drbd_nl.c 75 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709
  1. /*
  2. drbd_nl.c
  3. This file is part of DRBD by Philipp Reisner and Lars Ellenberg.
  4. Copyright (C) 2001-2008, LINBIT Information Technologies GmbH.
  5. Copyright (C) 1999-2008, Philipp Reisner <philipp.reisner@linbit.com>.
  6. Copyright (C) 2002-2008, Lars Ellenberg <lars.ellenberg@linbit.com>.
  7. drbd is free software; you can redistribute it and/or modify
  8. it under the terms of the GNU General Public License as published by
  9. the Free Software Foundation; either version 2, or (at your option)
  10. any later version.
  11. drbd is distributed in the hope that it will be useful,
  12. but WITHOUT ANY WARRANTY; without even the implied warranty of
  13. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  14. GNU General Public License for more details.
  15. You should have received a copy of the GNU General Public License
  16. along with drbd; see the file COPYING. If not, write to
  17. the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA.
  18. */
  19. #include <linux/module.h>
  20. #include <linux/drbd.h>
  21. #include <linux/in.h>
  22. #include <linux/fs.h>
  23. #include <linux/file.h>
  24. #include <linux/slab.h>
  25. #include <linux/connector.h>
  26. #include <linux/blkpg.h>
  27. #include <linux/cpumask.h>
  28. #include "drbd_int.h"
  29. #include "drbd_req.h"
  30. #include "drbd_wrappers.h"
  31. #include <asm/unaligned.h>
  32. #include <linux/drbd_tag_magic.h>
  33. #include <linux/drbd_limits.h>
  34. #include <linux/compiler.h>
  35. #include <linux/kthread.h>
  36. static unsigned short *tl_add_blob(unsigned short *, enum drbd_tags, const void *, int);
  37. static unsigned short *tl_add_str(unsigned short *, enum drbd_tags, const char *);
  38. static unsigned short *tl_add_int(unsigned short *, enum drbd_tags, const void *);
  39. /* see get_sb_bdev and bd_claim */
  40. static char *drbd_m_holder = "Hands off! this is DRBD's meta data device.";
  41. /* Generate the tag_list to struct functions */
  42. #define NL_PACKET(name, number, fields) \
  43. static int name ## _from_tags(struct drbd_conf *mdev, \
  44. unsigned short *tags, struct name *arg) __attribute__ ((unused)); \
  45. static int name ## _from_tags(struct drbd_conf *mdev, \
  46. unsigned short *tags, struct name *arg) \
  47. { \
  48. int tag; \
  49. int dlen; \
  50. \
  51. while ((tag = get_unaligned(tags++)) != TT_END) { \
  52. dlen = get_unaligned(tags++); \
  53. switch (tag_number(tag)) { \
  54. fields \
  55. default: \
  56. if (tag & T_MANDATORY) { \
  57. dev_err(DEV, "Unknown tag: %d\n", tag_number(tag)); \
  58. return 0; \
  59. } \
  60. } \
  61. tags = (unsigned short *)((char *)tags + dlen); \
  62. } \
  63. return 1; \
  64. }
  65. #define NL_INTEGER(pn, pr, member) \
  66. case pn: /* D_ASSERT( tag_type(tag) == TT_INTEGER ); */ \
  67. arg->member = get_unaligned((int *)(tags)); \
  68. break;
  69. #define NL_INT64(pn, pr, member) \
  70. case pn: /* D_ASSERT( tag_type(tag) == TT_INT64 ); */ \
  71. arg->member = get_unaligned((u64 *)(tags)); \
  72. break;
  73. #define NL_BIT(pn, pr, member) \
  74. case pn: /* D_ASSERT( tag_type(tag) == TT_BIT ); */ \
  75. arg->member = *(char *)(tags) ? 1 : 0; \
  76. break;
  77. #define NL_STRING(pn, pr, member, len) \
  78. case pn: /* D_ASSERT( tag_type(tag) == TT_STRING ); */ \
  79. if (dlen > len) { \
  80. dev_err(DEV, "arg too long: %s (%u wanted, max len: %u bytes)\n", \
  81. #member, dlen, (unsigned int)len); \
  82. return 0; \
  83. } \
  84. arg->member ## _len = dlen; \
  85. memcpy(arg->member, tags, min_t(size_t, dlen, len)); \
  86. break;
  87. #include <linux/drbd_nl.h>
  88. /* Generate the struct to tag_list functions */
  89. #define NL_PACKET(name, number, fields) \
  90. static unsigned short* \
  91. name ## _to_tags(struct drbd_conf *mdev, \
  92. struct name *arg, unsigned short *tags) __attribute__ ((unused)); \
  93. static unsigned short* \
  94. name ## _to_tags(struct drbd_conf *mdev, \
  95. struct name *arg, unsigned short *tags) \
  96. { \
  97. fields \
  98. return tags; \
  99. }
  100. #define NL_INTEGER(pn, pr, member) \
  101. put_unaligned(pn | pr | TT_INTEGER, tags++); \
  102. put_unaligned(sizeof(int), tags++); \
  103. put_unaligned(arg->member, (int *)tags); \
  104. tags = (unsigned short *)((char *)tags+sizeof(int));
  105. #define NL_INT64(pn, pr, member) \
  106. put_unaligned(pn | pr | TT_INT64, tags++); \
  107. put_unaligned(sizeof(u64), tags++); \
  108. put_unaligned(arg->member, (u64 *)tags); \
  109. tags = (unsigned short *)((char *)tags+sizeof(u64));
  110. #define NL_BIT(pn, pr, member) \
  111. put_unaligned(pn | pr | TT_BIT, tags++); \
  112. put_unaligned(sizeof(char), tags++); \
  113. *(char *)tags = arg->member; \
  114. tags = (unsigned short *)((char *)tags+sizeof(char));
  115. #define NL_STRING(pn, pr, member, len) \
  116. put_unaligned(pn | pr | TT_STRING, tags++); \
  117. put_unaligned(arg->member ## _len, tags++); \
  118. memcpy(tags, arg->member, arg->member ## _len); \
  119. tags = (unsigned short *)((char *)tags + arg->member ## _len);
  120. #include <linux/drbd_nl.h>
  121. void drbd_bcast_ev_helper(struct drbd_conf *mdev, char *helper_name);
  122. void drbd_nl_send_reply(struct cn_msg *, int);
  123. int drbd_khelper(struct drbd_conf *mdev, char *cmd)
  124. {
  125. char *envp[] = { "HOME=/",
  126. "TERM=linux",
  127. "PATH=/sbin:/usr/sbin:/bin:/usr/bin",
  128. NULL, /* Will be set to address family */
  129. NULL, /* Will be set to address */
  130. NULL };
  131. char mb[12], af[20], ad[60], *afs;
  132. char *argv[] = {usermode_helper, cmd, mb, NULL };
  133. int ret;
  134. if (current == mdev->worker.task)
  135. drbd_set_flag(mdev, CALLBACK_PENDING);
  136. snprintf(mb, 12, "minor-%d", mdev_to_minor(mdev));
  137. if (get_net_conf(mdev)) {
  138. switch (((struct sockaddr *)mdev->net_conf->peer_addr)->sa_family) {
  139. case AF_INET6:
  140. afs = "ipv6";
  141. snprintf(ad, 60, "DRBD_PEER_ADDRESS=%pI6",
  142. &((struct sockaddr_in6 *)mdev->net_conf->peer_addr)->sin6_addr);
  143. break;
  144. case AF_INET:
  145. afs = "ipv4";
  146. snprintf(ad, 60, "DRBD_PEER_ADDRESS=%pI4",
  147. &((struct sockaddr_in *)mdev->net_conf->peer_addr)->sin_addr);
  148. break;
  149. default:
  150. afs = "ssocks";
  151. snprintf(ad, 60, "DRBD_PEER_ADDRESS=%pI4",
  152. &((struct sockaddr_in *)mdev->net_conf->peer_addr)->sin_addr);
  153. }
  154. snprintf(af, 20, "DRBD_PEER_AF=%s", afs);
  155. envp[3]=af;
  156. envp[4]=ad;
  157. put_net_conf(mdev);
  158. }
  159. /* The helper may take some time.
  160. * write out any unsynced meta data changes now */
  161. drbd_md_sync(mdev);
  162. dev_info(DEV, "helper command: %s %s %s\n", usermode_helper, cmd, mb);
  163. drbd_bcast_ev_helper(mdev, cmd);
  164. ret = call_usermodehelper(usermode_helper, argv, envp, UMH_WAIT_PROC);
  165. if (ret)
  166. dev_warn(DEV, "helper command: %s %s %s exit code %u (0x%x)\n",
  167. usermode_helper, cmd, mb,
  168. (ret >> 8) & 0xff, ret);
  169. else
  170. dev_info(DEV, "helper command: %s %s %s exit code %u (0x%x)\n",
  171. usermode_helper, cmd, mb,
  172. (ret >> 8) & 0xff, ret);
  173. if (current == mdev->worker.task)
  174. drbd_clear_flag(mdev, CALLBACK_PENDING);
  175. if (ret < 0) /* Ignore any ERRNOs we got. */
  176. ret = 0;
  177. return ret;
  178. }
  179. enum drbd_disk_state drbd_try_outdate_peer(struct drbd_conf *mdev)
  180. {
  181. char *ex_to_string;
  182. int r;
  183. enum drbd_disk_state nps;
  184. enum drbd_fencing_p fp;
  185. D_ASSERT(mdev->state.pdsk == D_UNKNOWN);
  186. if (get_ldev_if_state(mdev, D_CONSISTENT)) {
  187. fp = mdev->ldev->dc.fencing;
  188. put_ldev(mdev);
  189. } else {
  190. dev_warn(DEV, "Not fencing peer, I'm not even Consistent myself.\n");
  191. nps = mdev->state.pdsk;
  192. goto out;
  193. }
  194. r = drbd_khelper(mdev, "fence-peer");
  195. switch ((r>>8) & 0xff) {
  196. case 3: /* peer is inconsistent */
  197. ex_to_string = "peer is inconsistent or worse";
  198. nps = D_INCONSISTENT;
  199. break;
  200. case 4: /* peer got outdated, or was already outdated */
  201. ex_to_string = "peer was fenced";
  202. nps = D_OUTDATED;
  203. break;
  204. case 5: /* peer was down */
  205. if (mdev->state.disk == D_UP_TO_DATE) {
  206. /* we will(have) create(d) a new UUID anyways... */
  207. ex_to_string = "peer is unreachable, assumed to be dead";
  208. nps = D_OUTDATED;
  209. } else {
  210. ex_to_string = "peer unreachable, doing nothing since disk != UpToDate";
  211. nps = mdev->state.pdsk;
  212. }
  213. break;
  214. case 6: /* Peer is primary, voluntarily outdate myself.
  215. * This is useful when an unconnected R_SECONDARY is asked to
  216. * become R_PRIMARY, but finds the other peer being active. */
  217. ex_to_string = "peer is active";
  218. dev_warn(DEV, "Peer is primary, outdating myself.\n");
  219. nps = D_UNKNOWN;
  220. _drbd_request_state(mdev, NS(disk, D_OUTDATED), CS_WAIT_COMPLETE);
  221. break;
  222. case 7:
  223. if (fp != FP_STONITH)
  224. dev_err(DEV, "fence-peer() = 7 && fencing != Stonith !!!\n");
  225. ex_to_string = "peer was stonithed";
  226. nps = D_OUTDATED;
  227. break;
  228. default:
  229. /* The script is broken ... */
  230. nps = D_UNKNOWN;
  231. dev_err(DEV, "fence-peer helper broken, returned %d\n", (r>>8)&0xff);
  232. return nps;
  233. }
  234. dev_info(DEV, "fence-peer helper returned %d (%s)\n",
  235. (r>>8) & 0xff, ex_to_string);
  236. out:
  237. if (mdev->state.susp_fen && nps >= D_UNKNOWN) {
  238. /* The handler was not successful... unfreeze here, the
  239. state engine can not unfreeze... */
  240. _drbd_request_state(mdev, NS(susp_fen, 0), CS_VERBOSE);
  241. }
  242. return nps;
  243. }
  244. static int _try_outdate_peer_async(void *data)
  245. {
  246. struct drbd_conf *mdev = (struct drbd_conf *)data;
  247. enum drbd_disk_state nps;
  248. union drbd_state ns;
  249. nps = drbd_try_outdate_peer(mdev);
  250. /* Not using
  251. drbd_request_state(mdev, NS(pdsk, nps));
  252. here, because we might were able to re-establish the connection
  253. in the meantime. This can only partially be solved in the state's
  254. engine is_valid_state() and is_valid_state_transition()
  255. functions.
  256. nps can be D_INCONSISTENT, D_OUTDATED or D_UNKNOWN.
  257. pdsk == D_INCONSISTENT while conn >= C_CONNECTED is valid,
  258. therefore we have to have the pre state change check here.
  259. */
  260. spin_lock_irq(&mdev->req_lock);
  261. ns = mdev->state;
  262. if (ns.conn < C_WF_REPORT_PARAMS && !drbd_test_flag(mdev, STATE_SENT)) {
  263. ns.pdsk = nps;
  264. _drbd_set_state(mdev, ns, CS_VERBOSE, NULL);
  265. }
  266. spin_unlock_irq(&mdev->req_lock);
  267. return 0;
  268. }
  269. void drbd_try_outdate_peer_async(struct drbd_conf *mdev)
  270. {
  271. struct task_struct *opa;
  272. opa = kthread_run(_try_outdate_peer_async, mdev, "drbd%d_a_helper", mdev_to_minor(mdev));
  273. if (IS_ERR(opa))
  274. dev_err(DEV, "out of mem, failed to invoke fence-peer helper\n");
  275. }
  276. enum drbd_state_rv
  277. drbd_set_role(struct drbd_conf *mdev, enum drbd_role new_role, int force)
  278. {
  279. const int max_tries = 4;
  280. enum drbd_state_rv rv = SS_UNKNOWN_ERROR;
  281. int try = 0;
  282. int forced = 0;
  283. union drbd_state mask, val;
  284. enum drbd_disk_state nps;
  285. if (new_role == R_PRIMARY)
  286. request_ping(mdev); /* Detect a dead peer ASAP */
  287. mutex_lock(&mdev->state_mutex);
  288. mask.i = 0; mask.role = R_MASK;
  289. val.i = 0; val.role = new_role;
  290. while (try++ < max_tries) {
  291. rv = _drbd_request_state(mdev, mask, val, CS_WAIT_COMPLETE);
  292. /* in case we first succeeded to outdate,
  293. * but now suddenly could establish a connection */
  294. if (rv == SS_CW_FAILED_BY_PEER && mask.pdsk != 0) {
  295. val.pdsk = 0;
  296. mask.pdsk = 0;
  297. continue;
  298. }
  299. if (rv == SS_NO_UP_TO_DATE_DISK && force &&
  300. (mdev->state.disk < D_UP_TO_DATE &&
  301. mdev->state.disk >= D_INCONSISTENT)) {
  302. mask.disk = D_MASK;
  303. val.disk = D_UP_TO_DATE;
  304. forced = 1;
  305. continue;
  306. }
  307. if (rv == SS_NO_UP_TO_DATE_DISK &&
  308. mdev->state.disk == D_CONSISTENT && mask.pdsk == 0) {
  309. D_ASSERT(mdev->state.pdsk == D_UNKNOWN);
  310. nps = drbd_try_outdate_peer(mdev);
  311. if (nps == D_OUTDATED || nps == D_INCONSISTENT) {
  312. val.disk = D_UP_TO_DATE;
  313. mask.disk = D_MASK;
  314. }
  315. val.pdsk = nps;
  316. mask.pdsk = D_MASK;
  317. continue;
  318. }
  319. if (rv == SS_NOTHING_TO_DO)
  320. goto fail;
  321. if (rv == SS_PRIMARY_NOP && mask.pdsk == 0) {
  322. nps = drbd_try_outdate_peer(mdev);
  323. if (force && nps > D_OUTDATED) {
  324. dev_warn(DEV, "Forced into split brain situation!\n");
  325. nps = D_OUTDATED;
  326. }
  327. mask.pdsk = D_MASK;
  328. val.pdsk = nps;
  329. continue;
  330. }
  331. if (rv == SS_TWO_PRIMARIES) {
  332. /* Maybe the peer is detected as dead very soon...
  333. retry at most once more in this case. */
  334. schedule_timeout_interruptible((mdev->net_conf->ping_timeo+1)*HZ/10);
  335. if (try < max_tries)
  336. try = max_tries - 1;
  337. continue;
  338. }
  339. if (rv < SS_SUCCESS) {
  340. rv = _drbd_request_state(mdev, mask, val,
  341. CS_VERBOSE + CS_WAIT_COMPLETE);
  342. if (rv < SS_SUCCESS)
  343. goto fail;
  344. }
  345. break;
  346. }
  347. if (rv < SS_SUCCESS)
  348. goto fail;
  349. if (forced)
  350. dev_warn(DEV, "Forced to consider local data as UpToDate!\n");
  351. /* Wait until nothing is on the fly :) */
  352. wait_event(mdev->misc_wait, atomic_read(&mdev->ap_pending_cnt) == 0);
  353. if (new_role == R_SECONDARY) {
  354. set_disk_ro(mdev->vdisk, true);
  355. if (get_ldev(mdev)) {
  356. mdev->ldev->md.uuid[UI_CURRENT] &= ~(u64)1;
  357. put_ldev(mdev);
  358. }
  359. } else {
  360. if (get_net_conf(mdev)) {
  361. mdev->net_conf->want_lose = 0;
  362. put_net_conf(mdev);
  363. }
  364. set_disk_ro(mdev->vdisk, false);
  365. if (get_ldev(mdev)) {
  366. if (((mdev->state.conn < C_CONNECTED ||
  367. mdev->state.pdsk <= D_FAILED)
  368. && mdev->ldev->md.uuid[UI_BITMAP] == 0) || forced)
  369. drbd_uuid_new_current(mdev);
  370. mdev->ldev->md.uuid[UI_CURRENT] |= (u64)1;
  371. put_ldev(mdev);
  372. }
  373. }
  374. /* writeout of activity log covered areas of the bitmap
  375. * to stable storage done in after state change already */
  376. if (mdev->state.conn >= C_WF_REPORT_PARAMS) {
  377. /* if this was forced, we should consider sync */
  378. if (forced)
  379. drbd_send_uuids(mdev);
  380. drbd_send_current_state(mdev);
  381. }
  382. drbd_md_sync(mdev);
  383. kobject_uevent(&disk_to_dev(mdev->vdisk)->kobj, KOBJ_CHANGE);
  384. fail:
  385. mutex_unlock(&mdev->state_mutex);
  386. return rv;
  387. }
  388. static struct drbd_conf *ensure_mdev(int minor, int create)
  389. {
  390. struct drbd_conf *mdev;
  391. if (minor >= minor_count)
  392. return NULL;
  393. mdev = minor_to_mdev(minor);
  394. if (!mdev && create) {
  395. struct gendisk *disk = NULL;
  396. mdev = drbd_new_device(minor);
  397. spin_lock_irq(&drbd_pp_lock);
  398. if (minor_table[minor] == NULL) {
  399. minor_table[minor] = mdev;
  400. disk = mdev->vdisk;
  401. mdev = NULL;
  402. } /* else: we lost the race */
  403. spin_unlock_irq(&drbd_pp_lock);
  404. if (disk) /* we won the race above */
  405. /* in case we ever add a drbd_delete_device(),
  406. * don't forget the del_gendisk! */
  407. add_disk(disk);
  408. else /* we lost the race above */
  409. drbd_free_mdev(mdev);
  410. mdev = minor_to_mdev(minor);
  411. }
  412. return mdev;
  413. }
  414. static int drbd_nl_primary(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
  415. struct drbd_nl_cfg_reply *reply)
  416. {
  417. struct primary primary_args;
  418. memset(&primary_args, 0, sizeof(struct primary));
  419. if (!primary_from_tags(mdev, nlp->tag_list, &primary_args)) {
  420. reply->ret_code = ERR_MANDATORY_TAG;
  421. return 0;
  422. }
  423. reply->ret_code =
  424. drbd_set_role(mdev, R_PRIMARY, primary_args.primary_force);
  425. return 0;
  426. }
  427. static int drbd_nl_secondary(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
  428. struct drbd_nl_cfg_reply *reply)
  429. {
  430. reply->ret_code = drbd_set_role(mdev, R_SECONDARY, 0);
  431. return 0;
  432. }
  433. /* initializes the md.*_offset members, so we are able to find
  434. * the on disk meta data */
  435. static void drbd_md_set_sector_offsets(struct drbd_conf *mdev,
  436. struct drbd_backing_dev *bdev)
  437. {
  438. sector_t md_size_sect = 0;
  439. switch (bdev->dc.meta_dev_idx) {
  440. default:
  441. /* v07 style fixed size indexed meta data */
  442. bdev->md.md_size_sect = MD_RESERVED_SECT;
  443. bdev->md.md_offset = drbd_md_ss__(mdev, bdev);
  444. bdev->md.al_offset = MD_AL_OFFSET;
  445. bdev->md.bm_offset = MD_BM_OFFSET;
  446. break;
  447. case DRBD_MD_INDEX_FLEX_EXT:
  448. /* just occupy the full device; unit: sectors */
  449. bdev->md.md_size_sect = drbd_get_capacity(bdev->md_bdev);
  450. bdev->md.md_offset = 0;
  451. bdev->md.al_offset = MD_AL_OFFSET;
  452. bdev->md.bm_offset = MD_BM_OFFSET;
  453. break;
  454. case DRBD_MD_INDEX_INTERNAL:
  455. case DRBD_MD_INDEX_FLEX_INT:
  456. bdev->md.md_offset = drbd_md_ss__(mdev, bdev);
  457. /* al size is still fixed */
  458. bdev->md.al_offset = -MD_AL_MAX_SIZE;
  459. /* we need (slightly less than) ~ this much bitmap sectors: */
  460. md_size_sect = drbd_get_capacity(bdev->backing_bdev);
  461. md_size_sect = ALIGN(md_size_sect, BM_SECT_PER_EXT);
  462. md_size_sect = BM_SECT_TO_EXT(md_size_sect);
  463. md_size_sect = ALIGN(md_size_sect, 8);
  464. /* plus the "drbd meta data super block",
  465. * and the activity log; */
  466. md_size_sect += MD_BM_OFFSET;
  467. bdev->md.md_size_sect = md_size_sect;
  468. /* bitmap offset is adjusted by 'super' block size */
  469. bdev->md.bm_offset = -md_size_sect + MD_AL_OFFSET;
  470. break;
  471. }
  472. }
  473. /* input size is expected to be in KB */
  474. char *ppsize(char *buf, unsigned long long size)
  475. {
  476. /* Needs 9 bytes at max including trailing NUL:
  477. * -1ULL ==> "16384 EB" */
  478. static char units[] = { 'K', 'M', 'G', 'T', 'P', 'E' };
  479. int base = 0;
  480. while (size >= 10000 && base < sizeof(units)-1) {
  481. /* shift + round */
  482. size = (size >> 10) + !!(size & (1<<9));
  483. base++;
  484. }
  485. sprintf(buf, "%u %cB", (unsigned)size, units[base]);
  486. return buf;
  487. }
  488. /* there is still a theoretical deadlock when called from receiver
  489. * on an D_INCONSISTENT R_PRIMARY:
  490. * remote READ does inc_ap_bio, receiver would need to receive answer
  491. * packet from remote to dec_ap_bio again.
  492. * receiver receive_sizes(), comes here,
  493. * waits for ap_bio_cnt == 0. -> deadlock.
  494. * but this cannot happen, actually, because:
  495. * R_PRIMARY D_INCONSISTENT, and peer's disk is unreachable
  496. * (not connected, or bad/no disk on peer):
  497. * see drbd_fail_request_early, ap_bio_cnt is zero.
  498. * R_PRIMARY D_INCONSISTENT, and C_SYNC_TARGET:
  499. * peer may not initiate a resize.
  500. */
  501. void drbd_suspend_io(struct drbd_conf *mdev)
  502. {
  503. drbd_set_flag(mdev, SUSPEND_IO);
  504. if (is_susp(mdev->state))
  505. return;
  506. wait_event(mdev->misc_wait, !atomic_read(&mdev->ap_bio_cnt));
  507. }
  508. void drbd_resume_io(struct drbd_conf *mdev)
  509. {
  510. drbd_clear_flag(mdev, SUSPEND_IO);
  511. wake_up(&mdev->misc_wait);
  512. }
  513. /**
  514. * drbd_determine_dev_size() - Sets the right device size obeying all constraints
  515. * @mdev: DRBD device.
  516. *
  517. * Returns 0 on success, negative return values indicate errors.
  518. * You should call drbd_md_sync() after calling this function.
  519. */
  520. enum determine_dev_size drbd_determine_dev_size(struct drbd_conf *mdev, enum dds_flags flags) __must_hold(local)
  521. {
  522. sector_t prev_first_sect, prev_size; /* previous meta location */
  523. sector_t la_size;
  524. sector_t size;
  525. char ppb[10];
  526. int md_moved, la_size_changed;
  527. enum determine_dev_size rv = unchanged;
  528. /* race:
  529. * application request passes inc_ap_bio,
  530. * but then cannot get an AL-reference.
  531. * this function later may wait on ap_bio_cnt == 0. -> deadlock.
  532. *
  533. * to avoid that:
  534. * Suspend IO right here.
  535. * still lock the act_log to not trigger ASSERTs there.
  536. */
  537. drbd_suspend_io(mdev);
  538. /* no wait necessary anymore, actually we could assert that */
  539. wait_event(mdev->al_wait, lc_try_lock(mdev->act_log));
  540. prev_first_sect = drbd_md_first_sector(mdev->ldev);
  541. prev_size = mdev->ldev->md.md_size_sect;
  542. la_size = mdev->ldev->md.la_size_sect;
  543. /* TODO: should only be some assert here, not (re)init... */
  544. drbd_md_set_sector_offsets(mdev, mdev->ldev);
  545. size = drbd_new_dev_size(mdev, mdev->ldev, flags & DDSF_FORCED);
  546. if (drbd_get_capacity(mdev->this_bdev) != size ||
  547. drbd_bm_capacity(mdev) != size) {
  548. int err;
  549. err = drbd_bm_resize(mdev, size, !(flags & DDSF_NO_RESYNC));
  550. if (unlikely(err)) {
  551. /* currently there is only one error: ENOMEM! */
  552. size = drbd_bm_capacity(mdev)>>1;
  553. if (size == 0) {
  554. dev_err(DEV, "OUT OF MEMORY! "
  555. "Could not allocate bitmap!\n");
  556. } else {
  557. dev_err(DEV, "BM resizing failed. "
  558. "Leaving size unchanged at size = %lu KB\n",
  559. (unsigned long)size);
  560. }
  561. rv = dev_size_error;
  562. }
  563. /* racy, see comments above. */
  564. drbd_set_my_capacity(mdev, size);
  565. mdev->ldev->md.la_size_sect = size;
  566. dev_info(DEV, "size = %s (%llu KB)\n", ppsize(ppb, size>>1),
  567. (unsigned long long)size>>1);
  568. }
  569. if (rv == dev_size_error)
  570. goto out;
  571. la_size_changed = (la_size != mdev->ldev->md.la_size_sect);
  572. md_moved = prev_first_sect != drbd_md_first_sector(mdev->ldev)
  573. || prev_size != mdev->ldev->md.md_size_sect;
  574. if (la_size_changed || md_moved) {
  575. int err;
  576. drbd_al_shrink(mdev); /* All extents inactive. */
  577. dev_info(DEV, "Writing the whole bitmap, %s\n",
  578. la_size_changed && md_moved ? "size changed and md moved" :
  579. la_size_changed ? "size changed" : "md moved");
  580. /* next line implicitly does drbd_suspend_io()+drbd_resume_io() */
  581. err = drbd_bitmap_io(mdev, md_moved ? &drbd_bm_write_all : &drbd_bm_write,
  582. "size changed", BM_LOCKED_MASK);
  583. if (err) {
  584. rv = dev_size_error;
  585. goto out;
  586. }
  587. drbd_md_mark_dirty(mdev);
  588. }
  589. if (size > la_size)
  590. rv = grew;
  591. if (size < la_size)
  592. rv = shrunk;
  593. out:
  594. lc_unlock(mdev->act_log);
  595. wake_up(&mdev->al_wait);
  596. drbd_resume_io(mdev);
  597. return rv;
  598. }
  599. sector_t
  600. drbd_new_dev_size(struct drbd_conf *mdev, struct drbd_backing_dev *bdev, int assume_peer_has_space)
  601. {
  602. sector_t p_size = mdev->p_size; /* partner's disk size. */
  603. sector_t la_size = bdev->md.la_size_sect; /* last agreed size. */
  604. sector_t m_size; /* my size */
  605. sector_t u_size = bdev->dc.disk_size; /* size requested by user. */
  606. sector_t size = 0;
  607. m_size = drbd_get_max_capacity(bdev);
  608. if (mdev->state.conn < C_CONNECTED && assume_peer_has_space) {
  609. dev_warn(DEV, "Resize while not connected was forced by the user!\n");
  610. p_size = m_size;
  611. }
  612. if (p_size && m_size) {
  613. size = min_t(sector_t, p_size, m_size);
  614. } else {
  615. if (la_size) {
  616. size = la_size;
  617. if (m_size && m_size < size)
  618. size = m_size;
  619. if (p_size && p_size < size)
  620. size = p_size;
  621. } else {
  622. if (m_size)
  623. size = m_size;
  624. if (p_size)
  625. size = p_size;
  626. }
  627. }
  628. if (size == 0)
  629. dev_err(DEV, "Both nodes diskless!\n");
  630. if (u_size) {
  631. if (u_size > size)
  632. dev_err(DEV, "Requested disk size is too big (%lu > %lu)\n",
  633. (unsigned long)u_size>>1, (unsigned long)size>>1);
  634. else
  635. size = u_size;
  636. }
  637. return size;
  638. }
  639. /**
  640. * drbd_check_al_size() - Ensures that the AL is of the right size
  641. * @mdev: DRBD device.
  642. *
  643. * Returns -EBUSY if current al lru is still used, -ENOMEM when allocation
  644. * failed, and 0 on success. You should call drbd_md_sync() after you called
  645. * this function.
  646. */
  647. static int drbd_check_al_size(struct drbd_conf *mdev)
  648. {
  649. struct lru_cache *n, *t;
  650. struct lc_element *e;
  651. unsigned int in_use;
  652. int i;
  653. ERR_IF(mdev->sync_conf.al_extents < 7)
  654. mdev->sync_conf.al_extents = 127;
  655. if (mdev->act_log &&
  656. mdev->act_log->nr_elements == mdev->sync_conf.al_extents)
  657. return 0;
  658. in_use = 0;
  659. t = mdev->act_log;
  660. n = lc_create("act_log", drbd_al_ext_cache,
  661. mdev->sync_conf.al_extents, sizeof(struct lc_element), 0);
  662. if (n == NULL) {
  663. dev_err(DEV, "Cannot allocate act_log lru!\n");
  664. return -ENOMEM;
  665. }
  666. spin_lock_irq(&mdev->al_lock);
  667. if (t) {
  668. for (i = 0; i < t->nr_elements; i++) {
  669. e = lc_element_by_index(t, i);
  670. if (e->refcnt)
  671. dev_err(DEV, "refcnt(%d)==%d\n",
  672. e->lc_number, e->refcnt);
  673. in_use += e->refcnt;
  674. }
  675. }
  676. if (!in_use)
  677. mdev->act_log = n;
  678. spin_unlock_irq(&mdev->al_lock);
  679. if (in_use) {
  680. dev_err(DEV, "Activity log still in use!\n");
  681. lc_destroy(n);
  682. return -EBUSY;
  683. } else {
  684. if (t)
  685. lc_destroy(t);
  686. }
  687. drbd_md_mark_dirty(mdev); /* we changed mdev->act_log->nr_elemens */
  688. return 0;
  689. }
  690. static void drbd_setup_queue_param(struct drbd_conf *mdev, unsigned int max_bio_size)
  691. {
  692. struct request_queue * const q = mdev->rq_queue;
  693. unsigned int max_hw_sectors = max_bio_size >> 9;
  694. unsigned int max_segments = 0;
  695. if (get_ldev_if_state(mdev, D_ATTACHING)) {
  696. struct request_queue * const b = mdev->ldev->backing_bdev->bd_disk->queue;
  697. max_hw_sectors = min(queue_max_hw_sectors(b), max_bio_size >> 9);
  698. max_segments = mdev->ldev->dc.max_bio_bvecs;
  699. put_ldev(mdev);
  700. }
  701. blk_queue_logical_block_size(q, 512);
  702. blk_queue_max_hw_sectors(q, max_hw_sectors);
  703. /* This is the workaround for "bio would need to, but cannot, be split" */
  704. blk_queue_max_segments(q, max_segments ? max_segments : BLK_MAX_SEGMENTS);
  705. blk_queue_segment_boundary(q, PAGE_CACHE_SIZE-1);
  706. if (get_ldev_if_state(mdev, D_ATTACHING)) {
  707. struct request_queue * const b = mdev->ldev->backing_bdev->bd_disk->queue;
  708. blk_queue_stack_limits(q, b);
  709. if (q->backing_dev_info.ra_pages != b->backing_dev_info.ra_pages) {
  710. dev_info(DEV, "Adjusting my ra_pages to backing device's (%lu -> %lu)\n",
  711. q->backing_dev_info.ra_pages,
  712. b->backing_dev_info.ra_pages);
  713. q->backing_dev_info.ra_pages = b->backing_dev_info.ra_pages;
  714. }
  715. put_ldev(mdev);
  716. }
  717. }
  718. void drbd_reconsider_max_bio_size(struct drbd_conf *mdev)
  719. {
  720. unsigned int now, new, local, peer;
  721. now = queue_max_hw_sectors(mdev->rq_queue) << 9;
  722. local = mdev->local_max_bio_size; /* Eventually last known value, from volatile memory */
  723. peer = mdev->peer_max_bio_size; /* Eventually last known value, from meta data */
  724. if (get_ldev_if_state(mdev, D_ATTACHING)) {
  725. local = queue_max_hw_sectors(mdev->ldev->backing_bdev->bd_disk->queue) << 9;
  726. mdev->local_max_bio_size = local;
  727. put_ldev(mdev);
  728. }
  729. local = min(local, DRBD_MAX_BIO_SIZE);
  730. /* We may ignore peer limits if the peer is modern enough.
  731. Because new from 8.3.8 onwards the peer can use multiple
  732. BIOs for a single peer_request */
  733. if (mdev->state.conn >= C_CONNECTED) {
  734. if (mdev->agreed_pro_version < 94) {
  735. peer = min(mdev->peer_max_bio_size, DRBD_MAX_SIZE_H80_PACKET);
  736. /* Correct old drbd (up to 8.3.7) if it believes it can do more than 32KiB */
  737. } else if (mdev->agreed_pro_version == 94)
  738. peer = DRBD_MAX_SIZE_H80_PACKET;
  739. else /* drbd 8.3.8 onwards */
  740. peer = DRBD_MAX_BIO_SIZE;
  741. }
  742. new = min(local, peer);
  743. if (mdev->state.role == R_PRIMARY && new < now)
  744. dev_err(DEV, "ASSERT FAILED new < now; (%u < %u)\n", new, now);
  745. if (new != now)
  746. dev_info(DEV, "max BIO size = %u\n", new);
  747. drbd_setup_queue_param(mdev, new);
  748. }
  749. /* serialize deconfig (worker exiting, doing cleanup)
  750. * and reconfig (drbdsetup disk, drbdsetup net)
  751. *
  752. * Wait for a potentially exiting worker, then restart it,
  753. * or start a new one. Flush any pending work, there may still be an
  754. * after_state_change queued.
  755. */
  756. static void drbd_reconfig_start(struct drbd_conf *mdev)
  757. {
  758. wait_event(mdev->state_wait, !drbd_test_and_set_flag(mdev, CONFIG_PENDING));
  759. wait_event(mdev->state_wait, !drbd_test_flag(mdev, DEVICE_DYING));
  760. drbd_thread_start(&mdev->worker);
  761. drbd_flush_workqueue(mdev);
  762. }
  763. /* if still unconfigured, stops worker again.
  764. * if configured now, clears CONFIG_PENDING.
  765. * wakes potential waiters */
  766. static void drbd_reconfig_done(struct drbd_conf *mdev)
  767. {
  768. spin_lock_irq(&mdev->req_lock);
  769. if (mdev->state.disk == D_DISKLESS &&
  770. mdev->state.conn == C_STANDALONE &&
  771. mdev->state.role == R_SECONDARY) {
  772. drbd_set_flag(mdev, DEVICE_DYING);
  773. drbd_thread_stop_nowait(&mdev->worker);
  774. } else
  775. drbd_clear_flag(mdev, CONFIG_PENDING);
  776. spin_unlock_irq(&mdev->req_lock);
  777. wake_up(&mdev->state_wait);
  778. }
  779. /* Make sure IO is suspended before calling this function(). */
  780. static void drbd_suspend_al(struct drbd_conf *mdev)
  781. {
  782. int s = 0;
  783. if (lc_try_lock(mdev->act_log)) {
  784. drbd_al_shrink(mdev);
  785. lc_unlock(mdev->act_log);
  786. } else {
  787. dev_warn(DEV, "Failed to lock al in drbd_suspend_al()\n");
  788. return;
  789. }
  790. spin_lock_irq(&mdev->req_lock);
  791. if (mdev->state.conn < C_CONNECTED)
  792. s = !drbd_test_and_set_flag(mdev, AL_SUSPENDED);
  793. spin_unlock_irq(&mdev->req_lock);
  794. if (s)
  795. dev_info(DEV, "Suspended AL updates\n");
  796. }
  797. /* does always return 0;
  798. * interesting return code is in reply->ret_code */
  799. static int drbd_nl_disk_conf(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
  800. struct drbd_nl_cfg_reply *reply)
  801. {
  802. enum drbd_ret_code retcode;
  803. enum determine_dev_size dd;
  804. sector_t max_possible_sectors;
  805. sector_t min_md_device_sectors;
  806. struct drbd_backing_dev *nbc = NULL; /* new_backing_conf */
  807. struct block_device *bdev;
  808. struct lru_cache *resync_lru = NULL;
  809. union drbd_state ns, os;
  810. enum drbd_state_rv rv;
  811. int cp_discovered = 0;
  812. int logical_block_size;
  813. drbd_reconfig_start(mdev);
  814. /* if you want to reconfigure, please tear down first */
  815. if (mdev->state.disk > D_DISKLESS) {
  816. retcode = ERR_DISK_CONFIGURED;
  817. goto fail;
  818. }
  819. /* It may just now have detached because of IO error. Make sure
  820. * drbd_ldev_destroy is done already, we may end up here very fast,
  821. * e.g. if someone calls attach from the on-io-error handler,
  822. * to realize a "hot spare" feature (not that I'd recommend that) */
  823. wait_event(mdev->misc_wait, !atomic_read(&mdev->local_cnt));
  824. /* make sure there is no leftover from previous force-detach attempts */
  825. drbd_clear_flag(mdev, FORCE_DETACH);
  826. drbd_clear_flag(mdev, WAS_IO_ERROR);
  827. drbd_clear_flag(mdev, WAS_READ_ERROR);
  828. /* and no leftover from previously aborted resync or verify, either */
  829. mdev->rs_total = 0;
  830. mdev->rs_failed = 0;
  831. atomic_set(&mdev->rs_pending_cnt, 0);
  832. /* allocation not in the IO path, cqueue thread context */
  833. nbc = kzalloc(sizeof(struct drbd_backing_dev), GFP_KERNEL);
  834. if (!nbc) {
  835. retcode = ERR_NOMEM;
  836. goto fail;
  837. }
  838. nbc->dc.disk_size = DRBD_DISK_SIZE_SECT_DEF;
  839. nbc->dc.on_io_error = DRBD_ON_IO_ERROR_DEF;
  840. nbc->dc.fencing = DRBD_FENCING_DEF;
  841. nbc->dc.max_bio_bvecs = DRBD_MAX_BIO_BVECS_DEF;
  842. spin_lock_init(&nbc->md.uuid_lock);
  843. if (!disk_conf_from_tags(mdev, nlp->tag_list, &nbc->dc)) {
  844. retcode = ERR_MANDATORY_TAG;
  845. goto fail;
  846. }
  847. if (nbc->dc.meta_dev_idx < DRBD_MD_INDEX_FLEX_INT) {
  848. retcode = ERR_MD_IDX_INVALID;
  849. goto fail;
  850. }
  851. if (get_net_conf(mdev)) {
  852. int prot = mdev->net_conf->wire_protocol;
  853. put_net_conf(mdev);
  854. if (nbc->dc.fencing == FP_STONITH && prot == DRBD_PROT_A) {
  855. retcode = ERR_STONITH_AND_PROT_A;
  856. goto fail;
  857. }
  858. }
  859. bdev = blkdev_get_by_path(nbc->dc.backing_dev,
  860. FMODE_READ | FMODE_WRITE | FMODE_EXCL, mdev);
  861. if (IS_ERR(bdev)) {
  862. dev_err(DEV, "open(\"%s\") failed with %ld\n", nbc->dc.backing_dev,
  863. PTR_ERR(bdev));
  864. retcode = ERR_OPEN_DISK;
  865. goto fail;
  866. }
  867. nbc->backing_bdev = bdev;
  868. /*
  869. * meta_dev_idx >= 0: external fixed size, possibly multiple
  870. * drbd sharing one meta device. TODO in that case, paranoia
  871. * check that [md_bdev, meta_dev_idx] is not yet used by some
  872. * other drbd minor! (if you use drbd.conf + drbdadm, that
  873. * should check it for you already; but if you don't, or
  874. * someone fooled it, we need to double check here)
  875. */
  876. bdev = blkdev_get_by_path(nbc->dc.meta_dev,
  877. FMODE_READ | FMODE_WRITE | FMODE_EXCL,
  878. (nbc->dc.meta_dev_idx < 0) ?
  879. (void *)mdev : (void *)drbd_m_holder);
  880. if (IS_ERR(bdev)) {
  881. dev_err(DEV, "open(\"%s\") failed with %ld\n", nbc->dc.meta_dev,
  882. PTR_ERR(bdev));
  883. retcode = ERR_OPEN_MD_DISK;
  884. goto fail;
  885. }
  886. nbc->md_bdev = bdev;
  887. if ((nbc->backing_bdev == nbc->md_bdev) !=
  888. (nbc->dc.meta_dev_idx == DRBD_MD_INDEX_INTERNAL ||
  889. nbc->dc.meta_dev_idx == DRBD_MD_INDEX_FLEX_INT)) {
  890. retcode = ERR_MD_IDX_INVALID;
  891. goto fail;
  892. }
  893. resync_lru = lc_create("resync", drbd_bm_ext_cache,
  894. 61, sizeof(struct bm_extent),
  895. offsetof(struct bm_extent, lce));
  896. if (!resync_lru) {
  897. retcode = ERR_NOMEM;
  898. goto fail;
  899. }
  900. /* RT - for drbd_get_max_capacity() DRBD_MD_INDEX_FLEX_INT */
  901. drbd_md_set_sector_offsets(mdev, nbc);
  902. if (drbd_get_max_capacity(nbc) < nbc->dc.disk_size) {
  903. dev_err(DEV, "max capacity %llu smaller than disk size %llu\n",
  904. (unsigned long long) drbd_get_max_capacity(nbc),
  905. (unsigned long long) nbc->dc.disk_size);
  906. retcode = ERR_DISK_TOO_SMALL;
  907. goto fail;
  908. }
  909. if (nbc->dc.meta_dev_idx < 0) {
  910. max_possible_sectors = DRBD_MAX_SECTORS_FLEX;
  911. /* at least one MB, otherwise it does not make sense */
  912. min_md_device_sectors = (2<<10);
  913. } else {
  914. max_possible_sectors = DRBD_MAX_SECTORS;
  915. min_md_device_sectors = MD_RESERVED_SECT * (nbc->dc.meta_dev_idx + 1);
  916. }
  917. if (drbd_get_capacity(nbc->md_bdev) < min_md_device_sectors) {
  918. retcode = ERR_MD_DISK_TOO_SMALL;
  919. dev_warn(DEV, "refusing attach: md-device too small, "
  920. "at least %llu sectors needed for this meta-disk type\n",
  921. (unsigned long long) min_md_device_sectors);
  922. goto fail;
  923. }
  924. /* Make sure the new disk is big enough
  925. * (we may currently be R_PRIMARY with no local disk...) */
  926. if (drbd_get_max_capacity(nbc) <
  927. drbd_get_capacity(mdev->this_bdev)) {
  928. retcode = ERR_DISK_TOO_SMALL;
  929. goto fail;
  930. }
  931. nbc->known_size = drbd_get_capacity(nbc->backing_bdev);
  932. if (nbc->known_size > max_possible_sectors) {
  933. dev_warn(DEV, "==> truncating very big lower level device "
  934. "to currently maximum possible %llu sectors <==\n",
  935. (unsigned long long) max_possible_sectors);
  936. if (nbc->dc.meta_dev_idx >= 0)
  937. dev_warn(DEV, "==>> using internal or flexible "
  938. "meta data may help <<==\n");
  939. }
  940. drbd_suspend_io(mdev);
  941. /* also wait for the last barrier ack. */
  942. wait_event(mdev->misc_wait, !atomic_read(&mdev->ap_pending_cnt) || is_susp(mdev->state));
  943. /* and for any other previously queued work */
  944. drbd_flush_workqueue(mdev);
  945. rv = _drbd_request_state(mdev, NS(disk, D_ATTACHING), CS_VERBOSE);
  946. retcode = rv; /* FIXME: Type mismatch. */
  947. drbd_resume_io(mdev);
  948. if (rv < SS_SUCCESS)
  949. goto fail;
  950. if (!get_ldev_if_state(mdev, D_ATTACHING))
  951. goto force_diskless;
  952. drbd_md_set_sector_offsets(mdev, nbc);
  953. /* allocate a second IO page if logical_block_size != 512 */
  954. logical_block_size = bdev_logical_block_size(nbc->md_bdev);
  955. if (logical_block_size == 0)
  956. logical_block_size = MD_SECTOR_SIZE;
  957. if (logical_block_size != MD_SECTOR_SIZE) {
  958. if (!mdev->md_io_tmpp) {
  959. struct page *page = alloc_page(GFP_NOIO);
  960. if (!page)
  961. goto force_diskless_dec;
  962. dev_warn(DEV, "Meta data's bdev logical_block_size = %d != %d\n",
  963. logical_block_size, MD_SECTOR_SIZE);
  964. dev_warn(DEV, "Workaround engaged (has performance impact).\n");
  965. mdev->md_io_tmpp = page;
  966. }
  967. }
  968. if (!mdev->bitmap) {
  969. if (drbd_bm_init(mdev)) {
  970. retcode = ERR_NOMEM;
  971. goto force_diskless_dec;
  972. }
  973. }
  974. retcode = drbd_md_read(mdev, nbc);
  975. if (retcode != NO_ERROR)
  976. goto force_diskless_dec;
  977. if (mdev->state.conn < C_CONNECTED &&
  978. mdev->state.role == R_PRIMARY &&
  979. (mdev->ed_uuid & ~((u64)1)) != (nbc->md.uuid[UI_CURRENT] & ~((u64)1))) {
  980. dev_err(DEV, "Can only attach to data with current UUID=%016llX\n",
  981. (unsigned long long)mdev->ed_uuid);
  982. retcode = ERR_DATA_NOT_CURRENT;
  983. goto force_diskless_dec;
  984. }
  985. /* Since we are diskless, fix the activity log first... */
  986. if (drbd_check_al_size(mdev)) {
  987. retcode = ERR_NOMEM;
  988. goto force_diskless_dec;
  989. }
  990. /* Prevent shrinking of consistent devices ! */
  991. if (drbd_md_test_flag(nbc, MDF_CONSISTENT) &&
  992. drbd_new_dev_size(mdev, nbc, 0) < nbc->md.la_size_sect) {
  993. dev_warn(DEV, "refusing to truncate a consistent device\n");
  994. retcode = ERR_DISK_TOO_SMALL;
  995. goto force_diskless_dec;
  996. }
  997. if (!drbd_al_read_log(mdev, nbc)) {
  998. retcode = ERR_IO_MD_DISK;
  999. goto force_diskless_dec;
  1000. }
  1001. /* Reset the "barriers don't work" bits here, then force meta data to
  1002. * be written, to ensure we determine if barriers are supported. */
  1003. if (nbc->dc.no_md_flush)
  1004. drbd_set_flag(mdev, MD_NO_FUA);
  1005. else
  1006. drbd_clear_flag(mdev, MD_NO_FUA);
  1007. /* Point of no return reached.
  1008. * Devices and memory are no longer released by error cleanup below.
  1009. * now mdev takes over responsibility, and the state engine should
  1010. * clean it up somewhere. */
  1011. D_ASSERT(mdev->ldev == NULL);
  1012. mdev->ldev = nbc;
  1013. mdev->resync = resync_lru;
  1014. nbc = NULL;
  1015. resync_lru = NULL;
  1016. mdev->write_ordering = WO_bdev_flush;
  1017. drbd_bump_write_ordering(mdev, WO_bdev_flush);
  1018. if (drbd_md_test_flag(mdev->ldev, MDF_CRASHED_PRIMARY))
  1019. drbd_set_flag(mdev, CRASHED_PRIMARY);
  1020. else
  1021. drbd_clear_flag(mdev, CRASHED_PRIMARY);
  1022. if (drbd_md_test_flag(mdev->ldev, MDF_PRIMARY_IND) &&
  1023. !(mdev->state.role == R_PRIMARY && mdev->state.susp_nod)) {
  1024. drbd_set_flag(mdev, CRASHED_PRIMARY);
  1025. cp_discovered = 1;
  1026. }
  1027. mdev->send_cnt = 0;
  1028. mdev->recv_cnt = 0;
  1029. mdev->read_cnt = 0;
  1030. mdev->writ_cnt = 0;
  1031. drbd_reconsider_max_bio_size(mdev);
  1032. /* If I am currently not R_PRIMARY,
  1033. * but meta data primary indicator is set,
  1034. * I just now recover from a hard crash,
  1035. * and have been R_PRIMARY before that crash.
  1036. *
  1037. * Now, if I had no connection before that crash
  1038. * (have been degraded R_PRIMARY), chances are that
  1039. * I won't find my peer now either.
  1040. *
  1041. * In that case, and _only_ in that case,
  1042. * we use the degr-wfc-timeout instead of the default,
  1043. * so we can automatically recover from a crash of a
  1044. * degraded but active "cluster" after a certain timeout.
  1045. */
  1046. drbd_clear_flag(mdev, USE_DEGR_WFC_T);
  1047. if (mdev->state.role != R_PRIMARY &&
  1048. drbd_md_test_flag(mdev->ldev, MDF_PRIMARY_IND) &&
  1049. !drbd_md_test_flag(mdev->ldev, MDF_CONNECTED_IND))
  1050. drbd_set_flag(mdev, USE_DEGR_WFC_T);
  1051. dd = drbd_determine_dev_size(mdev, 0);
  1052. if (dd == dev_size_error) {
  1053. retcode = ERR_NOMEM_BITMAP;
  1054. goto force_diskless_dec;
  1055. } else if (dd == grew)
  1056. drbd_set_flag(mdev, RESYNC_AFTER_NEG);
  1057. if (drbd_md_test_flag(mdev->ldev, MDF_FULL_SYNC)) {
  1058. dev_info(DEV, "Assuming that all blocks are out of sync "
  1059. "(aka FullSync)\n");
  1060. if (drbd_bitmap_io(mdev, &drbd_bmio_set_n_write,
  1061. "set_n_write from attaching", BM_LOCKED_MASK)) {
  1062. retcode = ERR_IO_MD_DISK;
  1063. goto force_diskless_dec;
  1064. }
  1065. } else {
  1066. if (drbd_bitmap_io(mdev, &drbd_bm_read,
  1067. "read from attaching", BM_LOCKED_MASK) < 0) {
  1068. retcode = ERR_IO_MD_DISK;
  1069. goto force_diskless_dec;
  1070. }
  1071. }
  1072. if (cp_discovered) {
  1073. drbd_al_apply_to_bm(mdev);
  1074. if (drbd_bitmap_io(mdev, &drbd_bm_write,
  1075. "crashed primary apply AL", BM_LOCKED_MASK)) {
  1076. retcode = ERR_IO_MD_DISK;
  1077. goto force_diskless_dec;
  1078. }
  1079. }
  1080. if (_drbd_bm_total_weight(mdev) == drbd_bm_bits(mdev))
  1081. drbd_suspend_al(mdev); /* IO is still suspended here... */
  1082. spin_lock_irq(&mdev->req_lock);
  1083. os = mdev->state;
  1084. ns.i = os.i;
  1085. /* If MDF_CONSISTENT is not set go into inconsistent state,
  1086. otherwise investigate MDF_WasUpToDate...
  1087. If MDF_WAS_UP_TO_DATE is not set go into D_OUTDATED disk state,
  1088. otherwise into D_CONSISTENT state.
  1089. */
  1090. if (drbd_md_test_flag(mdev->ldev, MDF_CONSISTENT)) {
  1091. if (drbd_md_test_flag(mdev->ldev, MDF_WAS_UP_TO_DATE))
  1092. ns.disk = D_CONSISTENT;
  1093. else
  1094. ns.disk = D_OUTDATED;
  1095. } else {
  1096. ns.disk = D_INCONSISTENT;
  1097. }
  1098. if (drbd_md_test_flag(mdev->ldev, MDF_PEER_OUT_DATED))
  1099. ns.pdsk = D_OUTDATED;
  1100. if ( ns.disk == D_CONSISTENT &&
  1101. (ns.pdsk == D_OUTDATED || mdev->ldev->dc.fencing == FP_DONT_CARE))
  1102. ns.disk = D_UP_TO_DATE;
  1103. /* All tests on MDF_PRIMARY_IND, MDF_CONNECTED_IND,
  1104. MDF_CONSISTENT and MDF_WAS_UP_TO_DATE must happen before
  1105. this point, because drbd_request_state() modifies these
  1106. flags. */
  1107. /* In case we are C_CONNECTED postpone any decision on the new disk
  1108. state after the negotiation phase. */
  1109. if (mdev->state.conn == C_CONNECTED) {
  1110. mdev->new_state_tmp.i = ns.i;
  1111. ns.i = os.i;
  1112. ns.disk = D_NEGOTIATING;
  1113. /* We expect to receive up-to-date UUIDs soon.
  1114. To avoid a race in receive_state, free p_uuid while
  1115. holding req_lock. I.e. atomic with the state change */
  1116. kfree(mdev->p_uuid);
  1117. mdev->p_uuid = NULL;
  1118. }
  1119. rv = _drbd_set_state(mdev, ns, CS_VERBOSE, NULL);
  1120. ns = mdev->state;
  1121. spin_unlock_irq(&mdev->req_lock);
  1122. if (rv < SS_SUCCESS)
  1123. goto force_diskless_dec;
  1124. if (mdev->state.role == R_PRIMARY)
  1125. mdev->ldev->md.uuid[UI_CURRENT] |= (u64)1;
  1126. else
  1127. mdev->ldev->md.uuid[UI_CURRENT] &= ~(u64)1;
  1128. drbd_md_mark_dirty(mdev);
  1129. drbd_md_sync(mdev);
  1130. kobject_uevent(&disk_to_dev(mdev->vdisk)->kobj, KOBJ_CHANGE);
  1131. put_ldev(mdev);
  1132. reply->ret_code = retcode;
  1133. drbd_reconfig_done(mdev);
  1134. return 0;
  1135. force_diskless_dec:
  1136. put_ldev(mdev);
  1137. force_diskless:
  1138. drbd_force_state(mdev, NS(disk, D_FAILED));
  1139. drbd_md_sync(mdev);
  1140. fail:
  1141. if (nbc) {
  1142. if (nbc->backing_bdev)
  1143. blkdev_put(nbc->backing_bdev,
  1144. FMODE_READ | FMODE_WRITE | FMODE_EXCL);
  1145. if (nbc->md_bdev)
  1146. blkdev_put(nbc->md_bdev,
  1147. FMODE_READ | FMODE_WRITE | FMODE_EXCL);
  1148. kfree(nbc);
  1149. }
  1150. lc_destroy(resync_lru);
  1151. reply->ret_code = retcode;
  1152. drbd_reconfig_done(mdev);
  1153. return 0;
  1154. }
  1155. /* Detaching the disk is a process in multiple stages. First we need to lock
  1156. * out application IO, in-flight IO, IO stuck in drbd_al_begin_io.
  1157. * Then we transition to D_DISKLESS, and wait for put_ldev() to return all
  1158. * internal references as well.
  1159. * Only then we have finally detached. */
  1160. static int drbd_nl_detach(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
  1161. struct drbd_nl_cfg_reply *reply)
  1162. {
  1163. enum drbd_ret_code retcode;
  1164. int ret;
  1165. struct detach dt = {};
  1166. if (!detach_from_tags(mdev, nlp->tag_list, &dt)) {
  1167. reply->ret_code = ERR_MANDATORY_TAG;
  1168. goto out;
  1169. }
  1170. if (dt.detach_force) {
  1171. drbd_set_flag(mdev, FORCE_DETACH);
  1172. drbd_force_state(mdev, NS(disk, D_FAILED));
  1173. reply->ret_code = SS_SUCCESS;
  1174. goto out;
  1175. }
  1176. drbd_suspend_io(mdev); /* so no-one is stuck in drbd_al_begin_io */
  1177. drbd_md_get_buffer(mdev); /* make sure there is no in-flight meta-data IO */
  1178. retcode = drbd_request_state(mdev, NS(disk, D_FAILED));
  1179. drbd_md_put_buffer(mdev);
  1180. /* D_FAILED will transition to DISKLESS. */
  1181. ret = wait_event_interruptible(mdev->misc_wait,
  1182. mdev->state.disk != D_FAILED);
  1183. drbd_resume_io(mdev);
  1184. if ((int)retcode == (int)SS_IS_DISKLESS)
  1185. retcode = SS_NOTHING_TO_DO;
  1186. if (ret)
  1187. retcode = ERR_INTR;
  1188. reply->ret_code = retcode;
  1189. out:
  1190. return 0;
  1191. }
  1192. static int drbd_nl_net_conf(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
  1193. struct drbd_nl_cfg_reply *reply)
  1194. {
  1195. int i, ns;
  1196. enum drbd_ret_code retcode;
  1197. struct net_conf *new_conf = NULL;
  1198. struct crypto_hash *tfm = NULL;
  1199. struct crypto_hash *integrity_w_tfm = NULL;
  1200. struct crypto_hash *integrity_r_tfm = NULL;
  1201. struct hlist_head *new_tl_hash = NULL;
  1202. struct hlist_head *new_ee_hash = NULL;
  1203. struct drbd_conf *odev;
  1204. char hmac_name[CRYPTO_MAX_ALG_NAME];
  1205. void *int_dig_out = NULL;
  1206. void *int_dig_in = NULL;
  1207. void *int_dig_vv = NULL;
  1208. struct sockaddr *new_my_addr, *new_peer_addr, *taken_addr;
  1209. drbd_reconfig_start(mdev);
  1210. if (mdev->state.conn > C_STANDALONE) {
  1211. retcode = ERR_NET_CONFIGURED;
  1212. goto fail;
  1213. }
  1214. /* allocation not in the IO path, cqueue thread context */
  1215. new_conf = kzalloc(sizeof(struct net_conf), GFP_KERNEL);
  1216. if (!new_conf) {
  1217. retcode = ERR_NOMEM;
  1218. goto fail;
  1219. }
  1220. new_conf->timeout = DRBD_TIMEOUT_DEF;
  1221. new_conf->try_connect_int = DRBD_CONNECT_INT_DEF;
  1222. new_conf->ping_int = DRBD_PING_INT_DEF;
  1223. new_conf->max_epoch_size = DRBD_MAX_EPOCH_SIZE_DEF;
  1224. new_conf->max_buffers = DRBD_MAX_BUFFERS_DEF;
  1225. new_conf->unplug_watermark = DRBD_UNPLUG_WATERMARK_DEF;
  1226. new_conf->sndbuf_size = DRBD_SNDBUF_SIZE_DEF;
  1227. new_conf->rcvbuf_size = DRBD_RCVBUF_SIZE_DEF;
  1228. new_conf->ko_count = DRBD_KO_COUNT_DEF;
  1229. new_conf->after_sb_0p = DRBD_AFTER_SB_0P_DEF;
  1230. new_conf->after_sb_1p = DRBD_AFTER_SB_1P_DEF;
  1231. new_conf->after_sb_2p = DRBD_AFTER_SB_2P_DEF;
  1232. new_conf->want_lose = 0;
  1233. new_conf->two_primaries = 0;
  1234. new_conf->wire_protocol = DRBD_PROT_C;
  1235. new_conf->ping_timeo = DRBD_PING_TIMEO_DEF;
  1236. new_conf->rr_conflict = DRBD_RR_CONFLICT_DEF;
  1237. new_conf->on_congestion = DRBD_ON_CONGESTION_DEF;
  1238. new_conf->cong_extents = DRBD_CONG_EXTENTS_DEF;
  1239. if (!net_conf_from_tags(mdev, nlp->tag_list, new_conf)) {
  1240. retcode = ERR_MANDATORY_TAG;
  1241. goto fail;
  1242. }
  1243. if (new_conf->two_primaries
  1244. && (new_conf->wire_protocol != DRBD_PROT_C)) {
  1245. retcode = ERR_NOT_PROTO_C;
  1246. goto fail;
  1247. }
  1248. if (get_ldev(mdev)) {
  1249. enum drbd_fencing_p fp = mdev->ldev->dc.fencing;
  1250. put_ldev(mdev);
  1251. if (new_conf->wire_protocol == DRBD_PROT_A && fp == FP_STONITH) {
  1252. retcode = ERR_STONITH_AND_PROT_A;
  1253. goto fail;
  1254. }
  1255. }
  1256. if (new_conf->on_congestion != OC_BLOCK && new_conf->wire_protocol != DRBD_PROT_A) {
  1257. retcode = ERR_CONG_NOT_PROTO_A;
  1258. goto fail;
  1259. }
  1260. if (mdev->state.role == R_PRIMARY && new_conf->want_lose) {
  1261. retcode = ERR_DISCARD;
  1262. goto fail;
  1263. }
  1264. retcode = NO_ERROR;
  1265. new_my_addr = (struct sockaddr *)&new_conf->my_addr;
  1266. new_peer_addr = (struct sockaddr *)&new_conf->peer_addr;
  1267. for (i = 0; i < minor_count; i++) {
  1268. odev = minor_to_mdev(i);
  1269. if (!odev || odev == mdev)
  1270. continue;
  1271. if (get_net_conf(odev)) {
  1272. taken_addr = (struct sockaddr *)&odev->net_conf->my_addr;
  1273. if (new_conf->my_addr_len == odev->net_conf->my_addr_len &&
  1274. !memcmp(new_my_addr, taken_addr, new_conf->my_addr_len))
  1275. retcode = ERR_LOCAL_ADDR;
  1276. taken_addr = (struct sockaddr *)&odev->net_conf->peer_addr;
  1277. if (new_conf->peer_addr_len == odev->net_conf->peer_addr_len &&
  1278. !memcmp(new_peer_addr, taken_addr, new_conf->peer_addr_len))
  1279. retcode = ERR_PEER_ADDR;
  1280. put_net_conf(odev);
  1281. if (retcode != NO_ERROR)
  1282. goto fail;
  1283. }
  1284. }
  1285. if (new_conf->cram_hmac_alg[0] != 0) {
  1286. snprintf(hmac_name, CRYPTO_MAX_ALG_NAME, "hmac(%s)",
  1287. new_conf->cram_hmac_alg);
  1288. tfm = crypto_alloc_hash(hmac_name, 0, CRYPTO_ALG_ASYNC);
  1289. if (IS_ERR(tfm)) {
  1290. tfm = NULL;
  1291. retcode = ERR_AUTH_ALG;
  1292. goto fail;
  1293. }
  1294. if (!drbd_crypto_is_hash(crypto_hash_tfm(tfm))) {
  1295. retcode = ERR_AUTH_ALG_ND;
  1296. goto fail;
  1297. }
  1298. }
  1299. if (new_conf->integrity_alg[0]) {
  1300. integrity_w_tfm = crypto_alloc_hash(new_conf->integrity_alg, 0, CRYPTO_ALG_ASYNC);
  1301. if (IS_ERR(integrity_w_tfm)) {
  1302. integrity_w_tfm = NULL;
  1303. retcode=ERR_INTEGRITY_ALG;
  1304. goto fail;
  1305. }
  1306. if (!drbd_crypto_is_hash(crypto_hash_tfm(integrity_w_tfm))) {
  1307. retcode=ERR_INTEGRITY_ALG_ND;
  1308. goto fail;
  1309. }
  1310. integrity_r_tfm = crypto_alloc_hash(new_conf->integrity_alg, 0, CRYPTO_ALG_ASYNC);
  1311. if (IS_ERR(integrity_r_tfm)) {
  1312. integrity_r_tfm = NULL;
  1313. retcode=ERR_INTEGRITY_ALG;
  1314. goto fail;
  1315. }
  1316. }
  1317. ns = new_conf->max_epoch_size/8;
  1318. if (mdev->tl_hash_s != ns) {
  1319. new_tl_hash = kzalloc(ns*sizeof(void *), GFP_KERNEL);
  1320. if (!new_tl_hash) {
  1321. retcode = ERR_NOMEM;
  1322. goto fail;
  1323. }
  1324. }
  1325. ns = new_conf->max_buffers/8;
  1326. if (new_conf->two_primaries && (mdev->ee_hash_s != ns)) {
  1327. new_ee_hash = kzalloc(ns*sizeof(void *), GFP_KERNEL);
  1328. if (!new_ee_hash) {
  1329. retcode = ERR_NOMEM;
  1330. goto fail;
  1331. }
  1332. }
  1333. ((char *)new_conf->shared_secret)[SHARED_SECRET_MAX-1] = 0;
  1334. if (integrity_w_tfm) {
  1335. i = crypto_hash_digestsize(integrity_w_tfm);
  1336. int_dig_out = kmalloc(i, GFP_KERNEL);
  1337. if (!int_dig_out) {
  1338. retcode = ERR_NOMEM;
  1339. goto fail;
  1340. }
  1341. int_dig_in = kmalloc(i, GFP_KERNEL);
  1342. if (!int_dig_in) {
  1343. retcode = ERR_NOMEM;
  1344. goto fail;
  1345. }
  1346. int_dig_vv = kmalloc(i, GFP_KERNEL);
  1347. if (!int_dig_vv) {
  1348. retcode = ERR_NOMEM;
  1349. goto fail;
  1350. }
  1351. }
  1352. if (!mdev->bitmap) {
  1353. if(drbd_bm_init(mdev)) {
  1354. retcode = ERR_NOMEM;
  1355. goto fail;
  1356. }
  1357. }
  1358. drbd_flush_workqueue(mdev);
  1359. spin_lock_irq(&mdev->req_lock);
  1360. if (mdev->net_conf != NULL) {
  1361. retcode = ERR_NET_CONFIGURED;
  1362. spin_unlock_irq(&mdev->req_lock);
  1363. goto fail;
  1364. }
  1365. mdev->net_conf = new_conf;
  1366. mdev->send_cnt = 0;
  1367. mdev->recv_cnt = 0;
  1368. if (new_tl_hash) {
  1369. kfree(mdev->tl_hash);
  1370. mdev->tl_hash_s = mdev->net_conf->max_epoch_size/8;
  1371. mdev->tl_hash = new_tl_hash;
  1372. }
  1373. if (new_ee_hash) {
  1374. kfree(mdev->ee_hash);
  1375. mdev->ee_hash_s = mdev->net_conf->max_buffers/8;
  1376. mdev->ee_hash = new_ee_hash;
  1377. }
  1378. crypto_free_hash(mdev->cram_hmac_tfm);
  1379. mdev->cram_hmac_tfm = tfm;
  1380. crypto_free_hash(mdev->integrity_w_tfm);
  1381. mdev->integrity_w_tfm = integrity_w_tfm;
  1382. crypto_free_hash(mdev->integrity_r_tfm);
  1383. mdev->integrity_r_tfm = integrity_r_tfm;
  1384. kfree(mdev->int_dig_out);
  1385. kfree(mdev->int_dig_in);
  1386. kfree(mdev->int_dig_vv);
  1387. mdev->int_dig_out=int_dig_out;
  1388. mdev->int_dig_in=int_dig_in;
  1389. mdev->int_dig_vv=int_dig_vv;
  1390. retcode = _drbd_set_state(_NS(mdev, conn, C_UNCONNECTED), CS_VERBOSE, NULL);
  1391. spin_unlock_irq(&mdev->req_lock);
  1392. kobject_uevent(&disk_to_dev(mdev->vdisk)->kobj, KOBJ_CHANGE);
  1393. reply->ret_code = retcode;
  1394. drbd_reconfig_done(mdev);
  1395. return 0;
  1396. fail:
  1397. kfree(int_dig_out);
  1398. kfree(int_dig_in);
  1399. kfree(int_dig_vv);
  1400. crypto_free_hash(tfm);
  1401. crypto_free_hash(integrity_w_tfm);
  1402. crypto_free_hash(integrity_r_tfm);
  1403. kfree(new_tl_hash);
  1404. kfree(new_ee_hash);
  1405. kfree(new_conf);
  1406. reply->ret_code = retcode;
  1407. drbd_reconfig_done(mdev);
  1408. return 0;
  1409. }
  1410. static int drbd_nl_disconnect(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
  1411. struct drbd_nl_cfg_reply *reply)
  1412. {
  1413. int retcode;
  1414. struct disconnect dc;
  1415. memset(&dc, 0, sizeof(struct disconnect));
  1416. if (!disconnect_from_tags(mdev, nlp->tag_list, &dc)) {
  1417. retcode = ERR_MANDATORY_TAG;
  1418. goto fail;
  1419. }
  1420. if (dc.force) {
  1421. spin_lock_irq(&mdev->req_lock);
  1422. if (mdev->state.conn >= C_WF_CONNECTION)
  1423. _drbd_set_state(_NS(mdev, conn, C_DISCONNECTING), CS_HARD, NULL);
  1424. spin_unlock_irq(&mdev->req_lock);
  1425. goto done;
  1426. }
  1427. retcode = _drbd_request_state(mdev, NS(conn, C_DISCONNECTING), CS_ORDERED);
  1428. if (retcode == SS_NOTHING_TO_DO)
  1429. goto done;
  1430. else if (retcode == SS_ALREADY_STANDALONE)
  1431. goto done;
  1432. else if (retcode == SS_PRIMARY_NOP) {
  1433. /* Our statche checking code wants to see the peer outdated. */
  1434. retcode = drbd_request_state(mdev, NS2(conn, C_DISCONNECTING,
  1435. pdsk, D_OUTDATED));
  1436. } else if (retcode == SS_CW_FAILED_BY_PEER) {
  1437. /* The peer probably wants to see us outdated. */
  1438. retcode = _drbd_request_state(mdev, NS2(conn, C_DISCONNECTING,
  1439. disk, D_OUTDATED),
  1440. CS_ORDERED);
  1441. if (retcode == SS_IS_DISKLESS || retcode == SS_LOWER_THAN_OUTDATED) {
  1442. drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
  1443. retcode = SS_SUCCESS;
  1444. }
  1445. }
  1446. if (retcode < SS_SUCCESS)
  1447. goto fail;
  1448. if (wait_event_interruptible(mdev->state_wait,
  1449. mdev->state.conn != C_DISCONNECTING)) {
  1450. /* Do not test for mdev->state.conn == C_STANDALONE, since
  1451. someone else might connect us in the mean time! */
  1452. retcode = ERR_INTR;
  1453. goto fail;
  1454. }
  1455. done:
  1456. retcode = NO_ERROR;
  1457. fail:
  1458. drbd_md_sync(mdev);
  1459. reply->ret_code = retcode;
  1460. return 0;
  1461. }
  1462. void resync_after_online_grow(struct drbd_conf *mdev)
  1463. {
  1464. int iass; /* I am sync source */
  1465. dev_info(DEV, "Resync of new storage after online grow\n");
  1466. if (mdev->state.role != mdev->state.peer)
  1467. iass = (mdev->state.role == R_PRIMARY);
  1468. else
  1469. iass = drbd_test_flag(mdev, DISCARD_CONCURRENT);
  1470. if (iass)
  1471. drbd_start_resync(mdev, C_SYNC_SOURCE);
  1472. else
  1473. _drbd_request_state(mdev, NS(conn, C_WF_SYNC_UUID), CS_VERBOSE + CS_SERIALIZE);
  1474. }
  1475. static int drbd_nl_resize(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
  1476. struct drbd_nl_cfg_reply *reply)
  1477. {
  1478. struct resize rs;
  1479. int retcode = NO_ERROR;
  1480. enum determine_dev_size dd;
  1481. enum dds_flags ddsf;
  1482. memset(&rs, 0, sizeof(struct resize));
  1483. if (!resize_from_tags(mdev, nlp->tag_list, &rs)) {
  1484. retcode = ERR_MANDATORY_TAG;
  1485. goto fail;
  1486. }
  1487. if (mdev->state.conn > C_CONNECTED) {
  1488. retcode = ERR_RESIZE_RESYNC;
  1489. goto fail;
  1490. }
  1491. if (mdev->state.role == R_SECONDARY &&
  1492. mdev->state.peer == R_SECONDARY) {
  1493. retcode = ERR_NO_PRIMARY;
  1494. goto fail;
  1495. }
  1496. if (!get_ldev(mdev)) {
  1497. retcode = ERR_NO_DISK;
  1498. goto fail;
  1499. }
  1500. if (rs.no_resync && mdev->agreed_pro_version < 93) {
  1501. retcode = ERR_NEED_APV_93;
  1502. goto fail_ldev;
  1503. }
  1504. if (mdev->ldev->known_size != drbd_get_capacity(mdev->ldev->backing_bdev))
  1505. mdev->ldev->known_size = drbd_get_capacity(mdev->ldev->backing_bdev);
  1506. mdev->ldev->dc.disk_size = (sector_t)rs.resize_size;
  1507. ddsf = (rs.resize_force ? DDSF_FORCED : 0) | (rs.no_resync ? DDSF_NO_RESYNC : 0);
  1508. dd = drbd_determine_dev_size(mdev, ddsf);
  1509. drbd_md_sync(mdev);
  1510. put_ldev(mdev);
  1511. if (dd == dev_size_error) {
  1512. retcode = ERR_NOMEM_BITMAP;
  1513. goto fail;
  1514. }
  1515. if (mdev->state.conn == C_CONNECTED) {
  1516. if (dd == grew)
  1517. drbd_set_flag(mdev, RESIZE_PENDING);
  1518. drbd_send_uuids(mdev);
  1519. drbd_send_sizes(mdev, 1, ddsf);
  1520. }
  1521. fail:
  1522. reply->ret_code = retcode;
  1523. return 0;
  1524. fail_ldev:
  1525. put_ldev(mdev);
  1526. goto fail;
  1527. }
  1528. static int drbd_nl_syncer_conf(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
  1529. struct drbd_nl_cfg_reply *reply)
  1530. {
  1531. int retcode = NO_ERROR;
  1532. int err;
  1533. int ovr; /* online verify running */
  1534. int rsr; /* re-sync running */
  1535. struct crypto_hash *verify_tfm = NULL;
  1536. struct crypto_hash *csums_tfm = NULL;
  1537. struct syncer_conf sc;
  1538. cpumask_var_t new_cpu_mask;
  1539. int *rs_plan_s = NULL;
  1540. int fifo_size;
  1541. if (!zalloc_cpumask_var(&new_cpu_mask, GFP_KERNEL)) {
  1542. retcode = ERR_NOMEM;
  1543. goto fail;
  1544. }
  1545. if (nlp->flags & DRBD_NL_SET_DEFAULTS) {
  1546. memset(&sc, 0, sizeof(struct syncer_conf));
  1547. sc.rate = DRBD_RATE_DEF;
  1548. sc.after = DRBD_AFTER_DEF;
  1549. sc.al_extents = DRBD_AL_EXTENTS_DEF;
  1550. sc.on_no_data = DRBD_ON_NO_DATA_DEF;
  1551. sc.c_plan_ahead = DRBD_C_PLAN_AHEAD_DEF;
  1552. sc.c_delay_target = DRBD_C_DELAY_TARGET_DEF;
  1553. sc.c_fill_target = DRBD_C_FILL_TARGET_DEF;
  1554. sc.c_max_rate = DRBD_C_MAX_RATE_DEF;
  1555. sc.c_min_rate = DRBD_C_MIN_RATE_DEF;
  1556. } else
  1557. memcpy(&sc, &mdev->sync_conf, sizeof(struct syncer_conf));
  1558. if (!syncer_conf_from_tags(mdev, nlp->tag_list, &sc)) {
  1559. retcode = ERR_MANDATORY_TAG;
  1560. goto fail;
  1561. }
  1562. /* re-sync running */
  1563. rsr = ( mdev->state.conn == C_SYNC_SOURCE ||
  1564. mdev->state.conn == C_SYNC_TARGET ||
  1565. mdev->state.conn == C_PAUSED_SYNC_S ||
  1566. mdev->state.conn == C_PAUSED_SYNC_T );
  1567. if (rsr && strcmp(sc.csums_alg, mdev->sync_conf.csums_alg)) {
  1568. retcode = ERR_CSUMS_RESYNC_RUNNING;
  1569. goto fail;
  1570. }
  1571. if (!rsr && sc.csums_alg[0]) {
  1572. csums_tfm = crypto_alloc_hash(sc.csums_alg, 0, CRYPTO_ALG_ASYNC);
  1573. if (IS_ERR(csums_tfm)) {
  1574. csums_tfm = NULL;
  1575. retcode = ERR_CSUMS_ALG;
  1576. goto fail;
  1577. }
  1578. if (!drbd_crypto_is_hash(crypto_hash_tfm(csums_tfm))) {
  1579. retcode = ERR_CSUMS_ALG_ND;
  1580. goto fail;
  1581. }
  1582. }
  1583. /* online verify running */
  1584. ovr = (mdev->state.conn == C_VERIFY_S || mdev->state.conn == C_VERIFY_T);
  1585. if (ovr) {
  1586. if (strcmp(sc.verify_alg, mdev->sync_conf.verify_alg)) {
  1587. retcode = ERR_VERIFY_RUNNING;
  1588. goto fail;
  1589. }
  1590. }
  1591. if (!ovr && sc.verify_alg[0]) {
  1592. verify_tfm = crypto_alloc_hash(sc.verify_alg, 0, CRYPTO_ALG_ASYNC);
  1593. if (IS_ERR(verify_tfm)) {
  1594. verify_tfm = NULL;
  1595. retcode = ERR_VERIFY_ALG;
  1596. goto fail;
  1597. }
  1598. if (!drbd_crypto_is_hash(crypto_hash_tfm(verify_tfm))) {
  1599. retcode = ERR_VERIFY_ALG_ND;
  1600. goto fail;
  1601. }
  1602. }
  1603. /* silently ignore cpu mask on UP kernel */
  1604. if (nr_cpu_ids > 1 && sc.cpu_mask[0] != 0) {
  1605. err = bitmap_parse(sc.cpu_mask, 32,
  1606. cpumask_bits(new_cpu_mask), nr_cpu_ids);
  1607. if (err) {
  1608. dev_warn(DEV, "bitmap_parse() failed with %d\n", err);
  1609. retcode = ERR_CPU_MASK_PARSE;
  1610. goto fail;
  1611. }
  1612. }
  1613. ERR_IF (sc.rate < 1) sc.rate = 1;
  1614. ERR_IF (sc.al_extents < 7) sc.al_extents = 127; /* arbitrary minimum */
  1615. #define AL_MAX ((MD_AL_MAX_SIZE-1) * AL_EXTENTS_PT)
  1616. if (sc.al_extents > AL_MAX) {
  1617. dev_err(DEV, "sc.al_extents > %d\n", AL_MAX);
  1618. sc.al_extents = AL_MAX;
  1619. }
  1620. #undef AL_MAX
  1621. /* to avoid spurious errors when configuring minors before configuring
  1622. * the minors they depend on: if necessary, first create the minor we
  1623. * depend on */
  1624. if (sc.after >= 0)
  1625. ensure_mdev(sc.after, 1);
  1626. /* most sanity checks done, try to assign the new sync-after
  1627. * dependency. need to hold the global lock in there,
  1628. * to avoid a race in the dependency loop check. */
  1629. retcode = drbd_alter_sa(mdev, sc.after);
  1630. if (retcode != NO_ERROR)
  1631. goto fail;
  1632. fifo_size = (sc.c_plan_ahead * 10 * SLEEP_TIME) / HZ;
  1633. if (fifo_size != mdev->rs_plan_s.size && fifo_size > 0) {
  1634. rs_plan_s = kzalloc(sizeof(int) * fifo_size, GFP_KERNEL);
  1635. if (!rs_plan_s) {
  1636. dev_err(DEV, "kmalloc of fifo_buffer failed");
  1637. retcode = ERR_NOMEM;
  1638. goto fail;
  1639. }
  1640. }
  1641. /* ok, assign the rest of it as well.
  1642. * lock against receive_SyncParam() */
  1643. spin_lock(&mdev->peer_seq_lock);
  1644. mdev->sync_conf = sc;
  1645. if (!rsr) {
  1646. crypto_free_hash(mdev->csums_tfm);
  1647. mdev->csums_tfm = csums_tfm;
  1648. csums_tfm = NULL;
  1649. }
  1650. if (!ovr) {
  1651. crypto_free_hash(mdev->verify_tfm);
  1652. mdev->verify_tfm = verify_tfm;
  1653. verify_tfm = NULL;
  1654. }
  1655. if (fifo_size != mdev->rs_plan_s.size) {
  1656. kfree(mdev->rs_plan_s.values);
  1657. mdev->rs_plan_s.values = rs_plan_s;
  1658. mdev->rs_plan_s.size = fifo_size;
  1659. mdev->rs_planed = 0;
  1660. rs_plan_s = NULL;
  1661. }
  1662. spin_unlock(&mdev->peer_seq_lock);
  1663. if (get_ldev(mdev)) {
  1664. wait_event(mdev->al_wait, lc_try_lock(mdev->act_log));
  1665. drbd_al_shrink(mdev);
  1666. err = drbd_check_al_size(mdev);
  1667. lc_unlock(mdev->act_log);
  1668. wake_up(&mdev->al_wait);
  1669. put_ldev(mdev);
  1670. drbd_md_sync(mdev);
  1671. if (err) {
  1672. retcode = ERR_NOMEM;
  1673. goto fail;
  1674. }
  1675. }
  1676. if (mdev->state.conn >= C_CONNECTED)
  1677. drbd_send_sync_param(mdev, &sc);
  1678. if (!cpumask_equal(mdev->cpu_mask, new_cpu_mask)) {
  1679. cpumask_copy(mdev->cpu_mask, new_cpu_mask);
  1680. drbd_calc_cpu_mask(mdev);
  1681. mdev->receiver.reset_cpu_mask = 1;
  1682. mdev->asender.reset_cpu_mask = 1;
  1683. mdev->worker.reset_cpu_mask = 1;
  1684. }
  1685. kobject_uevent(&disk_to_dev(mdev->vdisk)->kobj, KOBJ_CHANGE);
  1686. fail:
  1687. kfree(rs_plan_s);
  1688. free_cpumask_var(new_cpu_mask);
  1689. crypto_free_hash(csums_tfm);
  1690. crypto_free_hash(verify_tfm);
  1691. reply->ret_code = retcode;
  1692. return 0;
  1693. }
  1694. static int drbd_nl_invalidate(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
  1695. struct drbd_nl_cfg_reply *reply)
  1696. {
  1697. int retcode;
  1698. /* If there is still bitmap IO pending, probably because of a previous
  1699. * resync just being finished, wait for it before requesting a new resync.
  1700. * Also wait for it's after_state_ch(). */
  1701. drbd_suspend_io(mdev);
  1702. wait_event(mdev->misc_wait, !drbd_test_flag(mdev, BITMAP_IO));
  1703. drbd_flush_workqueue(mdev);
  1704. retcode = _drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_T), CS_ORDERED);
  1705. if (retcode < SS_SUCCESS && retcode != SS_NEED_CONNECTION)
  1706. retcode = drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_T));
  1707. while (retcode == SS_NEED_CONNECTION) {
  1708. spin_lock_irq(&mdev->req_lock);
  1709. if (mdev->state.conn < C_CONNECTED)
  1710. retcode = _drbd_set_state(_NS(mdev, disk, D_INCONSISTENT), CS_VERBOSE, NULL);
  1711. spin_unlock_irq(&mdev->req_lock);
  1712. if (retcode != SS_NEED_CONNECTION)
  1713. break;
  1714. retcode = drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_T));
  1715. }
  1716. drbd_resume_io(mdev);
  1717. reply->ret_code = retcode;
  1718. return 0;
  1719. }
  1720. static int drbd_bmio_set_susp_al(struct drbd_conf *mdev)
  1721. {
  1722. int rv;
  1723. rv = drbd_bmio_set_n_write(mdev);
  1724. drbd_suspend_al(mdev);
  1725. return rv;
  1726. }
  1727. static int drbd_nl_invalidate_peer(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
  1728. struct drbd_nl_cfg_reply *reply)
  1729. {
  1730. int retcode;
  1731. /* If there is still bitmap IO pending, probably because of a previous
  1732. * resync just being finished, wait for it before requesting a new resync.
  1733. * Also wait for it's after_state_ch(). */
  1734. drbd_suspend_io(mdev);
  1735. wait_event(mdev->misc_wait, !drbd_test_flag(mdev, BITMAP_IO));
  1736. drbd_flush_workqueue(mdev);
  1737. retcode = _drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_S), CS_ORDERED);
  1738. if (retcode < SS_SUCCESS) {
  1739. if (retcode == SS_NEED_CONNECTION && mdev->state.role == R_PRIMARY) {
  1740. /* The peer will get a resync upon connect anyways. Just make that
  1741. into a full resync. */
  1742. retcode = drbd_request_state(mdev, NS(pdsk, D_INCONSISTENT));
  1743. if (retcode >= SS_SUCCESS) {
  1744. if (drbd_bitmap_io(mdev, &drbd_bmio_set_susp_al,
  1745. "set_n_write from invalidate_peer",
  1746. BM_LOCKED_SET_ALLOWED))
  1747. retcode = ERR_IO_MD_DISK;
  1748. }
  1749. } else
  1750. retcode = drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_S));
  1751. }
  1752. drbd_resume_io(mdev);
  1753. reply->ret_code = retcode;
  1754. return 0;
  1755. }
  1756. static int drbd_nl_pause_sync(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
  1757. struct drbd_nl_cfg_reply *reply)
  1758. {
  1759. int retcode = NO_ERROR;
  1760. if (drbd_request_state(mdev, NS(user_isp, 1)) == SS_NOTHING_TO_DO)
  1761. retcode = ERR_PAUSE_IS_SET;
  1762. reply->ret_code = retcode;
  1763. return 0;
  1764. }
  1765. static int drbd_nl_resume_sync(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
  1766. struct drbd_nl_cfg_reply *reply)
  1767. {
  1768. int retcode = NO_ERROR;
  1769. union drbd_state s;
  1770. if (drbd_request_state(mdev, NS(user_isp, 0)) == SS_NOTHING_TO_DO) {
  1771. s = mdev->state;
  1772. if (s.conn == C_PAUSED_SYNC_S || s.conn == C_PAUSED_SYNC_T) {
  1773. retcode = s.aftr_isp ? ERR_PIC_AFTER_DEP :
  1774. s.peer_isp ? ERR_PIC_PEER_DEP : ERR_PAUSE_IS_CLEAR;
  1775. } else {
  1776. retcode = ERR_PAUSE_IS_CLEAR;
  1777. }
  1778. }
  1779. reply->ret_code = retcode;
  1780. return 0;
  1781. }
  1782. static int drbd_nl_suspend_io(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
  1783. struct drbd_nl_cfg_reply *reply)
  1784. {
  1785. reply->ret_code = drbd_request_state(mdev, NS(susp, 1));
  1786. return 0;
  1787. }
  1788. static int drbd_nl_resume_io(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
  1789. struct drbd_nl_cfg_reply *reply)
  1790. {
  1791. if (drbd_test_flag(mdev, NEW_CUR_UUID)) {
  1792. drbd_uuid_new_current(mdev);
  1793. drbd_clear_flag(mdev, NEW_CUR_UUID);
  1794. }
  1795. drbd_suspend_io(mdev);
  1796. reply->ret_code = drbd_request_state(mdev, NS3(susp, 0, susp_nod, 0, susp_fen, 0));
  1797. if (reply->ret_code == SS_SUCCESS) {
  1798. if (mdev->state.conn < C_CONNECTED)
  1799. tl_clear(mdev);
  1800. if (mdev->state.disk == D_DISKLESS || mdev->state.disk == D_FAILED)
  1801. tl_restart(mdev, fail_frozen_disk_io);
  1802. }
  1803. drbd_resume_io(mdev);
  1804. return 0;
  1805. }
  1806. static int drbd_nl_outdate(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
  1807. struct drbd_nl_cfg_reply *reply)
  1808. {
  1809. reply->ret_code = drbd_request_state(mdev, NS(disk, D_OUTDATED));
  1810. return 0;
  1811. }
  1812. static int drbd_nl_get_config(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
  1813. struct drbd_nl_cfg_reply *reply)
  1814. {
  1815. unsigned short *tl;
  1816. tl = reply->tag_list;
  1817. if (get_ldev(mdev)) {
  1818. tl = disk_conf_to_tags(mdev, &mdev->ldev->dc, tl);
  1819. put_ldev(mdev);
  1820. }
  1821. if (get_net_conf(mdev)) {
  1822. tl = net_conf_to_tags(mdev, mdev->net_conf, tl);
  1823. put_net_conf(mdev);
  1824. }
  1825. tl = syncer_conf_to_tags(mdev, &mdev->sync_conf, tl);
  1826. put_unaligned(TT_END, tl++); /* Close the tag list */
  1827. return (int)((char *)tl - (char *)reply->tag_list);
  1828. }
  1829. static int drbd_nl_get_state(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
  1830. struct drbd_nl_cfg_reply *reply)
  1831. {
  1832. unsigned short *tl = reply->tag_list;
  1833. union drbd_state s = mdev->state;
  1834. unsigned long rs_left;
  1835. unsigned int res;
  1836. tl = get_state_to_tags(mdev, (struct get_state *)&s, tl);
  1837. /* no local ref, no bitmap, no syncer progress. */
  1838. if (s.conn >= C_SYNC_SOURCE && s.conn <= C_PAUSED_SYNC_T) {
  1839. if (get_ldev(mdev)) {
  1840. drbd_get_syncer_progress(mdev, &rs_left, &res);
  1841. tl = tl_add_int(tl, T_sync_progress, &res);
  1842. put_ldev(mdev);
  1843. }
  1844. }
  1845. put_unaligned(TT_END, tl++); /* Close the tag list */
  1846. return (int)((char *)tl - (char *)reply->tag_list);
  1847. }
  1848. static int drbd_nl_get_uuids(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
  1849. struct drbd_nl_cfg_reply *reply)
  1850. {
  1851. unsigned short *tl;
  1852. tl = reply->tag_list;
  1853. if (get_ldev(mdev)) {
  1854. unsigned long flags;
  1855. spin_lock_irqsave(&mdev->ldev->md.uuid_lock, flags);
  1856. tl = tl_add_blob(tl, T_uuids, mdev->ldev->md.uuid, UI_SIZE*sizeof(u64));
  1857. tl = tl_add_int(tl, T_uuids_flags, &mdev->ldev->md.flags);
  1858. spin_unlock_irqrestore(&mdev->ldev->md.uuid_lock, flags);
  1859. put_ldev(mdev);
  1860. }
  1861. put_unaligned(TT_END, tl++); /* Close the tag list */
  1862. return (int)((char *)tl - (char *)reply->tag_list);
  1863. }
  1864. /**
  1865. * drbd_nl_get_timeout_flag() - Used by drbdsetup to find out which timeout value to use
  1866. * @mdev: DRBD device.
  1867. * @nlp: Netlink/connector packet from drbdsetup
  1868. * @reply: Reply packet for drbdsetup
  1869. */
  1870. static int drbd_nl_get_timeout_flag(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
  1871. struct drbd_nl_cfg_reply *reply)
  1872. {
  1873. unsigned short *tl;
  1874. char rv;
  1875. tl = reply->tag_list;
  1876. rv = mdev->state.pdsk == D_OUTDATED ? UT_PEER_OUTDATED :
  1877. drbd_test_flag(mdev, USE_DEGR_WFC_T) ? UT_DEGRADED : UT_DEFAULT;
  1878. tl = tl_add_blob(tl, T_use_degraded, &rv, sizeof(rv));
  1879. put_unaligned(TT_END, tl++); /* Close the tag list */
  1880. return (int)((char *)tl - (char *)reply->tag_list);
  1881. }
  1882. static int drbd_nl_start_ov(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
  1883. struct drbd_nl_cfg_reply *reply)
  1884. {
  1885. /* default to resume from last known position, if possible */
  1886. struct start_ov args = {
  1887. .start_sector = mdev->ov_start_sector,
  1888. .stop_sector = ULLONG_MAX,
  1889. };
  1890. if (!start_ov_from_tags(mdev, nlp->tag_list, &args)) {
  1891. reply->ret_code = ERR_MANDATORY_TAG;
  1892. return 0;
  1893. }
  1894. /* If there is still bitmap IO pending, e.g. previous resync or verify
  1895. * just being finished, wait for it before requesting a new resync. */
  1896. drbd_suspend_io(mdev);
  1897. wait_event(mdev->misc_wait, !drbd_test_flag(mdev, BITMAP_IO));
  1898. /* w_make_ov_request expects start position to be aligned */
  1899. mdev->ov_start_sector = args.start_sector & ~(BM_SECT_PER_BIT-1);
  1900. mdev->ov_stop_sector = args.stop_sector;
  1901. reply->ret_code = drbd_request_state(mdev,NS(conn,C_VERIFY_S));
  1902. drbd_resume_io(mdev);
  1903. return 0;
  1904. }
  1905. static int drbd_nl_new_c_uuid(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
  1906. struct drbd_nl_cfg_reply *reply)
  1907. {
  1908. int retcode = NO_ERROR;
  1909. int skip_initial_sync = 0;
  1910. int err;
  1911. struct new_c_uuid args;
  1912. memset(&args, 0, sizeof(struct new_c_uuid));
  1913. if (!new_c_uuid_from_tags(mdev, nlp->tag_list, &args)) {
  1914. reply->ret_code = ERR_MANDATORY_TAG;
  1915. return 0;
  1916. }
  1917. mutex_lock(&mdev->state_mutex); /* Protects us against serialized state changes. */
  1918. if (!get_ldev(mdev)) {
  1919. retcode = ERR_NO_DISK;
  1920. goto out;
  1921. }
  1922. /* this is "skip initial sync", assume to be clean */
  1923. if (mdev->state.conn == C_CONNECTED && mdev->agreed_pro_version >= 90 &&
  1924. mdev->ldev->md.uuid[UI_CURRENT] == UUID_JUST_CREATED && args.clear_bm) {
  1925. dev_info(DEV, "Preparing to skip initial sync\n");
  1926. skip_initial_sync = 1;
  1927. } else if (mdev->state.conn != C_STANDALONE) {
  1928. retcode = ERR_CONNECTED;
  1929. goto out_dec;
  1930. }
  1931. drbd_uuid_set(mdev, UI_BITMAP, 0); /* Rotate UI_BITMAP to History 1, etc... */
  1932. drbd_uuid_new_current(mdev); /* New current, previous to UI_BITMAP */
  1933. if (args.clear_bm) {
  1934. err = drbd_bitmap_io(mdev, &drbd_bmio_clear_n_write,
  1935. "clear_n_write from new_c_uuid", BM_LOCKED_MASK);
  1936. if (err) {
  1937. dev_err(DEV, "Writing bitmap failed with %d\n",err);
  1938. retcode = ERR_IO_MD_DISK;
  1939. }
  1940. if (skip_initial_sync) {
  1941. drbd_send_uuids_skip_initial_sync(mdev);
  1942. _drbd_uuid_set(mdev, UI_BITMAP, 0);
  1943. drbd_print_uuids(mdev, "cleared bitmap UUID");
  1944. spin_lock_irq(&mdev->req_lock);
  1945. _drbd_set_state(_NS2(mdev, disk, D_UP_TO_DATE, pdsk, D_UP_TO_DATE),
  1946. CS_VERBOSE, NULL);
  1947. spin_unlock_irq(&mdev->req_lock);
  1948. }
  1949. }
  1950. drbd_md_sync(mdev);
  1951. out_dec:
  1952. put_ldev(mdev);
  1953. out:
  1954. mutex_unlock(&mdev->state_mutex);
  1955. reply->ret_code = retcode;
  1956. return 0;
  1957. }
  1958. struct cn_handler_struct {
  1959. int (*function)(struct drbd_conf *,
  1960. struct drbd_nl_cfg_req *,
  1961. struct drbd_nl_cfg_reply *);
  1962. int reply_body_size;
  1963. };
  1964. static struct cn_handler_struct cnd_table[] = {
  1965. [ P_primary ] = { &drbd_nl_primary, 0 },
  1966. [ P_secondary ] = { &drbd_nl_secondary, 0 },
  1967. [ P_disk_conf ] = { &drbd_nl_disk_conf, 0 },
  1968. [ P_detach ] = { &drbd_nl_detach, 0 },
  1969. [ P_net_conf ] = { &drbd_nl_net_conf, 0 },
  1970. [ P_disconnect ] = { &drbd_nl_disconnect, 0 },
  1971. [ P_resize ] = { &drbd_nl_resize, 0 },
  1972. [ P_syncer_conf ] = { &drbd_nl_syncer_conf, 0 },
  1973. [ P_invalidate ] = { &drbd_nl_invalidate, 0 },
  1974. [ P_invalidate_peer ] = { &drbd_nl_invalidate_peer, 0 },
  1975. [ P_pause_sync ] = { &drbd_nl_pause_sync, 0 },
  1976. [ P_resume_sync ] = { &drbd_nl_resume_sync, 0 },
  1977. [ P_suspend_io ] = { &drbd_nl_suspend_io, 0 },
  1978. [ P_resume_io ] = { &drbd_nl_resume_io, 0 },
  1979. [ P_outdate ] = { &drbd_nl_outdate, 0 },
  1980. [ P_get_config ] = { &drbd_nl_get_config,
  1981. sizeof(struct syncer_conf_tag_len_struct) +
  1982. sizeof(struct disk_conf_tag_len_struct) +
  1983. sizeof(struct net_conf_tag_len_struct) },
  1984. [ P_get_state ] = { &drbd_nl_get_state,
  1985. sizeof(struct get_state_tag_len_struct) +
  1986. sizeof(struct sync_progress_tag_len_struct) },
  1987. [ P_get_uuids ] = { &drbd_nl_get_uuids,
  1988. sizeof(struct get_uuids_tag_len_struct) },
  1989. [ P_get_timeout_flag ] = { &drbd_nl_get_timeout_flag,
  1990. sizeof(struct get_timeout_flag_tag_len_struct)},
  1991. [ P_start_ov ] = { &drbd_nl_start_ov, 0 },
  1992. [ P_new_c_uuid ] = { &drbd_nl_new_c_uuid, 0 },
  1993. };
  1994. static void drbd_connector_callback(struct cn_msg *req, struct netlink_skb_parms *nsp)
  1995. {
  1996. struct drbd_nl_cfg_req *nlp = (struct drbd_nl_cfg_req *)req->data;
  1997. struct cn_handler_struct *cm;
  1998. struct cn_msg *cn_reply;
  1999. struct drbd_nl_cfg_reply *reply;
  2000. struct drbd_conf *mdev;
  2001. int retcode, rr;
  2002. int reply_size = sizeof(struct cn_msg)
  2003. + sizeof(struct drbd_nl_cfg_reply)
  2004. + sizeof(short int);
  2005. if (!try_module_get(THIS_MODULE)) {
  2006. printk(KERN_ERR "drbd: try_module_get() failed!\n");
  2007. return;
  2008. }
  2009. if (!capable(CAP_SYS_ADMIN)) {
  2010. retcode = ERR_PERM;
  2011. goto fail;
  2012. }
  2013. mdev = ensure_mdev(nlp->drbd_minor,
  2014. (nlp->flags & DRBD_NL_CREATE_DEVICE));
  2015. if (!mdev) {
  2016. retcode = ERR_MINOR_INVALID;
  2017. goto fail;
  2018. }
  2019. if (nlp->packet_type >= P_nl_after_last_packet ||
  2020. nlp->packet_type == P_return_code_only) {
  2021. retcode = ERR_PACKET_NR;
  2022. goto fail;
  2023. }
  2024. cm = cnd_table + nlp->packet_type;
  2025. /* This may happen if packet number is 0: */
  2026. if (cm->function == NULL) {
  2027. retcode = ERR_PACKET_NR;
  2028. goto fail;
  2029. }
  2030. reply_size += cm->reply_body_size;
  2031. /* allocation not in the IO path, cqueue thread context */
  2032. cn_reply = kzalloc(reply_size, GFP_KERNEL);
  2033. if (!cn_reply) {
  2034. retcode = ERR_NOMEM;
  2035. goto fail;
  2036. }
  2037. reply = (struct drbd_nl_cfg_reply *) cn_reply->data;
  2038. reply->packet_type =
  2039. cm->reply_body_size ? nlp->packet_type : P_return_code_only;
  2040. reply->minor = nlp->drbd_minor;
  2041. reply->ret_code = NO_ERROR; /* Might by modified by cm->function. */
  2042. /* reply->tag_list; might be modified by cm->function. */
  2043. rr = cm->function(mdev, nlp, reply);
  2044. cn_reply->id = req->id;
  2045. cn_reply->seq = req->seq;
  2046. cn_reply->ack = req->ack + 1;
  2047. cn_reply->len = sizeof(struct drbd_nl_cfg_reply) + rr;
  2048. cn_reply->flags = 0;
  2049. rr = cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_KERNEL);
  2050. if (rr && rr != -ESRCH)
  2051. printk(KERN_INFO "drbd: cn_netlink_send()=%d\n", rr);
  2052. kfree(cn_reply);
  2053. module_put(THIS_MODULE);
  2054. return;
  2055. fail:
  2056. drbd_nl_send_reply(req, retcode);
  2057. module_put(THIS_MODULE);
  2058. }
  2059. static atomic_t drbd_nl_seq = ATOMIC_INIT(2); /* two. */
  2060. static unsigned short *
  2061. __tl_add_blob(unsigned short *tl, enum drbd_tags tag, const void *data,
  2062. unsigned short len, int nul_terminated)
  2063. {
  2064. unsigned short l = tag_descriptions[tag_number(tag)].max_len;
  2065. len = (len < l) ? len : l;
  2066. put_unaligned(tag, tl++);
  2067. put_unaligned(len, tl++);
  2068. memcpy(tl, data, len);
  2069. tl = (unsigned short*)((char*)tl + len);
  2070. if (nul_terminated)
  2071. *((char*)tl - 1) = 0;
  2072. return tl;
  2073. }
  2074. static unsigned short *
  2075. tl_add_blob(unsigned short *tl, enum drbd_tags tag, const void *data, int len)
  2076. {
  2077. return __tl_add_blob(tl, tag, data, len, 0);
  2078. }
  2079. static unsigned short *
  2080. tl_add_str(unsigned short *tl, enum drbd_tags tag, const char *str)
  2081. {
  2082. return __tl_add_blob(tl, tag, str, strlen(str)+1, 0);
  2083. }
  2084. static unsigned short *
  2085. tl_add_int(unsigned short *tl, enum drbd_tags tag, const void *val)
  2086. {
  2087. put_unaligned(tag, tl++);
  2088. switch(tag_type(tag)) {
  2089. case TT_INTEGER:
  2090. put_unaligned(sizeof(int), tl++);
  2091. put_unaligned(*(int *)val, (int *)tl);
  2092. tl = (unsigned short*)((char*)tl+sizeof(int));
  2093. break;
  2094. case TT_INT64:
  2095. put_unaligned(sizeof(u64), tl++);
  2096. put_unaligned(*(u64 *)val, (u64 *)tl);
  2097. tl = (unsigned short*)((char*)tl+sizeof(u64));
  2098. break;
  2099. default:
  2100. /* someone did something stupid. */
  2101. ;
  2102. }
  2103. return tl;
  2104. }
  2105. void drbd_bcast_state(struct drbd_conf *mdev, union drbd_state state)
  2106. {
  2107. char buffer[sizeof(struct cn_msg)+
  2108. sizeof(struct drbd_nl_cfg_reply)+
  2109. sizeof(struct get_state_tag_len_struct)+
  2110. sizeof(short int)];
  2111. struct cn_msg *cn_reply = (struct cn_msg *) buffer;
  2112. struct drbd_nl_cfg_reply *reply =
  2113. (struct drbd_nl_cfg_reply *)cn_reply->data;
  2114. unsigned short *tl = reply->tag_list;
  2115. /* dev_warn(DEV, "drbd_bcast_state() got called\n"); */
  2116. tl = get_state_to_tags(mdev, (struct get_state *)&state, tl);
  2117. put_unaligned(TT_END, tl++); /* Close the tag list */
  2118. cn_reply->id.idx = CN_IDX_DRBD;
  2119. cn_reply->id.val = CN_VAL_DRBD;
  2120. cn_reply->seq = atomic_add_return(1, &drbd_nl_seq);
  2121. cn_reply->ack = 0; /* not used here. */
  2122. cn_reply->len = sizeof(struct drbd_nl_cfg_reply) +
  2123. (int)((char *)tl - (char *)reply->tag_list);
  2124. cn_reply->flags = 0;
  2125. reply->packet_type = P_get_state;
  2126. reply->minor = mdev_to_minor(mdev);
  2127. reply->ret_code = NO_ERROR;
  2128. cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_NOIO);
  2129. }
  2130. void drbd_bcast_ev_helper(struct drbd_conf *mdev, char *helper_name)
  2131. {
  2132. char buffer[sizeof(struct cn_msg)+
  2133. sizeof(struct drbd_nl_cfg_reply)+
  2134. sizeof(struct call_helper_tag_len_struct)+
  2135. sizeof(short int)];
  2136. struct cn_msg *cn_reply = (struct cn_msg *) buffer;
  2137. struct drbd_nl_cfg_reply *reply =
  2138. (struct drbd_nl_cfg_reply *)cn_reply->data;
  2139. unsigned short *tl = reply->tag_list;
  2140. /* dev_warn(DEV, "drbd_bcast_state() got called\n"); */
  2141. tl = tl_add_str(tl, T_helper, helper_name);
  2142. put_unaligned(TT_END, tl++); /* Close the tag list */
  2143. cn_reply->id.idx = CN_IDX_DRBD;
  2144. cn_reply->id.val = CN_VAL_DRBD;
  2145. cn_reply->seq = atomic_add_return(1, &drbd_nl_seq);
  2146. cn_reply->ack = 0; /* not used here. */
  2147. cn_reply->len = sizeof(struct drbd_nl_cfg_reply) +
  2148. (int)((char *)tl - (char *)reply->tag_list);
  2149. cn_reply->flags = 0;
  2150. reply->packet_type = P_call_helper;
  2151. reply->minor = mdev_to_minor(mdev);
  2152. reply->ret_code = NO_ERROR;
  2153. cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_NOIO);
  2154. }
  2155. void drbd_bcast_ee(struct drbd_conf *mdev,
  2156. const char *reason, const int dgs,
  2157. const char* seen_hash, const char* calc_hash,
  2158. const struct drbd_epoch_entry* e)
  2159. {
  2160. struct cn_msg *cn_reply;
  2161. struct drbd_nl_cfg_reply *reply;
  2162. unsigned short *tl;
  2163. struct page *page;
  2164. unsigned len;
  2165. if (!e)
  2166. return;
  2167. if (!reason || !reason[0])
  2168. return;
  2169. /* apparently we have to memcpy twice, first to prepare the data for the
  2170. * struct cn_msg, then within cn_netlink_send from the cn_msg to the
  2171. * netlink skb. */
  2172. /* receiver thread context, which is not in the writeout path (of this node),
  2173. * but may be in the writeout path of the _other_ node.
  2174. * GFP_NOIO to avoid potential "distributed deadlock". */
  2175. cn_reply = kzalloc(
  2176. sizeof(struct cn_msg)+
  2177. sizeof(struct drbd_nl_cfg_reply)+
  2178. sizeof(struct dump_ee_tag_len_struct)+
  2179. sizeof(short int),
  2180. GFP_NOIO);
  2181. if (!cn_reply) {
  2182. dev_err(DEV, "could not kmalloc buffer for drbd_bcast_ee, sector %llu, size %u\n",
  2183. (unsigned long long)e->sector, e->size);
  2184. return;
  2185. }
  2186. reply = (struct drbd_nl_cfg_reply*)cn_reply->data;
  2187. tl = reply->tag_list;
  2188. tl = tl_add_str(tl, T_dump_ee_reason, reason);
  2189. tl = tl_add_blob(tl, T_seen_digest, seen_hash, dgs);
  2190. tl = tl_add_blob(tl, T_calc_digest, calc_hash, dgs);
  2191. tl = tl_add_int(tl, T_ee_sector, &e->sector);
  2192. tl = tl_add_int(tl, T_ee_block_id, &e->block_id);
  2193. /* dump the first 32k */
  2194. len = min_t(unsigned, e->size, 32 << 10);
  2195. put_unaligned(T_ee_data, tl++);
  2196. put_unaligned(len, tl++);
  2197. page = e->pages;
  2198. page_chain_for_each(page) {
  2199. void *d = kmap_atomic(page);
  2200. unsigned l = min_t(unsigned, len, PAGE_SIZE);
  2201. memcpy(tl, d, l);
  2202. kunmap_atomic(d);
  2203. tl = (unsigned short*)((char*)tl + l);
  2204. len -= l;
  2205. if (len == 0)
  2206. break;
  2207. }
  2208. put_unaligned(TT_END, tl++); /* Close the tag list */
  2209. cn_reply->id.idx = CN_IDX_DRBD;
  2210. cn_reply->id.val = CN_VAL_DRBD;
  2211. cn_reply->seq = atomic_add_return(1,&drbd_nl_seq);
  2212. cn_reply->ack = 0; // not used here.
  2213. cn_reply->len = sizeof(struct drbd_nl_cfg_reply) +
  2214. (int)((char*)tl - (char*)reply->tag_list);
  2215. cn_reply->flags = 0;
  2216. reply->packet_type = P_dump_ee;
  2217. reply->minor = mdev_to_minor(mdev);
  2218. reply->ret_code = NO_ERROR;
  2219. cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_NOIO);
  2220. kfree(cn_reply);
  2221. }
  2222. void drbd_bcast_sync_progress(struct drbd_conf *mdev)
  2223. {
  2224. char buffer[sizeof(struct cn_msg)+
  2225. sizeof(struct drbd_nl_cfg_reply)+
  2226. sizeof(struct sync_progress_tag_len_struct)+
  2227. sizeof(short int)];
  2228. struct cn_msg *cn_reply = (struct cn_msg *) buffer;
  2229. struct drbd_nl_cfg_reply *reply =
  2230. (struct drbd_nl_cfg_reply *)cn_reply->data;
  2231. unsigned short *tl = reply->tag_list;
  2232. unsigned long rs_left;
  2233. unsigned int res;
  2234. /* no local ref, no bitmap, no syncer progress, no broadcast. */
  2235. if (!get_ldev(mdev))
  2236. return;
  2237. drbd_get_syncer_progress(mdev, &rs_left, &res);
  2238. put_ldev(mdev);
  2239. tl = tl_add_int(tl, T_sync_progress, &res);
  2240. put_unaligned(TT_END, tl++); /* Close the tag list */
  2241. cn_reply->id.idx = CN_IDX_DRBD;
  2242. cn_reply->id.val = CN_VAL_DRBD;
  2243. cn_reply->seq = atomic_add_return(1, &drbd_nl_seq);
  2244. cn_reply->ack = 0; /* not used here. */
  2245. cn_reply->len = sizeof(struct drbd_nl_cfg_reply) +
  2246. (int)((char *)tl - (char *)reply->tag_list);
  2247. cn_reply->flags = 0;
  2248. reply->packet_type = P_sync_progress;
  2249. reply->minor = mdev_to_minor(mdev);
  2250. reply->ret_code = NO_ERROR;
  2251. cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_NOIO);
  2252. }
  2253. int __init drbd_nl_init(void)
  2254. {
  2255. static struct cb_id cn_id_drbd;
  2256. int err, try=10;
  2257. cn_id_drbd.val = CN_VAL_DRBD;
  2258. do {
  2259. cn_id_drbd.idx = cn_idx;
  2260. err = cn_add_callback(&cn_id_drbd, "cn_drbd", &drbd_connector_callback);
  2261. if (!err)
  2262. break;
  2263. cn_idx = (cn_idx + CN_IDX_STEP);
  2264. } while (try--);
  2265. if (err) {
  2266. printk(KERN_ERR "drbd: cn_drbd failed to register\n");
  2267. return err;
  2268. }
  2269. return 0;
  2270. }
  2271. void drbd_nl_cleanup(void)
  2272. {
  2273. static struct cb_id cn_id_drbd;
  2274. cn_id_drbd.idx = cn_idx;
  2275. cn_id_drbd.val = CN_VAL_DRBD;
  2276. cn_del_callback(&cn_id_drbd);
  2277. }
  2278. void drbd_nl_send_reply(struct cn_msg *req, int ret_code)
  2279. {
  2280. char buffer[sizeof(struct cn_msg)+sizeof(struct drbd_nl_cfg_reply)];
  2281. struct cn_msg *cn_reply = (struct cn_msg *) buffer;
  2282. struct drbd_nl_cfg_reply *reply =
  2283. (struct drbd_nl_cfg_reply *)cn_reply->data;
  2284. int rr;
  2285. memset(buffer, 0, sizeof(buffer));
  2286. cn_reply->id = req->id;
  2287. cn_reply->seq = req->seq;
  2288. cn_reply->ack = req->ack + 1;
  2289. cn_reply->len = sizeof(struct drbd_nl_cfg_reply);
  2290. cn_reply->flags = 0;
  2291. reply->packet_type = P_return_code_only;
  2292. reply->minor = ((struct drbd_nl_cfg_req *)req->data)->drbd_minor;
  2293. reply->ret_code = ret_code;
  2294. rr = cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_NOIO);
  2295. if (rr && rr != -ESRCH)
  2296. printk(KERN_INFO "drbd: cn_netlink_send()=%d\n", rr);
  2297. }