]> git.ipfire.org Git - thirdparty/mdadm.git/blame - util.c
Create.c: fix uclibc build
[thirdparty/mdadm.git] / util.c
CommitLineData
64c4757e 1/*
9a9dab36 2 * mdadm - manage Linux "md" devices aka RAID arrays.
64c4757e 3 *
6f02172d 4 * Copyright (C) 2001-2013 Neil Brown <neilb@suse.de>
64c4757e
NB
5 *
6 *
7 * This program is free software; you can redistribute it and/or modify
8 * it under the terms of the GNU General Public License as published by
9 * the Free Software Foundation; either version 2 of the License, or
10 * (at your option) any later version.
11 *
12 * This program is distributed in the hope that it will be useful,
13 * but WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
15 * GNU General Public License for more details.
16 *
17 * You should have received a copy of the GNU General Public License
18 * along with this program; if not, write to the Free Software
19 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 *
21 * Author: Neil Brown
e736b623 22 * Email: <neilb@suse.de>
64c4757e
NB
23 */
24
9a9dab36 25#include "mdadm.h"
64c4757e 26#include "md_p.h"
edd8d13c 27#include <sys/socket.h>
64c4757e 28#include <sys/utsname.h>
9fe32043 29#include <sys/wait.h>
edd8d13c 30#include <sys/un.h>
a7dec3fd 31#include <sys/resource.h>
a9c15847 32#include <sys/vfs.h>
b2514242 33#include <sys/mman.h>
a9c15847 34#include <linux/magic.h>
986b8688 35#include <poll.h>
98c6faba 36#include <ctype.h>
a322f70c 37#include <dirent.h>
7716570e 38#include <dlfcn.h>
8bda8609 39#include <limits.h>
0a816ef9
NB
40
41/*
42 * following taken from linux/blkpg.h because they aren't
43 * anywhere else and it isn't safe to #include linux/ * stuff.
44 */
45
46#define BLKPG _IO(0x12,105)
47
48/* The argument structure */
49struct blkpg_ioctl_arg {
5d500228
N
50 int op;
51 int flags;
52 int datalen;
53 void *data;
0a816ef9
NB
54};
55
56/* The subfunctions (for the op field) */
57#define BLKPG_ADD_PARTITION 1
58#define BLKPG_DEL_PARTITION 2
59
60/* Sizes of name fields. Unused at present. */
61#define BLKPG_DEVNAMELTH 64
62#define BLKPG_VOLNAMELTH 64
63
64/* The data structure for ADD_PARTITION and DEL_PARTITION */
65struct blkpg_partition {
66 long long start; /* starting offset in bytes */
67 long long length; /* length in bytes */
68 int pno; /* partition number */
69 char devname[BLKPG_DEVNAMELTH]; /* partition name, like sda5 or c0d1p2,
70 to be used in kernel messages */
71 char volname[BLKPG_VOLNAMELTH]; /* volume label */
72};
64c4757e 73
0f22b998 74#include "part.h"
056b331e
N
75
76/* Force a compilation error if condition is true */
77#define BUILD_BUG_ON(condition) ((void)BUILD_BUG_ON_ZERO(condition))
78
79/* Force a compilation error if condition is true, but also produce a
80 result (of value 0 and type size_t), so the expression can be used
81 e.g. in a structure initializer (or where-ever else comma expressions
82 aren't permitted). */
83#define BUILD_BUG_ON_ZERO(e) (sizeof(struct { int:-!!(e); }))
84
d15a1f72 85static int is_dlm_hooks_ready = 0;
7071320a
N
86
87int dlm_funs_ready(void)
88{
89 return is_dlm_hooks_ready ? 1 : 0;
90}
91
7071320a 92static struct dlm_hooks *dlm_hooks = NULL;
d15a1f72
GJ
93struct dlm_lock_resource *dlm_lock_res = NULL;
94static int ast_called = 0;
95
96struct dlm_lock_resource {
97 dlm_lshandle_t *ls;
98 struct dlm_lksb lksb;
99};
100
d15a1f72
GJ
101/* Using poll(2) to wait for and dispatch ASTs */
102static int poll_for_ast(dlm_lshandle_t ls)
103{
104 struct pollfd pfd;
105
106 pfd.fd = dlm_hooks->ls_get_fd(ls);
107 pfd.events = POLLIN;
108
109 while (!ast_called)
110 {
111 if (poll(&pfd, 1, 0) < 0)
112 {
113 perror("poll");
114 return -1;
115 }
116 dlm_hooks->dispatch(dlm_hooks->ls_get_fd(ls));
117 }
118 ast_called = 0;
119
120 return 0;
121}
122
123static void dlm_ast(void *arg)
124{
125 ast_called = 1;
126}
127
81a8a694 128static char *cluster_name = NULL;
d15a1f72 129/* Create the lockspace, take bitmapXXX locks on all the bitmaps. */
1b7eb962 130int cluster_get_dlmlock(void)
d15a1f72
GJ
131{
132 int ret = -1;
133 char str[64];
134 int flags = LKF_NOQUEUE;
1b7eb962
GJ
135 int retry_count = 0;
136
137 if (!dlm_funs_ready()) {
138 pr_err("Something wrong with dlm library\n");
139 return -1;
140 }
d15a1f72 141
81a8a694
GJ
142 ret = get_cluster_name(&cluster_name);
143 if (ret) {
144 pr_err("The md can't get cluster name\n");
145 return -1;
146 }
147
d15a1f72 148 dlm_lock_res = xmalloc(sizeof(struct dlm_lock_resource));
1b7eb962 149 dlm_lock_res->ls = dlm_hooks->open_lockspace(cluster_name);
d15a1f72 150 if (!dlm_lock_res->ls) {
1b7eb962
GJ
151 dlm_lock_res->ls = dlm_hooks->create_lockspace(cluster_name, O_RDWR);
152 if (!dlm_lock_res->ls) {
153 pr_err("%s failed to create lockspace\n", cluster_name);
154 return -ENOMEM;
155 }
156 } else {
157 pr_err("open existed %s lockspace\n", cluster_name);
d15a1f72
GJ
158 }
159
81a8a694 160 snprintf(str, 64, "bitmap%s", cluster_name);
1b7eb962 161retry:
b7a462e5
JS
162 ret = dlm_hooks->ls_lock(dlm_lock_res->ls, LKM_PWMODE,
163 &dlm_lock_res->lksb, flags, str, strlen(str),
164 0, dlm_ast, dlm_lock_res, NULL, NULL);
d15a1f72
GJ
165 if (ret) {
166 pr_err("error %d when get PW mode on lock %s\n", errno, str);
1b7eb962
GJ
167 /* let's try several times if EAGAIN happened */
168 if (dlm_lock_res->lksb.sb_status == EAGAIN && retry_count < 10) {
239b3cc0 169 sleep_for(10, 0, true);
1b7eb962
GJ
170 retry_count++;
171 goto retry;
172 }
32539f74
GJ
173 dlm_hooks->release_lockspace(cluster_name, dlm_lock_res->ls, 1);
174 return ret;
d15a1f72
GJ
175 }
176
177 /* Wait for it to complete */
178 poll_for_ast(dlm_lock_res->ls);
d15a1f72 179
1b7eb962
GJ
180 if (dlm_lock_res->lksb.sb_status) {
181 pr_err("failed to lock cluster\n");
182 return -1;
183 }
184 return 1;
d15a1f72
GJ
185}
186
1b7eb962 187int cluster_release_dlmlock(void)
d15a1f72
GJ
188{
189 int ret = -1;
190
81a8a694 191 if (!cluster_name)
1b7eb962
GJ
192 goto out;
193
194 if (!dlm_lock_res->lksb.sb_lkid)
195 goto out;
81a8a694 196
1b7eb962
GJ
197 ret = dlm_hooks->ls_unlock_wait(dlm_lock_res->ls,
198 dlm_lock_res->lksb.sb_lkid, 0,
199 &dlm_lock_res->lksb);
d15a1f72
GJ
200 if (ret) {
201 pr_err("error %d happened when unlock\n", errno);
202 /* XXX make sure the lock is unlocked eventually */
203 goto out;
204 }
205
206 /* Wait for it to complete */
207 poll_for_ast(dlm_lock_res->ls);
208
209 errno = dlm_lock_res->lksb.sb_status;
210 if (errno != EUNLOCK) {
b7a462e5
JS
211 pr_err("error %d happened in ast when unlock lockspace\n",
212 errno);
d15a1f72
GJ
213 /* XXX make sure the lockspace is unlocked eventually */
214 goto out;
215 }
216
81a8a694 217 ret = dlm_hooks->release_lockspace(cluster_name, dlm_lock_res->ls, 1);
d15a1f72
GJ
218 if (ret) {
219 pr_err("error %d happened when release lockspace\n", errno);
220 /* XXX make sure the lockspace is released eventually */
221 goto out;
222 }
223 free(dlm_lock_res);
224
225out:
226 return ret;
227}
228
9db2ab4e
JS
229int md_array_valid(int fd)
230{
231 struct mdinfo *sra;
232 int ret;
233
234 sra = sysfs_read(fd, NULL, GET_ARRAY_STATE);
235 if (sra) {
236 if (sra->array_state != ARRAY_UNKNOWN_STATE)
237 ret = 0;
238 else
239 ret = -ENODEV;
240
241 free(sra);
242 } else {
243 /*
244 * GET_ARRAY_INFO doesn't provide access to the proper state
245 * information, so fallback to a basic check for raid_disks != 0
246 */
247 ret = ioctl(fd, RAID_VERSION);
248 }
249
250 return !ret;
251}
252
3ab8f4bf
JS
253int md_array_active(int fd)
254{
255 struct mdinfo *sra;
256 struct mdu_array_info_s array;
a822017f 257 int ret = 0;
3ab8f4bf
JS
258
259 sra = sysfs_read(fd, NULL, GET_ARRAY_STATE);
260 if (sra) {
a822017f 261 if (!md_array_is_active(sra))
3ab8f4bf
JS
262 ret = -ENODEV;
263
264 free(sra);
265 } else {
266 /*
267 * GET_ARRAY_INFO doesn't provide access to the proper state
268 * information, so fallback to a basic check for raid_disks != 0
269 */
953cc7e5 270 ret = md_get_array_info(fd, &array);
3ab8f4bf
JS
271 }
272
273 return !ret;
274}
275
a822017f
MT
276int md_array_is_active(struct mdinfo *info)
277{
278 return (info->array_state != ARRAY_CLEAR &&
279 info->array_state != ARRAY_INACTIVE &&
280 info->array_state != ARRAY_UNKNOWN_STATE);
281}
282
9cd39f01
JS
283/*
284 * Get array info from the kernel. Longer term we want to deprecate the
285 * ioctl and get it from sysfs.
286 */
287int md_get_array_info(int fd, struct mdu_array_info_s *array)
288{
289 return ioctl(fd, GET_ARRAY_INFO, array);
290}
291
018a4882
JS
292/*
293 * Set array info
294 */
295int md_set_array_info(int fd, struct mdu_array_info_s *array)
296{
297 return ioctl(fd, SET_ARRAY_INFO, array);
298}
299
d97572f5
JS
300/*
301 * Get disk info from the kernel.
302 */
303int md_get_disk_info(int fd, struct mdu_disk_info_s *disk)
304{
305 return ioctl(fd, GET_DISK_INFO, disk);
306}
307
64c4757e
NB
308int get_linux_version()
309{
310 struct utsname name;
98c6faba 311 char *cp;
f161d047 312 int a = 0, b = 0,c = 0;
64c4757e
NB
313 if (uname(&name) <0)
314 return -1;
315
98c6faba
NB
316 cp = name.release;
317 a = strtoul(cp, &cp, 10);
f161d047
N
318 if (*cp == '.')
319 b = strtoul(cp+1, &cp, 10);
320 if (*cp == '.')
321 c = strtoul(cp+1, &cp, 10);
98c6faba 322
682c7051 323 return (a*1000000)+(b*1000)+c;
64c4757e
NB
324}
325
bc77ed53
DW
326int mdadm_version(char *version)
327{
328 int a, b, c;
329 char *cp;
330
331 if (!version)
332 version = Version;
333
334 cp = strchr(version, '-');
335 if (!cp || *(cp+1) != ' ' || *(cp+2) != 'v')
336 return -1;
337 cp += 3;
338 a = strtoul(cp, &cp, 10);
339 if (*cp != '.')
340 return -1;
341 b = strtoul(cp+1, &cp, 10);
342 if (*cp == '.')
343 c = strtoul(cp+1, &cp, 10);
344 else
345 c = 0;
346 if (*cp != ' ' && *cp != '-')
347 return -1;
348 return (a*1000000)+(b*1000)+c;
349}
350
51d4261c 351unsigned long long parse_size(char *size)
84e11361
N
352{
353 /* parse 'size' which should be a number optionally
42e641ab 354 * followed by 'K', 'M'. 'G' or 'T'.
84e11361
N
355 * Without a suffix, K is assumed.
356 * Number returned is in sectors (half-K)
822e393a 357 * INVALID_SECTORS returned on error.
84e11361
N
358 */
359 char *c;
360 long long s = strtoll(size, &c, 10);
361 if (s > 0) {
362 switch (*c) {
363 case 'K':
364 c++;
365 default:
366 s *= 2;
367 break;
368 case 'M':
369 c++;
370 s *= 1024 * 2;
371 break;
372 case 'G':
373 c++;
374 s *= 1024 * 1024 * 2;
375 break;
42e641ab
KT
376 case 'T':
377 c++;
378 s *= 1024 * 1024 * 1024 * 2LL;
379 break;
72ca9bcf
N
380 case 's': /* sectors */
381 c++;
382 break;
84e11361 383 }
51d4261c 384 } else
822e393a 385 s = INVALID_SECTORS;
84e11361 386 if (*c)
822e393a 387 s = INVALID_SECTORS;
84e11361
N
388 return s;
389}
390
5339f996
GJ
391int is_near_layout_10(int layout)
392{
393 int fc, fo;
394
395 fc = (layout >> 8) & 255;
396 fo = layout & (1 << 16);
397 if (fc > 1 || fo > 0)
398 return 0;
399 return 1;
400}
401
4a06e2c2
N
402int parse_layout_10(char *layout)
403{
404 int copies, rv;
405 char *cp;
406 /* Parse the layout string for raid10 */
407 /* 'f', 'o' or 'n' followed by a number <= raid_disks */
408 if ((layout[0] != 'n' && layout[0] != 'f' && layout[0] != 'o') ||
409 (copies = strtoul(layout+1, &cp, 10)) < 1 ||
410 copies > 200 ||
411 *cp)
412 return -1;
413 if (layout[0] == 'n')
414 rv = 256 + copies;
415 else if (layout[0] == 'o')
416 rv = 0x10000 + (copies<<8) + 1;
417 else
418 rv = 1 + (copies<<8);
419 return rv;
420}
421
422int parse_layout_faulty(char *layout)
423{
a0151041
CL
424 int ln, mode;
425 char *m;
426
60815698
MG
427 if (!layout)
428 return -1;
a0151041 429
4a06e2c2 430 /* Parse the layout string for 'faulty' */
a0151041
CL
431 ln = strcspn(layout, "0123456789");
432 m = xstrdup(layout);
4a06e2c2
N
433 m[ln] = 0;
434 mode = map_name(faultylayout, m);
06ef6195
WG
435 free(m);
436
4a06e2c2
N
437 if (mode == UnSet)
438 return -1;
439
440 return mode | (atoi(layout+ln)<< ModeShift);
441}
79868890 442
4de90913
GJ
443int parse_cluster_confirm_arg(char *input, char **devname, int *slot)
444{
445 char *dev;
446 *slot = strtoul(input, &dev, 10);
447 if (dev == input || dev[0] != ':')
448 return -1;
449 *devname = dev+1;
450 return 0;
451}
452
0430ed48
NB
453void remove_partitions(int fd)
454{
455 /* remove partitions from this block devices.
456 * This is used for components added to an array
457 */
458#ifdef BLKPG_DEL_PARTITION
459 struct blkpg_ioctl_arg a;
460 struct blkpg_partition p;
461
462 a.op = BLKPG_DEL_PARTITION;
463 a.data = (void*)&p;
464 a.datalen = sizeof(p);
465 a.flags = 0;
466 memset(a.data, 0, a.datalen);
ca3b6696 467 for (p.pno = 0; p.pno < 16; p.pno++)
0430ed48
NB
468 ioctl(fd, BLKPG, &a);
469#endif
470}
471
691c6ee1
N
472int test_partition(int fd)
473{
474 /* Check if fd is a whole-disk or a partition.
475 * BLKPG will return EINVAL on a partition, and BLKPG_DEL_PARTITION
476 * will return ENXIO on an invalid partition number.
477 */
478 struct blkpg_ioctl_arg a;
479 struct blkpg_partition p;
480 a.op = BLKPG_DEL_PARTITION;
481 a.data = (void*)&p;
482 a.datalen = sizeof(p);
483 a.flags = 0;
484 memset(a.data, 0, a.datalen);
485 p.pno = 1<<30;
486 if (ioctl(fd, BLKPG, &a) == 0)
487 /* Very unlikely, but not a partition */
488 return 0;
357ac106 489 if (errno == ENXIO || errno == ENOTTY)
691c6ee1
N
490 /* not a partition */
491 return 0;
492
493 return 1;
494}
495
bfd76b93
CA
496int test_partition_from_id(dev_t id)
497{
498 char buf[20];
499 int fd, rv;
500
501 sprintf(buf, "%d:%d", major(id), minor(id));
502 fd = dev_open(buf, O_RDONLY);
503 if (fd < 0)
504 return -1;
505 rv = test_partition(fd);
506 close(fd);
507 return rv;
508}
691c6ee1 509
de5a472e 510int enough(int level, int raid_disks, int layout, int clean, char *avail)
64c4757e 511{
265e0f17 512 int copies, first;
de5a472e
N
513 int i;
514 int avail_disks = 0;
515
516 for (i = 0; i < raid_disks; i++)
517 avail_disks += !!avail[i];
518
64c4757e 519 switch (level) {
265e0f17
NB
520 case 10:
521 /* This is the tricky one - we need to check
522 * which actual disks are present.
523 */
702b557b 524 copies = (layout&255)* ((layout>>8) & 255);
ca3b6696 525 first = 0;
265e0f17
NB
526 do {
527 /* there must be one of the 'copies' form 'first' */
528 int n = copies;
ca3b6696 529 int cnt = 0;
b3ec716d 530 int this = first;
265e0f17 531 while (n--) {
b3ec716d 532 if (avail[this])
265e0f17 533 cnt++;
b3ec716d 534 this = (this+1) % raid_disks;
265e0f17
NB
535 }
536 if (cnt == 0)
537 return 0;
b3ec716d 538 first = (first+(layout&255)) % raid_disks;
265e0f17
NB
539 } while (first != 0);
540 return 1;
e5329c37 541
df0d4ea0 542 case LEVEL_MULTIPATH:
e0d19036 543 return avail_disks>= 1;
df0d4ea0 544 case LEVEL_LINEAR:
64c4757e
NB
545 case 0:
546 return avail_disks == raid_disks;
547 case 1:
548 return avail_disks >= 1;
549 case 4:
330d6900
N
550 if (avail_disks == raid_disks - 1 &&
551 !avail[raid_disks - 1])
552 /* If just the parity device is missing, then we
553 * have enough, even if not clean
554 */
555 return 1;
556 /* FALL THROUGH */
64c4757e 557 case 5:
583315d9
NB
558 if (clean)
559 return avail_disks >= raid_disks-1;
560 else
561 return avail_disks >= raid_disks;
98c6faba 562 case 6:
583315d9
NB
563 if (clean)
564 return avail_disks >= raid_disks-2;
565 else
566 return avail_disks >= raid_disks;
64c4757e
NB
567 default:
568 return 0;
569 }
570}
571
aae5a112 572char *__fname_from_uuid(int id[4], int swap, char *buf, char sep)
d7288ddc 573{
9968e376 574 int i, j;
d7288ddc
N
575 char uuid[16];
576 char *c = buf;
577 strcpy(c, "UUID-");
578 c += strlen(c);
aae5a112 579 copy_uuid(uuid, id, swap);
9968e376 580 for (i = 0; i < 4; i++) {
9968e376 581 if (i)
ff54de6e 582 *c++ = sep;
9968e376
DW
583 for (j = 3; j >= 0; j--) {
584 sprintf(c,"%02x", (unsigned char) uuid[j+4*i]);
585 c+= 2;
586 }
d7288ddc
N
587 }
588 return buf;
aae5a112
DW
589
590}
591
ba65d917
MT
592/**
593 * fname_from_uuid() - generate uuid string. Should not be used with super1.
594 * @info: info with uuid
595 * @buf: buf to fill.
596 *
597 * This routine should not be used with super1. See detail_fname_from_uuid() for details. It does
598 * not use superswitch swapuuid as it should be 0 but it has to do UUID conversion if host is big
599 * endian- left for backward compatibility.
600 */
601char *fname_from_uuid(struct mdinfo *info, char *buf)
aae5a112 602{
2c2d9c48 603#if __BYTE_ORDER == BIG_ENDIAN
ba65d917 604 return __fname_from_uuid(info->uuid, true, buf, ':');
2c2d9c48 605#else
ba65d917 606 return __fname_from_uuid(info->uuid, false, buf, ':');
2c2d9c48 607#endif
d7288ddc
N
608}
609
682c7051
NB
610int check_ext2(int fd, char *name)
611{
612 /*
613 * Check for an ext2fs file system.
614 * Superblock is always 1K at 1K offset
615 *
616 * s_magic is le16 at 56 == 0xEF53
617 * report mtime - le32 at 44
618 * blocks - le32 at 4
619 * logblksize - le32 at 24
620 */
621 unsigned char sb[1024];
622 time_t mtime;
2538ba2a
N
623 unsigned long long size;
624 int bsize;
682c7051
NB
625 if (lseek(fd, 1024,0)!= 1024)
626 return 0;
627 if (read(fd, sb, 1024)!= 1024)
628 return 0;
629 if (sb[56] != 0x53 || sb[57] != 0xef)
630 return 0;
631
632 mtime = sb[44]|(sb[45]|(sb[46]|sb[47]<<8)<<8)<<8;
633 bsize = sb[24]|(sb[25]|(sb[26]|sb[27]<<8)<<8)<<8;
634 size = sb[4]|(sb[5]|(sb[6]|sb[7]<<8)<<8)<<8;
2538ba2a 635 size <<= bsize;
e7b84f9d 636 pr_err("%s appears to contain an ext2fs file system\n",
682c7051 637 name);
2538ba2a 638 cont_err("size=%lluK mtime=%s", size, ctime(&mtime));
682c7051
NB
639 return 1;
640}
641
642int check_reiser(int fd, char *name)
643{
644 /*
645 * superblock is at 64K
646 * size is 1024;
647 * Magic string "ReIsErFs" or "ReIsEr2Fs" at 52
648 *
649 */
650 unsigned char sb[1024];
2538ba2a 651 unsigned long long size;
682c7051
NB
652 if (lseek(fd, 64*1024, 0) != 64*1024)
653 return 0;
654 if (read(fd, sb, 1024) != 1024)
655 return 0;
ca3b6696
N
656 if (strncmp((char*)sb+52, "ReIsErFs",8) != 0 &&
657 strncmp((char*)sb+52, "ReIsEr2Fs",9) != 0)
682c7051 658 return 0;
e7b84f9d 659 pr_err("%s appears to contain a reiserfs file system\n",name);
682c7051 660 size = sb[0]|(sb[1]|(sb[2]|sb[3]<<8)<<8)<<8;
2538ba2a 661 cont_err("size = %lluK\n", size*4);
aba69144 662
682c7051
NB
663 return 1;
664}
665
666int check_raid(int fd, char *name)
667{
4b1ac34b 668 struct mdinfo info;
682c7051 669 time_t crtime;
d078d77c 670 char *level;
82d9eba6 671 struct supertype *st = guess_super(fd);
f9ce90ba 672
cb8f6859
N
673 if (!st)
674 return 0;
fa219dd2
MD
675 if (st->ss->add_to_super != NULL) {
676 st->ss->load_super(st, fd, name);
677 /* Looks like a raid array .. */
678 pr_err("%s appears to be part of a raid array:\n", name);
679 st->ss->getinfo_super(st, &info, NULL);
680 st->ss->free_super(st);
681 crtime = info.array.ctime;
682 level = map_num(pers, info.array.level);
683 if (!level)
684 level = "-unknown-";
685 cont_err("level=%s devices=%d ctime=%s",
686 level, info.array.raid_disks, ctime(&crtime));
687 } else {
688 /* Looks like GPT or MBR */
689 pr_err("partition table exists on %s\n", name);
690 }
82d9eba6 691 return 1;
682c7051
NB
692}
693
0a6bff09
ZL
694int fstat_is_blkdev(int fd, char *devname, dev_t *rdev)
695{
696 struct stat stb;
697
698 if (fstat(fd, &stb) != 0) {
699 pr_err("fstat failed for %s: %s\n", devname, strerror(errno));
700 return 0;
701 }
702 if ((S_IFMT & stb.st_mode) != S_IFBLK) {
703 pr_err("%s is not a block device.\n", devname);
9e04ac1c
ZL
704 return 0;
705 }
706 if (rdev)
707 *rdev = stb.st_rdev;
708 return 1;
709}
710
711int stat_is_blkdev(char *devname, dev_t *rdev)
712{
713 struct stat stb;
714
715 if (stat(devname, &stb) != 0) {
716 pr_err("stat failed for %s: %s\n", devname, strerror(errno));
717 return 0;
718 }
719 if ((S_IFMT & stb.st_mode) != S_IFBLK) {
720 pr_err("%s is not a block device.\n", devname);
0a6bff09
ZL
721 return 0;
722 }
723 if (rdev)
724 *rdev = stb.st_rdev;
725 return 1;
726}
727
682c7051
NB
728int ask(char *mesg)
729{
730 char *add = "";
731 int i;
ca3b6696 732 for (i = 0; i < 5; i++) {
682c7051
NB
733 char buf[100];
734 fprintf(stderr, "%s%s", mesg, add);
735 fflush(stderr);
736 if (fgets(buf, 100, stdin)==NULL)
737 return 0;
738 if (buf[0]=='y' || buf[0]=='Y')
739 return 1;
740 if (buf[0]=='n' || buf[0]=='N')
741 return 0;
742 add = "(y/n) ";
743 }
e7b84f9d 744 pr_err("assuming 'no'\n");
682c7051
NB
745 return 0;
746}
747
8d80900b 748int is_standard(char *dev, int *nump)
e5329c37
NB
749{
750 /* tests if dev is a "standard" md dev name.
751 * i.e if the last component is "/dNN" or "/mdNN",
aba69144 752 * where NN is a string of digits
598f0d58
NB
753 * Returns 1 if a partitionable standard,
754 * -1 if non-partitonable,
755 * 0 if not a standard name.
e5329c37 756 */
8d80900b 757 char *d = strrchr(dev, '/');
ca3b6696 758 int type = 0;
8d80900b
NB
759 int num;
760 if (!d)
e5329c37 761 return 0;
ca3b6696
N
762 if (strncmp(d, "/d",2) == 0)
763 d += 2, type = 1; /* /dev/md/dN{pM} */
764 else if (strncmp(d, "/md_d", 5) == 0)
765 d += 5, type = 1; /* /dev/md_dN{pM} */
766 else if (strncmp(d, "/md", 3) == 0)
767 d += 3, type = -1; /* /dev/mdN */
768 else if (d-dev > 3 && strncmp(d-2, "md/", 3) == 0)
769 d += 1, type = -1; /* /dev/md/N */
e5329c37
NB
770 else
771 return 0;
8d80900b 772 if (!*d)
e5329c37 773 return 0;
8d80900b
NB
774 num = atoi(d);
775 while (isdigit(*d))
776 d++;
777 if (*d)
e5329c37 778 return 0;
8d80900b
NB
779 if (nump) *nump = num;
780
781 return type;
e5329c37
NB
782}
783
4b1ac34b 784unsigned long calc_csum(void *super, int bytes)
82b27616 785{
56eb10c0 786 unsigned long long newcsum = 0;
82b27616 787 int i;
4b1ac34b
NB
788 unsigned int csum;
789 unsigned int *superc = (unsigned int*) super;
82b27616 790
ca3b6696
N
791 for(i = 0; i < bytes/4; i++)
792 newcsum += superc[i];
82b27616 793 csum = (newcsum& 0xffffffff) + (newcsum>>32);
570c0542 794#ifdef __alpha__
aba69144 795/* The in-kernel checksum calculation is always 16bit on
570c0542 796 * the alpha, though it is 32 bit on i386...
ca3b6696 797 * I wonder what it is elsewhere... (it uses an API in
570c0542
NB
798 * a way that it shouldn't).
799 */
800 csum = (csum & 0xffff) + (csum >> 16);
801 csum = (csum & 0xffff) + (csum >> 16);
802#endif
82b27616
NB
803 return csum;
804}
cd29a5c8 805
56eb10c0 806char *human_size(long long bytes)
cd29a5c8 807{
ff9239ee 808 static char buf[47];
d5d3721e 809
42e641ab
KT
810 /* We convert bytes to either centi-M{ega,ibi}bytes,
811 * centi-G{igi,ibi}bytes or centi-T{era,ebi}bytes
812 * with appropriate rounding, and then print
813 * 1/100th of those as a decimal.
d5d3721e 814 * We allow upto 2048Megabytes before converting to
42e641ab
KT
815 * gigabytes and 2048Gigabytes before converting to
816 * terabytes, as that shows more precision and isn't
d5d3721e 817 * too large a number.
d5d3721e 818 */
cd29a5c8 819
56eb10c0 820 if (bytes < 5000*1024)
ca3b6696 821 buf[0] = 0;
d5d3721e 822 else if (bytes < 2*1024LL*1024LL*1024LL) {
93d3bd3b 823 long cMiB = (bytes * 200LL / (1LL<<20) + 1) / 2;
d5d3721e 824 long cMB = (bytes / ( 1000000LL / 200LL ) +1) /2;
8f23b0b3 825 snprintf(buf, sizeof(buf), " (%ld.%02ld MiB %ld.%02ld MB)",
efa29530 826 cMiB/100, cMiB % 100, cMB/100, cMB % 100);
42e641ab 827 } else if (bytes < 2*1024LL*1024LL*1024LL*1024LL) {
93d3bd3b 828 long cGiB = (bytes * 200LL / (1LL<<30) +1) / 2;
d5d3721e 829 long cGB = (bytes / (1000000000LL/200LL ) +1) /2;
8f23b0b3 830 snprintf(buf, sizeof(buf), " (%ld.%02ld GiB %ld.%02ld GB)",
efa29530 831 cGiB/100, cGiB % 100, cGB/100, cGB % 100);
42e641ab
KT
832 } else {
833 long cTiB = (bytes * 200LL / (1LL<<40) + 1) / 2;
834 long cTB = (bytes / (1000000000000LL / 200LL) + 1) / 2;
835 snprintf(buf, sizeof(buf), " (%ld.%02ld TiB %ld.%02ld TB)",
836 cTiB/100, cTiB % 100, cTB/100, cTB % 100);
d5d3721e 837 }
cd29a5c8
NB
838 return buf;
839}
e0d19036 840
f0ec6710 841char *human_size_brief(long long bytes, int prefix)
e0d19036
NB
842{
843 static char buf[30];
e0d19036 844
42e641ab
KT
845 /* We convert bytes to either centi-M{ega,ibi}bytes,
846 * centi-G{igi,ibi}bytes or centi-T{era,ebi}bytes
847 * with appropriate rounding, and then print
848 * 1/100th of those as a decimal.
570abc6f 849 * We allow upto 2048Megabytes before converting to
42e641ab
KT
850 * gigabytes and 2048Gigabytes before converting to
851 * terabytes, as that shows more precision and isn't
570abc6f 852 * too large a number.
f0ec6710
MN
853 *
854 * If prefix == IEC, we mean prefixes like kibi,mebi,gibi etc.
855 * If prefix == JEDEC, we mean prefixes like kilo,mega,giga etc.
570abc6f
MN
856 */
857
e0d19036 858 if (bytes < 5000*1024)
570abc6f 859 buf[0] = 0;
f0ec6710
MN
860 else if (prefix == IEC) {
861 if (bytes < 2*1024LL*1024LL*1024LL) {
93d3bd3b 862 long cMiB = (bytes * 200LL / (1LL<<20) +1) /2;
f0ec6710 863 snprintf(buf, sizeof(buf), "%ld.%02ldMiB",
efa29530 864 cMiB/100, cMiB % 100);
42e641ab 865 } else if (bytes < 2*1024LL*1024LL*1024LL*1024LL) {
93d3bd3b 866 long cGiB = (bytes * 200LL / (1LL<<30) +1) /2;
f0ec6710 867 snprintf(buf, sizeof(buf), "%ld.%02ldGiB",
efa29530 868 cGiB/100, cGiB % 100);
42e641ab
KT
869 } else {
870 long cTiB = (bytes * 200LL / (1LL<<40) + 1) / 2;
871 snprintf(buf, sizeof(buf), "%ld.%02ldTiB",
872 cTiB/100, cTiB % 100);
f0ec6710
MN
873 }
874 }
875 else if (prefix == JEDEC) {
876 if (bytes < 2*1024LL*1024LL*1024LL) {
877 long cMB = (bytes / ( 1000000LL / 200LL ) +1) /2;
878 snprintf(buf, sizeof(buf), "%ld.%02ldMB",
efa29530 879 cMB/100, cMB % 100);
42e641ab 880 } else if (bytes < 2*1024LL*1024LL*1024LL*1024LL) {
f0ec6710
MN
881 long cGB = (bytes / (1000000000LL/200LL ) +1) /2;
882 snprintf(buf, sizeof(buf), "%ld.%02ldGB",
efa29530 883 cGB/100, cGB % 100);
42e641ab
KT
884 } else {
885 long cTB = (bytes / (1000000000000LL / 200LL) + 1) / 2;
886 snprintf(buf, sizeof(buf), "%ld.%02ldTB",
887 cTB/100, cTB % 100);
f0ec6710 888 }
570abc6f 889 }
f0ec6710
MN
890 else
891 buf[0] = 0;
570abc6f 892
e0d19036
NB
893 return buf;
894}
e4965ef8
N
895
896void print_r10_layout(int layout)
897{
898 int near = layout & 255;
899 int far = (layout >> 8) & 255;
900 int offset = (layout&0x10000);
901 char *sep = "";
902
903 if (near != 1) {
904 printf("%s near=%d", sep, near);
905 sep = ",";
906 }
907 if (far != 1)
908 printf("%s %s=%d", sep, offset?"offset":"far", far);
909 if (near*far == 1)
910 printf("NO REDUNDANCY");
911}
e0d19036 912
5f8097be
NB
913unsigned long long calc_array_size(int level, int raid_disks, int layout,
914 int chunksize, unsigned long long devsize)
577e8448 915{
e03640bd
CA
916 if (level == 1)
917 return devsize;
577e8448
AK
918 devsize &= ~(unsigned long long)((chunksize>>9)-1);
919 return get_data_disks(level, layout, raid_disks) * devsize;
920}
921
922int get_data_disks(int level, int layout, int raid_disks)
5f8097be
NB
923{
924 int data_disks = 0;
925 switch (level) {
ca3b6696
N
926 case 0: data_disks = raid_disks;
927 break;
928 case 1: data_disks = 1;
929 break;
5f8097be 930 case 4:
ca3b6696
N
931 case 5: data_disks = raid_disks - 1;
932 break;
933 case 6: data_disks = raid_disks - 2;
934 break;
5f8097be
NB
935 case 10: data_disks = raid_disks / (layout & 255) / ((layout>>8)&255);
936 break;
937 }
577e8448
AK
938
939 return data_disks;
5f8097be
NB
940}
941
13db17bd 942dev_t devnm2devid(char *devnm)
4dd2df09
N
943{
944 /* First look in /sys/block/$DEVNM/dev for %d:%d
945 * If that fails, try parsing out a number
946 */
feeb2785 947 char path[PATH_MAX];
4dd2df09
N
948 char *ep;
949 int fd;
950 int mjr,mnr;
951
feeb2785 952 snprintf(path, sizeof(path), "/sys/block/%s/dev", devnm);
4dd2df09
N
953 fd = open(path, O_RDONLY);
954 if (fd >= 0) {
955 char buf[20];
956 int n = read(fd, buf, sizeof(buf));
957 close(fd);
958 if (n > 0)
959 buf[n] = 0;
960 if (n > 0 && sscanf(buf, "%d:%d\n", &mjr, &mnr) == 2)
961 return makedev(mjr, mnr);
962 }
963 if (strncmp(devnm, "md_d", 4) == 0 &&
964 isdigit(devnm[4]) &&
965 (mnr = strtoul(devnm+4, &ep, 10)) >= 0 &&
966 ep > devnm && *ep == 0)
967 return makedev(get_mdp_major(), mnr << MdpMinorShift);
968
969 if (strncmp(devnm, "md", 2) == 0 &&
970 isdigit(devnm[2]) &&
971 (mnr = strtoul(devnm+2, &ep, 10)) >= 0 &&
972 ep > devnm && *ep == 0)
973 return makedev(MD_MAJOR, mnr);
974
975 return 0;
976}
977
25aa7329
MT
978/**
979 * is_devname_numbered() - helper for numbered devname verification.
980 * @devname: path or name to check.
981 * @pref: expected devname prefix.
982 * @pref_len: prefix len.
983 */
984static bool is_devname_numbered(const char *devname, const char *pref, const int pref_len)
985{
986 int val;
987
988 assert(devname && pref);
989
990 if (strncmp(devname, pref, pref_len) != 0)
991 return false;
992
993 if (parse_num(&val, devname + pref_len) != 0)
994 return false;
995
996 if (val > 127)
997 return false;
998
999 return true;
1000}
1001
1002/**
1003 * is_devname_md_numbered() - check if &devname is numbered MD device (md).
1004 * @devname: path or name to check.
1005 */
1006bool is_devname_md_numbered(const char *devname)
1007{
1008 return is_devname_numbered(devname, DEV_NUM_PREF, DEV_NUM_PREF_LEN);
1009}
1010
1011/**
1012 * is_devname_md_d_numbered() - check if &devname is secondary numbered MD device (md_d).
1013 * @devname: path or name to check.
1014 */
1015bool is_devname_md_d_numbered(const char *devname)
1016{
1017 static const char d_dev[] = DEV_NUM_PREF "_d";
1018
1019 return is_devname_numbered(devname, d_dev, sizeof(d_dev) - 1);
1020}
1021
b938519e
MK
1022/**
1023 * get_md_name() - Get main dev node of the md device.
1024 * @devnm: Md device name or path.
1025 *
1026 * Function checks if the full name was passed and returns md name
1027 * if it is the MD device.
1028 *
1029 * Return: Main dev node of the md device or NULL if not found.
1030 */
4dd2df09 1031char *get_md_name(char *devnm)
e0d19036 1032{
b938519e 1033 static char devname[NAME_MAX];
e0d19036 1034 struct stat stb;
98c6faba 1035
b938519e
MK
1036 if (strncmp(devnm, "/dev/", 5) == 0)
1037 snprintf(devname, sizeof(devname), "%s", devnm);
1038 else
1039 snprintf(devname, sizeof(devname), "/dev/%s", devnm);
4dd2df09 1040
b938519e
MK
1041 if (!is_mddev(devname))
1042 return NULL;
1043 if (stat(devname, &stb) == 0 && (S_IFMT&stb.st_mode) == S_IFBLK)
4dd2df09
N
1044 return devname;
1045
e0d19036
NB
1046 return NULL;
1047}
1048
1049void put_md_name(char *name)
1050{
ca3b6696 1051 if (strncmp(name, "/dev/.tmp.md", 12) == 0)
e0d19036
NB
1052 unlink(name);
1053}
f9ce90ba 1054
cc742d38
N
1055int get_maj_min(char *dev, int *major, int *minor)
1056{
1057 char *e;
1058 *major = strtoul(dev, &e, 0);
1059 return (e > dev && *e == ':' && e[1] &&
1060 (*minor = strtoul(e+1, &e, 0)) >= 0 &&
1061 *e == 0);
1062}
1063
7211116c
MK
1064/**
1065 * is_bit_set() - get bit value by index.
1066 * @val: value.
1067 * @index: index of the bit (LSB numbering).
1068 *
1069 * Return: bit value.
1070 */
1071bool is_bit_set(int *val, unsigned char index)
1072{
1073 if ((*val) & (1 << index))
1074 return true;
1075 return false;
1076}
1077
8b0dabea
NB
1078int dev_open(char *dev, int flags)
1079{
1080 /* like 'open', but if 'dev' matches %d:%d, create a temp
1081 * block device and open that
1082 */
8b0dabea
NB
1083 int fd = -1;
1084 char devname[32];
e81cdd9f 1085 int major;
8b0dabea 1086 int minor;
e81cdd9f 1087
9f0ad56b
JS
1088 if (!dev)
1089 return -1;
6df6a774 1090 flags |= O_DIRECT;
e81cdd9f 1091
cc742d38 1092 if (get_maj_min(dev, &major, &minor)) {
9dc7d357
N
1093 snprintf(devname, sizeof(devname), "/dev/.tmp.md.%d:%d:%d",
1094 (int)getpid(), major, minor);
1095 if (mknod(devname, S_IFBLK|0600, makedev(major, minor)) == 0) {
1096 fd = open(devname, flags);
1097 unlink(devname);
6df6a774
N
1098 }
1099 if (fd < 0) {
9dc7d357 1100 /* Try /tmp as /dev appear to be read-only */
b7a462e5
JS
1101 snprintf(devname, sizeof(devname),
1102 "/tmp/.tmp.md.%d:%d:%d",
6df6a774 1103 (int)getpid(), major, minor);
b7a462e5
JS
1104 if (mknod(devname, S_IFBLK|0600,
1105 makedev(major, minor)) == 0) {
6df6a774
N
1106 fd = open(devname, flags);
1107 unlink(devname);
1108 }
8b0dabea
NB
1109 }
1110 } else
6df6a774 1111 fd = open(dev, flags);
8b0dabea
NB
1112 return fd;
1113}
f9ce90ba 1114
4dd2df09 1115int open_dev_flags(char *devnm, int flags)
e8a70c89 1116{
13db17bd 1117 dev_t devid;
e8a70c89
N
1118 char buf[20];
1119
4dd2df09
N
1120 devid = devnm2devid(devnm);
1121 sprintf(buf, "%d:%d", major(devid), minor(devid));
d998b738
N
1122 return dev_open(buf, flags);
1123}
1124
4dd2df09 1125int open_dev(char *devnm)
d998b738 1126{
4dd2df09 1127 return open_dev_flags(devnm, O_RDONLY);
e8a70c89
N
1128}
1129
4dd2df09 1130int open_dev_excl(char *devnm)
a931db9e
NB
1131{
1132 char buf[20];
1133 int i;
7187750e 1134 int flags = O_RDWR;
13db17bd 1135 dev_t devid = devnm2devid(devnm);
239b3cc0 1136 unsigned int delay = 1; // miliseconds
a931db9e 1137
4dd2df09 1138 sprintf(buf, "%d:%d", major(devid), minor(devid));
efa29530 1139 for (i = 0; i < 25; i++) {
7187750e 1140 int fd = dev_open(buf, flags|O_EXCL);
a931db9e
NB
1141 if (fd >= 0)
1142 return fd;
7187750e
N
1143 if (errno == EACCES && flags == O_RDWR) {
1144 flags = O_RDONLY;
1145 continue;
1146 }
a931db9e
NB
1147 if (errno != EBUSY)
1148 return fd;
239b3cc0
MG
1149 sleep_for(0, MSEC_TO_NSEC(delay), true);
1150 if (delay < 200)
399e0b97 1151 delay *= 2;
a931db9e
NB
1152 }
1153 return -1;
1154}
1155
9008ed1c
N
1156int same_dev(char *one, char *two)
1157{
1158 struct stat st1, st2;
1159 if (stat(one, &st1) != 0)
1160 return 0;
1161 if (stat(two, &st2) != 0)
1162 return 0;
1163 if ((st1.st_mode & S_IFMT) != S_IFBLK)
1164 return 0;
1165 if ((st2.st_mode & S_IFMT) != S_IFBLK)
1166 return 0;
1167 return st1.st_rdev == st2.st_rdev;
1168}
1169
a7c6e3fb 1170void wait_for(char *dev, int fd)
a714580e
N
1171{
1172 int i;
a7c6e3fb 1173 struct stat stb_want;
239b3cc0 1174 unsigned int delay = 1; // miliseconds
a7c6e3fb
N
1175
1176 if (fstat(fd, &stb_want) != 0 ||
1177 (stb_want.st_mode & S_IFMT) != S_IFBLK)
1178 return;
a714580e 1179
efa29530 1180 for (i = 0; i < 25; i++) {
a714580e 1181 struct stat stb;
a7c6e3fb
N
1182 if (stat(dev, &stb) == 0 &&
1183 (stb.st_mode & S_IFMT) == S_IFBLK &&
1184 (stb.st_rdev == stb_want.st_rdev))
a714580e 1185 return;
239b3cc0
MG
1186 sleep_for(0, MSEC_TO_NSEC(delay), true);
1187 if (delay < 200)
399e0b97 1188 delay *= 2;
a714580e 1189 }
436305c6 1190 if (i == 25)
9b8fea91 1191 pr_err("timeout waiting for %s\n", dev);
a714580e
N
1192}
1193
0f22b998
N
1194struct superswitch *superlist[] =
1195{
1196 &super0, &super1,
1197 &super_ddf, &super_imsm,
0592faeb 1198 &mbr, &gpt,
32141c17
JS
1199 NULL
1200};
f7dd881f 1201
4725bc31 1202struct supertype *super_by_fd(int fd, char **subarrayp)
f9ce90ba 1203{
1686dc25
NB
1204 mdu_array_info_t array;
1205 int vers;
1206 int minor;
1207 struct supertype *st = NULL;
7e0f6979 1208 struct mdinfo *sra;
142cb9e1 1209 char *verstr;
1686dc25
NB
1210 char version[20];
1211 int i;
f7e7067b 1212 char *subarray = NULL;
4dd2df09 1213 char container[32] = "";
f1f3ef7d
LXK
1214 char *devnm = NULL;
1215
1216 devnm = fd2devnm(fd);
1217 if (!devnm)
1218 return NULL;
1686dc25 1219
4dd2df09 1220 sra = sysfs_read(fd, NULL, GET_VERSION);
1686dc25
NB
1221
1222 if (sra) {
7e0f6979
NB
1223 vers = sra->array.major_version;
1224 minor = sra->array.minor_version;
142cb9e1 1225 verstr = sra->text_version;
1686dc25 1226 } else {
9cd39f01 1227 if (md_get_array_info(fd, &array))
1686dc25
NB
1228 array.major_version = array.minor_version = 0;
1229 vers = array.major_version;
1230 minor = array.minor_version;
142cb9e1 1231 verstr = "";
6fbba4c9 1232 }
82d9eba6 1233
1686dc25
NB
1234 if (vers != -1) {
1235 sprintf(version, "%d.%d", vers, minor);
1236 verstr = version;
6fbba4c9 1237 }
3c558363 1238 if (minor == -2 && is_subarray(verstr)) {
f7e7067b 1239 char *dev = verstr+1;
5f7e44b2 1240
f7e7067b 1241 subarray = strchr(dev, '/');
92d49ecf 1242 if (subarray) {
f7e7067b 1243 *subarray++ = '\0';
503975b9 1244 subarray = xstrdup(subarray);
92d49ecf 1245 }
4dd2df09 1246 strcpy(container, dev);
15d230f7 1247 sysfs_free(sra);
5f7e44b2 1248 sra = sysfs_read(-1, container, GET_VERSION);
603f24a0
N
1249 if (sra && sra->text_version[0])
1250 verstr = sra->text_version;
1251 else
1252 verstr = "-no-metadata-";
f7e7067b
NB
1253 }
1254
efa29530 1255 for (i = 0; st == NULL && superlist[i]; i++)
f7e7067b 1256 st = superlist[i]->match_metadata_desc(verstr);
1686dc25 1257
15d230f7 1258 sysfs_free(sra);
f7e7067b 1259 if (st) {
3b0896f8 1260 st->sb = NULL;
1f49fb3a
N
1261 if (subarrayp)
1262 *subarrayp = subarray;
4dd2df09 1263 strcpy(st->container_devnm, container);
f1f3ef7d 1264 strncpy(st->devnm, devnm, MD_NAME_MAX - 1);
4725bc31
N
1265 } else
1266 free(subarray);
5f7e44b2 1267
82d9eba6 1268 return st;
f9ce90ba 1269}
ea24acd0 1270
159c3a1a 1271struct supertype *dup_super(struct supertype *orig)
3da92f27 1272{
159c3a1a 1273 struct supertype *st;
1686dc25 1274
d2ca6449
NB
1275 if (!orig)
1276 return orig;
503975b9 1277 st = xcalloc(1, sizeof(*st));
159c3a1a
NB
1278 st->ss = orig->ss;
1279 st->max_devs = orig->max_devs;
1280 st->minor_version = orig->minor_version;
cb8f6859 1281 st->ignore_hw_compat = orig->ignore_hw_compat;
23bf42cc 1282 st->data_offset = orig->data_offset;
159c3a1a
NB
1283 st->sb = NULL;
1284 st->info = NULL;
1285 return st;
3da92f27
NB
1286}
1287
54887ad8 1288struct supertype *guess_super_type(int fd, enum guess_types guess_type)
f9ce90ba
NB
1289{
1290 /* try each load_super to find the best match,
1291 * and return the best superswitch
1292 */
82d9eba6
NB
1293 struct superswitch *ss;
1294 struct supertype *st;
1d13b599 1295 unsigned int besttime = 0;
570c0542 1296 int bestsuper = -1;
f9ce90ba
NB
1297 int i;
1298
503975b9 1299 st = xcalloc(1, sizeof(*st));
4dd2df09 1300 st->container_devnm[0] = 0;
d1d599ea 1301
efa29530 1302 for (i = 0; superlist[i]; i++) {
f9ce90ba
NB
1303 int rv;
1304 ss = superlist[i];
54887ad8
N
1305 if (guess_type == guess_array && ss->add_to_super == NULL)
1306 continue;
1307 if (guess_type == guess_partitions && ss->add_to_super != NULL)
1308 continue;
ef609477 1309 memset(st, 0, sizeof(*st));
df3346e6 1310 st->ignore_hw_compat = 1;
3da92f27 1311 rv = ss->load_super(st, fd, NULL);
570c0542
NB
1312 if (rv == 0) {
1313 struct mdinfo info;
a5d85af7 1314 st->ss->getinfo_super(st, &info, NULL);
570c0542
NB
1315 if (bestsuper == -1 ||
1316 besttime < info.array.ctime) {
1317 bestsuper = i;
1318 besttime = info.array.ctime;
570c0542 1319 }
3da92f27 1320 ss->free_super(st);
570c0542
NB
1321 }
1322 }
1323 if (bestsuper != -1) {
1324 int rv;
ef609477 1325 memset(st, 0, sizeof(*st));
df3346e6 1326 st->ignore_hw_compat = 1;
3da92f27 1327 rv = superlist[bestsuper]->load_super(st, fd, NULL);
f9ce90ba 1328 if (rv == 0) {
5e747af2 1329 superlist[bestsuper]->free_super(st);
82d9eba6 1330 return st;
f9ce90ba
NB
1331 }
1332 }
570c0542 1333 free(st);
f9ce90ba
NB
1334 return NULL;
1335}
fe6729fa 1336
beae1dfe
NB
1337/* Return size of device in bytes */
1338int get_dev_size(int fd, char *dname, unsigned long long *sizep)
1339{
1340 unsigned long long ldsize;
c2c9bb6f
NB
1341 struct stat st;
1342
1343 if (fstat(fd, &st) != -1 && S_ISREG(st.st_mode))
1344 ldsize = (unsigned long long)st.st_size;
1345 else
beae1dfe
NB
1346#ifdef BLKGETSIZE64
1347 if (ioctl(fd, BLKGETSIZE64, &ldsize) != 0)
1348#endif
1349 {
1350 unsigned long dsize;
1351 if (ioctl(fd, BLKGETSIZE, &dsize) == 0) {
1352 ldsize = dsize;
1353 ldsize <<= 9;
1354 } else {
1355 if (dname)
32971509 1356 pr_err("Cannot get size of %s: %s\n",
beae1dfe
NB
1357 dname, strerror(errno));
1358 return 0;
1359 }
1360 }
1361 *sizep = ldsize;
1362 return 1;
1363}
8fac0577 1364
32971509
PB
1365/* Return sector size of device in bytes */
1366int get_dev_sector_size(int fd, char *dname, unsigned int *sectsizep)
1367{
1368 unsigned int sectsize;
1369
1370 if (ioctl(fd, BLKSSZGET, &sectsize) != 0) {
1371 if (dname)
1372 pr_err("Cannot get sector size of %s: %s\n",
1373 dname, strerror(errno));
1374 return 0;
1375 }
1376
1377 *sectsizep = sectsize;
1378 return 1;
1379}
1380
3a371610
N
1381/* Return true if this can only be a container, not a member device.
1382 * i.e. is and md device and size is zero
1383 */
1384int must_be_container(int fd)
1385{
f5c924f4 1386 struct mdinfo *mdi;
3a371610 1387 unsigned long long size;
f5c924f4
JS
1388
1389 mdi = sysfs_read(fd, NULL, GET_VERSION);
1390 if (!mdi)
3a371610 1391 return 0;
f5c924f4
JS
1392 sysfs_free(mdi);
1393
3a371610
N
1394 if (get_dev_size(fd, NULL, &size) == 0)
1395 return 1;
1396 if (size == 0)
1397 return 1;
1398 return 0;
1399}
034b203a
TM
1400
1401/* Sets endofpart parameter to the last block used by the last GPT partition on the device.
1402 * Returns: 1 if successful
1403 * -1 for unknown partition type
1404 * 0 for other errors
1405 */
1406static int get_gpt_last_partition_end(int fd, unsigned long long *endofpart)
1407{
056b331e 1408 struct GPT gpt;
034b203a 1409 unsigned char empty_gpt_entry[16]= {0};
db7fdfe4
JS
1410 struct GPT_part_entry *part;
1411 char buf[512];
034b203a
TM
1412 unsigned long long curr_part_end;
1413 unsigned all_partitions, entry_size;
f21e18ca 1414 unsigned part_nr;
41b06495 1415 unsigned int sector_size = 0;
034b203a
TM
1416
1417 *endofpart = 0;
1418
056b331e 1419 BUILD_BUG_ON(sizeof(gpt) != 512);
73e658d8 1420 /* skip protective MBR */
41b06495
MD
1421 if (!get_dev_sector_size(fd, NULL, &sector_size))
1422 return 0;
1423 lseek(fd, sector_size, SEEK_SET);
73e658d8 1424 /* read GPT header */
056b331e 1425 if (read(fd, &gpt, 512) != 512)
034b203a
TM
1426 return 0;
1427
1428 /* get the number of partition entries and the entry size */
056b331e
N
1429 all_partitions = __le32_to_cpu(gpt.part_cnt);
1430 entry_size = __le32_to_cpu(gpt.part_size);
034b203a
TM
1431
1432 /* Check GPT signature*/
056b331e 1433 if (gpt.magic != GPT_SIGNATURE_MAGIC)
034b203a
TM
1434 return -1;
1435
1436 /* sanity checks */
1437 if (all_partitions > 1024 ||
db7fdfe4 1438 entry_size > sizeof(buf))
034b203a
TM
1439 return -1;
1440
db7fdfe4
JS
1441 part = (struct GPT_part_entry *)buf;
1442
41b06495
MD
1443 /* set offset to third block (GPT entries) */
1444 lseek(fd, sector_size*2, SEEK_SET);
ca3b6696 1445 for (part_nr = 0; part_nr < all_partitions; part_nr++) {
73e658d8 1446 /* read partition entry */
db7fdfe4 1447 if (read(fd, buf, entry_size) != (ssize_t)entry_size)
73e658d8
LB
1448 return 0;
1449
034b203a 1450 /* is this valid partition? */
db7fdfe4 1451 if (memcmp(part->type_guid, empty_gpt_entry, 16) != 0) {
034b203a 1452 /* check the last lba for the current partition */
db7fdfe4 1453 curr_part_end = __le64_to_cpu(part->ending_lba);
034b203a
TM
1454 if (curr_part_end > *endofpart)
1455 *endofpart = curr_part_end;
1456 }
1457
034b203a
TM
1458 }
1459 return 1;
1460}
1461
1462/* Sets endofpart parameter to the last block used by the last partition on the device.
1463 * Returns: 1 if successful
1464 * -1 for unknown partition type
1465 * 0 for other errors
1466 */
1467static int get_last_partition_end(int fd, unsigned long long *endofpart)
1468{
056b331e 1469 struct MBR boot_sect;
034b203a 1470 unsigned long long curr_part_end;
f21e18ca 1471 unsigned part_nr;
31208db9 1472 unsigned int sector_size;
034b203a
TM
1473 int retval = 0;
1474
1475 *endofpart = 0;
1476
056b331e 1477 BUILD_BUG_ON(sizeof(boot_sect) != 512);
034b203a
TM
1478 /* read MBR */
1479 lseek(fd, 0, 0);
056b331e 1480 if (read(fd, &boot_sect, 512) != 512)
034b203a
TM
1481 goto abort;
1482
1483 /* check MBP signature */
056b331e 1484 if (boot_sect.magic == MBR_SIGNATURE_MAGIC) {
034b203a
TM
1485 retval = 1;
1486 /* found the correct signature */
034b203a 1487
ca3b6696 1488 for (part_nr = 0; part_nr < MBR_PARTITIONS; part_nr++) {
8e2bca51
JC
1489 /*
1490 * Have to make every access through boot_sect rather
1491 * than using a pointer to the partition table (or an
1492 * entry), since the entries are not properly aligned.
1493 */
1494
034b203a 1495 /* check for GPT type */
8e2bca51
JC
1496 if (boot_sect.parts[part_nr].part_type ==
1497 MBR_GPT_PARTITION_TYPE) {
034b203a
TM
1498 retval = get_gpt_last_partition_end(fd, endofpart);
1499 break;
1500 }
1501 /* check the last used lba for the current partition */
8e2bca51
JC
1502 curr_part_end =
1503 __le32_to_cpu(boot_sect.parts[part_nr].first_sect_lba) +
1504 __le32_to_cpu(boot_sect.parts[part_nr].blocks_num);
034b203a
TM
1505 if (curr_part_end > *endofpart)
1506 *endofpart = curr_part_end;
034b203a
TM
1507 }
1508 } else {
1509 /* Unknown partition table */
1510 retval = -1;
1511 }
31208db9
MD
1512 /* calculate number of 512-byte blocks */
1513 if (get_dev_sector_size(fd, NULL, &sector_size))
1514 *endofpart *= (sector_size / 512);
034b203a
TM
1515 abort:
1516 return retval;
1517}
1518
53ed6ac3
KW
1519int check_partitions(int fd, char *dname, unsigned long long freesize,
1520 unsigned long long size)
034b203a
TM
1521{
1522 /*
1523 * Check where the last partition ends
1524 */
1525 unsigned long long endofpart;
034b203a 1526
31208db9 1527 if (get_last_partition_end(fd, &endofpart) > 0) {
034b203a
TM
1528 /* There appears to be a partition table here */
1529 if (freesize == 0) {
1530 /* partitions will not be visible in new device */
e7b84f9d
N
1531 pr_err("partition table exists on %s but will be lost or\n"
1532 " meaningless after creating array\n",
1533 dname);
034b203a
TM
1534 return 1;
1535 } else if (endofpart > freesize) {
1536 /* last partition overlaps metadata */
e7b84f9d
N
1537 pr_err("metadata will over-write last partition on %s.\n",
1538 dname);
034b203a 1539 return 1;
53ed6ac3
KW
1540 } else if (size && endofpart > size) {
1541 /* partitions will be truncated in new device */
e7b84f9d
N
1542 pr_err("array size is too small to cover all partitions on %s.\n",
1543 dname);
53ed6ac3 1544 return 1;
034b203a
TM
1545 }
1546 }
1547 return 0;
1548}
1549
a322f70c
DW
1550int open_container(int fd)
1551{
1552 /* 'fd' is a block device. Find out if it is in use
1553 * by a container, and return an open fd on that container.
1554 */
ccd61ebf 1555 char path[288];
a322f70c
DW
1556 char *e;
1557 DIR *dir;
1558 struct dirent *de;
1559 int dfd, n;
1560 char buf[200];
1561 int major, minor;
1562 struct stat st;
1563
1564 if (fstat(fd, &st) != 0)
1565 return -1;
1566 sprintf(path, "/sys/dev/block/%d:%d/holders",
1567 (int)major(st.st_rdev), (int)minor(st.st_rdev));
1568 e = path + strlen(path);
1569
1570 dir = opendir(path);
1571 if (!dir)
1572 return -1;
1573 while ((de = readdir(dir))) {
1574 if (de->d_ino == 0)
1575 continue;
1576 if (de->d_name[0] == '.')
1577 continue;
a994592d
N
1578 /* Need to make sure it is a container and not a volume */
1579 sprintf(e, "/%s/md/metadata_version", de->d_name);
1580 dfd = open(path, O_RDONLY);
1581 if (dfd < 0)
1582 continue;
1583 n = read(dfd, buf, sizeof(buf));
1584 close(dfd);
1585 if (n <= 0 || (unsigned)n >= sizeof(buf))
1586 continue;
1587 buf[n] = 0;
1588 if (strncmp(buf, "external", 8) != 0 ||
1589 n < 10 ||
1590 buf[9] == '/')
1591 continue;
a322f70c
DW
1592 sprintf(e, "/%s/dev", de->d_name);
1593 dfd = open(path, O_RDONLY);
1594 if (dfd < 0)
1595 continue;
1596 n = read(dfd, buf, sizeof(buf));
1597 close(dfd);
f21e18ca 1598 if (n <= 0 || (unsigned)n >= sizeof(buf))
a322f70c
DW
1599 continue;
1600 buf[n] = 0;
1601 if (sscanf(buf, "%d:%d", &major, &minor) != 2)
1602 continue;
1603 sprintf(buf, "%d:%d", major, minor);
1604 dfd = dev_open(buf, O_RDONLY);
1605 if (dfd >= 0) {
1606 closedir(dir);
1607 return dfd;
1608 }
1609 }
355726fa 1610 closedir(dir);
a322f70c
DW
1611 return -1;
1612}
1613
33414a01
DW
1614struct superswitch *version_to_superswitch(char *vers)
1615{
1616 int i;
1617
1618 for (i = 0; superlist[i]; i++) {
1619 struct superswitch *ss = superlist[i];
1620
1621 if (strcmp(vers, ss->name) == 0)
1622 return ss;
1623 }
1624
1625 return NULL;
1626}
1627
4dd2df09
N
1628int metadata_container_matches(char *metadata, char *devnm)
1629{
1630 /* Check if 'devnm' is the container named in 'metadata'
1631 * which is
1632 * /containername/componentname or
1633 * -containername/componentname
1634 */
1635 int l;
1636 if (*metadata != '/' && *metadata != '-')
1637 return 0;
1638 l = strlen(devnm);
1639 if (strncmp(metadata+1, devnm, l) != 0)
1640 return 0;
1641 if (metadata[l+1] != '/')
1642 return 0;
1643 return 1;
1644}
1645
1646int metadata_subdev_matches(char *metadata, char *devnm)
1647{
1648 /* Check if 'devnm' is the subdev named in 'metadata'
1649 * which is
1650 * /containername/subdev or
1651 * -containername/subdev
1652 */
1653 char *sl;
1654 if (*metadata != '/' && *metadata != '-')
1655 return 0;
1656 sl = strchr(metadata+1, '/');
1657 if (!sl)
1658 return 0;
1659 if (strcmp(sl+1, devnm) == 0)
1660 return 1;
1661 return 0;
1662}
1663
33414a01
DW
1664int is_container_member(struct mdstat_ent *mdstat, char *container)
1665{
1666 if (mdstat->metadata_version == NULL ||
1667 strncmp(mdstat->metadata_version, "external:", 9) != 0 ||
4dd2df09 1668 !metadata_container_matches(mdstat->metadata_version+9, container))
33414a01
DW
1669 return 0;
1670
1671 return 1;
1672}
1673
1674int is_subarray_active(char *subarray, char *container)
1675{
1676 struct mdstat_ent *mdstat = mdstat_read(0, 0);
1677 struct mdstat_ent *ent;
1678
e5408a32
DW
1679 for (ent = mdstat; ent; ent = ent->next)
1680 if (is_container_member(ent, container))
e5e5d7ce 1681 if (strcmp(to_subarray(ent, container), subarray) == 0)
33414a01 1682 break;
33414a01
DW
1683
1684 free_mdstat(mdstat);
1685
1686 return ent != NULL;
1687}
1688
1689/* open_subarray - opens a subarray in a container
1690 * @dev: container device name
feab51f8 1691 * @st: empty supertype
33414a01
DW
1692 * @quiet: block reporting errors flag
1693 *
1694 * On success returns an fd to a container and fills in *st
1695 */
feab51f8 1696int open_subarray(char *dev, char *subarray, struct supertype *st, int quiet)
33414a01
DW
1697{
1698 struct mdinfo *mdi;
a951a4f7 1699 struct mdinfo *info;
33414a01 1700 int fd, err = 1;
4dd2df09 1701 char *_devnm;
33414a01
DW
1702
1703 fd = open(dev, O_RDWR|O_EXCL);
1704 if (fd < 0) {
1705 if (!quiet)
e7b84f9d 1706 pr_err("Couldn't open %s, aborting\n",
33414a01 1707 dev);
b990032d 1708 return -1;
33414a01
DW
1709 }
1710
4dd2df09
N
1711 _devnm = fd2devnm(fd);
1712 if (_devnm == NULL) {
33414a01 1713 if (!quiet)
e7b84f9d
N
1714 pr_err("Failed to determine device number for %s\n",
1715 dev);
33414a01
DW
1716 goto close_fd;
1717 }
4dd2df09 1718 strcpy(st->devnm, _devnm);
33414a01 1719
4dd2df09 1720 mdi = sysfs_read(fd, st->devnm, GET_VERSION|GET_LEVEL);
33414a01
DW
1721 if (!mdi) {
1722 if (!quiet)
e7b84f9d 1723 pr_err("Failed to read sysfs for %s\n",
33414a01
DW
1724 dev);
1725 goto close_fd;
1726 }
1727
1728 if (mdi->array.level != UnSet) {
1729 if (!quiet)
e7b84f9d 1730 pr_err("%s is not a container\n", dev);
33414a01
DW
1731 goto free_sysfs;
1732 }
1733
1734 st->ss = version_to_superswitch(mdi->text_version);
1735 if (!st->ss) {
1736 if (!quiet)
e7b84f9d
N
1737 pr_err("Operation not supported for %s metadata\n",
1738 mdi->text_version);
33414a01
DW
1739 goto free_sysfs;
1740 }
1741
4dd2df09 1742 if (st->devnm[0] == 0) {
33414a01 1743 if (!quiet)
e7b84f9d 1744 pr_err("Failed to allocate device name\n");
33414a01
DW
1745 goto free_sysfs;
1746 }
1747
db20d413 1748 if (!st->ss->load_container) {
33414a01 1749 if (!quiet)
e7b84f9d 1750 pr_err("%s is not a container\n", dev);
4dd2df09 1751 goto free_sysfs;
33414a01
DW
1752 }
1753
db20d413 1754 if (st->ss->load_container(st, fd, NULL)) {
33414a01 1755 if (!quiet)
e7b84f9d 1756 pr_err("Failed to load metadata for %s\n",
db20d413 1757 dev);
4dd2df09 1758 goto free_sysfs;
33414a01
DW
1759 }
1760
a951a4f7
N
1761 info = st->ss->container_content(st, subarray);
1762 if (!info) {
1763 if (!quiet)
e7b84f9d 1764 pr_err("Failed to find subarray-%s in %s\n",
a951a4f7
N
1765 subarray, dev);
1766 goto free_super;
1767 }
1768 free(info);
1769
33414a01
DW
1770 err = 0;
1771
1772 free_super:
1773 if (err)
1774 st->ss->free_super(st);
33414a01
DW
1775 free_sysfs:
1776 sysfs_free(mdi);
1777 close_fd:
1778 if (err)
1779 close(fd);
1780
1781 if (err)
1782 return -1;
1783 else
1784 return fd;
1785}
1786
7801ac20
N
1787int add_disk(int mdfd, struct supertype *st,
1788 struct mdinfo *sra, struct mdinfo *info)
1789{
1790 /* Add a device to an array, in one of 2 ways. */
1791 int rv;
32141c17 1792
7801ac20 1793 if (st->ss->external) {
d23534e4
DW
1794 if (info->disk.state & (1<<MD_DISK_SYNC))
1795 info->recovery_start = MaxSector;
1796 else
1797 info->recovery_start = 0;
2904b26f 1798 rv = sysfs_add_disk(sra, info, 0);
7801ac20
N
1799 if (! rv) {
1800 struct mdinfo *sd2;
f35f2525
N
1801 for (sd2 = sra->devs; sd2; sd2=sd2->next)
1802 if (sd2 == info)
1803 break;
1804 if (sd2 == NULL) {
503975b9 1805 sd2 = xmalloc(sizeof(*sd2));
f35f2525
N
1806 *sd2 = *info;
1807 sd2->next = sra->devs;
1808 sra->devs = sd2;
1809 }
7801ac20
N
1810 }
1811 } else
7801ac20
N
1812 rv = ioctl(mdfd, ADD_NEW_DISK, &info->disk);
1813 return rv;
1814}
1815
de6ae750
N
1816int remove_disk(int mdfd, struct supertype *st,
1817 struct mdinfo *sra, struct mdinfo *info)
1818{
1819 int rv;
32141c17 1820
de6ae750 1821 /* Remove the disk given by 'info' from the array */
de6ae750 1822 if (st->ss->external)
b823c8f9 1823 rv = sysfs_set_str(sra, info, "slot", STR_COMMON_NONE);
de6ae750 1824 else
de6ae750
N
1825 rv = ioctl(mdfd, HOT_REMOVE_DISK, makedev(info->disk.major,
1826 info->disk.minor));
1827 return rv;
1828}
1829
1ab9ed2a 1830int hot_remove_disk(int mdfd, unsigned long dev, int force)
2dd271fe 1831{
1ab9ed2a 1832 int cnt = force ? 500 : 5;
2dd271fe
N
1833 int ret;
1834
1835 /* HOT_REMOVE_DISK can fail with EBUSY if there are
1836 * outstanding IO requests to the device.
1837 * In this case, it can be helpful to wait a little while,
1ab9ed2a 1838 * up to 5 seconds if 'force' is set, or 50 msec if not.
2dd271fe
N
1839 */
1840 while ((ret = ioctl(mdfd, HOT_REMOVE_DISK, dev)) == -1 &&
1841 errno == EBUSY &&
1842 cnt-- > 0)
239b3cc0 1843 sleep_for(0, MSEC_TO_NSEC(10), true);
2dd271fe
N
1844
1845 return ret;
1846}
1847
1ab9ed2a 1848int sys_hot_remove_disk(int statefd, int force)
fdd01569 1849{
1ab9ed2a 1850 int cnt = force ? 500 : 5;
fdd01569
N
1851 int ret;
1852
1853 while ((ret = write(statefd, "remove", 6)) == -1 &&
1854 errno == EBUSY &&
1855 cnt-- > 0)
239b3cc0 1856 sleep_for(0, MSEC_TO_NSEC(10), true);
fdd01569
N
1857 return ret == 6 ? 0 : -1;
1858}
1859
f35f2525
N
1860int set_array_info(int mdfd, struct supertype *st, struct mdinfo *info)
1861{
1862 /* Initialise kernel's knowledge of array.
1863 * This varies between externally managed arrays
1864 * and older kernels
1865 */
700483a2 1866 mdu_array_info_t inf;
f35f2525
N
1867 int rv;
1868
f35f2525 1869 if (st->ss->external)
de23e12a 1870 return sysfs_set_array(info);
700483a2
JS
1871 memset(&inf, 0, sizeof(inf));
1872 inf.major_version = info->array.major_version;
1873 inf.minor_version = info->array.minor_version;
1874 rv = md_set_array_info(mdfd, &inf);
1875
f35f2525
N
1876 return rv;
1877}
1878
1e5c6983
DW
1879unsigned long long min_recovery_start(struct mdinfo *array)
1880{
1881 /* find the minimum recovery_start in an array for metadata
1882 * formats that only record per-array recovery progress instead
1883 * of per-device
1884 */
1885 unsigned long long recovery_start = MaxSector;
1886 struct mdinfo *d;
1887
1888 for (d = array->devs; d; d = d->next)
1889 recovery_start = min(recovery_start, d->recovery_start);
1890
1891 return recovery_start;
1892}
1893
4dd2df09 1894int mdmon_pid(char *devnm)
a931db9e
NB
1895{
1896 char path[100];
1897 char pid[10];
1898 int fd;
1899 int n;
10013317 1900
4dd2df09 1901 sprintf(path, "%s/%s.pid", MDMON_DIR, devnm);
10013317 1902
24f6f99b 1903 fd = open(path, O_RDONLY | O_NOATIME, 0);
a931db9e
NB
1904
1905 if (fd < 0)
cf556303 1906 return -1;
a931db9e
NB
1907 n = read(fd, pid, 9);
1908 close(fd);
1909 if (n <= 0)
cf556303 1910 return -1;
24f6f99b 1911 return atoi(pid);
a931db9e
NB
1912}
1913
4dd2df09 1914int mdmon_running(char *devnm)
a931db9e 1915{
4dd2df09 1916 int pid = mdmon_pid(devnm);
24f6f99b 1917 if (pid <= 0)
a931db9e 1918 return 0;
24f6f99b 1919 if (kill(pid, 0) == 0)
a931db9e
NB
1920 return 1;
1921 return 0;
1922}
1923
4dd2df09 1924int start_mdmon(char *devnm)
8850ee3e 1925{
ff6bb131 1926 int i;
44d2e365 1927 int len;
ca3b6696 1928 pid_t pid;
9fe32043 1929 int status;
723d1df4 1930 char *prefix = in_initrd() ? "initrd-" : "";
44d2e365
N
1931 char pathbuf[1024];
1932 char *paths[4] = {
1933 pathbuf,
85945e19 1934 BINDIR "/mdmon",
2f1bcf43 1935 "./mdmon",
44d2e365
N
1936 NULL
1937 };
8850ee3e 1938
40ebbb9c 1939 if (check_env("MDADM_NO_MDMON"))
8850ee3e 1940 return 0;
723d1df4 1941 if (continue_via_systemd(devnm, MDMON_SERVICE, prefix))
ff6bb131 1942 return 0;
8850ee3e 1943
ff6bb131 1944 /* That failed, try running mdmon directly */
9cf014ec 1945 len = readlink("/proc/self/exe", pathbuf, sizeof(pathbuf)-1);
44d2e365
N
1946 if (len > 0) {
1947 char *sl;
1948 pathbuf[len] = 0;
1949 sl = strrchr(pathbuf, '/');
1950 if (sl)
1951 sl++;
1952 else
1953 sl = pathbuf;
1954 strcpy(sl, "mdmon");
1955 } else
1956 pathbuf[0] = '\0';
1957
8850ee3e
N
1958 switch(fork()) {
1959 case 0:
ff6bb131 1960 manage_fork_fds(1);
ca3b6696 1961 for (i = 0; paths[i]; i++)
a0963a86 1962 if (paths[i][0]) {
2f1bcf43 1963 execl(paths[i], paths[i],
4dd2df09 1964 devnm, NULL);
a0963a86 1965 }
8850ee3e 1966 exit(1);
7a862a02 1967 case -1: pr_err("cannot run mdmon. Array remains readonly\n");
8850ee3e 1968 return -1;
9fe32043
N
1969 default: /* parent - good */
1970 pid = wait(&status);
15c10423 1971 if (pid < 0 || status != 0) {
7a862a02 1972 pr_err("failed to launch mdmon. Array remains readonly\n");
9fe32043 1973 return -1;
15c10423 1974 }
8850ee3e
N
1975 }
1976 return 0;
1977}
1978
148acb7b
DW
1979__u32 random32(void)
1980{
1981 __u32 rv;
1982 int rfd = open("/dev/urandom", O_RDONLY);
1983 if (rfd < 0 || read(rfd, &rv, 4) != 4)
1984 rv = random();
1985 if (rfd >= 0)
1986 close(rfd);
1987 return rv;
1988}
1989
c5f71c24
JS
1990void random_uuid(__u8 *buf)
1991{
1992 int fd, i, len;
1993 __u32 r[4];
1994
1995 fd = open("/dev/urandom", O_RDONLY);
1996 if (fd < 0)
1997 goto use_random;
1998 len = read(fd, buf, 16);
1999 close(fd);
2000 if (len != 16)
2001 goto use_random;
2002
2003 return;
2004
2005use_random:
2006 for (i = 0; i < 4; i++)
2007 r[i] = random();
2008 memcpy(buf, r, 16);
2009}
2010
edd8d13c
NB
2011int flush_metadata_updates(struct supertype *st)
2012{
2013 int sfd;
2014 if (!st->updates) {
2015 st->update_tail = NULL;
2016 return -1;
2017 }
2018
4dd2df09 2019 sfd = connect_monitor(st->container_devnm);
edd8d13c
NB
2020 if (sfd < 0)
2021 return -1;
2022
2023 while (st->updates) {
2024 struct metadata_update *mu = st->updates;
2025 st->updates = mu->next;
2026
2027 send_message(sfd, mu, 0);
2028 wait_reply(sfd, 0);
2029 free(mu->buf);
2030 free(mu);
2031 }
2032 ack(sfd, 0);
2033 wait_reply(sfd, 0);
2034 close(sfd);
2035 st->update_tail = NULL;
2036 return 0;
2037}
2038
2039void append_metadata_update(struct supertype *st, void *buf, int len)
2040{
2041
503975b9 2042 struct metadata_update *mu = xmalloc(sizeof(*mu));
edd8d13c
NB
2043
2044 mu->buf = buf;
2045 mu->len = len;
2046 mu->space = NULL;
cb23f1f4 2047 mu->space_list = NULL;
edd8d13c
NB
2048 mu->next = NULL;
2049 *st->update_tail = mu;
2050 st->update_tail = &mu->next;
2051}
a931db9e 2052
fe6729fa
NB
2053#ifdef __TINYC__
2054/* tinyc doesn't optimize this check in ioctl.h out ... */
2055unsigned int __invalid_size_argument_for_IOC = 0;
2056#endif
2057
0c0f09cb
MT
2058/**
2059 * disk_fd_matches_criteria() - check if device matches spare criteria.
51a9f2fc 2060 * @st: supertype, not NULL.
0c0f09cb
MT
2061 * @disk_fd: file descriptor of the disk.
2062 * @sc: criteria to test.
2063 *
2064 * Return: true if disk matches criteria, false otherwise.
2065 */
51a9f2fc 2066bool disk_fd_matches_criteria(struct supertype *st, int disk_fd, struct spare_criteria *sc)
0c0f09cb
MT
2067{
2068 unsigned int dev_sector_size = 0;
2069 unsigned long long dev_size = 0;
2070
2071 if (!sc->criteria_set)
2072 return true;
2073
2074 if (!get_dev_size(disk_fd, NULL, &dev_size) || dev_size < sc->min_size)
2075 return false;
2076
2077 if (!get_dev_sector_size(disk_fd, NULL, &dev_sector_size) ||
2078 sc->sector_size != dev_sector_size)
2079 return false;
2080
51a9f2fc
MT
2081 if (drive_test_and_add_policies(st, &sc->pols, disk_fd, 0))
2082 return false;
2083
0c0f09cb
MT
2084 return true;
2085}
2086
2087/**
2088 * devid_matches_criteria() - check if device referenced by devid matches spare criteria.
51a9f2fc 2089 * @st: supertype, not NULL.
0c0f09cb
MT
2090 * @devid: devid of the device to check.
2091 * @sc: criteria to test.
2092 *
2093 * Return: true if disk matches criteria, false otherwise.
2094 */
51a9f2fc 2095bool devid_matches_criteria(struct supertype *st, dev_t devid, struct spare_criteria *sc)
0c0f09cb
MT
2096{
2097 char buf[NAME_MAX];
2098 bool ret;
2099 int fd;
2100
2101 if (!sc->criteria_set)
2102 return true;
2103
2104 snprintf(buf, NAME_MAX, "%d:%d", major(devid), minor(devid));
2105
2106 fd = dev_open(buf, O_RDONLY);
2107 if (!is_fd_valid(fd))
2108 return false;
2109
2110 /* Error code inherited */
51a9f2fc 2111 ret = disk_fd_matches_criteria(st, fd, sc);
0c0f09cb
MT
2112
2113 close(fd);
2114 return ret;
2115}
2116
326727d9
AC
2117/* Pick all spares matching given criteria from a container
2118 * if min_size == 0 do not check size
2119 * if domlist == NULL do not check domains
2120 * if spare_group given add it to domains of each spare
2121 * metadata allows to test domains using metadata of destination array */
2122struct mdinfo *container_choose_spares(struct supertype *st,
fbfdcb06 2123 struct spare_criteria *criteria,
326727d9
AC
2124 struct domainlist *domlist,
2125 char *spare_group,
2126 const char *metadata, int get_one)
2127{
2128 struct mdinfo *d, **dp, *disks = NULL;
2129
2130 /* get list of all disks in container */
2131 if (st->ss->getinfo_super_disks)
2132 disks = st->ss->getinfo_super_disks(st);
2133
2134 if (!disks)
2135 return disks;
2136 /* find spare devices on the list */
2137 dp = &disks->devs;
2138 disks->array.spare_disks = 0;
2139 while (*dp) {
0c0f09cb
MT
2140 bool found = false;
2141
326727d9
AC
2142 d = *dp;
2143 if (d->disk.state == 0) {
326727d9
AC
2144 dev_t dev = makedev(d->disk.major,d->disk.minor);
2145
51a9f2fc 2146 found = devid_matches_criteria(st, dev, criteria);
4b57ecf6 2147
326727d9
AC
2148 /* check if domain matches */
2149 if (found && domlist) {
4dd2df09 2150 struct dev_policy *pol = devid_policy(dev);
326727d9
AC
2151 if (spare_group)
2152 pol_add(&pol, pol_domain,
2153 spare_group, NULL);
e5508b36 2154 if (domain_test(domlist, pol, metadata) != 1)
0c0f09cb
MT
2155 found = false;
2156
326727d9
AC
2157 dev_policy_free(pol);
2158 }
2159 }
2160 if (found) {
2161 dp = &d->next;
2162 disks->array.spare_disks++;
2163 if (get_one) {
2164 sysfs_free(*dp);
2165 d->next = NULL;
2166 }
2167 } else {
2168 *dp = d->next;
2169 d->next = NULL;
2170 sysfs_free(d);
2171 }
2172 }
2173 return disks;
2174}
9eafa1de
MN
2175
2176/* Checks if paths point to the same device
2177 * Returns 0 if they do.
2178 * Returns 1 if they don't.
2179 * Returns -1 if something went wrong,
2180 * e.g. paths are empty or the files
2181 * they point to don't exist */
2182int compare_paths (char* path1, char* path2)
2183{
2184 struct stat st1,st2;
2185
2186 if (path1 == NULL || path2 == NULL)
2187 return -1;
2188 if (stat(path1,&st1) != 0)
2189 return -1;
2190 if (stat(path2,&st2) != 0)
2191 return -1;
2192 if ((st1.st_ino == st2.st_ino) && (st1.st_dev == st2.st_dev))
2193 return 0;
2194 return 1;
2195}
a7dec3fd
N
2196
2197/* Make sure we can open as many devices as needed */
2198void enable_fds(int devices)
2199{
2200 unsigned int fds = 20 + devices;
2201 struct rlimit lim;
d7be7d87 2202 if (getrlimit(RLIMIT_NOFILE, &lim) != 0 || lim.rlim_cur >= fds)
a7dec3fd
N
2203 return;
2204 if (lim.rlim_max < fds)
2205 lim.rlim_max = fds;
2206 lim.rlim_cur = fds;
2207 setrlimit(RLIMIT_NOFILE, &lim);
2208}
a9c15847 2209
ff6bb131
MT
2210/* Close all opened descriptors if needed and redirect
2211 * streams to /dev/null.
2212 * For debug purposed, leave STDOUT and STDERR untouched
2213 * Returns:
2214 * 1- if any error occurred
2215 * 0- otherwise
2216 */
2217void manage_fork_fds(int close_all)
2218{
2219 DIR *dir;
2220 struct dirent *dirent;
2221
2222 close(0);
2223 open("/dev/null", O_RDWR);
2224
2225#ifndef DEBUG
2226 dup2(0, 1);
2227 dup2(0, 2);
2228#endif
2229
2230 if (close_all == 0)
2231 return;
2232
2233 dir = opendir("/proc/self/fd");
2234 if (!dir) {
2235 pr_err("Cannot open /proc/self/fd directory.\n");
2236 return;
2237 }
2238 for (dirent = readdir(dir); dirent; dirent = readdir(dir)) {
2239 int fd = -1;
2240
2241 if ((strcmp(dirent->d_name, ".") == 0) ||
2242 (strcmp(dirent->d_name, "..")) == 0)
2243 continue;
2244
2245 fd = strtol(dirent->d_name, NULL, 10);
2246 if (fd > 2)
2247 close(fd);
2248 }
2249}
2250
2251/* In a systemd/udev world, it is best to get systemd to
2252 * run daemon rather than running in the background.
2253 * Returns:
2254 * 1- if systemd service has been started
2255 * 0- otherwise
2256 */
723d1df4 2257int continue_via_systemd(char *devnm, char *service_name, char *prefix)
ff6bb131
MT
2258{
2259 int pid, status;
2260 char pathbuf[1024];
2261
2262 /* Simply return that service cannot be started */
2263 if (check_env("MDADM_NO_SYSTEMCTL"))
2264 return 0;
2265 switch (fork()) {
2266 case 0:
2267 manage_fork_fds(1);
2268 snprintf(pathbuf, sizeof(pathbuf),
723d1df4 2269 "%s@%s%s.service", service_name, prefix ?: "", devnm);
ff6bb131
MT
2270 status = execl("/usr/bin/systemctl", "systemctl", "restart",
2271 pathbuf, NULL);
2272 status = execl("/bin/systemctl", "systemctl", "restart",
2273 pathbuf, NULL);
2274 exit(1);
2275 case -1: /* Just do it ourselves. */
2276 break;
2277 default: /* parent - good */
2278 pid = wait(&status);
2279 if (pid >= 0 && status == 0)
2280 return 1;
2281 }
2282 return 0;
2283}
2284
a9c15847
N
2285int in_initrd(void)
2286{
eb45d0ad 2287 return access("/etc/initrd-release", F_OK) >= 0;
a9c15847 2288}
8832342d
N
2289
2290void reopen_mddev(int mdfd)
2291{
2292 /* Re-open without any O_EXCL, but keep
2293 * the same fd
2294 */
2295 char *devnm;
2296 int fd;
2297 devnm = fd2devnm(mdfd);
2298 close(mdfd);
2299 fd = open_dev(devnm);
2300 if (fd >= 0 && fd != mdfd)
2301 dup2(fd, mdfd);
2302}
7716570e 2303
e80357f8
GJ
2304static struct cmap_hooks *cmap_hooks = NULL;
2305static int is_cmap_hooks_ready = 0;
7716570e 2306
e80357f8
GJ
2307void set_cmap_hooks(void)
2308{
2309 cmap_hooks = xmalloc(sizeof(struct cmap_hooks));
2310 cmap_hooks->cmap_handle = dlopen("libcmap.so.4", RTLD_NOW | RTLD_LOCAL);
2311 if (!cmap_hooks->cmap_handle)
2312 return;
7716570e 2313
b7a462e5
JS
2314 cmap_hooks->initialize =
2315 dlsym(cmap_hooks->cmap_handle, "cmap_initialize");
2316 cmap_hooks->get_string =
2317 dlsym(cmap_hooks->cmap_handle, "cmap_get_string");
e80357f8 2318 cmap_hooks->finalize = dlsym(cmap_hooks->cmap_handle, "cmap_finalize");
7716570e 2319
e80357f8
GJ
2320 if (!cmap_hooks->initialize || !cmap_hooks->get_string ||
2321 !cmap_hooks->finalize)
2322 dlclose(cmap_hooks->cmap_handle);
2323 else
2324 is_cmap_hooks_ready = 1;
2325}
7716570e 2326
e80357f8
GJ
2327int get_cluster_name(char **cluster_name)
2328{
2329 int rv = -1;
2330 cmap_handle_t handle;
7716570e 2331
e80357f8
GJ
2332 if (!is_cmap_hooks_ready)
2333 return rv;
7716570e 2334
e80357f8 2335 rv = cmap_hooks->initialize(&handle);
7716570e
GJ
2336 if (rv != CS_OK)
2337 goto out;
2338
e80357f8 2339 rv = cmap_hooks->get_string(handle, "totem.cluster_name", cluster_name);
7716570e
GJ
2340 if (rv != CS_OK) {
2341 free(*cluster_name);
2342 rv = -1;
2343 goto name_err;
2344 }
2345
2346 rv = 0;
2347name_err:
e80357f8 2348 cmap_hooks->finalize(handle);
7716570e 2349out:
7716570e
GJ
2350 return rv;
2351}
d15a1f72
GJ
2352
2353void set_dlm_hooks(void)
2354{
2355 dlm_hooks = xmalloc(sizeof(struct dlm_hooks));
2356 dlm_hooks->dlm_handle = dlopen("libdlm_lt.so.3", RTLD_NOW | RTLD_LOCAL);
2357 if (!dlm_hooks->dlm_handle)
2358 return;
2359
1b7eb962
GJ
2360 dlm_hooks->open_lockspace =
2361 dlsym(dlm_hooks->dlm_handle, "dlm_open_lockspace");
b7a462e5
JS
2362 dlm_hooks->create_lockspace =
2363 dlsym(dlm_hooks->dlm_handle, "dlm_create_lockspace");
2364 dlm_hooks->release_lockspace =
2365 dlsym(dlm_hooks->dlm_handle, "dlm_release_lockspace");
d15a1f72 2366 dlm_hooks->ls_lock = dlsym(dlm_hooks->dlm_handle, "dlm_ls_lock");
1b7eb962
GJ
2367 dlm_hooks->ls_unlock_wait =
2368 dlsym(dlm_hooks->dlm_handle, "dlm_ls_unlock_wait");
d15a1f72
GJ
2369 dlm_hooks->ls_get_fd = dlsym(dlm_hooks->dlm_handle, "dlm_ls_get_fd");
2370 dlm_hooks->dispatch = dlsym(dlm_hooks->dlm_handle, "dlm_dispatch");
2371
1b7eb962
GJ
2372 if (!dlm_hooks->open_lockspace || !dlm_hooks->create_lockspace ||
2373 !dlm_hooks->ls_lock || !dlm_hooks->ls_unlock_wait ||
2374 !dlm_hooks->release_lockspace || !dlm_hooks->ls_get_fd ||
2375 !dlm_hooks->dispatch)
d15a1f72
GJ
2376 dlclose(dlm_hooks->dlm_handle);
2377 else
2378 is_dlm_hooks_ready = 1;
2379}
e80357f8
GJ
2380
2381void set_hooks(void)
2382{
2383 set_dlm_hooks();
2384 set_cmap_hooks();
2385}
b2514242
PB
2386
2387int zero_disk_range(int fd, unsigned long long sector, size_t count)
2388{
2389 int ret = 0;
2390 int fd_zero;
2391 void *addr = NULL;
2392 size_t written = 0;
2393 size_t len = count * 512;
2394 ssize_t n;
2395
2396 fd_zero = open("/dev/zero", O_RDONLY);
2397 if (fd_zero < 0) {
2398 pr_err("Cannot open /dev/zero\n");
2399 return -1;
2400 }
2401
2402 if (lseek64(fd, sector * 512, SEEK_SET) < 0) {
2403 ret = -errno;
2404 pr_err("Failed to seek offset for zeroing\n");
2405 goto out;
2406 }
2407
2408 addr = mmap(NULL, len, PROT_READ, MAP_PRIVATE, fd_zero, 0);
2409
2410 if (addr == MAP_FAILED) {
2411 ret = -errno;
2412 pr_err("Mapping /dev/zero failed\n");
2413 goto out;
2414 }
2415
2416 do {
2417 n = write(fd, addr + written, len - written);
2418 if (n < 0) {
2419 if (errno == EINTR)
2420 continue;
2421 ret = -errno;
2422 pr_err("Zeroing disk range failed\n");
2423 break;
2424 }
2425 written += n;
2426 } while (written != len);
2427
2428 munmap(addr, len);
2429
2430out:
2431 close(fd_zero);
2432 return ret;
2433}
239b3cc0
MG
2434
2435/**
2436 * sleep_for() - Sleeps for specified time.
2437 * @sec: Seconds to sleep for.
2438 * @nsec: Nanoseconds to sleep for, has to be less than one second.
2439 * @wake_after_interrupt: If set, wake up if interrupted.
2440 *
2441 * Function immediately returns if error different than EINTR occurs.
2442 */
2443void sleep_for(unsigned int sec, long nsec, bool wake_after_interrupt)
2444{
2445 struct timespec delay = {.tv_sec = sec, .tv_nsec = nsec};
2446
2447 assert(nsec < MSEC_TO_NSEC(1000));
2448
2449 do {
2450 errno = 0;
2451 nanosleep(&delay, &delay);
2452 if (errno != 0 && errno != EINTR) {
2453 pr_err("Error sleeping for %us %ldns: %s\n", sec, nsec, strerror(errno));
2454 return;
2455 }
2456 } while (!wake_after_interrupt && errno == EINTR);
2457}
ee9dcf95
MG
2458
2459/* is_directory() - Checks if directory provided by path is indeed a regular directory.
2460 * @path: directory path to be checked
2461 *
2462 * Doesn't accept symlinks.
2463 *
2464 * Return: true if is a directory, false if not
2465 */
2466bool is_directory(const char *path)
2467{
2468 struct stat st;
2469
2470 if (lstat(path, &st) != 0) {
2471 pr_err("%s: %s\n", strerror(errno), path);
2472 return false;
2473 }
2474
2475 if (!S_ISDIR(st.st_mode))
2476 return false;
2477
2478 return true;
2479}
2480
2481/*
2482 * is_file() - Checks if file provided by path is indeed a regular file.
2483 * @path: file path to be checked
2484 *
2485 * Doesn't accept symlinks.
2486 *
2487 * Return: true if is a file, false if not
2488 */
2489bool is_file(const char *path)
2490{
2491 struct stat st;
2492
2493 if (lstat(path, &st) != 0) {
2494 pr_err("%s: %s\n", strerror(errno), path);
2495 return false;
2496 }
2497
2498 if (!S_ISREG(st.st_mode))
2499 return false;
2500
2501 return true;
2502}