drbd: Allow to wait for the completion of an epoch entry as well
[deliverable/linux.git] / drivers / block / drbd / drbd_receiver.c
CommitLineData
b411b363
PR
1/*
2 drbd_receiver.c
3
4 This file is part of DRBD by Philipp Reisner and Lars Ellenberg.
5
6 Copyright (C) 2001-2008, LINBIT Information Technologies GmbH.
7 Copyright (C) 1999-2008, Philipp Reisner <philipp.reisner@linbit.com>.
8 Copyright (C) 2002-2008, Lars Ellenberg <lars.ellenberg@linbit.com>.
9
10 drbd is free software; you can redistribute it and/or modify
11 it under the terms of the GNU General Public License as published by
12 the Free Software Foundation; either version 2, or (at your option)
13 any later version.
14
15 drbd is distributed in the hope that it will be useful,
16 but WITHOUT ANY WARRANTY; without even the implied warranty of
17 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
18 GNU General Public License for more details.
19
20 You should have received a copy of the GNU General Public License
21 along with drbd; see the file COPYING. If not, write to
22 the Free Software Foundation, 675 Mass Ave, Cambridge, MA 02139, USA.
23 */
24
25
b411b363
PR
26#include <linux/module.h>
27
28#include <asm/uaccess.h>
29#include <net/sock.h>
30
b411b363
PR
31#include <linux/drbd.h>
32#include <linux/fs.h>
33#include <linux/file.h>
34#include <linux/in.h>
35#include <linux/mm.h>
36#include <linux/memcontrol.h>
37#include <linux/mm_inline.h>
38#include <linux/slab.h>
b411b363
PR
39#include <linux/pkt_sched.h>
40#define __KERNEL_SYSCALLS__
41#include <linux/unistd.h>
42#include <linux/vmalloc.h>
43#include <linux/random.h>
b411b363
PR
44#include <linux/string.h>
45#include <linux/scatterlist.h>
46#include "drbd_int.h"
b411b363
PR
47#include "drbd_req.h"
48
49#include "drbd_vli.h"
50
b411b363
PR
51enum finish_epoch {
52 FE_STILL_LIVE,
53 FE_DESTROYED,
54 FE_RECYCLED,
55};
56
57static int drbd_do_handshake(struct drbd_conf *mdev);
58static int drbd_do_auth(struct drbd_conf *mdev);
59
60static enum finish_epoch drbd_may_finish_epoch(struct drbd_conf *, struct drbd_epoch *, enum epoch_event);
61static int e_end_block(struct drbd_conf *, struct drbd_work *, int);
62
b411b363
PR
63
64#define GFP_TRY (__GFP_HIGHMEM | __GFP_NOWARN)
65
45bb912b
LE
66/*
67 * some helper functions to deal with single linked page lists,
68 * page->private being our "next" pointer.
69 */
70
71/* If at least n pages are linked at head, get n pages off.
72 * Otherwise, don't modify head, and return NULL.
73 * Locking is the responsibility of the caller.
74 */
75static struct page *page_chain_del(struct page **head, int n)
76{
77 struct page *page;
78 struct page *tmp;
79
80 BUG_ON(!n);
81 BUG_ON(!head);
82
83 page = *head;
23ce4227
PR
84
85 if (!page)
86 return NULL;
87
45bb912b
LE
88 while (page) {
89 tmp = page_chain_next(page);
90 if (--n == 0)
91 break; /* found sufficient pages */
92 if (tmp == NULL)
93 /* insufficient pages, don't use any of them. */
94 return NULL;
95 page = tmp;
96 }
97
98 /* add end of list marker for the returned list */
99 set_page_private(page, 0);
100 /* actual return value, and adjustment of head */
101 page = *head;
102 *head = tmp;
103 return page;
104}
105
106/* may be used outside of locks to find the tail of a (usually short)
107 * "private" page chain, before adding it back to a global chain head
108 * with page_chain_add() under a spinlock. */
109static struct page *page_chain_tail(struct page *page, int *len)
110{
111 struct page *tmp;
112 int i = 1;
113 while ((tmp = page_chain_next(page)))
114 ++i, page = tmp;
115 if (len)
116 *len = i;
117 return page;
118}
119
120static int page_chain_free(struct page *page)
121{
122 struct page *tmp;
123 int i = 0;
124 page_chain_for_each_safe(page, tmp) {
125 put_page(page);
126 ++i;
127 }
128 return i;
129}
130
131static void page_chain_add(struct page **head,
132 struct page *chain_first, struct page *chain_last)
133{
134#if 1
135 struct page *tmp;
136 tmp = page_chain_tail(chain_first, NULL);
137 BUG_ON(tmp != chain_last);
138#endif
139
140 /* add chain to head */
141 set_page_private(chain_last, (unsigned long)*head);
142 *head = chain_first;
143}
144
145static struct page *drbd_pp_first_pages_or_try_alloc(struct drbd_conf *mdev, int number)
b411b363
PR
146{
147 struct page *page = NULL;
45bb912b
LE
148 struct page *tmp = NULL;
149 int i = 0;
b411b363
PR
150
151 /* Yes, testing drbd_pp_vacant outside the lock is racy.
152 * So what. It saves a spin_lock. */
45bb912b 153 if (drbd_pp_vacant >= number) {
b411b363 154 spin_lock(&drbd_pp_lock);
45bb912b
LE
155 page = page_chain_del(&drbd_pp_pool, number);
156 if (page)
157 drbd_pp_vacant -= number;
b411b363 158 spin_unlock(&drbd_pp_lock);
45bb912b
LE
159 if (page)
160 return page;
b411b363 161 }
45bb912b 162
b411b363
PR
163 /* GFP_TRY, because we must not cause arbitrary write-out: in a DRBD
164 * "criss-cross" setup, that might cause write-out on some other DRBD,
165 * which in turn might block on the other node at this very place. */
45bb912b
LE
166 for (i = 0; i < number; i++) {
167 tmp = alloc_page(GFP_TRY);
168 if (!tmp)
169 break;
170 set_page_private(tmp, (unsigned long)page);
171 page = tmp;
172 }
173
174 if (i == number)
175 return page;
176
177 /* Not enough pages immediately available this time.
178 * No need to jump around here, drbd_pp_alloc will retry this
179 * function "soon". */
180 if (page) {
181 tmp = page_chain_tail(page, NULL);
182 spin_lock(&drbd_pp_lock);
183 page_chain_add(&drbd_pp_pool, page, tmp);
184 drbd_pp_vacant += i;
185 spin_unlock(&drbd_pp_lock);
186 }
187 return NULL;
b411b363
PR
188}
189
b411b363
PR
190static void reclaim_net_ee(struct drbd_conf *mdev, struct list_head *to_be_freed)
191{
192 struct drbd_epoch_entry *e;
193 struct list_head *le, *tle;
194
195 /* The EEs are always appended to the end of the list. Since
196 they are sent in order over the wire, they have to finish
197 in order. As soon as we see the first not finished we can
198 stop to examine the list... */
199
200 list_for_each_safe(le, tle, &mdev->net_ee) {
201 e = list_entry(le, struct drbd_epoch_entry, w.list);
45bb912b 202 if (drbd_ee_has_active_page(e))
b411b363
PR
203 break;
204 list_move(le, to_be_freed);
205 }
206}
207
208static void drbd_kick_lo_and_reclaim_net(struct drbd_conf *mdev)
209{
210 LIST_HEAD(reclaimed);
211 struct drbd_epoch_entry *e, *t;
212
87eeee41 213 spin_lock_irq(&mdev->tconn->req_lock);
b411b363 214 reclaim_net_ee(mdev, &reclaimed);
87eeee41 215 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
216
217 list_for_each_entry_safe(e, t, &reclaimed, w.list)
435f0740 218 drbd_free_net_ee(mdev, e);
b411b363
PR
219}
220
221/**
45bb912b 222 * drbd_pp_alloc() - Returns @number pages, retries forever (or until signalled)
b411b363 223 * @mdev: DRBD device.
45bb912b
LE
224 * @number: number of pages requested
225 * @retry: whether to retry, if not enough pages are available right now
226 *
227 * Tries to allocate number pages, first from our own page pool, then from
228 * the kernel, unless this allocation would exceed the max_buffers setting.
229 * Possibly retry until DRBD frees sufficient pages somewhere else.
b411b363 230 *
45bb912b 231 * Returns a page chain linked via page->private.
b411b363 232 */
45bb912b 233static struct page *drbd_pp_alloc(struct drbd_conf *mdev, unsigned number, bool retry)
b411b363
PR
234{
235 struct page *page = NULL;
236 DEFINE_WAIT(wait);
237
45bb912b
LE
238 /* Yes, we may run up to @number over max_buffers. If we
239 * follow it strictly, the admin will get it wrong anyways. */
89e58e75 240 if (atomic_read(&mdev->pp_in_use) < mdev->tconn->net_conf->max_buffers)
45bb912b 241 page = drbd_pp_first_pages_or_try_alloc(mdev, number);
b411b363 242
45bb912b 243 while (page == NULL) {
b411b363
PR
244 prepare_to_wait(&drbd_pp_wait, &wait, TASK_INTERRUPTIBLE);
245
246 drbd_kick_lo_and_reclaim_net(mdev);
247
89e58e75 248 if (atomic_read(&mdev->pp_in_use) < mdev->tconn->net_conf->max_buffers) {
45bb912b 249 page = drbd_pp_first_pages_or_try_alloc(mdev, number);
b411b363
PR
250 if (page)
251 break;
252 }
253
254 if (!retry)
255 break;
256
257 if (signal_pending(current)) {
258 dev_warn(DEV, "drbd_pp_alloc interrupted!\n");
259 break;
260 }
261
262 schedule();
263 }
264 finish_wait(&drbd_pp_wait, &wait);
265
45bb912b
LE
266 if (page)
267 atomic_add(number, &mdev->pp_in_use);
b411b363
PR
268 return page;
269}
270
271/* Must not be used from irq, as that may deadlock: see drbd_pp_alloc.
87eeee41 272 * Is also used from inside an other spin_lock_irq(&mdev->tconn->req_lock);
45bb912b
LE
273 * Either links the page chain back to the global pool,
274 * or returns all pages to the system. */
435f0740 275static void drbd_pp_free(struct drbd_conf *mdev, struct page *page, int is_net)
b411b363 276{
435f0740 277 atomic_t *a = is_net ? &mdev->pp_in_use_by_net : &mdev->pp_in_use;
b411b363 278 int i;
435f0740 279
1816a2b4 280 if (drbd_pp_vacant > (DRBD_MAX_BIO_SIZE/PAGE_SIZE)*minor_count)
45bb912b
LE
281 i = page_chain_free(page);
282 else {
283 struct page *tmp;
284 tmp = page_chain_tail(page, &i);
285 spin_lock(&drbd_pp_lock);
286 page_chain_add(&drbd_pp_pool, page, tmp);
287 drbd_pp_vacant += i;
288 spin_unlock(&drbd_pp_lock);
b411b363 289 }
435f0740 290 i = atomic_sub_return(i, a);
45bb912b 291 if (i < 0)
435f0740
LE
292 dev_warn(DEV, "ASSERTION FAILED: %s: %d < 0\n",
293 is_net ? "pp_in_use_by_net" : "pp_in_use", i);
b411b363
PR
294 wake_up(&drbd_pp_wait);
295}
296
297/*
298You need to hold the req_lock:
299 _drbd_wait_ee_list_empty()
300
301You must not have the req_lock:
302 drbd_free_ee()
303 drbd_alloc_ee()
304 drbd_init_ee()
305 drbd_release_ee()
306 drbd_ee_fix_bhs()
307 drbd_process_done_ee()
308 drbd_clear_done_ee()
309 drbd_wait_ee_list_empty()
310*/
311
312struct drbd_epoch_entry *drbd_alloc_ee(struct drbd_conf *mdev,
313 u64 id,
314 sector_t sector,
315 unsigned int data_size,
316 gfp_t gfp_mask) __must_hold(local)
317{
b411b363
PR
318 struct drbd_epoch_entry *e;
319 struct page *page;
45bb912b 320 unsigned nr_pages = (data_size + PAGE_SIZE -1) >> PAGE_SHIFT;
b411b363 321
0cf9d27e 322 if (drbd_insert_fault(mdev, DRBD_FAULT_AL_EE))
b411b363
PR
323 return NULL;
324
325 e = mempool_alloc(drbd_ee_mempool, gfp_mask & ~__GFP_HIGHMEM);
326 if (!e) {
327 if (!(gfp_mask & __GFP_NOWARN))
328 dev_err(DEV, "alloc_ee: Allocation of an EE failed\n");
329 return NULL;
330 }
331
45bb912b
LE
332 page = drbd_pp_alloc(mdev, nr_pages, (gfp_mask & __GFP_WAIT));
333 if (!page)
334 goto fail;
b411b363 335
8b946255 336 drbd_clear_interval(&e->i);
53840641
AG
337 e->i.size = data_size;
338 e->i.sector = sector;
339 e->i.waiting = false;
340
b411b363 341 e->epoch = NULL;
45bb912b
LE
342 e->mdev = mdev;
343 e->pages = page;
344 atomic_set(&e->pending_bios, 0);
b411b363 345 e->flags = 0;
9a8e7753
AG
346 /*
347 * The block_id is opaque to the receiver. It is not endianness
348 * converted, and sent back to the sender unchanged.
349 */
45bb912b 350 e->block_id = id;
b411b363 351
b411b363
PR
352 return e;
353
45bb912b 354 fail:
b411b363 355 mempool_free(e, drbd_ee_mempool);
b411b363
PR
356 return NULL;
357}
358
435f0740 359void drbd_free_some_ee(struct drbd_conf *mdev, struct drbd_epoch_entry *e, int is_net)
b411b363 360{
c36c3ced
LE
361 if (e->flags & EE_HAS_DIGEST)
362 kfree(e->digest);
435f0740 363 drbd_pp_free(mdev, e->pages, is_net);
45bb912b 364 D_ASSERT(atomic_read(&e->pending_bios) == 0);
8b946255 365 D_ASSERT(drbd_interval_empty(&e->i));
b411b363
PR
366 mempool_free(e, drbd_ee_mempool);
367}
368
369int drbd_release_ee(struct drbd_conf *mdev, struct list_head *list)
370{
371 LIST_HEAD(work_list);
372 struct drbd_epoch_entry *e, *t;
373 int count = 0;
435f0740 374 int is_net = list == &mdev->net_ee;
b411b363 375
87eeee41 376 spin_lock_irq(&mdev->tconn->req_lock);
b411b363 377 list_splice_init(list, &work_list);
87eeee41 378 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
379
380 list_for_each_entry_safe(e, t, &work_list, w.list) {
435f0740 381 drbd_free_some_ee(mdev, e, is_net);
b411b363
PR
382 count++;
383 }
384 return count;
385}
386
387
388/*
389 * This function is called from _asender only_
8554df1c 390 * but see also comments in _req_mod(,BARRIER_ACKED)
b411b363
PR
391 * and receive_Barrier.
392 *
393 * Move entries from net_ee to done_ee, if ready.
394 * Grab done_ee, call all callbacks, free the entries.
395 * The callbacks typically send out ACKs.
396 */
397static int drbd_process_done_ee(struct drbd_conf *mdev)
398{
399 LIST_HEAD(work_list);
400 LIST_HEAD(reclaimed);
401 struct drbd_epoch_entry *e, *t;
402 int ok = (mdev->state.conn >= C_WF_REPORT_PARAMS);
403
87eeee41 404 spin_lock_irq(&mdev->tconn->req_lock);
b411b363
PR
405 reclaim_net_ee(mdev, &reclaimed);
406 list_splice_init(&mdev->done_ee, &work_list);
87eeee41 407 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
408
409 list_for_each_entry_safe(e, t, &reclaimed, w.list)
435f0740 410 drbd_free_net_ee(mdev, e);
b411b363
PR
411
412 /* possible callbacks here:
413 * e_end_block, and e_end_resync_block, e_send_discard_ack.
414 * all ignore the last argument.
415 */
416 list_for_each_entry_safe(e, t, &work_list, w.list) {
b411b363
PR
417 /* list_del not necessary, next/prev members not touched */
418 ok = e->w.cb(mdev, &e->w, !ok) && ok;
419 drbd_free_ee(mdev, e);
420 }
421 wake_up(&mdev->ee_wait);
422
423 return ok;
424}
425
426void _drbd_wait_ee_list_empty(struct drbd_conf *mdev, struct list_head *head)
427{
428 DEFINE_WAIT(wait);
429
430 /* avoids spin_lock/unlock
431 * and calling prepare_to_wait in the fast path */
432 while (!list_empty(head)) {
433 prepare_to_wait(&mdev->ee_wait, &wait, TASK_UNINTERRUPTIBLE);
87eeee41 434 spin_unlock_irq(&mdev->tconn->req_lock);
7eaceacc 435 io_schedule();
b411b363 436 finish_wait(&mdev->ee_wait, &wait);
87eeee41 437 spin_lock_irq(&mdev->tconn->req_lock);
b411b363
PR
438 }
439}
440
441void drbd_wait_ee_list_empty(struct drbd_conf *mdev, struct list_head *head)
442{
87eeee41 443 spin_lock_irq(&mdev->tconn->req_lock);
b411b363 444 _drbd_wait_ee_list_empty(mdev, head);
87eeee41 445 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
446}
447
448/* see also kernel_accept; which is only present since 2.6.18.
449 * also we want to log which part of it failed, exactly */
450static int drbd_accept(struct drbd_conf *mdev, const char **what,
451 struct socket *sock, struct socket **newsock)
452{
453 struct sock *sk = sock->sk;
454 int err = 0;
455
456 *what = "listen";
457 err = sock->ops->listen(sock, 5);
458 if (err < 0)
459 goto out;
460
461 *what = "sock_create_lite";
462 err = sock_create_lite(sk->sk_family, sk->sk_type, sk->sk_protocol,
463 newsock);
464 if (err < 0)
465 goto out;
466
467 *what = "accept";
468 err = sock->ops->accept(sock, *newsock, 0);
469 if (err < 0) {
470 sock_release(*newsock);
471 *newsock = NULL;
472 goto out;
473 }
474 (*newsock)->ops = sock->ops;
475
476out:
477 return err;
478}
479
480static int drbd_recv_short(struct drbd_conf *mdev, struct socket *sock,
481 void *buf, size_t size, int flags)
482{
483 mm_segment_t oldfs;
484 struct kvec iov = {
485 .iov_base = buf,
486 .iov_len = size,
487 };
488 struct msghdr msg = {
489 .msg_iovlen = 1,
490 .msg_iov = (struct iovec *)&iov,
491 .msg_flags = (flags ? flags : MSG_WAITALL | MSG_NOSIGNAL)
492 };
493 int rv;
494
495 oldfs = get_fs();
496 set_fs(KERNEL_DS);
497 rv = sock_recvmsg(sock, &msg, size, msg.msg_flags);
498 set_fs(oldfs);
499
500 return rv;
501}
502
503static int drbd_recv(struct drbd_conf *mdev, void *buf, size_t size)
504{
505 mm_segment_t oldfs;
506 struct kvec iov = {
507 .iov_base = buf,
508 .iov_len = size,
509 };
510 struct msghdr msg = {
511 .msg_iovlen = 1,
512 .msg_iov = (struct iovec *)&iov,
513 .msg_flags = MSG_WAITALL | MSG_NOSIGNAL
514 };
515 int rv;
516
517 oldfs = get_fs();
518 set_fs(KERNEL_DS);
519
520 for (;;) {
e42325a5 521 rv = sock_recvmsg(mdev->tconn->data.socket, &msg, size, msg.msg_flags);
b411b363
PR
522 if (rv == size)
523 break;
524
525 /* Note:
526 * ECONNRESET other side closed the connection
527 * ERESTARTSYS (on sock) we got a signal
528 */
529
530 if (rv < 0) {
531 if (rv == -ECONNRESET)
532 dev_info(DEV, "sock was reset by peer\n");
533 else if (rv != -ERESTARTSYS)
534 dev_err(DEV, "sock_recvmsg returned %d\n", rv);
535 break;
536 } else if (rv == 0) {
537 dev_info(DEV, "sock was shut down by peer\n");
538 break;
539 } else {
540 /* signal came in, or peer/link went down,
541 * after we read a partial message
542 */
543 /* D_ASSERT(signal_pending(current)); */
544 break;
545 }
546 };
547
548 set_fs(oldfs);
549
550 if (rv != size)
551 drbd_force_state(mdev, NS(conn, C_BROKEN_PIPE));
552
553 return rv;
554}
555
5dbf1673
LE
556/* quoting tcp(7):
557 * On individual connections, the socket buffer size must be set prior to the
558 * listen(2) or connect(2) calls in order to have it take effect.
559 * This is our wrapper to do so.
560 */
561static void drbd_setbufsize(struct socket *sock, unsigned int snd,
562 unsigned int rcv)
563{
564 /* open coded SO_SNDBUF, SO_RCVBUF */
565 if (snd) {
566 sock->sk->sk_sndbuf = snd;
567 sock->sk->sk_userlocks |= SOCK_SNDBUF_LOCK;
568 }
569 if (rcv) {
570 sock->sk->sk_rcvbuf = rcv;
571 sock->sk->sk_userlocks |= SOCK_RCVBUF_LOCK;
572 }
573}
574
b411b363
PR
575static struct socket *drbd_try_connect(struct drbd_conf *mdev)
576{
577 const char *what;
578 struct socket *sock;
579 struct sockaddr_in6 src_in6;
580 int err;
581 int disconnect_on_error = 1;
582
b2fb6dbe 583 if (!get_net_conf(mdev->tconn))
b411b363
PR
584 return NULL;
585
586 what = "sock_create_kern";
89e58e75 587 err = sock_create_kern(((struct sockaddr *)mdev->tconn->net_conf->my_addr)->sa_family,
b411b363
PR
588 SOCK_STREAM, IPPROTO_TCP, &sock);
589 if (err < 0) {
590 sock = NULL;
591 goto out;
592 }
593
594 sock->sk->sk_rcvtimeo =
89e58e75
PR
595 sock->sk->sk_sndtimeo = mdev->tconn->net_conf->try_connect_int*HZ;
596 drbd_setbufsize(sock, mdev->tconn->net_conf->sndbuf_size,
597 mdev->tconn->net_conf->rcvbuf_size);
b411b363
PR
598
599 /* explicitly bind to the configured IP as source IP
600 * for the outgoing connections.
601 * This is needed for multihomed hosts and to be
602 * able to use lo: interfaces for drbd.
603 * Make sure to use 0 as port number, so linux selects
604 * a free one dynamically.
605 */
89e58e75
PR
606 memcpy(&src_in6, mdev->tconn->net_conf->my_addr,
607 min_t(int, mdev->tconn->net_conf->my_addr_len, sizeof(src_in6)));
608 if (((struct sockaddr *)mdev->tconn->net_conf->my_addr)->sa_family == AF_INET6)
b411b363
PR
609 src_in6.sin6_port = 0;
610 else
611 ((struct sockaddr_in *)&src_in6)->sin_port = 0; /* AF_INET & AF_SCI */
612
613 what = "bind before connect";
614 err = sock->ops->bind(sock,
615 (struct sockaddr *) &src_in6,
89e58e75 616 mdev->tconn->net_conf->my_addr_len);
b411b363
PR
617 if (err < 0)
618 goto out;
619
620 /* connect may fail, peer not yet available.
621 * stay C_WF_CONNECTION, don't go Disconnecting! */
622 disconnect_on_error = 0;
623 what = "connect";
624 err = sock->ops->connect(sock,
89e58e75
PR
625 (struct sockaddr *)mdev->tconn->net_conf->peer_addr,
626 mdev->tconn->net_conf->peer_addr_len, 0);
b411b363
PR
627
628out:
629 if (err < 0) {
630 if (sock) {
631 sock_release(sock);
632 sock = NULL;
633 }
634 switch (-err) {
635 /* timeout, busy, signal pending */
636 case ETIMEDOUT: case EAGAIN: case EINPROGRESS:
637 case EINTR: case ERESTARTSYS:
638 /* peer not (yet) available, network problem */
639 case ECONNREFUSED: case ENETUNREACH:
640 case EHOSTDOWN: case EHOSTUNREACH:
641 disconnect_on_error = 0;
642 break;
643 default:
644 dev_err(DEV, "%s failed, err = %d\n", what, err);
645 }
646 if (disconnect_on_error)
647 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
648 }
b2fb6dbe 649 put_net_conf(mdev->tconn);
b411b363
PR
650 return sock;
651}
652
653static struct socket *drbd_wait_for_connect(struct drbd_conf *mdev)
654{
655 int timeo, err;
656 struct socket *s_estab = NULL, *s_listen;
657 const char *what;
658
b2fb6dbe 659 if (!get_net_conf(mdev->tconn))
b411b363
PR
660 return NULL;
661
662 what = "sock_create_kern";
89e58e75 663 err = sock_create_kern(((struct sockaddr *)mdev->tconn->net_conf->my_addr)->sa_family,
b411b363
PR
664 SOCK_STREAM, IPPROTO_TCP, &s_listen);
665 if (err) {
666 s_listen = NULL;
667 goto out;
668 }
669
89e58e75 670 timeo = mdev->tconn->net_conf->try_connect_int * HZ;
b411b363
PR
671 timeo += (random32() & 1) ? timeo / 7 : -timeo / 7; /* 28.5% random jitter */
672
673 s_listen->sk->sk_reuse = 1; /* SO_REUSEADDR */
674 s_listen->sk->sk_rcvtimeo = timeo;
675 s_listen->sk->sk_sndtimeo = timeo;
89e58e75
PR
676 drbd_setbufsize(s_listen, mdev->tconn->net_conf->sndbuf_size,
677 mdev->tconn->net_conf->rcvbuf_size);
b411b363
PR
678
679 what = "bind before listen";
680 err = s_listen->ops->bind(s_listen,
89e58e75
PR
681 (struct sockaddr *) mdev->tconn->net_conf->my_addr,
682 mdev->tconn->net_conf->my_addr_len);
b411b363
PR
683 if (err < 0)
684 goto out;
685
686 err = drbd_accept(mdev, &what, s_listen, &s_estab);
687
688out:
689 if (s_listen)
690 sock_release(s_listen);
691 if (err < 0) {
692 if (err != -EAGAIN && err != -EINTR && err != -ERESTARTSYS) {
693 dev_err(DEV, "%s failed, err = %d\n", what, err);
694 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
695 }
696 }
b2fb6dbe 697 put_net_conf(mdev->tconn);
b411b363
PR
698
699 return s_estab;
700}
701
d8763023
AG
702static int drbd_send_fp(struct drbd_conf *mdev, struct socket *sock,
703 enum drbd_packet cmd)
b411b363 704{
c012949a 705 struct p_header *h = &mdev->tconn->data.sbuf.header;
b411b363
PR
706
707 return _drbd_send_cmd(mdev, sock, cmd, h, sizeof(*h), 0);
708}
709
d8763023
AG
710static enum drbd_packet drbd_recv_fp(struct drbd_conf *mdev,
711 struct socket *sock)
b411b363 712{
e42325a5 713 struct p_header80 *h = &mdev->tconn->data.rbuf.header.h80;
b411b363
PR
714 int rr;
715
716 rr = drbd_recv_short(mdev, sock, h, sizeof(*h), 0);
717
ca9bc12b 718 if (rr == sizeof(*h) && h->magic == cpu_to_be32(DRBD_MAGIC))
b411b363
PR
719 return be16_to_cpu(h->command);
720
721 return 0xffff;
722}
723
724/**
725 * drbd_socket_okay() - Free the socket if its connection is not okay
726 * @mdev: DRBD device.
727 * @sock: pointer to the pointer to the socket.
728 */
729static int drbd_socket_okay(struct drbd_conf *mdev, struct socket **sock)
730{
731 int rr;
732 char tb[4];
733
734 if (!*sock)
81e84650 735 return false;
b411b363
PR
736
737 rr = drbd_recv_short(mdev, *sock, tb, 4, MSG_DONTWAIT | MSG_PEEK);
738
739 if (rr > 0 || rr == -EAGAIN) {
81e84650 740 return true;
b411b363
PR
741 } else {
742 sock_release(*sock);
743 *sock = NULL;
81e84650 744 return false;
b411b363
PR
745 }
746}
747
748/*
749 * return values:
750 * 1 yes, we have a valid connection
751 * 0 oops, did not work out, please try again
752 * -1 peer talks different language,
753 * no point in trying again, please go standalone.
754 * -2 We do not have a network config...
755 */
756static int drbd_connect(struct drbd_conf *mdev)
757{
758 struct socket *s, *sock, *msock;
759 int try, h, ok;
760
e42325a5 761 D_ASSERT(!mdev->tconn->data.socket);
b411b363 762
b411b363
PR
763 if (drbd_request_state(mdev, NS(conn, C_WF_CONNECTION)) < SS_SUCCESS)
764 return -2;
765
766 clear_bit(DISCARD_CONCURRENT, &mdev->flags);
fd340c12
PR
767 mdev->tconn->agreed_pro_version = 99;
768 /* agreed_pro_version must be smaller than 100 so we send the old
769 header (h80) in the first packet and in the handshake packet. */
b411b363
PR
770
771 sock = NULL;
772 msock = NULL;
773
774 do {
775 for (try = 0;;) {
776 /* 3 tries, this should take less than a second! */
777 s = drbd_try_connect(mdev);
778 if (s || ++try >= 3)
779 break;
780 /* give the other side time to call bind() & listen() */
20ee6390 781 schedule_timeout_interruptible(HZ / 10);
b411b363
PR
782 }
783
784 if (s) {
785 if (!sock) {
786 drbd_send_fp(mdev, s, P_HAND_SHAKE_S);
787 sock = s;
788 s = NULL;
789 } else if (!msock) {
790 drbd_send_fp(mdev, s, P_HAND_SHAKE_M);
791 msock = s;
792 s = NULL;
793 } else {
794 dev_err(DEV, "Logic error in drbd_connect()\n");
795 goto out_release_sockets;
796 }
797 }
798
799 if (sock && msock) {
89e58e75 800 schedule_timeout_interruptible(mdev->tconn->net_conf->ping_timeo*HZ/10);
b411b363
PR
801 ok = drbd_socket_okay(mdev, &sock);
802 ok = drbd_socket_okay(mdev, &msock) && ok;
803 if (ok)
804 break;
805 }
806
807retry:
808 s = drbd_wait_for_connect(mdev);
809 if (s) {
810 try = drbd_recv_fp(mdev, s);
811 drbd_socket_okay(mdev, &sock);
812 drbd_socket_okay(mdev, &msock);
813 switch (try) {
814 case P_HAND_SHAKE_S:
815 if (sock) {
816 dev_warn(DEV, "initial packet S crossed\n");
817 sock_release(sock);
818 }
819 sock = s;
820 break;
821 case P_HAND_SHAKE_M:
822 if (msock) {
823 dev_warn(DEV, "initial packet M crossed\n");
824 sock_release(msock);
825 }
826 msock = s;
827 set_bit(DISCARD_CONCURRENT, &mdev->flags);
828 break;
829 default:
830 dev_warn(DEV, "Error receiving initial packet\n");
831 sock_release(s);
832 if (random32() & 1)
833 goto retry;
834 }
835 }
836
837 if (mdev->state.conn <= C_DISCONNECTING)
838 goto out_release_sockets;
839 if (signal_pending(current)) {
840 flush_signals(current);
841 smp_rmb();
e6b3ea83 842 if (get_t_state(&mdev->tconn->receiver) == EXITING)
b411b363
PR
843 goto out_release_sockets;
844 }
845
846 if (sock && msock) {
847 ok = drbd_socket_okay(mdev, &sock);
848 ok = drbd_socket_okay(mdev, &msock) && ok;
849 if (ok)
850 break;
851 }
852 } while (1);
853
854 msock->sk->sk_reuse = 1; /* SO_REUSEADDR */
855 sock->sk->sk_reuse = 1; /* SO_REUSEADDR */
856
857 sock->sk->sk_allocation = GFP_NOIO;
858 msock->sk->sk_allocation = GFP_NOIO;
859
860 sock->sk->sk_priority = TC_PRIO_INTERACTIVE_BULK;
861 msock->sk->sk_priority = TC_PRIO_INTERACTIVE;
862
b411b363 863 /* NOT YET ...
89e58e75 864 * sock->sk->sk_sndtimeo = mdev->tconn->net_conf->timeout*HZ/10;
b411b363
PR
865 * sock->sk->sk_rcvtimeo = MAX_SCHEDULE_TIMEOUT;
866 * first set it to the P_HAND_SHAKE timeout,
867 * which we set to 4x the configured ping_timeout. */
868 sock->sk->sk_sndtimeo =
89e58e75 869 sock->sk->sk_rcvtimeo = mdev->tconn->net_conf->ping_timeo*4*HZ/10;
b411b363 870
89e58e75
PR
871 msock->sk->sk_sndtimeo = mdev->tconn->net_conf->timeout*HZ/10;
872 msock->sk->sk_rcvtimeo = mdev->tconn->net_conf->ping_int*HZ;
b411b363
PR
873
874 /* we don't want delays.
25985edc 875 * we use TCP_CORK where appropriate, though */
b411b363
PR
876 drbd_tcp_nodelay(sock);
877 drbd_tcp_nodelay(msock);
878
e42325a5
PR
879 mdev->tconn->data.socket = sock;
880 mdev->tconn->meta.socket = msock;
31890f4a 881 mdev->tconn->last_received = jiffies;
b411b363 882
e6b3ea83 883 D_ASSERT(mdev->tconn->asender.task == NULL);
b411b363
PR
884
885 h = drbd_do_handshake(mdev);
886 if (h <= 0)
887 return h;
888
a0638456 889 if (mdev->tconn->cram_hmac_tfm) {
b411b363 890 /* drbd_request_state(mdev, NS(conn, WFAuth)); */
b10d96cb
JT
891 switch (drbd_do_auth(mdev)) {
892 case -1:
b411b363
PR
893 dev_err(DEV, "Authentication of peer failed\n");
894 return -1;
b10d96cb
JT
895 case 0:
896 dev_err(DEV, "Authentication of peer failed, trying again.\n");
897 return 0;
b411b363
PR
898 }
899 }
900
901 if (drbd_request_state(mdev, NS(conn, C_WF_REPORT_PARAMS)) < SS_SUCCESS)
902 return 0;
903
89e58e75 904 sock->sk->sk_sndtimeo = mdev->tconn->net_conf->timeout*HZ/10;
b411b363
PR
905 sock->sk->sk_rcvtimeo = MAX_SCHEDULE_TIMEOUT;
906
907 atomic_set(&mdev->packet_seq, 0);
908 mdev->peer_seq = 0;
909
e6b3ea83 910 drbd_thread_start(&mdev->tconn->asender);
b411b363 911
148efa16 912 if (drbd_send_protocol(mdev) == -1)
7e2455c1 913 return -1;
b411b363 914 drbd_send_sync_param(mdev, &mdev->sync_conf);
e89b591c 915 drbd_send_sizes(mdev, 0, 0);
b411b363
PR
916 drbd_send_uuids(mdev);
917 drbd_send_state(mdev);
918 clear_bit(USE_DEGR_WFC_T, &mdev->flags);
919 clear_bit(RESIZE_PENDING, &mdev->flags);
7fde2be9 920 mod_timer(&mdev->request_timer, jiffies + HZ); /* just start it here. */
b411b363
PR
921
922 return 1;
923
924out_release_sockets:
925 if (sock)
926 sock_release(sock);
927 if (msock)
928 sock_release(msock);
929 return -1;
930}
931
d8763023
AG
932static bool decode_header(struct drbd_conf *mdev, struct p_header *h,
933 enum drbd_packet *cmd, unsigned int *packet_size)
b411b363 934{
fd340c12 935 if (h->h80.magic == cpu_to_be32(DRBD_MAGIC)) {
02918be2
PR
936 *cmd = be16_to_cpu(h->h80.command);
937 *packet_size = be16_to_cpu(h->h80.length);
ca9bc12b 938 } else if (h->h95.magic == cpu_to_be16(DRBD_MAGIC_BIG)) {
02918be2 939 *cmd = be16_to_cpu(h->h95.command);
fd340c12 940 *packet_size = be32_to_cpu(h->h95.length) & 0x00ffffff;
02918be2 941 } else {
004352fa
LE
942 dev_err(DEV, "magic?? on data m: 0x%08x c: %d l: %d\n",
943 be32_to_cpu(h->h80.magic),
944 be16_to_cpu(h->h80.command),
945 be16_to_cpu(h->h80.length));
81e84650 946 return false;
b411b363 947 }
257d0af6
PR
948 return true;
949}
950
d8763023
AG
951static int drbd_recv_header(struct drbd_conf *mdev, enum drbd_packet *cmd,
952 unsigned int *packet_size)
257d0af6
PR
953{
954 struct p_header *h = &mdev->tconn->data.rbuf.header;
955 int r;
956
957 r = drbd_recv(mdev, h, sizeof(*h));
958 if (unlikely(r != sizeof(*h))) {
959 if (!signal_pending(current))
960 dev_warn(DEV, "short read expecting header on sock: r=%d\n", r);
961 return false;
962 }
963
964 r = decode_header(mdev, h, cmd, packet_size);
31890f4a 965 mdev->tconn->last_received = jiffies;
b411b363 966
257d0af6 967 return r;
b411b363
PR
968}
969
2451fc3b 970static void drbd_flush(struct drbd_conf *mdev)
b411b363
PR
971{
972 int rv;
973
974 if (mdev->write_ordering >= WO_bdev_flush && get_ldev(mdev)) {
fbd9b09a 975 rv = blkdev_issue_flush(mdev->ldev->backing_bdev, GFP_KERNEL,
dd3932ed 976 NULL);
b411b363
PR
977 if (rv) {
978 dev_err(DEV, "local disk flush failed with status %d\n", rv);
979 /* would rather check on EOPNOTSUPP, but that is not reliable.
980 * don't try again for ANY return value != 0
981 * if (rv == -EOPNOTSUPP) */
982 drbd_bump_write_ordering(mdev, WO_drain_io);
983 }
984 put_ldev(mdev);
985 }
b411b363
PR
986}
987
988/**
989 * drbd_may_finish_epoch() - Applies an epoch_event to the epoch's state, eventually finishes it.
990 * @mdev: DRBD device.
991 * @epoch: Epoch object.
992 * @ev: Epoch event.
993 */
994static enum finish_epoch drbd_may_finish_epoch(struct drbd_conf *mdev,
995 struct drbd_epoch *epoch,
996 enum epoch_event ev)
997{
2451fc3b 998 int epoch_size;
b411b363 999 struct drbd_epoch *next_epoch;
b411b363
PR
1000 enum finish_epoch rv = FE_STILL_LIVE;
1001
1002 spin_lock(&mdev->epoch_lock);
1003 do {
1004 next_epoch = NULL;
b411b363
PR
1005
1006 epoch_size = atomic_read(&epoch->epoch_size);
1007
1008 switch (ev & ~EV_CLEANUP) {
1009 case EV_PUT:
1010 atomic_dec(&epoch->active);
1011 break;
1012 case EV_GOT_BARRIER_NR:
1013 set_bit(DE_HAVE_BARRIER_NUMBER, &epoch->flags);
b411b363
PR
1014 break;
1015 case EV_BECAME_LAST:
1016 /* nothing to do*/
1017 break;
1018 }
1019
b411b363
PR
1020 if (epoch_size != 0 &&
1021 atomic_read(&epoch->active) == 0 &&
2451fc3b 1022 test_bit(DE_HAVE_BARRIER_NUMBER, &epoch->flags)) {
b411b363
PR
1023 if (!(ev & EV_CLEANUP)) {
1024 spin_unlock(&mdev->epoch_lock);
1025 drbd_send_b_ack(mdev, epoch->barrier_nr, epoch_size);
1026 spin_lock(&mdev->epoch_lock);
1027 }
1028 dec_unacked(mdev);
1029
1030 if (mdev->current_epoch != epoch) {
1031 next_epoch = list_entry(epoch->list.next, struct drbd_epoch, list);
1032 list_del(&epoch->list);
1033 ev = EV_BECAME_LAST | (ev & EV_CLEANUP);
1034 mdev->epochs--;
b411b363
PR
1035 kfree(epoch);
1036
1037 if (rv == FE_STILL_LIVE)
1038 rv = FE_DESTROYED;
1039 } else {
1040 epoch->flags = 0;
1041 atomic_set(&epoch->epoch_size, 0);
698f9315 1042 /* atomic_set(&epoch->active, 0); is already zero */
b411b363
PR
1043 if (rv == FE_STILL_LIVE)
1044 rv = FE_RECYCLED;
2451fc3b 1045 wake_up(&mdev->ee_wait);
b411b363
PR
1046 }
1047 }
1048
1049 if (!next_epoch)
1050 break;
1051
1052 epoch = next_epoch;
1053 } while (1);
1054
1055 spin_unlock(&mdev->epoch_lock);
1056
b411b363
PR
1057 return rv;
1058}
1059
1060/**
1061 * drbd_bump_write_ordering() - Fall back to an other write ordering method
1062 * @mdev: DRBD device.
1063 * @wo: Write ordering method to try.
1064 */
1065void drbd_bump_write_ordering(struct drbd_conf *mdev, enum write_ordering_e wo) __must_hold(local)
1066{
1067 enum write_ordering_e pwo;
1068 static char *write_ordering_str[] = {
1069 [WO_none] = "none",
1070 [WO_drain_io] = "drain",
1071 [WO_bdev_flush] = "flush",
b411b363
PR
1072 };
1073
1074 pwo = mdev->write_ordering;
1075 wo = min(pwo, wo);
b411b363
PR
1076 if (wo == WO_bdev_flush && mdev->ldev->dc.no_disk_flush)
1077 wo = WO_drain_io;
1078 if (wo == WO_drain_io && mdev->ldev->dc.no_disk_drain)
1079 wo = WO_none;
1080 mdev->write_ordering = wo;
2451fc3b 1081 if (pwo != mdev->write_ordering || wo == WO_bdev_flush)
b411b363
PR
1082 dev_info(DEV, "Method to ensure write ordering: %s\n", write_ordering_str[mdev->write_ordering]);
1083}
1084
45bb912b
LE
1085/**
1086 * drbd_submit_ee()
1087 * @mdev: DRBD device.
1088 * @e: epoch entry
1089 * @rw: flag field, see bio->bi_rw
10f6d992
LE
1090 *
1091 * May spread the pages to multiple bios,
1092 * depending on bio_add_page restrictions.
1093 *
1094 * Returns 0 if all bios have been submitted,
1095 * -ENOMEM if we could not allocate enough bios,
1096 * -ENOSPC (any better suggestion?) if we have not been able to bio_add_page a
1097 * single page to an empty bio (which should never happen and likely indicates
1098 * that the lower level IO stack is in some way broken). This has been observed
1099 * on certain Xen deployments.
45bb912b
LE
1100 */
1101/* TODO allocate from our own bio_set. */
1102int drbd_submit_ee(struct drbd_conf *mdev, struct drbd_epoch_entry *e,
1103 const unsigned rw, const int fault_type)
1104{
1105 struct bio *bios = NULL;
1106 struct bio *bio;
1107 struct page *page = e->pages;
010f6e67
AG
1108 sector_t sector = e->i.sector;
1109 unsigned ds = e->i.size;
45bb912b
LE
1110 unsigned n_bios = 0;
1111 unsigned nr_pages = (ds + PAGE_SIZE -1) >> PAGE_SHIFT;
10f6d992 1112 int err = -ENOMEM;
45bb912b
LE
1113
1114 /* In most cases, we will only need one bio. But in case the lower
1115 * level restrictions happen to be different at this offset on this
1116 * side than those of the sending peer, we may need to submit the
1117 * request in more than one bio. */
1118next_bio:
1119 bio = bio_alloc(GFP_NOIO, nr_pages);
1120 if (!bio) {
1121 dev_err(DEV, "submit_ee: Allocation of a bio failed\n");
1122 goto fail;
1123 }
010f6e67 1124 /* > e->i.sector, unless this is the first bio */
45bb912b
LE
1125 bio->bi_sector = sector;
1126 bio->bi_bdev = mdev->ldev->backing_bdev;
45bb912b
LE
1127 bio->bi_rw = rw;
1128 bio->bi_private = e;
1129 bio->bi_end_io = drbd_endio_sec;
1130
1131 bio->bi_next = bios;
1132 bios = bio;
1133 ++n_bios;
1134
1135 page_chain_for_each(page) {
1136 unsigned len = min_t(unsigned, ds, PAGE_SIZE);
1137 if (!bio_add_page(bio, page, len, 0)) {
10f6d992
LE
1138 /* A single page must always be possible!
1139 * But in case it fails anyways,
1140 * we deal with it, and complain (below). */
1141 if (bio->bi_vcnt == 0) {
1142 dev_err(DEV,
1143 "bio_add_page failed for len=%u, "
1144 "bi_vcnt=0 (bi_sector=%llu)\n",
1145 len, (unsigned long long)bio->bi_sector);
1146 err = -ENOSPC;
1147 goto fail;
1148 }
45bb912b
LE
1149 goto next_bio;
1150 }
1151 ds -= len;
1152 sector += len >> 9;
1153 --nr_pages;
1154 }
1155 D_ASSERT(page == NULL);
1156 D_ASSERT(ds == 0);
1157
1158 atomic_set(&e->pending_bios, n_bios);
1159 do {
1160 bio = bios;
1161 bios = bios->bi_next;
1162 bio->bi_next = NULL;
1163
45bb912b 1164 drbd_generic_make_request(mdev, fault_type, bio);
45bb912b 1165 } while (bios);
45bb912b
LE
1166 return 0;
1167
1168fail:
1169 while (bios) {
1170 bio = bios;
1171 bios = bios->bi_next;
1172 bio_put(bio);
1173 }
10f6d992 1174 return err;
45bb912b
LE
1175}
1176
53840641
AG
1177static void drbd_remove_epoch_entry_interval(struct drbd_conf *mdev,
1178 struct drbd_epoch_entry *e)
1179{
1180 struct drbd_interval *i = &e->i;
1181
1182 drbd_remove_interval(&mdev->write_requests, i);
1183 drbd_clear_interval(i);
1184
1185 /* Wake up any processes waiting for this epoch entry to complete. */
1186 if (i->waiting)
1187 wake_up(&mdev->misc_wait);
1188}
1189
d8763023
AG
1190static int receive_Barrier(struct drbd_conf *mdev, enum drbd_packet cmd,
1191 unsigned int data_size)
b411b363 1192{
2451fc3b 1193 int rv;
e42325a5 1194 struct p_barrier *p = &mdev->tconn->data.rbuf.barrier;
b411b363
PR
1195 struct drbd_epoch *epoch;
1196
b411b363
PR
1197 inc_unacked(mdev);
1198
b411b363
PR
1199 mdev->current_epoch->barrier_nr = p->barrier;
1200 rv = drbd_may_finish_epoch(mdev, mdev->current_epoch, EV_GOT_BARRIER_NR);
1201
1202 /* P_BARRIER_ACK may imply that the corresponding extent is dropped from
1203 * the activity log, which means it would not be resynced in case the
1204 * R_PRIMARY crashes now.
1205 * Therefore we must send the barrier_ack after the barrier request was
1206 * completed. */
1207 switch (mdev->write_ordering) {
b411b363
PR
1208 case WO_none:
1209 if (rv == FE_RECYCLED)
81e84650 1210 return true;
2451fc3b
PR
1211
1212 /* receiver context, in the writeout path of the other node.
1213 * avoid potential distributed deadlock */
1214 epoch = kmalloc(sizeof(struct drbd_epoch), GFP_NOIO);
1215 if (epoch)
1216 break;
1217 else
1218 dev_warn(DEV, "Allocation of an epoch failed, slowing down\n");
1219 /* Fall through */
b411b363
PR
1220
1221 case WO_bdev_flush:
1222 case WO_drain_io:
b411b363 1223 drbd_wait_ee_list_empty(mdev, &mdev->active_ee);
2451fc3b
PR
1224 drbd_flush(mdev);
1225
1226 if (atomic_read(&mdev->current_epoch->epoch_size)) {
1227 epoch = kmalloc(sizeof(struct drbd_epoch), GFP_NOIO);
1228 if (epoch)
1229 break;
b411b363
PR
1230 }
1231
2451fc3b
PR
1232 epoch = mdev->current_epoch;
1233 wait_event(mdev->ee_wait, atomic_read(&epoch->epoch_size) == 0);
1234
1235 D_ASSERT(atomic_read(&epoch->active) == 0);
1236 D_ASSERT(epoch->flags == 0);
b411b363 1237
81e84650 1238 return true;
2451fc3b
PR
1239 default:
1240 dev_err(DEV, "Strangeness in mdev->write_ordering %d\n", mdev->write_ordering);
81e84650 1241 return false;
b411b363
PR
1242 }
1243
1244 epoch->flags = 0;
1245 atomic_set(&epoch->epoch_size, 0);
1246 atomic_set(&epoch->active, 0);
1247
1248 spin_lock(&mdev->epoch_lock);
1249 if (atomic_read(&mdev->current_epoch->epoch_size)) {
1250 list_add(&epoch->list, &mdev->current_epoch->list);
1251 mdev->current_epoch = epoch;
1252 mdev->epochs++;
b411b363
PR
1253 } else {
1254 /* The current_epoch got recycled while we allocated this one... */
1255 kfree(epoch);
1256 }
1257 spin_unlock(&mdev->epoch_lock);
1258
81e84650 1259 return true;
b411b363
PR
1260}
1261
1262/* used from receive_RSDataReply (recv_resync_read)
1263 * and from receive_Data */
1264static struct drbd_epoch_entry *
1265read_in_block(struct drbd_conf *mdev, u64 id, sector_t sector, int data_size) __must_hold(local)
1266{
6666032a 1267 const sector_t capacity = drbd_get_capacity(mdev->this_bdev);
b411b363 1268 struct drbd_epoch_entry *e;
b411b363 1269 struct page *page;
45bb912b 1270 int dgs, ds, rr;
a0638456
PR
1271 void *dig_in = mdev->tconn->int_dig_in;
1272 void *dig_vv = mdev->tconn->int_dig_vv;
6b4388ac 1273 unsigned long *data;
b411b363 1274
a0638456
PR
1275 dgs = (mdev->tconn->agreed_pro_version >= 87 && mdev->tconn->integrity_r_tfm) ?
1276 crypto_hash_digestsize(mdev->tconn->integrity_r_tfm) : 0;
b411b363
PR
1277
1278 if (dgs) {
1279 rr = drbd_recv(mdev, dig_in, dgs);
1280 if (rr != dgs) {
0ddc5549
LE
1281 if (!signal_pending(current))
1282 dev_warn(DEV,
1283 "short read receiving data digest: read %d expected %d\n",
1284 rr, dgs);
b411b363
PR
1285 return NULL;
1286 }
1287 }
1288
1289 data_size -= dgs;
1290
841ce241
AG
1291 if (!expect(data_size != 0))
1292 return NULL;
1293 if (!expect(IS_ALIGNED(data_size, 512)))
1294 return NULL;
1295 if (!expect(data_size <= DRBD_MAX_BIO_SIZE))
1296 return NULL;
b411b363 1297
6666032a
LE
1298 /* even though we trust out peer,
1299 * we sometimes have to double check. */
1300 if (sector + (data_size>>9) > capacity) {
fdda6544
LE
1301 dev_err(DEV, "request from peer beyond end of local disk: "
1302 "capacity: %llus < sector: %llus + size: %u\n",
6666032a
LE
1303 (unsigned long long)capacity,
1304 (unsigned long long)sector, data_size);
1305 return NULL;
1306 }
1307
b411b363
PR
1308 /* GFP_NOIO, because we must not cause arbitrary write-out: in a DRBD
1309 * "criss-cross" setup, that might cause write-out on some other DRBD,
1310 * which in turn might block on the other node at this very place. */
1311 e = drbd_alloc_ee(mdev, id, sector, data_size, GFP_NOIO);
1312 if (!e)
1313 return NULL;
45bb912b 1314
b411b363 1315 ds = data_size;
45bb912b
LE
1316 page = e->pages;
1317 page_chain_for_each(page) {
1318 unsigned len = min_t(int, ds, PAGE_SIZE);
6b4388ac 1319 data = kmap(page);
45bb912b 1320 rr = drbd_recv(mdev, data, len);
0cf9d27e 1321 if (drbd_insert_fault(mdev, DRBD_FAULT_RECEIVE)) {
6b4388ac
PR
1322 dev_err(DEV, "Fault injection: Corrupting data on receive\n");
1323 data[0] = data[0] ^ (unsigned long)-1;
1324 }
b411b363 1325 kunmap(page);
45bb912b 1326 if (rr != len) {
b411b363 1327 drbd_free_ee(mdev, e);
0ddc5549
LE
1328 if (!signal_pending(current))
1329 dev_warn(DEV, "short read receiving data: read %d expected %d\n",
1330 rr, len);
b411b363
PR
1331 return NULL;
1332 }
1333 ds -= rr;
1334 }
1335
1336 if (dgs) {
a0638456 1337 drbd_csum_ee(mdev, mdev->tconn->integrity_r_tfm, e, dig_vv);
b411b363 1338 if (memcmp(dig_in, dig_vv, dgs)) {
470be44a
LE
1339 dev_err(DEV, "Digest integrity check FAILED: %llus +%u\n",
1340 (unsigned long long)sector, data_size);
b411b363
PR
1341 drbd_bcast_ee(mdev, "digest failed",
1342 dgs, dig_in, dig_vv, e);
1343 drbd_free_ee(mdev, e);
1344 return NULL;
1345 }
1346 }
1347 mdev->recv_cnt += data_size>>9;
1348 return e;
1349}
1350
1351/* drbd_drain_block() just takes a data block
1352 * out of the socket input buffer, and discards it.
1353 */
1354static int drbd_drain_block(struct drbd_conf *mdev, int data_size)
1355{
1356 struct page *page;
1357 int rr, rv = 1;
1358 void *data;
1359
c3470cde 1360 if (!data_size)
81e84650 1361 return true;
c3470cde 1362
45bb912b 1363 page = drbd_pp_alloc(mdev, 1, 1);
b411b363
PR
1364
1365 data = kmap(page);
1366 while (data_size) {
1367 rr = drbd_recv(mdev, data, min_t(int, data_size, PAGE_SIZE));
1368 if (rr != min_t(int, data_size, PAGE_SIZE)) {
1369 rv = 0;
0ddc5549
LE
1370 if (!signal_pending(current))
1371 dev_warn(DEV,
1372 "short read receiving data: read %d expected %d\n",
1373 rr, min_t(int, data_size, PAGE_SIZE));
b411b363
PR
1374 break;
1375 }
1376 data_size -= rr;
1377 }
1378 kunmap(page);
435f0740 1379 drbd_pp_free(mdev, page, 0);
b411b363
PR
1380 return rv;
1381}
1382
1383static int recv_dless_read(struct drbd_conf *mdev, struct drbd_request *req,
1384 sector_t sector, int data_size)
1385{
1386 struct bio_vec *bvec;
1387 struct bio *bio;
1388 int dgs, rr, i, expect;
a0638456
PR
1389 void *dig_in = mdev->tconn->int_dig_in;
1390 void *dig_vv = mdev->tconn->int_dig_vv;
b411b363 1391
a0638456
PR
1392 dgs = (mdev->tconn->agreed_pro_version >= 87 && mdev->tconn->integrity_r_tfm) ?
1393 crypto_hash_digestsize(mdev->tconn->integrity_r_tfm) : 0;
b411b363
PR
1394
1395 if (dgs) {
1396 rr = drbd_recv(mdev, dig_in, dgs);
1397 if (rr != dgs) {
0ddc5549
LE
1398 if (!signal_pending(current))
1399 dev_warn(DEV,
1400 "short read receiving data reply digest: read %d expected %d\n",
1401 rr, dgs);
b411b363
PR
1402 return 0;
1403 }
1404 }
1405
1406 data_size -= dgs;
1407
1408 /* optimistically update recv_cnt. if receiving fails below,
1409 * we disconnect anyways, and counters will be reset. */
1410 mdev->recv_cnt += data_size>>9;
1411
1412 bio = req->master_bio;
1413 D_ASSERT(sector == bio->bi_sector);
1414
1415 bio_for_each_segment(bvec, bio, i) {
1416 expect = min_t(int, data_size, bvec->bv_len);
1417 rr = drbd_recv(mdev,
1418 kmap(bvec->bv_page)+bvec->bv_offset,
1419 expect);
1420 kunmap(bvec->bv_page);
1421 if (rr != expect) {
0ddc5549
LE
1422 if (!signal_pending(current))
1423 dev_warn(DEV, "short read receiving data reply: "
1424 "read %d expected %d\n",
1425 rr, expect);
b411b363
PR
1426 return 0;
1427 }
1428 data_size -= rr;
1429 }
1430
1431 if (dgs) {
a0638456 1432 drbd_csum_bio(mdev, mdev->tconn->integrity_r_tfm, bio, dig_vv);
b411b363
PR
1433 if (memcmp(dig_in, dig_vv, dgs)) {
1434 dev_err(DEV, "Digest integrity check FAILED. Broken NICs?\n");
1435 return 0;
1436 }
1437 }
1438
1439 D_ASSERT(data_size == 0);
1440 return 1;
1441}
1442
1443/* e_end_resync_block() is called via
1444 * drbd_process_done_ee() by asender only */
1445static int e_end_resync_block(struct drbd_conf *mdev, struct drbd_work *w, int unused)
1446{
1447 struct drbd_epoch_entry *e = (struct drbd_epoch_entry *)w;
010f6e67 1448 sector_t sector = e->i.sector;
b411b363
PR
1449 int ok;
1450
8b946255 1451 D_ASSERT(drbd_interval_empty(&e->i));
b411b363 1452
45bb912b 1453 if (likely((e->flags & EE_WAS_ERROR) == 0)) {
010f6e67 1454 drbd_set_in_sync(mdev, sector, e->i.size);
b411b363
PR
1455 ok = drbd_send_ack(mdev, P_RS_WRITE_ACK, e);
1456 } else {
1457 /* Record failure to sync */
010f6e67 1458 drbd_rs_failed_io(mdev, sector, e->i.size);
b411b363
PR
1459
1460 ok = drbd_send_ack(mdev, P_NEG_ACK, e);
1461 }
1462 dec_unacked(mdev);
1463
1464 return ok;
1465}
1466
1467static int recv_resync_read(struct drbd_conf *mdev, sector_t sector, int data_size) __releases(local)
1468{
1469 struct drbd_epoch_entry *e;
1470
1471 e = read_in_block(mdev, ID_SYNCER, sector, data_size);
45bb912b
LE
1472 if (!e)
1473 goto fail;
b411b363
PR
1474
1475 dec_rs_pending(mdev);
1476
b411b363
PR
1477 inc_unacked(mdev);
1478 /* corresponding dec_unacked() in e_end_resync_block()
1479 * respective _drbd_clear_done_ee */
1480
45bb912b
LE
1481 e->w.cb = e_end_resync_block;
1482
87eeee41 1483 spin_lock_irq(&mdev->tconn->req_lock);
b411b363 1484 list_add(&e->w.list, &mdev->sync_ee);
87eeee41 1485 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363 1486
0f0601f4 1487 atomic_add(data_size >> 9, &mdev->rs_sect_ev);
45bb912b 1488 if (drbd_submit_ee(mdev, e, WRITE, DRBD_FAULT_RS_WR) == 0)
81e84650 1489 return true;
b411b363 1490
10f6d992
LE
1491 /* don't care for the reason here */
1492 dev_err(DEV, "submit failed, triggering re-connect\n");
87eeee41 1493 spin_lock_irq(&mdev->tconn->req_lock);
22cc37a9 1494 list_del(&e->w.list);
87eeee41 1495 spin_unlock_irq(&mdev->tconn->req_lock);
22cc37a9 1496
45bb912b
LE
1497 drbd_free_ee(mdev, e);
1498fail:
1499 put_ldev(mdev);
81e84650 1500 return false;
b411b363
PR
1501}
1502
668eebc6 1503static struct drbd_request *
bc9c5c41
AG
1504find_request(struct drbd_conf *mdev, struct rb_root *root, u64 id,
1505 sector_t sector, bool missing_ok, const char *func)
51624585 1506{
51624585
AG
1507 struct drbd_request *req;
1508
bc9c5c41
AG
1509 /* Request object according to our peer */
1510 req = (struct drbd_request *)(unsigned long)id;
1511 if (drbd_contains_interval(root, sector, &req->i))
668eebc6 1512 return req;
c3afd8f5
AG
1513 if (!missing_ok) {
1514 dev_err(DEV, "%s: failed to find request %lu, sector %llus\n", func,
1515 (unsigned long)id, (unsigned long long)sector);
1516 }
51624585
AG
1517 return NULL;
1518}
1519
d8763023
AG
1520static int receive_DataReply(struct drbd_conf *mdev, enum drbd_packet cmd,
1521 unsigned int data_size)
b411b363
PR
1522{
1523 struct drbd_request *req;
1524 sector_t sector;
b411b363 1525 int ok;
e42325a5 1526 struct p_data *p = &mdev->tconn->data.rbuf.data;
b411b363
PR
1527
1528 sector = be64_to_cpu(p->sector);
1529
87eeee41 1530 spin_lock_irq(&mdev->tconn->req_lock);
bc9c5c41 1531 req = find_request(mdev, &mdev->read_requests, p->block_id, sector, false, __func__);
87eeee41 1532 spin_unlock_irq(&mdev->tconn->req_lock);
c3afd8f5 1533 if (unlikely(!req))
81e84650 1534 return false;
b411b363 1535
24c4830c 1536 /* hlist_del(&req->collision) is done in _req_may_be_done, to avoid
b411b363
PR
1537 * special casing it there for the various failure cases.
1538 * still no race with drbd_fail_pending_reads */
1539 ok = recv_dless_read(mdev, req, sector, data_size);
1540
1541 if (ok)
8554df1c 1542 req_mod(req, DATA_RECEIVED);
b411b363
PR
1543 /* else: nothing. handled from drbd_disconnect...
1544 * I don't think we may complete this just yet
1545 * in case we are "on-disconnect: freeze" */
1546
1547 return ok;
1548}
1549
d8763023
AG
1550static int receive_RSDataReply(struct drbd_conf *mdev, enum drbd_packet cmd,
1551 unsigned int data_size)
b411b363
PR
1552{
1553 sector_t sector;
b411b363 1554 int ok;
e42325a5 1555 struct p_data *p = &mdev->tconn->data.rbuf.data;
b411b363
PR
1556
1557 sector = be64_to_cpu(p->sector);
1558 D_ASSERT(p->block_id == ID_SYNCER);
1559
1560 if (get_ldev(mdev)) {
1561 /* data is submitted to disk within recv_resync_read.
1562 * corresponding put_ldev done below on error,
9c50842a 1563 * or in drbd_endio_sec. */
b411b363
PR
1564 ok = recv_resync_read(mdev, sector, data_size);
1565 } else {
1566 if (__ratelimit(&drbd_ratelimit_state))
1567 dev_err(DEV, "Can not write resync data to local disk.\n");
1568
1569 ok = drbd_drain_block(mdev, data_size);
1570
2b2bf214 1571 drbd_send_ack_dp(mdev, P_NEG_ACK, p, data_size);
b411b363
PR
1572 }
1573
778f271d
PR
1574 atomic_add(data_size >> 9, &mdev->rs_sect_in);
1575
b411b363
PR
1576 return ok;
1577}
1578
1579/* e_end_block() is called via drbd_process_done_ee().
1580 * this means this function only runs in the asender thread
1581 */
1582static int e_end_block(struct drbd_conf *mdev, struct drbd_work *w, int cancel)
1583{
1584 struct drbd_epoch_entry *e = (struct drbd_epoch_entry *)w;
010f6e67 1585 sector_t sector = e->i.sector;
b411b363
PR
1586 int ok = 1, pcmd;
1587
89e58e75 1588 if (mdev->tconn->net_conf->wire_protocol == DRBD_PROT_C) {
45bb912b 1589 if (likely((e->flags & EE_WAS_ERROR) == 0)) {
b411b363
PR
1590 pcmd = (mdev->state.conn >= C_SYNC_SOURCE &&
1591 mdev->state.conn <= C_PAUSED_SYNC_T &&
1592 e->flags & EE_MAY_SET_IN_SYNC) ?
1593 P_RS_WRITE_ACK : P_WRITE_ACK;
1594 ok &= drbd_send_ack(mdev, pcmd, e);
1595 if (pcmd == P_RS_WRITE_ACK)
010f6e67 1596 drbd_set_in_sync(mdev, sector, e->i.size);
b411b363
PR
1597 } else {
1598 ok = drbd_send_ack(mdev, P_NEG_ACK, e);
1599 /* we expect it to be marked out of sync anyways...
1600 * maybe assert this? */
1601 }
1602 dec_unacked(mdev);
1603 }
1604 /* we delete from the conflict detection hash _after_ we sent out the
1605 * P_WRITE_ACK / P_NEG_ACK, to get the sequence number right. */
89e58e75 1606 if (mdev->tconn->net_conf->two_primaries) {
87eeee41 1607 spin_lock_irq(&mdev->tconn->req_lock);
8b946255 1608 D_ASSERT(!drbd_interval_empty(&e->i));
53840641 1609 drbd_remove_epoch_entry_interval(mdev, e);
87eeee41 1610 spin_unlock_irq(&mdev->tconn->req_lock);
bb3bfe96 1611 } else
8b946255 1612 D_ASSERT(drbd_interval_empty(&e->i));
b411b363
PR
1613
1614 drbd_may_finish_epoch(mdev, e->epoch, EV_PUT + (cancel ? EV_CLEANUP : 0));
1615
1616 return ok;
1617}
1618
1619static int e_send_discard_ack(struct drbd_conf *mdev, struct drbd_work *w, int unused)
1620{
1621 struct drbd_epoch_entry *e = (struct drbd_epoch_entry *)w;
1622 int ok = 1;
1623
89e58e75 1624 D_ASSERT(mdev->tconn->net_conf->wire_protocol == DRBD_PROT_C);
b411b363
PR
1625 ok = drbd_send_ack(mdev, P_DISCARD_ACK, e);
1626
87eeee41 1627 spin_lock_irq(&mdev->tconn->req_lock);
8b946255 1628 D_ASSERT(!drbd_interval_empty(&e->i));
53840641 1629 drbd_remove_epoch_entry_interval(mdev, e);
87eeee41 1630 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
1631
1632 dec_unacked(mdev);
1633
1634 return ok;
1635}
1636
3e394da1
AG
1637static bool seq_greater(u32 a, u32 b)
1638{
1639 /*
1640 * We assume 32-bit wrap-around here.
1641 * For 24-bit wrap-around, we would have to shift:
1642 * a <<= 8; b <<= 8;
1643 */
1644 return (s32)a - (s32)b > 0;
1645}
1646
1647static u32 seq_max(u32 a, u32 b)
1648{
1649 return seq_greater(a, b) ? a : b;
1650}
1651
1652static void update_peer_seq(struct drbd_conf *mdev, unsigned int new_seq)
1653{
1654 unsigned int m;
1655
1656 spin_lock(&mdev->peer_seq_lock);
1657 m = seq_max(mdev->peer_seq, new_seq);
1658 mdev->peer_seq = m;
1659 spin_unlock(&mdev->peer_seq_lock);
1660 if (m == new_seq)
1661 wake_up(&mdev->seq_wait);
1662}
1663
b411b363
PR
1664/* Called from receive_Data.
1665 * Synchronize packets on sock with packets on msock.
1666 *
1667 * This is here so even when a P_DATA packet traveling via sock overtook an Ack
1668 * packet traveling on msock, they are still processed in the order they have
1669 * been sent.
1670 *
1671 * Note: we don't care for Ack packets overtaking P_DATA packets.
1672 *
1673 * In case packet_seq is larger than mdev->peer_seq number, there are
1674 * outstanding packets on the msock. We wait for them to arrive.
1675 * In case we are the logically next packet, we update mdev->peer_seq
1676 * ourselves. Correctly handles 32bit wrap around.
1677 *
1678 * Assume we have a 10 GBit connection, that is about 1<<30 byte per second,
1679 * about 1<<21 sectors per second. So "worst" case, we have 1<<3 == 8 seconds
1680 * for the 24bit wrap (historical atomic_t guarantee on some archs), and we have
1681 * 1<<9 == 512 seconds aka ages for the 32bit wrap around...
1682 *
1683 * returns 0 if we may process the packet,
1684 * -ERESTARTSYS if we were interrupted (by disconnect signal). */
1685static int drbd_wait_peer_seq(struct drbd_conf *mdev, const u32 packet_seq)
1686{
1687 DEFINE_WAIT(wait);
1688 unsigned int p_seq;
1689 long timeout;
1690 int ret = 0;
1691 spin_lock(&mdev->peer_seq_lock);
1692 for (;;) {
1693 prepare_to_wait(&mdev->seq_wait, &wait, TASK_INTERRUPTIBLE);
3e394da1 1694 if (!seq_greater(packet_seq, mdev->peer_seq + 1))
b411b363
PR
1695 break;
1696 if (signal_pending(current)) {
1697 ret = -ERESTARTSYS;
1698 break;
1699 }
1700 p_seq = mdev->peer_seq;
1701 spin_unlock(&mdev->peer_seq_lock);
1702 timeout = schedule_timeout(30*HZ);
1703 spin_lock(&mdev->peer_seq_lock);
1704 if (timeout == 0 && p_seq == mdev->peer_seq) {
1705 ret = -ETIMEDOUT;
1706 dev_err(DEV, "ASSERT FAILED waited 30 seconds for sequence update, forcing reconnect\n");
1707 break;
1708 }
1709 }
1710 finish_wait(&mdev->seq_wait, &wait);
1711 if (mdev->peer_seq+1 == packet_seq)
1712 mdev->peer_seq++;
1713 spin_unlock(&mdev->peer_seq_lock);
1714 return ret;
1715}
1716
688593c5
LE
1717/* see also bio_flags_to_wire()
1718 * DRBD_REQ_*, because we need to semantically map the flags to data packet
1719 * flags and back. We may replicate to other kernel versions. */
1720static unsigned long wire_flags_to_bio(struct drbd_conf *mdev, u32 dpf)
76d2e7ec 1721{
688593c5
LE
1722 return (dpf & DP_RW_SYNC ? REQ_SYNC : 0) |
1723 (dpf & DP_FUA ? REQ_FUA : 0) |
1724 (dpf & DP_FLUSH ? REQ_FLUSH : 0) |
1725 (dpf & DP_DISCARD ? REQ_DISCARD : 0);
76d2e7ec
PR
1726}
1727
b411b363 1728/* mirrored write */
d8763023
AG
1729static int receive_Data(struct drbd_conf *mdev, enum drbd_packet cmd,
1730 unsigned int data_size)
b411b363
PR
1731{
1732 sector_t sector;
1733 struct drbd_epoch_entry *e;
e42325a5 1734 struct p_data *p = &mdev->tconn->data.rbuf.data;
b411b363
PR
1735 int rw = WRITE;
1736 u32 dp_flags;
1737
b411b363 1738 if (!get_ldev(mdev)) {
b411b363
PR
1739 spin_lock(&mdev->peer_seq_lock);
1740 if (mdev->peer_seq+1 == be32_to_cpu(p->seq_num))
1741 mdev->peer_seq++;
1742 spin_unlock(&mdev->peer_seq_lock);
1743
2b2bf214 1744 drbd_send_ack_dp(mdev, P_NEG_ACK, p, data_size);
b411b363
PR
1745 atomic_inc(&mdev->current_epoch->epoch_size);
1746 return drbd_drain_block(mdev, data_size);
1747 }
1748
1749 /* get_ldev(mdev) successful.
1750 * Corresponding put_ldev done either below (on various errors),
9c50842a 1751 * or in drbd_endio_sec, if we successfully submit the data at
b411b363
PR
1752 * the end of this function. */
1753
1754 sector = be64_to_cpu(p->sector);
1755 e = read_in_block(mdev, p->block_id, sector, data_size);
1756 if (!e) {
1757 put_ldev(mdev);
81e84650 1758 return false;
b411b363
PR
1759 }
1760
b411b363
PR
1761 e->w.cb = e_end_block;
1762
688593c5
LE
1763 dp_flags = be32_to_cpu(p->dp_flags);
1764 rw |= wire_flags_to_bio(mdev, dp_flags);
1765
1766 if (dp_flags & DP_MAY_SET_IN_SYNC)
1767 e->flags |= EE_MAY_SET_IN_SYNC;
1768
b411b363
PR
1769 spin_lock(&mdev->epoch_lock);
1770 e->epoch = mdev->current_epoch;
1771 atomic_inc(&e->epoch->epoch_size);
1772 atomic_inc(&e->epoch->active);
b411b363
PR
1773 spin_unlock(&mdev->epoch_lock);
1774
b411b363 1775 /* I'm the receiver, I do hold a net_cnt reference. */
89e58e75 1776 if (!mdev->tconn->net_conf->two_primaries) {
87eeee41 1777 spin_lock_irq(&mdev->tconn->req_lock);
b411b363
PR
1778 } else {
1779 /* don't get the req_lock yet,
1780 * we may sleep in drbd_wait_peer_seq */
010f6e67 1781 const int size = e->i.size;
b411b363
PR
1782 const int discard = test_bit(DISCARD_CONCURRENT, &mdev->flags);
1783 DEFINE_WAIT(wait);
b411b363
PR
1784 int first;
1785
89e58e75 1786 D_ASSERT(mdev->tconn->net_conf->wire_protocol == DRBD_PROT_C);
b411b363
PR
1787
1788 /* conflict detection and handling:
1789 * 1. wait on the sequence number,
1790 * in case this data packet overtook ACK packets.
bb3bfe96
AG
1791 * 2. check our interval trees for conflicting requests:
1792 * we only need to check the write_requests tree; the
1793 * epoch_entries tree cannot contain any overlaps because
1794 * they were already eliminated on the submitting node.
b411b363
PR
1795 *
1796 * Note: for two_primaries, we are protocol C,
1797 * so there cannot be any request that is DONE
1798 * but still on the transfer log.
1799 *
bb3bfe96 1800 * unconditionally add to the epoch_entries tree.
b411b363
PR
1801 *
1802 * if no conflicting request is found:
1803 * submit.
1804 *
1805 * if any conflicting request is found
1806 * that has not yet been acked,
1807 * AND I have the "discard concurrent writes" flag:
1808 * queue (via done_ee) the P_DISCARD_ACK; OUT.
1809 *
1810 * if any conflicting request is found:
1811 * block the receiver, waiting on misc_wait
1812 * until no more conflicting requests are there,
1813 * or we get interrupted (disconnect).
1814 *
1815 * we do not just write after local io completion of those
1816 * requests, but only after req is done completely, i.e.
1817 * we wait for the P_DISCARD_ACK to arrive!
1818 *
1819 * then proceed normally, i.e. submit.
1820 */
1821 if (drbd_wait_peer_seq(mdev, be32_to_cpu(p->seq_num)))
1822 goto out_interrupted;
1823
87eeee41 1824 spin_lock_irq(&mdev->tconn->req_lock);
b411b363 1825
8b946255 1826 drbd_insert_interval(&mdev->epoch_entries, &e->i);
b411b363 1827
b411b363
PR
1828 first = 1;
1829 for (;;) {
de696716 1830 struct drbd_interval *i;
a500c2ef 1831 struct drbd_request *req2;
b411b363
PR
1832 int have_unacked = 0;
1833 int have_conflict = 0;
1834 prepare_to_wait(&mdev->misc_wait, &wait,
1835 TASK_INTERRUPTIBLE);
de696716
AG
1836
1837 i = drbd_find_overlap(&mdev->write_requests, sector, size);
1838 if (i) {
a500c2ef 1839 req2 = container_of(i, struct drbd_request, i);
de696716
AG
1840
1841 /* only ALERT on first iteration,
1842 * we may be woken up early... */
1843 if (first)
1844 dev_alert(DEV, "%s[%u] Concurrent local write detected!"
1845 " new: %llus +%u; pending: %llus +%u\n",
1846 current->comm, current->pid,
1847 (unsigned long long)sector, size,
1848 (unsigned long long)req2->i.sector, req2->i.size);
1849 if (req2->rq_state & RQ_NET_PENDING)
1850 ++have_unacked;
1851 ++have_conflict;
b411b363 1852 }
b411b363
PR
1853 if (!have_conflict)
1854 break;
1855
1856 /* Discard Ack only for the _first_ iteration */
1857 if (first && discard && have_unacked) {
1858 dev_alert(DEV, "Concurrent write! [DISCARD BY FLAG] sec=%llus\n",
1859 (unsigned long long)sector);
1860 inc_unacked(mdev);
1861 e->w.cb = e_send_discard_ack;
1862 list_add_tail(&e->w.list, &mdev->done_ee);
1863
87eeee41 1864 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
1865
1866 /* we could probably send that P_DISCARD_ACK ourselves,
1867 * but I don't like the receiver using the msock */
1868
1869 put_ldev(mdev);
1870 wake_asender(mdev);
1871 finish_wait(&mdev->misc_wait, &wait);
81e84650 1872 return true;
b411b363
PR
1873 }
1874
1875 if (signal_pending(current)) {
53840641 1876 drbd_remove_epoch_entry_interval(mdev, e);
87eeee41 1877 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
1878 finish_wait(&mdev->misc_wait, &wait);
1879 goto out_interrupted;
1880 }
1881
a500c2ef 1882 /* Indicate to wake up mdev->misc_wait upon completion. */
53840641 1883 i->waiting = true;
a500c2ef 1884
87eeee41 1885 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
1886 if (first) {
1887 first = 0;
1888 dev_alert(DEV, "Concurrent write! [W AFTERWARDS] "
1889 "sec=%llus\n", (unsigned long long)sector);
1890 } else if (discard) {
1891 /* we had none on the first iteration.
1892 * there must be none now. */
1893 D_ASSERT(have_unacked == 0);
1894 }
1895 schedule();
87eeee41 1896 spin_lock_irq(&mdev->tconn->req_lock);
b411b363
PR
1897 }
1898 finish_wait(&mdev->misc_wait, &wait);
1899 }
1900
1901 list_add(&e->w.list, &mdev->active_ee);
87eeee41 1902 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363 1903
89e58e75 1904 switch (mdev->tconn->net_conf->wire_protocol) {
b411b363
PR
1905 case DRBD_PROT_C:
1906 inc_unacked(mdev);
1907 /* corresponding dec_unacked() in e_end_block()
1908 * respective _drbd_clear_done_ee */
1909 break;
1910 case DRBD_PROT_B:
1911 /* I really don't like it that the receiver thread
1912 * sends on the msock, but anyways */
1913 drbd_send_ack(mdev, P_RECV_ACK, e);
1914 break;
1915 case DRBD_PROT_A:
1916 /* nothing to do */
1917 break;
1918 }
1919
6719fb03 1920 if (mdev->state.pdsk < D_INCONSISTENT) {
b411b363 1921 /* In case we have the only disk of the cluster, */
010f6e67 1922 drbd_set_out_of_sync(mdev, e->i.sector, e->i.size);
b411b363 1923 e->flags |= EE_CALL_AL_COMPLETE_IO;
6719fb03 1924 e->flags &= ~EE_MAY_SET_IN_SYNC;
010f6e67 1925 drbd_al_begin_io(mdev, e->i.sector);
b411b363
PR
1926 }
1927
45bb912b 1928 if (drbd_submit_ee(mdev, e, rw, DRBD_FAULT_DT_WR) == 0)
81e84650 1929 return true;
b411b363 1930
10f6d992
LE
1931 /* don't care for the reason here */
1932 dev_err(DEV, "submit failed, triggering re-connect\n");
87eeee41 1933 spin_lock_irq(&mdev->tconn->req_lock);
22cc37a9 1934 list_del(&e->w.list);
53840641 1935 drbd_remove_epoch_entry_interval(mdev, e);
87eeee41 1936 spin_unlock_irq(&mdev->tconn->req_lock);
22cc37a9 1937 if (e->flags & EE_CALL_AL_COMPLETE_IO)
010f6e67 1938 drbd_al_complete_io(mdev, e->i.sector);
22cc37a9 1939
b411b363 1940out_interrupted:
10f6d992 1941 drbd_may_finish_epoch(mdev, e->epoch, EV_PUT + EV_CLEANUP);
b411b363
PR
1942 put_ldev(mdev);
1943 drbd_free_ee(mdev, e);
81e84650 1944 return false;
b411b363
PR
1945}
1946
0f0601f4
LE
1947/* We may throttle resync, if the lower device seems to be busy,
1948 * and current sync rate is above c_min_rate.
1949 *
1950 * To decide whether or not the lower device is busy, we use a scheme similar
1951 * to MD RAID is_mddev_idle(): if the partition stats reveal "significant"
1952 * (more than 64 sectors) of activity we cannot account for with our own resync
1953 * activity, it obviously is "busy".
1954 *
1955 * The current sync rate used here uses only the most recent two step marks,
1956 * to have a short time average so we can react faster.
1957 */
e3555d85 1958int drbd_rs_should_slow_down(struct drbd_conf *mdev, sector_t sector)
0f0601f4
LE
1959{
1960 struct gendisk *disk = mdev->ldev->backing_bdev->bd_contains->bd_disk;
1961 unsigned long db, dt, dbdt;
e3555d85 1962 struct lc_element *tmp;
0f0601f4
LE
1963 int curr_events;
1964 int throttle = 0;
1965
1966 /* feature disabled? */
1967 if (mdev->sync_conf.c_min_rate == 0)
1968 return 0;
1969
e3555d85
PR
1970 spin_lock_irq(&mdev->al_lock);
1971 tmp = lc_find(mdev->resync, BM_SECT_TO_EXT(sector));
1972 if (tmp) {
1973 struct bm_extent *bm_ext = lc_entry(tmp, struct bm_extent, lce);
1974 if (test_bit(BME_PRIORITY, &bm_ext->flags)) {
1975 spin_unlock_irq(&mdev->al_lock);
1976 return 0;
1977 }
1978 /* Do not slow down if app IO is already waiting for this extent */
1979 }
1980 spin_unlock_irq(&mdev->al_lock);
1981
0f0601f4
LE
1982 curr_events = (int)part_stat_read(&disk->part0, sectors[0]) +
1983 (int)part_stat_read(&disk->part0, sectors[1]) -
1984 atomic_read(&mdev->rs_sect_ev);
e3555d85 1985
0f0601f4
LE
1986 if (!mdev->rs_last_events || curr_events - mdev->rs_last_events > 64) {
1987 unsigned long rs_left;
1988 int i;
1989
1990 mdev->rs_last_events = curr_events;
1991
1992 /* sync speed average over the last 2*DRBD_SYNC_MARK_STEP,
1993 * approx. */
2649f080
LE
1994 i = (mdev->rs_last_mark + DRBD_SYNC_MARKS-1) % DRBD_SYNC_MARKS;
1995
1996 if (mdev->state.conn == C_VERIFY_S || mdev->state.conn == C_VERIFY_T)
1997 rs_left = mdev->ov_left;
1998 else
1999 rs_left = drbd_bm_total_weight(mdev) - mdev->rs_failed;
0f0601f4
LE
2000
2001 dt = ((long)jiffies - (long)mdev->rs_mark_time[i]) / HZ;
2002 if (!dt)
2003 dt++;
2004 db = mdev->rs_mark_left[i] - rs_left;
2005 dbdt = Bit2KB(db/dt);
2006
2007 if (dbdt > mdev->sync_conf.c_min_rate)
2008 throttle = 1;
2009 }
2010 return throttle;
2011}
2012
2013
d8763023
AG
2014static int receive_DataRequest(struct drbd_conf *mdev, enum drbd_packet cmd,
2015 unsigned int digest_size)
b411b363
PR
2016{
2017 sector_t sector;
2018 const sector_t capacity = drbd_get_capacity(mdev->this_bdev);
2019 struct drbd_epoch_entry *e;
2020 struct digest_info *di = NULL;
b18b37be 2021 int size, verb;
b411b363 2022 unsigned int fault_type;
e42325a5 2023 struct p_block_req *p = &mdev->tconn->data.rbuf.block_req;
b411b363
PR
2024
2025 sector = be64_to_cpu(p->sector);
2026 size = be32_to_cpu(p->blksize);
2027
1816a2b4 2028 if (size <= 0 || (size & 0x1ff) != 0 || size > DRBD_MAX_BIO_SIZE) {
b411b363
PR
2029 dev_err(DEV, "%s:%d: sector: %llus, size: %u\n", __FILE__, __LINE__,
2030 (unsigned long long)sector, size);
81e84650 2031 return false;
b411b363
PR
2032 }
2033 if (sector + (size>>9) > capacity) {
2034 dev_err(DEV, "%s:%d: sector: %llus, size: %u\n", __FILE__, __LINE__,
2035 (unsigned long long)sector, size);
81e84650 2036 return false;
b411b363
PR
2037 }
2038
2039 if (!get_ldev_if_state(mdev, D_UP_TO_DATE)) {
b18b37be
PR
2040 verb = 1;
2041 switch (cmd) {
2042 case P_DATA_REQUEST:
2043 drbd_send_ack_rp(mdev, P_NEG_DREPLY, p);
2044 break;
2045 case P_RS_DATA_REQUEST:
2046 case P_CSUM_RS_REQUEST:
2047 case P_OV_REQUEST:
2048 drbd_send_ack_rp(mdev, P_NEG_RS_DREPLY , p);
2049 break;
2050 case P_OV_REPLY:
2051 verb = 0;
2052 dec_rs_pending(mdev);
2053 drbd_send_ack_ex(mdev, P_OV_RESULT, sector, size, ID_IN_SYNC);
2054 break;
2055 default:
2056 dev_err(DEV, "unexpected command (%s) in receive_DataRequest\n",
2057 cmdname(cmd));
2058 }
2059 if (verb && __ratelimit(&drbd_ratelimit_state))
b411b363
PR
2060 dev_err(DEV, "Can not satisfy peer's read request, "
2061 "no local data.\n");
b18b37be 2062
a821cc4a
LE
2063 /* drain possibly payload */
2064 return drbd_drain_block(mdev, digest_size);
b411b363
PR
2065 }
2066
2067 /* GFP_NOIO, because we must not cause arbitrary write-out: in a DRBD
2068 * "criss-cross" setup, that might cause write-out on some other DRBD,
2069 * which in turn might block on the other node at this very place. */
2070 e = drbd_alloc_ee(mdev, p->block_id, sector, size, GFP_NOIO);
2071 if (!e) {
2072 put_ldev(mdev);
81e84650 2073 return false;
b411b363
PR
2074 }
2075
02918be2 2076 switch (cmd) {
b411b363
PR
2077 case P_DATA_REQUEST:
2078 e->w.cb = w_e_end_data_req;
2079 fault_type = DRBD_FAULT_DT_RD;
80a40e43
LE
2080 /* application IO, don't drbd_rs_begin_io */
2081 goto submit;
2082
b411b363
PR
2083 case P_RS_DATA_REQUEST:
2084 e->w.cb = w_e_end_rsdata_req;
2085 fault_type = DRBD_FAULT_RS_RD;
5f9915bb
LE
2086 /* used in the sector offset progress display */
2087 mdev->bm_resync_fo = BM_SECT_TO_BIT(sector);
b411b363
PR
2088 break;
2089
2090 case P_OV_REPLY:
2091 case P_CSUM_RS_REQUEST:
2092 fault_type = DRBD_FAULT_RS_RD;
b411b363
PR
2093 di = kmalloc(sizeof(*di) + digest_size, GFP_NOIO);
2094 if (!di)
2095 goto out_free_e;
2096
2097 di->digest_size = digest_size;
2098 di->digest = (((char *)di)+sizeof(struct digest_info));
2099
c36c3ced
LE
2100 e->digest = di;
2101 e->flags |= EE_HAS_DIGEST;
2102
b411b363
PR
2103 if (drbd_recv(mdev, di->digest, digest_size) != digest_size)
2104 goto out_free_e;
2105
02918be2 2106 if (cmd == P_CSUM_RS_REQUEST) {
31890f4a 2107 D_ASSERT(mdev->tconn->agreed_pro_version >= 89);
b411b363 2108 e->w.cb = w_e_end_csum_rs_req;
5f9915bb
LE
2109 /* used in the sector offset progress display */
2110 mdev->bm_resync_fo = BM_SECT_TO_BIT(sector);
02918be2 2111 } else if (cmd == P_OV_REPLY) {
2649f080
LE
2112 /* track progress, we may need to throttle */
2113 atomic_add(size >> 9, &mdev->rs_sect_in);
b411b363
PR
2114 e->w.cb = w_e_end_ov_reply;
2115 dec_rs_pending(mdev);
0f0601f4
LE
2116 /* drbd_rs_begin_io done when we sent this request,
2117 * but accounting still needs to be done. */
2118 goto submit_for_resync;
b411b363
PR
2119 }
2120 break;
2121
2122 case P_OV_REQUEST:
b411b363 2123 if (mdev->ov_start_sector == ~(sector_t)0 &&
31890f4a 2124 mdev->tconn->agreed_pro_version >= 90) {
de228bba
LE
2125 unsigned long now = jiffies;
2126 int i;
b411b363
PR
2127 mdev->ov_start_sector = sector;
2128 mdev->ov_position = sector;
30b743a2
LE
2129 mdev->ov_left = drbd_bm_bits(mdev) - BM_SECT_TO_BIT(sector);
2130 mdev->rs_total = mdev->ov_left;
de228bba
LE
2131 for (i = 0; i < DRBD_SYNC_MARKS; i++) {
2132 mdev->rs_mark_left[i] = mdev->ov_left;
2133 mdev->rs_mark_time[i] = now;
2134 }
b411b363
PR
2135 dev_info(DEV, "Online Verify start sector: %llu\n",
2136 (unsigned long long)sector);
2137 }
2138 e->w.cb = w_e_end_ov_req;
2139 fault_type = DRBD_FAULT_RS_RD;
b411b363
PR
2140 break;
2141
b411b363
PR
2142 default:
2143 dev_err(DEV, "unexpected command (%s) in receive_DataRequest\n",
02918be2 2144 cmdname(cmd));
b411b363 2145 fault_type = DRBD_FAULT_MAX;
80a40e43 2146 goto out_free_e;
b411b363
PR
2147 }
2148
0f0601f4
LE
2149 /* Throttle, drbd_rs_begin_io and submit should become asynchronous
2150 * wrt the receiver, but it is not as straightforward as it may seem.
2151 * Various places in the resync start and stop logic assume resync
2152 * requests are processed in order, requeuing this on the worker thread
2153 * introduces a bunch of new code for synchronization between threads.
2154 *
2155 * Unlimited throttling before drbd_rs_begin_io may stall the resync
2156 * "forever", throttling after drbd_rs_begin_io will lock that extent
2157 * for application writes for the same time. For now, just throttle
2158 * here, where the rest of the code expects the receiver to sleep for
2159 * a while, anyways.
2160 */
2161
2162 /* Throttle before drbd_rs_begin_io, as that locks out application IO;
2163 * this defers syncer requests for some time, before letting at least
2164 * on request through. The resync controller on the receiving side
2165 * will adapt to the incoming rate accordingly.
2166 *
2167 * We cannot throttle here if remote is Primary/SyncTarget:
2168 * we would also throttle its application reads.
2169 * In that case, throttling is done on the SyncTarget only.
2170 */
e3555d85
PR
2171 if (mdev->state.peer != R_PRIMARY && drbd_rs_should_slow_down(mdev, sector))
2172 schedule_timeout_uninterruptible(HZ/10);
2173 if (drbd_rs_begin_io(mdev, sector))
80a40e43 2174 goto out_free_e;
b411b363 2175
0f0601f4
LE
2176submit_for_resync:
2177 atomic_add(size >> 9, &mdev->rs_sect_ev);
2178
80a40e43 2179submit:
b411b363 2180 inc_unacked(mdev);
87eeee41 2181 spin_lock_irq(&mdev->tconn->req_lock);
80a40e43 2182 list_add_tail(&e->w.list, &mdev->read_ee);
87eeee41 2183 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363 2184
45bb912b 2185 if (drbd_submit_ee(mdev, e, READ, fault_type) == 0)
81e84650 2186 return true;
b411b363 2187
10f6d992
LE
2188 /* don't care for the reason here */
2189 dev_err(DEV, "submit failed, triggering re-connect\n");
87eeee41 2190 spin_lock_irq(&mdev->tconn->req_lock);
22cc37a9 2191 list_del(&e->w.list);
87eeee41 2192 spin_unlock_irq(&mdev->tconn->req_lock);
22cc37a9
LE
2193 /* no drbd_rs_complete_io(), we are dropping the connection anyways */
2194
b411b363 2195out_free_e:
b411b363
PR
2196 put_ldev(mdev);
2197 drbd_free_ee(mdev, e);
81e84650 2198 return false;
b411b363
PR
2199}
2200
2201static int drbd_asb_recover_0p(struct drbd_conf *mdev) __must_hold(local)
2202{
2203 int self, peer, rv = -100;
2204 unsigned long ch_self, ch_peer;
2205
2206 self = mdev->ldev->md.uuid[UI_BITMAP] & 1;
2207 peer = mdev->p_uuid[UI_BITMAP] & 1;
2208
2209 ch_peer = mdev->p_uuid[UI_SIZE];
2210 ch_self = mdev->comm_bm_set;
2211
89e58e75 2212 switch (mdev->tconn->net_conf->after_sb_0p) {
b411b363
PR
2213 case ASB_CONSENSUS:
2214 case ASB_DISCARD_SECONDARY:
2215 case ASB_CALL_HELPER:
2216 dev_err(DEV, "Configuration error.\n");
2217 break;
2218 case ASB_DISCONNECT:
2219 break;
2220 case ASB_DISCARD_YOUNGER_PRI:
2221 if (self == 0 && peer == 1) {
2222 rv = -1;
2223 break;
2224 }
2225 if (self == 1 && peer == 0) {
2226 rv = 1;
2227 break;
2228 }
2229 /* Else fall through to one of the other strategies... */
2230 case ASB_DISCARD_OLDER_PRI:
2231 if (self == 0 && peer == 1) {
2232 rv = 1;
2233 break;
2234 }
2235 if (self == 1 && peer == 0) {
2236 rv = -1;
2237 break;
2238 }
2239 /* Else fall through to one of the other strategies... */
ad19bf6e 2240 dev_warn(DEV, "Discard younger/older primary did not find a decision\n"
b411b363
PR
2241 "Using discard-least-changes instead\n");
2242 case ASB_DISCARD_ZERO_CHG:
2243 if (ch_peer == 0 && ch_self == 0) {
2244 rv = test_bit(DISCARD_CONCURRENT, &mdev->flags)
2245 ? -1 : 1;
2246 break;
2247 } else {
2248 if (ch_peer == 0) { rv = 1; break; }
2249 if (ch_self == 0) { rv = -1; break; }
2250 }
89e58e75 2251 if (mdev->tconn->net_conf->after_sb_0p == ASB_DISCARD_ZERO_CHG)
b411b363
PR
2252 break;
2253 case ASB_DISCARD_LEAST_CHG:
2254 if (ch_self < ch_peer)
2255 rv = -1;
2256 else if (ch_self > ch_peer)
2257 rv = 1;
2258 else /* ( ch_self == ch_peer ) */
2259 /* Well, then use something else. */
2260 rv = test_bit(DISCARD_CONCURRENT, &mdev->flags)
2261 ? -1 : 1;
2262 break;
2263 case ASB_DISCARD_LOCAL:
2264 rv = -1;
2265 break;
2266 case ASB_DISCARD_REMOTE:
2267 rv = 1;
2268 }
2269
2270 return rv;
2271}
2272
2273static int drbd_asb_recover_1p(struct drbd_conf *mdev) __must_hold(local)
2274{
6184ea21 2275 int hg, rv = -100;
b411b363 2276
89e58e75 2277 switch (mdev->tconn->net_conf->after_sb_1p) {
b411b363
PR
2278 case ASB_DISCARD_YOUNGER_PRI:
2279 case ASB_DISCARD_OLDER_PRI:
2280 case ASB_DISCARD_LEAST_CHG:
2281 case ASB_DISCARD_LOCAL:
2282 case ASB_DISCARD_REMOTE:
2283 dev_err(DEV, "Configuration error.\n");
2284 break;
2285 case ASB_DISCONNECT:
2286 break;
2287 case ASB_CONSENSUS:
2288 hg = drbd_asb_recover_0p(mdev);
2289 if (hg == -1 && mdev->state.role == R_SECONDARY)
2290 rv = hg;
2291 if (hg == 1 && mdev->state.role == R_PRIMARY)
2292 rv = hg;
2293 break;
2294 case ASB_VIOLENTLY:
2295 rv = drbd_asb_recover_0p(mdev);
2296 break;
2297 case ASB_DISCARD_SECONDARY:
2298 return mdev->state.role == R_PRIMARY ? 1 : -1;
2299 case ASB_CALL_HELPER:
2300 hg = drbd_asb_recover_0p(mdev);
2301 if (hg == -1 && mdev->state.role == R_PRIMARY) {
bb437946
AG
2302 enum drbd_state_rv rv2;
2303
2304 drbd_set_role(mdev, R_SECONDARY, 0);
b411b363
PR
2305 /* drbd_change_state() does not sleep while in SS_IN_TRANSIENT_STATE,
2306 * we might be here in C_WF_REPORT_PARAMS which is transient.
2307 * we do not need to wait for the after state change work either. */
bb437946
AG
2308 rv2 = drbd_change_state(mdev, CS_VERBOSE, NS(role, R_SECONDARY));
2309 if (rv2 != SS_SUCCESS) {
b411b363
PR
2310 drbd_khelper(mdev, "pri-lost-after-sb");
2311 } else {
2312 dev_warn(DEV, "Successfully gave up primary role.\n");
2313 rv = hg;
2314 }
2315 } else
2316 rv = hg;
2317 }
2318
2319 return rv;
2320}
2321
2322static int drbd_asb_recover_2p(struct drbd_conf *mdev) __must_hold(local)
2323{
6184ea21 2324 int hg, rv = -100;
b411b363 2325
89e58e75 2326 switch (mdev->tconn->net_conf->after_sb_2p) {
b411b363
PR
2327 case ASB_DISCARD_YOUNGER_PRI:
2328 case ASB_DISCARD_OLDER_PRI:
2329 case ASB_DISCARD_LEAST_CHG:
2330 case ASB_DISCARD_LOCAL:
2331 case ASB_DISCARD_REMOTE:
2332 case ASB_CONSENSUS:
2333 case ASB_DISCARD_SECONDARY:
2334 dev_err(DEV, "Configuration error.\n");
2335 break;
2336 case ASB_VIOLENTLY:
2337 rv = drbd_asb_recover_0p(mdev);
2338 break;
2339 case ASB_DISCONNECT:
2340 break;
2341 case ASB_CALL_HELPER:
2342 hg = drbd_asb_recover_0p(mdev);
2343 if (hg == -1) {
bb437946
AG
2344 enum drbd_state_rv rv2;
2345
b411b363
PR
2346 /* drbd_change_state() does not sleep while in SS_IN_TRANSIENT_STATE,
2347 * we might be here in C_WF_REPORT_PARAMS which is transient.
2348 * we do not need to wait for the after state change work either. */
bb437946
AG
2349 rv2 = drbd_change_state(mdev, CS_VERBOSE, NS(role, R_SECONDARY));
2350 if (rv2 != SS_SUCCESS) {
b411b363
PR
2351 drbd_khelper(mdev, "pri-lost-after-sb");
2352 } else {
2353 dev_warn(DEV, "Successfully gave up primary role.\n");
2354 rv = hg;
2355 }
2356 } else
2357 rv = hg;
2358 }
2359
2360 return rv;
2361}
2362
2363static void drbd_uuid_dump(struct drbd_conf *mdev, char *text, u64 *uuid,
2364 u64 bits, u64 flags)
2365{
2366 if (!uuid) {
2367 dev_info(DEV, "%s uuid info vanished while I was looking!\n", text);
2368 return;
2369 }
2370 dev_info(DEV, "%s %016llX:%016llX:%016llX:%016llX bits:%llu flags:%llX\n",
2371 text,
2372 (unsigned long long)uuid[UI_CURRENT],
2373 (unsigned long long)uuid[UI_BITMAP],
2374 (unsigned long long)uuid[UI_HISTORY_START],
2375 (unsigned long long)uuid[UI_HISTORY_END],
2376 (unsigned long long)bits,
2377 (unsigned long long)flags);
2378}
2379
2380/*
2381 100 after split brain try auto recover
2382 2 C_SYNC_SOURCE set BitMap
2383 1 C_SYNC_SOURCE use BitMap
2384 0 no Sync
2385 -1 C_SYNC_TARGET use BitMap
2386 -2 C_SYNC_TARGET set BitMap
2387 -100 after split brain, disconnect
2388-1000 unrelated data
4a23f264
PR
2389-1091 requires proto 91
2390-1096 requires proto 96
b411b363
PR
2391 */
2392static int drbd_uuid_compare(struct drbd_conf *mdev, int *rule_nr) __must_hold(local)
2393{
2394 u64 self, peer;
2395 int i, j;
2396
2397 self = mdev->ldev->md.uuid[UI_CURRENT] & ~((u64)1);
2398 peer = mdev->p_uuid[UI_CURRENT] & ~((u64)1);
2399
2400 *rule_nr = 10;
2401 if (self == UUID_JUST_CREATED && peer == UUID_JUST_CREATED)
2402 return 0;
2403
2404 *rule_nr = 20;
2405 if ((self == UUID_JUST_CREATED || self == (u64)0) &&
2406 peer != UUID_JUST_CREATED)
2407 return -2;
2408
2409 *rule_nr = 30;
2410 if (self != UUID_JUST_CREATED &&
2411 (peer == UUID_JUST_CREATED || peer == (u64)0))
2412 return 2;
2413
2414 if (self == peer) {
2415 int rct, dc; /* roles at crash time */
2416
2417 if (mdev->p_uuid[UI_BITMAP] == (u64)0 && mdev->ldev->md.uuid[UI_BITMAP] != (u64)0) {
2418
31890f4a 2419 if (mdev->tconn->agreed_pro_version < 91)
4a23f264 2420 return -1091;
b411b363
PR
2421
2422 if ((mdev->ldev->md.uuid[UI_BITMAP] & ~((u64)1)) == (mdev->p_uuid[UI_HISTORY_START] & ~((u64)1)) &&
2423 (mdev->ldev->md.uuid[UI_HISTORY_START] & ~((u64)1)) == (mdev->p_uuid[UI_HISTORY_START + 1] & ~((u64)1))) {
2424 dev_info(DEV, "was SyncSource, missed the resync finished event, corrected myself:\n");
2425 drbd_uuid_set_bm(mdev, 0UL);
2426
2427 drbd_uuid_dump(mdev, "self", mdev->ldev->md.uuid,
2428 mdev->state.disk >= D_NEGOTIATING ? drbd_bm_total_weight(mdev) : 0, 0);
2429 *rule_nr = 34;
2430 } else {
2431 dev_info(DEV, "was SyncSource (peer failed to write sync_uuid)\n");
2432 *rule_nr = 36;
2433 }
2434
2435 return 1;
2436 }
2437
2438 if (mdev->ldev->md.uuid[UI_BITMAP] == (u64)0 && mdev->p_uuid[UI_BITMAP] != (u64)0) {
2439
31890f4a 2440 if (mdev->tconn->agreed_pro_version < 91)
4a23f264 2441 return -1091;
b411b363
PR
2442
2443 if ((mdev->ldev->md.uuid[UI_HISTORY_START] & ~((u64)1)) == (mdev->p_uuid[UI_BITMAP] & ~((u64)1)) &&
2444 (mdev->ldev->md.uuid[UI_HISTORY_START + 1] & ~((u64)1)) == (mdev->p_uuid[UI_HISTORY_START] & ~((u64)1))) {
2445 dev_info(DEV, "was SyncTarget, peer missed the resync finished event, corrected peer:\n");
2446
2447 mdev->p_uuid[UI_HISTORY_START + 1] = mdev->p_uuid[UI_HISTORY_START];
2448 mdev->p_uuid[UI_HISTORY_START] = mdev->p_uuid[UI_BITMAP];
2449 mdev->p_uuid[UI_BITMAP] = 0UL;
2450
2451 drbd_uuid_dump(mdev, "peer", mdev->p_uuid, mdev->p_uuid[UI_SIZE], mdev->p_uuid[UI_FLAGS]);
2452 *rule_nr = 35;
2453 } else {
2454 dev_info(DEV, "was SyncTarget (failed to write sync_uuid)\n");
2455 *rule_nr = 37;
2456 }
2457
2458 return -1;
2459 }
2460
2461 /* Common power [off|failure] */
2462 rct = (test_bit(CRASHED_PRIMARY, &mdev->flags) ? 1 : 0) +
2463 (mdev->p_uuid[UI_FLAGS] & 2);
2464 /* lowest bit is set when we were primary,
2465 * next bit (weight 2) is set when peer was primary */
2466 *rule_nr = 40;
2467
2468 switch (rct) {
2469 case 0: /* !self_pri && !peer_pri */ return 0;
2470 case 1: /* self_pri && !peer_pri */ return 1;
2471 case 2: /* !self_pri && peer_pri */ return -1;
2472 case 3: /* self_pri && peer_pri */
2473 dc = test_bit(DISCARD_CONCURRENT, &mdev->flags);
2474 return dc ? -1 : 1;
2475 }
2476 }
2477
2478 *rule_nr = 50;
2479 peer = mdev->p_uuid[UI_BITMAP] & ~((u64)1);
2480 if (self == peer)
2481 return -1;
2482
2483 *rule_nr = 51;
2484 peer = mdev->p_uuid[UI_HISTORY_START] & ~((u64)1);
2485 if (self == peer) {
31890f4a 2486 if (mdev->tconn->agreed_pro_version < 96 ?
4a23f264
PR
2487 (mdev->ldev->md.uuid[UI_HISTORY_START] & ~((u64)1)) ==
2488 (mdev->p_uuid[UI_HISTORY_START + 1] & ~((u64)1)) :
2489 peer + UUID_NEW_BM_OFFSET == (mdev->p_uuid[UI_BITMAP] & ~((u64)1))) {
b411b363
PR
2490 /* The last P_SYNC_UUID did not get though. Undo the last start of
2491 resync as sync source modifications of the peer's UUIDs. */
2492
31890f4a 2493 if (mdev->tconn->agreed_pro_version < 91)
4a23f264 2494 return -1091;
b411b363
PR
2495
2496 mdev->p_uuid[UI_BITMAP] = mdev->p_uuid[UI_HISTORY_START];
2497 mdev->p_uuid[UI_HISTORY_START] = mdev->p_uuid[UI_HISTORY_START + 1];
4a23f264
PR
2498
2499 dev_info(DEV, "Did not got last syncUUID packet, corrected:\n");
2500 drbd_uuid_dump(mdev, "peer", mdev->p_uuid, mdev->p_uuid[UI_SIZE], mdev->p_uuid[UI_FLAGS]);
2501
b411b363
PR
2502 return -1;
2503 }
2504 }
2505
2506 *rule_nr = 60;
2507 self = mdev->ldev->md.uuid[UI_CURRENT] & ~((u64)1);
2508 for (i = UI_HISTORY_START; i <= UI_HISTORY_END; i++) {
2509 peer = mdev->p_uuid[i] & ~((u64)1);
2510 if (self == peer)
2511 return -2;
2512 }
2513
2514 *rule_nr = 70;
2515 self = mdev->ldev->md.uuid[UI_BITMAP] & ~((u64)1);
2516 peer = mdev->p_uuid[UI_CURRENT] & ~((u64)1);
2517 if (self == peer)
2518 return 1;
2519
2520 *rule_nr = 71;
2521 self = mdev->ldev->md.uuid[UI_HISTORY_START] & ~((u64)1);
2522 if (self == peer) {
31890f4a 2523 if (mdev->tconn->agreed_pro_version < 96 ?
4a23f264
PR
2524 (mdev->ldev->md.uuid[UI_HISTORY_START + 1] & ~((u64)1)) ==
2525 (mdev->p_uuid[UI_HISTORY_START] & ~((u64)1)) :
2526 self + UUID_NEW_BM_OFFSET == (mdev->ldev->md.uuid[UI_BITMAP] & ~((u64)1))) {
b411b363
PR
2527 /* The last P_SYNC_UUID did not get though. Undo the last start of
2528 resync as sync source modifications of our UUIDs. */
2529
31890f4a 2530 if (mdev->tconn->agreed_pro_version < 91)
4a23f264 2531 return -1091;
b411b363
PR
2532
2533 _drbd_uuid_set(mdev, UI_BITMAP, mdev->ldev->md.uuid[UI_HISTORY_START]);
2534 _drbd_uuid_set(mdev, UI_HISTORY_START, mdev->ldev->md.uuid[UI_HISTORY_START + 1]);
2535
4a23f264 2536 dev_info(DEV, "Last syncUUID did not get through, corrected:\n");
b411b363
PR
2537 drbd_uuid_dump(mdev, "self", mdev->ldev->md.uuid,
2538 mdev->state.disk >= D_NEGOTIATING ? drbd_bm_total_weight(mdev) : 0, 0);
2539
2540 return 1;
2541 }
2542 }
2543
2544
2545 *rule_nr = 80;
d8c2a36b 2546 peer = mdev->p_uuid[UI_CURRENT] & ~((u64)1);
b411b363
PR
2547 for (i = UI_HISTORY_START; i <= UI_HISTORY_END; i++) {
2548 self = mdev->ldev->md.uuid[i] & ~((u64)1);
2549 if (self == peer)
2550 return 2;
2551 }
2552
2553 *rule_nr = 90;
2554 self = mdev->ldev->md.uuid[UI_BITMAP] & ~((u64)1);
2555 peer = mdev->p_uuid[UI_BITMAP] & ~((u64)1);
2556 if (self == peer && self != ((u64)0))
2557 return 100;
2558
2559 *rule_nr = 100;
2560 for (i = UI_HISTORY_START; i <= UI_HISTORY_END; i++) {
2561 self = mdev->ldev->md.uuid[i] & ~((u64)1);
2562 for (j = UI_HISTORY_START; j <= UI_HISTORY_END; j++) {
2563 peer = mdev->p_uuid[j] & ~((u64)1);
2564 if (self == peer)
2565 return -100;
2566 }
2567 }
2568
2569 return -1000;
2570}
2571
2572/* drbd_sync_handshake() returns the new conn state on success, or
2573 CONN_MASK (-1) on failure.
2574 */
2575static enum drbd_conns drbd_sync_handshake(struct drbd_conf *mdev, enum drbd_role peer_role,
2576 enum drbd_disk_state peer_disk) __must_hold(local)
2577{
2578 int hg, rule_nr;
2579 enum drbd_conns rv = C_MASK;
2580 enum drbd_disk_state mydisk;
2581
2582 mydisk = mdev->state.disk;
2583 if (mydisk == D_NEGOTIATING)
2584 mydisk = mdev->new_state_tmp.disk;
2585
2586 dev_info(DEV, "drbd_sync_handshake:\n");
2587 drbd_uuid_dump(mdev, "self", mdev->ldev->md.uuid, mdev->comm_bm_set, 0);
2588 drbd_uuid_dump(mdev, "peer", mdev->p_uuid,
2589 mdev->p_uuid[UI_SIZE], mdev->p_uuid[UI_FLAGS]);
2590
2591 hg = drbd_uuid_compare(mdev, &rule_nr);
2592
2593 dev_info(DEV, "uuid_compare()=%d by rule %d\n", hg, rule_nr);
2594
2595 if (hg == -1000) {
2596 dev_alert(DEV, "Unrelated data, aborting!\n");
2597 return C_MASK;
2598 }
4a23f264
PR
2599 if (hg < -1000) {
2600 dev_alert(DEV, "To resolve this both sides have to support at least protocol %d\n", -hg - 1000);
b411b363
PR
2601 return C_MASK;
2602 }
2603
2604 if ((mydisk == D_INCONSISTENT && peer_disk > D_INCONSISTENT) ||
2605 (peer_disk == D_INCONSISTENT && mydisk > D_INCONSISTENT)) {
2606 int f = (hg == -100) || abs(hg) == 2;
2607 hg = mydisk > D_INCONSISTENT ? 1 : -1;
2608 if (f)
2609 hg = hg*2;
2610 dev_info(DEV, "Becoming sync %s due to disk states.\n",
2611 hg > 0 ? "source" : "target");
2612 }
2613
3a11a487
AG
2614 if (abs(hg) == 100)
2615 drbd_khelper(mdev, "initial-split-brain");
2616
89e58e75 2617 if (hg == 100 || (hg == -100 && mdev->tconn->net_conf->always_asbp)) {
b411b363
PR
2618 int pcount = (mdev->state.role == R_PRIMARY)
2619 + (peer_role == R_PRIMARY);
2620 int forced = (hg == -100);
2621
2622 switch (pcount) {
2623 case 0:
2624 hg = drbd_asb_recover_0p(mdev);
2625 break;
2626 case 1:
2627 hg = drbd_asb_recover_1p(mdev);
2628 break;
2629 case 2:
2630 hg = drbd_asb_recover_2p(mdev);
2631 break;
2632 }
2633 if (abs(hg) < 100) {
2634 dev_warn(DEV, "Split-Brain detected, %d primaries, "
2635 "automatically solved. Sync from %s node\n",
2636 pcount, (hg < 0) ? "peer" : "this");
2637 if (forced) {
2638 dev_warn(DEV, "Doing a full sync, since"
2639 " UUIDs where ambiguous.\n");
2640 hg = hg*2;
2641 }
2642 }
2643 }
2644
2645 if (hg == -100) {
89e58e75 2646 if (mdev->tconn->net_conf->want_lose && !(mdev->p_uuid[UI_FLAGS]&1))
b411b363 2647 hg = -1;
89e58e75 2648 if (!mdev->tconn->net_conf->want_lose && (mdev->p_uuid[UI_FLAGS]&1))
b411b363
PR
2649 hg = 1;
2650
2651 if (abs(hg) < 100)
2652 dev_warn(DEV, "Split-Brain detected, manually solved. "
2653 "Sync from %s node\n",
2654 (hg < 0) ? "peer" : "this");
2655 }
2656
2657 if (hg == -100) {
580b9767
LE
2658 /* FIXME this log message is not correct if we end up here
2659 * after an attempted attach on a diskless node.
2660 * We just refuse to attach -- well, we drop the "connection"
2661 * to that disk, in a way... */
3a11a487 2662 dev_alert(DEV, "Split-Brain detected but unresolved, dropping connection!\n");
b411b363
PR
2663 drbd_khelper(mdev, "split-brain");
2664 return C_MASK;
2665 }
2666
2667 if (hg > 0 && mydisk <= D_INCONSISTENT) {
2668 dev_err(DEV, "I shall become SyncSource, but I am inconsistent!\n");
2669 return C_MASK;
2670 }
2671
2672 if (hg < 0 && /* by intention we do not use mydisk here. */
2673 mdev->state.role == R_PRIMARY && mdev->state.disk >= D_CONSISTENT) {
89e58e75 2674 switch (mdev->tconn->net_conf->rr_conflict) {
b411b363
PR
2675 case ASB_CALL_HELPER:
2676 drbd_khelper(mdev, "pri-lost");
2677 /* fall through */
2678 case ASB_DISCONNECT:
2679 dev_err(DEV, "I shall become SyncTarget, but I am primary!\n");
2680 return C_MASK;
2681 case ASB_VIOLENTLY:
2682 dev_warn(DEV, "Becoming SyncTarget, violating the stable-data"
2683 "assumption\n");
2684 }
2685 }
2686
89e58e75 2687 if (mdev->tconn->net_conf->dry_run || test_bit(CONN_DRY_RUN, &mdev->flags)) {
cf14c2e9
PR
2688 if (hg == 0)
2689 dev_info(DEV, "dry-run connect: No resync, would become Connected immediately.\n");
2690 else
2691 dev_info(DEV, "dry-run connect: Would become %s, doing a %s resync.",
2692 drbd_conn_str(hg > 0 ? C_SYNC_SOURCE : C_SYNC_TARGET),
2693 abs(hg) >= 2 ? "full" : "bit-map based");
2694 return C_MASK;
2695 }
2696
b411b363
PR
2697 if (abs(hg) >= 2) {
2698 dev_info(DEV, "Writing the whole bitmap, full sync required after drbd_sync_handshake.\n");
20ceb2b2
LE
2699 if (drbd_bitmap_io(mdev, &drbd_bmio_set_n_write, "set_n_write from sync_handshake",
2700 BM_LOCKED_SET_ALLOWED))
b411b363
PR
2701 return C_MASK;
2702 }
2703
2704 if (hg > 0) { /* become sync source. */
2705 rv = C_WF_BITMAP_S;
2706 } else if (hg < 0) { /* become sync target */
2707 rv = C_WF_BITMAP_T;
2708 } else {
2709 rv = C_CONNECTED;
2710 if (drbd_bm_total_weight(mdev)) {
2711 dev_info(DEV, "No resync, but %lu bits in bitmap!\n",
2712 drbd_bm_total_weight(mdev));
2713 }
2714 }
2715
2716 return rv;
2717}
2718
2719/* returns 1 if invalid */
2720static int cmp_after_sb(enum drbd_after_sb_p peer, enum drbd_after_sb_p self)
2721{
2722 /* ASB_DISCARD_REMOTE - ASB_DISCARD_LOCAL is valid */
2723 if ((peer == ASB_DISCARD_REMOTE && self == ASB_DISCARD_LOCAL) ||
2724 (self == ASB_DISCARD_REMOTE && peer == ASB_DISCARD_LOCAL))
2725 return 0;
2726
2727 /* any other things with ASB_DISCARD_REMOTE or ASB_DISCARD_LOCAL are invalid */
2728 if (peer == ASB_DISCARD_REMOTE || peer == ASB_DISCARD_LOCAL ||
2729 self == ASB_DISCARD_REMOTE || self == ASB_DISCARD_LOCAL)
2730 return 1;
2731
2732 /* everything else is valid if they are equal on both sides. */
2733 if (peer == self)
2734 return 0;
2735
2736 /* everything es is invalid. */
2737 return 1;
2738}
2739
d8763023
AG
2740static int receive_protocol(struct drbd_conf *mdev, enum drbd_packet cmd,
2741 unsigned int data_size)
b411b363 2742{
e42325a5 2743 struct p_protocol *p = &mdev->tconn->data.rbuf.protocol;
b411b363 2744 int p_proto, p_after_sb_0p, p_after_sb_1p, p_after_sb_2p;
cf14c2e9 2745 int p_want_lose, p_two_primaries, cf;
b411b363
PR
2746 char p_integrity_alg[SHARED_SECRET_MAX] = "";
2747
b411b363
PR
2748 p_proto = be32_to_cpu(p->protocol);
2749 p_after_sb_0p = be32_to_cpu(p->after_sb_0p);
2750 p_after_sb_1p = be32_to_cpu(p->after_sb_1p);
2751 p_after_sb_2p = be32_to_cpu(p->after_sb_2p);
b411b363 2752 p_two_primaries = be32_to_cpu(p->two_primaries);
cf14c2e9
PR
2753 cf = be32_to_cpu(p->conn_flags);
2754 p_want_lose = cf & CF_WANT_LOSE;
2755
2756 clear_bit(CONN_DRY_RUN, &mdev->flags);
2757
2758 if (cf & CF_DRY_RUN)
2759 set_bit(CONN_DRY_RUN, &mdev->flags);
b411b363 2760
89e58e75 2761 if (p_proto != mdev->tconn->net_conf->wire_protocol) {
b411b363
PR
2762 dev_err(DEV, "incompatible communication protocols\n");
2763 goto disconnect;
2764 }
2765
89e58e75 2766 if (cmp_after_sb(p_after_sb_0p, mdev->tconn->net_conf->after_sb_0p)) {
b411b363
PR
2767 dev_err(DEV, "incompatible after-sb-0pri settings\n");
2768 goto disconnect;
2769 }
2770
89e58e75 2771 if (cmp_after_sb(p_after_sb_1p, mdev->tconn->net_conf->after_sb_1p)) {
b411b363
PR
2772 dev_err(DEV, "incompatible after-sb-1pri settings\n");
2773 goto disconnect;
2774 }
2775
89e58e75 2776 if (cmp_after_sb(p_after_sb_2p, mdev->tconn->net_conf->after_sb_2p)) {
b411b363
PR
2777 dev_err(DEV, "incompatible after-sb-2pri settings\n");
2778 goto disconnect;
2779 }
2780
89e58e75 2781 if (p_want_lose && mdev->tconn->net_conf->want_lose) {
b411b363
PR
2782 dev_err(DEV, "both sides have the 'want_lose' flag set\n");
2783 goto disconnect;
2784 }
2785
89e58e75 2786 if (p_two_primaries != mdev->tconn->net_conf->two_primaries) {
b411b363
PR
2787 dev_err(DEV, "incompatible setting of the two-primaries options\n");
2788 goto disconnect;
2789 }
2790
31890f4a 2791 if (mdev->tconn->agreed_pro_version >= 87) {
89e58e75 2792 unsigned char *my_alg = mdev->tconn->net_conf->integrity_alg;
b411b363
PR
2793
2794 if (drbd_recv(mdev, p_integrity_alg, data_size) != data_size)
81e84650 2795 return false;
b411b363
PR
2796
2797 p_integrity_alg[SHARED_SECRET_MAX-1] = 0;
2798 if (strcmp(p_integrity_alg, my_alg)) {
2799 dev_err(DEV, "incompatible setting of the data-integrity-alg\n");
2800 goto disconnect;
2801 }
2802 dev_info(DEV, "data-integrity-alg: %s\n",
2803 my_alg[0] ? my_alg : (unsigned char *)"<not-used>");
2804 }
2805
81e84650 2806 return true;
b411b363
PR
2807
2808disconnect:
2809 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
81e84650 2810 return false;
b411b363
PR
2811}
2812
2813/* helper function
2814 * input: alg name, feature name
2815 * return: NULL (alg name was "")
2816 * ERR_PTR(error) if something goes wrong
2817 * or the crypto hash ptr, if it worked out ok. */
2818struct crypto_hash *drbd_crypto_alloc_digest_safe(const struct drbd_conf *mdev,
2819 const char *alg, const char *name)
2820{
2821 struct crypto_hash *tfm;
2822
2823 if (!alg[0])
2824 return NULL;
2825
2826 tfm = crypto_alloc_hash(alg, 0, CRYPTO_ALG_ASYNC);
2827 if (IS_ERR(tfm)) {
2828 dev_err(DEV, "Can not allocate \"%s\" as %s (reason: %ld)\n",
2829 alg, name, PTR_ERR(tfm));
2830 return tfm;
2831 }
2832 if (!drbd_crypto_is_hash(crypto_hash_tfm(tfm))) {
2833 crypto_free_hash(tfm);
2834 dev_err(DEV, "\"%s\" is not a digest (%s)\n", alg, name);
2835 return ERR_PTR(-EINVAL);
2836 }
2837 return tfm;
2838}
2839
d8763023
AG
2840static int receive_SyncParam(struct drbd_conf *mdev, enum drbd_packet cmd,
2841 unsigned int packet_size)
b411b363 2842{
81e84650 2843 int ok = true;
e42325a5 2844 struct p_rs_param_95 *p = &mdev->tconn->data.rbuf.rs_param_95;
b411b363
PR
2845 unsigned int header_size, data_size, exp_max_sz;
2846 struct crypto_hash *verify_tfm = NULL;
2847 struct crypto_hash *csums_tfm = NULL;
31890f4a 2848 const int apv = mdev->tconn->agreed_pro_version;
778f271d
PR
2849 int *rs_plan_s = NULL;
2850 int fifo_size = 0;
b411b363
PR
2851
2852 exp_max_sz = apv <= 87 ? sizeof(struct p_rs_param)
2853 : apv == 88 ? sizeof(struct p_rs_param)
2854 + SHARED_SECRET_MAX
8e26f9cc
PR
2855 : apv <= 94 ? sizeof(struct p_rs_param_89)
2856 : /* apv >= 95 */ sizeof(struct p_rs_param_95);
b411b363 2857
02918be2 2858 if (packet_size > exp_max_sz) {
b411b363 2859 dev_err(DEV, "SyncParam packet too long: received %u, expected <= %u bytes\n",
02918be2 2860 packet_size, exp_max_sz);
81e84650 2861 return false;
b411b363
PR
2862 }
2863
2864 if (apv <= 88) {
257d0af6 2865 header_size = sizeof(struct p_rs_param) - sizeof(struct p_header);
02918be2 2866 data_size = packet_size - header_size;
8e26f9cc 2867 } else if (apv <= 94) {
257d0af6 2868 header_size = sizeof(struct p_rs_param_89) - sizeof(struct p_header);
02918be2 2869 data_size = packet_size - header_size;
b411b363 2870 D_ASSERT(data_size == 0);
8e26f9cc 2871 } else {
257d0af6 2872 header_size = sizeof(struct p_rs_param_95) - sizeof(struct p_header);
02918be2 2873 data_size = packet_size - header_size;
b411b363
PR
2874 D_ASSERT(data_size == 0);
2875 }
2876
2877 /* initialize verify_alg and csums_alg */
2878 memset(p->verify_alg, 0, 2 * SHARED_SECRET_MAX);
2879
02918be2 2880 if (drbd_recv(mdev, &p->head.payload, header_size) != header_size)
81e84650 2881 return false;
b411b363
PR
2882
2883 mdev->sync_conf.rate = be32_to_cpu(p->rate);
2884
2885 if (apv >= 88) {
2886 if (apv == 88) {
2887 if (data_size > SHARED_SECRET_MAX) {
2888 dev_err(DEV, "verify-alg too long, "
2889 "peer wants %u, accepting only %u byte\n",
2890 data_size, SHARED_SECRET_MAX);
81e84650 2891 return false;
b411b363
PR
2892 }
2893
2894 if (drbd_recv(mdev, p->verify_alg, data_size) != data_size)
81e84650 2895 return false;
b411b363
PR
2896
2897 /* we expect NUL terminated string */
2898 /* but just in case someone tries to be evil */
2899 D_ASSERT(p->verify_alg[data_size-1] == 0);
2900 p->verify_alg[data_size-1] = 0;
2901
2902 } else /* apv >= 89 */ {
2903 /* we still expect NUL terminated strings */
2904 /* but just in case someone tries to be evil */
2905 D_ASSERT(p->verify_alg[SHARED_SECRET_MAX-1] == 0);
2906 D_ASSERT(p->csums_alg[SHARED_SECRET_MAX-1] == 0);
2907 p->verify_alg[SHARED_SECRET_MAX-1] = 0;
2908 p->csums_alg[SHARED_SECRET_MAX-1] = 0;
2909 }
2910
2911 if (strcmp(mdev->sync_conf.verify_alg, p->verify_alg)) {
2912 if (mdev->state.conn == C_WF_REPORT_PARAMS) {
2913 dev_err(DEV, "Different verify-alg settings. me=\"%s\" peer=\"%s\"\n",
2914 mdev->sync_conf.verify_alg, p->verify_alg);
2915 goto disconnect;
2916 }
2917 verify_tfm = drbd_crypto_alloc_digest_safe(mdev,
2918 p->verify_alg, "verify-alg");
2919 if (IS_ERR(verify_tfm)) {
2920 verify_tfm = NULL;
2921 goto disconnect;
2922 }
2923 }
2924
2925 if (apv >= 89 && strcmp(mdev->sync_conf.csums_alg, p->csums_alg)) {
2926 if (mdev->state.conn == C_WF_REPORT_PARAMS) {
2927 dev_err(DEV, "Different csums-alg settings. me=\"%s\" peer=\"%s\"\n",
2928 mdev->sync_conf.csums_alg, p->csums_alg);
2929 goto disconnect;
2930 }
2931 csums_tfm = drbd_crypto_alloc_digest_safe(mdev,
2932 p->csums_alg, "csums-alg");
2933 if (IS_ERR(csums_tfm)) {
2934 csums_tfm = NULL;
2935 goto disconnect;
2936 }
2937 }
2938
8e26f9cc
PR
2939 if (apv > 94) {
2940 mdev->sync_conf.rate = be32_to_cpu(p->rate);
2941 mdev->sync_conf.c_plan_ahead = be32_to_cpu(p->c_plan_ahead);
2942 mdev->sync_conf.c_delay_target = be32_to_cpu(p->c_delay_target);
2943 mdev->sync_conf.c_fill_target = be32_to_cpu(p->c_fill_target);
2944 mdev->sync_conf.c_max_rate = be32_to_cpu(p->c_max_rate);
778f271d
PR
2945
2946 fifo_size = (mdev->sync_conf.c_plan_ahead * 10 * SLEEP_TIME) / HZ;
2947 if (fifo_size != mdev->rs_plan_s.size && fifo_size > 0) {
2948 rs_plan_s = kzalloc(sizeof(int) * fifo_size, GFP_KERNEL);
2949 if (!rs_plan_s) {
2950 dev_err(DEV, "kmalloc of fifo_buffer failed");
2951 goto disconnect;
2952 }
2953 }
8e26f9cc 2954 }
b411b363
PR
2955
2956 spin_lock(&mdev->peer_seq_lock);
2957 /* lock against drbd_nl_syncer_conf() */
2958 if (verify_tfm) {
2959 strcpy(mdev->sync_conf.verify_alg, p->verify_alg);
2960 mdev->sync_conf.verify_alg_len = strlen(p->verify_alg) + 1;
2961 crypto_free_hash(mdev->verify_tfm);
2962 mdev->verify_tfm = verify_tfm;
2963 dev_info(DEV, "using verify-alg: \"%s\"\n", p->verify_alg);
2964 }
2965 if (csums_tfm) {
2966 strcpy(mdev->sync_conf.csums_alg, p->csums_alg);
2967 mdev->sync_conf.csums_alg_len = strlen(p->csums_alg) + 1;
2968 crypto_free_hash(mdev->csums_tfm);
2969 mdev->csums_tfm = csums_tfm;
2970 dev_info(DEV, "using csums-alg: \"%s\"\n", p->csums_alg);
2971 }
778f271d
PR
2972 if (fifo_size != mdev->rs_plan_s.size) {
2973 kfree(mdev->rs_plan_s.values);
2974 mdev->rs_plan_s.values = rs_plan_s;
2975 mdev->rs_plan_s.size = fifo_size;
2976 mdev->rs_planed = 0;
2977 }
b411b363
PR
2978 spin_unlock(&mdev->peer_seq_lock);
2979 }
2980
2981 return ok;
2982disconnect:
2983 /* just for completeness: actually not needed,
2984 * as this is not reached if csums_tfm was ok. */
2985 crypto_free_hash(csums_tfm);
2986 /* but free the verify_tfm again, if csums_tfm did not work out */
2987 crypto_free_hash(verify_tfm);
2988 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
81e84650 2989 return false;
b411b363
PR
2990}
2991
b411b363
PR
2992/* warn if the arguments differ by more than 12.5% */
2993static void warn_if_differ_considerably(struct drbd_conf *mdev,
2994 const char *s, sector_t a, sector_t b)
2995{
2996 sector_t d;
2997 if (a == 0 || b == 0)
2998 return;
2999 d = (a > b) ? (a - b) : (b - a);
3000 if (d > (a>>3) || d > (b>>3))
3001 dev_warn(DEV, "Considerable difference in %s: %llus vs. %llus\n", s,
3002 (unsigned long long)a, (unsigned long long)b);
3003}
3004
d8763023
AG
3005static int receive_sizes(struct drbd_conf *mdev, enum drbd_packet cmd,
3006 unsigned int data_size)
b411b363 3007{
e42325a5 3008 struct p_sizes *p = &mdev->tconn->data.rbuf.sizes;
b411b363 3009 enum determine_dev_size dd = unchanged;
b411b363
PR
3010 sector_t p_size, p_usize, my_usize;
3011 int ldsc = 0; /* local disk size changed */
e89b591c 3012 enum dds_flags ddsf;
b411b363 3013
b411b363
PR
3014 p_size = be64_to_cpu(p->d_size);
3015 p_usize = be64_to_cpu(p->u_size);
3016
3017 if (p_size == 0 && mdev->state.disk == D_DISKLESS) {
3018 dev_err(DEV, "some backing storage is needed\n");
3019 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
81e84650 3020 return false;
b411b363
PR
3021 }
3022
3023 /* just store the peer's disk size for now.
3024 * we still need to figure out whether we accept that. */
3025 mdev->p_size = p_size;
3026
b411b363
PR
3027 if (get_ldev(mdev)) {
3028 warn_if_differ_considerably(mdev, "lower level device sizes",
3029 p_size, drbd_get_max_capacity(mdev->ldev));
3030 warn_if_differ_considerably(mdev, "user requested size",
3031 p_usize, mdev->ldev->dc.disk_size);
3032
3033 /* if this is the first connect, or an otherwise expected
3034 * param exchange, choose the minimum */
3035 if (mdev->state.conn == C_WF_REPORT_PARAMS)
3036 p_usize = min_not_zero((sector_t)mdev->ldev->dc.disk_size,
3037 p_usize);
3038
3039 my_usize = mdev->ldev->dc.disk_size;
3040
3041 if (mdev->ldev->dc.disk_size != p_usize) {
3042 mdev->ldev->dc.disk_size = p_usize;
3043 dev_info(DEV, "Peer sets u_size to %lu sectors\n",
3044 (unsigned long)mdev->ldev->dc.disk_size);
3045 }
3046
3047 /* Never shrink a device with usable data during connect.
3048 But allow online shrinking if we are connected. */
a393db6f 3049 if (drbd_new_dev_size(mdev, mdev->ldev, 0) <
b411b363
PR
3050 drbd_get_capacity(mdev->this_bdev) &&
3051 mdev->state.disk >= D_OUTDATED &&
3052 mdev->state.conn < C_CONNECTED) {
3053 dev_err(DEV, "The peer's disk size is too small!\n");
3054 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
3055 mdev->ldev->dc.disk_size = my_usize;
3056 put_ldev(mdev);
81e84650 3057 return false;
b411b363
PR
3058 }
3059 put_ldev(mdev);
3060 }
b411b363 3061
e89b591c 3062 ddsf = be16_to_cpu(p->dds_flags);
b411b363 3063 if (get_ldev(mdev)) {
24c4830c 3064 dd = drbd_determine_dev_size(mdev, ddsf);
b411b363
PR
3065 put_ldev(mdev);
3066 if (dd == dev_size_error)
81e84650 3067 return false;
b411b363
PR
3068 drbd_md_sync(mdev);
3069 } else {
3070 /* I am diskless, need to accept the peer's size. */
3071 drbd_set_my_capacity(mdev, p_size);
3072 }
3073
99432fcc
PR
3074 mdev->peer_max_bio_size = be32_to_cpu(p->max_bio_size);
3075 drbd_reconsider_max_bio_size(mdev);
3076
b411b363
PR
3077 if (get_ldev(mdev)) {
3078 if (mdev->ldev->known_size != drbd_get_capacity(mdev->ldev->backing_bdev)) {
3079 mdev->ldev->known_size = drbd_get_capacity(mdev->ldev->backing_bdev);
3080 ldsc = 1;
3081 }
3082
b411b363
PR
3083 put_ldev(mdev);
3084 }
3085
3086 if (mdev->state.conn > C_WF_REPORT_PARAMS) {
3087 if (be64_to_cpu(p->c_size) !=
3088 drbd_get_capacity(mdev->this_bdev) || ldsc) {
3089 /* we have different sizes, probably peer
3090 * needs to know my new size... */
e89b591c 3091 drbd_send_sizes(mdev, 0, ddsf);
b411b363
PR
3092 }
3093 if (test_and_clear_bit(RESIZE_PENDING, &mdev->flags) ||
3094 (dd == grew && mdev->state.conn == C_CONNECTED)) {
3095 if (mdev->state.pdsk >= D_INCONSISTENT &&
e89b591c
PR
3096 mdev->state.disk >= D_INCONSISTENT) {
3097 if (ddsf & DDSF_NO_RESYNC)
3098 dev_info(DEV, "Resync of new storage suppressed with --assume-clean\n");
3099 else
3100 resync_after_online_grow(mdev);
3101 } else
b411b363
PR
3102 set_bit(RESYNC_AFTER_NEG, &mdev->flags);
3103 }
3104 }
3105
81e84650 3106 return true;
b411b363
PR
3107}
3108
d8763023
AG
3109static int receive_uuids(struct drbd_conf *mdev, enum drbd_packet cmd,
3110 unsigned int data_size)
b411b363 3111{
e42325a5 3112 struct p_uuids *p = &mdev->tconn->data.rbuf.uuids;
b411b363 3113 u64 *p_uuid;
62b0da3a 3114 int i, updated_uuids = 0;
b411b363 3115
b411b363
PR
3116 p_uuid = kmalloc(sizeof(u64)*UI_EXTENDED_SIZE, GFP_NOIO);
3117
3118 for (i = UI_CURRENT; i < UI_EXTENDED_SIZE; i++)
3119 p_uuid[i] = be64_to_cpu(p->uuid[i]);
3120
3121 kfree(mdev->p_uuid);
3122 mdev->p_uuid = p_uuid;
3123
3124 if (mdev->state.conn < C_CONNECTED &&
3125 mdev->state.disk < D_INCONSISTENT &&
3126 mdev->state.role == R_PRIMARY &&
3127 (mdev->ed_uuid & ~((u64)1)) != (p_uuid[UI_CURRENT] & ~((u64)1))) {
3128 dev_err(DEV, "Can only connect to data with current UUID=%016llX\n",
3129 (unsigned long long)mdev->ed_uuid);
3130 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
81e84650 3131 return false;
b411b363
PR
3132 }
3133
3134 if (get_ldev(mdev)) {
3135 int skip_initial_sync =
3136 mdev->state.conn == C_CONNECTED &&
31890f4a 3137 mdev->tconn->agreed_pro_version >= 90 &&
b411b363
PR
3138 mdev->ldev->md.uuid[UI_CURRENT] == UUID_JUST_CREATED &&
3139 (p_uuid[UI_FLAGS] & 8);
3140 if (skip_initial_sync) {
3141 dev_info(DEV, "Accepted new current UUID, preparing to skip initial sync\n");
3142 drbd_bitmap_io(mdev, &drbd_bmio_clear_n_write,
20ceb2b2
LE
3143 "clear_n_write from receive_uuids",
3144 BM_LOCKED_TEST_ALLOWED);
b411b363
PR
3145 _drbd_uuid_set(mdev, UI_CURRENT, p_uuid[UI_CURRENT]);
3146 _drbd_uuid_set(mdev, UI_BITMAP, 0);
3147 _drbd_set_state(_NS2(mdev, disk, D_UP_TO_DATE, pdsk, D_UP_TO_DATE),
3148 CS_VERBOSE, NULL);
3149 drbd_md_sync(mdev);
62b0da3a 3150 updated_uuids = 1;
b411b363
PR
3151 }
3152 put_ldev(mdev);
18a50fa2
PR
3153 } else if (mdev->state.disk < D_INCONSISTENT &&
3154 mdev->state.role == R_PRIMARY) {
3155 /* I am a diskless primary, the peer just created a new current UUID
3156 for me. */
62b0da3a 3157 updated_uuids = drbd_set_ed_uuid(mdev, p_uuid[UI_CURRENT]);
b411b363
PR
3158 }
3159
3160 /* Before we test for the disk state, we should wait until an eventually
3161 ongoing cluster wide state change is finished. That is important if
3162 we are primary and are detaching from our disk. We need to see the
3163 new disk state... */
3164 wait_event(mdev->misc_wait, !test_bit(CLUSTER_ST_CHANGE, &mdev->flags));
3165 if (mdev->state.conn >= C_CONNECTED && mdev->state.disk < D_INCONSISTENT)
62b0da3a
LE
3166 updated_uuids |= drbd_set_ed_uuid(mdev, p_uuid[UI_CURRENT]);
3167
3168 if (updated_uuids)
3169 drbd_print_uuids(mdev, "receiver updated UUIDs to");
b411b363 3170
81e84650 3171 return true;
b411b363
PR
3172}
3173
3174/**
3175 * convert_state() - Converts the peer's view of the cluster state to our point of view
3176 * @ps: The state as seen by the peer.
3177 */
3178static union drbd_state convert_state(union drbd_state ps)
3179{
3180 union drbd_state ms;
3181
3182 static enum drbd_conns c_tab[] = {
3183 [C_CONNECTED] = C_CONNECTED,
3184
3185 [C_STARTING_SYNC_S] = C_STARTING_SYNC_T,
3186 [C_STARTING_SYNC_T] = C_STARTING_SYNC_S,
3187 [C_DISCONNECTING] = C_TEAR_DOWN, /* C_NETWORK_FAILURE, */
3188 [C_VERIFY_S] = C_VERIFY_T,
3189 [C_MASK] = C_MASK,
3190 };
3191
3192 ms.i = ps.i;
3193
3194 ms.conn = c_tab[ps.conn];
3195 ms.peer = ps.role;
3196 ms.role = ps.peer;
3197 ms.pdsk = ps.disk;
3198 ms.disk = ps.pdsk;
3199 ms.peer_isp = (ps.aftr_isp | ps.user_isp);
3200
3201 return ms;
3202}
3203
d8763023
AG
3204static int receive_req_state(struct drbd_conf *mdev, enum drbd_packet cmd,
3205 unsigned int data_size)
b411b363 3206{
e42325a5 3207 struct p_req_state *p = &mdev->tconn->data.rbuf.req_state;
b411b363 3208 union drbd_state mask, val;
bf885f8a 3209 enum drbd_state_rv rv;
b411b363 3210
b411b363
PR
3211 mask.i = be32_to_cpu(p->mask);
3212 val.i = be32_to_cpu(p->val);
3213
3214 if (test_bit(DISCARD_CONCURRENT, &mdev->flags) &&
3215 test_bit(CLUSTER_ST_CHANGE, &mdev->flags)) {
3216 drbd_send_sr_reply(mdev, SS_CONCURRENT_ST_CHG);
81e84650 3217 return true;
b411b363
PR
3218 }
3219
3220 mask = convert_state(mask);
3221 val = convert_state(val);
3222
3223 rv = drbd_change_state(mdev, CS_VERBOSE, mask, val);
3224
3225 drbd_send_sr_reply(mdev, rv);
3226 drbd_md_sync(mdev);
3227
81e84650 3228 return true;
b411b363
PR
3229}
3230
d8763023
AG
3231static int receive_state(struct drbd_conf *mdev, enum drbd_packet cmd,
3232 unsigned int data_size)
b411b363 3233{
e42325a5 3234 struct p_state *p = &mdev->tconn->data.rbuf.state;
4ac4aada 3235 union drbd_state os, ns, peer_state;
b411b363 3236 enum drbd_disk_state real_peer_disk;
65d922c3 3237 enum chg_state_flags cs_flags;
b411b363
PR
3238 int rv;
3239
b411b363
PR
3240 peer_state.i = be32_to_cpu(p->state);
3241
3242 real_peer_disk = peer_state.disk;
3243 if (peer_state.disk == D_NEGOTIATING) {
3244 real_peer_disk = mdev->p_uuid[UI_FLAGS] & 4 ? D_INCONSISTENT : D_CONSISTENT;
3245 dev_info(DEV, "real peer disk state = %s\n", drbd_disk_str(real_peer_disk));
3246 }
3247
87eeee41 3248 spin_lock_irq(&mdev->tconn->req_lock);
b411b363 3249 retry:
4ac4aada 3250 os = ns = mdev->state;
87eeee41 3251 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363 3252
e9ef7bb6
LE
3253 /* peer says his disk is uptodate, while we think it is inconsistent,
3254 * and this happens while we think we have a sync going on. */
3255 if (os.pdsk == D_INCONSISTENT && real_peer_disk == D_UP_TO_DATE &&
3256 os.conn > C_CONNECTED && os.disk == D_UP_TO_DATE) {
3257 /* If we are (becoming) SyncSource, but peer is still in sync
3258 * preparation, ignore its uptodate-ness to avoid flapping, it
3259 * will change to inconsistent once the peer reaches active
3260 * syncing states.
3261 * It may have changed syncer-paused flags, however, so we
3262 * cannot ignore this completely. */
3263 if (peer_state.conn > C_CONNECTED &&
3264 peer_state.conn < C_SYNC_SOURCE)
3265 real_peer_disk = D_INCONSISTENT;
3266
3267 /* if peer_state changes to connected at the same time,
3268 * it explicitly notifies us that it finished resync.
3269 * Maybe we should finish it up, too? */
3270 else if (os.conn >= C_SYNC_SOURCE &&
3271 peer_state.conn == C_CONNECTED) {
3272 if (drbd_bm_total_weight(mdev) <= mdev->rs_failed)
3273 drbd_resync_finished(mdev);
81e84650 3274 return true;
e9ef7bb6
LE
3275 }
3276 }
3277
3278 /* peer says his disk is inconsistent, while we think it is uptodate,
3279 * and this happens while the peer still thinks we have a sync going on,
3280 * but we think we are already done with the sync.
3281 * We ignore this to avoid flapping pdsk.
3282 * This should not happen, if the peer is a recent version of drbd. */
3283 if (os.pdsk == D_UP_TO_DATE && real_peer_disk == D_INCONSISTENT &&
3284 os.conn == C_CONNECTED && peer_state.conn > C_SYNC_SOURCE)
3285 real_peer_disk = D_UP_TO_DATE;
3286
4ac4aada
LE
3287 if (ns.conn == C_WF_REPORT_PARAMS)
3288 ns.conn = C_CONNECTED;
b411b363 3289
67531718
PR
3290 if (peer_state.conn == C_AHEAD)
3291 ns.conn = C_BEHIND;
3292
b411b363
PR
3293 if (mdev->p_uuid && peer_state.disk >= D_NEGOTIATING &&
3294 get_ldev_if_state(mdev, D_NEGOTIATING)) {
3295 int cr; /* consider resync */
3296
3297 /* if we established a new connection */
4ac4aada 3298 cr = (os.conn < C_CONNECTED);
b411b363
PR
3299 /* if we had an established connection
3300 * and one of the nodes newly attaches a disk */
4ac4aada 3301 cr |= (os.conn == C_CONNECTED &&
b411b363 3302 (peer_state.disk == D_NEGOTIATING ||
4ac4aada 3303 os.disk == D_NEGOTIATING));
b411b363
PR
3304 /* if we have both been inconsistent, and the peer has been
3305 * forced to be UpToDate with --overwrite-data */
3306 cr |= test_bit(CONSIDER_RESYNC, &mdev->flags);
3307 /* if we had been plain connected, and the admin requested to
3308 * start a sync by "invalidate" or "invalidate-remote" */
4ac4aada 3309 cr |= (os.conn == C_CONNECTED &&
b411b363
PR
3310 (peer_state.conn >= C_STARTING_SYNC_S &&
3311 peer_state.conn <= C_WF_BITMAP_T));
3312
3313 if (cr)
4ac4aada 3314 ns.conn = drbd_sync_handshake(mdev, peer_state.role, real_peer_disk);
b411b363
PR
3315
3316 put_ldev(mdev);
4ac4aada
LE
3317 if (ns.conn == C_MASK) {
3318 ns.conn = C_CONNECTED;
b411b363 3319 if (mdev->state.disk == D_NEGOTIATING) {
82f59cc6 3320 drbd_force_state(mdev, NS(disk, D_FAILED));
b411b363
PR
3321 } else if (peer_state.disk == D_NEGOTIATING) {
3322 dev_err(DEV, "Disk attach process on the peer node was aborted.\n");
3323 peer_state.disk = D_DISKLESS;
580b9767 3324 real_peer_disk = D_DISKLESS;
b411b363 3325 } else {
cf14c2e9 3326 if (test_and_clear_bit(CONN_DRY_RUN, &mdev->flags))
81e84650 3327 return false;
4ac4aada 3328 D_ASSERT(os.conn == C_WF_REPORT_PARAMS);
b411b363 3329 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
81e84650 3330 return false;
b411b363
PR
3331 }
3332 }
3333 }
3334
87eeee41 3335 spin_lock_irq(&mdev->tconn->req_lock);
4ac4aada 3336 if (mdev->state.i != os.i)
b411b363
PR
3337 goto retry;
3338 clear_bit(CONSIDER_RESYNC, &mdev->flags);
b411b363
PR
3339 ns.peer = peer_state.role;
3340 ns.pdsk = real_peer_disk;
3341 ns.peer_isp = (peer_state.aftr_isp | peer_state.user_isp);
4ac4aada 3342 if ((ns.conn == C_CONNECTED || ns.conn == C_WF_BITMAP_S) && ns.disk == D_NEGOTIATING)
b411b363 3343 ns.disk = mdev->new_state_tmp.disk;
4ac4aada
LE
3344 cs_flags = CS_VERBOSE + (os.conn < C_CONNECTED && ns.conn >= C_CONNECTED ? 0 : CS_HARD);
3345 if (ns.pdsk == D_CONSISTENT && is_susp(ns) && ns.conn == C_CONNECTED && os.conn < C_CONNECTED &&
481c6f50 3346 test_bit(NEW_CUR_UUID, &mdev->flags)) {
8554df1c 3347 /* Do not allow tl_restart(RESEND) for a rebooted peer. We can only allow this
481c6f50 3348 for temporal network outages! */
87eeee41 3349 spin_unlock_irq(&mdev->tconn->req_lock);
481c6f50
PR
3350 dev_err(DEV, "Aborting Connect, can not thaw IO with an only Consistent peer\n");
3351 tl_clear(mdev);
3352 drbd_uuid_new_current(mdev);
3353 clear_bit(NEW_CUR_UUID, &mdev->flags);
3354 drbd_force_state(mdev, NS2(conn, C_PROTOCOL_ERROR, susp, 0));
81e84650 3355 return false;
481c6f50 3356 }
65d922c3 3357 rv = _drbd_set_state(mdev, ns, cs_flags, NULL);
b411b363 3358 ns = mdev->state;
87eeee41 3359 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
3360
3361 if (rv < SS_SUCCESS) {
3362 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
81e84650 3363 return false;
b411b363
PR
3364 }
3365
4ac4aada
LE
3366 if (os.conn > C_WF_REPORT_PARAMS) {
3367 if (ns.conn > C_CONNECTED && peer_state.conn <= C_CONNECTED &&
b411b363
PR
3368 peer_state.disk != D_NEGOTIATING ) {
3369 /* we want resync, peer has not yet decided to sync... */
3370 /* Nowadays only used when forcing a node into primary role and
3371 setting its disk to UpToDate with that */
3372 drbd_send_uuids(mdev);
3373 drbd_send_state(mdev);
3374 }
3375 }
3376
89e58e75 3377 mdev->tconn->net_conf->want_lose = 0;
b411b363
PR
3378
3379 drbd_md_sync(mdev); /* update connected indicator, la_size, ... */
3380
81e84650 3381 return true;
b411b363
PR
3382}
3383
d8763023
AG
3384static int receive_sync_uuid(struct drbd_conf *mdev, enum drbd_packet cmd,
3385 unsigned int data_size)
b411b363 3386{
e42325a5 3387 struct p_rs_uuid *p = &mdev->tconn->data.rbuf.rs_uuid;
b411b363
PR
3388
3389 wait_event(mdev->misc_wait,
3390 mdev->state.conn == C_WF_SYNC_UUID ||
c4752ef1 3391 mdev->state.conn == C_BEHIND ||
b411b363
PR
3392 mdev->state.conn < C_CONNECTED ||
3393 mdev->state.disk < D_NEGOTIATING);
3394
3395 /* D_ASSERT( mdev->state.conn == C_WF_SYNC_UUID ); */
3396
b411b363
PR
3397 /* Here the _drbd_uuid_ functions are right, current should
3398 _not_ be rotated into the history */
3399 if (get_ldev_if_state(mdev, D_NEGOTIATING)) {
3400 _drbd_uuid_set(mdev, UI_CURRENT, be64_to_cpu(p->uuid));
3401 _drbd_uuid_set(mdev, UI_BITMAP, 0UL);
3402
62b0da3a 3403 drbd_print_uuids(mdev, "updated sync uuid");
b411b363
PR
3404 drbd_start_resync(mdev, C_SYNC_TARGET);
3405
3406 put_ldev(mdev);
3407 } else
3408 dev_err(DEV, "Ignoring SyncUUID packet!\n");
3409
81e84650 3410 return true;
b411b363
PR
3411}
3412
2c46407d
AG
3413/**
3414 * receive_bitmap_plain
3415 *
3416 * Return 0 when done, 1 when another iteration is needed, and a negative error
3417 * code upon failure.
3418 */
3419static int
02918be2
PR
3420receive_bitmap_plain(struct drbd_conf *mdev, unsigned int data_size,
3421 unsigned long *buffer, struct bm_xfer_ctx *c)
b411b363
PR
3422{
3423 unsigned num_words = min_t(size_t, BM_PACKET_WORDS, c->bm_words - c->word_offset);
3424 unsigned want = num_words * sizeof(long);
2c46407d 3425 int err;
b411b363 3426
02918be2
PR
3427 if (want != data_size) {
3428 dev_err(DEV, "%s:want (%u) != data_size (%u)\n", __func__, want, data_size);
2c46407d 3429 return -EIO;
b411b363
PR
3430 }
3431 if (want == 0)
2c46407d
AG
3432 return 0;
3433 err = drbd_recv(mdev, buffer, want);
3434 if (err != want) {
3435 if (err >= 0)
3436 err = -EIO;
3437 return err;
3438 }
b411b363
PR
3439
3440 drbd_bm_merge_lel(mdev, c->word_offset, num_words, buffer);
3441
3442 c->word_offset += num_words;
3443 c->bit_offset = c->word_offset * BITS_PER_LONG;
3444 if (c->bit_offset > c->bm_bits)
3445 c->bit_offset = c->bm_bits;
3446
2c46407d 3447 return 1;
b411b363
PR
3448}
3449
2c46407d
AG
3450/**
3451 * recv_bm_rle_bits
3452 *
3453 * Return 0 when done, 1 when another iteration is needed, and a negative error
3454 * code upon failure.
3455 */
3456static int
b411b363
PR
3457recv_bm_rle_bits(struct drbd_conf *mdev,
3458 struct p_compressed_bm *p,
c6d25cfe
PR
3459 struct bm_xfer_ctx *c,
3460 unsigned int len)
b411b363
PR
3461{
3462 struct bitstream bs;
3463 u64 look_ahead;
3464 u64 rl;
3465 u64 tmp;
3466 unsigned long s = c->bit_offset;
3467 unsigned long e;
b411b363
PR
3468 int toggle = DCBP_get_start(p);
3469 int have;
3470 int bits;
3471
3472 bitstream_init(&bs, p->code, len, DCBP_get_pad_bits(p));
3473
3474 bits = bitstream_get_bits(&bs, &look_ahead, 64);
3475 if (bits < 0)
2c46407d 3476 return -EIO;
b411b363
PR
3477
3478 for (have = bits; have > 0; s += rl, toggle = !toggle) {
3479 bits = vli_decode_bits(&rl, look_ahead);
3480 if (bits <= 0)
2c46407d 3481 return -EIO;
b411b363
PR
3482
3483 if (toggle) {
3484 e = s + rl -1;
3485 if (e >= c->bm_bits) {
3486 dev_err(DEV, "bitmap overflow (e:%lu) while decoding bm RLE packet\n", e);
2c46407d 3487 return -EIO;
b411b363
PR
3488 }
3489 _drbd_bm_set_bits(mdev, s, e);
3490 }
3491
3492 if (have < bits) {
3493 dev_err(DEV, "bitmap decoding error: h:%d b:%d la:0x%08llx l:%u/%u\n",
3494 have, bits, look_ahead,
3495 (unsigned int)(bs.cur.b - p->code),
3496 (unsigned int)bs.buf_len);
2c46407d 3497 return -EIO;
b411b363
PR
3498 }
3499 look_ahead >>= bits;
3500 have -= bits;
3501
3502 bits = bitstream_get_bits(&bs, &tmp, 64 - have);
3503 if (bits < 0)
2c46407d 3504 return -EIO;
b411b363
PR
3505 look_ahead |= tmp << have;
3506 have += bits;
3507 }
3508
3509 c->bit_offset = s;
3510 bm_xfer_ctx_bit_to_word_offset(c);
3511
2c46407d 3512 return (s != c->bm_bits);
b411b363
PR
3513}
3514
2c46407d
AG
3515/**
3516 * decode_bitmap_c
3517 *
3518 * Return 0 when done, 1 when another iteration is needed, and a negative error
3519 * code upon failure.
3520 */
3521static int
b411b363
PR
3522decode_bitmap_c(struct drbd_conf *mdev,
3523 struct p_compressed_bm *p,
c6d25cfe
PR
3524 struct bm_xfer_ctx *c,
3525 unsigned int len)
b411b363
PR
3526{
3527 if (DCBP_get_code(p) == RLE_VLI_Bits)
c6d25cfe 3528 return recv_bm_rle_bits(mdev, p, c, len);
b411b363
PR
3529
3530 /* other variants had been implemented for evaluation,
3531 * but have been dropped as this one turned out to be "best"
3532 * during all our tests. */
3533
3534 dev_err(DEV, "receive_bitmap_c: unknown encoding %u\n", p->encoding);
3535 drbd_force_state(mdev, NS(conn, C_PROTOCOL_ERROR));
2c46407d 3536 return -EIO;
b411b363
PR
3537}
3538
3539void INFO_bm_xfer_stats(struct drbd_conf *mdev,
3540 const char *direction, struct bm_xfer_ctx *c)
3541{
3542 /* what would it take to transfer it "plaintext" */
c012949a 3543 unsigned plain = sizeof(struct p_header) *
b411b363
PR
3544 ((c->bm_words+BM_PACKET_WORDS-1)/BM_PACKET_WORDS+1)
3545 + c->bm_words * sizeof(long);
3546 unsigned total = c->bytes[0] + c->bytes[1];
3547 unsigned r;
3548
3549 /* total can not be zero. but just in case: */
3550 if (total == 0)
3551 return;
3552
3553 /* don't report if not compressed */
3554 if (total >= plain)
3555 return;
3556
3557 /* total < plain. check for overflow, still */
3558 r = (total > UINT_MAX/1000) ? (total / (plain/1000))
3559 : (1000 * total / plain);
3560
3561 if (r > 1000)
3562 r = 1000;
3563
3564 r = 1000 - r;
3565 dev_info(DEV, "%s bitmap stats [Bytes(packets)]: plain %u(%u), RLE %u(%u), "
3566 "total %u; compression: %u.%u%%\n",
3567 direction,
3568 c->bytes[1], c->packets[1],
3569 c->bytes[0], c->packets[0],
3570 total, r/10, r % 10);
3571}
3572
3573/* Since we are processing the bitfield from lower addresses to higher,
3574 it does not matter if the process it in 32 bit chunks or 64 bit
3575 chunks as long as it is little endian. (Understand it as byte stream,
3576 beginning with the lowest byte...) If we would use big endian
3577 we would need to process it from the highest address to the lowest,
3578 in order to be agnostic to the 32 vs 64 bits issue.
3579
3580 returns 0 on failure, 1 if we successfully received it. */
d8763023
AG
3581static int receive_bitmap(struct drbd_conf *mdev, enum drbd_packet cmd,
3582 unsigned int data_size)
b411b363
PR
3583{
3584 struct bm_xfer_ctx c;
3585 void *buffer;
2c46407d 3586 int err;
81e84650 3587 int ok = false;
257d0af6 3588 struct p_header *h = &mdev->tconn->data.rbuf.header;
b411b363 3589
20ceb2b2
LE
3590 drbd_bm_lock(mdev, "receive bitmap", BM_LOCKED_SET_ALLOWED);
3591 /* you are supposed to send additional out-of-sync information
3592 * if you actually set bits during this phase */
b411b363
PR
3593
3594 /* maybe we should use some per thread scratch page,
3595 * and allocate that during initial device creation? */
3596 buffer = (unsigned long *) __get_free_page(GFP_NOIO);
3597 if (!buffer) {
3598 dev_err(DEV, "failed to allocate one page buffer in %s\n", __func__);
3599 goto out;
3600 }
3601
3602 c = (struct bm_xfer_ctx) {
3603 .bm_bits = drbd_bm_bits(mdev),
3604 .bm_words = drbd_bm_words(mdev),
3605 };
3606
2c46407d 3607 for(;;) {
02918be2 3608 if (cmd == P_BITMAP) {
2c46407d 3609 err = receive_bitmap_plain(mdev, data_size, buffer, &c);
02918be2 3610 } else if (cmd == P_COMPRESSED_BITMAP) {
b411b363
PR
3611 /* MAYBE: sanity check that we speak proto >= 90,
3612 * and the feature is enabled! */
3613 struct p_compressed_bm *p;
3614
02918be2 3615 if (data_size > BM_PACKET_PAYLOAD_BYTES) {
b411b363
PR
3616 dev_err(DEV, "ReportCBitmap packet too large\n");
3617 goto out;
3618 }
3619 /* use the page buff */
3620 p = buffer;
3621 memcpy(p, h, sizeof(*h));
02918be2 3622 if (drbd_recv(mdev, p->head.payload, data_size) != data_size)
b411b363 3623 goto out;
004352fa
LE
3624 if (data_size <= (sizeof(*p) - sizeof(p->head))) {
3625 dev_err(DEV, "ReportCBitmap packet too small (l:%u)\n", data_size);
78fcbdae 3626 goto out;
b411b363 3627 }
c6d25cfe 3628 err = decode_bitmap_c(mdev, p, &c, data_size);
b411b363 3629 } else {
02918be2 3630 dev_warn(DEV, "receive_bitmap: cmd neither ReportBitMap nor ReportCBitMap (is 0x%x)", cmd);
b411b363
PR
3631 goto out;
3632 }
3633
02918be2 3634 c.packets[cmd == P_BITMAP]++;
257d0af6 3635 c.bytes[cmd == P_BITMAP] += sizeof(struct p_header) + data_size;
b411b363 3636
2c46407d
AG
3637 if (err <= 0) {
3638 if (err < 0)
3639 goto out;
b411b363 3640 break;
2c46407d 3641 }
02918be2 3642 if (!drbd_recv_header(mdev, &cmd, &data_size))
b411b363 3643 goto out;
2c46407d 3644 }
b411b363
PR
3645
3646 INFO_bm_xfer_stats(mdev, "receive", &c);
3647
3648 if (mdev->state.conn == C_WF_BITMAP_T) {
de1f8e4a
AG
3649 enum drbd_state_rv rv;
3650
b411b363
PR
3651 ok = !drbd_send_bitmap(mdev);
3652 if (!ok)
3653 goto out;
3654 /* Omit CS_ORDERED with this state transition to avoid deadlocks. */
de1f8e4a
AG
3655 rv = _drbd_request_state(mdev, NS(conn, C_WF_SYNC_UUID), CS_VERBOSE);
3656 D_ASSERT(rv == SS_SUCCESS);
b411b363
PR
3657 } else if (mdev->state.conn != C_WF_BITMAP_S) {
3658 /* admin may have requested C_DISCONNECTING,
3659 * other threads may have noticed network errors */
3660 dev_info(DEV, "unexpected cstate (%s) in receive_bitmap\n",
3661 drbd_conn_str(mdev->state.conn));
3662 }
3663
81e84650 3664 ok = true;
b411b363 3665 out:
20ceb2b2 3666 drbd_bm_unlock(mdev);
b411b363
PR
3667 if (ok && mdev->state.conn == C_WF_BITMAP_S)
3668 drbd_start_resync(mdev, C_SYNC_SOURCE);
3669 free_page((unsigned long) buffer);
3670 return ok;
3671}
3672
d8763023
AG
3673static int receive_skip(struct drbd_conf *mdev, enum drbd_packet cmd,
3674 unsigned int data_size)
b411b363
PR
3675{
3676 /* TODO zero copy sink :) */
3677 static char sink[128];
3678 int size, want, r;
3679
02918be2
PR
3680 dev_warn(DEV, "skipping unknown optional packet type %d, l: %d!\n",
3681 cmd, data_size);
b411b363 3682
02918be2 3683 size = data_size;
b411b363
PR
3684 while (size > 0) {
3685 want = min_t(int, size, sizeof(sink));
3686 r = drbd_recv(mdev, sink, want);
841ce241
AG
3687 if (!expect(r > 0))
3688 break;
b411b363
PR
3689 size -= r;
3690 }
3691 return size == 0;
3692}
3693
d8763023
AG
3694static int receive_UnplugRemote(struct drbd_conf *mdev, enum drbd_packet cmd,
3695 unsigned int data_size)
0ced55a3 3696{
e7f52dfb
LE
3697 /* Make sure we've acked all the TCP data associated
3698 * with the data requests being unplugged */
e42325a5 3699 drbd_tcp_quickack(mdev->tconn->data.socket);
0ced55a3 3700
81e84650 3701 return true;
0ced55a3
PR
3702}
3703
d8763023
AG
3704static int receive_out_of_sync(struct drbd_conf *mdev, enum drbd_packet cmd,
3705 unsigned int data_size)
73a01a18 3706{
e42325a5 3707 struct p_block_desc *p = &mdev->tconn->data.rbuf.block_desc;
73a01a18 3708
f735e363
LE
3709 switch (mdev->state.conn) {
3710 case C_WF_SYNC_UUID:
3711 case C_WF_BITMAP_T:
3712 case C_BEHIND:
3713 break;
3714 default:
3715 dev_err(DEV, "ASSERT FAILED cstate = %s, expected: WFSyncUUID|WFBitMapT|Behind\n",
3716 drbd_conn_str(mdev->state.conn));
3717 }
3718
73a01a18
PR
3719 drbd_set_out_of_sync(mdev, be64_to_cpu(p->sector), be32_to_cpu(p->blksize));
3720
81e84650 3721 return true;
73a01a18
PR
3722}
3723
d8763023
AG
3724typedef int (*drbd_cmd_handler_f)(struct drbd_conf *, enum drbd_packet cmd,
3725 unsigned int to_receive);
02918be2
PR
3726
3727struct data_cmd {
3728 int expect_payload;
3729 size_t pkt_size;
3730 drbd_cmd_handler_f function;
3731};
3732
3733static struct data_cmd drbd_cmd_handler[] = {
3734 [P_DATA] = { 1, sizeof(struct p_data), receive_Data },
3735 [P_DATA_REPLY] = { 1, sizeof(struct p_data), receive_DataReply },
3736 [P_RS_DATA_REPLY] = { 1, sizeof(struct p_data), receive_RSDataReply } ,
3737 [P_BARRIER] = { 0, sizeof(struct p_barrier), receive_Barrier } ,
257d0af6
PR
3738 [P_BITMAP] = { 1, sizeof(struct p_header), receive_bitmap } ,
3739 [P_COMPRESSED_BITMAP] = { 1, sizeof(struct p_header), receive_bitmap } ,
3740 [P_UNPLUG_REMOTE] = { 0, sizeof(struct p_header), receive_UnplugRemote },
02918be2
PR
3741 [P_DATA_REQUEST] = { 0, sizeof(struct p_block_req), receive_DataRequest },
3742 [P_RS_DATA_REQUEST] = { 0, sizeof(struct p_block_req), receive_DataRequest },
257d0af6
PR
3743 [P_SYNC_PARAM] = { 1, sizeof(struct p_header), receive_SyncParam },
3744 [P_SYNC_PARAM89] = { 1, sizeof(struct p_header), receive_SyncParam },
02918be2
PR
3745 [P_PROTOCOL] = { 1, sizeof(struct p_protocol), receive_protocol },
3746 [P_UUIDS] = { 0, sizeof(struct p_uuids), receive_uuids },
3747 [P_SIZES] = { 0, sizeof(struct p_sizes), receive_sizes },
3748 [P_STATE] = { 0, sizeof(struct p_state), receive_state },
3749 [P_STATE_CHG_REQ] = { 0, sizeof(struct p_req_state), receive_req_state },
3750 [P_SYNC_UUID] = { 0, sizeof(struct p_rs_uuid), receive_sync_uuid },
3751 [P_OV_REQUEST] = { 0, sizeof(struct p_block_req), receive_DataRequest },
3752 [P_OV_REPLY] = { 1, sizeof(struct p_block_req), receive_DataRequest },
3753 [P_CSUM_RS_REQUEST] = { 1, sizeof(struct p_block_req), receive_DataRequest },
3754 [P_DELAY_PROBE] = { 0, sizeof(struct p_delay_probe93), receive_skip },
73a01a18 3755 [P_OUT_OF_SYNC] = { 0, sizeof(struct p_block_desc), receive_out_of_sync },
b411b363
PR
3756 /* anything missing from this table is in
3757 * the asender_tbl, see get_asender_cmd */
02918be2 3758 [P_MAX_CMD] = { 0, 0, NULL },
b411b363
PR
3759};
3760
02918be2 3761/* All handler functions that expect a sub-header get that sub-heder in
e42325a5 3762 mdev->tconn->data.rbuf.header.head.payload.
02918be2 3763
e42325a5 3764 Usually in mdev->tconn->data.rbuf.header.head the callback can find the usual
02918be2
PR
3765 p_header, but they may not rely on that. Since there is also p_header95 !
3766 */
b411b363
PR
3767
3768static void drbdd(struct drbd_conf *mdev)
3769{
c012949a 3770 struct p_header *header = &mdev->tconn->data.rbuf.header;
02918be2 3771 unsigned int packet_size;
d8763023 3772 enum drbd_packet cmd;
02918be2
PR
3773 size_t shs; /* sub header size */
3774 int rv;
b411b363 3775
e6b3ea83 3776 while (get_t_state(&mdev->tconn->receiver) == RUNNING) {
b411b363 3777 drbd_thread_current_set_cpu(mdev);
02918be2
PR
3778 if (!drbd_recv_header(mdev, &cmd, &packet_size))
3779 goto err_out;
b411b363 3780
02918be2
PR
3781 if (unlikely(cmd >= P_MAX_CMD || !drbd_cmd_handler[cmd].function)) {
3782 dev_err(DEV, "unknown packet type %d, l: %d!\n", cmd, packet_size);
3783 goto err_out;
0b33a916 3784 }
b411b363 3785
c012949a 3786 shs = drbd_cmd_handler[cmd].pkt_size - sizeof(struct p_header);
02918be2
PR
3787 if (packet_size - shs > 0 && !drbd_cmd_handler[cmd].expect_payload) {
3788 dev_err(DEV, "No payload expected %s l:%d\n", cmdname(cmd), packet_size);
3789 goto err_out;
b411b363 3790 }
b411b363 3791
c13f7e1a 3792 if (shs) {
c012949a 3793 rv = drbd_recv(mdev, &header->payload, shs);
c13f7e1a 3794 if (unlikely(rv != shs)) {
0ddc5549
LE
3795 if (!signal_pending(current))
3796 dev_warn(DEV, "short read while reading sub header: rv=%d\n", rv);
c13f7e1a
LE
3797 goto err_out;
3798 }
3799 }
3800
02918be2 3801 rv = drbd_cmd_handler[cmd].function(mdev, cmd, packet_size - shs);
b411b363 3802
02918be2 3803 if (unlikely(!rv)) {
b411b363 3804 dev_err(DEV, "error receiving %s, l: %d!\n",
02918be2
PR
3805 cmdname(cmd), packet_size);
3806 goto err_out;
b411b363
PR
3807 }
3808 }
b411b363 3809
02918be2
PR
3810 if (0) {
3811 err_out:
3812 drbd_force_state(mdev, NS(conn, C_PROTOCOL_ERROR));
3813 }
856c50c7
LE
3814 /* If we leave here, we probably want to update at least the
3815 * "Connected" indicator on stable storage. Do so explicitly here. */
3816 drbd_md_sync(mdev);
b411b363
PR
3817}
3818
191d3cc8 3819void drbd_flush_workqueue(struct drbd_tconn *tconn)
b411b363
PR
3820{
3821 struct drbd_wq_barrier barr;
3822
3823 barr.w.cb = w_prev_work_done;
3824 init_completion(&barr.done);
191d3cc8 3825 drbd_queue_work(&tconn->data.work, &barr.w);
b411b363
PR
3826 wait_for_completion(&barr.done);
3827}
3828
3829static void drbd_disconnect(struct drbd_conf *mdev)
3830{
3831 enum drbd_fencing_p fp;
3832 union drbd_state os, ns;
3833 int rv = SS_UNKNOWN_ERROR;
3834 unsigned int i;
3835
3836 if (mdev->state.conn == C_STANDALONE)
3837 return;
b411b363
PR
3838
3839 /* asender does not clean up anything. it must not interfere, either */
e6b3ea83 3840 drbd_thread_stop(&mdev->tconn->asender);
b411b363 3841 drbd_free_sock(mdev);
b411b363 3842
85719573 3843 /* wait for current activity to cease. */
87eeee41 3844 spin_lock_irq(&mdev->tconn->req_lock);
b411b363
PR
3845 _drbd_wait_ee_list_empty(mdev, &mdev->active_ee);
3846 _drbd_wait_ee_list_empty(mdev, &mdev->sync_ee);
3847 _drbd_wait_ee_list_empty(mdev, &mdev->read_ee);
87eeee41 3848 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
3849
3850 /* We do not have data structures that would allow us to
3851 * get the rs_pending_cnt down to 0 again.
3852 * * On C_SYNC_TARGET we do not have any data structures describing
3853 * the pending RSDataRequest's we have sent.
3854 * * On C_SYNC_SOURCE there is no data structure that tracks
3855 * the P_RS_DATA_REPLY blocks that we sent to the SyncTarget.
3856 * And no, it is not the sum of the reference counts in the
3857 * resync_LRU. The resync_LRU tracks the whole operation including
3858 * the disk-IO, while the rs_pending_cnt only tracks the blocks
3859 * on the fly. */
3860 drbd_rs_cancel_all(mdev);
3861 mdev->rs_total = 0;
3862 mdev->rs_failed = 0;
3863 atomic_set(&mdev->rs_pending_cnt, 0);
3864 wake_up(&mdev->misc_wait);
3865
7fde2be9
PR
3866 del_timer(&mdev->request_timer);
3867
b411b363
PR
3868 /* make sure syncer is stopped and w_resume_next_sg queued */
3869 del_timer_sync(&mdev->resync_timer);
b411b363
PR
3870 resync_timer_fn((unsigned long)mdev);
3871
b411b363
PR
3872 /* wait for all w_e_end_data_req, w_e_end_rsdata_req, w_send_barrier,
3873 * w_make_resync_request etc. which may still be on the worker queue
3874 * to be "canceled" */
191d3cc8 3875 drbd_flush_workqueue(mdev->tconn);
b411b363
PR
3876
3877 /* This also does reclaim_net_ee(). If we do this too early, we might
3878 * miss some resync ee and pages.*/
3879 drbd_process_done_ee(mdev);
3880
3881 kfree(mdev->p_uuid);
3882 mdev->p_uuid = NULL;
3883
fb22c402 3884 if (!is_susp(mdev->state))
b411b363
PR
3885 tl_clear(mdev);
3886
b411b363
PR
3887 dev_info(DEV, "Connection closed\n");
3888
3889 drbd_md_sync(mdev);
3890
3891 fp = FP_DONT_CARE;
3892 if (get_ldev(mdev)) {
3893 fp = mdev->ldev->dc.fencing;
3894 put_ldev(mdev);
3895 }
3896
87f7be4c
PR
3897 if (mdev->state.role == R_PRIMARY && fp >= FP_RESOURCE && mdev->state.pdsk >= D_UNKNOWN)
3898 drbd_try_outdate_peer_async(mdev);
b411b363 3899
87eeee41 3900 spin_lock_irq(&mdev->tconn->req_lock);
b411b363
PR
3901 os = mdev->state;
3902 if (os.conn >= C_UNCONNECTED) {
3903 /* Do not restart in case we are C_DISCONNECTING */
3904 ns = os;
3905 ns.conn = C_UNCONNECTED;
3906 rv = _drbd_set_state(mdev, ns, CS_VERBOSE, NULL);
3907 }
87eeee41 3908 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
3909
3910 if (os.conn == C_DISCONNECTING) {
b2fb6dbe 3911 wait_event(mdev->tconn->net_cnt_wait, atomic_read(&mdev->tconn->net_cnt) == 0);
b411b363 3912
a0638456
PR
3913 crypto_free_hash(mdev->tconn->cram_hmac_tfm);
3914 mdev->tconn->cram_hmac_tfm = NULL;
b411b363 3915
89e58e75
PR
3916 kfree(mdev->tconn->net_conf);
3917 mdev->tconn->net_conf = NULL;
b411b363
PR
3918 drbd_request_state(mdev, NS(conn, C_STANDALONE));
3919 }
3920
20ceb2b2
LE
3921 /* serialize with bitmap writeout triggered by the state change,
3922 * if any. */
3923 wait_event(mdev->misc_wait, !test_bit(BITMAP_IO, &mdev->flags));
3924
b411b363
PR
3925 /* tcp_close and release of sendpage pages can be deferred. I don't
3926 * want to use SO_LINGER, because apparently it can be deferred for
3927 * more than 20 seconds (longest time I checked).
3928 *
3929 * Actually we don't care for exactly when the network stack does its
3930 * put_page(), but release our reference on these pages right here.
3931 */
3932 i = drbd_release_ee(mdev, &mdev->net_ee);
3933 if (i)
3934 dev_info(DEV, "net_ee not empty, killed %u entries\n", i);
435f0740
LE
3935 i = atomic_read(&mdev->pp_in_use_by_net);
3936 if (i)
3937 dev_info(DEV, "pp_in_use_by_net = %d, expected 0\n", i);
b411b363
PR
3938 i = atomic_read(&mdev->pp_in_use);
3939 if (i)
45bb912b 3940 dev_info(DEV, "pp_in_use = %d, expected 0\n", i);
b411b363
PR
3941
3942 D_ASSERT(list_empty(&mdev->read_ee));
3943 D_ASSERT(list_empty(&mdev->active_ee));
3944 D_ASSERT(list_empty(&mdev->sync_ee));
3945 D_ASSERT(list_empty(&mdev->done_ee));
3946
3947 /* ok, no more ee's on the fly, it is safe to reset the epoch_size */
3948 atomic_set(&mdev->current_epoch->epoch_size, 0);
3949 D_ASSERT(list_empty(&mdev->current_epoch->list));
3950}
3951
3952/*
3953 * We support PRO_VERSION_MIN to PRO_VERSION_MAX. The protocol version
3954 * we can agree on is stored in agreed_pro_version.
3955 *
3956 * feature flags and the reserved array should be enough room for future
3957 * enhancements of the handshake protocol, and possible plugins...
3958 *
3959 * for now, they are expected to be zero, but ignored.
3960 */
3961static int drbd_send_handshake(struct drbd_conf *mdev)
3962{
e6b3ea83 3963 /* ASSERT current == mdev->tconn->receiver ... */
e42325a5 3964 struct p_handshake *p = &mdev->tconn->data.sbuf.handshake;
b411b363
PR
3965 int ok;
3966
e42325a5 3967 if (mutex_lock_interruptible(&mdev->tconn->data.mutex)) {
b411b363
PR
3968 dev_err(DEV, "interrupted during initial handshake\n");
3969 return 0; /* interrupted. not ok. */
3970 }
3971
e42325a5
PR
3972 if (mdev->tconn->data.socket == NULL) {
3973 mutex_unlock(&mdev->tconn->data.mutex);
b411b363
PR
3974 return 0;
3975 }
3976
3977 memset(p, 0, sizeof(*p));
3978 p->protocol_min = cpu_to_be32(PRO_VERSION_MIN);
3979 p->protocol_max = cpu_to_be32(PRO_VERSION_MAX);
c012949a
PR
3980 ok = _drbd_send_cmd(mdev, mdev->tconn->data.socket, P_HAND_SHAKE,
3981 &p->head, sizeof(*p), 0 );
e42325a5 3982 mutex_unlock(&mdev->tconn->data.mutex);
b411b363
PR
3983 return ok;
3984}
3985
3986/*
3987 * return values:
3988 * 1 yes, we have a valid connection
3989 * 0 oops, did not work out, please try again
3990 * -1 peer talks different language,
3991 * no point in trying again, please go standalone.
3992 */
3993static int drbd_do_handshake(struct drbd_conf *mdev)
3994{
e6b3ea83 3995 /* ASSERT current == mdev->tconn->receiver ... */
e42325a5 3996 struct p_handshake *p = &mdev->tconn->data.rbuf.handshake;
02918be2
PR
3997 const int expect = sizeof(struct p_handshake) - sizeof(struct p_header80);
3998 unsigned int length;
d8763023 3999 enum drbd_packet cmd;
b411b363
PR
4000 int rv;
4001
4002 rv = drbd_send_handshake(mdev);
4003 if (!rv)
4004 return 0;
4005
02918be2 4006 rv = drbd_recv_header(mdev, &cmd, &length);
b411b363
PR
4007 if (!rv)
4008 return 0;
4009
02918be2 4010 if (cmd != P_HAND_SHAKE) {
b411b363 4011 dev_err(DEV, "expected HandShake packet, received: %s (0x%04x)\n",
02918be2 4012 cmdname(cmd), cmd);
b411b363
PR
4013 return -1;
4014 }
4015
02918be2 4016 if (length != expect) {
b411b363 4017 dev_err(DEV, "expected HandShake length: %u, received: %u\n",
02918be2 4018 expect, length);
b411b363
PR
4019 return -1;
4020 }
4021
4022 rv = drbd_recv(mdev, &p->head.payload, expect);
4023
4024 if (rv != expect) {
0ddc5549
LE
4025 if (!signal_pending(current))
4026 dev_warn(DEV, "short read receiving handshake packet: l=%u\n", rv);
b411b363
PR
4027 return 0;
4028 }
4029
b411b363
PR
4030 p->protocol_min = be32_to_cpu(p->protocol_min);
4031 p->protocol_max = be32_to_cpu(p->protocol_max);
4032 if (p->protocol_max == 0)
4033 p->protocol_max = p->protocol_min;
4034
4035 if (PRO_VERSION_MAX < p->protocol_min ||
4036 PRO_VERSION_MIN > p->protocol_max)
4037 goto incompat;
4038
31890f4a 4039 mdev->tconn->agreed_pro_version = min_t(int, PRO_VERSION_MAX, p->protocol_max);
b411b363
PR
4040
4041 dev_info(DEV, "Handshake successful: "
31890f4a 4042 "Agreed network protocol version %d\n", mdev->tconn->agreed_pro_version);
b411b363
PR
4043
4044 return 1;
4045
4046 incompat:
4047 dev_err(DEV, "incompatible DRBD dialects: "
4048 "I support %d-%d, peer supports %d-%d\n",
4049 PRO_VERSION_MIN, PRO_VERSION_MAX,
4050 p->protocol_min, p->protocol_max);
4051 return -1;
4052}
4053
4054#if !defined(CONFIG_CRYPTO_HMAC) && !defined(CONFIG_CRYPTO_HMAC_MODULE)
4055static int drbd_do_auth(struct drbd_conf *mdev)
4056{
4057 dev_err(DEV, "This kernel was build without CONFIG_CRYPTO_HMAC.\n");
4058 dev_err(DEV, "You need to disable 'cram-hmac-alg' in drbd.conf.\n");
b10d96cb 4059 return -1;
b411b363
PR
4060}
4061#else
4062#define CHALLENGE_LEN 64
b10d96cb
JT
4063
4064/* Return value:
4065 1 - auth succeeded,
4066 0 - failed, try again (network error),
4067 -1 - auth failed, don't try again.
4068*/
4069
b411b363
PR
4070static int drbd_do_auth(struct drbd_conf *mdev)
4071{
4072 char my_challenge[CHALLENGE_LEN]; /* 64 Bytes... */
4073 struct scatterlist sg;
4074 char *response = NULL;
4075 char *right_response = NULL;
4076 char *peers_ch = NULL;
89e58e75 4077 unsigned int key_len = strlen(mdev->tconn->net_conf->shared_secret);
b411b363
PR
4078 unsigned int resp_size;
4079 struct hash_desc desc;
d8763023 4080 enum drbd_packet cmd;
02918be2 4081 unsigned int length;
b411b363
PR
4082 int rv;
4083
a0638456 4084 desc.tfm = mdev->tconn->cram_hmac_tfm;
b411b363
PR
4085 desc.flags = 0;
4086
a0638456 4087 rv = crypto_hash_setkey(mdev->tconn->cram_hmac_tfm,
89e58e75 4088 (u8 *)mdev->tconn->net_conf->shared_secret, key_len);
b411b363
PR
4089 if (rv) {
4090 dev_err(DEV, "crypto_hash_setkey() failed with %d\n", rv);
b10d96cb 4091 rv = -1;
b411b363
PR
4092 goto fail;
4093 }
4094
4095 get_random_bytes(my_challenge, CHALLENGE_LEN);
4096
4097 rv = drbd_send_cmd2(mdev, P_AUTH_CHALLENGE, my_challenge, CHALLENGE_LEN);
4098 if (!rv)
4099 goto fail;
4100
02918be2 4101 rv = drbd_recv_header(mdev, &cmd, &length);
b411b363
PR
4102 if (!rv)
4103 goto fail;
4104
02918be2 4105 if (cmd != P_AUTH_CHALLENGE) {
b411b363 4106 dev_err(DEV, "expected AuthChallenge packet, received: %s (0x%04x)\n",
02918be2 4107 cmdname(cmd), cmd);
b411b363
PR
4108 rv = 0;
4109 goto fail;
4110 }
4111
02918be2 4112 if (length > CHALLENGE_LEN * 2) {
b411b363 4113 dev_err(DEV, "expected AuthChallenge payload too big.\n");
b10d96cb 4114 rv = -1;
b411b363
PR
4115 goto fail;
4116 }
4117
02918be2 4118 peers_ch = kmalloc(length, GFP_NOIO);
b411b363
PR
4119 if (peers_ch == NULL) {
4120 dev_err(DEV, "kmalloc of peers_ch failed\n");
b10d96cb 4121 rv = -1;
b411b363
PR
4122 goto fail;
4123 }
4124
02918be2 4125 rv = drbd_recv(mdev, peers_ch, length);
b411b363 4126
02918be2 4127 if (rv != length) {
0ddc5549
LE
4128 if (!signal_pending(current))
4129 dev_warn(DEV, "short read AuthChallenge: l=%u\n", rv);
b411b363
PR
4130 rv = 0;
4131 goto fail;
4132 }
4133
a0638456 4134 resp_size = crypto_hash_digestsize(mdev->tconn->cram_hmac_tfm);
b411b363
PR
4135 response = kmalloc(resp_size, GFP_NOIO);
4136 if (response == NULL) {
4137 dev_err(DEV, "kmalloc of response failed\n");
b10d96cb 4138 rv = -1;
b411b363
PR
4139 goto fail;
4140 }
4141
4142 sg_init_table(&sg, 1);
02918be2 4143 sg_set_buf(&sg, peers_ch, length);
b411b363
PR
4144
4145 rv = crypto_hash_digest(&desc, &sg, sg.length, response);
4146 if (rv) {
4147 dev_err(DEV, "crypto_hash_digest() failed with %d\n", rv);
b10d96cb 4148 rv = -1;
b411b363
PR
4149 goto fail;
4150 }
4151
4152 rv = drbd_send_cmd2(mdev, P_AUTH_RESPONSE, response, resp_size);
4153 if (!rv)
4154 goto fail;
4155
02918be2 4156 rv = drbd_recv_header(mdev, &cmd, &length);
b411b363
PR
4157 if (!rv)
4158 goto fail;
4159
02918be2 4160 if (cmd != P_AUTH_RESPONSE) {
b411b363 4161 dev_err(DEV, "expected AuthResponse packet, received: %s (0x%04x)\n",
02918be2 4162 cmdname(cmd), cmd);
b411b363
PR
4163 rv = 0;
4164 goto fail;
4165 }
4166
02918be2 4167 if (length != resp_size) {
b411b363
PR
4168 dev_err(DEV, "expected AuthResponse payload of wrong size\n");
4169 rv = 0;
4170 goto fail;
4171 }
4172
4173 rv = drbd_recv(mdev, response , resp_size);
4174
4175 if (rv != resp_size) {
0ddc5549
LE
4176 if (!signal_pending(current))
4177 dev_warn(DEV, "short read receiving AuthResponse: l=%u\n", rv);
b411b363
PR
4178 rv = 0;
4179 goto fail;
4180 }
4181
4182 right_response = kmalloc(resp_size, GFP_NOIO);
2d1ee87d 4183 if (right_response == NULL) {
b411b363 4184 dev_err(DEV, "kmalloc of right_response failed\n");
b10d96cb 4185 rv = -1;
b411b363
PR
4186 goto fail;
4187 }
4188
4189 sg_set_buf(&sg, my_challenge, CHALLENGE_LEN);
4190
4191 rv = crypto_hash_digest(&desc, &sg, sg.length, right_response);
4192 if (rv) {
4193 dev_err(DEV, "crypto_hash_digest() failed with %d\n", rv);
b10d96cb 4194 rv = -1;
b411b363
PR
4195 goto fail;
4196 }
4197
4198 rv = !memcmp(response, right_response, resp_size);
4199
4200 if (rv)
4201 dev_info(DEV, "Peer authenticated using %d bytes of '%s' HMAC\n",
89e58e75 4202 resp_size, mdev->tconn->net_conf->cram_hmac_alg);
b10d96cb
JT
4203 else
4204 rv = -1;
b411b363
PR
4205
4206 fail:
4207 kfree(peers_ch);
4208 kfree(response);
4209 kfree(right_response);
4210
4211 return rv;
4212}
4213#endif
4214
4215int drbdd_init(struct drbd_thread *thi)
4216{
4217 struct drbd_conf *mdev = thi->mdev;
4218 unsigned int minor = mdev_to_minor(mdev);
4219 int h;
4220
4221 sprintf(current->comm, "drbd%d_receiver", minor);
4222
4223 dev_info(DEV, "receiver (re)started\n");
4224
4225 do {
4226 h = drbd_connect(mdev);
4227 if (h == 0) {
4228 drbd_disconnect(mdev);
20ee6390 4229 schedule_timeout_interruptible(HZ);
b411b363
PR
4230 }
4231 if (h == -1) {
4232 dev_warn(DEV, "Discarding network configuration.\n");
4233 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
4234 }
4235 } while (h == 0);
4236
4237 if (h > 0) {
b2fb6dbe 4238 if (get_net_conf(mdev->tconn)) {
b411b363 4239 drbdd(mdev);
b2fb6dbe 4240 put_net_conf(mdev->tconn);
b411b363
PR
4241 }
4242 }
4243
4244 drbd_disconnect(mdev);
4245
4246 dev_info(DEV, "receiver terminated\n");
4247 return 0;
4248}
4249
4250/* ********* acknowledge sender ******** */
4251
d8763023 4252static int got_RqSReply(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363 4253{
257d0af6 4254 struct p_req_state_reply *p = &mdev->tconn->meta.rbuf.req_state_reply;
b411b363
PR
4255
4256 int retcode = be32_to_cpu(p->retcode);
4257
4258 if (retcode >= SS_SUCCESS) {
4259 set_bit(CL_ST_CHG_SUCCESS, &mdev->flags);
4260 } else {
4261 set_bit(CL_ST_CHG_FAIL, &mdev->flags);
4262 dev_err(DEV, "Requested state change failed by peer: %s (%d)\n",
4263 drbd_set_st_err_str(retcode), retcode);
4264 }
4265 wake_up(&mdev->state_wait);
4266
81e84650 4267 return true;
b411b363
PR
4268}
4269
d8763023 4270static int got_Ping(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363
PR
4271{
4272 return drbd_send_ping_ack(mdev);
4273
4274}
4275
d8763023 4276static int got_PingAck(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363
PR
4277{
4278 /* restore idle timeout */
e42325a5 4279 mdev->tconn->meta.socket->sk->sk_rcvtimeo = mdev->tconn->net_conf->ping_int*HZ;
309d1608
PR
4280 if (!test_and_set_bit(GOT_PING_ACK, &mdev->flags))
4281 wake_up(&mdev->misc_wait);
b411b363 4282
81e84650 4283 return true;
b411b363
PR
4284}
4285
d8763023 4286static int got_IsInSync(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363 4287{
257d0af6 4288 struct p_block_ack *p = &mdev->tconn->meta.rbuf.block_ack;
b411b363
PR
4289 sector_t sector = be64_to_cpu(p->sector);
4290 int blksize = be32_to_cpu(p->blksize);
4291
31890f4a 4292 D_ASSERT(mdev->tconn->agreed_pro_version >= 89);
b411b363
PR
4293
4294 update_peer_seq(mdev, be32_to_cpu(p->seq_num));
4295
1d53f09e
LE
4296 if (get_ldev(mdev)) {
4297 drbd_rs_complete_io(mdev, sector);
4298 drbd_set_in_sync(mdev, sector, blksize);
4299 /* rs_same_csums is supposed to count in units of BM_BLOCK_SIZE */
4300 mdev->rs_same_csum += (blksize >> BM_BLOCK_SHIFT);
4301 put_ldev(mdev);
4302 }
b411b363 4303 dec_rs_pending(mdev);
778f271d 4304 atomic_add(blksize >> 9, &mdev->rs_sect_in);
b411b363 4305
81e84650 4306 return true;
b411b363
PR
4307}
4308
bc9c5c41
AG
4309static int
4310validate_req_change_req_state(struct drbd_conf *mdev, u64 id, sector_t sector,
4311 struct rb_root *root, const char *func,
4312 enum drbd_req_event what, bool missing_ok)
b411b363
PR
4313{
4314 struct drbd_request *req;
4315 struct bio_and_error m;
4316
87eeee41 4317 spin_lock_irq(&mdev->tconn->req_lock);
bc9c5c41 4318 req = find_request(mdev, root, id, sector, missing_ok, func);
b411b363 4319 if (unlikely(!req)) {
87eeee41 4320 spin_unlock_irq(&mdev->tconn->req_lock);
81e84650 4321 return false;
b411b363
PR
4322 }
4323 __req_mod(req, what, &m);
87eeee41 4324 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
4325
4326 if (m.bio)
4327 complete_master_bio(mdev, &m);
81e84650 4328 return true;
b411b363
PR
4329}
4330
d8763023 4331static int got_BlockAck(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363 4332{
257d0af6 4333 struct p_block_ack *p = &mdev->tconn->meta.rbuf.block_ack;
b411b363
PR
4334 sector_t sector = be64_to_cpu(p->sector);
4335 int blksize = be32_to_cpu(p->blksize);
4336 enum drbd_req_event what;
4337
4338 update_peer_seq(mdev, be32_to_cpu(p->seq_num));
4339
579b57ed 4340 if (p->block_id == ID_SYNCER) {
b411b363
PR
4341 drbd_set_in_sync(mdev, sector, blksize);
4342 dec_rs_pending(mdev);
81e84650 4343 return true;
b411b363 4344 }
257d0af6 4345 switch (cmd) {
b411b363 4346 case P_RS_WRITE_ACK:
89e58e75 4347 D_ASSERT(mdev->tconn->net_conf->wire_protocol == DRBD_PROT_C);
8554df1c 4348 what = WRITE_ACKED_BY_PEER_AND_SIS;
b411b363
PR
4349 break;
4350 case P_WRITE_ACK:
89e58e75 4351 D_ASSERT(mdev->tconn->net_conf->wire_protocol == DRBD_PROT_C);
8554df1c 4352 what = WRITE_ACKED_BY_PEER;
b411b363
PR
4353 break;
4354 case P_RECV_ACK:
89e58e75 4355 D_ASSERT(mdev->tconn->net_conf->wire_protocol == DRBD_PROT_B);
8554df1c 4356 what = RECV_ACKED_BY_PEER;
b411b363
PR
4357 break;
4358 case P_DISCARD_ACK:
89e58e75 4359 D_ASSERT(mdev->tconn->net_conf->wire_protocol == DRBD_PROT_C);
8554df1c 4360 what = CONFLICT_DISCARDED_BY_PEER;
b411b363
PR
4361 break;
4362 default:
4363 D_ASSERT(0);
81e84650 4364 return false;
b411b363
PR
4365 }
4366
4367 return validate_req_change_req_state(mdev, p->block_id, sector,
bc9c5c41
AG
4368 &mdev->write_requests, __func__,
4369 what, false);
b411b363
PR
4370}
4371
d8763023 4372static int got_NegAck(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363 4373{
257d0af6 4374 struct p_block_ack *p = &mdev->tconn->meta.rbuf.block_ack;
b411b363 4375 sector_t sector = be64_to_cpu(p->sector);
2deb8336 4376 int size = be32_to_cpu(p->blksize);
89e58e75
PR
4377 bool missing_ok = mdev->tconn->net_conf->wire_protocol == DRBD_PROT_A ||
4378 mdev->tconn->net_conf->wire_protocol == DRBD_PROT_B;
c3afd8f5 4379 bool found;
b411b363
PR
4380
4381 update_peer_seq(mdev, be32_to_cpu(p->seq_num));
4382
579b57ed 4383 if (p->block_id == ID_SYNCER) {
b411b363
PR
4384 dec_rs_pending(mdev);
4385 drbd_rs_failed_io(mdev, sector, size);
81e84650 4386 return true;
b411b363 4387 }
2deb8336 4388
c3afd8f5 4389 found = validate_req_change_req_state(mdev, p->block_id, sector,
bc9c5c41 4390 &mdev->write_requests, __func__,
8554df1c 4391 NEG_ACKED, missing_ok);
c3afd8f5
AG
4392 if (!found) {
4393 /* Protocol A has no P_WRITE_ACKs, but has P_NEG_ACKs.
4394 The master bio might already be completed, therefore the
4395 request is no longer in the collision hash. */
4396 /* In Protocol B we might already have got a P_RECV_ACK
4397 but then get a P_NEG_ACK afterwards. */
4398 if (!missing_ok)
2deb8336 4399 return false;
c3afd8f5 4400 drbd_set_out_of_sync(mdev, sector, size);
2deb8336 4401 }
2deb8336 4402 return true;
b411b363
PR
4403}
4404
d8763023 4405static int got_NegDReply(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363 4406{
257d0af6 4407 struct p_block_ack *p = &mdev->tconn->meta.rbuf.block_ack;
b411b363
PR
4408 sector_t sector = be64_to_cpu(p->sector);
4409
4410 update_peer_seq(mdev, be32_to_cpu(p->seq_num));
4411 dev_err(DEV, "Got NegDReply; Sector %llus, len %u; Fail original request.\n",
4412 (unsigned long long)sector, be32_to_cpu(p->blksize));
4413
4414 return validate_req_change_req_state(mdev, p->block_id, sector,
bc9c5c41 4415 &mdev->read_requests, __func__,
8554df1c 4416 NEG_ACKED, false);
b411b363
PR
4417}
4418
d8763023 4419static int got_NegRSDReply(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363
PR
4420{
4421 sector_t sector;
4422 int size;
257d0af6 4423 struct p_block_ack *p = &mdev->tconn->meta.rbuf.block_ack;
b411b363
PR
4424
4425 sector = be64_to_cpu(p->sector);
4426 size = be32_to_cpu(p->blksize);
b411b363
PR
4427
4428 update_peer_seq(mdev, be32_to_cpu(p->seq_num));
4429
4430 dec_rs_pending(mdev);
4431
4432 if (get_ldev_if_state(mdev, D_FAILED)) {
4433 drbd_rs_complete_io(mdev, sector);
257d0af6 4434 switch (cmd) {
d612d309
PR
4435 case P_NEG_RS_DREPLY:
4436 drbd_rs_failed_io(mdev, sector, size);
4437 case P_RS_CANCEL:
4438 break;
4439 default:
4440 D_ASSERT(0);
4441 put_ldev(mdev);
4442 return false;
4443 }
b411b363
PR
4444 put_ldev(mdev);
4445 }
4446
81e84650 4447 return true;
b411b363
PR
4448}
4449
d8763023 4450static int got_BarrierAck(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363 4451{
257d0af6 4452 struct p_barrier_ack *p = &mdev->tconn->meta.rbuf.barrier_ack;
b411b363
PR
4453
4454 tl_release(mdev, p->barrier, be32_to_cpu(p->set_size));
4455
c4752ef1
PR
4456 if (mdev->state.conn == C_AHEAD &&
4457 atomic_read(&mdev->ap_in_flight) == 0 &&
370a43e7
PR
4458 !test_and_set_bit(AHEAD_TO_SYNC_SOURCE, &mdev->current_epoch->flags)) {
4459 mdev->start_resync_timer.expires = jiffies + HZ;
4460 add_timer(&mdev->start_resync_timer);
c4752ef1
PR
4461 }
4462
81e84650 4463 return true;
b411b363
PR
4464}
4465
d8763023 4466static int got_OVResult(struct drbd_conf *mdev, enum drbd_packet cmd)
b411b363 4467{
257d0af6 4468 struct p_block_ack *p = &mdev->tconn->meta.rbuf.block_ack;
b411b363
PR
4469 struct drbd_work *w;
4470 sector_t sector;
4471 int size;
4472
4473 sector = be64_to_cpu(p->sector);
4474 size = be32_to_cpu(p->blksize);
4475
4476 update_peer_seq(mdev, be32_to_cpu(p->seq_num));
4477
4478 if (be64_to_cpu(p->block_id) == ID_OUT_OF_SYNC)
4479 drbd_ov_oos_found(mdev, sector, size);
4480 else
4481 ov_oos_print(mdev);
4482
1d53f09e 4483 if (!get_ldev(mdev))
81e84650 4484 return true;
1d53f09e 4485
b411b363
PR
4486 drbd_rs_complete_io(mdev, sector);
4487 dec_rs_pending(mdev);
4488
ea5442af
LE
4489 --mdev->ov_left;
4490
4491 /* let's advance progress step marks only for every other megabyte */
4492 if ((mdev->ov_left & 0x200) == 0x200)
4493 drbd_advance_rs_marks(mdev, mdev->ov_left);
4494
4495 if (mdev->ov_left == 0) {
b411b363
PR
4496 w = kmalloc(sizeof(*w), GFP_NOIO);
4497 if (w) {
4498 w->cb = w_ov_finished;
e42325a5 4499 drbd_queue_work_front(&mdev->tconn->data.work, w);
b411b363
PR
4500 } else {
4501 dev_err(DEV, "kmalloc(w) failed.");
4502 ov_oos_print(mdev);
4503 drbd_resync_finished(mdev);
4504 }
4505 }
1d53f09e 4506 put_ldev(mdev);
81e84650 4507 return true;
b411b363
PR
4508}
4509
d8763023 4510static int got_skip(struct drbd_conf *mdev, enum drbd_packet cmd)
0ced55a3 4511{
81e84650 4512 return true;
0ced55a3
PR
4513}
4514
b411b363
PR
4515struct asender_cmd {
4516 size_t pkt_size;
d8763023 4517 int (*process)(struct drbd_conf *mdev, enum drbd_packet cmd);
b411b363
PR
4518};
4519
4520static struct asender_cmd *get_asender_cmd(int cmd)
4521{
4522 static struct asender_cmd asender_tbl[] = {
4523 /* anything missing from this table is in
4524 * the drbd_cmd_handler (drbd_default_handler) table,
4525 * see the beginning of drbdd() */
257d0af6
PR
4526 [P_PING] = { sizeof(struct p_header), got_Ping },
4527 [P_PING_ACK] = { sizeof(struct p_header), got_PingAck },
b411b363
PR
4528 [P_RECV_ACK] = { sizeof(struct p_block_ack), got_BlockAck },
4529 [P_WRITE_ACK] = { sizeof(struct p_block_ack), got_BlockAck },
4530 [P_RS_WRITE_ACK] = { sizeof(struct p_block_ack), got_BlockAck },
4531 [P_DISCARD_ACK] = { sizeof(struct p_block_ack), got_BlockAck },
4532 [P_NEG_ACK] = { sizeof(struct p_block_ack), got_NegAck },
4533 [P_NEG_DREPLY] = { sizeof(struct p_block_ack), got_NegDReply },
4534 [P_NEG_RS_DREPLY] = { sizeof(struct p_block_ack), got_NegRSDReply},
4535 [P_OV_RESULT] = { sizeof(struct p_block_ack), got_OVResult },
4536 [P_BARRIER_ACK] = { sizeof(struct p_barrier_ack), got_BarrierAck },
4537 [P_STATE_CHG_REPLY] = { sizeof(struct p_req_state_reply), got_RqSReply },
4538 [P_RS_IS_IN_SYNC] = { sizeof(struct p_block_ack), got_IsInSync },
02918be2 4539 [P_DELAY_PROBE] = { sizeof(struct p_delay_probe93), got_skip },
d612d309 4540 [P_RS_CANCEL] = { sizeof(struct p_block_ack), got_NegRSDReply},
b411b363
PR
4541 [P_MAX_CMD] = { 0, NULL },
4542 };
4543 if (cmd > P_MAX_CMD || asender_tbl[cmd].process == NULL)
4544 return NULL;
4545 return &asender_tbl[cmd];
4546}
4547
4548int drbd_asender(struct drbd_thread *thi)
4549{
4550 struct drbd_conf *mdev = thi->mdev;
257d0af6 4551 struct p_header *h = &mdev->tconn->meta.rbuf.header;
b411b363
PR
4552 struct asender_cmd *cmd = NULL;
4553
257d0af6 4554 int rv;
b411b363
PR
4555 void *buf = h;
4556 int received = 0;
257d0af6 4557 int expect = sizeof(struct p_header);
f36af18c 4558 int ping_timeout_active = 0;
257d0af6 4559 int empty, pkt_size;
d8763023 4560 enum drbd_packet cmd_nr;
b411b363
PR
4561
4562 sprintf(current->comm, "drbd%d_asender", mdev_to_minor(mdev));
4563
4564 current->policy = SCHED_RR; /* Make this a realtime task! */
4565 current->rt_priority = 2; /* more important than all other tasks */
4566
e77a0a5c 4567 while (get_t_state(thi) == RUNNING) {
b411b363
PR
4568 drbd_thread_current_set_cpu(mdev);
4569 if (test_and_clear_bit(SEND_PING, &mdev->flags)) {
841ce241
AG
4570 if (!drbd_send_ping(mdev)) {
4571 dev_err(DEV, "drbd_send_ping has failed\n");
4572 goto reconnect;
4573 }
e42325a5 4574 mdev->tconn->meta.socket->sk->sk_rcvtimeo =
89e58e75 4575 mdev->tconn->net_conf->ping_timeo*HZ/10;
f36af18c 4576 ping_timeout_active = 1;
b411b363
PR
4577 }
4578
4579 /* conditionally cork;
4580 * it may hurt latency if we cork without much to send */
89e58e75 4581 if (!mdev->tconn->net_conf->no_cork &&
b411b363 4582 3 < atomic_read(&mdev->unacked_cnt))
e42325a5 4583 drbd_tcp_cork(mdev->tconn->meta.socket);
b411b363
PR
4584 while (1) {
4585 clear_bit(SIGNAL_ASENDER, &mdev->flags);
4586 flush_signals(current);
0f8488e1 4587 if (!drbd_process_done_ee(mdev))
b411b363 4588 goto reconnect;
b411b363
PR
4589 /* to avoid race with newly queued ACKs */
4590 set_bit(SIGNAL_ASENDER, &mdev->flags);
87eeee41 4591 spin_lock_irq(&mdev->tconn->req_lock);
b411b363 4592 empty = list_empty(&mdev->done_ee);
87eeee41 4593 spin_unlock_irq(&mdev->tconn->req_lock);
b411b363
PR
4594 /* new ack may have been queued right here,
4595 * but then there is also a signal pending,
4596 * and we start over... */
4597 if (empty)
4598 break;
4599 }
4600 /* but unconditionally uncork unless disabled */
89e58e75 4601 if (!mdev->tconn->net_conf->no_cork)
e42325a5 4602 drbd_tcp_uncork(mdev->tconn->meta.socket);
b411b363
PR
4603
4604 /* short circuit, recv_msg would return EINTR anyways. */
4605 if (signal_pending(current))
4606 continue;
4607
e42325a5 4608 rv = drbd_recv_short(mdev, mdev->tconn->meta.socket,
b411b363
PR
4609 buf, expect-received, 0);
4610 clear_bit(SIGNAL_ASENDER, &mdev->flags);
4611
4612 flush_signals(current);
4613
4614 /* Note:
4615 * -EINTR (on meta) we got a signal
4616 * -EAGAIN (on meta) rcvtimeo expired
4617 * -ECONNRESET other side closed the connection
4618 * -ERESTARTSYS (on data) we got a signal
4619 * rv < 0 other than above: unexpected error!
4620 * rv == expected: full header or command
4621 * rv < expected: "woken" by signal during receive
4622 * rv == 0 : "connection shut down by peer"
4623 */
4624 if (likely(rv > 0)) {
4625 received += rv;
4626 buf += rv;
4627 } else if (rv == 0) {
4628 dev_err(DEV, "meta connection shut down by peer.\n");
4629 goto reconnect;
4630 } else if (rv == -EAGAIN) {
cb6518cb
LE
4631 /* If the data socket received something meanwhile,
4632 * that is good enough: peer is still alive. */
31890f4a 4633 if (time_after(mdev->tconn->last_received,
e42325a5 4634 jiffies - mdev->tconn->meta.socket->sk->sk_rcvtimeo))
cb6518cb 4635 continue;
f36af18c 4636 if (ping_timeout_active) {
b411b363
PR
4637 dev_err(DEV, "PingAck did not arrive in time.\n");
4638 goto reconnect;
4639 }
4640 set_bit(SEND_PING, &mdev->flags);
4641 continue;
4642 } else if (rv == -EINTR) {
4643 continue;
4644 } else {
4645 dev_err(DEV, "sock_recvmsg returned %d\n", rv);
4646 goto reconnect;
4647 }
4648
4649 if (received == expect && cmd == NULL) {
257d0af6 4650 if (!decode_header(mdev, h, &cmd_nr, &pkt_size))
b411b363 4651 goto reconnect;
257d0af6 4652 cmd = get_asender_cmd(cmd_nr);
b411b363 4653 if (unlikely(cmd == NULL)) {
257d0af6
PR
4654 dev_err(DEV, "unknown command %d on meta (l: %d)\n",
4655 cmd_nr, pkt_size);
b411b363
PR
4656 goto disconnect;
4657 }
4658 expect = cmd->pkt_size;
257d0af6
PR
4659 if (pkt_size != expect - sizeof(struct p_header)) {
4660 dev_err(DEV, "Wrong packet size on meta (c: %d, l: %d)\n",
4661 cmd_nr, pkt_size);
b411b363 4662 goto reconnect;
257d0af6 4663 }
b411b363
PR
4664 }
4665 if (received == expect) {
31890f4a 4666 mdev->tconn->last_received = jiffies;
b411b363 4667 D_ASSERT(cmd != NULL);
257d0af6 4668 if (!cmd->process(mdev, cmd_nr))
b411b363
PR
4669 goto reconnect;
4670
f36af18c
LE
4671 /* the idle_timeout (ping-int)
4672 * has been restored in got_PingAck() */
4673 if (cmd == get_asender_cmd(P_PING_ACK))
4674 ping_timeout_active = 0;
4675
b411b363
PR
4676 buf = h;
4677 received = 0;
257d0af6 4678 expect = sizeof(struct p_header);
b411b363
PR
4679 cmd = NULL;
4680 }
4681 }
4682
4683 if (0) {
4684reconnect:
4685 drbd_force_state(mdev, NS(conn, C_NETWORK_FAILURE));
856c50c7 4686 drbd_md_sync(mdev);
b411b363
PR
4687 }
4688 if (0) {
4689disconnect:
4690 drbd_force_state(mdev, NS(conn, C_DISCONNECTING));
856c50c7 4691 drbd_md_sync(mdev);
b411b363
PR
4692 }
4693 clear_bit(SIGNAL_ASENDER, &mdev->flags);
4694
4695 D_ASSERT(mdev->state.conn < C_CONNECTED);
4696 dev_info(DEV, "asender terminated\n");
4697
4698 return 0;
4699}
This page took 0.391898 seconds and 5 git commands to generate.