[lxc-devel] [RFC PATCH v2] allow multiple monitor clients

S.Çağlar Onur caglar at 10ur.org
Tue Apr 23 03:42:56 UTC 2013


Hi Dwight,

On Mon, Apr 22, 2013 at 5:42 PM, Dwight Engen <dwight.engen at oracle.com>wrote:

> [...]
> > > > So here is what I'm proposing: when lxc-monitor starts, it
> > > > attempts to start lxc-monitord. lxc-monitord creates a fifo and a
> > > > socket on lxcpath.
> > >
> > > Thanks, Dwight.  Looks awesome.  Some comments below, but I'm only
> > > not adding an ack bc you say you want to make some changes first
> > > anyway.
> > >
> > > When you send the next version I'll run it through my testsuite (and
> > > presumably ack).
>
> Serge, this one should be testable so feel free to hit it with your
> testsuite if you want, but I'm still sending it as RFC due to the
> questions raised below. Caglar, I've tested this pretty thoroughly
> with your python parallel start script doing 40 containers
> parallel 4 ways (and put into a loop running for a few minutes) and
> some other parallel startup cases I made. If you want to test it
> yourself too, that'd be great.


Yep, it's working great here with my set of tools as well. Awesome work!
Thanks for doing this...


>  > > ...
> > > > +static void lxc_monitord_delete(struct lxc_monitor *mon, const
> > > > char *lxcpath) +{
> > > > + int i;
> > > > +
> > > > + lxc_mainloop_del_handler(&mon->descr, mon->listenfd);
> > > > + close(mon->listenfd);
> > >
> > > The ordering here might need to change to ensure we don't get any
> > > clients hanging between the two steps.
> >
> > Hmm, good point. Have to think about this, there might be a race the
> > other way with still having the fd in the epoll set also.
>
> I think the way I have it is the right order. It looks to me from
> the epoll_ctl manpage that we'll get EBADF if fd isn't valid at the
> time of EPOLL_CTL_DEL.
>
>
> I have a couple of new questions too :( In the current code there is
> the following flow (only when starting a container as daemon through
> the api):
>
> lxcapi_start()
>   wait_on_daemonized_start()
>     lxcapi_wait()
>       lxc_wait()
>         lxc_monitor_open()
>
> This is racy with multiple starters all trying to bind the socket
> address and is the source of Caglar's original problem. It looks to me
> like it is also racy with respect to the child container
> setting the state, but there is a timeout safety on the wait side so
> we don't hang.
>
> In the change I'm proposing, I put in a call to lxc_monitord_spawn() in
> only this daemon case which should mean there is always a place to
> deliver the status and no races between parent and child (because of
> sync'ing on the pipe), but has the drawback of having monitord always
> get started when the container is started daemonized. This is the only
> flow I found that used lxc_wait internally. Stephane, you might want to
> comment on this as it looks like you added the
> wait_on_daemonized_start() stuff, I'd be happy if my analysis missed
> something :) At least monitord will go away after startup, but it'd be
> nice not to have to start it at all. Any thoughts?
>
> The other question is: I do getsockopt SO_PEERCRED and
> check against the effective uid which I believe is correct in case
> the caller is setuid. What I'm wondering is why the routines in
> af_unix.c are passing/checking against the real?


I believe you are right and those needs to be replaced with geteuid/getegid
to handle elevated privileges


>
> --
>
> Signed-off-by: Dwight Engen <dwight.engen at oracle.com>
> ---
>  .gitignore             |   1 +
>  src/lxc/Makefile.am    |   2 +
>  src/lxc/lxc_console.c  |   4 +-
>  src/lxc/lxc_monitor.c  |   2 +
>  src/lxc/lxc_monitord.c | 377
> +++++++++++++++++++++++++++++++++++++++++++++++++
>  src/lxc/lxccontainer.c |   6 +-
>  src/lxc/mainloop.c     |   7 +-
>  src/lxc/mainloop.h     |   7 +-
>  src/lxc/monitor.c      | 192 ++++++++++++++++++-------
>  src/lxc/monitor.h      |  10 +-
>  src/lxc/start.c        |   4 +-
>  src/lxc/utils.h        |  26 ++++
>  12 files changed, 574 insertions(+), 64 deletions(-)
>  create mode 100644 src/lxc/lxc_monitord.c
>
> diff --git a/.gitignore b/.gitignore
> index 905a2dc..c614a75 100644
> --- a/.gitignore
> +++ b/.gitignore
> @@ -52,6 +52,7 @@ src/lxc/lxc-info
>  src/lxc/lxc-init
>  src/lxc/lxc-kill
>  src/lxc/lxc-monitor
> +src/lxc/lxc-monitord
>  src/lxc/lxc-netstat
>  src/lxc/lxc-ps
>  src/lxc/lxc-restart
> diff --git a/src/lxc/Makefile.am b/src/lxc/Makefile.am
> index ebeca466..1fa0fa8 100644
> --- a/src/lxc/Makefile.am
> +++ b/src/lxc/Makefile.am
> @@ -150,6 +150,7 @@ bin_PROGRAMS = \
>         lxc-start \
>         lxc-execute \
>         lxc-monitor \
> +       lxc-monitord \
>         lxc-wait \
>         lxc-console \
>         lxc-freeze \
> @@ -181,6 +182,7 @@ lxc_freeze_SOURCES = lxc_freeze.c
>  lxc_info_SOURCES = lxc_info.c
>  lxc_init_SOURCES = lxc_init.c
>  lxc_monitor_SOURCES = lxc_monitor.c
> +lxc_monitord_SOURCES = lxc_monitord.c
>  lxc_restart_SOURCES = lxc_restart.c
>  lxc_start_SOURCES = lxc_start.c
>  lxc_stop_SOURCES = lxc_stop.c
> diff --git a/src/lxc/lxc_console.c b/src/lxc/lxc_console.c
> index 643c442..f6659f6 100644
> --- a/src/lxc/lxc_console.c
> +++ b/src/lxc/lxc_console.c
> @@ -241,7 +241,7 @@ Type <Ctrl+%1$c q> to exit the console, \
>                 goto out_mainloop_open;
>         }
>
> -       err = lxc_mainloop(&descr);
> +       err = lxc_mainloop(&descr, -1);
>         if (err) {
>                 ERROR("mainloop returned an error");
>                 goto out_mainloop_open;
> @@ -255,7 +255,7 @@ out_mainloop_open:
>  out:
>         /* Restore previous terminal parameter */
>         tcsetattr(0, TCSAFLUSH, &oldtios);
> -
> +
>         /* Return to line it is */
>         printf("\n");
>
> diff --git a/src/lxc/lxc_monitor.c b/src/lxc/lxc_monitor.c
> index 8c15869..0ca829f 100644
> --- a/src/lxc/lxc_monitor.c
> +++ b/src/lxc/lxc_monitor.c
> @@ -87,6 +87,8 @@ int main(int argc, char *argv[])
>                 return -1;
>         }
>
> +       lxc_monitord_spawn(my_args.lxcpath);
> +
>         fd = lxc_monitor_open(my_args.lxcpath);
>         if (fd < 0)
>                 return -1;
> diff --git a/src/lxc/lxc_monitord.c b/src/lxc/lxc_monitord.c
> new file mode 100644
> index 0000000..8857aec
> --- /dev/null
> +++ b/src/lxc/lxc_monitord.c
> @@ -0,0 +1,377 @@
> +/*
> + * lxc: linux Container library
> + *
> + * Copyright © 2012 Oracle.
> + *
> + * Authors:
> + * Dwight Engen <dwight.engen at oracle.com>
> + *
> + * This library is free software; you can redistribute it and/or
> + * modify it under the terms of the GNU Lesser General Public
> + * License as published by the Free Software Foundation; either
> + * version 2.1 of the License, or (at your option) any later version.
> + *
> + * This library is distributed in the hope that it will be useful,
> + * but WITHOUT ANY WARRANTY; without even the implied warranty of
> + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
> + * Lesser General Public License for more details.
> + *
> + * You should have received a copy of the GNU Lesser General Public
> + * License along with this library; if not, write to the Free Software
> + * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
> + */
> +
> +#define _GNU_SOURCE
> +#include <stdio.h>
> +#include <signal.h>
> +#include <errno.h>
> +#include <unistd.h>
> +#include <string.h>
> +#include <stdlib.h>
> +#include <fcntl.h>
> +#include <sys/types.h>
> +#include <sys/stat.h>
> +#include <sys/param.h>
> +#include <sys/socket.h>
> +#include <sys/un.h>
> +#include <netinet/in.h>
> +#include <net/if.h>
> +
> +#include <lxc/af_unix.h>
> +#include <lxc/log.h>
> +#include <lxc/mainloop.h>
> +#include <lxc/monitor.h>
> +#include <lxc/utils.h>
> +
> +lxc_log_define(lxc_monitord, lxc);
> +
> +static struct lxc_monitor mon;
> +
> +static void lxc_monitord_cleanup(void);
> +
> +/*
> + * Defines the structure to store the monitor information
> + * @lxcpath      : the path being monitored
> + * @fifofd       : the file descriptor for publishers (containers) to
> write state
> + * @listenfd     : the file descriptor for subscribers (lxc-monitors) to
> connect
> + * @clientfds    : accepted client file descriptors
> + * @clientfds_cnt: the count of valid fds in clientfds
> + * @descr        : the lxc_mainloop state
> + */
> +struct lxc_monitor {
> +       const char *lxcpath;
> +       int fifofd;
> +       int listenfd;
> +       int clientfds[1024];
> +       int clientfds_cnt;
> +       struct lxc_epoll_descr descr;
> +};
> +
> +static int lxc_monitord_fifo_create(struct lxc_monitor *mon)
> +{
> +       char fifo_path[PATH_MAX];
> +       int ret;
> +
> +       ret = snprintf(fifo_path, sizeof(fifo_path), "%s/monitor-fifo",
> mon->lxcpath);
> +       if (ret < 0 || ret >= sizeof(fifo_path)) {
> +               ERROR("lxcpath too long to monitor fifo");
> +               return -1;
> +       }
> +
> +       ret = mknod(fifo_path, S_IFIFO|S_IRUSR|S_IWUSR, 0);
> +       if (ret < 0) {
> +               INFO("monitor fifo %s exists, already running?",
> fifo_path);
> +               return -1;
> +       }
> +
> +       mon->fifofd = open(fifo_path, O_RDWR);
> +       if (mon->fifofd < 0) {
> +               unlink(fifo_path);
> +               ERROR("failed to open monitor fifo");
> +               return -1;
> +       }
> +       return 0;
> +}
> +
> +static int lxc_monitord_fifo_delete(struct lxc_monitor *mon)
> +{
> +       char fifo_path[PATH_MAX];
> +       int ret;
> +
> +       ret = snprintf(fifo_path, sizeof(fifo_path), "%s/monitor-fifo",
> mon->lxcpath);
> +       if (ret < 0 || ret >= sizeof(fifo_path)) {
> +               ERROR("lxcpath too long to monitor fifo");
> +               return -1;
> +       }
> +       unlink(fifo_path);
> +       return 0;
> +}
> +
> +static void lxc_monitord_sockfd_remove(struct lxc_monitor *mon, int fd) {
> +       int i;
> +
> +       if (lxc_mainloop_del_handler(&mon->descr, fd))
> +               CRIT("fd:%d not found in mainloop", fd);
> +       close(fd);
> +
> +       for (i = 0; i < mon->clientfds_cnt; i++) {
> +               if (mon->clientfds[i] == fd)
> +                       break;
> +       }
> +       if (i >= mon->clientfds_cnt) {
> +               CRIT("fd:%d not found in clients array", fd);
> +               lxc_monitord_cleanup();
> +               exit(EXIT_FAILURE);
> +       }
> +
> +       memmove(&mon->clientfds[i], &mon->clientfds[i+1],
> +               (&mon->clientfds[mon->clientfds_cnt-1] -
> &mon->clientfds[i]) * sizeof(int));
> +       mon->clientfds_cnt--;
> +}
> +
> +static int lxc_monitord_sock_handler(int fd, void *data,
> +                                    struct lxc_epoll_descr *descr)
> +{
> +       struct lxc_monitor *mon = data;
> +
> +       lxc_monitord_sockfd_remove(mon, fd);
> +       return 0;
> +}
> +
> +static int lxc_monitord_sock_accept(int fd, void *data,
> +                                   struct lxc_epoll_descr *descr)
> +{
> +       int ret,clientfd;
> +       struct lxc_monitor *mon = data;
> +       struct ucred cred;
> +       socklen_t credsz = sizeof(cred);
> +
> +       ret = -1;
> +       clientfd = accept(fd, NULL, 0);
> +       if (clientfd < 0) {
> +               SYSERROR("failed to accept connection");
> +               goto out;
> +       }
> +
> +       if (fcntl(clientfd, F_SETFD, FD_CLOEXEC)) {
> +               SYSERROR("failed to set close-on-exec on incoming
> connection");
> +               goto err1;
> +       }
> +
> +       if (getsockopt(clientfd, SOL_SOCKET, SO_PEERCRED, &cred, &credsz))
> +       {
> +               ERROR("failed to get credentials on socket");
> +               goto err1;
> +       }
> +       if (cred.uid && cred.uid != geteuid()) {
> +               WARN("monitor denied for uid:%d", cred.uid);
> +               ret = -EACCES;
> +               goto err1;
> +       }
> +
> +       ret = lxc_mainloop_add_handler(&mon->descr, clientfd,
> +                                      lxc_monitord_sock_handler, mon);
> +       if (ret) {
> +               ERROR("failed to add socket handler");
> +               goto err1;
> +       }
> +       mon->clientfds[mon->clientfds_cnt++] = clientfd;
> +       INFO("accepted client fd:%d clients:%d", clientfd,
> mon->clientfds_cnt);
> +       goto out;
> +
> +err1:
> +       close(clientfd);
> +out:
> +       return ret;
> +}
> +
> +static int lxc_monitord_sock_create(struct lxc_monitor *mon)
> +{
> +       struct sockaddr_un addr;
> +       int fd;
> +
> +       if (lxc_monitor_sock_name(mon->lxcpath, &addr) < 0)
> +               return -1;
> +
> +       fd = lxc_af_unix_open(addr.sun_path, SOCK_STREAM, O_TRUNC);
> +       if (fd < 0) {
> +               ERROR("failed to open unix socket : %s", strerror(errno));
> +               return -1;
> +       }
> +
> +       mon->listenfd = fd;
> +       return 0;
> +}
> +
> +static int lxc_monitord_sock_delete(struct lxc_monitor *mon)
> +{
> +       struct sockaddr_un addr;
> +
> +       if (lxc_monitor_sock_name(mon->lxcpath, &addr) < 0)
> +               return -1;
> +       if (addr.sun_path[0])
> +               unlink(addr.sun_path);
> +       return 0;
> +}
> +
> +static int lxc_monitord_create(struct lxc_monitor *mon)
> +{
> +       int ret;
> +
> +       ret = lxc_monitord_fifo_create(mon);
> +       if (ret < 0)
> +               return ret;
> +
> +       ret = lxc_monitord_sock_create(mon);
> +       return ret;
> +}
> +
> +static void lxc_monitord_delete(struct lxc_monitor *mon)
> +{
> +       int i;
> +
> +       lxc_mainloop_del_handler(&mon->descr, mon->listenfd);
> +       close(mon->listenfd);
> +       lxc_monitord_sock_delete(mon);
> +
> +       lxc_mainloop_del_handler(&mon->descr, mon->fifofd);
> +       close(mon->fifofd);
> +       lxc_monitord_fifo_delete(mon);
> +
> +       for (i = 0; i < mon->clientfds_cnt; i++) {
> +               lxc_mainloop_del_handler(&mon->descr, mon->clientfds[i]);
> +               close(mon->clientfds[i]);
> +       }
> +       mon->clientfds_cnt = 0;
> +}
> +
> +static int lxc_monitord_fifo_handler(int fd, void *data,
> +                                    struct lxc_epoll_descr *descr)
> +{
> +       int ret,i;
> +       struct lxc_msg msglxc;
> +       struct lxc_monitor *mon = data;
> +
> +       ret = read(fd, &msglxc, sizeof(msglxc));
> +       if (ret != sizeof(msglxc)) {
> +               SYSERROR("read fifo failed : %s", strerror(errno));
> +               return 1;
> +       }
> +
> +       for (i = 0; i < mon->clientfds_cnt; i++) {
> +               DEBUG("writing client fd:%d", mon->clientfds[i]);
> +               ret = write(mon->clientfds[i], &msglxc, sizeof(msglxc));
> +               if (ret < 0) {
> +                       ERROR("write failed to client sock:%d %d %s",
> +                             mon->clientfds[i], errno, strerror(errno));
> +               }
> +       }
> +
> +       return 0;
> +}
> +
> +static int lxc_monitord_mainloop_add(struct lxc_monitor *mon)
> +{
> +       int ret;
> +
> +       ret = lxc_mainloop_add_handler(&mon->descr, mon->fifofd,
> +                                      lxc_monitord_fifo_handler, mon);
> +       if (ret < 0) {
> +               ERROR("failed to add to mainloop monitor handler for
> fifo");
> +               return -1;
> +       }
> +
> +       ret = lxc_mainloop_add_handler(&mon->descr, mon->listenfd,
> +                                      lxc_monitord_sock_accept, mon);
> +       if (ret < 0) {
> +               ERROR("failed to add to mainloop monitor handler for
> listen socket");
> +               return -1;
> +       }
> +
> +       return 0;
> +}
> +
> +static void lxc_monitord_cleanup(void)
> +{
> +       lxc_monitord_delete(&mon);
> +}
> +
> +static void lxc_monitord_sig_handler(int sig)
> +{
> +       INFO("caught signal %d", sig);
> +       lxc_monitord_cleanup();
> +       exit(EXIT_SUCCESS);
> +}
> +
> +int main(int argc, char *argv[])
> +{
> +       int ret,pipefd;
> +       char *lxcpath = argv[1];
> +       char logpath[PATH_MAX];
> +       sigset_t mask;
> +
> +       snprintf(logpath, sizeof(logpath), "%s/lxc-monitord.log", lxcpath);
> +       ret = lxc_log_init(NULL, logpath, "NOTICE", "lxc-monitord", 0);
> +       if (ret)
> +               return ret;
> +
> +       pipefd = atoi(argv[2]);
> +
> +       if (sigfillset(&mask) ||
> +           sigdelset(&mask, SIGILL)  ||
> +           sigdelset(&mask, SIGSEGV) ||
> +           sigdelset(&mask, SIGBUS)  ||
> +           sigdelset(&mask, SIGTERM) ||
> +           sigprocmask(SIG_BLOCK, &mask, NULL)) {
> +               SYSERROR("failed to set signal mask");
> +               return -1;
> +       }
> +
> +       signal(SIGILL,  lxc_monitord_sig_handler);
> +       signal(SIGSEGV, lxc_monitord_sig_handler);
> +       signal(SIGBUS,  lxc_monitord_sig_handler);
> +       signal(SIGTERM, lxc_monitord_sig_handler);
> +
> +       ret = EXIT_FAILURE;
> +       memset(&mon, 0, sizeof(mon));
> +       mon.lxcpath = lxcpath;
> +       if (lxc_mainloop_open(&mon.descr)) {
> +               ERROR("failed to create mainloop");
> +               goto out;
> +       }
> +
> +       if (lxc_monitord_create(&mon)) {
> +               goto out;
> +       }
> +
> +       /* sync with parent, we're ignoring the return from write
> +        * because regardless if it works or not, the following
> +        * close will sync us with the parent process. the
> +        * if-empty-statement construct is to quiet the
> +        * warn-unused-result warning.
> +        */
> +       if (write(pipefd, "S", 1)) ;
> +       close(pipefd);
> +
> +       if (lxc_monitord_mainloop_add(&mon)) {
> +               ERROR("failed to add mainloop handlers");
> +               goto out;
> +       }
> +
> +       NOTICE("monitoring lxcpath %s", mon.lxcpath);
> +       for(;;) {
> +               ret = lxc_mainloop(&mon.descr, 1000 * 30);
> +               if (mon.clientfds_cnt <= 0)
> +               {
> +                       NOTICE("no clients for 30 seconds, exiting");
> +                       break;
> +               }
> +       }
> +
> +       lxc_mainloop_close(&mon.descr);
> +       lxc_monitord_cleanup();
> +       ret = EXIT_SUCCESS;
> +       NOTICE("monitor exiting");
> +out:
> +       return ret;
> +}
> diff --git a/src/lxc/lxccontainer.c b/src/lxc/lxccontainer.c
> index 1df6a98..53765b0 100644
> --- a/src/lxc/lxccontainer.c
> +++ b/src/lxc/lxccontainer.c
> @@ -32,6 +32,7 @@
>  #include <sys/wait.h>
>  #include <errno.h>
>  #include <lxc/utils.h>
> +#include <lxc/monitor.h>
>
>  lxc_log_define(lxc_container, lxc);
>
> @@ -370,6 +371,7 @@ static bool lxcapi_start(struct lxc_container *c, int
> useinit, char * const argv
>         if (daemonize) {
>                 if (!lxc_container_get(c))
>                         return false;
> +               lxc_monitord_spawn(c->config_path);
>                 pid_t pid = fork();
>                 if (pid < 0) {
>                         lxc_container_put(c);
> @@ -560,7 +562,7 @@ static bool lxcapi_create(struct lxc_container *c,
> char *t, char *const argv[])
>         }
>
>         /* container is already created if we have a config and
> rootfs.path is accessible */
> -       if (lxcapi_is_defined(c) && c->lxc_conf &&
> c->lxc_conf->rootfs.path && access(c->lxc_conf->rootfs.path, F_OK) == 0)
> +       if (lxcapi_is_defined(c) && c->lxc_conf &&
> c->lxc_conf->rootfs.path && access(c->lxc_conf->rootfs.path, F_OK) == 0)
>                 goto out;
>
>         /* we're going to fork.  but since we'll wait for our child, we
> @@ -826,7 +828,7 @@ static bool lxcapi_destroy(struct lxc_container *c)
>                 return false;
>
>         /* container is already destroyed if we don't have a config and
> rootfs.path is not accessible */
> -       if (!lxcapi_is_defined(c) && (!c->lxc_conf ||
> !c->lxc_conf->rootfs.path || access(c->lxc_conf->rootfs.path, F_OK) != 0))
> +       if (!lxcapi_is_defined(c) && (!c->lxc_conf ||
> !c->lxc_conf->rootfs.path || access(c->lxc_conf->rootfs.path, F_OK) != 0))
>                 return false;
>
>         pid = fork();
> diff --git a/src/lxc/mainloop.c b/src/lxc/mainloop.c
> index 975215d..d9ab5d1 100644
> --- a/src/lxc/mainloop.c
> +++ b/src/lxc/mainloop.c
> @@ -38,7 +38,7 @@ struct mainloop_handler {
>
>  #define MAX_EVENTS 10
>
> -int lxc_mainloop(struct lxc_epoll_descr *descr)
> +int lxc_mainloop(struct lxc_epoll_descr *descr, int timeout_ms)
>  {
>         int i, nfds;
>         struct mainloop_handler *handler;
> @@ -46,7 +46,7 @@ int lxc_mainloop(struct lxc_epoll_descr *descr)
>
>         for (;;) {
>
> -               nfds = epoll_wait(descr->epfd, events, MAX_EVENTS, -1);
> +               nfds = epoll_wait(descr->epfd, events, MAX_EVENTS,
> timeout_ms);
>                 if (nfds < 0) {
>                         if (errno == EINTR)
>                                 continue;
> @@ -64,6 +64,9 @@ int lxc_mainloop(struct lxc_epoll_descr *descr)
>                                 return 0;
>                 }
>
> +               if (nfds == 0 && timeout_ms != 0)
> +                       return 0;
> +
>                 if (lxc_list_empty(&descr->handlers))
>                         return 0;
>         }
> diff --git a/src/lxc/mainloop.h b/src/lxc/mainloop.h
> index 6b16242..ec87569 100644
> --- a/src/lxc/mainloop.h
> +++ b/src/lxc/mainloop.h
> @@ -21,6 +21,9 @@
>   * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
>   */
>
> +#ifndef _mainloop_h
> +#define _mainloop_h
> +
>  #include "list.h"
>
>  struct lxc_epoll_descr {
> @@ -31,7 +34,7 @@ struct lxc_epoll_descr {
>  typedef int (*lxc_mainloop_callback_t)(int fd, void *data,
>                                        struct lxc_epoll_descr *descr);
>
> -extern int lxc_mainloop(struct lxc_epoll_descr *descr);
> +extern int lxc_mainloop(struct lxc_epoll_descr *descr, int timeout_ms);
>
>  extern int lxc_mainloop_add_handler(struct lxc_epoll_descr *descr, int fd,
>                                     lxc_mainloop_callback_t callback,
> @@ -42,3 +45,5 @@ extern int lxc_mainloop_del_handler(struct
> lxc_epoll_descr *descr, int fd);
>  extern int lxc_mainloop_open(struct lxc_epoll_descr *descr);
>
>  extern int lxc_mainloop_close(struct lxc_epoll_descr *descr);
> +
> +#endif
> diff --git a/src/lxc/monitor.c b/src/lxc/monitor.c
> index afdaf67..e7044f6 100644
> --- a/src/lxc/monitor.c
> +++ b/src/lxc/monitor.c
> @@ -5,6 +5,7 @@
>   *
>   * Authors:
>   * Daniel Lezcano <daniel.lezcano at free.fr>
> + * Dwight Engen <dwight.engen at oracle.com>
>   *
>   * This library is free software; you can redistribute it and/or
>   * modify it under the terms of the GNU Lesser General Public
> @@ -20,6 +21,7 @@
>   * License along with this library; if not, write to the Free Software
>   * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
>   */
> +
>  #include <stdio.h>
>  #include <errno.h>
>  #include <unistd.h>
> @@ -30,7 +32,7 @@
>  #include <sys/stat.h>
>  #include <sys/param.h>
>  #include <sys/socket.h>
> -#include <sys/un.h>
> +#include <sys/wait.h>
>  #include <netinet/in.h>
>  #include <net/if.h>
>
> @@ -40,37 +42,36 @@
>  #include <lxc/log.h>
>  #include <lxc/state.h>
>  #include <lxc/monitor.h>
> +#include <lxc/utils.h>
>
>  lxc_log_define(lxc_monitor, lxc);
>
> -#ifndef UNIX_PATH_MAX
> -#define UNIX_PATH_MAX 108
> -#endif
> -
> -static void lxc_monitor_send(struct lxc_msg *msg, const char *lxcpath)
> +/* routines used by monitor publishers (containers) */
> +static void lxc_monitor_fifo_send(struct lxc_msg *msg, const char
> *lxcpath)
>  {
> -       int fd;
> -       struct sockaddr_un addr = { .sun_family = AF_UNIX };
> -       char *offset = &addr.sun_path[1];
> -       size_t ret, len;
> -
> -       /*
> -        * addr.sun_path is only 108 bytes.
> -        * should we take a hash of lxcpath?  a subset of it?
> -        */
> -       len = sizeof(addr.sun_path) - 1;
> -       ret = snprintf(offset, len, "%s/lxc-monitor", lxcpath);
> -       if (ret < 0 || ret >= len) {
> -               ERROR("lxcpath too long to open monitor");
> +       int fd,ret;
> +       char fifo_path[PATH_MAX];
> +
> +       BUILD_BUG_ON(sizeof(*msg) > PIPE_BUF); /* write not guaranteed
> atomic */
> +       ret = snprintf(fifo_path, sizeof(fifo_path), "%s/monitor-fifo",
> lxcpath);
> +       if (ret < 0 || ret >= sizeof(fifo_path)) {
> +               ERROR("lxcpath too long to open monitor fifo");
>                 return;
>         }
>
> -       fd = socket(PF_UNIX, SOCK_DGRAM, 0);
> -       if (fd < 0)
> +       fd = open(fifo_path, O_WRONLY);
> +       if (fd < 0) {
> +               /* it is normal for this open to fail when there is no
> monitor
> +                * running, so we don't log it
> +                */
>                 return;
> +       }
>
> -       sendto(fd, msg, sizeof(*msg), 0,
> -              (const struct sockaddr *)&addr, sizeof(addr));
> +       ret = write(fd, msg, sizeof(*msg));
> +       if (ret != sizeof(*msg)) {
> +               SYSERROR("failed to write monitor fifo %s", fifo_path);
> +               return;
> +       }
>
>         close(fd);
>  }
> @@ -82,50 +83,74 @@ void lxc_monitor_send_state(const char *name,
> lxc_state_t state, const char *lxc
>         strncpy(msg.name, name, sizeof(msg.name));
>         msg.name[sizeof(msg.name) - 1] = 0;
>
> -       lxc_monitor_send(&msg, lxcpath);
> +       lxc_monitor_fifo_send(&msg, lxcpath);
>  }
>
> -int lxc_monitor_open(const char *lxcpath)
> +
> +/* routines used by monitor subscribers (lxc-monitor) */
> +int lxc_monitor_close(int fd)
>  {
> -       struct sockaddr_un addr = { .sun_family = AF_UNIX };
> -       char *offset = &addr.sun_path[1];
> -       int fd;
> -       size_t ret, len;
> -
> -       /*
> -        * addr.sun_path is only 108 bytes.
> -        * should we take a hash of lxcpath?  a subset of it?
> +       return close(fd);
> +}
> +
> +int lxc_monitor_sock_name(const char *lxcpath, struct sockaddr_un *addr) {
> +       size_t len;
> +       int ret;
> +       char *sockname = &addr->sun_path[0]; // 1 for abstract
> +
> +       /* addr.sun_path is only 108 bytes.
> +        * should we take a hash of lxcpath? a subset of it? ftok()? we
> need
> +        * to make sure it is unique.
>          */
> -       len = sizeof(addr.sun_path) - 1;
> -       ret = snprintf(offset, len, "%s/lxc-monitor", lxcpath);
> +       memset(addr, 0, sizeof(*addr));
> +       addr->sun_family = AF_UNIX;
> +       len = sizeof(addr->sun_path) - 1;
> +       ret = snprintf(sockname, len, "%s/monitor-sock", lxcpath);
>         if (ret < 0 || ret >= len) {
> -               ERROR("lxcpath too long to open monitor");
> +               ERROR("lxcpath too long for unix socket");
>                 return -1;
>         }
> +       return 0;
> +}
>
> -       fd = socket(PF_UNIX, SOCK_DGRAM, 0);
> +int lxc_monitor_open(const char *lxcpath)
> +{
> +       struct sockaddr_un addr;
> +       int fd,ret;
> +       int retry,backoff_ms[] = {10, 50, 100};
> +
> +       if (lxc_monitor_sock_name(lxcpath, &addr) < 0)
> +               return -1;
> +
> +       fd = socket(PF_UNIX, SOCK_STREAM, 0);
>         if (fd < 0) {
>                 ERROR("socket : %s", strerror(errno));
>                 return -1;
>         }
>
> -       if (bind(fd, (struct sockaddr *)&addr, sizeof(addr))) {
> -               ERROR("bind : %s", strerror(errno));
> -               close(fd);
> -               return -1;
> +       for (retry = 0; retry < sizeof(backoff_ms)/sizeof(backoff_ms[0]);
> retry++) {
> +               ret = connect(fd, (struct sockaddr *)&addr, sizeof(addr));
> +               if (ret == 0 || errno != ECONNREFUSED)
> +                       break;
> +               ERROR("connect : backing off %d", backoff_ms[retry]);
> +               usleep(backoff_ms[retry] * 1000);
>         }
>
> +       if (ret < 0) {
> +               ERROR("connect : %s", strerror(errno));
> +               goto err1;
> +       }
>         return fd;
> +err1:
> +       close(fd);
> +       return ret;
>  }
>
> -/* timeout of 0 means return immediately;  -1 means wait forever */
> -int lxc_monitor_read_timeout(int fd, struct lxc_msg *msg, int timeout)
> +int lxc_monitor_read_timeout(int fd, struct lxc_msg *msglxc, int timeout)
>  {
> -       struct sockaddr_un from;
> -       socklen_t len = sizeof(from);
> -       int ret;
>         fd_set rfds;
>         struct timeval tv;
> +       int ret;
>
>         if (timeout != -1) {
>                 FD_ZERO(&rfds);
> @@ -141,13 +166,12 @@ int lxc_monitor_read_timeout(int fd, struct lxc_msg
> *msg, int timeout)
>                         return -2;  // timed out
>         }
>
> -       ret = recvfrom(fd, msg, sizeof(*msg), 0,
> -                      (struct sockaddr *)&from, &len);
> -       if (ret < 0) {
> -               SYSERROR("failed to receive state");
> +       ret = recv(fd, msglxc, sizeof(*msglxc), 0);
> +       if (ret <= 0) {
> +               SYSERROR("client failed to recv (monitord died?) %s",
> +                        strerror(errno));
>                 return -1;
>         }
> -
>         return ret;
>  }
>
> @@ -156,7 +180,69 @@ int lxc_monitor_read(int fd, struct lxc_msg *msg)
>         return lxc_monitor_read_timeout(fd, msg, -1);
>  }
>
> -int lxc_monitor_close(int fd)
> +
> +
> +/* used to spawn a monitord either on startup of a daemon container, or
> when
> + * lxc-monitor starts
> + */
> +int lxc_monitord_spawn(const char *lxcpath)
>  {
> -       return close(fd);
> +       pid_t pid1,pid2;
> +       int pipefd[2];
> +       char pipefd_str[10];
> +
> +       char * const args[] = {
> +               "/usr/bin/lxc-monitord",
> +               (char *)lxcpath,
> +               pipefd_str,
> +               NULL,
> +       };
> +
> +       /* double fork to avoid zombies when monitord exits */
> +       pid1 = fork();
> +       if (pid1 < 0) {
> +               SYSERROR("failed to fork");
> +               return -1;
> +       }
> +
> +       if (pid1) {
> +               waitpid(pid1, NULL, 0);
> +               return 0;
> +       }
> +
> +       if (pipe(pipefd) < 0) {
> +               SYSERROR("failed to create pipe");
> +               exit(EXIT_FAILURE);
> +       }
> +
> +       pid2 = fork();
> +       if (pid2) {
> +               char c;
> +               /* wait for daemon to create socket */
> +               close(pipefd[1]);
> +               /* sync with child, we're ignoring the return from read
> +                * because regardless if it works or not, either way we've
> +                * synced with the child process. the if-empty-statement
> +                * construct is to quiet the warn-unused-result warning.
> +                */
> +               if (read(pipefd[0], &c, 1)) ;
> +               close(pipefd[0]);
> +               exit(EXIT_SUCCESS);
> +       }
> +
> +       umask(0);
> +       if (setsid() < 0) {
> +               SYSERROR("failed to setsid");
> +               exit(EXIT_FAILURE);
> +       }
> +       close(0);
> +       close(1);
> +       close(2);
> +       open("/dev/null", O_RDONLY);
> +       open("/dev/null", O_RDWR);
> +       open("/dev/null", O_RDWR);
> +       close(pipefd[0]);
> +       sprintf(pipefd_str, "%d", pipefd[1]);
> +       execvp(args[0], args);
> +       exit(EXIT_FAILURE);
>  }
> diff --git a/src/lxc/monitor.h b/src/lxc/monitor.h
> index 8bef4c7..cd59ee8 100644
> --- a/src/lxc/monitor.h
> +++ b/src/lxc/monitor.h
> @@ -24,6 +24,9 @@
>  #define __monitor_h
>
>  #include <sys/param.h>
> +#include <sys/un.h>
> +
> +#include <lxc/conf.h>
>
>  typedef enum {
>         lxc_msg_state,
> @@ -32,11 +35,14 @@ typedef enum {
>
>  struct lxc_msg {
>         lxc_msg_type_t type;
> -       char name[MAXPATHLEN];
> +       char name[NAME_MAX+1];
>         int value;
>  };
>
> -void lxc_monitor_send_state(const char *name, lxc_state_t state,
> +extern int lxc_monitor_open(const char *lxcpath);
> +extern int lxc_monitor_sock_name(const char *lxcpath, struct sockaddr_un
> *addr);
> +extern void lxc_monitor_send_state(const char *name, lxc_state_t state,
>                             const char *lxcpath);
> +extern int lxc_monitord_spawn(const char *lxcpath);
>
>  #endif
> diff --git a/src/lxc/start.c b/src/lxc/start.c
> index 0a0cc40..fd96d4f 100644
> --- a/src/lxc/start.c
> +++ b/src/lxc/start.c
> @@ -390,7 +390,7 @@ int lxc_poll(const char *name, struct lxc_handler
> *handler)
>                 #endif
>         }
>
> -       return lxc_mainloop(&descr);
> +       return lxc_mainloop(&descr, -1);
>
>  out_mainloop_open:
>         lxc_mainloop_close(&descr);
> @@ -808,7 +808,7 @@ int lxc_spawn(struct lxc_handler *handler)
>         /* TODO - pass lxc.cgroup.dir (or user's pam cgroup) in for first
> argument */
>         if ((handler->cgroup = lxc_cgroup_path_create(NULL, name)) == NULL)
>                 goto out_delete_net;
> -
> +
>         if (lxc_cgroup_enter(handler->cgroup, handler->pid) < 0)
>                 goto out_delete_net;
>
> diff --git a/src/lxc/utils.h b/src/lxc/utils.h
> index 8954503..8e6a748 100644
> --- a/src/lxc/utils.h
> +++ b/src/lxc/utils.h
> @@ -32,4 +32,30 @@ extern int mkdir_p(const char *dir, mode_t mode);
>   */
>  extern const char *default_lxc_path(void);
>
> +/**
> + * BUILD_BUG_ON - break compile if a condition is true.
> + * @condition: the condition which the compiler should know is false.
> + *
> + * If you have some code which relies on certain constants being equal, or
> + * other compile-time-evaluated condition, you should use BUILD_BUG_ON to
> + * detect if someone changes it.
> + *
> + * The implementation uses gcc's reluctance to create a negative array,
> but
> + * gcc (as of 4.4) only emits that error for obvious cases (eg. not
> arguments
> + * to inline functions).  So as a fallback we use the optimizer; if it
> can't
> + * prove the condition is false, it will cause a link error on the
> undefined
> + * "__build_bug_on_failed".  This error message can be harder to track
> down
> + * though, hence the two different methods.
> + */
> +#ifndef __OPTIMIZE__
> +#define BUILD_BUG_ON(condition) ((void)sizeof(char[1 - 2*!!(condition)]))
> +#else
> +extern int __build_bug_on_failed;
> +#define BUILD_BUG_ON(condition)                                        \
> +       do {                                                    \
> +               ((void)sizeof(char[1 - 2*!!(condition)]));      \
> +               if (condition) __build_bug_on_failed = 1;       \
> +       } while(0)
> +#endif
> +
>  #endif
> --
> 1.8.1.4
>
>
Cheers,
-- 
S.Çağlar Onur <caglar at 10ur.org>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.linuxcontainers.org/pipermail/lxc-devel/attachments/20130422/4acf5830/attachment.html>


More information about the lxc-devel mailing list