]>
Commit | Line | Data |
---|---|---|
a54d5262 DW |
1 | /* |
2 | * mdmon - monitor external metadata arrays | |
3 | * | |
e736b623 N |
4 | * Copyright (C) 2007-2009 Neil Brown <neilb@suse.de> |
5 | * Copyright (C) 2007-2009 Intel Corporation | |
a54d5262 DW |
6 | * |
7 | * This program is free software; you can redistribute it and/or modify it | |
8 | * under the terms and conditions of the GNU General Public License, | |
9 | * version 2, as published by the Free Software Foundation. | |
10 | * | |
11 | * This program is distributed in the hope it will be useful, but WITHOUT | |
12 | * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or | |
13 | * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for | |
14 | * more details. | |
15 | * | |
16 | * You should have received a copy of the GNU General Public License along with | |
17 | * this program; if not, write to the Free Software Foundation, Inc., | |
18 | * 51 Franklin St - Fifth Floor, Boston, MA 02110-1301 USA. | |
19 | */ | |
549e9569 NB |
20 | |
21 | /* | |
22 | * md array manager. | |
23 | * When md arrays have user-space managed metadata, this is the program | |
24 | * that does the managing. | |
25 | * | |
26 | * Given one argument: the name of the array (e.g. /dev/md0) that is | |
27 | * the container. | |
28 | * We fork off a helper that runs high priority and mlocked. It responds to | |
29 | * device failures and other events that might stop writeout, or that are | |
30 | * trivial to deal with. | |
31 | * The main thread then watches for new arrays being created in the container | |
32 | * and starts monitoring them too ... along with a few other tasks. | |
33 | * | |
34 | * The main thread communicates with the priority thread by writing over | |
35 | * a pipe. | |
36 | * Separate programs can communicate with the main thread via Unix-domain | |
37 | * socket. | |
38 | * The two threads share address space and open file table. | |
39 | * | |
40 | */ | |
41 | ||
42 | #ifndef _GNU_SOURCE | |
43 | #define _GNU_SOURCE | |
44 | #endif | |
45 | ||
46 | #include <unistd.h> | |
47 | #include <stdlib.h> | |
4d43913c | 48 | #include <sys/types.h> |
549e9569 NB |
49 | #include <sys/stat.h> |
50 | #include <sys/socket.h> | |
51 | #include <sys/un.h> | |
52 | #include <sys/mman.h> | |
4d43913c | 53 | #include <sys/syscall.h> |
9fe32043 | 54 | #include <sys/wait.h> |
549e9569 NB |
55 | #include <stdio.h> |
56 | #include <errno.h> | |
57 | #include <string.h> | |
58 | #include <fcntl.h> | |
13047e4c | 59 | #include <dirent.h> |
f4190c2f DW |
60 | #ifdef USE_PTHREADS |
61 | #include <pthread.h> | |
62 | #else | |
549e9569 | 63 | #include <sched.h> |
f4190c2f | 64 | #endif |
549e9569 NB |
65 | |
66 | #include "mdadm.h" | |
67 | #include "mdmon.h" | |
ee3a6cab | 68 | #include "xmalloc.h" |
549e9569 | 69 | |
d56dd607 PB |
70 | char const Name[] = "mdmon"; |
71 | ||
549e9569 NB |
72 | struct active_array *discard_this; |
73 | struct active_array *pending_discard; | |
4d43913c NB |
74 | |
75 | int mon_tid, mgr_tid; | |
549e9569 | 76 | |
6144ed44 DW |
77 | int sigterm; |
78 | ||
f4190c2f DW |
79 | #ifdef USE_PTHREADS |
80 | static void *run_child(void *v) | |
81 | { | |
82 | struct supertype *c = v; | |
83 | ||
84 | mon_tid = syscall(SYS_gettid); | |
85 | do_monitor(c); | |
86 | return 0; | |
87 | } | |
88 | ||
89 | static int clone_monitor(struct supertype *container) | |
90 | { | |
91 | pthread_attr_t attr; | |
92 | pthread_t thread; | |
93 | int rc; | |
94 | ||
95 | mon_tid = -1; | |
96 | pthread_attr_init(&attr); | |
97 | pthread_attr_setstacksize(&attr, 4096); | |
98 | pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED); | |
99 | rc = pthread_create(&thread, &attr, run_child, container); | |
100 | if (rc) | |
101 | return rc; | |
102 | while (mon_tid == -1) | |
239b3cc0 | 103 | sleep_for(0, USEC_TO_NSEC(10), true); |
f4190c2f DW |
104 | pthread_attr_destroy(&attr); |
105 | ||
106 | mgr_tid = syscall(SYS_gettid); | |
107 | ||
108 | return mon_tid; | |
109 | } | |
110 | #else /* USE_PTHREADS */ | |
111 | static int run_child(void *v) | |
549e9569 NB |
112 | { |
113 | struct supertype *c = v; | |
1ed3f387 | 114 | |
549e9569 NB |
115 | do_monitor(c); |
116 | return 0; | |
117 | } | |
118 | ||
97f734fd N |
119 | #ifdef __ia64__ |
120 | int __clone2(int (*fn)(void *), | |
121 | void *child_stack_base, size_t stack_size, | |
122 | int flags, void *arg, ... | |
123 | /* pid_t *pid, struct user_desc *tls, pid_t *ctid */ ); | |
124 | #endif | |
f4190c2f | 125 | static int clone_monitor(struct supertype *container) |
549e9569 | 126 | { |
549e9569 | 127 | static char stack[4096]; |
549e9569 | 128 | |
97f734fd N |
129 | #ifdef __ia64__ |
130 | mon_tid = __clone2(run_child, stack, sizeof(stack), | |
131 | CLONE_FS|CLONE_FILES|CLONE_VM|CLONE_SIGHAND|CLONE_THREAD, | |
132 | container); | |
133 | #else | |
2cc98f9e | 134 | mon_tid = clone(run_child, stack+4096-64, |
549e9569 NB |
135 | CLONE_FS|CLONE_FILES|CLONE_VM|CLONE_SIGHAND|CLONE_THREAD, |
136 | container); | |
97f734fd | 137 | #endif |
3e70c845 | 138 | |
4d43913c | 139 | mgr_tid = syscall(SYS_gettid); |
2cc98f9e DW |
140 | |
141 | return mon_tid; | |
549e9569 | 142 | } |
f4190c2f | 143 | #endif /* USE_PTHREADS */ |
549e9569 | 144 | |
fa716c83 | 145 | static int make_pidfile(char *devname) |
549e9569 NB |
146 | { |
147 | char path[100]; | |
148 | char pid[10]; | |
149 | int fd; | |
3d2c4fc7 DW |
150 | int n; |
151 | ||
753cf905 | 152 | if (mkdir(MDMON_DIR, 0755) < 0 && |
ed8fa52f LB |
153 | errno != EEXIST) |
154 | return -errno; | |
753cf905 | 155 | sprintf(path, "%s/%s.pid", MDMON_DIR, devname); |
549e9569 | 156 | |
5d4d1b26 | 157 | fd = open(path, O_RDWR|O_CREAT|O_EXCL, 0600); |
549e9569 | 158 | if (fd < 0) |
295646b3 | 159 | return -errno; |
549e9569 | 160 | sprintf(pid, "%d\n", getpid()); |
3d2c4fc7 | 161 | n = write(fd, pid, strlen(pid)); |
549e9569 | 162 | close(fd); |
3d2c4fc7 DW |
163 | if (n < 0) |
164 | return -errno; | |
549e9569 NB |
165 | return 0; |
166 | } | |
167 | ||
9f1da824 | 168 | static void try_kill_monitor(pid_t pid, char *devname, int sock) |
96a8270d DW |
169 | { |
170 | char buf[100]; | |
171 | int fd; | |
417a4b04 | 172 | int n; |
af7ca334 | 173 | long fl; |
d2e11da4 | 174 | int rv; |
b109d928 | 175 | |
8aae4219 DW |
176 | /* first rule of survival... don't off yourself */ |
177 | if (pid == getpid()) | |
178 | return; | |
179 | ||
b109d928 DW |
180 | /* kill this process if it is mdmon */ |
181 | sprintf(buf, "/proc/%lu/cmdline", (unsigned long) pid); | |
182 | fd = open(buf, O_RDONLY); | |
183 | if (fd < 0) | |
184 | return; | |
185 | ||
417a4b04 N |
186 | n = read(fd, buf, sizeof(buf)-1); |
187 | buf[sizeof(buf)-1] = 0; | |
188 | close(fd); | |
b109d928 | 189 | |
a99d3469 N |
190 | if (n < 0 || !(strstr(buf, "mdmon") || |
191 | strstr(buf, "@dmon"))) | |
883a6142 DW |
192 | return; |
193 | ||
194 | kill(pid, SIGTERM); | |
195 | ||
88e5516e N |
196 | if (sock < 0) |
197 | return; | |
198 | ||
af7ca334 N |
199 | /* Wait for monitor to exit by reading from the socket, after |
200 | * clearing the non-blocking flag */ | |
201 | fl = fcntl(sock, F_GETFL, 0); | |
f9949a04 XN |
202 | if (fl < 0) |
203 | return; | |
204 | ||
af7ca334 | 205 | fl &= ~O_NONBLOCK; |
f9949a04 XN |
206 | if (fcntl(sock, F_SETFL, fl) < 0) |
207 | return; | |
fcf57625 | 208 | n = read(sock, buf, 100); |
d2e11da4 PB |
209 | |
210 | /* If there is I/O going on it might took some time to get to | |
211 | * clean state. Wait for monitor to exit fully to avoid races. | |
212 | * Ping it with SIGUSR1 in case that it is sleeping */ | |
213 | for (n = 0; n < 25; n++) { | |
214 | rv = kill(pid, SIGUSR1); | |
215 | if (rv < 0) | |
216 | break; | |
239b3cc0 | 217 | sleep_for(0, MSEC_TO_NSEC(200), true); |
d2e11da4 | 218 | } |
b109d928 DW |
219 | } |
220 | ||
e0d6609f NB |
221 | void remove_pidfile(char *devname) |
222 | { | |
223 | char buf[100]; | |
224 | ||
753cf905 | 225 | sprintf(buf, "%s/%s.pid", MDMON_DIR, devname); |
e0d6609f | 226 | unlink(buf); |
753cf905 | 227 | sprintf(buf, "%s/%s.sock", MDMON_DIR, devname); |
57752795 | 228 | unlink(buf); |
e0d6609f NB |
229 | } |
230 | ||
fa716c83 | 231 | static int make_control_sock(char *devname) |
549e9569 NB |
232 | { |
233 | char path[100]; | |
234 | int sfd; | |
235 | long fl; | |
236 | struct sockaddr_un addr; | |
237 | ||
6144ed44 DW |
238 | if (sigterm) |
239 | return -1; | |
240 | ||
753cf905 | 241 | sprintf(path, "%s/%s.sock", MDMON_DIR, devname); |
549e9569 NB |
242 | unlink(path); |
243 | sfd = socket(PF_LOCAL, SOCK_STREAM, 0); | |
244 | if (sfd < 0) | |
245 | return -1; | |
246 | ||
247 | addr.sun_family = PF_LOCAL; | |
dd5ab402 | 248 | snprintf(addr.sun_path, sizeof(addr.sun_path), "%s", path); |
120ec6f7 | 249 | umask(077); /* ensure no world write access */ |
50d72ed4 | 250 | if (bind(sfd, (struct sockaddr*)&addr, sizeof(addr)) < 0) { |
549e9569 NB |
251 | close(sfd); |
252 | return -1; | |
253 | } | |
254 | listen(sfd, 10); | |
255 | fl = fcntl(sfd, F_GETFL, 0); | |
256 | fl |= O_NONBLOCK; | |
f9949a04 XN |
257 | if (fcntl(sfd, F_SETFL, fl) < 0) { |
258 | close_fd(&sfd); | |
259 | return -1; | |
260 | } | |
549e9569 NB |
261 | return sfd; |
262 | } | |
263 | ||
6144ed44 DW |
264 | static void term(int sig) |
265 | { | |
266 | sigterm = 1; | |
267 | } | |
268 | ||
4d43913c NB |
269 | static void wake_me(int sig) |
270 | { | |
271 | ||
272 | } | |
273 | ||
16ddab0d DW |
274 | /* if we are debugging and starting mdmon by hand then don't fork */ |
275 | static int do_fork(void) | |
276 | { | |
277 | #ifdef DEBUG | |
40ebbb9c | 278 | if (check_env("MDADM_NO_MDMON")) |
16ddab0d DW |
279 | return 0; |
280 | #endif | |
281 | ||
282 | return 1; | |
283 | } | |
284 | ||
13047e4c DW |
285 | void usage(void) |
286 | { | |
eb155f6d JS |
287 | fprintf(stderr, |
288 | "Usage: mdmon [options] CONTAINER\n" | |
289 | "\n" | |
290 | "Options are:\n" | |
291 | " --help -h : This message\n" | |
bf3a33b3 JS |
292 | " --all -a : All devices\n" |
293 | " --foreground -F : Run in foreground (do not fork)\n" | |
eb155f6d JS |
294 | " --takeover -t : Takeover container\n" |
295 | ); | |
13047e4c DW |
296 | exit(2); |
297 | } | |
16ddab0d | 298 | |
1066ab83 LF |
299 | static bool is_duplicate_opt(const int opt, const int set_val, const char *long_name) |
300 | { | |
301 | if (opt == set_val) { | |
302 | pr_err("--%s option duplicated!\n", long_name); | |
303 | return true; | |
304 | } | |
305 | return false; | |
306 | } | |
307 | ||
4dd2df09 | 308 | static int mdmon(char *devnm, int must_fork, int takeover); |
1ffd2840 | 309 | |
549e9569 NB |
310 | int main(int argc, char *argv[]) |
311 | { | |
13047e4c | 312 | char *container_name = NULL; |
1ffd2840 | 313 | int status = 0; |
eb155f6d | 314 | int opt; |
b5c727dc N |
315 | int all = 0; |
316 | int takeover = 0; | |
03041982 | 317 | int dofork = 1; |
c8772da4 | 318 | int mdfd = -1; |
1066ab83 | 319 | bool help = false; |
eb155f6d JS |
320 | static struct option options[] = { |
321 | {"all", 0, NULL, 'a'}, | |
322 | {"takeover", 0, NULL, 't'}, | |
323 | {"help", 0, NULL, 'h'}, | |
da827518 | 324 | {"offroot", 0, NULL, OffRootOpt}, |
03041982 | 325 | {"foreground", 0, NULL, 'F'}, |
eb155f6d JS |
326 | {NULL, 0, NULL, 0} |
327 | }; | |
328 | ||
420dafcd N |
329 | /* |
330 | * mdmon should never complain due to lack of a platform, | |
331 | * that is mdadm's job if at all. | |
332 | */ | |
333 | imsm_set_no_platform(1); | |
334 | ||
03041982 | 335 | while ((opt = getopt_long(argc, argv, "thaF", options, NULL)) != -1) { |
eb155f6d JS |
336 | switch (opt) { |
337 | case 'a': | |
1066ab83 LF |
338 | if (is_duplicate_opt(all, 1, "all")) |
339 | exit(1); | |
eb155f6d | 340 | container_name = argv[optind-1]; |
b5c727dc | 341 | all = 1; |
eb155f6d JS |
342 | break; |
343 | case 't': | |
1066ab83 LF |
344 | if (is_duplicate_opt(takeover, 1, "takeover")) |
345 | exit(1); | |
b5c727dc | 346 | takeover = 1; |
eb155f6d | 347 | break; |
03041982 | 348 | case 'F': |
1066ab83 LF |
349 | if (is_duplicate_opt(dofork, 0, "foreground")) |
350 | exit(1); | |
03041982 N |
351 | dofork = 0; |
352 | break; | |
da827518 | 353 | case OffRootOpt: |
1066ab83 LF |
354 | if (is_duplicate_opt(argv[0][0], '@', "offroot")) |
355 | exit(1); | |
5d79c72e | 356 | argv[0][0] = '@'; |
da827518 | 357 | break; |
eb155f6d | 358 | case 'h': |
1066ab83 LF |
359 | if (is_duplicate_opt(help, true, "help")) |
360 | exit(1); | |
361 | help = true; | |
362 | break; | |
eb155f6d | 363 | default: |
b5c727dc | 364 | usage(); |
eb155f6d JS |
365 | break; |
366 | } | |
367 | } | |
368 | ||
1066ab83 LF |
369 | if (in_initrd()) { |
370 | /* | |
371 | * set first char of argv[0] to @. This is used by | |
372 | * systemd to signal that the task was launched from | |
373 | * initrd/initramfs and should be preserved during shutdown | |
374 | */ | |
375 | argv[0][0] = '@'; | |
376 | } | |
377 | ||
d39fd87e | 378 | if (!all && argv[optind]) { |
723d1df4 N |
379 | static const char prefix[] = "initrd/"; |
380 | container_name = argv[optind]; | |
381 | if (strncmp(container_name, prefix, | |
382 | sizeof(prefix) - 1) == 0) | |
383 | container_name += sizeof(prefix)-1; | |
384 | container_name = get_md_name(container_name); | |
d39fd87e N |
385 | if (!container_name) |
386 | return 1; | |
549e9569 | 387 | } |
eb155f6d | 388 | |
9b429fc0 | 389 | if (container_name == NULL || argc - optind > 1) |
eb155f6d JS |
390 | usage(); |
391 | ||
392 | if (strcmp(container_name, "/proc/mdstat") == 0) | |
393 | all = 1; | |
394 | ||
1066ab83 LF |
395 | if (help) |
396 | usage(); | |
397 | ||
b5c727dc | 398 | if (all) { |
1ffd2840 | 399 | struct mdstat_ent *mdstat, *e; |
dd5ab402 | 400 | int container_len = strnlen(container_name, MD_NAME_MAX); |
1ffd2840 DW |
401 | |
402 | /* launch an mdmon instance for each container found */ | |
1ffd2840 DW |
403 | mdstat = mdstat_read(0, 0); |
404 | for (e = mdstat; e; e = e->next) { | |
4b3644ab | 405 | if (is_mdstat_ent_external(e) && !is_mdstat_ent_subarray(e)) { |
1b34f519 DW |
406 | /* update cmdline so this mdmon instance can be |
407 | * distinguished from others in a call to ps(1) | |
408 | */ | |
4dd2df09 | 409 | if (strlen(e->devnm) <= (unsigned)container_len) { |
eb49460b | 410 | memset(container_name, 0, container_len); |
4dd2df09 | 411 | sprintf(container_name, "%s", e->devnm); |
1b34f519 | 412 | } |
4dd2df09 | 413 | status |= mdmon(e->devnm, 1, takeover); |
1ffd2840 DW |
414 | } |
415 | } | |
416 | free_mdstat(mdstat); | |
417 | ||
418 | return status; | |
c8772da4 MK |
419 | } |
420 | ||
421 | mdfd = open_mddev(container_name, 0); | |
422 | if (is_fd_valid(mdfd)) { | |
423 | char *devnm = fd2devnm(mdfd); | |
b938519e | 424 | |
9b429fc0 | 425 | close(mdfd); |
6f4098a6 | 426 | |
c8772da4 MK |
427 | if (devnm) |
428 | return mdmon(devnm, dofork && do_fork(), takeover); | |
e8a70c89 | 429 | } |
c8772da4 MK |
430 | |
431 | pr_err("%s is not a valid md device name\n", container_name); | |
432 | return 1; | |
1ffd2840 DW |
433 | } |
434 | ||
4dd2df09 | 435 | static int mdmon(char *devnm, int must_fork, int takeover) |
1ffd2840 DW |
436 | { |
437 | int mdfd; | |
438 | struct mdinfo *mdi, *di; | |
439 | struct supertype *container; | |
440 | sigset_t set; | |
441 | struct sigaction act; | |
442 | int pfd[2]; | |
443 | int status; | |
444 | int ignore; | |
96a8270d | 445 | pid_t victim = -1; |
9f1da824 | 446 | int victim_sock = -1; |
1ffd2840 | 447 | |
4dd2df09 | 448 | dprintf("starting mdmon for %s\n", devnm); |
b928b5a0 | 449 | |
4dd2df09 | 450 | mdfd = open_dev(devnm); |
549e9569 | 451 | if (mdfd < 0) { |
a88e119f | 452 | pr_err("%s: %s\n", devnm, strerror(errno)); |
1ffd2840 | 453 | return 1; |
549e9569 | 454 | } |
549e9569 | 455 | |
9fe32043 | 456 | /* Fork, and have the child tell us when they are ready */ |
3e7312a9 | 457 | if (must_fork) { |
3d2c4fc7 | 458 | if (pipe(pfd) != 0) { |
a88e119f | 459 | pr_err("failed to create pipe\n"); |
e7623d5a | 460 | close_fd(&mdfd); |
1ffd2840 | 461 | return 1; |
3d2c4fc7 | 462 | } |
16ddab0d DW |
463 | switch(fork()) { |
464 | case -1: | |
a88e119f | 465 | pr_err("failed to fork: %s\n", strerror(errno)); |
e7623d5a | 466 | close_fd(&mdfd); |
1ffd2840 | 467 | return 1; |
16ddab0d | 468 | case 0: /* child */ |
e7623d5a | 469 | close_fd(&pfd[0]); |
16ddab0d DW |
470 | break; |
471 | default: /* parent */ | |
e7623d5a | 472 | close_fd(&pfd[1]); |
16ddab0d DW |
473 | if (read(pfd[0], &status, sizeof(status)) != sizeof(status)) { |
474 | wait(&status); | |
475 | status = WEXITSTATUS(status); | |
476 | } | |
e7623d5a XN |
477 | close_fd(&pfd[0]); |
478 | close_fd(&mdfd); | |
1ffd2840 | 479 | return status; |
9fe32043 | 480 | } |
16ddab0d DW |
481 | } else |
482 | pfd[0] = pfd[1] = -1; | |
549e9569 | 483 | |
503975b9 | 484 | container = xcalloc(1, sizeof(*container)); |
dd5ab402 | 485 | snprintf(container->devnm, MD_NAME_MAX, "%s", devnm); |
13047e4c | 486 | container->arrays = NULL; |
96a8270d | 487 | container->sock = -1; |
13047e4c | 488 | |
4dd2df09 | 489 | mdi = sysfs_read(mdfd, container->devnm, GET_VERSION|GET_LEVEL|GET_DEVS); |
13047e4c DW |
490 | |
491 | if (!mdi) { | |
a88e119f | 492 | pr_err("failed to load sysfs info for %s\n", container->devnm); |
13047e4c DW |
493 | exit(3); |
494 | } | |
495 | if (mdi->array.level != UnSet) { | |
a88e119f | 496 | pr_err("%s is not a container - cannot monitor\n", devnm); |
13047e4c DW |
497 | exit(3); |
498 | } | |
499 | if (mdi->array.major_version != -1 || | |
500 | mdi->array.minor_version != -2) { | |
a88e119f | 501 | pr_err("%s does not use external metadata - cannot monitor\n", |
4dd2df09 | 502 | devnm); |
13047e4c DW |
503 | exit(3); |
504 | } | |
505 | ||
33414a01 | 506 | container->ss = version_to_superswitch(mdi->text_version); |
13047e4c | 507 | if (container->ss == NULL) { |
a88e119f | 508 | pr_err("%s uses unsupported metadata: %s\n", |
4dd2df09 | 509 | devnm, mdi->text_version); |
13047e4c DW |
510 | exit(3); |
511 | } | |
512 | ||
513 | container->devs = NULL; | |
514 | for (di = mdi->devs; di; di = di->next) { | |
503975b9 | 515 | struct mdinfo *cd = xmalloc(sizeof(*cd)); |
13047e4c DW |
516 | *cd = *di; |
517 | cd->next = container->devs; | |
518 | container->devs = cd; | |
519 | } | |
520 | sysfs_free(mdi); | |
549e9569 | 521 | |
883a6142 DW |
522 | /* SIGUSR is sent between parent and child. So both block it |
523 | * and enable it only with pselect. | |
524 | */ | |
525 | sigemptyset(&set); | |
526 | sigaddset(&set, SIGUSR1); | |
883a6142 DW |
527 | sigaddset(&set, SIGTERM); |
528 | sigprocmask(SIG_BLOCK, &set, NULL); | |
529 | act.sa_handler = wake_me; | |
530 | act.sa_flags = 0; | |
531 | sigaction(SIGUSR1, &act, NULL); | |
883a6142 DW |
532 | act.sa_handler = term; |
533 | sigaction(SIGTERM, &act, NULL); | |
534 | act.sa_handler = SIG_IGN; | |
535 | sigaction(SIGPIPE, &act, NULL); | |
536 | ||
4dd2df09 | 537 | victim = mdmon_pid(container->devnm); |
84a230d9 | 538 | if (victim >= 0) |
4dd2df09 | 539 | victim_sock = connect_monitor(container->devnm); |
13047e4c | 540 | |
13047e4c | 541 | ignore = chdir("/"); |
32f21701 N |
542 | if (!takeover && victim > 0 && victim_sock >= 0) { |
543 | if (fping_monitor(victim_sock) == 0) { | |
a88e119f | 544 | pr_err("%s already managed\n", container->devnm); |
b109d928 | 545 | exit(3); |
24cfdbc5 | 546 | } |
32f21701 | 547 | close(victim_sock); |
88e5516e | 548 | victim_sock = -1; |
549e9569 | 549 | } |
4dd2df09 | 550 | if (container->ss->load_container(container, mdfd, devnm)) { |
a88e119f | 551 | pr_err("Cannot load metadata for %s\n", devnm); |
549e9569 NB |
552 | exit(3); |
553 | } | |
e8a70c89 | 554 | close(mdfd); |
549e9569 | 555 | |
9fe32043 N |
556 | /* Ok, this is close enough. We can say goodbye to our parent now. |
557 | */ | |
fa716c83 | 558 | if (victim > 0) |
4dd2df09 N |
559 | remove_pidfile(devnm); |
560 | if (make_pidfile(devnm) < 0) { | |
753cf905 | 561 | exit(3); |
fa716c83 | 562 | } |
4dd2df09 | 563 | container->sock = make_control_sock(devnm); |
fa716c83 | 564 | |
9fe32043 | 565 | status = 0; |
5e57245e N |
566 | if (pfd[1] >= 0) { |
567 | if (write(pfd[1], &status, sizeof(status)) < 0) | |
568 | pr_err("failed to notify our parent: %d\n", | |
569 | getppid()); | |
570 | close(pfd[1]); | |
571 | } | |
9fe32043 | 572 | |
1373b07d | 573 | mlockall(MCL_CURRENT | MCL_FUTURE); |
549e9569 | 574 | |
3e70c845 | 575 | if (clone_monitor(container) < 0) { |
a88e119f | 576 | pr_err("failed to start monitor process: %s\n", |
549e9569 NB |
577 | strerror(errno)); |
578 | exit(2); | |
579 | } | |
580 | ||
fa716c83 | 581 | if (victim > 0) { |
4dd2df09 | 582 | try_kill_monitor(victim, container->devnm, victim_sock); |
88e5516e N |
583 | if (victim_sock >= 0) |
584 | close(victim_sock); | |
9f1da824 | 585 | } |
e98ef225 N |
586 | |
587 | setsid(); | |
ff6bb131 | 588 | manage_fork_fds(0); |
e98ef225 | 589 | |
e4c72d1d LB |
590 | /* This silliness is to stop the compiler complaining |
591 | * that we ignore 'ignore' | |
592 | */ | |
593 | if (ignore) | |
594 | ignore++; | |
595 | ||
549e9569 NB |
596 | do_manager(container); |
597 | ||
598 | exit(0); | |
599 | } | |
999b4972 N |
600 | |
601 | /* Some stub functions so super-* can link with us */ | |
602 | int child_monitor(int afd, struct mdinfo *sra, struct reshape *reshape, | |
603 | struct supertype *st, unsigned long blocks, | |
604 | int *fds, unsigned long long *offsets, | |
605 | int dests, int *destfd, unsigned long long *destoffsets) | |
606 | { | |
607 | return 0; | |
608 | } | |
afbbf073 AK |
609 | |
610 | int restore_stripes(int *dest, unsigned long long *offsets, | |
611 | int raid_disks, int chunk_size, int level, int layout, | |
612 | int source, unsigned long long read_offset, | |
613 | unsigned long long start, unsigned long long length, | |
614 | char *src_buf) | |
615 | { | |
616 | return 1; | |
617 | } | |
618 | ||
afbbf073 AK |
619 | int save_stripes(int *source, unsigned long long *offsets, |
620 | int raid_disks, int chunk_size, int level, int layout, | |
621 | int nwrites, int *dest, | |
622 | unsigned long long start, unsigned long long length, | |
623 | char *buf) | |
624 | { | |
625 | return 0; | |
626 | } | |
935a3254 N |
627 | |
628 | struct superswitch super0 = { | |
629 | .name = "0.90", | |
630 | }; | |
631 | struct superswitch super1 = { | |
632 | .name = "1.x", | |
633 | }; |