]> git.ipfire.org Git - thirdparty/mdadm.git/blame - mdmon.c
Merge branch 'master' of git://github.com/djbw/mdadm
[thirdparty/mdadm.git] / mdmon.c
CommitLineData
a54d5262
DW
1/*
2 * mdmon - monitor external metadata arrays
3 *
e736b623
N
4 * Copyright (C) 2007-2009 Neil Brown <neilb@suse.de>
5 * Copyright (C) 2007-2009 Intel Corporation
a54d5262
DW
6 *
7 * This program is free software; you can redistribute it and/or modify it
8 * under the terms and conditions of the GNU General Public License,
9 * version 2, as published by the Free Software Foundation.
10 *
11 * This program is distributed in the hope it will be useful, but WITHOUT
12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
13 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
14 * more details.
15 *
16 * You should have received a copy of the GNU General Public License along with
17 * this program; if not, write to the Free Software Foundation, Inc.,
18 * 51 Franklin St - Fifth Floor, Boston, MA 02110-1301 USA.
19 */
549e9569
NB
20
21/*
22 * md array manager.
23 * When md arrays have user-space managed metadata, this is the program
24 * that does the managing.
25 *
26 * Given one argument: the name of the array (e.g. /dev/md0) that is
27 * the container.
28 * We fork off a helper that runs high priority and mlocked. It responds to
29 * device failures and other events that might stop writeout, or that are
30 * trivial to deal with.
31 * The main thread then watches for new arrays being created in the container
32 * and starts monitoring them too ... along with a few other tasks.
33 *
34 * The main thread communicates with the priority thread by writing over
35 * a pipe.
36 * Separate programs can communicate with the main thread via Unix-domain
37 * socket.
38 * The two threads share address space and open file table.
39 *
40 */
41
42#ifndef _GNU_SOURCE
43#define _GNU_SOURCE
44#endif
45
46#include <unistd.h>
47#include <stdlib.h>
4d43913c 48#include <sys/types.h>
549e9569
NB
49#include <sys/stat.h>
50#include <sys/socket.h>
51#include <sys/un.h>
52#include <sys/mman.h>
4d43913c 53#include <sys/syscall.h>
9fe32043 54#include <sys/wait.h>
549e9569
NB
55#include <stdio.h>
56#include <errno.h>
57#include <string.h>
58#include <fcntl.h>
b109d928 59#include <signal.h>
13047e4c 60#include <dirent.h>
f4190c2f
DW
61#ifdef USE_PTHREADS
62#include <pthread.h>
63#else
549e9569 64#include <sched.h>
f4190c2f 65#endif
549e9569
NB
66
67#include "mdadm.h"
68#include "mdmon.h"
69
549e9569
NB
70struct active_array *discard_this;
71struct active_array *pending_discard;
4d43913c
NB
72
73int mon_tid, mgr_tid;
549e9569 74
6144ed44
DW
75int sigterm;
76
f4190c2f
DW
77#ifdef USE_PTHREADS
78static void *run_child(void *v)
79{
80 struct supertype *c = v;
81
82 mon_tid = syscall(SYS_gettid);
83 do_monitor(c);
84 return 0;
85}
86
87static int clone_monitor(struct supertype *container)
88{
89 pthread_attr_t attr;
90 pthread_t thread;
91 int rc;
92
93 mon_tid = -1;
94 pthread_attr_init(&attr);
95 pthread_attr_setstacksize(&attr, 4096);
96 pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED);
97 rc = pthread_create(&thread, &attr, run_child, container);
98 if (rc)
99 return rc;
100 while (mon_tid == -1)
101 usleep(10);
102 pthread_attr_destroy(&attr);
103
104 mgr_tid = syscall(SYS_gettid);
105
106 return mon_tid;
107}
108#else /* USE_PTHREADS */
109static int run_child(void *v)
549e9569
NB
110{
111 struct supertype *c = v;
1ed3f387 112
549e9569
NB
113 do_monitor(c);
114 return 0;
115}
116
97f734fd
N
117#ifdef __ia64__
118int __clone2(int (*fn)(void *),
119 void *child_stack_base, size_t stack_size,
120 int flags, void *arg, ...
121 /* pid_t *pid, struct user_desc *tls, pid_t *ctid */ );
122#endif
f4190c2f 123static int clone_monitor(struct supertype *container)
549e9569 124{
549e9569 125 static char stack[4096];
549e9569 126
97f734fd
N
127#ifdef __ia64__
128 mon_tid = __clone2(run_child, stack, sizeof(stack),
129 CLONE_FS|CLONE_FILES|CLONE_VM|CLONE_SIGHAND|CLONE_THREAD,
130 container);
131#else
2cc98f9e 132 mon_tid = clone(run_child, stack+4096-64,
549e9569
NB
133 CLONE_FS|CLONE_FILES|CLONE_VM|CLONE_SIGHAND|CLONE_THREAD,
134 container);
97f734fd 135#endif
3e70c845 136
4d43913c 137 mgr_tid = syscall(SYS_gettid);
2cc98f9e
DW
138
139 return mon_tid;
549e9569 140}
f4190c2f 141#endif /* USE_PTHREADS */
549e9569 142
fa716c83 143static int make_pidfile(char *devname)
549e9569
NB
144{
145 char path[100];
146 char pid[10];
147 int fd;
3d2c4fc7
DW
148 int n;
149
435b90e7 150 if (mkdir(pid_dir, 0700) < 0 &&
ed8fa52f
LB
151 errno != EEXIST)
152 return -errno;
5d4d1b26 153 sprintf(path, "%s/%s.pid", pid_dir, devname);
549e9569 154
5d4d1b26 155 fd = open(path, O_RDWR|O_CREAT|O_EXCL, 0600);
549e9569 156 if (fd < 0)
295646b3 157 return -errno;
549e9569 158 sprintf(pid, "%d\n", getpid());
3d2c4fc7 159 n = write(fd, pid, strlen(pid));
549e9569 160 close(fd);
3d2c4fc7
DW
161 if (n < 0)
162 return -errno;
549e9569
NB
163 return 0;
164}
165
9f1da824 166static void try_kill_monitor(pid_t pid, char *devname, int sock)
96a8270d
DW
167{
168 char buf[100];
169 int fd;
417a4b04 170 int n;
af7ca334 171 long fl;
b109d928 172
8aae4219
DW
173 /* first rule of survival... don't off yourself */
174 if (pid == getpid())
175 return;
176
b109d928
DW
177 /* kill this process if it is mdmon */
178 sprintf(buf, "/proc/%lu/cmdline", (unsigned long) pid);
179 fd = open(buf, O_RDONLY);
180 if (fd < 0)
181 return;
182
417a4b04
N
183 n = read(fd, buf, sizeof(buf)-1);
184 buf[sizeof(buf)-1] = 0;
185 close(fd);
b109d928 186
417a4b04 187 if (n < 0 || !strstr(buf, "mdmon"))
883a6142
DW
188 return;
189
190 kill(pid, SIGTERM);
191
af7ca334
N
192 /* Wait for monitor to exit by reading from the socket, after
193 * clearing the non-blocking flag */
194 fl = fcntl(sock, F_GETFL, 0);
195 fl &= ~O_NONBLOCK;
196 fcntl(sock, F_SETFL, fl);
fcf57625
N
197 n = read(sock, buf, 100);
198 /* Ignore result, it is just the wait that
199 * matters
200 */
b109d928
DW
201}
202
e0d6609f
NB
203void remove_pidfile(char *devname)
204{
205 char buf[100];
206
5d4d1b26 207 sprintf(buf, "%s/%s.pid", pid_dir, devname);
e0d6609f 208 unlink(buf);
5d4d1b26 209 sprintf(buf, "%s/%s.sock", pid_dir, devname);
57752795 210 unlink(buf);
5d4d1b26
N
211 if (strcmp(pid_dir, ALT_RUN) == 0)
212 /* try to clean up when we are finished with this dir */
213 rmdir(pid_dir);
e0d6609f
NB
214}
215
fa716c83 216static int make_control_sock(char *devname)
549e9569
NB
217{
218 char path[100];
219 int sfd;
220 long fl;
221 struct sockaddr_un addr;
222
6144ed44
DW
223 if (sigterm)
224 return -1;
225
5d4d1b26 226 sprintf(path, "%s/%s.sock", pid_dir, devname);
549e9569
NB
227 unlink(path);
228 sfd = socket(PF_LOCAL, SOCK_STREAM, 0);
229 if (sfd < 0)
230 return -1;
231
232 addr.sun_family = PF_LOCAL;
233 strcpy(addr.sun_path, path);
234 if (bind(sfd, &addr, sizeof(addr)) < 0) {
235 close(sfd);
236 return -1;
237 }
238 listen(sfd, 10);
239 fl = fcntl(sfd, F_GETFL, 0);
240 fl |= O_NONBLOCK;
241 fcntl(sfd, F_SETFL, fl);
242 return sfd;
243}
244
6144ed44
DW
245static void term(int sig)
246{
247 sigterm = 1;
248}
249
4d43913c
NB
250static void wake_me(int sig)
251{
252
253}
254
16ddab0d
DW
255/* if we are debugging and starting mdmon by hand then don't fork */
256static int do_fork(void)
257{
258 #ifdef DEBUG
40ebbb9c 259 if (check_env("MDADM_NO_MDMON"))
16ddab0d
DW
260 return 0;
261 #endif
262
263 return 1;
264}
265
13047e4c
DW
266void usage(void)
267{
eb49460b 268 fprintf(stderr, "Usage: mdmon [--all] [--takeover] CONTAINER\n");
13047e4c
DW
269 exit(2);
270}
16ddab0d 271
b5c727dc 272static int mdmon(char *devname, int devnum, int must_fork, int takeover);
1ffd2840 273
549e9569
NB
274int main(int argc, char *argv[])
275{
13047e4c 276 char *container_name = NULL;
e8a70c89
N
277 int devnum;
278 char *devname;
1ffd2840 279 int status = 0;
b5c727dc
N
280 int arg;
281 int all = 0;
282 int takeover = 0;
283
284 for (arg = 1; arg < argc; arg++) {
eb49460b
LB
285 if (strncmp(argv[arg], "--all",5) == 0 ||
286 strcmp(argv[arg], "/proc/mdstat") == 0) {
287 container_name = argv[arg];
b5c727dc 288 all = 1;
eb49460b 289 } else if (strcmp(argv[arg], "--takeover") == 0)
b5c727dc
N
290 takeover = 1;
291 else if (container_name == NULL)
292 container_name = argv[arg];
293 else
294 usage();
549e9569 295 }
eb49460b
LB
296 if (container_name == NULL)
297 usage();
13047e4c 298
b5c727dc 299 if (all) {
1ffd2840 300 struct mdstat_ent *mdstat, *e;
eb49460b 301 int container_len = strlen(container_name);
1ffd2840
DW
302
303 /* launch an mdmon instance for each container found */
1ffd2840
DW
304 mdstat = mdstat_read(0, 0);
305 for (e = mdstat; e; e = e->next) {
306 if (strncmp(e->metadata_version, "external:", 9) == 0 &&
307 !is_subarray(&e->metadata_version[9])) {
308 devname = devnum2devname(e->devnum);
1b34f519
DW
309 /* update cmdline so this mdmon instance can be
310 * distinguished from others in a call to ps(1)
311 */
eb49460b
LB
312 if (strlen(devname) <= container_len) {
313 memset(container_name, 0, container_len);
1b34f519
DW
314 sprintf(container_name, "%s", devname);
315 }
3e7312a9 316 status |= mdmon(devname, e->devnum, 1,
b5c727dc 317 takeover);
1ffd2840
DW
318 }
319 }
320 free_mdstat(mdstat);
321
322 return status;
323 } else if (strncmp(container_name, "md", 2) == 0) {
6f4098a6
DW
324 devnum = devname2devnum(container_name);
325 devname = devnum2devname(devnum);
326 if (strcmp(container_name, devname) != 0)
327 devname = NULL;
328 } else {
329 struct stat st;
330
331 devnum = NoMdDev;
332 if (stat(container_name, &st) == 0)
333 devnum = stat2devnum(&st);
334 if (devnum == NoMdDev)
335 devname = NULL;
336 else
337 devname = devnum2devname(devnum);
338 }
339
340 if (!devname) {
e8a70c89
N
341 fprintf(stderr, "mdmon: %s is not a valid md device name\n",
342 container_name);
343 exit(1);
344 }
b5c727dc 345 return mdmon(devname, devnum, do_fork(), takeover);
1ffd2840
DW
346}
347
b5c727dc 348static int mdmon(char *devname, int devnum, int must_fork, int takeover)
1ffd2840
DW
349{
350 int mdfd;
351 struct mdinfo *mdi, *di;
352 struct supertype *container;
353 sigset_t set;
354 struct sigaction act;
355 int pfd[2];
356 int status;
357 int ignore;
96a8270d 358 pid_t victim = -1;
9f1da824 359 int victim_sock = -1;
1ffd2840 360
b5c727dc 361 dprintf("starting mdmon for %s\n", devname);
b928b5a0 362
e8a70c89 363 mdfd = open_dev(devnum);
549e9569 364 if (mdfd < 0) {
1ffd2840 365 fprintf(stderr, "mdmon: %s: %s\n", devname,
549e9569 366 strerror(errno));
1ffd2840 367 return 1;
549e9569
NB
368 }
369 if (md_get_version(mdfd) < 0) {
13047e4c 370 fprintf(stderr, "mdmon: %s: Not an md device\n",
1ffd2840
DW
371 devname);
372 return 1;
549e9569
NB
373 }
374
9fe32043 375 /* Fork, and have the child tell us when they are ready */
3e7312a9 376 if (must_fork) {
3d2c4fc7
DW
377 if (pipe(pfd) != 0) {
378 fprintf(stderr, "mdmon: failed to create pipe\n");
1ffd2840 379 return 1;
3d2c4fc7 380 }
16ddab0d
DW
381 switch(fork()) {
382 case -1:
383 fprintf(stderr, "mdmon: failed to fork: %s\n",
384 strerror(errno));
1ffd2840 385 return 1;
16ddab0d
DW
386 case 0: /* child */
387 close(pfd[0]);
388 break;
389 default: /* parent */
390 close(pfd[1]);
391 if (read(pfd[0], &status, sizeof(status)) != sizeof(status)) {
392 wait(&status);
393 status = WEXITSTATUS(status);
394 }
1ffd2840 395 return status;
9fe32043 396 }
16ddab0d
DW
397 } else
398 pfd[0] = pfd[1] = -1;
549e9569 399
f5df5d69 400 container = calloc(1, sizeof(*container));
e8a70c89
N
401 container->devnum = devnum;
402 container->devname = devname;
13047e4c 403 container->arrays = NULL;
c1363b40 404 container->subarray[0] = 0;
96a8270d 405 container->sock = -1;
13047e4c
DW
406
407 if (!container->devname) {
408 fprintf(stderr, "mdmon: failed to allocate container name string\n");
409 exit(3);
410 }
411
b526e52d 412 mdi = sysfs_read(mdfd, container->devnum, GET_VERSION|GET_LEVEL|GET_DEVS);
13047e4c
DW
413
414 if (!mdi) {
415 fprintf(stderr, "mdmon: failed to load sysfs info for %s\n",
416 container->devname);
417 exit(3);
418 }
419 if (mdi->array.level != UnSet) {
420 fprintf(stderr, "mdmon: %s is not a container - cannot monitor\n",
1ffd2840 421 devname);
13047e4c
DW
422 exit(3);
423 }
424 if (mdi->array.major_version != -1 ||
425 mdi->array.minor_version != -2) {
426 fprintf(stderr, "mdmon: %s does not use external metadata - cannot monitor\n",
1ffd2840 427 devname);
13047e4c
DW
428 exit(3);
429 }
430
33414a01 431 container->ss = version_to_superswitch(mdi->text_version);
13047e4c 432 if (container->ss == NULL) {
33414a01 433 fprintf(stderr, "mdmon: %s uses unsupported metadata: %s\n",
1ffd2840 434 devname, mdi->text_version);
13047e4c
DW
435 exit(3);
436 }
437
438 container->devs = NULL;
439 for (di = mdi->devs; di; di = di->next) {
440 struct mdinfo *cd = malloc(sizeof(*cd));
441 *cd = *di;
442 cd->next = container->devs;
443 container->devs = cd;
444 }
445 sysfs_free(mdi);
549e9569 446
883a6142
DW
447 /* SIGUSR is sent between parent and child. So both block it
448 * and enable it only with pselect.
449 */
450 sigemptyset(&set);
451 sigaddset(&set, SIGUSR1);
883a6142
DW
452 sigaddset(&set, SIGTERM);
453 sigprocmask(SIG_BLOCK, &set, NULL);
454 act.sa_handler = wake_me;
455 act.sa_flags = 0;
456 sigaction(SIGUSR1, &act, NULL);
883a6142
DW
457 act.sa_handler = term;
458 sigaction(SIGTERM, &act, NULL);
459 act.sa_handler = SIG_IGN;
460 sigaction(SIGPIPE, &act, NULL);
461
32f21701
N
462 pid_dir = VAR_RUN;
463 victim = mdmon_pid(container->devnum);
464 if (victim < 0) {
465 pid_dir = ALT_RUN;
b5c727dc 466 victim = mdmon_pid(container->devnum);
13047e4c 467 }
32f21701
N
468 if (victim >= 0)
469 victim_sock = connect_monitor(container->devname);
13047e4c 470
13047e4c 471 ignore = chdir("/");
32f21701
N
472 if (!takeover && victim > 0 && victim_sock >= 0) {
473 if (fping_monitor(victim_sock) == 0) {
b109d928
DW
474 fprintf(stderr, "mdmon: %s already managed\n",
475 container->devname);
476 exit(3);
24cfdbc5 477 }
32f21701 478 close(victim_sock);
549e9569 479 }
1ffd2840 480 if (container->ss->load_super(container, mdfd, devname)) {
549e9569 481 fprintf(stderr, "mdmon: Cannot load metadata for %s\n",
1ffd2840 482 devname);
549e9569
NB
483 exit(3);
484 }
e8a70c89 485 close(mdfd);
549e9569 486
9fe32043
N
487 /* Ok, this is close enough. We can say goodbye to our parent now.
488 */
fa716c83
N
489 if (victim > 0)
490 remove_pidfile(devname);
ed8fa52f 491 pid_dir = VAR_RUN;
fa716c83 492 if (make_pidfile(devname) < 0) {
ed8fa52f
LB
493 /* Try the alternate */
494 pid_dir = ALT_RUN;
495 if (make_pidfile(devname) < 0) {
496 fprintf(stderr, "mdmon: Neither %s nor %s are writable\n"
497 " cannot create .pid or .sock files. Aborting\n",
498 VAR_RUN, ALT_RUN);
499 exit(3);
500 }
fa716c83
N
501 }
502 container->sock = make_control_sock(devname);
503
9fe32043 504 status = 0;
3d2c4fc7
DW
505 if (write(pfd[1], &status, sizeof(status)) < 0)
506 fprintf(stderr, "mdmon: failed to notify our parent: %d\n",
507 getppid());
9fe32043
N
508 close(pfd[1]);
509
1373b07d 510 mlockall(MCL_CURRENT | MCL_FUTURE);
549e9569 511
3e70c845 512 if (clone_monitor(container) < 0) {
295646b3 513 fprintf(stderr, "mdmon: failed to start monitor process: %s\n",
549e9569
NB
514 strerror(errno));
515 exit(2);
516 }
517
fa716c83 518 if (victim > 0) {
9f1da824
DW
519 try_kill_monitor(victim, container->devname, victim_sock);
520 close(victim_sock);
521 }
e98ef225
N
522
523 setsid();
524 close(0);
525 open("/dev/null", O_RDWR);
526 close(1);
527 ignore = dup(0);
528#ifndef DEBUG
529 close(2);
530 ignore = dup(0);
531#endif
532
549e9569
NB
533 do_manager(container);
534
535 exit(0);
536}