]> git.ipfire.org Git - thirdparty/mdadm.git/blame - mdmon.c
Create: support --readonly flag.
[thirdparty/mdadm.git] / mdmon.c
CommitLineData
a54d5262
DW
1/*
2 * mdmon - monitor external metadata arrays
3 *
e736b623
N
4 * Copyright (C) 2007-2009 Neil Brown <neilb@suse.de>
5 * Copyright (C) 2007-2009 Intel Corporation
a54d5262
DW
6 *
7 * This program is free software; you can redistribute it and/or modify it
8 * under the terms and conditions of the GNU General Public License,
9 * version 2, as published by the Free Software Foundation.
10 *
11 * This program is distributed in the hope it will be useful, but WITHOUT
12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
13 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
14 * more details.
15 *
16 * You should have received a copy of the GNU General Public License along with
17 * this program; if not, write to the Free Software Foundation, Inc.,
18 * 51 Franklin St - Fifth Floor, Boston, MA 02110-1301 USA.
19 */
549e9569
NB
20
21/*
22 * md array manager.
23 * When md arrays have user-space managed metadata, this is the program
24 * that does the managing.
25 *
26 * Given one argument: the name of the array (e.g. /dev/md0) that is
27 * the container.
28 * We fork off a helper that runs high priority and mlocked. It responds to
29 * device failures and other events that might stop writeout, or that are
30 * trivial to deal with.
31 * The main thread then watches for new arrays being created in the container
32 * and starts monitoring them too ... along with a few other tasks.
33 *
34 * The main thread communicates with the priority thread by writing over
35 * a pipe.
36 * Separate programs can communicate with the main thread via Unix-domain
37 * socket.
38 * The two threads share address space and open file table.
39 *
40 */
41
42#ifndef _GNU_SOURCE
43#define _GNU_SOURCE
44#endif
45
46#include <unistd.h>
47#include <stdlib.h>
4d43913c 48#include <sys/types.h>
549e9569
NB
49#include <sys/stat.h>
50#include <sys/socket.h>
51#include <sys/un.h>
52#include <sys/mman.h>
4d43913c 53#include <sys/syscall.h>
9fe32043 54#include <sys/wait.h>
549e9569
NB
55#include <stdio.h>
56#include <errno.h>
57#include <string.h>
58#include <fcntl.h>
b109d928 59#include <signal.h>
13047e4c 60#include <dirent.h>
f4190c2f
DW
61#ifdef USE_PTHREADS
62#include <pthread.h>
63#else
549e9569 64#include <sched.h>
f4190c2f 65#endif
549e9569
NB
66
67#include "mdadm.h"
68#include "mdmon.h"
69
549e9569
NB
70struct active_array *discard_this;
71struct active_array *pending_discard;
4d43913c
NB
72
73int mon_tid, mgr_tid;
549e9569 74
6144ed44
DW
75int sigterm;
76
f4190c2f
DW
77#ifdef USE_PTHREADS
78static void *run_child(void *v)
79{
80 struct supertype *c = v;
81
82 mon_tid = syscall(SYS_gettid);
83 do_monitor(c);
84 return 0;
85}
86
87static int clone_monitor(struct supertype *container)
88{
89 pthread_attr_t attr;
90 pthread_t thread;
91 int rc;
92
93 mon_tid = -1;
94 pthread_attr_init(&attr);
95 pthread_attr_setstacksize(&attr, 4096);
96 pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED);
97 rc = pthread_create(&thread, &attr, run_child, container);
98 if (rc)
99 return rc;
100 while (mon_tid == -1)
101 usleep(10);
102 pthread_attr_destroy(&attr);
103
104 mgr_tid = syscall(SYS_gettid);
105
106 return mon_tid;
107}
108#else /* USE_PTHREADS */
109static int run_child(void *v)
549e9569
NB
110{
111 struct supertype *c = v;
1ed3f387 112
549e9569
NB
113 do_monitor(c);
114 return 0;
115}
116
97f734fd
N
117#ifdef __ia64__
118int __clone2(int (*fn)(void *),
119 void *child_stack_base, size_t stack_size,
120 int flags, void *arg, ...
121 /* pid_t *pid, struct user_desc *tls, pid_t *ctid */ );
122#endif
f4190c2f 123static int clone_monitor(struct supertype *container)
549e9569 124{
549e9569 125 static char stack[4096];
549e9569 126
97f734fd
N
127#ifdef __ia64__
128 mon_tid = __clone2(run_child, stack, sizeof(stack),
129 CLONE_FS|CLONE_FILES|CLONE_VM|CLONE_SIGHAND|CLONE_THREAD,
130 container);
131#else
2cc98f9e 132 mon_tid = clone(run_child, stack+4096-64,
549e9569
NB
133 CLONE_FS|CLONE_FILES|CLONE_VM|CLONE_SIGHAND|CLONE_THREAD,
134 container);
97f734fd 135#endif
3e70c845 136
4d43913c 137 mgr_tid = syscall(SYS_gettid);
2cc98f9e
DW
138
139 return mon_tid;
549e9569 140}
f4190c2f 141#endif /* USE_PTHREADS */
549e9569 142
fa716c83 143static int make_pidfile(char *devname)
549e9569
NB
144{
145 char path[100];
146 char pid[10];
147 int fd;
3d2c4fc7
DW
148 int n;
149
753cf905 150 if (mkdir(MDMON_DIR, 0755) < 0 &&
ed8fa52f
LB
151 errno != EEXIST)
152 return -errno;
753cf905 153 sprintf(path, "%s/%s.pid", MDMON_DIR, devname);
549e9569 154
5d4d1b26 155 fd = open(path, O_RDWR|O_CREAT|O_EXCL, 0600);
549e9569 156 if (fd < 0)
295646b3 157 return -errno;
549e9569 158 sprintf(pid, "%d\n", getpid());
3d2c4fc7 159 n = write(fd, pid, strlen(pid));
549e9569 160 close(fd);
3d2c4fc7
DW
161 if (n < 0)
162 return -errno;
549e9569
NB
163 return 0;
164}
165
9f1da824 166static void try_kill_monitor(pid_t pid, char *devname, int sock)
96a8270d
DW
167{
168 char buf[100];
169 int fd;
417a4b04 170 int n;
af7ca334 171 long fl;
b109d928 172
8aae4219
DW
173 /* first rule of survival... don't off yourself */
174 if (pid == getpid())
175 return;
176
b109d928
DW
177 /* kill this process if it is mdmon */
178 sprintf(buf, "/proc/%lu/cmdline", (unsigned long) pid);
179 fd = open(buf, O_RDONLY);
180 if (fd < 0)
181 return;
182
417a4b04
N
183 n = read(fd, buf, sizeof(buf)-1);
184 buf[sizeof(buf)-1] = 0;
185 close(fd);
b109d928 186
417a4b04 187 if (n < 0 || !strstr(buf, "mdmon"))
883a6142
DW
188 return;
189
190 kill(pid, SIGTERM);
191
88e5516e
N
192 if (sock < 0)
193 return;
194
af7ca334
N
195 /* Wait for monitor to exit by reading from the socket, after
196 * clearing the non-blocking flag */
197 fl = fcntl(sock, F_GETFL, 0);
198 fl &= ~O_NONBLOCK;
199 fcntl(sock, F_SETFL, fl);
fcf57625
N
200 n = read(sock, buf, 100);
201 /* Ignore result, it is just the wait that
202 * matters
203 */
b109d928
DW
204}
205
e0d6609f
NB
206void remove_pidfile(char *devname)
207{
208 char buf[100];
209
753cf905 210 sprintf(buf, "%s/%s.pid", MDMON_DIR, devname);
e0d6609f 211 unlink(buf);
753cf905 212 sprintf(buf, "%s/%s.sock", MDMON_DIR, devname);
57752795 213 unlink(buf);
e0d6609f
NB
214}
215
fa716c83 216static int make_control_sock(char *devname)
549e9569
NB
217{
218 char path[100];
219 int sfd;
220 long fl;
221 struct sockaddr_un addr;
222
6144ed44
DW
223 if (sigterm)
224 return -1;
225
753cf905 226 sprintf(path, "%s/%s.sock", MDMON_DIR, devname);
549e9569
NB
227 unlink(path);
228 sfd = socket(PF_LOCAL, SOCK_STREAM, 0);
229 if (sfd < 0)
230 return -1;
231
232 addr.sun_family = PF_LOCAL;
233 strcpy(addr.sun_path, path);
234 if (bind(sfd, &addr, sizeof(addr)) < 0) {
235 close(sfd);
236 return -1;
237 }
238 listen(sfd, 10);
239 fl = fcntl(sfd, F_GETFL, 0);
240 fl |= O_NONBLOCK;
241 fcntl(sfd, F_SETFL, fl);
242 return sfd;
243}
244
6144ed44
DW
245static void term(int sig)
246{
247 sigterm = 1;
248}
249
4d43913c
NB
250static void wake_me(int sig)
251{
252
253}
254
16ddab0d
DW
255/* if we are debugging and starting mdmon by hand then don't fork */
256static int do_fork(void)
257{
258 #ifdef DEBUG
40ebbb9c 259 if (check_env("MDADM_NO_MDMON"))
16ddab0d
DW
260 return 0;
261 #endif
262
263 return 1;
264}
265
13047e4c
DW
266void usage(void)
267{
eb155f6d
JS
268 fprintf(stderr,
269"Usage: mdmon [options] CONTAINER\n"
270"\n"
271"Options are:\n"
272" --help -h : This message\n"
273" --all : All devices\n"
274" --takeover -t : Takeover container\n"
da827518
JS
275" --offroot : Set first character of argv[0] to @ to indicate the\n"
276" application was launched from initrd/initramfs and\n"
277" should not be shutdown by systemd as part of the\n"
278" regular shutdown process.\n"
eb155f6d 279);
13047e4c
DW
280 exit(2);
281}
16ddab0d 282
b5c727dc 283static int mdmon(char *devname, int devnum, int must_fork, int takeover);
1ffd2840 284
549e9569
NB
285int main(int argc, char *argv[])
286{
13047e4c 287 char *container_name = NULL;
e8a70c89
N
288 int devnum;
289 char *devname;
1ffd2840 290 int status = 0;
eb155f6d 291 int opt;
b5c727dc
N
292 int all = 0;
293 int takeover = 0;
eb155f6d
JS
294 static struct option options[] = {
295 {"all", 0, NULL, 'a'},
296 {"takeover", 0, NULL, 't'},
297 {"help", 0, NULL, 'h'},
da827518 298 {"offroot", 0, NULL, OffRootOpt},
eb155f6d
JS
299 {NULL, 0, NULL, 0}
300 };
301
302 while ((opt = getopt_long(argc, argv, "th", options, NULL)) != -1) {
303 switch (opt) {
304 case 'a':
305 container_name = argv[optind-1];
b5c727dc 306 all = 1;
eb155f6d
JS
307 break;
308 case 't':
b5c727dc 309 takeover = 1;
eb155f6d 310 break;
da827518
JS
311 case OffRootOpt:
312 argv[0][0] = '@';
313 break;
eb155f6d
JS
314 case 'h':
315 default:
b5c727dc 316 usage();
eb155f6d
JS
317 break;
318 }
319 }
320
321 if (all == 0 && container_name == NULL) {
322 if (argv[optind])
323 container_name = argv[optind];
549e9569 324 }
eb155f6d 325
eb49460b
LB
326 if (container_name == NULL)
327 usage();
13047e4c 328
eb155f6d
JS
329 if (argc - optind > 1)
330 usage();
331
332 if (strcmp(container_name, "/proc/mdstat") == 0)
333 all = 1;
334
b5c727dc 335 if (all) {
1ffd2840 336 struct mdstat_ent *mdstat, *e;
eb49460b 337 int container_len = strlen(container_name);
1ffd2840
DW
338
339 /* launch an mdmon instance for each container found */
1ffd2840
DW
340 mdstat = mdstat_read(0, 0);
341 for (e = mdstat; e; e = e->next) {
f4db7a6f
MM
342 if (e->metadata_version &&
343 strncmp(e->metadata_version, "external:", 9) == 0 &&
1ffd2840
DW
344 !is_subarray(&e->metadata_version[9])) {
345 devname = devnum2devname(e->devnum);
1b34f519
DW
346 /* update cmdline so this mdmon instance can be
347 * distinguished from others in a call to ps(1)
348 */
f21e18ca 349 if (strlen(devname) <= (unsigned)container_len) {
eb49460b 350 memset(container_name, 0, container_len);
1b34f519
DW
351 sprintf(container_name, "%s", devname);
352 }
3e7312a9 353 status |= mdmon(devname, e->devnum, 1,
b5c727dc 354 takeover);
1ffd2840
DW
355 }
356 }
357 free_mdstat(mdstat);
358
359 return status;
360 } else if (strncmp(container_name, "md", 2) == 0) {
6f4098a6
DW
361 devnum = devname2devnum(container_name);
362 devname = devnum2devname(devnum);
363 if (strcmp(container_name, devname) != 0)
364 devname = NULL;
365 } else {
366 struct stat st;
367
368 devnum = NoMdDev;
369 if (stat(container_name, &st) == 0)
370 devnum = stat2devnum(&st);
371 if (devnum == NoMdDev)
372 devname = NULL;
373 else
374 devname = devnum2devname(devnum);
375 }
376
377 if (!devname) {
e8a70c89
N
378 fprintf(stderr, "mdmon: %s is not a valid md device name\n",
379 container_name);
380 exit(1);
381 }
b5c727dc 382 return mdmon(devname, devnum, do_fork(), takeover);
1ffd2840
DW
383}
384
b5c727dc 385static int mdmon(char *devname, int devnum, int must_fork, int takeover)
1ffd2840
DW
386{
387 int mdfd;
388 struct mdinfo *mdi, *di;
389 struct supertype *container;
390 sigset_t set;
391 struct sigaction act;
392 int pfd[2];
393 int status;
394 int ignore;
96a8270d 395 pid_t victim = -1;
9f1da824 396 int victim_sock = -1;
1ffd2840 397
b5c727dc 398 dprintf("starting mdmon for %s\n", devname);
b928b5a0 399
e8a70c89 400 mdfd = open_dev(devnum);
549e9569 401 if (mdfd < 0) {
1ffd2840 402 fprintf(stderr, "mdmon: %s: %s\n", devname,
549e9569 403 strerror(errno));
1ffd2840 404 return 1;
549e9569
NB
405 }
406 if (md_get_version(mdfd) < 0) {
13047e4c 407 fprintf(stderr, "mdmon: %s: Not an md device\n",
1ffd2840
DW
408 devname);
409 return 1;
549e9569
NB
410 }
411
9fe32043 412 /* Fork, and have the child tell us when they are ready */
3e7312a9 413 if (must_fork) {
3d2c4fc7
DW
414 if (pipe(pfd) != 0) {
415 fprintf(stderr, "mdmon: failed to create pipe\n");
1ffd2840 416 return 1;
3d2c4fc7 417 }
16ddab0d
DW
418 switch(fork()) {
419 case -1:
420 fprintf(stderr, "mdmon: failed to fork: %s\n",
421 strerror(errno));
1ffd2840 422 return 1;
16ddab0d
DW
423 case 0: /* child */
424 close(pfd[0]);
425 break;
426 default: /* parent */
427 close(pfd[1]);
428 if (read(pfd[0], &status, sizeof(status)) != sizeof(status)) {
429 wait(&status);
430 status = WEXITSTATUS(status);
431 }
1ffd2840 432 return status;
9fe32043 433 }
16ddab0d
DW
434 } else
435 pfd[0] = pfd[1] = -1;
549e9569 436
503975b9 437 container = xcalloc(1, sizeof(*container));
e8a70c89
N
438 container->devnum = devnum;
439 container->devname = devname;
13047e4c 440 container->arrays = NULL;
96a8270d 441 container->sock = -1;
13047e4c
DW
442
443 if (!container->devname) {
444 fprintf(stderr, "mdmon: failed to allocate container name string\n");
445 exit(3);
446 }
447
b526e52d 448 mdi = sysfs_read(mdfd, container->devnum, GET_VERSION|GET_LEVEL|GET_DEVS);
13047e4c
DW
449
450 if (!mdi) {
451 fprintf(stderr, "mdmon: failed to load sysfs info for %s\n",
452 container->devname);
453 exit(3);
454 }
455 if (mdi->array.level != UnSet) {
456 fprintf(stderr, "mdmon: %s is not a container - cannot monitor\n",
1ffd2840 457 devname);
13047e4c
DW
458 exit(3);
459 }
460 if (mdi->array.major_version != -1 ||
461 mdi->array.minor_version != -2) {
462 fprintf(stderr, "mdmon: %s does not use external metadata - cannot monitor\n",
1ffd2840 463 devname);
13047e4c
DW
464 exit(3);
465 }
466
33414a01 467 container->ss = version_to_superswitch(mdi->text_version);
13047e4c 468 if (container->ss == NULL) {
33414a01 469 fprintf(stderr, "mdmon: %s uses unsupported metadata: %s\n",
1ffd2840 470 devname, mdi->text_version);
13047e4c
DW
471 exit(3);
472 }
473
474 container->devs = NULL;
475 for (di = mdi->devs; di; di = di->next) {
503975b9 476 struct mdinfo *cd = xmalloc(sizeof(*cd));
13047e4c
DW
477 *cd = *di;
478 cd->next = container->devs;
479 container->devs = cd;
480 }
481 sysfs_free(mdi);
549e9569 482
883a6142
DW
483 /* SIGUSR is sent between parent and child. So both block it
484 * and enable it only with pselect.
485 */
486 sigemptyset(&set);
487 sigaddset(&set, SIGUSR1);
883a6142
DW
488 sigaddset(&set, SIGTERM);
489 sigprocmask(SIG_BLOCK, &set, NULL);
490 act.sa_handler = wake_me;
491 act.sa_flags = 0;
492 sigaction(SIGUSR1, &act, NULL);
883a6142
DW
493 act.sa_handler = term;
494 sigaction(SIGTERM, &act, NULL);
495 act.sa_handler = SIG_IGN;
496 sigaction(SIGPIPE, &act, NULL);
497
32f21701 498 victim = mdmon_pid(container->devnum);
84a230d9 499 if (victim >= 0)
32f21701 500 victim_sock = connect_monitor(container->devname);
13047e4c 501
13047e4c 502 ignore = chdir("/");
32f21701
N
503 if (!takeover && victim > 0 && victim_sock >= 0) {
504 if (fping_monitor(victim_sock) == 0) {
b109d928
DW
505 fprintf(stderr, "mdmon: %s already managed\n",
506 container->devname);
507 exit(3);
24cfdbc5 508 }
32f21701 509 close(victim_sock);
88e5516e 510 victim_sock = -1;
549e9569 511 }
0fb69d1d 512 if (container->ss->load_container(container, mdfd, devname)) {
549e9569 513 fprintf(stderr, "mdmon: Cannot load metadata for %s\n",
1ffd2840 514 devname);
549e9569
NB
515 exit(3);
516 }
e8a70c89 517 close(mdfd);
549e9569 518
9fe32043
N
519 /* Ok, this is close enough. We can say goodbye to our parent now.
520 */
fa716c83
N
521 if (victim > 0)
522 remove_pidfile(devname);
fa716c83 523 if (make_pidfile(devname) < 0) {
753cf905 524 exit(3);
fa716c83
N
525 }
526 container->sock = make_control_sock(devname);
527
9fe32043 528 status = 0;
3d2c4fc7
DW
529 if (write(pfd[1], &status, sizeof(status)) < 0)
530 fprintf(stderr, "mdmon: failed to notify our parent: %d\n",
531 getppid());
9fe32043
N
532 close(pfd[1]);
533
1373b07d 534 mlockall(MCL_CURRENT | MCL_FUTURE);
549e9569 535
3e70c845 536 if (clone_monitor(container) < 0) {
295646b3 537 fprintf(stderr, "mdmon: failed to start monitor process: %s\n",
549e9569
NB
538 strerror(errno));
539 exit(2);
540 }
541
fa716c83 542 if (victim > 0) {
9f1da824 543 try_kill_monitor(victim, container->devname, victim_sock);
88e5516e
N
544 if (victim_sock >= 0)
545 close(victim_sock);
9f1da824 546 }
e98ef225
N
547
548 setsid();
549 close(0);
550 open("/dev/null", O_RDWR);
551 close(1);
552 ignore = dup(0);
553#ifndef DEBUG
554 close(2);
555 ignore = dup(0);
556#endif
557
e4c72d1d
LB
558 /* This silliness is to stop the compiler complaining
559 * that we ignore 'ignore'
560 */
561 if (ignore)
562 ignore++;
563
549e9569
NB
564 do_manager(container);
565
566 exit(0);
567}
999b4972
N
568
569/* Some stub functions so super-* can link with us */
570int child_monitor(int afd, struct mdinfo *sra, struct reshape *reshape,
571 struct supertype *st, unsigned long blocks,
572 int *fds, unsigned long long *offsets,
573 int dests, int *destfd, unsigned long long *destoffsets)
574{
575 return 0;
576}
afbbf073
AK
577
578int restore_stripes(int *dest, unsigned long long *offsets,
579 int raid_disks, int chunk_size, int level, int layout,
580 int source, unsigned long long read_offset,
581 unsigned long long start, unsigned long long length,
582 char *src_buf)
583{
584 return 1;
585}
586
587void abort_reshape(struct mdinfo *sra)
588{
589 return;
590}
591
592int save_stripes(int *source, unsigned long long *offsets,
593 int raid_disks, int chunk_size, int level, int layout,
594 int nwrites, int *dest,
595 unsigned long long start, unsigned long long length,
596 char *buf)
597{
598 return 0;
599}