]> git.proxmox.com Git - ceph.git/blob - ceph/src/ceph_osd.cc
a27ffb8548ff095b5383c4d58a57b93d48f1d91c
[ceph.git] / ceph / src / ceph_osd.cc
1 // -*- mode:C++; tab-width:8; c-basic-offset:2; indent-tabs-mode:t -*-
2 // vim: ts=8 sw=2 smarttab
3 /*
4 * Ceph - scalable distributed file system
5 *
6 * Copyright (C) 2004-2006 Sage Weil <sage@newdream.net>
7 *
8 * This is free software; you can redistribute it and/or
9 * modify it under the terms of the GNU Lesser General Public
10 * License version 2.1, as published by the Free Software
11 * Foundation. See file COPYING.
12 *
13 */
14
15 #include <sys/types.h>
16 #include <sys/stat.h>
17 #include <fcntl.h>
18 #include <boost/scoped_ptr.hpp>
19
20 #include <iostream>
21 #include <string>
22 using namespace std;
23
24 #include "osd/OSD.h"
25 #include "os/ObjectStore.h"
26 #include "mon/MonClient.h"
27 #include "include/ceph_features.h"
28
29 #include "common/config.h"
30
31 #include "mon/MonMap.h"
32
33 #include "msg/Messenger.h"
34
35 #include "common/Timer.h"
36 #include "common/TracepointProvider.h"
37 #include "common/ceph_argparse.h"
38
39 #include "global/global_init.h"
40 #include "global/signal_handler.h"
41
42 #include "include/color.h"
43 #include "common/errno.h"
44 #include "common/pick_address.h"
45
46 #include "perfglue/heap_profiler.h"
47
48 #include "include/assert.h"
49
50 #define dout_context g_ceph_context
51 #define dout_subsys ceph_subsys_osd
52
53 namespace {
54
55 TracepointProvider::Traits osd_tracepoint_traits("libosd_tp.so",
56 "osd_tracing");
57 TracepointProvider::Traits os_tracepoint_traits("libos_tp.so",
58 "osd_objectstore_tracing");
59 #ifdef WITH_OSD_INSTRUMENT_FUNCTIONS
60 TracepointProvider::Traits cyg_profile_traits("libcyg_profile_tp.so",
61 "osd_function_tracing");
62 #endif
63
64 } // anonymous namespace
65
66 OSD *osd = NULL;
67
68 void handle_osd_signal(int signum)
69 {
70 if (osd)
71 osd->handle_signal(signum);
72 }
73
74 static void usage()
75 {
76 cout << "usage: ceph-osd -i <ID> [flags]\n"
77 << " --osd-data PATH data directory\n"
78 << " --osd-journal PATH\n"
79 << " journal file or block device\n"
80 << " --mkfs create a [new] data directory\n"
81 << " --mkkey generate a new secret key. This is normally used in combination with --mkfs\n"
82 << " --convert-filestore\n"
83 << " run any pending upgrade operations\n"
84 << " --flush-journal flush all data out of journal\n"
85 << " --mkjournal initialize a new journal\n"
86 << " --check-wants-journal\n"
87 << " check whether a journal is desired\n"
88 << " --check-allows-journal\n"
89 << " check whether a journal is allowed\n"
90 << " --check-needs-journal\n"
91 << " check whether a journal is required\n"
92 << " --debug_osd <N> set debug level (e.g. 10)\n"
93 << " --get-device-fsid PATH\n"
94 << " get OSD fsid for the given block device\n"
95 << std::endl;
96 generic_server_usage();
97 }
98
99 #ifdef BUILDING_FOR_EMBEDDED
100 void cephd_preload_embedded_plugins();
101 void cephd_preload_rados_classes(OSD *osd);
102 extern "C" int cephd_osd(int argc, const char **argv)
103 #else
104 int main(int argc, const char **argv)
105 #endif
106 {
107 vector<const char*> args;
108 argv_to_vec(argc, argv, args);
109 env_to_vec(args);
110
111 vector<const char*> def_args;
112 // We want to enable leveldb's log, while allowing users to override this
113 // option, therefore we will pass it as a default argument to global_init().
114 def_args.push_back("--leveldb-log=");
115
116 auto cct = global_init(&def_args, args, CEPH_ENTITY_TYPE_OSD,
117 CODE_ENVIRONMENT_DAEMON,
118 0, "osd_data");
119 ceph_heap_profiler_init();
120
121 // osd specific args
122 bool mkfs = false;
123 bool mkjournal = false;
124 bool check_wants_journal = false;
125 bool check_allows_journal = false;
126 bool check_needs_journal = false;
127 bool mkkey = false;
128 bool flushjournal = false;
129 bool dump_journal = false;
130 bool convertfilestore = false;
131 bool get_osd_fsid = false;
132 bool get_cluster_fsid = false;
133 bool get_journal_fsid = false;
134 bool get_device_fsid = false;
135 string device_path;
136 std::string dump_pg_log;
137
138 std::string val;
139 for (std::vector<const char*>::iterator i = args.begin(); i != args.end(); ) {
140 if (ceph_argparse_double_dash(args, i)) {
141 break;
142 } else if (ceph_argparse_flag(args, i, "-h", "--help", (char*)NULL)) {
143 usage();
144 } else if (ceph_argparse_flag(args, i, "--mkfs", (char*)NULL)) {
145 mkfs = true;
146 } else if (ceph_argparse_flag(args, i, "--mkjournal", (char*)NULL)) {
147 mkjournal = true;
148 } else if (ceph_argparse_flag(args, i, "--check-allows-journal", (char*)NULL)) {
149 check_allows_journal = true;
150 } else if (ceph_argparse_flag(args, i, "--check-wants-journal", (char*)NULL)) {
151 check_wants_journal = true;
152 } else if (ceph_argparse_flag(args, i, "--check-needs-journal", (char*)NULL)) {
153 check_needs_journal = true;
154 } else if (ceph_argparse_flag(args, i, "--mkkey", (char*)NULL)) {
155 mkkey = true;
156 } else if (ceph_argparse_flag(args, i, "--flush-journal", (char*)NULL)) {
157 flushjournal = true;
158 } else if (ceph_argparse_flag(args, i, "--convert-filestore", (char*)NULL)) {
159 convertfilestore = true;
160 } else if (ceph_argparse_witharg(args, i, &val, "--dump-pg-log", (char*)NULL)) {
161 dump_pg_log = val;
162 } else if (ceph_argparse_flag(args, i, "--dump-journal", (char*)NULL)) {
163 dump_journal = true;
164 } else if (ceph_argparse_flag(args, i, "--get-cluster-fsid", (char*)NULL)) {
165 get_cluster_fsid = true;
166 } else if (ceph_argparse_flag(args, i, "--get-osd-fsid", "--get-osd-uuid", (char*)NULL)) {
167 get_osd_fsid = true;
168 } else if (ceph_argparse_flag(args, i, "--get-journal-fsid", "--get-journal-uuid", (char*)NULL)) {
169 get_journal_fsid = true;
170 } else if (ceph_argparse_witharg(args, i, &device_path,
171 "--get-device-fsid", (char*)NULL)) {
172 get_device_fsid = true;
173 } else {
174 ++i;
175 }
176 }
177 if (!args.empty()) {
178 derr << "unrecognized arg " << args[0] << dendl;
179 usage();
180 }
181
182 if (get_journal_fsid) {
183 device_path = g_conf->osd_journal;
184 get_device_fsid = true;
185 }
186 if (get_device_fsid) {
187 uuid_d uuid;
188 int r = ObjectStore::probe_block_device_fsid(g_ceph_context, device_path,
189 &uuid);
190 if (r < 0) {
191 cerr << "failed to get device fsid for " << device_path
192 << ": " << cpp_strerror(r) << std::endl;
193 exit(1);
194 }
195 cout << uuid << std::endl;
196 return 0;
197 }
198
199 if (!dump_pg_log.empty()) {
200 common_init_finish(g_ceph_context);
201 bufferlist bl;
202 std::string error;
203 int r = bl.read_file(dump_pg_log.c_str(), &error);
204 if (r >= 0) {
205 pg_log_entry_t e;
206 bufferlist::iterator p = bl.begin();
207 while (!p.end()) {
208 uint64_t pos = p.get_off();
209 try {
210 ::decode(e, p);
211 }
212 catch (const buffer::error &e) {
213 derr << "failed to decode LogEntry at offset " << pos << dendl;
214 return 1;
215 }
216 derr << pos << ":\t" << e << dendl;
217 }
218 } else {
219 derr << "unable to open " << dump_pg_log << ": " << error << dendl;
220 }
221 return 0;
222 }
223
224 // whoami
225 char *end;
226 const char *id = g_conf->name.get_id().c_str();
227 int whoami = strtol(id, &end, 10);
228 if (*end || end == id || whoami < 0) {
229 derr << "must specify '-i #' where # is the osd number" << dendl;
230 usage();
231 }
232
233 if (g_conf->osd_data.empty()) {
234 derr << "must specify '--osd-data=foo' data path" << dendl;
235 usage();
236 }
237
238 // the store
239 string store_type = g_conf->osd_objectstore;
240 {
241 char fn[PATH_MAX];
242 snprintf(fn, sizeof(fn), "%s/type", g_conf->osd_data.c_str());
243 int fd = ::open(fn, O_RDONLY);
244 if (fd >= 0) {
245 bufferlist bl;
246 bl.read_fd(fd, 64);
247 if (bl.length()) {
248 store_type = string(bl.c_str(), bl.length() - 1); // drop \n
249 dout(5) << "object store type is " << store_type << dendl;
250 }
251 ::close(fd);
252 }
253 }
254 ObjectStore *store = ObjectStore::create(g_ceph_context,
255 store_type,
256 g_conf->osd_data,
257 g_conf->osd_journal,
258 g_conf->osd_os_flags);
259 if (!store) {
260 derr << "unable to create object store" << dendl;
261 return -ENODEV;
262 }
263
264 #ifdef BUILDING_FOR_EMBEDDED
265 cephd_preload_embedded_plugins();
266 #endif
267
268 if (mkfs) {
269 common_init_finish(g_ceph_context);
270 MonClient mc(g_ceph_context);
271 if (mc.build_initial_monmap() < 0)
272 return -1;
273 if (mc.get_monmap_privately() < 0)
274 return -1;
275
276 if (mc.monmap.fsid.is_zero()) {
277 derr << "must specify cluster fsid" << dendl;
278 return -EINVAL;
279 }
280
281 int err = OSD::mkfs(g_ceph_context, store, g_conf->osd_data,
282 mc.monmap.fsid, whoami);
283 if (err < 0) {
284 derr << TEXT_RED << " ** ERROR: error creating empty object store in "
285 << g_conf->osd_data << ": " << cpp_strerror(-err) << TEXT_NORMAL << dendl;
286 exit(1);
287 }
288 derr << "created object store " << g_conf->osd_data
289 << " for osd." << whoami << " fsid " << mc.monmap.fsid << dendl;
290 }
291 if (mkkey) {
292 common_init_finish(g_ceph_context);
293 KeyRing *keyring = KeyRing::create_empty();
294 if (!keyring) {
295 derr << "Unable to get a Ceph keyring." << dendl;
296 return 1;
297 }
298
299 EntityName ename(g_conf->name);
300 EntityAuth eauth;
301
302 int ret = keyring->load(g_ceph_context, g_conf->keyring);
303 if (ret == 0 &&
304 keyring->get_auth(ename, eauth)) {
305 derr << "already have key in keyring " << g_conf->keyring << dendl;
306 } else {
307 eauth.key.create(g_ceph_context, CEPH_CRYPTO_AES);
308 keyring->add(ename, eauth);
309 bufferlist bl;
310 keyring->encode_plaintext(bl);
311 int r = bl.write_file(g_conf->keyring.c_str(), 0600);
312 if (r)
313 derr << TEXT_RED << " ** ERROR: writing new keyring to " << g_conf->keyring
314 << ": " << cpp_strerror(r) << TEXT_NORMAL << dendl;
315 else
316 derr << "created new key in keyring " << g_conf->keyring << dendl;
317 }
318 }
319 if (mkfs || mkkey)
320 exit(0);
321 if (mkjournal) {
322 common_init_finish(g_ceph_context);
323 int err = store->mkjournal();
324 if (err < 0) {
325 derr << TEXT_RED << " ** ERROR: error creating fresh journal " << g_conf->osd_journal
326 << " for object store " << g_conf->osd_data
327 << ": " << cpp_strerror(-err) << TEXT_NORMAL << dendl;
328 exit(1);
329 }
330 derr << "created new journal " << g_conf->osd_journal
331 << " for object store " << g_conf->osd_data << dendl;
332 exit(0);
333 }
334 if (check_wants_journal) {
335 if (store->wants_journal()) {
336 cout << "yes" << std::endl;
337 exit(0);
338 } else {
339 cout << "no" << std::endl;
340 exit(1);
341 }
342 }
343 if (check_allows_journal) {
344 if (store->allows_journal()) {
345 cout << "yes" << std::endl;
346 exit(0);
347 } else {
348 cout << "no" << std::endl;
349 exit(1);
350 }
351 }
352 if (check_needs_journal) {
353 if (store->needs_journal()) {
354 cout << "yes" << std::endl;
355 exit(0);
356 } else {
357 cout << "no" << std::endl;
358 exit(1);
359 }
360 }
361 if (flushjournal) {
362 common_init_finish(g_ceph_context);
363 int err = store->mount();
364 if (err < 0) {
365 derr << TEXT_RED << " ** ERROR: error flushing journal " << g_conf->osd_journal
366 << " for object store " << g_conf->osd_data
367 << ": " << cpp_strerror(-err) << TEXT_NORMAL << dendl;
368 goto flushjournal_out;
369 }
370 store->umount();
371 derr << "flushed journal " << g_conf->osd_journal
372 << " for object store " << g_conf->osd_data
373 << dendl;
374 flushjournal_out:
375 delete store;
376 exit(err < 0 ? 1 : 0);
377 }
378 if (dump_journal) {
379 common_init_finish(g_ceph_context);
380 int err = store->dump_journal(cout);
381 if (err < 0) {
382 derr << TEXT_RED << " ** ERROR: error dumping journal " << g_conf->osd_journal
383 << " for object store " << g_conf->osd_data
384 << ": " << cpp_strerror(-err) << TEXT_NORMAL << dendl;
385 exit(1);
386 }
387 derr << "dumped journal " << g_conf->osd_journal
388 << " for object store " << g_conf->osd_data
389 << dendl;
390 exit(0);
391
392 }
393
394
395 if (convertfilestore) {
396 int err = store->mount();
397 if (err < 0) {
398 derr << TEXT_RED << " ** ERROR: error mounting store " << g_conf->osd_data
399 << ": " << cpp_strerror(-err) << TEXT_NORMAL << dendl;
400 exit(1);
401 }
402 err = store->upgrade();
403 store->umount();
404 if (err < 0) {
405 derr << TEXT_RED << " ** ERROR: error converting store " << g_conf->osd_data
406 << ": " << cpp_strerror(-err) << TEXT_NORMAL << dendl;
407 exit(1);
408 }
409 exit(0);
410 }
411
412 string magic;
413 uuid_d cluster_fsid, osd_fsid;
414 int w;
415 int r = OSD::peek_meta(store, magic, cluster_fsid, osd_fsid, w);
416 if (r < 0) {
417 derr << TEXT_RED << " ** ERROR: unable to open OSD superblock on "
418 << g_conf->osd_data << ": " << cpp_strerror(-r)
419 << TEXT_NORMAL << dendl;
420 if (r == -ENOTSUP) {
421 derr << TEXT_RED << " ** please verify that underlying storage "
422 << "supports xattrs" << TEXT_NORMAL << dendl;
423 }
424 exit(1);
425 }
426 if (w != whoami) {
427 derr << "OSD id " << w << " != my id " << whoami << dendl;
428 exit(1);
429 }
430 if (strcmp(magic.c_str(), CEPH_OSD_ONDISK_MAGIC)) {
431 derr << "OSD magic " << magic << " != my " << CEPH_OSD_ONDISK_MAGIC
432 << dendl;
433 exit(1);
434 }
435
436 if (get_cluster_fsid) {
437 cout << cluster_fsid << std::endl;
438 exit(0);
439 }
440 if (get_osd_fsid) {
441 cout << osd_fsid << std::endl;
442 exit(0);
443 }
444
445 pick_addresses(g_ceph_context, CEPH_PICK_ADDRESS_PUBLIC
446 |CEPH_PICK_ADDRESS_CLUSTER);
447
448 if (g_conf->public_addr.is_blank_ip() && !g_conf->cluster_addr.is_blank_ip()) {
449 derr << TEXT_YELLOW
450 << " ** WARNING: specified cluster addr but not public addr; we recommend **\n"
451 << " ** you specify neither or both. **"
452 << TEXT_NORMAL << dendl;
453 }
454
455 std::string public_msgr_type = g_conf->ms_public_type.empty() ? g_conf->get_val<std::string>("ms_type") : g_conf->ms_public_type;
456 std::string cluster_msgr_type = g_conf->ms_cluster_type.empty() ? g_conf->get_val<std::string>("ms_type") : g_conf->ms_cluster_type;
457 Messenger *ms_public = Messenger::create(g_ceph_context, public_msgr_type,
458 entity_name_t::OSD(whoami), "client",
459 getpid(),
460 Messenger::HAS_HEAVY_TRAFFIC |
461 Messenger::HAS_MANY_CONNECTIONS);
462 Messenger *ms_cluster = Messenger::create(g_ceph_context, cluster_msgr_type,
463 entity_name_t::OSD(whoami), "cluster",
464 getpid(),
465 Messenger::HAS_HEAVY_TRAFFIC |
466 Messenger::HAS_MANY_CONNECTIONS);
467 Messenger *ms_hb_back_client = Messenger::create(g_ceph_context, cluster_msgr_type,
468 entity_name_t::OSD(whoami), "hb_back_client",
469 getpid(), Messenger::HEARTBEAT);
470 Messenger *ms_hb_front_client = Messenger::create(g_ceph_context, public_msgr_type,
471 entity_name_t::OSD(whoami), "hb_front_client",
472 getpid(), Messenger::HEARTBEAT);
473 Messenger *ms_hb_back_server = Messenger::create(g_ceph_context, cluster_msgr_type,
474 entity_name_t::OSD(whoami), "hb_back_server",
475 getpid(), Messenger::HEARTBEAT);
476 Messenger *ms_hb_front_server = Messenger::create(g_ceph_context, public_msgr_type,
477 entity_name_t::OSD(whoami), "hb_front_server",
478 getpid(), Messenger::HEARTBEAT);
479 Messenger *ms_objecter = Messenger::create(g_ceph_context, public_msgr_type,
480 entity_name_t::OSD(whoami), "ms_objecter",
481 getpid(), 0);
482 if (!ms_public || !ms_cluster || !ms_hb_front_client || !ms_hb_back_client || !ms_hb_back_server || !ms_hb_front_server || !ms_objecter)
483 exit(1);
484 ms_cluster->set_cluster_protocol(CEPH_OSD_PROTOCOL);
485 ms_hb_front_client->set_cluster_protocol(CEPH_OSD_PROTOCOL);
486 ms_hb_back_client->set_cluster_protocol(CEPH_OSD_PROTOCOL);
487 ms_hb_back_server->set_cluster_protocol(CEPH_OSD_PROTOCOL);
488 ms_hb_front_server->set_cluster_protocol(CEPH_OSD_PROTOCOL);
489
490 cout << "starting osd." << whoami
491 << " at " << ms_public->get_myaddr()
492 << " osd_data " << g_conf->osd_data
493 << " " << ((g_conf->osd_journal.empty()) ?
494 "(no journal)" : g_conf->osd_journal)
495 << std::endl;
496
497 boost::scoped_ptr<Throttle> client_byte_throttler(
498 new Throttle(g_ceph_context, "osd_client_bytes",
499 g_conf->osd_client_message_size_cap));
500
501 // All feature bits 0 - 34 should be present from dumpling v0.67 forward
502 uint64_t osd_required =
503 CEPH_FEATURE_UID |
504 CEPH_FEATURE_PGID64 |
505 CEPH_FEATURE_OSDENC;
506
507 ms_public->set_default_policy(Messenger::Policy::stateless_server(0));
508 ms_public->set_policy_throttlers(entity_name_t::TYPE_CLIENT,
509 client_byte_throttler.get(),
510 nullptr);
511 ms_public->set_policy(entity_name_t::TYPE_MON,
512 Messenger::Policy::lossy_client(CEPH_FEATURE_UID |
513 CEPH_FEATURE_PGID64 |
514 CEPH_FEATURE_OSDENC));
515 ms_public->set_policy(entity_name_t::TYPE_MGR,
516 Messenger::Policy::lossy_client(CEPH_FEATURE_UID |
517 CEPH_FEATURE_PGID64 |
518 CEPH_FEATURE_OSDENC));
519
520 //try to poison pill any OSD connections on the wrong address
521 ms_public->set_policy(entity_name_t::TYPE_OSD,
522 Messenger::Policy::stateless_server(0));
523
524 ms_cluster->set_default_policy(Messenger::Policy::stateless_server(0));
525 ms_cluster->set_policy(entity_name_t::TYPE_MON, Messenger::Policy::lossy_client(0));
526 ms_cluster->set_policy(entity_name_t::TYPE_OSD,
527 Messenger::Policy::lossless_peer(osd_required));
528 ms_cluster->set_policy(entity_name_t::TYPE_CLIENT,
529 Messenger::Policy::stateless_server(0));
530
531 ms_hb_front_client->set_policy(entity_name_t::TYPE_OSD,
532 Messenger::Policy::lossy_client(0));
533 ms_hb_back_client->set_policy(entity_name_t::TYPE_OSD,
534 Messenger::Policy::lossy_client(0));
535 ms_hb_back_server->set_policy(entity_name_t::TYPE_OSD,
536 Messenger::Policy::stateless_server(0));
537 ms_hb_front_server->set_policy(entity_name_t::TYPE_OSD,
538 Messenger::Policy::stateless_server(0));
539
540 ms_objecter->set_default_policy(Messenger::Policy::lossy_client(CEPH_FEATURE_OSDREPLYMUX));
541
542 r = ms_public->bind(g_conf->public_addr);
543 if (r < 0)
544 exit(1);
545 r = ms_cluster->bind(g_conf->cluster_addr);
546 if (r < 0)
547 exit(1);
548
549 if (g_conf->osd_heartbeat_use_min_delay_socket) {
550 ms_hb_front_client->set_socket_priority(SOCKET_PRIORITY_MIN_DELAY);
551 ms_hb_back_client->set_socket_priority(SOCKET_PRIORITY_MIN_DELAY);
552 ms_hb_back_server->set_socket_priority(SOCKET_PRIORITY_MIN_DELAY);
553 ms_hb_front_server->set_socket_priority(SOCKET_PRIORITY_MIN_DELAY);
554 }
555
556 // hb back should bind to same ip as cluster_addr (if specified)
557 entity_addr_t hb_back_addr = g_conf->osd_heartbeat_addr;
558 if (hb_back_addr.is_blank_ip()) {
559 hb_back_addr = g_conf->cluster_addr;
560 if (hb_back_addr.is_ip())
561 hb_back_addr.set_port(0);
562 }
563 r = ms_hb_back_server->bind(hb_back_addr);
564 if (r < 0)
565 exit(1);
566 r = ms_hb_back_client->client_bind(hb_back_addr);
567 if (r < 0)
568 exit(1);
569
570 // hb front should bind to same ip as public_addr
571 entity_addr_t hb_front_addr = g_conf->public_addr;
572 if (hb_front_addr.is_ip())
573 hb_front_addr.set_port(0);
574 r = ms_hb_front_server->bind(hb_front_addr);
575 if (r < 0)
576 exit(1);
577 r = ms_hb_front_client->client_bind(hb_front_addr);
578 if (r < 0)
579 exit(1);
580
581 // Set up crypto, daemonize, etc.
582 global_init_daemonize(g_ceph_context);
583 common_init_finish(g_ceph_context);
584
585 TracepointProvider::initialize<osd_tracepoint_traits>(g_ceph_context);
586 TracepointProvider::initialize<os_tracepoint_traits>(g_ceph_context);
587 #ifdef WITH_OSD_INSTRUMENT_FUNCTIONS
588 TracepointProvider::initialize<cyg_profile_traits>(g_ceph_context);
589 #endif
590
591 MonClient mc(g_ceph_context);
592 if (mc.build_initial_monmap() < 0)
593 return -1;
594 global_init_chdir(g_ceph_context);
595
596 #ifndef BUILDING_FOR_EMBEDDED
597 if (global_init_preload_erasure_code(g_ceph_context) < 0)
598 return -1;
599 #endif
600
601 osd = new OSD(g_ceph_context,
602 store,
603 whoami,
604 ms_cluster,
605 ms_public,
606 ms_hb_front_client,
607 ms_hb_back_client,
608 ms_hb_front_server,
609 ms_hb_back_server,
610 ms_objecter,
611 &mc,
612 g_conf->osd_data,
613 g_conf->osd_journal);
614
615 int err = osd->pre_init();
616 if (err < 0) {
617 derr << TEXT_RED << " ** ERROR: osd pre_init failed: " << cpp_strerror(-err)
618 << TEXT_NORMAL << dendl;
619 return 1;
620 }
621
622 ms_public->start();
623 ms_hb_front_client->start();
624 ms_hb_back_client->start();
625 ms_hb_front_server->start();
626 ms_hb_back_server->start();
627 ms_cluster->start();
628 ms_objecter->start();
629
630 // start osd
631 err = osd->init();
632 if (err < 0) {
633 derr << TEXT_RED << " ** ERROR: osd init failed: " << cpp_strerror(-err)
634 << TEXT_NORMAL << dendl;
635 return 1;
636 }
637
638 #ifdef BUILDING_FOR_EMBEDDED
639 cephd_preload_rados_classes(osd);
640 #endif
641
642 // install signal handlers
643 init_async_signal_handler();
644 register_async_signal_handler(SIGHUP, sighup_handler);
645 register_async_signal_handler_oneshot(SIGINT, handle_osd_signal);
646 register_async_signal_handler_oneshot(SIGTERM, handle_osd_signal);
647
648 osd->final_init();
649
650 if (g_conf->inject_early_sigterm)
651 kill(getpid(), SIGTERM);
652
653 ms_public->wait();
654 ms_hb_front_client->wait();
655 ms_hb_back_client->wait();
656 ms_hb_front_server->wait();
657 ms_hb_back_server->wait();
658 ms_cluster->wait();
659 ms_objecter->wait();
660
661 unregister_async_signal_handler(SIGHUP, sighup_handler);
662 unregister_async_signal_handler(SIGINT, handle_osd_signal);
663 unregister_async_signal_handler(SIGTERM, handle_osd_signal);
664 shutdown_async_signal_handler();
665
666 // done
667 delete osd;
668 delete ms_public;
669 delete ms_hb_front_client;
670 delete ms_hb_back_client;
671 delete ms_hb_front_server;
672 delete ms_hb_back_server;
673 delete ms_cluster;
674 delete ms_objecter;
675
676 client_byte_throttler.reset();
677
678 // cd on exit, so that gmon.out (if any) goes into a separate directory for each node.
679 char s[20];
680 snprintf(s, sizeof(s), "gmon/%d", getpid());
681 if ((mkdir(s, 0755) == 0) && (chdir(s) == 0)) {
682 dout(0) << "ceph-osd: gmon.out should be in " << s << dendl;
683 }
684
685 return 0;
686 }