]> git.ipfire.org Git - thirdparty/mdadm.git/blame - mdmon.c
DDF: fix bug in compare_super_ddf
[thirdparty/mdadm.git] / mdmon.c
CommitLineData
a54d5262
DW
1/*
2 * mdmon - monitor external metadata arrays
3 *
e736b623
N
4 * Copyright (C) 2007-2009 Neil Brown <neilb@suse.de>
5 * Copyright (C) 2007-2009 Intel Corporation
a54d5262
DW
6 *
7 * This program is free software; you can redistribute it and/or modify it
8 * under the terms and conditions of the GNU General Public License,
9 * version 2, as published by the Free Software Foundation.
10 *
11 * This program is distributed in the hope it will be useful, but WITHOUT
12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
13 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
14 * more details.
15 *
16 * You should have received a copy of the GNU General Public License along with
17 * this program; if not, write to the Free Software Foundation, Inc.,
18 * 51 Franklin St - Fifth Floor, Boston, MA 02110-1301 USA.
19 */
549e9569
NB
20
21/*
22 * md array manager.
23 * When md arrays have user-space managed metadata, this is the program
24 * that does the managing.
25 *
26 * Given one argument: the name of the array (e.g. /dev/md0) that is
27 * the container.
28 * We fork off a helper that runs high priority and mlocked. It responds to
29 * device failures and other events that might stop writeout, or that are
30 * trivial to deal with.
31 * The main thread then watches for new arrays being created in the container
32 * and starts monitoring them too ... along with a few other tasks.
33 *
34 * The main thread communicates with the priority thread by writing over
35 * a pipe.
36 * Separate programs can communicate with the main thread via Unix-domain
37 * socket.
38 * The two threads share address space and open file table.
39 *
40 */
41
42#ifndef _GNU_SOURCE
43#define _GNU_SOURCE
44#endif
45
46#include <unistd.h>
47#include <stdlib.h>
4d43913c 48#include <sys/types.h>
549e9569
NB
49#include <sys/stat.h>
50#include <sys/socket.h>
51#include <sys/un.h>
52#include <sys/mman.h>
4d43913c 53#include <sys/syscall.h>
9fe32043 54#include <sys/wait.h>
549e9569
NB
55#include <stdio.h>
56#include <errno.h>
57#include <string.h>
58#include <fcntl.h>
b109d928 59#include <signal.h>
13047e4c 60#include <dirent.h>
f4190c2f
DW
61#ifdef USE_PTHREADS
62#include <pthread.h>
63#else
549e9569 64#include <sched.h>
f4190c2f 65#endif
549e9569
NB
66
67#include "mdadm.h"
68#include "mdmon.h"
69
549e9569
NB
70struct active_array *discard_this;
71struct active_array *pending_discard;
4d43913c
NB
72
73int mon_tid, mgr_tid;
549e9569 74
6144ed44
DW
75int sigterm;
76
f4190c2f
DW
77#ifdef USE_PTHREADS
78static void *run_child(void *v)
79{
80 struct supertype *c = v;
81
82 mon_tid = syscall(SYS_gettid);
83 do_monitor(c);
84 return 0;
85}
86
87static int clone_monitor(struct supertype *container)
88{
89 pthread_attr_t attr;
90 pthread_t thread;
91 int rc;
92
93 mon_tid = -1;
94 pthread_attr_init(&attr);
95 pthread_attr_setstacksize(&attr, 4096);
96 pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED);
97 rc = pthread_create(&thread, &attr, run_child, container);
98 if (rc)
99 return rc;
100 while (mon_tid == -1)
101 usleep(10);
102 pthread_attr_destroy(&attr);
103
104 mgr_tid = syscall(SYS_gettid);
105
106 return mon_tid;
107}
108#else /* USE_PTHREADS */
109static int run_child(void *v)
549e9569
NB
110{
111 struct supertype *c = v;
1ed3f387 112
549e9569
NB
113 do_monitor(c);
114 return 0;
115}
116
97f734fd
N
117#ifdef __ia64__
118int __clone2(int (*fn)(void *),
119 void *child_stack_base, size_t stack_size,
120 int flags, void *arg, ...
121 /* pid_t *pid, struct user_desc *tls, pid_t *ctid */ );
122#endif
f4190c2f 123static int clone_monitor(struct supertype *container)
549e9569 124{
549e9569 125 static char stack[4096];
549e9569 126
97f734fd
N
127#ifdef __ia64__
128 mon_tid = __clone2(run_child, stack, sizeof(stack),
129 CLONE_FS|CLONE_FILES|CLONE_VM|CLONE_SIGHAND|CLONE_THREAD,
130 container);
131#else
2cc98f9e 132 mon_tid = clone(run_child, stack+4096-64,
549e9569
NB
133 CLONE_FS|CLONE_FILES|CLONE_VM|CLONE_SIGHAND|CLONE_THREAD,
134 container);
97f734fd 135#endif
3e70c845 136
4d43913c 137 mgr_tid = syscall(SYS_gettid);
2cc98f9e
DW
138
139 return mon_tid;
549e9569 140}
f4190c2f 141#endif /* USE_PTHREADS */
549e9569 142
fa716c83 143static int make_pidfile(char *devname)
549e9569
NB
144{
145 char path[100];
146 char pid[10];
147 int fd;
3d2c4fc7
DW
148 int n;
149
753cf905 150 if (mkdir(MDMON_DIR, 0755) < 0 &&
ed8fa52f
LB
151 errno != EEXIST)
152 return -errno;
753cf905 153 sprintf(path, "%s/%s.pid", MDMON_DIR, devname);
549e9569 154
5d4d1b26 155 fd = open(path, O_RDWR|O_CREAT|O_EXCL, 0600);
549e9569 156 if (fd < 0)
295646b3 157 return -errno;
549e9569 158 sprintf(pid, "%d\n", getpid());
3d2c4fc7 159 n = write(fd, pid, strlen(pid));
549e9569 160 close(fd);
3d2c4fc7
DW
161 if (n < 0)
162 return -errno;
549e9569
NB
163 return 0;
164}
165
9f1da824 166static void try_kill_monitor(pid_t pid, char *devname, int sock)
96a8270d
DW
167{
168 char buf[100];
169 int fd;
417a4b04 170 int n;
af7ca334 171 long fl;
b109d928 172
8aae4219
DW
173 /* first rule of survival... don't off yourself */
174 if (pid == getpid())
175 return;
176
b109d928
DW
177 /* kill this process if it is mdmon */
178 sprintf(buf, "/proc/%lu/cmdline", (unsigned long) pid);
179 fd = open(buf, O_RDONLY);
180 if (fd < 0)
181 return;
182
417a4b04
N
183 n = read(fd, buf, sizeof(buf)-1);
184 buf[sizeof(buf)-1] = 0;
185 close(fd);
b109d928 186
a99d3469
N
187 if (n < 0 || !(strstr(buf, "mdmon") ||
188 strstr(buf, "@dmon")))
883a6142
DW
189 return;
190
191 kill(pid, SIGTERM);
192
88e5516e
N
193 if (sock < 0)
194 return;
195
af7ca334
N
196 /* Wait for monitor to exit by reading from the socket, after
197 * clearing the non-blocking flag */
198 fl = fcntl(sock, F_GETFL, 0);
199 fl &= ~O_NONBLOCK;
200 fcntl(sock, F_SETFL, fl);
fcf57625
N
201 n = read(sock, buf, 100);
202 /* Ignore result, it is just the wait that
203 * matters
204 */
b109d928
DW
205}
206
e0d6609f
NB
207void remove_pidfile(char *devname)
208{
209 char buf[100];
210
753cf905 211 sprintf(buf, "%s/%s.pid", MDMON_DIR, devname);
e0d6609f 212 unlink(buf);
753cf905 213 sprintf(buf, "%s/%s.sock", MDMON_DIR, devname);
57752795 214 unlink(buf);
e0d6609f
NB
215}
216
fa716c83 217static int make_control_sock(char *devname)
549e9569
NB
218{
219 char path[100];
220 int sfd;
221 long fl;
222 struct sockaddr_un addr;
223
6144ed44
DW
224 if (sigterm)
225 return -1;
226
753cf905 227 sprintf(path, "%s/%s.sock", MDMON_DIR, devname);
549e9569
NB
228 unlink(path);
229 sfd = socket(PF_LOCAL, SOCK_STREAM, 0);
230 if (sfd < 0)
231 return -1;
232
233 addr.sun_family = PF_LOCAL;
234 strcpy(addr.sun_path, path);
235 if (bind(sfd, &addr, sizeof(addr)) < 0) {
236 close(sfd);
237 return -1;
238 }
239 listen(sfd, 10);
240 fl = fcntl(sfd, F_GETFL, 0);
241 fl |= O_NONBLOCK;
242 fcntl(sfd, F_SETFL, fl);
243 return sfd;
244}
245
6144ed44
DW
246static void term(int sig)
247{
248 sigterm = 1;
249}
250
4d43913c
NB
251static void wake_me(int sig)
252{
253
254}
255
16ddab0d
DW
256/* if we are debugging and starting mdmon by hand then don't fork */
257static int do_fork(void)
258{
259 #ifdef DEBUG
40ebbb9c 260 if (check_env("MDADM_NO_MDMON"))
16ddab0d
DW
261 return 0;
262 #endif
263
264 return 1;
265}
266
13047e4c
DW
267void usage(void)
268{
eb155f6d
JS
269 fprintf(stderr,
270"Usage: mdmon [options] CONTAINER\n"
271"\n"
272"Options are:\n"
273" --help -h : This message\n"
274" --all : All devices\n"
275" --takeover -t : Takeover container\n"
276);
13047e4c
DW
277 exit(2);
278}
16ddab0d 279
4dd2df09 280static int mdmon(char *devnm, int must_fork, int takeover);
1ffd2840 281
549e9569
NB
282int main(int argc, char *argv[])
283{
13047e4c 284 char *container_name = NULL;
4dd2df09 285 char *devnm = NULL;
1ffd2840 286 int status = 0;
eb155f6d 287 int opt;
b5c727dc
N
288 int all = 0;
289 int takeover = 0;
03041982 290 int dofork = 1;
eb155f6d
JS
291 static struct option options[] = {
292 {"all", 0, NULL, 'a'},
293 {"takeover", 0, NULL, 't'},
294 {"help", 0, NULL, 'h'},
da827518 295 {"offroot", 0, NULL, OffRootOpt},
03041982 296 {"foreground", 0, NULL, 'F'},
eb155f6d
JS
297 {NULL, 0, NULL, 0}
298 };
299
3e23ba9d
JS
300 /*
301 * Always change process name to @dmon to avoid systemd killing it
302 */
303 argv[0][0] = '@';
304
03041982 305 while ((opt = getopt_long(argc, argv, "thaF", options, NULL)) != -1) {
eb155f6d
JS
306 switch (opt) {
307 case 'a':
308 container_name = argv[optind-1];
b5c727dc 309 all = 1;
eb155f6d
JS
310 break;
311 case 't':
b5c727dc 312 takeover = 1;
eb155f6d 313 break;
03041982
N
314 case 'F':
315 dofork = 0;
316 break;
da827518 317 case OffRootOpt:
3e23ba9d 318 /* silently ignore old option */
da827518 319 break;
eb155f6d
JS
320 case 'h':
321 default:
b5c727dc 322 usage();
eb155f6d
JS
323 break;
324 }
325 }
326
327 if (all == 0 && container_name == NULL) {
328 if (argv[optind])
329 container_name = argv[optind];
549e9569 330 }
eb155f6d 331
eb49460b
LB
332 if (container_name == NULL)
333 usage();
13047e4c 334
eb155f6d
JS
335 if (argc - optind > 1)
336 usage();
337
338 if (strcmp(container_name, "/proc/mdstat") == 0)
339 all = 1;
340
b5c727dc 341 if (all) {
1ffd2840 342 struct mdstat_ent *mdstat, *e;
eb49460b 343 int container_len = strlen(container_name);
1ffd2840
DW
344
345 /* launch an mdmon instance for each container found */
1ffd2840
DW
346 mdstat = mdstat_read(0, 0);
347 for (e = mdstat; e; e = e->next) {
f4db7a6f
MM
348 if (e->metadata_version &&
349 strncmp(e->metadata_version, "external:", 9) == 0 &&
1ffd2840 350 !is_subarray(&e->metadata_version[9])) {
1b34f519
DW
351 /* update cmdline so this mdmon instance can be
352 * distinguished from others in a call to ps(1)
353 */
4dd2df09 354 if (strlen(e->devnm) <= (unsigned)container_len) {
eb49460b 355 memset(container_name, 0, container_len);
4dd2df09 356 sprintf(container_name, "%s", e->devnm);
1b34f519 357 }
4dd2df09 358 status |= mdmon(e->devnm, 1, takeover);
1ffd2840
DW
359 }
360 }
361 free_mdstat(mdstat);
362
363 return status;
364 } else if (strncmp(container_name, "md", 2) == 0) {
4dd2df09
N
365 int id = devnm2devid(container_name);
366 if (id)
367 devnm = container_name;
6f4098a6
DW
368 } else {
369 struct stat st;
370
6f4098a6 371 if (stat(container_name, &st) == 0)
4dd2df09 372 devnm = xstrdup(stat2devnm(&st));
6f4098a6
DW
373 }
374
4dd2df09 375 if (!devnm) {
e8a70c89
N
376 fprintf(stderr, "mdmon: %s is not a valid md device name\n",
377 container_name);
378 exit(1);
379 }
4dd2df09 380 return mdmon(devnm, dofork && do_fork(), takeover);
1ffd2840
DW
381}
382
4dd2df09 383static int mdmon(char *devnm, int must_fork, int takeover)
1ffd2840
DW
384{
385 int mdfd;
386 struct mdinfo *mdi, *di;
387 struct supertype *container;
388 sigset_t set;
389 struct sigaction act;
390 int pfd[2];
391 int status;
392 int ignore;
96a8270d 393 pid_t victim = -1;
9f1da824 394 int victim_sock = -1;
1ffd2840 395
4dd2df09 396 dprintf("starting mdmon for %s\n", devnm);
b928b5a0 397
4dd2df09 398 mdfd = open_dev(devnm);
549e9569 399 if (mdfd < 0) {
4dd2df09 400 fprintf(stderr, "mdmon: %s: %s\n", devnm,
549e9569 401 strerror(errno));
1ffd2840 402 return 1;
549e9569
NB
403 }
404 if (md_get_version(mdfd) < 0) {
13047e4c 405 fprintf(stderr, "mdmon: %s: Not an md device\n",
4dd2df09 406 devnm);
1ffd2840 407 return 1;
549e9569
NB
408 }
409
9fe32043 410 /* Fork, and have the child tell us when they are ready */
3e7312a9 411 if (must_fork) {
3d2c4fc7
DW
412 if (pipe(pfd) != 0) {
413 fprintf(stderr, "mdmon: failed to create pipe\n");
1ffd2840 414 return 1;
3d2c4fc7 415 }
16ddab0d
DW
416 switch(fork()) {
417 case -1:
418 fprintf(stderr, "mdmon: failed to fork: %s\n",
419 strerror(errno));
1ffd2840 420 return 1;
16ddab0d
DW
421 case 0: /* child */
422 close(pfd[0]);
423 break;
424 default: /* parent */
425 close(pfd[1]);
426 if (read(pfd[0], &status, sizeof(status)) != sizeof(status)) {
427 wait(&status);
428 status = WEXITSTATUS(status);
429 }
1ffd2840 430 return status;
9fe32043 431 }
16ddab0d
DW
432 } else
433 pfd[0] = pfd[1] = -1;
549e9569 434
503975b9 435 container = xcalloc(1, sizeof(*container));
4dd2df09 436 strcpy(container->devnm, devnm);
13047e4c 437 container->arrays = NULL;
96a8270d 438 container->sock = -1;
13047e4c 439
4dd2df09 440 mdi = sysfs_read(mdfd, container->devnm, GET_VERSION|GET_LEVEL|GET_DEVS);
13047e4c
DW
441
442 if (!mdi) {
443 fprintf(stderr, "mdmon: failed to load sysfs info for %s\n",
4dd2df09 444 container->devnm);
13047e4c
DW
445 exit(3);
446 }
447 if (mdi->array.level != UnSet) {
448 fprintf(stderr, "mdmon: %s is not a container - cannot monitor\n",
4dd2df09 449 devnm);
13047e4c
DW
450 exit(3);
451 }
452 if (mdi->array.major_version != -1 ||
453 mdi->array.minor_version != -2) {
454 fprintf(stderr, "mdmon: %s does not use external metadata - cannot monitor\n",
4dd2df09 455 devnm);
13047e4c
DW
456 exit(3);
457 }
458
33414a01 459 container->ss = version_to_superswitch(mdi->text_version);
13047e4c 460 if (container->ss == NULL) {
33414a01 461 fprintf(stderr, "mdmon: %s uses unsupported metadata: %s\n",
4dd2df09 462 devnm, mdi->text_version);
13047e4c
DW
463 exit(3);
464 }
465
466 container->devs = NULL;
467 for (di = mdi->devs; di; di = di->next) {
503975b9 468 struct mdinfo *cd = xmalloc(sizeof(*cd));
13047e4c
DW
469 *cd = *di;
470 cd->next = container->devs;
471 container->devs = cd;
472 }
473 sysfs_free(mdi);
549e9569 474
883a6142
DW
475 /* SIGUSR is sent between parent and child. So both block it
476 * and enable it only with pselect.
477 */
478 sigemptyset(&set);
479 sigaddset(&set, SIGUSR1);
883a6142
DW
480 sigaddset(&set, SIGTERM);
481 sigprocmask(SIG_BLOCK, &set, NULL);
482 act.sa_handler = wake_me;
483 act.sa_flags = 0;
484 sigaction(SIGUSR1, &act, NULL);
883a6142
DW
485 act.sa_handler = term;
486 sigaction(SIGTERM, &act, NULL);
487 act.sa_handler = SIG_IGN;
488 sigaction(SIGPIPE, &act, NULL);
489
4dd2df09 490 victim = mdmon_pid(container->devnm);
84a230d9 491 if (victim >= 0)
4dd2df09 492 victim_sock = connect_monitor(container->devnm);
13047e4c 493
13047e4c 494 ignore = chdir("/");
32f21701
N
495 if (!takeover && victim > 0 && victim_sock >= 0) {
496 if (fping_monitor(victim_sock) == 0) {
b109d928 497 fprintf(stderr, "mdmon: %s already managed\n",
4dd2df09 498 container->devnm);
b109d928 499 exit(3);
24cfdbc5 500 }
32f21701 501 close(victim_sock);
88e5516e 502 victim_sock = -1;
549e9569 503 }
4dd2df09 504 if (container->ss->load_container(container, mdfd, devnm)) {
549e9569 505 fprintf(stderr, "mdmon: Cannot load metadata for %s\n",
4dd2df09 506 devnm);
549e9569
NB
507 exit(3);
508 }
e8a70c89 509 close(mdfd);
549e9569 510
9fe32043
N
511 /* Ok, this is close enough. We can say goodbye to our parent now.
512 */
fa716c83 513 if (victim > 0)
4dd2df09
N
514 remove_pidfile(devnm);
515 if (make_pidfile(devnm) < 0) {
753cf905 516 exit(3);
fa716c83 517 }
4dd2df09 518 container->sock = make_control_sock(devnm);
fa716c83 519
9fe32043 520 status = 0;
3d2c4fc7
DW
521 if (write(pfd[1], &status, sizeof(status)) < 0)
522 fprintf(stderr, "mdmon: failed to notify our parent: %d\n",
523 getppid());
9fe32043
N
524 close(pfd[1]);
525
1373b07d 526 mlockall(MCL_CURRENT | MCL_FUTURE);
549e9569 527
3e70c845 528 if (clone_monitor(container) < 0) {
295646b3 529 fprintf(stderr, "mdmon: failed to start monitor process: %s\n",
549e9569
NB
530 strerror(errno));
531 exit(2);
532 }
533
fa716c83 534 if (victim > 0) {
4dd2df09 535 try_kill_monitor(victim, container->devnm, victim_sock);
88e5516e
N
536 if (victim_sock >= 0)
537 close(victim_sock);
9f1da824 538 }
e98ef225
N
539
540 setsid();
541 close(0);
542 open("/dev/null", O_RDWR);
543 close(1);
544 ignore = dup(0);
545#ifndef DEBUG
546 close(2);
547 ignore = dup(0);
548#endif
549
e4c72d1d
LB
550 /* This silliness is to stop the compiler complaining
551 * that we ignore 'ignore'
552 */
553 if (ignore)
554 ignore++;
555
549e9569
NB
556 do_manager(container);
557
558 exit(0);
559}
999b4972
N
560
561/* Some stub functions so super-* can link with us */
562int child_monitor(int afd, struct mdinfo *sra, struct reshape *reshape,
563 struct supertype *st, unsigned long blocks,
564 int *fds, unsigned long long *offsets,
565 int dests, int *destfd, unsigned long long *destoffsets)
566{
567 return 0;
568}
afbbf073
AK
569
570int restore_stripes(int *dest, unsigned long long *offsets,
571 int raid_disks, int chunk_size, int level, int layout,
572 int source, unsigned long long read_offset,
573 unsigned long long start, unsigned long long length,
574 char *src_buf)
575{
576 return 1;
577}
578
579void abort_reshape(struct mdinfo *sra)
580{
581 return;
582}
583
584int save_stripes(int *source, unsigned long long *offsets,
585 int raid_disks, int chunk_size, int level, int layout,
586 int nwrites, int *dest,
587 unsigned long long start, unsigned long long length,
588 char *buf)
589{
590 return 0;
591}