Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 20 Mar 2015 11:18:27 +0530
From:      Prasad Joshi <prasadjoshi.linux@gmail.com>
To:        Tiwei Bie <btw@mail.ustc.edu.cn>
Cc:        Konstantin Belousov <kostikbel@gmail.com>, freebsd-hackers@freebsd.org, mjguzik@gmail.com
Subject:   Re: [PATCH] Finish the task 'Fix corefilename race'
Message-ID:  <CALJbWeotyhiGVkruF-mpPNM0DBSZt9bjD4RdhZZrzv-3jwP0ag@mail.gmail.com>
In-Reply-To: <20150320000418.GA78913@freebsd>
References:  <1426749223-18118-1-git-send-email-btw@mail.ustc.edu.cn> <20150319101019.GZ2379@kib.kiev.ua> <20150319113530.GA33176@freebsd> <20150319144004.GD2379@kib.kiev.ua> <20150320000418.GA78913@freebsd>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, Mar 20, 2015 at 5:34 AM, Tiwei Bie <btw@mail.ustc.edu.cn> wrote:
> On Thu, Mar 19, 2015 at 04:40:04PM +0200, Konstantin Belousov wrote:
>> On Thu, Mar 19, 2015 at 07:35:30PM +0800, Tiwei Bie wrote:
>> > On Thu, Mar 19, 2015 at 12:10:19PM +0200, Konstantin Belousov wrote:
>> > > On Thu, Mar 19, 2015 at 03:13:43PM +0800, Tiwei Bie wrote:
>> > > > Hi, Mateusz!
>> > > >
>> > > > I have finished the task: Fix corefilename race [1].
>> > > >
>> > > > Following is my patch:
>> > > >
>> > > > ---
>> > > >  sys/kern/kern_sig.c | 22 ++++++++++++++++++++--
>> > > >  1 file changed, 20 insertions(+), 2 deletions(-)
>> > > >
>> > > > diff --git a/sys/kern/kern_sig.c b/sys/kern/kern_sig.c
>> > > > index 58d9707..a1421cb 100644
>> > > > --- a/sys/kern/kern_sig.c
>> > > > +++ b/sys/kern/kern_sig.c
>> > > > @@ -3090,8 +3090,24 @@ static int compress_user_cores = 0;
>> > > >  #endif
>> > > >
>> > > >  static char corefilename[MAXPATHLEN] = {"%N.core"};
>> > > > -SYSCTL_STRING(_kern, OID_AUTO, corefile, CTLFLAG_RWTUN, corefilename,
>> > > > -    sizeof(corefilename), "Process corefile name format string");
>> > > > +
>> > > > +static struct sx corefilename_lock;
>> > > > +SX_SYSINIT(corefilename_init, &corefilename_lock, "corefilename lock");
>> > > > +
>> > > > +static int
>> > > > +sysctl_kern_corefile(SYSCTL_HANDLER_ARGS)
>> > > > +{
>> > > > +       int error;
>> > > > +
>> > > > +       sx_xlock(&corefilename_lock);
>> > > > +       error = sysctl_handle_string(oidp, corefilename, MAXPATHLEN, req);

Hello,

Though I am not an expert FreeBSD developer. In my humble opinion,
MAXPATHLEN must be replaced with sizeof(corefilename). For example,
the SYSCTL_STRING line (above) removed in this patch, preferred to use
sizeof(corefilename) instead of MAXPATHLEN.

Thanks and Regards,
Prasad

>> > > > +       sx_xunlock(&corefilename_lock);
>> > > > +
>> > > > +       return (error);
>> > > > +}
>> > > > +SYSCTL_PROC(_kern, OID_AUTO, corefile, CTLTYPE_STRING | CTLFLAG_RWTUN |
>> > > > +    CTLFLAG_MPSAFE, 0, 0, sysctl_kern_corefile, "A",
>> > > > +    "Process corefile name format string");
>> > > >
>> > > >  /*
>> > > >   * corefile_open(comm, uid, pid, td, compress, vpp, namep)
>> > > > @@ -3120,6 +3136,7 @@ corefile_open(const char *comm, uid_t uid, pid_t pid, struct thread *td,
>> > > >         name = malloc(MAXPATHLEN, M_TEMP, M_WAITOK | M_ZERO);
>> > > >         indexpos = -1;
>> > > >         (void)sbuf_new(&sb, name, MAXPATHLEN, SBUF_FIXEDLEN);
>> > > > +       sx_slock(&corefilename_lock);
>> > > >         for (i = 0; format[i] != '\0'; i++) {
>> > > >                 switch (format[i]) {
>> > > >                 case '%':       /* Format character */
>> > > > @@ -3162,6 +3179,7 @@ corefile_open(const char *comm, uid_t uid, pid_t pid, struct thread *td,
>> > > >                         break;
>> > > >                 }
>> > > >         }
>> > > > +       sx_sunlock(&corefilename_lock);
>> > > >         free(hostname, M_TEMP);
>> > > >         if (compress)
>> > > >                 sbuf_printf(&sb, GZ_SUFFIX);
>> > >
>> > > So the race is between somebody setting the core path string and another
>> > > process coredumping, am I right ?
>> > >
>> >
>> > Yeah, you are right!
>> >
>> > > If you, could you try to reuse some existing lock for the task ? It is a
>> > > waste to have sx dedicated to the task, which is probably never used by
>> > > 99% of the machines in the world.
>> >
>> > Yeah, of course. After a quick `grep'ing, I found the sx lock: allprison_lock,
>> > which is defined in kern/kern_jail.c. It is rarely acquired as an exclusive
>> > lock, and is not defined as a static variable. So I think it will be a good
>> > candidate for this task.
>>
>> I think it is too quick grepping.  allprison_lock is completely unrelated
>> to the process management.  Please consider to utilize some lock used
>> for the process management.
>
> Well, this time I found allproc_lock (defined in kern/kern_proc.c), which
> is used to protect the process list. I think it may be a better choice.
>
> Here is the new patch:
>
> ---
>  sys/kern/kern_sig.c | 24 ++++++++++++++++++++++--
>  1 file changed, 22 insertions(+), 2 deletions(-)
>
> diff --git a/sys/kern/kern_sig.c b/sys/kern/kern_sig.c
> index 58d9707..cac2ea0 100644
> --- a/sys/kern/kern_sig.c
> +++ b/sys/kern/kern_sig.c
> @@ -3089,9 +3089,27 @@ SYSCTL_INT(_kern, OID_AUTO, compress_user_cores_gzlevel, CTLFLAG_RWTUN,
>  static int compress_user_cores = 0;
>  #endif
>
> +/*
> + * Protect the access to corefilename[] by allproc_lock.
> + */
> +#define        corefilename_lock       allproc_lock
> +
>  static char corefilename[MAXPATHLEN] = {"%N.core"};
> -SYSCTL_STRING(_kern, OID_AUTO, corefile, CTLFLAG_RWTUN, corefilename,
> -    sizeof(corefilename), "Process corefile name format string");
> +
> +static int
> +sysctl_kern_corefile(SYSCTL_HANDLER_ARGS)
> +{
> +       int error;
> +
> +       sx_xlock(&corefilename_lock);
> +       error = sysctl_handle_string(oidp, corefilename, MAXPATHLEN, req);
> +       sx_xunlock(&corefilename_lock);
> +
> +       return (error);
> +}
> +SYSCTL_PROC(_kern, OID_AUTO, corefile, CTLTYPE_STRING | CTLFLAG_RWTUN |
> +    CTLFLAG_MPSAFE, 0, 0, sysctl_kern_corefile, "A",
> +    "Process corefile name format string");
>
>  /*
>   * corefile_open(comm, uid, pid, td, compress, vpp, namep)
> @@ -3120,6 +3138,7 @@ corefile_open(const char *comm, uid_t uid, pid_t pid, struct thread *td,
>         name = malloc(MAXPATHLEN, M_TEMP, M_WAITOK | M_ZERO);
>         indexpos = -1;
>         (void)sbuf_new(&sb, name, MAXPATHLEN, SBUF_FIXEDLEN);
> +       sx_slock(&corefilename_lock);
>         for (i = 0; format[i] != '\0'; i++) {
>                 switch (format[i]) {
>                 case '%':       /* Format character */
> @@ -3162,6 +3181,7 @@ corefile_open(const char *comm, uid_t uid, pid_t pid, struct thread *td,
>                         break;
>                 }
>         }
> +       sx_sunlock(&corefilename_lock);
>         free(hostname, M_TEMP);
>         if (compress)
>                 sbuf_printf(&sb, GZ_SUFFIX);
> --
> 2.1.2
>
> Best regards,
> Tiwei Bie
>
> _______________________________________________
> freebsd-hackers@freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-hackers
> To unsubscribe, send any mail to "freebsd-hackers-unsubscribe@freebsd.org"



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CALJbWeotyhiGVkruF-mpPNM0DBSZt9bjD4RdhZZrzv-3jwP0ag>