Sine Nomine Associates (SNA) congratulates the OpenAFS project for establishing a legal entity, The OpenAFS Foundation, Inc., in order “to nurture and evolve the OpenAFS technology, to foster the OpenAFS community of experts, and to attract and increase the community of OpenAFS users” in the future.
Sine Nomine Associates engineers Mike Meffie and Andrew Deason were on the program of the October 16-18, 2012 European AFS and Kerberos Conference in Edinburgh, Scotland. Video of several of the talks are available from the web links below.
Sine Nomine Associates' engineers Andrew Deason, Tom Keiser, Steven Jenkins and Mike Meffie are scheduled to speak at AFS & Kerberos Best Practices Workshop 2010 May 24-28, 2010 at the University of Illinois at Urbana-Champaign.
Update: OpenAFS 1.4.12 release candidate 4 is now available.
The OpenAFS 1.4.12 release candidate 1 has been announced. The source code is available for download. This pre-release contains a large number of fixes since OpenAFS 1.4.11, including several critical fileserver and unix cache manager fixes.
Testing this pre-release in your environment will help improve the quality of the release. We can’t fix problems we don’t know about, so please report any errors to email@example.com and any positive results to the OpenAFS information mail list.
Several weeks ago I submitted an Internet Draft (I-D) to the afs3-standardizationAFS-3 protocol working group. This draft covers a number of interesting changes to the volume server RPC interface. The key proposals made in this draft are to:
- Introduce a GetCapabilities RPC, similar to the ones previously defined for the file server and cache manager services,
- Develop a solution to the XDR discriminated union discriminator evolution problem,
- Introduce a suite of RPCs to manage volume metadata via Tag-Length-Value (TLV) semantics,
- Export existing volume and volume transaction metadata via the new TLV interface, and
- Export Demand Attach File Server (DAFS) state metadata via the new TLV interface.
The primary motivation for this draft is the desire to introspect DAFS state via the standard remote procedure call interface. At the moment, the vos command can only report a boolean volume state of online/offline. For DAFS deployments, this is inadequate to properly manage a file server. Existing DAFS deployments utilize the fssync-debug command to determine the exact state of a volume. We have recognized for quite some time the need for a better (remote, and administrator–rather than developer–focused) introspection mechanism. With the advent of this draft, a considerably more descriptive set of states can be reported back to the caller.
Secondarily, this draft will pave the way for future protocol changes which permit vos to set advanced forms of volume policy, such as RxOSD-specific quotas, volume ACLs, etc.
The abstract for this draft is as follows:
AFS-3 heavily leverages Remote Procedure Calls (RPCs). This proposal adds a new mechanism to better manage the addition of new, enhancement-specific RPCs through the use of both capability bits via the GetCapabilities RPC, and via standardization of backwards-compatibility behaviors for enhancement-specific RPCs. These goals are accomplished through standardization of Tag-Length-Value (TLV) get/set/enumerate RPCs with value payloads encoded using an XDR discriminated union. The XDR union decode problem is circumvented by specifying an opaque default leg. Tags are allocated for existing volume and transaction metadata, and implementation-private tags are allocated for metadata related to the OpenAFS Demand Attach File Server.
Full text is available in the following formats: TXT, HTML, and XML.
Sine Nomine welcomes discussion of and feedback on this proposed Internet Draft over the afs3-standardization mailing list.
If you’re new to building the OpenAFS Windows client from source, getting your build machine properly configured can be a daunting task. The current process involves editing lines in a file named ntbuild.bat with things like the type of client to be built (32-bit, 64-bit, debug, etc) and the ‘8.3′ names of the paths to various installed products. If you have multiple build machines, you have multiple versions of this file.
Winafsbld is a set of batch files that replaces ntbuild.bat. Once all is said and done, it uses the same build mechanism as ntbuild.bat does but wraps it in a much more user-friendly environment. It does away with the need for the ‘8.3′ names and does a lot of parameter checking before it starts the build.
Winafsbld with instructions is available here as a zip file.
Here is a sample from the instructions:
Winafsbld.bat is executed from the same location as ntbuild.bat. It sets various configuration environment variables and calls batch files in the
No changes should be required in any of the files in the winafsbld directory.
Use Notepad (etc) to review winafsbld.bat. Options should be clear. (Note that a signing certificate is required for this release despite the options given.)
Open a console window and type ‘winafsbld’. If on Vista, open a console window with ‘Run as Administrator’ and navigate from the system directory to your build directory.
As currently implemented, the console window will turn blue to indicate a configuration error, red to indicate an error or green to indicate success.
Failures will spawn Notepad with the log file.
It is not a good idea to re-run Winafsbld.bat from the same console window as various environment variables will be modified each time the batch file is run. Close the console window and open a new one.
An old but critical bug in the unix version of the OpenAFS cache manager kernel module was recently fixed by Sine Nomine and was committed in the upstream stable code tree for inclusion in the next release of OpenAFS. This was quite an old bug. In fact, it has been present since OpenAFS 1.0, which makes it about ten years old.
The site reporting the bug had several hosts crash after removing a bogus IP address in their VLDB, which initially was quite baffling. As it turned out, a rare combination of events lead to a code path that exposed a race condition in the cache manager. In this case, the cache manager would crash when trying to use a pointer to memory which was freed and then reused on another thread.
This was triggered when the client noticed one of the fileserver network interfaces has a new address. At that point the cache manager invalidates the old address from all the cache entries for that server. The memory holding the server information is freed and is available for other uses in the cache manager.
The cache manager code which flushes vcache entries also accesses the server data members when flushing cache entries for read-only volumes. This is done to save the volume level callback information, since read-only volumes have callbacks for the entire volume, and not per individual files.
Now, there are a series of locks in the cache manager to prevent threads from walking over each other’s memory, but in this case, the locks were not used correctly in the code which was flushing the read-only cache entry. This code took a pointer to the memory holding the server information before the lock was held, a classic race condition. The fix was to make sure the pointer to the shared data member is used only after the mutual exclusion lock is held.
The patch is available in the OpenAFS git repository,
cm: address race condition in afs_QueueVCB
This is a conservative fix for the stable series. No new locks, or changes to locking order are introduced. However, longer term, we may want to revisit this part of the cache manager.
If you’ve ever administrated a sufficiently large and public AFS cell, you have probably at least once had a user assign rlidwka rights to system:anyuser on a directory. This can be a real security headache, particularly when web-accessible data is pulled directly from AFS. The only way currently to make sure that doesn’t happen is to revoke users’ admin rights, but then you lose the convenience and flexibility of users maintaining permissions themselves.Arguably, this problem can be solved by user education and performing audits of ACL rights, but that isn’t always enough.