public inbox for passt-dev@passt.top
 help / color / mirror / code / Atom feed
From: Paul Holzinger <pholzing@redhat.com>
To: David Gibson <david@gibson.dropbear.id.au>
Cc: Stefano Brivio <sbrivio@redhat.com>, passt-dev@passt.top
Subject: Re: [PATCH 2/2] pasta: Clean up waiting pasta child on failures
Date: Thu, 11 Dec 2025 14:49:50 +0100	[thread overview]
Message-ID: <3151ef6f-c170-4d83-b562-8785f7fb5c67@redhat.com> (raw)
In-Reply-To: <aToGChfQfUIcidNd@zatzit>


On 11/12/2025 00:45, David Gibson wrote:
> On Wed, Dec 10, 2025 at 01:05:10PM +0100, Paul Holzinger wrote:
>> On 10/12/2025 06:15, David Gibson wrote:
>>> When pasta is invoked with a command rather than an existing namespace to
>>> attach to, it spawns a child process to run a shell or other command.  We
>>> create that process during conf(), since we need the namespace to exist for
>>> much of our setup.  However, we don't want the specified command to run
>>> until the pasta network interface is ready for use.  Therefore,
>>> pasta_spawn_cmd() executing in the child waits before exec()ing.  main()
>>> signals the child to continue with SIGUSR1 shortly before entering the
>>> main forwarding loop.
>>>
>>> This has the downside that if we exit due to any kind of failure between
>>> conf() and the SIGUSR1, the child process will be around waiting
>>> indefinitely.  The user must manually clean this up.
>>>
>>> Make this cleaner, by having passt_exit() terminate the child, when called
>>> during this window.
>>>
>>> Signed-off-by: David Gibson <david@gibson.dropbear.id.au>
>>> ---
>>>    passt.c | 1 +
>>>    pasta.c | 2 ++
>>>    pasta.h | 1 +
>>>    util.c  | 5 +++++
>>>    4 files changed, 9 insertions(+)
>>>
>>> diff --git a/passt.c b/passt.c
>>> index cf38822f..955c7091 100644
>>> --- a/passt.c
>>> +++ b/passt.c
>>> @@ -431,6 +431,7 @@ int main(int argc, char **argv)
>>>    	if (pasta_child_pid) {
>>>    		kill(pasta_child_pid, SIGUSR1);
>>>    		log_stderr = false;
>>> +		pasta_child_signalled = true;
>>>    	}
>>>    	isolate_postfork(&c);
>>> diff --git a/pasta.c b/pasta.c
>>> index 5c693de1..8ac4511f 100644
>>> --- a/pasta.c
>>> +++ b/pasta.c
>>> @@ -54,6 +54,8 @@
>>>    /* PID of child, in case we created a namespace */
>>>    int pasta_child_pid;
>>> +/* Has the child been signalled to start a shell or command */
>>> +bool pasta_child_signalled;
>>>    /**
>>>     * pasta_child_handler() - Exit once shell exits (if we started it), reap clones
>>> diff --git a/pasta.h b/pasta.h
>>> index 4b063d13..55028c74 100644
>>> --- a/pasta.h
>>> +++ b/pasta.h
>>> @@ -7,6 +7,7 @@
>>>    #define PASTA_H
>>>    extern int pasta_child_pid;
>>> +extern bool pasta_child_signalled;
>>>    void pasta_open_ns(struct ctx *c, const char *netns);
>>>    void pasta_start_ns(struct ctx *c, uid_t uid, gid_t gid,
>>> diff --git a/util.c b/util.c
>>> index e266c396..4744f09e 100644
>>> --- a/util.c
>>> +++ b/util.c
>>> @@ -35,6 +35,7 @@
>>>    #include "log.h"
>>>    #include "pcap.h"
>>>    #include "epoll_ctl.h"
>>> +#include "pasta.h"
>>>    #ifdef HAS_GETRANDOM
>>>    #include <sys/random.h>
>>>    #endif
>>> @@ -1235,6 +1236,10 @@ void abort_with_msg(const char *fmt, ...)
>>>     */
>>>    void passt_exit(int status)
>>>    {
>>> +	/* If we're starting our own namespace, don't leave it in limbo */
>>> +	if (pasta_child_pid && !pasta_child_signalled)
>>> +		kill(pasta_child_pid, SIGTERM);
>> Any reason not to use SIGKILL? Then there is no doubt if it might be ignored
>> or not.
> Eh, only that some log might show KILLs on the assumption that they
> indicate a bad thing happening, which isn't really the case here.
>
>> Another thing I assume the goal here is to only kill the process if we
>> didn't exec yet.
> Yes, that was the goal.
>
>> I wonder how much value there is to have the child process
>> outlive pasta.
> That's a good question, and I don't have a strong opinion either way.
> I leant this way based on two factors:
>
>   - If this happens later, once the child is established, it's possible
>     the user could have started running something there that remains
>     valuable even if it loses its network
>
>   - If pasta dies once the child has exec()ed, the symptoms are both
>     more obvious and easier to clean up: the shell (or whatever) is
>     right there, running, and can be exited in the normal way
>     (e.g. running to completion or ^C).  Before the exec() this leaves
>     a process running non-obviously which has to be spotted and killed
>     explicitly by the user.
>
> (also note that if we do kill the child after exec(), we definitely
> want to use SIGTERM not SIGKILL to allow it to clean up gracefully).

sure, I agree though there is bit of a common issue here. The process is 
in a new pid namespace so it acts as pid 1. That means unless the 
process adds a signal handler explicitly a signal like SIGTERM will get 
ignored by default. When running `sleep` as pid 1 it will ignore SIGTERM 
and you must kill it. We see that all the time with podman containers.

>
>> I feel like using something like PR_SET_PDEATHSIG might be a
>> safer option in case pasta crashes without going through passt_exit.
> Oh, good idea.  I forgot PR_SET_PDEATHSIG was a thing.
>
>> And if
>> you don't want to propagate that into the user command we could unset it
>> right again before the exec as well.
>>
>>> +
>>>    	/* Make sure we don't leave the pcap file truncated */
>>>    	if (pcap_fd != -1 && fsync(pcap_fd))
>>>    		warn_perror("Failed to flush pcap file, it might be truncated");
>> -- 
>> Paul Holzinger
>>
-- 
Paul Holzinger


  reply	other threads:[~2025-12-11 13:49 UTC|newest]

Thread overview: 9+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-12-10  5:15 [PATCH 0/2] Improved exit()/_exit() handling David Gibson
2025-12-10  5:15 ` [PATCH 1/2] treewide: Introduce passt_exit() helper David Gibson
2025-12-10 16:18   ` Stefano Brivio
2025-12-10 23:32     ` David Gibson
2025-12-10  5:15 ` [PATCH 2/2] pasta: Clean up waiting pasta child on failures David Gibson
2025-12-10 12:05   ` Paul Holzinger
2025-12-10 23:45     ` David Gibson
2025-12-11 13:49       ` Paul Holzinger [this message]
2025-12-12  2:32         ` David Gibson

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=3151ef6f-c170-4d83-b562-8785f7fb5c67@redhat.com \
    --to=pholzing@redhat.com \
    --cc=david@gibson.dropbear.id.au \
    --cc=passt-dev@passt.top \
    --cc=sbrivio@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this public inbox

	https://passt.top/passt

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for IMAP folder(s).