1 /* 2 drbd_nl.c 3 4 This file is part of DRBD by Philipp Reisner and Lars Ellenberg. 5 6 Copyright (C) 2001-2008, LINBIT Information Technologies GmbH. 7 Copyright (C) 1999-2008, Philipp Reisner <philipp.reisner@linbit.com>. 8 Copyright (C) 2002-2008, Lars Ellenberg <lars.ellenberg@linbit.com>. 9 10 drbd is free software; you can redistribute it and/or modify 11 it under the terms of the GNU General Public License as published by 12 the Free Software Foundation; either version 2, or (at your option) 13 any later version. 14 15 drbd is distributed in the hope that it will be useful, 16 but WITHOUT ANY WARRANTY; without even the implied warranty of 17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 18 GNU General Public License for more details. 19 20 You should have received a copy of the GNU General Public License 21 along with drbd; see the file COPYING. If not, write to 22 the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA. 23 24 */ 25 26 #include <linux/module.h> 27 #include <linux/drbd.h> 28 #include <linux/in.h> 29 #include <linux/fs.h> 30 #include <linux/file.h> 31 #include <linux/slab.h> 32 #include <linux/connector.h> 33 #include <linux/blkpg.h> 34 #include <linux/cpumask.h> 35 #include "drbd_int.h" 36 #include "drbd_req.h" 37 #include "drbd_wrappers.h" 38 #include <asm/unaligned.h> 39 #include <linux/drbd_tag_magic.h> 40 #include <linux/drbd_limits.h> 41 #include <linux/compiler.h> 42 #include <linux/kthread.h> 43 44 static unsigned short *tl_add_blob(unsigned short *, enum drbd_tags, const void *, int); 45 static unsigned short *tl_add_str(unsigned short *, enum drbd_tags, const char *); 46 static unsigned short *tl_add_int(unsigned short *, enum drbd_tags, const void *); 47 48 /* see get_sb_bdev and bd_claim */ 49 static char *drbd_m_holder = "Hands off! this is DRBD's meta data device."; 50 51 /* Generate the tag_list to struct functions */ 52 #define NL_PACKET(name, number, fields) \ 53 static int name ## _from_tags(struct drbd_conf *mdev, \ 54 unsigned short *tags, struct name *arg) __attribute__ ((unused)); \ 55 static int name ## _from_tags(struct drbd_conf *mdev, \ 56 unsigned short *tags, struct name *arg) \ 57 { \ 58 int tag; \ 59 int dlen; \ 60 \ 61 while ((tag = get_unaligned(tags++)) != TT_END) { \ 62 dlen = get_unaligned(tags++); \ 63 switch (tag_number(tag)) { \ 64 fields \ 65 default: \ 66 if (tag & T_MANDATORY) { \ 67 dev_err(DEV, "Unknown tag: %d\n", tag_number(tag)); \ 68 return 0; \ 69 } \ 70 } \ 71 tags = (unsigned short *)((char *)tags + dlen); \ 72 } \ 73 return 1; \ 74 } 75 #define NL_INTEGER(pn, pr, member) \ 76 case pn: /* D_ASSERT( tag_type(tag) == TT_INTEGER ); */ \ 77 arg->member = get_unaligned((int *)(tags)); \ 78 break; 79 #define NL_INT64(pn, pr, member) \ 80 case pn: /* D_ASSERT( tag_type(tag) == TT_INT64 ); */ \ 81 arg->member = get_unaligned((u64 *)(tags)); \ 82 break; 83 #define NL_BIT(pn, pr, member) \ 84 case pn: /* D_ASSERT( tag_type(tag) == TT_BIT ); */ \ 85 arg->member = *(char *)(tags) ? 1 : 0; \ 86 break; 87 #define NL_STRING(pn, pr, member, len) \ 88 case pn: /* D_ASSERT( tag_type(tag) == TT_STRING ); */ \ 89 if (dlen > len) { \ 90 dev_err(DEV, "arg too long: %s (%u wanted, max len: %u bytes)\n", \ 91 #member, dlen, (unsigned int)len); \ 92 return 0; \ 93 } \ 94 arg->member ## _len = dlen; \ 95 memcpy(arg->member, tags, min_t(size_t, dlen, len)); \ 96 break; 97 #include "linux/drbd_nl.h" 98 99 /* Generate the struct to tag_list functions */ 100 #define NL_PACKET(name, number, fields) \ 101 static unsigned short* \ 102 name ## _to_tags(struct drbd_conf *mdev, \ 103 struct name *arg, unsigned short *tags) __attribute__ ((unused)); \ 104 static unsigned short* \ 105 name ## _to_tags(struct drbd_conf *mdev, \ 106 struct name *arg, unsigned short *tags) \ 107 { \ 108 fields \ 109 return tags; \ 110 } 111 112 #define NL_INTEGER(pn, pr, member) \ 113 put_unaligned(pn | pr | TT_INTEGER, tags++); \ 114 put_unaligned(sizeof(int), tags++); \ 115 put_unaligned(arg->member, (int *)tags); \ 116 tags = (unsigned short *)((char *)tags+sizeof(int)); 117 #define NL_INT64(pn, pr, member) \ 118 put_unaligned(pn | pr | TT_INT64, tags++); \ 119 put_unaligned(sizeof(u64), tags++); \ 120 put_unaligned(arg->member, (u64 *)tags); \ 121 tags = (unsigned short *)((char *)tags+sizeof(u64)); 122 #define NL_BIT(pn, pr, member) \ 123 put_unaligned(pn | pr | TT_BIT, tags++); \ 124 put_unaligned(sizeof(char), tags++); \ 125 *(char *)tags = arg->member; \ 126 tags = (unsigned short *)((char *)tags+sizeof(char)); 127 #define NL_STRING(pn, pr, member, len) \ 128 put_unaligned(pn | pr | TT_STRING, tags++); \ 129 put_unaligned(arg->member ## _len, tags++); \ 130 memcpy(tags, arg->member, arg->member ## _len); \ 131 tags = (unsigned short *)((char *)tags + arg->member ## _len); 132 #include "linux/drbd_nl.h" 133 134 void drbd_bcast_ev_helper(struct drbd_conf *mdev, char *helper_name); 135 void drbd_nl_send_reply(struct cn_msg *, int); 136 137 int drbd_khelper(struct drbd_conf *mdev, char *cmd) 138 { 139 char *envp[] = { "HOME=/", 140 "TERM=linux", 141 "PATH=/sbin:/usr/sbin:/bin:/usr/bin", 142 NULL, /* Will be set to address family */ 143 NULL, /* Will be set to address */ 144 NULL }; 145 146 char mb[12], af[20], ad[60], *afs; 147 char *argv[] = {usermode_helper, cmd, mb, NULL }; 148 int ret; 149 150 snprintf(mb, 12, "minor-%d", mdev_to_minor(mdev)); 151 152 if (get_net_conf(mdev)) { 153 switch (((struct sockaddr *)mdev->net_conf->peer_addr)->sa_family) { 154 case AF_INET6: 155 afs = "ipv6"; 156 snprintf(ad, 60, "DRBD_PEER_ADDRESS=%pI6", 157 &((struct sockaddr_in6 *)mdev->net_conf->peer_addr)->sin6_addr); 158 break; 159 case AF_INET: 160 afs = "ipv4"; 161 snprintf(ad, 60, "DRBD_PEER_ADDRESS=%pI4", 162 &((struct sockaddr_in *)mdev->net_conf->peer_addr)->sin_addr); 163 break; 164 default: 165 afs = "ssocks"; 166 snprintf(ad, 60, "DRBD_PEER_ADDRESS=%pI4", 167 &((struct sockaddr_in *)mdev->net_conf->peer_addr)->sin_addr); 168 } 169 snprintf(af, 20, "DRBD_PEER_AF=%s", afs); 170 envp[3]=af; 171 envp[4]=ad; 172 put_net_conf(mdev); 173 } 174 175 /* The helper may take some time. 176 * write out any unsynced meta data changes now */ 177 drbd_md_sync(mdev); 178 179 dev_info(DEV, "helper command: %s %s %s\n", usermode_helper, cmd, mb); 180 181 drbd_bcast_ev_helper(mdev, cmd); 182 ret = call_usermodehelper(usermode_helper, argv, envp, 1); 183 if (ret) 184 dev_warn(DEV, "helper command: %s %s %s exit code %u (0x%x)\n", 185 usermode_helper, cmd, mb, 186 (ret >> 8) & 0xff, ret); 187 else 188 dev_info(DEV, "helper command: %s %s %s exit code %u (0x%x)\n", 189 usermode_helper, cmd, mb, 190 (ret >> 8) & 0xff, ret); 191 192 if (ret < 0) /* Ignore any ERRNOs we got. */ 193 ret = 0; 194 195 return ret; 196 } 197 198 enum drbd_disk_state drbd_try_outdate_peer(struct drbd_conf *mdev) 199 { 200 char *ex_to_string; 201 int r; 202 enum drbd_disk_state nps; 203 enum drbd_fencing_p fp; 204 205 D_ASSERT(mdev->state.pdsk == D_UNKNOWN); 206 207 if (get_ldev_if_state(mdev, D_CONSISTENT)) { 208 fp = mdev->ldev->dc.fencing; 209 put_ldev(mdev); 210 } else { 211 dev_warn(DEV, "Not fencing peer, I'm not even Consistent myself.\n"); 212 nps = mdev->state.pdsk; 213 goto out; 214 } 215 216 r = drbd_khelper(mdev, "fence-peer"); 217 218 switch ((r>>8) & 0xff) { 219 case 3: /* peer is inconsistent */ 220 ex_to_string = "peer is inconsistent or worse"; 221 nps = D_INCONSISTENT; 222 break; 223 case 4: /* peer got outdated, or was already outdated */ 224 ex_to_string = "peer was fenced"; 225 nps = D_OUTDATED; 226 break; 227 case 5: /* peer was down */ 228 if (mdev->state.disk == D_UP_TO_DATE) { 229 /* we will(have) create(d) a new UUID anyways... */ 230 ex_to_string = "peer is unreachable, assumed to be dead"; 231 nps = D_OUTDATED; 232 } else { 233 ex_to_string = "peer unreachable, doing nothing since disk != UpToDate"; 234 nps = mdev->state.pdsk; 235 } 236 break; 237 case 6: /* Peer is primary, voluntarily outdate myself. 238 * This is useful when an unconnected R_SECONDARY is asked to 239 * become R_PRIMARY, but finds the other peer being active. */ 240 ex_to_string = "peer is active"; 241 dev_warn(DEV, "Peer is primary, outdating myself.\n"); 242 nps = D_UNKNOWN; 243 _drbd_request_state(mdev, NS(disk, D_OUTDATED), CS_WAIT_COMPLETE); 244 break; 245 case 7: 246 if (fp != FP_STONITH) 247 dev_err(DEV, "fence-peer() = 7 && fencing != Stonith !!!\n"); 248 ex_to_string = "peer was stonithed"; 249 nps = D_OUTDATED; 250 break; 251 default: 252 /* The script is broken ... */ 253 nps = D_UNKNOWN; 254 dev_err(DEV, "fence-peer helper broken, returned %d\n", (r>>8)&0xff); 255 return nps; 256 } 257 258 dev_info(DEV, "fence-peer helper returned %d (%s)\n", 259 (r>>8) & 0xff, ex_to_string); 260 261 out: 262 if (mdev->state.susp_fen && nps >= D_UNKNOWN) { 263 /* The handler was not successful... unfreeze here, the 264 state engine can not unfreeze... */ 265 _drbd_request_state(mdev, NS(susp_fen, 0), CS_VERBOSE); 266 } 267 268 return nps; 269 } 270 271 static int _try_outdate_peer_async(void *data) 272 { 273 struct drbd_conf *mdev = (struct drbd_conf *)data; 274 enum drbd_disk_state nps; 275 union drbd_state ns; 276 277 nps = drbd_try_outdate_peer(mdev); 278 279 /* Not using 280 drbd_request_state(mdev, NS(pdsk, nps)); 281 here, because we might were able to re-establish the connection 282 in the meantime. This can only partially be solved in the state's 283 engine is_valid_state() and is_valid_state_transition() 284 functions. 285 286 nps can be D_INCONSISTENT, D_OUTDATED or D_UNKNOWN. 287 pdsk == D_INCONSISTENT while conn >= C_CONNECTED is valid, 288 therefore we have to have the pre state change check here. 289 */ 290 spin_lock_irq(&mdev->req_lock); 291 ns = mdev->state; 292 if (ns.conn < C_WF_REPORT_PARAMS) { 293 ns.pdsk = nps; 294 _drbd_set_state(mdev, ns, CS_VERBOSE, NULL); 295 } 296 spin_unlock_irq(&mdev->req_lock); 297 298 return 0; 299 } 300 301 void drbd_try_outdate_peer_async(struct drbd_conf *mdev) 302 { 303 struct task_struct *opa; 304 305 opa = kthread_run(_try_outdate_peer_async, mdev, "drbd%d_a_helper", mdev_to_minor(mdev)); 306 if (IS_ERR(opa)) 307 dev_err(DEV, "out of mem, failed to invoke fence-peer helper\n"); 308 } 309 310 enum drbd_state_rv 311 drbd_set_role(struct drbd_conf *mdev, enum drbd_role new_role, int force) 312 { 313 const int max_tries = 4; 314 enum drbd_state_rv rv = SS_UNKNOWN_ERROR; 315 int try = 0; 316 int forced = 0; 317 union drbd_state mask, val; 318 enum drbd_disk_state nps; 319 320 if (new_role == R_PRIMARY) 321 request_ping(mdev); /* Detect a dead peer ASAP */ 322 323 mutex_lock(&mdev->state_mutex); 324 325 mask.i = 0; mask.role = R_MASK; 326 val.i = 0; val.role = new_role; 327 328 while (try++ < max_tries) { 329 rv = _drbd_request_state(mdev, mask, val, CS_WAIT_COMPLETE); 330 331 /* in case we first succeeded to outdate, 332 * but now suddenly could establish a connection */ 333 if (rv == SS_CW_FAILED_BY_PEER && mask.pdsk != 0) { 334 val.pdsk = 0; 335 mask.pdsk = 0; 336 continue; 337 } 338 339 if (rv == SS_NO_UP_TO_DATE_DISK && force && 340 (mdev->state.disk < D_UP_TO_DATE && 341 mdev->state.disk >= D_INCONSISTENT)) { 342 mask.disk = D_MASK; 343 val.disk = D_UP_TO_DATE; 344 forced = 1; 345 continue; 346 } 347 348 if (rv == SS_NO_UP_TO_DATE_DISK && 349 mdev->state.disk == D_CONSISTENT && mask.pdsk == 0) { 350 D_ASSERT(mdev->state.pdsk == D_UNKNOWN); 351 nps = drbd_try_outdate_peer(mdev); 352 353 if (nps == D_OUTDATED || nps == D_INCONSISTENT) { 354 val.disk = D_UP_TO_DATE; 355 mask.disk = D_MASK; 356 } 357 358 val.pdsk = nps; 359 mask.pdsk = D_MASK; 360 361 continue; 362 } 363 364 if (rv == SS_NOTHING_TO_DO) 365 goto fail; 366 if (rv == SS_PRIMARY_NOP && mask.pdsk == 0) { 367 nps = drbd_try_outdate_peer(mdev); 368 369 if (force && nps > D_OUTDATED) { 370 dev_warn(DEV, "Forced into split brain situation!\n"); 371 nps = D_OUTDATED; 372 } 373 374 mask.pdsk = D_MASK; 375 val.pdsk = nps; 376 377 continue; 378 } 379 if (rv == SS_TWO_PRIMARIES) { 380 /* Maybe the peer is detected as dead very soon... 381 retry at most once more in this case. */ 382 schedule_timeout_interruptible((mdev->net_conf->ping_timeo+1)*HZ/10); 383 if (try < max_tries) 384 try = max_tries - 1; 385 continue; 386 } 387 if (rv < SS_SUCCESS) { 388 rv = _drbd_request_state(mdev, mask, val, 389 CS_VERBOSE + CS_WAIT_COMPLETE); 390 if (rv < SS_SUCCESS) 391 goto fail; 392 } 393 break; 394 } 395 396 if (rv < SS_SUCCESS) 397 goto fail; 398 399 if (forced) 400 dev_warn(DEV, "Forced to consider local data as UpToDate!\n"); 401 402 /* Wait until nothing is on the fly :) */ 403 wait_event(mdev->misc_wait, atomic_read(&mdev->ap_pending_cnt) == 0); 404 405 if (new_role == R_SECONDARY) { 406 set_disk_ro(mdev->vdisk, true); 407 if (get_ldev(mdev)) { 408 mdev->ldev->md.uuid[UI_CURRENT] &= ~(u64)1; 409 put_ldev(mdev); 410 } 411 } else { 412 if (get_net_conf(mdev)) { 413 mdev->net_conf->want_lose = 0; 414 put_net_conf(mdev); 415 } 416 set_disk_ro(mdev->vdisk, false); 417 if (get_ldev(mdev)) { 418 if (((mdev->state.conn < C_CONNECTED || 419 mdev->state.pdsk <= D_FAILED) 420 && mdev->ldev->md.uuid[UI_BITMAP] == 0) || forced) 421 drbd_uuid_new_current(mdev); 422 423 mdev->ldev->md.uuid[UI_CURRENT] |= (u64)1; 424 put_ldev(mdev); 425 } 426 } 427 428 /* writeout of activity log covered areas of the bitmap 429 * to stable storage done in after state change already */ 430 431 if (mdev->state.conn >= C_WF_REPORT_PARAMS) { 432 /* if this was forced, we should consider sync */ 433 if (forced) 434 drbd_send_uuids(mdev); 435 drbd_send_state(mdev); 436 } 437 438 drbd_md_sync(mdev); 439 440 kobject_uevent(&disk_to_dev(mdev->vdisk)->kobj, KOBJ_CHANGE); 441 fail: 442 mutex_unlock(&mdev->state_mutex); 443 return rv; 444 } 445 446 static struct drbd_conf *ensure_mdev(int minor, int create) 447 { 448 struct drbd_conf *mdev; 449 450 if (minor >= minor_count) 451 return NULL; 452 453 mdev = minor_to_mdev(minor); 454 455 if (!mdev && create) { 456 struct gendisk *disk = NULL; 457 mdev = drbd_new_device(minor); 458 459 spin_lock_irq(&drbd_pp_lock); 460 if (minor_table[minor] == NULL) { 461 minor_table[minor] = mdev; 462 disk = mdev->vdisk; 463 mdev = NULL; 464 } /* else: we lost the race */ 465 spin_unlock_irq(&drbd_pp_lock); 466 467 if (disk) /* we won the race above */ 468 /* in case we ever add a drbd_delete_device(), 469 * don't forget the del_gendisk! */ 470 add_disk(disk); 471 else /* we lost the race above */ 472 drbd_free_mdev(mdev); 473 474 mdev = minor_to_mdev(minor); 475 } 476 477 return mdev; 478 } 479 480 static int drbd_nl_primary(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp, 481 struct drbd_nl_cfg_reply *reply) 482 { 483 struct primary primary_args; 484 485 memset(&primary_args, 0, sizeof(struct primary)); 486 if (!primary_from_tags(mdev, nlp->tag_list, &primary_args)) { 487 reply->ret_code = ERR_MANDATORY_TAG; 488 return 0; 489 } 490 491 reply->ret_code = 492 drbd_set_role(mdev, R_PRIMARY, primary_args.primary_force); 493 494 return 0; 495 } 496 497 static int drbd_nl_secondary(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp, 498 struct drbd_nl_cfg_reply *reply) 499 { 500 reply->ret_code = drbd_set_role(mdev, R_SECONDARY, 0); 501 502 return 0; 503 } 504 505 /* initializes the md.*_offset members, so we are able to find 506 * the on disk meta data */ 507 static void drbd_md_set_sector_offsets(struct drbd_conf *mdev, 508 struct drbd_backing_dev *bdev) 509 { 510 sector_t md_size_sect = 0; 511 switch (bdev->dc.meta_dev_idx) { 512 default: 513 /* v07 style fixed size indexed meta data */ 514 bdev->md.md_size_sect = MD_RESERVED_SECT; 515 bdev->md.md_offset = drbd_md_ss__(mdev, bdev); 516 bdev->md.al_offset = MD_AL_OFFSET; 517 bdev->md.bm_offset = MD_BM_OFFSET; 518 break; 519 case DRBD_MD_INDEX_FLEX_EXT: 520 /* just occupy the full device; unit: sectors */ 521 bdev->md.md_size_sect = drbd_get_capacity(bdev->md_bdev); 522 bdev->md.md_offset = 0; 523 bdev->md.al_offset = MD_AL_OFFSET; 524 bdev->md.bm_offset = MD_BM_OFFSET; 525 break; 526 case DRBD_MD_INDEX_INTERNAL: 527 case DRBD_MD_INDEX_FLEX_INT: 528 bdev->md.md_offset = drbd_md_ss__(mdev, bdev); 529 /* al size is still fixed */ 530 bdev->md.al_offset = -MD_AL_MAX_SIZE; 531 /* we need (slightly less than) ~ this much bitmap sectors: */ 532 md_size_sect = drbd_get_capacity(bdev->backing_bdev); 533 md_size_sect = ALIGN(md_size_sect, BM_SECT_PER_EXT); 534 md_size_sect = BM_SECT_TO_EXT(md_size_sect); 535 md_size_sect = ALIGN(md_size_sect, 8); 536 537 /* plus the "drbd meta data super block", 538 * and the activity log; */ 539 md_size_sect += MD_BM_OFFSET; 540 541 bdev->md.md_size_sect = md_size_sect; 542 /* bitmap offset is adjusted by 'super' block size */ 543 bdev->md.bm_offset = -md_size_sect + MD_AL_OFFSET; 544 break; 545 } 546 } 547 548 /* input size is expected to be in KB */ 549 char *ppsize(char *buf, unsigned long long size) 550 { 551 /* Needs 9 bytes at max including trailing NUL: 552 * -1ULL ==> "16384 EB" */ 553 static char units[] = { 'K', 'M', 'G', 'T', 'P', 'E' }; 554 int base = 0; 555 while (size >= 10000 && base < sizeof(units)-1) { 556 /* shift + round */ 557 size = (size >> 10) + !!(size & (1<<9)); 558 base++; 559 } 560 sprintf(buf, "%u %cB", (unsigned)size, units[base]); 561 562 return buf; 563 } 564 565 /* there is still a theoretical deadlock when called from receiver 566 * on an D_INCONSISTENT R_PRIMARY: 567 * remote READ does inc_ap_bio, receiver would need to receive answer 568 * packet from remote to dec_ap_bio again. 569 * receiver receive_sizes(), comes here, 570 * waits for ap_bio_cnt == 0. -> deadlock. 571 * but this cannot happen, actually, because: 572 * R_PRIMARY D_INCONSISTENT, and peer's disk is unreachable 573 * (not connected, or bad/no disk on peer): 574 * see drbd_fail_request_early, ap_bio_cnt is zero. 575 * R_PRIMARY D_INCONSISTENT, and C_SYNC_TARGET: 576 * peer may not initiate a resize. 577 */ 578 void drbd_suspend_io(struct drbd_conf *mdev) 579 { 580 set_bit(SUSPEND_IO, &mdev->flags); 581 if (is_susp(mdev->state)) 582 return; 583 wait_event(mdev->misc_wait, !atomic_read(&mdev->ap_bio_cnt)); 584 } 585 586 void drbd_resume_io(struct drbd_conf *mdev) 587 { 588 clear_bit(SUSPEND_IO, &mdev->flags); 589 wake_up(&mdev->misc_wait); 590 } 591 592 /** 593 * drbd_determine_dev_size() - Sets the right device size obeying all constraints 594 * @mdev: DRBD device. 595 * 596 * Returns 0 on success, negative return values indicate errors. 597 * You should call drbd_md_sync() after calling this function. 598 */ 599 enum determine_dev_size drbd_determine_dev_size(struct drbd_conf *mdev, enum dds_flags flags) __must_hold(local) 600 { 601 sector_t prev_first_sect, prev_size; /* previous meta location */ 602 sector_t la_size; 603 sector_t size; 604 char ppb[10]; 605 606 int md_moved, la_size_changed; 607 enum determine_dev_size rv = unchanged; 608 609 /* race: 610 * application request passes inc_ap_bio, 611 * but then cannot get an AL-reference. 612 * this function later may wait on ap_bio_cnt == 0. -> deadlock. 613 * 614 * to avoid that: 615 * Suspend IO right here. 616 * still lock the act_log to not trigger ASSERTs there. 617 */ 618 drbd_suspend_io(mdev); 619 620 /* no wait necessary anymore, actually we could assert that */ 621 wait_event(mdev->al_wait, lc_try_lock(mdev->act_log)); 622 623 prev_first_sect = drbd_md_first_sector(mdev->ldev); 624 prev_size = mdev->ldev->md.md_size_sect; 625 la_size = mdev->ldev->md.la_size_sect; 626 627 /* TODO: should only be some assert here, not (re)init... */ 628 drbd_md_set_sector_offsets(mdev, mdev->ldev); 629 630 size = drbd_new_dev_size(mdev, mdev->ldev, flags & DDSF_FORCED); 631 632 if (drbd_get_capacity(mdev->this_bdev) != size || 633 drbd_bm_capacity(mdev) != size) { 634 int err; 635 err = drbd_bm_resize(mdev, size, !(flags & DDSF_NO_RESYNC)); 636 if (unlikely(err)) { 637 /* currently there is only one error: ENOMEM! */ 638 size = drbd_bm_capacity(mdev)>>1; 639 if (size == 0) { 640 dev_err(DEV, "OUT OF MEMORY! " 641 "Could not allocate bitmap!\n"); 642 } else { 643 dev_err(DEV, "BM resizing failed. " 644 "Leaving size unchanged at size = %lu KB\n", 645 (unsigned long)size); 646 } 647 rv = dev_size_error; 648 } 649 /* racy, see comments above. */ 650 drbd_set_my_capacity(mdev, size); 651 mdev->ldev->md.la_size_sect = size; 652 dev_info(DEV, "size = %s (%llu KB)\n", ppsize(ppb, size>>1), 653 (unsigned long long)size>>1); 654 } 655 if (rv == dev_size_error) 656 goto out; 657 658 la_size_changed = (la_size != mdev->ldev->md.la_size_sect); 659 660 md_moved = prev_first_sect != drbd_md_first_sector(mdev->ldev) 661 || prev_size != mdev->ldev->md.md_size_sect; 662 663 if (la_size_changed || md_moved) { 664 int err; 665 666 drbd_al_shrink(mdev); /* All extents inactive. */ 667 dev_info(DEV, "Writing the whole bitmap, %s\n", 668 la_size_changed && md_moved ? "size changed and md moved" : 669 la_size_changed ? "size changed" : "md moved"); 670 /* next line implicitly does drbd_suspend_io()+drbd_resume_io() */ 671 err = drbd_bitmap_io(mdev, &drbd_bm_write, 672 "size changed", BM_LOCKED_MASK); 673 if (err) { 674 rv = dev_size_error; 675 goto out; 676 } 677 drbd_md_mark_dirty(mdev); 678 } 679 680 if (size > la_size) 681 rv = grew; 682 if (size < la_size) 683 rv = shrunk; 684 out: 685 lc_unlock(mdev->act_log); 686 wake_up(&mdev->al_wait); 687 drbd_resume_io(mdev); 688 689 return rv; 690 } 691 692 sector_t 693 drbd_new_dev_size(struct drbd_conf *mdev, struct drbd_backing_dev *bdev, int assume_peer_has_space) 694 { 695 sector_t p_size = mdev->p_size; /* partner's disk size. */ 696 sector_t la_size = bdev->md.la_size_sect; /* last agreed size. */ 697 sector_t m_size; /* my size */ 698 sector_t u_size = bdev->dc.disk_size; /* size requested by user. */ 699 sector_t size = 0; 700 701 m_size = drbd_get_max_capacity(bdev); 702 703 if (mdev->state.conn < C_CONNECTED && assume_peer_has_space) { 704 dev_warn(DEV, "Resize while not connected was forced by the user!\n"); 705 p_size = m_size; 706 } 707 708 if (p_size && m_size) { 709 size = min_t(sector_t, p_size, m_size); 710 } else { 711 if (la_size) { 712 size = la_size; 713 if (m_size && m_size < size) 714 size = m_size; 715 if (p_size && p_size < size) 716 size = p_size; 717 } else { 718 if (m_size) 719 size = m_size; 720 if (p_size) 721 size = p_size; 722 } 723 } 724 725 if (size == 0) 726 dev_err(DEV, "Both nodes diskless!\n"); 727 728 if (u_size) { 729 if (u_size > size) 730 dev_err(DEV, "Requested disk size is too big (%lu > %lu)\n", 731 (unsigned long)u_size>>1, (unsigned long)size>>1); 732 else 733 size = u_size; 734 } 735 736 return size; 737 } 738 739 /** 740 * drbd_check_al_size() - Ensures that the AL is of the right size 741 * @mdev: DRBD device. 742 * 743 * Returns -EBUSY if current al lru is still used, -ENOMEM when allocation 744 * failed, and 0 on success. You should call drbd_md_sync() after you called 745 * this function. 746 */ 747 static int drbd_check_al_size(struct drbd_conf *mdev) 748 { 749 struct lru_cache *n, *t; 750 struct lc_element *e; 751 unsigned int in_use; 752 int i; 753 754 ERR_IF(mdev->sync_conf.al_extents < 7) 755 mdev->sync_conf.al_extents = 127; 756 757 if (mdev->act_log && 758 mdev->act_log->nr_elements == mdev->sync_conf.al_extents) 759 return 0; 760 761 in_use = 0; 762 t = mdev->act_log; 763 n = lc_create("act_log", drbd_al_ext_cache, 764 mdev->sync_conf.al_extents, sizeof(struct lc_element), 0); 765 766 if (n == NULL) { 767 dev_err(DEV, "Cannot allocate act_log lru!\n"); 768 return -ENOMEM; 769 } 770 spin_lock_irq(&mdev->al_lock); 771 if (t) { 772 for (i = 0; i < t->nr_elements; i++) { 773 e = lc_element_by_index(t, i); 774 if (e->refcnt) 775 dev_err(DEV, "refcnt(%d)==%d\n", 776 e->lc_number, e->refcnt); 777 in_use += e->refcnt; 778 } 779 } 780 if (!in_use) 781 mdev->act_log = n; 782 spin_unlock_irq(&mdev->al_lock); 783 if (in_use) { 784 dev_err(DEV, "Activity log still in use!\n"); 785 lc_destroy(n); 786 return -EBUSY; 787 } else { 788 if (t) 789 lc_destroy(t); 790 } 791 drbd_md_mark_dirty(mdev); /* we changed mdev->act_log->nr_elemens */ 792 return 0; 793 } 794 795 static void drbd_setup_queue_param(struct drbd_conf *mdev, unsigned int max_bio_size) 796 { 797 struct request_queue * const q = mdev->rq_queue; 798 int max_hw_sectors = max_bio_size >> 9; 799 int max_segments = 0; 800 801 if (get_ldev_if_state(mdev, D_ATTACHING)) { 802 struct request_queue * const b = mdev->ldev->backing_bdev->bd_disk->queue; 803 804 max_hw_sectors = min(queue_max_hw_sectors(b), max_bio_size >> 9); 805 max_segments = mdev->ldev->dc.max_bio_bvecs; 806 put_ldev(mdev); 807 } 808 809 blk_queue_logical_block_size(q, 512); 810 blk_queue_max_hw_sectors(q, max_hw_sectors); 811 /* This is the workaround for "bio would need to, but cannot, be split" */ 812 blk_queue_max_segments(q, max_segments ? max_segments : BLK_MAX_SEGMENTS); 813 blk_queue_segment_boundary(q, PAGE_CACHE_SIZE-1); 814 815 if (get_ldev_if_state(mdev, D_ATTACHING)) { 816 struct request_queue * const b = mdev->ldev->backing_bdev->bd_disk->queue; 817 818 blk_queue_stack_limits(q, b); 819 820 if (q->backing_dev_info.ra_pages != b->backing_dev_info.ra_pages) { 821 dev_info(DEV, "Adjusting my ra_pages to backing device's (%lu -> %lu)\n", 822 q->backing_dev_info.ra_pages, 823 b->backing_dev_info.ra_pages); 824 q->backing_dev_info.ra_pages = b->backing_dev_info.ra_pages; 825 } 826 put_ldev(mdev); 827 } 828 } 829 830 void drbd_reconsider_max_bio_size(struct drbd_conf *mdev) 831 { 832 int now, new, local, peer; 833 834 now = queue_max_hw_sectors(mdev->rq_queue) << 9; 835 local = mdev->local_max_bio_size; /* Eventually last known value, from volatile memory */ 836 peer = mdev->peer_max_bio_size; /* Eventually last known value, from meta data */ 837 838 if (get_ldev_if_state(mdev, D_ATTACHING)) { 839 local = queue_max_hw_sectors(mdev->ldev->backing_bdev->bd_disk->queue) << 9; 840 mdev->local_max_bio_size = local; 841 put_ldev(mdev); 842 } 843 844 /* We may ignore peer limits if the peer is modern enough. 845 Because new from 8.3.8 onwards the peer can use multiple 846 BIOs for a single peer_request */ 847 if (mdev->state.conn >= C_CONNECTED) { 848 if (mdev->agreed_pro_version < 94) 849 peer = mdev->peer_max_bio_size; 850 else if (mdev->agreed_pro_version == 94) 851 peer = DRBD_MAX_SIZE_H80_PACKET; 852 else /* drbd 8.3.8 onwards */ 853 peer = DRBD_MAX_BIO_SIZE; 854 } 855 856 new = min_t(int, local, peer); 857 858 if (mdev->state.role == R_PRIMARY && new < now) 859 dev_err(DEV, "ASSERT FAILED new < now; (%d < %d)\n", new, now); 860 861 if (new != now) 862 dev_info(DEV, "max BIO size = %u\n", new); 863 864 drbd_setup_queue_param(mdev, new); 865 } 866 867 /* serialize deconfig (worker exiting, doing cleanup) 868 * and reconfig (drbdsetup disk, drbdsetup net) 869 * 870 * Wait for a potentially exiting worker, then restart it, 871 * or start a new one. Flush any pending work, there may still be an 872 * after_state_change queued. 873 */ 874 static void drbd_reconfig_start(struct drbd_conf *mdev) 875 { 876 wait_event(mdev->state_wait, !test_and_set_bit(CONFIG_PENDING, &mdev->flags)); 877 wait_event(mdev->state_wait, !test_bit(DEVICE_DYING, &mdev->flags)); 878 drbd_thread_start(&mdev->worker); 879 drbd_flush_workqueue(mdev); 880 } 881 882 /* if still unconfigured, stops worker again. 883 * if configured now, clears CONFIG_PENDING. 884 * wakes potential waiters */ 885 static void drbd_reconfig_done(struct drbd_conf *mdev) 886 { 887 spin_lock_irq(&mdev->req_lock); 888 if (mdev->state.disk == D_DISKLESS && 889 mdev->state.conn == C_STANDALONE && 890 mdev->state.role == R_SECONDARY) { 891 set_bit(DEVICE_DYING, &mdev->flags); 892 drbd_thread_stop_nowait(&mdev->worker); 893 } else 894 clear_bit(CONFIG_PENDING, &mdev->flags); 895 spin_unlock_irq(&mdev->req_lock); 896 wake_up(&mdev->state_wait); 897 } 898 899 /* Make sure IO is suspended before calling this function(). */ 900 static void drbd_suspend_al(struct drbd_conf *mdev) 901 { 902 int s = 0; 903 904 if (lc_try_lock(mdev->act_log)) { 905 drbd_al_shrink(mdev); 906 lc_unlock(mdev->act_log); 907 } else { 908 dev_warn(DEV, "Failed to lock al in drbd_suspend_al()\n"); 909 return; 910 } 911 912 spin_lock_irq(&mdev->req_lock); 913 if (mdev->state.conn < C_CONNECTED) 914 s = !test_and_set_bit(AL_SUSPENDED, &mdev->flags); 915 916 spin_unlock_irq(&mdev->req_lock); 917 918 if (s) 919 dev_info(DEV, "Suspended AL updates\n"); 920 } 921 922 /* does always return 0; 923 * interesting return code is in reply->ret_code */ 924 static int drbd_nl_disk_conf(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp, 925 struct drbd_nl_cfg_reply *reply) 926 { 927 enum drbd_ret_code retcode; 928 enum determine_dev_size dd; 929 sector_t max_possible_sectors; 930 sector_t min_md_device_sectors; 931 struct drbd_backing_dev *nbc = NULL; /* new_backing_conf */ 932 struct block_device *bdev; 933 struct lru_cache *resync_lru = NULL; 934 union drbd_state ns, os; 935 enum drbd_state_rv rv; 936 int cp_discovered = 0; 937 int logical_block_size; 938 939 drbd_reconfig_start(mdev); 940 941 /* if you want to reconfigure, please tear down first */ 942 if (mdev->state.disk > D_DISKLESS) { 943 retcode = ERR_DISK_CONFIGURED; 944 goto fail; 945 } 946 /* It may just now have detached because of IO error. Make sure 947 * drbd_ldev_destroy is done already, we may end up here very fast, 948 * e.g. if someone calls attach from the on-io-error handler, 949 * to realize a "hot spare" feature (not that I'd recommend that) */ 950 wait_event(mdev->misc_wait, !atomic_read(&mdev->local_cnt)); 951 952 /* allocation not in the IO path, cqueue thread context */ 953 nbc = kzalloc(sizeof(struct drbd_backing_dev), GFP_KERNEL); 954 if (!nbc) { 955 retcode = ERR_NOMEM; 956 goto fail; 957 } 958 959 nbc->dc.disk_size = DRBD_DISK_SIZE_SECT_DEF; 960 nbc->dc.on_io_error = DRBD_ON_IO_ERROR_DEF; 961 nbc->dc.fencing = DRBD_FENCING_DEF; 962 nbc->dc.max_bio_bvecs = DRBD_MAX_BIO_BVECS_DEF; 963 964 if (!disk_conf_from_tags(mdev, nlp->tag_list, &nbc->dc)) { 965 retcode = ERR_MANDATORY_TAG; 966 goto fail; 967 } 968 969 if (nbc->dc.meta_dev_idx < DRBD_MD_INDEX_FLEX_INT) { 970 retcode = ERR_MD_IDX_INVALID; 971 goto fail; 972 } 973 974 if (get_net_conf(mdev)) { 975 int prot = mdev->net_conf->wire_protocol; 976 put_net_conf(mdev); 977 if (nbc->dc.fencing == FP_STONITH && prot == DRBD_PROT_A) { 978 retcode = ERR_STONITH_AND_PROT_A; 979 goto fail; 980 } 981 } 982 983 bdev = blkdev_get_by_path(nbc->dc.backing_dev, 984 FMODE_READ | FMODE_WRITE | FMODE_EXCL, mdev); 985 if (IS_ERR(bdev)) { 986 dev_err(DEV, "open(\"%s\") failed with %ld\n", nbc->dc.backing_dev, 987 PTR_ERR(bdev)); 988 retcode = ERR_OPEN_DISK; 989 goto fail; 990 } 991 nbc->backing_bdev = bdev; 992 993 /* 994 * meta_dev_idx >= 0: external fixed size, possibly multiple 995 * drbd sharing one meta device. TODO in that case, paranoia 996 * check that [md_bdev, meta_dev_idx] is not yet used by some 997 * other drbd minor! (if you use drbd.conf + drbdadm, that 998 * should check it for you already; but if you don't, or 999 * someone fooled it, we need to double check here) 1000 */ 1001 bdev = blkdev_get_by_path(nbc->dc.meta_dev, 1002 FMODE_READ | FMODE_WRITE | FMODE_EXCL, 1003 (nbc->dc.meta_dev_idx < 0) ? 1004 (void *)mdev : (void *)drbd_m_holder); 1005 if (IS_ERR(bdev)) { 1006 dev_err(DEV, "open(\"%s\") failed with %ld\n", nbc->dc.meta_dev, 1007 PTR_ERR(bdev)); 1008 retcode = ERR_OPEN_MD_DISK; 1009 goto fail; 1010 } 1011 nbc->md_bdev = bdev; 1012 1013 if ((nbc->backing_bdev == nbc->md_bdev) != 1014 (nbc->dc.meta_dev_idx == DRBD_MD_INDEX_INTERNAL || 1015 nbc->dc.meta_dev_idx == DRBD_MD_INDEX_FLEX_INT)) { 1016 retcode = ERR_MD_IDX_INVALID; 1017 goto fail; 1018 } 1019 1020 resync_lru = lc_create("resync", drbd_bm_ext_cache, 1021 61, sizeof(struct bm_extent), 1022 offsetof(struct bm_extent, lce)); 1023 if (!resync_lru) { 1024 retcode = ERR_NOMEM; 1025 goto fail; 1026 } 1027 1028 /* RT - for drbd_get_max_capacity() DRBD_MD_INDEX_FLEX_INT */ 1029 drbd_md_set_sector_offsets(mdev, nbc); 1030 1031 if (drbd_get_max_capacity(nbc) < nbc->dc.disk_size) { 1032 dev_err(DEV, "max capacity %llu smaller than disk size %llu\n", 1033 (unsigned long long) drbd_get_max_capacity(nbc), 1034 (unsigned long long) nbc->dc.disk_size); 1035 retcode = ERR_DISK_TO_SMALL; 1036 goto fail; 1037 } 1038 1039 if (nbc->dc.meta_dev_idx < 0) { 1040 max_possible_sectors = DRBD_MAX_SECTORS_FLEX; 1041 /* at least one MB, otherwise it does not make sense */ 1042 min_md_device_sectors = (2<<10); 1043 } else { 1044 max_possible_sectors = DRBD_MAX_SECTORS; 1045 min_md_device_sectors = MD_RESERVED_SECT * (nbc->dc.meta_dev_idx + 1); 1046 } 1047 1048 if (drbd_get_capacity(nbc->md_bdev) < min_md_device_sectors) { 1049 retcode = ERR_MD_DISK_TO_SMALL; 1050 dev_warn(DEV, "refusing attach: md-device too small, " 1051 "at least %llu sectors needed for this meta-disk type\n", 1052 (unsigned long long) min_md_device_sectors); 1053 goto fail; 1054 } 1055 1056 /* Make sure the new disk is big enough 1057 * (we may currently be R_PRIMARY with no local disk...) */ 1058 if (drbd_get_max_capacity(nbc) < 1059 drbd_get_capacity(mdev->this_bdev)) { 1060 retcode = ERR_DISK_TO_SMALL; 1061 goto fail; 1062 } 1063 1064 nbc->known_size = drbd_get_capacity(nbc->backing_bdev); 1065 1066 if (nbc->known_size > max_possible_sectors) { 1067 dev_warn(DEV, "==> truncating very big lower level device " 1068 "to currently maximum possible %llu sectors <==\n", 1069 (unsigned long long) max_possible_sectors); 1070 if (nbc->dc.meta_dev_idx >= 0) 1071 dev_warn(DEV, "==>> using internal or flexible " 1072 "meta data may help <<==\n"); 1073 } 1074 1075 drbd_suspend_io(mdev); 1076 /* also wait for the last barrier ack. */ 1077 wait_event(mdev->misc_wait, !atomic_read(&mdev->ap_pending_cnt) || is_susp(mdev->state)); 1078 /* and for any other previously queued work */ 1079 drbd_flush_workqueue(mdev); 1080 1081 rv = _drbd_request_state(mdev, NS(disk, D_ATTACHING), CS_VERBOSE); 1082 retcode = rv; /* FIXME: Type mismatch. */ 1083 drbd_resume_io(mdev); 1084 if (rv < SS_SUCCESS) 1085 goto fail; 1086 1087 if (!get_ldev_if_state(mdev, D_ATTACHING)) 1088 goto force_diskless; 1089 1090 drbd_md_set_sector_offsets(mdev, nbc); 1091 1092 /* allocate a second IO page if logical_block_size != 512 */ 1093 logical_block_size = bdev_logical_block_size(nbc->md_bdev); 1094 if (logical_block_size == 0) 1095 logical_block_size = MD_SECTOR_SIZE; 1096 1097 if (logical_block_size != MD_SECTOR_SIZE) { 1098 if (!mdev->md_io_tmpp) { 1099 struct page *page = alloc_page(GFP_NOIO); 1100 if (!page) 1101 goto force_diskless_dec; 1102 1103 dev_warn(DEV, "Meta data's bdev logical_block_size = %d != %d\n", 1104 logical_block_size, MD_SECTOR_SIZE); 1105 dev_warn(DEV, "Workaround engaged (has performance impact).\n"); 1106 1107 mdev->md_io_tmpp = page; 1108 } 1109 } 1110 1111 if (!mdev->bitmap) { 1112 if (drbd_bm_init(mdev)) { 1113 retcode = ERR_NOMEM; 1114 goto force_diskless_dec; 1115 } 1116 } 1117 1118 retcode = drbd_md_read(mdev, nbc); 1119 if (retcode != NO_ERROR) 1120 goto force_diskless_dec; 1121 1122 if (mdev->state.conn < C_CONNECTED && 1123 mdev->state.role == R_PRIMARY && 1124 (mdev->ed_uuid & ~((u64)1)) != (nbc->md.uuid[UI_CURRENT] & ~((u64)1))) { 1125 dev_err(DEV, "Can only attach to data with current UUID=%016llX\n", 1126 (unsigned long long)mdev->ed_uuid); 1127 retcode = ERR_DATA_NOT_CURRENT; 1128 goto force_diskless_dec; 1129 } 1130 1131 /* Since we are diskless, fix the activity log first... */ 1132 if (drbd_check_al_size(mdev)) { 1133 retcode = ERR_NOMEM; 1134 goto force_diskless_dec; 1135 } 1136 1137 /* Prevent shrinking of consistent devices ! */ 1138 if (drbd_md_test_flag(nbc, MDF_CONSISTENT) && 1139 drbd_new_dev_size(mdev, nbc, 0) < nbc->md.la_size_sect) { 1140 dev_warn(DEV, "refusing to truncate a consistent device\n"); 1141 retcode = ERR_DISK_TO_SMALL; 1142 goto force_diskless_dec; 1143 } 1144 1145 if (!drbd_al_read_log(mdev, nbc)) { 1146 retcode = ERR_IO_MD_DISK; 1147 goto force_diskless_dec; 1148 } 1149 1150 /* Reset the "barriers don't work" bits here, then force meta data to 1151 * be written, to ensure we determine if barriers are supported. */ 1152 if (nbc->dc.no_md_flush) 1153 set_bit(MD_NO_FUA, &mdev->flags); 1154 else 1155 clear_bit(MD_NO_FUA, &mdev->flags); 1156 1157 /* Point of no return reached. 1158 * Devices and memory are no longer released by error cleanup below. 1159 * now mdev takes over responsibility, and the state engine should 1160 * clean it up somewhere. */ 1161 D_ASSERT(mdev->ldev == NULL); 1162 mdev->ldev = nbc; 1163 mdev->resync = resync_lru; 1164 nbc = NULL; 1165 resync_lru = NULL; 1166 1167 mdev->write_ordering = WO_bdev_flush; 1168 drbd_bump_write_ordering(mdev, WO_bdev_flush); 1169 1170 if (drbd_md_test_flag(mdev->ldev, MDF_CRASHED_PRIMARY)) 1171 set_bit(CRASHED_PRIMARY, &mdev->flags); 1172 else 1173 clear_bit(CRASHED_PRIMARY, &mdev->flags); 1174 1175 if (drbd_md_test_flag(mdev->ldev, MDF_PRIMARY_IND) && 1176 !(mdev->state.role == R_PRIMARY && mdev->state.susp_nod)) { 1177 set_bit(CRASHED_PRIMARY, &mdev->flags); 1178 cp_discovered = 1; 1179 } 1180 1181 mdev->send_cnt = 0; 1182 mdev->recv_cnt = 0; 1183 mdev->read_cnt = 0; 1184 mdev->writ_cnt = 0; 1185 1186 drbd_reconsider_max_bio_size(mdev); 1187 1188 /* If I am currently not R_PRIMARY, 1189 * but meta data primary indicator is set, 1190 * I just now recover from a hard crash, 1191 * and have been R_PRIMARY before that crash. 1192 * 1193 * Now, if I had no connection before that crash 1194 * (have been degraded R_PRIMARY), chances are that 1195 * I won't find my peer now either. 1196 * 1197 * In that case, and _only_ in that case, 1198 * we use the degr-wfc-timeout instead of the default, 1199 * so we can automatically recover from a crash of a 1200 * degraded but active "cluster" after a certain timeout. 1201 */ 1202 clear_bit(USE_DEGR_WFC_T, &mdev->flags); 1203 if (mdev->state.role != R_PRIMARY && 1204 drbd_md_test_flag(mdev->ldev, MDF_PRIMARY_IND) && 1205 !drbd_md_test_flag(mdev->ldev, MDF_CONNECTED_IND)) 1206 set_bit(USE_DEGR_WFC_T, &mdev->flags); 1207 1208 dd = drbd_determine_dev_size(mdev, 0); 1209 if (dd == dev_size_error) { 1210 retcode = ERR_NOMEM_BITMAP; 1211 goto force_diskless_dec; 1212 } else if (dd == grew) 1213 set_bit(RESYNC_AFTER_NEG, &mdev->flags); 1214 1215 if (drbd_md_test_flag(mdev->ldev, MDF_FULL_SYNC)) { 1216 dev_info(DEV, "Assuming that all blocks are out of sync " 1217 "(aka FullSync)\n"); 1218 if (drbd_bitmap_io(mdev, &drbd_bmio_set_n_write, 1219 "set_n_write from attaching", BM_LOCKED_MASK)) { 1220 retcode = ERR_IO_MD_DISK; 1221 goto force_diskless_dec; 1222 } 1223 } else { 1224 if (drbd_bitmap_io(mdev, &drbd_bm_read, 1225 "read from attaching", BM_LOCKED_MASK) < 0) { 1226 retcode = ERR_IO_MD_DISK; 1227 goto force_diskless_dec; 1228 } 1229 } 1230 1231 if (cp_discovered) { 1232 drbd_al_apply_to_bm(mdev); 1233 if (drbd_bitmap_io(mdev, &drbd_bm_write, 1234 "crashed primary apply AL", BM_LOCKED_MASK)) { 1235 retcode = ERR_IO_MD_DISK; 1236 goto force_diskless_dec; 1237 } 1238 } 1239 1240 if (_drbd_bm_total_weight(mdev) == drbd_bm_bits(mdev)) 1241 drbd_suspend_al(mdev); /* IO is still suspended here... */ 1242 1243 spin_lock_irq(&mdev->req_lock); 1244 os = mdev->state; 1245 ns.i = os.i; 1246 /* If MDF_CONSISTENT is not set go into inconsistent state, 1247 otherwise investigate MDF_WasUpToDate... 1248 If MDF_WAS_UP_TO_DATE is not set go into D_OUTDATED disk state, 1249 otherwise into D_CONSISTENT state. 1250 */ 1251 if (drbd_md_test_flag(mdev->ldev, MDF_CONSISTENT)) { 1252 if (drbd_md_test_flag(mdev->ldev, MDF_WAS_UP_TO_DATE)) 1253 ns.disk = D_CONSISTENT; 1254 else 1255 ns.disk = D_OUTDATED; 1256 } else { 1257 ns.disk = D_INCONSISTENT; 1258 } 1259 1260 if (drbd_md_test_flag(mdev->ldev, MDF_PEER_OUT_DATED)) 1261 ns.pdsk = D_OUTDATED; 1262 1263 if ( ns.disk == D_CONSISTENT && 1264 (ns.pdsk == D_OUTDATED || mdev->ldev->dc.fencing == FP_DONT_CARE)) 1265 ns.disk = D_UP_TO_DATE; 1266 1267 /* All tests on MDF_PRIMARY_IND, MDF_CONNECTED_IND, 1268 MDF_CONSISTENT and MDF_WAS_UP_TO_DATE must happen before 1269 this point, because drbd_request_state() modifies these 1270 flags. */ 1271 1272 /* In case we are C_CONNECTED postpone any decision on the new disk 1273 state after the negotiation phase. */ 1274 if (mdev->state.conn == C_CONNECTED) { 1275 mdev->new_state_tmp.i = ns.i; 1276 ns.i = os.i; 1277 ns.disk = D_NEGOTIATING; 1278 1279 /* We expect to receive up-to-date UUIDs soon. 1280 To avoid a race in receive_state, free p_uuid while 1281 holding req_lock. I.e. atomic with the state change */ 1282 kfree(mdev->p_uuid); 1283 mdev->p_uuid = NULL; 1284 } 1285 1286 rv = _drbd_set_state(mdev, ns, CS_VERBOSE, NULL); 1287 ns = mdev->state; 1288 spin_unlock_irq(&mdev->req_lock); 1289 1290 if (rv < SS_SUCCESS) 1291 goto force_diskless_dec; 1292 1293 if (mdev->state.role == R_PRIMARY) 1294 mdev->ldev->md.uuid[UI_CURRENT] |= (u64)1; 1295 else 1296 mdev->ldev->md.uuid[UI_CURRENT] &= ~(u64)1; 1297 1298 drbd_md_mark_dirty(mdev); 1299 drbd_md_sync(mdev); 1300 1301 kobject_uevent(&disk_to_dev(mdev->vdisk)->kobj, KOBJ_CHANGE); 1302 put_ldev(mdev); 1303 reply->ret_code = retcode; 1304 drbd_reconfig_done(mdev); 1305 return 0; 1306 1307 force_diskless_dec: 1308 put_ldev(mdev); 1309 force_diskless: 1310 drbd_force_state(mdev, NS(disk, D_FAILED)); 1311 drbd_md_sync(mdev); 1312 fail: 1313 if (nbc) { 1314 if (nbc->backing_bdev) 1315 blkdev_put(nbc->backing_bdev, 1316 FMODE_READ | FMODE_WRITE | FMODE_EXCL); 1317 if (nbc->md_bdev) 1318 blkdev_put(nbc->md_bdev, 1319 FMODE_READ | FMODE_WRITE | FMODE_EXCL); 1320 kfree(nbc); 1321 } 1322 lc_destroy(resync_lru); 1323 1324 reply->ret_code = retcode; 1325 drbd_reconfig_done(mdev); 1326 return 0; 1327 } 1328 1329 /* Detaching the disk is a process in multiple stages. First we need to lock 1330 * out application IO, in-flight IO, IO stuck in drbd_al_begin_io. 1331 * Then we transition to D_DISKLESS, and wait for put_ldev() to return all 1332 * internal references as well. 1333 * Only then we have finally detached. */ 1334 static int drbd_nl_detach(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp, 1335 struct drbd_nl_cfg_reply *reply) 1336 { 1337 enum drbd_ret_code retcode; 1338 int ret; 1339 drbd_suspend_io(mdev); /* so no-one is stuck in drbd_al_begin_io */ 1340 retcode = drbd_request_state(mdev, NS(disk, D_FAILED)); 1341 /* D_FAILED will transition to DISKLESS. */ 1342 ret = wait_event_interruptible(mdev->misc_wait, 1343 mdev->state.disk != D_FAILED); 1344 drbd_resume_io(mdev); 1345 if ((int)retcode == (int)SS_IS_DISKLESS) 1346 retcode = SS_NOTHING_TO_DO; 1347 if (ret) 1348 retcode = ERR_INTR; 1349 reply->ret_code = retcode; 1350 return 0; 1351 } 1352 1353 static int drbd_nl_net_conf(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp, 1354 struct drbd_nl_cfg_reply *reply) 1355 { 1356 int i, ns; 1357 enum drbd_ret_code retcode; 1358 struct net_conf *new_conf = NULL; 1359 struct crypto_hash *tfm = NULL; 1360 struct crypto_hash *integrity_w_tfm = NULL; 1361 struct crypto_hash *integrity_r_tfm = NULL; 1362 struct hlist_head *new_tl_hash = NULL; 1363 struct hlist_head *new_ee_hash = NULL; 1364 struct drbd_conf *odev; 1365 char hmac_name[CRYPTO_MAX_ALG_NAME]; 1366 void *int_dig_out = NULL; 1367 void *int_dig_in = NULL; 1368 void *int_dig_vv = NULL; 1369 struct sockaddr *new_my_addr, *new_peer_addr, *taken_addr; 1370 1371 drbd_reconfig_start(mdev); 1372 1373 if (mdev->state.conn > C_STANDALONE) { 1374 retcode = ERR_NET_CONFIGURED; 1375 goto fail; 1376 } 1377 1378 /* allocation not in the IO path, cqueue thread context */ 1379 new_conf = kzalloc(sizeof(struct net_conf), GFP_KERNEL); 1380 if (!new_conf) { 1381 retcode = ERR_NOMEM; 1382 goto fail; 1383 } 1384 1385 new_conf->timeout = DRBD_TIMEOUT_DEF; 1386 new_conf->try_connect_int = DRBD_CONNECT_INT_DEF; 1387 new_conf->ping_int = DRBD_PING_INT_DEF; 1388 new_conf->max_epoch_size = DRBD_MAX_EPOCH_SIZE_DEF; 1389 new_conf->max_buffers = DRBD_MAX_BUFFERS_DEF; 1390 new_conf->unplug_watermark = DRBD_UNPLUG_WATERMARK_DEF; 1391 new_conf->sndbuf_size = DRBD_SNDBUF_SIZE_DEF; 1392 new_conf->rcvbuf_size = DRBD_RCVBUF_SIZE_DEF; 1393 new_conf->ko_count = DRBD_KO_COUNT_DEF; 1394 new_conf->after_sb_0p = DRBD_AFTER_SB_0P_DEF; 1395 new_conf->after_sb_1p = DRBD_AFTER_SB_1P_DEF; 1396 new_conf->after_sb_2p = DRBD_AFTER_SB_2P_DEF; 1397 new_conf->want_lose = 0; 1398 new_conf->two_primaries = 0; 1399 new_conf->wire_protocol = DRBD_PROT_C; 1400 new_conf->ping_timeo = DRBD_PING_TIMEO_DEF; 1401 new_conf->rr_conflict = DRBD_RR_CONFLICT_DEF; 1402 new_conf->on_congestion = DRBD_ON_CONGESTION_DEF; 1403 new_conf->cong_extents = DRBD_CONG_EXTENTS_DEF; 1404 1405 if (!net_conf_from_tags(mdev, nlp->tag_list, new_conf)) { 1406 retcode = ERR_MANDATORY_TAG; 1407 goto fail; 1408 } 1409 1410 if (new_conf->two_primaries 1411 && (new_conf->wire_protocol != DRBD_PROT_C)) { 1412 retcode = ERR_NOT_PROTO_C; 1413 goto fail; 1414 } 1415 1416 if (get_ldev(mdev)) { 1417 enum drbd_fencing_p fp = mdev->ldev->dc.fencing; 1418 put_ldev(mdev); 1419 if (new_conf->wire_protocol == DRBD_PROT_A && fp == FP_STONITH) { 1420 retcode = ERR_STONITH_AND_PROT_A; 1421 goto fail; 1422 } 1423 } 1424 1425 if (new_conf->on_congestion != OC_BLOCK && new_conf->wire_protocol != DRBD_PROT_A) { 1426 retcode = ERR_CONG_NOT_PROTO_A; 1427 goto fail; 1428 } 1429 1430 if (mdev->state.role == R_PRIMARY && new_conf->want_lose) { 1431 retcode = ERR_DISCARD; 1432 goto fail; 1433 } 1434 1435 retcode = NO_ERROR; 1436 1437 new_my_addr = (struct sockaddr *)&new_conf->my_addr; 1438 new_peer_addr = (struct sockaddr *)&new_conf->peer_addr; 1439 for (i = 0; i < minor_count; i++) { 1440 odev = minor_to_mdev(i); 1441 if (!odev || odev == mdev) 1442 continue; 1443 if (get_net_conf(odev)) { 1444 taken_addr = (struct sockaddr *)&odev->net_conf->my_addr; 1445 if (new_conf->my_addr_len == odev->net_conf->my_addr_len && 1446 !memcmp(new_my_addr, taken_addr, new_conf->my_addr_len)) 1447 retcode = ERR_LOCAL_ADDR; 1448 1449 taken_addr = (struct sockaddr *)&odev->net_conf->peer_addr; 1450 if (new_conf->peer_addr_len == odev->net_conf->peer_addr_len && 1451 !memcmp(new_peer_addr, taken_addr, new_conf->peer_addr_len)) 1452 retcode = ERR_PEER_ADDR; 1453 1454 put_net_conf(odev); 1455 if (retcode != NO_ERROR) 1456 goto fail; 1457 } 1458 } 1459 1460 if (new_conf->cram_hmac_alg[0] != 0) { 1461 snprintf(hmac_name, CRYPTO_MAX_ALG_NAME, "hmac(%s)", 1462 new_conf->cram_hmac_alg); 1463 tfm = crypto_alloc_hash(hmac_name, 0, CRYPTO_ALG_ASYNC); 1464 if (IS_ERR(tfm)) { 1465 tfm = NULL; 1466 retcode = ERR_AUTH_ALG; 1467 goto fail; 1468 } 1469 1470 if (!drbd_crypto_is_hash(crypto_hash_tfm(tfm))) { 1471 retcode = ERR_AUTH_ALG_ND; 1472 goto fail; 1473 } 1474 } 1475 1476 if (new_conf->integrity_alg[0]) { 1477 integrity_w_tfm = crypto_alloc_hash(new_conf->integrity_alg, 0, CRYPTO_ALG_ASYNC); 1478 if (IS_ERR(integrity_w_tfm)) { 1479 integrity_w_tfm = NULL; 1480 retcode=ERR_INTEGRITY_ALG; 1481 goto fail; 1482 } 1483 1484 if (!drbd_crypto_is_hash(crypto_hash_tfm(integrity_w_tfm))) { 1485 retcode=ERR_INTEGRITY_ALG_ND; 1486 goto fail; 1487 } 1488 1489 integrity_r_tfm = crypto_alloc_hash(new_conf->integrity_alg, 0, CRYPTO_ALG_ASYNC); 1490 if (IS_ERR(integrity_r_tfm)) { 1491 integrity_r_tfm = NULL; 1492 retcode=ERR_INTEGRITY_ALG; 1493 goto fail; 1494 } 1495 } 1496 1497 ns = new_conf->max_epoch_size/8; 1498 if (mdev->tl_hash_s != ns) { 1499 new_tl_hash = kzalloc(ns*sizeof(void *), GFP_KERNEL); 1500 if (!new_tl_hash) { 1501 retcode = ERR_NOMEM; 1502 goto fail; 1503 } 1504 } 1505 1506 ns = new_conf->max_buffers/8; 1507 if (new_conf->two_primaries && (mdev->ee_hash_s != ns)) { 1508 new_ee_hash = kzalloc(ns*sizeof(void *), GFP_KERNEL); 1509 if (!new_ee_hash) { 1510 retcode = ERR_NOMEM; 1511 goto fail; 1512 } 1513 } 1514 1515 ((char *)new_conf->shared_secret)[SHARED_SECRET_MAX-1] = 0; 1516 1517 if (integrity_w_tfm) { 1518 i = crypto_hash_digestsize(integrity_w_tfm); 1519 int_dig_out = kmalloc(i, GFP_KERNEL); 1520 if (!int_dig_out) { 1521 retcode = ERR_NOMEM; 1522 goto fail; 1523 } 1524 int_dig_in = kmalloc(i, GFP_KERNEL); 1525 if (!int_dig_in) { 1526 retcode = ERR_NOMEM; 1527 goto fail; 1528 } 1529 int_dig_vv = kmalloc(i, GFP_KERNEL); 1530 if (!int_dig_vv) { 1531 retcode = ERR_NOMEM; 1532 goto fail; 1533 } 1534 } 1535 1536 if (!mdev->bitmap) { 1537 if(drbd_bm_init(mdev)) { 1538 retcode = ERR_NOMEM; 1539 goto fail; 1540 } 1541 } 1542 1543 drbd_flush_workqueue(mdev); 1544 spin_lock_irq(&mdev->req_lock); 1545 if (mdev->net_conf != NULL) { 1546 retcode = ERR_NET_CONFIGURED; 1547 spin_unlock_irq(&mdev->req_lock); 1548 goto fail; 1549 } 1550 mdev->net_conf = new_conf; 1551 1552 mdev->send_cnt = 0; 1553 mdev->recv_cnt = 0; 1554 1555 if (new_tl_hash) { 1556 kfree(mdev->tl_hash); 1557 mdev->tl_hash_s = mdev->net_conf->max_epoch_size/8; 1558 mdev->tl_hash = new_tl_hash; 1559 } 1560 1561 if (new_ee_hash) { 1562 kfree(mdev->ee_hash); 1563 mdev->ee_hash_s = mdev->net_conf->max_buffers/8; 1564 mdev->ee_hash = new_ee_hash; 1565 } 1566 1567 crypto_free_hash(mdev->cram_hmac_tfm); 1568 mdev->cram_hmac_tfm = tfm; 1569 1570 crypto_free_hash(mdev->integrity_w_tfm); 1571 mdev->integrity_w_tfm = integrity_w_tfm; 1572 1573 crypto_free_hash(mdev->integrity_r_tfm); 1574 mdev->integrity_r_tfm = integrity_r_tfm; 1575 1576 kfree(mdev->int_dig_out); 1577 kfree(mdev->int_dig_in); 1578 kfree(mdev->int_dig_vv); 1579 mdev->int_dig_out=int_dig_out; 1580 mdev->int_dig_in=int_dig_in; 1581 mdev->int_dig_vv=int_dig_vv; 1582 retcode = _drbd_set_state(_NS(mdev, conn, C_UNCONNECTED), CS_VERBOSE, NULL); 1583 spin_unlock_irq(&mdev->req_lock); 1584 1585 kobject_uevent(&disk_to_dev(mdev->vdisk)->kobj, KOBJ_CHANGE); 1586 reply->ret_code = retcode; 1587 drbd_reconfig_done(mdev); 1588 return 0; 1589 1590 fail: 1591 kfree(int_dig_out); 1592 kfree(int_dig_in); 1593 kfree(int_dig_vv); 1594 crypto_free_hash(tfm); 1595 crypto_free_hash(integrity_w_tfm); 1596 crypto_free_hash(integrity_r_tfm); 1597 kfree(new_tl_hash); 1598 kfree(new_ee_hash); 1599 kfree(new_conf); 1600 1601 reply->ret_code = retcode; 1602 drbd_reconfig_done(mdev); 1603 return 0; 1604 } 1605 1606 static int drbd_nl_disconnect(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp, 1607 struct drbd_nl_cfg_reply *reply) 1608 { 1609 int retcode; 1610 struct disconnect dc; 1611 1612 memset(&dc, 0, sizeof(struct disconnect)); 1613 if (!disconnect_from_tags(mdev, nlp->tag_list, &dc)) { 1614 retcode = ERR_MANDATORY_TAG; 1615 goto fail; 1616 } 1617 1618 if (dc.force) { 1619 spin_lock_irq(&mdev->req_lock); 1620 if (mdev->state.conn >= C_WF_CONNECTION) 1621 _drbd_set_state(_NS(mdev, conn, C_DISCONNECTING), CS_HARD, NULL); 1622 spin_unlock_irq(&mdev->req_lock); 1623 goto done; 1624 } 1625 1626 retcode = _drbd_request_state(mdev, NS(conn, C_DISCONNECTING), CS_ORDERED); 1627 1628 if (retcode == SS_NOTHING_TO_DO) 1629 goto done; 1630 else if (retcode == SS_ALREADY_STANDALONE) 1631 goto done; 1632 else if (retcode == SS_PRIMARY_NOP) { 1633 /* Our statche checking code wants to see the peer outdated. */ 1634 retcode = drbd_request_state(mdev, NS2(conn, C_DISCONNECTING, 1635 pdsk, D_OUTDATED)); 1636 } else if (retcode == SS_CW_FAILED_BY_PEER) { 1637 /* The peer probably wants to see us outdated. */ 1638 retcode = _drbd_request_state(mdev, NS2(conn, C_DISCONNECTING, 1639 disk, D_OUTDATED), 1640 CS_ORDERED); 1641 if (retcode == SS_IS_DISKLESS || retcode == SS_LOWER_THAN_OUTDATED) { 1642 drbd_force_state(mdev, NS(conn, C_DISCONNECTING)); 1643 retcode = SS_SUCCESS; 1644 } 1645 } 1646 1647 if (retcode < SS_SUCCESS) 1648 goto fail; 1649 1650 if (wait_event_interruptible(mdev->state_wait, 1651 mdev->state.conn != C_DISCONNECTING)) { 1652 /* Do not test for mdev->state.conn == C_STANDALONE, since 1653 someone else might connect us in the mean time! */ 1654 retcode = ERR_INTR; 1655 goto fail; 1656 } 1657 1658 done: 1659 retcode = NO_ERROR; 1660 fail: 1661 drbd_md_sync(mdev); 1662 reply->ret_code = retcode; 1663 return 0; 1664 } 1665 1666 void resync_after_online_grow(struct drbd_conf *mdev) 1667 { 1668 int iass; /* I am sync source */ 1669 1670 dev_info(DEV, "Resync of new storage after online grow\n"); 1671 if (mdev->state.role != mdev->state.peer) 1672 iass = (mdev->state.role == R_PRIMARY); 1673 else 1674 iass = test_bit(DISCARD_CONCURRENT, &mdev->flags); 1675 1676 if (iass) 1677 drbd_start_resync(mdev, C_SYNC_SOURCE); 1678 else 1679 _drbd_request_state(mdev, NS(conn, C_WF_SYNC_UUID), CS_VERBOSE + CS_SERIALIZE); 1680 } 1681 1682 static int drbd_nl_resize(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp, 1683 struct drbd_nl_cfg_reply *reply) 1684 { 1685 struct resize rs; 1686 int retcode = NO_ERROR; 1687 enum determine_dev_size dd; 1688 enum dds_flags ddsf; 1689 1690 memset(&rs, 0, sizeof(struct resize)); 1691 if (!resize_from_tags(mdev, nlp->tag_list, &rs)) { 1692 retcode = ERR_MANDATORY_TAG; 1693 goto fail; 1694 } 1695 1696 if (mdev->state.conn > C_CONNECTED) { 1697 retcode = ERR_RESIZE_RESYNC; 1698 goto fail; 1699 } 1700 1701 if (mdev->state.role == R_SECONDARY && 1702 mdev->state.peer == R_SECONDARY) { 1703 retcode = ERR_NO_PRIMARY; 1704 goto fail; 1705 } 1706 1707 if (!get_ldev(mdev)) { 1708 retcode = ERR_NO_DISK; 1709 goto fail; 1710 } 1711 1712 if (rs.no_resync && mdev->agreed_pro_version < 93) { 1713 retcode = ERR_NEED_APV_93; 1714 goto fail; 1715 } 1716 1717 if (mdev->ldev->known_size != drbd_get_capacity(mdev->ldev->backing_bdev)) 1718 mdev->ldev->known_size = drbd_get_capacity(mdev->ldev->backing_bdev); 1719 1720 mdev->ldev->dc.disk_size = (sector_t)rs.resize_size; 1721 ddsf = (rs.resize_force ? DDSF_FORCED : 0) | (rs.no_resync ? DDSF_NO_RESYNC : 0); 1722 dd = drbd_determine_dev_size(mdev, ddsf); 1723 drbd_md_sync(mdev); 1724 put_ldev(mdev); 1725 if (dd == dev_size_error) { 1726 retcode = ERR_NOMEM_BITMAP; 1727 goto fail; 1728 } 1729 1730 if (mdev->state.conn == C_CONNECTED) { 1731 if (dd == grew) 1732 set_bit(RESIZE_PENDING, &mdev->flags); 1733 1734 drbd_send_uuids(mdev); 1735 drbd_send_sizes(mdev, 1, ddsf); 1736 } 1737 1738 fail: 1739 reply->ret_code = retcode; 1740 return 0; 1741 } 1742 1743 static int drbd_nl_syncer_conf(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp, 1744 struct drbd_nl_cfg_reply *reply) 1745 { 1746 int retcode = NO_ERROR; 1747 int err; 1748 int ovr; /* online verify running */ 1749 int rsr; /* re-sync running */ 1750 struct crypto_hash *verify_tfm = NULL; 1751 struct crypto_hash *csums_tfm = NULL; 1752 struct syncer_conf sc; 1753 cpumask_var_t new_cpu_mask; 1754 int *rs_plan_s = NULL; 1755 int fifo_size; 1756 1757 if (!zalloc_cpumask_var(&new_cpu_mask, GFP_KERNEL)) { 1758 retcode = ERR_NOMEM; 1759 goto fail; 1760 } 1761 1762 if (nlp->flags & DRBD_NL_SET_DEFAULTS) { 1763 memset(&sc, 0, sizeof(struct syncer_conf)); 1764 sc.rate = DRBD_RATE_DEF; 1765 sc.after = DRBD_AFTER_DEF; 1766 sc.al_extents = DRBD_AL_EXTENTS_DEF; 1767 sc.on_no_data = DRBD_ON_NO_DATA_DEF; 1768 sc.c_plan_ahead = DRBD_C_PLAN_AHEAD_DEF; 1769 sc.c_delay_target = DRBD_C_DELAY_TARGET_DEF; 1770 sc.c_fill_target = DRBD_C_FILL_TARGET_DEF; 1771 sc.c_max_rate = DRBD_C_MAX_RATE_DEF; 1772 sc.c_min_rate = DRBD_C_MIN_RATE_DEF; 1773 } else 1774 memcpy(&sc, &mdev->sync_conf, sizeof(struct syncer_conf)); 1775 1776 if (!syncer_conf_from_tags(mdev, nlp->tag_list, &sc)) { 1777 retcode = ERR_MANDATORY_TAG; 1778 goto fail; 1779 } 1780 1781 /* re-sync running */ 1782 rsr = ( mdev->state.conn == C_SYNC_SOURCE || 1783 mdev->state.conn == C_SYNC_TARGET || 1784 mdev->state.conn == C_PAUSED_SYNC_S || 1785 mdev->state.conn == C_PAUSED_SYNC_T ); 1786 1787 if (rsr && strcmp(sc.csums_alg, mdev->sync_conf.csums_alg)) { 1788 retcode = ERR_CSUMS_RESYNC_RUNNING; 1789 goto fail; 1790 } 1791 1792 if (!rsr && sc.csums_alg[0]) { 1793 csums_tfm = crypto_alloc_hash(sc.csums_alg, 0, CRYPTO_ALG_ASYNC); 1794 if (IS_ERR(csums_tfm)) { 1795 csums_tfm = NULL; 1796 retcode = ERR_CSUMS_ALG; 1797 goto fail; 1798 } 1799 1800 if (!drbd_crypto_is_hash(crypto_hash_tfm(csums_tfm))) { 1801 retcode = ERR_CSUMS_ALG_ND; 1802 goto fail; 1803 } 1804 } 1805 1806 /* online verify running */ 1807 ovr = (mdev->state.conn == C_VERIFY_S || mdev->state.conn == C_VERIFY_T); 1808 1809 if (ovr) { 1810 if (strcmp(sc.verify_alg, mdev->sync_conf.verify_alg)) { 1811 retcode = ERR_VERIFY_RUNNING; 1812 goto fail; 1813 } 1814 } 1815 1816 if (!ovr && sc.verify_alg[0]) { 1817 verify_tfm = crypto_alloc_hash(sc.verify_alg, 0, CRYPTO_ALG_ASYNC); 1818 if (IS_ERR(verify_tfm)) { 1819 verify_tfm = NULL; 1820 retcode = ERR_VERIFY_ALG; 1821 goto fail; 1822 } 1823 1824 if (!drbd_crypto_is_hash(crypto_hash_tfm(verify_tfm))) { 1825 retcode = ERR_VERIFY_ALG_ND; 1826 goto fail; 1827 } 1828 } 1829 1830 /* silently ignore cpu mask on UP kernel */ 1831 if (nr_cpu_ids > 1 && sc.cpu_mask[0] != 0) { 1832 err = __bitmap_parse(sc.cpu_mask, 32, 0, 1833 cpumask_bits(new_cpu_mask), nr_cpu_ids); 1834 if (err) { 1835 dev_warn(DEV, "__bitmap_parse() failed with %d\n", err); 1836 retcode = ERR_CPU_MASK_PARSE; 1837 goto fail; 1838 } 1839 } 1840 1841 ERR_IF (sc.rate < 1) sc.rate = 1; 1842 ERR_IF (sc.al_extents < 7) sc.al_extents = 127; /* arbitrary minimum */ 1843 #define AL_MAX ((MD_AL_MAX_SIZE-1) * AL_EXTENTS_PT) 1844 if (sc.al_extents > AL_MAX) { 1845 dev_err(DEV, "sc.al_extents > %d\n", AL_MAX); 1846 sc.al_extents = AL_MAX; 1847 } 1848 #undef AL_MAX 1849 1850 /* to avoid spurious errors when configuring minors before configuring 1851 * the minors they depend on: if necessary, first create the minor we 1852 * depend on */ 1853 if (sc.after >= 0) 1854 ensure_mdev(sc.after, 1); 1855 1856 /* most sanity checks done, try to assign the new sync-after 1857 * dependency. need to hold the global lock in there, 1858 * to avoid a race in the dependency loop check. */ 1859 retcode = drbd_alter_sa(mdev, sc.after); 1860 if (retcode != NO_ERROR) 1861 goto fail; 1862 1863 fifo_size = (sc.c_plan_ahead * 10 * SLEEP_TIME) / HZ; 1864 if (fifo_size != mdev->rs_plan_s.size && fifo_size > 0) { 1865 rs_plan_s = kzalloc(sizeof(int) * fifo_size, GFP_KERNEL); 1866 if (!rs_plan_s) { 1867 dev_err(DEV, "kmalloc of fifo_buffer failed"); 1868 retcode = ERR_NOMEM; 1869 goto fail; 1870 } 1871 } 1872 1873 /* ok, assign the rest of it as well. 1874 * lock against receive_SyncParam() */ 1875 spin_lock(&mdev->peer_seq_lock); 1876 mdev->sync_conf = sc; 1877 1878 if (!rsr) { 1879 crypto_free_hash(mdev->csums_tfm); 1880 mdev->csums_tfm = csums_tfm; 1881 csums_tfm = NULL; 1882 } 1883 1884 if (!ovr) { 1885 crypto_free_hash(mdev->verify_tfm); 1886 mdev->verify_tfm = verify_tfm; 1887 verify_tfm = NULL; 1888 } 1889 1890 if (fifo_size != mdev->rs_plan_s.size) { 1891 kfree(mdev->rs_plan_s.values); 1892 mdev->rs_plan_s.values = rs_plan_s; 1893 mdev->rs_plan_s.size = fifo_size; 1894 mdev->rs_planed = 0; 1895 rs_plan_s = NULL; 1896 } 1897 1898 spin_unlock(&mdev->peer_seq_lock); 1899 1900 if (get_ldev(mdev)) { 1901 wait_event(mdev->al_wait, lc_try_lock(mdev->act_log)); 1902 drbd_al_shrink(mdev); 1903 err = drbd_check_al_size(mdev); 1904 lc_unlock(mdev->act_log); 1905 wake_up(&mdev->al_wait); 1906 1907 put_ldev(mdev); 1908 drbd_md_sync(mdev); 1909 1910 if (err) { 1911 retcode = ERR_NOMEM; 1912 goto fail; 1913 } 1914 } 1915 1916 if (mdev->state.conn >= C_CONNECTED) 1917 drbd_send_sync_param(mdev, &sc); 1918 1919 if (!cpumask_equal(mdev->cpu_mask, new_cpu_mask)) { 1920 cpumask_copy(mdev->cpu_mask, new_cpu_mask); 1921 drbd_calc_cpu_mask(mdev); 1922 mdev->receiver.reset_cpu_mask = 1; 1923 mdev->asender.reset_cpu_mask = 1; 1924 mdev->worker.reset_cpu_mask = 1; 1925 } 1926 1927 kobject_uevent(&disk_to_dev(mdev->vdisk)->kobj, KOBJ_CHANGE); 1928 fail: 1929 kfree(rs_plan_s); 1930 free_cpumask_var(new_cpu_mask); 1931 crypto_free_hash(csums_tfm); 1932 crypto_free_hash(verify_tfm); 1933 reply->ret_code = retcode; 1934 return 0; 1935 } 1936 1937 static int drbd_nl_invalidate(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp, 1938 struct drbd_nl_cfg_reply *reply) 1939 { 1940 int retcode; 1941 1942 /* If there is still bitmap IO pending, probably because of a previous 1943 * resync just being finished, wait for it before requesting a new resync. */ 1944 wait_event(mdev->misc_wait, !test_bit(BITMAP_IO, &mdev->flags)); 1945 1946 retcode = _drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_T), CS_ORDERED); 1947 1948 if (retcode < SS_SUCCESS && retcode != SS_NEED_CONNECTION) 1949 retcode = drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_T)); 1950 1951 while (retcode == SS_NEED_CONNECTION) { 1952 spin_lock_irq(&mdev->req_lock); 1953 if (mdev->state.conn < C_CONNECTED) 1954 retcode = _drbd_set_state(_NS(mdev, disk, D_INCONSISTENT), CS_VERBOSE, NULL); 1955 spin_unlock_irq(&mdev->req_lock); 1956 1957 if (retcode != SS_NEED_CONNECTION) 1958 break; 1959 1960 retcode = drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_T)); 1961 } 1962 1963 reply->ret_code = retcode; 1964 return 0; 1965 } 1966 1967 static int drbd_bmio_set_susp_al(struct drbd_conf *mdev) 1968 { 1969 int rv; 1970 1971 rv = drbd_bmio_set_n_write(mdev); 1972 drbd_suspend_al(mdev); 1973 return rv; 1974 } 1975 1976 static int drbd_nl_invalidate_peer(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp, 1977 struct drbd_nl_cfg_reply *reply) 1978 { 1979 int retcode; 1980 1981 /* If there is still bitmap IO pending, probably because of a previous 1982 * resync just being finished, wait for it before requesting a new resync. */ 1983 wait_event(mdev->misc_wait, !test_bit(BITMAP_IO, &mdev->flags)); 1984 1985 retcode = _drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_S), CS_ORDERED); 1986 1987 if (retcode < SS_SUCCESS) { 1988 if (retcode == SS_NEED_CONNECTION && mdev->state.role == R_PRIMARY) { 1989 /* The peer will get a resync upon connect anyways. Just make that 1990 into a full resync. */ 1991 retcode = drbd_request_state(mdev, NS(pdsk, D_INCONSISTENT)); 1992 if (retcode >= SS_SUCCESS) { 1993 if (drbd_bitmap_io(mdev, &drbd_bmio_set_susp_al, 1994 "set_n_write from invalidate_peer", 1995 BM_LOCKED_SET_ALLOWED)) 1996 retcode = ERR_IO_MD_DISK; 1997 } 1998 } else 1999 retcode = drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_S)); 2000 } 2001 2002 reply->ret_code = retcode; 2003 return 0; 2004 } 2005 2006 static int drbd_nl_pause_sync(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp, 2007 struct drbd_nl_cfg_reply *reply) 2008 { 2009 int retcode = NO_ERROR; 2010 2011 if (drbd_request_state(mdev, NS(user_isp, 1)) == SS_NOTHING_TO_DO) 2012 retcode = ERR_PAUSE_IS_SET; 2013 2014 reply->ret_code = retcode; 2015 return 0; 2016 } 2017 2018 static int drbd_nl_resume_sync(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp, 2019 struct drbd_nl_cfg_reply *reply) 2020 { 2021 int retcode = NO_ERROR; 2022 union drbd_state s; 2023 2024 if (drbd_request_state(mdev, NS(user_isp, 0)) == SS_NOTHING_TO_DO) { 2025 s = mdev->state; 2026 if (s.conn == C_PAUSED_SYNC_S || s.conn == C_PAUSED_SYNC_T) { 2027 retcode = s.aftr_isp ? ERR_PIC_AFTER_DEP : 2028 s.peer_isp ? ERR_PIC_PEER_DEP : ERR_PAUSE_IS_CLEAR; 2029 } else { 2030 retcode = ERR_PAUSE_IS_CLEAR; 2031 } 2032 } 2033 2034 reply->ret_code = retcode; 2035 return 0; 2036 } 2037 2038 static int drbd_nl_suspend_io(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp, 2039 struct drbd_nl_cfg_reply *reply) 2040 { 2041 reply->ret_code = drbd_request_state(mdev, NS(susp, 1)); 2042 2043 return 0; 2044 } 2045 2046 static int drbd_nl_resume_io(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp, 2047 struct drbd_nl_cfg_reply *reply) 2048 { 2049 if (test_bit(NEW_CUR_UUID, &mdev->flags)) { 2050 drbd_uuid_new_current(mdev); 2051 clear_bit(NEW_CUR_UUID, &mdev->flags); 2052 } 2053 drbd_suspend_io(mdev); 2054 reply->ret_code = drbd_request_state(mdev, NS3(susp, 0, susp_nod, 0, susp_fen, 0)); 2055 if (reply->ret_code == SS_SUCCESS) { 2056 if (mdev->state.conn < C_CONNECTED) 2057 tl_clear(mdev); 2058 if (mdev->state.disk == D_DISKLESS || mdev->state.disk == D_FAILED) 2059 tl_restart(mdev, fail_frozen_disk_io); 2060 } 2061 drbd_resume_io(mdev); 2062 2063 return 0; 2064 } 2065 2066 static int drbd_nl_outdate(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp, 2067 struct drbd_nl_cfg_reply *reply) 2068 { 2069 reply->ret_code = drbd_request_state(mdev, NS(disk, D_OUTDATED)); 2070 return 0; 2071 } 2072 2073 static int drbd_nl_get_config(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp, 2074 struct drbd_nl_cfg_reply *reply) 2075 { 2076 unsigned short *tl; 2077 2078 tl = reply->tag_list; 2079 2080 if (get_ldev(mdev)) { 2081 tl = disk_conf_to_tags(mdev, &mdev->ldev->dc, tl); 2082 put_ldev(mdev); 2083 } 2084 2085 if (get_net_conf(mdev)) { 2086 tl = net_conf_to_tags(mdev, mdev->net_conf, tl); 2087 put_net_conf(mdev); 2088 } 2089 tl = syncer_conf_to_tags(mdev, &mdev->sync_conf, tl); 2090 2091 put_unaligned(TT_END, tl++); /* Close the tag list */ 2092 2093 return (int)((char *)tl - (char *)reply->tag_list); 2094 } 2095 2096 static int drbd_nl_get_state(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp, 2097 struct drbd_nl_cfg_reply *reply) 2098 { 2099 unsigned short *tl = reply->tag_list; 2100 union drbd_state s = mdev->state; 2101 unsigned long rs_left; 2102 unsigned int res; 2103 2104 tl = get_state_to_tags(mdev, (struct get_state *)&s, tl); 2105 2106 /* no local ref, no bitmap, no syncer progress. */ 2107 if (s.conn >= C_SYNC_SOURCE && s.conn <= C_PAUSED_SYNC_T) { 2108 if (get_ldev(mdev)) { 2109 drbd_get_syncer_progress(mdev, &rs_left, &res); 2110 tl = tl_add_int(tl, T_sync_progress, &res); 2111 put_ldev(mdev); 2112 } 2113 } 2114 put_unaligned(TT_END, tl++); /* Close the tag list */ 2115 2116 return (int)((char *)tl - (char *)reply->tag_list); 2117 } 2118 2119 static int drbd_nl_get_uuids(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp, 2120 struct drbd_nl_cfg_reply *reply) 2121 { 2122 unsigned short *tl; 2123 2124 tl = reply->tag_list; 2125 2126 if (get_ldev(mdev)) { 2127 tl = tl_add_blob(tl, T_uuids, mdev->ldev->md.uuid, UI_SIZE*sizeof(u64)); 2128 tl = tl_add_int(tl, T_uuids_flags, &mdev->ldev->md.flags); 2129 put_ldev(mdev); 2130 } 2131 put_unaligned(TT_END, tl++); /* Close the tag list */ 2132 2133 return (int)((char *)tl - (char *)reply->tag_list); 2134 } 2135 2136 /** 2137 * drbd_nl_get_timeout_flag() - Used by drbdsetup to find out which timeout value to use 2138 * @mdev: DRBD device. 2139 * @nlp: Netlink/connector packet from drbdsetup 2140 * @reply: Reply packet for drbdsetup 2141 */ 2142 static int drbd_nl_get_timeout_flag(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp, 2143 struct drbd_nl_cfg_reply *reply) 2144 { 2145 unsigned short *tl; 2146 char rv; 2147 2148 tl = reply->tag_list; 2149 2150 rv = mdev->state.pdsk == D_OUTDATED ? UT_PEER_OUTDATED : 2151 test_bit(USE_DEGR_WFC_T, &mdev->flags) ? UT_DEGRADED : UT_DEFAULT; 2152 2153 tl = tl_add_blob(tl, T_use_degraded, &rv, sizeof(rv)); 2154 put_unaligned(TT_END, tl++); /* Close the tag list */ 2155 2156 return (int)((char *)tl - (char *)reply->tag_list); 2157 } 2158 2159 static int drbd_nl_start_ov(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp, 2160 struct drbd_nl_cfg_reply *reply) 2161 { 2162 /* default to resume from last known position, if possible */ 2163 struct start_ov args = 2164 { .start_sector = mdev->ov_start_sector }; 2165 2166 if (!start_ov_from_tags(mdev, nlp->tag_list, &args)) { 2167 reply->ret_code = ERR_MANDATORY_TAG; 2168 return 0; 2169 } 2170 2171 /* If there is still bitmap IO pending, e.g. previous resync or verify 2172 * just being finished, wait for it before requesting a new resync. */ 2173 wait_event(mdev->misc_wait, !test_bit(BITMAP_IO, &mdev->flags)); 2174 2175 /* w_make_ov_request expects position to be aligned */ 2176 mdev->ov_start_sector = args.start_sector & ~BM_SECT_PER_BIT; 2177 reply->ret_code = drbd_request_state(mdev,NS(conn,C_VERIFY_S)); 2178 return 0; 2179 } 2180 2181 2182 static int drbd_nl_new_c_uuid(struct drbd_conf *mdev, struct drbd_nl_cfg_req *nlp, 2183 struct drbd_nl_cfg_reply *reply) 2184 { 2185 int retcode = NO_ERROR; 2186 int skip_initial_sync = 0; 2187 int err; 2188 2189 struct new_c_uuid args; 2190 2191 memset(&args, 0, sizeof(struct new_c_uuid)); 2192 if (!new_c_uuid_from_tags(mdev, nlp->tag_list, &args)) { 2193 reply->ret_code = ERR_MANDATORY_TAG; 2194 return 0; 2195 } 2196 2197 mutex_lock(&mdev->state_mutex); /* Protects us against serialized state changes. */ 2198 2199 if (!get_ldev(mdev)) { 2200 retcode = ERR_NO_DISK; 2201 goto out; 2202 } 2203 2204 /* this is "skip initial sync", assume to be clean */ 2205 if (mdev->state.conn == C_CONNECTED && mdev->agreed_pro_version >= 90 && 2206 mdev->ldev->md.uuid[UI_CURRENT] == UUID_JUST_CREATED && args.clear_bm) { 2207 dev_info(DEV, "Preparing to skip initial sync\n"); 2208 skip_initial_sync = 1; 2209 } else if (mdev->state.conn != C_STANDALONE) { 2210 retcode = ERR_CONNECTED; 2211 goto out_dec; 2212 } 2213 2214 drbd_uuid_set(mdev, UI_BITMAP, 0); /* Rotate UI_BITMAP to History 1, etc... */ 2215 drbd_uuid_new_current(mdev); /* New current, previous to UI_BITMAP */ 2216 2217 if (args.clear_bm) { 2218 err = drbd_bitmap_io(mdev, &drbd_bmio_clear_n_write, 2219 "clear_n_write from new_c_uuid", BM_LOCKED_MASK); 2220 if (err) { 2221 dev_err(DEV, "Writing bitmap failed with %d\n",err); 2222 retcode = ERR_IO_MD_DISK; 2223 } 2224 if (skip_initial_sync) { 2225 drbd_send_uuids_skip_initial_sync(mdev); 2226 _drbd_uuid_set(mdev, UI_BITMAP, 0); 2227 drbd_print_uuids(mdev, "cleared bitmap UUID"); 2228 spin_lock_irq(&mdev->req_lock); 2229 _drbd_set_state(_NS2(mdev, disk, D_UP_TO_DATE, pdsk, D_UP_TO_DATE), 2230 CS_VERBOSE, NULL); 2231 spin_unlock_irq(&mdev->req_lock); 2232 } 2233 } 2234 2235 drbd_md_sync(mdev); 2236 out_dec: 2237 put_ldev(mdev); 2238 out: 2239 mutex_unlock(&mdev->state_mutex); 2240 2241 reply->ret_code = retcode; 2242 return 0; 2243 } 2244 2245 struct cn_handler_struct { 2246 int (*function)(struct drbd_conf *, 2247 struct drbd_nl_cfg_req *, 2248 struct drbd_nl_cfg_reply *); 2249 int reply_body_size; 2250 }; 2251 2252 static struct cn_handler_struct cnd_table[] = { 2253 [ P_primary ] = { &drbd_nl_primary, 0 }, 2254 [ P_secondary ] = { &drbd_nl_secondary, 0 }, 2255 [ P_disk_conf ] = { &drbd_nl_disk_conf, 0 }, 2256 [ P_detach ] = { &drbd_nl_detach, 0 }, 2257 [ P_net_conf ] = { &drbd_nl_net_conf, 0 }, 2258 [ P_disconnect ] = { &drbd_nl_disconnect, 0 }, 2259 [ P_resize ] = { &drbd_nl_resize, 0 }, 2260 [ P_syncer_conf ] = { &drbd_nl_syncer_conf, 0 }, 2261 [ P_invalidate ] = { &drbd_nl_invalidate, 0 }, 2262 [ P_invalidate_peer ] = { &drbd_nl_invalidate_peer, 0 }, 2263 [ P_pause_sync ] = { &drbd_nl_pause_sync, 0 }, 2264 [ P_resume_sync ] = { &drbd_nl_resume_sync, 0 }, 2265 [ P_suspend_io ] = { &drbd_nl_suspend_io, 0 }, 2266 [ P_resume_io ] = { &drbd_nl_resume_io, 0 }, 2267 [ P_outdate ] = { &drbd_nl_outdate, 0 }, 2268 [ P_get_config ] = { &drbd_nl_get_config, 2269 sizeof(struct syncer_conf_tag_len_struct) + 2270 sizeof(struct disk_conf_tag_len_struct) + 2271 sizeof(struct net_conf_tag_len_struct) }, 2272 [ P_get_state ] = { &drbd_nl_get_state, 2273 sizeof(struct get_state_tag_len_struct) + 2274 sizeof(struct sync_progress_tag_len_struct) }, 2275 [ P_get_uuids ] = { &drbd_nl_get_uuids, 2276 sizeof(struct get_uuids_tag_len_struct) }, 2277 [ P_get_timeout_flag ] = { &drbd_nl_get_timeout_flag, 2278 sizeof(struct get_timeout_flag_tag_len_struct)}, 2279 [ P_start_ov ] = { &drbd_nl_start_ov, 0 }, 2280 [ P_new_c_uuid ] = { &drbd_nl_new_c_uuid, 0 }, 2281 }; 2282 2283 static void drbd_connector_callback(struct cn_msg *req, struct netlink_skb_parms *nsp) 2284 { 2285 struct drbd_nl_cfg_req *nlp = (struct drbd_nl_cfg_req *)req->data; 2286 struct cn_handler_struct *cm; 2287 struct cn_msg *cn_reply; 2288 struct drbd_nl_cfg_reply *reply; 2289 struct drbd_conf *mdev; 2290 int retcode, rr; 2291 int reply_size = sizeof(struct cn_msg) 2292 + sizeof(struct drbd_nl_cfg_reply) 2293 + sizeof(short int); 2294 2295 if (!try_module_get(THIS_MODULE)) { 2296 printk(KERN_ERR "drbd: try_module_get() failed!\n"); 2297 return; 2298 } 2299 2300 if (!cap_raised(current_cap(), CAP_SYS_ADMIN)) { 2301 retcode = ERR_PERM; 2302 goto fail; 2303 } 2304 2305 mdev = ensure_mdev(nlp->drbd_minor, 2306 (nlp->flags & DRBD_NL_CREATE_DEVICE)); 2307 if (!mdev) { 2308 retcode = ERR_MINOR_INVALID; 2309 goto fail; 2310 } 2311 2312 if (nlp->packet_type >= P_nl_after_last_packet || 2313 nlp->packet_type == P_return_code_only) { 2314 retcode = ERR_PACKET_NR; 2315 goto fail; 2316 } 2317 2318 cm = cnd_table + nlp->packet_type; 2319 2320 /* This may happen if packet number is 0: */ 2321 if (cm->function == NULL) { 2322 retcode = ERR_PACKET_NR; 2323 goto fail; 2324 } 2325 2326 reply_size += cm->reply_body_size; 2327 2328 /* allocation not in the IO path, cqueue thread context */ 2329 cn_reply = kzalloc(reply_size, GFP_KERNEL); 2330 if (!cn_reply) { 2331 retcode = ERR_NOMEM; 2332 goto fail; 2333 } 2334 reply = (struct drbd_nl_cfg_reply *) cn_reply->data; 2335 2336 reply->packet_type = 2337 cm->reply_body_size ? nlp->packet_type : P_return_code_only; 2338 reply->minor = nlp->drbd_minor; 2339 reply->ret_code = NO_ERROR; /* Might by modified by cm->function. */ 2340 /* reply->tag_list; might be modified by cm->function. */ 2341 2342 rr = cm->function(mdev, nlp, reply); 2343 2344 cn_reply->id = req->id; 2345 cn_reply->seq = req->seq; 2346 cn_reply->ack = req->ack + 1; 2347 cn_reply->len = sizeof(struct drbd_nl_cfg_reply) + rr; 2348 cn_reply->flags = 0; 2349 2350 rr = cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_KERNEL); 2351 if (rr && rr != -ESRCH) 2352 printk(KERN_INFO "drbd: cn_netlink_send()=%d\n", rr); 2353 2354 kfree(cn_reply); 2355 module_put(THIS_MODULE); 2356 return; 2357 fail: 2358 drbd_nl_send_reply(req, retcode); 2359 module_put(THIS_MODULE); 2360 } 2361 2362 static atomic_t drbd_nl_seq = ATOMIC_INIT(2); /* two. */ 2363 2364 static unsigned short * 2365 __tl_add_blob(unsigned short *tl, enum drbd_tags tag, const void *data, 2366 unsigned short len, int nul_terminated) 2367 { 2368 unsigned short l = tag_descriptions[tag_number(tag)].max_len; 2369 len = (len < l) ? len : l; 2370 put_unaligned(tag, tl++); 2371 put_unaligned(len, tl++); 2372 memcpy(tl, data, len); 2373 tl = (unsigned short*)((char*)tl + len); 2374 if (nul_terminated) 2375 *((char*)tl - 1) = 0; 2376 return tl; 2377 } 2378 2379 static unsigned short * 2380 tl_add_blob(unsigned short *tl, enum drbd_tags tag, const void *data, int len) 2381 { 2382 return __tl_add_blob(tl, tag, data, len, 0); 2383 } 2384 2385 static unsigned short * 2386 tl_add_str(unsigned short *tl, enum drbd_tags tag, const char *str) 2387 { 2388 return __tl_add_blob(tl, tag, str, strlen(str)+1, 0); 2389 } 2390 2391 static unsigned short * 2392 tl_add_int(unsigned short *tl, enum drbd_tags tag, const void *val) 2393 { 2394 put_unaligned(tag, tl++); 2395 switch(tag_type(tag)) { 2396 case TT_INTEGER: 2397 put_unaligned(sizeof(int), tl++); 2398 put_unaligned(*(int *)val, (int *)tl); 2399 tl = (unsigned short*)((char*)tl+sizeof(int)); 2400 break; 2401 case TT_INT64: 2402 put_unaligned(sizeof(u64), tl++); 2403 put_unaligned(*(u64 *)val, (u64 *)tl); 2404 tl = (unsigned short*)((char*)tl+sizeof(u64)); 2405 break; 2406 default: 2407 /* someone did something stupid. */ 2408 ; 2409 } 2410 return tl; 2411 } 2412 2413 void drbd_bcast_state(struct drbd_conf *mdev, union drbd_state state) 2414 { 2415 char buffer[sizeof(struct cn_msg)+ 2416 sizeof(struct drbd_nl_cfg_reply)+ 2417 sizeof(struct get_state_tag_len_struct)+ 2418 sizeof(short int)]; 2419 struct cn_msg *cn_reply = (struct cn_msg *) buffer; 2420 struct drbd_nl_cfg_reply *reply = 2421 (struct drbd_nl_cfg_reply *)cn_reply->data; 2422 unsigned short *tl = reply->tag_list; 2423 2424 /* dev_warn(DEV, "drbd_bcast_state() got called\n"); */ 2425 2426 tl = get_state_to_tags(mdev, (struct get_state *)&state, tl); 2427 2428 put_unaligned(TT_END, tl++); /* Close the tag list */ 2429 2430 cn_reply->id.idx = CN_IDX_DRBD; 2431 cn_reply->id.val = CN_VAL_DRBD; 2432 2433 cn_reply->seq = atomic_add_return(1, &drbd_nl_seq); 2434 cn_reply->ack = 0; /* not used here. */ 2435 cn_reply->len = sizeof(struct drbd_nl_cfg_reply) + 2436 (int)((char *)tl - (char *)reply->tag_list); 2437 cn_reply->flags = 0; 2438 2439 reply->packet_type = P_get_state; 2440 reply->minor = mdev_to_minor(mdev); 2441 reply->ret_code = NO_ERROR; 2442 2443 cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_NOIO); 2444 } 2445 2446 void drbd_bcast_ev_helper(struct drbd_conf *mdev, char *helper_name) 2447 { 2448 char buffer[sizeof(struct cn_msg)+ 2449 sizeof(struct drbd_nl_cfg_reply)+ 2450 sizeof(struct call_helper_tag_len_struct)+ 2451 sizeof(short int)]; 2452 struct cn_msg *cn_reply = (struct cn_msg *) buffer; 2453 struct drbd_nl_cfg_reply *reply = 2454 (struct drbd_nl_cfg_reply *)cn_reply->data; 2455 unsigned short *tl = reply->tag_list; 2456 2457 /* dev_warn(DEV, "drbd_bcast_state() got called\n"); */ 2458 2459 tl = tl_add_str(tl, T_helper, helper_name); 2460 put_unaligned(TT_END, tl++); /* Close the tag list */ 2461 2462 cn_reply->id.idx = CN_IDX_DRBD; 2463 cn_reply->id.val = CN_VAL_DRBD; 2464 2465 cn_reply->seq = atomic_add_return(1, &drbd_nl_seq); 2466 cn_reply->ack = 0; /* not used here. */ 2467 cn_reply->len = sizeof(struct drbd_nl_cfg_reply) + 2468 (int)((char *)tl - (char *)reply->tag_list); 2469 cn_reply->flags = 0; 2470 2471 reply->packet_type = P_call_helper; 2472 reply->minor = mdev_to_minor(mdev); 2473 reply->ret_code = NO_ERROR; 2474 2475 cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_NOIO); 2476 } 2477 2478 void drbd_bcast_ee(struct drbd_conf *mdev, 2479 const char *reason, const int dgs, 2480 const char* seen_hash, const char* calc_hash, 2481 const struct drbd_epoch_entry* e) 2482 { 2483 struct cn_msg *cn_reply; 2484 struct drbd_nl_cfg_reply *reply; 2485 unsigned short *tl; 2486 struct page *page; 2487 unsigned len; 2488 2489 if (!e) 2490 return; 2491 if (!reason || !reason[0]) 2492 return; 2493 2494 /* apparently we have to memcpy twice, first to prepare the data for the 2495 * struct cn_msg, then within cn_netlink_send from the cn_msg to the 2496 * netlink skb. */ 2497 /* receiver thread context, which is not in the writeout path (of this node), 2498 * but may be in the writeout path of the _other_ node. 2499 * GFP_NOIO to avoid potential "distributed deadlock". */ 2500 cn_reply = kzalloc( 2501 sizeof(struct cn_msg)+ 2502 sizeof(struct drbd_nl_cfg_reply)+ 2503 sizeof(struct dump_ee_tag_len_struct)+ 2504 sizeof(short int), 2505 GFP_NOIO); 2506 2507 if (!cn_reply) { 2508 dev_err(DEV, "could not kmalloc buffer for drbd_bcast_ee, sector %llu, size %u\n", 2509 (unsigned long long)e->sector, e->size); 2510 return; 2511 } 2512 2513 reply = (struct drbd_nl_cfg_reply*)cn_reply->data; 2514 tl = reply->tag_list; 2515 2516 tl = tl_add_str(tl, T_dump_ee_reason, reason); 2517 tl = tl_add_blob(tl, T_seen_digest, seen_hash, dgs); 2518 tl = tl_add_blob(tl, T_calc_digest, calc_hash, dgs); 2519 tl = tl_add_int(tl, T_ee_sector, &e->sector); 2520 tl = tl_add_int(tl, T_ee_block_id, &e->block_id); 2521 2522 /* dump the first 32k */ 2523 len = min_t(unsigned, e->size, 32 << 10); 2524 put_unaligned(T_ee_data, tl++); 2525 put_unaligned(len, tl++); 2526 2527 page = e->pages; 2528 page_chain_for_each(page) { 2529 void *d = kmap_atomic(page, KM_USER0); 2530 unsigned l = min_t(unsigned, len, PAGE_SIZE); 2531 memcpy(tl, d, l); 2532 kunmap_atomic(d, KM_USER0); 2533 tl = (unsigned short*)((char*)tl + l); 2534 len -= l; 2535 if (len == 0) 2536 break; 2537 } 2538 put_unaligned(TT_END, tl++); /* Close the tag list */ 2539 2540 cn_reply->id.idx = CN_IDX_DRBD; 2541 cn_reply->id.val = CN_VAL_DRBD; 2542 2543 cn_reply->seq = atomic_add_return(1,&drbd_nl_seq); 2544 cn_reply->ack = 0; // not used here. 2545 cn_reply->len = sizeof(struct drbd_nl_cfg_reply) + 2546 (int)((char*)tl - (char*)reply->tag_list); 2547 cn_reply->flags = 0; 2548 2549 reply->packet_type = P_dump_ee; 2550 reply->minor = mdev_to_minor(mdev); 2551 reply->ret_code = NO_ERROR; 2552 2553 cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_NOIO); 2554 kfree(cn_reply); 2555 } 2556 2557 void drbd_bcast_sync_progress(struct drbd_conf *mdev) 2558 { 2559 char buffer[sizeof(struct cn_msg)+ 2560 sizeof(struct drbd_nl_cfg_reply)+ 2561 sizeof(struct sync_progress_tag_len_struct)+ 2562 sizeof(short int)]; 2563 struct cn_msg *cn_reply = (struct cn_msg *) buffer; 2564 struct drbd_nl_cfg_reply *reply = 2565 (struct drbd_nl_cfg_reply *)cn_reply->data; 2566 unsigned short *tl = reply->tag_list; 2567 unsigned long rs_left; 2568 unsigned int res; 2569 2570 /* no local ref, no bitmap, no syncer progress, no broadcast. */ 2571 if (!get_ldev(mdev)) 2572 return; 2573 drbd_get_syncer_progress(mdev, &rs_left, &res); 2574 put_ldev(mdev); 2575 2576 tl = tl_add_int(tl, T_sync_progress, &res); 2577 put_unaligned(TT_END, tl++); /* Close the tag list */ 2578 2579 cn_reply->id.idx = CN_IDX_DRBD; 2580 cn_reply->id.val = CN_VAL_DRBD; 2581 2582 cn_reply->seq = atomic_add_return(1, &drbd_nl_seq); 2583 cn_reply->ack = 0; /* not used here. */ 2584 cn_reply->len = sizeof(struct drbd_nl_cfg_reply) + 2585 (int)((char *)tl - (char *)reply->tag_list); 2586 cn_reply->flags = 0; 2587 2588 reply->packet_type = P_sync_progress; 2589 reply->minor = mdev_to_minor(mdev); 2590 reply->ret_code = NO_ERROR; 2591 2592 cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_NOIO); 2593 } 2594 2595 int __init drbd_nl_init(void) 2596 { 2597 static struct cb_id cn_id_drbd; 2598 int err, try=10; 2599 2600 cn_id_drbd.val = CN_VAL_DRBD; 2601 do { 2602 cn_id_drbd.idx = cn_idx; 2603 err = cn_add_callback(&cn_id_drbd, "cn_drbd", &drbd_connector_callback); 2604 if (!err) 2605 break; 2606 cn_idx = (cn_idx + CN_IDX_STEP); 2607 } while (try--); 2608 2609 if (err) { 2610 printk(KERN_ERR "drbd: cn_drbd failed to register\n"); 2611 return err; 2612 } 2613 2614 return 0; 2615 } 2616 2617 void drbd_nl_cleanup(void) 2618 { 2619 static struct cb_id cn_id_drbd; 2620 2621 cn_id_drbd.idx = cn_idx; 2622 cn_id_drbd.val = CN_VAL_DRBD; 2623 2624 cn_del_callback(&cn_id_drbd); 2625 } 2626 2627 void drbd_nl_send_reply(struct cn_msg *req, int ret_code) 2628 { 2629 char buffer[sizeof(struct cn_msg)+sizeof(struct drbd_nl_cfg_reply)]; 2630 struct cn_msg *cn_reply = (struct cn_msg *) buffer; 2631 struct drbd_nl_cfg_reply *reply = 2632 (struct drbd_nl_cfg_reply *)cn_reply->data; 2633 int rr; 2634 2635 memset(buffer, 0, sizeof(buffer)); 2636 cn_reply->id = req->id; 2637 2638 cn_reply->seq = req->seq; 2639 cn_reply->ack = req->ack + 1; 2640 cn_reply->len = sizeof(struct drbd_nl_cfg_reply); 2641 cn_reply->flags = 0; 2642 2643 reply->packet_type = P_return_code_only; 2644 reply->minor = ((struct drbd_nl_cfg_req *)req->data)->drbd_minor; 2645 reply->ret_code = ret_code; 2646 2647 rr = cn_netlink_send(cn_reply, CN_IDX_DRBD, GFP_NOIO); 2648 if (rr && rr != -ESRCH) 2649 printk(KERN_INFO "drbd: cn_netlink_send()=%d\n", rr); 2650 } 2651 2652