2012-02-27 19:37:16 +05:30
|
|
|
// Copyright (C) 2011 Red Hat, Inc. All rights reserved.
|
|
|
|
//
|
|
|
|
// This file is part of the thin-provisioning-tools source.
|
|
|
|
//
|
|
|
|
// thin-provisioning-tools is free software: you can redistribute it
|
|
|
|
// and/or modify it under the terms of the GNU General Public License
|
|
|
|
// as published by the Free Software Foundation, either version 3 of
|
|
|
|
// the License, or (at your option) any later version.
|
|
|
|
//
|
|
|
|
// thin-provisioning-tools is distributed in the hope that it will be
|
|
|
|
// useful, but WITHOUT ANY WARRANTY; without even the implied warranty
|
|
|
|
// of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU General Public License along
|
|
|
|
// with thin-provisioning-tools. If not, see
|
|
|
|
// <http://www.gnu.org/licenses/>.
|
|
|
|
|
|
|
|
#include <iostream>
|
|
|
|
#include <getopt.h>
|
|
|
|
#include <libgen.h>
|
|
|
|
|
|
|
|
#include "version.h"
|
|
|
|
|
2013-08-16 18:37:04 +05:30
|
|
|
#include "base/error_state.h"
|
2013-08-16 18:18:25 +05:30
|
|
|
#include "base/nested_output.h"
|
2013-05-21 20:19:20 +05:30
|
|
|
#include "persistent-data/space-maps/core.h"
|
2013-09-11 16:10:46 +05:30
|
|
|
#include "persistent-data/file_utils.h"
|
2013-05-21 19:08:33 +05:30
|
|
|
#include "thin-provisioning/device_tree.h"
|
|
|
|
#include "thin-provisioning/mapping_tree.h"
|
|
|
|
#include "thin-provisioning/superblock.h"
|
|
|
|
|
2013-08-16 18:37:04 +05:30
|
|
|
using namespace base;
|
2012-02-27 19:37:16 +05:30
|
|
|
using namespace std;
|
|
|
|
using namespace thin_provisioning;
|
|
|
|
|
2013-05-21 19:08:33 +05:30
|
|
|
//----------------------------------------------------------------
|
|
|
|
|
2012-02-27 19:37:16 +05:30
|
|
|
namespace {
|
2013-05-21 20:19:20 +05:30
|
|
|
//--------------------------------
|
|
|
|
|
|
|
|
block_manager<>::ptr
|
|
|
|
open_bm(string const &path) {
|
2013-05-21 19:08:33 +05:30
|
|
|
block_address nr_blocks = get_nr_blocks(path);
|
2013-08-15 15:05:07 +05:30
|
|
|
block_io<>::mode m = block_io<>::READ_ONLY;
|
2013-05-21 19:08:33 +05:30
|
|
|
return block_manager<>::ptr(new block_manager<>(path, nr_blocks, 1, m));
|
|
|
|
}
|
|
|
|
|
2013-05-21 20:19:20 +05:30
|
|
|
transaction_manager::ptr
|
|
|
|
open_tm(block_manager<>::ptr bm) {
|
|
|
|
space_map::ptr sm(new core_map(bm->get_nr_blocks()));
|
|
|
|
sm->inc(superblock_detail::SUPERBLOCK_LOCATION);
|
|
|
|
transaction_manager::ptr tm(new transaction_manager(bm, sm));
|
|
|
|
return tm;
|
|
|
|
}
|
|
|
|
|
|
|
|
//--------------------------------
|
|
|
|
|
2013-05-21 19:08:33 +05:30
|
|
|
class superblock_reporter : public superblock_detail::damage_visitor {
|
|
|
|
public:
|
2013-05-21 19:35:25 +05:30
|
|
|
superblock_reporter(nested_output &out)
|
2013-05-21 19:08:33 +05:30
|
|
|
: out_(out),
|
|
|
|
err_(NO_ERROR) {
|
|
|
|
}
|
|
|
|
|
|
|
|
virtual void visit(superblock_detail::superblock_corruption const &d) {
|
2013-05-21 19:35:25 +05:30
|
|
|
out_ << "superblock is corrupt" << end_message();
|
2013-05-21 20:19:20 +05:30
|
|
|
{
|
2013-08-08 15:19:59 +05:30
|
|
|
nested_output::nest _ = out_.push();
|
2013-05-21 20:19:20 +05:30
|
|
|
out_ << d.desc_ << end_message();
|
|
|
|
}
|
2013-05-21 19:08:33 +05:30
|
|
|
err_ = combine_errors(err_, FATAL);
|
|
|
|
}
|
|
|
|
|
2013-08-16 18:37:04 +05:30
|
|
|
base::error_state get_error() const {
|
2013-05-21 19:08:33 +05:30
|
|
|
return err_;
|
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
2013-05-21 19:35:25 +05:30
|
|
|
nested_output &out_;
|
2013-05-21 19:08:33 +05:30
|
|
|
error_state err_;
|
|
|
|
};
|
|
|
|
|
2013-05-21 20:19:20 +05:30
|
|
|
//--------------------------------
|
|
|
|
|
|
|
|
class devices_reporter : public device_tree_detail::damage_visitor {
|
|
|
|
public:
|
|
|
|
devices_reporter(nested_output &out)
|
|
|
|
: out_(out),
|
|
|
|
err_(NO_ERROR) {
|
|
|
|
}
|
|
|
|
|
|
|
|
virtual void visit(device_tree_detail::missing_devices const &d) {
|
|
|
|
out_ << "missing devices: " << d.keys_ << end_message();
|
|
|
|
{
|
2013-08-08 15:19:59 +05:30
|
|
|
nested_output::nest _ = out_.push();
|
2013-05-21 20:19:20 +05:30
|
|
|
out_ << d.desc_ << end_message();
|
|
|
|
}
|
|
|
|
|
|
|
|
err_ = combine_errors(err_, FATAL);
|
|
|
|
}
|
|
|
|
|
|
|
|
error_state get_error() const {
|
|
|
|
return err_;
|
|
|
|
}
|
|
|
|
|
|
|
|
private:
|
|
|
|
nested_output &out_;
|
|
|
|
error_state err_;
|
|
|
|
};
|
|
|
|
|
|
|
|
//--------------------------------
|
|
|
|
|
2013-05-22 19:25:28 +05:30
|
|
|
class mapping_reporter : public mapping_tree_detail::damage_visitor {
|
|
|
|
public:
|
|
|
|
mapping_reporter(nested_output &out)
|
2013-08-15 20:56:17 +05:30
|
|
|
: out_(out),
|
|
|
|
err_(NO_ERROR) {
|
2013-05-22 19:25:28 +05:30
|
|
|
}
|
|
|
|
|
|
|
|
virtual void visit(mapping_tree_detail::missing_devices const &d) {
|
|
|
|
out_ << "missing all mappings for devices: " << d.keys_ << end_message();
|
|
|
|
{
|
2013-08-08 15:19:59 +05:30
|
|
|
nested_output::nest _ = out_.push();
|
2013-05-22 19:25:28 +05:30
|
|
|
out_ << d.desc_ << end_message();
|
|
|
|
}
|
|
|
|
err_ = combine_errors(err_, FATAL);
|
|
|
|
}
|
|
|
|
|
|
|
|
virtual void visit(mapping_tree_detail::missing_mappings const &d) {
|
|
|
|
out_ << "thin device " << d.thin_dev_ << " is missing mappings " << d.keys_ << end_message();
|
|
|
|
{
|
2013-08-08 15:19:59 +05:30
|
|
|
nested_output::nest _ = out_.push();
|
2013-05-22 19:25:28 +05:30
|
|
|
out_ << d.desc_ << end_message();
|
|
|
|
}
|
|
|
|
err_ = combine_errors(err_, FATAL);
|
|
|
|
}
|
|
|
|
|
2013-10-15 15:10:26 +05:30
|
|
|
error_state get_error() const {
|
|
|
|
return err_;
|
|
|
|
}
|
|
|
|
|
2013-05-22 19:25:28 +05:30
|
|
|
private:
|
|
|
|
nested_output &out_;
|
|
|
|
error_state err_;
|
|
|
|
};
|
|
|
|
|
|
|
|
//--------------------------------
|
|
|
|
|
2013-05-23 15:55:54 +05:30
|
|
|
struct flags {
|
2014-03-27 17:30:17 +05:30
|
|
|
flags()
|
|
|
|
: check_device_tree(true),
|
|
|
|
check_mapping_tree_level1(true),
|
|
|
|
check_mapping_tree_level2(true),
|
|
|
|
ignore_non_fatal_errors(false),
|
|
|
|
quiet(false),
|
|
|
|
clear_needs_check_flag_on_success(false) {
|
|
|
|
}
|
|
|
|
|
2013-05-23 15:55:54 +05:30
|
|
|
bool check_device_tree;
|
|
|
|
bool check_mapping_tree_level1;
|
|
|
|
bool check_mapping_tree_level2;
|
2013-05-23 16:27:02 +05:30
|
|
|
|
|
|
|
bool ignore_non_fatal_errors;
|
2013-06-19 17:08:14 +05:30
|
|
|
|
|
|
|
bool quiet;
|
2014-03-27 17:30:17 +05:30
|
|
|
bool clear_needs_check_flag_on_success;
|
2013-05-23 15:55:54 +05:30
|
|
|
};
|
|
|
|
|
|
|
|
error_state metadata_check(string const &path, flags fs) {
|
2013-05-21 19:08:33 +05:30
|
|
|
block_manager<>::ptr bm = open_bm(path);
|
|
|
|
|
2013-05-21 19:35:25 +05:30
|
|
|
nested_output out(cerr, 2);
|
2013-06-19 17:42:44 +05:30
|
|
|
if (fs.quiet)
|
|
|
|
out.disable();
|
|
|
|
|
2013-05-21 20:19:20 +05:30
|
|
|
superblock_reporter sb_rep(out);
|
|
|
|
devices_reporter dev_rep(out);
|
2013-05-22 19:25:28 +05:30
|
|
|
mapping_reporter mapping_rep(out);
|
2013-05-21 20:19:20 +05:30
|
|
|
|
2013-05-21 19:35:25 +05:30
|
|
|
out << "examining superblock" << end_message();
|
|
|
|
{
|
2013-08-08 15:19:59 +05:30
|
|
|
nested_output::nest _ = out.push();
|
2013-05-21 19:35:25 +05:30
|
|
|
check_superblock(bm, sb_rep);
|
2013-05-21 20:19:20 +05:30
|
|
|
}
|
2013-05-21 19:35:25 +05:30
|
|
|
|
2013-05-21 20:19:20 +05:30
|
|
|
if (sb_rep.get_error() == FATAL)
|
|
|
|
return FATAL;
|
|
|
|
|
2013-05-22 19:25:28 +05:30
|
|
|
superblock_detail::superblock sb = read_superblock(bm);
|
|
|
|
transaction_manager::ptr tm = open_tm(bm);
|
|
|
|
|
2013-05-23 15:55:54 +05:30
|
|
|
if (fs.check_device_tree) {
|
|
|
|
out << "examining devices tree" << end_message();
|
|
|
|
{
|
2013-08-08 15:19:59 +05:30
|
|
|
nested_output::nest _ = out.push();
|
2013-05-23 15:55:54 +05:30
|
|
|
device_tree dtree(tm, sb.device_details_root_,
|
|
|
|
device_tree_detail::device_details_traits::ref_counter());
|
|
|
|
check_device_tree(dtree, dev_rep);
|
|
|
|
}
|
2013-05-21 19:35:25 +05:30
|
|
|
}
|
2013-05-21 20:19:20 +05:30
|
|
|
|
2013-05-23 15:55:54 +05:30
|
|
|
if (fs.check_mapping_tree_level1 && !fs.check_mapping_tree_level2) {
|
|
|
|
out << "examining top level of mapping tree" << end_message();
|
|
|
|
{
|
2013-08-08 15:19:59 +05:30
|
|
|
nested_output::nest _ = out.push();
|
2013-05-23 15:55:54 +05:30
|
|
|
dev_tree dtree(tm, sb.data_mapping_root_,
|
|
|
|
mapping_tree_detail::mtree_traits::ref_counter(tm));
|
|
|
|
check_mapping_tree(dtree, mapping_rep);
|
|
|
|
}
|
|
|
|
|
|
|
|
} else if (fs.check_mapping_tree_level2) {
|
|
|
|
out << "examining mapping tree" << end_message();
|
|
|
|
{
|
2013-08-08 15:19:59 +05:30
|
|
|
nested_output::nest _ = out.push();
|
2013-05-23 15:55:54 +05:30
|
|
|
mapping_tree mtree(tm, sb.data_mapping_root_,
|
|
|
|
mapping_tree_detail::block_traits::ref_counter(tm->get_sm()));
|
|
|
|
check_mapping_tree(mtree, mapping_rep);
|
|
|
|
}
|
2013-05-22 19:25:28 +05:30
|
|
|
}
|
|
|
|
|
2013-05-21 20:19:20 +05:30
|
|
|
return combine_errors(sb_rep.get_error(),
|
2013-10-15 15:10:26 +05:30
|
|
|
combine_errors(mapping_rep.get_error(),
|
|
|
|
dev_rep.get_error()));
|
2013-05-21 19:08:33 +05:30
|
|
|
}
|
|
|
|
|
2014-03-27 17:30:17 +05:30
|
|
|
void clear_needs_check(string const &path) {
|
|
|
|
block_manager<>::ptr bm = open_bm(path, block_io<>::READ_WRITE);
|
|
|
|
|
|
|
|
superblock_detail::superblock sb = read_superblock(bm);
|
|
|
|
sb.set_needs_check_flag(false);
|
|
|
|
write_superblock(bm, sb);
|
|
|
|
}
|
|
|
|
|
|
|
|
bool check(string const &path, flags fs) {
|
2013-05-21 19:08:33 +05:30
|
|
|
error_state err;
|
2014-03-27 17:30:17 +05:30
|
|
|
bool success = false;
|
2013-05-21 19:08:33 +05:30
|
|
|
|
2012-03-02 15:30:31 +05:30
|
|
|
try {
|
2013-05-23 15:55:54 +05:30
|
|
|
err = metadata_check(path, fs);
|
2013-05-21 19:08:33 +05:30
|
|
|
|
2014-03-27 17:30:17 +05:30
|
|
|
if (fs.ignore_non_fatal_errors)
|
|
|
|
success = (err == FATAL) ? 1 : 0;
|
|
|
|
else
|
|
|
|
success = (err == NO_ERROR) ? 0 : 1;
|
|
|
|
|
|
|
|
if (success && fs.clear_needs_check_flag_on_success)
|
|
|
|
clear_needs_check(path);
|
|
|
|
|
2012-03-02 15:30:31 +05:30
|
|
|
} catch (std::exception &e) {
|
2013-06-19 17:08:14 +05:30
|
|
|
if (!fs.quiet)
|
|
|
|
cerr << e.what() << endl;
|
|
|
|
|
2012-02-27 19:37:16 +05:30
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2014-03-27 17:30:17 +05:30
|
|
|
return success;
|
2012-02-27 19:37:16 +05:30
|
|
|
}
|
|
|
|
|
2012-03-13 19:36:10 +05:30
|
|
|
void usage(ostream &out, string const &cmd) {
|
|
|
|
out << "Usage: " << cmd << " [options] {device|file}" << endl
|
|
|
|
<< "Options:" << endl
|
|
|
|
<< " {-q|--quiet}" << endl
|
|
|
|
<< " {-h|--help}" << endl
|
2013-04-11 18:10:47 +05:30
|
|
|
<< " {-V|--version}" << endl
|
2014-03-27 17:30:17 +05:30
|
|
|
<< " {--clear-needs-check-flag}" << endl
|
|
|
|
<< " {--ignore-non-fatal-errors}" << endl
|
2013-05-23 16:27:02 +05:30
|
|
|
<< " {--skip-mappings}" << endl
|
2014-03-27 17:30:17 +05:30
|
|
|
<< " {--super-block-only}" << endl;
|
2012-02-27 19:37:16 +05:30
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
int main(int argc, char **argv)
|
|
|
|
{
|
|
|
|
int c;
|
2013-08-15 15:05:07 +05:30
|
|
|
flags fs;
|
2013-07-29 15:59:05 +05:30
|
|
|
|
2013-05-23 18:27:15 +05:30
|
|
|
char const shortopts[] = "qhV";
|
|
|
|
option const longopts[] = {
|
2012-03-02 18:29:59 +05:30
|
|
|
{ "quiet", no_argument, NULL, 'q'},
|
2012-02-27 19:37:16 +05:30
|
|
|
{ "help", no_argument, NULL, 'h'},
|
|
|
|
{ "version", no_argument, NULL, 'V'},
|
2013-04-23 19:51:44 +05:30
|
|
|
{ "super-block-only", no_argument, NULL, 1},
|
2013-05-23 15:55:54 +05:30
|
|
|
{ "skip-mappings", no_argument, NULL, 2},
|
2013-05-23 16:27:02 +05:30
|
|
|
{ "ignore-non-fatal-errors", no_argument, NULL, 3},
|
2014-03-27 17:30:17 +05:30
|
|
|
{ "clear-needs-check-flag", no_argument, NULL, 4 },
|
2012-02-27 19:37:16 +05:30
|
|
|
{ NULL, no_argument, NULL, 0 }
|
|
|
|
};
|
|
|
|
|
|
|
|
while ((c = getopt_long(argc, argv, shortopts, longopts, NULL)) != -1) {
|
|
|
|
switch(c) {
|
|
|
|
case 'h':
|
2012-03-13 19:36:10 +05:30
|
|
|
usage(cout, basename(argv[0]));
|
2012-02-27 19:37:16 +05:30
|
|
|
return 0;
|
2012-03-02 18:29:59 +05:30
|
|
|
|
|
|
|
case 'q':
|
2013-06-19 17:08:14 +05:30
|
|
|
fs.quiet = true;
|
2012-03-02 18:29:59 +05:30
|
|
|
break;
|
|
|
|
|
2012-02-27 19:37:16 +05:30
|
|
|
case 'V':
|
2012-03-13 18:02:30 +05:30
|
|
|
cout << THIN_PROVISIONING_TOOLS_VERSION << endl;
|
2012-02-27 19:37:16 +05:30
|
|
|
return 0;
|
2012-03-13 18:02:30 +05:30
|
|
|
|
2013-04-23 19:51:44 +05:30
|
|
|
case 1:
|
2013-05-23 15:55:54 +05:30
|
|
|
// super-block-only
|
|
|
|
fs.check_device_tree = false;
|
|
|
|
fs.check_mapping_tree_level1 = false;
|
|
|
|
fs.check_mapping_tree_level2 = false;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case 2:
|
|
|
|
// skip-mappings
|
|
|
|
fs.check_mapping_tree_level2 = false;
|
2013-04-23 19:51:44 +05:30
|
|
|
break;
|
|
|
|
|
2013-05-23 16:27:02 +05:30
|
|
|
case 3:
|
|
|
|
// ignore-non-fatal-errors
|
|
|
|
fs.ignore_non_fatal_errors = true;
|
|
|
|
break;
|
|
|
|
|
2014-03-27 17:30:17 +05:30
|
|
|
case 4:
|
|
|
|
// clear needs-check flag
|
|
|
|
fs.clear_needs_check_flag_on_success = true;
|
|
|
|
break;
|
|
|
|
|
2012-03-06 00:04:05 +05:30
|
|
|
default:
|
2012-03-13 19:36:10 +05:30
|
|
|
usage(cerr, basename(argv[0]));
|
2012-03-06 00:04:05 +05:30
|
|
|
return 1;
|
2012-02-27 19:37:16 +05:30
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2012-03-06 00:04:05 +05:30
|
|
|
if (argc == optind) {
|
2013-06-19 17:08:14 +05:30
|
|
|
if (!fs.quiet) {
|
|
|
|
cerr << "No input file provided." << endl;
|
|
|
|
usage(cerr, basename(argv[0]));
|
|
|
|
}
|
|
|
|
|
2012-02-27 19:37:16 +05:30
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
2013-05-23 15:55:54 +05:30
|
|
|
return check(argv[optind], fs);
|
2012-02-27 19:37:16 +05:30
|
|
|
}
|