From: Christian Brauner Date: Fri, 25 Nov 2016 16:28:18 +0000 (+0100) Subject: log: fix race X-Git-Tag: lxc-2.1.0~250^2~1 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=0dcdbf8a67534897275795edddd5550993ecc003;p=thirdparty%2Flxc.git log: fix race localtime_r() can lead to deadlocks because it calls __tzset() and __tzconvert() internally. The deadlock stems from an interaction between these functions and the functions in monitor.c and commands.{c,h}. The latter functions will write to the log independent of the container thread that is currently running. Since the monitor fork()ed it seems to duplicate the mutex states of the time functions mentioned above causing the deadlock. As a short termm fix, I suggest to simply disable receiving the time when monitor.c or command.{c,h} functions are called. This should be ok, since the [lxc monitor] will only emit a few messages and thread-safety is currently more important than beautiful logs. The rest of the log stays the same as it was before. Here is an example output from logs where I printed the pid and tid of the process that is currently writing to the log: lxc 20161125170200.619 INFO lxc_start: 18695-18695: - start.c:lxc_check_inherited:243 - Closed inherited fd: 23. lxc 20161125170200.640 DEBUG lxc_start: 18677-18677: - start.c:__lxc_start:1334 - Not dropping CAP_SYS_BOOT or watching utmp. lxc 20161125170200.640 INFO lxc_cgroup: 18677-18677: - cgroups/cgroup.c:cgroup_init:68 - cgroup driver cgroupfs-ng initing for lxc-test-concurrent-0 ----------> lxc 20150427012246.000 INFO lxc_monitor: 13017-18622: - monitor.c:lxc_monitor_sock_name:178 - using monitor sock name lxc/ad055575fe28ddd5//var/lib/lxc lxc 20161125170200.662 DEBUG lxc_cgfsng: 18677-18677: - cgroups/cgfsng.c:filter_and_set_cpus:478 - No isolated cpus detected. lxc 20161125170200.662 DEBUG lxc_cgfsng: 18677-18677: - cgroups/cgfsng.c:handle_cpuset_hierarchy:648 - "cgroup.clone_children" was already set to "1". Signed-off-by: Christian Brauner --- diff --git a/src/lxc/log.c b/src/lxc/log.c index 7b89aada9..c2400197a 100644 --- a/src/lxc/log.c +++ b/src/lxc/log.c @@ -155,7 +155,7 @@ static int log_append_logfile(const struct lxc_log_appender *appender, char buffer[LXC_LOG_BUFFER_SIZE]; struct tm newtime; int n; - int ms; + int ms = 0; int fd_to_use = -1; #ifndef NO_LXC_CONF @@ -169,11 +169,25 @@ static int log_append_logfile(const struct lxc_log_appender *appender, if (fd_to_use == -1) return 0; - if (!localtime_r(&event->timestamp.tv_sec, &newtime)) - return 0; - - strftime(date, sizeof(date), "%Y%m%d%H%M%S", &newtime); - ms = event->timestamp.tv_usec / 1000; + /* localtime_r() can lead to deadlocks because it calls __tzset() and + * __tzconvert() internally. The deadlock stems from an interaction + * between these functions and the functions in monitor.c and + * commands.{c,h}. The latter functions will write to the log + * independent of the container thread that is currently running. Since + * the monitor fork()ed it seems to duplicate the mutex states of the + * time functions mentioned above. + * As a short termm fix, I suggest to simply disable receiving the time + * when monitor.c or command.{c,h} functions are called. This should be + * ok, since the [lxc monitor] will only emit a few messages and + * thread-safety is currently more important than beautiful logs. The + * rest of the log stays the same as it was before. + */ + if (getpid() == gettid()) { + if (!localtime_r(&event->timestamp.tv_sec, &newtime)) + return 0; + strftime(date, sizeof(date), "%Y%m%d%H%M%S", &newtime); + ms = event->timestamp.tv_usec / 1000; + } n = snprintf(buffer, sizeof(buffer), "%15s%s%s %10s.%03d %-8s %s - %s:%s:%d - ", log_prefix, @@ -190,13 +204,9 @@ static int log_append_logfile(const struct lxc_log_appender *appender, return n; if (n < sizeof(buffer) - 1) - n += vsnprintf(buffer + n, sizeof(buffer) - n, event->fmt, - *event->vap); - else { - WARN("truncated next event from %d to %zd bytes", n, - sizeof(buffer)); + n += vsnprintf(buffer + n, sizeof(buffer) - n, event->fmt, *event->vap); + else n = sizeof(buffer) - 1; - } buffer[n] = '\n';