drbd: allow read requests to be retried after force-detach
[deliverable/linux.git] / drivers / block / drbd / drbd_nl.c
CommitLineData
b411b363
PR
1/*
2 drbd_nl.c
3
4 This file is part of DRBD by Philipp Reisner and Lars Ellenberg.
5
6 Copyright (C) 2001-2008, LINBIT Information Technologies GmbH.
7 Copyright (C) 1999-2008, Philipp Reisner <philipp.reisner@linbit.com>.
8 Copyright (C) 2002-2008, Lars Ellenberg <lars.ellenberg@linbit.com>.
9
10 drbd is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 2, or (at your option)
13 any later version.
14
15 drbd is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
19
20 You should have received a copy of the GNU General Public License
21 along with drbd; see the file COPYING. If not, write to
22 the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA.
23
24 */
25
b411b363
PR
26#include <linux/module.h>
27#include <linux/drbd.h>
28#include <linux/in.h>
29#include <linux/fs.h>
30#include <linux/file.h>
31#include <linux/slab.h>
b411b363
PR
32#include <linux/blkpg.h>
33#include <linux/cpumask.h>
34#include "drbd_int.h"
265be2d0 35#include "drbd_req.h"
b411b363
PR
36#include "drbd_wrappers.h"
37#include <asm/unaligned.h>
b411b363 38#include <linux/drbd_limits.h>
87f7be4c 39#include <linux/kthread.h>
b411b363 40
3b98c0c2
LE
41#include <net/genetlink.h>
42
43/* .doit */
44// int drbd_adm_create_resource(struct sk_buff *skb, struct genl_info *info);
45// int drbd_adm_delete_resource(struct sk_buff *skb, struct genl_info *info);
46
47int drbd_adm_add_minor(struct sk_buff *skb, struct genl_info *info);
48int drbd_adm_delete_minor(struct sk_buff *skb, struct genl_info *info);
49
789c1b62
AG
50int drbd_adm_new_resource(struct sk_buff *skb, struct genl_info *info);
51int drbd_adm_del_resource(struct sk_buff *skb, struct genl_info *info);
85f75dd7 52int drbd_adm_down(struct sk_buff *skb, struct genl_info *info);
3b98c0c2
LE
53
54int drbd_adm_set_role(struct sk_buff *skb, struct genl_info *info);
55int drbd_adm_attach(struct sk_buff *skb, struct genl_info *info);
f399002e 56int drbd_adm_disk_opts(struct sk_buff *skb, struct genl_info *info);
3b98c0c2
LE
57int drbd_adm_detach(struct sk_buff *skb, struct genl_info *info);
58int drbd_adm_connect(struct sk_buff *skb, struct genl_info *info);
f399002e 59int drbd_adm_net_opts(struct sk_buff *skb, struct genl_info *info);
3b98c0c2
LE
60int drbd_adm_resize(struct sk_buff *skb, struct genl_info *info);
61int drbd_adm_start_ov(struct sk_buff *skb, struct genl_info *info);
62int drbd_adm_new_c_uuid(struct sk_buff *skb, struct genl_info *info);
63int drbd_adm_disconnect(struct sk_buff *skb, struct genl_info *info);
64int drbd_adm_invalidate(struct sk_buff *skb, struct genl_info *info);
65int drbd_adm_invalidate_peer(struct sk_buff *skb, struct genl_info *info);
66int drbd_adm_pause_sync(struct sk_buff *skb, struct genl_info *info);
67int drbd_adm_resume_sync(struct sk_buff *skb, struct genl_info *info);
68int drbd_adm_suspend_io(struct sk_buff *skb, struct genl_info *info);
69int drbd_adm_resume_io(struct sk_buff *skb, struct genl_info *info);
70int drbd_adm_outdate(struct sk_buff *skb, struct genl_info *info);
f399002e 71int drbd_adm_resource_opts(struct sk_buff *skb, struct genl_info *info);
3b98c0c2
LE
72int drbd_adm_get_status(struct sk_buff *skb, struct genl_info *info);
73int drbd_adm_get_timeout_type(struct sk_buff *skb, struct genl_info *info);
74/* .dumpit */
75int drbd_adm_get_status_all(struct sk_buff *skb, struct netlink_callback *cb);
76
77#include <linux/drbd_genl_api.h>
01b39b50 78#include "drbd_nla.h"
3b98c0c2
LE
79#include <linux/genl_magic_func.h>
80
81/* used blkdev_get_by_path, to claim our meta data device(s) */
b411b363
PR
82static char *drbd_m_holder = "Hands off! this is DRBD's meta data device.";
83
3b98c0c2
LE
84/* Configuration is strictly serialized, because generic netlink message
85 * processing is strictly serialized by the genl_lock().
86 * Which means we can use one static global drbd_config_context struct.
87 */
88static struct drbd_config_context {
89 /* assigned from drbd_genlmsghdr */
90 unsigned int minor;
91 /* assigned from request attributes, if present */
92 unsigned int volume;
93#define VOLUME_UNSPECIFIED (-1U)
94 /* pointer into the request skb,
95 * limited lifetime! */
7c3063cc 96 char *resource_name;
089c075d
AG
97 struct nlattr *my_addr;
98 struct nlattr *peer_addr;
3b98c0c2
LE
99
100 /* reply buffer */
101 struct sk_buff *reply_skb;
102 /* pointer into reply buffer */
103 struct drbd_genlmsghdr *reply_dh;
104 /* resolved from attributes, if possible */
105 struct drbd_conf *mdev;
106 struct drbd_tconn *tconn;
107} adm_ctx;
108
109static void drbd_adm_send_reply(struct sk_buff *skb, struct genl_info *info)
110{
111 genlmsg_end(skb, genlmsg_data(nlmsg_data(nlmsg_hdr(skb))));
112 if (genlmsg_reply(skb, info))
113 printk(KERN_ERR "drbd: error sending genl reply\n");
b411b363 114}
3b98c0c2
LE
115
116/* Used on a fresh "drbd_adm_prepare"d reply_skb, this cannot fail: The only
117 * reason it could fail was no space in skb, and there are 4k available. */
8432b314 118int drbd_msg_put_info(const char *info)
3b98c0c2
LE
119{
120 struct sk_buff *skb = adm_ctx.reply_skb;
121 struct nlattr *nla;
122 int err = -EMSGSIZE;
123
124 if (!info || !info[0])
125 return 0;
126
127 nla = nla_nest_start(skb, DRBD_NLA_CFG_REPLY);
128 if (!nla)
129 return err;
130
131 err = nla_put_string(skb, T_info_text, info);
132 if (err) {
133 nla_nest_cancel(skb, nla);
134 return err;
135 } else
136 nla_nest_end(skb, nla);
137 return 0;
b411b363
PR
138}
139
3b98c0c2
LE
140/* This would be a good candidate for a "pre_doit" hook,
141 * and per-family private info->pointers.
142 * But we need to stay compatible with older kernels.
143 * If it returns successfully, adm_ctx members are valid.
144 */
145#define DRBD_ADM_NEED_MINOR 1
44e52cfa 146#define DRBD_ADM_NEED_RESOURCE 2
089c075d 147#define DRBD_ADM_NEED_CONNECTION 4
3b98c0c2
LE
148static int drbd_adm_prepare(struct sk_buff *skb, struct genl_info *info,
149 unsigned flags)
150{
151 struct drbd_genlmsghdr *d_in = info->userhdr;
152 const u8 cmd = info->genlhdr->cmd;
153 int err;
154
155 memset(&adm_ctx, 0, sizeof(adm_ctx));
156
157 /* genl_rcv_msg only checks for CAP_NET_ADMIN on "GENL_ADMIN_PERM" :( */
158 if (cmd != DRBD_ADM_GET_STATUS
159 && security_netlink_recv(skb, CAP_SYS_ADMIN))
160 return -EPERM;
161
162 adm_ctx.reply_skb = genlmsg_new(NLMSG_GOODSIZE, GFP_KERNEL);
1e2a2551
AG
163 if (!adm_ctx.reply_skb) {
164 err = -ENOMEM;
3b98c0c2 165 goto fail;
1e2a2551 166 }
3b98c0c2
LE
167
168 adm_ctx.reply_dh = genlmsg_put_reply(adm_ctx.reply_skb,
169 info, &drbd_genl_family, 0, cmd);
170 /* put of a few bytes into a fresh skb of >= 4k will always succeed.
171 * but anyways */
1e2a2551
AG
172 if (!adm_ctx.reply_dh) {
173 err = -ENOMEM;
3b98c0c2 174 goto fail;
1e2a2551 175 }
3b98c0c2
LE
176
177 adm_ctx.reply_dh->minor = d_in->minor;
178 adm_ctx.reply_dh->ret_code = NO_ERROR;
179
089c075d 180 adm_ctx.volume = VOLUME_UNSPECIFIED;
3b98c0c2
LE
181 if (info->attrs[DRBD_NLA_CFG_CONTEXT]) {
182 struct nlattr *nla;
183 /* parse and validate only */
f399002e 184 err = drbd_cfg_context_from_attrs(NULL, info);
3b98c0c2
LE
185 if (err)
186 goto fail;
187
188 /* It was present, and valid,
189 * copy it over to the reply skb. */
190 err = nla_put_nohdr(adm_ctx.reply_skb,
191 info->attrs[DRBD_NLA_CFG_CONTEXT]->nla_len,
192 info->attrs[DRBD_NLA_CFG_CONTEXT]);
193 if (err)
194 goto fail;
195
196 /* and assign stuff to the global adm_ctx */
197 nla = nested_attr_tb[__nla_type(T_ctx_volume)];
089c075d
AG
198 if (nla)
199 adm_ctx.volume = nla_get_u32(nla);
7c3063cc 200 nla = nested_attr_tb[__nla_type(T_ctx_resource_name)];
3b98c0c2 201 if (nla)
7c3063cc 202 adm_ctx.resource_name = nla_data(nla);
089c075d
AG
203 adm_ctx.my_addr = nested_attr_tb[__nla_type(T_ctx_my_addr)];
204 adm_ctx.peer_addr = nested_attr_tb[__nla_type(T_ctx_peer_addr)];
205 if ((adm_ctx.my_addr &&
206 nla_len(adm_ctx.my_addr) > sizeof(adm_ctx.tconn->my_addr)) ||
207 (adm_ctx.peer_addr &&
208 nla_len(adm_ctx.peer_addr) > sizeof(adm_ctx.tconn->peer_addr))) {
209 err = -EINVAL;
210 goto fail;
211 }
212 }
3b98c0c2
LE
213
214 adm_ctx.minor = d_in->minor;
215 adm_ctx.mdev = minor_to_mdev(d_in->minor);
7c3063cc 216 adm_ctx.tconn = conn_get_by_name(adm_ctx.resource_name);
3b98c0c2
LE
217
218 if (!adm_ctx.mdev && (flags & DRBD_ADM_NEED_MINOR)) {
219 drbd_msg_put_info("unknown minor");
220 return ERR_MINOR_INVALID;
221 }
44e52cfa
AG
222 if (!adm_ctx.tconn && (flags & DRBD_ADM_NEED_RESOURCE)) {
223 drbd_msg_put_info("unknown resource");
3b98c0c2
LE
224 return ERR_INVALID_REQUEST;
225 }
226
089c075d
AG
227 if (flags & DRBD_ADM_NEED_CONNECTION) {
228 if (adm_ctx.tconn && !(flags & DRBD_ADM_NEED_RESOURCE)) {
229 drbd_msg_put_info("no resource name expected");
230 return ERR_INVALID_REQUEST;
231 }
232 if (adm_ctx.mdev) {
233 drbd_msg_put_info("no minor number expected");
234 return ERR_INVALID_REQUEST;
235 }
236 if (adm_ctx.my_addr && adm_ctx.peer_addr)
237 adm_ctx.tconn = conn_get_by_addrs(nla_data(adm_ctx.my_addr),
238 nla_len(adm_ctx.my_addr),
239 nla_data(adm_ctx.peer_addr),
240 nla_len(adm_ctx.peer_addr));
241 if (!adm_ctx.tconn) {
242 drbd_msg_put_info("unknown connection");
243 return ERR_INVALID_REQUEST;
244 }
245 }
246
3b98c0c2 247 /* some more paranoia, if the request was over-determined */
527f4b24
LE
248 if (adm_ctx.mdev && adm_ctx.tconn &&
249 adm_ctx.mdev->tconn != adm_ctx.tconn) {
44e52cfa 250 pr_warning("request: minor=%u, resource=%s; but that minor belongs to connection %s\n",
7c3063cc
AG
251 adm_ctx.minor, adm_ctx.resource_name,
252 adm_ctx.mdev->tconn->name);
44e52cfa 253 drbd_msg_put_info("minor exists in different resource");
527f4b24
LE
254 return ERR_INVALID_REQUEST;
255 }
3b98c0c2
LE
256 if (adm_ctx.mdev &&
257 adm_ctx.volume != VOLUME_UNSPECIFIED &&
258 adm_ctx.volume != adm_ctx.mdev->vnr) {
259 pr_warning("request: minor=%u, volume=%u; but that minor is volume %u in %s\n",
260 adm_ctx.minor, adm_ctx.volume,
261 adm_ctx.mdev->vnr, adm_ctx.mdev->tconn->name);
527f4b24 262 drbd_msg_put_info("minor exists as different volume");
3b98c0c2
LE
263 return ERR_INVALID_REQUEST;
264 }
0ace9dfa 265
3b98c0c2
LE
266 return NO_ERROR;
267
268fail:
269 nlmsg_free(adm_ctx.reply_skb);
270 adm_ctx.reply_skb = NULL;
1e2a2551 271 return err;
3b98c0c2
LE
272}
273
274static int drbd_adm_finish(struct genl_info *info, int retcode)
275{
0ace9dfa
PR
276 if (adm_ctx.tconn) {
277 kref_put(&adm_ctx.tconn->kref, &conn_destroy);
278 adm_ctx.tconn = NULL;
279 }
280
3b98c0c2
LE
281 if (!adm_ctx.reply_skb)
282 return -ENOMEM;
283
284 adm_ctx.reply_dh->ret_code = retcode;
3b98c0c2
LE
285 drbd_adm_send_reply(adm_ctx.reply_skb, info);
286 return 0;
287}
b411b363 288
6b75dced 289static void setup_khelper_env(struct drbd_tconn *tconn, char **envp)
b411b363 290{
6b75dced 291 char *afs;
b411b363 292
089c075d
AG
293 /* FIXME: A future version will not allow this case. */
294 if (tconn->my_addr_len == 0 || tconn->peer_addr_len == 0)
295 return;
296
297 switch (((struct sockaddr *)&tconn->peer_addr)->sa_family) {
298 case AF_INET6:
299 afs = "ipv6";
300 snprintf(envp[4], 60, "DRBD_PEER_ADDRESS=%pI6",
301 &((struct sockaddr_in6 *)&tconn->peer_addr)->sin6_addr);
302 break;
303 case AF_INET:
304 afs = "ipv4";
305 snprintf(envp[4], 60, "DRBD_PEER_ADDRESS=%pI4",
306 &((struct sockaddr_in *)&tconn->peer_addr)->sin_addr);
307 break;
308 default:
309 afs = "ssocks";
310 snprintf(envp[4], 60, "DRBD_PEER_ADDRESS=%pI4",
311 &((struct sockaddr_in *)&tconn->peer_addr)->sin_addr);
b411b363 312 }
089c075d 313 snprintf(envp[3], 20, "DRBD_PEER_AF=%s", afs);
6b75dced
PR
314}
315
316int drbd_khelper(struct drbd_conf *mdev, char *cmd)
317{
318 char *envp[] = { "HOME=/",
319 "TERM=linux",
320 "PATH=/sbin:/usr/sbin:/bin:/usr/bin",
321 (char[20]) { }, /* address family */
322 (char[60]) { }, /* address */
323 NULL };
324 char mb[12];
325 char *argv[] = {usermode_helper, cmd, mb, NULL };
326 struct sib_info sib;
327 int ret;
328
329 snprintf(mb, 12, "minor-%d", mdev_to_minor(mdev));
330 setup_khelper_env(mdev->tconn, envp);
b411b363 331
1090c056
LE
332 /* The helper may take some time.
333 * write out any unsynced meta data changes now */
334 drbd_md_sync(mdev);
335
b411b363 336 dev_info(DEV, "helper command: %s %s %s\n", usermode_helper, cmd, mb);
3b98c0c2
LE
337 sib.sib_reason = SIB_HELPER_PRE;
338 sib.helper_name = cmd;
339 drbd_bcast_event(mdev, &sib);
b411b363
PR
340 ret = call_usermodehelper(usermode_helper, argv, envp, 1);
341 if (ret)
342 dev_warn(DEV, "helper command: %s %s %s exit code %u (0x%x)\n",
343 usermode_helper, cmd, mb,
344 (ret >> 8) & 0xff, ret);
345 else
346 dev_info(DEV, "helper command: %s %s %s exit code %u (0x%x)\n",
347 usermode_helper, cmd, mb,
348 (ret >> 8) & 0xff, ret);
3b98c0c2
LE
349 sib.sib_reason = SIB_HELPER_POST;
350 sib.helper_exit_code = ret;
351 drbd_bcast_event(mdev, &sib);
b411b363
PR
352
353 if (ret < 0) /* Ignore any ERRNOs we got. */
354 ret = 0;
355
356 return ret;
357}
358
6b75dced
PR
359static void conn_md_sync(struct drbd_tconn *tconn)
360{
361 struct drbd_conf *mdev;
e90285e0 362 int vnr;
6b75dced 363
c141ebda
PR
364 rcu_read_lock();
365 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
366 kref_get(&mdev->kref);
367 rcu_read_unlock();
6b75dced 368 drbd_md_sync(mdev);
c141ebda
PR
369 kref_put(&mdev->kref, &drbd_minor_destroy);
370 rcu_read_lock();
371 }
372 rcu_read_unlock();
6b75dced
PR
373}
374
375int conn_khelper(struct drbd_tconn *tconn, char *cmd)
376{
377 char *envp[] = { "HOME=/",
378 "TERM=linux",
379 "PATH=/sbin:/usr/sbin:/bin:/usr/bin",
380 (char[20]) { }, /* address family */
381 (char[60]) { }, /* address */
382 NULL };
383 char *argv[] = {usermode_helper, cmd, tconn->name, NULL };
384 int ret;
385
386 setup_khelper_env(tconn, envp);
387 conn_md_sync(tconn);
388
389 conn_info(tconn, "helper command: %s %s %s\n", usermode_helper, cmd, tconn->name);
390 /* TODO: conn_bcast_event() ?? */
391
392 ret = call_usermodehelper(usermode_helper, argv, envp, 1);
393 if (ret)
394 conn_warn(tconn, "helper command: %s %s %s exit code %u (0x%x)\n",
395 usermode_helper, cmd, tconn->name,
396 (ret >> 8) & 0xff, ret);
397 else
398 conn_info(tconn, "helper command: %s %s %s exit code %u (0x%x)\n",
399 usermode_helper, cmd, tconn->name,
400 (ret >> 8) & 0xff, ret);
401 /* TODO: conn_bcast_event() ?? */
402
403 if (ret < 0) /* Ignore any ERRNOs we got. */
404 ret = 0;
405
406 return ret;
407}
408
cb703454 409static enum drbd_fencing_p highest_fencing_policy(struct drbd_tconn *tconn)
b411b363 410{
cb703454
PR
411 enum drbd_fencing_p fp = FP_NOT_AVAIL;
412 struct drbd_conf *mdev;
413 int vnr;
414
695d08fa 415 rcu_read_lock();
cb703454
PR
416 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
417 if (get_ldev_if_state(mdev, D_CONSISTENT)) {
daeda1cc
PR
418 fp = max_t(enum drbd_fencing_p, fp,
419 rcu_dereference(mdev->ldev->disk_conf)->fencing);
cb703454
PR
420 put_ldev(mdev);
421 }
422 }
695d08fa 423 rcu_read_unlock();
cb703454
PR
424
425 return fp;
426}
427
428bool conn_try_outdate_peer(struct drbd_tconn *tconn)
429{
430 union drbd_state mask = { };
431 union drbd_state val = { };
432 enum drbd_fencing_p fp;
b411b363
PR
433 char *ex_to_string;
434 int r;
b411b363 435
cb703454
PR
436 if (tconn->cstate >= C_WF_REPORT_PARAMS) {
437 conn_err(tconn, "Expected cstate < C_WF_REPORT_PARAMS\n");
438 return false;
439 }
b411b363 440
cb703454
PR
441 fp = highest_fencing_policy(tconn);
442 switch (fp) {
443 case FP_NOT_AVAIL:
444 conn_warn(tconn, "Not fencing peer, I'm not even Consistent myself.\n");
fb22c402 445 goto out;
cb703454
PR
446 case FP_DONT_CARE:
447 return true;
448 default: ;
b411b363
PR
449 }
450
cb703454 451 r = conn_khelper(tconn, "fence-peer");
b411b363
PR
452
453 switch ((r>>8) & 0xff) {
454 case 3: /* peer is inconsistent */
455 ex_to_string = "peer is inconsistent or worse";
cb703454
PR
456 mask.pdsk = D_MASK;
457 val.pdsk = D_INCONSISTENT;
b411b363
PR
458 break;
459 case 4: /* peer got outdated, or was already outdated */
460 ex_to_string = "peer was fenced";
cb703454
PR
461 mask.pdsk = D_MASK;
462 val.pdsk = D_OUTDATED;
b411b363
PR
463 break;
464 case 5: /* peer was down */
cb703454 465 if (conn_highest_disk(tconn) == D_UP_TO_DATE) {
b411b363
PR
466 /* we will(have) create(d) a new UUID anyways... */
467 ex_to_string = "peer is unreachable, assumed to be dead";
cb703454
PR
468 mask.pdsk = D_MASK;
469 val.pdsk = D_OUTDATED;
b411b363
PR
470 } else {
471 ex_to_string = "peer unreachable, doing nothing since disk != UpToDate";
b411b363
PR
472 }
473 break;
474 case 6: /* Peer is primary, voluntarily outdate myself.
475 * This is useful when an unconnected R_SECONDARY is asked to
476 * become R_PRIMARY, but finds the other peer being active. */
477 ex_to_string = "peer is active";
cb703454
PR
478 conn_warn(tconn, "Peer is primary, outdating myself.\n");
479 mask.disk = D_MASK;
480 val.disk = D_OUTDATED;
b411b363
PR
481 break;
482 case 7:
483 if (fp != FP_STONITH)
cb703454 484 conn_err(tconn, "fence-peer() = 7 && fencing != Stonith !!!\n");
b411b363 485 ex_to_string = "peer was stonithed";
cb703454
PR
486 mask.pdsk = D_MASK;
487 val.pdsk = D_OUTDATED;
b411b363
PR
488 break;
489 default:
490 /* The script is broken ... */
cb703454
PR
491 conn_err(tconn, "fence-peer helper broken, returned %d\n", (r>>8)&0xff);
492 return false; /* Eventually leave IO frozen */
b411b363
PR
493 }
494
cb703454
PR
495 conn_info(tconn, "fence-peer helper returned %d (%s)\n",
496 (r>>8) & 0xff, ex_to_string);
fb22c402 497
cb703454 498 out:
fb22c402 499
cb703454
PR
500 /* Not using
501 conn_request_state(tconn, mask, val, CS_VERBOSE);
502 here, because we might were able to re-establish the connection in the
503 meantime. */
504 spin_lock_irq(&tconn->req_lock);
a1096a6e 505 if (tconn->cstate < C_WF_REPORT_PARAMS && !test_bit(STATE_SENT, &tconn->flags))
cb703454
PR
506 _conn_request_state(tconn, mask, val, CS_VERBOSE);
507 spin_unlock_irq(&tconn->req_lock);
508
509 return conn_highest_pdsk(tconn) <= D_OUTDATED;
b411b363
PR
510}
511
87f7be4c
PR
512static int _try_outdate_peer_async(void *data)
513{
cb703454 514 struct drbd_tconn *tconn = (struct drbd_tconn *)data;
87f7be4c 515
cb703454 516 conn_try_outdate_peer(tconn);
87f7be4c 517
9dc9fbb3 518 kref_put(&tconn->kref, &conn_destroy);
87f7be4c
PR
519 return 0;
520}
521
cb703454 522void conn_try_outdate_peer_async(struct drbd_tconn *tconn)
87f7be4c
PR
523{
524 struct task_struct *opa;
525
9dc9fbb3 526 kref_get(&tconn->kref);
cb703454 527 opa = kthread_run(_try_outdate_peer_async, tconn, "drbd_async_h");
9dc9fbb3 528 if (IS_ERR(opa)) {
cb703454 529 conn_err(tconn, "out of mem, failed to invoke fence-peer helper\n");
9dc9fbb3
PR
530 kref_put(&tconn->kref, &conn_destroy);
531 }
87f7be4c 532}
b411b363 533
bf885f8a
AG
534enum drbd_state_rv
535drbd_set_role(struct drbd_conf *mdev, enum drbd_role new_role, int force)
b411b363
PR
536{
537 const int max_tries = 4;
bf885f8a 538 enum drbd_state_rv rv = SS_UNKNOWN_ERROR;
44ed167d 539 struct net_conf *nc;
b411b363
PR
540 int try = 0;
541 int forced = 0;
542 union drbd_state mask, val;
b411b363
PR
543
544 if (new_role == R_PRIMARY)
0625ac19 545 request_ping(mdev->tconn); /* Detect a dead peer ASAP */
b411b363 546
8410da8f 547 mutex_lock(mdev->state_mutex);
b411b363
PR
548
549 mask.i = 0; mask.role = R_MASK;
550 val.i = 0; val.role = new_role;
551
552 while (try++ < max_tries) {
bf885f8a 553 rv = _drbd_request_state(mdev, mask, val, CS_WAIT_COMPLETE);
b411b363
PR
554
555 /* in case we first succeeded to outdate,
556 * but now suddenly could establish a connection */
bf885f8a 557 if (rv == SS_CW_FAILED_BY_PEER && mask.pdsk != 0) {
b411b363
PR
558 val.pdsk = 0;
559 mask.pdsk = 0;
560 continue;
561 }
562
bf885f8a 563 if (rv == SS_NO_UP_TO_DATE_DISK && force &&
d10a33c6
PR
564 (mdev->state.disk < D_UP_TO_DATE &&
565 mdev->state.disk >= D_INCONSISTENT)) {
b411b363
PR
566 mask.disk = D_MASK;
567 val.disk = D_UP_TO_DATE;
568 forced = 1;
569 continue;
570 }
571
bf885f8a 572 if (rv == SS_NO_UP_TO_DATE_DISK &&
b411b363
PR
573 mdev->state.disk == D_CONSISTENT && mask.pdsk == 0) {
574 D_ASSERT(mdev->state.pdsk == D_UNKNOWN);
b411b363 575
cb703454 576 if (conn_try_outdate_peer(mdev->tconn)) {
b411b363
PR
577 val.disk = D_UP_TO_DATE;
578 mask.disk = D_MASK;
579 }
b411b363
PR
580 continue;
581 }
582
bf885f8a 583 if (rv == SS_NOTHING_TO_DO)
3b98c0c2 584 goto out;
bf885f8a 585 if (rv == SS_PRIMARY_NOP && mask.pdsk == 0) {
cb703454 586 if (!conn_try_outdate_peer(mdev->tconn) && force) {
b411b363 587 dev_warn(DEV, "Forced into split brain situation!\n");
cb703454
PR
588 mask.pdsk = D_MASK;
589 val.pdsk = D_OUTDATED;
b411b363 590
cb703454 591 }
b411b363
PR
592 continue;
593 }
bf885f8a 594 if (rv == SS_TWO_PRIMARIES) {
b411b363
PR
595 /* Maybe the peer is detected as dead very soon...
596 retry at most once more in this case. */
44ed167d
PR
597 int timeo;
598 rcu_read_lock();
599 nc = rcu_dereference(mdev->tconn->net_conf);
600 timeo = nc ? (nc->ping_timeo + 1) * HZ / 10 : 1;
601 rcu_read_unlock();
602 schedule_timeout_interruptible(timeo);
b411b363
PR
603 if (try < max_tries)
604 try = max_tries - 1;
605 continue;
606 }
bf885f8a
AG
607 if (rv < SS_SUCCESS) {
608 rv = _drbd_request_state(mdev, mask, val,
b411b363 609 CS_VERBOSE + CS_WAIT_COMPLETE);
bf885f8a 610 if (rv < SS_SUCCESS)
3b98c0c2 611 goto out;
b411b363
PR
612 }
613 break;
614 }
615
bf885f8a 616 if (rv < SS_SUCCESS)
3b98c0c2 617 goto out;
b411b363
PR
618
619 if (forced)
620 dev_warn(DEV, "Forced to consider local data as UpToDate!\n");
621
622 /* Wait until nothing is on the fly :) */
623 wait_event(mdev->misc_wait, atomic_read(&mdev->ap_pending_cnt) == 0);
624
b6dd1a89
LE
625 /* FIXME also wait for all pending P_BARRIER_ACK? */
626
b411b363 627 if (new_role == R_SECONDARY) {
81e84650 628 set_disk_ro(mdev->vdisk, true);
b411b363
PR
629 if (get_ldev(mdev)) {
630 mdev->ldev->md.uuid[UI_CURRENT] &= ~(u64)1;
631 put_ldev(mdev);
632 }
633 } else {
a0095508 634 mutex_lock(&mdev->tconn->conf_update);
91fd4dad 635 nc = mdev->tconn->net_conf;
44ed167d 636 if (nc)
6139f60d 637 nc->discard_my_data = 0; /* without copy; single bit op is atomic */
a0095508 638 mutex_unlock(&mdev->tconn->conf_update);
91fd4dad 639
81e84650 640 set_disk_ro(mdev->vdisk, false);
b411b363
PR
641 if (get_ldev(mdev)) {
642 if (((mdev->state.conn < C_CONNECTED ||
643 mdev->state.pdsk <= D_FAILED)
644 && mdev->ldev->md.uuid[UI_BITMAP] == 0) || forced)
645 drbd_uuid_new_current(mdev);
646
647 mdev->ldev->md.uuid[UI_CURRENT] |= (u64)1;
648 put_ldev(mdev);
649 }
650 }
651
19f843aa
LE
652 /* writeout of activity log covered areas of the bitmap
653 * to stable storage done in after state change already */
b411b363
PR
654
655 if (mdev->state.conn >= C_WF_REPORT_PARAMS) {
656 /* if this was forced, we should consider sync */
657 if (forced)
658 drbd_send_uuids(mdev);
43de7c85 659 drbd_send_current_state(mdev);
b411b363
PR
660 }
661
662 drbd_md_sync(mdev);
663
664 kobject_uevent(&disk_to_dev(mdev->vdisk)->kobj, KOBJ_CHANGE);
3b98c0c2 665out:
8410da8f 666 mutex_unlock(mdev->state_mutex);
bf885f8a 667 return rv;
b411b363
PR
668}
669
3b98c0c2 670static const char *from_attrs_err_to_txt(int err)
b411b363 671{
3b98c0c2
LE
672 return err == -ENOMSG ? "required attribute missing" :
673 err == -EOPNOTSUPP ? "unknown mandatory attribute" :
f399002e 674 err == -EEXIST ? "can not change invariant setting" :
3b98c0c2 675 "invalid attribute value";
b411b363
PR
676}
677
3b98c0c2 678int drbd_adm_set_role(struct sk_buff *skb, struct genl_info *info)
b411b363 679{
3b98c0c2
LE
680 struct set_role_parms parms;
681 int err;
682 enum drbd_ret_code retcode;
b411b363 683
3b98c0c2
LE
684 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
685 if (!adm_ctx.reply_skb)
686 return retcode;
687 if (retcode != NO_ERROR)
688 goto out;
689
690 memset(&parms, 0, sizeof(parms));
691 if (info->attrs[DRBD_NLA_SET_ROLE_PARMS]) {
f399002e 692 err = set_role_parms_from_attrs(&parms, info);
3b98c0c2
LE
693 if (err) {
694 retcode = ERR_MANDATORY_TAG;
695 drbd_msg_put_info(from_attrs_err_to_txt(err));
696 goto out;
697 }
698 }
699
700 if (info->genlhdr->cmd == DRBD_ADM_PRIMARY)
701 retcode = drbd_set_role(adm_ctx.mdev, R_PRIMARY, parms.assume_uptodate);
702 else
703 retcode = drbd_set_role(adm_ctx.mdev, R_SECONDARY, 0);
704out:
705 drbd_adm_finish(info, retcode);
b411b363
PR
706 return 0;
707}
708
709/* initializes the md.*_offset members, so we are able to find
710 * the on disk meta data */
711static void drbd_md_set_sector_offsets(struct drbd_conf *mdev,
712 struct drbd_backing_dev *bdev)
713{
714 sector_t md_size_sect = 0;
daeda1cc
PR
715 int meta_dev_idx;
716
717 rcu_read_lock();
718 meta_dev_idx = rcu_dereference(bdev->disk_conf)->meta_dev_idx;
719
720 switch (meta_dev_idx) {
b411b363
PR
721 default:
722 /* v07 style fixed size indexed meta data */
723 bdev->md.md_size_sect = MD_RESERVED_SECT;
724 bdev->md.md_offset = drbd_md_ss__(mdev, bdev);
725 bdev->md.al_offset = MD_AL_OFFSET;
726 bdev->md.bm_offset = MD_BM_OFFSET;
727 break;
728 case DRBD_MD_INDEX_FLEX_EXT:
729 /* just occupy the full device; unit: sectors */
730 bdev->md.md_size_sect = drbd_get_capacity(bdev->md_bdev);
731 bdev->md.md_offset = 0;
732 bdev->md.al_offset = MD_AL_OFFSET;
733 bdev->md.bm_offset = MD_BM_OFFSET;
734 break;
735 case DRBD_MD_INDEX_INTERNAL:
736 case DRBD_MD_INDEX_FLEX_INT:
737 bdev->md.md_offset = drbd_md_ss__(mdev, bdev);
738 /* al size is still fixed */
7ad651b5 739 bdev->md.al_offset = -MD_AL_SECTORS;
b411b363
PR
740 /* we need (slightly less than) ~ this much bitmap sectors: */
741 md_size_sect = drbd_get_capacity(bdev->backing_bdev);
742 md_size_sect = ALIGN(md_size_sect, BM_SECT_PER_EXT);
743 md_size_sect = BM_SECT_TO_EXT(md_size_sect);
744 md_size_sect = ALIGN(md_size_sect, 8);
745
746 /* plus the "drbd meta data super block",
747 * and the activity log; */
748 md_size_sect += MD_BM_OFFSET;
749
750 bdev->md.md_size_sect = md_size_sect;
751 /* bitmap offset is adjusted by 'super' block size */
752 bdev->md.bm_offset = -md_size_sect + MD_AL_OFFSET;
753 break;
754 }
daeda1cc 755 rcu_read_unlock();
b411b363
PR
756}
757
4b0715f0 758/* input size is expected to be in KB */
b411b363
PR
759char *ppsize(char *buf, unsigned long long size)
760{
4b0715f0
LE
761 /* Needs 9 bytes at max including trailing NUL:
762 * -1ULL ==> "16384 EB" */
b411b363
PR
763 static char units[] = { 'K', 'M', 'G', 'T', 'P', 'E' };
764 int base = 0;
4b0715f0 765 while (size >= 10000 && base < sizeof(units)-1) {
b411b363
PR
766 /* shift + round */
767 size = (size >> 10) + !!(size & (1<<9));
768 base++;
769 }
4b0715f0 770 sprintf(buf, "%u %cB", (unsigned)size, units[base]);
b411b363
PR
771
772 return buf;
773}
774
775/* there is still a theoretical deadlock when called from receiver
776 * on an D_INCONSISTENT R_PRIMARY:
777 * remote READ does inc_ap_bio, receiver would need to receive answer
778 * packet from remote to dec_ap_bio again.
779 * receiver receive_sizes(), comes here,
780 * waits for ap_bio_cnt == 0. -> deadlock.
781 * but this cannot happen, actually, because:
782 * R_PRIMARY D_INCONSISTENT, and peer's disk is unreachable
783 * (not connected, or bad/no disk on peer):
784 * see drbd_fail_request_early, ap_bio_cnt is zero.
785 * R_PRIMARY D_INCONSISTENT, and C_SYNC_TARGET:
786 * peer may not initiate a resize.
787 */
3b98c0c2
LE
788/* Note these are not to be confused with
789 * drbd_adm_suspend_io/drbd_adm_resume_io,
790 * which are (sub) state changes triggered by admin (drbdsetup),
791 * and can be long lived.
792 * This changes an mdev->flag, is triggered by drbd internals,
793 * and should be short-lived. */
b411b363
PR
794void drbd_suspend_io(struct drbd_conf *mdev)
795{
796 set_bit(SUSPEND_IO, &mdev->flags);
2aebfabb 797 if (drbd_suspended(mdev))
265be2d0 798 return;
b411b363
PR
799 wait_event(mdev->misc_wait, !atomic_read(&mdev->ap_bio_cnt));
800}
801
802void drbd_resume_io(struct drbd_conf *mdev)
803{
804 clear_bit(SUSPEND_IO, &mdev->flags);
805 wake_up(&mdev->misc_wait);
806}
807
808/**
809 * drbd_determine_dev_size() - Sets the right device size obeying all constraints
810 * @mdev: DRBD device.
811 *
812 * Returns 0 on success, negative return values indicate errors.
813 * You should call drbd_md_sync() after calling this function.
814 */
24c4830c 815enum determine_dev_size drbd_determine_dev_size(struct drbd_conf *mdev, enum dds_flags flags) __must_hold(local)
b411b363
PR
816{
817 sector_t prev_first_sect, prev_size; /* previous meta location */
ef5e44a6 818 sector_t la_size, u_size;
b411b363
PR
819 sector_t size;
820 char ppb[10];
821
822 int md_moved, la_size_changed;
823 enum determine_dev_size rv = unchanged;
824
825 /* race:
826 * application request passes inc_ap_bio,
827 * but then cannot get an AL-reference.
828 * this function later may wait on ap_bio_cnt == 0. -> deadlock.
829 *
830 * to avoid that:
831 * Suspend IO right here.
832 * still lock the act_log to not trigger ASSERTs there.
833 */
834 drbd_suspend_io(mdev);
835
836 /* no wait necessary anymore, actually we could assert that */
837 wait_event(mdev->al_wait, lc_try_lock(mdev->act_log));
838
839 prev_first_sect = drbd_md_first_sector(mdev->ldev);
840 prev_size = mdev->ldev->md.md_size_sect;
841 la_size = mdev->ldev->md.la_size_sect;
842
843 /* TODO: should only be some assert here, not (re)init... */
844 drbd_md_set_sector_offsets(mdev, mdev->ldev);
845
daeda1cc
PR
846 rcu_read_lock();
847 u_size = rcu_dereference(mdev->ldev->disk_conf)->disk_size;
848 rcu_read_unlock();
ef5e44a6 849 size = drbd_new_dev_size(mdev, mdev->ldev, u_size, flags & DDSF_FORCED);
b411b363
PR
850
851 if (drbd_get_capacity(mdev->this_bdev) != size ||
852 drbd_bm_capacity(mdev) != size) {
853 int err;
02d9a94b 854 err = drbd_bm_resize(mdev, size, !(flags & DDSF_NO_RESYNC));
b411b363
PR
855 if (unlikely(err)) {
856 /* currently there is only one error: ENOMEM! */
857 size = drbd_bm_capacity(mdev)>>1;
858 if (size == 0) {
859 dev_err(DEV, "OUT OF MEMORY! "
860 "Could not allocate bitmap!\n");
861 } else {
862 dev_err(DEV, "BM resizing failed. "
863 "Leaving size unchanged at size = %lu KB\n",
864 (unsigned long)size);
865 }
866 rv = dev_size_error;
867 }
868 /* racy, see comments above. */
869 drbd_set_my_capacity(mdev, size);
870 mdev->ldev->md.la_size_sect = size;
871 dev_info(DEV, "size = %s (%llu KB)\n", ppsize(ppb, size>>1),
872 (unsigned long long)size>>1);
873 }
874 if (rv == dev_size_error)
875 goto out;
876
877 la_size_changed = (la_size != mdev->ldev->md.la_size_sect);
878
879 md_moved = prev_first_sect != drbd_md_first_sector(mdev->ldev)
880 || prev_size != mdev->ldev->md.md_size_sect;
881
882 if (la_size_changed || md_moved) {
24dccabb
AG
883 int err;
884
b411b363
PR
885 drbd_al_shrink(mdev); /* All extents inactive. */
886 dev_info(DEV, "Writing the whole bitmap, %s\n",
887 la_size_changed && md_moved ? "size changed and md moved" :
888 la_size_changed ? "size changed" : "md moved");
20ceb2b2
LE
889 /* next line implicitly does drbd_suspend_io()+drbd_resume_io() */
890 err = drbd_bitmap_io(mdev, &drbd_bm_write,
891 "size changed", BM_LOCKED_MASK);
24dccabb
AG
892 if (err) {
893 rv = dev_size_error;
894 goto out;
895 }
b411b363
PR
896 drbd_md_mark_dirty(mdev);
897 }
898
899 if (size > la_size)
900 rv = grew;
901 if (size < la_size)
902 rv = shrunk;
903out:
904 lc_unlock(mdev->act_log);
905 wake_up(&mdev->al_wait);
906 drbd_resume_io(mdev);
907
908 return rv;
909}
910
911sector_t
ef5e44a6
PR
912drbd_new_dev_size(struct drbd_conf *mdev, struct drbd_backing_dev *bdev,
913 sector_t u_size, int assume_peer_has_space)
b411b363
PR
914{
915 sector_t p_size = mdev->p_size; /* partner's disk size. */
916 sector_t la_size = bdev->md.la_size_sect; /* last agreed size. */
917 sector_t m_size; /* my size */
b411b363
PR
918 sector_t size = 0;
919
920 m_size = drbd_get_max_capacity(bdev);
921
a393db6f
PR
922 if (mdev->state.conn < C_CONNECTED && assume_peer_has_space) {
923 dev_warn(DEV, "Resize while not connected was forced by the user!\n");
924 p_size = m_size;
925 }
926
b411b363
PR
927 if (p_size && m_size) {
928 size = min_t(sector_t, p_size, m_size);
929 } else {
930 if (la_size) {
931 size = la_size;
932 if (m_size && m_size < size)
933 size = m_size;
934 if (p_size && p_size < size)
935 size = p_size;
936 } else {
937 if (m_size)
938 size = m_size;
939 if (p_size)
940 size = p_size;
941 }
942 }
943
944 if (size == 0)
945 dev_err(DEV, "Both nodes diskless!\n");
946
947 if (u_size) {
948 if (u_size > size)
949 dev_err(DEV, "Requested disk size is too big (%lu > %lu)\n",
950 (unsigned long)u_size>>1, (unsigned long)size>>1);
951 else
952 size = u_size;
953 }
954
955 return size;
956}
957
958/**
959 * drbd_check_al_size() - Ensures that the AL is of the right size
960 * @mdev: DRBD device.
961 *
962 * Returns -EBUSY if current al lru is still used, -ENOMEM when allocation
963 * failed, and 0 on success. You should call drbd_md_sync() after you called
964 * this function.
965 */
f399002e 966static int drbd_check_al_size(struct drbd_conf *mdev, struct disk_conf *dc)
b411b363
PR
967{
968 struct lru_cache *n, *t;
969 struct lc_element *e;
970 unsigned int in_use;
971 int i;
972
b411b363 973 if (mdev->act_log &&
f399002e 974 mdev->act_log->nr_elements == dc->al_extents)
b411b363
PR
975 return 0;
976
977 in_use = 0;
978 t = mdev->act_log;
7ad651b5 979 n = lc_create("act_log", drbd_al_ext_cache, AL_UPDATES_PER_TRANSACTION,
f399002e 980 dc->al_extents, sizeof(struct lc_element), 0);
b411b363
PR
981
982 if (n == NULL) {
983 dev_err(DEV, "Cannot allocate act_log lru!\n");
984 return -ENOMEM;
985 }
986 spin_lock_irq(&mdev->al_lock);
987 if (t) {
988 for (i = 0; i < t->nr_elements; i++) {
989 e = lc_element_by_index(t, i);
990 if (e->refcnt)
991 dev_err(DEV, "refcnt(%d)==%d\n",
992 e->lc_number, e->refcnt);
993 in_use += e->refcnt;
994 }
995 }
996 if (!in_use)
997 mdev->act_log = n;
998 spin_unlock_irq(&mdev->al_lock);
999 if (in_use) {
1000 dev_err(DEV, "Activity log still in use!\n");
1001 lc_destroy(n);
1002 return -EBUSY;
1003 } else {
1004 if (t)
1005 lc_destroy(t);
1006 }
1007 drbd_md_mark_dirty(mdev); /* we changed mdev->act_log->nr_elemens */
1008 return 0;
1009}
1010
99432fcc 1011static void drbd_setup_queue_param(struct drbd_conf *mdev, unsigned int max_bio_size)
b411b363
PR
1012{
1013 struct request_queue * const q = mdev->rq_queue;
99432fcc
PR
1014 int max_hw_sectors = max_bio_size >> 9;
1015 int max_segments = 0;
1016
1017 if (get_ldev_if_state(mdev, D_ATTACHING)) {
1018 struct request_queue * const b = mdev->ldev->backing_bdev->bd_disk->queue;
1019
1020 max_hw_sectors = min(queue_max_hw_sectors(b), max_bio_size >> 9);
daeda1cc
PR
1021 rcu_read_lock();
1022 max_segments = rcu_dereference(mdev->ldev->disk_conf)->max_bio_bvecs;
1023 rcu_read_unlock();
99432fcc
PR
1024 put_ldev(mdev);
1025 }
b411b363 1026
b411b363 1027 blk_queue_logical_block_size(q, 512);
1816a2b4
LE
1028 blk_queue_max_hw_sectors(q, max_hw_sectors);
1029 /* This is the workaround for "bio would need to, but cannot, be split" */
1030 blk_queue_max_segments(q, max_segments ? max_segments : BLK_MAX_SEGMENTS);
1031 blk_queue_segment_boundary(q, PAGE_CACHE_SIZE-1);
b411b363 1032
99432fcc
PR
1033 if (get_ldev_if_state(mdev, D_ATTACHING)) {
1034 struct request_queue * const b = mdev->ldev->backing_bdev->bd_disk->queue;
1035
1036 blk_queue_stack_limits(q, b);
1037
1038 if (q->backing_dev_info.ra_pages != b->backing_dev_info.ra_pages) {
1039 dev_info(DEV, "Adjusting my ra_pages to backing device's (%lu -> %lu)\n",
1040 q->backing_dev_info.ra_pages,
1041 b->backing_dev_info.ra_pages);
1042 q->backing_dev_info.ra_pages = b->backing_dev_info.ra_pages;
1043 }
1044 put_ldev(mdev);
1045 }
1046}
1047
1048void drbd_reconsider_max_bio_size(struct drbd_conf *mdev)
1049{
1050 int now, new, local, peer;
1051
1052 now = queue_max_hw_sectors(mdev->rq_queue) << 9;
1053 local = mdev->local_max_bio_size; /* Eventually last known value, from volatile memory */
1054 peer = mdev->peer_max_bio_size; /* Eventually last known value, from meta data */
b411b363 1055
99432fcc
PR
1056 if (get_ldev_if_state(mdev, D_ATTACHING)) {
1057 local = queue_max_hw_sectors(mdev->ldev->backing_bdev->bd_disk->queue) << 9;
1058 mdev->local_max_bio_size = local;
1059 put_ldev(mdev);
b411b363 1060 }
99432fcc
PR
1061
1062 /* We may ignore peer limits if the peer is modern enough.
1063 Because new from 8.3.8 onwards the peer can use multiple
1064 BIOs for a single peer_request */
1065 if (mdev->state.conn >= C_CONNECTED) {
31890f4a 1066 if (mdev->tconn->agreed_pro_version < 94)
2ffca4f3
PR
1067 peer = min_t(int, mdev->peer_max_bio_size, DRBD_MAX_SIZE_H80_PACKET);
1068 /* Correct old drbd (up to 8.3.7) if it believes it can do more than 32KiB */
31890f4a 1069 else if (mdev->tconn->agreed_pro_version == 94)
99432fcc 1070 peer = DRBD_MAX_SIZE_H80_PACKET;
2ffca4f3
PR
1071 else if (mdev->tconn->agreed_pro_version < 100)
1072 peer = DRBD_MAX_BIO_SIZE_P95; /* drbd 8.3.8 onwards, before 8.4.0 */
1073 else
99432fcc
PR
1074 peer = DRBD_MAX_BIO_SIZE;
1075 }
1076
1077 new = min_t(int, local, peer);
1078
1079 if (mdev->state.role == R_PRIMARY && new < now)
1080 dev_err(DEV, "ASSERT FAILED new < now; (%d < %d)\n", new, now);
1081
1082 if (new != now)
1083 dev_info(DEV, "max BIO size = %u\n", new);
1084
1085 drbd_setup_queue_param(mdev, new);
b411b363
PR
1086}
1087
a18e9d1e 1088/* Starts the worker thread */
0e29d163 1089static void conn_reconfig_start(struct drbd_tconn *tconn)
b411b363 1090{
0e29d163
PR
1091 drbd_thread_start(&tconn->worker);
1092 conn_flush_workqueue(tconn);
b411b363
PR
1093}
1094
a18e9d1e 1095/* if still unconfigured, stops worker again. */
0e29d163 1096static void conn_reconfig_done(struct drbd_tconn *tconn)
b411b363 1097{
992d6e91 1098 bool stop_threads;
0e29d163 1099 spin_lock_irq(&tconn->req_lock);
e0e16653
PR
1100 stop_threads = conn_all_vols_unconf(tconn) &&
1101 tconn->cstate == C_STANDALONE;
0e29d163 1102 spin_unlock_irq(&tconn->req_lock);
992d6e91
LE
1103 if (stop_threads) {
1104 /* asender is implicitly stopped by receiver
81fa2e67 1105 * in conn_disconnect() */
992d6e91
LE
1106 drbd_thread_stop(&tconn->receiver);
1107 drbd_thread_stop(&tconn->worker);
1108 }
b411b363
PR
1109}
1110
0778286a
PR
1111/* Make sure IO is suspended before calling this function(). */
1112static void drbd_suspend_al(struct drbd_conf *mdev)
1113{
1114 int s = 0;
1115
61610420 1116 if (!lc_try_lock(mdev->act_log)) {
0778286a
PR
1117 dev_warn(DEV, "Failed to lock al in drbd_suspend_al()\n");
1118 return;
1119 }
1120
61610420 1121 drbd_al_shrink(mdev);
87eeee41 1122 spin_lock_irq(&mdev->tconn->req_lock);
0778286a
PR
1123 if (mdev->state.conn < C_CONNECTED)
1124 s = !test_and_set_bit(AL_SUSPENDED, &mdev->flags);
87eeee41 1125 spin_unlock_irq(&mdev->tconn->req_lock);
61610420 1126 lc_unlock(mdev->act_log);
0778286a
PR
1127
1128 if (s)
1129 dev_info(DEV, "Suspended AL updates\n");
1130}
1131
5979e361
LE
1132
1133static bool should_set_defaults(struct genl_info *info)
1134{
1135 unsigned flags = ((struct drbd_genlmsghdr*)info->userhdr)->flags;
1136 return 0 != (flags & DRBD_GENL_F_SET_DEFAULTS);
1137}
1138
d589a21e
PR
1139static void enforce_disk_conf_limits(struct disk_conf *dc)
1140{
1141 if (dc->al_extents < DRBD_AL_EXTENTS_MIN)
1142 dc->al_extents = DRBD_AL_EXTENTS_MIN;
1143 if (dc->al_extents > DRBD_AL_EXTENTS_MAX)
1144 dc->al_extents = DRBD_AL_EXTENTS_MAX;
1145
1146 if (dc->c_plan_ahead > DRBD_C_PLAN_AHEAD_MAX)
1147 dc->c_plan_ahead = DRBD_C_PLAN_AHEAD_MAX;
1148}
1149
f399002e
LE
1150int drbd_adm_disk_opts(struct sk_buff *skb, struct genl_info *info)
1151{
1152 enum drbd_ret_code retcode;
1153 struct drbd_conf *mdev;
daeda1cc 1154 struct disk_conf *new_disk_conf, *old_disk_conf;
813472ce 1155 struct fifo_buffer *old_plan = NULL, *new_plan = NULL;
f399002e 1156 int err, fifo_size;
f399002e
LE
1157
1158 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
1159 if (!adm_ctx.reply_skb)
1160 return retcode;
1161 if (retcode != NO_ERROR)
1162 goto out;
1163
1164 mdev = adm_ctx.mdev;
1165
1166 /* we also need a disk
1167 * to change the options on */
1168 if (!get_ldev(mdev)) {
1169 retcode = ERR_NO_DISK;
1170 goto out;
1171 }
1172
daeda1cc 1173 new_disk_conf = kmalloc(sizeof(struct disk_conf), GFP_KERNEL);
5ecc72c3 1174 if (!new_disk_conf) {
f399002e
LE
1175 retcode = ERR_NOMEM;
1176 goto fail;
1177 }
1178
daeda1cc
PR
1179 mutex_lock(&mdev->tconn->conf_update);
1180 old_disk_conf = mdev->ldev->disk_conf;
1181 *new_disk_conf = *old_disk_conf;
5979e361 1182 if (should_set_defaults(info))
b966b5dd 1183 set_disk_conf_defaults(new_disk_conf);
5979e361 1184
5ecc72c3 1185 err = disk_conf_from_attrs_for_change(new_disk_conf, info);
c75b9b10 1186 if (err && err != -ENOMSG) {
f399002e
LE
1187 retcode = ERR_MANDATORY_TAG;
1188 drbd_msg_put_info(from_attrs_err_to_txt(err));
1189 }
1190
5ecc72c3
LE
1191 if (!expect(new_disk_conf->resync_rate >= 1))
1192 new_disk_conf->resync_rate = 1;
f399002e 1193
d589a21e 1194 enforce_disk_conf_limits(new_disk_conf);
f399002e 1195
5ecc72c3 1196 fifo_size = (new_disk_conf->c_plan_ahead * 10 * SLEEP_TIME) / HZ;
9958c857 1197 if (fifo_size != mdev->rs_plan_s->size) {
813472ce
PR
1198 new_plan = fifo_alloc(fifo_size);
1199 if (!new_plan) {
f399002e
LE
1200 dev_err(DEV, "kmalloc of fifo_buffer failed");
1201 retcode = ERR_NOMEM;
daeda1cc 1202 goto fail_unlock;
f399002e
LE
1203 }
1204 }
1205
f399002e
LE
1206 wait_event(mdev->al_wait, lc_try_lock(mdev->act_log));
1207 drbd_al_shrink(mdev);
5ecc72c3 1208 err = drbd_check_al_size(mdev, new_disk_conf);
f399002e
LE
1209 lc_unlock(mdev->act_log);
1210 wake_up(&mdev->al_wait);
1211
1212 if (err) {
1213 retcode = ERR_NOMEM;
daeda1cc 1214 goto fail_unlock;
f399002e
LE
1215 }
1216
dc97b708 1217 write_lock_irq(&global_state_lock);
95f8efd0 1218 retcode = drbd_resync_after_valid(mdev, new_disk_conf->resync_after);
dc97b708 1219 if (retcode == NO_ERROR) {
daeda1cc 1220 rcu_assign_pointer(mdev->ldev->disk_conf, new_disk_conf);
95f8efd0 1221 drbd_resync_after_changed(mdev);
dc97b708
PR
1222 }
1223 write_unlock_irq(&global_state_lock);
f399002e 1224
daeda1cc
PR
1225 if (retcode != NO_ERROR)
1226 goto fail_unlock;
f399002e 1227
813472ce
PR
1228 if (new_plan) {
1229 old_plan = mdev->rs_plan_s;
1230 rcu_assign_pointer(mdev->rs_plan_s, new_plan);
9958c857 1231 }
9958c857 1232
c141ebda 1233 mutex_unlock(&mdev->tconn->conf_update);
27eb13e9 1234
9a51ab1c
PR
1235 if (new_disk_conf->al_updates)
1236 mdev->ldev->md.flags &= MDF_AL_DISABLED;
1237 else
1238 mdev->ldev->md.flags |= MDF_AL_DISABLED;
1239
27eb13e9
PR
1240 drbd_bump_write_ordering(mdev->tconn, WO_bdev_flush);
1241
daeda1cc 1242 drbd_md_sync(mdev);
f399002e
LE
1243
1244 if (mdev->state.conn >= C_CONNECTED)
1245 drbd_send_sync_param(mdev);
1246
daeda1cc
PR
1247 synchronize_rcu();
1248 kfree(old_disk_conf);
813472ce 1249 kfree(old_plan);
cdfda633 1250 mod_timer(&mdev->request_timer, jiffies + HZ);
daeda1cc
PR
1251 goto success;
1252
1253fail_unlock:
1254 mutex_unlock(&mdev->tconn->conf_update);
f399002e 1255 fail:
5ecc72c3 1256 kfree(new_disk_conf);
813472ce 1257 kfree(new_plan);
daeda1cc
PR
1258success:
1259 put_ldev(mdev);
f399002e
LE
1260 out:
1261 drbd_adm_finish(info, retcode);
1262 return 0;
1263}
1264
3b98c0c2 1265int drbd_adm_attach(struct sk_buff *skb, struct genl_info *info)
b411b363 1266{
3b98c0c2
LE
1267 struct drbd_conf *mdev;
1268 int err;
116676ca 1269 enum drbd_ret_code retcode;
b411b363
PR
1270 enum determine_dev_size dd;
1271 sector_t max_possible_sectors;
1272 sector_t min_md_device_sectors;
1273 struct drbd_backing_dev *nbc = NULL; /* new_backing_conf */
daeda1cc 1274 struct disk_conf *new_disk_conf = NULL;
e525fd89 1275 struct block_device *bdev;
b411b363 1276 struct lru_cache *resync_lru = NULL;
9958c857 1277 struct fifo_buffer *new_plan = NULL;
b411b363 1278 union drbd_state ns, os;
f2024e7c 1279 enum drbd_state_rv rv;
44ed167d 1280 struct net_conf *nc;
b411b363 1281
3b98c0c2
LE
1282 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
1283 if (!adm_ctx.reply_skb)
1284 return retcode;
1285 if (retcode != NO_ERROR)
40cbf085 1286 goto finish;
3b98c0c2
LE
1287
1288 mdev = adm_ctx.mdev;
0e29d163 1289 conn_reconfig_start(mdev->tconn);
b411b363
PR
1290
1291 /* if you want to reconfigure, please tear down first */
1292 if (mdev->state.disk > D_DISKLESS) {
1293 retcode = ERR_DISK_CONFIGURED;
1294 goto fail;
1295 }
82f59cc6
LE
1296 /* It may just now have detached because of IO error. Make sure
1297 * drbd_ldev_destroy is done already, we may end up here very fast,
1298 * e.g. if someone calls attach from the on-io-error handler,
1299 * to realize a "hot spare" feature (not that I'd recommend that) */
1300 wait_event(mdev->misc_wait, !atomic_read(&mdev->local_cnt));
b411b363 1301
3b98c0c2 1302 /* allocation not in the IO path, drbdsetup context */
b411b363
PR
1303 nbc = kzalloc(sizeof(struct drbd_backing_dev), GFP_KERNEL);
1304 if (!nbc) {
1305 retcode = ERR_NOMEM;
1306 goto fail;
1307 }
daeda1cc
PR
1308 new_disk_conf = kzalloc(sizeof(struct disk_conf), GFP_KERNEL);
1309 if (!new_disk_conf) {
1310 retcode = ERR_NOMEM;
1311 goto fail;
1312 }
1313 nbc->disk_conf = new_disk_conf;
b411b363 1314
daeda1cc
PR
1315 set_disk_conf_defaults(new_disk_conf);
1316 err = disk_conf_from_attrs(new_disk_conf, info);
3b98c0c2 1317 if (err) {
b411b363 1318 retcode = ERR_MANDATORY_TAG;
3b98c0c2 1319 drbd_msg_put_info(from_attrs_err_to_txt(err));
b411b363
PR
1320 goto fail;
1321 }
1322
d589a21e
PR
1323 enforce_disk_conf_limits(new_disk_conf);
1324
9958c857
PR
1325 new_plan = fifo_alloc((new_disk_conf->c_plan_ahead * 10 * SLEEP_TIME) / HZ);
1326 if (!new_plan) {
1327 retcode = ERR_NOMEM;
1328 goto fail;
1329 }
1330
daeda1cc 1331 if (new_disk_conf->meta_dev_idx < DRBD_MD_INDEX_FLEX_INT) {
b411b363
PR
1332 retcode = ERR_MD_IDX_INVALID;
1333 goto fail;
1334 }
1335
44ed167d
PR
1336 rcu_read_lock();
1337 nc = rcu_dereference(mdev->tconn->net_conf);
1338 if (nc) {
daeda1cc 1339 if (new_disk_conf->fencing == FP_STONITH && nc->wire_protocol == DRBD_PROT_A) {
44ed167d 1340 rcu_read_unlock();
47ff2d0a
PR
1341 retcode = ERR_STONITH_AND_PROT_A;
1342 goto fail;
1343 }
1344 }
44ed167d 1345 rcu_read_unlock();
47ff2d0a 1346
daeda1cc 1347 bdev = blkdev_get_by_path(new_disk_conf->backing_dev,
d4d77629 1348 FMODE_READ | FMODE_WRITE | FMODE_EXCL, mdev);
e525fd89 1349 if (IS_ERR(bdev)) {
daeda1cc 1350 dev_err(DEV, "open(\"%s\") failed with %ld\n", new_disk_conf->backing_dev,
e525fd89 1351 PTR_ERR(bdev));
b411b363
PR
1352 retcode = ERR_OPEN_DISK;
1353 goto fail;
1354 }
e525fd89
TH
1355 nbc->backing_bdev = bdev;
1356
1357 /*
1358 * meta_dev_idx >= 0: external fixed size, possibly multiple
1359 * drbd sharing one meta device. TODO in that case, paranoia
1360 * check that [md_bdev, meta_dev_idx] is not yet used by some
1361 * other drbd minor! (if you use drbd.conf + drbdadm, that
1362 * should check it for you already; but if you don't, or
1363 * someone fooled it, we need to double check here)
1364 */
daeda1cc 1365 bdev = blkdev_get_by_path(new_disk_conf->meta_dev,
d4d77629 1366 FMODE_READ | FMODE_WRITE | FMODE_EXCL,
daeda1cc 1367 (new_disk_conf->meta_dev_idx < 0) ?
d4d77629 1368 (void *)mdev : (void *)drbd_m_holder);
e525fd89 1369 if (IS_ERR(bdev)) {
daeda1cc 1370 dev_err(DEV, "open(\"%s\") failed with %ld\n", new_disk_conf->meta_dev,
e525fd89 1371 PTR_ERR(bdev));
b411b363
PR
1372 retcode = ERR_OPEN_MD_DISK;
1373 goto fail;
1374 }
e525fd89 1375 nbc->md_bdev = bdev;
b411b363 1376
e525fd89 1377 if ((nbc->backing_bdev == nbc->md_bdev) !=
daeda1cc
PR
1378 (new_disk_conf->meta_dev_idx == DRBD_MD_INDEX_INTERNAL ||
1379 new_disk_conf->meta_dev_idx == DRBD_MD_INDEX_FLEX_INT)) {
e525fd89 1380 retcode = ERR_MD_IDX_INVALID;
b411b363
PR
1381 goto fail;
1382 }
1383
1384 resync_lru = lc_create("resync", drbd_bm_ext_cache,
46a15bc3 1385 1, 61, sizeof(struct bm_extent),
b411b363
PR
1386 offsetof(struct bm_extent, lce));
1387 if (!resync_lru) {
1388 retcode = ERR_NOMEM;
e525fd89 1389 goto fail;
b411b363
PR
1390 }
1391
1392 /* RT - for drbd_get_max_capacity() DRBD_MD_INDEX_FLEX_INT */
1393 drbd_md_set_sector_offsets(mdev, nbc);
1394
daeda1cc 1395 if (drbd_get_max_capacity(nbc) < new_disk_conf->disk_size) {
b411b363
PR
1396 dev_err(DEV, "max capacity %llu smaller than disk size %llu\n",
1397 (unsigned long long) drbd_get_max_capacity(nbc),
daeda1cc 1398 (unsigned long long) new_disk_conf->disk_size);
67b58bf7 1399 retcode = ERR_DISK_TOO_SMALL;
e525fd89 1400 goto fail;
b411b363
PR
1401 }
1402
daeda1cc 1403 if (new_disk_conf->meta_dev_idx < 0) {
b411b363
PR
1404 max_possible_sectors = DRBD_MAX_SECTORS_FLEX;
1405 /* at least one MB, otherwise it does not make sense */
1406 min_md_device_sectors = (2<<10);
1407 } else {
1408 max_possible_sectors = DRBD_MAX_SECTORS;
daeda1cc 1409 min_md_device_sectors = MD_RESERVED_SECT * (new_disk_conf->meta_dev_idx + 1);
b411b363
PR
1410 }
1411
b411b363 1412 if (drbd_get_capacity(nbc->md_bdev) < min_md_device_sectors) {
67b58bf7 1413 retcode = ERR_MD_DISK_TOO_SMALL;
b411b363
PR
1414 dev_warn(DEV, "refusing attach: md-device too small, "
1415 "at least %llu sectors needed for this meta-disk type\n",
1416 (unsigned long long) min_md_device_sectors);
e525fd89 1417 goto fail;
b411b363
PR
1418 }
1419
1420 /* Make sure the new disk is big enough
1421 * (we may currently be R_PRIMARY with no local disk...) */
1422 if (drbd_get_max_capacity(nbc) <
1423 drbd_get_capacity(mdev->this_bdev)) {
67b58bf7 1424 retcode = ERR_DISK_TOO_SMALL;
e525fd89 1425 goto fail;
b411b363
PR
1426 }
1427
1428 nbc->known_size = drbd_get_capacity(nbc->backing_bdev);
1429
1352994b
LE
1430 if (nbc->known_size > max_possible_sectors) {
1431 dev_warn(DEV, "==> truncating very big lower level device "
1432 "to currently maximum possible %llu sectors <==\n",
1433 (unsigned long long) max_possible_sectors);
daeda1cc 1434 if (new_disk_conf->meta_dev_idx >= 0)
1352994b
LE
1435 dev_warn(DEV, "==>> using internal or flexible "
1436 "meta data may help <<==\n");
1437 }
1438
b411b363
PR
1439 drbd_suspend_io(mdev);
1440 /* also wait for the last barrier ack. */
b6dd1a89
LE
1441 /* FIXME see also https://daiquiri.linbit/cgi-bin/bugzilla/show_bug.cgi?id=171
1442 * We need a way to either ignore barrier acks for barriers sent before a device
1443 * was attached, or a way to wait for all pending barrier acks to come in.
1444 * As barriers are counted per resource,
1445 * we'd need to suspend io on all devices of a resource.
1446 */
2aebfabb 1447 wait_event(mdev->misc_wait, !atomic_read(&mdev->ap_pending_cnt) || drbd_suspended(mdev));
b411b363 1448 /* and for any other previously queued work */
a21e9298 1449 drbd_flush_workqueue(mdev);
b411b363 1450
f2024e7c
AG
1451 rv = _drbd_request_state(mdev, NS(disk, D_ATTACHING), CS_VERBOSE);
1452 retcode = rv; /* FIXME: Type mismatch. */
b411b363 1453 drbd_resume_io(mdev);
f2024e7c 1454 if (rv < SS_SUCCESS)
e525fd89 1455 goto fail;
b411b363
PR
1456
1457 if (!get_ldev_if_state(mdev, D_ATTACHING))
1458 goto force_diskless;
1459
1460 drbd_md_set_sector_offsets(mdev, nbc);
1461
1462 if (!mdev->bitmap) {
1463 if (drbd_bm_init(mdev)) {
1464 retcode = ERR_NOMEM;
1465 goto force_diskless_dec;
1466 }
1467 }
1468
1469 retcode = drbd_md_read(mdev, nbc);
1470 if (retcode != NO_ERROR)
1471 goto force_diskless_dec;
1472
1473 if (mdev->state.conn < C_CONNECTED &&
1474 mdev->state.role == R_PRIMARY &&
1475 (mdev->ed_uuid & ~((u64)1)) != (nbc->md.uuid[UI_CURRENT] & ~((u64)1))) {
1476 dev_err(DEV, "Can only attach to data with current UUID=%016llX\n",
1477 (unsigned long long)mdev->ed_uuid);
1478 retcode = ERR_DATA_NOT_CURRENT;
1479 goto force_diskless_dec;
1480 }
1481
1482 /* Since we are diskless, fix the activity log first... */
daeda1cc 1483 if (drbd_check_al_size(mdev, new_disk_conf)) {
b411b363
PR
1484 retcode = ERR_NOMEM;
1485 goto force_diskless_dec;
1486 }
1487
1488 /* Prevent shrinking of consistent devices ! */
1489 if (drbd_md_test_flag(nbc, MDF_CONSISTENT) &&
daeda1cc 1490 drbd_new_dev_size(mdev, nbc, nbc->disk_conf->disk_size, 0) < nbc->md.la_size_sect) {
b411b363 1491 dev_warn(DEV, "refusing to truncate a consistent device\n");
67b58bf7 1492 retcode = ERR_DISK_TOO_SMALL;
b411b363
PR
1493 goto force_diskless_dec;
1494 }
1495
b411b363
PR
1496 /* Reset the "barriers don't work" bits here, then force meta data to
1497 * be written, to ensure we determine if barriers are supported. */
e544046a 1498 if (new_disk_conf->md_flushes)
a8a4e51e 1499 clear_bit(MD_NO_FUA, &mdev->flags);
e544046a
AG
1500 else
1501 set_bit(MD_NO_FUA, &mdev->flags);
b411b363
PR
1502
1503 /* Point of no return reached.
1504 * Devices and memory are no longer released by error cleanup below.
1505 * now mdev takes over responsibility, and the state engine should
1506 * clean it up somewhere. */
1507 D_ASSERT(mdev->ldev == NULL);
1508 mdev->ldev = nbc;
1509 mdev->resync = resync_lru;
9958c857 1510 mdev->rs_plan_s = new_plan;
b411b363
PR
1511 nbc = NULL;
1512 resync_lru = NULL;
daeda1cc 1513 new_disk_conf = NULL;
9958c857 1514 new_plan = NULL;
b411b363 1515
4b0007c0 1516 drbd_bump_write_ordering(mdev->tconn, WO_bdev_flush);
b411b363
PR
1517
1518 if (drbd_md_test_flag(mdev->ldev, MDF_CRASHED_PRIMARY))
1519 set_bit(CRASHED_PRIMARY, &mdev->flags);
1520 else
1521 clear_bit(CRASHED_PRIMARY, &mdev->flags);
1522
894c6a94 1523 if (drbd_md_test_flag(mdev->ldev, MDF_PRIMARY_IND) &&
d5d7ebd4 1524 !(mdev->state.role == R_PRIMARY && mdev->tconn->susp_nod))
b411b363 1525 set_bit(CRASHED_PRIMARY, &mdev->flags);
b411b363
PR
1526
1527 mdev->send_cnt = 0;
1528 mdev->recv_cnt = 0;
1529 mdev->read_cnt = 0;
1530 mdev->writ_cnt = 0;
1531
99432fcc 1532 drbd_reconsider_max_bio_size(mdev);
b411b363
PR
1533
1534 /* If I am currently not R_PRIMARY,
1535 * but meta data primary indicator is set,
1536 * I just now recover from a hard crash,
1537 * and have been R_PRIMARY before that crash.
1538 *
1539 * Now, if I had no connection before that crash
1540 * (have been degraded R_PRIMARY), chances are that
1541 * I won't find my peer now either.
1542 *
1543 * In that case, and _only_ in that case,
1544 * we use the degr-wfc-timeout instead of the default,
1545 * so we can automatically recover from a crash of a
1546 * degraded but active "cluster" after a certain timeout.
1547 */
1548 clear_bit(USE_DEGR_WFC_T, &mdev->flags);
1549 if (mdev->state.role != R_PRIMARY &&
1550 drbd_md_test_flag(mdev->ldev, MDF_PRIMARY_IND) &&
1551 !drbd_md_test_flag(mdev->ldev, MDF_CONNECTED_IND))
1552 set_bit(USE_DEGR_WFC_T, &mdev->flags);
1553
24c4830c 1554 dd = drbd_determine_dev_size(mdev, 0);
b411b363
PR
1555 if (dd == dev_size_error) {
1556 retcode = ERR_NOMEM_BITMAP;
1557 goto force_diskless_dec;
1558 } else if (dd == grew)
1559 set_bit(RESYNC_AFTER_NEG, &mdev->flags);
1560
9a51ab1c
PR
1561 if (drbd_md_test_flag(mdev->ldev, MDF_FULL_SYNC) ||
1562 (test_bit(CRASHED_PRIMARY, &mdev->flags) &&
1563 drbd_md_test_flag(mdev->ldev, MDF_AL_DISABLED))) {
b411b363
PR
1564 dev_info(DEV, "Assuming that all blocks are out of sync "
1565 "(aka FullSync)\n");
20ceb2b2
LE
1566 if (drbd_bitmap_io(mdev, &drbd_bmio_set_n_write,
1567 "set_n_write from attaching", BM_LOCKED_MASK)) {
b411b363
PR
1568 retcode = ERR_IO_MD_DISK;
1569 goto force_diskless_dec;
1570 }
1571 } else {
20ceb2b2 1572 if (drbd_bitmap_io(mdev, &drbd_bm_read,
22ab6a30 1573 "read from attaching", BM_LOCKED_MASK)) {
b411b363
PR
1574 retcode = ERR_IO_MD_DISK;
1575 goto force_diskless_dec;
1576 }
1577 }
1578
0778286a
PR
1579 if (_drbd_bm_total_weight(mdev) == drbd_bm_bits(mdev))
1580 drbd_suspend_al(mdev); /* IO is still suspended here... */
1581
87eeee41 1582 spin_lock_irq(&mdev->tconn->req_lock);
78bae59b
PR
1583 os = drbd_read_state(mdev);
1584 ns = os;
b411b363
PR
1585 /* If MDF_CONSISTENT is not set go into inconsistent state,
1586 otherwise investigate MDF_WasUpToDate...
1587 If MDF_WAS_UP_TO_DATE is not set go into D_OUTDATED disk state,
1588 otherwise into D_CONSISTENT state.
1589 */
1590 if (drbd_md_test_flag(mdev->ldev, MDF_CONSISTENT)) {
1591 if (drbd_md_test_flag(mdev->ldev, MDF_WAS_UP_TO_DATE))
1592 ns.disk = D_CONSISTENT;
1593 else
1594 ns.disk = D_OUTDATED;
1595 } else {
1596 ns.disk = D_INCONSISTENT;
1597 }
1598
1599 if (drbd_md_test_flag(mdev->ldev, MDF_PEER_OUT_DATED))
1600 ns.pdsk = D_OUTDATED;
1601
daeda1cc
PR
1602 rcu_read_lock();
1603 if (ns.disk == D_CONSISTENT &&
1604 (ns.pdsk == D_OUTDATED || rcu_dereference(mdev->ldev->disk_conf)->fencing == FP_DONT_CARE))
b411b363
PR
1605 ns.disk = D_UP_TO_DATE;
1606
1607 /* All tests on MDF_PRIMARY_IND, MDF_CONNECTED_IND,
1608 MDF_CONSISTENT and MDF_WAS_UP_TO_DATE must happen before
1609 this point, because drbd_request_state() modifies these
1610 flags. */
1611
9a51ab1c
PR
1612 if (rcu_dereference(mdev->ldev->disk_conf)->al_updates)
1613 mdev->ldev->md.flags &= MDF_AL_DISABLED;
1614 else
1615 mdev->ldev->md.flags |= MDF_AL_DISABLED;
1616
1617 rcu_read_unlock();
1618
b411b363
PR
1619 /* In case we are C_CONNECTED postpone any decision on the new disk
1620 state after the negotiation phase. */
1621 if (mdev->state.conn == C_CONNECTED) {
1622 mdev->new_state_tmp.i = ns.i;
1623 ns.i = os.i;
1624 ns.disk = D_NEGOTIATING;
dc66c74d
PR
1625
1626 /* We expect to receive up-to-date UUIDs soon.
1627 To avoid a race in receive_state, free p_uuid while
1628 holding req_lock. I.e. atomic with the state change */
1629 kfree(mdev->p_uuid);
1630 mdev->p_uuid = NULL;
b411b363
PR
1631 }
1632
1633 rv = _drbd_set_state(mdev, ns, CS_VERBOSE, NULL);
87eeee41 1634 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
1635
1636 if (rv < SS_SUCCESS)
1637 goto force_diskless_dec;
1638
cdfda633
PR
1639 mod_timer(&mdev->request_timer, jiffies + HZ);
1640
b411b363
PR
1641 if (mdev->state.role == R_PRIMARY)
1642 mdev->ldev->md.uuid[UI_CURRENT] |= (u64)1;
1643 else
1644 mdev->ldev->md.uuid[UI_CURRENT] &= ~(u64)1;
1645
1646 drbd_md_mark_dirty(mdev);
1647 drbd_md_sync(mdev);
1648
1649 kobject_uevent(&disk_to_dev(mdev->vdisk)->kobj, KOBJ_CHANGE);
1650 put_ldev(mdev);
0e29d163 1651 conn_reconfig_done(mdev->tconn);
3b98c0c2 1652 drbd_adm_finish(info, retcode);
b411b363
PR
1653 return 0;
1654
1655 force_diskless_dec:
1656 put_ldev(mdev);
1657 force_diskless:
9510b241 1658 drbd_force_state(mdev, NS(disk, D_DISKLESS));
b411b363 1659 drbd_md_sync(mdev);
b411b363 1660 fail:
40cbf085 1661 conn_reconfig_done(mdev->tconn);
b411b363 1662 if (nbc) {
e525fd89
TH
1663 if (nbc->backing_bdev)
1664 blkdev_put(nbc->backing_bdev,
1665 FMODE_READ | FMODE_WRITE | FMODE_EXCL);
1666 if (nbc->md_bdev)
1667 blkdev_put(nbc->md_bdev,
1668 FMODE_READ | FMODE_WRITE | FMODE_EXCL);
b411b363
PR
1669 kfree(nbc);
1670 }
daeda1cc 1671 kfree(new_disk_conf);
b411b363 1672 lc_destroy(resync_lru);
9958c857 1673 kfree(new_plan);
b411b363 1674
40cbf085 1675 finish:
3b98c0c2 1676 drbd_adm_finish(info, retcode);
b411b363
PR
1677 return 0;
1678}
1679
cdfda633 1680static int adm_detach(struct drbd_conf *mdev, int force)
85f75dd7 1681{
19f83c76 1682 enum drbd_state_rv retcode;
009ba89d 1683 int ret;
cdfda633
PR
1684
1685 if (force) {
1686 drbd_force_state(mdev, NS(disk, D_FAILED));
1687 retcode = SS_SUCCESS;
1688 goto out;
1689 }
1690
85f75dd7 1691 drbd_suspend_io(mdev); /* so no-one is stuck in drbd_al_begin_io */
0cfac5dd 1692 drbd_md_get_buffer(mdev); /* make sure there is no in-flight meta-data IO */
009ba89d 1693 retcode = drbd_request_state(mdev, NS(disk, D_FAILED));
0cfac5dd 1694 drbd_md_put_buffer(mdev);
009ba89d
LE
1695 /* D_FAILED will transition to DISKLESS. */
1696 ret = wait_event_interruptible(mdev->misc_wait,
1697 mdev->state.disk != D_FAILED);
85f75dd7 1698 drbd_resume_io(mdev);
009ba89d
LE
1699 if ((int)retcode == (int)SS_IS_DISKLESS)
1700 retcode = SS_NOTHING_TO_DO;
1701 if (ret)
1702 retcode = ERR_INTR;
cdfda633 1703out:
85f75dd7
LE
1704 return retcode;
1705}
1706
82f59cc6
LE
1707/* Detaching the disk is a process in multiple stages. First we need to lock
1708 * out application IO, in-flight IO, IO stuck in drbd_al_begin_io.
1709 * Then we transition to D_DISKLESS, and wait for put_ldev() to return all
1710 * internal references as well.
1711 * Only then we have finally detached. */
3b98c0c2 1712int drbd_adm_detach(struct sk_buff *skb, struct genl_info *info)
b411b363 1713{
9a0d9d03 1714 enum drbd_ret_code retcode;
cdfda633
PR
1715 struct detach_parms parms = { };
1716 int err;
3b98c0c2
LE
1717
1718 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
1719 if (!adm_ctx.reply_skb)
1720 return retcode;
1721 if (retcode != NO_ERROR)
1722 goto out;
1723
cdfda633
PR
1724 if (info->attrs[DRBD_NLA_DETACH_PARMS]) {
1725 err = detach_parms_from_attrs(&parms, info);
1726 if (err) {
1727 retcode = ERR_MANDATORY_TAG;
1728 drbd_msg_put_info(from_attrs_err_to_txt(err));
1729 goto out;
1730 }
1731 }
1732
1733 retcode = adm_detach(adm_ctx.mdev, parms.force_detach);
3b98c0c2
LE
1734out:
1735 drbd_adm_finish(info, retcode);
b411b363
PR
1736 return 0;
1737}
1738
f399002e
LE
1739static bool conn_resync_running(struct drbd_tconn *tconn)
1740{
1741 struct drbd_conf *mdev;
695d08fa 1742 bool rv = false;
f399002e
LE
1743 int vnr;
1744
695d08fa 1745 rcu_read_lock();
f399002e
LE
1746 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
1747 if (mdev->state.conn == C_SYNC_SOURCE ||
1748 mdev->state.conn == C_SYNC_TARGET ||
1749 mdev->state.conn == C_PAUSED_SYNC_S ||
695d08fa
PR
1750 mdev->state.conn == C_PAUSED_SYNC_T) {
1751 rv = true;
1752 break;
1753 }
f399002e 1754 }
695d08fa
PR
1755 rcu_read_unlock();
1756
1757 return rv;
f399002e
LE
1758}
1759
1760static bool conn_ov_running(struct drbd_tconn *tconn)
1761{
1762 struct drbd_conf *mdev;
695d08fa 1763 bool rv = false;
f399002e
LE
1764 int vnr;
1765
695d08fa 1766 rcu_read_lock();
f399002e
LE
1767 idr_for_each_entry(&tconn->volumes, mdev, vnr) {
1768 if (mdev->state.conn == C_VERIFY_S ||
695d08fa
PR
1769 mdev->state.conn == C_VERIFY_T) {
1770 rv = true;
1771 break;
1772 }
f399002e 1773 }
695d08fa
PR
1774 rcu_read_unlock();
1775
1776 return rv;
f399002e
LE
1777}
1778
cd64397c 1779static enum drbd_ret_code
44ed167d 1780_check_net_options(struct drbd_tconn *tconn, struct net_conf *old_conf, struct net_conf *new_conf)
cd64397c
PR
1781{
1782 struct drbd_conf *mdev;
1783 int i;
1784
dcb20d1a
PR
1785 if (old_conf && tconn->cstate == C_WF_REPORT_PARAMS && tconn->agreed_pro_version < 100) {
1786 if (new_conf->wire_protocol != old_conf->wire_protocol)
1787 return ERR_NEED_APV_100;
1788
1789 if (new_conf->two_primaries != old_conf->two_primaries)
1790 return ERR_NEED_APV_100;
1791
1792 if (!new_conf->integrity_alg != !old_conf->integrity_alg)
1793 return ERR_NEED_APV_100;
1794
1795 if (strcmp(new_conf->integrity_alg, old_conf->integrity_alg))
1796 return ERR_NEED_APV_100;
1797 }
1798
1799 if (!new_conf->two_primaries &&
1800 conn_highest_role(tconn) == R_PRIMARY &&
1801 conn_highest_peer(tconn) == R_PRIMARY)
1802 return ERR_NEED_ALLOW_TWO_PRI;
b032b6fa 1803
cd64397c
PR
1804 if (new_conf->two_primaries &&
1805 (new_conf->wire_protocol != DRBD_PROT_C))
1806 return ERR_NOT_PROTO_C;
1807
cd64397c
PR
1808 idr_for_each_entry(&tconn->volumes, mdev, i) {
1809 if (get_ldev(mdev)) {
daeda1cc 1810 enum drbd_fencing_p fp = rcu_dereference(mdev->ldev->disk_conf)->fencing;
cd64397c 1811 put_ldev(mdev);
44ed167d 1812 if (new_conf->wire_protocol == DRBD_PROT_A && fp == FP_STONITH)
cd64397c 1813 return ERR_STONITH_AND_PROT_A;
cd64397c 1814 }
6139f60d 1815 if (mdev->state.role == R_PRIMARY && new_conf->discard_my_data)
cd64397c 1816 return ERR_DISCARD;
cd64397c 1817 }
cd64397c
PR
1818
1819 if (new_conf->on_congestion != OC_BLOCK && new_conf->wire_protocol != DRBD_PROT_A)
1820 return ERR_CONG_NOT_PROTO_A;
1821
1822 return NO_ERROR;
1823}
1824
44ed167d
PR
1825static enum drbd_ret_code
1826check_net_options(struct drbd_tconn *tconn, struct net_conf *new_conf)
1827{
1828 static enum drbd_ret_code rv;
1829 struct drbd_conf *mdev;
1830 int i;
1831
1832 rcu_read_lock();
1833 rv = _check_net_options(tconn, rcu_dereference(tconn->net_conf), new_conf);
1834 rcu_read_unlock();
1835
1836 /* tconn->volumes protected by genl_lock() here */
1837 idr_for_each_entry(&tconn->volumes, mdev, i) {
1838 if (!mdev->bitmap) {
1839 if(drbd_bm_init(mdev))
1840 return ERR_NOMEM;
1841 }
1842 }
1843
1844 return rv;
1845}
1846
0fd0ea06
PR
1847struct crypto {
1848 struct crypto_hash *verify_tfm;
1849 struct crypto_hash *csums_tfm;
1850 struct crypto_hash *cram_hmac_tfm;
8d412fc6 1851 struct crypto_hash *integrity_tfm;
0fd0ea06
PR
1852};
1853
1854static int
4b6ad6d4 1855alloc_hash(struct crypto_hash **tfm, char *tfm_name, int err_alg)
0fd0ea06
PR
1856{
1857 if (!tfm_name[0])
1858 return NO_ERROR;
1859
1860 *tfm = crypto_alloc_hash(tfm_name, 0, CRYPTO_ALG_ASYNC);
1861 if (IS_ERR(*tfm)) {
1862 *tfm = NULL;
1863 return err_alg;
1864 }
1865
0fd0ea06
PR
1866 return NO_ERROR;
1867}
1868
1869static enum drbd_ret_code
1870alloc_crypto(struct crypto *crypto, struct net_conf *new_conf)
1871{
1872 char hmac_name[CRYPTO_MAX_ALG_NAME];
1873 enum drbd_ret_code rv;
0fd0ea06 1874
4b6ad6d4
AG
1875 rv = alloc_hash(&crypto->csums_tfm, new_conf->csums_alg,
1876 ERR_CSUMS_ALG);
0fd0ea06
PR
1877 if (rv != NO_ERROR)
1878 return rv;
4b6ad6d4
AG
1879 rv = alloc_hash(&crypto->verify_tfm, new_conf->verify_alg,
1880 ERR_VERIFY_ALG);
0fd0ea06
PR
1881 if (rv != NO_ERROR)
1882 return rv;
4b6ad6d4
AG
1883 rv = alloc_hash(&crypto->integrity_tfm, new_conf->integrity_alg,
1884 ERR_INTEGRITY_ALG);
0fd0ea06
PR
1885 if (rv != NO_ERROR)
1886 return rv;
0fd0ea06
PR
1887 if (new_conf->cram_hmac_alg[0] != 0) {
1888 snprintf(hmac_name, CRYPTO_MAX_ALG_NAME, "hmac(%s)",
1889 new_conf->cram_hmac_alg);
1890
4b6ad6d4
AG
1891 rv = alloc_hash(&crypto->cram_hmac_tfm, hmac_name,
1892 ERR_AUTH_ALG);
0fd0ea06 1893 }
0fd0ea06
PR
1894
1895 return rv;
1896}
1897
1898static void free_crypto(struct crypto *crypto)
1899{
0fd0ea06 1900 crypto_free_hash(crypto->cram_hmac_tfm);
8d412fc6 1901 crypto_free_hash(crypto->integrity_tfm);
0fd0ea06
PR
1902 crypto_free_hash(crypto->csums_tfm);
1903 crypto_free_hash(crypto->verify_tfm);
1904}
1905
f399002e
LE
1906int drbd_adm_net_opts(struct sk_buff *skb, struct genl_info *info)
1907{
1908 enum drbd_ret_code retcode;
1909 struct drbd_tconn *tconn;
44ed167d 1910 struct net_conf *old_conf, *new_conf = NULL;
f399002e
LE
1911 int err;
1912 int ovr; /* online verify running */
1913 int rsr; /* re-sync running */
0fd0ea06 1914 struct crypto crypto = { };
f399002e 1915
089c075d 1916 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_CONNECTION);
f399002e
LE
1917 if (!adm_ctx.reply_skb)
1918 return retcode;
1919 if (retcode != NO_ERROR)
1920 goto out;
1921
1922 tconn = adm_ctx.tconn;
1923
1924 new_conf = kzalloc(sizeof(struct net_conf), GFP_KERNEL);
1925 if (!new_conf) {
1926 retcode = ERR_NOMEM;
1927 goto out;
1928 }
1929
44ed167d
PR
1930 conn_reconfig_start(tconn);
1931
88104ca4 1932 mutex_lock(&tconn->data.mutex);
a0095508 1933 mutex_lock(&tconn->conf_update);
91fd4dad 1934 old_conf = tconn->net_conf;
44ed167d
PR
1935
1936 if (!old_conf) {
f399002e
LE
1937 drbd_msg_put_info("net conf missing, try connect");
1938 retcode = ERR_INVALID_REQUEST;
91fd4dad 1939 goto fail;
f399002e
LE
1940 }
1941
44ed167d 1942 *new_conf = *old_conf;
5979e361 1943 if (should_set_defaults(info))
b966b5dd 1944 set_net_conf_defaults(new_conf);
f399002e 1945
f399002e 1946 err = net_conf_from_attrs_for_change(new_conf, info);
c75b9b10 1947 if (err && err != -ENOMSG) {
f399002e
LE
1948 retcode = ERR_MANDATORY_TAG;
1949 drbd_msg_put_info(from_attrs_err_to_txt(err));
1950 goto fail;
1951 }
1952
cd64397c
PR
1953 retcode = check_net_options(tconn, new_conf);
1954 if (retcode != NO_ERROR)
1955 goto fail;
1956
f399002e
LE
1957 /* re-sync running */
1958 rsr = conn_resync_running(tconn);
0fd0ea06 1959 if (rsr && strcmp(new_conf->csums_alg, old_conf->csums_alg)) {
f399002e 1960 retcode = ERR_CSUMS_RESYNC_RUNNING;
91fd4dad 1961 goto fail;
f399002e
LE
1962 }
1963
f399002e
LE
1964 /* online verify running */
1965 ovr = conn_ov_running(tconn);
0fd0ea06
PR
1966 if (ovr && strcmp(new_conf->verify_alg, old_conf->verify_alg)) {
1967 retcode = ERR_VERIFY_RUNNING;
1968 goto fail;
f399002e
LE
1969 }
1970
0fd0ea06
PR
1971 retcode = alloc_crypto(&crypto, new_conf);
1972 if (retcode != NO_ERROR)
1973 goto fail;
f399002e 1974
44ed167d 1975 rcu_assign_pointer(tconn->net_conf, new_conf);
f399002e
LE
1976
1977 if (!rsr) {
1978 crypto_free_hash(tconn->csums_tfm);
0fd0ea06
PR
1979 tconn->csums_tfm = crypto.csums_tfm;
1980 crypto.csums_tfm = NULL;
f399002e
LE
1981 }
1982 if (!ovr) {
1983 crypto_free_hash(tconn->verify_tfm);
0fd0ea06
PR
1984 tconn->verify_tfm = crypto.verify_tfm;
1985 crypto.verify_tfm = NULL;
f399002e
LE
1986 }
1987
8d412fc6
AG
1988 crypto_free_hash(tconn->integrity_tfm);
1989 tconn->integrity_tfm = crypto.integrity_tfm;
d659f2aa 1990 if (tconn->cstate >= C_WF_REPORT_PARAMS && tconn->agreed_pro_version >= 100)
88104ca4 1991 /* Do this without trying to take tconn->data.mutex again. */
d659f2aa 1992 __drbd_send_protocol(tconn, P_PROTOCOL_UPDATE);
0fd0ea06 1993
0fd0ea06
PR
1994 crypto_free_hash(tconn->cram_hmac_tfm);
1995 tconn->cram_hmac_tfm = crypto.cram_hmac_tfm;
1996
a0095508 1997 mutex_unlock(&tconn->conf_update);
88104ca4 1998 mutex_unlock(&tconn->data.mutex);
91fd4dad
PR
1999 synchronize_rcu();
2000 kfree(old_conf);
2001
f399002e
LE
2002 if (tconn->cstate >= C_WF_REPORT_PARAMS)
2003 drbd_send_sync_param(minor_to_mdev(conn_lowest_minor(tconn)));
2004
91fd4dad
PR
2005 goto done;
2006
f399002e 2007 fail:
a0095508 2008 mutex_unlock(&tconn->conf_update);
88104ca4 2009 mutex_unlock(&tconn->data.mutex);
0fd0ea06 2010 free_crypto(&crypto);
f399002e 2011 kfree(new_conf);
91fd4dad 2012 done:
f399002e
LE
2013 conn_reconfig_done(tconn);
2014 out:
2015 drbd_adm_finish(info, retcode);
2016 return 0;
2017}
2018
3b98c0c2 2019int drbd_adm_connect(struct sk_buff *skb, struct genl_info *info)
b411b363 2020{
3b98c0c2 2021 struct drbd_conf *mdev;
44ed167d 2022 struct net_conf *old_conf, *new_conf = NULL;
0fd0ea06 2023 struct crypto crypto = { };
3b98c0c2 2024 struct drbd_tconn *tconn;
3b98c0c2
LE
2025 enum drbd_ret_code retcode;
2026 int i;
2027 int err;
b411b363 2028
44e52cfa 2029 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_RESOURCE);
089c075d 2030
3b98c0c2
LE
2031 if (!adm_ctx.reply_skb)
2032 return retcode;
2033 if (retcode != NO_ERROR)
2034 goto out;
089c075d
AG
2035 if (!(adm_ctx.my_addr && adm_ctx.peer_addr)) {
2036 drbd_msg_put_info("connection endpoint(s) missing");
2037 retcode = ERR_INVALID_REQUEST;
2038 goto out;
2039 }
2040
2041 /* No need for _rcu here. All reconfiguration is
2042 * strictly serialized on genl_lock(). We are protected against
2043 * concurrent reconfiguration/addition/deletion */
2044 list_for_each_entry(tconn, &drbd_tconns, all_tconn) {
2045 if (nla_len(adm_ctx.my_addr) == tconn->my_addr_len &&
2046 !memcmp(nla_data(adm_ctx.my_addr), &tconn->my_addr, tconn->my_addr_len)) {
2047 retcode = ERR_LOCAL_ADDR;
2048 goto out;
2049 }
2050
2051 if (nla_len(adm_ctx.peer_addr) == tconn->peer_addr_len &&
2052 !memcmp(nla_data(adm_ctx.peer_addr), &tconn->peer_addr, tconn->peer_addr_len)) {
2053 retcode = ERR_PEER_ADDR;
2054 goto out;
2055 }
2056 }
3b98c0c2
LE
2057
2058 tconn = adm_ctx.tconn;
80883197 2059 conn_reconfig_start(tconn);
b411b363 2060
80883197 2061 if (tconn->cstate > C_STANDALONE) {
b411b363
PR
2062 retcode = ERR_NET_CONFIGURED;
2063 goto fail;
2064 }
2065
a209b4ae 2066 /* allocation not in the IO path, drbdsetup / netlink process context */
5979e361 2067 new_conf = kzalloc(sizeof(*new_conf), GFP_KERNEL);
b411b363
PR
2068 if (!new_conf) {
2069 retcode = ERR_NOMEM;
2070 goto fail;
2071 }
2072
b966b5dd 2073 set_net_conf_defaults(new_conf);
f399002e
LE
2074
2075 err = net_conf_from_attrs(new_conf, info);
25e40932 2076 if (err && err != -ENOMSG) {
b411b363 2077 retcode = ERR_MANDATORY_TAG;
3b98c0c2 2078 drbd_msg_put_info(from_attrs_err_to_txt(err));
b411b363
PR
2079 goto fail;
2080 }
2081
cd64397c
PR
2082 retcode = check_net_options(tconn, new_conf);
2083 if (retcode != NO_ERROR)
422028b1 2084 goto fail;
422028b1 2085
0fd0ea06
PR
2086 retcode = alloc_crypto(&crypto, new_conf);
2087 if (retcode != NO_ERROR)
2088 goto fail;
b411b363 2089
b411b363
PR
2090 ((char *)new_conf->shared_secret)[SHARED_SECRET_MAX-1] = 0;
2091
80883197 2092 conn_flush_workqueue(tconn);
91fd4dad 2093
a0095508 2094 mutex_lock(&tconn->conf_update);
91fd4dad
PR
2095 old_conf = tconn->net_conf;
2096 if (old_conf) {
b411b363 2097 retcode = ERR_NET_CONFIGURED;
a0095508 2098 mutex_unlock(&tconn->conf_update);
b411b363
PR
2099 goto fail;
2100 }
44ed167d 2101 rcu_assign_pointer(tconn->net_conf, new_conf);
b411b363 2102
91fd4dad 2103 conn_free_crypto(tconn);
0fd0ea06 2104 tconn->cram_hmac_tfm = crypto.cram_hmac_tfm;
8d412fc6 2105 tconn->integrity_tfm = crypto.integrity_tfm;
0fd0ea06
PR
2106 tconn->csums_tfm = crypto.csums_tfm;
2107 tconn->verify_tfm = crypto.verify_tfm;
b411b363 2108
089c075d
AG
2109 tconn->my_addr_len = nla_len(adm_ctx.my_addr);
2110 memcpy(&tconn->my_addr, nla_data(adm_ctx.my_addr), tconn->my_addr_len);
2111 tconn->peer_addr_len = nla_len(adm_ctx.peer_addr);
2112 memcpy(&tconn->peer_addr, nla_data(adm_ctx.peer_addr), tconn->peer_addr_len);
2113
a0095508 2114 mutex_unlock(&tconn->conf_update);
91fd4dad 2115
695d08fa 2116 rcu_read_lock();
80883197
PR
2117 idr_for_each_entry(&tconn->volumes, mdev, i) {
2118 mdev->send_cnt = 0;
2119 mdev->recv_cnt = 0;
80883197 2120 }
695d08fa 2121 rcu_read_unlock();
5ee743e9
LE
2122
2123 retcode = conn_request_state(tconn, NS(conn, C_UNCONNECTED), CS_VERBOSE);
2124
80883197 2125 conn_reconfig_done(tconn);
3b98c0c2 2126 drbd_adm_finish(info, retcode);
b411b363
PR
2127 return 0;
2128
2129fail:
0fd0ea06 2130 free_crypto(&crypto);
b411b363
PR
2131 kfree(new_conf);
2132
80883197 2133 conn_reconfig_done(tconn);
3b98c0c2
LE
2134out:
2135 drbd_adm_finish(info, retcode);
b411b363
PR
2136 return 0;
2137}
2138
85f75dd7
LE
2139static enum drbd_state_rv conn_try_disconnect(struct drbd_tconn *tconn, bool force)
2140{
2141 enum drbd_state_rv rv;
85f75dd7 2142
f3dfa40a
LE
2143 rv = conn_request_state(tconn, NS(conn, C_DISCONNECTING),
2144 force ? CS_HARD : 0);
85f75dd7
LE
2145
2146 switch (rv) {
2147 case SS_NOTHING_TO_DO:
f3dfa40a 2148 break;
85f75dd7
LE
2149 case SS_ALREADY_STANDALONE:
2150 return SS_SUCCESS;
2151 case SS_PRIMARY_NOP:
2152 /* Our state checking code wants to see the peer outdated. */
2153 rv = conn_request_state(tconn, NS2(conn, C_DISCONNECTING,
f3dfa40a 2154 pdsk, D_OUTDATED), CS_VERBOSE);
85f75dd7
LE
2155 break;
2156 case SS_CW_FAILED_BY_PEER:
2157 /* The peer probably wants to see us outdated. */
2158 rv = conn_request_state(tconn, NS2(conn, C_DISCONNECTING,
2159 disk, D_OUTDATED), 0);
2160 if (rv == SS_IS_DISKLESS || rv == SS_LOWER_THAN_OUTDATED) {
f3dfa40a
LE
2161 rv = conn_request_state(tconn, NS(conn, C_DISCONNECTING),
2162 CS_HARD);
85f75dd7
LE
2163 }
2164 break;
2165 default:;
2166 /* no special handling necessary */
2167 }
2168
f3dfa40a
LE
2169 if (rv >= SS_SUCCESS) {
2170 enum drbd_state_rv rv2;
2171 /* No one else can reconfigure the network while I am here.
2172 * The state handling only uses drbd_thread_stop_nowait(),
2173 * we want to really wait here until the receiver is no more.
2174 */
2175 drbd_thread_stop(&adm_ctx.tconn->receiver);
2176
2177 /* Race breaker. This additional state change request may be
2178 * necessary, if this was a forced disconnect during a receiver
2179 * restart. We may have "killed" the receiver thread just
2180 * after drbdd_init() returned. Typically, we should be
2181 * C_STANDALONE already, now, and this becomes a no-op.
2182 */
2183 rv2 = conn_request_state(tconn, NS(conn, C_STANDALONE),
2184 CS_VERBOSE | CS_HARD);
2185 if (rv2 < SS_SUCCESS)
2186 conn_err(tconn,
2187 "unexpected rv2=%d in conn_try_disconnect()\n",
2188 rv2);
2189 }
85f75dd7
LE
2190 return rv;
2191}
2192
3b98c0c2 2193int drbd_adm_disconnect(struct sk_buff *skb, struct genl_info *info)
b411b363 2194{
3b98c0c2
LE
2195 struct disconnect_parms parms;
2196 struct drbd_tconn *tconn;
85f75dd7 2197 enum drbd_state_rv rv;
3b98c0c2
LE
2198 enum drbd_ret_code retcode;
2199 int err;
2561b9c1 2200
089c075d 2201 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_CONNECTION);
3b98c0c2
LE
2202 if (!adm_ctx.reply_skb)
2203 return retcode;
2204 if (retcode != NO_ERROR)
2561b9c1 2205 goto fail;
3b98c0c2
LE
2206
2207 tconn = adm_ctx.tconn;
2208 memset(&parms, 0, sizeof(parms));
2209 if (info->attrs[DRBD_NLA_DISCONNECT_PARMS]) {
f399002e 2210 err = disconnect_parms_from_attrs(&parms, info);
3b98c0c2
LE
2211 if (err) {
2212 retcode = ERR_MANDATORY_TAG;
2213 drbd_msg_put_info(from_attrs_err_to_txt(err));
2214 goto fail;
2215 }
2561b9c1
PR
2216 }
2217
85f75dd7
LE
2218 rv = conn_try_disconnect(tconn, parms.force_disconnect);
2219 if (rv < SS_SUCCESS)
f3dfa40a
LE
2220 retcode = rv; /* FIXME: Type mismatch. */
2221 else
2222 retcode = NO_ERROR;
b411b363 2223 fail:
3b98c0c2 2224 drbd_adm_finish(info, retcode);
b411b363
PR
2225 return 0;
2226}
2227
2228void resync_after_online_grow(struct drbd_conf *mdev)
2229{
2230 int iass; /* I am sync source */
2231
2232 dev_info(DEV, "Resync of new storage after online grow\n");
2233 if (mdev->state.role != mdev->state.peer)
2234 iass = (mdev->state.role == R_PRIMARY);
2235 else
25703f83 2236 iass = test_bit(DISCARD_CONCURRENT, &mdev->tconn->flags);
b411b363
PR
2237
2238 if (iass)
2239 drbd_start_resync(mdev, C_SYNC_SOURCE);
2240 else
2241 _drbd_request_state(mdev, NS(conn, C_WF_SYNC_UUID), CS_VERBOSE + CS_SERIALIZE);
2242}
2243
3b98c0c2 2244int drbd_adm_resize(struct sk_buff *skb, struct genl_info *info)
b411b363 2245{
daeda1cc 2246 struct disk_conf *old_disk_conf, *new_disk_conf = NULL;
3b98c0c2
LE
2247 struct resize_parms rs;
2248 struct drbd_conf *mdev;
2249 enum drbd_ret_code retcode;
b411b363 2250 enum determine_dev_size dd;
6495d2c6 2251 enum dds_flags ddsf;
daeda1cc 2252 sector_t u_size;
3b98c0c2 2253 int err;
b411b363 2254
3b98c0c2
LE
2255 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2256 if (!adm_ctx.reply_skb)
2257 return retcode;
2258 if (retcode != NO_ERROR)
b411b363 2259 goto fail;
3b98c0c2
LE
2260
2261 memset(&rs, 0, sizeof(struct resize_parms));
2262 if (info->attrs[DRBD_NLA_RESIZE_PARMS]) {
f399002e 2263 err = resize_parms_from_attrs(&rs, info);
3b98c0c2
LE
2264 if (err) {
2265 retcode = ERR_MANDATORY_TAG;
2266 drbd_msg_put_info(from_attrs_err_to_txt(err));
2267 goto fail;
2268 }
b411b363
PR
2269 }
2270
3b98c0c2 2271 mdev = adm_ctx.mdev;
b411b363
PR
2272 if (mdev->state.conn > C_CONNECTED) {
2273 retcode = ERR_RESIZE_RESYNC;
2274 goto fail;
2275 }
2276
2277 if (mdev->state.role == R_SECONDARY &&
2278 mdev->state.peer == R_SECONDARY) {
2279 retcode = ERR_NO_PRIMARY;
2280 goto fail;
2281 }
2282
2283 if (!get_ldev(mdev)) {
2284 retcode = ERR_NO_DISK;
2285 goto fail;
2286 }
2287
31890f4a 2288 if (rs.no_resync && mdev->tconn->agreed_pro_version < 93) {
6495d2c6 2289 retcode = ERR_NEED_APV_93;
9bcd2521 2290 goto fail_ldev;
6495d2c6
PR
2291 }
2292
daeda1cc
PR
2293 rcu_read_lock();
2294 u_size = rcu_dereference(mdev->ldev->disk_conf)->disk_size;
2295 rcu_read_unlock();
2296 if (u_size != (sector_t)rs.resize_size) {
2297 new_disk_conf = kmalloc(sizeof(struct disk_conf), GFP_KERNEL);
2298 if (!new_disk_conf) {
2299 retcode = ERR_NOMEM;
9bcd2521 2300 goto fail_ldev;
daeda1cc
PR
2301 }
2302 }
2303
087c2492 2304 if (mdev->ldev->known_size != drbd_get_capacity(mdev->ldev->backing_bdev))
b411b363 2305 mdev->ldev->known_size = drbd_get_capacity(mdev->ldev->backing_bdev);
b411b363 2306
daeda1cc
PR
2307 if (new_disk_conf) {
2308 mutex_lock(&mdev->tconn->conf_update);
2309 old_disk_conf = mdev->ldev->disk_conf;
2310 *new_disk_conf = *old_disk_conf;
2311 new_disk_conf->disk_size = (sector_t)rs.resize_size;
2312 rcu_assign_pointer(mdev->ldev->disk_conf, new_disk_conf);
2313 mutex_unlock(&mdev->tconn->conf_update);
2314 synchronize_rcu();
2315 kfree(old_disk_conf);
2316 }
2317
6495d2c6 2318 ddsf = (rs.resize_force ? DDSF_FORCED : 0) | (rs.no_resync ? DDSF_NO_RESYNC : 0);
24c4830c 2319 dd = drbd_determine_dev_size(mdev, ddsf);
b411b363
PR
2320 drbd_md_sync(mdev);
2321 put_ldev(mdev);
2322 if (dd == dev_size_error) {
2323 retcode = ERR_NOMEM_BITMAP;
2324 goto fail;
2325 }
2326
087c2492 2327 if (mdev->state.conn == C_CONNECTED) {
b411b363
PR
2328 if (dd == grew)
2329 set_bit(RESIZE_PENDING, &mdev->flags);
2330
2331 drbd_send_uuids(mdev);
6495d2c6 2332 drbd_send_sizes(mdev, 1, ddsf);
b411b363
PR
2333 }
2334
2335 fail:
3b98c0c2 2336 drbd_adm_finish(info, retcode);
b411b363 2337 return 0;
9bcd2521
PR
2338
2339 fail_ldev:
2340 put_ldev(mdev);
2341 goto fail;
b411b363
PR
2342}
2343
f399002e 2344int drbd_adm_resource_opts(struct sk_buff *skb, struct genl_info *info)
b411b363 2345{
3b98c0c2 2346 enum drbd_ret_code retcode;
f399002e 2347 struct drbd_tconn *tconn;
b57a1e27 2348 struct res_opts res_opts;
f399002e 2349 int err;
b411b363 2350
44e52cfa 2351 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_RESOURCE);
3b98c0c2
LE
2352 if (!adm_ctx.reply_skb)
2353 return retcode;
2354 if (retcode != NO_ERROR)
2355 goto fail;
f399002e 2356 tconn = adm_ctx.tconn;
3b98c0c2 2357
b57a1e27 2358 res_opts = tconn->res_opts;
5979e361 2359 if (should_set_defaults(info))
b966b5dd 2360 set_res_opts_defaults(&res_opts);
b411b363 2361
b57a1e27 2362 err = res_opts_from_attrs(&res_opts, info);
c75b9b10 2363 if (err && err != -ENOMSG) {
b411b363 2364 retcode = ERR_MANDATORY_TAG;
3b98c0c2 2365 drbd_msg_put_info(from_attrs_err_to_txt(err));
b411b363
PR
2366 goto fail;
2367 }
2368
afbbfa88
AG
2369 err = set_resource_options(tconn, &res_opts);
2370 if (err) {
2371 retcode = ERR_INVALID_REQUEST;
2372 if (err == -ENOMEM)
2373 retcode = ERR_NOMEM;
b411b363
PR
2374 }
2375
b411b363 2376fail:
3b98c0c2 2377 drbd_adm_finish(info, retcode);
b411b363
PR
2378 return 0;
2379}
2380
3b98c0c2 2381int drbd_adm_invalidate(struct sk_buff *skb, struct genl_info *info)
b411b363 2382{
3b98c0c2
LE
2383 struct drbd_conf *mdev;
2384 int retcode; /* enum drbd_ret_code rsp. enum drbd_state_rv */
2385
2386 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2387 if (!adm_ctx.reply_skb)
2388 return retcode;
2389 if (retcode != NO_ERROR)
2390 goto out;
2391
2392 mdev = adm_ctx.mdev;
b411b363 2393
194bfb32
LE
2394 /* If there is still bitmap IO pending, probably because of a previous
2395 * resync just being finished, wait for it before requesting a new resync. */
5016b82a 2396 drbd_suspend_io(mdev);
194bfb32
LE
2397 wait_event(mdev->misc_wait, !test_bit(BITMAP_IO, &mdev->flags));
2398
b411b363
PR
2399 retcode = _drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_T), CS_ORDERED);
2400
2401 if (retcode < SS_SUCCESS && retcode != SS_NEED_CONNECTION)
2402 retcode = drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_T));
2403
2404 while (retcode == SS_NEED_CONNECTION) {
87eeee41 2405 spin_lock_irq(&mdev->tconn->req_lock);
b411b363
PR
2406 if (mdev->state.conn < C_CONNECTED)
2407 retcode = _drbd_set_state(_NS(mdev, disk, D_INCONSISTENT), CS_VERBOSE, NULL);
87eeee41 2408 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
2409
2410 if (retcode != SS_NEED_CONNECTION)
2411 break;
2412
2413 retcode = drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_T));
2414 }
5016b82a 2415 drbd_resume_io(mdev);
b411b363 2416
3b98c0c2
LE
2417out:
2418 drbd_adm_finish(info, retcode);
b411b363
PR
2419 return 0;
2420}
2421
3b98c0c2
LE
2422static int drbd_adm_simple_request_state(struct sk_buff *skb, struct genl_info *info,
2423 union drbd_state mask, union drbd_state val)
b411b363 2424{
3b98c0c2 2425 enum drbd_ret_code retcode;
194bfb32 2426
3b98c0c2
LE
2427 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2428 if (!adm_ctx.reply_skb)
2429 return retcode;
2430 if (retcode != NO_ERROR)
2431 goto out;
b411b363 2432
3b98c0c2
LE
2433 retcode = drbd_request_state(adm_ctx.mdev, mask, val);
2434out:
2435 drbd_adm_finish(info, retcode);
b411b363
PR
2436 return 0;
2437}
2438
25b0d6c8
PR
2439static int drbd_bmio_set_susp_al(struct drbd_conf *mdev)
2440{
2441 int rv;
2442
2443 rv = drbd_bmio_set_n_write(mdev);
2444 drbd_suspend_al(mdev);
2445 return rv;
2446}
2447
3b98c0c2 2448int drbd_adm_invalidate_peer(struct sk_buff *skb, struct genl_info *info)
b411b363 2449{
25b0d6c8
PR
2450 int retcode; /* drbd_ret_code, drbd_state_rv */
2451 struct drbd_conf *mdev;
2452
2453 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2454 if (!adm_ctx.reply_skb)
2455 return retcode;
2456 if (retcode != NO_ERROR)
2457 goto out;
2458
2459 mdev = adm_ctx.mdev;
2460
5016b82a
LE
2461 /* If there is still bitmap IO pending, probably because of a previous
2462 * resync just being finished, wait for it before requesting a new resync. */
2463 drbd_suspend_io(mdev);
2464 wait_event(mdev->misc_wait, !test_bit(BITMAP_IO, &mdev->flags));
2465
25b0d6c8
PR
2466 retcode = _drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_S), CS_ORDERED);
2467 if (retcode < SS_SUCCESS) {
2468 if (retcode == SS_NEED_CONNECTION && mdev->state.role == R_PRIMARY) {
2469 /* The peer will get a resync upon connect anyways.
2470 * Just make that into a full resync. */
2471 retcode = drbd_request_state(mdev, NS(pdsk, D_INCONSISTENT));
2472 if (retcode >= SS_SUCCESS) {
2473 if (drbd_bitmap_io(mdev, &drbd_bmio_set_susp_al,
2474 "set_n_write from invalidate_peer",
2475 BM_LOCKED_SET_ALLOWED))
2476 retcode = ERR_IO_MD_DISK;
2477 }
2478 } else
2479 retcode = drbd_request_state(mdev, NS(conn, C_STARTING_SYNC_S));
2480 }
5016b82a 2481 drbd_resume_io(mdev);
25b0d6c8
PR
2482
2483out:
2484 drbd_adm_finish(info, retcode);
2485 return 0;
3b98c0c2 2486}
b411b363 2487
3b98c0c2
LE
2488int drbd_adm_pause_sync(struct sk_buff *skb, struct genl_info *info)
2489{
2490 enum drbd_ret_code retcode;
2491
2492 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2493 if (!adm_ctx.reply_skb)
2494 return retcode;
2495 if (retcode != NO_ERROR)
2496 goto out;
b411b363 2497
3b98c0c2
LE
2498 if (drbd_request_state(adm_ctx.mdev, NS(user_isp, 1)) == SS_NOTHING_TO_DO)
2499 retcode = ERR_PAUSE_IS_SET;
2500out:
2501 drbd_adm_finish(info, retcode);
b411b363
PR
2502 return 0;
2503}
2504
3b98c0c2 2505int drbd_adm_resume_sync(struct sk_buff *skb, struct genl_info *info)
b411b363 2506{
da9fbc27 2507 union drbd_dev_state s;
3b98c0c2
LE
2508 enum drbd_ret_code retcode;
2509
2510 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2511 if (!adm_ctx.reply_skb)
2512 return retcode;
2513 if (retcode != NO_ERROR)
2514 goto out;
b411b363 2515
3b98c0c2
LE
2516 if (drbd_request_state(adm_ctx.mdev, NS(user_isp, 0)) == SS_NOTHING_TO_DO) {
2517 s = adm_ctx.mdev->state;
cd88d030
PR
2518 if (s.conn == C_PAUSED_SYNC_S || s.conn == C_PAUSED_SYNC_T) {
2519 retcode = s.aftr_isp ? ERR_PIC_AFTER_DEP :
2520 s.peer_isp ? ERR_PIC_PEER_DEP : ERR_PAUSE_IS_CLEAR;
2521 } else {
2522 retcode = ERR_PAUSE_IS_CLEAR;
2523 }
2524 }
b411b363 2525
3b98c0c2
LE
2526out:
2527 drbd_adm_finish(info, retcode);
b411b363
PR
2528 return 0;
2529}
2530
3b98c0c2 2531int drbd_adm_suspend_io(struct sk_buff *skb, struct genl_info *info)
b411b363 2532{
3b98c0c2 2533 return drbd_adm_simple_request_state(skb, info, NS(susp, 1));
b411b363
PR
2534}
2535
3b98c0c2 2536int drbd_adm_resume_io(struct sk_buff *skb, struct genl_info *info)
b411b363 2537{
3b98c0c2
LE
2538 struct drbd_conf *mdev;
2539 int retcode; /* enum drbd_ret_code rsp. enum drbd_state_rv */
2540
2541 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2542 if (!adm_ctx.reply_skb)
2543 return retcode;
2544 if (retcode != NO_ERROR)
2545 goto out;
2546
2547 mdev = adm_ctx.mdev;
43a5182c
PR
2548 if (test_bit(NEW_CUR_UUID, &mdev->flags)) {
2549 drbd_uuid_new_current(mdev);
2550 clear_bit(NEW_CUR_UUID, &mdev->flags);
43a5182c 2551 }
265be2d0 2552 drbd_suspend_io(mdev);
3b98c0c2
LE
2553 retcode = drbd_request_state(mdev, NS3(susp, 0, susp_nod, 0, susp_fen, 0));
2554 if (retcode == SS_SUCCESS) {
265be2d0 2555 if (mdev->state.conn < C_CONNECTED)
2f5cdd0b 2556 tl_clear(mdev->tconn);
265be2d0 2557 if (mdev->state.disk == D_DISKLESS || mdev->state.disk == D_FAILED)
2f5cdd0b 2558 tl_restart(mdev->tconn, FAIL_FROZEN_DISK_IO);
265be2d0
PR
2559 }
2560 drbd_resume_io(mdev);
2561
3b98c0c2
LE
2562out:
2563 drbd_adm_finish(info, retcode);
b411b363
PR
2564 return 0;
2565}
2566
3b98c0c2 2567int drbd_adm_outdate(struct sk_buff *skb, struct genl_info *info)
b411b363 2568{
3b98c0c2 2569 return drbd_adm_simple_request_state(skb, info, NS(disk, D_OUTDATED));
b411b363
PR
2570}
2571
089c075d 2572int nla_put_drbd_cfg_context(struct sk_buff *skb, struct drbd_tconn *tconn, unsigned vnr)
543cc10b
LE
2573{
2574 struct nlattr *nla;
2575 nla = nla_nest_start(skb, DRBD_NLA_CFG_CONTEXT);
2576 if (!nla)
2577 goto nla_put_failure;
26ec9287
AG
2578 if (vnr != VOLUME_UNSPECIFIED &&
2579 nla_put_u32(skb, T_ctx_volume, vnr))
2580 goto nla_put_failure;
2581 if (nla_put_string(skb, T_ctx_resource_name, tconn->name))
2582 goto nla_put_failure;
2583 if (tconn->my_addr_len &&
2584 nla_put(skb, T_ctx_my_addr, tconn->my_addr_len, &tconn->my_addr))
2585 goto nla_put_failure;
2586 if (tconn->peer_addr_len &&
2587 nla_put(skb, T_ctx_peer_addr, tconn->peer_addr_len, &tconn->peer_addr))
2588 goto nla_put_failure;
543cc10b
LE
2589 nla_nest_end(skb, nla);
2590 return 0;
2591
2592nla_put_failure:
2593 if (nla)
2594 nla_nest_cancel(skb, nla);
2595 return -EMSGSIZE;
2596}
2597
3b98c0c2
LE
2598int nla_put_status_info(struct sk_buff *skb, struct drbd_conf *mdev,
2599 const struct sib_info *sib)
b411b363 2600{
3b98c0c2 2601 struct state_info *si = NULL; /* for sizeof(si->member); */
44ed167d 2602 struct net_conf *nc;
3b98c0c2
LE
2603 struct nlattr *nla;
2604 int got_ldev;
3b98c0c2
LE
2605 int err = 0;
2606 int exclude_sensitive;
2607
2608 /* If sib != NULL, this is drbd_bcast_event, which anyone can listen
2609 * to. So we better exclude_sensitive information.
2610 *
2611 * If sib == NULL, this is drbd_adm_get_status, executed synchronously
2612 * in the context of the requesting user process. Exclude sensitive
2613 * information, unless current has superuser.
2614 *
2615 * NOTE: for drbd_adm_get_status_all(), this is a netlink dump, and
2616 * relies on the current implementation of netlink_dump(), which
2617 * executes the dump callback successively from netlink_recvmsg(),
2618 * always in the context of the receiving process */
2619 exclude_sensitive = sib || !capable(CAP_SYS_ADMIN);
2620
2621 got_ldev = get_ldev(mdev);
3b98c0c2
LE
2622
2623 /* We need to add connection name and volume number information still.
2624 * Minor number is in drbd_genlmsghdr. */
089c075d 2625 if (nla_put_drbd_cfg_context(skb, mdev->tconn, mdev->vnr))
3b98c0c2 2626 goto nla_put_failure;
3b98c0c2 2627
f399002e
LE
2628 if (res_opts_to_skb(skb, &mdev->tconn->res_opts, exclude_sensitive))
2629 goto nla_put_failure;
2630
daeda1cc 2631 rcu_read_lock();
3b98c0c2 2632 if (got_ldev)
daeda1cc 2633 if (disk_conf_to_skb(skb, rcu_dereference(mdev->ldev->disk_conf), exclude_sensitive))
3b98c0c2 2634 goto nla_put_failure;
44ed167d 2635
44ed167d
PR
2636 nc = rcu_dereference(mdev->tconn->net_conf);
2637 if (nc)
2638 err = net_conf_to_skb(skb, nc, exclude_sensitive);
2639 rcu_read_unlock();
2640 if (err)
2641 goto nla_put_failure;
3b98c0c2 2642
3b98c0c2
LE
2643 nla = nla_nest_start(skb, DRBD_NLA_STATE_INFO);
2644 if (!nla)
2645 goto nla_put_failure;
26ec9287
AG
2646 if (nla_put_u32(skb, T_sib_reason, sib ? sib->sib_reason : SIB_GET_STATUS_REPLY) ||
2647 nla_put_u32(skb, T_current_state, mdev->state.i) ||
2648 nla_put_u64(skb, T_ed_uuid, mdev->ed_uuid) ||
2649 nla_put_u64(skb, T_capacity, drbd_get_capacity(mdev->this_bdev)))
2650 goto nla_put_failure;
3b98c0c2
LE
2651
2652 if (got_ldev) {
26ec9287
AG
2653 if (nla_put_u32(skb, T_disk_flags, mdev->ldev->md.flags) ||
2654 nla_put(skb, T_uuids, sizeof(si->uuids), mdev->ldev->md.uuid) ||
2655 nla_put_u64(skb, T_bits_total, drbd_bm_bits(mdev)) ||
2656 nla_put_u64(skb, T_bits_oos, drbd_bm_total_weight(mdev)))
2657 goto nla_put_failure;
3b98c0c2
LE
2658 if (C_SYNC_SOURCE <= mdev->state.conn &&
2659 C_PAUSED_SYNC_T >= mdev->state.conn) {
26ec9287
AG
2660 if (nla_put_u64(skb, T_bits_rs_total, mdev->rs_total) ||
2661 nla_put_u64(skb, T_bits_rs_failed, mdev->rs_failed))
2662 goto nla_put_failure;
3b98c0c2 2663 }
b411b363
PR
2664 }
2665
3b98c0c2
LE
2666 if (sib) {
2667 switch(sib->sib_reason) {
2668 case SIB_SYNC_PROGRESS:
2669 case SIB_GET_STATUS_REPLY:
2670 break;
2671 case SIB_STATE_CHANGE:
26ec9287
AG
2672 if (nla_put_u32(skb, T_prev_state, sib->os.i) ||
2673 nla_put_u32(skb, T_new_state, sib->ns.i))
2674 goto nla_put_failure;
3b98c0c2
LE
2675 break;
2676 case SIB_HELPER_POST:
26ec9287
AG
2677 if (nla_put_u32(skb, T_helper_exit_code,
2678 sib->helper_exit_code))
2679 goto nla_put_failure;
3b98c0c2
LE
2680 /* fall through */
2681 case SIB_HELPER_PRE:
26ec9287
AG
2682 if (nla_put_string(skb, T_helper, sib->helper_name))
2683 goto nla_put_failure;
3b98c0c2
LE
2684 break;
2685 }
b411b363 2686 }
3b98c0c2 2687 nla_nest_end(skb, nla);
b411b363 2688
3b98c0c2
LE
2689 if (0)
2690nla_put_failure:
2691 err = -EMSGSIZE;
2692 if (got_ldev)
2693 put_ldev(mdev);
3b98c0c2 2694 return err;
b411b363
PR
2695}
2696
3b98c0c2 2697int drbd_adm_get_status(struct sk_buff *skb, struct genl_info *info)
b411b363 2698{
3b98c0c2
LE
2699 enum drbd_ret_code retcode;
2700 int err;
b411b363 2701
3b98c0c2
LE
2702 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2703 if (!adm_ctx.reply_skb)
2704 return retcode;
2705 if (retcode != NO_ERROR)
2706 goto out;
b411b363 2707
3b98c0c2
LE
2708 err = nla_put_status_info(adm_ctx.reply_skb, adm_ctx.mdev, NULL);
2709 if (err) {
2710 nlmsg_free(adm_ctx.reply_skb);
2711 return err;
b411b363 2712 }
3b98c0c2
LE
2713out:
2714 drbd_adm_finish(info, retcode);
2715 return 0;
b411b363
PR
2716}
2717
71932efc 2718int get_one_status(struct sk_buff *skb, struct netlink_callback *cb)
b411b363 2719{
3b98c0c2
LE
2720 struct drbd_conf *mdev;
2721 struct drbd_genlmsghdr *dh;
543cc10b
LE
2722 struct drbd_tconn *pos = (struct drbd_tconn*)cb->args[0];
2723 struct drbd_tconn *tconn = NULL;
2724 struct drbd_tconn *tmp;
2725 unsigned volume = cb->args[1];
2726
2727 /* Open coded, deferred, iteration:
2728 * list_for_each_entry_safe(tconn, tmp, &drbd_tconns, all_tconn) {
2729 * idr_for_each_entry(&tconn->volumes, mdev, i) {
2730 * ...
2731 * }
2732 * }
2733 * where tconn is cb->args[0];
2734 * and i is cb->args[1];
2735 *
71932efc
LE
2736 * cb->args[2] indicates if we shall loop over all resources,
2737 * or just dump all volumes of a single resource.
2738 *
3b98c0c2
LE
2739 * This may miss entries inserted after this dump started,
2740 * or entries deleted before they are reached.
543cc10b
LE
2741 *
2742 * We need to make sure the mdev won't disappear while
2743 * we are looking at it, and revalidate our iterators
2744 * on each iteration.
2745 */
3b98c0c2 2746
9dc9fbb3 2747 /* synchronize with conn_create()/conn_destroy() */
c141ebda 2748 rcu_read_lock();
543cc10b 2749 /* revalidate iterator position */
ec0bddbc 2750 list_for_each_entry_rcu(tmp, &drbd_tconns, all_tconn) {
543cc10b
LE
2751 if (pos == NULL) {
2752 /* first iteration */
2753 pos = tmp;
2754 tconn = pos;
2755 break;
2756 }
2757 if (tmp == pos) {
2758 tconn = pos;
2759 break;
2760 }
2761 }
2762 if (tconn) {
71932efc 2763next_tconn:
543cc10b
LE
2764 mdev = idr_get_next(&tconn->volumes, &volume);
2765 if (!mdev) {
2766 /* No more volumes to dump on this tconn.
2767 * Advance tconn iterator. */
ec0bddbc
PR
2768 pos = list_entry_rcu(tconn->all_tconn.next,
2769 struct drbd_tconn, all_tconn);
71932efc 2770 /* Did we dump any volume on this tconn yet? */
543cc10b 2771 if (volume != 0) {
71932efc
LE
2772 /* If we reached the end of the list,
2773 * or only a single resource dump was requested,
2774 * we are done. */
2775 if (&pos->all_tconn == &drbd_tconns || cb->args[2])
2776 goto out;
543cc10b 2777 volume = 0;
71932efc 2778 tconn = pos;
543cc10b
LE
2779 goto next_tconn;
2780 }
2781 }
2782
3b98c0c2
LE
2783 dh = genlmsg_put(skb, NETLINK_CB(cb->skb).pid,
2784 cb->nlh->nlmsg_seq, &drbd_genl_family,
2785 NLM_F_MULTI, DRBD_ADM_GET_STATUS);
2786 if (!dh)
543cc10b
LE
2787 goto out;
2788
2789 if (!mdev) {
367d675d
LE
2790 /* This is a tconn without a single volume.
2791 * Suprisingly enough, it may have a network
2792 * configuration. */
2793 struct net_conf *nc;
543cc10b
LE
2794 dh->minor = -1U;
2795 dh->ret_code = NO_ERROR;
089c075d 2796 if (nla_put_drbd_cfg_context(skb, tconn, VOLUME_UNSPECIFIED))
367d675d
LE
2797 goto cancel;
2798 nc = rcu_dereference(tconn->net_conf);
2799 if (nc && net_conf_to_skb(skb, nc, 1) != 0)
2800 goto cancel;
2801 goto done;
543cc10b 2802 }
3b98c0c2 2803
543cc10b
LE
2804 D_ASSERT(mdev->vnr == volume);
2805 D_ASSERT(mdev->tconn == tconn);
3b98c0c2 2806
543cc10b 2807 dh->minor = mdev_to_minor(mdev);
3b98c0c2
LE
2808 dh->ret_code = NO_ERROR;
2809
2810 if (nla_put_status_info(skb, mdev, NULL)) {
367d675d 2811cancel:
3b98c0c2 2812 genlmsg_cancel(skb, dh);
543cc10b 2813 goto out;
3b98c0c2 2814 }
367d675d 2815done:
3b98c0c2
LE
2816 genlmsg_end(skb, dh);
2817 }
b411b363 2818
543cc10b 2819out:
c141ebda 2820 rcu_read_unlock();
543cc10b
LE
2821 /* where to start the next iteration */
2822 cb->args[0] = (long)pos;
2823 cb->args[1] = (pos == tconn) ? volume + 1 : 0;
b411b363 2824
543cc10b
LE
2825 /* No more tconns/volumes/minors found results in an empty skb.
2826 * Which will terminate the dump. */
3b98c0c2 2827 return skb->len;
b411b363
PR
2828}
2829
71932efc
LE
2830/*
2831 * Request status of all resources, or of all volumes within a single resource.
2832 *
2833 * This is a dump, as the answer may not fit in a single reply skb otherwise.
2834 * Which means we cannot use the family->attrbuf or other such members, because
2835 * dump is NOT protected by the genl_lock(). During dump, we only have access
2836 * to the incoming skb, and need to opencode "parsing" of the nlattr payload.
2837 *
2838 * Once things are setup properly, we call into get_one_status().
2839 */
2840int drbd_adm_get_status_all(struct sk_buff *skb, struct netlink_callback *cb)
2841{
2842 const unsigned hdrlen = GENL_HDRLEN + GENL_MAGIC_FAMILY_HDRSZ;
2843 struct nlattr *nla;
7c3063cc 2844 const char *resource_name;
71932efc 2845 struct drbd_tconn *tconn;
7c3063cc 2846 int maxtype;
71932efc
LE
2847
2848 /* Is this a followup call? */
2849 if (cb->args[0]) {
2850 /* ... of a single resource dump,
2851 * and the resource iterator has been advanced already? */
2852 if (cb->args[2] && cb->args[2] != cb->args[0])
2853 return 0; /* DONE. */
2854 goto dump;
2855 }
2856
2857 /* First call (from netlink_dump_start). We need to figure out
2858 * which resource(s) the user wants us to dump. */
2859 nla = nla_find(nlmsg_attrdata(cb->nlh, hdrlen),
2860 nlmsg_attrlen(cb->nlh, hdrlen),
2861 DRBD_NLA_CFG_CONTEXT);
2862
2863 /* No explicit context given. Dump all. */
2864 if (!nla)
2865 goto dump;
7c3063cc
AG
2866 maxtype = ARRAY_SIZE(drbd_cfg_context_nl_policy) - 1;
2867 nla = drbd_nla_find_nested(maxtype, nla, __nla_type(T_ctx_resource_name));
2868 if (IS_ERR(nla))
2869 return PTR_ERR(nla);
71932efc
LE
2870 /* context given, but no name present? */
2871 if (!nla)
2872 return -EINVAL;
7c3063cc
AG
2873 resource_name = nla_data(nla);
2874 tconn = conn_get_by_name(resource_name);
0ace9dfa 2875
71932efc
LE
2876 if (!tconn)
2877 return -ENODEV;
2878
0ace9dfa
PR
2879 kref_put(&tconn->kref, &conn_destroy); /* get_one_status() (re)validates tconn by itself */
2880
71932efc
LE
2881 /* prime iterators, and set "filter" mode mark:
2882 * only dump this tconn. */
2883 cb->args[0] = (long)tconn;
2884 /* cb->args[1] = 0; passed in this way. */
2885 cb->args[2] = (long)tconn;
2886
2887dump:
2888 return get_one_status(skb, cb);
2889}
2890
3b98c0c2 2891int drbd_adm_get_timeout_type(struct sk_buff *skb, struct genl_info *info)
b411b363 2892{
3b98c0c2
LE
2893 enum drbd_ret_code retcode;
2894 struct timeout_parms tp;
2895 int err;
b411b363 2896
3b98c0c2
LE
2897 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2898 if (!adm_ctx.reply_skb)
2899 return retcode;
2900 if (retcode != NO_ERROR)
2901 goto out;
b411b363 2902
3b98c0c2
LE
2903 tp.timeout_type =
2904 adm_ctx.mdev->state.pdsk == D_OUTDATED ? UT_PEER_OUTDATED :
2905 test_bit(USE_DEGR_WFC_T, &adm_ctx.mdev->flags) ? UT_DEGRADED :
2906 UT_DEFAULT;
b411b363 2907
3b98c0c2
LE
2908 err = timeout_parms_to_priv_skb(adm_ctx.reply_skb, &tp);
2909 if (err) {
2910 nlmsg_free(adm_ctx.reply_skb);
2911 return err;
2912 }
2913out:
2914 drbd_adm_finish(info, retcode);
2915 return 0;
b411b363
PR
2916}
2917
3b98c0c2 2918int drbd_adm_start_ov(struct sk_buff *skb, struct genl_info *info)
b411b363 2919{
3b98c0c2
LE
2920 struct drbd_conf *mdev;
2921 enum drbd_ret_code retcode;
b411b363 2922
3b98c0c2
LE
2923 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2924 if (!adm_ctx.reply_skb)
2925 return retcode;
2926 if (retcode != NO_ERROR)
2927 goto out;
873b0d5f 2928
3b98c0c2
LE
2929 mdev = adm_ctx.mdev;
2930 if (info->attrs[DRBD_NLA_START_OV_PARMS]) {
2931 /* resume from last known position, if possible */
2932 struct start_ov_parms parms =
2933 { .ov_start_sector = mdev->ov_start_sector };
f399002e 2934 int err = start_ov_parms_from_attrs(&parms, info);
3b98c0c2
LE
2935 if (err) {
2936 retcode = ERR_MANDATORY_TAG;
2937 drbd_msg_put_info(from_attrs_err_to_txt(err));
2938 goto out;
2939 }
2940 /* w_make_ov_request expects position to be aligned */
2941 mdev->ov_start_sector = parms.ov_start_sector & ~BM_SECT_PER_BIT;
2942 }
873b0d5f
LE
2943 /* If there is still bitmap IO pending, e.g. previous resync or verify
2944 * just being finished, wait for it before requesting a new resync. */
5016b82a 2945 drbd_suspend_io(mdev);
873b0d5f 2946 wait_event(mdev->misc_wait, !test_bit(BITMAP_IO, &mdev->flags));
3b98c0c2 2947 retcode = drbd_request_state(mdev,NS(conn,C_VERIFY_S));
5016b82a 2948 drbd_resume_io(mdev);
3b98c0c2
LE
2949out:
2950 drbd_adm_finish(info, retcode);
b411b363
PR
2951 return 0;
2952}
2953
2954
3b98c0c2 2955int drbd_adm_new_c_uuid(struct sk_buff *skb, struct genl_info *info)
b411b363 2956{
3b98c0c2
LE
2957 struct drbd_conf *mdev;
2958 enum drbd_ret_code retcode;
b411b363
PR
2959 int skip_initial_sync = 0;
2960 int err;
3b98c0c2 2961 struct new_c_uuid_parms args;
b411b363 2962
3b98c0c2
LE
2963 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
2964 if (!adm_ctx.reply_skb)
2965 return retcode;
2966 if (retcode != NO_ERROR)
2967 goto out_nolock;
b411b363 2968
3b98c0c2
LE
2969 mdev = adm_ctx.mdev;
2970 memset(&args, 0, sizeof(args));
2971 if (info->attrs[DRBD_NLA_NEW_C_UUID_PARMS]) {
f399002e 2972 err = new_c_uuid_parms_from_attrs(&args, info);
3b98c0c2
LE
2973 if (err) {
2974 retcode = ERR_MANDATORY_TAG;
2975 drbd_msg_put_info(from_attrs_err_to_txt(err));
2976 goto out_nolock;
2977 }
b411b363
PR
2978 }
2979
8410da8f 2980 mutex_lock(mdev->state_mutex); /* Protects us against serialized state changes. */
b411b363
PR
2981
2982 if (!get_ldev(mdev)) {
2983 retcode = ERR_NO_DISK;
2984 goto out;
2985 }
2986
2987 /* this is "skip initial sync", assume to be clean */
31890f4a 2988 if (mdev->state.conn == C_CONNECTED && mdev->tconn->agreed_pro_version >= 90 &&
b411b363
PR
2989 mdev->ldev->md.uuid[UI_CURRENT] == UUID_JUST_CREATED && args.clear_bm) {
2990 dev_info(DEV, "Preparing to skip initial sync\n");
2991 skip_initial_sync = 1;
2992 } else if (mdev->state.conn != C_STANDALONE) {
2993 retcode = ERR_CONNECTED;
2994 goto out_dec;
2995 }
2996
2997 drbd_uuid_set(mdev, UI_BITMAP, 0); /* Rotate UI_BITMAP to History 1, etc... */
2998 drbd_uuid_new_current(mdev); /* New current, previous to UI_BITMAP */
2999
3000 if (args.clear_bm) {
20ceb2b2
LE
3001 err = drbd_bitmap_io(mdev, &drbd_bmio_clear_n_write,
3002 "clear_n_write from new_c_uuid", BM_LOCKED_MASK);
b411b363
PR
3003 if (err) {
3004 dev_err(DEV, "Writing bitmap failed with %d\n",err);
3005 retcode = ERR_IO_MD_DISK;
3006 }
3007 if (skip_initial_sync) {
3008 drbd_send_uuids_skip_initial_sync(mdev);
3009 _drbd_uuid_set(mdev, UI_BITMAP, 0);
62b0da3a 3010 drbd_print_uuids(mdev, "cleared bitmap UUID");
87eeee41 3011 spin_lock_irq(&mdev->tconn->req_lock);
b411b363
PR
3012 _drbd_set_state(_NS2(mdev, disk, D_UP_TO_DATE, pdsk, D_UP_TO_DATE),
3013 CS_VERBOSE, NULL);
87eeee41 3014 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
3015 }
3016 }
3017
3018 drbd_md_sync(mdev);
3019out_dec:
3020 put_ldev(mdev);
3021out:
8410da8f 3022 mutex_unlock(mdev->state_mutex);
3b98c0c2
LE
3023out_nolock:
3024 drbd_adm_finish(info, retcode);
774b3055
PR
3025 return 0;
3026}
3027
3b98c0c2 3028static enum drbd_ret_code
7c3063cc 3029drbd_check_resource_name(const char *name)
774b3055 3030{
3b98c0c2 3031 if (!name || !name[0]) {
7c3063cc 3032 drbd_msg_put_info("resource name missing");
3b98c0c2 3033 return ERR_MANDATORY_TAG;
774b3055 3034 }
3b98c0c2
LE
3035 /* if we want to use these in sysfs/configfs/debugfs some day,
3036 * we must not allow slashes */
3037 if (strchr(name, '/')) {
7c3063cc 3038 drbd_msg_put_info("invalid resource name");
3b98c0c2 3039 return ERR_INVALID_REQUEST;
774b3055 3040 }
3b98c0c2 3041 return NO_ERROR;
774b3055
PR
3042}
3043
789c1b62 3044int drbd_adm_new_resource(struct sk_buff *skb, struct genl_info *info)
b411b363 3045{
3b98c0c2 3046 enum drbd_ret_code retcode;
afbbfa88
AG
3047 struct res_opts res_opts;
3048 int err;
9f5180e5 3049
3b98c0c2
LE
3050 retcode = drbd_adm_prepare(skb, info, 0);
3051 if (!adm_ctx.reply_skb)
3052 return retcode;
3053 if (retcode != NO_ERROR)
3054 goto out;
b411b363 3055
afbbfa88
AG
3056 set_res_opts_defaults(&res_opts);
3057 err = res_opts_from_attrs(&res_opts, info);
3058 if (err && err != -ENOMSG) {
3059 retcode = ERR_MANDATORY_TAG;
3060 drbd_msg_put_info(from_attrs_err_to_txt(err));
3061 goto out;
3062 }
3063
7c3063cc 3064 retcode = drbd_check_resource_name(adm_ctx.resource_name);
3b98c0c2
LE
3065 if (retcode != NO_ERROR)
3066 goto out;
b411b363 3067
3b98c0c2 3068 if (adm_ctx.tconn) {
38f19616
LE
3069 if (info->nlhdr->nlmsg_flags & NLM_F_EXCL) {
3070 retcode = ERR_INVALID_REQUEST;
789c1b62 3071 drbd_msg_put_info("resource exists");
38f19616
LE
3072 }
3073 /* else: still NO_ERROR */
3b98c0c2 3074 goto out;
b411b363
PR
3075 }
3076
afbbfa88 3077 if (!conn_create(adm_ctx.resource_name, &res_opts))
b411b363 3078 retcode = ERR_NOMEM;
3b98c0c2
LE
3079out:
3080 drbd_adm_finish(info, retcode);
3081 return 0;
b411b363
PR
3082}
3083
3b98c0c2 3084int drbd_adm_add_minor(struct sk_buff *skb, struct genl_info *info)
b411b363 3085{
3b98c0c2
LE
3086 struct drbd_genlmsghdr *dh = info->userhdr;
3087 enum drbd_ret_code retcode;
b411b363 3088
44e52cfa 3089 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_RESOURCE);
3b98c0c2
LE
3090 if (!adm_ctx.reply_skb)
3091 return retcode;
3092 if (retcode != NO_ERROR)
3093 goto out;
b411b363 3094
f2257a56 3095 if (dh->minor > MINORMASK) {
3b98c0c2
LE
3096 drbd_msg_put_info("requested minor out of range");
3097 retcode = ERR_INVALID_REQUEST;
3098 goto out;
b411b363 3099 }
0c8e36d9 3100 if (adm_ctx.volume > DRBD_VOLUME_MAX) {
3b98c0c2
LE
3101 drbd_msg_put_info("requested volume id out of range");
3102 retcode = ERR_INVALID_REQUEST;
3103 goto out;
b411b363 3104 }
b411b363 3105
38f19616
LE
3106 /* drbd_adm_prepare made sure already
3107 * that mdev->tconn and mdev->vnr match the request. */
3108 if (adm_ctx.mdev) {
3109 if (info->nlhdr->nlmsg_flags & NLM_F_EXCL)
3110 retcode = ERR_MINOR_EXISTS;
3111 /* else: still NO_ERROR */
3112 goto out;
3113 }
3114
3b98c0c2
LE
3115 retcode = conn_new_minor(adm_ctx.tconn, dh->minor, adm_ctx.volume);
3116out:
3117 drbd_adm_finish(info, retcode);
3118 return 0;
b411b363
PR
3119}
3120
85f75dd7
LE
3121static enum drbd_ret_code adm_delete_minor(struct drbd_conf *mdev)
3122{
3123 if (mdev->state.disk == D_DISKLESS &&
3124 /* no need to be mdev->state.conn == C_STANDALONE &&
3125 * we may want to delete a minor from a live replication group.
3126 */
3127 mdev->state.role == R_SECONDARY) {
369bea63
PR
3128 _drbd_request_state(mdev, NS(conn, C_WF_REPORT_PARAMS),
3129 CS_VERBOSE + CS_WAIT_COMPLETE);
81fa2e67
PR
3130 idr_remove(&mdev->tconn->volumes, mdev->vnr);
3131 idr_remove(&minors, mdev_to_minor(mdev));
3132 del_gendisk(mdev->vdisk);
3133 synchronize_rcu();
3134 kref_put(&mdev->kref, &drbd_minor_destroy);
85f75dd7
LE
3135 return NO_ERROR;
3136 } else
3137 return ERR_MINOR_CONFIGURED;
3138}
3139
3b98c0c2 3140int drbd_adm_delete_minor(struct sk_buff *skb, struct genl_info *info)
b411b363 3141{
3b98c0c2 3142 enum drbd_ret_code retcode;
b411b363 3143
3b98c0c2
LE
3144 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_MINOR);
3145 if (!adm_ctx.reply_skb)
3146 return retcode;
3147 if (retcode != NO_ERROR)
3148 goto out;
b411b363 3149
85f75dd7 3150 retcode = adm_delete_minor(adm_ctx.mdev);
85f75dd7
LE
3151out:
3152 drbd_adm_finish(info, retcode);
3153 return 0;
3154}
3155
3156int drbd_adm_down(struct sk_buff *skb, struct genl_info *info)
3157{
f3dfa40a 3158 int retcode; /* enum drbd_ret_code rsp. enum drbd_state_rv */
85f75dd7
LE
3159 struct drbd_conf *mdev;
3160 unsigned i;
3161
3162 retcode = drbd_adm_prepare(skb, info, 0);
3163 if (!adm_ctx.reply_skb)
3164 return retcode;
3165 if (retcode != NO_ERROR)
3166 goto out;
3167
3168 if (!adm_ctx.tconn) {
789c1b62 3169 retcode = ERR_RES_NOT_KNOWN;
85f75dd7
LE
3170 goto out;
3171 }
3172
85f75dd7
LE
3173 /* demote */
3174 idr_for_each_entry(&adm_ctx.tconn->volumes, mdev, i) {
3175 retcode = drbd_set_role(mdev, R_SECONDARY, 0);
3176 if (retcode < SS_SUCCESS) {
3177 drbd_msg_put_info("failed to demote");
c141ebda 3178 goto out;
85f75dd7
LE
3179 }
3180 }
3181
f3dfa40a
LE
3182 retcode = conn_try_disconnect(adm_ctx.tconn, 0);
3183 if (retcode < SS_SUCCESS) {
85f75dd7 3184 drbd_msg_put_info("failed to disconnect");
f3dfa40a 3185 goto out;
85f75dd7
LE
3186 }
3187
3188 /* detach */
3189 idr_for_each_entry(&adm_ctx.tconn->volumes, mdev, i) {
cdfda633 3190 retcode = adm_detach(mdev, 0);
f3dfa40a 3191 if (retcode < SS_SUCCESS) {
85f75dd7 3192 drbd_msg_put_info("failed to detach");
c141ebda 3193 goto out;
85f75dd7
LE
3194 }
3195 }
3196
f3dfa40a
LE
3197 /* If we reach this, all volumes (of this tconn) are Secondary,
3198 * Disconnected, Diskless, aka Unconfigured. Make sure all threads have
c141ebda 3199 * actually stopped, state handling only does drbd_thread_stop_nowait(). */
f3dfa40a
LE
3200 drbd_thread_stop(&adm_ctx.tconn->worker);
3201
3202 /* Now, nothing can fail anymore */
3203
85f75dd7
LE
3204 /* delete volumes */
3205 idr_for_each_entry(&adm_ctx.tconn->volumes, mdev, i) {
3206 retcode = adm_delete_minor(mdev);
3207 if (retcode != NO_ERROR) {
3208 /* "can not happen" */
3209 drbd_msg_put_info("failed to delete volume");
ef356262 3210 goto out;
85f75dd7
LE
3211 }
3212 }
3213
85f75dd7
LE
3214 /* delete connection */
3215 if (conn_lowest_minor(adm_ctx.tconn) < 0) {
ec0bddbc
PR
3216 list_del_rcu(&adm_ctx.tconn->all_tconn);
3217 synchronize_rcu();
9dc9fbb3
PR
3218 kref_put(&adm_ctx.tconn->kref, &conn_destroy);
3219
85f75dd7
LE
3220 retcode = NO_ERROR;
3221 } else {
3222 /* "can not happen" */
789c1b62 3223 retcode = ERR_RES_IN_USE;
85f75dd7 3224 drbd_msg_put_info("failed to delete connection");
85f75dd7 3225 }
ef356262 3226 goto out;
3b98c0c2
LE
3227out:
3228 drbd_adm_finish(info, retcode);
3229 return 0;
b411b363
PR
3230}
3231
789c1b62 3232int drbd_adm_del_resource(struct sk_buff *skb, struct genl_info *info)
b411b363 3233{
3b98c0c2 3234 enum drbd_ret_code retcode;
b411b363 3235
44e52cfa 3236 retcode = drbd_adm_prepare(skb, info, DRBD_ADM_NEED_RESOURCE);
3b98c0c2
LE
3237 if (!adm_ctx.reply_skb)
3238 return retcode;
3239 if (retcode != NO_ERROR)
3240 goto out;
3241
3242 if (conn_lowest_minor(adm_ctx.tconn) < 0) {
ec0bddbc
PR
3243 list_del_rcu(&adm_ctx.tconn->all_tconn);
3244 synchronize_rcu();
9dc9fbb3
PR
3245 kref_put(&adm_ctx.tconn->kref, &conn_destroy);
3246
3b98c0c2
LE
3247 retcode = NO_ERROR;
3248 } else {
789c1b62 3249 retcode = ERR_RES_IN_USE;
b411b363
PR
3250 }
3251
992d6e91
LE
3252 if (retcode == NO_ERROR)
3253 drbd_thread_stop(&adm_ctx.tconn->worker);
3b98c0c2
LE
3254out:
3255 drbd_adm_finish(info, retcode);
b411b363
PR
3256 return 0;
3257}
3258
3b98c0c2 3259void drbd_bcast_event(struct drbd_conf *mdev, const struct sib_info *sib)
b411b363 3260{
3b98c0c2
LE
3261 static atomic_t drbd_genl_seq = ATOMIC_INIT(2); /* two. */
3262 struct sk_buff *msg;
3263 struct drbd_genlmsghdr *d_out;
3264 unsigned seq;
3265 int err = -ENOMEM;
3266
3267 seq = atomic_inc_return(&drbd_genl_seq);
3268 msg = genlmsg_new(NLMSG_GOODSIZE, GFP_NOIO);
3269 if (!msg)
3270 goto failed;
3271
3272 err = -EMSGSIZE;
3273 d_out = genlmsg_put(msg, 0, seq, &drbd_genl_family, 0, DRBD_EVENT);
3274 if (!d_out) /* cannot happen, but anyways. */
3275 goto nla_put_failure;
3276 d_out->minor = mdev_to_minor(mdev);
6f9b5f84 3277 d_out->ret_code = NO_ERROR;
3b98c0c2
LE
3278
3279 if (nla_put_status_info(msg, mdev, sib))
3280 goto nla_put_failure;
3281 genlmsg_end(msg, d_out);
3282 err = drbd_genl_multicast_events(msg, 0);
3283 /* msg has been consumed or freed in netlink_broadcast() */
3284 if (err && err != -ESRCH)
3285 goto failed;
b411b363 3286
3b98c0c2 3287 return;
b411b363 3288
3b98c0c2
LE
3289nla_put_failure:
3290 nlmsg_free(msg);
3291failed:
3292 dev_err(DEV, "Error %d while broadcasting event. "
3293 "Event seq:%u sib_reason:%u\n",
3294 err, seq, sib->sib_reason);
b411b363 3295}
This page took 0.381412 seconds and 5 git commands to generate.