10 +688,12 @@ int virNetSocketNewConnectUNIX(const char *path,
     if (!(*retsock = virNetSocketNew(&localAddr, &remoteAddr, true,
     fd, -1, 0)))
         goto error;

+    VIR_FREE(pidpath);
+
     return 0;

  error:
-    if (pidfd > 0)
+    if (pidfd >= 0)
         virPidFileDeletePath(pidpath);
     VIR_FREE(pidpath);
     VIR_FORCE_CLOSE(fd);
--

Is that fine or should I use that goto error; everywhere after
acquiring the pidfile or is it better for you to see it in another
version?


Martin
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: Digital signature
URL: <http://listman.redhat.com/archives/libvir-list/attachments/20140917/c91e3556/attachment-0001.sig>


More information about the libvir-list mailing list