]> git.ipfire.org Git - thirdparty/mdadm.git/blame - Incremental.c
Change some "fprintf(stderr,"s to pr_err.
[thirdparty/mdadm.git] / Incremental.c
CommitLineData
8382f19b
NB
1/*
2 * Incremental.c - support --incremental. Part of:
3 * mdadm - manage Linux "md" devices aka RAID arrays.
4 *
ca3b6696 5 * Copyright (C) 2006-2012 Neil Brown <neilb@suse.de>
8382f19b
NB
6 *
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License as published by
10 * the Free Software Foundation; either version 2 of the License, or
11 * (at your option) any later version.
12 *
13 * This program is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
16 * GNU General Public License for more details.
17 *
18 * You should have received a copy of the GNU General Public License
19 * along with this program; if not, write to the Free Software
20 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
21 *
22 * Author: Neil Brown
23 * Email: <neilb@suse.de>
24 * Paper: Neil Brown
25 * Novell Inc
26 * GPO Box Q1283
27 * QVB Post Office, NSW 1230
28 * Australia
29 */
30
31#include "mdadm.h"
6b63c1a4 32#include <sys/wait.h>
61018da0
N
33#include <dirent.h>
34#include <ctype.h>
8382f19b 35
2bf740b3
N
36static int count_active(struct supertype *st, struct mdinfo *sra,
37 int mdfd, char **availp,
8382f19b 38 struct mdinfo *info);
7e0f6979 39static void find_reject(int mdfd, struct supertype *st, struct mdinfo *sra,
8382f19b
NB
40 int number, __u64 events, int verbose,
41 char *array_name);
f08605b3 42static int try_spare(char *devname, int *dfdp, struct dev_policy *pol,
d2db3045 43 struct map_ent *target,
f08605b3 44 struct supertype *st, int verbose);
8382f19b 45
7d91c3f5 46static int Incremental_container(struct supertype *st, char *devname,
11b6d91d
N
47 struct context *c);
48
49int Incremental(char *devname, struct context *c,
50 struct supertype *st)
8382f19b
NB
51{
52 /* Add this device to an array, creating the array if necessary
598f0d58 53 * and starting the array if sensible or - if runstop>0 - if possible.
8382f19b
NB
54 *
55 * This has several steps:
56 *
57 * 1/ Check if device is permitted by mdadm.conf, reject if not.
58 * 2/ Find metadata, reject if none appropriate (check
59 * version/name from args)
60 * 3/ Check if there is a match in mdadm.conf
215bb3f7
N
61 * 3a/ if not, check for homehost match. If no match, assemble as
62 * a 'foreign' array.
8382f19b
NB
63 * 4/ Determine device number.
64 * - If in mdadm.conf with std name, use that
65 * - UUID in /var/run/mdadm.map use that
66 * - If name is suggestive, use that. unless in use with different uuid.
67 * - Choose a free, high number.
68 * - Use a partitioned device unless strong suggestion not to.
69 * e.g. auto=md
352452c3 70 * Don't choose partitioned for containers.
8382f19b
NB
71 * 5/ Find out if array already exists
72 * 5a/ if it does not
73 * - choose a name, from mdadm.conf or 'name' field in array.
74 * - create the array
75 * - add the device
76 * 5b/ if it does
77 * - check one drive in array to make sure metadata is a reasonably
78 * close match. Reject if not (e.g. different type)
79 * - add the device
80 * 6/ Make sure /var/run/mdadm.map contains this array.
81 * 7/ Is there enough devices to possibly start the array?
352452c3 82 * For a container, this means running Incremental_container.
8382f19b
NB
83 * 7a/ if not, finish with success.
84 * 7b/ if yes,
85 * - read all metadata and arrange devices like -A does
86 * - if number of OK devices match expected, or -R and there are enough,
87 * start the array (auto-readonly).
88 */
89 struct stat stb;
7e83544b 90 struct mdinfo info, dinfo;
de6ae750 91 struct mdinfo *sra = NULL, *d;
fa56eddb 92 struct mddev_ident *match;
8382f19b 93 char chosen_name[1024];
15d4a7e4 94 int rv = 1;
8382f19b 95 struct map_ent *mp, *map = NULL;
15d4a7e4 96 int dfd = -1, mdfd = -1;
de6ae750 97 char *avail = NULL;
8382f19b 98 int active_disks;
47c74f3f 99 int trustworthy;
d7288ddc 100 char *name_to_use;
ad5bc697 101 mdu_array_info_t ainf;
7e83544b 102 struct dev_policy *policy = NULL;
d2db3045
N
103 struct map_ent target_array;
104 int have_target;
8382f19b
NB
105
106 struct createinfo *ci = conf_get_create_info();
107
47c74f3f 108 if (stat(devname, &stb) < 0) {
11b6d91d 109 if (c->verbose >= 0)
e7b84f9d 110 pr_err("stat failed for %s: %s.\n",
47c74f3f
N
111 devname, strerror(errno));
112 return rv;
113 }
114 if ((stb.st_mode & S_IFMT) != S_IFBLK) {
11b6d91d 115 if (c->verbose >= 0)
e7b84f9d 116 pr_err("%s is not a block device.\n",
47c74f3f
N
117 devname);
118 return rv;
119 }
0431869c 120 dfd = dev_open(devname, O_RDONLY);
47c74f3f 121 if (dfd < 0) {
11b6d91d 122 if (c->verbose >= 0)
e7b84f9d 123 pr_err("cannot open %s: %s.\n",
47c74f3f
N
124 devname, strerror(errno));
125 return rv;
126 }
127 /* If the device is a container, we do something very different */
3a371610 128 if (must_be_container(dfd)) {
47c74f3f
N
129 if (!st)
130 st = super_by_fd(dfd, NULL);
cb8f6859
N
131 if (st)
132 st->ignore_hw_compat = 1;
a92b2112 133 if (st && st->ss->load_container)
47c74f3f
N
134 rv = st->ss->load_container(st, dfd, NULL);
135
136 close(dfd);
5fc8cff3
JS
137 if (!rv && st->ss->container_content) {
138 if (map_lock(&map))
e7b84f9d
N
139 pr_err("failed to get "
140 "exclusive lock on mapfile\n");
11b6d91d 141 rv = Incremental_container(st, devname, c);
5fc8cff3
JS
142 map_unlock(&map);
143 return rv;
144 }
47c74f3f 145
e7b84f9d 146 pr_err("%s is not part of an md array.\n",
47c74f3f
N
147 devname);
148 return rv;
149 }
8382f19b 150
352452c3 151 /* 1/ Check if device is permitted by mdadm.conf */
8382f19b
NB
152
153 if (!conf_test_dev(devname)) {
11b6d91d 154 if (c->verbose >= 0)
e7b84f9d
N
155 pr_err("%s not permitted by mdadm.conf.\n",
156 devname);
15d4a7e4 157 goto out;
8382f19b
NB
158 }
159
160 /* 2/ Find metadata, reject if none appropriate (check
161 * version/name from args) */
162
8382f19b 163 if (fstat(dfd, &stb) < 0) {
11b6d91d 164 if (c->verbose >= 0)
e7b84f9d 165 pr_err("fstat failed for %s: %s.\n",
8382f19b 166 devname, strerror(errno));
15d4a7e4 167 goto out;
8382f19b
NB
168 }
169 if ((stb.st_mode & S_IFMT) != S_IFBLK) {
11b6d91d 170 if (c->verbose >= 0)
e7b84f9d 171 pr_err("%s is not a block device.\n",
8382f19b 172 devname);
15d4a7e4 173 goto out;
8382f19b
NB
174 }
175
7e83544b
N
176 dinfo.disk.major = major(stb.st_rdev);
177 dinfo.disk.minor = minor(stb.st_rdev);
178
179 policy = disk_policy(&dinfo);
d2db3045 180 have_target = policy_check_path(&dinfo, &target_array);
7e83544b 181
8382f19b 182 if (st == NULL && (st = guess_super(dfd)) == NULL) {
11b6d91d 183 if (c->verbose >= 0)
e7b84f9d
N
184 pr_err("no recognisable superblock on %s.\n",
185 devname);
d2db3045
N
186 rv = try_spare(devname, &dfd, policy,
187 have_target ? &target_array : NULL,
11b6d91d 188 st, c->verbose);
15d4a7e4 189 goto out;
8382f19b 190 }
cb8f6859 191 st->ignore_hw_compat = 1;
0f22b998
N
192 if (st->ss->compare_super == NULL ||
193 st->ss->load_super(st, dfd, NULL)) {
11b6d91d 194 if (c->verbose >= 0)
e7b84f9d 195 pr_err("no RAID superblock on %s.\n",
8382f19b 196 devname);
d2db3045
N
197 rv = try_spare(devname, &dfd, policy,
198 have_target ? &target_array : NULL,
11b6d91d 199 st, c->verbose);
0f22b998 200 free(st);
15d4a7e4 201 goto out;
8382f19b 202 }
15d4a7e4 203 close (dfd); dfd = -1;
8382f19b 204
a5d85af7 205 st->ss->getinfo_super(st, &info, NULL);
8382f19b 206
3a97f210 207 /* 3/ Check if there is a match in mdadm.conf */
11b6d91d 208 match = conf_match(st, &info, devname, c->verbose, &rv);
3a97f210
N
209 if (!match && rv == 2)
210 goto out;
8382f19b 211
112cace6
N
212 if (match && match->devname
213 && strcasecmp(match->devname, "<ignore>") == 0) {
11b6d91d 214 if (c->verbose >= 0)
e7b84f9d 215 pr_err("array containing %s is explicitly"
112cace6
N
216 " ignored by mdadm.conf\n",
217 devname);
15d4a7e4 218 goto out;
112cace6
N
219 }
220
7b403fef
N
221 /* 3a/ if not, check for homehost match. If no match, continue
222 * but don't trust the 'name' in the array. Thus a 'random' minor
223 * number will be assigned, and the device name will be based
224 * on that. */
215bb3f7
N
225 if (match)
226 trustworthy = LOCAL;
11b6d91d 227 else if (st->ss->match_home(st, c->homehost) == 1)
d1d3482b
N
228 trustworthy = LOCAL;
229 else if (st->ss->match_home(st, "any") == 1)
230 trustworthy = LOCAL_ANY;
215bb3f7 231 else
d1d3482b
N
232 trustworthy = FOREIGN;
233
4e8d9f0a 234 if (!match && !conf_test_metadata(st->ss->name, policy,
d1d3482b 235 (trustworthy == LOCAL))) {
11b6d91d 236 if (c->verbose >= 1)
e7b84f9d
N
237 pr_err("%s has metadata type %s for which "
238 "auto-assembly is disabled\n",
239 devname, st->ss->name);
15d4a7e4 240 goto out;
d1d3482b
N
241 }
242 if (trustworthy == LOCAL_ANY)
ecb02e31 243 trustworthy = LOCAL;
e12e1d1d 244
4ef2f11e
N
245 /* There are three possible sources for 'autof': command line,
246 * ARRAY line in mdadm.conf, or CREATE line in mdadm.conf.
350ac35d
N
247 * ARRAY takes precedence, then command line, then
248 * CREATE.
4ef2f11e 249 */
350ac35d 250 if (match && match->autof)
11b6d91d
N
251 c->autof = match->autof;
252 if (c->autof == 0)
253 c->autof = ci->autof;
4ef2f11e 254
7cdc0872 255 name_to_use = info.name;
0ac91628 256 if (name_to_use[0] == 0 &&
0c4304ca 257 info.array.level == LEVEL_CONTAINER) {
ecb02e31
N
258 name_to_use = info.text_version;
259 trustworthy = METADATA;
260 }
0ac91628 261 if (name_to_use[0] && trustworthy != LOCAL &&
11b6d91d 262 ! c->require_homehost &&
0ac91628
N
263 conf_name_is_free(name_to_use))
264 trustworthy = LOCAL;
ecb02e31 265
7cdc0872
N
266 /* strip "hostname:" prefix from name if we have decided
267 * to treat it as LOCAL
268 */
269 if (trustworthy == LOCAL && strchr(name_to_use, ':') != NULL)
270 name_to_use = strchr(name_to_use, ':')+1;
271
ad5bc697 272 /* 4/ Check if array exists.
215bb3f7 273 */
93c861ee 274 if (map_lock(&map))
e7b84f9d 275 pr_err("failed to get exclusive lock on "
93c861ee 276 "mapfile\n");
0431869c
N
277 /* Now check we can get O_EXCL. If not, probably "mdadm -A" has
278 * taken over
279 */
280 dfd = dev_open(devname, O_RDONLY|O_EXCL);
281 if (dfd < 0) {
282 if (c->verbose >= 0)
283 pr_err("cannot reopen %s: %s.\n",
284 devname, strerror(errno));
285 goto out_unlock;
286 }
287 /* Cannot hold it open while we add the device to the array,
288 * so we must release the O_EXCL and depend on the map_lock()
83785d30 289 * So now is the best time to remove any partitions.
0431869c 290 */
83785d30 291 remove_partitions(dfd);
0431869c
N
292 close(dfd);
293 dfd = -1;
294
215bb3f7 295 mp = map_by_uuid(&map, info.uuid);
339c2d6c 296 if (mp)
4dd2df09 297 mdfd = open_dev(mp->devnm);
339c2d6c 298 else
215bb3f7 299 mdfd = -1;
d7288ddc 300
8382f19b 301 if (mdfd < 0) {
8382f19b 302
215bb3f7 303 /* Couldn't find an existing array, maybe make a new one */
ffb3e494 304 mdfd = create_mddev(match ? match->devname : NULL,
11b6d91d 305 name_to_use, c->autof, trustworthy, chosen_name);
215bb3f7
N
306
307 if (mdfd < 0)
25824e2d 308 goto out_unlock;
215bb3f7 309
4dd2df09 310 sysfs_init(&info, mdfd, NULL);
215bb3f7 311
f35f2525 312 if (set_array_info(mdfd, st, &info) != 0) {
e7b84f9d 313 pr_err("failed to set array info for %s: %s\n",
8382f19b 314 chosen_name, strerror(errno));
15d4a7e4 315 rv = 2;
25824e2d 316 goto out_unlock;
8382f19b 317 }
7801ac20 318
c5afc314
N
319 dinfo = info;
320 dinfo.disk.major = major(stb.st_rdev);
321 dinfo.disk.minor = minor(stb.st_rdev);
322 if (add_disk(mdfd, st, &info, &dinfo) != 0) {
75a410f6 323 pr_err("failed to add %s to new array %s: %s.\n",
8382f19b
NB
324 devname, chosen_name, strerror(errno));
325 ioctl(mdfd, STOP_ARRAY, 0);
15d4a7e4 326 rv = 2;
25824e2d 327 goto out_unlock;
8382f19b 328 }
4dd2df09
N
329 sra = sysfs_read(mdfd, NULL, (GET_DEVS | GET_STATE |
330 GET_OFFSET | GET_SIZE));
ca3b6696 331
06c7f68e 332 if (!sra || !sra->devs || sra->devs->disk.raid_disk >= 0) {
8382f19b
NB
333 /* It really should be 'none' - must be old buggy
334 * kernel, and mdadm -I may not be able to complete.
335 * So reject it.
336 */
337 ioctl(mdfd, STOP_ARRAY, NULL);
e7b84f9d
N
338 pr_err("You have an old buggy kernel which cannot support\n"
339 " --incremental reliably. Aborting.\n");
15d4a7e4 340 rv = 2;
25824e2d 341 goto out_unlock;
8382f19b 342 }
c5afc314 343 info.array.working_disks = 1;
ad5bc697 344 /* 6/ Make sure /var/run/mdadm.map contains this array. */
4dd2df09 345 map_update(&map, fd2devnm(mdfd),
ad5bc697
N
346 info.text_version,
347 info.uuid, chosen_name);
8382f19b
NB
348 } else {
349 /* 5b/ if it does */
350 /* - check one drive in array to make sure metadata is a reasonably */
351 /* close match. Reject if not (e.g. different type) */
352 /* - add the device */
353 char dn[20];
354 int dfd2;
8382f19b 355 int err;
3da92f27 356 struct supertype *st2;
c5afc314 357 struct mdinfo info2, *d;
215bb3f7 358
4dd2df09 359 sra = sysfs_read(mdfd, NULL, (GET_DEVS | GET_STATE |
2bf740b3 360 GET_OFFSET | GET_SIZE));
ca3b6696 361
339c2d6c
N
362 if (mp->path)
363 strcpy(chosen_name, mp->path);
364 else
4dd2df09 365 strcpy(chosen_name, mp->devnm);
215bb3f7 366
ef83fe7c
N
367 /* It is generally not OK to add non-spare drives to a
368 * running array as they are probably missing because
369 * they failed. However if runstop is 1, then the
7e83544b
N
370 * array was possibly started early and our best bet is
371 * to add this anyway.
372 * Also if action policy is re-add or better we allow
e5e5d7ce
N
373 * re-add.
374 * This doesn't apply to containers as the 'non-spare'
375 * flag has a different meaning. The test has to happen
376 * at the device level there
3a6ec29a 377 */
e5e5d7ce
N
378 if (!st->ss->external
379 && (info.disk.state & (1<<MD_DISK_SYNC)) != 0
7e83544b
N
380 && ! policy_action_allows(policy, st->ss->name,
381 act_re_add)
11b6d91d 382 && c->runstop < 1) {
e5e5d7ce 383 if (ioctl(mdfd, GET_ARRAY_INFO, &ainf) == 0) {
e7b84f9d
N
384 pr_err("not adding %s to active array (without --run) %s\n",
385 devname, chosen_name);
15d4a7e4 386 rv = 2;
25824e2d 387 goto out_unlock;
3a6ec29a
N
388 }
389 }
15d4a7e4
N
390 if (!sra) {
391 rv = 2;
25824e2d 392 goto out_unlock;
15d4a7e4 393 }
7c548327
N
394 if (sra->devs) {
395 sprintf(dn, "%d:%d", sra->devs->disk.major,
396 sra->devs->disk.minor);
397 dfd2 = dev_open(dn, O_RDONLY);
fb745c4b 398 if (dfd2 < 0) {
e7b84f9d 399 pr_err("unable to open %s\n", devname);
fb745c4b
JS
400 rv = 2;
401 goto out_unlock;
402 }
7c548327
N
403 st2 = dup_super(st);
404 if (st2->ss->load_super(st2, dfd2, NULL) ||
405 st->ss->compare_super(st, st2) != 0) {
e7b84f9d
N
406 pr_err("metadata mismatch between %s and "
407 "chosen array %s\n",
408 devname, chosen_name);
7c548327 409 close(dfd2);
15d4a7e4 410 rv = 2;
25824e2d 411 goto out_unlock;
7c548327 412 }
8382f19b 413 close(dfd2);
a5d85af7 414 st2->ss->getinfo_super(st2, &info2, NULL);
7c548327
N
415 st2->ss->free_super(st2);
416 if (info.array.level != info2.array.level ||
417 memcmp(info.uuid, info2.uuid, 16) != 0 ||
418 info.array.raid_disks != info2.array.raid_disks) {
e7b84f9d
N
419 pr_err("unexpected difference between %s and %s.\n",
420 chosen_name, devname);
15d4a7e4 421 rv = 2;
25824e2d 422 goto out_unlock;
7c548327 423 }
8382f19b 424 }
69fe207e
N
425 info.disk.major = major(stb.st_rdev);
426 info.disk.minor = minor(stb.st_rdev);
c5afc314
N
427 /* add disk needs to know about containers */
428 if (st->ss->external)
429 sra->array.level = LEVEL_CONTAINER;
69fe207e 430 err = add_disk(mdfd, st, sra, &info);
8382f19b
NB
431 if (err < 0 && errno == EBUSY) {
432 /* could be another device present with the same
433 * disk.number. Find and reject any such
434 */
435 find_reject(mdfd, st, sra, info.disk.number,
11b6d91d 436 info.events, c->verbose, chosen_name);
69fe207e 437 err = add_disk(mdfd, st, sra, &info);
8382f19b 438 }
75a410f6
N
439 if (err < 0 && errno == EINVAL &&
440 info.disk.state & (1<<MD_DISK_SYNC)) {
441 /* Maybe it needs to be added as a spare */
442 if (policy_action_allows(policy, st->ss->name,
443 act_force_spare)) {
444 info.disk.state &= ~(1<<MD_DISK_SYNC);
445 err = add_disk(mdfd, st, sra, &info);
446 } else
447 if (c->verbose >= 0)
448 pr_err("can only add %s to %s as a spare, and force-spare is not set.\n",
449 devname, chosen_name);
450 }
8382f19b 451 if (err < 0) {
75a410f6 452 pr_err("failed to add %s to existing array %s: %s.\n",
8382f19b 453 devname, chosen_name, strerror(errno));
15d4a7e4 454 rv = 2;
25824e2d 455 goto out_unlock;
8382f19b 456 }
c5afc314
N
457 info.array.working_disks = 0;
458 for (d = sra->devs; d; d=d->next)
459 info.array.working_disks ++;
ca3b6696 460
8382f19b 461 }
8382f19b
NB
462
463 /* 7/ Is there enough devices to possibly start the array? */
464 /* 7a/ if not, finish with success. */
352452c3 465 if (info.array.level == LEVEL_CONTAINER) {
4dd2df09 466 char devnm[32];
352452c3 467 /* Try to assemble within the container */
a408d66c 468 sysfs_uevent(sra, "change");
11b6d91d 469 if (c->verbose >= 0)
e7b84f9d
N
470 pr_err("container %s now has %d device%s\n",
471 chosen_name, info.array.working_disks,
ca3b6696 472 info.array.working_disks == 1?"":"s");
a7c6e3fb 473 wait_for(chosen_name, mdfd);
ed690d36 474 if (st->ss->external)
4dd2df09 475 strcpy(devnm, fd2devnm(mdfd));
5fc8cff3
JS
476 if (st->ss->load_container)
477 rv = st->ss->load_container(st, mdfd, NULL);
a7c6e3fb 478 close(mdfd);
2bf740b3 479 sysfs_free(sra);
5fc8cff3 480 if (!rv)
11b6d91d 481 rv = Incremental_container(st, chosen_name, c);
5fc8cff3 482 map_unlock(&map);
03b7f6c6
N
483 if (rv == 1)
484 /* Don't fail the whole -I if a subarray didn't
485 * have enough devices to start yet
486 */
487 rv = 0;
ed690d36
PC
488 /* after spare is added, ping monitor for external metadata
489 * so that it can eg. try to rebuild degraded array */
983fff45 490 if (st->ss->external)
4dd2df09 491 ping_monitor(devnm);
03b7f6c6 492 return rv;
352452c3 493 }
de6ae750 494
2bf740b3
N
495 /* We have added something to the array, so need to re-read the
496 * state. Eventually this state should be kept up-to-date as
497 * things change.
498 */
499 sysfs_free(sra);
4dd2df09 500 sra = sysfs_read(mdfd, NULL, (GET_DEVS | GET_STATE |
2bf740b3
N
501 GET_OFFSET | GET_SIZE));
502 active_disks = count_active(st, sra, mdfd, &avail, &info);
8382f19b
NB
503 if (enough(info.array.level, info.array.raid_disks,
504 info.array.layout, info.array.state & 1,
de5a472e 505 avail) == 0) {
11b6d91d 506 if (c->verbose >= 0)
e7b84f9d
N
507 pr_err("%s attached to %s, not enough to start (%d).\n",
508 devname, chosen_name, active_disks);
15d4a7e4 509 rv = 0;
25824e2d 510 goto out_unlock;
8382f19b 511 }
8382f19b
NB
512
513 /* 7b/ if yes, */
514 /* - if number of OK devices match expected, or -R and there */
515 /* are enough, */
516 /* + add any bitmap file */
517 /* + start the array (auto-readonly). */
8382f19b
NB
518
519 if (ioctl(mdfd, GET_ARRAY_INFO, &ainf) == 0) {
11b6d91d 520 if (c->verbose >= 0)
e7b84f9d
N
521 pr_err("%s attached to %s which is already active.\n",
522 devname, chosen_name);
15d4a7e4 523 rv = 0;
25824e2d 524 goto out_unlock;
8382f19b 525 }
ad5bc697
N
526
527 map_unlock(&map);
11b6d91d 528 if (c->runstop > 0 || active_disks >= info.array.working_disks) {
2bf740b3 529 struct mdinfo *dsk;
8382f19b 530 /* Let's try to start it */
5e88ab2e
N
531
532 if (info.reshape_active && !(info.reshape_active & RESHAPE_NO_BACKUP)) {
ed503f89
N
533 pr_err("%s: This array is being reshaped and cannot be started\n",
534 chosen_name);
535 cont_err("by --incremental. Please use --assemble\n");
5e88ab2e
N
536 goto out;
537 }
8382f19b
NB
538 if (match && match->bitmap_file) {
539 int bmfd = open(match->bitmap_file, O_RDWR);
540 if (bmfd < 0) {
e7b84f9d
N
541 pr_err("Could not open bitmap file %s.\n",
542 match->bitmap_file);
15d4a7e4 543 goto out;
8382f19b
NB
544 }
545 if (ioctl(mdfd, SET_BITMAP_FILE, bmfd) != 0) {
546 close(bmfd);
e7b84f9d
N
547 pr_err("Failed to set bitmapfile for %s.\n",
548 chosen_name);
15d4a7e4 549 goto out;
8382f19b
NB
550 }
551 close(bmfd);
552 }
de6ae750
N
553 /* Need to remove from the array any devices which
554 * 'count_active' discerned were too old or inappropriate
555 */
556 for (d = sra ? sra->devs : NULL ; d ; d = d->next)
557 if (d->disk.state & (1<<MD_DISK_REMOVED))
558 remove_disk(mdfd, st, sra, d);
2bf740b3 559
7b403fef 560 if ((sra == NULL || active_disks >= info.array.working_disks)
215bb3f7 561 && trustworthy != FOREIGN)
8382f19b
NB
562 rv = ioctl(mdfd, RUN_ARRAY, NULL);
563 else
564 rv = sysfs_set_str(sra, NULL,
565 "array_state", "read-auto");
566 if (rv == 0) {
11b6d91d 567 if (c->verbose >= 0)
e7b84f9d
N
568 pr_err("%s attached to %s, which has been started.\n",
569 devname, chosen_name);
8382f19b 570 rv = 0;
a7c6e3fb 571 wait_for(chosen_name, mdfd);
7e83544b
N
572 /* We just started the array, so some devices
573 * might have been evicted from the array
574 * because their event counts were too old.
575 * If the action=re-add policy is in-force for
576 * those devices we should re-add them now.
577 */
578 for (dsk = sra->devs; dsk ; dsk = dsk->next) {
579 if (disk_action_allows(dsk, st->ss->name, act_re_add) &&
580 add_disk(mdfd, st, sra, dsk) == 0)
e7b84f9d
N
581 pr_err("%s re-added to %s\n",
582 dsk->sys_name, chosen_name);
7e83544b 583 }
8382f19b 584 } else {
e7b84f9d
N
585 pr_err("%s attached to %s, but failed to start: %s.\n",
586 devname, chosen_name, strerror(errno));
8382f19b
NB
587 rv = 1;
588 }
589 } else {
11b6d91d 590 if (c->verbose >= 0)
e7b84f9d
N
591 pr_err("%s attached to %s, not enough to start safely.\n",
592 devname, chosen_name);
8382f19b
NB
593 rv = 0;
594 }
15d4a7e4 595out:
de6ae750 596 free(avail);
15d4a7e4
N
597 if (dfd >= 0)
598 close(dfd);
599 if (mdfd >= 0)
600 close(mdfd);
7e83544b
N
601 if (policy)
602 dev_policy_free(policy);
2bf740b3
N
603 if (sra)
604 sysfs_free(sra);
8382f19b 605 return rv;
25824e2d
JS
606out_unlock:
607 map_unlock(&map);
608 goto out;
8382f19b
NB
609}
610
7e0f6979 611static void find_reject(int mdfd, struct supertype *st, struct mdinfo *sra,
8382f19b
NB
612 int number, __u64 events, int verbose,
613 char *array_name)
614{
3da92f27 615 /* Find a device attached to this array with a disk.number of number
8382f19b
NB
616 * and events less than the passed events, and remove the device.
617 */
06c7f68e 618 struct mdinfo *d;
8382f19b
NB
619 mdu_array_info_t ra;
620
621 if (ioctl(mdfd, GET_ARRAY_INFO, &ra) == 0)
622 return; /* not safe to remove from active arrays
623 * without thinking more */
624
625 for (d = sra->devs; d ; d = d->next) {
626 char dn[10];
627 int dfd;
8382f19b 628 struct mdinfo info;
06c7f68e 629 sprintf(dn, "%d:%d", d->disk.major, d->disk.minor);
8382f19b
NB
630 dfd = dev_open(dn, O_RDONLY);
631 if (dfd < 0)
632 continue;
3da92f27 633 if (st->ss->load_super(st, dfd, NULL)) {
8382f19b
NB
634 close(dfd);
635 continue;
636 }
a5d85af7 637 st->ss->getinfo_super(st, &info, NULL);
3da92f27 638 st->ss->free_super(st);
8382f19b
NB
639 close(dfd);
640
641 if (info.disk.number != number ||
642 info.events >= events)
643 continue;
644
06c7f68e 645 if (d->disk.raid_disk > -1)
8382f19b
NB
646 sysfs_set_str(sra, d, "slot", "none");
647 if (sysfs_set_str(sra, d, "state", "remove") == 0)
648 if (verbose >= 0)
e7b84f9d
N
649 pr_err("removing old device %s from %s\n",
650 d->sys_name+4, array_name);
8382f19b
NB
651 }
652}
653
2bf740b3
N
654static int count_active(struct supertype *st, struct mdinfo *sra,
655 int mdfd, char **availp,
8382f19b
NB
656 struct mdinfo *bestinfo)
657{
658 /* count how many devices in sra think they are active */
06c7f68e 659 struct mdinfo *d;
de6ae750 660 int cnt = 0;
72e7fb13 661 int replcnt = 0;
8382f19b 662 __u64 max_events = 0;
8382f19b 663 char *avail = NULL;
e4c72d1d 664 int *best = NULL;
de6ae750
N
665 char *devmap = NULL;
666 int numdevs = 0;
667 int devnum;
668 int b, i;
669 int raid_disks = 0;
8382f19b 670
b526e52d
DW
671 if (!sra)
672 return 0;
673
de6ae750
N
674 for (d = sra->devs ; d ; d = d->next)
675 numdevs++;
ca3b6696 676 for (d = sra->devs, devnum = 0 ; d ; d = d->next, devnum++) {
8382f19b
NB
677 char dn[30];
678 int dfd;
8382f19b
NB
679 int ok;
680 struct mdinfo info;
681
06c7f68e 682 sprintf(dn, "%d:%d", d->disk.major, d->disk.minor);
8382f19b
NB
683 dfd = dev_open(dn, O_RDONLY);
684 if (dfd < 0)
685 continue;
3da92f27 686 ok = st->ss->load_super(st, dfd, NULL);
8382f19b
NB
687 close(dfd);
688 if (ok != 0)
689 continue;
de6ae750
N
690 info.array.raid_disks = raid_disks;
691 st->ss->getinfo_super(st, &info, devmap + raid_disks * devnum);
43aaf431 692 if (!avail) {
de6ae750 693 raid_disks = info.array.raid_disks;
503975b9 694 avail = xcalloc(raid_disks, 1);
43aaf431 695 *availp = avail;
de6ae750 696
503975b9
N
697 best = xcalloc(raid_disks, sizeof(int));
698 devmap = xcalloc(raid_disks, numdevs);
de6ae750
N
699
700 st->ss->getinfo_super(st, &info, devmap);
43aaf431
DL
701 }
702
8382f19b
NB
703 if (info.disk.state & (1<<MD_DISK_SYNC))
704 {
8382f19b
NB
705 if (cnt == 0) {
706 cnt++;
707 max_events = info.events;
708 avail[info.disk.raid_disk] = 2;
de6ae750 709 best[info.disk.raid_disk] = devnum;
a5d85af7 710 st->ss->getinfo_super(st, bestinfo, NULL);
8382f19b 711 } else if (info.events == max_events) {
8382f19b 712 avail[info.disk.raid_disk] = 2;
de6ae750 713 best[info.disk.raid_disk] = devnum;
8382f19b 714 } else if (info.events == max_events-1) {
de6ae750
N
715 if (avail[info.disk.raid_disk] == 0) {
716 avail[info.disk.raid_disk] = 1;
717 best[info.disk.raid_disk] = devnum;
718 }
8382f19b
NB
719 } else if (info.events < max_events - 1)
720 ;
721 else if (info.events == max_events+1) {
722 int i;
8382f19b 723 max_events = info.events;
ca3b6696 724 for (i = 0; i < raid_disks; i++)
8382f19b
NB
725 if (avail[i])
726 avail[i]--;
727 avail[info.disk.raid_disk] = 2;
de6ae750 728 best[info.disk.raid_disk] = devnum;
a5d85af7 729 st->ss->getinfo_super(st, bestinfo, NULL);
8382f19b 730 } else { /* info.events much bigger */
47c7a4be 731 memset(avail, 0, raid_disks);
8382f19b 732 max_events = info.events;
1d1a9f87 733 avail[info.disk.raid_disk] = 2;
47c7a4be 734 best[info.disk.raid_disk] = devnum;
a5d85af7 735 st->ss->getinfo_super(st, bestinfo, NULL);
8382f19b 736 }
72e7fb13
N
737 } else if (info.disk.state & (1<<MD_DISK_REPLACEMENT))
738 replcnt++;
3da92f27 739 st->ss->free_super(st);
8382f19b 740 }
de6ae750
N
741 if (!avail)
742 return 0;
743 /* We need to reject any device that thinks the best device is
744 * failed or missing */
745 for (b = 0; b < raid_disks; b++)
746 if (avail[b] == 2)
747 break;
748 cnt = 0;
749 for (i = 0 ; i < raid_disks ; i++) {
750 if (i != b && avail[i])
751 if (devmap[raid_disks * best[i] + b] == 0) {
752 /* This device thinks 'b' is failed -
753 * don't use it */
754 devnum = best[i];
755 for (d=sra->devs ; devnum; d = d->next)
756 devnum--;
757 d->disk.state |= (1 << MD_DISK_REMOVED);
758 avail[i] = 0;
759 }
760 if (avail[i])
761 cnt++;
762 }
763 free(best);
764 free(devmap);
72e7fb13 765 return cnt + replcnt;
8382f19b
NB
766}
767
5be68a07
PC
768/* test if container has degraded member(s) */
769static int container_members_max_degradation(struct map_ent *map, struct map_ent *me)
770{
771 mdu_array_info_t array;
772 int afd;
773 int max_degraded = 0;
774
775 for(; map; map = map->next) {
4dd2df09 776 if (!metadata_container_matches(map->metadata, me->devnm))
5be68a07 777 continue;
4dd2df09 778 afd = open_dev(map->devnm);
5be68a07
PC
779 if (afd < 0)
780 continue;
781 /* most accurate information regarding array degradation */
782 if (ioctl(afd, GET_ARRAY_INFO, &array) >= 0) {
783 int degraded = array.raid_disks - array.active_disks -
784 array.spare_disks;
785 if (degraded > max_degraded)
786 max_degraded = degraded;
787 }
788 close(afd);
789 }
790 return (max_degraded);
791}
792
56e8be85 793static int array_try_spare(char *devname, int *dfdp, struct dev_policy *pol,
d2db3045 794 struct map_ent *target, int bare,
56e8be85 795 struct supertype *st, int verbose)
f08605b3
N
796{
797 /* This device doesn't have any md metadata
d2db3045
N
798 * The device policy allows 'spare' and if !bare, it allows spare-same-slot.
799 * If 'st' is not set, then we only know that some metadata allows this,
800 * others possibly don't.
801 * So look for a container or array to attach the device to.
802 * Prefer 'target' if that is set and the array is found.
803 *
f08605b3
N
804 * If st is set, then only arrays of that type are considered
805 * Return 0 on success, or some exit code on failure, probably 1.
806 */
8659d089 807 int rv = 1;
f08605b3
N
808 struct stat stb;
809 struct map_ent *mp, *map = NULL;
810 struct mdinfo *chosen = NULL;
811 int dfd = *dfdp;
812
f08605b3
N
813 if (fstat(dfd, &stb) != 0)
814 return 1;
f08605b3 815
56e8be85 816 /*
f08605b3
N
817 * Now we need to find a suitable array to add this to.
818 * We only accept arrays that:
819 * - match 'st'
820 * - are in the same domains as the device
821 * - are of an size for which the device will be useful
822 * and we choose the one that is the most degraded
823 */
824
825 if (map_lock(&map)) {
e7b84f9d 826 pr_err("failed to get exclusive lock on "
f08605b3
N
827 "mapfile\n");
828 return 1;
829 }
830 for (mp = map ; mp ; mp = mp->next) {
831 struct supertype *st2;
832 struct domainlist *dl = NULL;
833 struct mdinfo *sra;
834 unsigned long long devsize;
71204a50 835 unsigned long long component_size = 0;
f08605b3
N
836
837 if (is_subarray(mp->metadata))
838 continue;
839 if (st) {
840 st2 = st->ss->match_metadata_desc(mp->metadata);
841 if (!st2 ||
842 (st->minor_version >= 0 &&
843 st->minor_version != st2->minor_version)) {
844 if (verbose > 1)
e7b84f9d 845 pr_err("not adding %s to %s as metadata type doesn't match\n",
f08605b3
N
846 devname, mp->path);
847 free(st2);
848 continue;
849 }
850 free(st2);
851 }
4dd2df09 852 sra = sysfs_read(-1, mp->devnm,
f08605b3
N
853 GET_DEVS|GET_OFFSET|GET_SIZE|GET_STATE|
854 GET_DEGRADED|GET_COMPONENT|GET_VERSION);
855 if (!sra) {
856 /* Probably a container - no degraded info */
4dd2df09 857 sra = sysfs_read(-1, mp->devnm,
f08605b3
N
858 GET_DEVS|GET_OFFSET|GET_SIZE|GET_STATE|
859 GET_COMPONENT|GET_VERSION);
860 if (sra)
5be68a07 861 sra->array.failed_disks = -1;
f08605b3
N
862 }
863 if (!sra)
864 continue;
865 if (st == NULL) {
866 int i;
867 st2 = NULL;
ca3b6696 868 for(i = 0; !st2 && superlist[i]; i++)
f08605b3
N
869 st2 = superlist[i]->match_metadata_desc(
870 sra->text_version);
6e57f80a
N
871 if (!st2) {
872 if (verbose > 1)
e7b84f9d 873 pr_err("not adding %s to %s"
6e57f80a
N
874 " as metadata not recognised.\n",
875 devname, mp->path);
876 goto next;
877 }
625b2507
N
878 /* Need to double check the 'act_spare' permissions applies
879 * to this metadata.
880 */
881 if (!policy_action_allows(pol, st2->ss->name, act_spare))
882 goto next;
d2db3045
N
883 if (!bare && !policy_action_allows(pol, st2->ss->name,
884 act_spare_same_slot))
885 goto next;
f08605b3
N
886 } else
887 st2 = st;
5be68a07
PC
888 /* update number of failed disks for mostly degraded
889 * container member */
890 if (sra->array.failed_disks == -1)
891 sra->array.failed_disks = container_members_max_degradation(map, mp);
892
f08605b3 893 get_dev_size(dfd, NULL, &devsize);
48865704
PC
894 if (sra->component_size == 0) {
895 /* true for containers, here we must read superblock
896 * to obtain minimum spare size */
897 struct supertype *st3 = dup_super(st2);
4dd2df09 898 int mdfd = open_dev(mp->devnm);
f56128b9 899 if (mdfd < 0) {
1fdeb8a0 900 free(st3);
48865704 901 goto next;
1fdeb8a0 902 }
48865704
PC
903 if (st3->ss->load_container &&
904 !st3->ss->load_container(st3, mdfd, mp->path)) {
905 component_size = st3->ss->min_acceptable_spare_size(st3);
906 st3->ss->free_super(st3);
907 }
908 free(st3);
909 close(mdfd);
910 }
911 if ((sra->component_size > 0 &&
387fcd59
N
912 st2->ss->avail_size(st2, devsize,
913 sra->devs
914 ? sra->devs->data_offset
915 : INVALID_SECTORS)
916 < sra->component_size)
48865704
PC
917 ||
918 (sra->component_size == 0 && devsize < component_size)) {
f08605b3 919 if (verbose > 1)
e7b84f9d 920 pr_err("not adding %s to %s as it is too small\n",
f08605b3
N
921 devname, mp->path);
922 goto next;
923 }
d2db3045
N
924 /* test against target.
925 * If 'target' is set and 'bare' is false, we only accept
926 * arrays/containers that match 'target'.
927 * If 'target' is set and 'bare' is true, we prefer the
928 * array which matches 'target'.
b4924220 929 * target is considered only if we deal with degraded array
d2db3045 930 */
fee6a49e
PC
931 if (target && policy_action_allows(pol, st2->ss->name,
932 act_spare_same_slot)) {
d2db3045
N
933 if (strcmp(target->metadata, mp->metadata) == 0 &&
934 memcmp(target->uuid, mp->uuid,
b4924220
PC
935 sizeof(target->uuid)) == 0 &&
936 sra->array.failed_disks > 0) {
d2db3045
N
937 /* This is our target!! */
938 if (chosen)
939 sysfs_free(chosen);
940 chosen = sra;
941 sra = NULL;
942 /* skip to end so we don't check any more */
943 while (mp->next)
944 mp = mp->next;
945 goto next;
946 }
947 /* not our target */
948 if (!bare)
949 goto next;
950 }
951
b6b3f0f7 952 dl = domain_from_array(sra, st2->ss->name);
e5508b36 953 if (domain_test(dl, pol, st2->ss->name) != 1) {
b6b3f0f7
PC
954 /* domain test fails */
955 if (verbose > 1)
e7b84f9d 956 pr_err("not adding %s to %s as"
b6b3f0f7
PC
957 " it is not in a compatible domain\n",
958 devname, mp->path);
959
960 goto next;
961 }
f08605b3
N
962 /* all tests passed, OK to add to this array */
963 if (!chosen) {
964 chosen = sra;
965 sra = NULL;
966 } else if (chosen->array.failed_disks < sra->array.failed_disks) {
967 sysfs_free(chosen);
968 chosen = sra;
969 sra = NULL;
970 }
971 next:
972 if (sra)
973 sysfs_free(sra);
974 if (st != st2)
975 free(st2);
976 if (dl)
977 domain_free(dl);
978 }
979 if (chosen) {
980 /* add current device to chosen array as a spare */
4dd2df09 981 int mdfd = open_dev(chosen->sys_name);
f08605b3 982 if (mdfd >= 0) {
a655e550 983 struct mddev_dev devlist;
f08605b3
N
984 char devname[20];
985 devlist.next = NULL;
986 devlist.used = 0;
f08605b3
N
987 devlist.writemostly = 0;
988 devlist.devname = devname;
989 sprintf(devname, "%d:%d", major(stb.st_rdev),
990 minor(stb.st_rdev));
991 devlist.disposition = 'a';
992 close(dfd);
993 *dfdp = -1;
994 rv = Manage_subdevs(chosen->sys_name, mdfd, &devlist,
11b391ec 995 -1, 0, NULL, 0);
f08605b3
N
996 close(mdfd);
997 }
998 if (verbose > 0) {
999 if (rv == 0)
e7b84f9d 1000 pr_err("added %s as spare for %s\n",
f08605b3
N
1001 devname, chosen->sys_name);
1002 else
e7b84f9d 1003 pr_err("failed to add %s as spare for %s\n",
f08605b3
N
1004 devname, chosen->sys_name);
1005 }
1006 sysfs_free(chosen);
1007 }
015da8f5 1008 map_unlock(&map);
8659d089 1009 return rv;
f08605b3
N
1010}
1011
56e8be85
N
1012static int partition_try_spare(char *devname, int *dfdp, struct dev_policy *pol,
1013 struct supertype *st, int verbose)
1014{
61018da0
N
1015 /* we know that at least one partition virtual-metadata is
1016 * allowed to incorporate spares like this device. We need to
1017 * find a suitable device to copy partition information from.
1018 *
1019 * Getting a list of all disk (not partition) devices is
1020 * slightly non-trivial. We could look at /sys/block, but
1021 * that is theoretically due to be removed. Maybe best to use
1022 * /dev/disk/by-path/?* and ignore names ending '-partNN' as
1023 * we depend on this directory of 'path' info. But that fails
1024 * to find loop devices and probably others. Maybe don't
1025 * worry about that, they aren't the real target.
1026 *
1027 * So: check things in /dev/disk/by-path to see if they are in
1028 * a compatible domain, then load the partition table and see
1029 * if it is OK for the new device, and choose the largest
1030 * partition table that fits.
1031 */
1032 DIR *dir;
1033 struct dirent *de;
1034 char *chosen = NULL;
71204a50 1035 unsigned long long chosen_size = 0;
61018da0
N
1036 struct supertype *chosen_st = NULL;
1037 int fd;
1038
1039 dir = opendir("/dev/disk/by-path");
1040 if (!dir)
1041 return 1;
1042 while ((de = readdir(dir)) != NULL) {
1043 char *ep;
1044 struct dev_policy *pol2 = NULL;
1045 struct domainlist *domlist = NULL;
1046 int fd = -1;
1047 struct mdinfo info;
1048 struct supertype *st2 = NULL;
1049 char *devname = NULL;
1050 unsigned long long devsectors;
1051
1052 if (de->d_ino == 0 ||
1053 de->d_name[0] == '.' ||
1054 (de->d_type != DT_LNK && de->d_type != DT_UNKNOWN))
1055 goto next;
1056
1057 ep = de->d_name + strlen(de->d_name);
1058 while (ep > de->d_name &&
1059 isdigit(ep[-1]))
1060 ep--;
1061 if (ep > de->d_name + 5 &&
1062 strncmp(ep-5, "-part", 5) == 0)
1063 /* This is a partition - skip it */
1064 goto next;
1065
1066 pol2 = path_policy(de->d_name, type_disk);
1067
1068 domain_merge(&domlist, pol2, st ? st->ss->name : NULL);
e5508b36 1069 if (domain_test(domlist, pol, st ? st->ss->name : NULL) != 1)
61018da0
N
1070 /* new device is incompatible with this device. */
1071 goto next;
1072
1073 domain_free(domlist);
1074 domlist = NULL;
1075
71204a50
N
1076 if (asprintf(&devname, "/dev/disk/by-path/%s", de->d_name) != 1) {
1077 devname = NULL;
1078 goto next;
1079 }
61018da0
N
1080 fd = open(devname, O_RDONLY);
1081 if (fd < 0)
1082 goto next;
1083 if (get_dev_size(fd, devname, &devsectors) == 0)
1084 goto next;
1085 devsectors >>= 9;
1086
1087 if (st)
1088 st2 = dup_super(st);
1089 else
1090 st2 = guess_super_type(fd, guess_partitions);
1091 if (st2 == NULL ||
1092 st2->ss->load_super(st2, fd, NULL) < 0)
1093 goto next;
1094
1095 if (!st) {
1096 /* Check domain policy again, this time referring to metadata */
1097 domain_merge(&domlist, pol2, st2->ss->name);
e5508b36 1098 if (domain_test(domlist, pol, st2->ss->name) != 1)
61018da0
N
1099 /* Incompatible devices for this metadata type */
1100 goto next;
625b2507
N
1101 if (!policy_action_allows(pol, st2->ss->name, act_spare))
1102 /* Some partition types allow sparing, but not
1103 * this one.
1104 */
1105 goto next;
61018da0
N
1106 }
1107
a5d85af7 1108 st2->ss->getinfo_super(st2, &info, NULL);
61018da0
N
1109 if (info.component_size > devsectors)
1110 /* This partitioning doesn't fit in the device */
1111 goto next;
1112
1113 /* This is an acceptable device to copy partition
1114 * metadata from. We could just stop here, but I
1115 * think I want to keep looking incase a larger
1116 * metadata which makes better use of the device can
1117 * be found.
1118 */
1119 if (chosen == NULL ||
1120 chosen_size < info.component_size) {
1121 chosen_size = info.component_size;
1122 free(chosen);
1123 chosen = devname;
1124 devname = NULL;
1125 if (chosen_st) {
1126 chosen_st->ss->free_super(chosen_st);
1127 free(chosen_st);
1128 }
1129 chosen_st = st2;
1130 st2 = NULL;
1131 }
1132
1133 next:
1134 free(devname);
1135 domain_free(domlist);
1136 dev_policy_free(pol2);
1137 if (st2)
1138 st2->ss->free_super(st2);
1139 free(st2);
1140
1141 if (fd >= 0)
1142 close(fd);
1143 }
1144
be5c60e3
JS
1145 closedir(dir);
1146
61018da0
N
1147 if (!chosen)
1148 return 1;
1149
1150 /* 'chosen' is the best device we can find. Let's write its
1151 * metadata to devname dfd is read-only so don't use that
1152 */
1153 fd = open(devname, O_RDWR);
1154 if (fd >= 0) {
1155 chosen_st->ss->store_super(chosen_st, fd);
1156 close(fd);
1157 }
1158 free(chosen);
1159 chosen_st->ss->free_super(chosen_st);
1160 free(chosen_st);
1161 return 0;
56e8be85
N
1162}
1163
52e965c2
N
1164static int is_bare(int dfd)
1165{
1166 unsigned long long size = 0;
1167 char bufpad[4096 + 4096];
1168 char *buf = (char*)(((long)bufpad + 4096) & ~4095);
1169
1170 if (lseek(dfd, 0, SEEK_SET) != 0 ||
1171 read(dfd, buf, 4096) != 4096)
1172 return 0;
1173
1174 if (buf[0] != '\0' && buf[0] != '\x5a' && buf[0] != '\xff')
1175 return 0;
1176 if (memcmp(buf, buf+1, 4095) != 0)
1177 return 0;
1178
1179 /* OK, first 4K appear blank, try the end. */
1180 get_dev_size(dfd, NULL, &size);
1181 if (lseek(dfd, size-4096, SEEK_SET) < 0 ||
1182 read(dfd, buf, 4096) != 4096)
1183 return 0;
1184
1185 if (buf[0] != '\0' && buf[0] != '\x5a' && buf[0] != '\xff')
1186 return 0;
1187 if (memcmp(buf, buf+1, 4095) != 0)
1188 return 0;
1189
1190 return 1;
1191}
56e8be85
N
1192
1193/* adding a spare to a regular array is quite different from adding one to
1194 * a set-of-partitions virtual array.
1195 * This function determines which is worth trying and tries as appropriate.
1196 * Arrays are given priority over partitions.
1197 */
1198static int try_spare(char *devname, int *dfdp, struct dev_policy *pol,
d2db3045 1199 struct map_ent *target,
56e8be85
N
1200 struct supertype *st, int verbose)
1201{
1202 int i;
1203 int rv;
1204 int arrays_ok = 0;
1205 int partitions_ok = 0;
56e8be85 1206 int dfd = *dfdp;
d2db3045 1207 int bare;
56e8be85 1208
d2db3045 1209 /* Can only add a spare if device has at least one domain */
56e8be85
N
1210 if (pol_find(pol, pol_domain) == NULL)
1211 return 1;
1212 /* And only if some action allows spares */
1213 if (!policy_action_allows(pol, st?st->ss->name:NULL, act_spare))
1214 return 1;
1215
d2db3045
N
1216 /* Now check if the device is bare.
1217 * bare devices can always be added as a spare
1218 * non-bare devices can only be added if spare-same-slot is permitted,
1219 * and this device is replacing a previous device - in which case 'target'
1220 * will be set.
56e8be85 1221 */
52e965c2 1222 if (!is_bare(dfd)) {
d2db3045
N
1223 /* Must have a target and allow same_slot */
1224 /* Later - may allow force_spare without target */
1225 if (!target ||
1226 !policy_action_allows(pol, st?st->ss->name:NULL,
1227 act_spare_same_slot)) {
1228 if (verbose > 1)
e7b84f9d 1229 pr_err("%s is not bare, so not "
d2db3045
N
1230 "considering as a spare\n",
1231 devname);
1232 return 1;
1233 }
1234 bare = 0;
1235 } else
1236 bare = 1;
56e8be85 1237
d2db3045
N
1238 /* It might be OK to add this device to an array - need to see
1239 * what arrays might be candidates.
56e8be85
N
1240 */
1241 if (st) {
1242 /* just try try 'array' or 'partition' based on this metadata */
1243 if (st->ss->add_to_super)
d2db3045 1244 return array_try_spare(devname, dfdp, pol, target, bare,
56e8be85
N
1245 st, verbose);
1246 else
1247 return partition_try_spare(devname, dfdp, pol,
1248 st, verbose);
1249 }
d2db3045
N
1250 /* No metadata was specified or found so options are open.
1251 * Check for whether any array metadata, or any partition metadata
1252 * might allow adding the spare. This check is just help to avoid
1253 * a more costly scan of all arrays when we can be sure that will
1254 * fail.
1255 */
56e8be85
N
1256 for (i = 0; (!arrays_ok || !partitions_ok) && superlist[i] ; i++) {
1257 if (superlist[i]->add_to_super && !arrays_ok &&
1258 policy_action_allows(pol, superlist[i]->name, act_spare))
1259 arrays_ok = 1;
1260 if (superlist[i]->add_to_super == NULL && !partitions_ok &&
1261 policy_action_allows(pol, superlist[i]->name, act_spare))
1262 partitions_ok = 1;
1263 }
aaccda44 1264 rv = 1;
56e8be85 1265 if (arrays_ok)
d2db3045
N
1266 rv = array_try_spare(devname, dfdp, pol, target, bare,
1267 st, verbose);
aaccda44 1268 if (rv != 0 && partitions_ok)
56e8be85
N
1269 rv = partition_try_spare(devname, dfdp, pol, st, verbose);
1270 return rv;
1271}
1272
8382f19b
NB
1273int IncrementalScan(int verbose)
1274{
1275 /* look at every device listed in the 'map' file.
1276 * If one is found that is not running then:
1277 * look in mdadm.conf for bitmap file.
1278 * if one exists, but array has none, add it.
1279 * try to start array in auto-readonly mode
1280 */
1281 struct map_ent *mapl = NULL;
1282 struct map_ent *me;
fa56eddb 1283 struct mddev_ident *devs, *mddev;
8382f19b
NB
1284 int rv = 0;
1285
1286 map_read(&mapl);
1287 devs = conf_get_ident(NULL);
1288
1289 for (me = mapl ; me ; me = me->next) {
8382f19b
NB
1290 mdu_array_info_t array;
1291 mdu_bitmap_file_t bmf;
7e0f6979 1292 struct mdinfo *sra;
4dd2df09 1293 int mdfd = open_dev(me->devnm);
215bb3f7 1294
8382f19b
NB
1295 if (mdfd < 0)
1296 continue;
1297 if (ioctl(mdfd, GET_ARRAY_INFO, &array) == 0 ||
1298 errno != ENODEV) {
1299 close(mdfd);
1300 continue;
1301 }
1302 /* Ok, we can try this one. Maybe it needs a bitmap */
1303 for (mddev = devs ; mddev ; mddev = mddev->next)
339c2d6c 1304 if (mddev->devname && me->path
2400e6eb 1305 && devname_matches(mddev->devname, me->path))
8382f19b
NB
1306 break;
1307 if (mddev && mddev->bitmap_file) {
1308 /*
1309 * Note: early kernels will wrongly fail this, so it
1310 * is a hint only
1311 */
1312 int added = -1;
1313 if (ioctl(mdfd, GET_ARRAY_INFO, &bmf) < 0) {
1314 int bmfd = open(mddev->bitmap_file, O_RDWR);
1315 if (bmfd >= 0) {
1316 added = ioctl(mdfd, SET_BITMAP_FILE,
1317 bmfd);
1318 close(bmfd);
1319 }
1320 }
1321 if (verbose >= 0) {
1322 if (added == 0)
e7b84f9d
N
1323 pr_err("Added bitmap %s to %s\n",
1324 mddev->bitmap_file, me->path);
8382f19b 1325 else if (errno != EEXIST)
e7b84f9d
N
1326 pr_err("Failed to add bitmap to %s: %s\n",
1327 me->path, strerror(errno));
8382f19b
NB
1328 }
1329 }
5e88ab2e
N
1330 /* FIXME check for reshape_active and consider not
1331 * starting array.
1332 */
4dd2df09 1333 sra = sysfs_read(mdfd, NULL, 0);
8382f19b
NB
1334 if (sra) {
1335 if (sysfs_set_str(sra, NULL,
1336 "array_state", "read-auto") == 0) {
1337 if (verbose >= 0)
e7b84f9d 1338 pr_err("started array %s\n",
4dd2df09 1339 me->path ?: me->devnm);
8382f19b 1340 } else {
e7b84f9d 1341 pr_err("failed to start array %s: %s\n",
4dd2df09 1342 me->path ?: me->devnm,
e7b84f9d 1343 strerror(errno));
8382f19b
NB
1344 rv = 1;
1345 }
b1efa6c2 1346 sysfs_free(sra);
8382f19b
NB
1347 }
1348 }
1349 return rv;
1350}
598f0d58 1351
1771a6e2
N
1352static char *container2devname(char *devname)
1353{
1354 char *mdname = NULL;
1355
1356 if (devname[0] == '/') {
1357 int fd = open(devname, O_RDONLY);
1358 if (fd >= 0) {
4dd2df09 1359 mdname = xstrdup(fd2devnm(fd));
1771a6e2
N
1360 close(fd);
1361 }
1362 } else {
1363 int uuid[4];
1364 struct map_ent *mp, *map = NULL;
ca3b6696 1365
1771a6e2
N
1366 if (!parse_uuid(devname, uuid))
1367 return mdname;
1368 mp = map_by_uuid(&map, uuid);
1369 if (mp)
4dd2df09 1370 mdname = xstrdup(mp->devnm);
1771a6e2
N
1371 map_free(map);
1372 }
1373
1374 return mdname;
1375}
1376
47c74f3f 1377static int Incremental_container(struct supertype *st, char *devname,
11b6d91d 1378 struct context *c)
598f0d58
NB
1379{
1380 /* Collect the contents of this container and for each
1381 * array, choose a device name and assemble the array.
1382 */
1383
47c74f3f 1384 struct mdinfo *list;
598f0d58 1385 struct mdinfo *ra;
ad5bc697 1386 struct map_ent *map = NULL;
47c74f3f
N
1387 struct mdinfo info;
1388 int trustworthy;
fa56eddb 1389 struct mddev_ident *match;
47c74f3f 1390 int rv = 0;
037e12d6
AC
1391 struct domainlist *domains;
1392 struct map_ent *smp;
1393 int suuid[4];
1394 int sfd;
81219e70
LM
1395 int ra_blocked = 0;
1396 int ra_all = 0;
47c74f3f 1397
47c74f3f
N
1398 st->ss->getinfo_super(st, &info, NULL);
1399
11b6d91d 1400 if ((c->runstop > 0 && info.container_enough >= 0) ||
47c74f3f
N
1401 info.container_enough > 0)
1402 /* pass */;
1403 else {
11b6d91d 1404 if (c->verbose)
e7b84f9d 1405 pr_err("not enough devices to start the container\n");
47c74f3f
N
1406 return 0;
1407 }
1408
11b6d91d 1409 match = conf_match(st, &info, devname, c->verbose, &rv);
47c74f3f
N
1410 if (match == NULL && rv == 2)
1411 return rv;
1412
1413 /* Need to compute 'trustworthy' */
1414 if (match)
1415 trustworthy = LOCAL;
11b6d91d 1416 else if (st->ss->match_home(st, c->homehost) == 1)
47c74f3f
N
1417 trustworthy = LOCAL;
1418 else if (st->ss->match_home(st, "any") == 1)
1419 trustworthy = LOCAL;
1420 else
1421 trustworthy = FOREIGN;
ad5bc697 1422
47c74f3f 1423 list = st->ss->container_content(st, NULL);
81219e70
LM
1424 /* when nothing to activate - quit */
1425 if (list == NULL)
1426 return 0;
598f0d58 1427 for (ra = list ; ra ; ra = ra->next) {
598f0d58
NB
1428 int mdfd;
1429 char chosen_name[1024];
ad5bc697 1430 struct map_ent *mp;
fa56eddb 1431 struct mddev_ident *match = NULL;
598f0d58 1432
81219e70
LM
1433 ra_all++;
1434 /* do not activate arrays blocked by metadata handler */
1435 if (ra->array.state & (1 << MD_SB_BLOCK_VOLUME)) {
e7b84f9d 1436 pr_err("Cannot activate array %s in %s.\n",
81219e70
LM
1437 ra->text_version, devname);
1438 ra_blocked++;
1439 continue;
1440 }
c5afc314 1441 mp = map_by_uuid(&map, ra->uuid);
d7288ddc 1442
30926600 1443 if (mp) {
4dd2df09 1444 mdfd = open_dev(mp->devnm);
339c2d6c
N
1445 if (mp->path)
1446 strcpy(chosen_name, mp->path);
1447 else
4dd2df09 1448 strcpy(chosen_name, mp->devnm);
30926600 1449 } else {
dbb44303 1450
112cace6 1451 /* Check in mdadm.conf for container == devname and
dbb44303
N
1452 * member == ra->text_version after second slash.
1453 */
1454 char *sub = strchr(ra->text_version+1, '/');
fa56eddb 1455 struct mddev_ident *array_list;
dbb44303
N
1456 if (sub) {
1457 sub++;
1458 array_list = conf_get_ident(NULL);
1459 } else
1460 array_list = NULL;
1461 for(; array_list ; array_list = array_list->next) {
dbb44303
N
1462 char *dn;
1463 if (array_list->member == NULL ||
1464 array_list->container == NULL)
1465 continue;
1466 if (strcmp(array_list->member, sub) != 0)
1467 continue;
71d60c48
DW
1468 if (array_list->uuid_set &&
1469 !same_uuid(ra->uuid, array_list->uuid, st->ss->swapuuid))
1470 continue;
1771a6e2
N
1471 dn = container2devname(array_list->container);
1472 if (dn == NULL)
dbb44303 1473 continue;
dbb44303
N
1474 if (strncmp(dn, ra->text_version+1,
1475 strlen(dn)) != 0 ||
1476 ra->text_version[strlen(dn)+1] != '/') {
1477 free(dn);
1478 continue;
1479 }
1480 free(dn);
1481 /* we have a match */
1482 match = array_list;
11b6d91d 1483 if (c->verbose>0)
e7b84f9d 1484 pr_err("match found for member %s\n",
71d60c48 1485 array_list->member);
dbb44303
N
1486 break;
1487 }
dbb44303 1488
112cace6
N
1489 if (match && match->devname &&
1490 strcasecmp(match->devname, "<ignore>") == 0) {
11b6d91d 1491 if (c->verbose > 0)
e7b84f9d
N
1492 pr_err("array %s/%s is "
1493 "explicitly ignored by mdadm.conf\n",
1494 match->container, match->member);
112cace6
N
1495 return 2;
1496 }
05833051
N
1497 if (match)
1498 trustworthy = LOCAL;
112cace6 1499
30926600
N
1500 mdfd = create_mddev(match ? match->devname : NULL,
1501 ra->name,
11b6d91d 1502 c->autof,
30926600
N
1503 trustworthy,
1504 chosen_name);
1505 }
598f0d58
NB
1506
1507 if (mdfd < 0) {
e7b84f9d 1508 pr_err("failed to open %s: %s.\n",
598f0d58
NB
1509 chosen_name, strerror(errno));
1510 return 2;
1511 }
1512
11b6d91d
N
1513 assemble_container_content(st, mdfd, ra, c,
1514 chosen_name);
588bebfc 1515 close(mdfd);
598f0d58 1516 }
037e12d6 1517
81219e70
LM
1518 /* don't move spares to container with volume being activated
1519 when all volumes are blocked */
ad098cdd 1520 if (ra_all == ra_blocked)
81219e70 1521 return 0;
81219e70 1522
037e12d6
AC
1523 /* Now move all suitable spares from spare container */
1524 domains = domain_from_array(list, st->ss->name);
1525 memcpy(suuid, uuid_zero, sizeof(int[4]));
1526 if (domains &&
1527 (smp = map_by_uuid(&map, suuid)) != NULL &&
1528 (sfd = open(smp->path, O_RDONLY)) >= 0) {
1529 /* spare container found */
1530 struct supertype *sst =
1531 super_imsm.match_metadata_desc("imsm");
1532 struct mdinfo *sinfo;
1533 unsigned long long min_size = 0;
1534 if (st->ss->min_acceptable_spare_size)
1535 min_size = st->ss->min_acceptable_spare_size(st);
1536 if (!sst->ss->load_container(sst, sfd, NULL)) {
1537 close(sfd);
1538 sinfo = container_choose_spares(sst, min_size,
1539 domains, NULL,
1540 st->ss->name, 0);
1541 sst->ss->free_super(sst);
1542 if (sinfo){
1543 int count = 0;
1544 struct mdinfo *disks = sinfo->devs;
1545 while (disks) {
1546 /* move spare from spare
1547 * container to currently
1548 * assembled one
1549 */
1550 if (move_spare(
1551 smp->path,
1552 devname,
1553 makedev(disks->disk.major,
1554 disks->disk.minor)))
1555 count++;
1556 disks = disks->next;
1557 }
1558 if (count)
e7b84f9d
N
1559 pr_err("Added %d spare%s to %s\n",
1560 count, count>1?"s":"", devname);
037e12d6
AC
1561 }
1562 sysfs_free(sinfo);
1563 } else
1564 close(sfd);
1565 }
1566 domain_free(domains);
598f0d58
NB
1567 return 0;
1568}
29ba4804 1569
6b63c1a4
N
1570static void run_udisks(char *arg1, char *arg2)
1571{
1572 int pid = fork();
1573 int status;
1574 if (pid == 0) {
1575 execl("/usr/bin/udisks", "udisks", arg1, arg2, NULL);
1576 execl("/bin/udisks", "udisks", arg1, arg2, NULL);
1577 exit(1);
1578 }
1579 while (pid > 0 && wait(&status) != pid)
1580 ;
1581}
1582
29ba4804
N
1583/*
1584 * IncrementalRemove - Attempt to see if the passed in device belongs to any
1585 * raid arrays, and if so first fail (if needed) and then remove the device.
1586 *
1587 * @devname - The device we want to remove
950bc344 1588 * @id_path - name as found in /dev/disk/by-path for this device
29ba4804
N
1589 *
1590 * Note: the device name must be a kernel name like "sda", so
1591 * that we can find it in /proc/mdstat
1592 */
950bc344 1593int IncrementalRemove(char *devname, char *id_path, int verbose)
29ba4804
N
1594{
1595 int mdfd;
8af530b0 1596 int rv = 0;
29ba4804 1597 struct mdstat_ent *ent;
a655e550 1598 struct mddev_dev devlist;
8af530b0
N
1599 struct mdinfo mdi;
1600 char buf[32];
29ba4804 1601
950bc344
PC
1602 if (!id_path)
1603 dprintf(Name ": incremental removal without --path <id_path> "
1604 "lacks the possibility to re-add new device in this "
1605 "port\n");
1606
29ba4804 1607 if (strchr(devname, '/')) {
e7b84f9d 1608 pr_err("incremental removal requires a "
29ba4804
N
1609 "kernel device name, not a file: %s\n", devname);
1610 return 1;
1611 }
1612 ent = mdstat_by_component(devname);
1613 if (!ent) {
e7b84f9d 1614 pr_err("%s does not appear to be a component "
29ba4804
N
1615 "of any array\n", devname);
1616 return 1;
1617 }
8af530b0
N
1618 sysfs_init(&mdi, -1, ent->devnm);
1619 if (sysfs_get_str(&mdi, NULL, "array_state",
1620 buf, sizeof(buf)) > 0) {
1621 if (strncmp(buf, "active", 6) == 0 ||
1622 strncmp(buf, "clean", 5) == 0)
1623 sysfs_set_str(&mdi, NULL,
1624 "array_state", "read-auto");
1625 }
4dd2df09 1626 mdfd = open_dev(ent->devnm);
29ba4804 1627 if (mdfd < 0) {
e7b84f9d 1628 pr_err("Cannot open array %s!!\n", ent->dev);
08387a04 1629 free_mdstat(ent);
29ba4804
N
1630 return 1;
1631 }
403410eb
PC
1632
1633 if (id_path) {
1634 struct map_ent *map = NULL, *me;
4dd2df09 1635 me = map_by_devnm(&map, ent->devnm);
403410eb
PC
1636 if (me)
1637 policy_save_path(id_path, me);
1638 map_free(map);
1639 }
1640
29ba4804
N
1641 memset(&devlist, 0, sizeof(devlist));
1642 devlist.devname = devname;
1643 devlist.disposition = 'f';
08387a04
N
1644 /* for a container, we must fail each member array */
1645 if (ent->metadata_version &&
1646 strncmp(ent->metadata_version, "external:", 9) == 0) {
1647 struct mdstat_ent *mdstat = mdstat_read(0, 0);
1648 struct mdstat_ent *memb;
1649 for (memb = mdstat ; memb ; memb = memb->next)
1650 if (is_container_member(memb, ent->dev)) {
4dd2df09 1651 int subfd = open_dev(memb->devnm);
08387a04 1652 if (subfd >= 0) {
8af530b0
N
1653 rv |= Manage_subdevs(
1654 memb->dev, subfd,
1655 &devlist, verbose, 0,
1656 NULL, 0);
08387a04
N
1657 close(subfd);
1658 }
1659 }
1660 free_mdstat(mdstat);
1661 } else
8af530b0
N
1662 rv |= Manage_subdevs(ent->dev, mdfd, &devlist,
1663 verbose, 0, NULL, 0);
1664 if (rv & 2) {
6b63c1a4
N
1665 /* Failed due to EBUSY, try to stop the array.
1666 * Give udisks a chance to unmount it first.
8af530b0 1667 */
6b63c1a4
N
1668 int devid = devnm2devid(ent->devnm);
1669 run_udisks("--unmount", map_dev(major(devid),minor(devid), 0));
8af530b0
N
1670 rv = Manage_runstop(ent->dev, mdfd, -1,
1671 verbose, 1);
1672 if (rv)
1673 /* At least we can try to trigger a 'remove' */
1674 sysfs_uevent(&mdi, "remove");
6b63c1a4
N
1675 if (verbose) {
1676 if (rv)
1677 pr_err("Fail to stop %s too.\n", ent->devnm);
1678 }
8af530b0
N
1679 } else {
1680 devlist.disposition = 'r';
1681 rv = Manage_subdevs(ent->dev, mdfd, &devlist,
1682 verbose, 0, NULL, 0);
1683 }
aae3cdc3 1684 close(mdfd);
08387a04 1685 free_mdstat(ent);
aae3cdc3 1686 return rv;
29ba4804 1687}