]> git.ipfire.org Git - thirdparty/mdadm.git/blob - mdmon.c
mdmon: make switchroot an undecorated option
[thirdparty/mdadm.git] / mdmon.c
1 /*
2 * mdmon - monitor external metadata arrays
3 *
4 * Copyright (C) 2007-2008 Neil Brown <neilb@suse.de>
5 * Copyright (C) 2007-2008 Intel Corporation
6 *
7 * This program is free software; you can redistribute it and/or modify it
8 * under the terms and conditions of the GNU General Public License,
9 * version 2, as published by the Free Software Foundation.
10 *
11 * This program is distributed in the hope it will be useful, but WITHOUT
12 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
13 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
14 * more details.
15 *
16 * You should have received a copy of the GNU General Public License along with
17 * this program; if not, write to the Free Software Foundation, Inc.,
18 * 51 Franklin St - Fifth Floor, Boston, MA 02110-1301 USA.
19 */
20
21 /*
22 * md array manager.
23 * When md arrays have user-space managed metadata, this is the program
24 * that does the managing.
25 *
26 * Given one argument: the name of the array (e.g. /dev/md0) that is
27 * the container.
28 * We fork off a helper that runs high priority and mlocked. It responds to
29 * device failures and other events that might stop writeout, or that are
30 * trivial to deal with.
31 * The main thread then watches for new arrays being created in the container
32 * and starts monitoring them too ... along with a few other tasks.
33 *
34 * The main thread communicates with the priority thread by writing over
35 * a pipe.
36 * Separate programs can communicate with the main thread via Unix-domain
37 * socket.
38 * The two threads share address space and open file table.
39 *
40 */
41
42 #ifndef _GNU_SOURCE
43 #define _GNU_SOURCE
44 #endif
45
46 #include <unistd.h>
47 #include <stdlib.h>
48 #include <sys/types.h>
49 #include <sys/stat.h>
50 #include <sys/socket.h>
51 #include <sys/un.h>
52 #include <sys/mman.h>
53 #include <sys/syscall.h>
54 #include <sys/wait.h>
55 #include <stdio.h>
56 #include <errno.h>
57 #include <string.h>
58 #include <fcntl.h>
59 #include <signal.h>
60 #include <dirent.h>
61
62 #include <sched.h>
63
64 #include "mdadm.h"
65 #include "mdmon.h"
66
67 struct active_array *discard_this;
68 struct active_array *pending_discard;
69
70 int mon_tid, mgr_tid;
71
72 int sigterm;
73
74 int run_child(void *v)
75 {
76 struct supertype *c = v;
77
78 do_monitor(c);
79 return 0;
80 }
81
82 #ifdef __ia64__
83 int __clone2(int (*fn)(void *),
84 void *child_stack_base, size_t stack_size,
85 int flags, void *arg, ...
86 /* pid_t *pid, struct user_desc *tls, pid_t *ctid */ );
87 #endif
88 int clone_monitor(struct supertype *container)
89 {
90 static char stack[4096];
91
92 #ifdef __ia64__
93 mon_tid = __clone2(run_child, stack, sizeof(stack),
94 CLONE_FS|CLONE_FILES|CLONE_VM|CLONE_SIGHAND|CLONE_THREAD,
95 container);
96 #else
97 mon_tid = clone(run_child, stack+4096-64,
98 CLONE_FS|CLONE_FILES|CLONE_VM|CLONE_SIGHAND|CLONE_THREAD,
99 container);
100 #endif
101
102 mgr_tid = syscall(SYS_gettid);
103
104 return mon_tid;
105 }
106
107 static struct superswitch *find_metadata_methods(char *vers)
108 {
109 if (strcmp(vers, "ddf") == 0)
110 return &super_ddf;
111 if (strcmp(vers, "imsm") == 0)
112 return &super_imsm;
113 return NULL;
114 }
115
116
117 int make_pidfile(char *devname, int o_excl)
118 {
119 char path[100];
120 char pid[10];
121 int fd;
122 int n;
123
124 if (sigterm)
125 return -1;
126
127 sprintf(path, "/var/run/mdadm/%s.pid", devname);
128
129 fd = open(path, O_RDWR|O_CREAT|o_excl, 0600);
130 if (fd < 0)
131 return -errno;
132 sprintf(pid, "%d\n", getpid());
133 n = write(fd, pid, strlen(pid));
134 close(fd);
135 if (n < 0)
136 return -errno;
137 return 0;
138 }
139
140 int is_container_member(struct mdstat_ent *mdstat, char *container)
141 {
142 if (mdstat->metadata_version == NULL ||
143 strncmp(mdstat->metadata_version, "external:", 9) != 0 ||
144 !is_subarray(mdstat->metadata_version+9) ||
145 strncmp(mdstat->metadata_version+10, container, strlen(container)) != 0 ||
146 mdstat->metadata_version[10+strlen(container)] != '/')
147 return 0;
148
149 return 1;
150 }
151
152 void remove_pidfile(char *devname);
153 static void try_kill_monitor(char *devname)
154 {
155 char buf[100];
156 int fd;
157 pid_t pid;
158 struct mdstat_ent *mdstat;
159
160 sprintf(buf, "/var/run/mdadm/%s.pid", devname);
161 fd = open(buf, O_RDONLY);
162 if (fd < 0)
163 return;
164
165 if (read(fd, buf, sizeof(buf)) < 0) {
166 close(fd);
167 return;
168 }
169
170 close(fd);
171 pid = strtoul(buf, NULL, 10);
172
173 /* first rule of survival... don't off yourself */
174 if (pid == getpid())
175 return;
176
177 /* kill this process if it is mdmon */
178 sprintf(buf, "/proc/%lu/cmdline", (unsigned long) pid);
179 fd = open(buf, O_RDONLY);
180 if (fd < 0)
181 return;
182
183 if (read(fd, buf, sizeof(buf)) < 0) {
184 close(fd);
185 return;
186 }
187
188 if (!strstr(buf, "mdmon"))
189 return;
190
191 kill(pid, SIGTERM);
192
193 mdstat = mdstat_read(0, 0);
194 for ( ; mdstat; mdstat = mdstat->next)
195 if (is_container_member(mdstat, devname)) {
196 sprintf(buf, "/dev/%s", mdstat->dev);
197 WaitClean(buf, 0);
198 }
199 free_mdstat(mdstat);
200 remove_pidfile(devname);
201 }
202
203 void remove_pidfile(char *devname)
204 {
205 char buf[100];
206
207 if (sigterm)
208 return;
209
210 sprintf(buf, "/var/run/mdadm/%s.pid", devname);
211 unlink(buf);
212 sprintf(buf, "/var/run/mdadm/%s.sock", devname);
213 unlink(buf);
214 }
215
216 int make_control_sock(char *devname)
217 {
218 char path[100];
219 int sfd;
220 long fl;
221 struct sockaddr_un addr;
222
223 if (sigterm)
224 return -1;
225
226 sprintf(path, "/var/run/mdadm/%s.sock", devname);
227 unlink(path);
228 sfd = socket(PF_LOCAL, SOCK_STREAM, 0);
229 if (sfd < 0)
230 return -1;
231
232 addr.sun_family = PF_LOCAL;
233 strcpy(addr.sun_path, path);
234 if (bind(sfd, &addr, sizeof(addr)) < 0) {
235 close(sfd);
236 return -1;
237 }
238 listen(sfd, 10);
239 fl = fcntl(sfd, F_GETFL, 0);
240 fl |= O_NONBLOCK;
241 fcntl(sfd, F_SETFL, fl);
242 return sfd;
243 }
244
245 int socket_hup_requested;
246 static void hup(int sig)
247 {
248 socket_hup_requested = 1;
249 }
250
251 static void term(int sig)
252 {
253 sigterm = 1;
254 }
255
256 static void wake_me(int sig)
257 {
258
259 }
260
261 /* if we are debugging and starting mdmon by hand then don't fork */
262 static int do_fork(void)
263 {
264 #ifdef DEBUG
265 if (check_env("MDADM_NO_MDMON"))
266 return 0;
267 #endif
268
269 return 1;
270 }
271
272 void usage(void)
273 {
274 fprintf(stderr, "Usage: mdmon /device/name/for/container [target_dir]\n");
275 exit(2);
276 }
277
278 int mdmon(char *devname, int devnum, int scan, char *switchroot);
279
280 int main(int argc, char *argv[])
281 {
282 char *container_name = NULL;
283 char *switchroot = NULL;
284 int devnum;
285 char *devname;
286 int scan = 0;
287 int status = 0;
288
289 switch (argc) {
290 case 3:
291 switchroot = argv[2];
292 case 2:
293 container_name = argv[1];
294 break;
295 default:
296 usage();
297 }
298
299 if (strcmp(container_name, "/proc/mdstat") == 0) {
300 struct mdstat_ent *mdstat, *e;
301
302 /* launch an mdmon instance for each container found */
303 scan = 1;
304 mdstat = mdstat_read(0, 0);
305 for (e = mdstat; e; e = e->next) {
306 if (strncmp(e->metadata_version, "external:", 9) == 0 &&
307 !is_subarray(&e->metadata_version[9])) {
308 devname = devnum2devname(e->devnum);
309 status |= mdmon(devname, e->devnum, scan,
310 switchroot);
311 }
312 }
313 free_mdstat(mdstat);
314
315 return status;
316 } else if (strncmp(container_name, "md", 2) == 0) {
317 devnum = devname2devnum(container_name);
318 devname = devnum2devname(devnum);
319 if (strcmp(container_name, devname) != 0)
320 devname = NULL;
321 } else {
322 struct stat st;
323
324 devnum = NoMdDev;
325 if (stat(container_name, &st) == 0)
326 devnum = stat2devnum(&st);
327 if (devnum == NoMdDev)
328 devname = NULL;
329 else
330 devname = devnum2devname(devnum);
331 }
332
333 if (!devname) {
334 fprintf(stderr, "mdmon: %s is not a valid md device name\n",
335 container_name);
336 exit(1);
337 }
338 return mdmon(devname, devnum, scan, switchroot);
339 }
340
341 int mdmon(char *devname, int devnum, int scan, char *switchroot)
342 {
343 int mdfd;
344 struct mdinfo *mdi, *di;
345 struct supertype *container;
346 sigset_t set;
347 struct sigaction act;
348 int pfd[2];
349 int status;
350 int ignore;
351
352 dprintf("starting mdmon for %s in %s\n",
353 devname, switchroot ? : "/");
354 mdfd = open_dev(devnum);
355 if (mdfd < 0) {
356 fprintf(stderr, "mdmon: %s: %s\n", devname,
357 strerror(errno));
358 return 1;
359 }
360 if (md_get_version(mdfd) < 0) {
361 fprintf(stderr, "mdmon: %s: Not an md device\n",
362 devname);
363 return 1;
364 }
365
366 /* Fork, and have the child tell us when they are ready */
367 if (do_fork() || scan) {
368 if (pipe(pfd) != 0) {
369 fprintf(stderr, "mdmon: failed to create pipe\n");
370 return 1;
371 }
372 switch(fork()) {
373 case -1:
374 fprintf(stderr, "mdmon: failed to fork: %s\n",
375 strerror(errno));
376 return 1;
377 case 0: /* child */
378 close(pfd[0]);
379 break;
380 default: /* parent */
381 close(pfd[1]);
382 if (read(pfd[0], &status, sizeof(status)) != sizeof(status)) {
383 wait(&status);
384 status = WEXITSTATUS(status);
385 }
386 return status;
387 }
388 } else
389 pfd[0] = pfd[1] = -1;
390
391 container = malloc(sizeof(*container));
392 container->devnum = devnum;
393 container->devname = devname;
394 container->arrays = NULL;
395 container->subarray[0] = 0;
396
397 if (!container->devname) {
398 fprintf(stderr, "mdmon: failed to allocate container name string\n");
399 exit(3);
400 }
401
402 mdi = sysfs_read(mdfd, container->devnum,
403 GET_VERSION|GET_LEVEL|GET_DEVS);
404
405 if (!mdi) {
406 fprintf(stderr, "mdmon: failed to load sysfs info for %s\n",
407 container->devname);
408 exit(3);
409 }
410 if (mdi->array.level != UnSet) {
411 fprintf(stderr, "mdmon: %s is not a container - cannot monitor\n",
412 devname);
413 exit(3);
414 }
415 if (mdi->array.major_version != -1 ||
416 mdi->array.minor_version != -2) {
417 fprintf(stderr, "mdmon: %s does not use external metadata - cannot monitor\n",
418 devname);
419 exit(3);
420 }
421
422 container->ss = find_metadata_methods(mdi->text_version);
423 if (container->ss == NULL) {
424 fprintf(stderr, "mdmon: %s uses unknown metadata: %s\n",
425 devname, mdi->text_version);
426 exit(3);
427 }
428
429 container->devs = NULL;
430 for (di = mdi->devs; di; di = di->next) {
431 struct mdinfo *cd = malloc(sizeof(*cd));
432 *cd = *di;
433 cd->next = container->devs;
434 container->devs = cd;
435 }
436 sysfs_free(mdi);
437
438 /* SIGUSR is sent between parent and child. So both block it
439 * and enable it only with pselect.
440 */
441 sigemptyset(&set);
442 sigaddset(&set, SIGUSR1);
443 sigaddset(&set, SIGHUP);
444 sigaddset(&set, SIGALRM);
445 sigaddset(&set, SIGTERM);
446 sigprocmask(SIG_BLOCK, &set, NULL);
447 act.sa_handler = wake_me;
448 act.sa_flags = 0;
449 sigaction(SIGUSR1, &act, NULL);
450 sigaction(SIGALRM, &act, NULL);
451 act.sa_handler = hup;
452 sigaction(SIGHUP, &act, NULL);
453 act.sa_handler = term;
454 sigaction(SIGTERM, &act, NULL);
455 act.sa_handler = SIG_IGN;
456 sigaction(SIGPIPE, &act, NULL);
457
458 if (switchroot) {
459 /* we assume we assume that /sys /proc /dev are available in
460 * the new root (see nash:setuproot)
461 *
462 * kill any monitors in the current namespace and change
463 * to the new one
464 */
465 try_kill_monitor(container->devname);
466 if (chroot(switchroot) != 0) {
467 fprintf(stderr, "mdmon: failed to chroot to '%s': %s\n",
468 switchroot, strerror(errno));
469 exit(4);
470 }
471 }
472
473 /* If this fails, we hope it already exists
474 * pid file lives in /var/run/mdadm/mdXX.pid
475 */
476 mkdir("/var", 0600);
477 mkdir("/var/run", 0600);
478 mkdir("/var/run/mdadm", 0600);
479 ignore = chdir("/");
480 if (make_pidfile(container->devname, O_EXCL) < 0) {
481 if (ping_monitor(container->devname) == 0) {
482 fprintf(stderr, "mdmon: %s already managed\n",
483 container->devname);
484 exit(3);
485 } else {
486 int err;
487
488 /* cleanup the old monitor, this one is taking over */
489 try_kill_monitor(container->devname);
490 err = make_pidfile(container->devname, 0);
491 if (err < 0) {
492 fprintf(stderr, "mdmon: %s Cannot create pidfile\n",
493 container->devname);
494 if (err == -EROFS) {
495 /* FIXME implement a mechanism to
496 * prevent duplicate monitor instances
497 */
498 fprintf(stderr,
499 "mdmon: continuing on read-only file system\n");
500 } else
501 exit(3);
502 }
503 }
504 }
505 container->sock = make_control_sock(container->devname);
506
507 if (container->ss->load_super(container, mdfd, devname)) {
508 fprintf(stderr, "mdmon: Cannot load metadata for %s\n",
509 devname);
510 exit(3);
511 }
512 close(mdfd);
513
514 /* Ok, this is close enough. We can say goodbye to our parent now.
515 */
516 status = 0;
517 if (write(pfd[1], &status, sizeof(status)) < 0)
518 fprintf(stderr, "mdmon: failed to notify our parent: %d\n",
519 getppid());
520 close(pfd[1]);
521
522 setsid();
523 close(0);
524 open("/dev/null", O_RDWR);
525 close(1);
526 ignore = dup(0);
527 #ifndef DEBUG
528 close(2);
529 ignore = dup(0);
530 #endif
531
532 mlockall(MCL_FUTURE);
533
534 if (clone_monitor(container) < 0) {
535 fprintf(stderr, "mdmon: failed to start monitor process: %s\n",
536 strerror(errno));
537 exit(2);
538 }
539
540 do_manager(container);
541
542 exit(0);
543 }