Table of Contents

About

One of the problems on Linux is to determine whether a remote filesystem such as NFS or SAMBA has actually gone stale and/or accessing the mount point will result in a very annoying timeout that will make processes hang. Typically, one symptom is just using the console to change directory into the folder with the remote mount, at which point the console hangs annoyingly and does not recover until it is terminated forcibly. With NFS, the hang can be mitigated using soft instead of hard as parameter on the NFS mount, however the problem is still not resolved and there should be a safe way to check whether a mount point is still alive without making the accessing processes hang.

waitmax

waitmax is a utility from Checkmk, a service monitor similar to Unix and instructions for NFS state that waitmax should be called with stat -f in order to check an NFS mountpoint.

However, in order to use waitmax with something like monit, the waitmax program can be expanded upon in order to make the output more flexible. For example, it is clear that the user will not care about the specific output of stat -f and that the return code from the shell accessed via $? is what will be checked in a shell script, such that the waitmax program can be adjusted to suppress the output of the child and to only print out the success status.

// Copyright (C) 2019 Checkmk GmbH - License: GNU General Public License v2
// Copyright (C) 2024 Wizardry and Steamorks
// This file is part of Checkmk (https://checkmk.com). It is subject to the terms and
// conditions defined in the file COPYING, which is part of this source code package.
 
#include <stdio.h>
#include <errno.h>
#include <getopt.h>
#include <signal.h>
#include <stddef.h>
#include <stdlib.h>
#include <string.h>
#include <sys/wait.h>
#include <unistd.h>
 
static pid_t g_pid = 0;
static int g_timeout = 0;
static int g_signum = SIGTERM;
static int quiet = 0;
static int code = 0;
 
static void out(const char *buf) {
    size_t bytes_to_write = strlen(buf);
    while (bytes_to_write > 0) {
        ssize_t written = write(STDERR_FILENO, buf, bytes_to_write);
        if (written == -1) {
            if (errno == EINTR) continue;
            return;
        }
        buf += written;
        bytes_to_write -= written;
    }
}
 
static void exit_with(const char *message, int err, int status) {
    out(message);
    if (err != 0) {
        out(": ");
        out(strerror(errno));
    }
    out("\n");
    exit(status);
}
 
static void version() {
    exit_with(
        "waitmax version 1.1\n"
        "Copyright Mathias Kettner 2008 and Wizardry and Steamworks 2024\n"
        "This is free software; see the source for copying conditions.  "
        "There is NO\n"
        "warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR "
        "PURPOSE.",
        0, 0);
}
 
static void usage(int status) {
    exit_with(
        "Usage: waitmax [-s SIGNUM] MAXTIME PROGRAM [ARGS...]\n"
        "\n"
        "Execute PROGRAM as a subprocess. If PROGRAM does not exit before "
        "MAXTIME\n"
        "seconds, it will be killed with SIGTERM or an alternative signal.\n"
        "\n"
        "   -s, --signal SIGNUM   kill with SIGNUM on timeout\n"
        "   -h, --help            this help\n"
        "   -c, --code            only print exit status of child program\n"
        "   -q, --quiet           suppress all PROGRAM output\n"
        "   -V, --version         show version an exit\n",
        0, status);
}
 
static void kill_group(pid_t pid, int signum) {
    /* The child might have become a process group leader itself, so send the
       signal directly to it. */
    kill(pid, signum);
 
    /* Guard against harakiri... */
    signal(signum, SIG_IGN);
 
    /* Send the signal to all processes in our fresh process group. */
    kill(0, signum);
}
 
static void signalhandler(int signum) {
    if (signum == SIGALRM) {
        /* The child took too long, so remember that we timed out and send the
           configured signal instead of SIGALRM. */
        g_timeout = 1;
        signum = g_signum;
    }
 
    /* Are we the child process or has the child not been execvp'd yet? */
    if (g_pid == 0) exit(signum + 128);
 
    /* Send the configure signal to our process group. */
    kill_group(g_pid, signum);
 
    /* Make sure the children actually react on the signal. */
    if (signum != SIGKILL && signum != SIGCONT) kill_group(g_pid, SIGCONT);
}
 
static void setup_signal_handlers() {
    struct sigaction sa;
    sigemptyset(&sa.sa_mask);
    sa.sa_handler = signalhandler;
    sa.sa_flags = SA_RESTART; /* just to be sure... */
    sigaction(g_signum, &sa, NULL);
    sigaction(SIGALRM, &sa, NULL);
    sigaction(SIGHUP, &sa, NULL);
    sigaction(SIGINT, &sa, NULL);
    sigaction(SIGQUIT, &sa, NULL);
    sigaction(SIGTERM, &sa, NULL);
 
    /* Guard against a background child doing I/O on the tty. */
    sa.sa_handler = SIG_IGN;
    sigaction(SIGTTIN, &sa, NULL);
    sigaction(SIGTTOU, &sa, NULL);
 
    /* Make sure that waitpid won't fail. */
    sa.sa_handler = SIG_DFL;
    sigaction(SIGCHLD, &sa, NULL);
}
 
static void unblock_signal(int signum) {
    sigset_t signals_to_unblock;
    sigemptyset(&signals_to_unblock);
    sigaddset(&signals_to_unblock, signum);
    if (sigprocmask(SIG_UNBLOCK, &signals_to_unblock, NULL) == -1)
        exit_with("sigprocmask failed", errno, 1);
}
 
static struct option long_options[] = {{"version", no_argument, 0, 'V'},
                                       {"code", no_argument, 0, 'c'},
                                       {"quiet", no_argument, 0, 'q'},
                                       {"help", no_argument, 0, 'h'},
                                       {"signal", required_argument, 0, 's'},
                                       {0, 0, 0, 0}};
 
int main(int argc, char **argv) {
    /* Note: setenv calls malloc, and 'diet' warns about that. */
    if (getenv("POSIXLY_CORRECT") == NULL) putenv("POSIXLY_CORRECT=true");
    int ret;
    while ((ret = getopt_long(argc, argv, "Vqchs:", long_options, NULL)) != -1) {
        switch (ret) {
            case 'V':
                version();
                break;
 
            case 'h':
                usage(0);
                break;
 
            case 's':
                g_signum = atoi(optarg);
                if (g_signum < 1 || g_signum > 32)
                    exit_with("Signalnumber must be between 1 and 32.", 0, 1);
                break;
 
            case 'c':
                code = 1;
            case 'q':
                quiet = 1;
                break;
 
            default:
                usage(1);
                break;
        }
    }
 
    if (optind + 1 >= argc) usage(1);
 
    int maxtime = atoi(argv[optind]);
    if (maxtime <= 0) usage(1);
 
    /* Create a new process group with ourselves as the process group
       leader. This way we can send a signal to all subprocesses later (unless
       some non-direct descendant creates its own process group). Doing this in
       the parent process already simplifies things, because we don't have to
       worry about foreground/background groups then. */
    setpgid(0, 0);
 
    /* Setting up signal handlers before forking avoids race conditions with the
       child. */
    setup_signal_handlers();
 
    g_pid = fork();
    if (g_pid == -1) exit_with("fork() failed", errno, 1);
 
    if (g_pid == 0) {
        /* Restore tty behavior in the child. */
        struct sigaction sa;
        sigemptyset(&sa.sa_mask);
        sa.sa_flags = SA_RESTART; /* just to be sure... */
        sa.sa_handler = SIG_DFL;
        sigaction(SIGTTIN, &sa, NULL);
        sigaction(SIGTTOU, &sa, NULL);
 
        /* Suppress output. */
        if(quiet) {
            FILE *out = fopen("/dev/null", "w"); //to unix
            if(!out) {
                /* Windows */
                out = fopen("NUL", "w");
            }
            dup2(fileno(out), STDOUT_FILENO);
            dup2(fileno(out), STDERR_FILENO);
            fclose(out);
        }
 
        execvp(argv[optind + 1], argv + optind + 1);
        exit_with(argv[optind + 1], errno, 253);
    }
 
    /* Make sure SIGALRM is not blocked (e.g. by parent). */
    unblock_signal(SIGALRM);
    alarm(maxtime);
 
    int status;
    while (waitpid(g_pid, &status, 0) == -1) {
        if (errno != EINTR) exit_with("waitpid() failed", errno, 1);
    }
 
    if(code) {
        printf("%d\n", status);
    }
 
    if (WIFEXITED(status)) return WEXITSTATUS(status);
    if (WIFSIGNALED(status)) return g_timeout ? 255 : 128 + WTERMSIG(status);
    exit_with("Program did neither exit nor was signalled.", 0, 254);
    return 0; /* Make GCC happy. */
}

The program above can be saved to a file and compiled with the GNU C compiler gcc:

gcc waitmax.c -o waitmax

The program should then be copied to /usr/local/bin/waitmax to respect the FSH, from where it will be executed with the following parameters in order to determine whether a specific remote filesystem mountpoint is still alive:

waitmax -c -s 9 10 stat -f /mnt/storage

where:

  • -c is a parameter (implying also -q) that has been added by Wizardry and Steamworks in order to both suppress the output and to only print out the error message from stat

Monit

A monit template can then be written to check the filesystems and it would look like this:

###########################################################################
##  Copyright (C) Wizardry and Steamworks 2024 - License: GNU GPLv3      ##
###########################################################################
# meant to check whether remote filesystems are accessible                #
# https://grimore.org/linux/check_remote_filesystem_mounts_for_timeout    #
###########################################################################

check program a_mount with path "/usr/local/bin/waitmax -c -s 9 10 stat -f /mnt/a/"
   if content != "0" for 5 cycles then exec "/usr/sbin/reboot"

check program b_mount with path "/usr/local/bin/waitmax -c -s 9 10 stat -f /mnt/b/"
   if content != "0" for 5 cycles then exec "/usr/sbin/reboot"

linux/check_remote_filesystem_mounts_for_timeout.txt ยท Last modified: 2024/09/27 23:44 by office

Access website using Tor Access website using i2p Wizardry and Steamworks PGP Key


For the contact, copyright, license, warranty and privacy terms for the usage of this website please see the contact, license, privacy, copyright.