]>
Commit | Line | Data |
---|---|---|
a54d5262 DW |
1 | /* |
2 | * mdmon - monitor external metadata arrays | |
3 | * | |
e736b623 N |
4 | * Copyright (C) 2007-2009 Neil Brown <neilb@suse.de> |
5 | * Copyright (C) 2007-2009 Intel Corporation | |
a54d5262 DW |
6 | * |
7 | * This program is free software; you can redistribute it and/or modify it | |
8 | * under the terms and conditions of the GNU General Public License, | |
9 | * version 2, as published by the Free Software Foundation. | |
10 | * | |
11 | * This program is distributed in the hope it will be useful, but WITHOUT | |
12 | * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or | |
13 | * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for | |
14 | * more details. | |
15 | * | |
16 | * You should have received a copy of the GNU General Public License along with | |
17 | * this program; if not, write to the Free Software Foundation, Inc., | |
18 | * 51 Franklin St - Fifth Floor, Boston, MA 02110-1301 USA. | |
19 | */ | |
549e9569 NB |
20 | |
21 | /* | |
22 | * md array manager. | |
23 | * When md arrays have user-space managed metadata, this is the program | |
24 | * that does the managing. | |
25 | * | |
26 | * Given one argument: the name of the array (e.g. /dev/md0) that is | |
27 | * the container. | |
28 | * We fork off a helper that runs high priority and mlocked. It responds to | |
29 | * device failures and other events that might stop writeout, or that are | |
30 | * trivial to deal with. | |
31 | * The main thread then watches for new arrays being created in the container | |
32 | * and starts monitoring them too ... along with a few other tasks. | |
33 | * | |
34 | * The main thread communicates with the priority thread by writing over | |
35 | * a pipe. | |
36 | * Separate programs can communicate with the main thread via Unix-domain | |
37 | * socket. | |
38 | * The two threads share address space and open file table. | |
39 | * | |
40 | */ | |
41 | ||
42 | #ifndef _GNU_SOURCE | |
43 | #define _GNU_SOURCE | |
44 | #endif | |
45 | ||
46 | #include <unistd.h> | |
47 | #include <stdlib.h> | |
4d43913c | 48 | #include <sys/types.h> |
549e9569 NB |
49 | #include <sys/stat.h> |
50 | #include <sys/socket.h> | |
51 | #include <sys/un.h> | |
52 | #include <sys/mman.h> | |
4d43913c | 53 | #include <sys/syscall.h> |
9fe32043 | 54 | #include <sys/wait.h> |
549e9569 NB |
55 | #include <stdio.h> |
56 | #include <errno.h> | |
57 | #include <string.h> | |
58 | #include <fcntl.h> | |
13047e4c | 59 | #include <dirent.h> |
f4190c2f DW |
60 | #ifdef USE_PTHREADS |
61 | #include <pthread.h> | |
62 | #else | |
549e9569 | 63 | #include <sched.h> |
f4190c2f | 64 | #endif |
549e9569 NB |
65 | |
66 | #include "mdadm.h" | |
67 | #include "mdmon.h" | |
68 | ||
d56dd607 PB |
69 | char const Name[] = "mdmon"; |
70 | ||
549e9569 NB |
71 | struct active_array *discard_this; |
72 | struct active_array *pending_discard; | |
4d43913c NB |
73 | |
74 | int mon_tid, mgr_tid; | |
549e9569 | 75 | |
6144ed44 DW |
76 | int sigterm; |
77 | ||
f4190c2f DW |
78 | #ifdef USE_PTHREADS |
79 | static void *run_child(void *v) | |
80 | { | |
81 | struct supertype *c = v; | |
82 | ||
83 | mon_tid = syscall(SYS_gettid); | |
84 | do_monitor(c); | |
85 | return 0; | |
86 | } | |
87 | ||
88 | static int clone_monitor(struct supertype *container) | |
89 | { | |
90 | pthread_attr_t attr; | |
91 | pthread_t thread; | |
92 | int rc; | |
93 | ||
94 | mon_tid = -1; | |
95 | pthread_attr_init(&attr); | |
96 | pthread_attr_setstacksize(&attr, 4096); | |
97 | pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED); | |
98 | rc = pthread_create(&thread, &attr, run_child, container); | |
99 | if (rc) | |
100 | return rc; | |
101 | while (mon_tid == -1) | |
239b3cc0 | 102 | sleep_for(0, USEC_TO_NSEC(10), true); |
f4190c2f DW |
103 | pthread_attr_destroy(&attr); |
104 | ||
105 | mgr_tid = syscall(SYS_gettid); | |
106 | ||
107 | return mon_tid; | |
108 | } | |
109 | #else /* USE_PTHREADS */ | |
110 | static int run_child(void *v) | |
549e9569 NB |
111 | { |
112 | struct supertype *c = v; | |
1ed3f387 | 113 | |
549e9569 NB |
114 | do_monitor(c); |
115 | return 0; | |
116 | } | |
117 | ||
97f734fd N |
118 | #ifdef __ia64__ |
119 | int __clone2(int (*fn)(void *), | |
120 | void *child_stack_base, size_t stack_size, | |
121 | int flags, void *arg, ... | |
122 | /* pid_t *pid, struct user_desc *tls, pid_t *ctid */ ); | |
123 | #endif | |
f4190c2f | 124 | static int clone_monitor(struct supertype *container) |
549e9569 | 125 | { |
549e9569 | 126 | static char stack[4096]; |
549e9569 | 127 | |
97f734fd N |
128 | #ifdef __ia64__ |
129 | mon_tid = __clone2(run_child, stack, sizeof(stack), | |
130 | CLONE_FS|CLONE_FILES|CLONE_VM|CLONE_SIGHAND|CLONE_THREAD, | |
131 | container); | |
132 | #else | |
2cc98f9e | 133 | mon_tid = clone(run_child, stack+4096-64, |
549e9569 NB |
134 | CLONE_FS|CLONE_FILES|CLONE_VM|CLONE_SIGHAND|CLONE_THREAD, |
135 | container); | |
97f734fd | 136 | #endif |
3e70c845 | 137 | |
4d43913c | 138 | mgr_tid = syscall(SYS_gettid); |
2cc98f9e DW |
139 | |
140 | return mon_tid; | |
549e9569 | 141 | } |
f4190c2f | 142 | #endif /* USE_PTHREADS */ |
549e9569 | 143 | |
fa716c83 | 144 | static int make_pidfile(char *devname) |
549e9569 NB |
145 | { |
146 | char path[100]; | |
147 | char pid[10]; | |
148 | int fd; | |
3d2c4fc7 DW |
149 | int n; |
150 | ||
753cf905 | 151 | if (mkdir(MDMON_DIR, 0755) < 0 && |
ed8fa52f LB |
152 | errno != EEXIST) |
153 | return -errno; | |
753cf905 | 154 | sprintf(path, "%s/%s.pid", MDMON_DIR, devname); |
549e9569 | 155 | |
5d4d1b26 | 156 | fd = open(path, O_RDWR|O_CREAT|O_EXCL, 0600); |
549e9569 | 157 | if (fd < 0) |
295646b3 | 158 | return -errno; |
549e9569 | 159 | sprintf(pid, "%d\n", getpid()); |
3d2c4fc7 | 160 | n = write(fd, pid, strlen(pid)); |
549e9569 | 161 | close(fd); |
3d2c4fc7 DW |
162 | if (n < 0) |
163 | return -errno; | |
549e9569 NB |
164 | return 0; |
165 | } | |
166 | ||
9f1da824 | 167 | static void try_kill_monitor(pid_t pid, char *devname, int sock) |
96a8270d DW |
168 | { |
169 | char buf[100]; | |
170 | int fd; | |
417a4b04 | 171 | int n; |
af7ca334 | 172 | long fl; |
d2e11da4 | 173 | int rv; |
b109d928 | 174 | |
8aae4219 DW |
175 | /* first rule of survival... don't off yourself */ |
176 | if (pid == getpid()) | |
177 | return; | |
178 | ||
b109d928 DW |
179 | /* kill this process if it is mdmon */ |
180 | sprintf(buf, "/proc/%lu/cmdline", (unsigned long) pid); | |
181 | fd = open(buf, O_RDONLY); | |
182 | if (fd < 0) | |
183 | return; | |
184 | ||
417a4b04 N |
185 | n = read(fd, buf, sizeof(buf)-1); |
186 | buf[sizeof(buf)-1] = 0; | |
187 | close(fd); | |
b109d928 | 188 | |
a99d3469 N |
189 | if (n < 0 || !(strstr(buf, "mdmon") || |
190 | strstr(buf, "@dmon"))) | |
883a6142 DW |
191 | return; |
192 | ||
193 | kill(pid, SIGTERM); | |
194 | ||
88e5516e N |
195 | if (sock < 0) |
196 | return; | |
197 | ||
af7ca334 N |
198 | /* Wait for monitor to exit by reading from the socket, after |
199 | * clearing the non-blocking flag */ | |
200 | fl = fcntl(sock, F_GETFL, 0); | |
201 | fl &= ~O_NONBLOCK; | |
202 | fcntl(sock, F_SETFL, fl); | |
fcf57625 | 203 | n = read(sock, buf, 100); |
d2e11da4 PB |
204 | |
205 | /* If there is I/O going on it might took some time to get to | |
206 | * clean state. Wait for monitor to exit fully to avoid races. | |
207 | * Ping it with SIGUSR1 in case that it is sleeping */ | |
208 | for (n = 0; n < 25; n++) { | |
209 | rv = kill(pid, SIGUSR1); | |
210 | if (rv < 0) | |
211 | break; | |
239b3cc0 | 212 | sleep_for(0, MSEC_TO_NSEC(200), true); |
d2e11da4 | 213 | } |
b109d928 DW |
214 | } |
215 | ||
e0d6609f NB |
216 | void remove_pidfile(char *devname) |
217 | { | |
218 | char buf[100]; | |
219 | ||
753cf905 | 220 | sprintf(buf, "%s/%s.pid", MDMON_DIR, devname); |
e0d6609f | 221 | unlink(buf); |
753cf905 | 222 | sprintf(buf, "%s/%s.sock", MDMON_DIR, devname); |
57752795 | 223 | unlink(buf); |
e0d6609f NB |
224 | } |
225 | ||
fa716c83 | 226 | static int make_control_sock(char *devname) |
549e9569 NB |
227 | { |
228 | char path[100]; | |
229 | int sfd; | |
230 | long fl; | |
231 | struct sockaddr_un addr; | |
232 | ||
6144ed44 DW |
233 | if (sigterm) |
234 | return -1; | |
235 | ||
753cf905 | 236 | sprintf(path, "%s/%s.sock", MDMON_DIR, devname); |
549e9569 NB |
237 | unlink(path); |
238 | sfd = socket(PF_LOCAL, SOCK_STREAM, 0); | |
239 | if (sfd < 0) | |
240 | return -1; | |
241 | ||
242 | addr.sun_family = PF_LOCAL; | |
243 | strcpy(addr.sun_path, path); | |
120ec6f7 | 244 | umask(077); /* ensure no world write access */ |
50d72ed4 | 245 | if (bind(sfd, (struct sockaddr*)&addr, sizeof(addr)) < 0) { |
549e9569 NB |
246 | close(sfd); |
247 | return -1; | |
248 | } | |
249 | listen(sfd, 10); | |
250 | fl = fcntl(sfd, F_GETFL, 0); | |
251 | fl |= O_NONBLOCK; | |
252 | fcntl(sfd, F_SETFL, fl); | |
253 | return sfd; | |
254 | } | |
255 | ||
6144ed44 DW |
256 | static void term(int sig) |
257 | { | |
258 | sigterm = 1; | |
259 | } | |
260 | ||
4d43913c NB |
261 | static void wake_me(int sig) |
262 | { | |
263 | ||
264 | } | |
265 | ||
16ddab0d DW |
266 | /* if we are debugging and starting mdmon by hand then don't fork */ |
267 | static int do_fork(void) | |
268 | { | |
269 | #ifdef DEBUG | |
40ebbb9c | 270 | if (check_env("MDADM_NO_MDMON")) |
16ddab0d DW |
271 | return 0; |
272 | #endif | |
273 | ||
274 | return 1; | |
275 | } | |
276 | ||
13047e4c DW |
277 | void usage(void) |
278 | { | |
eb155f6d JS |
279 | fprintf(stderr, |
280 | "Usage: mdmon [options] CONTAINER\n" | |
281 | "\n" | |
282 | "Options are:\n" | |
283 | " --help -h : This message\n" | |
bf3a33b3 JS |
284 | " --all -a : All devices\n" |
285 | " --foreground -F : Run in foreground (do not fork)\n" | |
eb155f6d JS |
286 | " --takeover -t : Takeover container\n" |
287 | ); | |
13047e4c DW |
288 | exit(2); |
289 | } | |
16ddab0d | 290 | |
1066ab83 LF |
291 | static bool is_duplicate_opt(const int opt, const int set_val, const char *long_name) |
292 | { | |
293 | if (opt == set_val) { | |
294 | pr_err("--%s option duplicated!\n", long_name); | |
295 | return true; | |
296 | } | |
297 | return false; | |
298 | } | |
299 | ||
4dd2df09 | 300 | static int mdmon(char *devnm, int must_fork, int takeover); |
1ffd2840 | 301 | |
549e9569 NB |
302 | int main(int argc, char *argv[]) |
303 | { | |
13047e4c | 304 | char *container_name = NULL; |
4dd2df09 | 305 | char *devnm = NULL; |
1ffd2840 | 306 | int status = 0; |
eb155f6d | 307 | int opt; |
b5c727dc N |
308 | int all = 0; |
309 | int takeover = 0; | |
03041982 | 310 | int dofork = 1; |
1066ab83 | 311 | bool help = false; |
eb155f6d JS |
312 | static struct option options[] = { |
313 | {"all", 0, NULL, 'a'}, | |
314 | {"takeover", 0, NULL, 't'}, | |
315 | {"help", 0, NULL, 'h'}, | |
da827518 | 316 | {"offroot", 0, NULL, OffRootOpt}, |
03041982 | 317 | {"foreground", 0, NULL, 'F'}, |
eb155f6d JS |
318 | {NULL, 0, NULL, 0} |
319 | }; | |
320 | ||
420dafcd N |
321 | /* |
322 | * mdmon should never complain due to lack of a platform, | |
323 | * that is mdadm's job if at all. | |
324 | */ | |
325 | imsm_set_no_platform(1); | |
326 | ||
03041982 | 327 | while ((opt = getopt_long(argc, argv, "thaF", options, NULL)) != -1) { |
eb155f6d JS |
328 | switch (opt) { |
329 | case 'a': | |
1066ab83 LF |
330 | if (is_duplicate_opt(all, 1, "all")) |
331 | exit(1); | |
eb155f6d | 332 | container_name = argv[optind-1]; |
b5c727dc | 333 | all = 1; |
eb155f6d JS |
334 | break; |
335 | case 't': | |
1066ab83 LF |
336 | if (is_duplicate_opt(takeover, 1, "takeover")) |
337 | exit(1); | |
b5c727dc | 338 | takeover = 1; |
eb155f6d | 339 | break; |
03041982 | 340 | case 'F': |
1066ab83 LF |
341 | if (is_duplicate_opt(dofork, 0, "foreground")) |
342 | exit(1); | |
03041982 N |
343 | dofork = 0; |
344 | break; | |
da827518 | 345 | case OffRootOpt: |
1066ab83 LF |
346 | if (is_duplicate_opt(argv[0][0], '@', "offroot")) |
347 | exit(1); | |
5d79c72e | 348 | argv[0][0] = '@'; |
da827518 | 349 | break; |
eb155f6d | 350 | case 'h': |
1066ab83 LF |
351 | if (is_duplicate_opt(help, true, "help")) |
352 | exit(1); | |
353 | help = true; | |
354 | break; | |
eb155f6d | 355 | default: |
b5c727dc | 356 | usage(); |
eb155f6d JS |
357 | break; |
358 | } | |
359 | } | |
360 | ||
1066ab83 LF |
361 | if (in_initrd()) { |
362 | /* | |
363 | * set first char of argv[0] to @. This is used by | |
364 | * systemd to signal that the task was launched from | |
365 | * initrd/initramfs and should be preserved during shutdown | |
366 | */ | |
367 | argv[0][0] = '@'; | |
368 | } | |
369 | ||
d39fd87e | 370 | if (!all && argv[optind]) { |
723d1df4 N |
371 | static const char prefix[] = "initrd/"; |
372 | container_name = argv[optind]; | |
373 | if (strncmp(container_name, prefix, | |
374 | sizeof(prefix) - 1) == 0) | |
375 | container_name += sizeof(prefix)-1; | |
376 | container_name = get_md_name(container_name); | |
d39fd87e N |
377 | if (!container_name) |
378 | return 1; | |
549e9569 | 379 | } |
eb155f6d | 380 | |
9b429fc0 | 381 | if (container_name == NULL || argc - optind > 1) |
eb155f6d JS |
382 | usage(); |
383 | ||
384 | if (strcmp(container_name, "/proc/mdstat") == 0) | |
385 | all = 1; | |
386 | ||
1066ab83 LF |
387 | if (help) |
388 | usage(); | |
389 | ||
b5c727dc | 390 | if (all) { |
1ffd2840 | 391 | struct mdstat_ent *mdstat, *e; |
eb49460b | 392 | int container_len = strlen(container_name); |
1ffd2840 DW |
393 | |
394 | /* launch an mdmon instance for each container found */ | |
1ffd2840 DW |
395 | mdstat = mdstat_read(0, 0); |
396 | for (e = mdstat; e; e = e->next) { | |
f4db7a6f MM |
397 | if (e->metadata_version && |
398 | strncmp(e->metadata_version, "external:", 9) == 0 && | |
1ffd2840 | 399 | !is_subarray(&e->metadata_version[9])) { |
1b34f519 DW |
400 | /* update cmdline so this mdmon instance can be |
401 | * distinguished from others in a call to ps(1) | |
402 | */ | |
4dd2df09 | 403 | if (strlen(e->devnm) <= (unsigned)container_len) { |
eb49460b | 404 | memset(container_name, 0, container_len); |
4dd2df09 | 405 | sprintf(container_name, "%s", e->devnm); |
1b34f519 | 406 | } |
4dd2df09 | 407 | status |= mdmon(e->devnm, 1, takeover); |
1ffd2840 DW |
408 | } |
409 | } | |
410 | free_mdstat(mdstat); | |
411 | ||
412 | return status; | |
6f4098a6 | 413 | } else { |
b938519e | 414 | int mdfd = open_mddev(container_name, 0); |
9b429fc0 | 415 | devnm = fd2devnm(mdfd); |
b938519e | 416 | |
9b429fc0 | 417 | close(mdfd); |
6f4098a6 DW |
418 | } |
419 | ||
4dd2df09 | 420 | if (!devnm) { |
a88e119f | 421 | pr_err("%s is not a valid md device name\n", |
e8a70c89 | 422 | container_name); |
9b429fc0 | 423 | return 1; |
e8a70c89 | 424 | } |
4dd2df09 | 425 | return mdmon(devnm, dofork && do_fork(), takeover); |
1ffd2840 DW |
426 | } |
427 | ||
4dd2df09 | 428 | static int mdmon(char *devnm, int must_fork, int takeover) |
1ffd2840 DW |
429 | { |
430 | int mdfd; | |
431 | struct mdinfo *mdi, *di; | |
432 | struct supertype *container; | |
433 | sigset_t set; | |
434 | struct sigaction act; | |
435 | int pfd[2]; | |
436 | int status; | |
437 | int ignore; | |
96a8270d | 438 | pid_t victim = -1; |
9f1da824 | 439 | int victim_sock = -1; |
1ffd2840 | 440 | |
4dd2df09 | 441 | dprintf("starting mdmon for %s\n", devnm); |
b928b5a0 | 442 | |
4dd2df09 | 443 | mdfd = open_dev(devnm); |
549e9569 | 444 | if (mdfd < 0) { |
a88e119f | 445 | pr_err("%s: %s\n", devnm, strerror(errno)); |
1ffd2840 | 446 | return 1; |
549e9569 | 447 | } |
549e9569 | 448 | |
9fe32043 | 449 | /* Fork, and have the child tell us when they are ready */ |
3e7312a9 | 450 | if (must_fork) { |
3d2c4fc7 | 451 | if (pipe(pfd) != 0) { |
a88e119f | 452 | pr_err("failed to create pipe\n"); |
1ffd2840 | 453 | return 1; |
3d2c4fc7 | 454 | } |
16ddab0d DW |
455 | switch(fork()) { |
456 | case -1: | |
a88e119f | 457 | pr_err("failed to fork: %s\n", strerror(errno)); |
1ffd2840 | 458 | return 1; |
16ddab0d DW |
459 | case 0: /* child */ |
460 | close(pfd[0]); | |
461 | break; | |
462 | default: /* parent */ | |
463 | close(pfd[1]); | |
464 | if (read(pfd[0], &status, sizeof(status)) != sizeof(status)) { | |
465 | wait(&status); | |
466 | status = WEXITSTATUS(status); | |
467 | } | |
5e57245e | 468 | close(pfd[0]); |
1ffd2840 | 469 | return status; |
9fe32043 | 470 | } |
16ddab0d DW |
471 | } else |
472 | pfd[0] = pfd[1] = -1; | |
549e9569 | 473 | |
503975b9 | 474 | container = xcalloc(1, sizeof(*container)); |
4dd2df09 | 475 | strcpy(container->devnm, devnm); |
13047e4c | 476 | container->arrays = NULL; |
96a8270d | 477 | container->sock = -1; |
13047e4c | 478 | |
4dd2df09 | 479 | mdi = sysfs_read(mdfd, container->devnm, GET_VERSION|GET_LEVEL|GET_DEVS); |
13047e4c DW |
480 | |
481 | if (!mdi) { | |
a88e119f | 482 | pr_err("failed to load sysfs info for %s\n", container->devnm); |
13047e4c DW |
483 | exit(3); |
484 | } | |
485 | if (mdi->array.level != UnSet) { | |
a88e119f | 486 | pr_err("%s is not a container - cannot monitor\n", devnm); |
13047e4c DW |
487 | exit(3); |
488 | } | |
489 | if (mdi->array.major_version != -1 || | |
490 | mdi->array.minor_version != -2) { | |
a88e119f | 491 | pr_err("%s does not use external metadata - cannot monitor\n", |
4dd2df09 | 492 | devnm); |
13047e4c DW |
493 | exit(3); |
494 | } | |
495 | ||
33414a01 | 496 | container->ss = version_to_superswitch(mdi->text_version); |
13047e4c | 497 | if (container->ss == NULL) { |
a88e119f | 498 | pr_err("%s uses unsupported metadata: %s\n", |
4dd2df09 | 499 | devnm, mdi->text_version); |
13047e4c DW |
500 | exit(3); |
501 | } | |
502 | ||
503 | container->devs = NULL; | |
504 | for (di = mdi->devs; di; di = di->next) { | |
503975b9 | 505 | struct mdinfo *cd = xmalloc(sizeof(*cd)); |
13047e4c DW |
506 | *cd = *di; |
507 | cd->next = container->devs; | |
508 | container->devs = cd; | |
509 | } | |
510 | sysfs_free(mdi); | |
549e9569 | 511 | |
883a6142 DW |
512 | /* SIGUSR is sent between parent and child. So both block it |
513 | * and enable it only with pselect. | |
514 | */ | |
515 | sigemptyset(&set); | |
516 | sigaddset(&set, SIGUSR1); | |
883a6142 DW |
517 | sigaddset(&set, SIGTERM); |
518 | sigprocmask(SIG_BLOCK, &set, NULL); | |
519 | act.sa_handler = wake_me; | |
520 | act.sa_flags = 0; | |
521 | sigaction(SIGUSR1, &act, NULL); | |
883a6142 DW |
522 | act.sa_handler = term; |
523 | sigaction(SIGTERM, &act, NULL); | |
524 | act.sa_handler = SIG_IGN; | |
525 | sigaction(SIGPIPE, &act, NULL); | |
526 | ||
4dd2df09 | 527 | victim = mdmon_pid(container->devnm); |
84a230d9 | 528 | if (victim >= 0) |
4dd2df09 | 529 | victim_sock = connect_monitor(container->devnm); |
13047e4c | 530 | |
13047e4c | 531 | ignore = chdir("/"); |
32f21701 N |
532 | if (!takeover && victim > 0 && victim_sock >= 0) { |
533 | if (fping_monitor(victim_sock) == 0) { | |
a88e119f | 534 | pr_err("%s already managed\n", container->devnm); |
b109d928 | 535 | exit(3); |
24cfdbc5 | 536 | } |
32f21701 | 537 | close(victim_sock); |
88e5516e | 538 | victim_sock = -1; |
549e9569 | 539 | } |
4dd2df09 | 540 | if (container->ss->load_container(container, mdfd, devnm)) { |
a88e119f | 541 | pr_err("Cannot load metadata for %s\n", devnm); |
549e9569 NB |
542 | exit(3); |
543 | } | |
e8a70c89 | 544 | close(mdfd); |
549e9569 | 545 | |
9fe32043 N |
546 | /* Ok, this is close enough. We can say goodbye to our parent now. |
547 | */ | |
fa716c83 | 548 | if (victim > 0) |
4dd2df09 N |
549 | remove_pidfile(devnm); |
550 | if (make_pidfile(devnm) < 0) { | |
753cf905 | 551 | exit(3); |
fa716c83 | 552 | } |
4dd2df09 | 553 | container->sock = make_control_sock(devnm); |
fa716c83 | 554 | |
9fe32043 | 555 | status = 0; |
5e57245e N |
556 | if (pfd[1] >= 0) { |
557 | if (write(pfd[1], &status, sizeof(status)) < 0) | |
558 | pr_err("failed to notify our parent: %d\n", | |
559 | getppid()); | |
560 | close(pfd[1]); | |
561 | } | |
9fe32043 | 562 | |
1373b07d | 563 | mlockall(MCL_CURRENT | MCL_FUTURE); |
549e9569 | 564 | |
3e70c845 | 565 | if (clone_monitor(container) < 0) { |
a88e119f | 566 | pr_err("failed to start monitor process: %s\n", |
549e9569 NB |
567 | strerror(errno)); |
568 | exit(2); | |
569 | } | |
570 | ||
fa716c83 | 571 | if (victim > 0) { |
4dd2df09 | 572 | try_kill_monitor(victim, container->devnm, victim_sock); |
88e5516e N |
573 | if (victim_sock >= 0) |
574 | close(victim_sock); | |
9f1da824 | 575 | } |
e98ef225 N |
576 | |
577 | setsid(); | |
ff6bb131 | 578 | manage_fork_fds(0); |
e98ef225 | 579 | |
e4c72d1d LB |
580 | /* This silliness is to stop the compiler complaining |
581 | * that we ignore 'ignore' | |
582 | */ | |
583 | if (ignore) | |
584 | ignore++; | |
585 | ||
549e9569 NB |
586 | do_manager(container); |
587 | ||
588 | exit(0); | |
589 | } | |
999b4972 N |
590 | |
591 | /* Some stub functions so super-* can link with us */ | |
592 | int child_monitor(int afd, struct mdinfo *sra, struct reshape *reshape, | |
593 | struct supertype *st, unsigned long blocks, | |
594 | int *fds, unsigned long long *offsets, | |
595 | int dests, int *destfd, unsigned long long *destoffsets) | |
596 | { | |
597 | return 0; | |
598 | } | |
afbbf073 AK |
599 | |
600 | int restore_stripes(int *dest, unsigned long long *offsets, | |
601 | int raid_disks, int chunk_size, int level, int layout, | |
602 | int source, unsigned long long read_offset, | |
603 | unsigned long long start, unsigned long long length, | |
604 | char *src_buf) | |
605 | { | |
606 | return 1; | |
607 | } | |
608 | ||
afbbf073 AK |
609 | int save_stripes(int *source, unsigned long long *offsets, |
610 | int raid_disks, int chunk_size, int level, int layout, | |
611 | int nwrites, int *dest, | |
612 | unsigned long long start, unsigned long long length, | |
613 | char *buf) | |
614 | { | |
615 | return 0; | |
616 | } | |
935a3254 N |
617 | |
618 | struct superswitch super0 = { | |
619 | .name = "0.90", | |
620 | }; | |
621 | struct superswitch super1 = { | |
622 | .name = "1.x", | |
623 | }; |