Pseudocode could be something like this:

CREATE inotify watch for IN_CLOSE_WRITE on the file

REPEAT

    Open the file

    IF Open was successful THEN

         Lock the file nonblocking

         IF Lock was successful THEN

                 READ the file

                 IF Read was successful and file size was non-zero THEN

                         UNLOCK the file (maybe not needed - done by close?)

                        CLOSE the file

                         REMOVE inotify watch

                        RETURN file contents

                  ENDIF

                  UNLOCK the file (maybe not needed - done by close?)

         ENDIF

         CLOSE the file

      ENDIF

      WAIT for inotify event

END REPEAT

regards,
Anders Widell


On 05/03/2017 10:46 AM, Anders Widell wrote:
> I think osaftransportd must do this sequence:
>
> * Open the file
>
> * Lock the file
>
> * Check if the file has a non-zero size - if the size is zero, close the
> file and treat it as non-existing.
>
> Though your worry about deadlock is important from a security
> perspective. Locking shall be non-blocking as Hans says - otherwise
> there can be a risk for denial of service.
>
> regards,
>
> Anders Widell
>
> On 05/03/2017 08:52 AM, Hans Nordebäck wrote:
>> Hi Minh,
>>
>> the flock is used in non blocking mode, not sure but as I mentioned
>> earlier why not add a new function
>>
>> FileNotify::WaitForFileClose and change the return codes in
>> ProcessEvents to differentiate the events?
>>
>> /Thanks HansN
>>
>>
>> On 05/03/2017 08:43 AM, minh chau wrote:
>>> Hi Anders, Hans,
>>>
>>> Using flock() when reading pid file in osaftransportd, it may be
>>> causing a deadlock. When open() is called in __create_pidfile(), that
>>> will generate IN_CREATE towards osaftransportd. Right after that if
>>> osaftransportd takes the lock before __create_pidfile(), I think it
>>> will cause a deadlock?
>>>
>>> There might be two ways we can do:
>>>
>>> (1) It's a little bit change in the temporary approach, we first
>>> create original pid file as normally, at the end of
>>> __create_pidfile(), create a symlink temporary pid file targeting the
>>> original pid file. Then, osaftransportd now watches the temporary pid
>>> file, and FileNotify can continue using IN_CREATE (which is created
>>> by both symlink() and open(), don't have to add IN_MOVED_TO)
>>>
>>> (2) The other simple one is the retry of reading pid as sent out in
>>> V1, it does retry as similar as NID is trying to open fifo file after
>>> call WaitForFileCreation(). We can extend the waiting time of retries
>>> for osaftransportd as similar to NID, and the pid should be ready to
>>> read by that period of waiting time.
>>>
>>> Or (3)...?
>>>
>>> thanks,
>>> Minh
>>>
>>> On 03/05/17 00:43, Anders Widell wrote:
>>>> Yes, when reading this patch I realize that the pidfile creation
>>>> already uses flock() for atomicity. Maybe this is standard practice
>>>> when creating pid files, and if so we probably shouldn't do it in
>>>> another way because then we can have problems interacting with other
>>>> programs that operate on the pid files (Ubuntu start-stop-daemon and
>>>> LSB start_daemon). Maybe the solution is as simple as using flock()
>>>> when reading the pid file?
>>>>
>>>> regards,
>>>>
>>>> Anders Widell
>>>>
>>>>
>>>> On 05/02/2017 03:10 PM, Hans Nordebäck wrote:
>>>>> Hi Minh,
>>>>>
>>>>> some minor comments below, I discussed with Anders about using the
>>>>> existing flock instead of the rename.
>>>>>
>>>>> /BR HansN
>>>>>
>>>>>
>>>>> On 04/28/2017 11:36 AM, Minh Chau wrote:
>>>>>> At startup, osaftransportd waits for osafdtmd.pid file creation
>>>>>> and then reads dtm pid. If osafdtmd.pid has not been completedly
>>>>>> created but osaftransportd still receives IN_CREATE, osaftransported
>>>>>> will fail to read pid of dtmd. That results in a node reboot with
>>>>>> a reason as "osafdtmd failed to start".
>>>>>>
>>>>>> The patch implements an approach suggested by Anders Widell, which
>>>>>> creates a completed temporary pid file first, then renames it to
>>>>>> correct pid file name. Whenever osaftransportd is notified to read
>>>>>> dtmd's pid, the data in pid file should be always safe to read. In
>>>>>> addition to this, FileNotify needs to introduce IN_MOVED_TO event.
>>>>>> ---
>>>>>>    src/base/daemon.c       | 27 ++++++++++++++++++---------
>>>>>>    src/base/file_notify.cc | 10 +++++++++-
>>>>>>    2 files changed, 27 insertions(+), 10 deletions(-)
>>>>>>
>>>>>> diff --git a/src/base/daemon.c b/src/base/daemon.c
>>>>>> index 77a869561..2fd161ce0 100644
>>>>>> --- a/src/base/daemon.c
>>>>>> +++ b/src/base/daemon.c
>>>>>> @@ -88,40 +88,49 @@ static int __create_pidfile(const char *pidfile)
>>>>>>    {
>>>>>>        FILE *file = NULL;
>>>>>>        int fd, pid, rc = 0;
>>>>>> +    char pidfiletmp[256] = {0};
>>>>> [HansN] use NAME_MAX instead of 256
>>>>>> +
>>>>>> +    sprintf(pidfiletmp, "%s.tmp", pidfile);
>>>>> [HansN] use snprintf and shouldn't pid be included in temp name?
>>>>>>          /* open the file and associate a stream with it */
>>>>>> -    if (((fd = open(pidfile, O_RDWR | O_CREAT, 0644)) == -1) ||
>>>>>> +    if (((fd = open(pidfiletmp, O_RDWR | O_CREAT, 0644)) == -1) ||
>>>>>>            ((file = fdopen(fd, "r+")) == NULL)) {
>>>>>> -        syslog(LOG_ERR, "open failed, pidfile=%s, errno=%s",
>>>>>> pidfile,
>>>>>> -               strerror(errno));
>>>>>> +        syslog(LOG_ERR, "open failed, pidfiletmp=%s, errno=%s",
>>>>>> +            pidfiletmp, strerror(errno));
>>>>> [HansN] close(fd) is missing
>>>>>>            return -1;
>>>>>>        }
>>>>>>          /* Lock the file */
>>>>>>        if (flock(fd, LOCK_EX | LOCK_NB) == -1) {
>>>>>> -        syslog(LOG_ERR, "flock failed, pidfile=%s, errno=%s",
>>>>>> pidfile,
>>>>>> -               strerror(errno));
>>>>>> +        syslog(LOG_ERR, "flock failed, pidfiletmp=%s, errno=%s",
>>>>>> +            pidfiletmp, strerror(errno));
>>>>>>            fclose(file);
>>>>>>            return -1;
>>>>>>        }
>>>>>>          pid = getpid();
>>>>>>        if (!fprintf(file, "%d\n", pid)) {
>>>>>> -        syslog(LOG_ERR, "fprintf failed, pidfile=%s, errno=%s",
>>>>>> pidfile,
>>>>>> -               strerror(errno));
>>>>>> +        syslog(LOG_ERR, "fprintf failed, pidfiletmp=%s, errno=%s",
>>>>>> +             pidfiletmp, strerror(errno));
>>>>>>            fclose(file);
>>>>>>            return -1;
>>>>>>        }
>>>>>>        fflush(file);
>>>>>>          if (flock(fd, LOCK_UN) == -1) {
>>>>>> -        syslog(LOG_ERR, "flock failed, pidfile=%s, errno=%s",
>>>>>> pidfile,
>>>>>> -               strerror(errno));
>>>>>> +        syslog(LOG_ERR, "flock failed, pidfiletmp=%s, errno=%s",
>>>>>> +            pidfiletmp, strerror(errno));
>>>>>>            fclose(file);
>>>>>>            return -1;
>>>>>>        }
>>>>>>        fclose(file);
>>>>>>    +    if (rename(pidfiletmp, pidfile) != 0) {
>>>>>> +        syslog(LOG_ERR, "rename failed, old=%s new=%s, error:%s",
>>>>>> +            pidfiletmp, pidfile, strerror(errno));
>>>>>> +        return -1;
>>>>>> +    }
>>>>>> +
>>>>>>        return rc;
>>>>>>    }
>>>>>>    diff --git a/src/base/file_notify.cc b/src/base/file_notify.cc
>>>>>> index e96be8b4a..80d1b7d54 100644
>>>>>> --- a/src/base/file_notify.cc
>>>>>> +++ b/src/base/file_notify.cc
>>>>>> @@ -50,7 +50,7 @@ FileNotify::FileNotifyErrors
>>>>>> FileNotify::WaitForFileCreation(
>>>>>>      SplitFileName(file_name);
>>>>>>        if ((inotify_wd_ = inotify_add_watch(inotify_fd_,
>>>>>> file_path_.c_str(),
>>>>>> -                                       IN_CREATE)) == -1) {
>>>>>> +                                       IN_CREATE | IN_MOVED_TO))
>>>>>> == -1) {
>>>>>>        LOG_NO("inotify_add_watch failed: %s", strerror(errno));
>>>>>>        return FileNotifyErrors::kError;
>>>>>>      }
>>>>>> @@ -144,6 +144,14 @@ FileNotify::FileNotifyErrors
>>>>>> FileNotify::ProcessEvents(
>>>>>>                    return FileNotifyErrors::kOK;
>>>>>>                  }
>>>>>>                }
>>>>>> +            if (event->mask & IN_MOVED_TO) {
>>>>>> +              if (file_name_ == event->name) {
>>>>>> +                TRACE("file name: %s moved to %s",
>>>>>> file_name_.c_str(),
>>>>>> +                    file_path_.c_str());
>>>>>> +                delete[] fds;
>>>>>> +                return FileNotifyErrors::kOK;
>>>>>> +              }
>>>>>> +            }
>>>>>>                if (event->mask & IN_IGNORED) {
>>>>>>                  TRACE("IN_IGNORE received, (ignored)");
>>>>>>                }
>>>>
>>>>
>
>
> ------------------------------------------------------------------------------
> Check out the vibrant tech community on one of the world's most
> engaging tech sites, Slashdot.org! http://sdm.link/slashdot
> _______________________________________________
> Opensaf-devel mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/opensaf-devel
>



------------------------------------------------------------------------------
Check out the vibrant tech community on one of the world's most
engaging tech sites, Slashdot.org! http://sdm.link/slashdot
_______________________________________________
Opensaf-devel mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/opensaf-devel

Reply via email to