xref: /openbmc/linux/drivers/block/drbd/drbd_nl.c (revision 261a9af6)
1 /*
2    drbd_nl.c
3 
4    This file is part of DRBD by Philipp Reisner and Lars Ellenberg.
5 
6    Copyright (C) 2001-2008, LINBIT Information Technologies GmbH.
7    Copyright (C) 1999-2008, Philipp Reisner <philipp.reisner@linbit.com>.
8    Copyright (C) 2002-2008, Lars Ellenberg <lars.ellenberg@linbit.com>.
9 
10    drbd is free software; you can redistribute it and/or modify
11    it under the terms of the GNU General Public License as published by
12    the Free Software Foundation; either version 2, or (at your option)
13    any later version.
14 
15    drbd is distributed in the hope that it will be useful,
16    but WITHOUT ANY WARRANTY; without even the implied warranty of
17    MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
18    GNU General Public License for more details.
19 
20    You should have received a copy of the GNU General Public License
21    along with drbd; see the file COPYING.  If not, write to
22    the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA.
23 
24  */
25 
26 #include <linux/module.h>
27 #include <linux/drbd.h>
28 #include <linux/in.h>
29 #include <linux/fs.h>
30 #include <linux/file.h>
31 #include <linux/slab.h>
32 #include <linux/connector.h>
33 #include <linux/blkpg.h>
34 #include <linux/cpumask.h>
35 #include "drbd_int.h"
36 #include "drbd_req.h"
37 #include "drbd_wrappers.h"
38 #include <asm/unaligned.h>
39 #include <linux/drbd_tag_magic.h>
40 #include <linux/drbd_limits.h>
41 #include <linux/compiler.h>
42 #include <linux/kthread.h>
43 
44 static unsigned short *tl_add_blob(unsigned short *, enum drbd_tags, const void *, int);
45 static unsigned short *tl_add_str(unsigned short *, enum drbd_tags, const char *);
46 static unsigned short *tl_add_int(unsigned short *, enum drbd_tags, const void *);
47 
48 /* see get_sb_bdev and bd_claim */
49 static char *drbd_m_holder = "Hands off! this is DRBD's meta data device.";
50 
51 /* Generate the tag_list to struct functions */
52 #define NL_PACKET(name, number, fields) \
53 static int name ## _from_tags(struct drbd_conf *mdev, \
54 	unsigned short *tags, struct name *arg) __attribute__ ((unused)); \
55 static int name ## _from_tags(struct drbd_conf *mdev, \
56 	unsigned short *tags, struct name *arg) \
57 { \
58 	int tag; \
59 	int dlen; \
60 	\
61 	while ((tag = get_unaligned(tags++)) != TT_END) {	\
62 		dlen = get_unaligned(tags++);			\
63 		switch (tag_number(tag)) { \
64 		fields \
65 		default: \
66 			if (tag & T_MANDATORY) { \
67 				dev_err(DEV, "Unknown tag: %d\n", tag_number(tag)); \
68 				return 0; \
69 			} \
70 		} \
71 		tags = (unsigned short *)((char *)tags + dlen); \
72 	} \
73 	return 1; \
74 }
75 #define NL_INTEGER(pn, pr, member) \
76 	case pn: /* D_ASSERT( tag_type(tag) == TT_INTEGER ); */ \
77 		arg->member = get_unaligned((int *)(tags));	\
78 		break;
79 #define NL_INT64(pn, pr, member) \
80 	case pn: /* D_ASSERT( tag_type(tag) == TT_INT64 ); */ \
81 		arg->member = get_unaligned((u64 *)(tags));	\
82 		break;
83 #define NL_BIT(pn, pr, member) \
84 	case pn: /* D_ASSERT( tag_type(tag) == TT_BIT ); */ \
85 		arg->member = *(char *)(tags) ? 1 : 0; \
86 		break;
87 #define NL_STRING(pn, pr, member, len) \
88 	case pn: /* D_ASSERT( tag_type(tag) == TT_STRING ); */ \
89 		if (dlen > len) { \
90 			dev_err(DEV, "arg too long: %s (%u wanted, max len: %u bytes)\n", \
91 				#member, dlen, (unsigned int)len); \
92 			return 0; \
93 		} \
94 		 arg->member ## _len = dlen; \
95 		 memcpy(arg->member, tags, min_t(size_t, dlen, len)); \
96 		 break;
97 #include "linux/drbd_nl.h"
98 
99 /* Generate the struct to tag_list functions */
100 #define NL_PACKET(name, number, fields) \
101 static unsigned short* \
102 name ## _to_tags(struct drbd_conf *mdev, \
103 	struct name *arg, unsigned short *tags) __attribute__ ((unused)); \
104 static unsigned short* \
105 name ## _to_tags(struct drbd_conf *mdev, \
106 	struct name *arg, unsigned short *tags) \
107 { \
108 	fields \
109 	return tags; \
110 }
111 
112 #define NL_INTEGER(pn, pr, member) \
113 	put_unaligned(pn | pr | TT_INTEGER, tags++);	\
114 	put_unaligned(sizeof(int), tags++);		\
115 	put_unaligned(arg->member, (int *)tags);	\
116 	tags = (unsigned short *)((char *)tags+sizeof(int));
117 #define NL_INT64(pn, pr, member) \
118 	put_unaligned(pn | pr | TT_INT64, tags++);	\
119 	put_unaligned(sizeof(u64), tags++);		\
120 	put_unaligned(arg->member, (u64 *)tags);	\
121 	tags = (unsigned short *)((char *)tags+sizeof(u64));
122 #define NL_BIT(pn, pr, member) \
123 	put_unaligned(pn | pr | TT_BIT, tags++);	\
124 	put_unaligned(sizeof(char), tags++);		\
125 	*(char *)tags = arg->member; \
126 	tags = (unsigned short *)((char *)tags+sizeof(char));
127 #define NL_STRING(pn, pr, member, len) \
128 	put_unaligned(pn | pr | TT_STRING, tags++);	\
129 	put_unaligned(arg->member ## _len, tags++);	\
130 	memcpy(tags, arg->member, arg->member ## _len); \
131 	tags = (unsigned short *)((char *)tags + arg->member ## _len);
132 #include "linux/drbd_nl.h"
133 
134 void drbd_bcast_ev_helper(struct drbd_conf *mdev, char *helper_name);
135 void drbd_nl_send_reply(struct cn_msg *, int);
136 
137 int drbd_khelper(struct drbd_conf *mdev, char *cmd)
138 {
139 	char *envp[] = { "HOME=/",
140 			"TERM=linux",
141 			"PATH=/sbin:/usr/sbin:/bin:/usr/bin",
142 			NULL, /* Will be set to address family */
143 			NULL, /* Will be set to address */
144 			NULL };
145 
146 	char mb[12], af[20], ad[60], *afs;
147 	char *argv[] = {usermode_helper, cmd, mb, NULL };
148 	int ret;
149 
150 	snprintf(mb, 12, "minor-%d", mdev_to_minor(mdev));
151 
152 	if (get_net_conf(mdev)) {
153 		switch (((struct sockaddr *)mdev->net_conf->peer_addr)->sa_family) {
154 		case AF_INET6:
155 			afs = "ipv6";
156 			snprintf(ad, 60, "DRBD_PEER_ADDRESS=%pI6",
157 				 &((struct sockaddr_in6 *)mdev->net_conf->peer_addr)->sin6_addr);
158 			break;
159 		case AF_INET:
160 			afs = "ipv4";
161 			snprintf(ad, 60, "DRBD_PEER_ADDRESS=%pI4",
162 				 &((struct sockaddr_in *)mdev->net_conf->peer_addr)->sin_addr);
163 			break;
164 		default:
165 			afs = "ssocks";
166 			snprintf(ad, 60, "DRBD_PEER_ADDRESS=%pI4",
167 				 &((struct sockaddr_in *)mdev->net_conf->peer_addr)->sin_addr);
168 		}
169 		snprintf(af, 20, "DRBD_PEER_AF=%s", afs);
170 		envp[3]=af;
171 		envp[4]=ad;
172 		put_net_conf(mdev);
173 	}
174 
175 	/* The helper may take some time.
176 	 * write out any unsynced meta data changes now */
177 	drbd_md_sync(mdev);
178 
179 	dev_info(DEV, "helper command: %s %s %s\n", usermode_helper, cmd, mb);
180 
181 	drbd_bcast_ev_helper(mdev, cmd);
182 	ret = call_usermodehelper(usermode_helper, argv, envp, 1);
183 	if (ret)
184 		dev_warn(DEV, "helper command: %s %s %s exit code %u (0x%x)\n",
185 				usermode_helper, cmd, mb,
186 				(ret >> 8) & 0xff, ret);
187 	else
188 		dev_info(DEV, "helper command: %s %s %s exit code %u (0x%x)\n",
189 				usermode_helper, cmd, mb,
190 				(ret >> 8) & 0xff, ret);
191 
192 	if (ret < 0) /* Ignore any ERRNOs we got. */
193 		ret = 0;
194 
195 	return ret;
196 }
197 
198 enum drbd_disk_state drbd_try_outdate_peer(struct drbd_conf *mdev)
199 {
200 	char *ex_to_string;
201 	int r;
202 	enum drbd_disk_state nps;
203 	enum drbd_fencing_p fp;
204 
205 	D_ASSERT(mdev->state.pdsk == D_UNKNOWN);
206 
207 	if (get_ldev_if_state(mdev, D_CONSISTENT)) {
208 		fp = mdev->ldev->dc.fencing;
209 		put_ldev(mdev);
210 	} else {
211 		dev_warn(DEV, "Not fencing peer, I'm not even Consistent myself.\n");
212 		nps = mdev->state.pdsk;
213 		goto out;
214 	}
215 
216 	r = drbd_khelper(mdev, "fence-peer");
217 
218 	switch ((r>>8) & 0xff) {
219 	case 3: /* peer is inconsistent */
220 		ex_to_string = "peer is inconsistent or worse";
221 		nps = D_INCONSISTENT;
222 		break;
223 	case 4: /* peer got outdated, or was already outdated */
224 		ex_to_string = "peer was fenced";
225 		nps = D_OUTDATED;
226 		break;
227 	case 5: /* peer was down */
228 		if (mdev->state.disk == D_UP_TO_DATE) {
229 			/* we will(have) create(d) a new UUID anyways... */
230 			ex_to_string = "peer is unreachable, assumed to be dead";
231 			nps = D_OUTDATED;
232 		} else {
233 			ex_to_string = "peer unreachable, doing nothing since disk != UpToDate";
234 			nps = mdev->state.pdsk;
235 		}
236 		break;
237 	case 6: /* Peer is primary, voluntarily outdate myself.
238 		 * This is useful when an unconnected R_SECONDARY is asked to
239 		 * become R_PRIMARY, but finds the other peer being active. */
240 		ex_to_string = "peer is active";
241 		dev_warn(DEV, "Peer is primary, outdating myself.\n");
242 		nps = D_UNKNOWN;
243 		_drbd_request_state(mdev, NS(disk, D_OUTDATED), CS_WAIT_COMPLETE);
244 		break;
245 	case 7:
246 		if (fp != FP_STONITH)
247 			dev_err(DEV, "fence-peer() = 7 && fencing != Stonith !!!\n");
248 		ex_to_string = "peer was stonithed";
249 		nps = D_OUTDATED;
250 		break;
251 	default:
252 		/* The script is broken ... */
253 		nps = D_UNKNOWN;
254 		dev_err(DEV, "fence-peer helper broken, returned %d\n", (r>>8)&0xff);
255 		return nps;
256 	}
257 
258 	dev_info(DEV, "fence-peer helper returned %d (%s)\n",
259 			(r>>8) & 0xff, ex_to_string);
260 
261 out:
262 	if (mdev->state.susp_fen && nps >= D_UNKNOWN) {
263 		/* The handler was not successful... unfreeze here, the
264 		   state engine can not unfreeze... */
265 		_drbd_request_state(mdev, NS(susp_fen, 0), CS_VERBOSE);
266 	}
267 
268 	return nps;
269 }
270 
271 static int _try_outdate_peer_async(void *data)
272 {
273 	struct drbd_conf *mdev = (struct drbd_conf *)data;
274 	enum drbd_disk_state nps;
275 	union drbd_state ns;
276 
277 	nps = drbd_try_outdate_peer(mdev);
278 
279 	/* Not using
280 	   drbd_request_state(mdev, NS(pdsk, nps));
281 	   here, because we might were able to re-establish the connection
282 	   in the meantime. This can only partially be solved in the state's
283 	   engine is_valid_state() and is_valid_state_transition()
284 	   functions.
285 
286 	   nps can be D_INCONSISTENT, D_OUTDATED or D_UNKNOWN.
287 	   pdsk == D_INCONSISTENT while conn >= C_CONNECTED is valid,
288 	   therefore we have to have the pre state change check here.
289 	*/
290 	spin_lock_irq(&mdev->req_lock);
291 	ns = mdev->state;
292 	if (ns.conn < C_WF_REPORT_PARAMS) {
293 		ns.pdsk = nps;
294 		_drbd_set_state(mdev, ns, CS_VERBOSE, NULL);
295 	}
296 	spin_unlock_irq(&mdev->req_lock);
297 
298 	return 0;
299 }
300 
301 void drbd_try_outdate_peer_async(struct drbd_conf *mdev)
302 {
303 	struct task_struct *opa;
304 
305 	opa = kthread_run(_try_outdate_peer_async, mdev, "drbd%d_a_helper", mdev_to_minor(mdev));
306 	if (IS_ERR(opa))
307 		dev_err(DEV, "out of mem, failed to invoke fence-peer helper\n");
308 }
309 
310 enum drbd_state_rv
311 drbd_set_role(struct drbd_conf *mdev, enum drbd_role new_role, int force)
312 {
313 	const int max_tries = 4;
314 	enum drbd_state_rv rv = SS_UNKNOWN_ERROR;
315 	int try = 0;
316 	int forced = 0;
317 	union drbd_state mask, val;
318 	enum drbd_disk_state nps;
319 
320 	if (new_role == R_PRIMARY)
321 		request_ping(mdev); /* Detect a dead peer ASAP */
322 
323 	mutex_lock(&mdev->state_mutex);
324 
325 	mask.i = 0; mask.role = R_MASK;
326 	val.i  = 0; val.role  = new_role;
327 
328 	while (try++ < max_tries) {
329 		rv = _drbd_request_state(mdev, mask, val, CS_WAIT_COMPLETE);
330 
331 		/* in case we first succeeded to outdate,
332 		 * but now suddenly could establish a connection */
333 		if (rv == SS_CW_FAILED_BY_PEER && mask.pdsk != 0) {
334 			val.pdsk = 0;
335 			mask.pdsk = 0;
336 			continue;
337 		}
338 
339 		if (rv == SS_NO_UP_TO_DATE_DISK && force &&
340 		    (mdev->state.disk < D_UP_TO_DATE &&
341 		     mdev->state.disk >= D_INCONSISTENT)) {
342 			mask.disk = D_MASK;
343 			val.disk  = D_UP_TO_DATE;
344 			forced = 1;
345 			continue;
346 		}
347 
348 		if (rv == SS_NO_UP_TO_DATE_DISK &&
349 		    mdev->state.disk == D_CONSISTENT && mask.pdsk == 0) {
350 			D_ASSERT(mdev->state.pdsk == D_UNKNOWN);
351 			nps = drbd_try_outdate_peer(mdev);
352 
353 			if (nps == D_OUTDATED || nps == D_INCONSISTENT) {
354 				val.disk = D_UP_TO_DATE;
355 				mask.disk = D_MASK;
356 			}
357 
358 			val.pdsk = nps;
359 			mask.pdsk = D_MASK;
360 
361 			continue;
362 		}
363 
364 		if (rv == SS_NOTHING_TO_DO)
365 			goto fail;
366 		if (rv == SS_PRIMARY_NOP && mask.pdsk == 0) {
367 			nps = drbd_try_outdate_peer(mdev);
368 
369 			if (force && nps > D_OUTDATED) {
370 				dev_warn(DEV, "Forced into split brain situation!\n");
371 				nps = D_OUTDATED;
372 			}
373 
374 			mask.pdsk = D_MASK;
375 			val.pdsk  = nps;
376 
377 			continue;
378 		}
379 		if (rv == SS_TWO_PRIMARIES) {
380 			/* Maybe the peer is detected as dead very soon...
381 			   retry at most once more in this case. */
382 			schedule_timeout_interruptible((mdev->net_conf->ping_timeo+1)*HZ/10);
383 			if (try < max_tries)
384 				try = max_tries - 1;
385 			continue;
386 		}
387 		if (rv < SS_SUCCESS) {
388 			rv = _drbd_request_state(mdev, mask, val,
389 						CS_VERBOSE + CS_WAIT_COMPLETE);
390 			if (rv < SS_SUCCESS)
391 				goto fail;
392 		}
393 		break;
394 	}
395 
396 	if (rv < SS_SUCCESS)
397 		goto fail;
398 
399 	if (forced)
400 		dev_warn(DEV, "Forced to consider local data as UpToDate!\n");
401 
402 	/* Wait until nothing is on the fly :) */
403 	wait_event(mdev->misc_wait, atomic_read(&mdev->ap_pending_cnt) == 0);
404 
405 	if (new_role == R_SECONDARY) {
406 		set_disk_ro(mdev->vdisk, true);
407 		if (get_ldev(mdev)) {
408 			mdev->ldev->md.uuid[UI_CURRENT] &= ~(u64)1;
409 			put_ldev(mdev);
410 		}
411 	} else {
412 		if (get_net_conf(mdev)) {
413 			mdev->net_conf->want_lose = 0;
414 			put_net_conf(mdev);
415 		}
416 		set_disk_ro(mdev->vdisk, false);
417 		if (get_ldev(mdev)) {
418 			if (((mdev->state.conn < C_CONNECTED ||
419 			       mdev->state.pdsk <= D_FAILED)
420 			      && mdev->ldev->md.uuid[UI_BITMAP] == 0) || forced)
421 				drbd_uuid_new_current(mdev);
422 
423 			mdev->ldev->md.uuid[UI_CURRENT] |=  (u64)1;
424 			put_ldev(mdev);
425 		}
426 	}
427 
428 	/* writeout of activity log covered areas of the bitmap
429 	 * to stable storage done in after state change already */
430 
431 	if (mdev->state.conn >= C_WF_REPORT_PARAMS) {
432 		/* if this was forced, we should consider sync */
433 		if (forced)
434 			drbd_send_uuids(mdev);
435 		drbd_send_state(mdev);
436 	}
437 
438 	drbd_md_sync(mdev);
439 
440 	kobject_uevent(&disk_to_dev(mdev->vdisk)->kobj, KOBJ_CHANGE);
441  fail:
442 	mutex_unlock(&mdev->state_mutex);
443 	return rv;
444 }
445 
446 static struct drbd_conf *ensure_mdev(int minor, int create)
447 {
448 	struct drbd_conf *mdev;
449 
450 	if (minor >= minor_count)
451 		return NULL;
452 
453 	mdev = minor_to_mdev(minor);
454 
455 	if (!mdev && create) {
456 		struct gendisk *disk = NULL;
457 		mdev = drbd_new_device(minor);
458 
459 		spin_lock_irq(&drbd_pp_lock);
460 		if (minor_table[minor] == NULL) {
461 			minor_table[minor] = mdev;
462 			disk = mdev->vdisk;
463 			mdev = NULL;
464 		} /* else: we lost the race */
465 		spin_unlock_irq(&drbd_pp_lock);
466 
467 		if (disk) /* we won the race above */
468 			/* in case we ever add a drbd_delete_device(),
469 			 * don't forget the del_gendisk! */
470 			add_disk(disk);
471 		else /* we lost the race above */
472 			drbd_free_mdev(mdev);
473 
474 		mdev = minor_to_mdev(minor);
475 	}
476 
477 	return mdev;
478 }
479 
480 static int drbd_nl_primary(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
481 			   struct drbd_nl_cfg_reply *reply)
482 {
483 	struct primary primary_args;
484 
485 	memset(&primary_args, 0, sizeof(struct primary));
486 	if (!primary_from_tags(mdev, nlp->tag_list, &primary_args)) {
487 		reply->ret_code = ERR_MANDATORY_TAG;
488 		return 0;
489 	}
490 
491 	reply->ret_code =
492 		drbd_set_role(mdev, R_PRIMARY, primary_args.primary_force);
493 
494 	return 0;
495 }
496 
497 static int drbd_nl_secondary(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
498 			     struct drbd_nl_cfg_reply *reply)
499 {
500 	reply->ret_code = drbd_set_role(mdev, R_SECONDARY, 0);
501 
502 	return 0;
503 }
504 
505 /* initializes the md.*_offset members, so we are able to find
506  * the on disk meta data */
507 static void drbd_md_set_sector_offsets(struct drbd_conf *mdev,
508 				       struct drbd_backing_dev *bdev)
509 {
510 	sector_t md_size_sect = 0;
511 	switch (bdev->dc.meta_dev_idx) {
512 	default:
513 		/* v07 style fixed size indexed meta data */
514 		bdev->md.md_size_sect = MD_RESERVED_SECT;
515 		bdev->md.md_offset = drbd_md_ss__(mdev, bdev);
516 		bdev->md.al_offset = MD_AL_OFFSET;
517 		bdev->md.bm_offset = MD_BM_OFFSET;
518 		break;
519 	case DRBD_MD_INDEX_FLEX_EXT:
520 		/* just occupy the full device; unit: sectors */
521 		bdev->md.md_size_sect = drbd_get_capacity(bdev->md_bdev);
522 		bdev->md.md_offset = 0;
523 		bdev->md.al_offset = MD_AL_OFFSET;
524 		bdev->md.bm_offset = MD_BM_OFFSET;
525 		break;
526 	case DRBD_MD_INDEX_INTERNAL:
527 	case DRBD_MD_INDEX_FLEX_INT:
528 		bdev->md.md_offset = drbd_md_ss__(mdev, bdev);
529 		/* al size is still fixed */
530 		bdev->md.al_offset = -MD_AL_MAX_SIZE;
531 		/* we need (slightly less than) ~ this much bitmap sectors: */
532 		md_size_sect = drbd_get_capacity(bdev->backing_bdev);
533 		md_size_sect = ALIGN(md_size_sect, BM_SECT_PER_EXT);
534 		md_size_sect = BM_SECT_TO_EXT(md_size_sect);
535 		md_size_sect = ALIGN(md_size_sect, 8);
536 
537 		/* plus the "drbd meta data super block",
538 		 * and the activity log; */
539 		md_size_sect += MD_BM_OFFSET;
540 
541 		bdev->md.md_size_sect = md_size_sect;
542 		/* bitmap offset is adjusted by 'super' block size */
543 		bdev->md.bm_offset   = -md_size_sect + MD_AL_OFFSET;
544 		break;
545 	}
546 }
547 
548 /* input size is expected to be in KB */
549 char *ppsize(char *buf, unsigned long long size)
550 {
551 	/* Needs 9 bytes at max including trailing NUL:
552 	 * -1ULL ==> "16384 EB" */
553 	static char units[] = { 'K', 'M', 'G', 'T', 'P', 'E' };
554 	int base = 0;
555 	while (size >= 10000 && base < sizeof(units)-1) {
556 		/* shift + round */
557 		size = (size >> 10) + !!(size & (1<<9));
558 		base++;
559 	}
560 	sprintf(buf, "%u %cB", (unsigned)size, units[base]);
561 
562 	return buf;
563 }
564 
565 /* there is still a theoretical deadlock when called from receiver
566  * on an D_INCONSISTENT R_PRIMARY:
567  *  remote READ does inc_ap_bio, receiver would need to receive answer
568  *  packet from remote to dec_ap_bio again.
569  *  receiver receive_sizes(), comes here,
570  *  waits for ap_bio_cnt == 0. -> deadlock.
571  * but this cannot happen, actually, because:
572  *  R_PRIMARY D_INCONSISTENT, and peer's disk is unreachable
573  *  (not connected, or bad/no disk on peer):
574  *  see drbd_fail_request_early, ap_bio_cnt is zero.
575  *  R_PRIMARY D_INCONSISTENT, and C_SYNC_TARGET:
576  *  peer may not initiate a resize.
577  */
578 void drbd_suspend_io(struct drbd_conf *mdev)
579 {
580 	set_bit(SUSPEND_IO, &mdev->flags);
581 	if (is_susp(mdev->state))
582 		return;
583 	wait_event(mdev->misc_wait, !atomic_read(&mdev->ap_bio_cnt));
584 }
585 
586 void drbd_resume_io(struct drbd_conf *mdev)
587 {
588 	clear_bit(SUSPEND_IO, &mdev->flags);
589 	wake_up(&mdev->misc_wait);
590 }
591 
592 /**
593  * drbd_determine_dev_size() -  Sets the right device size obeying all constraints
594  * @mdev:	DRBD device.
595  *
596  * Returns 0 on success, negative return values indicate errors.
597  * You should call drbd_md_sync() after calling this function.
598  */
599 enum determine_dev_size drbd_determine_dev_size(struct drbd_conf *mdev, enum dds_flags flags) __must_hold(local)
600 {
601 	sector_t prev_first_sect, prev_size; /* previous meta location */
602 	sector_t la_size;
603 	sector_t size;
604 	char ppb[10];
605 
606 	int md_moved, la_size_changed;
607 	enum determine_dev_size rv = unchanged;
608 
609 	/* race:
610 	 * application request passes inc_ap_bio,
611 	 * but then cannot get an AL-reference.
612 	 * this function later may wait on ap_bio_cnt == 0. -> deadlock.
613 	 *
614 	 * to avoid that:
615 	 * Suspend IO right here.
616 	 * still lock the act_log to not trigger ASSERTs there.
617 	 */
618 	drbd_suspend_io(mdev);
619 
620 	/* no wait necessary anymore, actually we could assert that */
621 	wait_event(mdev->al_wait, lc_try_lock(mdev->act_log));
622 
623 	prev_first_sect = drbd_md_first_sector(mdev->ldev);
624 	prev_size = mdev->ldev->md.md_size_sect;
625 	la_size = mdev->ldev->md.la_size_sect;
626 
627 	/* TODO: should only be some assert here, not (re)init... */
628 	drbd_md_set_sector_offsets(mdev, mdev->ldev);
629 
630 	size = drbd_new_dev_size(mdev, mdev->ldev, flags & DDSF_FORCED);
631 
632 	if (drbd_get_capacity(mdev->this_bdev) != size ||
633 	    drbd_bm_capacity(mdev) != size) {
634 		int err;
635 		err = drbd_bm_resize(mdev, size, !(flags & DDSF_NO_RESYNC));
636 		if (unlikely(err)) {
637 			/* currently there is only one error: ENOMEM! */
638 			size = drbd_bm_capacity(mdev)>>1;
639 			if (size == 0) {
640 				dev_err(DEV, "OUT OF MEMORY! "
641 				    "Could not allocate bitmap!\n");
642 			} else {
643 				dev_err(DEV, "BM resizing failed. "
644 				    "Leaving size unchanged at size = %lu KB\n",
645 				    (unsigned long)size);
646 			}
647 			rv = dev_size_error;
648 		}
649 		/* racy, see comments above. */
650 		drbd_set_my_capacity(mdev, size);
651 		mdev->ldev->md.la_size_sect = size;
652 		dev_info(DEV, "size = %s (%llu KB)\n", ppsize(ppb, size>>1),
653 		     (unsigned long long)size>>1);
654 	}
655 	if (rv == dev_size_error)
656 		goto out;
657 
658 	la_size_changed = (la_size != mdev->ldev->md.la_size_sect);
659 
660 	md_moved = prev_first_sect != drbd_md_first_sector(mdev->ldev)
661 		|| prev_size	   != mdev->ldev->md.md_size_sect;
662 
663 	if (la_size_changed || md_moved) {
664 		int err;
665 
666 		drbd_al_shrink(mdev); /* All extents inactive. */
667 		dev_info(DEV, "Writing the whole bitmap, %s\n",
668 			 la_size_changed && md_moved ? "size changed and md moved" :
669 			 la_size_changed ? "size changed" : "md moved");
670 		/* next line implicitly does drbd_suspend_io()+drbd_resume_io() */
671 		err = drbd_bitmap_io(mdev, &drbd_bm_write,
672 				"size changed", BM_LOCKED_MASK);
673 		if (err) {
674 			rv = dev_size_error;
675 			goto out;
676 		}
677 		drbd_md_mark_dirty(mdev);
678 	}
679 
680 	if (size > la_size)
681 		rv = grew;
682 	if (size < la_size)
683 		rv = shrunk;
684 out:
685 	lc_unlock(mdev->act_log);
686 	wake_up(&mdev->al_wait);
687 	drbd_resume_io(mdev);
688 
689 	return rv;
690 }
691 
692 sector_t
693 drbd_new_dev_size(struct drbd_conf *mdev, struct drbd_backing_dev *bdev, int assume_peer_has_space)
694 {
695 	sector_t p_size = mdev->p_size;   /* partner's disk size. */
696 	sector_t la_size = bdev->md.la_size_sect; /* last agreed size. */
697 	sector_t m_size; /* my size */
698 	sector_t u_size = bdev->dc.disk_size; /* size requested by user. */
699 	sector_t size = 0;
700 
701 	m_size = drbd_get_max_capacity(bdev);
702 
703 	if (mdev->state.conn < C_CONNECTED && assume_peer_has_space) {
704 		dev_warn(DEV, "Resize while not connected was forced by the user!\n");
705 		p_size = m_size;
706 	}
707 
708 	if (p_size && m_size) {
709 		size = min_t(sector_t, p_size, m_size);
710 	} else {
711 		if (la_size) {
712 			size = la_size;
713 			if (m_size && m_size < size)
714 				size = m_size;
715 			if (p_size && p_size < size)
716 				size = p_size;
717 		} else {
718 			if (m_size)
719 				size = m_size;
720 			if (p_size)
721 				size = p_size;
722 		}
723 	}
724 
725 	if (size == 0)
726 		dev_err(DEV, "Both nodes diskless!\n");
727 
728 	if (u_size) {
729 		if (u_size > size)
730 			dev_err(DEV, "Requested disk size is too big (%lu > %lu)\n",
731 			    (unsigned long)u_size>>1, (unsigned long)size>>1);
732 		else
733 			size = u_size;
734 	}
735 
736 	return size;
737 }
738 
739 /**
740  * drbd_check_al_size() - Ensures that the AL is of the right size
741  * @mdev:	DRBD device.
742  *
743  * Returns -EBUSY if current al lru is still used, -ENOMEM when allocation
744  * failed, and 0 on success. You should call drbd_md_sync() after you called
745  * this function.
746  */
747 static int drbd_check_al_size(struct drbd_conf *mdev)
748 {
749 	struct lru_cache *n, *t;
750 	struct lc_element *e;
751 	unsigned int in_use;
752 	int i;
753 
754 	ERR_IF(mdev->sync_conf.al_extents < 7)
755 		mdev->sync_conf.al_extents = 127;
756 
757 	if (mdev->act_log &&
758 	    mdev->act_log->nr_elements == mdev->sync_conf.al_extents)
759 		return 0;
760 
761 	in_use = 0;
762 	t = mdev->act_log;
763 	n = lc_create("act_log", drbd_al_ext_cache,
764 		mdev->sync_conf.al_extents, sizeof(struct lc_element), 0);
765 
766 	if (n == NULL) {
767 		dev_err(DEV, "Cannot allocate act_log lru!\n");
768 		return -ENOMEM;
769 	}
770 	spin_lock_irq(&mdev->al_lock);
771 	if (t) {
772 		for (i = 0; i < t->nr_elements; i++) {
773 			e = lc_element_by_index(t, i);
774 			if (e->refcnt)
775 				dev_err(DEV, "refcnt(%d)==%d\n",
776 				    e->lc_number, e->refcnt);
777 			in_use += e->refcnt;
778 		}
779 	}
780 	if (!in_use)
781 		mdev->act_log = n;
782 	spin_unlock_irq(&mdev->al_lock);
783 	if (in_use) {
784 		dev_err(DEV, "Activity log still in use!\n");
785 		lc_destroy(n);
786 		return -EBUSY;
787 	} else {
788 		if (t)
789 			lc_destroy(t);
790 	}
791 	drbd_md_mark_dirty(mdev); /* we changed mdev->act_log->nr_elemens */
792 	return 0;
793 }
794 
795 static void drbd_setup_queue_param(struct drbd_conf *mdev, unsigned int max_bio_size)
796 {
797 	struct request_queue * const q = mdev->rq_queue;
798 	int max_hw_sectors = max_bio_size >> 9;
799 	int max_segments = 0;
800 
801 	if (get_ldev_if_state(mdev, D_ATTACHING)) {
802 		struct request_queue * const b = mdev->ldev->backing_bdev->bd_disk->queue;
803 
804 		max_hw_sectors = min(queue_max_hw_sectors(b), max_bio_size >> 9);
805 		max_segments = mdev->ldev->dc.max_bio_bvecs;
806 		put_ldev(mdev);
807 	}
808 
809 	blk_queue_logical_block_size(q, 512);
810 	blk_queue_max_hw_sectors(q, max_hw_sectors);
811 	/* This is the workaround for "bio would need to, but cannot, be split" */
812 	blk_queue_max_segments(q, max_segments ? max_segments : BLK_MAX_SEGMENTS);
813 	blk_queue_segment_boundary(q, PAGE_CACHE_SIZE-1);
814 
815 	if (get_ldev_if_state(mdev, D_ATTACHING)) {
816 		struct request_queue * const b = mdev->ldev->backing_bdev->bd_disk->queue;
817 
818 		blk_queue_stack_limits(q, b);
819 
820 		if (q->backing_dev_info.ra_pages != b->backing_dev_info.ra_pages) {
821 			dev_info(DEV, "Adjusting my ra_pages to backing device's (%lu -> %lu)\n",
822 				 q->backing_dev_info.ra_pages,
823 				 b->backing_dev_info.ra_pages);
824 			q->backing_dev_info.ra_pages = b->backing_dev_info.ra_pages;
825 		}
826 		put_ldev(mdev);
827 	}
828 }
829 
830 void drbd_reconsider_max_bio_size(struct drbd_conf *mdev)
831 {
832 	int now, new, local, peer;
833 
834 	now = queue_max_hw_sectors(mdev->rq_queue) << 9;
835 	local = mdev->local_max_bio_size; /* Eventually last known value, from volatile memory */
836 	peer = mdev->peer_max_bio_size; /* Eventually last known value, from meta data */
837 
838 	if (get_ldev_if_state(mdev, D_ATTACHING)) {
839 		local = queue_max_hw_sectors(mdev->ldev->backing_bdev->bd_disk->queue) << 9;
840 		mdev->local_max_bio_size = local;
841 		put_ldev(mdev);
842 	}
843 
844 	/* We may ignore peer limits if the peer is modern enough.
845 	   Because new from 8.3.8 onwards the peer can use multiple
846 	   BIOs for a single peer_request */
847 	if (mdev->state.conn >= C_CONNECTED) {
848 		if (mdev->agreed_pro_version < 94)
849 			peer = mdev->peer_max_bio_size;
850 		else if (mdev->agreed_pro_version == 94)
851 			peer = DRBD_MAX_SIZE_H80_PACKET;
852 		else /* drbd 8.3.8 onwards */
853 			peer = DRBD_MAX_BIO_SIZE;
854 	}
855 
856 	new = min_t(int, local, peer);
857 
858 	if (mdev->state.role == R_PRIMARY && new < now)
859 		dev_err(DEV, "ASSERT FAILED new < now; (%d < %d)\n", new, now);
860 
861 	if (new != now)
862 		dev_info(DEV, "max BIO size = %u\n", new);
863 
864 	drbd_setup_queue_param(mdev, new);
865 }
866 
867 /* serialize deconfig (worker exiting, doing cleanup)
868  * and reconfig (drbdsetup disk, drbdsetup net)
869  *
870  * Wait for a potentially exiting worker, then restart it,
871  * or start a new one.  Flush any pending work, there may still be an
872  * after_state_change queued.
873  */
874 static void drbd_reconfig_start(struct drbd_conf *mdev)
875 {
876 	wait_event(mdev->state_wait, !test_and_set_bit(CONFIG_PENDING, &mdev->flags));
877 	wait_event(mdev->state_wait, !test_bit(DEVICE_DYING, &mdev->flags));
878 	drbd_thread_start(&mdev->worker);
879 	drbd_flush_workqueue(mdev);
880 }
881 
882 /* if still unconfigured, stops worker again.
883  * if configured now, clears CONFIG_PENDING.
884  * wakes potential waiters */
885 static void drbd_reconfig_done(struct drbd_conf *mdev)
886 {
887 	spin_lock_irq(&mdev->req_lock);
888 	if (mdev->state.disk == D_DISKLESS &&
889 	    mdev->state.conn == C_STANDALONE &&
890 	    mdev->state.role == R_SECONDARY) {
891 		set_bit(DEVICE_DYING, &mdev->flags);
892 		drbd_thread_stop_nowait(&mdev->worker);
893 	} else
894 		clear_bit(CONFIG_PENDING, &mdev->flags);
895 	spin_unlock_irq(&mdev->req_lock);
896 	wake_up(&mdev->state_wait);
897 }
898 
899 /* Make sure IO is suspended before calling this function(). */
900 static void drbd_suspend_al(struct drbd_conf *mdev)
901 {
902 	int s = 0;
903 
904 	if (lc_try_lock(mdev->act_log)) {
905 		drbd_al_shrink(mdev);
906 		lc_unlock(mdev->act_log);
907 	} else {
908 		dev_warn(DEV, "Failed to lock al in drbd_suspend_al()\n");
909 		return;
910 	}
911 
912 	spin_lock_irq(&mdev->req_lock);
913 	if (mdev->state.conn < C_CONNECTED)
914 		s = !test_and_set_bit(AL_SUSPENDED, &mdev->flags);
915 
916 	spin_unlock_irq(&mdev->req_lock);
917 
918 	if (s)
919 		dev_info(DEV, "Suspended AL updates\n");
920 }
921 
922 /* does always return 0;
923  * interesting return code is in reply->ret_code */
924 static int drbd_nl_disk_conf(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
925 			     struct drbd_nl_cfg_reply *reply)
926 {
927 	enum drbd_ret_code retcode;
928 	enum determine_dev_size dd;
929 	sector_t max_possible_sectors;
930 	sector_t min_md_device_sectors;
931 	struct drbd_backing_dev *nbc = NULL; /* new_backing_conf */
932 	struct block_device *bdev;
933 	struct lru_cache *resync_lru = NULL;
934 	union drbd_state ns, os;
935 	enum drbd_state_rv rv;
936 	int cp_discovered = 0;
937 	int logical_block_size;
938 
939 	drbd_reconfig_start(mdev);
940 
941 	/* if you want to reconfigure, please tear down first */
942 	if (mdev->state.disk > D_DISKLESS) {
943 		retcode = ERR_DISK_CONFIGURED;
944 		goto fail;
945 	}
946 	/* It may just now have detached because of IO error.  Make sure
947 	 * drbd_ldev_destroy is done already, we may end up here very fast,
948 	 * e.g. if someone calls attach from the on-io-error handler,
949 	 * to realize a "hot spare" feature (not that I'd recommend that) */
950 	wait_event(mdev->misc_wait, !atomic_read(&mdev->local_cnt));
951 
952 	/* allocation not in the IO path, cqueue thread context */
953 	nbc = kzalloc(sizeof(struct drbd_backing_dev), GFP_KERNEL);
954 	if (!nbc) {
955 		retcode = ERR_NOMEM;
956 		goto fail;
957 	}
958 
959 	nbc->dc.disk_size     = DRBD_DISK_SIZE_SECT_DEF;
960 	nbc->dc.on_io_error   = DRBD_ON_IO_ERROR_DEF;
961 	nbc->dc.fencing       = DRBD_FENCING_DEF;
962 	nbc->dc.max_bio_bvecs = DRBD_MAX_BIO_BVECS_DEF;
963 
964 	if (!disk_conf_from_tags(mdev, nlp->tag_list, &nbc->dc)) {
965 		retcode = ERR_MANDATORY_TAG;
966 		goto fail;
967 	}
968 
969 	if (nbc->dc.meta_dev_idx < DRBD_MD_INDEX_FLEX_INT) {
970 		retcode = ERR_MD_IDX_INVALID;
971 		goto fail;
972 	}
973 
974 	if (get_net_conf(mdev)) {
975 		int prot = mdev->net_conf->wire_protocol;
976 		put_net_conf(mdev);
977 		if (nbc->dc.fencing == FP_STONITH && prot == DRBD_PROT_A) {
978 			retcode = ERR_STONITH_AND_PROT_A;
979 			goto fail;
980 		}
981 	}
982 
983 	bdev = blkdev_get_by_path(nbc->dc.backing_dev,
984 				  FMODE_READ | FMODE_WRITE | FMODE_EXCL, mdev);
985 	if (IS_ERR(bdev)) {
986 		dev_err(DEV, "open(\"%s\") failed with %ld\n", nbc->dc.backing_dev,
987 			PTR_ERR(bdev));
988 		retcode = ERR_OPEN_DISK;
989 		goto fail;
990 	}
991 	nbc->backing_bdev = bdev;
992 
993 	/*
994 	 * meta_dev_idx >= 0: external fixed size, possibly multiple
995 	 * drbd sharing one meta device.  TODO in that case, paranoia
996 	 * check that [md_bdev, meta_dev_idx] is not yet used by some
997 	 * other drbd minor!  (if you use drbd.conf + drbdadm, that
998 	 * should check it for you already; but if you don't, or
999 	 * someone fooled it, we need to double check here)
1000 	 */
1001 	bdev = blkdev_get_by_path(nbc->dc.meta_dev,
1002 				  FMODE_READ | FMODE_WRITE | FMODE_EXCL,
1003 				  (nbc->dc.meta_dev_idx < 0) ?
1004 				  (void *)mdev : (void *)drbd_m_holder);
1005 	if (IS_ERR(bdev)) {
1006 		dev_err(DEV, "open(\"%s\") failed with %ld\n", nbc->dc.meta_dev,
1007 			PTR_ERR(bdev));
1008 		retcode = ERR_OPEN_MD_DISK;
1009 		goto fail;
1010 	}
1011 	nbc->md_bdev = bdev;
1012 
1013 	if ((nbc->backing_bdev == nbc->md_bdev) !=
1014 	    (nbc->dc.meta_dev_idx == DRBD_MD_INDEX_INTERNAL ||
1015 	     nbc->dc.meta_dev_idx == DRBD_MD_INDEX_FLEX_INT)) {
1016 		retcode = ERR_MD_IDX_INVALID;
1017 		goto fail;
1018 	}
1019 
1020 	resync_lru = lc_create("resync", drbd_bm_ext_cache,
1021 			61, sizeof(struct bm_extent),
1022 			offsetof(struct bm_extent, lce));
1023 	if (!resync_lru) {
1024 		retcode = ERR_NOMEM;
1025 		goto fail;
1026 	}
1027 
1028 	/* RT - for drbd_get_max_capacity() DRBD_MD_INDEX_FLEX_INT */
1029 	drbd_md_set_sector_offsets(mdev, nbc);
1030 
1031 	if (drbd_get_max_capacity(nbc) < nbc->dc.disk_size) {
1032 		dev_err(DEV, "max capacity %llu smaller than disk size %llu\n",
1033 			(unsigned long long) drbd_get_max_capacity(nbc),
1034 			(unsigned long long) nbc->dc.disk_size);
1035 		retcode = ERR_DISK_TO_SMALL;
1036 		goto fail;
1037 	}
1038 
1039 	if (nbc->dc.meta_dev_idx < 0) {
1040 		max_possible_sectors = DRBD_MAX_SECTORS_FLEX;
1041 		/* at least one MB, otherwise it does not make sense */
1042 		min_md_device_sectors = (2<<10);
1043 	} else {
1044 		max_possible_sectors = DRBD_MAX_SECTORS;
1045 		min_md_device_sectors = MD_RESERVED_SECT * (nbc->dc.meta_dev_idx + 1);
1046 	}
1047 
1048 	if (drbd_get_capacity(nbc->md_bdev) < min_md_device_sectors) {
1049 		retcode = ERR_MD_DISK_TO_SMALL;
1050 		dev_warn(DEV, "refusing attach: md-device too small, "
1051 		     "at least %llu sectors needed for this meta-disk type\n",
1052 		     (unsigned long long) min_md_device_sectors);
1053 		goto fail;
1054 	}
1055 
1056 	/* Make sure the new disk is big enough
1057 	 * (we may currently be R_PRIMARY with no local disk...) */
1058 	if (drbd_get_max_capacity(nbc) <
1059 	    drbd_get_capacity(mdev->this_bdev)) {
1060 		retcode = ERR_DISK_TO_SMALL;
1061 		goto fail;
1062 	}
1063 
1064 	nbc->known_size = drbd_get_capacity(nbc->backing_bdev);
1065 
1066 	if (nbc->known_size > max_possible_sectors) {
1067 		dev_warn(DEV, "==> truncating very big lower level device "
1068 			"to currently maximum possible %llu sectors <==\n",
1069 			(unsigned long long) max_possible_sectors);
1070 		if (nbc->dc.meta_dev_idx >= 0)
1071 			dev_warn(DEV, "==>> using internal or flexible "
1072 				      "meta data may help <<==\n");
1073 	}
1074 
1075 	drbd_suspend_io(mdev);
1076 	/* also wait for the last barrier ack. */
1077 	wait_event(mdev->misc_wait, !atomic_read(&mdev->ap_pending_cnt) || is_susp(mdev->state));
1078 	/* and for any other previously queued work */
1079 	drbd_flush_workqueue(mdev);
1080 
1081 	rv = _drbd_request_state(mdev, NS(disk, D_ATTACHING), CS_VERBOSE);
1082 	retcode = rv;  /* FIXME: Type mismatch. */
1083 	drbd_resume_io(mdev);
1084 	if (rv < SS_SUCCESS)
1085 		goto fail;
1086 
1087 	if (!get_ldev_if_state(mdev, D_ATTACHING))
1088 		goto force_diskless;
1089 
1090 	drbd_md_set_sector_offsets(mdev, nbc);
1091 
1092 	/* allocate a second IO page if logical_block_size != 512 */
1093 	logical_block_size = bdev_logical_block_size(nbc->md_bdev);
1094 	if (logical_block_size == 0)
1095 		logical_block_size = MD_SECTOR_SIZE;
1096 
1097 	if (logical_block_size != MD_SECTOR_SIZE) {
1098 		if (!mdev->md_io_tmpp) {
1099 			struct page *page = alloc_page(GFP_NOIO);
1100 			if (!page)
1101 				goto force_diskless_dec;
1102 
1103 			dev_warn(DEV, "Meta data's bdev logical_block_size = %d != %d\n",
1104 			     logical_block_size, MD_SECTOR_SIZE);
1105 			dev_warn(DEV, "Workaround engaged (has performance impact).\n");
1106 
1107 			mdev->md_io_tmpp = page;
1108 		}
1109 	}
1110 
1111 	if (!mdev->bitmap) {
1112 		if (drbd_bm_init(mdev)) {
1113 			retcode = ERR_NOMEM;
1114 			goto force_diskless_dec;
1115 		}
1116 	}
1117 
1118 	retcode = drbd_md_read(mdev, nbc);
1119 	if (retcode != NO_ERROR)
1120 		goto force_diskless_dec;
1121 
1122 	if (mdev->state.conn < C_CONNECTED &&
1123 	    mdev->state.role == R_PRIMARY &&
1124 	    (mdev->ed_uuid & ~((u64)1)) != (nbc->md.uuid[UI_CURRENT] & ~((u64)1))) {
1125 		dev_err(DEV, "Can only attach to data with current UUID=%016llX\n",
1126 		    (unsigned long long)mdev->ed_uuid);
1127 		retcode = ERR_DATA_NOT_CURRENT;
1128 		goto force_diskless_dec;
1129 	}
1130 
1131 	/* Since we are diskless, fix the activity log first... */
1132 	if (drbd_check_al_size(mdev)) {
1133 		retcode = ERR_NOMEM;
1134 		goto force_diskless_dec;
1135 	}
1136 
1137 	/* Prevent shrinking of consistent devices ! */
1138 	if (drbd_md_test_flag(nbc, MDF_CONSISTENT) &&
1139 	    drbd_new_dev_size(mdev, nbc, 0) < nbc->md.la_size_sect) {
1140 		dev_warn(DEV, "refusing to truncate a consistent device\n");
1141 		retcode = ERR_DISK_TO_SMALL;
1142 		goto force_diskless_dec;
1143 	}
1144 
1145 	if (!drbd_al_read_log(mdev, nbc)) {
1146 		retcode = ERR_IO_MD_DISK;
1147 		goto force_diskless_dec;
1148 	}
1149 
1150 	/* Reset the "barriers don't work" bits here, then force meta data to
1151 	 * be written, to ensure we determine if barriers are supported. */
1152 	if (nbc->dc.no_md_flush)
1153 		set_bit(MD_NO_FUA, &mdev->flags);
1154 	else
1155 		clear_bit(MD_NO_FUA, &mdev->flags);
1156 
1157 	/* Point of no return reached.
1158 	 * Devices and memory are no longer released by error cleanup below.
1159 	 * now mdev takes over responsibility, and the state engine should
1160 	 * clean it up somewhere.  */
1161 	D_ASSERT(mdev->ldev == NULL);
1162 	mdev->ldev = nbc;
1163 	mdev->resync = resync_lru;
1164 	nbc = NULL;
1165 	resync_lru = NULL;
1166 
1167 	mdev->write_ordering = WO_bdev_flush;
1168 	drbd_bump_write_ordering(mdev, WO_bdev_flush);
1169 
1170 	if (drbd_md_test_flag(mdev->ldev, MDF_CRASHED_PRIMARY))
1171 		set_bit(CRASHED_PRIMARY, &mdev->flags);
1172 	else
1173 		clear_bit(CRASHED_PRIMARY, &mdev->flags);
1174 
1175 	if (drbd_md_test_flag(mdev->ldev, MDF_PRIMARY_IND) &&
1176 	    !(mdev->state.role == R_PRIMARY && mdev->state.susp_nod)) {
1177 		set_bit(CRASHED_PRIMARY, &mdev->flags);
1178 		cp_discovered = 1;
1179 	}
1180 
1181 	mdev->send_cnt = 0;
1182 	mdev->recv_cnt = 0;
1183 	mdev->read_cnt = 0;
1184 	mdev->writ_cnt = 0;
1185 
1186 	drbd_reconsider_max_bio_size(mdev);
1187 
1188 	/* If I am currently not R_PRIMARY,
1189 	 * but meta data primary indicator is set,
1190 	 * I just now recover from a hard crash,
1191 	 * and have been R_PRIMARY before that crash.
1192 	 *
1193 	 * Now, if I had no connection before that crash
1194 	 * (have been degraded R_PRIMARY), chances are that
1195 	 * I won't find my peer now either.
1196 	 *
1197 	 * In that case, and _only_ in that case,
1198 	 * we use the degr-wfc-timeout instead of the default,
1199 	 * so we can automatically recover from a crash of a
1200 	 * degraded but active "cluster" after a certain timeout.
1201 	 */
1202 	clear_bit(USE_DEGR_WFC_T, &mdev->flags);
1203 	if (mdev->state.role != R_PRIMARY &&
1204 	     drbd_md_test_flag(mdev->ldev, MDF_PRIMARY_IND) &&
1205 	    !drbd_md_test_flag(mdev->ldev, MDF_CONNECTED_IND))
1206 		set_bit(USE_DEGR_WFC_T, &mdev->flags);
1207 
1208 	dd = drbd_determine_dev_size(mdev, 0);
1209 	if (dd == dev_size_error) {
1210 		retcode = ERR_NOMEM_BITMAP;
1211 		goto force_diskless_dec;
1212 	} else if (dd == grew)
1213 		set_bit(RESYNC_AFTER_NEG, &mdev->flags);
1214 
1215 	if (drbd_md_test_flag(mdev->ldev, MDF_FULL_SYNC)) {
1216 		dev_info(DEV, "Assuming that all blocks are out of sync "
1217 		     "(aka FullSync)\n");
1218 		if (drbd_bitmap_io(mdev, &drbd_bmio_set_n_write,
1219 			"set_n_write from attaching", BM_LOCKED_MASK)) {
1220 			retcode = ERR_IO_MD_DISK;
1221 			goto force_diskless_dec;
1222 		}
1223 	} else {
1224 		if (drbd_bitmap_io(mdev, &drbd_bm_read,
1225 			"read from attaching", BM_LOCKED_MASK) < 0) {
1226 			retcode = ERR_IO_MD_DISK;
1227 			goto force_diskless_dec;
1228 		}
1229 	}
1230 
1231 	if (cp_discovered) {
1232 		drbd_al_apply_to_bm(mdev);
1233 		if (drbd_bitmap_io(mdev, &drbd_bm_write,
1234 			"crashed primary apply AL", BM_LOCKED_MASK)) {
1235 			retcode = ERR_IO_MD_DISK;
1236 			goto force_diskless_dec;
1237 		}
1238 	}
1239 
1240 	if (_drbd_bm_total_weight(mdev) == drbd_bm_bits(mdev))
1241 		drbd_suspend_al(mdev); /* IO is still suspended here... */
1242 
1243 	spin_lock_irq(&mdev->req_lock);
1244 	os = mdev->state;
1245 	ns.i = os.i;
1246 	/* If MDF_CONSISTENT is not set go into inconsistent state,
1247 	   otherwise investigate MDF_WasUpToDate...
1248 	   If MDF_WAS_UP_TO_DATE is not set go into D_OUTDATED disk state,
1249 	   otherwise into D_CONSISTENT state.
1250 	*/
1251 	if (drbd_md_test_flag(mdev->ldev, MDF_CONSISTENT)) {
1252 		if (drbd_md_test_flag(mdev->ldev, MDF_WAS_UP_TO_DATE))
1253 			ns.disk = D_CONSISTENT;
1254 		else
1255 			ns.disk = D_OUTDATED;
1256 	} else {
1257 		ns.disk = D_INCONSISTENT;
1258 	}
1259 
1260 	if (drbd_md_test_flag(mdev->ldev, MDF_PEER_OUT_DATED))
1261 		ns.pdsk = D_OUTDATED;
1262 
1263 	if ( ns.disk == D_CONSISTENT &&
1264 	    (ns.pdsk == D_OUTDATED || mdev->ldev->dc.fencing == FP_DONT_CARE))
1265 		ns.disk = D_UP_TO_DATE;
1266 
1267 	/* All tests on MDF_PRIMARY_IND, MDF_CONNECTED_IND,
1268 	   MDF_CONSISTENT and MDF_WAS_UP_TO_DATE must happen before
1269 	   this point, because drbd_request_state() modifies these
1270 	   flags. */
1271 
1272 	/* In case we are C_CONNECTED postpone any decision on the new disk
1273 	   state after the negotiation phase. */
1274 	if (mdev->state.conn == C_CONNECTED) {
1275 		mdev->new_state_tmp.i = ns.i;
1276 		ns.i = os.i;
1277 		ns.disk = D_NEGOTIATING;
1278 
1279 		/* We expect to receive up-to-date UUIDs soon.
1280 		   To avoid a race in receive_state, free p_uuid while
1281 		   holding req_lock. I.e. atomic with the state change */
1282 		kfree(mdev->p_uuid);
1283 		mdev->p_uuid = NULL;
1284 	}
1285 
1286 	rv = _drbd_set_state(mdev, ns, CS_VERBOSE, NULL);
1287 	ns = mdev->state;
1288 	spin_unlock_irq(&mdev->req_lock);
1289 
1290 	if (rv < SS_SUCCESS)
1291 		goto force_diskless_dec;
1292 
1293 	if (mdev->state.role == R_PRIMARY)
1294 		mdev->ldev->md.uuid[UI_CURRENT] |=  (u64)1;
1295 	else
1296 		mdev->ldev->md.uuid[UI_CURRENT] &= ~(u64)1;
1297 
1298 	drbd_md_mark_dirty(mdev);
1299 	drbd_md_sync(mdev);
1300 
1301 	kobject_uevent(&disk_to_dev(mdev->vdisk)->kobj, KOBJ_CHANGE);
1302 	put_ldev(mdev);
1303 	reply->ret_code = retcode;
1304 	drbd_reconfig_done(mdev);
1305 	return 0;
1306 
1307  force_diskless_dec:
1308 	put_ldev(mdev);
1309  force_diskless:
1310 	drbd_force_state(mdev, NS(disk, D_FAILED));
1311 	drbd_md_sync(mdev);
1312  fail:
1313 	if (nbc) {
1314 		if (nbc->backing_bdev)
1315 			blkdev_put(nbc->backing_bdev,
1316 				   FMODE_READ | FMODE_WRITE | FMODE_EXCL);
1317 		if (nbc->md_bdev)
1318 			blkdev_put(nbc->md_bdev,
1319 				   FMODE_READ | FMODE_WRITE | FMODE_EXCL);
1320 		kfree(nbc);
1321 	}
1322 	lc_destroy(resync_lru);
1323 
1324 	reply->ret_code = retcode;
1325 	drbd_reconfig_done(mdev);
1326 	return 0;
1327 }
1328 
1329 /* Detaching the disk is a process in multiple stages.  First we need to lock
1330  * out application IO, in-flight IO, IO stuck in drbd_al_begin_io.
1331  * Then we transition to D_DISKLESS, and wait for put_ldev() to return all
1332  * internal references as well.
1333  * Only then we have finally detached. */
1334 static int drbd_nl_detach(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1335 			  struct drbd_nl_cfg_reply *reply)
1336 {
1337 	enum drbd_ret_code retcode;
1338 	int ret;
1339 	drbd_suspend_io(mdev); /* so no-one is stuck in drbd_al_begin_io */
1340 	retcode = drbd_request_state(mdev, NS(disk, D_FAILED));
1341 	/* D_FAILED will transition to DISKLESS. */
1342 	ret = wait_event_interruptible(mdev->misc_wait,
1343 			mdev->state.disk != D_FAILED);
1344 	drbd_resume_io(mdev);
1345 	if ((int)retcode == (int)SS_IS_DISKLESS)
1346 		retcode = SS_NOTHING_TO_DO;
1347 	if (ret)
1348 		retcode = ERR_INTR;
1349 	reply->ret_code = retcode;
1350 	return 0;
1351 }
1352 
1353 static int drbd_nl_net_conf(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1354 			    struct drbd_nl_cfg_reply *reply)
1355 {
1356 	int i, ns;
1357 	enum drbd_ret_code retcode;
1358 	struct net_conf *new_conf = NULL;
1359 	struct crypto_hash *tfm = NULL;
1360 	struct crypto_hash *integrity_w_tfm = NULL;
1361 	struct crypto_hash *integrity_r_tfm = NULL;
1362 	struct hlist_head *new_tl_hash = NULL;
1363 	struct hlist_head *new_ee_hash = NULL;
1364 	struct drbd_conf *odev;
1365 	char hmac_name[CRYPTO_MAX_ALG_NAME];
1366 	void *int_dig_out = NULL;
1367 	void *int_dig_in = NULL;
1368 	void *int_dig_vv = NULL;
1369 	struct sockaddr *new_my_addr, *new_peer_addr, *taken_addr;
1370 
1371 	drbd_reconfig_start(mdev);
1372 
1373 	if (mdev->state.conn > C_STANDALONE) {
1374 		retcode = ERR_NET_CONFIGURED;
1375 		goto fail;
1376 	}
1377 
1378 	/* allocation not in the IO path, cqueue thread context */
1379 	new_conf = kzalloc(sizeof(struct net_conf), GFP_KERNEL);
1380 	if (!new_conf) {
1381 		retcode = ERR_NOMEM;
1382 		goto fail;
1383 	}
1384 
1385 	new_conf->timeout	   = DRBD_TIMEOUT_DEF;
1386 	new_conf->try_connect_int  = DRBD_CONNECT_INT_DEF;
1387 	new_conf->ping_int	   = DRBD_PING_INT_DEF;
1388 	new_conf->max_epoch_size   = DRBD_MAX_EPOCH_SIZE_DEF;
1389 	new_conf->max_buffers	   = DRBD_MAX_BUFFERS_DEF;
1390 	new_conf->unplug_watermark = DRBD_UNPLUG_WATERMARK_DEF;
1391 	new_conf->sndbuf_size	   = DRBD_SNDBUF_SIZE_DEF;
1392 	new_conf->rcvbuf_size	   = DRBD_RCVBUF_SIZE_DEF;
1393 	new_conf->ko_count	   = DRBD_KO_COUNT_DEF;
1394 	new_conf->after_sb_0p	   = DRBD_AFTER_SB_0P_DEF;
1395 	new_conf->after_sb_1p	   = DRBD_AFTER_SB_1P_DEF;
1396 	new_conf->after_sb_2p	   = DRBD_AFTER_SB_2P_DEF;
1397 	new_conf->want_lose	   = 0;
1398 	new_conf->two_primaries    = 0;
1399 	new_conf->wire_protocol    = DRBD_PROT_C;
1400 	new_conf->ping_timeo	   = DRBD_PING_TIMEO_DEF;
1401 	new_conf->rr_conflict	   = DRBD_RR_CONFLICT_DEF;
1402 	new_conf->on_congestion    = DRBD_ON_CONGESTION_DEF;
1403 	new_conf->cong_extents     = DRBD_CONG_EXTENTS_DEF;
1404 
1405 	if (!net_conf_from_tags(mdev, nlp->tag_list, new_conf)) {
1406 		retcode = ERR_MANDATORY_TAG;
1407 		goto fail;
1408 	}
1409 
1410 	if (new_conf->two_primaries
1411 	    && (new_conf->wire_protocol != DRBD_PROT_C)) {
1412 		retcode = ERR_NOT_PROTO_C;
1413 		goto fail;
1414 	}
1415 
1416 	if (get_ldev(mdev)) {
1417 		enum drbd_fencing_p fp = mdev->ldev->dc.fencing;
1418 		put_ldev(mdev);
1419 		if (new_conf->wire_protocol == DRBD_PROT_A && fp == FP_STONITH) {
1420 			retcode = ERR_STONITH_AND_PROT_A;
1421 			goto fail;
1422 		}
1423 	}
1424 
1425 	if (new_conf->on_congestion != OC_BLOCK && new_conf->wire_protocol != DRBD_PROT_A) {
1426 		retcode = ERR_CONG_NOT_PROTO_A;
1427 		goto fail;
1428 	}
1429 
1430 	if (mdev->state.role == R_PRIMARY && new_conf->want_lose) {
1431 		retcode = ERR_DISCARD;
1432 		goto fail;
1433 	}
1434 
1435 	retcode = NO_ERROR;
1436 
1437 	new_my_addr = (struct sockaddr *)&new_conf->my_addr;
1438 	new_peer_addr = (struct sockaddr *)&new_conf->peer_addr;
1439 	for (i = 0; i < minor_count; i++) {
1440 		odev = minor_to_mdev(i);
1441 		if (!odev || odev == mdev)
1442 			continue;
1443 		if (get_net_conf(odev)) {
1444 			taken_addr = (struct sockaddr *)&odev->net_conf->my_addr;
1445 			if (new_conf->my_addr_len == odev->net_conf->my_addr_len &&
1446 			    !memcmp(new_my_addr, taken_addr, new_conf->my_addr_len))
1447 				retcode = ERR_LOCAL_ADDR;
1448 
1449 			taken_addr = (struct sockaddr *)&odev->net_conf->peer_addr;
1450 			if (new_conf->peer_addr_len == odev->net_conf->peer_addr_len &&
1451 			    !memcmp(new_peer_addr, taken_addr, new_conf->peer_addr_len))
1452 				retcode = ERR_PEER_ADDR;
1453 
1454 			put_net_conf(odev);
1455 			if (retcode != NO_ERROR)
1456 				goto fail;
1457 		}
1458 	}
1459 
1460 	if (new_conf->cram_hmac_alg[0] != 0) {
1461 		snprintf(hmac_name, CRYPTO_MAX_ALG_NAME, "hmac(%s)",
1462 			new_conf->cram_hmac_alg);
1463 		tfm = crypto_alloc_hash(hmac_name, 0, CRYPTO_ALG_ASYNC);
1464 		if (IS_ERR(tfm)) {
1465 			tfm = NULL;
1466 			retcode = ERR_AUTH_ALG;
1467 			goto fail;
1468 		}
1469 
1470 		if (!drbd_crypto_is_hash(crypto_hash_tfm(tfm))) {
1471 			retcode = ERR_AUTH_ALG_ND;
1472 			goto fail;
1473 		}
1474 	}
1475 
1476 	if (new_conf->integrity_alg[0]) {
1477 		integrity_w_tfm = crypto_alloc_hash(new_conf->integrity_alg, 0, CRYPTO_ALG_ASYNC);
1478 		if (IS_ERR(integrity_w_tfm)) {
1479 			integrity_w_tfm = NULL;
1480 			retcode=ERR_INTEGRITY_ALG;
1481 			goto fail;
1482 		}
1483 
1484 		if (!drbd_crypto_is_hash(crypto_hash_tfm(integrity_w_tfm))) {
1485 			retcode=ERR_INTEGRITY_ALG_ND;
1486 			goto fail;
1487 		}
1488 
1489 		integrity_r_tfm = crypto_alloc_hash(new_conf->integrity_alg, 0, CRYPTO_ALG_ASYNC);
1490 		if (IS_ERR(integrity_r_tfm)) {
1491 			integrity_r_tfm = NULL;
1492 			retcode=ERR_INTEGRITY_ALG;
1493 			goto fail;
1494 		}
1495 	}
1496 
1497 	ns = new_conf->max_epoch_size/8;
1498 	if (mdev->tl_hash_s != ns) {
1499 		new_tl_hash = kzalloc(ns*sizeof(void *), GFP_KERNEL);
1500 		if (!new_tl_hash) {
1501 			retcode = ERR_NOMEM;
1502 			goto fail;
1503 		}
1504 	}
1505 
1506 	ns = new_conf->max_buffers/8;
1507 	if (new_conf->two_primaries && (mdev->ee_hash_s != ns)) {
1508 		new_ee_hash = kzalloc(ns*sizeof(void *), GFP_KERNEL);
1509 		if (!new_ee_hash) {
1510 			retcode = ERR_NOMEM;
1511 			goto fail;
1512 		}
1513 	}
1514 
1515 	((char *)new_conf->shared_secret)[SHARED_SECRET_MAX-1] = 0;
1516 
1517 	if (integrity_w_tfm) {
1518 		i = crypto_hash_digestsize(integrity_w_tfm);
1519 		int_dig_out = kmalloc(i, GFP_KERNEL);
1520 		if (!int_dig_out) {
1521 			retcode = ERR_NOMEM;
1522 			goto fail;
1523 		}
1524 		int_dig_in = kmalloc(i, GFP_KERNEL);
1525 		if (!int_dig_in) {
1526 			retcode = ERR_NOMEM;
1527 			goto fail;
1528 		}
1529 		int_dig_vv = kmalloc(i, GFP_KERNEL);
1530 		if (!int_dig_vv) {
1531 			retcode = ERR_NOMEM;
1532 			goto fail;
1533 		}
1534 	}
1535 
1536 	if (!mdev->bitmap) {
1537 		if(drbd_bm_init(mdev)) {
1538 			retcode = ERR_NOMEM;
1539 			goto fail;
1540 		}
1541 	}
1542 
1543 	drbd_flush_workqueue(mdev);
1544 	spin_lock_irq(&mdev->req_lock);
1545 	if (mdev->net_conf != NULL) {
1546 		retcode = ERR_NET_CONFIGURED;
1547 		spin_unlock_irq(&mdev->req_lock);
1548 		goto fail;
1549 	}
1550 	mdev->net_conf = new_conf;
1551 
1552 	mdev->send_cnt = 0;
1553 	mdev->recv_cnt = 0;
1554 
1555 	if (new_tl_hash) {
1556 		kfree(mdev->tl_hash);
1557 		mdev->tl_hash_s = mdev->net_conf->max_epoch_size/8;
1558 		mdev->tl_hash = new_tl_hash;
1559 	}
1560 
1561 	if (new_ee_hash) {
1562 		kfree(mdev->ee_hash);
1563 		mdev->ee_hash_s = mdev->net_conf->max_buffers/8;
1564 		mdev->ee_hash = new_ee_hash;
1565 	}
1566 
1567 	crypto_free_hash(mdev->cram_hmac_tfm);
1568 	mdev->cram_hmac_tfm = tfm;
1569 
1570 	crypto_free_hash(mdev->integrity_w_tfm);
1571 	mdev->integrity_w_tfm = integrity_w_tfm;
1572 
1573 	crypto_free_hash(mdev->integrity_r_tfm);
1574 	mdev->integrity_r_tfm = integrity_r_tfm;
1575 
1576 	kfree(mdev->int_dig_out);
1577 	kfree(mdev->int_dig_in);
1578 	kfree(mdev->int_dig_vv);
1579 	mdev->int_dig_out=int_dig_out;
1580 	mdev->int_dig_in=int_dig_in;
1581 	mdev->int_dig_vv=int_dig_vv;
1582 	retcode = _drbd_set_state(_NS(mdev, conn, C_UNCONNECTED), CS_VERBOSE, NULL);
1583 	spin_unlock_irq(&mdev->req_lock);
1584 
1585 	kobject_uevent(&disk_to_dev(mdev->vdisk)->kobj, KOBJ_CHANGE);
1586 	reply->ret_code = retcode;
1587 	drbd_reconfig_done(mdev);
1588 	return 0;
1589 
1590 fail:
1591 	kfree(int_dig_out);
1592 	kfree(int_dig_in);
1593 	kfree(int_dig_vv);
1594 	crypto_free_hash(tfm);
1595 	crypto_free_hash(integrity_w_tfm);
1596 	crypto_free_hash(integrity_r_tfm);
1597 	kfree(new_tl_hash);
1598 	kfree(new_ee_hash);
1599 	kfree(new_conf);
1600 
1601 	reply->ret_code = retcode;
1602 	drbd_reconfig_done(mdev);
1603 	return 0;
1604 }
1605 
1606 static int drbd_nl_disconnect(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1607 			      struct drbd_nl_cfg_reply *reply)
1608 {
1609 	int retcode;
1610 	struct disconnect dc;
1611 
1612 	memset(&dc, 0, sizeof(struct disconnect));
1613 	if (!disconnect_from_tags(mdev, nlp->tag_list, &dc)) {
1614 		retcode = ERR_MANDATORY_TAG;
1615 		goto fail;
1616 	}
1617 
1618 	if (dc.force) {
1619 		spin_lock_irq(&mdev->req_lock);
1620 		if (mdev->state.conn >= C_WF_CONNECTION)
1621 			_drbd_set_state(_NS(mdev, conn, C_DISCONNECTING), CS_HARD, NULL);
1622 		spin_unlock_irq(&mdev->req_lock);
1623 		goto done;
1624 	}
1625 
1626 	retcode = _drbd_request_state(mdev, NS(conn, C_DISCONNECTING), CS_ORDERED);
1627 
1628 	if (retcode == SS_NOTHING_TO_DO)
1629 		goto done;
1630 	else if (retcode == SS_ALREADY_STANDALONE)
1631 		goto done;
1632 	else if (retcode == SS_PRIMARY_NOP) {
1633 		/* Our statche checking code wants to see the peer outdated. */
1634 		retcode = drbd_request_state(mdev, NS2(conn, C_DISCONNECTING,
1635 						      pdsk, D_OUTDATED));
1636 	} else if (retcode == SS_CW_FAILED_BY_PEER) {
1637 		/* The peer probably wants to see us outdated. */
1638 		retcode = _drbd_request_state(mdev, NS2(conn, C_DISCONNECTING,
1639 							disk, D_OUTDATED),
1640 					      CS_ORDERED);
1641 		if (retcode == SS_IS_DISKLESS || retcode == SS_LOWER_THAN_OUTDATED) {
1642 			drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
1643 			retcode = SS_SUCCESS;
1644 		}
1645 	}
1646 
1647 	if (retcode < SS_SUCCESS)
1648 		goto fail;
1649 
1650 	if (wait_event_interruptible(mdev->state_wait,
1651 				     mdev->state.conn != C_DISCONNECTING)) {
1652 		/* Do not test for mdev->state.conn == C_STANDALONE, since
1653 		   someone else might connect us in the mean time! */
1654 		retcode = ERR_INTR;
1655 		goto fail;
1656 	}
1657 
1658  done:
1659 	retcode = NO_ERROR;
1660  fail:
1661 	drbd_md_sync(mdev);
1662 	reply->ret_code = retcode;
1663 	return 0;
1664 }
1665 
1666 void resync_after_online_grow(struct drbd_conf *mdev)
1667 {
1668 	int iass; /* I am sync source */
1669 
1670 	dev_info(DEV, "Resync of new storage after online grow\n");
1671 	if (mdev->state.role != mdev->state.peer)
1672 		iass = (mdev->state.role == R_PRIMARY);
1673 	else
1674 		iass = test_bit(DISCARD_CONCURRENT, &mdev->flags);
1675 
1676 	if (iass)
1677 		drbd_start_resync(mdev, C_SYNC_SOURCE);
1678 	else
1679 		_drbd_request_state(mdev, NS(conn, C_WF_SYNC_UUID), CS_VERBOSE + CS_SERIALIZE);
1680 }
1681 
1682 static int drbd_nl_resize(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1683 			  struct drbd_nl_cfg_reply *reply)
1684 {
1685 	struct resize rs;
1686 	int retcode = NO_ERROR;
1687 	enum determine_dev_size dd;
1688 	enum dds_flags ddsf;
1689 
1690 	memset(&rs, 0, sizeof(struct resize));
1691 	if (!resize_from_tags(mdev, nlp->tag_list, &rs)) {
1692 		retcode = ERR_MANDATORY_TAG;
1693 		goto fail;
1694 	}
1695 
1696 	if (mdev->state.conn > C_CONNECTED) {
1697 		retcode = ERR_RESIZE_RESYNC;
1698 		goto fail;
1699 	}
1700 
1701 	if (mdev->state.role == R_SECONDARY &&
1702 	    mdev->state.peer == R_SECONDARY) {
1703 		retcode = ERR_NO_PRIMARY;
1704 		goto fail;
1705 	}
1706 
1707 	if (!get_ldev(mdev)) {
1708 		retcode = ERR_NO_DISK;
1709 		goto fail;
1710 	}
1711 
1712 	if (rs.no_resync && mdev->agreed_pro_version < 93) {
1713 		retcode = ERR_NEED_APV_93;
1714 		goto fail;
1715 	}
1716 
1717 	if (mdev->ldev->known_size != drbd_get_capacity(mdev->ldev->backing_bdev))
1718 		mdev->ldev->known_size = drbd_get_capacity(mdev->ldev->backing_bdev);
1719 
1720 	mdev->ldev->dc.disk_size = (sector_t)rs.resize_size;
1721 	ddsf = (rs.resize_force ? DDSF_FORCED : 0) | (rs.no_resync ? DDSF_NO_RESYNC : 0);
1722 	dd = drbd_determine_dev_size(mdev, ddsf);
1723 	drbd_md_sync(mdev);
1724 	put_ldev(mdev);
1725 	if (dd == dev_size_error) {
1726 		retcode = ERR_NOMEM_BITMAP;
1727 		goto fail;
1728 	}
1729 
1730 	if (mdev->state.conn == C_CONNECTED) {
1731 		if (dd == grew)
1732 			set_bit(RESIZE_PENDING, &mdev->flags);
1733 
1734 		drbd_send_uuids(mdev);
1735 		drbd_send_sizes(mdev, 1, ddsf);
1736 	}
1737 
1738  fail:
1739 	reply->ret_code = retcode;
1740 	return 0;
1741 }
1742 
1743 static int drbd_nl_syncer_conf(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1744 			       struct drbd_nl_cfg_reply *reply)
1745 {
1746 	int retcode = NO_ERROR;
1747 	int err;
1748 	int ovr; /* online verify running */
1749 	int rsr; /* re-sync running */
1750 	struct crypto_hash *verify_tfm = NULL;
1751 	struct crypto_hash *csums_tfm = NULL;
1752 	struct syncer_conf sc;
1753 	cpumask_var_t new_cpu_mask;
1754 	int *rs_plan_s = NULL;
1755 	int fifo_size;
1756 
1757 	if (!zalloc_cpumask_var(&new_cpu_mask, GFP_KERNEL)) {
1758 		retcode = ERR_NOMEM;
1759 		goto fail;
1760 	}
1761 
1762 	if (nlp->flags & DRBD_NL_SET_DEFAULTS) {
1763 		memset(&sc, 0, sizeof(struct syncer_conf));
1764 		sc.rate       = DRBD_RATE_DEF;
1765 		sc.after      = DRBD_AFTER_DEF;
1766 		sc.al_extents = DRBD_AL_EXTENTS_DEF;
1767 		sc.on_no_data  = DRBD_ON_NO_DATA_DEF;
1768 		sc.c_plan_ahead = DRBD_C_PLAN_AHEAD_DEF;
1769 		sc.c_delay_target = DRBD_C_DELAY_TARGET_DEF;
1770 		sc.c_fill_target = DRBD_C_FILL_TARGET_DEF;
1771 		sc.c_max_rate = DRBD_C_MAX_RATE_DEF;
1772 		sc.c_min_rate = DRBD_C_MIN_RATE_DEF;
1773 	} else
1774 		memcpy(&sc, &mdev->sync_conf, sizeof(struct syncer_conf));
1775 
1776 	if (!syncer_conf_from_tags(mdev, nlp->tag_list, &sc)) {
1777 		retcode = ERR_MANDATORY_TAG;
1778 		goto fail;
1779 	}
1780 
1781 	/* re-sync running */
1782 	rsr = (	mdev->state.conn == C_SYNC_SOURCE ||
1783 		mdev->state.conn == C_SYNC_TARGET ||
1784 		mdev->state.conn == C_PAUSED_SYNC_S ||
1785 		mdev->state.conn == C_PAUSED_SYNC_T );
1786 
1787 	if (rsr && strcmp(sc.csums_alg, mdev->sync_conf.csums_alg)) {
1788 		retcode = ERR_CSUMS_RESYNC_RUNNING;
1789 		goto fail;
1790 	}
1791 
1792 	if (!rsr && sc.csums_alg[0]) {
1793 		csums_tfm = crypto_alloc_hash(sc.csums_alg, 0, CRYPTO_ALG_ASYNC);
1794 		if (IS_ERR(csums_tfm)) {
1795 			csums_tfm = NULL;
1796 			retcode = ERR_CSUMS_ALG;
1797 			goto fail;
1798 		}
1799 
1800 		if (!drbd_crypto_is_hash(crypto_hash_tfm(csums_tfm))) {
1801 			retcode = ERR_CSUMS_ALG_ND;
1802 			goto fail;
1803 		}
1804 	}
1805 
1806 	/* online verify running */
1807 	ovr = (mdev->state.conn == C_VERIFY_S || mdev->state.conn == C_VERIFY_T);
1808 
1809 	if (ovr) {
1810 		if (strcmp(sc.verify_alg, mdev->sync_conf.verify_alg)) {
1811 			retcode = ERR_VERIFY_RUNNING;
1812 			goto fail;
1813 		}
1814 	}
1815 
1816 	if (!ovr && sc.verify_alg[0]) {
1817 		verify_tfm = crypto_alloc_hash(sc.verify_alg, 0, CRYPTO_ALG_ASYNC);
1818 		if (IS_ERR(verify_tfm)) {
1819 			verify_tfm = NULL;
1820 			retcode = ERR_VERIFY_ALG;
1821 			goto fail;
1822 		}
1823 
1824 		if (!drbd_crypto_is_hash(crypto_hash_tfm(verify_tfm))) {
1825 			retcode = ERR_VERIFY_ALG_ND;
1826 			goto fail;
1827 		}
1828 	}
1829 
1830 	/* silently ignore cpu mask on UP kernel */
1831 	if (nr_cpu_ids > 1 && sc.cpu_mask[0] != 0) {
1832 		err = __bitmap_parse(sc.cpu_mask, 32, 0,
1833 				cpumask_bits(new_cpu_mask), nr_cpu_ids);
1834 		if (err) {
1835 			dev_warn(DEV, "__bitmap_parse() failed with %d\n", err);
1836 			retcode = ERR_CPU_MASK_PARSE;
1837 			goto fail;
1838 		}
1839 	}
1840 
1841 	ERR_IF (sc.rate < 1) sc.rate = 1;
1842 	ERR_IF (sc.al_extents < 7) sc.al_extents = 127; /* arbitrary minimum */
1843 #define AL_MAX ((MD_AL_MAX_SIZE-1) * AL_EXTENTS_PT)
1844 	if (sc.al_extents > AL_MAX) {
1845 		dev_err(DEV, "sc.al_extents > %d\n", AL_MAX);
1846 		sc.al_extents = AL_MAX;
1847 	}
1848 #undef AL_MAX
1849 
1850 	/* to avoid spurious errors when configuring minors before configuring
1851 	 * the minors they depend on: if necessary, first create the minor we
1852 	 * depend on */
1853 	if (sc.after >= 0)
1854 		ensure_mdev(sc.after, 1);
1855 
1856 	/* most sanity checks done, try to assign the new sync-after
1857 	 * dependency.  need to hold the global lock in there,
1858 	 * to avoid a race in the dependency loop check. */
1859 	retcode = drbd_alter_sa(mdev, sc.after);
1860 	if (retcode != NO_ERROR)
1861 		goto fail;
1862 
1863 	fifo_size = (sc.c_plan_ahead * 10 * SLEEP_TIME) / HZ;
1864 	if (fifo_size != mdev->rs_plan_s.size && fifo_size > 0) {
1865 		rs_plan_s   = kzalloc(sizeof(int) * fifo_size, GFP_KERNEL);
1866 		if (!rs_plan_s) {
1867 			dev_err(DEV, "kmalloc of fifo_buffer failed");
1868 			retcode = ERR_NOMEM;
1869 			goto fail;
1870 		}
1871 	}
1872 
1873 	/* ok, assign the rest of it as well.
1874 	 * lock against receive_SyncParam() */
1875 	spin_lock(&mdev->peer_seq_lock);
1876 	mdev->sync_conf = sc;
1877 
1878 	if (!rsr) {
1879 		crypto_free_hash(mdev->csums_tfm);
1880 		mdev->csums_tfm = csums_tfm;
1881 		csums_tfm = NULL;
1882 	}
1883 
1884 	if (!ovr) {
1885 		crypto_free_hash(mdev->verify_tfm);
1886 		mdev->verify_tfm = verify_tfm;
1887 		verify_tfm = NULL;
1888 	}
1889 
1890 	if (fifo_size != mdev->rs_plan_s.size) {
1891 		kfree(mdev->rs_plan_s.values);
1892 		mdev->rs_plan_s.values = rs_plan_s;
1893 		mdev->rs_plan_s.size   = fifo_size;
1894 		mdev->rs_planed = 0;
1895 		rs_plan_s = NULL;
1896 	}
1897 
1898 	spin_unlock(&mdev->peer_seq_lock);
1899 
1900 	if (get_ldev(mdev)) {
1901 		wait_event(mdev->al_wait, lc_try_lock(mdev->act_log));
1902 		drbd_al_shrink(mdev);
1903 		err = drbd_check_al_size(mdev);
1904 		lc_unlock(mdev->act_log);
1905 		wake_up(&mdev->al_wait);
1906 
1907 		put_ldev(mdev);
1908 		drbd_md_sync(mdev);
1909 
1910 		if (err) {
1911 			retcode = ERR_NOMEM;
1912 			goto fail;
1913 		}
1914 	}
1915 
1916 	if (mdev->state.conn >= C_CONNECTED)
1917 		drbd_send_sync_param(mdev, &sc);
1918 
1919 	if (!cpumask_equal(mdev->cpu_mask, new_cpu_mask)) {
1920 		cpumask_copy(mdev->cpu_mask, new_cpu_mask);
1921 		drbd_calc_cpu_mask(mdev);
1922 		mdev->receiver.reset_cpu_mask = 1;
1923 		mdev->asender.reset_cpu_mask = 1;
1924 		mdev->worker.reset_cpu_mask = 1;
1925 	}
1926 
1927 	kobject_uevent(&disk_to_dev(mdev->vdisk)->kobj, KOBJ_CHANGE);
1928 fail:
1929 	kfree(rs_plan_s);
1930 	free_cpumask_var(new_cpu_mask);
1931 	crypto_free_hash(csums_tfm);
1932 	crypto_free_hash(verify_tfm);
1933 	reply->ret_code = retcode;
1934 	return 0;
1935 }
1936 
1937 static int drbd_nl_invalidate(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1938 			      struct drbd_nl_cfg_reply *reply)
1939 {
1940 	int retcode;
1941 
1942 	/* If there is still bitmap IO pending, probably because of a previous
1943 	 * resync just being finished, wait for it before requesting a new resync. */
1944 	wait_event(mdev->misc_wait, !test_bit(BITMAP_IO, &mdev->flags));
1945 
1946 	retcode = _drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_T), CS_ORDERED);
1947 
1948 	if (retcode < SS_SUCCESS && retcode != SS_NEED_CONNECTION)
1949 		retcode = drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_T));
1950 
1951 	while (retcode == SS_NEED_CONNECTION) {
1952 		spin_lock_irq(&mdev->req_lock);
1953 		if (mdev->state.conn < C_CONNECTED)
1954 			retcode = _drbd_set_state(_NS(mdev, disk, D_INCONSISTENT), CS_VERBOSE, NULL);
1955 		spin_unlock_irq(&mdev->req_lock);
1956 
1957 		if (retcode != SS_NEED_CONNECTION)
1958 			break;
1959 
1960 		retcode = drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_T));
1961 	}
1962 
1963 	reply->ret_code = retcode;
1964 	return 0;
1965 }
1966 
1967 static int drbd_bmio_set_susp_al(struct drbd_conf *mdev)
1968 {
1969 	int rv;
1970 
1971 	rv = drbd_bmio_set_n_write(mdev);
1972 	drbd_suspend_al(mdev);
1973 	return rv;
1974 }
1975 
1976 static int drbd_nl_invalidate_peer(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
1977 				   struct drbd_nl_cfg_reply *reply)
1978 {
1979 	int retcode;
1980 
1981 	/* If there is still bitmap IO pending, probably because of a previous
1982 	 * resync just being finished, wait for it before requesting a new resync. */
1983 	wait_event(mdev->misc_wait, !test_bit(BITMAP_IO, &mdev->flags));
1984 
1985 	retcode = _drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_S), CS_ORDERED);
1986 
1987 	if (retcode < SS_SUCCESS) {
1988 		if (retcode == SS_NEED_CONNECTION && mdev->state.role == R_PRIMARY) {
1989 			/* The peer will get a resync upon connect anyways. Just make that
1990 			   into a full resync. */
1991 			retcode = drbd_request_state(mdev, NS(pdsk, D_INCONSISTENT));
1992 			if (retcode >= SS_SUCCESS) {
1993 				if (drbd_bitmap_io(mdev, &drbd_bmio_set_susp_al,
1994 					"set_n_write from invalidate_peer",
1995 					BM_LOCKED_SET_ALLOWED))
1996 					retcode = ERR_IO_MD_DISK;
1997 			}
1998 		} else
1999 			retcode = drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_S));
2000 	}
2001 
2002 	reply->ret_code = retcode;
2003 	return 0;
2004 }
2005 
2006 static int drbd_nl_pause_sync(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
2007 			      struct drbd_nl_cfg_reply *reply)
2008 {
2009 	int retcode = NO_ERROR;
2010 
2011 	if (drbd_request_state(mdev, NS(user_isp, 1)) == SS_NOTHING_TO_DO)
2012 		retcode = ERR_PAUSE_IS_SET;
2013 
2014 	reply->ret_code = retcode;
2015 	return 0;
2016 }
2017 
2018 static int drbd_nl_resume_sync(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
2019 			       struct drbd_nl_cfg_reply *reply)
2020 {
2021 	int retcode = NO_ERROR;
2022 	union drbd_state s;
2023 
2024 	if (drbd_request_state(mdev, NS(user_isp, 0)) == SS_NOTHING_TO_DO) {
2025 		s = mdev->state;
2026 		if (s.conn == C_PAUSED_SYNC_S || s.conn == C_PAUSED_SYNC_T) {
2027 			retcode = s.aftr_isp ? ERR_PIC_AFTER_DEP :
2028 				  s.peer_isp ? ERR_PIC_PEER_DEP : ERR_PAUSE_IS_CLEAR;
2029 		} else {
2030 			retcode = ERR_PAUSE_IS_CLEAR;
2031 		}
2032 	}
2033 
2034 	reply->ret_code = retcode;
2035 	return 0;
2036 }
2037 
2038 static int drbd_nl_suspend_io(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
2039 			      struct drbd_nl_cfg_reply *reply)
2040 {
2041 	reply->ret_code = drbd_request_state(mdev, NS(susp, 1));
2042 
2043 	return 0;
2044 }
2045 
2046 static int drbd_nl_resume_io(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
2047 			     struct drbd_nl_cfg_reply *reply)
2048 {
2049 	if (test_bit(NEW_CUR_UUID, &mdev->flags)) {
2050 		drbd_uuid_new_current(mdev);
2051 		clear_bit(NEW_CUR_UUID, &mdev->flags);
2052 	}
2053 	drbd_suspend_io(mdev);
2054 	reply->ret_code = drbd_request_state(mdev, NS3(susp, 0, susp_nod, 0, susp_fen, 0));
2055 	if (reply->ret_code == SS_SUCCESS) {
2056 		if (mdev->state.conn < C_CONNECTED)
2057 			tl_clear(mdev);
2058 		if (mdev->state.disk == D_DISKLESS || mdev->state.disk == D_FAILED)
2059 			tl_restart(mdev, fail_frozen_disk_io);
2060 	}
2061 	drbd_resume_io(mdev);
2062 
2063 	return 0;
2064 }
2065 
2066 static int drbd_nl_outdate(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
2067 			   struct drbd_nl_cfg_reply *reply)
2068 {
2069 	reply->ret_code = drbd_request_state(mdev, NS(disk, D_OUTDATED));
2070 	return 0;
2071 }
2072 
2073 static int drbd_nl_get_config(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
2074 			   struct drbd_nl_cfg_reply *reply)
2075 {
2076 	unsigned short *tl;
2077 
2078 	tl = reply->tag_list;
2079 
2080 	if (get_ldev(mdev)) {
2081 		tl = disk_conf_to_tags(mdev, &mdev->ldev->dc, tl);
2082 		put_ldev(mdev);
2083 	}
2084 
2085 	if (get_net_conf(mdev)) {
2086 		tl = net_conf_to_tags(mdev, mdev->net_conf, tl);
2087 		put_net_conf(mdev);
2088 	}
2089 	tl = syncer_conf_to_tags(mdev, &mdev->sync_conf, tl);
2090 
2091 	put_unaligned(TT_END, tl++); /* Close the tag list */
2092 
2093 	return (int)((char *)tl - (char *)reply->tag_list);
2094 }
2095 
2096 static int drbd_nl_get_state(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
2097 			     struct drbd_nl_cfg_reply *reply)
2098 {
2099 	unsigned short *tl = reply->tag_list;
2100 	union drbd_state s = mdev->state;
2101 	unsigned long rs_left;
2102 	unsigned int res;
2103 
2104 	tl = get_state_to_tags(mdev, (struct get_state *)&s, tl);
2105 
2106 	/* no local ref, no bitmap, no syncer progress. */
2107 	if (s.conn >= C_SYNC_SOURCE && s.conn <= C_PAUSED_SYNC_T) {
2108 		if (get_ldev(mdev)) {
2109 			drbd_get_syncer_progress(mdev, &rs_left, &res);
2110 			tl = tl_add_int(tl, T_sync_progress, &res);
2111 			put_ldev(mdev);
2112 		}
2113 	}
2114 	put_unaligned(TT_END, tl++); /* Close the tag list */
2115 
2116 	return (int)((char *)tl - (char *)reply->tag_list);
2117 }
2118 
2119 static int drbd_nl_get_uuids(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
2120 			     struct drbd_nl_cfg_reply *reply)
2121 {
2122 	unsigned short *tl;
2123 
2124 	tl = reply->tag_list;
2125 
2126 	if (get_ldev(mdev)) {
2127 		tl = tl_add_blob(tl, T_uuids, mdev->ldev->md.uuid, UI_SIZE*sizeof(u64));
2128 		tl = tl_add_int(tl, T_uuids_flags, &mdev->ldev->md.flags);
2129 		put_ldev(mdev);
2130 	}
2131 	put_unaligned(TT_END, tl++); /* Close the tag list */
2132 
2133 	return (int)((char *)tl - (char *)reply->tag_list);
2134 }
2135 
2136 /**
2137  * drbd_nl_get_timeout_flag() - Used by drbdsetup to find out which timeout value to use
2138  * @mdev:	DRBD device.
2139  * @nlp:	Netlink/connector packet from drbdsetup
2140  * @reply:	Reply packet for drbdsetup
2141  */
2142 static int drbd_nl_get_timeout_flag(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
2143 				    struct drbd_nl_cfg_reply *reply)
2144 {
2145 	unsigned short *tl;
2146 	char rv;
2147 
2148 	tl = reply->tag_list;
2149 
2150 	rv = mdev->state.pdsk == D_OUTDATED        ? UT_PEER_OUTDATED :
2151 	  test_bit(USE_DEGR_WFC_T, &mdev->flags) ? UT_DEGRADED : UT_DEFAULT;
2152 
2153 	tl = tl_add_blob(tl, T_use_degraded, &rv, sizeof(rv));
2154 	put_unaligned(TT_END, tl++); /* Close the tag list */
2155 
2156 	return (int)((char *)tl - (char *)reply->tag_list);
2157 }
2158 
2159 static int drbd_nl_start_ov(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
2160 				    struct drbd_nl_cfg_reply *reply)
2161 {
2162 	/* default to resume from last known position, if possible */
2163 	struct start_ov args =
2164 		{ .start_sector = mdev->ov_start_sector };
2165 
2166 	if (!start_ov_from_tags(mdev, nlp->tag_list, &args)) {
2167 		reply->ret_code = ERR_MANDATORY_TAG;
2168 		return 0;
2169 	}
2170 
2171 	/* If there is still bitmap IO pending, e.g. previous resync or verify
2172 	 * just being finished, wait for it before requesting a new resync. */
2173 	wait_event(mdev->misc_wait, !test_bit(BITMAP_IO, &mdev->flags));
2174 
2175 	/* w_make_ov_request expects position to be aligned */
2176 	mdev->ov_start_sector = args.start_sector & ~BM_SECT_PER_BIT;
2177 	reply->ret_code = drbd_request_state(mdev,NS(conn,C_VERIFY_S));
2178 	return 0;
2179 }
2180 
2181 
2182 static int drbd_nl_new_c_uuid(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp,
2183 			      struct drbd_nl_cfg_reply *reply)
2184 {
2185 	int retcode = NO_ERROR;
2186 	int skip_initial_sync = 0;
2187 	int err;
2188 
2189 	struct new_c_uuid args;
2190 
2191 	memset(&args, 0, sizeof(struct new_c_uuid));
2192 	if (!new_c_uuid_from_tags(mdev, nlp->tag_list, &args)) {
2193 		reply->ret_code = ERR_MANDATORY_TAG;
2194 		return 0;
2195 	}
2196 
2197 	mutex_lock(&mdev->state_mutex); /* Protects us against serialized state changes. */
2198 
2199 	if (!get_ldev(mdev)) {
2200 		retcode = ERR_NO_DISK;
2201 		goto out;
2202 	}
2203 
2204 	/* this is "skip initial sync", assume to be clean */
2205 	if (mdev->state.conn == C_CONNECTED && mdev->agreed_pro_version >= 90 &&
2206 	    mdev->ldev->md.uuid[UI_CURRENT] == UUID_JUST_CREATED && args.clear_bm) {
2207 		dev_info(DEV, "Preparing to skip initial sync\n");
2208 		skip_initial_sync = 1;
2209 	} else if (mdev->state.conn != C_STANDALONE) {
2210 		retcode = ERR_CONNECTED;
2211 		goto out_dec;
2212 	}
2213 
2214 	drbd_uuid_set(mdev, UI_BITMAP, 0); /* Rotate UI_BITMAP to History 1, etc... */
2215 	drbd_uuid_new_current(mdev); /* New current, previous to UI_BITMAP */
2216 
2217 	if (args.clear_bm) {
2218 		err = drbd_bitmap_io(mdev, &drbd_bmio_clear_n_write,
2219 			"clear_n_write from new_c_uuid", BM_LOCKED_MASK);
2220 		if (err) {
2221 			dev_err(DEV, "Writing bitmap failed with %d\n",err);
2222 			retcode = ERR_IO_MD_DISK;
2223 		}
2224 		if (skip_initial_sync) {
2225 			drbd_send_uuids_skip_initial_sync(mdev);
2226 			_drbd_uuid_set(mdev, UI_BITMAP, 0);
2227 			drbd_print_uuids(mdev, "cleared bitmap UUID");
2228 			spin_lock_irq(&mdev->req_lock);
2229 			_drbd_set_state(_NS2(mdev, disk, D_UP_TO_DATE, pdsk, D_UP_TO_DATE),
2230 					CS_VERBOSE, NULL);
2231 			spin_unlock_irq(&mdev->req_lock);
2232 		}
2233 	}
2234 
2235 	drbd_md_sync(mdev);
2236 out_dec:
2237 	put_ldev(mdev);
2238 out:
2239 	mutex_unlock(&mdev->state_mutex);
2240 
2241 	reply->ret_code = retcode;
2242 	return 0;
2243 }
2244 
2245 struct cn_handler_struct {
2246 	int (*function)(struct drbd_conf *,
2247 			 struct drbd_nl_cfg_req *,
2248 			 struct drbd_nl_cfg_reply *);
2249 	int reply_body_size;
2250 };
2251 
2252 static struct cn_handler_struct cnd_table[] = {
2253 	[ P_primary ]		= { &drbd_nl_primary,		0 },
2254 	[ P_secondary ]		= { &drbd_nl_secondary,		0 },
2255 	[ P_disk_conf ]		= { &drbd_nl_disk_conf,		0 },
2256 	[ P_detach ]		= { &drbd_nl_detach,		0 },
2257 	[ P_net_conf ]		= { &drbd_nl_net_conf,		0 },
2258 	[ P_disconnect ]	= { &drbd_nl_disconnect,	0 },
2259 	[ P_resize ]		= { &drbd_nl_resize,		0 },
2260 	[ P_syncer_conf ]	= { &drbd_nl_syncer_conf,	0 },
2261 	[ P_invalidate ]	= { &drbd_nl_invalidate,	0 },
2262 	[ P_invalidate_peer ]	= { &drbd_nl_invalidate_peer,	0 },
2263 	[ P_pause_sync ]	= { &drbd_nl_pause_sync,	0 },
2264 	[ P_resume_sync ]	= { &drbd_nl_resume_sync,	0 },
2265 	[ P_suspend_io ]	= { &drbd_nl_suspend_io,	0 },
2266 	[ P_resume_io ]		= { &drbd_nl_resume_io,		0 },
2267 	[ P_outdate ]		= { &drbd_nl_outdate,		0 },
2268 	[ P_get_config ]	= { &drbd_nl_get_config,
2269 				    sizeof(struct syncer_conf_tag_len_struct) +
2270 				    sizeof(struct disk_conf_tag_len_struct) +
2271 				    sizeof(struct net_conf_tag_len_struct) },
2272 	[ P_get_state ]		= { &drbd_nl_get_state,
2273 				    sizeof(struct get_state_tag_len_struct) +
2274 				    sizeof(struct sync_progress_tag_len_struct)	},
2275 	[ P_get_uuids ]		= { &drbd_nl_get_uuids,
2276 				    sizeof(struct get_uuids_tag_len_struct) },
2277 	[ P_get_timeout_flag ]	= { &drbd_nl_get_timeout_flag,
2278 				    sizeof(struct get_timeout_flag_tag_len_struct)},
2279 	[ P_start_ov ]		= { &drbd_nl_start_ov,		0 },
2280 	[ P_new_c_uuid ]	= { &drbd_nl_new_c_uuid,	0 },
2281 };
2282 
2283 static void drbd_connector_callback(struct cn_msg *req, struct netlink_skb_parms *nsp)
2284 {
2285 	struct drbd_nl_cfg_req *nlp = (struct drbd_nl_cfg_req *)req->data;
2286 	struct cn_handler_struct *cm;
2287 	struct cn_msg *cn_reply;
2288 	struct drbd_nl_cfg_reply *reply;
2289 	struct drbd_conf *mdev;
2290 	int retcode, rr;
2291 	int reply_size = sizeof(struct cn_msg)
2292 		+ sizeof(struct drbd_nl_cfg_reply)
2293 		+ sizeof(short int);
2294 
2295 	if (!try_module_get(THIS_MODULE)) {
2296 		printk(KERN_ERR "drbd: try_module_get() failed!\n");
2297 		return;
2298 	}
2299 
2300 	if (!cap_raised(current_cap(), CAP_SYS_ADMIN)) {
2301 		retcode = ERR_PERM;
2302 		goto fail;
2303 	}
2304 
2305 	mdev = ensure_mdev(nlp->drbd_minor,
2306 			(nlp->flags & DRBD_NL_CREATE_DEVICE));
2307 	if (!mdev) {
2308 		retcode = ERR_MINOR_INVALID;
2309 		goto fail;
2310 	}
2311 
2312 	if (nlp->packet_type >= P_nl_after_last_packet ||
2313 	    nlp->packet_type == P_return_code_only) {
2314 		retcode = ERR_PACKET_NR;
2315 		goto fail;
2316 	}
2317 
2318 	cm = cnd_table + nlp->packet_type;
2319 
2320 	/* This may happen if packet number is 0: */
2321 	if (cm->function == NULL) {
2322 		retcode = ERR_PACKET_NR;
2323 		goto fail;
2324 	}
2325 
2326 	reply_size += cm->reply_body_size;
2327 
2328 	/* allocation not in the IO path, cqueue thread context */
2329 	cn_reply = kzalloc(reply_size, GFP_KERNEL);
2330 	if (!cn_reply) {
2331 		retcode = ERR_NOMEM;
2332 		goto fail;
2333 	}
2334 	reply = (struct drbd_nl_cfg_reply *) cn_reply->data;
2335 
2336 	reply->packet_type =
2337 		cm->reply_body_size ? nlp->packet_type : P_return_code_only;
2338 	reply->minor = nlp->drbd_minor;
2339 	reply->ret_code = NO_ERROR; /* Might by modified by cm->function. */
2340 	/* reply->tag_list; might be modified by cm->function. */
2341 
2342 	rr = cm->function(mdev, nlp, reply);
2343 
2344 	cn_reply->id = req->id;
2345 	cn_reply->seq = req->seq;
2346 	cn_reply->ack = req->ack  + 1;
2347 	cn_reply->len = sizeof(struct drbd_nl_cfg_reply) + rr;
2348 	cn_reply->flags = 0;
2349 
2350 	rr = cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_KERNEL);
2351 	if (rr && rr != -ESRCH)
2352 		printk(KERN_INFO "drbd: cn_netlink_send()=%d\n", rr);
2353 
2354 	kfree(cn_reply);
2355 	module_put(THIS_MODULE);
2356 	return;
2357  fail:
2358 	drbd_nl_send_reply(req, retcode);
2359 	module_put(THIS_MODULE);
2360 }
2361 
2362 static atomic_t drbd_nl_seq = ATOMIC_INIT(2); /* two. */
2363 
2364 static unsigned short *
2365 __tl_add_blob(unsigned short *tl, enum drbd_tags tag, const void *data,
2366 	unsigned short len, int nul_terminated)
2367 {
2368 	unsigned short l = tag_descriptions[tag_number(tag)].max_len;
2369 	len = (len < l) ? len :  l;
2370 	put_unaligned(tag, tl++);
2371 	put_unaligned(len, tl++);
2372 	memcpy(tl, data, len);
2373 	tl = (unsigned short*)((char*)tl + len);
2374 	if (nul_terminated)
2375 		*((char*)tl - 1) = 0;
2376 	return tl;
2377 }
2378 
2379 static unsigned short *
2380 tl_add_blob(unsigned short *tl, enum drbd_tags tag, const void *data, int len)
2381 {
2382 	return __tl_add_blob(tl, tag, data, len, 0);
2383 }
2384 
2385 static unsigned short *
2386 tl_add_str(unsigned short *tl, enum drbd_tags tag, const char *str)
2387 {
2388 	return __tl_add_blob(tl, tag, str, strlen(str)+1, 0);
2389 }
2390 
2391 static unsigned short *
2392 tl_add_int(unsigned short *tl, enum drbd_tags tag, const void *val)
2393 {
2394 	put_unaligned(tag, tl++);
2395 	switch(tag_type(tag)) {
2396 	case TT_INTEGER:
2397 		put_unaligned(sizeof(int), tl++);
2398 		put_unaligned(*(int *)val, (int *)tl);
2399 		tl = (unsigned short*)((char*)tl+sizeof(int));
2400 		break;
2401 	case TT_INT64:
2402 		put_unaligned(sizeof(u64), tl++);
2403 		put_unaligned(*(u64 *)val, (u64 *)tl);
2404 		tl = (unsigned short*)((char*)tl+sizeof(u64));
2405 		break;
2406 	default:
2407 		/* someone did something stupid. */
2408 		;
2409 	}
2410 	return tl;
2411 }
2412 
2413 void drbd_bcast_state(struct drbd_conf *mdev, union drbd_state state)
2414 {
2415 	char buffer[sizeof(struct cn_msg)+
2416 		    sizeof(struct drbd_nl_cfg_reply)+
2417 		    sizeof(struct get_state_tag_len_struct)+
2418 		    sizeof(short int)];
2419 	struct cn_msg *cn_reply = (struct cn_msg *) buffer;
2420 	struct drbd_nl_cfg_reply *reply =
2421 		(struct drbd_nl_cfg_reply *)cn_reply->data;
2422 	unsigned short *tl = reply->tag_list;
2423 
2424 	/* dev_warn(DEV, "drbd_bcast_state() got called\n"); */
2425 
2426 	tl = get_state_to_tags(mdev, (struct get_state *)&state, tl);
2427 
2428 	put_unaligned(TT_END, tl++); /* Close the tag list */
2429 
2430 	cn_reply->id.idx = CN_IDX_DRBD;
2431 	cn_reply->id.val = CN_VAL_DRBD;
2432 
2433 	cn_reply->seq = atomic_add_return(1, &drbd_nl_seq);
2434 	cn_reply->ack = 0; /* not used here. */
2435 	cn_reply->len = sizeof(struct drbd_nl_cfg_reply) +
2436 		(int)((char *)tl - (char *)reply->tag_list);
2437 	cn_reply->flags = 0;
2438 
2439 	reply->packet_type = P_get_state;
2440 	reply->minor = mdev_to_minor(mdev);
2441 	reply->ret_code = NO_ERROR;
2442 
2443 	cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_NOIO);
2444 }
2445 
2446 void drbd_bcast_ev_helper(struct drbd_conf *mdev, char *helper_name)
2447 {
2448 	char buffer[sizeof(struct cn_msg)+
2449 		    sizeof(struct drbd_nl_cfg_reply)+
2450 		    sizeof(struct call_helper_tag_len_struct)+
2451 		    sizeof(short int)];
2452 	struct cn_msg *cn_reply = (struct cn_msg *) buffer;
2453 	struct drbd_nl_cfg_reply *reply =
2454 		(struct drbd_nl_cfg_reply *)cn_reply->data;
2455 	unsigned short *tl = reply->tag_list;
2456 
2457 	/* dev_warn(DEV, "drbd_bcast_state() got called\n"); */
2458 
2459 	tl = tl_add_str(tl, T_helper, helper_name);
2460 	put_unaligned(TT_END, tl++); /* Close the tag list */
2461 
2462 	cn_reply->id.idx = CN_IDX_DRBD;
2463 	cn_reply->id.val = CN_VAL_DRBD;
2464 
2465 	cn_reply->seq = atomic_add_return(1, &drbd_nl_seq);
2466 	cn_reply->ack = 0; /* not used here. */
2467 	cn_reply->len = sizeof(struct drbd_nl_cfg_reply) +
2468 		(int)((char *)tl - (char *)reply->tag_list);
2469 	cn_reply->flags = 0;
2470 
2471 	reply->packet_type = P_call_helper;
2472 	reply->minor = mdev_to_minor(mdev);
2473 	reply->ret_code = NO_ERROR;
2474 
2475 	cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_NOIO);
2476 }
2477 
2478 void drbd_bcast_ee(struct drbd_conf *mdev,
2479 		const char *reason, const int dgs,
2480 		const char* seen_hash, const char* calc_hash,
2481 		const struct drbd_epoch_entry* e)
2482 {
2483 	struct cn_msg *cn_reply;
2484 	struct drbd_nl_cfg_reply *reply;
2485 	unsigned short *tl;
2486 	struct page *page;
2487 	unsigned len;
2488 
2489 	if (!e)
2490 		return;
2491 	if (!reason || !reason[0])
2492 		return;
2493 
2494 	/* apparently we have to memcpy twice, first to prepare the data for the
2495 	 * struct cn_msg, then within cn_netlink_send from the cn_msg to the
2496 	 * netlink skb. */
2497 	/* receiver thread context, which is not in the writeout path (of this node),
2498 	 * but may be in the writeout path of the _other_ node.
2499 	 * GFP_NOIO to avoid potential "distributed deadlock". */
2500 	cn_reply = kzalloc(
2501 		sizeof(struct cn_msg)+
2502 		sizeof(struct drbd_nl_cfg_reply)+
2503 		sizeof(struct dump_ee_tag_len_struct)+
2504 		sizeof(short int),
2505 		GFP_NOIO);
2506 
2507 	if (!cn_reply) {
2508 		dev_err(DEV, "could not kmalloc buffer for drbd_bcast_ee, sector %llu, size %u\n",
2509 				(unsigned long long)e->sector, e->size);
2510 		return;
2511 	}
2512 
2513 	reply = (struct drbd_nl_cfg_reply*)cn_reply->data;
2514 	tl = reply->tag_list;
2515 
2516 	tl = tl_add_str(tl, T_dump_ee_reason, reason);
2517 	tl = tl_add_blob(tl, T_seen_digest, seen_hash, dgs);
2518 	tl = tl_add_blob(tl, T_calc_digest, calc_hash, dgs);
2519 	tl = tl_add_int(tl, T_ee_sector, &e->sector);
2520 	tl = tl_add_int(tl, T_ee_block_id, &e->block_id);
2521 
2522 	/* dump the first 32k */
2523 	len = min_t(unsigned, e->size, 32 << 10);
2524 	put_unaligned(T_ee_data, tl++);
2525 	put_unaligned(len, tl++);
2526 
2527 	page = e->pages;
2528 	page_chain_for_each(page) {
2529 		void *d = kmap_atomic(page, KM_USER0);
2530 		unsigned l = min_t(unsigned, len, PAGE_SIZE);
2531 		memcpy(tl, d, l);
2532 		kunmap_atomic(d, KM_USER0);
2533 		tl = (unsigned short*)((char*)tl + l);
2534 		len -= l;
2535 		if (len == 0)
2536 			break;
2537 	}
2538 	put_unaligned(TT_END, tl++); /* Close the tag list */
2539 
2540 	cn_reply->id.idx = CN_IDX_DRBD;
2541 	cn_reply->id.val = CN_VAL_DRBD;
2542 
2543 	cn_reply->seq = atomic_add_return(1,&drbd_nl_seq);
2544 	cn_reply->ack = 0; // not used here.
2545 	cn_reply->len = sizeof(struct drbd_nl_cfg_reply) +
2546 		(int)((char*)tl - (char*)reply->tag_list);
2547 	cn_reply->flags = 0;
2548 
2549 	reply->packet_type = P_dump_ee;
2550 	reply->minor = mdev_to_minor(mdev);
2551 	reply->ret_code = NO_ERROR;
2552 
2553 	cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_NOIO);
2554 	kfree(cn_reply);
2555 }
2556 
2557 void drbd_bcast_sync_progress(struct drbd_conf *mdev)
2558 {
2559 	char buffer[sizeof(struct cn_msg)+
2560 		    sizeof(struct drbd_nl_cfg_reply)+
2561 		    sizeof(struct sync_progress_tag_len_struct)+
2562 		    sizeof(short int)];
2563 	struct cn_msg *cn_reply = (struct cn_msg *) buffer;
2564 	struct drbd_nl_cfg_reply *reply =
2565 		(struct drbd_nl_cfg_reply *)cn_reply->data;
2566 	unsigned short *tl = reply->tag_list;
2567 	unsigned long rs_left;
2568 	unsigned int res;
2569 
2570 	/* no local ref, no bitmap, no syncer progress, no broadcast. */
2571 	if (!get_ldev(mdev))
2572 		return;
2573 	drbd_get_syncer_progress(mdev, &rs_left, &res);
2574 	put_ldev(mdev);
2575 
2576 	tl = tl_add_int(tl, T_sync_progress, &res);
2577 	put_unaligned(TT_END, tl++); /* Close the tag list */
2578 
2579 	cn_reply->id.idx = CN_IDX_DRBD;
2580 	cn_reply->id.val = CN_VAL_DRBD;
2581 
2582 	cn_reply->seq = atomic_add_return(1, &drbd_nl_seq);
2583 	cn_reply->ack = 0; /* not used here. */
2584 	cn_reply->len = sizeof(struct drbd_nl_cfg_reply) +
2585 		(int)((char *)tl - (char *)reply->tag_list);
2586 	cn_reply->flags = 0;
2587 
2588 	reply->packet_type = P_sync_progress;
2589 	reply->minor = mdev_to_minor(mdev);
2590 	reply->ret_code = NO_ERROR;
2591 
2592 	cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_NOIO);
2593 }
2594 
2595 int __init drbd_nl_init(void)
2596 {
2597 	static struct cb_id cn_id_drbd;
2598 	int err, try=10;
2599 
2600 	cn_id_drbd.val = CN_VAL_DRBD;
2601 	do {
2602 		cn_id_drbd.idx = cn_idx;
2603 		err = cn_add_callback(&cn_id_drbd, "cn_drbd", &drbd_connector_callback);
2604 		if (!err)
2605 			break;
2606 		cn_idx = (cn_idx + CN_IDX_STEP);
2607 	} while (try--);
2608 
2609 	if (err) {
2610 		printk(KERN_ERR "drbd: cn_drbd failed to register\n");
2611 		return err;
2612 	}
2613 
2614 	return 0;
2615 }
2616 
2617 void drbd_nl_cleanup(void)
2618 {
2619 	static struct cb_id cn_id_drbd;
2620 
2621 	cn_id_drbd.idx = cn_idx;
2622 	cn_id_drbd.val = CN_VAL_DRBD;
2623 
2624 	cn_del_callback(&cn_id_drbd);
2625 }
2626 
2627 void drbd_nl_send_reply(struct cn_msg *req, int ret_code)
2628 {
2629 	char buffer[sizeof(struct cn_msg)+sizeof(struct drbd_nl_cfg_reply)];
2630 	struct cn_msg *cn_reply = (struct cn_msg *) buffer;
2631 	struct drbd_nl_cfg_reply *reply =
2632 		(struct drbd_nl_cfg_reply *)cn_reply->data;
2633 	int rr;
2634 
2635 	memset(buffer, 0, sizeof(buffer));
2636 	cn_reply->id = req->id;
2637 
2638 	cn_reply->seq = req->seq;
2639 	cn_reply->ack = req->ack  + 1;
2640 	cn_reply->len = sizeof(struct drbd_nl_cfg_reply);
2641 	cn_reply->flags = 0;
2642 
2643 	reply->packet_type = P_return_code_only;
2644 	reply->minor = ((struct drbd_nl_cfg_req *)req->data)->drbd_minor;
2645 	reply->ret_code = ret_code;
2646 
2647 	rr = cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_NOIO);
2648 	if (rr && rr != -ESRCH)
2649 		printk(KERN_INFO "drbd: cn_netlink_send()=%d\n", rr);
2650 }
2651 
2652