mirror of
git://sourceware.org/git/lvm2.git
synced 2024-12-22 17:35:59 +03:00
664e947726
Coverity reports some unchecked allocations.
830 lines
19 KiB
C
830 lines
19 KiB
C
/*
|
|
* Copyright (C) 2016 Red Hat, Inc. All rights reserved.
|
|
*
|
|
* This file is part of the device-mapper userspace tools.
|
|
*
|
|
* It includes tree drawing code based on pstree: http://psmisc.sourceforge.net/
|
|
*
|
|
* This copyrighted material is made available to anyone wishing to use,
|
|
* modify, copy, or redistribute it subject to the terms and conditions
|
|
* of the GNU General Public License v.2.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software Foundation,
|
|
* Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
|
|
*/
|
|
|
|
#include "tool.h"
|
|
|
|
#include "dm-logging.h"
|
|
|
|
#include "defaults.h"
|
|
|
|
#include <sys/types.h>
|
|
#include <sys/stat.h>
|
|
#include <unistd.h>
|
|
#include <fcntl.h>
|
|
#include <sys/inotify.h>
|
|
#include <dirent.h>
|
|
#include <ctype.h>
|
|
|
|
#ifdef __linux__
|
|
# include "kdev_t.h"
|
|
#else
|
|
# define MAJOR(x) major((x))
|
|
# define MINOR(x) minor((x))
|
|
# define MKDEV(x,y) makedev((x),(y))
|
|
#endif
|
|
|
|
/* limit to two updates/sec */
|
|
#define FILEMAPD_WAIT_USECS 500000
|
|
|
|
/* how long to wait for unlinked files */
|
|
#define FILEMAPD_NOFILE_WAIT_USECS 100000
|
|
#define FILEMAPD_NOFILE_WAIT_TRIES 10
|
|
|
|
struct filemap_monitor {
|
|
dm_filemapd_mode_t mode;
|
|
const char *program_id;
|
|
uint64_t group_id;
|
|
char *path;
|
|
int fd;
|
|
|
|
int inotify_fd;
|
|
int inotify_watch_fd;
|
|
|
|
/* monitoring heuristics */
|
|
int64_t blocks; /* allocated blocks, from stat.st_blocks */
|
|
uint64_t nr_regions;
|
|
int deleted;
|
|
};
|
|
|
|
static int _foreground;
|
|
static int _verbose;
|
|
|
|
const char *const _usage = "dmfilemapd <fd> <group_id> <abs_path> <mode> "
|
|
"[<foreground>[<log_level>]]";
|
|
|
|
/*
|
|
* Daemon logging. By default, all messages are thrown away: messages
|
|
* are only written to the terminal if the daemon is run in the foreground.
|
|
*/
|
|
__attribute__((format(printf, 5, 0)))
|
|
static void _dmfilemapd_log_line(int level,
|
|
const char *file __attribute__((unused)),
|
|
int line __attribute__((unused)),
|
|
int dm_errno_or_class,
|
|
const char *f, va_list ap)
|
|
{
|
|
static int _abort_on_internal_errors = -1;
|
|
FILE *out = log_stderr(level) ? stderr : stdout;
|
|
|
|
level = log_level(level);
|
|
|
|
if (level <= _LOG_WARN || _verbose) {
|
|
if (level < _LOG_WARN)
|
|
out = stderr;
|
|
vfprintf(out, f, ap);
|
|
fputc('\n', out);
|
|
}
|
|
|
|
if (_abort_on_internal_errors < 0)
|
|
/* Set when env DM_ABORT_ON_INTERNAL_ERRORS is not "0" */
|
|
_abort_on_internal_errors =
|
|
strcmp(getenv("DM_ABORT_ON_INTERNAL_ERRORS") ? : "0", "0");
|
|
|
|
if (_abort_on_internal_errors &&
|
|
!strncmp(f, INTERNAL_ERROR, sizeof(INTERNAL_ERROR) - 1))
|
|
abort();
|
|
}
|
|
|
|
__attribute__((format(printf, 5, 6)))
|
|
static void _dmfilemapd_log_with_errno(int level,
|
|
const char *file, int line,
|
|
int dm_errno_or_class,
|
|
const char *f, ...)
|
|
{
|
|
va_list ap;
|
|
|
|
va_start(ap, f);
|
|
_dmfilemapd_log_line(level, file, line, dm_errno_or_class, f, ap);
|
|
va_end(ap);
|
|
}
|
|
|
|
/*
|
|
* Only used for reporting errors before daemonise().
|
|
*/
|
|
__attribute__((format(printf, 1, 2)))
|
|
static void _early_log(const char *fmt, ...)
|
|
{
|
|
va_list ap;
|
|
|
|
va_start(ap, fmt);
|
|
vfprintf(stderr, fmt, ap);
|
|
fputc('\n', stderr);
|
|
va_end(ap);
|
|
}
|
|
|
|
static void _setup_logging(void)
|
|
{
|
|
dm_log_init_verbose(_verbose - 1);
|
|
dm_log_with_errno_init(_dmfilemapd_log_with_errno);
|
|
}
|
|
|
|
#define PROC_FD_DELETED_STR "(deleted)"
|
|
/*
|
|
* Scan the /proc/<pid>/fd directory for pid and check for an fd
|
|
* symlink whose contents match path.
|
|
*/
|
|
static int _is_open_in_pid(pid_t pid, const char *path)
|
|
{
|
|
char deleted_path[PATH_MAX + sizeof(PROC_FD_DELETED_STR)];
|
|
struct dirent *pid_dp = NULL;
|
|
char path_buf[PATH_MAX];
|
|
char link_buf[PATH_MAX];
|
|
DIR *pid_d = NULL;
|
|
ssize_t len;
|
|
|
|
if (pid == getpid())
|
|
return 0;
|
|
|
|
if (dm_snprintf(path_buf, sizeof(path_buf),
|
|
DEFAULT_PROC_DIR "%d/fd", pid) < 0) {
|
|
log_error("Could not format pid path.");
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Test for the kernel 'file (deleted)' form when scanning.
|
|
*/
|
|
if (dm_snprintf(deleted_path, sizeof(deleted_path), "%s %s",
|
|
path, PROC_FD_DELETED_STR) < 0) {
|
|
log_error("Could not format check path.");
|
|
return 0;
|
|
}
|
|
|
|
pid_d = opendir(path_buf);
|
|
if (!pid_d) {
|
|
log_error("Could not open proc path: %s.", path_buf);
|
|
return 0;
|
|
}
|
|
|
|
while ((pid_dp = readdir(pid_d)) != NULL) {
|
|
if (pid_dp->d_name[0] == '.')
|
|
continue;
|
|
if ((len = readlinkat(dirfd(pid_d), pid_dp->d_name, link_buf,
|
|
sizeof(link_buf))) < 0) {
|
|
log_error("readlink failed for " DEFAULT_PROC_DIR
|
|
"/%d/fd/.", pid);
|
|
goto bad;
|
|
}
|
|
link_buf[len] = '\0';
|
|
if (!strcmp(deleted_path, link_buf)) {
|
|
if (closedir(pid_d))
|
|
log_sys_error("closedir", path_buf);
|
|
return 1;
|
|
}
|
|
}
|
|
|
|
bad:
|
|
if (closedir(pid_d))
|
|
log_sys_error("closedir", path_buf);
|
|
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* Attempt to determine whether a file is open by any process by
|
|
* scanning symbolic links in /proc/<pid>/fd.
|
|
*
|
|
* This is a heuristic since it cannot guarantee to detect brief
|
|
* access in all cases: a process that opens and then closes the
|
|
* file rapidly may never be seen by the scan.
|
|
*
|
|
* The method will also give false-positives if a process exists
|
|
* that has a deleted file open that had the same path, but a
|
|
* different inode number, to the file being monitored.
|
|
*
|
|
* For this reason the daemon only uses _is_open() for unlinked
|
|
* files when the mode is DM_FILEMAPD_FOLLOW_INODE, since these
|
|
* files can no longer be newly opened by processes.
|
|
*
|
|
* In this situation !is_open(path) provides an indication that
|
|
* the daemon should shut down: the file has been unlinked from
|
|
* the file system and we appear to hold the final reference.
|
|
*/
|
|
static int _is_open(const char *path)
|
|
{
|
|
struct dirent *proc_dp = NULL;
|
|
DIR *proc_d = NULL;
|
|
pid_t pid;
|
|
|
|
proc_d = opendir(DEFAULT_PROC_DIR);
|
|
if (!proc_d)
|
|
return 0;
|
|
while ((proc_dp = readdir(proc_d)) != NULL) {
|
|
if (!isdigit(proc_dp->d_name[0]))
|
|
continue;
|
|
pid = (pid_t) strtol(proc_dp->d_name, NULL, 10);
|
|
if (!pid)
|
|
continue;
|
|
if (_is_open_in_pid(pid, path)) {
|
|
if (closedir(proc_d))
|
|
log_sys_error("closedir", DEFAULT_PROC_DIR);
|
|
return 1;
|
|
}
|
|
}
|
|
|
|
if (closedir(proc_d))
|
|
log_sys_error("closedir", DEFAULT_PROC_DIR);
|
|
|
|
return 0;
|
|
}
|
|
|
|
static void _filemap_monitor_wait(uint64_t usecs)
|
|
{
|
|
if (_verbose) {
|
|
if (usecs == FILEMAPD_WAIT_USECS)
|
|
log_very_verbose("Waiting for check interval");
|
|
if (usecs == FILEMAPD_NOFILE_WAIT_USECS)
|
|
log_very_verbose("Waiting for unlinked path");
|
|
}
|
|
usleep((useconds_t) usecs);
|
|
}
|
|
|
|
static int _parse_args(int argc, char **argv, struct filemap_monitor *fm)
|
|
{
|
|
char *endptr;
|
|
|
|
/* we don't care what is in argv[0]. */
|
|
argc--;
|
|
argv++;
|
|
|
|
if (argc < 5) {
|
|
_early_log("Wrong number of arguments.");
|
|
_early_log("usage: %s", _usage);
|
|
return 0;
|
|
}
|
|
|
|
/*
|
|
* We don't know the true nr_regions at daemon start time,
|
|
* and it is not worth a dm_stats_list()/group walk to count:
|
|
* we can assume that there is at least one region or the
|
|
* daemon would not have been started.
|
|
*
|
|
* A correct value will be obtained following the first update
|
|
* of the group's regions.
|
|
*/
|
|
fm->nr_regions = 1;
|
|
|
|
/* parse <fd> */
|
|
fm->fd = (int) strtol(argv[0], &endptr, 10);
|
|
if (*endptr) {
|
|
_early_log("Could not parse file descriptor: %s", argv[0]);
|
|
return 0;
|
|
}
|
|
|
|
argc--;
|
|
argv++;
|
|
|
|
/* parse <group_id> */
|
|
fm->group_id = strtoull(argv[0], &endptr, 10);
|
|
if (*endptr) {
|
|
_early_log("Could not parse group identifier: %s", argv[0]);
|
|
return 0;
|
|
}
|
|
|
|
argc--;
|
|
argv++;
|
|
|
|
/* parse <path> */
|
|
if (!argv[0] || !strlen(argv[0])) {
|
|
_early_log("Path argument is required.");
|
|
return 0;
|
|
}
|
|
|
|
if (*argv[0] != '/') {
|
|
_early_log("Path argument must specify an absolute path.");
|
|
return 0;
|
|
}
|
|
|
|
fm->path = dm_strdup(argv[0]);
|
|
if (!fm->path) {
|
|
_early_log("Could not allocate memory for path argument.");
|
|
return 0;
|
|
}
|
|
|
|
argc--;
|
|
argv++;
|
|
|
|
/* parse <mode> */
|
|
if (!argv[0] || !strlen(argv[0])) {
|
|
_early_log("Mode argument is required.");
|
|
return 0;
|
|
}
|
|
|
|
fm->mode = dm_filemapd_mode_from_string(argv[0]);
|
|
if (fm->mode == DM_FILEMAPD_FOLLOW_NONE)
|
|
return 0;
|
|
|
|
argc--;
|
|
argv++;
|
|
|
|
/* parse [<foreground>[<verbose>]] */
|
|
if (argc) {
|
|
_foreground = (int) strtol(argv[0], &endptr, 10);
|
|
if (*endptr) {
|
|
_early_log("Could not parse debug argument: %s.",
|
|
argv[0]);
|
|
return 0;
|
|
}
|
|
argc--;
|
|
argv++;
|
|
if (argc) {
|
|
_verbose = (int) strtol(argv[0], &endptr, 10);
|
|
if (*endptr) {
|
|
_early_log("Could not parse verbose "
|
|
"argument: %s", argv[0]);
|
|
return 0;
|
|
}
|
|
if (_verbose < 0 || _verbose > 3) {
|
|
_early_log("Verbose argument out of range: %d.",
|
|
_verbose);
|
|
return 0;
|
|
}
|
|
}
|
|
}
|
|
return 1;
|
|
}
|
|
|
|
static int _filemap_fd_update_blocks(struct filemap_monitor *fm)
|
|
{
|
|
struct stat buf;
|
|
|
|
if (fm->fd < 0) {
|
|
log_error("Filemap fd is not open.");
|
|
return 0;
|
|
}
|
|
|
|
if (fstat(fm->fd, &buf)) {
|
|
log_error("Failed to fstat filemap file descriptor.");
|
|
return 0;
|
|
}
|
|
|
|
fm->blocks = buf.st_blocks;
|
|
|
|
return 1;
|
|
}
|
|
|
|
static int _filemap_fd_check_changed(struct filemap_monitor *fm)
|
|
{
|
|
int64_t old_blocks;
|
|
|
|
old_blocks = fm->blocks;
|
|
|
|
if (!_filemap_fd_update_blocks(fm))
|
|
return -1;
|
|
|
|
return (fm->blocks != old_blocks);
|
|
}
|
|
|
|
static void _filemap_monitor_close_fd(struct filemap_monitor *fm)
|
|
{
|
|
if (close(fm->fd))
|
|
log_error("Error closing file descriptor.");
|
|
fm->fd = -1;
|
|
}
|
|
|
|
static void _filemap_monitor_end_notify(struct filemap_monitor *fm)
|
|
{
|
|
inotify_rm_watch(fm->inotify_fd, fm->inotify_watch_fd);
|
|
}
|
|
|
|
static int _filemap_monitor_set_notify(struct filemap_monitor *fm)
|
|
{
|
|
int inotify_fd, watch_fd;
|
|
|
|
/*
|
|
* Set IN_NONBLOCK since we do not want to block in event read()
|
|
* calls. Do not set IN_CLOEXEC as dmfilemapd is single-threaded
|
|
* and does not fork or exec.
|
|
*/
|
|
if ((inotify_fd = inotify_init1(IN_NONBLOCK)) < 0) {
|
|
log_sys_error("inotify_init1", "IN_NONBLOCK");
|
|
return 0;
|
|
}
|
|
|
|
if ((watch_fd = inotify_add_watch(inotify_fd, fm->path,
|
|
IN_MODIFY | IN_DELETE_SELF)) < 0) {
|
|
log_sys_error("inotify_add_watch", fm->path);
|
|
return 0;
|
|
}
|
|
fm->inotify_fd = inotify_fd;
|
|
fm->inotify_watch_fd = watch_fd;
|
|
return 1;
|
|
}
|
|
|
|
static int _filemap_monitor_reopen_fd(struct filemap_monitor *fm)
|
|
{
|
|
int tries = FILEMAPD_NOFILE_WAIT_TRIES;
|
|
|
|
/*
|
|
* In DM_FILEMAPD_FOLLOW_PATH mode, inotify watches must be
|
|
* re-established whenever the file at the watched path is
|
|
* changed.
|
|
*
|
|
* FIXME: stat file and skip if inode is unchanged.
|
|
*/
|
|
if (fm->fd > 0)
|
|
log_error("Filemap file descriptor already open.");
|
|
|
|
while ((fm->fd < 0) && --tries)
|
|
if (((fm->fd = open(fm->path, O_RDONLY)) < 0) && tries)
|
|
_filemap_monitor_wait(FILEMAPD_NOFILE_WAIT_USECS);
|
|
|
|
if (!tries && (fm->fd < 0)) {
|
|
log_error("Could not re-open file descriptor.");
|
|
return 0;
|
|
}
|
|
|
|
return _filemap_monitor_set_notify(fm);
|
|
}
|
|
|
|
static int _filemap_monitor_get_events(struct filemap_monitor *fm)
|
|
{
|
|
/* alignment as per man(7) inotify */
|
|
char buf[sizeof(struct inotify_event) + NAME_MAX + 1]
|
|
__attribute__ ((aligned(__alignof__(struct inotify_event))));
|
|
|
|
struct inotify_event *event;
|
|
int check = 0;
|
|
ssize_t len;
|
|
char *ptr;
|
|
|
|
/*
|
|
* Close the file descriptor for the file being monitored here
|
|
* when mode=path: this will allow the inode to be de-allocated,
|
|
* and an IN_DELETE_SELF event generated in the case that the
|
|
* daemon is holding the last open reference to the file.
|
|
*/
|
|
if (fm->mode == DM_FILEMAPD_FOLLOW_PATH) {
|
|
_filemap_monitor_end_notify(fm);
|
|
_filemap_monitor_close_fd(fm);
|
|
}
|
|
|
|
len = read(fm->inotify_fd, (void *) &buf, sizeof(buf));
|
|
|
|
/* no events to read? */
|
|
if (len < 0 && (errno == EAGAIN))
|
|
goto out;
|
|
|
|
/* interrupted by signal? */
|
|
if (len < 0 && (errno == EINTR))
|
|
goto out;
|
|
|
|
if (len < 0)
|
|
return -1;
|
|
|
|
if (!len)
|
|
goto out;
|
|
|
|
for (ptr = buf; ptr < buf + len; ptr += sizeof(*event) + event->len) {
|
|
event = (struct inotify_event *) ptr;
|
|
if (event->mask & IN_DELETE_SELF)
|
|
fm->deleted = 1;
|
|
if (event->mask & IN_MODIFY)
|
|
check = 1;
|
|
/*
|
|
* Event IN_IGNORED is generated when a file has been deleted
|
|
* and IN_DELETE_SELF generated, and indicates that the file
|
|
* watch has been automatically removed.
|
|
*
|
|
* This can only happen for the DM_FILEMAPD_FOLLOW_PATH mode,
|
|
* since inotify IN_DELETE events are generated at the time
|
|
* the inode is destroyed: DM_FILEMAPD_FOLLOW_INODE will hold
|
|
* the file descriptor open, meaning that the event will not
|
|
* be generated until after the daemon closes the file.
|
|
*
|
|
* The event is ignored here since inotify monitoring will
|
|
* be reestablished (or the daemon will terminate) following
|
|
* deletion of a DM_FILEMAPD_FOLLOW_PATH monitored file.
|
|
*/
|
|
if (event->mask & IN_IGNORED)
|
|
log_very_verbose("Inotify watch removed: IN_IGNORED "
|
|
"in event->mask");
|
|
}
|
|
|
|
out:
|
|
/*
|
|
* Re-open file descriptor if required and log disposition.
|
|
*/
|
|
if (fm->mode == DM_FILEMAPD_FOLLOW_PATH)
|
|
if (!_filemap_monitor_reopen_fd(fm))
|
|
return -1;
|
|
|
|
log_very_verbose("exiting _filemap_monitor_get_events() with "
|
|
"deleted=%d, check=%d", fm->deleted, check);
|
|
return check;
|
|
}
|
|
|
|
static void _filemap_monitor_destroy(struct filemap_monitor *fm)
|
|
{
|
|
if (fm->fd > 0) {
|
|
_filemap_monitor_end_notify(fm);
|
|
_filemap_monitor_close_fd(fm);
|
|
}
|
|
dm_free((void *) fm->program_id);
|
|
dm_free(fm->path);
|
|
}
|
|
|
|
static int _filemap_monitor_check_same_file(int fd1, int fd2)
|
|
{
|
|
struct stat buf1, buf2;
|
|
|
|
if ((fd1 < 0) || (fd2 < 0))
|
|
return 0;
|
|
|
|
if (fstat(fd1, &buf1)) {
|
|
log_error("Failed to fstat file descriptor %d", fd1);
|
|
return -1;
|
|
}
|
|
|
|
if (fstat(fd2, &buf2)) {
|
|
log_error("Failed to fstat file descriptor %d", fd2);
|
|
return -1;
|
|
}
|
|
|
|
return ((buf1.st_dev == buf2.st_dev) && (buf1.st_ino == buf2.st_ino));
|
|
}
|
|
|
|
static int _filemap_monitor_check_file_unlinked(struct filemap_monitor *fm)
|
|
{
|
|
char path_buf[PATH_MAX];
|
|
char link_buf[PATH_MAX];
|
|
int same, fd;
|
|
ssize_t len;
|
|
|
|
fm->deleted = 0;
|
|
same = 0;
|
|
|
|
if ((fd = open(fm->path, O_RDONLY)) < 0)
|
|
goto check_unlinked;
|
|
|
|
same = _filemap_monitor_check_same_file(fm->fd, fd);
|
|
|
|
if (close(fd))
|
|
log_error("Error closing fd %d", fd);
|
|
|
|
if (same < 0)
|
|
return 0;
|
|
|
|
if (same)
|
|
return 1;
|
|
|
|
check_unlinked:
|
|
/*
|
|
* The file has been unlinked from its original location: test
|
|
* whether it is still reachable in the filesystem, or if it is
|
|
* unlinked and anonymous.
|
|
*/
|
|
if (dm_snprintf(path_buf, sizeof(path_buf), DEFAULT_PROC_DIR
|
|
"/%d/fd/%d", getpid(), fm->fd) < 0) {
|
|
log_error("Could not format pid path.");
|
|
return 0;
|
|
}
|
|
if ((len = readlink(path_buf, link_buf, sizeof(link_buf) - 1)) < 0) {
|
|
log_error("readlink failed for " DEFAULT_PROC_DIR "/%d/fd/%d.",
|
|
getpid(), fm->fd);
|
|
return 0;
|
|
}
|
|
link_buf[len] = '\0';
|
|
|
|
/*
|
|
* Try to re-open the file, from the path now reported in /proc/pid/fd.
|
|
*/
|
|
if ((fd = open(link_buf, O_RDONLY)) < 0)
|
|
fm->deleted = 1;
|
|
else
|
|
same = _filemap_monitor_check_same_file(fm->fd, fd);
|
|
|
|
if ((fd >= 0) && close(fd))
|
|
log_error("Error closing fd %d", fd);
|
|
|
|
if (same < 0)
|
|
return 0;
|
|
|
|
/* Should not happen with normal /proc. */
|
|
if ((fd > 0) && !same) {
|
|
log_error("File descriptor mismatch: %d and %s (read from %s) "
|
|
"are not the same file!", fm->fd, link_buf, path_buf);
|
|
return 0;
|
|
}
|
|
return 1;
|
|
}
|
|
|
|
static int _daemonise(struct filemap_monitor *fm)
|
|
{
|
|
pid_t pid = 0, sid;
|
|
int fd;
|
|
|
|
if (!(sid = setsid())) {
|
|
_early_log("setsid failed.");
|
|
return 0;
|
|
}
|
|
|
|
if ((pid = fork()) < 0) {
|
|
_early_log("Failed to fork daemon process.");
|
|
return 0;
|
|
}
|
|
|
|
if (pid > 0) {
|
|
if (_verbose)
|
|
_early_log("Started dmfilemapd with pid=%d", pid);
|
|
exit(0);
|
|
}
|
|
|
|
if (chdir("/")) {
|
|
_early_log("Failed to change directory.");
|
|
return 0;
|
|
}
|
|
|
|
if (!_verbose) {
|
|
if (close(STDIN_FILENO))
|
|
_early_log("Error closing stdin");
|
|
if (close(STDOUT_FILENO))
|
|
_early_log("Error closing stdout");
|
|
if (close(STDERR_FILENO))
|
|
_early_log("Error closing stderr");
|
|
if ((open("/dev/null", O_RDONLY) < 0) ||
|
|
(open("/dev/null", O_WRONLY) < 0) ||
|
|
(open("/dev/null", O_WRONLY) < 0)) {
|
|
_early_log("Error opening stdio streams.");
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
for (fd = (int) sysconf(_SC_OPEN_MAX) - 1; fd > STDERR_FILENO; fd--) {
|
|
if (fd == fm->fd)
|
|
continue;
|
|
close(fd);
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
static int _update_regions(struct dm_stats *dms, struct filemap_monitor *fm)
|
|
{
|
|
uint64_t *regions = NULL, *region, nr_regions = 0;
|
|
|
|
regions = dm_stats_update_regions_from_fd(dms, fm->fd, fm->group_id);
|
|
if (!regions) {
|
|
log_error("Failed to update filemap regions for group_id="
|
|
FMTu64 ".", fm->group_id);
|
|
return 0;
|
|
}
|
|
|
|
for (region = regions; *region != DM_STATS_REGIONS_ALL; region++)
|
|
nr_regions++;
|
|
|
|
if (!nr_regions)
|
|
log_warn("File contains no extents: exiting.");
|
|
|
|
if (nr_regions && (regions[0] != fm->group_id)) {
|
|
log_warn("group_id changed from " FMTu64 " to " FMTu64,
|
|
fm->group_id, regions[0]);
|
|
fm->group_id = regions[0];
|
|
}
|
|
dm_free(regions);
|
|
fm->nr_regions = nr_regions;
|
|
return 1;
|
|
}
|
|
|
|
static int _dmfilemapd(struct filemap_monitor *fm)
|
|
{
|
|
int running = 1, check = 0, open = 0;
|
|
const char *program_id;
|
|
struct dm_stats *dms;
|
|
|
|
/*
|
|
* The correct program_id is retrieved from the group leader
|
|
* following the call to dm_stats_list().
|
|
*/
|
|
if (!(dms = dm_stats_create(NULL)))
|
|
goto_bad;
|
|
|
|
if (!dm_stats_bind_from_fd(dms, fm->fd)) {
|
|
log_error("Could not bind dm_stats handle to file descriptor "
|
|
"%d", fm->fd);
|
|
goto bad;
|
|
}
|
|
|
|
if (!_filemap_monitor_set_notify(fm))
|
|
goto bad;
|
|
|
|
if (!_filemap_fd_update_blocks(fm))
|
|
goto bad;
|
|
|
|
if (!dm_stats_list(dms, DM_STATS_ALL_PROGRAMS)) {
|
|
log_error("Failed to list stats handle.");
|
|
goto bad;
|
|
}
|
|
|
|
/*
|
|
* Take the program_id for new regions (created by calls to
|
|
* dm_stats_update_regions_from_fd()) from the value used by
|
|
* the group leader.
|
|
*/
|
|
program_id = dm_stats_get_region_program_id(dms, fm->group_id);
|
|
if (program_id)
|
|
fm->program_id = dm_strdup(program_id);
|
|
else
|
|
fm->program_id = NULL;
|
|
dm_stats_set_program_id(dms, 1, program_id);
|
|
|
|
do {
|
|
if (!dm_stats_group_present(dms, fm->group_id)) {
|
|
log_info("Filemap group removed: exiting.");
|
|
running = 0;
|
|
continue;
|
|
}
|
|
|
|
if ((check = _filemap_monitor_get_events(fm)) < 0)
|
|
goto bad;
|
|
|
|
if (!check)
|
|
goto wait;
|
|
|
|
if ((check = _filemap_fd_check_changed(fm)) < 0)
|
|
goto bad;
|
|
|
|
if (check && !_update_regions(dms, fm))
|
|
goto bad;
|
|
|
|
running = !!fm->nr_regions;
|
|
if (!running)
|
|
continue;
|
|
|
|
wait:
|
|
_filemap_monitor_wait(FILEMAPD_WAIT_USECS);
|
|
|
|
/* mode=inode termination condions */
|
|
if (fm->mode == DM_FILEMAPD_FOLLOW_INODE) {
|
|
if (!_filemap_monitor_check_file_unlinked(fm))
|
|
goto bad;
|
|
if (fm->deleted && !(open = _is_open(fm->path))) {
|
|
log_info("File unlinked and closed: exiting.");
|
|
running = 0;
|
|
} else if (fm->deleted && open)
|
|
log_verbose("File unlinked and open: "
|
|
"continuing.");
|
|
}
|
|
|
|
if (!dm_stats_list(dms, NULL)) {
|
|
log_error("Failed to list stats handle.");
|
|
goto bad;
|
|
}
|
|
|
|
} while (running);
|
|
|
|
_filemap_monitor_destroy(fm);
|
|
dm_stats_destroy(dms);
|
|
return 0;
|
|
|
|
bad:
|
|
_filemap_monitor_destroy(fm);
|
|
dm_stats_destroy(dms);
|
|
log_error("Exiting");
|
|
return 1;
|
|
}
|
|
|
|
static const char * _mode_names[] = {
|
|
"inode",
|
|
"path"
|
|
};
|
|
|
|
/*
|
|
* dmfilemapd <fd> <group_id> <path> <mode> [<foreground>[<log_level>]]
|
|
*/
|
|
int main(int argc, char **argv)
|
|
{
|
|
struct filemap_monitor fm;
|
|
|
|
memset(&fm, 0, sizeof(fm));
|
|
|
|
if (!_parse_args(argc, argv, &fm)) {
|
|
dm_free(fm.path);
|
|
return 1;
|
|
}
|
|
|
|
_setup_logging();
|
|
|
|
log_info("Starting dmfilemapd with fd=%d, group_id=" FMTu64 " "
|
|
"mode=%s, path=%s", fm.fd, fm.group_id,
|
|
_mode_names[fm.mode], fm.path);
|
|
|
|
if (!_foreground && !_daemonise(&fm))
|
|
return 1;
|
|
|
|
return _dmfilemapd(&fm);
|
|
}
|