]> git.ipfire.org Git - thirdparty/mdadm.git/blame - mdmon.c
util: remove obsolete code from get_md_name
[thirdparty/mdadm.git] / mdmon.c
CommitLineData
a54d5262
DW
1/*
2 * mdmon - monitor external metadata arrays
3 *
e736b623
N
4 * Copyright (C) 2007-2009 Neil Brown <neilb@suse.de>
5 * Copyright (C) 2007-2009 Intel Corporation
a54d5262
DW
6 *
7 * This program is free software; you can redistribute it and/or modify it
8 * under the terms and conditions of the GNU General Public License,
9 * version 2, as published by the Free Software Foundation.
10 *
11 * This program is distributed in the hope it will be useful, but WITHOUT
12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
13 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
14 * more details.
15 *
16 * You should have received a copy of the GNU General Public License along with
17 * this program; if not, write to the Free Software Foundation, Inc.,
18 * 51 Franklin St - Fifth Floor, Boston, MA 02110-1301 USA.
19 */
549e9569
NB
20
21/*
22 * md array manager.
23 * When md arrays have user-space managed metadata, this is the program
24 * that does the managing.
25 *
26 * Given one argument: the name of the array (e.g. /dev/md0) that is
27 * the container.
28 * We fork off a helper that runs high priority and mlocked. It responds to
29 * device failures and other events that might stop writeout, or that are
30 * trivial to deal with.
31 * The main thread then watches for new arrays being created in the container
32 * and starts monitoring them too ... along with a few other tasks.
33 *
34 * The main thread communicates with the priority thread by writing over
35 * a pipe.
36 * Separate programs can communicate with the main thread via Unix-domain
37 * socket.
38 * The two threads share address space and open file table.
39 *
40 */
41
42#ifndef _GNU_SOURCE
43#define _GNU_SOURCE
44#endif
45
46#include <unistd.h>
47#include <stdlib.h>
4d43913c 48#include <sys/types.h>
549e9569
NB
49#include <sys/stat.h>
50#include <sys/socket.h>
51#include <sys/un.h>
52#include <sys/mman.h>
4d43913c 53#include <sys/syscall.h>
9fe32043 54#include <sys/wait.h>
549e9569
NB
55#include <stdio.h>
56#include <errno.h>
57#include <string.h>
58#include <fcntl.h>
13047e4c 59#include <dirent.h>
f4190c2f
DW
60#ifdef USE_PTHREADS
61#include <pthread.h>
62#else
549e9569 63#include <sched.h>
f4190c2f 64#endif
549e9569
NB
65
66#include "mdadm.h"
67#include "mdmon.h"
68
d56dd607
PB
69char const Name[] = "mdmon";
70
549e9569
NB
71struct active_array *discard_this;
72struct active_array *pending_discard;
4d43913c
NB
73
74int mon_tid, mgr_tid;
549e9569 75
6144ed44
DW
76int sigterm;
77
f4190c2f
DW
78#ifdef USE_PTHREADS
79static void *run_child(void *v)
80{
81 struct supertype *c = v;
82
83 mon_tid = syscall(SYS_gettid);
84 do_monitor(c);
85 return 0;
86}
87
88static int clone_monitor(struct supertype *container)
89{
90 pthread_attr_t attr;
91 pthread_t thread;
92 int rc;
93
94 mon_tid = -1;
95 pthread_attr_init(&attr);
96 pthread_attr_setstacksize(&attr, 4096);
97 pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED);
98 rc = pthread_create(&thread, &attr, run_child, container);
99 if (rc)
100 return rc;
101 while (mon_tid == -1)
239b3cc0 102 sleep_for(0, USEC_TO_NSEC(10), true);
f4190c2f
DW
103 pthread_attr_destroy(&attr);
104
105 mgr_tid = syscall(SYS_gettid);
106
107 return mon_tid;
108}
109#else /* USE_PTHREADS */
110static int run_child(void *v)
549e9569
NB
111{
112 struct supertype *c = v;
1ed3f387 113
549e9569
NB
114 do_monitor(c);
115 return 0;
116}
117
97f734fd
N
118#ifdef __ia64__
119int __clone2(int (*fn)(void *),
120 void *child_stack_base, size_t stack_size,
121 int flags, void *arg, ...
122 /* pid_t *pid, struct user_desc *tls, pid_t *ctid */ );
123#endif
f4190c2f 124static int clone_monitor(struct supertype *container)
549e9569 125{
549e9569 126 static char stack[4096];
549e9569 127
97f734fd
N
128#ifdef __ia64__
129 mon_tid = __clone2(run_child, stack, sizeof(stack),
130 CLONE_FS|CLONE_FILES|CLONE_VM|CLONE_SIGHAND|CLONE_THREAD,
131 container);
132#else
2cc98f9e 133 mon_tid = clone(run_child, stack+4096-64,
549e9569
NB
134 CLONE_FS|CLONE_FILES|CLONE_VM|CLONE_SIGHAND|CLONE_THREAD,
135 container);
97f734fd 136#endif
3e70c845 137
4d43913c 138 mgr_tid = syscall(SYS_gettid);
2cc98f9e
DW
139
140 return mon_tid;
549e9569 141}
f4190c2f 142#endif /* USE_PTHREADS */
549e9569 143
fa716c83 144static int make_pidfile(char *devname)
549e9569
NB
145{
146 char path[100];
147 char pid[10];
148 int fd;
3d2c4fc7
DW
149 int n;
150
753cf905 151 if (mkdir(MDMON_DIR, 0755) < 0 &&
ed8fa52f
LB
152 errno != EEXIST)
153 return -errno;
753cf905 154 sprintf(path, "%s/%s.pid", MDMON_DIR, devname);
549e9569 155
5d4d1b26 156 fd = open(path, O_RDWR|O_CREAT|O_EXCL, 0600);
549e9569 157 if (fd < 0)
295646b3 158 return -errno;
549e9569 159 sprintf(pid, "%d\n", getpid());
3d2c4fc7 160 n = write(fd, pid, strlen(pid));
549e9569 161 close(fd);
3d2c4fc7
DW
162 if (n < 0)
163 return -errno;
549e9569
NB
164 return 0;
165}
166
9f1da824 167static void try_kill_monitor(pid_t pid, char *devname, int sock)
96a8270d
DW
168{
169 char buf[100];
170 int fd;
417a4b04 171 int n;
af7ca334 172 long fl;
d2e11da4 173 int rv;
b109d928 174
8aae4219
DW
175 /* first rule of survival... don't off yourself */
176 if (pid == getpid())
177 return;
178
b109d928
DW
179 /* kill this process if it is mdmon */
180 sprintf(buf, "/proc/%lu/cmdline", (unsigned long) pid);
181 fd = open(buf, O_RDONLY);
182 if (fd < 0)
183 return;
184
417a4b04
N
185 n = read(fd, buf, sizeof(buf)-1);
186 buf[sizeof(buf)-1] = 0;
187 close(fd);
b109d928 188
a99d3469
N
189 if (n < 0 || !(strstr(buf, "mdmon") ||
190 strstr(buf, "@dmon")))
883a6142
DW
191 return;
192
193 kill(pid, SIGTERM);
194
88e5516e
N
195 if (sock < 0)
196 return;
197
af7ca334
N
198 /* Wait for monitor to exit by reading from the socket, after
199 * clearing the non-blocking flag */
200 fl = fcntl(sock, F_GETFL, 0);
201 fl &= ~O_NONBLOCK;
202 fcntl(sock, F_SETFL, fl);
fcf57625 203 n = read(sock, buf, 100);
d2e11da4
PB
204
205 /* If there is I/O going on it might took some time to get to
206 * clean state. Wait for monitor to exit fully to avoid races.
207 * Ping it with SIGUSR1 in case that it is sleeping */
208 for (n = 0; n < 25; n++) {
209 rv = kill(pid, SIGUSR1);
210 if (rv < 0)
211 break;
239b3cc0 212 sleep_for(0, MSEC_TO_NSEC(200), true);
d2e11da4 213 }
b109d928
DW
214}
215
e0d6609f
NB
216void remove_pidfile(char *devname)
217{
218 char buf[100];
219
753cf905 220 sprintf(buf, "%s/%s.pid", MDMON_DIR, devname);
e0d6609f 221 unlink(buf);
753cf905 222 sprintf(buf, "%s/%s.sock", MDMON_DIR, devname);
57752795 223 unlink(buf);
e0d6609f
NB
224}
225
fa716c83 226static int make_control_sock(char *devname)
549e9569
NB
227{
228 char path[100];
229 int sfd;
230 long fl;
231 struct sockaddr_un addr;
232
6144ed44
DW
233 if (sigterm)
234 return -1;
235
753cf905 236 sprintf(path, "%s/%s.sock", MDMON_DIR, devname);
549e9569
NB
237 unlink(path);
238 sfd = socket(PF_LOCAL, SOCK_STREAM, 0);
239 if (sfd < 0)
240 return -1;
241
242 addr.sun_family = PF_LOCAL;
243 strcpy(addr.sun_path, path);
120ec6f7 244 umask(077); /* ensure no world write access */
50d72ed4 245 if (bind(sfd, (struct sockaddr*)&addr, sizeof(addr)) < 0) {
549e9569
NB
246 close(sfd);
247 return -1;
248 }
249 listen(sfd, 10);
250 fl = fcntl(sfd, F_GETFL, 0);
251 fl |= O_NONBLOCK;
252 fcntl(sfd, F_SETFL, fl);
253 return sfd;
254}
255
6144ed44
DW
256static void term(int sig)
257{
258 sigterm = 1;
259}
260
4d43913c
NB
261static void wake_me(int sig)
262{
263
264}
265
16ddab0d
DW
266/* if we are debugging and starting mdmon by hand then don't fork */
267static int do_fork(void)
268{
269 #ifdef DEBUG
40ebbb9c 270 if (check_env("MDADM_NO_MDMON"))
16ddab0d
DW
271 return 0;
272 #endif
273
274 return 1;
275}
276
13047e4c
DW
277void usage(void)
278{
eb155f6d
JS
279 fprintf(stderr,
280"Usage: mdmon [options] CONTAINER\n"
281"\n"
282"Options are:\n"
283" --help -h : This message\n"
bf3a33b3
JS
284" --all -a : All devices\n"
285" --foreground -F : Run in foreground (do not fork)\n"
eb155f6d
JS
286" --takeover -t : Takeover container\n"
287);
13047e4c
DW
288 exit(2);
289}
16ddab0d 290
1066ab83
LF
291static bool is_duplicate_opt(const int opt, const int set_val, const char *long_name)
292{
293 if (opt == set_val) {
294 pr_err("--%s option duplicated!\n", long_name);
295 return true;
296 }
297 return false;
298}
299
4dd2df09 300static int mdmon(char *devnm, int must_fork, int takeover);
1ffd2840 301
549e9569
NB
302int main(int argc, char *argv[])
303{
13047e4c 304 char *container_name = NULL;
4dd2df09 305 char *devnm = NULL;
1ffd2840 306 int status = 0;
eb155f6d 307 int opt;
b5c727dc
N
308 int all = 0;
309 int takeover = 0;
03041982 310 int dofork = 1;
1066ab83 311 bool help = false;
eb155f6d
JS
312 static struct option options[] = {
313 {"all", 0, NULL, 'a'},
314 {"takeover", 0, NULL, 't'},
315 {"help", 0, NULL, 'h'},
da827518 316 {"offroot", 0, NULL, OffRootOpt},
03041982 317 {"foreground", 0, NULL, 'F'},
eb155f6d
JS
318 {NULL, 0, NULL, 0}
319 };
320
03041982 321 while ((opt = getopt_long(argc, argv, "thaF", options, NULL)) != -1) {
eb155f6d
JS
322 switch (opt) {
323 case 'a':
1066ab83
LF
324 if (is_duplicate_opt(all, 1, "all"))
325 exit(1);
eb155f6d 326 container_name = argv[optind-1];
b5c727dc 327 all = 1;
eb155f6d
JS
328 break;
329 case 't':
1066ab83
LF
330 if (is_duplicate_opt(takeover, 1, "takeover"))
331 exit(1);
b5c727dc 332 takeover = 1;
eb155f6d 333 break;
03041982 334 case 'F':
1066ab83
LF
335 if (is_duplicate_opt(dofork, 0, "foreground"))
336 exit(1);
03041982
N
337 dofork = 0;
338 break;
da827518 339 case OffRootOpt:
1066ab83
LF
340 if (is_duplicate_opt(argv[0][0], '@', "offroot"))
341 exit(1);
5d79c72e 342 argv[0][0] = '@';
da827518 343 break;
eb155f6d 344 case 'h':
1066ab83
LF
345 if (is_duplicate_opt(help, true, "help"))
346 exit(1);
347 help = true;
348 break;
eb155f6d 349 default:
b5c727dc 350 usage();
eb155f6d
JS
351 break;
352 }
353 }
354
1066ab83
LF
355
356 if (in_initrd()) {
357 /*
358 * set first char of argv[0] to @. This is used by
359 * systemd to signal that the task was launched from
360 * initrd/initramfs and should be preserved during shutdown
361 */
362 argv[0][0] = '@';
363 }
364
eb155f6d 365 if (all == 0 && container_name == NULL) {
9b429fc0
MK
366 if (argv[optind]) {
367 container_name = get_md_name(argv[optind]);
368 if (!container_name)
b938519e 369 return 1;
9b429fc0 370 }
549e9569 371 }
eb155f6d 372
9b429fc0 373 if (container_name == NULL || argc - optind > 1)
eb155f6d
JS
374 usage();
375
376 if (strcmp(container_name, "/proc/mdstat") == 0)
377 all = 1;
378
1066ab83
LF
379 if (help)
380 usage();
381
b5c727dc 382 if (all) {
1ffd2840 383 struct mdstat_ent *mdstat, *e;
eb49460b 384 int container_len = strlen(container_name);
1ffd2840
DW
385
386 /* launch an mdmon instance for each container found */
1ffd2840
DW
387 mdstat = mdstat_read(0, 0);
388 for (e = mdstat; e; e = e->next) {
f4db7a6f
MM
389 if (e->metadata_version &&
390 strncmp(e->metadata_version, "external:", 9) == 0 &&
1ffd2840 391 !is_subarray(&e->metadata_version[9])) {
1b34f519
DW
392 /* update cmdline so this mdmon instance can be
393 * distinguished from others in a call to ps(1)
394 */
4dd2df09 395 if (strlen(e->devnm) <= (unsigned)container_len) {
eb49460b 396 memset(container_name, 0, container_len);
4dd2df09 397 sprintf(container_name, "%s", e->devnm);
1b34f519 398 }
4dd2df09 399 status |= mdmon(e->devnm, 1, takeover);
1ffd2840
DW
400 }
401 }
402 free_mdstat(mdstat);
403
404 return status;
6f4098a6 405 } else {
b938519e 406 int mdfd = open_mddev(container_name, 0);
9b429fc0 407 devnm = fd2devnm(mdfd);
b938519e 408
9b429fc0 409 close(mdfd);
6f4098a6
DW
410 }
411
4dd2df09 412 if (!devnm) {
a88e119f 413 pr_err("%s is not a valid md device name\n",
e8a70c89 414 container_name);
9b429fc0 415 return 1;
e8a70c89 416 }
4dd2df09 417 return mdmon(devnm, dofork && do_fork(), takeover);
1ffd2840
DW
418}
419
4dd2df09 420static int mdmon(char *devnm, int must_fork, int takeover)
1ffd2840
DW
421{
422 int mdfd;
423 struct mdinfo *mdi, *di;
424 struct supertype *container;
425 sigset_t set;
426 struct sigaction act;
427 int pfd[2];
428 int status;
429 int ignore;
96a8270d 430 pid_t victim = -1;
9f1da824 431 int victim_sock = -1;
1ffd2840 432
4dd2df09 433 dprintf("starting mdmon for %s\n", devnm);
b928b5a0 434
4dd2df09 435 mdfd = open_dev(devnm);
549e9569 436 if (mdfd < 0) {
a88e119f 437 pr_err("%s: %s\n", devnm, strerror(errno));
1ffd2840 438 return 1;
549e9569 439 }
549e9569 440
9fe32043 441 /* Fork, and have the child tell us when they are ready */
3e7312a9 442 if (must_fork) {
3d2c4fc7 443 if (pipe(pfd) != 0) {
a88e119f 444 pr_err("failed to create pipe\n");
1ffd2840 445 return 1;
3d2c4fc7 446 }
16ddab0d
DW
447 switch(fork()) {
448 case -1:
a88e119f 449 pr_err("failed to fork: %s\n", strerror(errno));
1ffd2840 450 return 1;
16ddab0d
DW
451 case 0: /* child */
452 close(pfd[0]);
453 break;
454 default: /* parent */
455 close(pfd[1]);
456 if (read(pfd[0], &status, sizeof(status)) != sizeof(status)) {
457 wait(&status);
458 status = WEXITSTATUS(status);
459 }
5e57245e 460 close(pfd[0]);
1ffd2840 461 return status;
9fe32043 462 }
16ddab0d
DW
463 } else
464 pfd[0] = pfd[1] = -1;
549e9569 465
503975b9 466 container = xcalloc(1, sizeof(*container));
4dd2df09 467 strcpy(container->devnm, devnm);
13047e4c 468 container->arrays = NULL;
96a8270d 469 container->sock = -1;
13047e4c 470
4dd2df09 471 mdi = sysfs_read(mdfd, container->devnm, GET_VERSION|GET_LEVEL|GET_DEVS);
13047e4c
DW
472
473 if (!mdi) {
a88e119f 474 pr_err("failed to load sysfs info for %s\n", container->devnm);
13047e4c
DW
475 exit(3);
476 }
477 if (mdi->array.level != UnSet) {
a88e119f 478 pr_err("%s is not a container - cannot monitor\n", devnm);
13047e4c
DW
479 exit(3);
480 }
481 if (mdi->array.major_version != -1 ||
482 mdi->array.minor_version != -2) {
a88e119f 483 pr_err("%s does not use external metadata - cannot monitor\n",
4dd2df09 484 devnm);
13047e4c
DW
485 exit(3);
486 }
487
33414a01 488 container->ss = version_to_superswitch(mdi->text_version);
13047e4c 489 if (container->ss == NULL) {
a88e119f 490 pr_err("%s uses unsupported metadata: %s\n",
4dd2df09 491 devnm, mdi->text_version);
13047e4c
DW
492 exit(3);
493 }
494
495 container->devs = NULL;
496 for (di = mdi->devs; di; di = di->next) {
503975b9 497 struct mdinfo *cd = xmalloc(sizeof(*cd));
13047e4c
DW
498 *cd = *di;
499 cd->next = container->devs;
500 container->devs = cd;
501 }
502 sysfs_free(mdi);
549e9569 503
883a6142
DW
504 /* SIGUSR is sent between parent and child. So both block it
505 * and enable it only with pselect.
506 */
507 sigemptyset(&set);
508 sigaddset(&set, SIGUSR1);
883a6142
DW
509 sigaddset(&set, SIGTERM);
510 sigprocmask(SIG_BLOCK, &set, NULL);
511 act.sa_handler = wake_me;
512 act.sa_flags = 0;
513 sigaction(SIGUSR1, &act, NULL);
883a6142
DW
514 act.sa_handler = term;
515 sigaction(SIGTERM, &act, NULL);
516 act.sa_handler = SIG_IGN;
517 sigaction(SIGPIPE, &act, NULL);
518
4dd2df09 519 victim = mdmon_pid(container->devnm);
84a230d9 520 if (victim >= 0)
4dd2df09 521 victim_sock = connect_monitor(container->devnm);
13047e4c 522
13047e4c 523 ignore = chdir("/");
32f21701
N
524 if (!takeover && victim > 0 && victim_sock >= 0) {
525 if (fping_monitor(victim_sock) == 0) {
a88e119f 526 pr_err("%s already managed\n", container->devnm);
b109d928 527 exit(3);
24cfdbc5 528 }
32f21701 529 close(victim_sock);
88e5516e 530 victim_sock = -1;
549e9569 531 }
4dd2df09 532 if (container->ss->load_container(container, mdfd, devnm)) {
a88e119f 533 pr_err("Cannot load metadata for %s\n", devnm);
549e9569
NB
534 exit(3);
535 }
e8a70c89 536 close(mdfd);
549e9569 537
9fe32043
N
538 /* Ok, this is close enough. We can say goodbye to our parent now.
539 */
fa716c83 540 if (victim > 0)
4dd2df09
N
541 remove_pidfile(devnm);
542 if (make_pidfile(devnm) < 0) {
753cf905 543 exit(3);
fa716c83 544 }
4dd2df09 545 container->sock = make_control_sock(devnm);
fa716c83 546
9fe32043 547 status = 0;
5e57245e
N
548 if (pfd[1] >= 0) {
549 if (write(pfd[1], &status, sizeof(status)) < 0)
550 pr_err("failed to notify our parent: %d\n",
551 getppid());
552 close(pfd[1]);
553 }
9fe32043 554
1373b07d 555 mlockall(MCL_CURRENT | MCL_FUTURE);
549e9569 556
3e70c845 557 if (clone_monitor(container) < 0) {
a88e119f 558 pr_err("failed to start monitor process: %s\n",
549e9569
NB
559 strerror(errno));
560 exit(2);
561 }
562
fa716c83 563 if (victim > 0) {
4dd2df09 564 try_kill_monitor(victim, container->devnm, victim_sock);
88e5516e
N
565 if (victim_sock >= 0)
566 close(victim_sock);
9f1da824 567 }
e98ef225
N
568
569 setsid();
ff6bb131 570 manage_fork_fds(0);
e98ef225 571
e4c72d1d
LB
572 /* This silliness is to stop the compiler complaining
573 * that we ignore 'ignore'
574 */
575 if (ignore)
576 ignore++;
577
549e9569
NB
578 do_manager(container);
579
580 exit(0);
581}
999b4972
N
582
583/* Some stub functions so super-* can link with us */
584int child_monitor(int afd, struct mdinfo *sra, struct reshape *reshape,
585 struct supertype *st, unsigned long blocks,
586 int *fds, unsigned long long *offsets,
587 int dests, int *destfd, unsigned long long *destoffsets)
588{
589 return 0;
590}
afbbf073
AK
591
592int restore_stripes(int *dest, unsigned long long *offsets,
593 int raid_disks, int chunk_size, int level, int layout,
594 int source, unsigned long long read_offset,
595 unsigned long long start, unsigned long long length,
596 char *src_buf)
597{
598 return 1;
599}
600
afbbf073
AK
601int save_stripes(int *source, unsigned long long *offsets,
602 int raid_disks, int chunk_size, int level, int layout,
603 int nwrites, int *dest,
604 unsigned long long start, unsigned long long length,
605 char *buf)
606{
607 return 0;
608}
935a3254
N
609
610struct superswitch super0 = {
611 .name = "0.90",
612};
613struct superswitch super1 = {
614 .name = "1.x",
615};