xref: /openbmc/linux/fs/ocfs2/dlm/dlmdomain.c (revision 6325b4a2)
16714d8e8SKurt Hackel /* -*- mode: c; c-basic-offset: 8; -*-
26714d8e8SKurt Hackel  * vim: noexpandtab sw=8 ts=8 sts=0:
36714d8e8SKurt Hackel  *
46714d8e8SKurt Hackel  * dlmdomain.c
56714d8e8SKurt Hackel  *
66714d8e8SKurt Hackel  * defines domain join / leave apis
76714d8e8SKurt Hackel  *
86714d8e8SKurt Hackel  * Copyright (C) 2004 Oracle.  All rights reserved.
96714d8e8SKurt Hackel  *
106714d8e8SKurt Hackel  * This program is free software; you can redistribute it and/or
116714d8e8SKurt Hackel  * modify it under the terms of the GNU General Public
126714d8e8SKurt Hackel  * License as published by the Free Software Foundation; either
136714d8e8SKurt Hackel  * version 2 of the License, or (at your option) any later version.
146714d8e8SKurt Hackel  *
156714d8e8SKurt Hackel  * This program is distributed in the hope that it will be useful,
166714d8e8SKurt Hackel  * but WITHOUT ANY WARRANTY; without even the implied warranty of
176714d8e8SKurt Hackel  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
186714d8e8SKurt Hackel  * General Public License for more details.
196714d8e8SKurt Hackel  *
206714d8e8SKurt Hackel  * You should have received a copy of the GNU General Public
216714d8e8SKurt Hackel  * License along with this program; if not, write to the
226714d8e8SKurt Hackel  * Free Software Foundation, Inc., 59 Temple Place - Suite 330,
236714d8e8SKurt Hackel  * Boston, MA 021110-1307, USA.
246714d8e8SKurt Hackel  *
256714d8e8SKurt Hackel  */
266714d8e8SKurt Hackel 
276714d8e8SKurt Hackel #include <linux/module.h>
286714d8e8SKurt Hackel #include <linux/types.h>
296714d8e8SKurt Hackel #include <linux/slab.h>
306714d8e8SKurt Hackel #include <linux/highmem.h>
316714d8e8SKurt Hackel #include <linux/utsname.h>
326714d8e8SKurt Hackel #include <linux/init.h>
336714d8e8SKurt Hackel #include <linux/spinlock.h>
346714d8e8SKurt Hackel #include <linux/delay.h>
356714d8e8SKurt Hackel #include <linux/err.h>
366325b4a2SSunil Mushran #include <linux/debugfs.h>
376714d8e8SKurt Hackel 
386714d8e8SKurt Hackel #include "cluster/heartbeat.h"
396714d8e8SKurt Hackel #include "cluster/nodemanager.h"
406714d8e8SKurt Hackel #include "cluster/tcp.h"
416714d8e8SKurt Hackel 
426714d8e8SKurt Hackel #include "dlmapi.h"
436714d8e8SKurt Hackel #include "dlmcommon.h"
446714d8e8SKurt Hackel #include "dlmdomain.h"
456325b4a2SSunil Mushran #include "dlmdebug.h"
466714d8e8SKurt Hackel 
476714d8e8SKurt Hackel #include "dlmver.h"
486714d8e8SKurt Hackel 
496714d8e8SKurt Hackel #define MLOG_MASK_PREFIX (ML_DLM|ML_DLM_DOMAIN)
506714d8e8SKurt Hackel #include "cluster/masklog.h"
516714d8e8SKurt Hackel 
521faf2894SSrinivas Eeda /*
531faf2894SSrinivas Eeda  * ocfs2 node maps are array of long int, which limits to send them freely
541faf2894SSrinivas Eeda  * across the wire due to endianness issues. To workaround this, we convert
551faf2894SSrinivas Eeda  * long ints to byte arrays. Following 3 routines are helper functions to
561faf2894SSrinivas Eeda  * set/test/copy bits within those array of bytes
571faf2894SSrinivas Eeda  */
581faf2894SSrinivas Eeda static inline void byte_set_bit(u8 nr, u8 map[])
591faf2894SSrinivas Eeda {
601faf2894SSrinivas Eeda 	map[nr >> 3] |= (1UL << (nr & 7));
611faf2894SSrinivas Eeda }
621faf2894SSrinivas Eeda 
631faf2894SSrinivas Eeda static inline int byte_test_bit(u8 nr, u8 map[])
641faf2894SSrinivas Eeda {
651faf2894SSrinivas Eeda 	return ((1UL << (nr & 7)) & (map[nr >> 3])) != 0;
661faf2894SSrinivas Eeda }
671faf2894SSrinivas Eeda 
681faf2894SSrinivas Eeda static inline void byte_copymap(u8 dmap[], unsigned long smap[],
691faf2894SSrinivas Eeda 			unsigned int sz)
701faf2894SSrinivas Eeda {
711faf2894SSrinivas Eeda 	unsigned int nn;
721faf2894SSrinivas Eeda 
731faf2894SSrinivas Eeda 	if (!sz)
741faf2894SSrinivas Eeda 		return;
751faf2894SSrinivas Eeda 
761faf2894SSrinivas Eeda 	memset(dmap, 0, ((sz + 7) >> 3));
771faf2894SSrinivas Eeda 	for (nn = 0 ; nn < sz; nn++)
781faf2894SSrinivas Eeda 		if (test_bit(nn, smap))
791faf2894SSrinivas Eeda 			byte_set_bit(nn, dmap);
801faf2894SSrinivas Eeda }
811faf2894SSrinivas Eeda 
8203d864c0SDaniel Phillips static void dlm_free_pagevec(void **vec, int pages)
8303d864c0SDaniel Phillips {
8403d864c0SDaniel Phillips 	while (pages--)
8503d864c0SDaniel Phillips 		free_page((unsigned long)vec[pages]);
8603d864c0SDaniel Phillips 	kfree(vec);
8703d864c0SDaniel Phillips }
8803d864c0SDaniel Phillips 
8903d864c0SDaniel Phillips static void **dlm_alloc_pagevec(int pages)
9003d864c0SDaniel Phillips {
9103d864c0SDaniel Phillips 	void **vec = kmalloc(pages * sizeof(void *), GFP_KERNEL);
9203d864c0SDaniel Phillips 	int i;
9303d864c0SDaniel Phillips 
9403d864c0SDaniel Phillips 	if (!vec)
9503d864c0SDaniel Phillips 		return NULL;
9603d864c0SDaniel Phillips 
9703d864c0SDaniel Phillips 	for (i = 0; i < pages; i++)
9803d864c0SDaniel Phillips 		if (!(vec[i] = (void *)__get_free_page(GFP_KERNEL)))
9903d864c0SDaniel Phillips 			goto out_free;
100c8f33b6eSJoel Becker 
101685f1adbSMark Fasheh 	mlog(0, "Allocated DLM hash pagevec; %d pages (%lu expected), %lu buckets per page\n",
102f5a923d1SMark Fasheh 	     pages, (unsigned long)DLM_HASH_PAGES,
103f5a923d1SMark Fasheh 	     (unsigned long)DLM_BUCKETS_PER_PAGE);
10403d864c0SDaniel Phillips 	return vec;
10503d864c0SDaniel Phillips out_free:
10603d864c0SDaniel Phillips 	dlm_free_pagevec(vec, i);
10703d864c0SDaniel Phillips 	return NULL;
10803d864c0SDaniel Phillips }
10903d864c0SDaniel Phillips 
1106714d8e8SKurt Hackel /*
1116714d8e8SKurt Hackel  *
1126714d8e8SKurt Hackel  * spinlock lock ordering: if multiple locks are needed, obey this ordering:
1136714d8e8SKurt Hackel  *    dlm_domain_lock
1146714d8e8SKurt Hackel  *    struct dlm_ctxt->spinlock
1156714d8e8SKurt Hackel  *    struct dlm_lock_resource->spinlock
1166714d8e8SKurt Hackel  *    struct dlm_ctxt->master_lock
1176714d8e8SKurt Hackel  *    struct dlm_ctxt->ast_lock
1186714d8e8SKurt Hackel  *    dlm_master_list_entry->spinlock
1196714d8e8SKurt Hackel  *    dlm_lock->spinlock
1206714d8e8SKurt Hackel  *
1216714d8e8SKurt Hackel  */
1226714d8e8SKurt Hackel 
12334af946aSIngo Molnar DEFINE_SPINLOCK(dlm_domain_lock);
1246714d8e8SKurt Hackel LIST_HEAD(dlm_domains);
1256714d8e8SKurt Hackel static DECLARE_WAIT_QUEUE_HEAD(dlm_domain_events);
1266714d8e8SKurt Hackel 
127d24fbcdaSJoel Becker /*
128d24fbcdaSJoel Becker  * The supported protocol version for DLM communication.  Running domains
129d24fbcdaSJoel Becker  * will have a negotiated version with the same major number and a minor
130d24fbcdaSJoel Becker  * number equal or smaller.  The dlm_ctxt->dlm_locking_proto field should
131d24fbcdaSJoel Becker  * be used to determine what a running domain is actually using.
132d24fbcdaSJoel Becker  */
133d24fbcdaSJoel Becker static const struct dlm_protocol_version dlm_protocol = {
134d24fbcdaSJoel Becker 	.pv_major = 1,
135d24fbcdaSJoel Becker 	.pv_minor = 0,
136d24fbcdaSJoel Becker };
137d24fbcdaSJoel Becker 
1386714d8e8SKurt Hackel #define DLM_DOMAIN_BACKOFF_MS 200
1396714d8e8SKurt Hackel 
140d74c9803SKurt Hackel static int dlm_query_join_handler(struct o2net_msg *msg, u32 len, void *data,
141d74c9803SKurt Hackel 				  void **ret_data);
142d74c9803SKurt Hackel static int dlm_assert_joined_handler(struct o2net_msg *msg, u32 len, void *data,
143d74c9803SKurt Hackel 				     void **ret_data);
144d74c9803SKurt Hackel static int dlm_cancel_join_handler(struct o2net_msg *msg, u32 len, void *data,
145d74c9803SKurt Hackel 				   void **ret_data);
146d74c9803SKurt Hackel static int dlm_exit_domain_handler(struct o2net_msg *msg, u32 len, void *data,
147d74c9803SKurt Hackel 				   void **ret_data);
148d24fbcdaSJoel Becker static int dlm_protocol_compare(struct dlm_protocol_version *existing,
149d24fbcdaSJoel Becker 				struct dlm_protocol_version *request);
1506714d8e8SKurt Hackel 
1516714d8e8SKurt Hackel static void dlm_unregister_domain_handlers(struct dlm_ctxt *dlm);
1526714d8e8SKurt Hackel 
1536714d8e8SKurt Hackel void __dlm_unhash_lockres(struct dlm_lock_resource *lockres)
1546714d8e8SKurt Hackel {
15578062cb2SSunil Mushran 	if (!hlist_unhashed(&lockres->hash_node)) {
15681f2094aSMark Fasheh 		hlist_del_init(&lockres->hash_node);
1576714d8e8SKurt Hackel 		dlm_lockres_put(lockres);
1586714d8e8SKurt Hackel 	}
15978062cb2SSunil Mushran }
1606714d8e8SKurt Hackel 
1616714d8e8SKurt Hackel void __dlm_insert_lockres(struct dlm_ctxt *dlm,
1626714d8e8SKurt Hackel 		       struct dlm_lock_resource *res)
1636714d8e8SKurt Hackel {
16481f2094aSMark Fasheh 	struct hlist_head *bucket;
1656714d8e8SKurt Hackel 	struct qstr *q;
1666714d8e8SKurt Hackel 
1676714d8e8SKurt Hackel 	assert_spin_locked(&dlm->spinlock);
1686714d8e8SKurt Hackel 
1696714d8e8SKurt Hackel 	q = &res->lockname;
17003d864c0SDaniel Phillips 	bucket = dlm_lockres_hash(dlm, q->hash);
1716714d8e8SKurt Hackel 
1726714d8e8SKurt Hackel 	/* get a reference for our hashtable */
1736714d8e8SKurt Hackel 	dlm_lockres_get(res);
1746714d8e8SKurt Hackel 
17581f2094aSMark Fasheh 	hlist_add_head(&res->hash_node, bucket);
1766714d8e8SKurt Hackel }
1776714d8e8SKurt Hackel 
178ba2bf218SKurt Hackel struct dlm_lock_resource * __dlm_lookup_lockres_full(struct dlm_ctxt *dlm,
1796714d8e8SKurt Hackel 						     const char *name,
180a3d33291SMark Fasheh 						     unsigned int len,
181a3d33291SMark Fasheh 						     unsigned int hash)
1826714d8e8SKurt Hackel {
18381f2094aSMark Fasheh 	struct hlist_head *bucket;
1844198985fSDaniel Phillips 	struct hlist_node *list;
1856714d8e8SKurt Hackel 
1866714d8e8SKurt Hackel 	mlog_entry("%.*s\n", len, name);
1876714d8e8SKurt Hackel 
1886714d8e8SKurt Hackel 	assert_spin_locked(&dlm->spinlock);
1896714d8e8SKurt Hackel 
19003d864c0SDaniel Phillips 	bucket = dlm_lockres_hash(dlm, hash);
19103d864c0SDaniel Phillips 
1924198985fSDaniel Phillips 	hlist_for_each(list, bucket) {
1934198985fSDaniel Phillips 		struct dlm_lock_resource *res = hlist_entry(list,
1944198985fSDaniel Phillips 			struct dlm_lock_resource, hash_node);
1954198985fSDaniel Phillips 		if (res->lockname.name[0] != name[0])
1964198985fSDaniel Phillips 			continue;
1974198985fSDaniel Phillips 		if (unlikely(res->lockname.len != len))
1984198985fSDaniel Phillips 			continue;
1994198985fSDaniel Phillips 		if (memcmp(res->lockname.name + 1, name + 1, len - 1))
2004198985fSDaniel Phillips 			continue;
2014198985fSDaniel Phillips 		dlm_lockres_get(res);
2024198985fSDaniel Phillips 		return res;
2036714d8e8SKurt Hackel 	}
2044198985fSDaniel Phillips 	return NULL;
2056714d8e8SKurt Hackel }
2066714d8e8SKurt Hackel 
207ba2bf218SKurt Hackel /* intended to be called by functions which do not care about lock
208ba2bf218SKurt Hackel  * resources which are being purged (most net _handler functions).
209ba2bf218SKurt Hackel  * this will return NULL for any lock resource which is found but
210ba2bf218SKurt Hackel  * currently in the process of dropping its mastery reference.
211ba2bf218SKurt Hackel  * use __dlm_lookup_lockres_full when you need the lock resource
212ba2bf218SKurt Hackel  * regardless (e.g. dlm_get_lock_resource) */
213ba2bf218SKurt Hackel struct dlm_lock_resource * __dlm_lookup_lockres(struct dlm_ctxt *dlm,
214ba2bf218SKurt Hackel 						const char *name,
215ba2bf218SKurt Hackel 						unsigned int len,
216ba2bf218SKurt Hackel 						unsigned int hash)
217ba2bf218SKurt Hackel {
218ba2bf218SKurt Hackel 	struct dlm_lock_resource *res = NULL;
219ba2bf218SKurt Hackel 
220ba2bf218SKurt Hackel 	mlog_entry("%.*s\n", len, name);
221ba2bf218SKurt Hackel 
222ba2bf218SKurt Hackel 	assert_spin_locked(&dlm->spinlock);
223ba2bf218SKurt Hackel 
224ba2bf218SKurt Hackel 	res = __dlm_lookup_lockres_full(dlm, name, len, hash);
225ba2bf218SKurt Hackel 	if (res) {
226ba2bf218SKurt Hackel 		spin_lock(&res->spinlock);
227ba2bf218SKurt Hackel 		if (res->state & DLM_LOCK_RES_DROPPING_REF) {
228ba2bf218SKurt Hackel 			spin_unlock(&res->spinlock);
229ba2bf218SKurt Hackel 			dlm_lockres_put(res);
230ba2bf218SKurt Hackel 			return NULL;
231ba2bf218SKurt Hackel 		}
232ba2bf218SKurt Hackel 		spin_unlock(&res->spinlock);
233ba2bf218SKurt Hackel 	}
234ba2bf218SKurt Hackel 
235ba2bf218SKurt Hackel 	return res;
236ba2bf218SKurt Hackel }
237ba2bf218SKurt Hackel 
2386714d8e8SKurt Hackel struct dlm_lock_resource * dlm_lookup_lockres(struct dlm_ctxt *dlm,
2396714d8e8SKurt Hackel 				    const char *name,
2406714d8e8SKurt Hackel 				    unsigned int len)
2416714d8e8SKurt Hackel {
2426714d8e8SKurt Hackel 	struct dlm_lock_resource *res;
243a3d33291SMark Fasheh 	unsigned int hash = dlm_lockid_hash(name, len);
2446714d8e8SKurt Hackel 
2456714d8e8SKurt Hackel 	spin_lock(&dlm->spinlock);
246a3d33291SMark Fasheh 	res = __dlm_lookup_lockres(dlm, name, len, hash);
2476714d8e8SKurt Hackel 	spin_unlock(&dlm->spinlock);
2486714d8e8SKurt Hackel 	return res;
2496714d8e8SKurt Hackel }
2506714d8e8SKurt Hackel 
2516714d8e8SKurt Hackel static struct dlm_ctxt * __dlm_lookup_domain_full(const char *domain, int len)
2526714d8e8SKurt Hackel {
2536714d8e8SKurt Hackel 	struct dlm_ctxt *tmp = NULL;
2546714d8e8SKurt Hackel 	struct list_head *iter;
2556714d8e8SKurt Hackel 
2566714d8e8SKurt Hackel 	assert_spin_locked(&dlm_domain_lock);
2576714d8e8SKurt Hackel 
2586714d8e8SKurt Hackel 	/* tmp->name here is always NULL terminated,
2596714d8e8SKurt Hackel 	 * but domain may not be! */
2606714d8e8SKurt Hackel 	list_for_each(iter, &dlm_domains) {
2616714d8e8SKurt Hackel 		tmp = list_entry (iter, struct dlm_ctxt, list);
2626714d8e8SKurt Hackel 		if (strlen(tmp->name) == len &&
2636714d8e8SKurt Hackel 		    memcmp(tmp->name, domain, len)==0)
2646714d8e8SKurt Hackel 			break;
2656714d8e8SKurt Hackel 		tmp = NULL;
2666714d8e8SKurt Hackel 	}
2676714d8e8SKurt Hackel 
2686714d8e8SKurt Hackel 	return tmp;
2696714d8e8SKurt Hackel }
2706714d8e8SKurt Hackel 
2716714d8e8SKurt Hackel /* For null terminated domain strings ONLY */
2726714d8e8SKurt Hackel static struct dlm_ctxt * __dlm_lookup_domain(const char *domain)
2736714d8e8SKurt Hackel {
2746714d8e8SKurt Hackel 	assert_spin_locked(&dlm_domain_lock);
2756714d8e8SKurt Hackel 
2766714d8e8SKurt Hackel 	return __dlm_lookup_domain_full(domain, strlen(domain));
2776714d8e8SKurt Hackel }
2786714d8e8SKurt Hackel 
2796714d8e8SKurt Hackel 
2806714d8e8SKurt Hackel /* returns true on one of two conditions:
2816714d8e8SKurt Hackel  * 1) the domain does not exist
2826714d8e8SKurt Hackel  * 2) the domain exists and it's state is "joined" */
2836714d8e8SKurt Hackel static int dlm_wait_on_domain_helper(const char *domain)
2846714d8e8SKurt Hackel {
2856714d8e8SKurt Hackel 	int ret = 0;
2866714d8e8SKurt Hackel 	struct dlm_ctxt *tmp = NULL;
2876714d8e8SKurt Hackel 
2886714d8e8SKurt Hackel 	spin_lock(&dlm_domain_lock);
2896714d8e8SKurt Hackel 
2906714d8e8SKurt Hackel 	tmp = __dlm_lookup_domain(domain);
2916714d8e8SKurt Hackel 	if (!tmp)
2926714d8e8SKurt Hackel 		ret = 1;
2936714d8e8SKurt Hackel 	else if (tmp->dlm_state == DLM_CTXT_JOINED)
2946714d8e8SKurt Hackel 		ret = 1;
2956714d8e8SKurt Hackel 
2966714d8e8SKurt Hackel 	spin_unlock(&dlm_domain_lock);
2976714d8e8SKurt Hackel 	return ret;
2986714d8e8SKurt Hackel }
2996714d8e8SKurt Hackel 
3006714d8e8SKurt Hackel static void dlm_free_ctxt_mem(struct dlm_ctxt *dlm)
3016714d8e8SKurt Hackel {
3026325b4a2SSunil Mushran 	dlm_destroy_debugfs_subroot(dlm);
3036325b4a2SSunil Mushran 
30481f2094aSMark Fasheh 	if (dlm->lockres_hash)
30503d864c0SDaniel Phillips 		dlm_free_pagevec((void **)dlm->lockres_hash, DLM_HASH_PAGES);
3066714d8e8SKurt Hackel 
3076714d8e8SKurt Hackel 	if (dlm->name)
3086714d8e8SKurt Hackel 		kfree(dlm->name);
3096714d8e8SKurt Hackel 
3106714d8e8SKurt Hackel 	kfree(dlm);
3116714d8e8SKurt Hackel }
3126714d8e8SKurt Hackel 
3136714d8e8SKurt Hackel /* A little strange - this function will be called while holding
3146714d8e8SKurt Hackel  * dlm_domain_lock and is expected to be holding it on the way out. We
3156714d8e8SKurt Hackel  * will however drop and reacquire it multiple times */
3166714d8e8SKurt Hackel static void dlm_ctxt_release(struct kref *kref)
3176714d8e8SKurt Hackel {
3186714d8e8SKurt Hackel 	struct dlm_ctxt *dlm;
3196714d8e8SKurt Hackel 
3206714d8e8SKurt Hackel 	dlm = container_of(kref, struct dlm_ctxt, dlm_refs);
3216714d8e8SKurt Hackel 
3226714d8e8SKurt Hackel 	BUG_ON(dlm->num_joins);
3236714d8e8SKurt Hackel 	BUG_ON(dlm->dlm_state == DLM_CTXT_JOINED);
3246714d8e8SKurt Hackel 
3256714d8e8SKurt Hackel 	/* we may still be in the list if we hit an error during join. */
3266714d8e8SKurt Hackel 	list_del_init(&dlm->list);
3276714d8e8SKurt Hackel 
3286714d8e8SKurt Hackel 	spin_unlock(&dlm_domain_lock);
3296714d8e8SKurt Hackel 
3306714d8e8SKurt Hackel 	mlog(0, "freeing memory from domain %s\n", dlm->name);
3316714d8e8SKurt Hackel 
3326714d8e8SKurt Hackel 	wake_up(&dlm_domain_events);
3336714d8e8SKurt Hackel 
3346714d8e8SKurt Hackel 	dlm_free_ctxt_mem(dlm);
3356714d8e8SKurt Hackel 
3366714d8e8SKurt Hackel 	spin_lock(&dlm_domain_lock);
3376714d8e8SKurt Hackel }
3386714d8e8SKurt Hackel 
3396714d8e8SKurt Hackel void dlm_put(struct dlm_ctxt *dlm)
3406714d8e8SKurt Hackel {
3416714d8e8SKurt Hackel 	spin_lock(&dlm_domain_lock);
3426714d8e8SKurt Hackel 	kref_put(&dlm->dlm_refs, dlm_ctxt_release);
3436714d8e8SKurt Hackel 	spin_unlock(&dlm_domain_lock);
3446714d8e8SKurt Hackel }
3456714d8e8SKurt Hackel 
3466714d8e8SKurt Hackel static void __dlm_get(struct dlm_ctxt *dlm)
3476714d8e8SKurt Hackel {
3486714d8e8SKurt Hackel 	kref_get(&dlm->dlm_refs);
3496714d8e8SKurt Hackel }
3506714d8e8SKurt Hackel 
3516714d8e8SKurt Hackel /* given a questionable reference to a dlm object, gets a reference if
3526714d8e8SKurt Hackel  * it can find it in the list, otherwise returns NULL in which case
3536714d8e8SKurt Hackel  * you shouldn't trust your pointer. */
3546714d8e8SKurt Hackel struct dlm_ctxt *dlm_grab(struct dlm_ctxt *dlm)
3556714d8e8SKurt Hackel {
3566714d8e8SKurt Hackel 	struct list_head *iter;
3576714d8e8SKurt Hackel 	struct dlm_ctxt *target = NULL;
3586714d8e8SKurt Hackel 
3596714d8e8SKurt Hackel 	spin_lock(&dlm_domain_lock);
3606714d8e8SKurt Hackel 
3616714d8e8SKurt Hackel 	list_for_each(iter, &dlm_domains) {
3626714d8e8SKurt Hackel 		target = list_entry (iter, struct dlm_ctxt, list);
3636714d8e8SKurt Hackel 
3646714d8e8SKurt Hackel 		if (target == dlm) {
3656714d8e8SKurt Hackel 			__dlm_get(target);
3666714d8e8SKurt Hackel 			break;
3676714d8e8SKurt Hackel 		}
3686714d8e8SKurt Hackel 
3696714d8e8SKurt Hackel 		target = NULL;
3706714d8e8SKurt Hackel 	}
3716714d8e8SKurt Hackel 
3726714d8e8SKurt Hackel 	spin_unlock(&dlm_domain_lock);
3736714d8e8SKurt Hackel 
3746714d8e8SKurt Hackel 	return target;
3756714d8e8SKurt Hackel }
3766714d8e8SKurt Hackel 
3776714d8e8SKurt Hackel int dlm_domain_fully_joined(struct dlm_ctxt *dlm)
3786714d8e8SKurt Hackel {
3796714d8e8SKurt Hackel 	int ret;
3806714d8e8SKurt Hackel 
3816714d8e8SKurt Hackel 	spin_lock(&dlm_domain_lock);
3826714d8e8SKurt Hackel 	ret = (dlm->dlm_state == DLM_CTXT_JOINED) ||
3836714d8e8SKurt Hackel 		(dlm->dlm_state == DLM_CTXT_IN_SHUTDOWN);
3846714d8e8SKurt Hackel 	spin_unlock(&dlm_domain_lock);
3856714d8e8SKurt Hackel 
3866714d8e8SKurt Hackel 	return ret;
3876714d8e8SKurt Hackel }
3886714d8e8SKurt Hackel 
3893156d267SKurt Hackel static void dlm_destroy_dlm_worker(struct dlm_ctxt *dlm)
3903156d267SKurt Hackel {
3913156d267SKurt Hackel 	if (dlm->dlm_worker) {
3923156d267SKurt Hackel 		flush_workqueue(dlm->dlm_worker);
3933156d267SKurt Hackel 		destroy_workqueue(dlm->dlm_worker);
3943156d267SKurt Hackel 		dlm->dlm_worker = NULL;
3953156d267SKurt Hackel 	}
3963156d267SKurt Hackel }
3973156d267SKurt Hackel 
3986714d8e8SKurt Hackel static void dlm_complete_dlm_shutdown(struct dlm_ctxt *dlm)
3996714d8e8SKurt Hackel {
4006714d8e8SKurt Hackel 	dlm_unregister_domain_handlers(dlm);
4016714d8e8SKurt Hackel 	dlm_complete_thread(dlm);
4026714d8e8SKurt Hackel 	dlm_complete_recovery_thread(dlm);
4033156d267SKurt Hackel 	dlm_destroy_dlm_worker(dlm);
4046714d8e8SKurt Hackel 
4056714d8e8SKurt Hackel 	/* We've left the domain. Now we can take ourselves out of the
4066714d8e8SKurt Hackel 	 * list and allow the kref stuff to help us free the
4076714d8e8SKurt Hackel 	 * memory. */
4086714d8e8SKurt Hackel 	spin_lock(&dlm_domain_lock);
4096714d8e8SKurt Hackel 	list_del_init(&dlm->list);
4106714d8e8SKurt Hackel 	spin_unlock(&dlm_domain_lock);
4116714d8e8SKurt Hackel 
4126714d8e8SKurt Hackel 	/* Wake up anyone waiting for us to remove this domain */
4136714d8e8SKurt Hackel 	wake_up(&dlm_domain_events);
4146714d8e8SKurt Hackel }
4156714d8e8SKurt Hackel 
416ba2bf218SKurt Hackel static int dlm_migrate_all_locks(struct dlm_ctxt *dlm)
4176714d8e8SKurt Hackel {
418ba2bf218SKurt Hackel 	int i, num, n, ret = 0;
4196714d8e8SKurt Hackel 	struct dlm_lock_resource *res;
420ba2bf218SKurt Hackel 	struct hlist_node *iter;
421ba2bf218SKurt Hackel 	struct hlist_head *bucket;
422ba2bf218SKurt Hackel 	int dropped;
4236714d8e8SKurt Hackel 
4246714d8e8SKurt Hackel 	mlog(0, "Migrating locks from domain %s\n", dlm->name);
425ba2bf218SKurt Hackel 
426ba2bf218SKurt Hackel 	num = 0;
4276714d8e8SKurt Hackel 	spin_lock(&dlm->spinlock);
42881f2094aSMark Fasheh 	for (i = 0; i < DLM_HASH_BUCKETS; i++) {
429ba2bf218SKurt Hackel redo_bucket:
430ba2bf218SKurt Hackel 		n = 0;
431ba2bf218SKurt Hackel 		bucket = dlm_lockres_hash(dlm, i);
432ba2bf218SKurt Hackel 		iter = bucket->first;
433ba2bf218SKurt Hackel 		while (iter) {
434ba2bf218SKurt Hackel 			n++;
435ba2bf218SKurt Hackel 			res = hlist_entry(iter, struct dlm_lock_resource,
436ba2bf218SKurt Hackel 					  hash_node);
4376714d8e8SKurt Hackel 			dlm_lockres_get(res);
438ba2bf218SKurt Hackel 			/* migrate, if necessary.  this will drop the dlm
439ba2bf218SKurt Hackel 			 * spinlock and retake it if it does migration. */
440ba2bf218SKurt Hackel 			dropped = dlm_empty_lockres(dlm, res);
4416714d8e8SKurt Hackel 
442ba2bf218SKurt Hackel 			spin_lock(&res->spinlock);
443ba2bf218SKurt Hackel 			__dlm_lockres_calc_usage(dlm, res);
444ba2bf218SKurt Hackel 			iter = res->hash_node.next;
445ba2bf218SKurt Hackel 			spin_unlock(&res->spinlock);
446ba2bf218SKurt Hackel 
4476714d8e8SKurt Hackel 			dlm_lockres_put(res);
448ba2bf218SKurt Hackel 
449ba2bf218SKurt Hackel 			if (dropped)
450ba2bf218SKurt Hackel 				goto redo_bucket;
4516714d8e8SKurt Hackel 		}
4520d01af6eSSunil Mushran 		cond_resched_lock(&dlm->spinlock);
453ba2bf218SKurt Hackel 		num += n;
454ba2bf218SKurt Hackel 		mlog(0, "%s: touched %d lockreses in bucket %d "
455ba2bf218SKurt Hackel 		     "(tot=%d)\n", dlm->name, n, i, num);
4566714d8e8SKurt Hackel 	}
4576714d8e8SKurt Hackel 	spin_unlock(&dlm->spinlock);
458ba2bf218SKurt Hackel 	wake_up(&dlm->dlm_thread_wq);
4596714d8e8SKurt Hackel 
460ba2bf218SKurt Hackel 	/* let the dlm thread take care of purging, keep scanning until
461ba2bf218SKurt Hackel 	 * nothing remains in the hash */
462ba2bf218SKurt Hackel 	if (num) {
463ba2bf218SKurt Hackel 		mlog(0, "%s: %d lock resources in hash last pass\n",
464ba2bf218SKurt Hackel 		     dlm->name, num);
465ba2bf218SKurt Hackel 		ret = -EAGAIN;
466ba2bf218SKurt Hackel 	}
4676714d8e8SKurt Hackel 	mlog(0, "DONE Migrating locks from domain %s\n", dlm->name);
468ba2bf218SKurt Hackel 	return ret;
4696714d8e8SKurt Hackel }
4706714d8e8SKurt Hackel 
4716714d8e8SKurt Hackel static int dlm_no_joining_node(struct dlm_ctxt *dlm)
4726714d8e8SKurt Hackel {
4736714d8e8SKurt Hackel 	int ret;
4746714d8e8SKurt Hackel 
4756714d8e8SKurt Hackel 	spin_lock(&dlm->spinlock);
4766714d8e8SKurt Hackel 	ret = dlm->joining_node == DLM_LOCK_RES_OWNER_UNKNOWN;
4776714d8e8SKurt Hackel 	spin_unlock(&dlm->spinlock);
4786714d8e8SKurt Hackel 
4796714d8e8SKurt Hackel 	return ret;
4806714d8e8SKurt Hackel }
4816714d8e8SKurt Hackel 
4826714d8e8SKurt Hackel static void dlm_mark_domain_leaving(struct dlm_ctxt *dlm)
4836714d8e8SKurt Hackel {
4846714d8e8SKurt Hackel 	/* Yikes, a double spinlock! I need domain_lock for the dlm
4856714d8e8SKurt Hackel 	 * state and the dlm spinlock for join state... Sorry! */
4866714d8e8SKurt Hackel again:
4876714d8e8SKurt Hackel 	spin_lock(&dlm_domain_lock);
4886714d8e8SKurt Hackel 	spin_lock(&dlm->spinlock);
4896714d8e8SKurt Hackel 
4906714d8e8SKurt Hackel 	if (dlm->joining_node != DLM_LOCK_RES_OWNER_UNKNOWN) {
4916714d8e8SKurt Hackel 		mlog(0, "Node %d is joining, we wait on it.\n",
4926714d8e8SKurt Hackel 			  dlm->joining_node);
4936714d8e8SKurt Hackel 		spin_unlock(&dlm->spinlock);
4946714d8e8SKurt Hackel 		spin_unlock(&dlm_domain_lock);
4956714d8e8SKurt Hackel 
4966714d8e8SKurt Hackel 		wait_event(dlm->dlm_join_events, dlm_no_joining_node(dlm));
4976714d8e8SKurt Hackel 		goto again;
4986714d8e8SKurt Hackel 	}
4996714d8e8SKurt Hackel 
5006714d8e8SKurt Hackel 	dlm->dlm_state = DLM_CTXT_LEAVING;
5016714d8e8SKurt Hackel 	spin_unlock(&dlm->spinlock);
5026714d8e8SKurt Hackel 	spin_unlock(&dlm_domain_lock);
5036714d8e8SKurt Hackel }
5046714d8e8SKurt Hackel 
5056714d8e8SKurt Hackel static void __dlm_print_nodes(struct dlm_ctxt *dlm)
5066714d8e8SKurt Hackel {
5076714d8e8SKurt Hackel 	int node = -1;
5086714d8e8SKurt Hackel 
5096714d8e8SKurt Hackel 	assert_spin_locked(&dlm->spinlock);
5106714d8e8SKurt Hackel 
511781ee3e2SSunil Mushran 	printk(KERN_INFO "ocfs2_dlm: Nodes in domain (\"%s\"): ", dlm->name);
5126714d8e8SKurt Hackel 
5136714d8e8SKurt Hackel 	while ((node = find_next_bit(dlm->domain_map, O2NM_MAX_NODES,
5146714d8e8SKurt Hackel 				     node + 1)) < O2NM_MAX_NODES) {
515781ee3e2SSunil Mushran 		printk("%d ", node);
5166714d8e8SKurt Hackel 	}
517781ee3e2SSunil Mushran 	printk("\n");
5186714d8e8SKurt Hackel }
5196714d8e8SKurt Hackel 
520d74c9803SKurt Hackel static int dlm_exit_domain_handler(struct o2net_msg *msg, u32 len, void *data,
521d74c9803SKurt Hackel 				   void **ret_data)
5226714d8e8SKurt Hackel {
5236714d8e8SKurt Hackel 	struct dlm_ctxt *dlm = data;
5246714d8e8SKurt Hackel 	unsigned int node;
5256714d8e8SKurt Hackel 	struct dlm_exit_domain *exit_msg = (struct dlm_exit_domain *) msg->buf;
5266714d8e8SKurt Hackel 
5276714d8e8SKurt Hackel 	mlog_entry("%p %u %p", msg, len, data);
5286714d8e8SKurt Hackel 
5296714d8e8SKurt Hackel 	if (!dlm_grab(dlm))
5306714d8e8SKurt Hackel 		return 0;
5316714d8e8SKurt Hackel 
5326714d8e8SKurt Hackel 	node = exit_msg->node_idx;
5336714d8e8SKurt Hackel 
534781ee3e2SSunil Mushran 	printk(KERN_INFO "ocfs2_dlm: Node %u leaves domain %s\n", node, dlm->name);
5356714d8e8SKurt Hackel 
5366714d8e8SKurt Hackel 	spin_lock(&dlm->spinlock);
5376714d8e8SKurt Hackel 	clear_bit(node, dlm->domain_map);
5386714d8e8SKurt Hackel 	__dlm_print_nodes(dlm);
5396714d8e8SKurt Hackel 
5406714d8e8SKurt Hackel 	/* notify anything attached to the heartbeat events */
5416714d8e8SKurt Hackel 	dlm_hb_event_notify_attached(dlm, node, 0);
5426714d8e8SKurt Hackel 
5436714d8e8SKurt Hackel 	spin_unlock(&dlm->spinlock);
5446714d8e8SKurt Hackel 
5456714d8e8SKurt Hackel 	dlm_put(dlm);
5466714d8e8SKurt Hackel 
5476714d8e8SKurt Hackel 	return 0;
5486714d8e8SKurt Hackel }
5496714d8e8SKurt Hackel 
5506714d8e8SKurt Hackel static int dlm_send_one_domain_exit(struct dlm_ctxt *dlm,
5516714d8e8SKurt Hackel 				    unsigned int node)
5526714d8e8SKurt Hackel {
5536714d8e8SKurt Hackel 	int status;
5546714d8e8SKurt Hackel 	struct dlm_exit_domain leave_msg;
5556714d8e8SKurt Hackel 
5566714d8e8SKurt Hackel 	mlog(0, "Asking node %u if we can leave the domain %s me = %u\n",
5576714d8e8SKurt Hackel 		  node, dlm->name, dlm->node_num);
5586714d8e8SKurt Hackel 
5596714d8e8SKurt Hackel 	memset(&leave_msg, 0, sizeof(leave_msg));
5606714d8e8SKurt Hackel 	leave_msg.node_idx = dlm->node_num;
5616714d8e8SKurt Hackel 
5626714d8e8SKurt Hackel 	status = o2net_send_message(DLM_EXIT_DOMAIN_MSG, dlm->key,
5636714d8e8SKurt Hackel 				    &leave_msg, sizeof(leave_msg), node,
5646714d8e8SKurt Hackel 				    NULL);
5656714d8e8SKurt Hackel 
5666714d8e8SKurt Hackel 	mlog(0, "status return %d from o2net_send_message\n", status);
5676714d8e8SKurt Hackel 
5686714d8e8SKurt Hackel 	return status;
5696714d8e8SKurt Hackel }
5706714d8e8SKurt Hackel 
5716714d8e8SKurt Hackel 
5726714d8e8SKurt Hackel static void dlm_leave_domain(struct dlm_ctxt *dlm)
5736714d8e8SKurt Hackel {
5746714d8e8SKurt Hackel 	int node, clear_node, status;
5756714d8e8SKurt Hackel 
5766714d8e8SKurt Hackel 	/* At this point we've migrated away all our locks and won't
5776714d8e8SKurt Hackel 	 * accept mastership of new ones. The dlm is responsible for
5786714d8e8SKurt Hackel 	 * almost nothing now. We make sure not to confuse any joining
5796714d8e8SKurt Hackel 	 * nodes and then commence shutdown procedure. */
5806714d8e8SKurt Hackel 
5816714d8e8SKurt Hackel 	spin_lock(&dlm->spinlock);
5826714d8e8SKurt Hackel 	/* Clear ourselves from the domain map */
5836714d8e8SKurt Hackel 	clear_bit(dlm->node_num, dlm->domain_map);
5846714d8e8SKurt Hackel 	while ((node = find_next_bit(dlm->domain_map, O2NM_MAX_NODES,
5856714d8e8SKurt Hackel 				     0)) < O2NM_MAX_NODES) {
5866714d8e8SKurt Hackel 		/* Drop the dlm spinlock. This is safe wrt the domain_map.
5876714d8e8SKurt Hackel 		 * -nodes cannot be added now as the
5886714d8e8SKurt Hackel 		 *   query_join_handlers knows to respond with OK_NO_MAP
5896714d8e8SKurt Hackel 		 * -we catch the right network errors if a node is
5906714d8e8SKurt Hackel 		 *   removed from the map while we're sending him the
5916714d8e8SKurt Hackel 		 *   exit message. */
5926714d8e8SKurt Hackel 		spin_unlock(&dlm->spinlock);
5936714d8e8SKurt Hackel 
5946714d8e8SKurt Hackel 		clear_node = 1;
5956714d8e8SKurt Hackel 
5966714d8e8SKurt Hackel 		status = dlm_send_one_domain_exit(dlm, node);
5976714d8e8SKurt Hackel 		if (status < 0 &&
5986714d8e8SKurt Hackel 		    status != -ENOPROTOOPT &&
5996714d8e8SKurt Hackel 		    status != -ENOTCONN) {
6006714d8e8SKurt Hackel 			mlog(ML_NOTICE, "Error %d sending domain exit message "
6016714d8e8SKurt Hackel 			     "to node %d\n", status, node);
6026714d8e8SKurt Hackel 
6036714d8e8SKurt Hackel 			/* Not sure what to do here but lets sleep for
6046714d8e8SKurt Hackel 			 * a bit in case this was a transient
6056714d8e8SKurt Hackel 			 * error... */
6066714d8e8SKurt Hackel 			msleep(DLM_DOMAIN_BACKOFF_MS);
6076714d8e8SKurt Hackel 			clear_node = 0;
6086714d8e8SKurt Hackel 		}
6096714d8e8SKurt Hackel 
6106714d8e8SKurt Hackel 		spin_lock(&dlm->spinlock);
6116714d8e8SKurt Hackel 		/* If we're not clearing the node bit then we intend
6126714d8e8SKurt Hackel 		 * to loop back around to try again. */
6136714d8e8SKurt Hackel 		if (clear_node)
6146714d8e8SKurt Hackel 			clear_bit(node, dlm->domain_map);
6156714d8e8SKurt Hackel 	}
6166714d8e8SKurt Hackel 	spin_unlock(&dlm->spinlock);
6176714d8e8SKurt Hackel }
6186714d8e8SKurt Hackel 
6196714d8e8SKurt Hackel int dlm_joined(struct dlm_ctxt *dlm)
6206714d8e8SKurt Hackel {
6216714d8e8SKurt Hackel 	int ret = 0;
6226714d8e8SKurt Hackel 
6236714d8e8SKurt Hackel 	spin_lock(&dlm_domain_lock);
6246714d8e8SKurt Hackel 
6256714d8e8SKurt Hackel 	if (dlm->dlm_state == DLM_CTXT_JOINED)
6266714d8e8SKurt Hackel 		ret = 1;
6276714d8e8SKurt Hackel 
6286714d8e8SKurt Hackel 	spin_unlock(&dlm_domain_lock);
6296714d8e8SKurt Hackel 
6306714d8e8SKurt Hackel 	return ret;
6316714d8e8SKurt Hackel }
6326714d8e8SKurt Hackel 
6336714d8e8SKurt Hackel int dlm_shutting_down(struct dlm_ctxt *dlm)
6346714d8e8SKurt Hackel {
6356714d8e8SKurt Hackel 	int ret = 0;
6366714d8e8SKurt Hackel 
6376714d8e8SKurt Hackel 	spin_lock(&dlm_domain_lock);
6386714d8e8SKurt Hackel 
6396714d8e8SKurt Hackel 	if (dlm->dlm_state == DLM_CTXT_IN_SHUTDOWN)
6406714d8e8SKurt Hackel 		ret = 1;
6416714d8e8SKurt Hackel 
6426714d8e8SKurt Hackel 	spin_unlock(&dlm_domain_lock);
6436714d8e8SKurt Hackel 
6446714d8e8SKurt Hackel 	return ret;
6456714d8e8SKurt Hackel }
6466714d8e8SKurt Hackel 
6476714d8e8SKurt Hackel void dlm_unregister_domain(struct dlm_ctxt *dlm)
6486714d8e8SKurt Hackel {
6496714d8e8SKurt Hackel 	int leave = 0;
65029576f8bSSunil Mushran 	struct dlm_lock_resource *res;
6516714d8e8SKurt Hackel 
6526714d8e8SKurt Hackel 	spin_lock(&dlm_domain_lock);
6536714d8e8SKurt Hackel 	BUG_ON(dlm->dlm_state != DLM_CTXT_JOINED);
6546714d8e8SKurt Hackel 	BUG_ON(!dlm->num_joins);
6556714d8e8SKurt Hackel 
6566714d8e8SKurt Hackel 	dlm->num_joins--;
6576714d8e8SKurt Hackel 	if (!dlm->num_joins) {
6586714d8e8SKurt Hackel 		/* We mark it "in shutdown" now so new register
6596714d8e8SKurt Hackel 		 * requests wait until we've completely left the
6606714d8e8SKurt Hackel 		 * domain. Don't use DLM_CTXT_LEAVING yet as we still
6616714d8e8SKurt Hackel 		 * want new domain joins to communicate with us at
6626714d8e8SKurt Hackel 		 * least until we've completed migration of our
6636714d8e8SKurt Hackel 		 * resources. */
6646714d8e8SKurt Hackel 		dlm->dlm_state = DLM_CTXT_IN_SHUTDOWN;
6656714d8e8SKurt Hackel 		leave = 1;
6666714d8e8SKurt Hackel 	}
6676714d8e8SKurt Hackel 	spin_unlock(&dlm_domain_lock);
6686714d8e8SKurt Hackel 
6696714d8e8SKurt Hackel 	if (leave) {
6706714d8e8SKurt Hackel 		mlog(0, "shutting down domain %s\n", dlm->name);
6716714d8e8SKurt Hackel 
6726714d8e8SKurt Hackel 		/* We changed dlm state, notify the thread */
6736714d8e8SKurt Hackel 		dlm_kick_thread(dlm, NULL);
6746714d8e8SKurt Hackel 
675ba2bf218SKurt Hackel 		while (dlm_migrate_all_locks(dlm)) {
6762f5bf1f2SSunil Mushran 			/* Give dlm_thread time to purge the lockres' */
6772f5bf1f2SSunil Mushran 			msleep(500);
678ba2bf218SKurt Hackel 			mlog(0, "%s: more migration to do\n", dlm->name);
679ba2bf218SKurt Hackel 		}
68029576f8bSSunil Mushran 
68129576f8bSSunil Mushran 		/* This list should be empty. If not, print remaining lockres */
68229576f8bSSunil Mushran 		if (!list_empty(&dlm->tracking_list)) {
68329576f8bSSunil Mushran 			mlog(ML_ERROR, "Following lockres' are still on the "
68429576f8bSSunil Mushran 			     "tracking list:\n");
68529576f8bSSunil Mushran 			list_for_each_entry(res, &dlm->tracking_list, tracking)
68629576f8bSSunil Mushran 				dlm_print_one_lock_resource(res);
68729576f8bSSunil Mushran 		}
68829576f8bSSunil Mushran 
6896714d8e8SKurt Hackel 		dlm_mark_domain_leaving(dlm);
6906714d8e8SKurt Hackel 		dlm_leave_domain(dlm);
6916714d8e8SKurt Hackel 		dlm_complete_dlm_shutdown(dlm);
6926714d8e8SKurt Hackel 	}
6936714d8e8SKurt Hackel 	dlm_put(dlm);
6946714d8e8SKurt Hackel }
6956714d8e8SKurt Hackel EXPORT_SYMBOL_GPL(dlm_unregister_domain);
6966714d8e8SKurt Hackel 
697d24fbcdaSJoel Becker static int dlm_query_join_proto_check(char *proto_type, int node,
698d24fbcdaSJoel Becker 				      struct dlm_protocol_version *ours,
699d24fbcdaSJoel Becker 				      struct dlm_protocol_version *request)
700d24fbcdaSJoel Becker {
701d24fbcdaSJoel Becker 	int rc;
702d24fbcdaSJoel Becker 	struct dlm_protocol_version proto = *request;
703d24fbcdaSJoel Becker 
704d24fbcdaSJoel Becker 	if (!dlm_protocol_compare(ours, &proto)) {
705d24fbcdaSJoel Becker 		mlog(0,
706d24fbcdaSJoel Becker 		     "node %u wanted to join with %s locking protocol "
707d24fbcdaSJoel Becker 		     "%u.%u, we respond with %u.%u\n",
708d24fbcdaSJoel Becker 		     node, proto_type,
709d24fbcdaSJoel Becker 		     request->pv_major,
710d24fbcdaSJoel Becker 		     request->pv_minor,
711d24fbcdaSJoel Becker 		     proto.pv_major, proto.pv_minor);
712d24fbcdaSJoel Becker 		request->pv_minor = proto.pv_minor;
713d24fbcdaSJoel Becker 		rc = 0;
714d24fbcdaSJoel Becker 	} else {
715d24fbcdaSJoel Becker 		mlog(ML_NOTICE,
716d24fbcdaSJoel Becker 		     "Node %u wanted to join with %s locking "
717d24fbcdaSJoel Becker 		     "protocol %u.%u, but we have %u.%u, disallowing\n",
718d24fbcdaSJoel Becker 		     node, proto_type,
719d24fbcdaSJoel Becker 		     request->pv_major,
720d24fbcdaSJoel Becker 		     request->pv_minor,
721d24fbcdaSJoel Becker 		     ours->pv_major,
722d24fbcdaSJoel Becker 		     ours->pv_minor);
723d24fbcdaSJoel Becker 		rc = 1;
724d24fbcdaSJoel Becker 	}
725d24fbcdaSJoel Becker 
726d24fbcdaSJoel Becker 	return rc;
727d24fbcdaSJoel Becker }
728d24fbcdaSJoel Becker 
7290f71b7b4SJoel Becker /*
7300f71b7b4SJoel Becker  * struct dlm_query_join_packet is made up of four one-byte fields.  They
7310f71b7b4SJoel Becker  * are effectively in big-endian order already.  However, little-endian
7320f71b7b4SJoel Becker  * machines swap them before putting the packet on the wire (because
7330f71b7b4SJoel Becker  * query_join's response is a status, and that status is treated as a u32
7340f71b7b4SJoel Becker  * on the wire).  Thus, a big-endian and little-endian machines will treat
7350f71b7b4SJoel Becker  * this structure differently.
7360f71b7b4SJoel Becker  *
7370f71b7b4SJoel Becker  * The solution is to have little-endian machines swap the structure when
7380f71b7b4SJoel Becker  * converting from the structure to the u32 representation.  This will
7390f71b7b4SJoel Becker  * result in the structure having the correct format on the wire no matter
7400f71b7b4SJoel Becker  * the host endian format.
7410f71b7b4SJoel Becker  */
7420f71b7b4SJoel Becker static void dlm_query_join_packet_to_wire(struct dlm_query_join_packet *packet,
7430f71b7b4SJoel Becker 					  u32 *wire)
7440f71b7b4SJoel Becker {
7450f71b7b4SJoel Becker 	union dlm_query_join_response response;
7460f71b7b4SJoel Becker 
7470f71b7b4SJoel Becker 	response.packet = *packet;
7480f71b7b4SJoel Becker 	*wire = cpu_to_be32(response.intval);
7490f71b7b4SJoel Becker }
7500f71b7b4SJoel Becker 
7510f71b7b4SJoel Becker static void dlm_query_join_wire_to_packet(u32 wire,
7520f71b7b4SJoel Becker 					  struct dlm_query_join_packet *packet)
7530f71b7b4SJoel Becker {
7540f71b7b4SJoel Becker 	union dlm_query_join_response response;
7550f71b7b4SJoel Becker 
7560f71b7b4SJoel Becker 	response.intval = cpu_to_be32(wire);
7570f71b7b4SJoel Becker 	*packet = response.packet;
7580f71b7b4SJoel Becker }
7590f71b7b4SJoel Becker 
760d74c9803SKurt Hackel static int dlm_query_join_handler(struct o2net_msg *msg, u32 len, void *data,
761d74c9803SKurt Hackel 				  void **ret_data)
7626714d8e8SKurt Hackel {
7636714d8e8SKurt Hackel 	struct dlm_query_join_request *query;
7640f71b7b4SJoel Becker 	struct dlm_query_join_packet packet = {
7650f71b7b4SJoel Becker 		.code = JOIN_DISALLOW,
766d24fbcdaSJoel Becker 	};
7676714d8e8SKurt Hackel 	struct dlm_ctxt *dlm = NULL;
7680f71b7b4SJoel Becker 	u32 response;
7691faf2894SSrinivas Eeda 	u8 nodenum;
7706714d8e8SKurt Hackel 
7716714d8e8SKurt Hackel 	query = (struct dlm_query_join_request *) msg->buf;
7726714d8e8SKurt Hackel 
7736714d8e8SKurt Hackel 	mlog(0, "node %u wants to join domain %s\n", query->node_idx,
7746714d8e8SKurt Hackel 		  query->domain);
7756714d8e8SKurt Hackel 
7766714d8e8SKurt Hackel 	/*
7776714d8e8SKurt Hackel 	 * If heartbeat doesn't consider the node live, tell it
7786714d8e8SKurt Hackel 	 * to back off and try again.  This gives heartbeat a chance
7796714d8e8SKurt Hackel 	 * to catch up.
7806714d8e8SKurt Hackel 	 */
7816714d8e8SKurt Hackel 	if (!o2hb_check_node_heartbeating(query->node_idx)) {
7826714d8e8SKurt Hackel 		mlog(0, "node %u is not in our live map yet\n",
7836714d8e8SKurt Hackel 		     query->node_idx);
7846714d8e8SKurt Hackel 
7850f71b7b4SJoel Becker 		packet.code = JOIN_DISALLOW;
7866714d8e8SKurt Hackel 		goto respond;
7876714d8e8SKurt Hackel 	}
7886714d8e8SKurt Hackel 
7890f71b7b4SJoel Becker 	packet.code = JOIN_OK_NO_MAP;
7906714d8e8SKurt Hackel 
7916714d8e8SKurt Hackel 	spin_lock(&dlm_domain_lock);
7926714d8e8SKurt Hackel 	dlm = __dlm_lookup_domain_full(query->domain, query->name_len);
7931faf2894SSrinivas Eeda 	if (!dlm)
7941faf2894SSrinivas Eeda 		goto unlock_respond;
7951faf2894SSrinivas Eeda 
7961faf2894SSrinivas Eeda 	/*
7971faf2894SSrinivas Eeda 	 * There is a small window where the joining node may not see the
7981faf2894SSrinivas Eeda 	 * node(s) that just left but still part of the cluster. DISALLOW
7991faf2894SSrinivas Eeda 	 * join request if joining node has different node map.
8001faf2894SSrinivas Eeda 	 */
8011faf2894SSrinivas Eeda 	nodenum=0;
8021faf2894SSrinivas Eeda 	while (nodenum < O2NM_MAX_NODES) {
8031faf2894SSrinivas Eeda 		if (test_bit(nodenum, dlm->domain_map)) {
8041faf2894SSrinivas Eeda 			if (!byte_test_bit(nodenum, query->node_map)) {
805e4968476SSunil Mushran 				mlog(0, "disallow join as node %u does not "
806e4968476SSunil Mushran 				     "have node %u in its nodemap\n",
807e4968476SSunil Mushran 				     query->node_idx, nodenum);
8080f71b7b4SJoel Becker 				packet.code = JOIN_DISALLOW;
8091faf2894SSrinivas Eeda 				goto unlock_respond;
8101faf2894SSrinivas Eeda 			}
8111faf2894SSrinivas Eeda 		}
8121faf2894SSrinivas Eeda 		nodenum++;
8131faf2894SSrinivas Eeda 	}
8141faf2894SSrinivas Eeda 
8156714d8e8SKurt Hackel 	/* Once the dlm ctxt is marked as leaving then we don't want
816e2faea4cSKurt Hackel 	 * to be put in someone's domain map.
817e2faea4cSKurt Hackel 	 * Also, explicitly disallow joining at certain troublesome
818e2faea4cSKurt Hackel 	 * times (ie. during recovery). */
8196714d8e8SKurt Hackel 	if (dlm && dlm->dlm_state != DLM_CTXT_LEAVING) {
820e2faea4cSKurt Hackel 		int bit = query->node_idx;
8216714d8e8SKurt Hackel 		spin_lock(&dlm->spinlock);
8226714d8e8SKurt Hackel 
8236714d8e8SKurt Hackel 		if (dlm->dlm_state == DLM_CTXT_NEW &&
8246714d8e8SKurt Hackel 		    dlm->joining_node == DLM_LOCK_RES_OWNER_UNKNOWN) {
8256714d8e8SKurt Hackel 			/*If this is a brand new context and we
8266714d8e8SKurt Hackel 			 * haven't started our join process yet, then
8276714d8e8SKurt Hackel 			 * the other node won the race. */
8280f71b7b4SJoel Becker 			packet.code = JOIN_OK_NO_MAP;
8296714d8e8SKurt Hackel 		} else if (dlm->joining_node != DLM_LOCK_RES_OWNER_UNKNOWN) {
8306714d8e8SKurt Hackel 			/* Disallow parallel joins. */
8310f71b7b4SJoel Becker 			packet.code = JOIN_DISALLOW;
832e2faea4cSKurt Hackel 		} else if (dlm->reco.state & DLM_RECO_STATE_ACTIVE) {
833e4968476SSunil Mushran 			mlog(0, "node %u trying to join, but recovery "
834e2faea4cSKurt Hackel 			     "is ongoing.\n", bit);
8350f71b7b4SJoel Becker 			packet.code = JOIN_DISALLOW;
836e2faea4cSKurt Hackel 		} else if (test_bit(bit, dlm->recovery_map)) {
837e4968476SSunil Mushran 			mlog(0, "node %u trying to join, but it "
838e2faea4cSKurt Hackel 			     "still needs recovery.\n", bit);
8390f71b7b4SJoel Becker 			packet.code = JOIN_DISALLOW;
840e2faea4cSKurt Hackel 		} else if (test_bit(bit, dlm->domain_map)) {
841e4968476SSunil Mushran 			mlog(0, "node %u trying to join, but it "
842e2faea4cSKurt Hackel 			     "is still in the domain! needs recovery?\n",
843e2faea4cSKurt Hackel 			     bit);
8440f71b7b4SJoel Becker 			packet.code = JOIN_DISALLOW;
8456714d8e8SKurt Hackel 		} else {
8466714d8e8SKurt Hackel 			/* Alright we're fully a part of this domain
8476714d8e8SKurt Hackel 			 * so we keep some state as to who's joining
8486714d8e8SKurt Hackel 			 * and indicate to him that needs to be fixed
8496714d8e8SKurt Hackel 			 * up. */
850d24fbcdaSJoel Becker 
851d24fbcdaSJoel Becker 			/* Make sure we speak compatible locking protocols.  */
852d24fbcdaSJoel Becker 			if (dlm_query_join_proto_check("DLM", bit,
853d24fbcdaSJoel Becker 						       &dlm->dlm_locking_proto,
854d24fbcdaSJoel Becker 						       &query->dlm_proto)) {
8550f71b7b4SJoel Becker 				packet.code = JOIN_PROTOCOL_MISMATCH;
856d24fbcdaSJoel Becker 			} else if (dlm_query_join_proto_check("fs", bit,
857d24fbcdaSJoel Becker 							      &dlm->fs_locking_proto,
858d24fbcdaSJoel Becker 							      &query->fs_proto)) {
8590f71b7b4SJoel Becker 				packet.code = JOIN_PROTOCOL_MISMATCH;
860d24fbcdaSJoel Becker 			} else {
8610f71b7b4SJoel Becker 				packet.dlm_minor = query->dlm_proto.pv_minor;
8620f71b7b4SJoel Becker 				packet.fs_minor = query->fs_proto.pv_minor;
8630f71b7b4SJoel Becker 				packet.code = JOIN_OK;
8646714d8e8SKurt Hackel 				__dlm_set_joining_node(dlm, query->node_idx);
8656714d8e8SKurt Hackel 			}
866d24fbcdaSJoel Becker 		}
8676714d8e8SKurt Hackel 
8686714d8e8SKurt Hackel 		spin_unlock(&dlm->spinlock);
8696714d8e8SKurt Hackel 	}
8701faf2894SSrinivas Eeda unlock_respond:
8716714d8e8SKurt Hackel 	spin_unlock(&dlm_domain_lock);
8726714d8e8SKurt Hackel 
8736714d8e8SKurt Hackel respond:
8740f71b7b4SJoel Becker 	mlog(0, "We respond with %u\n", packet.code);
8756714d8e8SKurt Hackel 
8760f71b7b4SJoel Becker 	dlm_query_join_packet_to_wire(&packet, &response);
8770f71b7b4SJoel Becker 	return response;
8786714d8e8SKurt Hackel }
8796714d8e8SKurt Hackel 
880d74c9803SKurt Hackel static int dlm_assert_joined_handler(struct o2net_msg *msg, u32 len, void *data,
881d74c9803SKurt Hackel 				     void **ret_data)
8826714d8e8SKurt Hackel {
8836714d8e8SKurt Hackel 	struct dlm_assert_joined *assert;
8846714d8e8SKurt Hackel 	struct dlm_ctxt *dlm = NULL;
8856714d8e8SKurt Hackel 
8866714d8e8SKurt Hackel 	assert = (struct dlm_assert_joined *) msg->buf;
8876714d8e8SKurt Hackel 
8886714d8e8SKurt Hackel 	mlog(0, "node %u asserts join on domain %s\n", assert->node_idx,
8896714d8e8SKurt Hackel 		  assert->domain);
8906714d8e8SKurt Hackel 
8916714d8e8SKurt Hackel 	spin_lock(&dlm_domain_lock);
8926714d8e8SKurt Hackel 	dlm = __dlm_lookup_domain_full(assert->domain, assert->name_len);
8936714d8e8SKurt Hackel 	/* XXX should we consider no dlm ctxt an error? */
8946714d8e8SKurt Hackel 	if (dlm) {
8956714d8e8SKurt Hackel 		spin_lock(&dlm->spinlock);
8966714d8e8SKurt Hackel 
8976714d8e8SKurt Hackel 		/* Alright, this node has officially joined our
8986714d8e8SKurt Hackel 		 * domain. Set him in the map and clean up our
8996714d8e8SKurt Hackel 		 * leftover join state. */
9006714d8e8SKurt Hackel 		BUG_ON(dlm->joining_node != assert->node_idx);
9016714d8e8SKurt Hackel 		set_bit(assert->node_idx, dlm->domain_map);
9026714d8e8SKurt Hackel 		__dlm_set_joining_node(dlm, DLM_LOCK_RES_OWNER_UNKNOWN);
9036714d8e8SKurt Hackel 
904781ee3e2SSunil Mushran 		printk(KERN_INFO "ocfs2_dlm: Node %u joins domain %s\n",
905781ee3e2SSunil Mushran 		       assert->node_idx, dlm->name);
9066714d8e8SKurt Hackel 		__dlm_print_nodes(dlm);
9076714d8e8SKurt Hackel 
9086714d8e8SKurt Hackel 		/* notify anything attached to the heartbeat events */
9096714d8e8SKurt Hackel 		dlm_hb_event_notify_attached(dlm, assert->node_idx, 1);
9106714d8e8SKurt Hackel 
9116714d8e8SKurt Hackel 		spin_unlock(&dlm->spinlock);
9126714d8e8SKurt Hackel 	}
9136714d8e8SKurt Hackel 	spin_unlock(&dlm_domain_lock);
9146714d8e8SKurt Hackel 
9156714d8e8SKurt Hackel 	return 0;
9166714d8e8SKurt Hackel }
9176714d8e8SKurt Hackel 
918d74c9803SKurt Hackel static int dlm_cancel_join_handler(struct o2net_msg *msg, u32 len, void *data,
919d74c9803SKurt Hackel 				   void **ret_data)
9206714d8e8SKurt Hackel {
9216714d8e8SKurt Hackel 	struct dlm_cancel_join *cancel;
9226714d8e8SKurt Hackel 	struct dlm_ctxt *dlm = NULL;
9236714d8e8SKurt Hackel 
9246714d8e8SKurt Hackel 	cancel = (struct dlm_cancel_join *) msg->buf;
9256714d8e8SKurt Hackel 
9266714d8e8SKurt Hackel 	mlog(0, "node %u cancels join on domain %s\n", cancel->node_idx,
9276714d8e8SKurt Hackel 		  cancel->domain);
9286714d8e8SKurt Hackel 
9296714d8e8SKurt Hackel 	spin_lock(&dlm_domain_lock);
9306714d8e8SKurt Hackel 	dlm = __dlm_lookup_domain_full(cancel->domain, cancel->name_len);
9316714d8e8SKurt Hackel 
9326714d8e8SKurt Hackel 	if (dlm) {
9336714d8e8SKurt Hackel 		spin_lock(&dlm->spinlock);
9346714d8e8SKurt Hackel 
9356714d8e8SKurt Hackel 		/* Yikes, this guy wants to cancel his join. No
9366714d8e8SKurt Hackel 		 * problem, we simply cleanup our join state. */
9376714d8e8SKurt Hackel 		BUG_ON(dlm->joining_node != cancel->node_idx);
9386714d8e8SKurt Hackel 		__dlm_set_joining_node(dlm, DLM_LOCK_RES_OWNER_UNKNOWN);
9396714d8e8SKurt Hackel 
9406714d8e8SKurt Hackel 		spin_unlock(&dlm->spinlock);
9416714d8e8SKurt Hackel 	}
9426714d8e8SKurt Hackel 	spin_unlock(&dlm_domain_lock);
9436714d8e8SKurt Hackel 
9446714d8e8SKurt Hackel 	return 0;
9456714d8e8SKurt Hackel }
9466714d8e8SKurt Hackel 
9476714d8e8SKurt Hackel static int dlm_send_one_join_cancel(struct dlm_ctxt *dlm,
9486714d8e8SKurt Hackel 				    unsigned int node)
9496714d8e8SKurt Hackel {
9506714d8e8SKurt Hackel 	int status;
9516714d8e8SKurt Hackel 	struct dlm_cancel_join cancel_msg;
9526714d8e8SKurt Hackel 
9536714d8e8SKurt Hackel 	memset(&cancel_msg, 0, sizeof(cancel_msg));
9546714d8e8SKurt Hackel 	cancel_msg.node_idx = dlm->node_num;
9556714d8e8SKurt Hackel 	cancel_msg.name_len = strlen(dlm->name);
9566714d8e8SKurt Hackel 	memcpy(cancel_msg.domain, dlm->name, cancel_msg.name_len);
9576714d8e8SKurt Hackel 
9586714d8e8SKurt Hackel 	status = o2net_send_message(DLM_CANCEL_JOIN_MSG, DLM_MOD_KEY,
9596714d8e8SKurt Hackel 				    &cancel_msg, sizeof(cancel_msg), node,
9606714d8e8SKurt Hackel 				    NULL);
9616714d8e8SKurt Hackel 	if (status < 0) {
9626714d8e8SKurt Hackel 		mlog_errno(status);
9636714d8e8SKurt Hackel 		goto bail;
9646714d8e8SKurt Hackel 	}
9656714d8e8SKurt Hackel 
9666714d8e8SKurt Hackel bail:
9676714d8e8SKurt Hackel 	return status;
9686714d8e8SKurt Hackel }
9696714d8e8SKurt Hackel 
9706714d8e8SKurt Hackel /* map_size should be in bytes. */
9716714d8e8SKurt Hackel static int dlm_send_join_cancels(struct dlm_ctxt *dlm,
9726714d8e8SKurt Hackel 				 unsigned long *node_map,
9736714d8e8SKurt Hackel 				 unsigned int map_size)
9746714d8e8SKurt Hackel {
9756714d8e8SKurt Hackel 	int status, tmpstat;
9766714d8e8SKurt Hackel 	unsigned int node;
9776714d8e8SKurt Hackel 
9786714d8e8SKurt Hackel 	if (map_size != (BITS_TO_LONGS(O2NM_MAX_NODES) *
9796714d8e8SKurt Hackel 			 sizeof(unsigned long))) {
9806714d8e8SKurt Hackel 		mlog(ML_ERROR,
9816714d8e8SKurt Hackel 		     "map_size %u != BITS_TO_LONGS(O2NM_MAX_NODES) %u\n",
9823a4780a8SAndrew Morton 		     map_size, (unsigned)BITS_TO_LONGS(O2NM_MAX_NODES));
9836714d8e8SKurt Hackel 		return -EINVAL;
9846714d8e8SKurt Hackel 	}
9856714d8e8SKurt Hackel 
9866714d8e8SKurt Hackel 	status = 0;
9876714d8e8SKurt Hackel 	node = -1;
9886714d8e8SKurt Hackel 	while ((node = find_next_bit(node_map, O2NM_MAX_NODES,
9896714d8e8SKurt Hackel 				     node + 1)) < O2NM_MAX_NODES) {
9906714d8e8SKurt Hackel 		if (node == dlm->node_num)
9916714d8e8SKurt Hackel 			continue;
9926714d8e8SKurt Hackel 
9936714d8e8SKurt Hackel 		tmpstat = dlm_send_one_join_cancel(dlm, node);
9946714d8e8SKurt Hackel 		if (tmpstat) {
9956714d8e8SKurt Hackel 			mlog(ML_ERROR, "Error return %d cancelling join on "
9966714d8e8SKurt Hackel 			     "node %d\n", tmpstat, node);
9976714d8e8SKurt Hackel 			if (!status)
9986714d8e8SKurt Hackel 				status = tmpstat;
9996714d8e8SKurt Hackel 		}
10006714d8e8SKurt Hackel 	}
10016714d8e8SKurt Hackel 
10026714d8e8SKurt Hackel 	if (status)
10036714d8e8SKurt Hackel 		mlog_errno(status);
10046714d8e8SKurt Hackel 	return status;
10056714d8e8SKurt Hackel }
10066714d8e8SKurt Hackel 
10076714d8e8SKurt Hackel static int dlm_request_join(struct dlm_ctxt *dlm,
10086714d8e8SKurt Hackel 			    int node,
1009d24fbcdaSJoel Becker 			    enum dlm_query_join_response_code *response)
10106714d8e8SKurt Hackel {
1011d24fbcdaSJoel Becker 	int status;
10126714d8e8SKurt Hackel 	struct dlm_query_join_request join_msg;
10130f71b7b4SJoel Becker 	struct dlm_query_join_packet packet;
10140f71b7b4SJoel Becker 	u32 join_resp;
10156714d8e8SKurt Hackel 
10166714d8e8SKurt Hackel 	mlog(0, "querying node %d\n", node);
10176714d8e8SKurt Hackel 
10186714d8e8SKurt Hackel 	memset(&join_msg, 0, sizeof(join_msg));
10196714d8e8SKurt Hackel 	join_msg.node_idx = dlm->node_num;
10206714d8e8SKurt Hackel 	join_msg.name_len = strlen(dlm->name);
10216714d8e8SKurt Hackel 	memcpy(join_msg.domain, dlm->name, join_msg.name_len);
1022d24fbcdaSJoel Becker 	join_msg.dlm_proto = dlm->dlm_locking_proto;
1023d24fbcdaSJoel Becker 	join_msg.fs_proto = dlm->fs_locking_proto;
10246714d8e8SKurt Hackel 
10251faf2894SSrinivas Eeda 	/* copy live node map to join message */
10261faf2894SSrinivas Eeda 	byte_copymap(join_msg.node_map, dlm->live_nodes_map, O2NM_MAX_NODES);
10271faf2894SSrinivas Eeda 
10286714d8e8SKurt Hackel 	status = o2net_send_message(DLM_QUERY_JOIN_MSG, DLM_MOD_KEY, &join_msg,
1029d24fbcdaSJoel Becker 				    sizeof(join_msg), node,
10300f71b7b4SJoel Becker 				    &join_resp);
10316714d8e8SKurt Hackel 	if (status < 0 && status != -ENOPROTOOPT) {
10326714d8e8SKurt Hackel 		mlog_errno(status);
10336714d8e8SKurt Hackel 		goto bail;
10346714d8e8SKurt Hackel 	}
10350f71b7b4SJoel Becker 	dlm_query_join_wire_to_packet(join_resp, &packet);
10366714d8e8SKurt Hackel 
10376714d8e8SKurt Hackel 	/* -ENOPROTOOPT from the net code means the other side isn't
10386714d8e8SKurt Hackel 	    listening for our message type -- that's fine, it means
10396714d8e8SKurt Hackel 	    his dlm isn't up, so we can consider him a 'yes' but not
10406714d8e8SKurt Hackel 	    joined into the domain.  */
10416714d8e8SKurt Hackel 	if (status == -ENOPROTOOPT) {
10426714d8e8SKurt Hackel 		status = 0;
10436714d8e8SKurt Hackel 		*response = JOIN_OK_NO_MAP;
10440f71b7b4SJoel Becker 	} else if (packet.code == JOIN_DISALLOW ||
10450f71b7b4SJoel Becker 		   packet.code == JOIN_OK_NO_MAP) {
10460f71b7b4SJoel Becker 		*response = packet.code;
10470f71b7b4SJoel Becker 	} else if (packet.code == JOIN_PROTOCOL_MISMATCH) {
1048d24fbcdaSJoel Becker 		mlog(ML_NOTICE,
1049d24fbcdaSJoel Becker 		     "This node requested DLM locking protocol %u.%u and "
1050d24fbcdaSJoel Becker 		     "filesystem locking protocol %u.%u.  At least one of "
1051d24fbcdaSJoel Becker 		     "the protocol versions on node %d is not compatible, "
1052d24fbcdaSJoel Becker 		     "disconnecting\n",
1053d24fbcdaSJoel Becker 		     dlm->dlm_locking_proto.pv_major,
1054d24fbcdaSJoel Becker 		     dlm->dlm_locking_proto.pv_minor,
1055d24fbcdaSJoel Becker 		     dlm->fs_locking_proto.pv_major,
1056d24fbcdaSJoel Becker 		     dlm->fs_locking_proto.pv_minor,
1057d24fbcdaSJoel Becker 		     node);
1058d24fbcdaSJoel Becker 		status = -EPROTO;
10590f71b7b4SJoel Becker 		*response = packet.code;
10600f71b7b4SJoel Becker 	} else if (packet.code == JOIN_OK) {
10610f71b7b4SJoel Becker 		*response = packet.code;
1062d24fbcdaSJoel Becker 		/* Use the same locking protocol as the remote node */
10630f71b7b4SJoel Becker 		dlm->dlm_locking_proto.pv_minor = packet.dlm_minor;
10640f71b7b4SJoel Becker 		dlm->fs_locking_proto.pv_minor = packet.fs_minor;
1065d24fbcdaSJoel Becker 		mlog(0,
1066d24fbcdaSJoel Becker 		     "Node %d responds JOIN_OK with DLM locking protocol "
1067d24fbcdaSJoel Becker 		     "%u.%u and fs locking protocol %u.%u\n",
1068d24fbcdaSJoel Becker 		     node,
1069d24fbcdaSJoel Becker 		     dlm->dlm_locking_proto.pv_major,
1070d24fbcdaSJoel Becker 		     dlm->dlm_locking_proto.pv_minor,
1071d24fbcdaSJoel Becker 		     dlm->fs_locking_proto.pv_major,
1072d24fbcdaSJoel Becker 		     dlm->fs_locking_proto.pv_minor);
10736714d8e8SKurt Hackel 	} else {
10746714d8e8SKurt Hackel 		status = -EINVAL;
1075d24fbcdaSJoel Becker 		mlog(ML_ERROR, "invalid response %d from node %u\n",
10760f71b7b4SJoel Becker 		     packet.code, node);
10776714d8e8SKurt Hackel 	}
10786714d8e8SKurt Hackel 
10796714d8e8SKurt Hackel 	mlog(0, "status %d, node %d response is %d\n", status, node,
10806714d8e8SKurt Hackel 	     *response);
10816714d8e8SKurt Hackel 
10826714d8e8SKurt Hackel bail:
10836714d8e8SKurt Hackel 	return status;
10846714d8e8SKurt Hackel }
10856714d8e8SKurt Hackel 
10866714d8e8SKurt Hackel static int dlm_send_one_join_assert(struct dlm_ctxt *dlm,
10876714d8e8SKurt Hackel 				    unsigned int node)
10886714d8e8SKurt Hackel {
10896714d8e8SKurt Hackel 	int status;
10906714d8e8SKurt Hackel 	struct dlm_assert_joined assert_msg;
10916714d8e8SKurt Hackel 
10926714d8e8SKurt Hackel 	mlog(0, "Sending join assert to node %u\n", node);
10936714d8e8SKurt Hackel 
10946714d8e8SKurt Hackel 	memset(&assert_msg, 0, sizeof(assert_msg));
10956714d8e8SKurt Hackel 	assert_msg.node_idx = dlm->node_num;
10966714d8e8SKurt Hackel 	assert_msg.name_len = strlen(dlm->name);
10976714d8e8SKurt Hackel 	memcpy(assert_msg.domain, dlm->name, assert_msg.name_len);
10986714d8e8SKurt Hackel 
10996714d8e8SKurt Hackel 	status = o2net_send_message(DLM_ASSERT_JOINED_MSG, DLM_MOD_KEY,
11006714d8e8SKurt Hackel 				    &assert_msg, sizeof(assert_msg), node,
11016714d8e8SKurt Hackel 				    NULL);
11026714d8e8SKurt Hackel 	if (status < 0)
11036714d8e8SKurt Hackel 		mlog_errno(status);
11046714d8e8SKurt Hackel 
11056714d8e8SKurt Hackel 	return status;
11066714d8e8SKurt Hackel }
11076714d8e8SKurt Hackel 
11086714d8e8SKurt Hackel static void dlm_send_join_asserts(struct dlm_ctxt *dlm,
11096714d8e8SKurt Hackel 				  unsigned long *node_map)
11106714d8e8SKurt Hackel {
11116714d8e8SKurt Hackel 	int status, node, live;
11126714d8e8SKurt Hackel 
11136714d8e8SKurt Hackel 	status = 0;
11146714d8e8SKurt Hackel 	node = -1;
11156714d8e8SKurt Hackel 	while ((node = find_next_bit(node_map, O2NM_MAX_NODES,
11166714d8e8SKurt Hackel 				     node + 1)) < O2NM_MAX_NODES) {
11176714d8e8SKurt Hackel 		if (node == dlm->node_num)
11186714d8e8SKurt Hackel 			continue;
11196714d8e8SKurt Hackel 
11206714d8e8SKurt Hackel 		do {
11216714d8e8SKurt Hackel 			/* It is very important that this message be
11226714d8e8SKurt Hackel 			 * received so we spin until either the node
11236714d8e8SKurt Hackel 			 * has died or it gets the message. */
11246714d8e8SKurt Hackel 			status = dlm_send_one_join_assert(dlm, node);
11256714d8e8SKurt Hackel 
11266714d8e8SKurt Hackel 			spin_lock(&dlm->spinlock);
11276714d8e8SKurt Hackel 			live = test_bit(node, dlm->live_nodes_map);
11286714d8e8SKurt Hackel 			spin_unlock(&dlm->spinlock);
11296714d8e8SKurt Hackel 
11306714d8e8SKurt Hackel 			if (status) {
11316714d8e8SKurt Hackel 				mlog(ML_ERROR, "Error return %d asserting "
11326714d8e8SKurt Hackel 				     "join on node %d\n", status, node);
11336714d8e8SKurt Hackel 
11346714d8e8SKurt Hackel 				/* give us some time between errors... */
11356714d8e8SKurt Hackel 				if (live)
11366714d8e8SKurt Hackel 					msleep(DLM_DOMAIN_BACKOFF_MS);
11376714d8e8SKurt Hackel 			}
11386714d8e8SKurt Hackel 		} while (status && live);
11396714d8e8SKurt Hackel 	}
11406714d8e8SKurt Hackel }
11416714d8e8SKurt Hackel 
11426714d8e8SKurt Hackel struct domain_join_ctxt {
11436714d8e8SKurt Hackel 	unsigned long live_map[BITS_TO_LONGS(O2NM_MAX_NODES)];
11446714d8e8SKurt Hackel 	unsigned long yes_resp_map[BITS_TO_LONGS(O2NM_MAX_NODES)];
11456714d8e8SKurt Hackel };
11466714d8e8SKurt Hackel 
11476714d8e8SKurt Hackel static int dlm_should_restart_join(struct dlm_ctxt *dlm,
11486714d8e8SKurt Hackel 				   struct domain_join_ctxt *ctxt,
1149d24fbcdaSJoel Becker 				   enum dlm_query_join_response_code response)
11506714d8e8SKurt Hackel {
11516714d8e8SKurt Hackel 	int ret;
11526714d8e8SKurt Hackel 
11536714d8e8SKurt Hackel 	if (response == JOIN_DISALLOW) {
11546714d8e8SKurt Hackel 		mlog(0, "Latest response of disallow -- should restart\n");
11556714d8e8SKurt Hackel 		return 1;
11566714d8e8SKurt Hackel 	}
11576714d8e8SKurt Hackel 
11586714d8e8SKurt Hackel 	spin_lock(&dlm->spinlock);
11596714d8e8SKurt Hackel 	/* For now, we restart the process if the node maps have
11606714d8e8SKurt Hackel 	 * changed at all */
11616714d8e8SKurt Hackel 	ret = memcmp(ctxt->live_map, dlm->live_nodes_map,
11626714d8e8SKurt Hackel 		     sizeof(dlm->live_nodes_map));
11636714d8e8SKurt Hackel 	spin_unlock(&dlm->spinlock);
11646714d8e8SKurt Hackel 
11656714d8e8SKurt Hackel 	if (ret)
11666714d8e8SKurt Hackel 		mlog(0, "Node maps changed -- should restart\n");
11676714d8e8SKurt Hackel 
11686714d8e8SKurt Hackel 	return ret;
11696714d8e8SKurt Hackel }
11706714d8e8SKurt Hackel 
11716714d8e8SKurt Hackel static int dlm_try_to_join_domain(struct dlm_ctxt *dlm)
11726714d8e8SKurt Hackel {
11736714d8e8SKurt Hackel 	int status = 0, tmpstat, node;
11746714d8e8SKurt Hackel 	struct domain_join_ctxt *ctxt;
1175d24fbcdaSJoel Becker 	enum dlm_query_join_response_code response = JOIN_DISALLOW;
11766714d8e8SKurt Hackel 
11776714d8e8SKurt Hackel 	mlog_entry("%p", dlm);
11786714d8e8SKurt Hackel 
1179cd861280SRobert P. J. Day 	ctxt = kzalloc(sizeof(*ctxt), GFP_KERNEL);
11806714d8e8SKurt Hackel 	if (!ctxt) {
11816714d8e8SKurt Hackel 		status = -ENOMEM;
11826714d8e8SKurt Hackel 		mlog_errno(status);
11836714d8e8SKurt Hackel 		goto bail;
11846714d8e8SKurt Hackel 	}
11856714d8e8SKurt Hackel 
11866714d8e8SKurt Hackel 	/* group sem locking should work for us here -- we're already
11876714d8e8SKurt Hackel 	 * registered for heartbeat events so filling this should be
11886714d8e8SKurt Hackel 	 * atomic wrt getting those handlers called. */
11896714d8e8SKurt Hackel 	o2hb_fill_node_map(dlm->live_nodes_map, sizeof(dlm->live_nodes_map));
11906714d8e8SKurt Hackel 
11916714d8e8SKurt Hackel 	spin_lock(&dlm->spinlock);
11926714d8e8SKurt Hackel 	memcpy(ctxt->live_map, dlm->live_nodes_map, sizeof(ctxt->live_map));
11936714d8e8SKurt Hackel 
11946714d8e8SKurt Hackel 	__dlm_set_joining_node(dlm, dlm->node_num);
11956714d8e8SKurt Hackel 
11966714d8e8SKurt Hackel 	spin_unlock(&dlm->spinlock);
11976714d8e8SKurt Hackel 
11986714d8e8SKurt Hackel 	node = -1;
11996714d8e8SKurt Hackel 	while ((node = find_next_bit(ctxt->live_map, O2NM_MAX_NODES,
12006714d8e8SKurt Hackel 				     node + 1)) < O2NM_MAX_NODES) {
12016714d8e8SKurt Hackel 		if (node == dlm->node_num)
12026714d8e8SKurt Hackel 			continue;
12036714d8e8SKurt Hackel 
12046714d8e8SKurt Hackel 		status = dlm_request_join(dlm, node, &response);
12056714d8e8SKurt Hackel 		if (status < 0) {
12066714d8e8SKurt Hackel 			mlog_errno(status);
12076714d8e8SKurt Hackel 			goto bail;
12086714d8e8SKurt Hackel 		}
12096714d8e8SKurt Hackel 
12106714d8e8SKurt Hackel 		/* Ok, either we got a response or the node doesn't have a
12116714d8e8SKurt Hackel 		 * dlm up. */
12126714d8e8SKurt Hackel 		if (response == JOIN_OK)
12136714d8e8SKurt Hackel 			set_bit(node, ctxt->yes_resp_map);
12146714d8e8SKurt Hackel 
12156714d8e8SKurt Hackel 		if (dlm_should_restart_join(dlm, ctxt, response)) {
12166714d8e8SKurt Hackel 			status = -EAGAIN;
12176714d8e8SKurt Hackel 			goto bail;
12186714d8e8SKurt Hackel 		}
12196714d8e8SKurt Hackel 	}
12206714d8e8SKurt Hackel 
12216714d8e8SKurt Hackel 	mlog(0, "Yay, done querying nodes!\n");
12226714d8e8SKurt Hackel 
12236714d8e8SKurt Hackel 	/* Yay, everyone agree's we can join the domain. My domain is
12246714d8e8SKurt Hackel 	 * comprised of all nodes who were put in the
12256714d8e8SKurt Hackel 	 * yes_resp_map. Copy that into our domain map and send a join
12266714d8e8SKurt Hackel 	 * assert message to clean up everyone elses state. */
12276714d8e8SKurt Hackel 	spin_lock(&dlm->spinlock);
12286714d8e8SKurt Hackel 	memcpy(dlm->domain_map, ctxt->yes_resp_map,
12296714d8e8SKurt Hackel 	       sizeof(ctxt->yes_resp_map));
12306714d8e8SKurt Hackel 	set_bit(dlm->node_num, dlm->domain_map);
12316714d8e8SKurt Hackel 	spin_unlock(&dlm->spinlock);
12326714d8e8SKurt Hackel 
12336714d8e8SKurt Hackel 	dlm_send_join_asserts(dlm, ctxt->yes_resp_map);
12346714d8e8SKurt Hackel 
12356714d8e8SKurt Hackel 	/* Joined state *must* be set before the joining node
12366714d8e8SKurt Hackel 	 * information, otherwise the query_join handler may read no
12376714d8e8SKurt Hackel 	 * current joiner but a state of NEW and tell joining nodes
12386714d8e8SKurt Hackel 	 * we're not in the domain. */
12396714d8e8SKurt Hackel 	spin_lock(&dlm_domain_lock);
12406714d8e8SKurt Hackel 	dlm->dlm_state = DLM_CTXT_JOINED;
12416714d8e8SKurt Hackel 	dlm->num_joins++;
12426714d8e8SKurt Hackel 	spin_unlock(&dlm_domain_lock);
12436714d8e8SKurt Hackel 
12446714d8e8SKurt Hackel bail:
12456714d8e8SKurt Hackel 	spin_lock(&dlm->spinlock);
12466714d8e8SKurt Hackel 	__dlm_set_joining_node(dlm, DLM_LOCK_RES_OWNER_UNKNOWN);
12476714d8e8SKurt Hackel 	if (!status)
12486714d8e8SKurt Hackel 		__dlm_print_nodes(dlm);
12496714d8e8SKurt Hackel 	spin_unlock(&dlm->spinlock);
12506714d8e8SKurt Hackel 
12516714d8e8SKurt Hackel 	if (ctxt) {
12526714d8e8SKurt Hackel 		/* Do we need to send a cancel message to any nodes? */
12536714d8e8SKurt Hackel 		if (status < 0) {
12546714d8e8SKurt Hackel 			tmpstat = dlm_send_join_cancels(dlm,
12556714d8e8SKurt Hackel 							ctxt->yes_resp_map,
12566714d8e8SKurt Hackel 							sizeof(ctxt->yes_resp_map));
12576714d8e8SKurt Hackel 			if (tmpstat < 0)
12586714d8e8SKurt Hackel 				mlog_errno(tmpstat);
12596714d8e8SKurt Hackel 		}
12606714d8e8SKurt Hackel 		kfree(ctxt);
12616714d8e8SKurt Hackel 	}
12626714d8e8SKurt Hackel 
12636714d8e8SKurt Hackel 	mlog(0, "returning %d\n", status);
12646714d8e8SKurt Hackel 	return status;
12656714d8e8SKurt Hackel }
12666714d8e8SKurt Hackel 
12676714d8e8SKurt Hackel static void dlm_unregister_domain_handlers(struct dlm_ctxt *dlm)
12686714d8e8SKurt Hackel {
126914829422SJoel Becker 	o2hb_unregister_callback(NULL, &dlm->dlm_hb_up);
127014829422SJoel Becker 	o2hb_unregister_callback(NULL, &dlm->dlm_hb_down);
12716714d8e8SKurt Hackel 	o2net_unregister_handler_list(&dlm->dlm_domain_handlers);
12726714d8e8SKurt Hackel }
12736714d8e8SKurt Hackel 
12746714d8e8SKurt Hackel static int dlm_register_domain_handlers(struct dlm_ctxt *dlm)
12756714d8e8SKurt Hackel {
12766714d8e8SKurt Hackel 	int status;
12776714d8e8SKurt Hackel 
12786714d8e8SKurt Hackel 	mlog(0, "registering handlers.\n");
12796714d8e8SKurt Hackel 
12806714d8e8SKurt Hackel 	o2hb_setup_callback(&dlm->dlm_hb_down, O2HB_NODE_DOWN_CB,
12816714d8e8SKurt Hackel 			    dlm_hb_node_down_cb, dlm, DLM_HB_NODE_DOWN_PRI);
128214829422SJoel Becker 	status = o2hb_register_callback(NULL, &dlm->dlm_hb_down);
12836714d8e8SKurt Hackel 	if (status)
12846714d8e8SKurt Hackel 		goto bail;
12856714d8e8SKurt Hackel 
12866714d8e8SKurt Hackel 	o2hb_setup_callback(&dlm->dlm_hb_up, O2HB_NODE_UP_CB,
12876714d8e8SKurt Hackel 			    dlm_hb_node_up_cb, dlm, DLM_HB_NODE_UP_PRI);
128814829422SJoel Becker 	status = o2hb_register_callback(NULL, &dlm->dlm_hb_up);
12896714d8e8SKurt Hackel 	if (status)
12906714d8e8SKurt Hackel 		goto bail;
12916714d8e8SKurt Hackel 
12926714d8e8SKurt Hackel 	status = o2net_register_handler(DLM_MASTER_REQUEST_MSG, dlm->key,
12936714d8e8SKurt Hackel 					sizeof(struct dlm_master_request),
12946714d8e8SKurt Hackel 					dlm_master_request_handler,
1295d74c9803SKurt Hackel 					dlm, NULL, &dlm->dlm_domain_handlers);
12966714d8e8SKurt Hackel 	if (status)
12976714d8e8SKurt Hackel 		goto bail;
12986714d8e8SKurt Hackel 
12996714d8e8SKurt Hackel 	status = o2net_register_handler(DLM_ASSERT_MASTER_MSG, dlm->key,
13006714d8e8SKurt Hackel 					sizeof(struct dlm_assert_master),
13016714d8e8SKurt Hackel 					dlm_assert_master_handler,
13023b8118cfSKurt Hackel 					dlm, dlm_assert_master_post_handler,
13033b8118cfSKurt Hackel 					&dlm->dlm_domain_handlers);
13046714d8e8SKurt Hackel 	if (status)
13056714d8e8SKurt Hackel 		goto bail;
13066714d8e8SKurt Hackel 
13076714d8e8SKurt Hackel 	status = o2net_register_handler(DLM_CREATE_LOCK_MSG, dlm->key,
13086714d8e8SKurt Hackel 					sizeof(struct dlm_create_lock),
13096714d8e8SKurt Hackel 					dlm_create_lock_handler,
1310d74c9803SKurt Hackel 					dlm, NULL, &dlm->dlm_domain_handlers);
13116714d8e8SKurt Hackel 	if (status)
13126714d8e8SKurt Hackel 		goto bail;
13136714d8e8SKurt Hackel 
13146714d8e8SKurt Hackel 	status = o2net_register_handler(DLM_CONVERT_LOCK_MSG, dlm->key,
13156714d8e8SKurt Hackel 					DLM_CONVERT_LOCK_MAX_LEN,
13166714d8e8SKurt Hackel 					dlm_convert_lock_handler,
1317d74c9803SKurt Hackel 					dlm, NULL, &dlm->dlm_domain_handlers);
13186714d8e8SKurt Hackel 	if (status)
13196714d8e8SKurt Hackel 		goto bail;
13206714d8e8SKurt Hackel 
13216714d8e8SKurt Hackel 	status = o2net_register_handler(DLM_UNLOCK_LOCK_MSG, dlm->key,
13226714d8e8SKurt Hackel 					DLM_UNLOCK_LOCK_MAX_LEN,
13236714d8e8SKurt Hackel 					dlm_unlock_lock_handler,
1324d74c9803SKurt Hackel 					dlm, NULL, &dlm->dlm_domain_handlers);
13256714d8e8SKurt Hackel 	if (status)
13266714d8e8SKurt Hackel 		goto bail;
13276714d8e8SKurt Hackel 
13286714d8e8SKurt Hackel 	status = o2net_register_handler(DLM_PROXY_AST_MSG, dlm->key,
13296714d8e8SKurt Hackel 					DLM_PROXY_AST_MAX_LEN,
13306714d8e8SKurt Hackel 					dlm_proxy_ast_handler,
1331d74c9803SKurt Hackel 					dlm, NULL, &dlm->dlm_domain_handlers);
13326714d8e8SKurt Hackel 	if (status)
13336714d8e8SKurt Hackel 		goto bail;
13346714d8e8SKurt Hackel 
13356714d8e8SKurt Hackel 	status = o2net_register_handler(DLM_EXIT_DOMAIN_MSG, dlm->key,
13366714d8e8SKurt Hackel 					sizeof(struct dlm_exit_domain),
13376714d8e8SKurt Hackel 					dlm_exit_domain_handler,
1338d74c9803SKurt Hackel 					dlm, NULL, &dlm->dlm_domain_handlers);
13396714d8e8SKurt Hackel 	if (status)
13406714d8e8SKurt Hackel 		goto bail;
13416714d8e8SKurt Hackel 
1342ba2bf218SKurt Hackel 	status = o2net_register_handler(DLM_DEREF_LOCKRES_MSG, dlm->key,
1343ba2bf218SKurt Hackel 					sizeof(struct dlm_deref_lockres),
1344ba2bf218SKurt Hackel 					dlm_deref_lockres_handler,
1345d74c9803SKurt Hackel 					dlm, NULL, &dlm->dlm_domain_handlers);
1346ba2bf218SKurt Hackel 	if (status)
1347ba2bf218SKurt Hackel 		goto bail;
1348ba2bf218SKurt Hackel 
13496714d8e8SKurt Hackel 	status = o2net_register_handler(DLM_MIGRATE_REQUEST_MSG, dlm->key,
13506714d8e8SKurt Hackel 					sizeof(struct dlm_migrate_request),
13516714d8e8SKurt Hackel 					dlm_migrate_request_handler,
1352d74c9803SKurt Hackel 					dlm, NULL, &dlm->dlm_domain_handlers);
13536714d8e8SKurt Hackel 	if (status)
13546714d8e8SKurt Hackel 		goto bail;
13556714d8e8SKurt Hackel 
13566714d8e8SKurt Hackel 	status = o2net_register_handler(DLM_MIG_LOCKRES_MSG, dlm->key,
13576714d8e8SKurt Hackel 					DLM_MIG_LOCKRES_MAX_LEN,
13586714d8e8SKurt Hackel 					dlm_mig_lockres_handler,
1359d74c9803SKurt Hackel 					dlm, NULL, &dlm->dlm_domain_handlers);
13606714d8e8SKurt Hackel 	if (status)
13616714d8e8SKurt Hackel 		goto bail;
13626714d8e8SKurt Hackel 
13636714d8e8SKurt Hackel 	status = o2net_register_handler(DLM_MASTER_REQUERY_MSG, dlm->key,
13646714d8e8SKurt Hackel 					sizeof(struct dlm_master_requery),
13656714d8e8SKurt Hackel 					dlm_master_requery_handler,
1366d74c9803SKurt Hackel 					dlm, NULL, &dlm->dlm_domain_handlers);
13676714d8e8SKurt Hackel 	if (status)
13686714d8e8SKurt Hackel 		goto bail;
13696714d8e8SKurt Hackel 
13706714d8e8SKurt Hackel 	status = o2net_register_handler(DLM_LOCK_REQUEST_MSG, dlm->key,
13716714d8e8SKurt Hackel 					sizeof(struct dlm_lock_request),
13726714d8e8SKurt Hackel 					dlm_request_all_locks_handler,
1373d74c9803SKurt Hackel 					dlm, NULL, &dlm->dlm_domain_handlers);
13746714d8e8SKurt Hackel 	if (status)
13756714d8e8SKurt Hackel 		goto bail;
13766714d8e8SKurt Hackel 
13776714d8e8SKurt Hackel 	status = o2net_register_handler(DLM_RECO_DATA_DONE_MSG, dlm->key,
13786714d8e8SKurt Hackel 					sizeof(struct dlm_reco_data_done),
13796714d8e8SKurt Hackel 					dlm_reco_data_done_handler,
1380d74c9803SKurt Hackel 					dlm, NULL, &dlm->dlm_domain_handlers);
13816714d8e8SKurt Hackel 	if (status)
13826714d8e8SKurt Hackel 		goto bail;
13836714d8e8SKurt Hackel 
13846714d8e8SKurt Hackel 	status = o2net_register_handler(DLM_BEGIN_RECO_MSG, dlm->key,
13856714d8e8SKurt Hackel 					sizeof(struct dlm_begin_reco),
13866714d8e8SKurt Hackel 					dlm_begin_reco_handler,
1387d74c9803SKurt Hackel 					dlm, NULL, &dlm->dlm_domain_handlers);
13886714d8e8SKurt Hackel 	if (status)
13896714d8e8SKurt Hackel 		goto bail;
13906714d8e8SKurt Hackel 
13916714d8e8SKurt Hackel 	status = o2net_register_handler(DLM_FINALIZE_RECO_MSG, dlm->key,
13926714d8e8SKurt Hackel 					sizeof(struct dlm_finalize_reco),
13936714d8e8SKurt Hackel 					dlm_finalize_reco_handler,
1394d74c9803SKurt Hackel 					dlm, NULL, &dlm->dlm_domain_handlers);
13956714d8e8SKurt Hackel 	if (status)
13966714d8e8SKurt Hackel 		goto bail;
13976714d8e8SKurt Hackel 
13986714d8e8SKurt Hackel bail:
13996714d8e8SKurt Hackel 	if (status)
14006714d8e8SKurt Hackel 		dlm_unregister_domain_handlers(dlm);
14016714d8e8SKurt Hackel 
14026714d8e8SKurt Hackel 	return status;
14036714d8e8SKurt Hackel }
14046714d8e8SKurt Hackel 
14056714d8e8SKurt Hackel static int dlm_join_domain(struct dlm_ctxt *dlm)
14066714d8e8SKurt Hackel {
14076714d8e8SKurt Hackel 	int status;
14080dd82141SSunil Mushran 	unsigned int backoff;
14090dd82141SSunil Mushran 	unsigned int total_backoff = 0;
14106714d8e8SKurt Hackel 
14116714d8e8SKurt Hackel 	BUG_ON(!dlm);
14126714d8e8SKurt Hackel 
14136714d8e8SKurt Hackel 	mlog(0, "Join domain %s\n", dlm->name);
14146714d8e8SKurt Hackel 
14156714d8e8SKurt Hackel 	status = dlm_register_domain_handlers(dlm);
14166714d8e8SKurt Hackel 	if (status) {
14176714d8e8SKurt Hackel 		mlog_errno(status);
14186714d8e8SKurt Hackel 		goto bail;
14196714d8e8SKurt Hackel 	}
14206714d8e8SKurt Hackel 
14216714d8e8SKurt Hackel 	status = dlm_launch_thread(dlm);
14226714d8e8SKurt Hackel 	if (status < 0) {
14236714d8e8SKurt Hackel 		mlog_errno(status);
14246714d8e8SKurt Hackel 		goto bail;
14256714d8e8SKurt Hackel 	}
14266714d8e8SKurt Hackel 
14276714d8e8SKurt Hackel 	status = dlm_launch_recovery_thread(dlm);
14286714d8e8SKurt Hackel 	if (status < 0) {
14296714d8e8SKurt Hackel 		mlog_errno(status);
14306714d8e8SKurt Hackel 		goto bail;
14316714d8e8SKurt Hackel 	}
14326714d8e8SKurt Hackel 
14333156d267SKurt Hackel 	dlm->dlm_worker = create_singlethread_workqueue("dlm_wq");
14343156d267SKurt Hackel 	if (!dlm->dlm_worker) {
14353156d267SKurt Hackel 		status = -ENOMEM;
14363156d267SKurt Hackel 		mlog_errno(status);
14373156d267SKurt Hackel 		goto bail;
14383156d267SKurt Hackel 	}
14393156d267SKurt Hackel 
14406714d8e8SKurt Hackel 	do {
14416714d8e8SKurt Hackel 		status = dlm_try_to_join_domain(dlm);
14426714d8e8SKurt Hackel 
14436714d8e8SKurt Hackel 		/* If we're racing another node to the join, then we
14446714d8e8SKurt Hackel 		 * need to back off temporarily and let them
14456714d8e8SKurt Hackel 		 * complete. */
14460dd82141SSunil Mushran #define	DLM_JOIN_TIMEOUT_MSECS	90000
14476714d8e8SKurt Hackel 		if (status == -EAGAIN) {
14486714d8e8SKurt Hackel 			if (signal_pending(current)) {
14496714d8e8SKurt Hackel 				status = -ERESTARTSYS;
14506714d8e8SKurt Hackel 				goto bail;
14516714d8e8SKurt Hackel 			}
14526714d8e8SKurt Hackel 
14530dd82141SSunil Mushran 			if (total_backoff >
14540dd82141SSunil Mushran 			    msecs_to_jiffies(DLM_JOIN_TIMEOUT_MSECS)) {
14550dd82141SSunil Mushran 				status = -ERESTARTSYS;
14560dd82141SSunil Mushran 				mlog(ML_NOTICE, "Timed out joining dlm domain "
14570dd82141SSunil Mushran 				     "%s after %u msecs\n", dlm->name,
14580dd82141SSunil Mushran 				     jiffies_to_msecs(total_backoff));
14590dd82141SSunil Mushran 				goto bail;
14600dd82141SSunil Mushran 			}
14610dd82141SSunil Mushran 
14626714d8e8SKurt Hackel 			/*
14636714d8e8SKurt Hackel 			 * <chip> After you!
14646714d8e8SKurt Hackel 			 * <dale> No, after you!
14656714d8e8SKurt Hackel 			 * <chip> I insist!
14666714d8e8SKurt Hackel 			 * <dale> But you first!
14676714d8e8SKurt Hackel 			 * ...
14686714d8e8SKurt Hackel 			 */
14696714d8e8SKurt Hackel 			backoff = (unsigned int)(jiffies & 0x3);
14706714d8e8SKurt Hackel 			backoff *= DLM_DOMAIN_BACKOFF_MS;
14710dd82141SSunil Mushran 			total_backoff += backoff;
14726714d8e8SKurt Hackel 			mlog(0, "backoff %d\n", backoff);
14736714d8e8SKurt Hackel 			msleep(backoff);
14746714d8e8SKurt Hackel 		}
14756714d8e8SKurt Hackel 	} while (status == -EAGAIN);
14766714d8e8SKurt Hackel 
14776714d8e8SKurt Hackel 	if (status < 0) {
14786714d8e8SKurt Hackel 		mlog_errno(status);
14796714d8e8SKurt Hackel 		goto bail;
14806714d8e8SKurt Hackel 	}
14816714d8e8SKurt Hackel 
14826714d8e8SKurt Hackel 	status = 0;
14836714d8e8SKurt Hackel bail:
14846714d8e8SKurt Hackel 	wake_up(&dlm_domain_events);
14856714d8e8SKurt Hackel 
14866714d8e8SKurt Hackel 	if (status) {
14876714d8e8SKurt Hackel 		dlm_unregister_domain_handlers(dlm);
14886714d8e8SKurt Hackel 		dlm_complete_thread(dlm);
14896714d8e8SKurt Hackel 		dlm_complete_recovery_thread(dlm);
14903156d267SKurt Hackel 		dlm_destroy_dlm_worker(dlm);
14916714d8e8SKurt Hackel 	}
14926714d8e8SKurt Hackel 
14936714d8e8SKurt Hackel 	return status;
14946714d8e8SKurt Hackel }
14956714d8e8SKurt Hackel 
14966714d8e8SKurt Hackel static struct dlm_ctxt *dlm_alloc_ctxt(const char *domain,
14976714d8e8SKurt Hackel 				u32 key)
14986714d8e8SKurt Hackel {
14996714d8e8SKurt Hackel 	int i;
15006325b4a2SSunil Mushran 	int ret;
15016714d8e8SKurt Hackel 	struct dlm_ctxt *dlm = NULL;
15026714d8e8SKurt Hackel 
1503cd861280SRobert P. J. Day 	dlm = kzalloc(sizeof(*dlm), GFP_KERNEL);
15046714d8e8SKurt Hackel 	if (!dlm) {
15056714d8e8SKurt Hackel 		mlog_errno(-ENOMEM);
15066714d8e8SKurt Hackel 		goto leave;
15076714d8e8SKurt Hackel 	}
15086714d8e8SKurt Hackel 
15096714d8e8SKurt Hackel 	dlm->name = kmalloc(strlen(domain) + 1, GFP_KERNEL);
15106714d8e8SKurt Hackel 	if (dlm->name == NULL) {
15116714d8e8SKurt Hackel 		mlog_errno(-ENOMEM);
15126714d8e8SKurt Hackel 		kfree(dlm);
15136714d8e8SKurt Hackel 		dlm = NULL;
15146714d8e8SKurt Hackel 		goto leave;
15156714d8e8SKurt Hackel 	}
15166714d8e8SKurt Hackel 
151703d864c0SDaniel Phillips 	dlm->lockres_hash = (struct hlist_head **)dlm_alloc_pagevec(DLM_HASH_PAGES);
151881f2094aSMark Fasheh 	if (!dlm->lockres_hash) {
15196714d8e8SKurt Hackel 		mlog_errno(-ENOMEM);
15206714d8e8SKurt Hackel 		kfree(dlm->name);
15216714d8e8SKurt Hackel 		kfree(dlm);
15226714d8e8SKurt Hackel 		dlm = NULL;
15236714d8e8SKurt Hackel 		goto leave;
15246714d8e8SKurt Hackel 	}
15256714d8e8SKurt Hackel 
152681f2094aSMark Fasheh 	for (i = 0; i < DLM_HASH_BUCKETS; i++)
152703d864c0SDaniel Phillips 		INIT_HLIST_HEAD(dlm_lockres_hash(dlm, i));
15286714d8e8SKurt Hackel 
15296714d8e8SKurt Hackel 	strcpy(dlm->name, domain);
15306714d8e8SKurt Hackel 	dlm->key = key;
15316714d8e8SKurt Hackel 	dlm->node_num = o2nm_this_node();
15326714d8e8SKurt Hackel 
15336325b4a2SSunil Mushran 	ret = dlm_create_debugfs_subroot(dlm);
15346325b4a2SSunil Mushran 	if (ret < 0) {
15356325b4a2SSunil Mushran 		dlm_free_pagevec((void **)dlm->lockres_hash, DLM_HASH_PAGES);
15366325b4a2SSunil Mushran 		kfree(dlm->name);
15376325b4a2SSunil Mushran 		kfree(dlm);
15386325b4a2SSunil Mushran 		dlm = NULL;
15396325b4a2SSunil Mushran 		goto leave;
15406325b4a2SSunil Mushran 	}
15416325b4a2SSunil Mushran 
15426714d8e8SKurt Hackel 	spin_lock_init(&dlm->spinlock);
15436714d8e8SKurt Hackel 	spin_lock_init(&dlm->master_lock);
15446714d8e8SKurt Hackel 	spin_lock_init(&dlm->ast_lock);
15456714d8e8SKurt Hackel 	INIT_LIST_HEAD(&dlm->list);
15466714d8e8SKurt Hackel 	INIT_LIST_HEAD(&dlm->dirty_list);
15476714d8e8SKurt Hackel 	INIT_LIST_HEAD(&dlm->reco.resources);
15486714d8e8SKurt Hackel 	INIT_LIST_HEAD(&dlm->reco.received);
15496714d8e8SKurt Hackel 	INIT_LIST_HEAD(&dlm->reco.node_data);
15506714d8e8SKurt Hackel 	INIT_LIST_HEAD(&dlm->purge_list);
15516714d8e8SKurt Hackel 	INIT_LIST_HEAD(&dlm->dlm_domain_handlers);
155229576f8bSSunil Mushran 	INIT_LIST_HEAD(&dlm->tracking_list);
15536714d8e8SKurt Hackel 	dlm->reco.state = 0;
15546714d8e8SKurt Hackel 
15556714d8e8SKurt Hackel 	INIT_LIST_HEAD(&dlm->pending_asts);
15566714d8e8SKurt Hackel 	INIT_LIST_HEAD(&dlm->pending_basts);
15576714d8e8SKurt Hackel 
15586714d8e8SKurt Hackel 	mlog(0, "dlm->recovery_map=%p, &(dlm->recovery_map[0])=%p\n",
15596714d8e8SKurt Hackel 		  dlm->recovery_map, &(dlm->recovery_map[0]));
15606714d8e8SKurt Hackel 
15616714d8e8SKurt Hackel 	memset(dlm->recovery_map, 0, sizeof(dlm->recovery_map));
15626714d8e8SKurt Hackel 	memset(dlm->live_nodes_map, 0, sizeof(dlm->live_nodes_map));
15636714d8e8SKurt Hackel 	memset(dlm->domain_map, 0, sizeof(dlm->domain_map));
15646714d8e8SKurt Hackel 
15656714d8e8SKurt Hackel 	dlm->dlm_thread_task = NULL;
15666714d8e8SKurt Hackel 	dlm->dlm_reco_thread_task = NULL;
15673156d267SKurt Hackel 	dlm->dlm_worker = NULL;
15686714d8e8SKurt Hackel 	init_waitqueue_head(&dlm->dlm_thread_wq);
15696714d8e8SKurt Hackel 	init_waitqueue_head(&dlm->dlm_reco_thread_wq);
15706714d8e8SKurt Hackel 	init_waitqueue_head(&dlm->reco.event);
15716714d8e8SKurt Hackel 	init_waitqueue_head(&dlm->ast_wq);
15726714d8e8SKurt Hackel 	init_waitqueue_head(&dlm->migration_wq);
15736714d8e8SKurt Hackel 	INIT_LIST_HEAD(&dlm->master_list);
15746714d8e8SKurt Hackel 	INIT_LIST_HEAD(&dlm->mle_hb_events);
15756714d8e8SKurt Hackel 
15766714d8e8SKurt Hackel 	dlm->joining_node = DLM_LOCK_RES_OWNER_UNKNOWN;
15776714d8e8SKurt Hackel 	init_waitqueue_head(&dlm->dlm_join_events);
15786714d8e8SKurt Hackel 
15796714d8e8SKurt Hackel 	dlm->reco.new_master = O2NM_INVALID_NODE_NUM;
15806714d8e8SKurt Hackel 	dlm->reco.dead_node = O2NM_INVALID_NODE_NUM;
15816714d8e8SKurt Hackel 	atomic_set(&dlm->local_resources, 0);
15826714d8e8SKurt Hackel 	atomic_set(&dlm->remote_resources, 0);
15836714d8e8SKurt Hackel 	atomic_set(&dlm->unknown_resources, 0);
15846714d8e8SKurt Hackel 
15856714d8e8SKurt Hackel 	spin_lock_init(&dlm->work_lock);
15866714d8e8SKurt Hackel 	INIT_LIST_HEAD(&dlm->work_list);
1587c4028958SDavid Howells 	INIT_WORK(&dlm->dispatched_work, dlm_dispatch_work);
15886714d8e8SKurt Hackel 
15896714d8e8SKurt Hackel 	kref_init(&dlm->dlm_refs);
15906714d8e8SKurt Hackel 	dlm->dlm_state = DLM_CTXT_NEW;
15916714d8e8SKurt Hackel 
15926714d8e8SKurt Hackel 	INIT_LIST_HEAD(&dlm->dlm_eviction_callbacks);
15936714d8e8SKurt Hackel 
15946714d8e8SKurt Hackel 	mlog(0, "context init: refcount %u\n",
15956714d8e8SKurt Hackel 		  atomic_read(&dlm->dlm_refs.refcount));
15966714d8e8SKurt Hackel 
15976714d8e8SKurt Hackel leave:
15986714d8e8SKurt Hackel 	return dlm;
15996714d8e8SKurt Hackel }
16006714d8e8SKurt Hackel 
16016714d8e8SKurt Hackel /*
1602d24fbcdaSJoel Becker  * Compare a requested locking protocol version against the current one.
1603d24fbcdaSJoel Becker  *
1604d24fbcdaSJoel Becker  * If the major numbers are different, they are incompatible.
1605d24fbcdaSJoel Becker  * If the current minor is greater than the request, they are incompatible.
1606d24fbcdaSJoel Becker  * If the current minor is less than or equal to the request, they are
1607d24fbcdaSJoel Becker  * compatible, and the requester should run at the current minor version.
1608d24fbcdaSJoel Becker  */
1609d24fbcdaSJoel Becker static int dlm_protocol_compare(struct dlm_protocol_version *existing,
1610d24fbcdaSJoel Becker 				struct dlm_protocol_version *request)
1611d24fbcdaSJoel Becker {
1612d24fbcdaSJoel Becker 	if (existing->pv_major != request->pv_major)
1613d24fbcdaSJoel Becker 		return 1;
1614d24fbcdaSJoel Becker 
1615d24fbcdaSJoel Becker 	if (existing->pv_minor > request->pv_minor)
1616d24fbcdaSJoel Becker 		return 1;
1617d24fbcdaSJoel Becker 
1618d24fbcdaSJoel Becker 	if (existing->pv_minor < request->pv_minor)
1619d24fbcdaSJoel Becker 		request->pv_minor = existing->pv_minor;
1620d24fbcdaSJoel Becker 
1621d24fbcdaSJoel Becker 	return 0;
1622d24fbcdaSJoel Becker }
1623d24fbcdaSJoel Becker 
1624d24fbcdaSJoel Becker /*
1625d24fbcdaSJoel Becker  * dlm_register_domain: one-time setup per "domain".
1626d24fbcdaSJoel Becker  *
1627d24fbcdaSJoel Becker  * The filesystem passes in the requested locking version via proto.
1628d24fbcdaSJoel Becker  * If registration was successful, proto will contain the negotiated
1629d24fbcdaSJoel Becker  * locking protocol.
16306714d8e8SKurt Hackel  */
16316714d8e8SKurt Hackel struct dlm_ctxt * dlm_register_domain(const char *domain,
1632d24fbcdaSJoel Becker 			       u32 key,
1633d24fbcdaSJoel Becker 			       struct dlm_protocol_version *fs_proto)
16346714d8e8SKurt Hackel {
16356714d8e8SKurt Hackel 	int ret;
16366714d8e8SKurt Hackel 	struct dlm_ctxt *dlm = NULL;
16376714d8e8SKurt Hackel 	struct dlm_ctxt *new_ctxt = NULL;
16386714d8e8SKurt Hackel 
16396714d8e8SKurt Hackel 	if (strlen(domain) > O2NM_MAX_NAME_LEN) {
16406714d8e8SKurt Hackel 		ret = -ENAMETOOLONG;
16416714d8e8SKurt Hackel 		mlog(ML_ERROR, "domain name length too long\n");
16426714d8e8SKurt Hackel 		goto leave;
16436714d8e8SKurt Hackel 	}
16446714d8e8SKurt Hackel 
16456714d8e8SKurt Hackel 	if (!o2hb_check_local_node_heartbeating()) {
16466714d8e8SKurt Hackel 		mlog(ML_ERROR, "the local node has not been configured, or is "
16476714d8e8SKurt Hackel 		     "not heartbeating\n");
16486714d8e8SKurt Hackel 		ret = -EPROTO;
16496714d8e8SKurt Hackel 		goto leave;
16506714d8e8SKurt Hackel 	}
16516714d8e8SKurt Hackel 
16526714d8e8SKurt Hackel 	mlog(0, "register called for domain \"%s\"\n", domain);
16536714d8e8SKurt Hackel 
16546714d8e8SKurt Hackel retry:
16556714d8e8SKurt Hackel 	dlm = NULL;
16566714d8e8SKurt Hackel 	if (signal_pending(current)) {
16576714d8e8SKurt Hackel 		ret = -ERESTARTSYS;
16586714d8e8SKurt Hackel 		mlog_errno(ret);
16596714d8e8SKurt Hackel 		goto leave;
16606714d8e8SKurt Hackel 	}
16616714d8e8SKurt Hackel 
16626714d8e8SKurt Hackel 	spin_lock(&dlm_domain_lock);
16636714d8e8SKurt Hackel 
16646714d8e8SKurt Hackel 	dlm = __dlm_lookup_domain(domain);
16656714d8e8SKurt Hackel 	if (dlm) {
16666714d8e8SKurt Hackel 		if (dlm->dlm_state != DLM_CTXT_JOINED) {
16676714d8e8SKurt Hackel 			spin_unlock(&dlm_domain_lock);
16686714d8e8SKurt Hackel 
16696714d8e8SKurt Hackel 			mlog(0, "This ctxt is not joined yet!\n");
16706714d8e8SKurt Hackel 			wait_event_interruptible(dlm_domain_events,
16716714d8e8SKurt Hackel 						 dlm_wait_on_domain_helper(
16726714d8e8SKurt Hackel 							 domain));
16736714d8e8SKurt Hackel 			goto retry;
16746714d8e8SKurt Hackel 		}
16756714d8e8SKurt Hackel 
1676d24fbcdaSJoel Becker 		if (dlm_protocol_compare(&dlm->fs_locking_proto, fs_proto)) {
1677d24fbcdaSJoel Becker 			mlog(ML_ERROR,
1678d24fbcdaSJoel Becker 			     "Requested locking protocol version is not "
1679d24fbcdaSJoel Becker 			     "compatible with already registered domain "
1680d24fbcdaSJoel Becker 			     "\"%s\"\n", domain);
1681d24fbcdaSJoel Becker 			ret = -EPROTO;
1682d24fbcdaSJoel Becker 			goto leave;
1683d24fbcdaSJoel Becker 		}
1684d24fbcdaSJoel Becker 
16856714d8e8SKurt Hackel 		__dlm_get(dlm);
16866714d8e8SKurt Hackel 		dlm->num_joins++;
16876714d8e8SKurt Hackel 
16886714d8e8SKurt Hackel 		spin_unlock(&dlm_domain_lock);
16896714d8e8SKurt Hackel 
16906714d8e8SKurt Hackel 		ret = 0;
16916714d8e8SKurt Hackel 		goto leave;
16926714d8e8SKurt Hackel 	}
16936714d8e8SKurt Hackel 
16946714d8e8SKurt Hackel 	/* doesn't exist */
16956714d8e8SKurt Hackel 	if (!new_ctxt) {
16966714d8e8SKurt Hackel 		spin_unlock(&dlm_domain_lock);
16976714d8e8SKurt Hackel 
16986714d8e8SKurt Hackel 		new_ctxt = dlm_alloc_ctxt(domain, key);
16996714d8e8SKurt Hackel 		if (new_ctxt)
17006714d8e8SKurt Hackel 			goto retry;
17016714d8e8SKurt Hackel 
17026714d8e8SKurt Hackel 		ret = -ENOMEM;
17036714d8e8SKurt Hackel 		mlog_errno(ret);
17046714d8e8SKurt Hackel 		goto leave;
17056714d8e8SKurt Hackel 	}
17066714d8e8SKurt Hackel 
17076714d8e8SKurt Hackel 	/* a little variable switch-a-roo here... */
17086714d8e8SKurt Hackel 	dlm = new_ctxt;
17096714d8e8SKurt Hackel 	new_ctxt = NULL;
17106714d8e8SKurt Hackel 
17116714d8e8SKurt Hackel 	/* add the new domain */
17126714d8e8SKurt Hackel 	list_add_tail(&dlm->list, &dlm_domains);
17136714d8e8SKurt Hackel 	spin_unlock(&dlm_domain_lock);
17146714d8e8SKurt Hackel 
1715d24fbcdaSJoel Becker 	/*
1716d24fbcdaSJoel Becker 	 * Pass the locking protocol version into the join.  If the join
1717d24fbcdaSJoel Becker 	 * succeeds, it will have the negotiated protocol set.
1718d24fbcdaSJoel Becker 	 */
1719d24fbcdaSJoel Becker 	dlm->dlm_locking_proto = dlm_protocol;
1720d24fbcdaSJoel Becker 	dlm->fs_locking_proto = *fs_proto;
1721d24fbcdaSJoel Becker 
17226714d8e8SKurt Hackel 	ret = dlm_join_domain(dlm);
17236714d8e8SKurt Hackel 	if (ret) {
17246714d8e8SKurt Hackel 		mlog_errno(ret);
17256714d8e8SKurt Hackel 		dlm_put(dlm);
17266714d8e8SKurt Hackel 		goto leave;
17276714d8e8SKurt Hackel 	}
17286714d8e8SKurt Hackel 
1729d24fbcdaSJoel Becker 	/* Tell the caller what locking protocol we negotiated */
1730d24fbcdaSJoel Becker 	*fs_proto = dlm->fs_locking_proto;
1731d24fbcdaSJoel Becker 
17326714d8e8SKurt Hackel 	ret = 0;
17336714d8e8SKurt Hackel leave:
17346714d8e8SKurt Hackel 	if (new_ctxt)
17356714d8e8SKurt Hackel 		dlm_free_ctxt_mem(new_ctxt);
17366714d8e8SKurt Hackel 
17376714d8e8SKurt Hackel 	if (ret < 0)
17386714d8e8SKurt Hackel 		dlm = ERR_PTR(ret);
17396714d8e8SKurt Hackel 
17406714d8e8SKurt Hackel 	return dlm;
17416714d8e8SKurt Hackel }
17426714d8e8SKurt Hackel EXPORT_SYMBOL_GPL(dlm_register_domain);
17436714d8e8SKurt Hackel 
17446714d8e8SKurt Hackel static LIST_HEAD(dlm_join_handlers);
17456714d8e8SKurt Hackel 
17466714d8e8SKurt Hackel static void dlm_unregister_net_handlers(void)
17476714d8e8SKurt Hackel {
17486714d8e8SKurt Hackel 	o2net_unregister_handler_list(&dlm_join_handlers);
17496714d8e8SKurt Hackel }
17506714d8e8SKurt Hackel 
17516714d8e8SKurt Hackel static int dlm_register_net_handlers(void)
17526714d8e8SKurt Hackel {
17536714d8e8SKurt Hackel 	int status = 0;
17546714d8e8SKurt Hackel 
17556714d8e8SKurt Hackel 	status = o2net_register_handler(DLM_QUERY_JOIN_MSG, DLM_MOD_KEY,
17566714d8e8SKurt Hackel 					sizeof(struct dlm_query_join_request),
17576714d8e8SKurt Hackel 					dlm_query_join_handler,
1758d74c9803SKurt Hackel 					NULL, NULL, &dlm_join_handlers);
17596714d8e8SKurt Hackel 	if (status)
17606714d8e8SKurt Hackel 		goto bail;
17616714d8e8SKurt Hackel 
17626714d8e8SKurt Hackel 	status = o2net_register_handler(DLM_ASSERT_JOINED_MSG, DLM_MOD_KEY,
17636714d8e8SKurt Hackel 					sizeof(struct dlm_assert_joined),
17646714d8e8SKurt Hackel 					dlm_assert_joined_handler,
1765d74c9803SKurt Hackel 					NULL, NULL, &dlm_join_handlers);
17666714d8e8SKurt Hackel 	if (status)
17676714d8e8SKurt Hackel 		goto bail;
17686714d8e8SKurt Hackel 
17696714d8e8SKurt Hackel 	status = o2net_register_handler(DLM_CANCEL_JOIN_MSG, DLM_MOD_KEY,
17706714d8e8SKurt Hackel 					sizeof(struct dlm_cancel_join),
17716714d8e8SKurt Hackel 					dlm_cancel_join_handler,
1772d74c9803SKurt Hackel 					NULL, NULL, &dlm_join_handlers);
17736714d8e8SKurt Hackel 
17746714d8e8SKurt Hackel bail:
17756714d8e8SKurt Hackel 	if (status < 0)
17766714d8e8SKurt Hackel 		dlm_unregister_net_handlers();
17776714d8e8SKurt Hackel 
17786714d8e8SKurt Hackel 	return status;
17796714d8e8SKurt Hackel }
17806714d8e8SKurt Hackel 
17816714d8e8SKurt Hackel /* Domain eviction callback handling.
17826714d8e8SKurt Hackel  *
17836714d8e8SKurt Hackel  * The file system requires notification of node death *before* the
17846714d8e8SKurt Hackel  * dlm completes it's recovery work, otherwise it may be able to
17856714d8e8SKurt Hackel  * acquire locks on resources requiring recovery. Since the dlm can
17866714d8e8SKurt Hackel  * evict a node from it's domain *before* heartbeat fires, a similar
17876714d8e8SKurt Hackel  * mechanism is required. */
17886714d8e8SKurt Hackel 
17896714d8e8SKurt Hackel /* Eviction is not expected to happen often, so a per-domain lock is
17906714d8e8SKurt Hackel  * not necessary. Eviction callbacks are allowed to sleep for short
17916714d8e8SKurt Hackel  * periods of time. */
17926714d8e8SKurt Hackel static DECLARE_RWSEM(dlm_callback_sem);
17936714d8e8SKurt Hackel 
17946714d8e8SKurt Hackel void dlm_fire_domain_eviction_callbacks(struct dlm_ctxt *dlm,
17956714d8e8SKurt Hackel 					int node_num)
17966714d8e8SKurt Hackel {
17976714d8e8SKurt Hackel 	struct list_head *iter;
17986714d8e8SKurt Hackel 	struct dlm_eviction_cb *cb;
17996714d8e8SKurt Hackel 
18006714d8e8SKurt Hackel 	down_read(&dlm_callback_sem);
18016714d8e8SKurt Hackel 	list_for_each(iter, &dlm->dlm_eviction_callbacks) {
18026714d8e8SKurt Hackel 		cb = list_entry(iter, struct dlm_eviction_cb, ec_item);
18036714d8e8SKurt Hackel 
18046714d8e8SKurt Hackel 		cb->ec_func(node_num, cb->ec_data);
18056714d8e8SKurt Hackel 	}
18066714d8e8SKurt Hackel 	up_read(&dlm_callback_sem);
18076714d8e8SKurt Hackel }
18086714d8e8SKurt Hackel 
18096714d8e8SKurt Hackel void dlm_setup_eviction_cb(struct dlm_eviction_cb *cb,
18106714d8e8SKurt Hackel 			   dlm_eviction_func *f,
18116714d8e8SKurt Hackel 			   void *data)
18126714d8e8SKurt Hackel {
18136714d8e8SKurt Hackel 	INIT_LIST_HEAD(&cb->ec_item);
18146714d8e8SKurt Hackel 	cb->ec_func = f;
18156714d8e8SKurt Hackel 	cb->ec_data = data;
18166714d8e8SKurt Hackel }
18176714d8e8SKurt Hackel EXPORT_SYMBOL_GPL(dlm_setup_eviction_cb);
18186714d8e8SKurt Hackel 
18196714d8e8SKurt Hackel void dlm_register_eviction_cb(struct dlm_ctxt *dlm,
18206714d8e8SKurt Hackel 			      struct dlm_eviction_cb *cb)
18216714d8e8SKurt Hackel {
18226714d8e8SKurt Hackel 	down_write(&dlm_callback_sem);
18236714d8e8SKurt Hackel 	list_add_tail(&cb->ec_item, &dlm->dlm_eviction_callbacks);
18246714d8e8SKurt Hackel 	up_write(&dlm_callback_sem);
18256714d8e8SKurt Hackel }
18266714d8e8SKurt Hackel EXPORT_SYMBOL_GPL(dlm_register_eviction_cb);
18276714d8e8SKurt Hackel 
18286714d8e8SKurt Hackel void dlm_unregister_eviction_cb(struct dlm_eviction_cb *cb)
18296714d8e8SKurt Hackel {
18306714d8e8SKurt Hackel 	down_write(&dlm_callback_sem);
18316714d8e8SKurt Hackel 	list_del_init(&cb->ec_item);
18326714d8e8SKurt Hackel 	up_write(&dlm_callback_sem);
18336714d8e8SKurt Hackel }
18346714d8e8SKurt Hackel EXPORT_SYMBOL_GPL(dlm_unregister_eviction_cb);
18356714d8e8SKurt Hackel 
18366714d8e8SKurt Hackel static int __init dlm_init(void)
18376714d8e8SKurt Hackel {
18386714d8e8SKurt Hackel 	int status;
18396714d8e8SKurt Hackel 
18406714d8e8SKurt Hackel 	dlm_print_version();
18416714d8e8SKurt Hackel 
18426714d8e8SKurt Hackel 	status = dlm_init_mle_cache();
184312eb0035SSunil Mushran 	if (status) {
184412eb0035SSunil Mushran 		mlog(ML_ERROR, "Could not create o2dlm_mle slabcache\n");
1845724bdca9SSunil Mushran 		goto error;
1846724bdca9SSunil Mushran 	}
1847724bdca9SSunil Mushran 
1848724bdca9SSunil Mushran 	status = dlm_init_master_caches();
1849724bdca9SSunil Mushran 	if (status) {
1850724bdca9SSunil Mushran 		mlog(ML_ERROR, "Could not create o2dlm_lockres and "
1851724bdca9SSunil Mushran 		     "o2dlm_lockname slabcaches\n");
1852724bdca9SSunil Mushran 		goto error;
1853724bdca9SSunil Mushran 	}
1854724bdca9SSunil Mushran 
1855724bdca9SSunil Mushran 	status = dlm_init_lock_cache();
1856724bdca9SSunil Mushran 	if (status) {
1857724bdca9SSunil Mushran 		mlog(ML_ERROR, "Count not create o2dlm_lock slabcache\n");
1858724bdca9SSunil Mushran 		goto error;
185912eb0035SSunil Mushran 	}
18606714d8e8SKurt Hackel 
18616714d8e8SKurt Hackel 	status = dlm_register_net_handlers();
18626714d8e8SKurt Hackel 	if (status) {
1863724bdca9SSunil Mushran 		mlog(ML_ERROR, "Unable to register network handlers\n");
1864724bdca9SSunil Mushran 		goto error;
18656714d8e8SKurt Hackel 	}
18666714d8e8SKurt Hackel 
18676325b4a2SSunil Mushran 	status = dlm_create_debugfs_root();
18686325b4a2SSunil Mushran 	if (status)
18696325b4a2SSunil Mushran 		goto error;
18706325b4a2SSunil Mushran 
18716714d8e8SKurt Hackel 	return 0;
1872724bdca9SSunil Mushran error:
18736325b4a2SSunil Mushran 	dlm_unregister_net_handlers();
1874724bdca9SSunil Mushran 	dlm_destroy_lock_cache();
1875724bdca9SSunil Mushran 	dlm_destroy_master_caches();
1876724bdca9SSunil Mushran 	dlm_destroy_mle_cache();
1877724bdca9SSunil Mushran 	return -1;
18786714d8e8SKurt Hackel }
18796714d8e8SKurt Hackel 
18806714d8e8SKurt Hackel static void __exit dlm_exit (void)
18816714d8e8SKurt Hackel {
18826325b4a2SSunil Mushran 	dlm_destroy_debugfs_root();
18836714d8e8SKurt Hackel 	dlm_unregister_net_handlers();
1884724bdca9SSunil Mushran 	dlm_destroy_lock_cache();
1885724bdca9SSunil Mushran 	dlm_destroy_master_caches();
18866714d8e8SKurt Hackel 	dlm_destroy_mle_cache();
18876714d8e8SKurt Hackel }
18886714d8e8SKurt Hackel 
18896714d8e8SKurt Hackel MODULE_AUTHOR("Oracle");
18906714d8e8SKurt Hackel MODULE_LICENSE("GPL");
18916714d8e8SKurt Hackel 
18926714d8e8SKurt Hackel module_init(dlm_init);
18936714d8e8SKurt Hackel module_exit(dlm_exit);
1894